Apple´¹Î£¸üн¨¸´Òѱ»ÀûÓõķì϶CVE-2023-37450

°ä²¼¹¦·ò 2023-07-11

1¡¢Apple´¹Î£¸üн¨¸´Òѱ»ÀûÓõķì϶CVE-2023-37450


¾ÝýÌå7ÔÂ10ÈÕ±¨Â·   £¬Apple°ä²¼ÁËÐÂÒ»ÂÖ¼±¾ç°²È«ÏìÓ¦(RSR)¸üР  £¬ÒÔ½¨¸´ÔÚ¹¥»÷Öб»ÀûÓõķì϶£¨CVE-2023-37450£© ¡£¸Ã·ì϶ÊÇÔÚWebKitä¯ÀÀÆ÷ÒýÇæÖз¢ÏÖµÄ   £¬Ó°ÏìÁËmacOS¡¢iOSºÍiPadOS ¡£¹¥»÷Õß¿Éͨ¹ýÓÕÆ­Ö¸±ê´ò¿ªÔ̺¬¶ñÒâÔì×÷ÄÚÈݵÄÍøÒ³   £¬ÔÚÖ¸±êÉ豸ÉÏÖ´ÐÐËÁÒâ´úÂë ¡£Apple°µÊ¾ÒÑͨ¹ý¸Ä½ø²é³­À´½¨¸´¸Ã·ì϶   £¬½¨ÒéËùÓÐЧ»§ÀûÓøò¹¶¡ ¡£ÕâÊÇ×Ô2023ËêÊ×ÒÔÀ´   £¬Apple½¨¸´µÄµÚÊ®¸öÁãÈÕ·ì϶ ¡£ 


https://www.bleepingcomputer.com/news/apple/apple-releases-emergency-update-to-fix-zero-day-exploited-in-attacks/


2¡¢ÃÀ¹ú·­Òë·þÎñKings of Translationй¶ÊýÍò±Ê¼Í¼


¾Ý7ÔÂ7ÈÕ±¨Â·   £¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸ö²»ÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â   £¬ÆäÖÐÔ̺¬³¬¹ý25000±Ê¼Í¼ ¡£Í¨¹ýÆäÖеIJο¼×ÊÁϺͷ¢Æ±   £¬×êÑÐÈËԱȷ¶¨¸ÃÊý¾Ý¿âÊôÓÚŦԼ·­Òë·þÎñÌṩÉÌKings of Translation ¡£Ð¹Â¶Êý¾ÝÔ̺¬Ô´´úÂë½ØÍ¼ºÍ¿Í»§ÉÏ´«µÄÎĵµ   £¬ÀýÈç˰ÎñÉ걨¡¢»¤ÕÕ¡¢¼ÝÊ»ÅÆÕÕ¡¢µ®ÉúºÍ»éÒö¼Í¼¡¢Ã³Ò×ÎļþºÍǩ֤ÉêÇëµÈ ¡£Ä¿Ç°   £¬¸ÃÊý¾Ý¿âÒѱ»±£»¤ÆðÀ´   £¬Éв»Ã÷ÏÔÔÚ´Ë֮ǰÒѶ³öÁ˶à¾Ã ¡£


https://www.hackread.com/global-translation-service-exposed-records/


3¡¢ºÚ¿ÍÐû³ÆÒÑÇÔÈ¡RazerµÄÔ´ÂëºÍÃÜÔ¿µÈÊý¾Ý²¢ÔÚ°µÍøÏúÊÛ


ýÌå7ÔÂ8ÈÕ³Æ   £¬ºÚ¿ÍÔÚ°µÍøÒÔ10ÍòÃÀÔªµÄ¼ÛÖµÏúÊÛRazerµÄÊý¾Ý ¡£¹¥»÷ÕßÔÚÌû×ÓÖÐÌáµ½   £¬ËûÇÔÈ¡ÁËrazer.com¼°Æä²úÆ·µÄÔ´´úÂë¡¢¼ÓÃÜÃÜÔ¿¡¢Êý¾Ý¿âºÍºó¶Ë½Ó¼ûµÇ¼µÈÐÅÏ¢   £¬²¢°µÊ¾¸ÃÊý¾Ý¿âÖ»»áÏúÊÛÒ»´Î ¡£´Ë±í   £¬Âô¼Ò¶ÔÖÅʹÓÃÖÐÑëÈË   £¬Õâͨ³£ÊǶÔÂò¼ÒºÍÂô¼ÒµÄ±£»¤ºÍ±£ÕÏ   £¬¼´Õâ²»ÊÇÒ»¸öȦÌ× ¡£Ö¤Ã÷Ô̺¬³¤´ï580Ò³µÄÎļþÊ÷ÒÔ¼°·ÖÆçĿ¼ÏÂÎļþ¼ÐµÄ½ØÆÁ ¡£RazerÉÐδ¶Ô´ËÊÂ×ö³ö»Ø¸´ ¡£


https://www.databreaches.net/intellectual-property-allegedly-from-razer-appears-for-sale-on-hacking-forum/


