AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄÎó²î

Ðû²¼Ê±¼ä 2023-09-22

1¡¢AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄÎó²î


¾Ý9ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬AppleÐû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬£¬£¬ÒÔÐÞ¸´ÔÚÕë¶ÔiPhoneºÍMacµÄ¹¥»÷Öб»Ê¹ÓõÄ3¸öеÄÎó²î¡£¡£¡£¡£¡£¡£¡£±»Ê¹ÓÃÎó²î»®·ÖÊÇWebkitÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2023-41993£©£¬£¬£¬£¬¿Éͨ¹ýÓÕÆ­Ä¿µÄ»á¼ûÌØÖÆµÄWebÄÚÈÝÀ´µ¼ÖÂí§Òâ´úÂëÖ´ÐУ»£»£»Çå¾²¿ò¼ÜÖеÄÎó²î£¨CVE-2023-41991£©£¬£¬£¬£¬¿ÉÒÔʹÓöñÒâÓ¦ÓóÌÐòÈÆ¹ýÊðÃûÑéÖ¤£»£»£»µÚÈý¸öÊÇÄں˿ò¼ÜÖеÄÎó²î£¨CVE-2023-41992£©£¬£¬£¬£¬ÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´ÌáȨ¡£¡£¡£¡£¡£¡£¡£AppleÔÚ½ñÄêÒÑÐÞ¸´ÁË16¸öÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/151174/hacking/apple-zero-days.html


2¡¢T-Mobile¹Ù·½Ó¦ÓùÊÕÏ¿ÉÒÔÉó²éËûÈËÕÊ»§ºÍÕ˵¥ÐÅÏ¢


¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬T-MobileµÄ¿Í»§³Æ£¬£¬£¬£¬ÔڵǼ¸Ã¹«Ë¾µÄ¹Ù·½Òƶ¯Ó¦Óúó¿ÉÒÔÉó²éÆäËûÈ˵ÄÕÊ»§ºÍÕ˵¥ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢µØµã¡¢ÕË»§Óà¶îÒÔ¼°ÐÅÓÿ¨ÏêϸÐÅÏ¢£¬£¬£¬£¬ÀýÈçÈÕÆÚºÍ×îºóËÄλÊý×Ö¡£¡£¡£¡£¡£¡£¡£ËäÈ»´Ó20ÈÕ×îÏÈÔÚRedditºÍTwitterÓ¿ÏÖÁË´ó×Ú±¨¸æ£¬£¬£¬£¬µ«Ò»Ð©¿Í»§Éù³ÆÔÚÒÑÍùÁ½ÖÜÄÚÒ»Ö±±£´æÕâÖÖÇéÐΡ£¡£¡£¡£¡£¡£¡£T-MobileÌåÏÖ£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢·ÇÍøÂç¹¥»÷µ¼ÖµÄ£¬£¬£¬£¬ÆäϵͳҲûÓÐÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÔÝʱµÄϵͳ¹ÊÕÏ£¬£¬£¬£¬ÓëÍýÏëµÄÒ¹¼äÊÖÒÕ¸üÐÂÓйØ£¬£¬£¬£¬½öÉæ¼°²»µ½100Ãû¿Í»§µÄÐÅÏ¢£¬£¬£¬£¬ºÜ¿ì¾Í»ñµÃÏàʶ¾ö¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/


3¡¢Check PointÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ


9ÔÂ20ÈÕ£¬£¬£¬£¬Check PointÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ¡£¡£¡£¡£¡£¡£¡£BBTok×î³õÓÚ2020ÄêÆØ¹â£¬£¬£¬£¬¸´ÖÆÁË40¶à¼ÒÄ«Î÷¸çºÍ°ÍÎ÷ÒøÐеĽçÃæ£¬£¬£¬£¬²¢ÓÕÆ­Ä¿µÄÊäÈëÒøÐÐÕË»§µÄ2FAÂë»òÖ§¸¶¿¨ºÅ¡£¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸ç£¬£¬£¬£¬½ÓÄɶà²ãµØÀíΧÀ¸À´È·±£Ä¿µÄÅÌËã»ú½öÀ´×ÔÕâЩ¹ú¼Ò¡£¡£¡£¡£¡£¡£¡£Ñ¬È¾Á´Ê¹ÓÃÁËÒ»ÖÖÆæÒìµÄLOLBins×éºÏ£¬£¬£¬£¬µ¼Ö¼ì²âÂʽϵ͡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ý´¹ÂÚÁ´½Ó·Ö·¢£¬£¬£¬£¬¶ø²»ÊÇ×÷ΪÓʼþµÄ¸½¼þ¡£¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/security/check-point-research-exposes-new-versions-of-the-bbtok-banking-malware-which-targets-clients-of-over-40-mexican-and-brazilian-banks/


