AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-42824

Ðû²¼Ê±¼ä 2023-10-07

1¡¢AppleÐû²¼½ôÆÈ¸üÐÂÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-42824


¾ÝýÌå10ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬AppleÐû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬ £¬£¬À´ÐÞ¸´Ó°ÏìiPhoneºÍiPadµÄÒѱ»Ê¹ÓÃÎó²î¡£¡£¡£¡£¡£ÕâÊDZ£´æÓÚÄÚºËÖеÄȨÏÞÌáÉýÎó²î£¨CVE-2023-42824£©£¬£¬£¬£¬£¬ £¬£¬iOS 16.6֮ǰµÄ°æ±¾¶¼¿ÉÄÜÊÜ´ËÎó²îµÄÓ°Ï죬£¬£¬£¬£¬ £¬£¬ÉÐδÐû²¼¹¥»÷ÕßÉí·Ý¡£¡£¡£¡£¡£ÕâÊÇ×ÔÄêÍ·ÒÔÀ´ÐÞ¸´µÄµÚ17¸ö±»Ê¹ÓÃÎó²î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËWebRTCÖеĻº³åÇøÒç³öÎó²î£¨CVE-2023-5217£©£¬£¬£¬£¬£¬ £¬£¬¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£


https://securityaffairs.com/151968/hacking/apple-zero-days-2.html


2¡¢»ùÒò¼ì²â¹«Ë¾23andMeÔ⵽ײ¿â¹¥»÷Êý°ÙÍòÓû§ÐÅϢй¶


¾Ý10ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÉù³Æ´Ó23andMeÇÔÈ¡ÁËÖÁÉÙ700ÍòÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬²¢ÔÚBreachedºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£¡£×î³õ¹¥»÷ÕßÐû²¼ÁË100ÍòÐеÂÒáÓÌÌ«È˵ÄÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬ÔÚ10ÔÂ4ÈÕÓÖÌá³öÒÔÿ¸ö23andMeÕË»§1-10ÃÀÔªµÄ¼ÛÇ®ÅúÁ¿³öÊÛÊý¾Ý×ÊÁÏ£¬£¬£¬£¬£¬ £¬£¬Ïêϸ¼ÛǮȡ¾öÓÚ¹ºÖÃÊýÄ¿¡£¡£¡£¡£¡£23andMe½«´Ë´Îй¶¹éÒòÓÚײ¿â¹¥»÷£¬£¬£¬£¬£¬ £¬£¬²¢ÌåÏÖËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½¨Ò飬£¬£¬£¬£¬ £¬£¬Óû§Ó¦×èÖ¹ÖØ¸´Ê¹ÓÃͳһ¸öÃÜÂë¡£¡£¡£¡£¡£


https://www.hackread.com/hacker-claims-dna-service-23andme-users-data/


3¡¢Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½¹¥»÷µ¼ÖÂЧÀÍÔÝʱÖÐÖ¹


ýÌå10ÔÂ5Èճƣ¬£¬£¬£¬£¬ £¬£¬Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½ÍøÂç¹¥»÷µ¼ÖÂÆäЧÀÍÒâÍâÖÐÖ¹£¬£¬£¬£¬£¬ £¬£¬¿ÉÄÜ»¹»áΣ¼°¿Í»§Êý¾Ý¡£¡£¡£¡£¡£¸Ã¹«Ë¾Îª60¸ö¹ú¼ÒÌá¹©ÒÆ¶¯µçÐźÍÓïÒôIP(VoIP)ЧÀÍ£¬£¬£¬£¬£¬ £¬£¬¹¥»÷±¬·¢ÔÚÖÜÄ©£¬£¬£¬£¬£¬ £¬£¬Ó°ÏìÁ˳ýÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÎÚ¿ËÀ¼ºÍÍ»Äá˹֮ÍâµÄËùÓйú¼Ò¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬ £¬£¬¿Í»§ºÍÁãÊÛÉ̳ÆÎÞ·¨»á¼û¸Ã¹«Ë¾µÄ³äÖµÃÅ»§£¬£¬£¬£¬£¬ £¬£¬º£Äں͹ú¼Êºô½ÐЧÀÍÒ²±£´æÎÊÌâ¡£¡£¡£¡£¡£Lyca³ÆÆäÖ÷ҪʹÃüÊÇÈ·±£¿£¿£¿£¿£¿£¿£¿Í»§Êý¾ÝµÄÇå¾²£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÕýÔÚÊÓ²ìÊÇ·ñÓÐСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬ £¬£¬²¢ÌåÏÖËùÓмͼ¶¼ÊÇÍêÈ«¼ÓÃܵÄ¡£¡£¡£¡£¡£


