Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ£»£»£»£»£»£»BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR

Ðû²¼Ê±¼ä 2020-09-16

1.Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ


1.jpg


Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼ÁËÎó²îÅû¶ָÄÏ£¬£¬£¬£¬ÒÔ×ÊÖú¹«Ë¾ÊµÑéÎó²îÅû¶Á÷³Ì»òÔÚÒѾ­½¨ÉèÎó²îÅû¶Á÷³ÌµÄÇéÐÎÏÂ¶ÔÆä¾ÙÐÐˢС£¡£¡£¡£¡£ ¡£¡£NCSCÌåÏÖ£¬£¬£¬£¬¸ÃÖ¸Äϲ¢²»ÊÇÒ»¸öÎó²îÅû¶µÄ¹æÔòÊֲᣬ£¬£¬£¬¶øÊÇΪ¸üºÃµÄʵÑéÌṩÁËÐëÒªµÄÐÅÏ¢¡£¡£¡£¡£¡£ ¡£¡£ÆäÖ÷Òª·ÖΪÈý¸öÖ÷Òª²¿·Ö£¬£¬£¬£¬ÐÎòÁËÔõÑù½«ÍⲿÎó²îÐÅÏ¢¶¨Ïò¸øºÏÊʵÄÈË£¬£¬£¬£¬ÒÔ¼°±¨¸æÐè×ñÕչرÕÎó²îµÄ¿ò¼Ü±ê×¼¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/uk-government-releases-toolkit-to-easily-disclose-vulnerabilities/


2.Aqua SecurityÐû²¼2020ÄêCloud Native Threat±¨¸æ


2.jpg


Aqua Security¸ú×Ù²¢ÆÊÎöÁË2019Äê6ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ16371Æð¹¥»÷£¬£¬£¬£¬Ðû²¼ÁË2020ÄêCloud Native Threat±¨¸æ¡£¡£¡£¡£¡£ ¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬½ñÄêÄêÍ·Õë¶ÔÔÆÏµÍ³µÄ¹¥»÷ÔÚ¼¤Ôö£¬£¬£¬£¬Ïà±ÈÉÏÒ»ÄêÔöÌíÁË250£¥¡£¡£¡£¡£¡£ ¡£¡£ÔÚÕâЩ¹¥»÷ʱ´ú£¬£¬£¬£¬ºÚ¿ÍÊÔͼ»ñµÃ¶ÔÃÛ¹ÞЧÀÍÆ÷µÄ¿ØÖÆÈ¨£¬£¬£¬£¬È»ºóÏÂÔØ²¢°²ÅŶñÒâÈÝÆ÷¾µÏñ¡£¡£¡£¡£¡£ ¡£¡£AquaÌåÏÖ£¬£¬£¬£¬ÕâЩ¾µÏñÖÐÓÐ95£¥ÊÇÕë¶ÔÍÚ¿ó¼ÓÃÜÇ®±ÒµÄ£¬£¬£¬£¬¶øÆäÓàÔòÓÃÓÚÉèÖÃDDoS»ù´¡ÉèÊ©¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/


3.BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR


3.png


ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºµÈ´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËеÄBlindSide¹¥»÷·½·¨£¬£¬£¬£¬Æä¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR¡£¡£¡£¡£¡£ ¡£¡£ÍƲâÖ´ÐÐÊÇÏÖ´ú´¦Öóͷ£Æ÷µÄÒ»ÖÖÌá¸ßÐÔÄܵĹ¦Ð§£¬£¬£¬£¬BlindSide¿ÉÒÔʹÓÃÈí¼þÓ¦ÓóÌÐòÖеÄÎó²î£¬£¬£¬£¬²¢ÔÚÍÆ²âÖ´ÐÐÓòÖÐÖØ¸´Ê¹ÓøÃÎó²î£¬£¬£¬£¬Öظ´Ì½²âÄڴ棬£¬£¬£¬Ö±µ½¹¥»÷ÕßÈÆ¹ýASLR¡£¡£¡£¡£¡£ ¡£¡£ÓÉÓڴ˹¥»÷±¬·¢ÔÚÍÆ²âÖ´ÐеĹæÄ£ÄÚ£¬£¬£¬£¬Òò´ËËùÓÐʧ°ÜµÄ̽²â¶¼»á±»ÑïÆú£¬£¬£¬£¬²¢²»»áÓ°ÏìCPU»òÆäÎȹÌÐÔ¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/


