AppleÐû²¼½ôÆÈ¸üУ¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÒѱ»Æð¾¢Ê¹ÓõÄÎó²î

Ðû²¼Ê±¼ä 2022-08-18
1¡¢AppleÐû²¼½ôÆÈ¸üУ¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÒѱ»Æð¾¢Ê¹ÓõÄÎó²î

      

8ÔÂ17ÈÕ£¬£¬ £¬£¬£¬£¬£¬AppleÐû²¼½ôÆÈ¸üУ¬£¬ £¬£¬£¬£¬£¬ÐÞ¸´Á½¸ö¿É±»ÓÃÀ´ÈëÇÖiPhone¡¢iPad»òMacµÄÁãÈÕÎó²î¡£ ¡£¡£¡£¡£¡£¡£µÚÒ»¸öÊDzÙ×÷ϵͳÄÚºËÖеÄÔ½½çдÈëÎó²î£¨CVE-2022-32894£©£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÒÔÄÚºËȨÏÞÖ´ÐдúÂë¡£ ¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÊÇWebKitÖеÄÔ½½çдÈëÎó²î£¨CVE-2022-32893£©£¬£¬ £¬£¬£¬£¬£¬¿Éͨ¹ý»á¼û¶ñÒâÍøÕ¾±»Ô¶³ÌʹÓÃÀ´Ö´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£¡£¡£¡£AppleÌåÏÖÕâÁ½¸öÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬ £¬£¬£¬£¬£¬¿ÉÊÇûÓÐÐû²¼¹ØÓÚÕâЩ¹¥»÷µÄÏêϸÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/apple-patches-new-macos-ios-zero-days


2¡¢CS:GOƤ·ôÉúÒâÆ½Ì¨Ôâµ½¹¥»÷Ëðʧ¼ÛÖµ600ÍòÃÀÔªÉÌÆ·

      

¾ÝýÌå8ÔÂ16Èճƣ¬£¬ £¬£¬£¬£¬£¬CS:GO£¨·´¿Ö¾«Ó¢£ºÈ«Çò¹¥ÊÆ£©×î´óµÄƤ·ôÉúÒâÆ½Ì¨Ö®Ò»CS.MONEYÔâµ½¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÔÚËðʧÁ˼ÛÖµÔ¼600ÍòÃÀÔªµÄ20000¼þÎïÆ·ºóÏÂÏß¡£ ¡£¡£¡£¡£¡£¡£CS.MONEYÓµÓÐ53ÖÖÎäÆ÷µÄ1696ÖÖÆæÒìÆ¤·ô£¬£¬ £¬£¬£¬£¬£¬ÖÎÀíµÄ×Ü×ʲú¼ÛֵΪ16500000ÃÀÔª£¬£¬ £¬£¬£¬£¬£¬ÔÚ¹¥»÷ÊÂÎñºóϵøµ½ÁË10500000ÃÀÔª¡£ ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýijÖÖ·½·¨»ñµÃÁËÓÃÓÚSteamÊÚȨµÄMobile Authenticator(MA)ÎļþµÄ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬£¬È»ºó¿ØÖÆÁË100¸ö°üÀ¨¸ÃЧÀͳÖÓÐµÄÆ¤·ôµÄbotÕÊ»§£¬£¬ £¬£¬£¬£¬£¬²¢¾ÙÐÐÁËԼһǧ±ÊÉúÒâ¡£ ¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÒÑÖÐÖ¹ÈýÌ죬£¬ £¬£¬£¬£¬£¬µ«±»µÁÎïÆ·ÈÔδ±»Õһء£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cs-go-trading-site-hacked-to-steal-6-million-worth-of-skins/


3¡¢Ó¢¹úË®Îñ¹«Ë¾South Staffordshire WaterÔâµ½Clop¹¥»÷

      

¾ÝýÌå8ÔÂ16ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬Ó¢¹úË®Îñ¹«Ë¾South Staffordshire Water³ÆÆäÔâµ½¹¥»÷µ¼ÖÂITϵͳÖÐÖ¹¡£ ¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¼ÒÌìÌìΪ160ÍòÏûºÄÕßÌṩ3.3ÒÚÉýÒûÓÃË®µÄ¹«Ë¾£¬£¬ £¬£¬£¬£¬£¬Ëü͸¶´ËÊÂÎñ²¢Î´Ó°ÏìÆä¹©Ë®ÏµÍ³¡£ ¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬£¬£¬²¢ÌåÏÖ¿ÉÓ°Ï칩ˮµÄÔËÓªºÍÇå¾²¡£ ¡£¡£¡£¡£¡£¡£¸ÃÍŻﻹÉù³ÆÒÑÇÔÈ¡ÁË5TBµÄÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬²¢Ðû²¼ÁËÒ»·Ý±»µÁÊý¾ÝÑù±¾£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨»¤ÕÕ¡¢Éí·ÝÖ¤ºÍSCADAϵͳµÄ½ØÍ¼¡£ ¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/134450/cyber-crime/south-staffordshire-water-cyberattack.html


4¡¢ClarotyÑÝʾÔõÑùͨ¹ýÎäÆ÷»¯µÄPLCÈëÇÖOTµÄÐÂEvil¹¥»÷

      

