LinuxϵͳÃæÁÙÐÂÍþв£ºBootkitty UEFIÆô¶¯¹¤¾ß°ü±»·¢ÏÖ
Ðû²¼Ê±¼ä 2024-11-291. LinuxϵͳÃæÁÙÐÂÍþв£ºBootkitty UEFIÆô¶¯¹¤¾ß°ü±»·¢ÏÖ
11ÔÂ27ÈÕ£¬Ò»¿îÃûΪBootkittyµÄLinux¶ñÒâÈí¼þ×÷ΪÊ׸öרÃÅÕë¶ÔLinuxϵͳµÄUEFIÆô¶¯¹¤¾ß°üÒѱ»·¢ÏÖ£¬±êÖ¾×ŶÔWindowsµÄÒþÃØÆô¶¯¹¤¾ß°üÍþвÕý·¢Éúת±ä¡£¾¡¹ÜÄ¿Ç°Ëü½öÔÚijЩUbuntu°æ±¾ºÍÅäÖÃÉÏÆð×÷Óã¬ÇÒ´æÔÚÐí¶àδʹÓõĹ¦Ð§ºÍ¼æÈÝÐÔÎÊÌ⣬³£µ¼ÖÂϵͳÍ߽⣬µ«Æä´æÔÚ±êÖ¾×ÅUEFIÆô¶¯Ì×¼þÍþвÁìÓòµÄÒ»¸öÖØ´óÉú³¤¡£Bootkittyͨ¹ý¹Ò½ÓUEFIÄþ¾²ÈÏÖ¤ÐÒéºÍGRUBº¯ÊýÀ´ÈƹýÄþ¾²Æô¶¯ºÍÍêÕûÐÔÑéÖ¤£¬´Ó¶ø¼ÓÔضñÒâ×é¼þ¡£Ëü»¹»áÀ¹½ØLinuxÄں˵Ľâѹ¹ý³Ì²¢¹Ò½ÓÏà¹Øº¯Êý£¬Ê¹¶ñÒâÈí¼þÄܹ»¼ÓÔضñÒâÄ£¿é£¬²¢ÔÚϵͳÆô¶¯Ê±×¢Èë¶ñÒâ¿â¡£Ñо¿ÈËÔ±Ö¸³ö£¬½«BootkittyÉÏ´«µ½VirusTotalµÄͬһÓû§»¹ÉÏ´«ÁËÒ»¸öÃûΪBCDropperµÄδǩÃûÄÚºËÄ£¿é£¬µ«Á½ÕßÖ®¼äµÄÁªÏµ½ÏÈõ¡£´ËÀà¶ñÒâÈí¼þµÄ·¢ÏÖ±íÃ÷£¬Ëæ×ÅLinuxÔÚÆóÒµÖеÄÆÕ¼°£¬¹¥»÷ÕßÕýÔÚ¿ª·¢Ö®Ç°½öÏÞÓÚWindowsµÄLinux¶ñÒâÈí¼þ¡£ÓëBootkittyÏà¹ØµÄÈëÇÖÖ¸±êÒÑÔÚGitHubÉϹ²Ïí¡£
https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/
2. TorÏîÄ¿½ô¼±ºôÓõ£º²¿Êð¸ü¶àWebTunnelÇÅ·´¿¹Õþ¸®Éó²é
11ÔÂ28ÈÕ£¬TorÏîÄ¿½üÆÚÏòÒþ˽ÉçÇø·¢³ö½ô¼±ºôÓõ£¬ÇëÇóÖ¾Ô¸ÕßÔÚ2025Äê3ÔÂ10ÈÕÇ°ÐÖú²¿Êð200¸öеÄWebTunnelÇÅ£¬ÒÔÓ¦¶ÔÈÕÒæÑϾþµÄÕþ¸®Éó²éÌôÕ½¡£Ä¿Ç°£¬TorÏîÄ¿ÒÑÔËÓª143¸öWebTunnelÇÅ£¬×ÊÖúÊÜÉó²éÏÞÖƵØÓòµÄÓû§·ÃÎÊ»¥ÁªÍø¡£´Ë¾ÙÖ÷ÒªÕë¶Ô¶íÂÞ˹²»Í£¼ÓÇ¿µÄÉó²éÖƶȣ¬¸ÃÖƶÈÒÑÓ°Ïìä¯ÀÀÆ÷ÄÚÖõÄÉó²é¹æ±Ü»úÖÆ£¬Èçobfs4Á¬½ÓºÍSnowflake¡£TorÏîÄ¿ÈÏΪ£¬½¨Á¢¸ü¶àWebTunnelÇÅÊÇÓ¦¶ÔÉó²éÉý¼¶µÄÓÐЧ¼Æı£¬ÒòΪ¿ª·¢Ð½â¾ö·½°¸ÐèҪʱ¼ä£¬¶øÓû§ÔÚ´ËÆÚ¼ä¿ÉÄÜÃæÁÙ·çÏÕ¡£WebTunnelsÊÇTorÏîÄ¿ÓÚ2024Äê3ÔÂÍƳöµÄÒ»ÖÖÐÂÐÍÇÅÁº£¬Í¨¹ý½«TorÁ÷Á¿ÓëͨÀýÍøÂçÁ÷Á¿»ìºÏ£¬²¢Ê¹ÓþßÓÐÓÐЧSSL/TLSÖ¤ÊéµÄWeb·þÎñÆ÷αװ³ÉHTTPSÁ÷Á¿£¬´Ó¶ø¶ã±ÜÉó²é¡£TorÏîÄ¿Æô¶¯ÁËÒ»Ïîл£¬ºôÓõÖ¾Ô¸Õß¼ÓÈ뽨Á¢ºÍά»¤WebTunnelÇÅ£¬ÉèÁ¢Îå×ù»ò¸ü¶àÇŵÄÖ¾Ô¸Õß½«»ñµÃTÐô×÷Ϊлл¡£¼ÓÈëÒªÇó°üÂÞÿ¸öIPv4Ò»¸öÇÅ¡¢ÌṩÓÐЧµç×ÓÓʼþ¡¢±£³ÖÇÅÁºÔËÐÐÖÁÉÙÒ»ÄêµÈ¡£Ö¾Ô¸Õß¿ÉÒÔ¼ì²ì¹Ù·½Ö¸ÄÏÁ˽â¸ü¶àÐÅÏ¢²¢¼ÓÈë»î¶¯¡£
https://www.bleepingcomputer.com/news/security/tor-needs-200-new-webtunnel-bridges-to-fight-censorship/
3. Ó¢¹úÍþÀÕ¶û´óѧ½ÌѧҽԺÔâÍøÂç¹¥»÷£¬·þÎñÖжÏÔ¤Ô¼ÍƳÙ
11ÔÂ28ÈÕ£¬Ó¢¹úÖ÷ÒªÒ½ÁƱ£½¡ÌṩÉÌÍþÀÕ¶û´óѧ½ÌѧҽԺ£¨WUTH£©£¬×÷ΪNHS»ù½ð»áµÄÒ»²¿ÃÅ£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬µ¼ÖÂϵͳÖжϣ¬Ô¤Ô¼ºÍÔ¤¶¨·¨Ê½±»ÆÈÍƳ١£WUTHÔËÓª×Ŷà¼ÒÒ½Ôº£¬Ìṩ°üÂÞ½ô¼±·þÎñ¡¢¼±ÐÔÒ½ÁÆ·þÎñ¡¢ÖØÖ¢¼à»¤¡¢Íâ¿Æ¡¢¶ù¿Æ¡¢²ú¿Æ·þÎñºÍ°©Ö¢»¤ÀíÔÚÄÚµÄÈ«ÃæÒ½ÁÆ·þÎñ¡£´Ë´ÎÍøÂç¹¥»÷ʹµÃ²¿ÃÅITϵͳÏÂÏß²¢×ªÎªÊÖ¶¯²Ù×÷£¬²»ÐÐÖÆÖ¹µØÔì³ÉÁË·þÎñÖжϺÍÑÓÎó¡£Ò½ÔºÒѻָ´ÒµÎñÁ¬ÐøÐÔÁ÷³Ì£¬Ê¹ÓÃÖ½ÖÊÎļþÌæ´úÊý×ÖÎļþ£¬µ«½ô¼±ÖÎÁƵÄÆÚ´ýʱ¼äÓÐËùÔö¼Ó¡£Ò½Ôº¶Ø´Ù¹«ÖÚ½öÔÚÕæÕý½ô¼±Çé¿öÏÂÇ°Íù¼±ÕïÊÒ¡£Ä¿Ç°£¬Ò½ÔºÈÔÎÞ·¨Ô¤¼ÆºÎʱÄָܻ´Õý³£ÔËÓª£¬ÇÒÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯¶Ô´Ë´Î¹¥»÷ÂôÁ¦¡£¸ÃÒ½ÁÆ»ú¹¹ÉÐδ¶Ô¹¥»÷ÐÔÖÊÌṩ¸ü¶àÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/uk-hospital-network-postpones-procedures-after-cyberattack/
