Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-01-131. Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
1ÔÂ9ÈÕ£¬£¬£¬£¬£¬ÒÑÍùÁ½¸öÔ£¬£¬£¬£¬£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬£¬£¬£¬£¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃÜÊÖÒÕÌӱܼì²â¡£¡£¡£¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´Ð§ÀÍ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£¡£¡£¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬£¬£¬£¬£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬£¬£¬£¬£¬µ«Ò²ÎªÆäËû¿ª·¢Ö°Ô±ÌṩÁËË¢ÐÂʱ»ú¡£¡£¡£¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐʱ´ú½âÃÜ£¬£¬£¬£¬£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃÜÊÖÒյĵÍÏÓÒɶȣ¬£¬£¬£¬£¬ÌÓ±ÜÁ˱ê×¼¾²Ì¬¼ì²âÒªÁì¡£¡£¡£¡£BansheeÖ÷Ҫͨ¹ýÓÕÆÐÔµÄGitHub´æ´¢¿âÈö²¥£¬£¬£¬£¬£¬Õë¶ÔmacOSÓû§£¬£¬£¬£¬£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÄ¿µÄÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬£¬£¬£¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬£¬£¬£¬£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬£¬£¬£¬£¬²¢ÌṩÓÕÆÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£¡£¡£¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´Õϰ£¬£¬£¬£¬£¬µ«Ô´´úÂëй¶ºó£¬£¬£¬£¬£¬¶à¸öÍøÂç´¹ÂڻÈÔÔÚÈö²¥¸Ã¶ñÒâÈí¼þ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/
2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬EverestÍŻﱻָΪĻºóºÚÊÖ
1ÔÂ11ÈÕ£¬£¬£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢ÀÃ×´ïºÍεÂ˹ÍеêËÁ¹ºÖòúÆ·µÄÖ÷¹ËСÎÒ˽¼ÒÐÅÏ¢±»²»·¨»ñÈ¡¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢ÄêËê¡¢µØµãµÈСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬£¬£¬ÉÐÓÐÉúÒâÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æÍ¨Öª£¬£¬£¬£¬£¬²¢Ïò¼ÓÖÝî¿Ïµ»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸·¨¼¯ÍÅÌᳫµÄ£¬£¬£¬£¬£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕʱ´úͨ¹ýÏúÊ۵㴦Öóͷ£Ð§À͹©Ó¦É̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£¡£¡£¡£EverestÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË422,075ÌõСÎÒ˽¼Ò¼Í¼¡£¡£¡£¡£Ö»¹Ü²¿·Ö¿Í»§»ñµÃÁËÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬µ«Ð§ÀÍÏÞÆÚδ¹ûÕæ¡£¡£¡£¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬£¬£¬£¬£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÖøÃû£¬£¬£¬£¬£¬ËûÃÇÉÆÓÚʹÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄÎó²îºÍÍøÂç´¹ÂÚ¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾ÊÚȨµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍÇå¾²ÒªÁìÀ´ÑÚÊÎÆä»î¶¯¡£¡£¡£¡£
https://therecord.media/marijuana-dispensary-warns-of-data-breach
3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬2.3GBÊý¾Ý±»µÁй¶
1ÔÂ10ÈÕ£¬£¬£¬£¬£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬£¬£¬£¬£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬²¿·ÖÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£¡£¡£¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬£¬£¬£¬£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬£¬£¬£¬£¬ÓªÒµÆÕ±é12¸ö¹ú¼Ò£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¡£¡£¡£¹¥»÷ÕßʹÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñЧÀÍÆ÷£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÓÃÓÚ±¨¸æÏ¢Õù¾öÄÚ²¿ÎÊÌâ¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬£¬£¬£¬£¬ËäȻһЩÊý¾Ý±»±ê¼ÇΪ¿Í»§£¬£¬£¬£¬£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£¡£¡£¡£Telef¨®nicaÒѽÓÄÉÐëÒª²½·¥×èÖ¹ÈκÎδ¾ÊÚȨµÄϵͳ»á¼û£¬£¬£¬£¬£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖ£¬£¬£¬£¬£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬£¬£¬£¬£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷
