Ó¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©°ä²¼·ì϶Åû¶ָÄÏ£»BlindSide¹¥»÷¿ÉÀûÓÃCPUµÄ´§Ä¦Ö´ÐÐÖ°ÄÜÈÆ¹ýASLR

°ä²¼¹¦·ò 2020-09-16

1.Ó¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©°ä²¼·ì϶Åû¶ָÄÏ


1.jpg


Ó¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©°ä²¼ÁË·ì϶Åû¶ָÄÏ £¬ÒÔÔ®ÊÖ¹«Ë¾Ö´Ðзì϶Åû¶Á÷³Ì»òÔÚÒѾ­³ÉÁ¢·ì϶Åû¶Á÷³ÌµÄÇé¿öÏÂ¶ÔÆä½øÐиĽø¡£NCSC°µÊ¾ £¬¸ÃÖ¸Äϲ¢²»ÊÇÒ»¸ö·ì϶Åû¶µÄ¹æ¶¨ÊÖ²á £¬¶øÊÇΪ¸üºÃµÄÖ´ÐÐÌṩÁ˱ØÒªµÄÐÅÏ¢¡£ÆäÖØÒª·ÖΪÈý¸öÖØÒª²¿ÃÅ £¬ÃèÊöÁËÈôºÎ½«±í²¿·ì϶ÐÅÏ¢¶¨Ïò¸øÏàÒ˵ÄÈË £¬ÒÔ¼°»ã±¨Ðè×ñÑ­¹Ø¹Ø·ì϶µÄ¿ò¼Ü³ß¶È¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/uk-government-releases-toolkit-to-easily-disclose-vulnerabilities/


2.Aqua Security°ä²¼2020ÄêCloud Native Threat»ã±¨


2.jpg


Aqua Security¸ú×Ù²¢·ÖÎöÁË2019Äê6ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ16371Æð¹¥»÷ £¬°ä²¼ÁË2020ÄêCloud Native Threat»ã±¨¡£»ã±¨ÏÔʾ £¬½ñÄêËêÊ×Õë¶ÔÔÆÏµÍ³µÄ¹¥»÷ÔÚ¼¤Ôö £¬Ïà±ÈÉÏÒ»ÄêÔö³¤ÁË250£¥¡£ÔÚÕâЩ¹¥»÷ÆÚ¼ä £¬ºÚ¿ÍÊÔͼ»ñµÃ¶ÔÃÛ¹Þ·þÎñÆ÷µÄ½ÚÔìȨ £¬¶øºóÏÂÔØ²¢²¿Êð¶ñÒâÈÝÆ÷¾µÏñ¡£Aqua°µÊ¾ £¬ÕâЩ¾µÏñÖÐÓÐ95£¥ÊÇÕë¶ÔÍÚ¿ó¼ÓÃÜÇ®±ÒµÄ £¬¶øÆäÓàÔòÓÃÓÚÉèÖÃDDoS»ù´¡ÉèÊ©¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/


3.BlindSide¹¥»÷¿ÉÀûÓÃCPUµÄ´§Ä¦Ö´ÐÐÖ°ÄÜÈÆ¹ýASLR


3.png


ËÕÀèÊÀÁª¹úÀí¹¤Ñ§ÔºµÈ´óѧµÄ×êÑÐÈËÔ±·¢ÏÖÁËеÄBlindSide¹¥»÷·½Ê½ £¬Æä¿ÉÀûÓÃCPUµÄ´§Ä¦Ö´ÐÐÖ°ÄÜÈÆ¹ýASLR¡£´§Ä¦Ö´ÐÐÊÇÏÖ´ú´¦ÖÃÆ÷µÄÒ»ÖÖÌá¸ß»úÄܵÄÖ°ÄÜ £¬BlindSideÄܹ»ÀûÓÃÈí¼þÀûÓ÷¨Ê½Öеķì϶ £¬²¢ÔÚ´§Ä¦Ö´ÐÐÓòÖз´¸´ÀûÓø÷ì϶ £¬·´¸´Ì½²âÄÚ´æ £¬Ö±µ½¹¥»÷ÕßÈÆ¹ýASLR¡£ÓÉÓڴ˹¥»÷²úÉúÔÚ´§Ä¦Ö´ÐеÄÁìÓòÄÚ £¬Òò¶øËùÓÐʧ°ÜµÄ̽²â³ÇÊб»Åׯú £¬²¢²»»áÓ°ÏìCPU»òÆä²»±äÐÔ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/


