Apple°ä²¼´¹Î£¸üн¨¸´3¸öÒѱ»ÔÚÒ°ÀûÓõķì϶
°ä²¼¹¦·ò 2023-09-221¡¢Apple°ä²¼´¹Î£¸üн¨¸´3¸öÒѱ»ÔÚÒ°ÀûÓõķì϶
¾Ý9ÔÂ21ÈÕ±¨Â·£¬Apple°ä²¼ÁË´¹Î£°²È«¸üУ¬ÒÔ½¨¸´ÔÚÕë¶ÔiPhoneºÍMacµÄ¹¥»÷Öб»ÀûÓõÄ3¸öеķì϶¡£±»ÀûÓ÷ì϶±ðÀëÊÇWebkitÖеÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2023-41993£©£¬¿Éͨ¹ýÓÕÆÖ¸±ê½Ó¼ûÌØÔìµÄWebÄÚÈÝÀ´µ¼ÖÂËÁÒâ´úÂëÖ´ÐУ»°²È«¿ò¼ÜÖеķì϶£¨CVE-2023-41991£©£¬Äܹ»Ê¹ÓöñÒâÀûÓ÷¨Ê½ÈƹýÊðÃûÑéÖ¤£»µÚÈý¸öÊÇÄں˿ò¼ÜÖеķì϶£¨CVE-2023-41992£©£¬±¾µØ¹¥»÷ÕßÄܹ»ÀûÓÃËüÀ´ÌáȨ¡£AppleÔÚ½ñÄêÒѽ¨¸´ÁË16¸öÁãÈÕ·ì϶¡£
https://securityaffairs.com/151174/hacking/apple-zero-days.html
2¡¢T-Mobile¹Ù·½ÀûÓùÊÕÏÄܹ»²é¿´ËûÈËÕÊ»§ºÍÕ˵¥ÐÅÏ¢
¾ÝýÌå9ÔÂ20ÈÕ±¨Â·£¬T-MobileµÄ¿Í»§³Æ£¬ÔڵǼ¸Ã¹«Ë¾µÄ¹Ù·½Òƶ¯ÀûÓúóÄܹ»²é¿´ÆäËûÈ˵ÄÕÊ»§ºÍÕ˵¥ÐÅÏ¢¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢µç»°ºÅÂë¡¢µØÖ·¡¢ÕË»§Óà¶îÒÔ¼°ÐÅÓþ¿¨¾ßÌåÐÅÏ¢£¬ÀýÈçÈÕÆÚºÍ×îºóËÄλÊý×Ö¡£¹ÌÈ»´Ó20ÈÕÆðÍ·ÔÚRedditºÍTwitterÓ¿ÏÖÁË´óÁ¿»ã±¨£¬µ«Ò»Ð©¿Í»§Ðû³ÆÔÚ´ÓǰÁ½ÖÜÄÚÒ»Ïò´æÔÚÕâÖÖÇé¿ö¡£T-Mobile°µÊ¾£¬Õâ´ÎÊÂÎñ²¢·ÇÍøÂç¹¥»÷µ¼Öµģ¬ÆäϵͳҲûÓÐÔâµ½ÈëÇÖ¡£ÕâÊÇÒ»¸öÁÙʱµÄϵͳ¹ÊÕÏ£¬Óë´òËãµÄÒ¹¼ä¼¼Êõ¸üÐÂÓйأ¬½öÉæ¼°²»µ½100Ãû¿Í»§µÄÐÅÏ¢£¬ºÜ¿ì¾ÍµÃµ½Ïàʶ¾ö¡£
https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/
3¡¢Check PointÅû¶Õë¶ÔÀ¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ
