Twitter³ÆÆä²¿ÃÅÔ´´úÂëй¶ÆäÒÑÒªÇóGitHubɾ³ý

°ä²¼¹¦·ò 2023-03-29

1¡¢Twitter³ÆÆä²¿ÃÅÔ´´úÂëй¶ÆäÒÑÒªÇóGitHubɾ³ý 


¾ÝýÌå3ÔÂ27ÈÕ±¨Â·£¬ÔÚGitHubɾ³ý֮ǰ£¬TwitterµÄÔ´´úÂë¿ÉÄÜÒѾ­¹«¿ªÁËÊýÔ¡£Æ¾¾ÝDMCA֪ͨ£¬ÕâЩÊý¾ÝÊÇÓÉGitHubÓû§FreeSpeechEnthusiast°ä²¼µÄ£¬Õâ¸öÃû×Ö°µÊ¾ËûÊÇÒ»¸ö¶ÔTwitter²»ÂúµÄÔ±¹¤¡£Twitter´Ë¿ÌÕýÊÔͼʹÓô«Æ±ÒªÇóGitHubÌṩÓйظÃÓû§ÒÔ¼°½Ó¼ûºÍ´«²¼TwitterÔ´´úÂëµÄÈ˵ÄÉí·ÝÐÅÏ¢£¬ÕâЩÐÅÏ¢½«ÓÃÓÚ½øÒ»²½µÄ˾·¨Ðж¯¡£Ä¿Ç°Éв»Ã÷ÏÔÓм¸¶àÈ˽Ӽû»òÏÂÔØÁËTwitterµÄÔ´´úÂë¡£


https://www.bleepingcomputer.com/news/security/twitter-takes-down-source-code-leaked-online-hunts-for-downloaders/


2¡¢×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÖÇÄÜÊÖ»úºÍÒôÏìµÈÉ豸µÄNUIT¹¥»÷


ýÌå3ÔÂ25Èճƣ¬×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖÃûΪ¡°½ü³¬ÉùÎÞÉùÌØÂåÒÁľÂí¡±(NUIT)µÄÐÂÐ͹¥»÷£¬Äܹ»¶ÔÖÇÄÜÊÖ»ú¡¢ÖÇÄÜÑïÉùÆ÷ºÍÆäËüÓÉÓïÒô¸±ÊÖÇý¶¯µÄÎïÁªÍøµÈÉ豸ִÐÐÎÞÉù¹¥»÷¡£ÆäÖØÒªµÀÀíÊÇ£¬ÖÇÄÜÉ豸ÖеÄÂó¿Ë·çÄܹ»¶ÔÈ˶úÎÞ·¨Ìýµ½µÄ½ü³¬Éù²¨×ö³ö·´Ó³£¬´Ó¶øÔÚʹÓô«Í³ÑïÉùÆ÷¼¼ÊõµÄÇé¿öÏ£¬ÒÔ×îÓ׵ķçÏÕÖ´Ðй¥»÷¡£NUIT¹¥»÷Äܹ»Ê¹ÓÃÁ½ÖÖ·ÖÆçµÄ²½Öè½øÐУºNUIT-1£¬É豸¼ÈÊǹ¥»÷Ô´ÓÖÊǹ¥»÷Ö¸±ê£»NUIT-2£¬Í¨¹ýÒ»¸öÓÐÑïÉùÆ÷µÄÉ豸¹¥»÷ÁíÒ»¸öÓÐÂó¿Ë·çµÄÉ豸¡£


https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/


3¡¢Apple½¨¸´ÔçÆÚµÄiPhoneºÍiPadÖÐÒѱ»ÀûÓõÄWebKit·ì϶


¾Ý3ÔÂ27ÈÕ±¨Â·£¬Apple°ä²¼°²È«¸üУ¬½¨¸´ÁËÔçÆÚµÄiPhoneºÍiPadÖÐÒѱ»ÀûÓõķì϶¡£ÕâÊÇÒ»¸öWebKitÀàÐÍ»ìºÏ·ì϶(CVE-2023-23529)£¬¸Ã¹«Ë¾ÓÚ2ÔÂ13ÈÕÔÚ½ÏеÄiPhoneºÍiPadÉ豸ÉϽ¨¸´Á˸ÃÎÊÌâ¡£AppleÕâ´Î¸üн¨¸´ÁËiOS 15.7.4ºÍiPadOS 15.7.4Öеķì϶¡£¹¥»÷ÕßÄܹ»ÓÕʹָ±ê½Ó¼û¶ñÒâÍøÒ³£¬À´´¥·¢·ì϶²¢µ¼Ö²Ù×÷ϵͳ±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£½ñÄê1Ô£¬Apple»¹ÏòÔçÆÚµÄiPhoneºÍiPad·´Ïò¸üÐÂÁË·ì϶CVE-2022-42856µÄ²¹¶¡¡£


https://securityaffairs.com/144114/hacking/cve-2023-23529-apple-zero-day.html


4¡¢AT&TÅû¶ÐÅÏ¢ÇÔÈ¡·¨Ê½BlackGuardбäÌåµÄ¼¼Êõϸ½Ú


AT&TÔÚ3ÔÂ23ÈÕ³ÆÆä·¢ÏÖÁ˶ñÒâÈí¼þBlackGuardµÄбäÌ壬ӵÓкöàÐÂÖ°ÄÜ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÓã²æÊ½´¹µö»î¶¯½øÐзַ¢£¬Ö¼ÔÚ´Ó¸÷ÀàÀûÓ÷¨Ê½ºÍä¯ÀÀÆ÷ÖÐÇÔÈ¡Óû§ÐÅÏ¢¡£ÆäÐÂÖ°ÄÜÔ̺¬£¬¿Éͨ¹ýUÅÌºÍÆäËü¿ÉÒÆ¶¯É豸´«²¼²¢×Ô¶¯Ï°È¾ÐÂÖ÷»ú£¬¿ÉÄÜ´ÓC2·þÎñÆ÷ÏÂÔØ¶î±íµÄpayload£¬Ôö³¤µ½"Run"×¢²á±íÏîÏÂÀ´»ñµÃÓÆ¾ÃÐÔ£¬½«¶ñÒâÈí¼þÎļþ¸´Ôìµ½C:\ÖеÄÿ¸öÎļþ¼Ð²¢ÎªÃ¿¸öÎļþ¸±±¾Ëæ»ú¶¨Ãû¡£³ýÁËÕâЩְÄÜÖ®±í£¬BlackGuardÏÖÕë¶Ô57¸ö¼ÓÃÜÇ®±Òä¯ÀÀÆ÷À©´óºÍÇ®°ü£¬ÊÔͼÇÔÈ¡Êý¾Ý²¢ºÄ¾¡×ʲú¡£


https://cybersecurity.att.com/blogs/labs-research/blackguard-stealer-extends-its-capabilities-in-new-variant


5¡¢Trend Micro°ä²¼Earth Preta×îÐÂÈÆ¹ýÕ½ÊõµÄ·ÖÎö»ã±¨


Trend MicroÓÚ3ÔÂ23ÈÕ°ä²¼Á˹ØÓÚEarth Preta×îÐÂÈÆ¹ýÕ½ÊõµÄ·ÖÎö»ã±¨¡£¹¥»÷ʼÓÚÓã²æÊ½´¹µöÓʼþÒÔ¼°Google DriveÁ´½Ó£¬´Ó2022Äê10ÔºÍ11ÔÂÆðÍ·£¬¹¥»÷Õ߸ü¸ÄÆäTTPÒÔ·Ö·¢¶ñÒâÈí¼þTONEINS¡¢TONESHELLºÍPUBLOAD¡£×êÑÐÈËÔ±»¹·¢ÏÖÁ˼¸¸öÓÃÓÚÔÚWindows 10ÖÐÈÆ¹ýUACµÄ¹¤¾ß£¬Ô̺¬HackTool.Win32.ABPASS¡¢HackTool.Win32.CCPASSºÍSilentCleanup¡£Earth PretaÔÚC&C½×¶ÎʹÓÃÁ˶àÖÖ¹¤¾ßºÍºÅÁÀýÈ磬ʹÓÃcertutil.exe´Ó·þÎñÆ÷ÏÂÔØºÏ·¨µÄWinRAR¶þ½øÔìÎļþ¡£


https://www.trendmicro.com/en_us/research/23/c/earth-preta-updated-stealthy-strategies.html


6¡¢Trellix°ä²¼¹ØÓÚÐÂÀÕË÷ÍÅ»ïDark PowerµÄ·ÖÎö»ã±¨


3ÔÂ23ÈÕ£¬°ä²¼Á˹ØÓÚÐÂÀÕË÷ÍÅ»ïDark PowerµÄ·ÖÎö»ã±¨¡£Dark PowerµÄpayloadÊÇÓÃNim¿ª·¢µÄ£¬±àÒëÈÕÆÚÊÇ2023Äê1ÔÂ29ÈÕ£¬¼´¹¥»÷ÆðÍ·µÄ¹¦·ò¡£ÓÐȤµÄÊÇ£¬¸ÃÀÕË÷Èí¼þÓÐÁ½¸ö°æ±¾ÔÚÒ°±í´«²¼£¬Ã¿¸ö°æ±¾¶¼ÓÐ·ÖÆçµÄ¼ÓÃÜÃÜÔ¿¹æ»®¡£Êê½ð¼Í¼×îºóÒ»´ÎÅú¸ÄÊÇÔÚ2ÔÂ9ÈÕ£¬Ëü¸øÖ¸±ê72Ó×ʱµÄ¹¦·ò½«10000ÃÀÔªµÄXMR£¨ÃÅÂÞ±Ò£©·¢Ë͵½Ö¸¶¨µÄÇ®°üµØÖ·£¬ÒÔ»ñµÃ½âÃÜÆ÷¡£Trellix°µÊ¾£¬ÒѾ­¿´µ½À´×ÔÃÀ¹ú¡¢·¨¹ú¡¢ÒÔÉ«ÁÓ×¢ÍÁ¶úÆä¡¢½Ý¿Ë¹²ºÍ¹ú¡¢°¢¶û¼°ÀûÑÇ¡¢°£¼°ºÍÃØÂ³µÄ10¸ö±»¹¥»÷Ö¸±ê¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/shining-light-on-dark-power.html