Ó¢ÌضûÊÓ²ìMSI©¶´µ¼ÖµÄBoot Guard˽Կй¶Ê¼þ
Ðû²¼Ê±¼ä 2023-05-101¡¢Ó¢ÌضûÊÓ²ìMSI©¶´µ¼ÖµÄBoot Guard˽Կй¶Ê¼þ
¾ÝýÌå5ÔÂ8ÈÕ±¨µÀ£¬Ó¢ÌضûÕýÔÚÊÓ²ìÆäBoot GuardÄþ¾²¹¦Ð§Ê¹ÓõÄ˽ԿµÄй¶Ê¼þ¡£3Ô£¬Money MessageÍŻ﹥»÷Á˼ÆËã»úÓ²¼þÖÆÔìÉÌMSI£¬Éù³ÆÒÑÇÔÈ¡1.5TBÊý¾Ý£¬Éæ¼°¹Ì¼þ¡¢Ô´´úÂëºÍÊý¾Ý¿â¡£²¢ÀÕË÷400ÍòÃÀÔª£¬ÔÚδÊÕµ½Êê½ðºó¿ªÊ¼Ð¹Â¶MSIµÄÊý¾Ý¡£¾ÝϤ£¬Ð¹Â¶µÄÔ´´úÂë°üÂÞ57¿îMSI²úÎïµÄ¾µÏñÇ©Ãû˽ԿºÍ116¿îMSI²úÎïµÄIntel Boot Guard˽Կ¡£Ó¢ÌضûÕýÔÚ»ý¼«ÊÓ²ì´ËÊ£¬Ñо¿ÈËԱ͸¶£¬Õû¸öÓ¢ÌضûÉú̬ϵͳ¶¼Êܵ½ÁË´Ë´ÎMSIÊý¾Ý鶵ÄÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/intel-investigating-leak-of-intel-boot-guard-private-keys-after-msi-breach/
2¡¢Î¢ÈíÐû²¼3Ô·ÝÄþ¾²¸üУ¬ÐÞ¸´Á½¸öÒѱ»ÀûÓõÄ©¶´
5ÔÂ9ÈÕ£¬Î¢ÈíÐû²¼3Ô·ÝÖܶþ²¹¶¡£¬ÐÞ¸´ÁË°üÂÞ3¸ö0 dayÔÚÄÚµÄ38¸ö©¶´(²»°üÂÞ5ÔÂ5ÈÕÐÞ¸´µÄ11¸öMicrosoft Edge©¶´)¡£´Ë´ÎÐÞ¸´µÄ3¸ö0 dayÖУ¬ÓÐÁ½¸öÔÚ¹¥»÷Öб»ÀûÓã¬ÁíÒ»¸öÒѹûÈ»Åû¶¡£±»ÀûÓõÄ©¶´ÊÇWin32kÄÚºËÇý¶¯·¨Ê½ÖеÄÌáȨ©¶´£¨CVE-2023-29336£©ºÍÄþ¾²Æô¶¯Äþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2023-24932£©£¬ºóÕ߿ɱ»ÓÃÓÚ°²×°BlackLotus UEFI bootkit¡£ÒѹûÈ»Åû¶µÄÊÇWindows OLEµÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-29325£©¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2023-patch-tuesday-fixes-3-zero-days-38-flaws/
3¡¢OT&P HealthcareÔâµ½¹¥»÷Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶
¾Ý5ÔÂ8ÈÕ±¨µÀ£¬ÖйúÏã¸ÛµÄÒ½ÁƱ£½¡¹«Ë¾OT&P HealthcareÔâµ½ÍøÂç¹¥»÷£¬Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶¡£¸Ã¹«Ë¾µÄIT²¿ÃÅÔÚÉÏÖÜËÄ·¢ÏÖ¡°ÏµÍ³²»Îȶ¨¡±µÄÎÊÌ⣬ÊӲ췢ÏÖÆäÔâµ½Á˹¥»÷£¬²¢Á¢¼´¹Ø±ÕÁ˸Ãϵͳ¡£Ñо¿ÈËÔ±ÕýÔÚÆÀ¹À¹¥»÷µÄ¹æÄ££¬Éв»È·¶¨Óм¸¶àÊý¾Ý±»µÁ£¬µ«Ò»Ð©»¼ÕßµÄÉí·ÝÖ¤ºÍ»¤ÕÕºÅÂë±»´¢´æÔÚϵͳÖС£´ÓÄ¿Ç°¹ûÈ»µÄÐÅÏ¢À´¿´£¬»¹²»Çå³þÕâÊÇ·ñΪÀÕË÷Èí»÷£¬ÒòΪûÓÐÌá¼°ÈκÎÒªÇó¡£
