LinuxÏµÍ³ÃæÁÙÐÂÍþв£ºBootkitty UEFIÆô¶¯¹¤¾ß°ü±»·¢Ã÷
Ðû²¼Ê±¼ä 2024-11-291. LinuxÏµÍ³ÃæÁÙÐÂÍþв£ºBootkitty UEFIÆô¶¯¹¤¾ß°ü±»·¢Ã÷
11ÔÂ27ÈÕ£¬£¬£¬£¬Ò»¿îÃûΪBootkittyµÄLinux¶ñÒâÈí¼þ×÷ΪÊ׸öרÃÅÕë¶ÔLinuxϵͳµÄUEFIÆô¶¯¹¤¾ß°üÒѱ»·¢Ã÷£¬£¬£¬£¬±ê¼Ç×ŶÔWindowsµÄÒþÃØÆô¶¯¹¤¾ß°üÍþвÕý±¬·¢×ª±ä¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚËü½öÔÚijЩUbuntu°æ±¾ºÍÉèÖÃÉÏÆð×÷Ó㬣¬£¬£¬ÇÒ±£´æÐí¶àδʹÓõĹ¦Ð§ºÍ¼æÈÝÐÔÎÊÌ⣬£¬£¬£¬³£µ¼ÖÂϵͳÍ߽⣬£¬£¬£¬µ«Æä±£´æ±ê¼Ç×ÅUEFIÆô¶¯Ì×¼þÍþвÁìÓòµÄÒ»¸öÖØ´óÉú³¤¡£¡£¡£¡£¡£¡£¡£¡£Bootkittyͨ¹ý¹Ò½ÓUEFIÇå¾²ÈÏÖ¤ÐæÅºÍGRUBº¯ÊýÀ´ÈƹýÇå¾²Æô¶¯ºÍÍêÕûÐÔÑéÖ¤£¬£¬£¬£¬´Ó¶ø¼ÓÔØ¶ñÒâ×é¼þ¡£¡£¡£¡£¡£¡£¡£¡£Ëü»¹»á×èµ²LinuxÄں˵ĽâѹÀú³Ì²¢¹Ò½ÓÏà¹Øº¯Êý£¬£¬£¬£¬Ê¹¶ñÒâÈí¼þÄܹ»¼ÓÔØ¶ñÒâÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬²¢ÔÚϵͳÆô¶¯Ê±×¢Èë¶ñÒâ¿â¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬½«BootkittyÉÏ´«µ½VirusTotalµÄͳһÓû§»¹ÉÏ´«ÁËÒ»¸öÃûΪBCDropperµÄδÊðÃûÄÚºËÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬µ«Á½ÕßÖ®¼äµÄÁªÏµ½ÏÈõ¡£¡£¡£¡£¡£¡£¡£¡£´ËÀà¶ñÒâÈí¼þµÄ·¢Ã÷Åú×¢£¬£¬£¬£¬Ëæ×ÅLinuxÔÚÆóÒµÖÐµÄÆÕ¼°£¬£¬£¬£¬¹¥»÷ÕßÕýÔÚ¿ª·¢Ö®Ç°½öÏÞÓÚWindowsµÄLinux¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£ÓëBootkittyÏà¹ØµÄÈëÇÖÖ¸±êÒÑÔÚGitHubÉϹ²Ïí¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/
2. TorÏîÄ¿½ôÆÈºôÓõ£º°²ÅŸü¶àWebTunnelÇŶԿ¹Õþ¸®Éó²é