¾Ý8ÔÂ16ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬£¬Claroty·¢Ã÷Ò»ÖÖеÄEvil PLC¹¥»÷·½·¨£¬£¬ £¬£¬£¬£¬£¬¿ÉÓ°ÏìÂÞ¿ËΤ¶û×Ô¶¯»¯¡¢Ê©ÄÍµÂµçÆø¡¢Í¨ÓÃµçÆø¡¢±´¼ÓÀ³¡¢Ð½ܡ¢OVARROºÍ°¬Ä¬ÉúµÄ²úÆ·¡£ ¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷¿ÉÒÔ½«¿É±à³ÌÂß¼­¿ØÖÆÆ÷(PLC)ÎäÆ÷»¯£¬£¬ £¬£¬£¬£¬£¬Ê¹Óù¤³ÌÊÂÇéÕ¾ÈëÇÖOTºÍÆóÒµµÄÍøÂ磬£¬ £¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô´Óʹ¤ÒµÍøÂç¡¢PLCÉèÖú͹ÊÕÏɨ³ýµÄ¹¤³Ìʦ¡£ ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÔÚÒ»¸ö̻¶ÔÚÍøÉϵÄPLCÖд¥·¢¹ÊÕÏ£¬£¬ £¬£¬£¬£¬£¬ÓÕʹ¹¤³Ìʦͨ¹ý¹¤³ÌÊÂÇéÕ¾Èí¼þÅþÁ¬µ½±»Ñ¬È¾PLC¡£ ¡£¡£¡£¡£¡£¡£µ±¹¤³Ìʦ¼ìË÷PLCÂß¼­µÄÊÂÇ鸱±¾Ê±£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßÔÙʹÓÃÆ½Ì¨ÉϵÄÎó²îÖ´ÐжñÒâ´úÂë¡£ ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/new-evil-plc-attack-weaponizes-plcs-to.html


5¡¢ESET·¢Ã÷LazarusʹÓÃеÄmacOS¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯

      

ýÌå8ÔÂ16ÈÕ±¨µÀ³Æ£¬£¬ £¬£¬£¬£¬£¬³¯ÏʺڿÍÍÅ»ïLazarus¿ÉÔÚ×°ÓÐÓ¢ÌØ¶ûºÍM1оƬ×éµÄÆ»¹ûMacÉÏÖ´ÐжñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬£¬ESET½«ÆäÓë»î¶¯Operation In(ter)ceptionÁªÏµÆðÀ´¡£ ¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯µÄÓÕ¶üÎļþËäȻʹÓÃ.PDFÀ©Õ¹Ãûµ«ÏÖʵÉÏÊÇÒ»¸öMach-O¿ÉÖ´ÐÐÎļþ£¬£¬ £¬£¬£¬£¬£¬Æä¹¦Ð§ÊÇÆô¶¯FinderFontsUpdater£¬£¬ £¬£¬£¬£¬£¬½ø¶øÖ´ÐÐsafarifontsagent£¬£¬ £¬£¬£¬£¬£¬¸ÃÏÂÔØÆ÷Ö¼ÔÚ´ÓÔ¶³ÌЧÀÍÆ÷¼ìË÷ÏÂÒ»½×¶ÎµÄpayload¡£ ¡£¡£¡£¡£¡£¡£ESETÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬ÓÕ¶üÊÇʹÓÃÁË2022Äê2Ô½ÒÏþ¸øShankey NohriaµÄÖ¤ÊéÇ©ÊðµÄ£¬£¬ £¬£¬£¬£¬£¬AppleÓÚ8ÔÂ12ÈÕ×÷·ÏÁ˸ÃÖ¤Êé¡£ ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/north-korea-hackers-spotted-targeting.html


6¡¢Ñо¿Ö°Ô±Åû¶RTLSÖпɵ¼ÖÂMitMµÈ¹¥»÷µÄÎó²îµÄÏêÇé

      

8ÔÂ15ÈÕ£¬£¬ £¬£¬£¬£¬£¬NozomiµÄÑо¿Ö°Ô±Õ¹ÏÖÁ˶à¸öÓ°ÏìUWB£¨³¬¿í´ø£©RTLS£¨ÊµÊ±¶¨Î»ÏµÍ³£©µÄÎó²î£¬£¬ £¬£¬£¬£¬£¬¿É±»ÓÃÀ´Ö´ÐÐÖÐÐÄÈ˹¥»÷²¢²Ù¿Ø±êÇ©µØÀíλÖÃÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£RTLSÊÖÒÕÆÕ±éÓÃÓÚ¹¤ÒµÇéÐΡ¢¹«¹²½»Í¨¡¢Ò½ÁƱ£½¡ºÍÖǻ۶¼»áÓ¦Ó㬣¬ £¬£¬£¬£¬£¬Ö÷Òª×÷ÓÃÊÇͨ¹ýʹÓøú×Ù±êÇ©¡¢ÐźÅÎüÊÕêºÍÖÐÑë´¦Öóͷ£ÏµÍ³½ç˵µØÀíΧÀ¸ÇøÓòÀ´Ð­ÖúÇå¾²¡£ ¡£¡£¡£¡£¡£¡£Nozomi½¨ÒéRTLSϵͳµÄÖÎÀíԱʹÓ÷À»ðǽÀ´ÏÞÖÆ»á¼û£¬£¬ £¬£¬£¬£¬£¬ÔÚÍøÂçÖмÓÈëÇÖ¼ì²âϵͳ£¬£¬ £¬£¬£¬£¬£¬²¢Ê¹ÓôøÓÐÊý¾Ý°üͬ²½¼ÆÊýÆ÷ÖµµÄSSHËíµÀ¾ÙÐÐÊý¾Ý¼ÓÃÜ¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/rtls-systems-vulnerable-to-mitm-attacks-location-manipulation/