4¡¢Sonatype¼ì²âµ½14¸öÇÔÈ¡SSHÃÜÔ¿µÈÐÅÏ¢µÄ¶ñÒânpm°ü


SonatypeÓÚ9ÔÂ19ÈÕ³ÆÆäÔÚnpmÈí¼þ°ü×¢²á±í¼ì²âµ½Ò»ÅúеĶñÒâÈí¼þ°ü£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡KubernetesÉèÖúÍSSHÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÊÔͼð³äJavaScript¿âºÍ×é¼þ£¬£¬£¬£¬ÀýÈçESLint²å¼þºÍTypeScript SDK¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬ÔÚ×°ÖúóËü»áÔËÐлìÏý´úÂ룬£¬£¬£¬ÒÔ´ÓÄ¿µÄÅÌËã»úÇÔÈ¡Ãô¸ÐÎļþ¡£¡£¡£¡£¡£¡£¡£³ýÁËKubernetesÉèÖúÍSSHÃÜÔ¿Í⣬£¬£¬£¬»¹ÇÔÈ¡Óû§Ãû¡¢IPµØµãºÍÖ÷»úÃûµÈÏµÍ³Ö¸ÎÆÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÓɲî±ðµÄnpmÕË»§·ÖÅúÐû²¼£¬£¬£¬£¬µ«ÏàͬµãÊǶ¼Ê¹ÓÃÁËÓòÃû¡°app.thretest.com¡±¡£¡£¡£¡£¡£¡£¡£


https://blog.sonatype.com/npm-packages-caught-exfiltrating-kubernetes-config-ssh-keys


5¡¢ProofpointÏêÊöʹÓÃValleyRATºÍSainbox RATµÄ¹¥»÷


9ÔÂ20ÈÕ£¬£¬£¬£¬ProofpointÏêÊöÁËʹÓÃValleyRATºÍSainbox RAT£¨Gh0stRAT±äÖÖ£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2023ÄêÒѼì²âµ½30¶à¸ö´ËÀà»î¶¯¡£¡£¡£¡£¡£¡£¡£½üÆÚµÄ»î¶¯Ê¹ÓÃÎÞаµÄ·Ö·¢ÒªÁ죬£¬£¬£¬Í¨¹ýExcelºÍPDF¸½¼þ·Ö·¢£¬£¬£¬£¬ÆäÖаüÀ¨Á´½Óµ½Ñ¹Ëõ¿ÉÖ´ÐÐÎļþµÄURL¡£¡£¡£¡£¡£¡£¡£SainboxÓÚ2020Äê±»·¢Ã÷£¬£¬£¬£¬½ñÄê4ÔÂÒÔÀ´ÒѼì²âµ½½ü20ÆðÈö²¥¸ÃRATµÄ»î¶¯£¬£¬£¬£¬¶øÔÚ´Ë֮ǰ£¬£¬£¬£¬SainboxÒÑÔÚ¶ñÒâÓʼþÁìÓòÏúÉùÄä¼£¶àÄê¡£¡£¡£¡£¡£¡£¡£ValleyRATÓÚ2Ô±»Åû¶£¬£¬£¬£¬Í¨¹ýC++¿ª·¢£¬£¬£¬£¬×Ô3ÔÂ21ÈÕÆð¼ì²âµ½6ÆðÈö²¥ValleyRATµÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£Proofpoint»¹·¢Ã÷ÁËÖÁÉÙ3¸ö·Ö·¢Purple FoxµÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape


6¡¢ÃÀ¹úÇå¾²»ú¹¹¹ûÕæ¹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄIoCºÍTTP


ÃÀ¹úFBIºÍCISAÓÚ9ÔÂ20ÈÕÐû²¼Á˹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄÁªºÏÍøÂçÇå¾²×Éѯ(CSA)£¬£¬£¬£¬Éæ¼°IoCºÍTTPµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£SnatchÓÚ2018ÄêÊ״ηºÆð£¬£¬£¬£¬½ÓÄÉRaaSģʽ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÒªº¦µÄ»ù´¡ÉèÊ©ÁìÓò£¬£¬£¬£¬°üÀ¨¹ú·À¹¤Òµ»ùµØ(DIB)¡¢Á¸Ê³ºÍũҵÒÔ¼°ÐÅÏ¢ÊÖÒÕÐÐÒµ¡£¡£¡£¡£¡£¡£¡£SnatchʹÓòî±ðµÄTTPÀ´Õì̽¡¢ºáÏòÒÆ¶¯ÒÔ¼°ËÑË÷Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ËüʹÓÃsc.exeWindowsÏÂÁîÐÐÀ´ÉèÖá¢ÅÌÎÊ¡¢×èÖ¹¡¢Æô¶¯¡¢É¾³ýºÍÌí¼ÓϵͳЧÀÍ£¬£¬£¬£¬»¹Ê¹ÓÃMetasploitºÍCobalt StrikeµÈ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬ÔÚ°²ÅÅÀÕË÷Èí¼þ֮ǰ£¬£¬£¬£¬Snatch»áÔÚÄ¿µÄϵͳÉÏÆÆ·Ñ³¤´ïÈý¸öÔµÄʱ¼ä£¬£¬£¬£¬¾ÙÐкáÏòÒÆ¶¯ÒÔ¾¡¿ÉÄÜ´ó¹æÄ£µØ°²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£


https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a