11ÔÂ28ÈÕ£¬£¬£¬£¬TorÏîÄ¿½üÆÚÏòÒþ˽ÉçÇø·¢³ö½ôÆÈºôÓõ£¬£¬£¬£¬ÇëÇó×ÔÔ¸ÕßÔÚ2025Äê3ÔÂ10ÈÕǰÐÖú°²ÅÅ200¸öеÄWebTunnelÇÅ£¬£¬£¬£¬ÒÔÓ¦¶ÔÈÕÒæÑÏËàµÄÕþ¸®Éó²éÌôÕ½¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬TorÏîÄ¿ÒÑÔËÓª143¸öWebTunnelÇÅ£¬£¬£¬£¬×ÊÖúÊÜÉó²éÏÞÖÆµØÇøµÄÓû§»á¼û»¥ÁªÍø¡£¡£¡£¡£¡£¡£¡£¡£´Ë¾ÙÖ÷ÒªÕë¶Ô¶íÂÞ˹һֱÔöÇ¿µÄÉó²éÖÆ¶È£¬£¬£¬£¬¸ÃÖÆ¶ÈÒÑÓ°Ïìä¯ÀÀÆ÷ÄÚÖõÄÉó²é¹æ±Ü»úÖÆ£¬£¬£¬£¬Èçobfs4ÅþÁ¬ºÍSnowflake¡£¡£¡£¡£¡£¡£¡£¡£TorÏîÄ¿ÒÔΪ£¬£¬£¬£¬½¨Éè¸ü¶àWebTunnelÇÅÊÇÓ¦¶ÔÉó²éÉý¼¶µÄÓÐÓÃÕ½ÂÔ£¬£¬£¬£¬ÓÉÓÚ¿ª·¢Ð½â¾ö¼Æ»®ÐèҪʱ¼ä£¬£¬£¬£¬¶øÓû§ÔÚ´Ëʱ´ú¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£¡£¡£¡£¡£¡£WebTunnelsÊÇTorÏîÄ¿ÓÚ2024Äê3ÔÂÍÆ³öµÄÒ»ÖÖÐÂÐÍÇÅÁº£¬£¬£¬£¬Í¨¹ý½«TorÁ÷Á¿ÓëͨÀýÍøÂçÁ÷Á¿»ìÏý£¬£¬£¬£¬²¢Ê¹ÓþßÓÐÓÐÓÃSSL/TLSÖ¤ÊéµÄWebЧÀÍÆ÷αװ³ÉHTTPSÁ÷Á¿£¬£¬£¬£¬´Ó¶øÌÓ±ÜÉó²é¡£¡£¡£¡£¡£¡£¡£¡£TorÏîÄ¿Æô¶¯ÁËÒ»Ïîл£¬£¬£¬£¬ºôÓõ×ÔÔ¸Õß¼ÓÈ뽨ÉèºÍά»¤WebTunnelÇÅ£¬£¬£¬£¬ÉèÁ¢Îå×ù»ò¸ü¶àÇŵÄ×ÔÔ¸Õß½«»ñµÃTÐô×÷Ϊлл¡£¡£¡£¡£¡£¡£¡£¡£¼ÓÈëÒªÇó°üÀ¨Ã¿¸öIPv4Ò»¸öÇÅ¡¢ÌṩÓÐÓõç×ÓÓʼþ¡¢¼á³ÖÇÅÁºÔËÐÐÖÁÉÙÒ»ÄêµÈ¡£¡£¡£¡£¡£¡£¡£¡£×ÔÔ¸Õß¿ÉÒÔÉó²é¹Ù·½Ö¸ÄÏÏàʶ¸ü¶àÐÅÏ¢²¢¼ÓÈë»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/tor-needs-200-new-webtunnel-bridges-to-fight-censorship/
3. Ó¢¹úÍþÀÕ¶û´óѧ½ÌѧҽԺÔâÍøÂç¹¥»÷£¬£¬£¬£¬Ð§ÀÍÖÐÖ¹Ô¤Ô¼ÍÆ³Ù
11ÔÂ28ÈÕ£¬£¬£¬£¬Ó¢¹úÖ÷ÒªÒ½ÁƱ£½¡ÌṩÉÌÍþÀÕ¶û´óѧ½ÌѧҽԺ£¨WUTH£©£¬£¬£¬£¬×÷ΪNHS»ù½ð»áµÄÒ»²¿·Ö£¬£¬£¬£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂϵͳÖÐÖ¹£¬£¬£¬£¬Ô¤Ô¼ºÍÔ¤¶¨³ÌÐò±»ÆÈÍÆ³Ù¡£¡£¡£¡£¡£¡£¡£¡£WUTHÔËÓª×Ŷà¼ÒÒ½Ôº£¬£¬£¬£¬Ìṩ°üÀ¨½ôÆÈЧÀÍ¡¢¼±ÐÔÒ½ÁÆÐ§ÀÍ¡¢ÖØÖ¢¼à»¤¡¢Íâ¿Æ¡¢¶ù¿Æ¡¢²ú¿ÆÐ§ÀͺͰ©Ö¢Õչ˻¤Ê¿ÔÚÄÚµÄÖÜȫҽÁÆÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÍøÂç¹¥»÷ʹµÃ²¿·ÖITϵͳÏÂÏß²¢×ªÎªÊÖ¶¯²Ù×÷£¬£¬£¬£¬²»¿É×èÖ¹µØÔì³ÉÁËЧÀÍÖÐÖ¹ºÍÑÓÎ󡣡£¡£¡£¡£¡£¡£¡£Ò½ÔºÒѻָ´ÓªÒµÒ»Á¬ÐÔÁ÷³Ì£¬£¬£¬£¬Ê¹ÓÃÖ½ÖÊÎļþÌæ»»Êý×ÖÎļþ£¬£¬£¬£¬µ«½ôÆÈÖÎÁÆµÄÆÚ´ýʱ¼äÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£¡£¡£Ò½Ôº±Þ²ß¹«ÖÚ½öÔÚÕæÕý½ôÆÈÇéÐÎÏÂǰÍù¼±ÕïÊÒ¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Ò½ÔºÈÔÎÞ·¨Ô¤¼ÆºÎʱÄָܻ´Õý³£ÔËÓª£¬£¬£¬£¬ÇÒÉÐδÓÐÈκÎÀÕË÷Èí¼þ×éÖ¯¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÒ½ÁÆ»ú¹¹ÉÐδ¶Ô¹¥»÷ÐÔ×ÓÌṩ¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/uk-hospital-network-postpones-procedures-after-cyberattack/
4. Å·ÖÞ¶à¹úÁªºÏ¹¥»÷²»·¨Á÷ýÌåÍøÂ磬£¬£¬£¬È¡µÞµÁ°æ²¢ÔöÇ¿ÍøÂç·¸·¨Ìá·À
11ÔÂ28ÈÕ£¬£¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯ÁªºÏ¶à¹úÖ´·¨»ú¹¹£¬£¬£¬£¬ÀÖ³ÉÈ¡µÞÁËÒ»¸ö²»·¨Á÷ýÌåÍøÂ磬£¬£¬£¬¾Ð²¶Á˽üÊ®¼¸ÃûÉæ°¸Ö°Ô±¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÂçµÁ°æÁËÁè¼Ý2500¸öµçÊÓÆµµÀ£¬£¬£¬£¬ÏòÈ«ÇòÁè¼Ý2200ÍòÈËÌṩЧÀÍ£¬£¬£¬£¬Ã¿ÄêÔì³É100ÒÚÅ·ÔªµÄËðʧ¡£¡£¡£¡£¡£¡£¡£¡£Å·ÖÞÐ̾¯×éÖ¯ÔÚÐж¯ÖÐÊÓ²ìÁË102ÃûÏÓÒÉÈË£¬£¬£¬£¬²¢Ö¸¿ØÉæ¼°Ï´Ç®ºÍÍøÂç·¸·¨¡£¡£¡£¡£¡£¡£¡£¡£Ö´·¨»ú¹¹¾ÙÐÐÁ˶à´ÎÍ»»÷¼ì²é£¬£¬£¬£¬²é»ñÁËЧÀÍÆ÷ºÍIPTV×°±¸£¬£¬£¬£¬²¢ÔÚͻϮʱ´ú·¢Ã÷Á˶¾Æ·¡¢ÎäÆ÷ÒÔ¼°´ó×Ú¼ÓÃÜÇ®±ÒºÍÏֽ𡣡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯»ñµÃÁ˱£¼ÓÀûÑÇ¡¢¿ËÂÞµØÑÇ¡¢·¨¹úµÈ¶à¸öÅ·ÖÞ¹ú¼ÒÖ´·¨»ú¹¹µÄÖ§³Ö£¬£¬£¬£¬Òâ´óÀû¹ÙÔ±³ÆÆäΪ¸Ã¹úÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷ÒôÏñµÁ°æÐж¯¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯ºÍ¹ú¼ÊÐ̾¯×éÖ¯ÒÑÍýÏëÔÚ2024ÄêÔ½ÌáÒé¾¢×Ô¶¯µØ¹¥»÷ÍøÂç·¸·¨£¬£¬£¬£¬½üÆÚ»¹Ðû²¼ÁËÉæ¼°40¶à¸ö¹ú¼ÒµÄ¡°HAECHI¡±Ðж¯£¬£¬£¬£¬¾Ð²¶ÁË5500¶àÃûÏÓÒÉÈË£¬£¬£¬£¬²¢½É»ñÁËÔ¼4ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯ÃØÊ鳤ÌåÏÖ£¬£¬£¬£¬ÍøÂç·¸·¨µÄЧ¹û¿ÉÄÜÊÇɱ¾øÐԵ쬣¬£¬£¬¹ú¼Ê¾¯Ô±ÏàÖúÖÁ¹ØÖ÷Òª¡£¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/11-arrested-europol-streaming-shutdown
5. ZelloÒªÇóÀÏÓû§ÖØÖÃÃÜÂ룬£¬£¬£¬ÒÉÒòÇå¾²Îó²î
11ÔÂ27ÈÕ£¬£¬£¬£¬ZelloÊÇÒ»ÏîÓµÓÐ1.4ÒÚÓû§µÄÒÆ¶¯Ð§ÀÍ£¬£¬£¬£¬½üÆÚÏòÓû§·¢³öÇå¾²ÖÒÑÔ£¬£¬£¬£¬ÒªÇóËùÓÐÔÚ2024Äê11ÔÂ2ÈÕ֮ǰ½¨ÉèµÄÕË»§ÖØÖÃÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡£ÕâÒ»²½·¥ËƺõÊǶÔDZÔÚÇå¾²Îó²îµÄÔ¤·À²½·¥¡£¡£¡£¡£¡£¡£¡£¡£ÖÚ¶àÓû§ÔÚ11ÔÂ15ÈÕÊÕµ½ÁËÕâһ֪ͨ£¬£¬£¬£¬µ«ZelloδÌṩ½øÒ»²½µÄÐÅÏ¢»òÚ¹ÊÍ¡£¡£¡£¡£¡£¡£¡£¡£Óû§±»Ö¸µ¼ÖÁÖ§³ÖÒ³ÃæÏàʶÔõÑù¸ü¸ÄÃÜÂ룬£¬£¬£¬²¢±»½¨Òé¸ü¸ÄÔÚÆäËûÔÚÏßЧÀÍÖпÉÄÜʹÓùýµÄÏàͬÃÜÂë¡£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉв»ÇåÎúÊÇ·ñ±¬·¢ÁËÊý¾Ýй¶»òƾ֤Ìî³ä¹¥»÷£¬£¬£¬£¬µ«Í¨ÖªÅú×¢ÍþвÐÐΪÕß¿ÉÄÜÒÑ»ñÈ¡¿Í»§ÃÜÂëµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£Ë¼Á¿µ½ZelloÌØÊâÖ¸³öÊÜÓ°ÏìµÄÊÇ11ÔÂ2ÈÕǰµÄÕË»§£¬£¬£¬£¬Çå¾²ÊÂÎñºÜ¿ÉÄܱ¬·¢ÔÚ´Ëʱ¼äµãÖÜΧ¡£¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ZelloÔÚ2020ÄêÔøÂÄÀú¹ýÒ»´ÎÊý¾Ýй¶£¬£¬£¬£¬µ¼Ö¿ͻ§µÄµç×ÓÓʼþµØµãºÍÉ¢ÁÐÃÜÂë±»µÁ¡£¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/