4.FBIÖÒ¸æÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÁ¿¼¤Ôö


4.png


Áª¹úµ÷²é¾Ö£¨FBI£©ÖÒ¸æÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÁ¿¼¤Ôö¡£Æ¾Ö¤Ìî³äÊÇÏà¶Ô½ÏеÄÊõÓï £¬Æð³õºÚ¿ÍÖ»ÀûÓÃÕâÀ๥»÷Õë¶ÔÔÚÏßÓÎÏ·ºÍʳƷ¶©¹ºÕÊ»§¡£µ«ÊÇËæ×ÅÕâÖÖÕ½ÊõµÄ³É¹¦ £¬¸ü¶àºÚ¿Í×é֯ת¶øÕë¶ÔÔÚÏßÒøÐзþÎñºÍ¼ÓÃÜÇ®±ÒÂòÂôËù £¬Ö¼ÔÚÇÔÈ¡½ðÈÚ×ʲú¡£FBI°µÊ¾ £¬×Ô2017ÄêÒÔÀ´ £¬ÆäÊÕµ½Á˽ü5ÍòÆðÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µ¼ÖµÄÕÊ»§ÐÅϢй¶ÊÂÎñµÄ»ã±¨ £¬Êܺ¦ÕßÔ̺¬ÒøÐÓ×¢½ðÈÚ·þÎñÌṩÉÌ¡¢±£ÏÕ¹«Ë¾ºÍͶ×ʹ«Ë¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/


5.Staples¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷ £¬¿Í»§¶©µ¥Êý¾Ýй¶


5.png


°ì¹«ÁãÊÛ¹«Ë¾Staples·¢³öÁËÊý¾Ýй¶֪ͨÊé £¬ÉêÃ÷Æä9ÔÂ2ÈÕ×óÓÒÔâµ½Á˺ڿ͹¥»÷ £¬µ¼Ö¿ͻ§¶©µ¥Êý¾Ýй¶¡£¸ÃÊÂÎñй¶µÄÐÅÏ¢Ô̺¬¿Í»§µÄÐÕÃû¡¢µØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢ÐÅÓþ¿¨ºÅºóËÄλ¡¢²úÆ·³É±¾¡¢½»»õºÍ¶©¹ºµÄ²úÆ·¡£Æ¾¾Ý֪ͨ £¬²¢Ã»ÓÐÃô¸ÐÊý¾Ý±»Ð¹Â¶ £¬Ô̺¬ÕÊ»§Í´´¦ºÍÆëÈ«µÄÖ§¸¶¿¨Êý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/108271/data-breach/staples-data-breach.html


6.ºÚ¿ÍÈëÇÖÃÀ¹úÍËÒÛÎäÊ¿ÊÂÎñ²¿ £¬ÇÔÈ¡4.6ÍòÎäÊ¿ÐÅÏ¢


6.png


ÍËÒÛÎäÊ¿ÊÂÎñ²¿£¨VA£©°µÊ¾ £¬ÓÐδ¾­ÊÚȨµÄÓû§½Ó¼ûÁËÓÉVA½ðÈÚ·þÎñÖÐÐÄ£¨FSC£©ÖÎÀíµÄÔÚÏßÀûÓ÷¨Ê½ £¬»ñÈ¡ÁËԼĪ46000ÃûÍËÒÛÎäÊ¿µÄÓ×ÎÒÐÅÏ¢¡£¸¥¼ªÄáÑÇÖݰµÊ¾ £¬ºÚ¿ÍʹÓÃÉç»á¹¤³Ì¹¥»÷ £¬²¢ÀûÓÃÉí·ÝÑéÖ¤ºÍ̸À´½Ó¼ûFSCÀûÓ÷¨Ê½ £¬¶øºó×ªÒÆÁËÍËÒÛÎäÊ¿ÖÎÀí¾ÖÕý±¾³ïËãÖ§¸¶¸øÒ½ÁƱ£½¡ÌṩÉÌÓÃÓÚÃÀ¹úÍËÒÛÎäÊ¿µÄÒ½ÁƵĿî×Ó¡£Ö»¹Ü¹ÙÔ±ÃÇÈÔÔÚµ÷²éÕâÆðÊÂÎñ £¬µ«VAÒÔΪ £¬ºÚ¿Í¿ÉÄÜ»¹ÇÔÈ¡ÁËÍËÒÛÎäÊ¿µÄ¼Í¼ £¬Ô̺¬Éç»á°²È«ºÅÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/department-of-veteran-affairs-discloses-breach-impacting-46000-veterans/