Ó¢ÌضûÊÓ²ìMSI©¶´µ¼ÖµÄBoot Guard˽Կй¶Ê¼þ

Ðû²¼Ê±¼ä 2023-05-10

1¡¢Ó¢ÌضûÊÓ²ìMSI©¶´µ¼ÖµÄBoot Guard˽Կй¶Ê¼þ


¾ÝýÌå5ÔÂ8ÈÕ±¨µÀ £¬Ó¢ÌضûÕýÔÚÊÓ²ìÆäBoot GuardÄþ¾²¹¦Ð§Ê¹ÓõÄ˽ԿµÄй¶Ê¼þ¡£3Ô £¬Money MessageÍŻ﹥»÷Á˼ÆËã»úÓ²¼þÖÆÔìÉÌMSI £¬Éù³ÆÒÑÇÔÈ¡1.5TBÊý¾Ý £¬Éæ¼°¹Ì¼þ¡¢Ô´´úÂëºÍÊý¾Ý¿â¡£²¢ÀÕË÷400ÍòÃÀÔª £¬ÔÚδÊÕµ½Êê½ðºó¿ªÊ¼Ð¹Â¶MSIµÄÊý¾Ý¡£¾ÝϤ £¬Ð¹Â¶µÄÔ´´úÂë°üÂÞ57¿îMSI²úÎïµÄ¾µÏñÇ©Ãû˽ԿºÍ116¿îMSI²úÎïµÄIntel Boot Guard˽Կ¡£Ó¢ÌضûÕýÔÚ»ý¼«ÊÓ²ì´ËÊ £¬Ñо¿ÈËԱ͸¶ £¬Õû¸öÓ¢ÌضûÉú̬ϵͳ¶¼Êܵ½ÁË´Ë´ÎMSIÊý¾Ý鶵ÄÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/intel-investigating-leak-of-intel-boot-guard-private-keys-after-msi-breach/


2¡¢Î¢ÈíÐû²¼3Ô·ÝÄþ¾²¸üР£¬ÐÞ¸´Á½¸öÒѱ»ÀûÓõÄ©¶´


5ÔÂ9ÈÕ £¬Î¢ÈíÐû²¼3Ô·ÝÖܶþ²¹¶¡ £¬ÐÞ¸´ÁË°üÂÞ3¸ö0 dayÔÚÄÚµÄ38¸ö©¶´(²»°üÂÞ5ÔÂ5ÈÕÐÞ¸´µÄ11¸öMicrosoft Edge©¶´)¡£´Ë´ÎÐÞ¸´µÄ3¸ö0 dayÖÐ £¬ÓÐÁ½¸öÔÚ¹¥»÷Öб»ÀûÓà £¬ÁíÒ»¸öÒѹûÈ»Åû¶¡£±»ÀûÓõÄ©¶´ÊÇWin32kÄÚºËÇý¶¯·¨Ê½ÖеÄÌáȨ©¶´£¨CVE-2023-29336£©ºÍÄþ¾²Æô¶¯Äþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2023-24932£© £¬ºóÕ߿ɱ»ÓÃÓÚ°²×°BlackLotus UEFI bootkit¡£ÒѹûÈ»Åû¶µÄÊÇWindows OLEµÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-29325£©¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2023-patch-tuesday-fixes-3-zero-days-38-flaws/


3¡¢OT&P HealthcareÔâµ½¹¥»÷Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶


¾Ý5ÔÂ8ÈÕ±¨µÀ £¬ÖйúÏã¸ÛµÄÒ½ÁƱ£½¡¹«Ë¾OT&P HealthcareÔâµ½ÍøÂç¹¥»÷ £¬Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶¡£¸Ã¹«Ë¾µÄIT²¿ÃÅÔÚÉÏÖÜËÄ·¢ÏÖ¡°ÏµÍ³²»Îȶ¨¡±µÄÎÊÌâ £¬ÊӲ췢ÏÖÆäÔâµ½Á˹¥»÷ £¬²¢Á¢¼´¹Ø±ÕÁ˸Ãϵͳ¡£Ñо¿ÈËÔ±ÕýÔÚÆÀ¹À¹¥»÷µÄ¹æÄ£ £¬Éв»È·¶¨Óм¸¶àÊý¾Ý±»µÁ £¬µ«Ò»Ð©»¼ÕßµÄÉí·ÝÖ¤ºÍ»¤ÕÕºÅÂë±»´¢´æÔÚϵͳÖС£´ÓÄ¿Ç°¹ûÈ»µÄÐÅÏ¢À´¿´ £¬»¹²»Çå³þÕâÊÇ·ñΪÀÕË÷Èí»÷ £¬ÒòΪûÓÐÌá¼°ÈκÎÒªÇó¡£


https://www.databreaches.net/hk-personal-data-medical-history-of-100000-otp-healthcare-patients-may-have-been-compromised-in-cyberattack/


