AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄÎó²î

Ðû²¼Ê±¼ä 2023-09-22

1¡¢AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄÎó²î


¾Ý9ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬AppleÐû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´ÔÚÕë¶ÔiPhoneºÍMacµÄ¹¥»÷Öб»Ê¹ÓõÄ3¸öеÄÎó²î¡£¡£¡£¡£¡£¡£±»Ê¹ÓÃÎó²î»®·ÖÊÇWebkitÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2023-41993£©£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÓÕÆ­Ä¿µÄ»á¼ûÌØÖÆµÄWebÄÚÈÝÀ´µ¼ÖÂí§Òâ´úÂëÖ´ÐУ»£»£»£»£»Çå¾²¿ò¼ÜÖеÄÎó²î£¨CVE-2023-41991£©£¬£¬£¬£¬£¬£¬¿ÉÒÔʹÓöñÒâÓ¦ÓóÌÐòÈÆ¹ýÊðÃûÑéÖ¤£»£»£»£»£»µÚÈý¸öÊÇÄں˿ò¼ÜÖеÄÎó²î£¨CVE-2023-41992£©£¬£¬£¬£¬£¬£¬ÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´ÌáȨ¡£¡£¡£¡£¡£¡£AppleÔÚ½ñÄêÒÑÐÞ¸´ÁË16¸öÁãÈÕÎó²î¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/151174/hacking/apple-zero-days.html


2¡¢T-Mobile¹Ù·½Ó¦ÓùÊÕÏ¿ÉÒÔÉó²éËûÈËÕÊ»§ºÍÕ˵¥ÐÅÏ¢


¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬T-MobileµÄ¿Í»§³Æ£¬£¬£¬£¬£¬£¬ÔڵǼ¸Ã¹«Ë¾µÄ¹Ù·½Òƶ¯Ó¦Óúó¿ÉÒÔÉó²éÆäËûÈ˵ÄÕÊ»§ºÍÕ˵¥ÐÅÏ¢¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢µØµã¡¢ÕË»§Óà¶îÒÔ¼°ÐÅÓÿ¨ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬ÀýÈçÈÕÆÚºÍ×îºóËÄλÊý×Ö¡£¡£¡£¡£¡£¡£ËäÈ»´Ó20ÈÕ×îÏÈÔÚRedditºÍTwitterÓ¿ÏÖÁË´ó×Ú±¨¸æ£¬£¬£¬£¬£¬£¬µ«Ò»Ð©¿Í»§Éù³ÆÔÚÒÑÍùÁ½ÖÜÄÚÒ»Ö±±£´æÕâÖÖÇéÐΡ£¡£¡£¡£¡£¡£T-MobileÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ²¢·ÇÍøÂç¹¥»÷µ¼ÖµÄ£¬£¬£¬£¬£¬£¬ÆäϵͳҲûÓÐÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÔÝʱµÄϵͳ¹ÊÕÏ£¬£¬£¬£¬£¬£¬ÓëÍýÏëµÄÒ¹¼äÊÖÒÕ¸üÐÂÓйØ£¬£¬£¬£¬£¬£¬½öÉæ¼°²»µ½100Ãû¿Í»§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬ºÜ¿ì¾Í»ñµÃÏàʶ¾ö¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/


3¡¢Check PointÅû¶Õë¶ÔÀ­¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ


9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Check PointÅû¶ÁËÕë¶ÔÀ­¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ¡£¡£¡£¡£¡£¡£BBTok×î³õÓÚ2020ÄêÆØ¹â£¬£¬£¬£¬£¬£¬¸´ÖÆÁË40¶à¼ÒÄ«Î÷¸çºÍ°ÍÎ÷ÒøÐеĽçÃæ£¬£¬£¬£¬£¬£¬²¢ÓÕÆ­Ä¿µÄÊäÈëÒøÐÐÕË»§µÄ2FAÂë»òÖ§¸¶¿¨ºÅ¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸ç£¬£¬£¬£¬£¬£¬½ÓÄɶà²ãµØÀíΧÀ¸À´È·±£Ä¿µÄÅÌËã»ú½öÀ´×ÔÕâЩ¹ú¼Ò¡£¡£¡£¡£¡£¡£Ñ¬È¾Á´Ê¹ÓÃÁËÒ»ÖÖÆæÒìµÄLOLBins×éºÏ£¬£¬£¬£¬£¬£¬µ¼Ö¼ì²âÂʽϵÍ¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ý´¹ÂÚÁ´½Ó·Ö·¢£¬£¬£¬£¬£¬£¬¶ø²»ÊÇ×÷ΪÓʼþµÄ¸½¼þ¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/security/check-point-research-exposes-new-versions-of-the-bbtok-banking-malware-which-targets-clients-of-over-40-mexican-and-brazilian-banks/


