Apple°ä²¼´¹Î£¸üУ¬½¨¸´Á½¸öÒѱ»»ý¼«ÀûÓõķì϶
°ä²¼¹¦·ò 2022-08-18
8ÔÂ17ÈÕ£¬Apple°ä²¼´¹Î£¸üУ¬½¨¸´Á½¸ö¿É±»ÓÃÀ´ÈëÇÖiPhone¡¢iPad»òMacµÄÁãÈÕ·ì϶¡£µÚÒ»¸öÊDzÙ×÷ϵͳÄÚºËÖеÄÔ½½çдÈë·ì϶£¨CVE-2022-32894£©£¬¹¥»÷ÕßÄܹ»ÀûÓô˷ì϶ÒÔÄÚºËȨÏÞÖ´ÐдúÂë¡£µÚ¶þ¸öÊÇWebKitÖеÄÔ½½çдÈë·ì϶£¨CVE-2022-32893£©£¬¿Éͨ¹ý½Ó¼û¶ñÒâÍøÕ¾±»Ô¶³ÌÀûÓÃÀ´Ö´ÐÐËÁÒâ´úÂë¡£Apple°µÊ¾ÕâÁ½¸ö·ì϶ÒÑÔÚÒ°±í±»»ý¼«ÀûÓ㬵«ÊÇûÓа䲼¹ØÓÚÕâЩ¹¥»÷µÄ¾ßÌåÐÅÏ¢¡£
https://www.securityweek.com/apple-patches-new-macos-ios-zero-days
2¡¢CS:GOƤ·ôÂòÂôƽ̨Ôâµ½¹¥»÷Ëðʧ¼ÛÖµ600ÍòÃÀÔªÉÌÆ·
¾ÝýÌå8ÔÂ16Èճƣ¬CS:GO£¨·´¿Ö¾«Ó¢£ºÈ«Çò¹¥ÊÆ£©×î´óµÄƤ·ôÂòÂôƽ̨֮һCS.MONEYÔâµ½¹¥»÷£¬ÔÚËðʧÁ˼ÛÖµÔ¼600ÍòÃÀÔªµÄ20000¼þÎïÆ·ºóÏÂÏß¡£CS.MONEYÕ¼ÓÐ53ÖÖ±øÆ÷µÄ1696ÖÖ¹ÖÒìÆ¤·ô£¬ÖÎÀíµÄ×Ü×ʲú¼ÛֵΪ16500000ÃÀÔª£¬ÔÚ¹¥»÷ÊÂÎñºó×ÅÂäµ½ÁË10500000ÃÀÔª¡£¾ÝϤ£¬¹¥»÷Õßͨ¹ýijÖÖ·½Ê½»ñµÃÁËÓÃÓÚSteamÊÚȨµÄMobile Authenticator(MA)ÎļþµÄ½Ó¼ûȨÏÞ£¬¶øºó½ÚÔìÁË100¸öÔ̺¬¸Ã·þÎñ³ÖÓÐµÄÆ¤·ôµÄbotÕÊ»§£¬²¢½øÐÐÁËԼһǧ±ÊÂòÂô¡£¸Ãƽ̨ÒÑÖжÏÈýÌ죬µ«±»µÁÎïÆ·ÈÔδ±»Õһء£
https://www.bleepingcomputer.com/news/security/cs-go-trading-site-hacked-to-steal-6-million-worth-of-skins/
3¡¢Ó¢¹úË®Îñ¹«Ë¾South Staffordshire WaterÔâµ½Clop¹¥»÷
¾ÝýÌå8ÔÂ16ÈÕ±¨Â·£¬Ó¢¹úË®Îñ¹«Ë¾South Staffordshire Water³ÆÆäÔâµ½¹¥»÷µ¼ÖÂITϵͳÖжϡ£ÕâÊÇÒ»¼ÒÿÌìΪ160ÍòÏû·ÑÕßÌṩ3.3ÒÚÉýÒûÓÃË®µÄ¹«Ë¾£¬Ëüй©´ËÊÂÎñ²¢Î´Ó°ÏìÆä¹©Ë®ÏµÍ³¡£ClopÍÅ»ïÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢°µÊ¾¿ÉÓ°Ï칩ˮµÄÔËÓªºÍ°²È«¡£¸ÃÍŻﻹÐû³ÆÒÑÇÔÈ¡ÁË5TBµÄÊý¾Ý£¬²¢°ä²¼ÁËÒ»·Ý±»µÁÊý¾ÝÑù±¾£¬ÆäÖÐÔ̺¬»¤ÕÕ¡¢Éí·ÝÖ¤ºÍSCADAϵͳµÄ½ØÍ¼¡£
https://securityaffairs.co/wordpress/134450/cyber-crime/south-staffordshire-water-cyberattack.html
4¡¢ClarotyÑÝʾÈôºÎͨ¹ý±øÆ÷»¯µÄPLCÈëÇÖOTµÄÐÂEvil¹¥»÷
