AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄÎó²î

Ðû²¼Ê±¼ä 2023-09-22

1¡¢AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄÎó²î


¾Ý9ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬AppleÐû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´ÔÚÕë¶ÔiPhoneºÍMacµÄ¹¥»÷Öб»Ê¹ÓõÄ3¸öеÄÎó²î ¡£¡£¡£¡£¡£¡£±»Ê¹ÓÃÎó²î»®·ÖÊÇWebkitÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2023-41993£©£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÓÕÆ­Ä¿µÄ»á¼ûÌØÖÆµÄWebÄÚÈÝÀ´µ¼ÖÂí§Òâ´úÂëÖ´ÐÐ £»£»£»Çå¾²¿ò¼ÜÖеÄÎó²î£¨CVE-2023-41991£©£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔʹÓöñÒâÓ¦ÓóÌÐòÈÆ¹ýÊðÃûÑéÖ¤ £»£»£»µÚÈý¸öÊÇÄں˿ò¼ÜÖеÄÎó²î£¨CVE-2023-41992£©£¬£¬£¬£¬£¬£¬£¬ÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´ÌáȨ ¡£¡£¡£¡£¡£¡£AppleÔÚ½ñÄêÒÑÐÞ¸´ÁË16¸öÁãÈÕÎó²î ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/151174/hacking/apple-zero-days.html


2¡¢T-Mobile¹Ù·½Ó¦ÓùÊÕÏ¿ÉÒÔÉó²éËûÈËÕÊ»§ºÍÕ˵¥ÐÅÏ¢


¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬T-MobileµÄ¿Í»§³Æ£¬£¬£¬£¬£¬£¬£¬ÔڵǼ¸Ã¹«Ë¾µÄ¹Ù·½Òƶ¯Ó¦Óúó¿ÉÒÔÉó²éÆäËûÈ˵ÄÕÊ»§ºÍÕ˵¥ÐÅÏ¢ ¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢µØµã¡¢ÕË»§Óà¶îÒÔ¼°ÐÅÓÿ¨ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÀýÈçÈÕÆÚºÍ×îºóËÄλÊý×Ö ¡£¡£¡£¡£¡£¡£ËäÈ»´Ó20ÈÕ×îÏÈÔÚRedditºÍTwitterÓ¿ÏÖÁË´ó×Ú±¨¸æ£¬£¬£¬£¬£¬£¬£¬µ«Ò»Ð©¿Í»§Éù³ÆÔÚÒÑÍùÁ½ÖÜÄÚÒ»Ö±±£´æÕâÖÖÇéÐÎ ¡£¡£¡£¡£¡£¡£T-MobileÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢·ÇÍøÂç¹¥»÷µ¼ÖµÄ£¬£¬£¬£¬£¬£¬£¬ÆäϵͳҲûÓÐÔâµ½ÈëÇÖ ¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÔÝʱµÄϵͳ¹ÊÕÏ£¬£¬£¬£¬£¬£¬£¬ÓëÍýÏëµÄÒ¹¼äÊÖÒÕ¸üÐÂÓйØ£¬£¬£¬£¬£¬£¬£¬½öÉæ¼°²»µ½100Ãû¿Í»§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ºÜ¿ì¾Í»ñµÃÏàʶ¾ö ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/


3¡¢Check PointÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ


9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬Check PointÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ ¡£¡£¡£¡£¡£¡£BBTok×î³õÓÚ2020ÄêÆØ¹â£¬£¬£¬£¬£¬£¬£¬¸´ÖÆÁË40¶à¼ÒÄ«Î÷¸çºÍ°ÍÎ÷ÒøÐеĽçÃæ£¬£¬£¬£¬£¬£¬£¬²¢ÓÕÆ­Ä¿µÄÊäÈëÒøÐÐÕË»§µÄ2FAÂë»òÖ§¸¶¿¨ºÅ ¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸ç£¬£¬£¬£¬£¬£¬£¬½ÓÄɶà²ãµØÀíΧÀ¸À´È·±£Ä¿µÄÅÌËã»ú½öÀ´×ÔÕâЩ¹ú¼Ò ¡£¡£¡£¡£¡£¡£Ñ¬È¾Á´Ê¹ÓÃÁËÒ»ÖÖÆæÒìµÄLOLBins×éºÏ£¬£¬£¬£¬£¬£¬£¬µ¼Ö¼ì²âÂÊ½ÏµÍ ¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ý´¹ÂÚÁ´½Ó·Ö·¢£¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇ×÷ΪÓʼþµÄ¸½¼þ ¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/security/check-point-research-exposes-new-versions-of-the-bbtok-banking-malware-which-targets-clients-of-over-40-mexican-and-brazilian-banks/


