LinuxÏµÍ³ÃæÁÙÐÂÍþв£ºBootkitty UEFIÆô¶¯¹¤¾ß°ü±»·¢Ã÷

Ðû²¼Ê±¼ä 2024-11-29

1. LinuxÏµÍ³ÃæÁÙÐÂÍþв£ºBootkitty UEFIÆô¶¯¹¤¾ß°ü±»·¢Ã÷


11ÔÂ27ÈÕ £¬Ò»¿îÃûΪBootkittyµÄLinux¶ñÒâÈí¼þ×÷ΪÊ׸öרÃÅÕë¶ÔLinuxϵͳµÄUEFIÆô¶¯¹¤¾ß°üÒѱ»·¢Ã÷ £¬±ê¼Ç×ŶÔWindowsµÄÒþÃØÆô¶¯¹¤¾ß°üÍþвÕý±¬·¢×ª±ä¡£Ö»¹ÜÏÖÔÚËü½öÔÚijЩUbuntu°æ±¾ºÍÉèÖÃÉÏÆð×÷Óà £¬ÇÒ±£´æÐí¶àδʹÓõĹ¦Ð§ºÍ¼æÈÝÐÔÎÊÌâ £¬³£µ¼ÖÂϵͳÍ߽⠣¬µ«Æä±£´æ±ê¼Ç×ÅUEFIÆô¶¯Ì×¼þÍþвÁìÓòµÄÒ»¸öÖØ´óÉú³¤¡£Bootkittyͨ¹ý¹Ò½ÓUEFIÇå¾²ÈÏ֤ЭæÅºÍGRUBº¯ÊýÀ´ÈƹýÇå¾²Æô¶¯ºÍÍêÕûÐÔÑéÖ¤ £¬´Ó¶ø¼ÓÔØ¶ñÒâ×é¼þ¡£Ëü»¹»á×èµ²LinuxÄں˵ĽâѹÀú³Ì²¢¹Ò½ÓÏà¹Øº¯Êý £¬Ê¹¶ñÒâÈí¼þÄܹ»¼ÓÔØ¶ñÒâÄ£¿é £¬²¢ÔÚϵͳÆô¶¯Ê±×¢Èë¶ñÒâ¿â¡£Ñо¿Ö°Ô±Ö¸³ö £¬½«BootkittyÉÏ´«µ½VirusTotalµÄͳһÓû§»¹ÉÏ´«ÁËÒ»¸öÃûΪBCDropperµÄδÊðÃûÄÚºËÄ£¿é £¬µ«Á½ÕßÖ®¼äµÄÁªÏµ½ÏÈõ¡£´ËÀà¶ñÒâÈí¼þµÄ·¢Ã÷Åú×¢ £¬Ëæ×ÅLinuxÔÚÆóÒµÖÐµÄÆÕ¼° £¬¹¥»÷ÕßÕýÔÚ¿ª·¢Ö®Ç°½öÏÞÓÚWindowsµÄLinux¶ñÒâÈí¼þ¡£ÓëBootkittyÏà¹ØµÄÈëÇÖÖ¸±êÒÑÔÚGitHubÉϹ²Ïí¡£