1ÔÂ11ÈÕ£¬£¬£¬£¬£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ¼äÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ä¿µÄÊÇÈÏÕæÖÎÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆÍ¼ºÍµØ¼®¾Ö(UGKK)¡£¡£¡£¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬£¬£¬£¬£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬£¬£¬£¬£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£¡£¡£¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬£¬£¬£¬£¬²¢°ü¹ÜËùÓÐȨÊý¾ÝûÓиü¸Ä»òÚ²ÆÐÔת¼µÄΣº¦£¬£¬£¬£¬£¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£¡£¡£¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ±¬·¢ÁËÆÕ±éÓ°Ï죬£¬£¬£¬£¬·¿µØ²úºÍµäÖÊ´û¿îÊг¡ÏÝÈë̱»¾£¬£¬£¬£¬£¬Ïà¹Ø¹«¹²Ð§ÀÍÒ²ÎÞ·¨»ñµÃ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÖ÷ÒªÊ±ÊÆÕýÔڼӾ磬£¬£¬£¬£¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÏêϸȪԴÉÐδȷ¶¨£¬£¬£¬£¬£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£¡£¡£¡£
https://therecord.media/slovakia-registry-cyberattack-land-agriculture
5. ProtonÈ«ÇòЧÀÍÖÐÖ¹£ºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö
1ÔÂ10ÈÕ£¬£¬£¬£¬£¬Òþ˽±£»£»£»£»£»¤Ð§ÀÍÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò¹æÄ£µÄ´ó¹æÄ£Ð§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÕýÔÚ¾ÙÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£¡£¡£¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬£¬£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨ÅþÁ¬µ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈЧÀÍ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÅþÁ¬Ê±»áÊÕµ½¹ýʧÐÂÎÅ£¬£¬£¬£¬£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¡£¡£¡£¾ÓÉԼĪÁ½Ð¡Ê±µÄÆð¾¢£¬£¬£¬£¬£¬ËùÓÐЧÀÍÂ½Ðø»Ö¸´Õý³££¬£¬£¬£¬£¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄЧÀÍ¡£¡£¡£¡£ProtonÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºó͸¶£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢Ã÷µÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¡£¡£¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿âЧÀÍÆ÷µÄÐÂÅþÁ¬ÊýÄ¿£¬£¬£¬£¬£¬µ¼ÖÂÔÚÅþÁ¬Óû§ÊýÄ¿¼±¾çÔöÌíʱ·ºÆð¸ºÔØ·åÖµ£¬£¬£¬£¬£¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¡£¡£¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌØÊâÈÝÁ¿À´´¦Öóͷ£ÐÂÅþÁ¬£¬£¬£¬£¬£¬µ«ÏòKubernetesµÄǨáãÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬£¬£¬£¬£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÔÚ»Ö¸´Àú³ÌÖУ¬£¬£¬£¬£¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔЧÀͲ»¿ÉÓõÄÇéÐΡ£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/
6. ÍøÂç·¸·¨·Ö×ÓÓÕÆÓû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵÑé´¹ÂÚ¹¥»÷
1ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬£¬£¬£¬£¬Í¨¹ýÓÕÆÓû§²Ù×÷£¬£¬£¬£¬£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹ÂÚ±£»£»£»£»£»¤¹¦Ð§¡£¡£¡£¡£Ëæ×ÅÒÆ¶¯×°±¸ÔÚÒ»Ñùƽ³£ÉúÑÄÖÐµÄÆÕ±éÓ¦Ó㬣¬£¬£¬£¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷µÄÖØµãÄ¿µÄ¡£¡£¡£¡£Îª±£»£»£»£»£»¤Óû§£¬£¬£¬£¬£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Æ»¹ûÖ¸³ö£¬£¬£¬£¬£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁÐ±í£¬£¬£¬£¬£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓᣡ£¡£¡£BleepingComputerÊӲ쵽£¬£¬£¬£¬£¬½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬£¬¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷ÊýÄ¿ÏÔÖøÔöÌí£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£¡£¡£¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶õ辶ͨÐзѵÈÓÕ¶ü£¬£¬£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£¡£¡£¡£ÕâÖÖÕ½ÂÔʹÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬£¬£¬£¬£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿µÄ¡£¡£¡£¡£×ÝȻδµã»÷Á´½Ó£¬£¬£¬£¬£¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬£¬£¬£¬£¬Ê¹ÆäÃæÁÙ¸ü´óΣº¦¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÃæÁÙÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬£¬£¬£¬£¬Óû§Ó¦¼á³ÖСÐÄ£¬£¬£¬£¬£¬Ö±½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬¶ø·ÇÈÝÒ׻ظ´¡£¡£¡£¡£ÌØÊâÊÇÍíÄêÓû§£¬£¬£¬£¬£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹ÂÚÐÅÏ¢µÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬ÐèÉóÉ÷¿´´ý£¬£¬£¬£¬£¬ÒÔÃâй¶СÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/