4¡¢Ó¢¹úCapita¹«Ë¾AWS´æ´¢Í°ÅäÖôíÎóй¶655 GBÊý¾Ý


ýÌå5ÔÂ5ÈÕ³Æ £¬Ó¢¹úÍâ°ü¹«Ë¾CapitaµÄAWS´æ´¢Í°×Ô2016ÄêÒÔÀ´Ò»Ö±Ì»Â¶ÔÚÍøÉÏ £¬ÆäÖаüÂÞÔ¼3000¸öÎļþ £¬×ܾÞϸΪ655 GB¡£ÕâЩÊý¾Ý°üÂÞÈí¼þÎļþ¡¢·þÎñÆ÷ͼÏñ¡¢´óÁ¿Excel±í¸ñ¡¢PowerPointÎļþºÍÎı¾Îļþ £¬ÆäÖÐÒ»¸öÎı¾°üÂÞCapitaÒ»¸öϵͳµÄµÇ¼ÐÅÏ¢¡£´æ´¢Í°ÉÏûÓÐÃÜÂë £¬ÈκÎÖªµÀºÍ²Âµ½ÍøÖ·µÄÈ˶¼¿ÉÒÔ·ÃÎÊÕâЩÎļþ £¬GrayHatWarfareÒ²²¶×½Á˸ÃÔÆ·þÎñÆ÷µÄÏêϸÐÅÏ¢¾ÝϤ¡£Ä¿Ç° £¬CapitaÒѽ«ÕâЩÊý¾Ý±£»¤ÆðÀ´¡£


https://candid.technology/capita-database-exposed-since-2016/


5¡¢Î¢Èí·¢ÏÖ¶à¸öºÚ¿ÍÍÅ»ïÀûÓÃPapercut©¶´µÄ¹¥»÷»î¶¯


ýÌå5ÔÂ9ÈÕ±¨µÀ £¬Î¢Èí·¢ÏÖÓëÒÁÀÊÓйصÄÍÅ»ïMango SandstormºÍMint SandstormÀûÓÃPaperCut MF/NGÖЩ¶´µÄ¹¥»÷»î¶¯¡£ÕâÊÇÒ»¸ö·ÃÎÊ¿ØÖƲ»Íש¶´£¨CVE-2023-27350£© £¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÔÚSYSTEMÖÐÖ´ÐдúÂë¡£ÆäÖÐMint SandstormµÄÀûÓûËƺõÊÇ»ú»áÖ÷ÒåµÄ £¬Ó°ÏìÁ˸÷¸öÐÐÒµºÍµØÓòµÄ×éÖ¯¡£Mango SandstormµÄÀûÓûÈÔÈ»ºÜµÍ £¬¹¥»÷ÕßʹÓÃÏÈÇ°ÈëÇֵŤ¾ßÁ¬½Óµ½ËûÃǵÄC2»ù´¡ÉèÊ©¡£


https://securityaffairs.com/145952/apt/iranian-apt-papercut-exploitation.html


6¡¢MalwarebyteÐû²¼4Ô·ÝÀÕË÷Èí¼þ̬ÊƵķÖÎö³ÂËß


5ÔÂ8ÈÕ £¬MalwarebyteÐû²¼Á˹ØÓÚ4Ô·ÝÀÕË÷Èí¼þ̬ÊƵķÖÎö³ÂËß¡£4Ô £¬LockBitÈÔ±£³ÖÆäÁìÏȵÄְλ £¬Ëü»¹¿ª·¢³öÁËmacOS±äÌå¡£Æä´ÎÊÇALPHV¡¢BianLianºÍRoyal¡£Êܵ½ÀÕË÷¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È48%£© £¬Æä´ÎÊǼÓÄôó£¨5%£©ºÍµÂ¹ú£¨4%£©µÈ¡£ÊÜ´ËÀ๥»÷Ó°Ïì×îÑÏÖصÄÊÇ·þÎñÒµ £¬Æä´ÎÊÇÒ½ÁƱ£½¡ºÍ¹«ÓÃÉèÊ©¡£4Ô·ݷºÆ𼸸öеÄÀÕË÷Èí¼þ £¬·Ö±ðΪAkira¡¢CrossLock¡¢Trigona¡¢Dunghill LeakºÍMoney Message¡£


https://www.malwarebytes.com/blog/threat-intelligence/2023/05/ransomware-review-may-2023