6. WotNotÊý¾Ýй¶ÊÂÎñ£ºAI¹©Ó¦Á´ÖеÄÊý¾ÝÇå¾²ÓëÒþ˽Σº¦
11ÔÂ28ÈÕ£¬£¬£¬£¬Ó¡¶ÈÈ˹¤ÖÇÄÜÊ×´´¹«Ë¾WotNot½üÆÚ±¬·¢ÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ÆäGoogle Cloud Storage´æ´¢Í°ÒòÉèÖùýʧ¶øÌ»Â¶£¬£¬£¬£¬µ¼ÖÂ346,381¸öÎļþ±»Î´¾ÊÚȨ»á¼û£¬£¬£¬£¬ÆäÖаüÀ¨»¤ÕÕ¡¢Ò½ÁƼͼ¡¢¼òÀúµÈÃô¸ÐСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£WotNot×÷Ϊһ¼ÒΪÆóÒµ¶¨ÖÆÌ¸Ìì»úеÈËµÄÆ½Ì¨£¬£¬£¬£¬Æä¿Í»§º¸ÇÁËĬ¿Ë¹«Ë¾¡¢¼ÓÖÝ´óѧµÈ×ÅÃûÆóÒµºÍ»ú¹¹¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶¶ÔÊÜÓ°ÏìµÄСÎÒ˽¼Ò×é³ÉÁËÖØ´óÇå¾²ºÍÒþ˽Íþв£¬£¬£¬£¬ÎªÍøÂç·¸·¨·Ö×ÓÌṩÁËÉí·Ý͵ÇÔ¡¢Ú²ÆµÈ»î¶¯µÄ¹¤¾ß°ü¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÕ¹ÏÖÁËAIЧÀÍÒýÈëµÄÓ°×ÓIT×ÊԴΣº¦£¬£¬£¬£¬¼´²»ÊÜ×éÖ¯Ö±½Ó¿ØÖƵÄϵͳ¿ÉÄÜ´øÀ´µÄÊý¾ÝÁ÷²»ÊÜ¿ØÖÆÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£WotNotµÄ°¸ÀýÅú×¢£¬£¬£¬£¬µ¥¸ö¹©Ó¦É̵ÄÇå¾²Îó²î¿ÉÄÜΣ¼°ÏÂÓζà¼Ò¹«Ë¾ºÍÊýǧÃûСÎÒ˽¼ÒµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬ÆóÒµ±ØÐèÊìϤµ½¶ÔÊý¾ÝÇå¾²µÄÔðÈβ»µ«ÏÞÓÚÄÚ²¿ÏµÍ³£¬£¬£¬£¬»¹Ó¦³¹µ×Éó²éAIʵÑéÁ´ÖÐÿ¸öÏàÖúͬ°éµÄÇ徲ʵ¼ù¡£¡£¡£¡£¡£¡£¡£¡£CybernewsÑо¿Ö°Ô±ÓÚ9ÔÂ9ÈÕÏòWotNotÅû¶ÁËÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬µ«¸Ã¹«Ë¾»¨ÁËÁ½¸ö¶àÔ²ŹرÕÁ˶Ôй¶Êý¾ÝµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/wotnot-exposes-346k-sensitive-customer-files/


¾©¹«Íø°²±¸11010802024551ºÅ