Windows¸üе¼ÖÂÀ¶ÆÁ²¢ÏÔʾUNSUPPORTED_PROCESSOR
Ðû²¼Ê±¼ä 2023-08-251¡¢Windows¸üе¼ÖÂÀ¶ÆÁ²¢ÏÔʾUNSUPPORTED_PROCESSOR
¾ÝýÌå8ÔÂ24ÈÕ±¨µÀ£¬½üÆÚÐû²¼µÄWindows 10ºÍ Windows 11µÄ8Ô·ÝÔ¤ÀÀ¸üпɵ¼ÖÂÀ¶ÆÁ£¬²¢Ö¸³ö²»Ö§³ÖµÄ´¦ÖÃÆ÷ÎÊÌâ¡£ÓÐÎÊÌâµÄ¸üзֱðΪKB5029351(Win 11)ºÍKB5029331 (Win 10)£¬ËüÃÇÉæ¼°ËÑË÷Ó¦ÓÃÐÞ¸´ºÍÒýÈëеı¸·ÝÓ¦Óá£ÊÜÓ°ÏìÓû§³Æ£¬ÔÚ°²×°8ÔÂ2ÈÕÐû²¼µÄ¸üк󣬻᷺ÆðÀ¶ÆÁ²¢ÏÔʾ´íÎóÐÅÏ¢¡°UNSUPPORTED_PROCESSOR¡±¡£²¿ÃÅÓû§³Æ£¬ÓÐÎÊÌâµÄ¿ÉÑ¡¸üÐÂÔÚ¼¸´ÎÖØÆôºó»á×Ô¶¯»Ø¹ö¡£Î¢ÈíÕýÔÚÊÓ²ìÕâÒ»ÎÊÌ⣬ÒÔÈ·¶¨ËüÊÇ·ñÓë΢ÈíÏà¹Ø£¬²¢½¨ÒéÓöµ½BSOD´íÎóµÄÓû§Ê¹Ó÷´À¡ÖÐÐÄÌá½»³ÂËß¡£
https://www.bleepingcomputer.com/news/microsoft/new-windows-updates-cause-unsupported-processor-blue-screens/
2¡¢ESETÅû¶ͨ¹ýSpacecolon¹¤¾ß¼¯·Ö·¢ScarabµÄ»î¶¯
ESETÔÚ8ÔÂ23ÈÕÅû¶ÁËͨ¹ýÒ»¸öСÐ͹¤¾ß¼¯Spacecolon·Ö·¢ÀÕË÷Èí¼þScarabµÄ»î¶¯¡£Spacecolon¿ÉÒÔ×·Ëݵ½2020Äê5Ô£¬×îа汾±àÒëÓÚ½ñÄê5Ô¡£ËüÓÉÈý¸öDelphi×é¼þ×é³É£¬·Ö±ðΪScHackTool¡¢ScInstallerºÍScService¡£¹¥»÷Õßͨ¹ýÈëÇÖWeb·þÎñÆ÷»ò±©Á¦ÆÆ½âRDPƾ¾Ý½øÈëÄ¿±ê£¬»¹»áƾ¾ÝÐèÒªÌṩ¶àÖÖµÚÈý·½ºì¶Ó¹¤¾ß£¬×îÖջᰲװÀÕË÷Èí¼þScarab¡£´ËÍ⣬¹¥»÷ÕßËÆºõÕýÔÚ×¼±¸·Ö·¢ÐµÄÀÕË÷Èí¼þScRansom£¬µ«ÊÇÑо¿ÈËÔ±ÉÐδÔÚÒ°Íâ·¢ÏÖËü£¬ÍƲâÆäÈÔ´¦ÓÚ¿ª·¢½×¶Î¡£
https://www.welivesecurity.com/en/eset-research/scarabs-colon-izing-vulnerable-servers/
3¡¢3ǧ¶ą̀Openfire·þÎñÆ÷δÐÞ¸´Â©¶´CVE-2023-32315
¾Ý8ÔÂ24ÈÕ±¨µÀ£¬VulncheckÑо¿ÈËÔ±·¢ÏÖ£¬Áè¼Ý3000̨Openfire·þÎñÆ÷ÈÝÒ×Êܵ½Openfire©¶´µÄÓ°Ïì¡£ÕâÊÇÒ»¸ö·¾¶±éÀú©¶´£¨CVE-2023-32315£©£¬ÓÚ5ÔÂ23ÈÕÅû¶£¬ÏÖÒѱ»ÐÞ¸´¡£µ«ÔÚ6Ô·ÝÓб¨µÀ³Æ£¬¸Ã©¶´±»ÀûÓÃÀ´´´½¨¹ÜÀíÔ±Óû§²¢ÔÚδÐÞ¸´µÄ·þÎñÆ÷ÖÐÉÏ´«¶ñÒâ²å¼þ¡£VulnCheck³Æ£¬ShodanɨÃè·¢ÏÖÁË6324̨̻¶µÄOpenfire·þÎñÆ÷£¬ÆäÖÐ50%£¨3162̨£©Î´´ò²¹¶¡£¬ÈÔÈ»ÈÝÒ×Êܵ½¸Ã©¶´µÄÓ°Ïì¡£
https://securityaffairs.com/149811/breaking-news/openfire-servers-exposed-new-exploit.html
