×êÑÐÈËÔ±ÑÝʾÈôºÎͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À
°ä²¼¹¦·ò 2022-05-19¾ÝýÌå5ÔÂ17ÈÕ±¨Â·£¬NCC GroupµÄ×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖ½øÐе͹¦ºÄÀ¶ÑÀ(BLE)Öм̹¥»÷ÐµĹ¤¾ß£¬¿ÉÈÆ¹ýÏÖÓб£»¤ÔÚÖ¸±êÉϽøÐÐÉí·ÝÑéÖ¤¡£ÔÚ´ËÀ๥»÷ÖУ¬¹¥»÷ÕßÄܹ»À¹½Ø²¢°Ñ³ÖÁ½·½Ö®¼äµÄͨѶ¡£ÌØË¹ÀModel 3ºÍModel Y¶¼Ê¹ÓÃÁË»ùÓÚBLEµÄϵͳ£¬Òò¶ø¹¥»÷¿ÉÓÃÓÚ½âËøºÍÆô¶¯Æû³µ¡£NCC°µÊ¾£¬¹¥»÷Ö´ÐÐԼνöÐèÊ®ÃëÖÓ¡£¹ÌÈ»ÕâÖÖBLE¹¥»÷µÄ¼¼Êõϸ½ÚÉÐδ°ä²¼£¬µ«×êÑÐÈËÔ±³ÆËûÃÇÒѾÔÚÌØË¹ÀModel 3ÉϲâÊÔÁËÕâÒ»²½Öè¡£
https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/
2¡¢VMware¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶CVE-2022-22972
5ÔÂ18ÈÕ£¬VMware°ä²¼°²È«¸üУ¬½¨¸´ÁËÓ°Ïì¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2022-22972£©¡£²¼¸æÖ¸³ö£¬·ì϶»áÓ°ÏìWorkspace ONE Access¡¢VMware Identity Manager(vIDM)ºÍvRealize Automation£¬ÓµÓÐÍøÂç½Ó¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÄÜ»ñµÃÖÎÀíȨÏÞÇÒ²»±ØÒª½øÐÐÉí·ÝÑéÖ¤¡£Õâ´Î¸üл¹½¨¸´ÁËÁíÒ»¸ö±¾µØÌáȨ·ì϶(CVE-2022-22973)£¬¿ÉÓÃÀ´½«È¨ÏÞÌáÉýΪroot¡£VMware°µÊ¾£¬¼øÓÚ·ì϶µÄÑϳÁÐÔ£¬Ç¿ÁÒ½¨Òéµ±¼´²ÉÈ¡Ðж¯½øÐн¨¸´¡£
https://www.bleepingcomputer.com/news/security/vmware-patches-critical-auth-bypass-flaw-in-multiple-products/
3¡¢×êÑÐÍŶӷ¢ÏÖmacOS¶ñÒâÈí¼þUpdateAgentµÄбäÖÖ
Jamf Threat LabsÔÚ5ÔÂ16ÈÕ°ä²¼µÄ»ã±¨ÖÐÅû¶ÁËmacOS¶ñÒâÈí¼þUpdateAgentбäÖÖµÄϸ½ÚÐÅÏ¢¡£UpdateAgentÓÚ2020Äêµ×³õ´Î±»·¢ÏÖ£¬¶ûºóÒÑÑݱäΪ¶ñÒâÈí¼þdropper£¬¿ÉÈÆ¹ýmacOS Gatekeeper±£»¤¡£Õâ´Î·¢ÏÖµÄбäÌå»ùÓÚSwift£¬¼Ù×°³ÉÃûΪ"PDFCreator"ºÍ"ActiveDirectory"µÄMach-O¶þ½øÔìÎļþ£¬Ö´ÐÐʱÓëÔ¶³Ì·þÎñÆ÷³ÉÁ¢ÏνӲ¢¼ìË÷ÒªÖ´ÐеÄbash¾ç±¾¡£ÔÚ·¢ÏÖʱ£¬ÕâЩ¶þ½øÔìÎļþÔÚVirusTotalÖеļì²âÂÊΪÁã¡£
https://www.jamf.com/blog/updateagent-adapts-again/