¾Ý8ÔÂ16ÈÕ±¨Â·£¬Claroty·¢ÏÖÒ»ÖÖеÄEvil PLC¹¥»÷·½Ê½£¬¿ÉÓ°ÏìÂÞ¿ËΤ¶û×Ô¶¯»¯¡¢Ê©ÄÍµÂµçÆø¡¢Í¨ÓÃµçÆø¡¢±´¼ÓÀ³¡¢Ð½ܡ¢OVARROºÍ°¬Ä¬ÉúµÄ²úÆ·¡£ÕâÖÖ¹¥»÷Äܹ»½«¿É±à³ÌÂß¼½ÚÔìÆ÷(PLC)±øÆ÷»¯£¬ÀûÓù¤³Ì¹¤×÷Õ¾ÈëÇÖOTºÍÆóÒµµÄÍøÂç£¬ÖØÒªÕë¶Ô´Óʹ¤ÒµÍøÂç¡¢PLCÅäÖú͹ÊÕÏÅųýµÄ¹¤³Ìʦ¡£¹¥»÷ÕßÊ×ÏÈÔÚÒ»¸ö¶³öÔÚÍøÉϵÄPLCÖд¥·¢¹ÊÕÏ£¬ÓÕʹ¹¤³Ìʦͨ¹ý¹¤³Ì¹¤×÷Õ¾Èí¼þÏνӵ½±»Ï°È¾PLC¡£µ±¹¤³Ìʦ¼ìË÷PLCÂß¼µÄ¹¤×÷¸±±¾Ê±£¬¹¥»÷ÕßÔÙÀûÓÃÆ½Ì¨Éϵķì϶ִÐжñÒâ´úÂë¡£
https://thehackernews.com/2022/08/new-evil-plc-attack-weaponizes-plcs-to.html
5¡¢ESET·¢ÏÖLazarusÀûÓÃеÄmacOS¶ñÒâÈí¼þµÄ¹¥»÷»î¶¯
ýÌå8ÔÂ16ÈÕ±¨Â·³Æ£¬³¯ÏʺڿÍÍÅ»ïLazarus¿ÉÔÚ×°ÓÐÓ¢ÌØ¶ûºÍM1оƬ×éµÄÆ»¹ûMacÉÏÖ´ÐжñÒâÈí¼þ£¬ESET½«ÆäÓë»î¶¯Operation In(ter)ceptionÁªÏµÆðÀ´¡£¹¥»÷»î¶¯µÄµö¶üÎļþ¹ÌȻʹÓÃ.PDFÀ©´óÃûµ«ÏÖʵÉÏÊÇÒ»¸öMach-O¿ÉÖ´ÐÐÎļþ£¬ÆäÖ°ÄÜÊÇÆô¶¯FinderFontsUpdater£¬½ø¶øÖ´ÐÐsafarifontsagent£¬¸ÃÏÂÔØÆ÷Ö¼ÔÚ´ÓÔ¶³Ì·þÎñÆ÷¼ìË÷ÏÂÒ»½×¶ÎµÄpayload¡£ESET°µÊ¾£¬µö¶üÊÇʹÓÃÁË2022Äê2ÔÂÐû¸æ¸øShankey NohriaµÄÖ¤ÊéÇ©ÊðµÄ£¬AppleÓÚ8ÔÂ12ÈÕ³·ÏúÁ˸ÃÖ¤Êé¡£
https://thehackernews.com/2022/08/north-korea-hackers-spotted-targeting.html
6¡¢×êÑÐÈËÔ±Åû¶RTLSÖпɵ¼ÖÂMitMµÈ¹¥»÷µÄ·ì϶µÄÏêÇé
8ÔÂ15ÈÕ£¬NozomiµÄ×êÑÐÈËÔ±½ÒʾÁ˶à¸öÓ°ÏìUWB£¨³¬¿í´ø£©RTLS£¨ÊµÊ±¶¨Î»ÏµÍ³£©µÄ·ì϶£¬¿É±»ÓÃÀ´Ö´ÐÐÖÐÑëÈ˹¥»÷²¢²Ù¿Ø±êÇ©µØÀíµØÎ»Êý¾Ý¡£RTLS¼¼Êõ¿í·ºÓÃÓÚ¹¤Òµ»·¾³¡¢¹«¹²½»Í¨¡¢Ò½ÁƱ£½¡ºÍÖǻ۳ÇÊÐÀûÓã¬ÖØÒª×÷ÓÃÊÇͨ¹ýʹÓøú×Ù±êÇ©¡¢ÐźŽӹÜêºÍÖÐÑë´¦ÖÃϵͳ½ç˵µØÀíΧÀ¸ÇøÓòÀ´ÐÖú°²È«¡£Nozomi½¨ÒéRTLSϵͳµÄÖÎÀíԱʹÓ÷À»ðǽÀ´Ï޶ȽӼû£¬ÔÚÍøÂçÖвÎÓëÇÖ¼ì²âϵͳ£¬²¢Ê¹Óôøº±¼û¾Ý°üͬ²½¼ÆÊýÆ÷ÖµµÄSSHËí·½øÐÐÊý¾Ý¼ÓÃÜ¡£
https://www.bleepingcomputer.com/news/security/rtls-systems-vulnerable-to-mitm-attacks-location-manipulation/


¾©¹«Íø°²±¸11010802024551ºÅ