4¡¢Sonatype¼ì²âµ½14¸öÇÔÈ¡SSHÃÜÔ¿µÈÐÅÏ¢µÄ¶ñÒânpm°ü


SonatypeÓÚ9ÔÂ19ÈÕ³ÆÆäÔÚnpmÈí¼þ°ü×¢²á±í¼ì²âµ½Ò»ÅúеĶñÒâÈí¼þ°ü£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡KubernetesÉèÖúÍSSHÃÜÔ¿¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÊÔͼð³äJavaScript¿âºÍ×é¼þ£¬£¬£¬£¬£¬£¬ÀýÈçESLint²å¼þºÍTypeScript SDK¹¤¾ß¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬ÔÚ×°ÖúóËü»áÔËÐлìÏý´úÂ룬£¬£¬£¬£¬£¬ÒÔ´ÓÄ¿µÄÅÌËã»úÇÔÈ¡Ãô¸ÐÎļþ¡£¡£¡£¡£¡£¡£³ýÁËKubernetesÉèÖúÍSSHÃÜÔ¿Í⣬£¬£¬£¬£¬£¬»¹ÇÔÈ¡Óû§Ãû¡¢IPµØµãºÍÖ÷»úÃûµÈÏµÍ³Ö¸ÎÆÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÓɲî±ðµÄnpmÕË»§·ÖÅúÐû²¼£¬£¬£¬£¬£¬£¬µ«ÏàͬµãÊǶ¼Ê¹ÓÃÁËÓòÃû¡°app.thretest.com¡±¡£¡£¡£¡£¡£¡£


https://blog.sonatype.com/npm-packages-caught-exfiltrating-kubernetes-config-ssh-keys


5¡¢ProofpointÏêÊöʹÓÃValleyRATºÍSainbox RATµÄ¹¥»÷


9ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ProofpointÏêÊöÁËʹÓÃValleyRATºÍSainbox RAT£¨Gh0stRAT±äÖÖ£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2023ÄêÒѼì²âµ½30¶à¸ö´ËÀà»î¶¯¡£¡£¡£¡£¡£¡£½üÆÚµÄ»î¶¯Ê¹ÓÃÎÞаµÄ·Ö·¢ÒªÁ죬£¬£¬£¬£¬£¬Í¨¹ýExcelºÍPDF¸½¼þ·Ö·¢£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Á´½Óµ½Ñ¹Ëõ¿ÉÖ´ÐÐÎļþµÄURL¡£¡£¡£¡£¡£¡£SainboxÓÚ2020Äê±»·¢Ã÷£¬£¬£¬£¬£¬£¬½ñÄê4ÔÂÒÔÀ´ÒѼì²âµ½½ü20ÆðÈö²¥¸ÃRATµÄ»î¶¯£¬£¬£¬£¬£¬£¬¶øÔÚ´Ë֮ǰ£¬£¬£¬£¬£¬£¬SainboxÒÑÔÚ¶ñÒâÓʼþÁìÓòÏúÉùÄä¼£¶àÄê¡£¡£¡£¡£¡£¡£ValleyRATÓÚ2Ô±»Åû¶£¬£¬£¬£¬£¬£¬Í¨¹ýC++¿ª·¢£¬£¬£¬£¬£¬£¬×Ô3ÔÂ21ÈÕÆð¼ì²âµ½6ÆðÈö²¥ValleyRATµÄ»î¶¯¡£¡£¡£¡£¡£¡£Proofpoint»¹·¢Ã÷ÁËÖÁÉÙ3¸ö·Ö·¢Purple FoxµÄ»î¶¯¡£¡£¡£¡£¡£¡£


https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape


6¡¢ÃÀ¹úÇå¾²»ú¹¹¹ûÕæ¹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄIoCºÍTTP


ÃÀ¹úFBIºÍCISAÓÚ9ÔÂ20ÈÕÐû²¼Á˹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄÁªºÏÍøÂçÇå¾²×Éѯ(CSA)£¬£¬£¬£¬£¬£¬Éæ¼°IoCºÍTTPµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£SnatchÓÚ2018ÄêÊ״ηºÆð£¬£¬£¬£¬£¬£¬½ÓÄÉRaaSģʽ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÒªº¦µÄ»ù´¡ÉèÊ©ÁìÓò£¬£¬£¬£¬£¬£¬°üÀ¨¹ú·À¹¤Òµ»ùµØ(DIB)¡¢Á¸Ê³ºÍũҵÒÔ¼°ÐÅÏ¢ÊÖÒÕÐÐÒµ¡£¡£¡£¡£¡£¡£SnatchʹÓòî±ðµÄTTPÀ´Õì̽¡¢ºáÏòÒÆ¶¯ÒÔ¼°ËÑË÷Êý¾Ý¡£¡£¡£¡£¡£¡£ËüʹÓÃsc.exeWindowsÏÂÁîÐÐÀ´ÉèÖá¢ÅÌÎÊ¡¢×èÖ¹¡¢Æô¶¯¡¢É¾³ýºÍÌí¼ÓϵͳЧÀÍ£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃMetasploitºÍCobalt StrikeµÈ¹¤¾ß¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬ÔÚ°²ÅÅÀÕË÷Èí¼þ֮ǰ£¬£¬£¬£¬£¬£¬Snatch»áÔÚÄ¿µÄϵͳÉÏÆÆ·Ñ³¤´ïÈý¸öÔµÄʱ¼ä£¬£¬£¬£¬£¬£¬¾ÙÐкáÏòÒÆ¶¯ÒÔ¾¡¿ÉÄÜ´ó¹æÄ£µØ°²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£


https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a