4¡¢Ñо¿ÈËÔ±¼ì²âµ½Ê®¼¸¸öÕë¶ÔRoblox¿ª·¢ÕߵĶñÒâNPM°ü
ReversingLabsÔÚ8ÔÂ22ÈÕ³ÆÆä¼ì²âµ½Ê®¼¸¸ö¶ñÒâNPM°ü£¬Ö¼ÔÚ°²×°¿ªÔ´ÐÅÏ¢ÇÔÈ¡·¨Ê½Luna Grabber¡£¸Ã»î¶¯Ê¼ÓÚ8Ô³õ£¬Ê¹ÓÃÁËαװ³ÉºÏ·¨°ünoblox.jsµÄÄ£¿é¡£¸Ã»î¶¯Õë¶ÔµÄÊÇRobloxÓÎϷƽ̨µÄ¿ª·¢ÈËÔ±£¬ºÏ·¨µÄnoblox.js°üÊÇÒ»¸ö¿ªÔ´Roblox API·â×°·¨Ê½¡£ReversingLabs½«´Ë´Î»î¶¯ÃèÊöΪ2021Äê10Ô·¢ÏÖµÄÒ»´Î¹¥»÷µÄÖØÑÝ£¬µ«¶þÕßÒ²´æÔÚ²îÒì£¬ÌØ±ðÊÇлÏÂÔØÁËÒ»¸ö¿ÉÖ´ÐÐÎļþÀ´°²×°Luna Grabber¡£¾ÝϤ£¬ÕâÊÇnpmÉÏ·¢Ïֵĺ±¼ûµÄ¶à½×¶ÎѬȾ°¸ÀýÖ®Ò»¡£
https://www.reversinglabs.com/blog/fake-roblox-api-packages-luna-grabber-npm
5¡¢Check PointÐû²¼2023ÄêÄêÖÐÄþ¾²Ì¬ÊƵķÖÎö³ÂËß
8ÔÂ23ÈÕ£¬Check PointÐû²¼ÁË2023ÄêÄêÖÐÍøÂçÄþ¾²Ì¬ÊƵķÖÎö³ÂËß¡£½ö½ñÄêµÚ¶þ¼¾¶È£¬Ã¿ÖÜÍøÂç¹¥»÷¾ÍÔö¼ÓÁË8%£¬ÕâÊǹýÈ¥Á½ÄêÀ´×îÏÔÖøµÄÔö·ù¡£¹¥»÷Õß²»½öÀûÓÃ×îм¼Êõ£¬»¹ÀûÓÃÒѹûÈ»Åû¶µÄ©¶´À´Ö´ÐжñÒâ»î¶¯¡£ÉϰëÄ꣬¹²ÓÐ48¸öÀÕË÷ÍÅ»ïÉù³ÆÈëÇÖ²¢ÀÕË÷ÁË2200¶à¸öÄ¿±ê¡£³ýÁËLockbitºÍAlphvµÈÀÏÅÆ¹¥»÷Õߣ¬»¹ÓÐRoyalºÍPlayµÈÐÂÃæ¿×¡£³ÂËß»¹Ö¸³ö£¬ÍøÂçÄþ¾²ÊÇÒ»¸ö¶¯Ì¬µÄÕ½³¡£¬ÆóÒµÐèÒª½áºÏ×îеÄÈ˹¤ÖÇÄÜÇý¶¯µÄ·ÀÓùºÍ¶Ô¾É©¶´µÄÉîÈëÁ˽⣬ƾ¾Ý²»Í£±ä»¯µÄÍþÐ²Ì¬ÊÆÀ´¿ª·¢×Ô¼ºµÄÄþ¾²¼ÆÄ±¡£
https://pages.checkpoint.com/2023-mid-year-cyber-security-report.html
6¡¢SophosÐû²¼2023ÄêÉϰëÄê¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
8ÔÂ23ÈÕ£¬SophosÐû²¼Á˹ØÓÚ2023ÄêÉϰëÄê¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£ÀÕË÷Èí¼þÔÚÄ¿±êÍøÂçÉÏ»¨·ÑµÄʱ¼äÔ½À´Ô½ÉÙ£¬ÉϰëÄ꣬ÀÕË÷¹¥»÷ÕßÍ£Áôʱ¼äµÄÖÐλÊý´Ó2022ÄêµÄ9Ìì½µÖÁ5Ìì¡£ËùÓй¥»÷ÀàÐ͵Ä×ÜÌåÍ£Áôʱ¼äΪ8Ì죬µÍÓÚ2022ÄêµÄ10Ìì¡£ÀÕË÷¹¥»÷Õ¼½ñÄê¼Ç¼µÄËùÓй¥»÷µÄ68.75%¡£43.42%µÄ¹¥»÷·¢ÉúÁËÊý¾Ýй¶£¬±ÈÈ¥ÄêÔö¼ÓÁË1.3%¡£¼ì²ìÓйØÈÕÆÚºÍʱ¼äµÄÊý¾Ý·¢ÏÖ£¬¹¥»÷Õ߸üÏ²î³ØÚÖܶþ¡¢ÖÜÈýºÍÖÜËÄÌᳫ¹¥»÷¡£Ô¶³Ì×ÀÃæÐÒé(RDP)ÈÔÈ»ÊDZ»ÀûÓÃ×î¶àµÄ¹¤¾ßÖ®Ò»£¬Í³¼ÆÊý¾ÝÏÔʾ£¬95%µÄ¹¥»÷¶¼Ê¹ÓÃÁËRDP¡£
https://news.sophos.com/en-us/2023/08/23/active-adversary-for-tech-leaders/