https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/


2. TorÏîÄ¿½ôÆÈºôÓõ£º°²ÅŸü¶àWebTunnelÇŶԿ¹Õþ¸®Éó²é


11ÔÂ28ÈÕ £¬TorÏîÄ¿½üÆÚÏòÒþ˽ÉçÇø·¢³ö½ôÆÈºôÓõ £¬ÇëÇó×ÔÔ¸ÕßÔÚ2025Äê3ÔÂ10ÈÕǰЭÖú°²ÅÅ200¸öеÄWebTunnelÇÅ £¬ÒÔÓ¦¶ÔÈÕÒæÑÏËàµÄÕþ¸®Éó²éÌôÕ½¡£ÏÖÔÚ £¬TorÏîÄ¿ÒÑÔËÓª143¸öWebTunnelÇÅ £¬×ÊÖúÊÜÉó²éÏÞÖÆµØÇøµÄÓû§»á¼û»¥ÁªÍø¡£´Ë¾ÙÖ÷ÒªÕë¶Ô¶íÂÞ˹һֱÔöÇ¿µÄÉó²éÖÆ¶È £¬¸ÃÖÆ¶ÈÒÑÓ°Ïìä¯ÀÀÆ÷ÄÚÖõÄÉó²é¹æ±Ü»úÖÆ £¬Èçobfs4ÅþÁ¬ºÍSnowflake¡£TorÏîÄ¿ÒÔΪ £¬½¨Éè¸ü¶àWebTunnelÇÅÊÇÓ¦¶ÔÉó²éÉý¼¶µÄÓÐÓÃÕ½ÂÔ £¬ÓÉÓÚ¿ª·¢Ð½â¾ö¼Æ»®ÐèҪʱ¼ä £¬¶øÓû§ÔÚ´Ëʱ´ú¿ÉÄÜÃæÁÙΣº¦¡£WebTunnelsÊÇTorÏîÄ¿ÓÚ2024Äê3ÔÂÍÆ³öµÄÒ»ÖÖÐÂÐÍÇÅÁº £¬Í¨¹ý½«TorÁ÷Á¿ÓëͨÀýÍøÂçÁ÷Á¿»ìÏý £¬²¢Ê¹ÓþßÓÐÓÐÓÃSSL/TLSÖ¤ÊéµÄWeb·þÎñÆ÷αװ³ÉHTTPSÁ÷Á¿ £¬´Ó¶øÌÓ±ÜÉó²é¡£TorÏîÄ¿Æô¶¯ÁËÒ»Ïîл £¬ºôÓõ×ÔÔ¸Õß¼ÓÈ뽨ÉèºÍά»¤WebTunnelÇÅ £¬ÉèÁ¢Îå×ù»ò¸ü¶àÇŵÄ×ÔÔ¸Õß½«»ñµÃTÐô×÷Ϊлл¡£¼ÓÈëÒªÇó°üÀ¨Ã¿¸öIPv4Ò»¸öÇÅ¡¢ÌṩÓÐÓõç×ÓÓʼþ¡¢¼á³ÖÇÅÁºÔËÐÐÖÁÉÙÒ»ÄêµÈ¡£×ÔÔ¸Õß¿ÉÒÔÉó²é¹Ù·½Ö¸ÄÏÏàʶ¸ü¶àÐÅÏ¢²¢¼ÓÈë»î¶¯¡£


https://www.bleepingcomputer.com/news/security/tor-needs-200-new-webtunnel-bridges-to-fight-censorship/


3. Ó¢¹úÍþÀÕ¶û´óѧ½ÌѧҽԺÔâÍøÂç¹¥»÷ £¬·þÎñÖÐÖ¹Ô¤Ô¼ÍÆ³Ù


11ÔÂ28ÈÕ £¬Ó¢¹úÖ÷ÒªÒ½ÁƱ£½¡ÌṩÉÌÍþÀÕ¶û´óѧ½ÌѧҽԺ£¨WUTH£© £¬×÷ΪNHS»ù½ð»áµÄÒ»²¿·Ö £¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷ £¬µ¼ÖÂϵͳÖÐÖ¹ £¬Ô¤Ô¼ºÍÔ¤¶¨³ÌÐò±»ÆÈÍÆ³Ù¡£WUTHÔËÓª×Ŷà¼ÒÒ½Ôº £¬Ìṩ°üÀ¨½ôÆÈ·þÎñ¡¢¼±ÐÔÒ½ÁÆ·þÎñ¡¢ÖØÖ¢¼à»¤¡¢Íâ¿Æ¡¢¶ù¿Æ¡¢²ú¿Æ·þÎñºÍ°©Ö¢Õչ˻¤Ê¿ÔÚÄÚµÄÖÜȫҽÁÆ·þÎñ¡£´Ë´ÎÍøÂç¹¥»÷ʹµÃ²¿·ÖITϵͳÏÂÏß²¢×ªÎªÊÖ¶¯²Ù×÷ £¬²»¿É×èÖ¹µØÔì³ÉÁË·þÎñÖÐÖ¹ºÍÑÓÎó¡£Ò½ÔºÒѻָ´ÓªÒµÒ»Á¬ÐÔÁ÷³Ì £¬Ê¹ÓÃÖ½ÖÊÎļþÌæ»»Êý×ÖÎļþ £¬µ«½ôÆÈÖÎÁÆµÄÆÚ´ýʱ¼äÓÐËùÔöÌí¡£Ò½Ôº±Þ²ß¹«ÖÚ½öÔÚÕæÕý½ôÆÈÇéÐÎÏÂǰÍù¼±ÕïÊÒ¡£ÏÖÔÚ £¬Ò½ÔºÈÔÎÞ·¨Ô¤¼ÆºÎʱÄָܻ´Õý³£ÔËÓª £¬ÇÒÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¸ÃÒ½ÁÆ»ú¹¹ÉÐδ¶Ô¹¥»÷ÐÔ×ÓÌṩ¸ü¶àÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/uk-hospital-network-postpones-procedures-after-cyberattack/