4¡¢Sonatype¼ì²âµ½14¸öÇÔÈ¡SSHÃÜÔ¿µÈÐÅÏ¢µÄ¶ñÒânpm°ü


SonatypeÓÚ9ÔÂ19ÈÕ³ÆÆäÔÚnpmÈí¼þ°ü×¢²á±í¼ì²âµ½Ò»ÅúеĶñÒâÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡KubernetesÉèÖúÍSSHÃÜÔ¿ ¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÊÔͼð³äJavaScript¿âºÍ×é¼þ£¬£¬£¬£¬£¬£¬£¬ÀýÈçESLint²å¼þºÍTypeScript SDK¹¤¾ß ¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬ÔÚ×°ÖúóËü»áÔËÐлìÏý´úÂ룬£¬£¬£¬£¬£¬£¬ÒÔ´ÓÄ¿µÄÅÌËã»úÇÔÈ¡Ãô¸ÐÎļþ ¡£¡£¡£¡£¡£¡£³ýÁËKubernetesÉèÖúÍSSHÃÜÔ¿Í⣬£¬£¬£¬£¬£¬£¬»¹ÇÔÈ¡Óû§Ãû¡¢IPµØµãºÍÖ÷»úÃûµÈÏµÍ³Ö¸ÎÆÐÅÏ¢ ¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÓɲî±ðµÄnpmÕË»§·ÖÅúÐû²¼£¬£¬£¬£¬£¬£¬£¬µ«ÏàͬµãÊǶ¼Ê¹ÓÃÁËÓòÃû¡°app.thretest.com¡± ¡£¡£¡£¡£¡£¡£


https://blog.sonatype.com/npm-packages-caught-exfiltrating-kubernetes-config-ssh-keys


5¡¢ProofpointÏêÊöʹÓÃValleyRATºÍSainbox RATµÄ¹¥»÷


9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬ProofpointÏêÊöÁËʹÓÃValleyRATºÍSainbox RAT£¨Gh0stRAT±äÖÖ£©µÄ¹¥»÷»î¶¯ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2023ÄêÒѼì²âµ½30¶à¸ö´ËÀà»î¶¯ ¡£¡£¡£¡£¡£¡£½üÆÚµÄ»î¶¯Ê¹ÓÃÎÞаµÄ·Ö·¢ÒªÁ죬£¬£¬£¬£¬£¬£¬Í¨¹ýExcelºÍPDF¸½¼þ·Ö·¢£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Á´½Óµ½Ñ¹Ëõ¿ÉÖ´ÐÐÎļþµÄURL ¡£¡£¡£¡£¡£¡£SainboxÓÚ2020Äê±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬½ñÄê4ÔÂÒÔÀ´ÒѼì²âµ½½ü20ÆðÈö²¥¸ÃRATµÄ»î¶¯£¬£¬£¬£¬£¬£¬£¬¶øÔÚ´Ë֮ǰ£¬£¬£¬£¬£¬£¬£¬SainboxÒÑÔÚ¶ñÒâÓʼþÁìÓòÏúÉùÄä¼£¶àÄê ¡£¡£¡£¡£¡£¡£ValleyRATÓÚ2Ô±»Åû¶£¬£¬£¬£¬£¬£¬£¬Í¨¹ýC++¿ª·¢£¬£¬£¬£¬£¬£¬£¬×Ô3ÔÂ21ÈÕÆð¼ì²âµ½6ÆðÈö²¥ValleyRATµÄ»î¶¯ ¡£¡£¡£¡£¡£¡£Proofpoint»¹·¢Ã÷ÁËÖÁÉÙ3¸ö·Ö·¢Purple FoxµÄ»î¶¯ ¡£¡£¡£¡£¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape


6¡¢ÃÀ¹úÇå¾²»ú¹¹¹ûÕæ¹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄIoCºÍTTP


ÃÀ¹úFBIºÍCISAÓÚ9ÔÂ20ÈÕÐû²¼Á˹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄÁªºÏÍøÂçÇå¾²×Éѯ(CSA)£¬£¬£¬£¬£¬£¬£¬Éæ¼°IoCºÍTTPµÈÐÅÏ¢ ¡£¡£¡£¡£¡£¡£SnatchÓÚ2018ÄêÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬½ÓÄÉRaaSģʽ ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÒªº¦µÄ»ù´¡ÉèÊ©ÁìÓò£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹ú·À¹¤Òµ»ùµØ(DIB)¡¢Á¸Ê³ºÍũҵÒÔ¼°ÐÅÏ¢ÊÖÒÕÐÐÒµ ¡£¡£¡£¡£¡£¡£SnatchʹÓòî±ðµÄTTPÀ´Õì̽¡¢ºáÏòÒÆ¶¯ÒÔ¼°ËÑË÷Êý¾Ý ¡£¡£¡£¡£¡£¡£ËüʹÓÃsc.exeWindowsÏÂÁîÐÐÀ´ÉèÖá¢ÅÌÎÊ¡¢×èÖ¹¡¢Æô¶¯¡¢É¾³ýºÍÌí¼ÓϵͳЧÀÍ£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃMetasploitºÍCobalt StrikeµÈ¹¤¾ß ¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬£¬ÔÚ°²ÅÅÀÕË÷Èí¼þ֮ǰ£¬£¬£¬£¬£¬£¬£¬Snatch»áÔÚÄ¿µÄϵͳÉÏÆÆ·Ñ³¤´ïÈý¸öÔµÄʱ¼ä£¬£¬£¬£¬£¬£¬£¬¾ÙÐкáÏòÒÆ¶¯ÒÔ¾¡¿ÉÄÜ´ó¹æÄ£µØ°²ÅÅÀÕË÷Èí¼þ ¡£¡£¡£¡£¡£¡£


https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a