SonicWall½ô¼±¸üÐÂÐÞ¸´GMSºÍAnalyticsÖеÄ15¸ö©¶´

Ðû²¼Ê±¼ä 2023-07-14

1¡¢SonicWall½ô¼±¸üÐÂÐÞ¸´GMSºÍAnalyticsÖеÄ15¸ö©¶´


7ÔÂ12ÈÕ£¬SonicWallÐû²¼½ô¼±¸üУ¬ÐÞ¸´ÁËGMS·À»ðǽ¹ÜÀíϵͳºÍAnalyticsÍøÂç³ÂËßÒýÇæÈí¼þÖеÄ15¸ö©¶´¡£ÆäÖнÏΪÑÏÖصÄÊÇWeb·þÎñÉí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2023-34124£©¡¢¶à¸öδ¾­Éí·ÝÑéÖ¤µÄSQLºÍÄþ¾²¹ýÂËÆ÷Èƹý©¶´£¨CVE-2023-34133£©¡¢Í¨¹ýWeb·þÎñ¶ÁÈ¡ÃÜÂëhash©¶´£¨CVE-2023-34134£©ºÍCASÉí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2023-34137£©¡£ÕâЩ©¶´ÉÐδ±»ÀûÓ㬸ù«Ë¾½¨ÒéʹÓÃÊÜÓ°Ïì²úÎïµÄÓû§Á¢¼´Ó¦Óò¹¶¡¡£


https://www.bleepingcomputer.com/news/security/sonicwall-warns-admins-to-patch-critical-auth-bypass-bugs-immediately/


2¡¢BlackLotus UEFI BootkitÔ´´úÂëÔÚGitHubÉϹûÈ»


¾Ý7ÔÂ13ÈÕ±¨µÀ£¬BlackLotus UEFI BootkitÔ´´úÂëÔÚGitHubÉϹûÈ»¡£¸ÃbootkitרΪWindowsÉè¼Æ£¬È¥Äê10Ô·ºÆðÔÚºÚ¿ÍÂÛ̳£¬Éù³Æ¾ßÓÐAPT¼¶´ËÍ⹦Ч£¬ÀýÈçÈƹýUACÒÔ¼°½ûÓÃÄþ¾²Ó¦ÓúͷÀÓù»úÖÆ¡£BlackLotus×î³õÔÚºÚ¿ÍÂÛ̳ÉϵÄÊÛ¼ÛΪ5000ÃÀÔª£¬ÏÖÔÚ£¬ÆäÔ´´úÂë±»Óû§YukariÔÚÐû²¼ÔÚGitHubÉÏ£¬Ê¹Ëü¿É¹©ÈκÎÈËʹÓá£Ð¹Â¶µÄÔ´´úÂëɾ³ýÁËBaton Drop©¶´£¨CVE-2022-21894 £©£¬Ö÷Òª°üÂÞrootkit²¿ÃźÍÈƹýÄþ¾²Æô¶¯µÄbootkit´úÂë¡£


https://www.securityweek.com/blacklotus-uefi-bootkit-source-code-leaked-on-github/


3¡¢Mandiant¹ûÈ»Á½Æðͨ¹ýUSB·Ö·¢µÄ¶ñÒâÈí¼þ»î¶¯µÄϸ½Ú


MandiantÔÚ7ÔÂ11ÈÕ͸¶Æä·¢ÏÖÁËÁ½Æðͨ¹ýUSB·Ö·¢µÄ¶ñÒâÈí¼þ»î¶¯¡£µÚÒ»¸ö»î¶¯±»¹éÒòÓÚTEMP.HEX£¬ÀûÓöñÒâDLLÎļþ¼ÓÔغóÃÅSogu¡£¸Ã»î¶¯Õë¶ÔÈ«Çò¶à¸öÐÐÒµ£¬²¢ÊÔͼ´ÓÄ¿±ê¼ÆËã»úÖÐÇÔÈ¡Êý¾Ý£¬ÆäÖдó¶àÊýÄ¿±êÊôÓÚÖÆÒ©¡¢IT¡¢ÄÜÔ´¡¢Í¨ÐÅ¡¢ÎÀÉúºÍÎïÁ÷ÐÐÒµ¡£µÚ¶þ¸ö»î¶¯·Ö·¢»ùÓÚshellcodeµÄºóÃÅSnowydrive£¬Ëü±»¼ÓÔص½ºÏ·¨½ø³ÌCUZ.exeÖУ¬¾ßÓÐÊý¾Ýй¶¡¢·´Ïòshell¡¢ÃüÁîÖ´ÐкÍÕì²ìµÈ¹¦Ð§£¬±»¹éÒòÓÚÕë¶ÔÑÇÖÞʯÓͺÍÌìÈ»Æø¹«Ë¾µÄUNC4698¡£