4. Å·ÖÞ¶à¹úÍŽṥ»÷²»·¨Á÷ýÌåÍøÂç £¬È¡µÞµÁ°æ²¢ÔöÇ¿ÍøÂç·¸·¨Ìá·À


11ÔÂ28ÈÕ £¬Å·ÖÞÐ̾¯×é͎֯á¶à¹úÖ´·¨»ú¹¹ £¬ÀÖ³ÉÈ¡µÞÁËÒ»¸ö²»·¨Á÷ýÌåÍøÂç £¬¾Ð²¶Á˽üÊ®¼¸ÃûÉæ°¸Ö°Ô±¡£¸ÃÍøÂçµÁ°æÁËÁè¼Ý2500¸öµçÊÓÆµµÀ £¬ÏòÈ«ÇòÁè¼Ý2200ÍòÈËÌṩ·þÎñ £¬Ã¿ÄêÔì³É100ÒÚÅ·ÔªµÄËðʧ¡£Å·ÖÞÐ̾¯×éÖ¯ÔÚÐж¯ÖÐÊÓ²ìÁË102ÃûÏÓÒÉÈË £¬²¢Ö¸¿ØÉæ¼°Ï´Ç®ºÍÍøÂç·¸·¨¡£Ö´·¨»ú¹¹¾ÙÐÐÁ˶à´ÎÍ»»÷¼ì²é £¬²é»ñÁË·þÎñÆ÷ºÍIPTV×°±¸ £¬²¢ÔÚͻϮʱ´ú·¢Ã÷Á˶¾Æ·¡¢ÎäÆ÷ÒÔ¼°´ó×Ú¼ÓÃÜÇ®±ÒºÍÏֽ𡣴˴ÎÐж¯»ñµÃÁ˱£¼ÓÀûÑÇ¡¢¿ËÂÞµØÑÇ¡¢·¨¹úµÈ¶à¸öÅ·ÖÞ¹ú¼ÒÖ´·¨»ú¹¹µÄÖ§³Ö £¬Òâ´óÀû¹ÙÔ±³ÆÆäΪ¸Ã¹úÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷ÒôÏñµÁ°æÐж¯¡£±ðµÄ £¬Å·ÖÞÐ̾¯×éÖ¯ºÍ¹ú¼ÊÐ̾¯×éÖ¯ÒÑÍýÏëÔÚ2024ÄêÔ½ÌáÒé¾¢×Ô¶¯µØ¹¥»÷ÍøÂç·¸·¨ £¬½üÆÚ»¹Ðû²¼ÁËÉæ¼°40¶à¸ö¹ú¼ÒµÄ¡°HAECHI¡±Ðж¯ £¬¾Ð²¶ÁË5500¶àÃûÏÓÒÉÈË £¬²¢½É»ñÁËÔ¼4ÒÚÃÀÔª¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤ÌåÏÖ £¬ÍøÂç·¸·¨µÄЧ¹û¿ÉÄÜÊÇɱ¾øÐ﵀ £¬¹ú¼Ê¾¯Ô±ºÏ×÷ÖÁ¹ØÖ÷Òª¡£