4¡¢ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Omnicell³ÆÆäϵͳÔâµ½ÀÕË÷¹¥»÷
¾Ý5ÔÂ17ÈÕ±¨Â·£¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾OmnicellÔâµ½ÁËÀÕË÷¹¥»÷¡£OmnicellÔÚ5ÔÂ9ÈÕÔÚÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄÎļþÖаµÊ¾£¬ÀÕË÷¹¥»÷²úÉúÔÚ5ÔÂ4ÈÕ£¬Æä²¿ÃÅÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì¡£´Ë±í£¬¸ÃÊÂÎñ¿ÉÄܵ¼Ö¸ù«Ë¾µÄóÒ×»úÃÜ»òÆäËü֪ʶ²úȨµÄÃÔʧ£¬ÒÔ¼°¹«Ë¾Ô±¹¤¡¢¿Í»§ºÍ¹©¸øÉ̵ÈÈ˵ÄÓ×ÎÒÐÅϢй¶¡£½ØÖÁ5ÔÂ17ÈÕ£¬OmnicellÈÔδÔÚÆäÍøÕ¾Éϰ䲼ÓйØÎ¥¹æµÄÕýʽ֪ͨ¡£
https://www.infosecurity-magazine.com/news/ransomware-healthcare-omnicell/
5¡¢¶à¹ú°²È«»ú¹¹½áºÏ°ä²¼³£¼ûµÄ¹¥»÷ý½éµÄ°²È«Õ÷ѯ
5ÔÂ17ÈÕ£¬À´×ÔÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢ºÉÀ¼ºÍÓ¢¹úµÄ¶à¸ö»ú¹¹½áºÏ°ä²¼ÁËÒ»·Ý°²È«Õ÷ѯ¡£Õ÷ѯ½ÒʾÁ˹¥»÷Õß×î³£ÀûÓÃ10¸ö³õʼ¹¥»÷ý½é£¬Ô̺¬²»Ç¿ÔìÖ´Ðжà³É·ÖÉí·ÝÑéÖ¤(MFA)¡¢Ã»ÓÐÕýÈ·µÄÀûÓÃȨÏÞ¼°½Ó¼û½ÚÔìÁбíÖеÄÃýÎó¡¢Èí¼þδ¸üС¢Ê¹ÓÃĬÈÏÅäÖûòĬÈÏÓû§ÃûºÍÃÜÂë¡¢Ô¶³Ì·þÎñ²»×ã×ã¹»µÄ½ÚÔìºÍδִÐÐÇ¿ÃÜÂëÕ½ÊõµÈ¡£´Ë±í£¬¸ÃÕ÷ѯ»¹ÌṩÁË»º½â´ëÊ©£¬ÒÔÔ®ÊÖ×éÖ¯¼ÓÇ¿ÆäÍøÂç·ÀÓù¡£
https://www.bleepingcomputer.com/news/security/cybersecurity-agencies-reveal-top-initial-access-attack-vectors/
6¡¢Microsoft°ä²¼Õë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ»ã±¨
5ÔÂ17ÈÕ£¬Microsoft°ä²¼ÁËÕë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ·ÖÎö»ã±¨¡£Ëæ×ÅÕë¶Ô¼ÓÃÜÇ®±ÒµÄ¹¥»÷µÄÏÔÖøÔö³¤£¬Microsoft×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÐÂÍþвÀàÐ͵ijöÏÖ£¬²¢³ÆÆäΪcryware¡£CrywareÊÇÖ±½Ó´Ó·ÇÍйܼÓÃÜÇ®±ÒÇ®°ü£¨Ò²³ÆÎªÈÈÇ®°ü£©ÍøÂçºÍÇÔÈ¡Êý¾ÝµÄÐÅÏ¢ÇÔÈ¡·¨Ê½¡£Ä¿Ç°ÀûÓüÓÃÜÇ®±ÒµÄÍþвÔ̺¬Cryptojackers¡¢ÀÕË÷Èí¼þ¡¢stealersºÍClipBankerľÂí¡£Cryware¿ÉÄÜ»áÔì³ÉÑϳÁµÄ²ÆÕþËðʧ£¬´Ë¿ÌҲûÓÐÖ§³ÖϵͳÄܹ»Ô®ÊÖ×·»Ø±»µÁµÄ¼ÓÃÜÇ®±Ò¡£
https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