https://www.databreaches.net/hk-personal-data-medical-history-of-100000-otp-healthcare-patients-may-have-been-compromised-in-cyberattack/
4¡¢Ó¢¹úCapita¹«Ë¾AWS´æ´¢Í°ÅäÖôíÎóй¶655 GBÊý¾Ý
ýÌå5ÔÂ5Èճƣ¬Ó¢¹úÍâ°ü¹«Ë¾CapitaµÄAWS´æ´¢Í°×Ô2016ÄêÒÔÀ´Ò»Ö±Ì»Â¶ÔÚÍøÉÏ£¬ÆäÖаüÂÞÔ¼3000¸öÎļþ£¬×ܾÞϸΪ655 GB¡£ÕâЩÊý¾Ý°üÂÞÈí¼þÎļþ¡¢·þÎñÆ÷ͼÏñ¡¢´óÁ¿Excel±í¸ñ¡¢PowerPointÎļþºÍÎı¾Îļþ£¬ÆäÖÐÒ»¸öÎı¾°üÂÞCapitaÒ»¸öϵͳµÄµÇ¼ÐÅÏ¢¡£´æ´¢Í°ÉÏûÓÐÃÜÂ룬ÈκÎÖªµÀºÍ²Âµ½ÍøÖ·µÄÈ˶¼¿ÉÒÔ·ÃÎÊÕâЩÎļþ£¬GrayHatWarfareÒ²²¶×½Á˸ÃÔÆ·þÎñÆ÷µÄÏêϸÐÅÏ¢¾ÝϤ¡£Ä¿Ç°£¬CapitaÒѽ«ÕâЩÊý¾Ý±£»¤ÆðÀ´¡£
https://candid.technology/capita-database-exposed-since-2016/
5¡¢Î¢Èí·¢ÏÖ¶à¸öºÚ¿ÍÍÅ»ïÀûÓÃPapercut©¶´µÄ¹¥»÷»î¶¯
ýÌå5ÔÂ9ÈÕ±¨µÀ£¬Î¢Èí·¢ÏÖÓëÒÁÀÊÓйصÄÍÅ»ïMango SandstormºÍMint SandstormÀûÓÃPaperCut MF/NGÖЩ¶´µÄ¹¥»÷»î¶¯¡£ÕâÊÇÒ»¸ö·ÃÎÊ¿ØÖƲ»Íש¶´£¨CVE-2023-27350£©£¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÔÚSYSTEMÖÐÖ´ÐдúÂë¡£ÆäÖÐMint SandstormµÄÀûÓûËƺõÊÇ»ú»áÖ÷ÒåµÄ£¬Ó°ÏìÁ˸÷¸öÐÐÒµºÍµØÓòµÄ×éÖ¯¡£Mango SandstormµÄÀûÓûÈÔÈ»ºÜµÍ£¬¹¥»÷ÕßʹÓÃÏÈÇ°ÈëÇֵŤ¾ßÁ¬½Óµ½ËûÃǵÄC2»ù´¡ÉèÊ©¡£
https://securityaffairs.com/145952/apt/iranian-apt-papercut-exploitation.html
6¡¢MalwarebyteÐû²¼4Ô·ÝÀÕË÷Èí¼þ̬ÊƵķÖÎö³ÂËß
5ÔÂ8ÈÕ£¬MalwarebyteÐû²¼Á˹ØÓÚ4Ô·ÝÀÕË÷Èí¼þ̬ÊƵķÖÎö³ÂËß¡£4Ô£¬LockBitÈÔ±£³ÖÆäÁìÏȵÄְ룬Ëü»¹¿ª·¢³öÁËmacOS±äÌå¡£Æä´ÎÊÇALPHV¡¢BianLianºÍRoyal¡£Êܵ½ÀÕË÷¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È48%£©£¬Æä´ÎÊǼÓÄôó£¨5%£©ºÍµÂ¹ú£¨4%£©µÈ¡£ÊÜ´ËÀ๥»÷Ó°Ïì×îÑÏÖصÄÊÇ·þÎñÒµ£¬Æä´ÎÊÇÒ½ÁƱ£½¡ºÍ¹«ÓÃÉèÊ©¡£4Ô·ݷºÆ𼸸öеÄÀÕË÷Èí¼þ£¬·Ö±ðΪAkira¡¢CrossLock¡¢Trigona¡¢Dunghill LeakºÍMoney Message¡£
https://www.malwarebytes.com/blog/threat-intelligence/2023/05/ransomware-review-may-2023