https://therecord.media/11-arrested-europol-streaming-shutdown


5. ZelloÒªÇóÀÏÓû§ÖØÖÃÃÜÂë £¬ÒÉÒòÇå¾²Îó²î


11ÔÂ27ÈÕ £¬ZelloÊÇÒ»ÏîÓµÓÐ1.4ÒÚÓû§µÄÒÆ¶¯·þÎñ £¬½üÆÚÏòÓû§·¢³öÇå¾²ÖÒÑÔ £¬ÒªÇóËùÓÐÔÚ2024Äê11ÔÂ2ÈÕ֮ǰ½¨ÉèµÄÕË»§ÖØÖÃÃÜÂë¡£ÕâÒ»²½·¥ËƺõÊǶÔDZÔÚÇå¾²Îó²îµÄÔ¤·À²½·¥¡£ÖÚ¶àÓû§ÔÚ11ÔÂ15ÈÕÊÕµ½ÁËÕâһ֪ͨ £¬µ«ZelloδÌṩ½øÒ»²½µÄÐÅÏ¢»òÚ¹ÊÍ¡£Óû§±»Ö¸µ¼ÖÁÖ§³ÖÒ³ÃæÏàʶÔõÑù¸ü¸ÄÃÜÂë £¬²¢±»½¨Òé¸ü¸ÄÔÚÆäËûÔÚÏß·þÎñÖпÉÄÜʹÓùýµÄÏàͬÃÜÂë¡£Ö»¹ÜÏÖÔÚÉв»ÇåÎúÊÇ·ñ±¬·¢ÁËÊý¾Ýй¶»òƾ֤Ìî³ä¹¥»÷ £¬µ«Í¨ÖªÅú×¢ÍþвÐÐΪÕß¿ÉÄÜÒÑ»ñÈ¡¿Í»§ÃÜÂëµÄ»á¼ûȨÏÞ¡£Ë¼Á¿µ½ZelloÌØÊâÖ¸³öÊÜÓ°ÏìµÄÊÇ11ÔÂ2ÈÕǰµÄÕË»§ £¬Çå¾²ÊÂÎñºÜ¿ÉÄܱ¬·¢ÔÚ´Ëʱ¼äµãÖÜΧ¡£ÖµµÃ×¢ÖØµÄÊÇ £¬ZelloÔÚ2020ÄêÔøÂÄÀú¹ýÒ»´ÎÊý¾Ýй¶ £¬µ¼Ö¿ͻ§µÄµç×ÓÓʼþµØÖ·ºÍÉ¢ÁÐÃÜÂë±»µÁ¡£


https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/


6. WotNotÊý¾Ýй¶ÊÂÎñ£ºAI¹©Ó¦Á´ÖеÄÊý¾ÝÇå¾²ÓëÒþ˽Σº¦


11ÔÂ28ÈÕ £¬Ó¡¶ÈÈ˹¤ÖÇÄÜÊ×´´¹«Ë¾WotNot½üÆÚ±¬·¢ÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ £¬ÆäGoogle Cloud Storage´æ´¢Í°ÒòÉèÖùýʧ¶øÌ»Â¶ £¬µ¼ÖÂ346,381¸öÎļþ±»Î´¾­ÊÚȨ»á¼û £¬ÆäÖаüÀ¨»¤ÕÕ¡¢Ò½ÁƼͼ¡¢¼òÀúµÈÃô¸ÐСÎÒ˽¼ÒÊý¾Ý¡£WotNot×÷Ϊһ¼ÒΪÆóÒµ¶¨ÖÆÌ¸Ìì»úеÈËµÄÆ½Ì¨ £¬Æä¿Í»§º­¸ÇÁËĬ¿Ë¹«Ë¾¡¢¼ÓÖÝ´óѧµÈ×ÅÃûÆóÒµºÍ»ú¹¹¡£´Ë´Îй¶¶ÔÊÜÓ°ÏìµÄСÎÒ˽¼Ò×é³ÉÁËÖØ´óÇå¾²ºÍÒþ˽Íþв £¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩÁËÉí·Ý͵ÇÔ¡¢Ú²Æ­µÈ»î¶¯µÄ¹¤¾ß°ü¡£¸ÃÊÂÎñÕ¹ÏÖÁËAI·þÎñÒýÈëµÄÓ°×ÓIT×ÊԴΣº¦ £¬¼´²»ÊÜ×éÖ¯Ö±½Ó¿ØÖƵÄϵͳ¿ÉÄÜ´øÀ´µÄÊý¾ÝÁ÷²»ÊÜ¿ØÖÆÎÊÌâ¡£WotNotµÄ°¸ÀýÅú×¢ £¬µ¥¸ö¹©Ó¦É̵ÄÇå¾²Îó²î¿ÉÄÜΣ¼°ÏÂÓζà¼Ò¹«Ë¾ºÍÊýǧÃûСÎÒ˽¼ÒµÄÊý¾Ý¡£Òò´Ë £¬ÆóÒµ±ØÐèÊìϤµ½¶ÔÊý¾ÝÇå¾²µÄÔðÈβ»µ«ÏÞÓÚÄÚ²¿ÏµÍ³ £¬»¹Ó¦³¹µ×Éó²éAIʵÑéÁ´ÖÐÿ¸öºÏ×÷»ï°éµÄÇ徲ʵ¼ù¡£CybernewsÑо¿Ö°Ô±ÓÚ9ÔÂ9ÈÕÏòWotNotÅû¶ÁËÊý¾Ýй¶ÎÊÌâ £¬µ«¸Ã¹«Ë¾»¨ÁËÁ½¸ö¶àÔ²ŹرÕÁ˶Ôй¶Êý¾ÝµÄ»á¼û¡£


https://cybernews.com/security/wotnot-exposes-346k-sensitive-customer-files/