https://therecord.media/cyberattack-on-lyca-stops-calls


4¡¢EclecticIQÅû¶ÒǪ̂»ýµçΪÓÕ¶üÕë¶Ô°ëµ¼ÌåÐÐÒµµÄ¹¥»÷


EclecticIQÔÚ10ÔÂ5ÈÕÅû¶ÁËÕë¶Ô¶«Ñǰ뵼ÌåÐÐÒµµÄÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÒǪ̂»ýµçΪÖ÷ÌâµÄÓÕ¶ü£¬£¬£¬£¬£¬ £¬£¬·Ö·¢ÁËHyperBro¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬ £¬£¬ÒÔÔÚ±»Ñ¬È¾µÄ×°±¸ÉÏ×°ÖÃCobalt Strike beacon£¬£¬£¬£¬£¬ £¬£¬´Ó¶ø¾ÙÐÐÔ¶³Ì»á¼û¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÒ»¸ö¶ñÒâÈí¼þÏÂÔØ³ÌÐò£¬£¬£¬£¬£¬ £¬£¬ËüʹÓÃPowerShellÖеÄBitsTransferÄ£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬ £¬£¬´Ó¿ÉÄÜÊDZ»ÈëÇÖµÄCobra DocGuardЧÀÍÆ÷ÉÏ»ñÈ¡¶ñÒâ¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£±»ÈëÇÖµÄCobra DocGuardЧÀÍÆ÷ÉÏÍйÜÁËÒ»¸ö»ùÓÚGOµÄºóÃÅ"ChargeWeapon"£¬£¬£¬£¬£¬ £¬£¬¿ÉÄÜÓÉͳһ¹¥»÷ÕßÓÚ8ÔÂ21ÈÕÉÏ´«¡£¡£¡£¡£¡£ 


https://blog.eclecticiq.com/chinese-state-sponsored-cyber-espionage-activity-targeting-semiconductor-industry-in-east-asia


5¡¢ESET·¢Ã÷ʹÓÃDinodasRAT¹¥»÷¹çÑÇÄÇijÕþ¸®»ú¹¹µÄ»î¶¯


10ÔÂ5ÈÕ£¬£¬£¬£¬£¬ £¬£¬ESET³ÆÆä·¢Ã÷ÁËÕë¶Ô¹çÑÇÄÇijÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯Operation Jacana¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ½ñÄê2Ô·ݱ»¼ì²âµ½£¬£¬£¬£¬£¬ £¬£¬ËüÉæ¼°µ½Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬·Ö·¢ÁËÓÉC++¿ª·¢µÄкóÃÅDinodasRAT¡£¡£¡£¡£¡£DinodasRATʹÓÃTiny¼ÓÃÜËã·¨(TEA)¶ÔÆä·¢Ë͵½C&CµÄÐÅÏ¢¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬ £¬£¬¿ÉÇÔÈ¡Îļþ¡¢¿ØÖÆWindows×¢²á±íÏîºÍÖ´ÐÐCMDÏÂÁîµÈ¡£¡£¡£¡£¡£³ýÁËDinodasRAT Ö®Í⣬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËKorplug£¬£¬£¬£¬£¬ £¬£¬¸Ã¹¤¾ßͨ³£ÓëMustang PandaµÈÍÅ»ïÓйØ¡£¡£¡£¡£¡£


https://www.welivesecurity.com/en/eset-research/operation-jacana-spying-guyana-entity/


6¡¢Group-IB¼ì²âµ½Õë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄľÂíGoldDigger


10ÔÂ5ÈÕ£¬£¬£¬£¬£¬ £¬£¬Group-IBÐû²¼Á˹ØÓÚÐÂAndroidľÂíGoldDiggerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô6ÔÂÆð¾ÍÒ»Ö±»îÔ¾£¬£¬£¬£¬£¬ £¬£¬Õë¶Ô50¶à¸öÔ½ÄϵÄÒøÐС¢µç×ÓÇ®°üºÍ¼ÓÃÜÇ®°üÓ¦ÓóÌÐò¡£¡£¡£¡£¡£GoldDiggerð³äÁËÔ½ÄÏÕþ¸®ÃÅ»§ÍøÕ¾ºÍÍâµØÄÜÔ´¹«Ë¾£¬£¬£¬£¬£¬ £¬£¬Ö÷ҪĿµÄÊÇÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£¡£¡£¡£¡£Óм£ÏóÅú×¢£¬£¬£¬£¬£¬ £¬£¬¸Ã»î¶¯¿ÉÄÜ»áÀ©´óµ½Õû¸öÑÇÌ«µØÇøºÍÎ÷°àÑÀÓï¹ú¼Ò¡£¡£¡£¡£¡£¸ÃľÂí»¹Ê¹ÓÃÁËÖØ´óµÄ±£»£»£»£»£»¤»úÖÆ£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÕýµ±Èí¼þVirbox ProtectorÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£


https://www.group-ib.com/blog/golddigger-fraud-matrix/