https://www.mandiant.com/resources/blog/infected-usb-steal-secrets


4¡¢2023ÄêÉÏ°ëÄêÈ«ÇòµÄ¼ÓÃÜÀÕË÷½ð¶î¸ß´ïÔ¼4.5ÒÚÃÀÔª


ChainaanalysisÔÚ7ÔÂ12Èճƣ¬¾­ÀúÁË»ìÂÒµÄ2022ÄêÖ®ºó£¬2023ÄêÆù½ñΪֹÊǼÓÃÜ»õ±ÒËÕÐѵÄÒ»Äê¡£½ØÖÁ6Ô·Ý£¬ÀÕË÷½ð¶îÒÑÖÁÉÙ4.491ÒÚÃÀÔª£¬µ½´ïÁË2022ÄêÈ«ÄêÀÕË÷Èí¼þ×ÜÊÕÈëµÄ90%¡£Èç¹û±£³ÖÕâһˮƽ£¬2023ÄêÈ«ÄêµÄÀÕË÷½ð¶î½«½ü9ÒÚÃÀÔª¡£Ñо¿ÈËÔ±ÈÏΪ£¬¹¥»÷Õß¿ªÊ¼Õë¶Ô¿ÉÒÔÀÕË÷µ½´ó±Ê½ðÇ®µÄ´óÐÍ×éÖ¯£¬µ¼ÖÂÁËÕâÖÖ´ó·ùÔö³¤¡£¸ß¶îÊê½ðÉæ¼°µÄÀÕË÷ÍÅ»ïÖ÷Òª°üÂÞBlackBasta¡¢LockBit¡¢ALPHVºÍClop¡£ÆäÖÐClopµÄƽ¾ùÊê½ðΪ170ÍòÃÀÔª£¬Êê½ðµÄÖÐλÊýΪ190ÍòÃÀÔª¡£


https://blog.chainalysis.com/reports/crypto-crime-midyear-2023-update-ransomware-scams/   


5¡¢Check PointÐû²¼QuickBlox¿ò¼ÜÖЩ¶´µÄ·ÖÎö³ÂËß


7ÔÂ12ÈÕ£¬Check Point³ÆÆä¶ÔQuickBlox¿ò¼ÜµÄSDKºÍAPIµÄÄþ¾²ÐÔ½øÐÐÑо¿£¬·¢ÏÖÁË¿ÉÄÜΣ¼°Êý°ÙÍòÓû§¸öÈËÐÅÏ¢µÄ©¶´¡£QuickBloxÊÇÒ»ÖÖÁ÷ÐеÄÁÄÌìºÍÊÓƵ·þÎñ£¬Ö÷ÒªÓÃÓÚÔ¶³ÌÒ½ÁÆ¡¢½ðÈÚºÍÖÇÄÜÎïÁªÍøÉ豸¡£Ñо¿ÈËÔ±»¹½âÊÍÁËһЩÆæÌصĹ¥»÷·½Ê½£¬ÀýÈ磬¿ÉÒÔʹ¹¥»÷Õß·ÃÎÊÖÇÄܶԽ²»ú²¢Ô¶³Ì¿ªÃÅ£¬»ò´ÓÔ¶³ÌÒ½ÁÆÓ¦ÓÃÖÐй©»¼ÕßµÄÊý¾Ý¡£Ä¿Ç°£¬QuickBloxÒÑͨ¹ýеÄÄþ¾²¼Ü¹¹Éè¼ÆºÍAPIÐÞ¸´ÁËÕâЩ©¶´¡£


https://research.checkpoint.com/2023/major-security-flaws-in-popular-quickblox-chat-and-video-framework-expose-sensitive-data-of-millions/


6¡¢FortiGuardÐû²¼½üÆÚ·Ö·¢LokiBotµÄ¹¥»÷»î¶¯µÄ³ÂËß


7ÔÂ12ÈÕ£¬FortiGuardÐû²¼³ÂËߣ¬·ÖÎöÁËÀûÓ鶴ºÍ¶ñÒâºê·Ö·¢¶ñÒâÈí¼þLokiBotµÄ»î¶¯¡£Ñо¿ÈËÔ±»ñÈ¡²¢·ÖÎöÁËÁ½ÖÖWordÎĵµ£¬µÚÒ»ÖÖ°üÂÞǶÈëÔÚXMLÎļþword/_rels/document.xml.relsÖеÄÍⲿÁ´½Ó£¬µÚ¶þÖÖ°üÂÞÔÚ´ò¿ªÎĵµºóÁ¢¼´Ö´ÐкêµÄVBA½Å±¾¡£ÕâЩÎĵµÀûÓÃÁËÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬¼´CVE-2021-40444ºÍCVE-2022-30190£¬×îÖÕ»áÔÚÄ¿±êµÄϵͳÖÐ×¢ÈëLokiBot¡£Ñо¿ÈËÔ±½¨Ò飬ÔÚ´¦ÖÃOfficeÎĵµ»òδ֪ÎļþʱӦ½÷É÷ÐÐÊ¡£


https://www.fortinet.com/blog/threat-research/lokibot-targets-microsoft-office-document-using-vulnerabilities-and-macros