4. Å·ÖÞ¶à¹úÁªºÏ¹¥»÷·Ç·¨Á÷ýÌåÍøÂ磬ȡµÞµÁ°æ²¢¼ÓÇ¿ÍøÂç·¸×ï·À·¶
11ÔÂ28ÈÕ£¬Å·ÖÞÐ̾¯×éÖ¯ÁªºÏ¶à¹úÖ´·¨»ú¹¹£¬ÀÖ³ÉÈ¡µÞÁËÒ»¸ö·Ç·¨Á÷ýÌåÍøÂ磬´þ²¶Á˽üÊ®¼¸ÃûÉæ°¸ÈËÔ±¡£¸ÃÍøÂçµÁ°æÁËÁè¼Ý2500¸öµçÊÓƵµÀ£¬ÏòÈ«ÇòÁè¼Ý2200ÍòÈËÌṩ·þÎñ£¬Ã¿ÄêÔì³É100ÒÚÅ·ÔªµÄËðʧ¡£Å·ÖÞÐ̾¯×éÖ¯ÔÚÐж¯ÖÐÊÓ²ìÁË102ÃûÏÓÒÉÈË£¬²¢Ö¸¿ØÉæ¼°Ï´Ç®ºÍÍøÂç·¸×ï¡£Ö´·¨»ú¹¹½øÐÐÁ˶à´ÎÍ»»÷¼ì²é£¬²é»ñÁË·þÎñÆ÷ºÍIPTVÉ豸£¬²¢ÔÚͻϮÆڼ䷢ÏÖÁ˶¾Æ·¡¢ÎäÆ÷ÒÔ¼°´óÁ¿¼ÓÃÜ»õ±ÒºÍÏֽ𡣴˴ÎÐж¯µÃµ½Á˱£¼ÓÀûÑÇ¡¢¿ËÂÞµØÑÇ¡¢·¨¹úµÈ¶à¸öÅ·ÖÞ¹ú¼ÒÖ´·¨»ú¹¹µÄÖ§³Ö£¬Òâ´óÀû¹ÙÔ±³ÆÆäΪ¸Ã¹úÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷ÒôÏñµÁ°æÐж¯¡£´ËÍ⣬ŷÖÞÐ̾¯×éÖ¯ºÍ¹ú¼ÊÐ̾¯×éÖ¯ÒѼƻ®ÔÚ2024ÄêÔ½·¢»ý¼«Ö÷¶¯µØ¹¥»÷ÍøÂç·¸×½üÆÚ»¹Ðû²¼ÁËÉæ¼°40¶à¸ö¹ú¼ÒµÄ¡°HAECHI¡±Ðж¯£¬´þ²¶ÁË5500¶àÃûÏÓÒÉÈË£¬²¢½É»ñÁËÔ¼4ÒÚÃÀÔª¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤ÌåÏÖ£¬ÍøÂç·¸×ïµÄºó¹û¿ÉÄÜÊÇ»ÙÃðÐԵģ¬¹ú¼Ê¾¯²ìºÏ×÷ÖÁ¹ØÖØÒª¡£
https://therecord.media/11-arrested-europol-streaming-shutdown
5. ZelloÒªÇóÀÏÓû§ÖØÖÃÃÜÂ룬ÒÉÒòÄþ¾²Â©¶´
11ÔÂ27ÈÕ£¬ZelloÊÇÒ»ÏîÓµÓÐ1.4ÒÚÓû§µÄÒƶ¯·þÎñ£¬½üÆÚÏòÓû§·¢³öÄþ¾²¾¯¸æ£¬ÒªÇóËùÓÐÔÚ2024Äê11ÔÂ2ÈÕ֮ǰ´´½¨µÄÕË»§ÖØÖÃÃÜÂë¡£ÕâÒ»´ëÊ©ËƺõÊǶÔDZÔÚÄþ¾²Â©¶´µÄÔ¤·À´ëÊ©¡£ÖÚ¶àÓû§ÔÚ11ÔÂ15ÈÕÊÕµ½ÁËÕâһ֪ͨ£¬µ«ZelloδÌṩ½øÒ»²½µÄÐÅÏ¢»ò½âÊÍ¡£Óû§±»Òýµ¼ÖÁÖ§³ÖÒ³ÃæÁ˽âÈçºÎ¸ü¸ÄÃÜÂ룬²¢±»½¨Òé¸ü¸ÄÔÚÆäËûÔÚÏß·þÎñÖпÉÄÜʹÓùýµÄÏàͬÃÜÂë¡£¾¡¹ÜÄ¿Ç°Éв»Çå³þÊÇ·ñ·¢ÉúÁËÊý¾Ý鶻òƾ֤Ìî³ä¹¥»÷£¬µ«Í¨Öª±íÃ÷ÍþвÐÐΪÕß¿ÉÄÜÒÑ»ñÈ¡¿Í»§ÃÜÂëµÄ·ÃÎÊȨÏÞ¡£¿¼Âǵ½ZelloÌرðÖ¸³öÊÜÓ°ÏìµÄÊÇ11ÔÂ2ÈÕÇ°µÄÕË»§£¬Äþ¾²Ê¼þºÜ¿ÉÄÜ·¢ÉúÔÚ´Ëʱ¼äµãËÄÖÜ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬ZelloÔÚ2020ÄêÔø¾Àú¹ýÒ»´ÎÊý¾Ýй¶£¬µ¼Ö¿ͻ§µÄµç×ÓÓʼþµØÖ·ºÍÉ¢ÁÐÃÜÂë±»µÁ¡£
https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/
6. WotNotÊý¾Ýй¶Ê¼þ£ºAI¹©Ó¦Á´ÖеÄÊý¾ÝÄþ¾²ÓëÒþ˽·çÏÕ
11ÔÂ28ÈÕ£¬Ó¡¶ÈÈ˹¤ÖÇÄܳõ´´¹«Ë¾WotNot½üÆÚ·¢ÉúÁËÒ»ÆðÑÏÖصÄÊý¾Ýй¶Ê¼þ£¬ÆäGoogle Cloud Storage´æ´¢Í°ÒòÅäÖôíÎó¶ø̻¶£¬µ¼ÖÂ346,381¸öÎļþ±»Î´¾ÊÚȨ·ÃÎÊ£¬ÆäÖаüÂÞ»¤ÕÕ¡¢Ò½ÁƼǼ¡¢¼òÀúµÈÃô¸Ð¸öÈËÊý¾Ý¡£WotNot×÷Ϊһ¼ÒΪÆóÒµ¶¨ÖÆÁÄÌì»úÆ÷È˵Äƽ̨£¬Æä¿Í»§º¸ÇÁËĬ¿Ë¹«Ë¾¡¢¼ÓÖÝ´óѧµÈÖªÃûÆóÒµºÍ»ú¹¹¡£´Ë´Î鶶ÔÊÜÓ°ÏìµÄ¸öÈË×é³ÉÁËÖØ´óÄþ¾²ºÍÒþ˽Íþв£¬ÎªÍøÂç·¸×ï·Ö×ÓÌṩÁËÉí·Ý͵ÇÔ¡¢ÆÛÕ©µÈ»î¶¯µÄ¹¤¾ß°ü¡£¸Ãʼþ½ÒʾÁËAI·þÎñÒýÈëµÄÓ°×ÓIT×ÊÔ´·çÏÕ£¬¼´²»ÊÜ×éÖ¯Ö±½Ó¿ØÖƵÄϵͳ¿ÉÄÜ´øÀ´µÄÊý¾ÝÁ÷²»ÊÜ¿ØÖÆÎÊÌâ¡£WotNotµÄ°¸Àý±íÃ÷£¬µ¥¸ö¹©Ó¦É̵ÄÄþ¾²Â©¶´¿ÉÄÜΣ¼°ÏÂÓζà¼Ò¹«Ë¾ºÍÊýǧÃû¸öÈ˵ÄÊý¾Ý¡£Òò´Ë£¬ÆóÒµ±ØÐëÈÏʶµ½¶ÔÊý¾ÝÄþ¾²µÄÔðÈβ»½öÏÞÓÚÄÚ²¿ÏµÍ³£¬»¹Ó¦³¹µ×Éó²éAIʵʩÁ´ÖÐÿ¸öºÏ×÷»ï°éµÄÄþ¾²Êµ¼ù¡£CybernewsÑо¿ÈËÔ±ÓÚ9ÔÂ9ÈÕÏòWotNotÅû¶ÁËÊý¾Ýй¶ÎÊÌ⣬µ«¸Ã¹«Ë¾»¨ÁËÁ½¸ö¶àÔ²ŹرÕÁ˶Ôй¶Êý¾ÝµÄ·ÃÎÊ¡£
https://cybernews.com/security/wotnot-exposes-346k-sensitive-customer-files/