4¡¢MOVEit½¨¸´ÓÖÒ»¸öSQL×¢Èë·ì϶CVE-2023-36934


      7ÔÂ7ÈÕ±¨Â·³Æ   £¬ProgressÔÚÆä²úÆ·MOVEit TransferÖÐÓÖ·¢ÏÖÁËÒ»¸öÑϳÁµÄSQL×¢Èë·ì϶£¨CVE-2023-36934£© ¡£ÀûÓô˷ì϶   £¬¹¥»÷Õß¿Éͨ¹ýÏòMOVEit TransferÀûÓÃÌá½»ÌØÔìµÄpayload   £¬À´µ¼ÖÂMOVEitÊý¾Ý¿âÄÚÈݴ۸ĺÍй¶ ¡£°²È«¸üл¹½¨¸´ÁËSQL×¢Èë·ì϶£¨CVE-2023-36932£©ºÍ¿Éµ¼Ö·¨Ê½Òâ±íÖÕÖ¹µÄ·ì϶£¨CVE-2023-36933£© ¡£´Ë±í   £¬ProgressÒѾö¶¨ÍƳöÿÔ°䲼µÄ¶¨ÆÚ°²È«¸üР  £¬³ÆÎª"Service Packs" ¡£ÕâÄܹ»¼ò»¯Èí¼þÉý¼¶¹ý³Ì   £¬Ê¹ÖÎÀíÔ±¿ÉÄܸü¿ì¸üÇáËɵØÀûÓý¨¸´·¨Ê½ ¡£


https://securityaffairs.com/148252/security/moveit-transfer-critical-flaw.html


5¡¢×êÑÐÈËÔ±Åû¶Õë¶Ôº«¹úµÄÓïÒô´¹µö¹¤¾ß¼¯Letscall


ThreatFabricÔÚ7ÔÂ7ÈÕÅû¶ÁËȫеÄÓïÒô´¹µö¹¤¾ß¼¯Letscall ¡£Õâ´Î¹¥»÷»î¶¯ÖØÒªÕë¶Ôº«¹úµÄÓû§   £¬Ñ¡È¡¶à½×¶Î¹¥»÷À´ÓÕʹָ±ê´Ó¼ÙÒâGoogle PlayÉ̵êµÄ´¹µöÍøÕ¾ÏÂÔØ¶ñÒâÀûÓà ¡£Ò»µ©×°ÖÃÁ˶ñÒâÈí¼þ   £¬Ëü¾Í»á½«À´µç³Á¶¨Ïòµ½¹¥»÷Õߵĺô½ÐÖÐÐÄ ¡£¾­¹ýѵÁ·µÄÔËÓªÈËÔ±»á¼ÙÒâÒøÐÐÔ±¹¤   £¬¶øºó´ÓºÁÎÞ½äÐĵÄÖ¸±êÄÇÀï»ñÈ¡Ãô¸ÐÐÅÏ¢ ¡£ÎªÁË·½±ãÓïÒôÁ÷Á¿µÄ·ÓÉ   £¬LetscallÀûÓÃÁËVOIPºÍWebRTCµÈ¼¼Êõ   £¬»¹ÀûÓÃÁËSTUNºÍTURNºÍ̸ ¡£


https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset


6¡¢ESET¼òÊöEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷»î¶¯

      

7ÔÂ6ÈÕ   £¬ESET¼òÊöÁËEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷»î¶¯ ¡£2021Äê1Ô   £¬ÔÚ¶à¸ö¹ú¶È·¨Âɲ¿ÃŵÄЭµ÷ϳɹ¦µ·»ÙÁËEmotet   £¬µ«ºóÕßÔÚ2021Äê11ÔÂÔٴλعé ¡£2022ËêÊ×   £¬EmotetÖ´ÐÐÁ˶à¸öÀ¬»øÓʼþ»î¶¯ ¡£2022Äê7Ô   £¬Î¢ÓĽûÓÃVBAºêµ¼ÖÂEmotet»î¶¯ÏÔ׎µÂä ¡£2023Äê   £¬Emotet·¢Õ¹ÁËÈý´Î¹¥»÷»î¶¯   £¬Ê¹ÓÃÁËǶÈë¶ñÒâVBAºêµÄWordÎļþºÍǶÈëVBScriptµÄOneNoteÎļþµÈ ¡£ÕâЩ¹¥»÷´ó¶àÕë¶ÔÈÕ±¾(43%)ºÍÒâ´óÀû(13%) ¡£×êÑÐÈËÔ±³Æ   £¬Ä¿Ç°Emotet²»»îÔ¾   £¬ºÜ¿ÉÄÜÊÇÓÉÓÚδÄÜÕÒµ½ÓÐЧµÄй¥»÷ÔØÌå ¡£


https://www.welivesecurity.com/2023/07/06/whats-up-with-emotet/