4.FBIÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö


4.png


Áª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö¡£¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤Ìî³äÊÇÏà¶Ô½ÏеÄÊõÓ£¬£¬£¬ÔçÏȺڿÍֻʹÓÃÕâÀ๥»÷Õë¶ÔÔÚÏßÓÎÏ·ºÍʳÎï¶©¹ºÕÊ»§¡£¡£¡£¡£¡£ ¡£¡£¿ÉÊÇËæ×ÅÕâÖÖÕ½ÂÔµÄÀֳɣ¬£¬£¬£¬¸ü¶àºÚ¿Í×é֯ת¶øÕë¶ÔÔÚÏßÒøÐÐЧÀͺͼÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈÚ×ʲú¡£¡£¡£¡£¡£ ¡£¡£FBIÌåÏÖ£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬ÆäÊÕµ½Á˽ü5ÍòÆðÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µ¼ÖµÄÕÊ»§ÐÅϢй¶ÊÂÎñµÄ±¨¸æ£¬£¬£¬£¬Êܺ¦Õß°üÀ¨ÒøÐС¢½ðÈÚЧÀÍÌṩÉÌ¡¢°ü¹Ü¹«Ë¾ºÍͶ×ʹ«Ë¾¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/


5.Staples¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬¿Í»§¶©µ¥Êý¾Ýй¶


5.png


°ì¹«ÁãÊÛ¹«Ë¾Staples·¢³öÁËÊý¾Ýй¶֪ͨÊ飬£¬£¬£¬ÉùÃ÷Æä9ÔÂ2ÈÕ×óÓÒÔâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬µ¼Ö¿ͻ§¶©µ¥Êý¾Ýй¶¡£¡£¡£¡£¡£ ¡£¡£¸ÃÊÂÎñй¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÐÅÓÿ¨ºÅºóËÄλ¡¢²úÆ·±¾Ç®¡¢½»»õºÍ¶©¹ºµÄ²úÆ·¡£¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬²¢Ã»ÓÐÃô¸ÐÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬°üÀ¨ÕÊ»§Æ¾Ö¤ºÍÍêÕûµÄÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/108271/data-breach/staples-data-breach.html


6.ºÚ¿ÍÈëÇÖÃÀ¹úÍËÎéÎäÊ¿ÊÂÎñ²¿£¬£¬£¬£¬ÇÔÈ¡4.6ÍòÎäÊ¿ÐÅÏ¢


6.png


ÍËÎéÎäÊ¿ÊÂÎñ²¿£¨VA£©ÌåÏÖ£¬£¬£¬£¬ÓÐδ¾­ÊÚȨµÄÓû§»á¼ûÁËÓÉVA½ðÈÚЧÀÍÖÐÐÄ£¨FSC£©ÖÎÀíµÄÔÚÏßÓ¦ÓóÌÐò£¬£¬£¬£¬»ñÈ¡ÁËԼĪ46000ÃûÍËÎéÎäÊ¿µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ ¡£¡£¸¥¼ªÄáÑÇÖÝÌåÏÖ£¬£¬£¬£¬ºÚ¿ÍʹÓÃÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬²¢Ê¹ÓÃÉí·ÝÑé֤ЭÒéÀ´»á¼ûFSCÓ¦ÓóÌÐò£¬£¬£¬£¬È»ºó×ªÒÆÁËÍËÎéÎäÊ¿ÖÎÀí¾ÖÔ­±¾ÍýÏëÖ§¸¶¸øÒ½ÁƱ£½¡ÌṩÉÌÓÃÓÚÃÀ¹úÍËÎéÎäÊ¿µÄÒ½ÁƵĿî×Ó¡£¡£¡£¡£¡£ ¡£¡£Ö»¹Ü¹ÙÔ±ÃÇÈÔÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬µ«VAÒÔΪ£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»¹ÇÔÈ¡ÁËÍËÎéÎäÊ¿µÄ¼Í¼£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/department-of-veteran-affairs-discloses-breach-impacting-46000-veterans/