9ÔÂ20ÈÕ£¬Check PointÅû¶ÁËÕë¶ÔÀ¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ¡£BBTok×î³õÓÚ2020ÄêÆØ¹â£¬¸´ÔìÁË40¶à¼ÒÄ«Î÷¸çºÍ°ÍÎ÷ÒøÐеĽçÃæ£¬²¢ÓÕÆÖ¸±êÊäÈëÒøÐÐÕË»§µÄ2FAÂë»òÖ§¸¶¿¨ºÅ¡£¹¥»÷»î¶¯ÖØÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸ç£¬Ñ¡È¡¶à²ãµØÀíΧÀ¸À´È·±£Ö¸±êÍÆËã»ú½öÀ´×ÔÕâЩ¹ú¶È¡£Ï°È¾Á´Ê¹ÓÃÁËÒ»ÖÖ¹ÖÒìµÄLOLBins×éºÏ£¬µ¼Ö¼ì²âÂʽϵ͡£¶ñÒâÈí¼þͨ¹ý´¹µöÁ´½Ó·Ö·¢£¬¶ø²»ÊÇ×÷ΪÓʼþµÄ¸½¼þ¡£
https://blog.checkpoint.com/security/check-point-research-exposes-new-versions-of-the-bbtok-banking-malware-which-targets-clients-of-over-40-mexican-and-brazilian-banks/
4¡¢Sonatype¼ì²âµ½14¸öÇÔÈ¡SSHÃÜÔ¿µÈÐÅÏ¢µÄ¶ñÒânpm°ü
SonatypeÓÚ9ÔÂ19ÈÕ³ÆÆäÔÚnpmÈí¼þ°ü×¢²á±í¼ì²âµ½Ò»ÅúеĶñÒâÈí¼þ°ü£¬Ö¼ÔÚÇÔÈ¡KubernetesÅäÖúÍSSHÃÜÔ¿¡£ÕâЩÈí¼þ°üÊÔͼ¼ÙÒâJavaScript¿âºÍ×é¼þ£¬ÀýÈçESLint²å¼þºÍTypeScript SDK¹¤¾ß¡£µ«ÊÇ£¬ÔÚ×°ÖúóËü»áÔËÐлìºÏ´úÂ룬ÒÔ´ÓÖ¸±êÍÆËã»úÇÔÈ¡Ãô¸ÐÎļþ¡£³ýÁËKubernetesÅäÖúÍSSHÃÜÔ¿±í£¬»¹ÇÔÈ¡Óû§Ãû¡¢IPµØÖ·ºÍÖ÷»úÃûµÈÏµÍ³Ö¸ÎÆÐÅÏ¢¡£ÕâЩÈí¼þ°üÓÉ·ÖÆçµÄnpmÕË»§·ÖÅú°ä²¼£¬µ«Ò»ÑùµãÊǶ¼Ê¹ÓÃÁËÓòÃû¡°app.thretest.com¡±¡£
https://blog.sonatype.com/npm-packages-caught-exfiltrating-kubernetes-config-ssh-keys
5¡¢ProofpointÏêÊöÀûÓÃValleyRATºÍSainbox RATµÄ¹¥»÷
9ÔÂ20ÈÕ£¬ProofpointÏêÊöÁËÀûÓÃValleyRATºÍSainbox RAT£¨Gh0stRAT±äÖÖ£©µÄ¹¥»÷»î¶¯¡£×êÑÐÈËÔ±ÔÚ2023ÄêÒѼì²âµ½30¶à¸ö´ËÀà»î¶¯¡£½üÆÚµÄ»î¶¯Ê¹Óýýݵķַ¢²½Ö裬ͨ¹ýExcelºÍPDF¸½¼þ·Ö·¢£¬ÆäÖÐÔ̺¬Á´½Óµ½Ñ¹Ëõ¿ÉÖ´ÐÐÎļþµÄURL¡£SainboxÓÚ2020Äê±»·¢ÏÖ£¬½ñÄê4ÔÂÒÔÀ´ÒѼì²âµ½½ü20Æð´«²¼¸ÃRATµÄ»î¶¯£¬¶øÔÚ´Ë֮ǰ£¬SainboxÒÑÔÚ¶ñÒâÓʼþÁìÓòÙÈÆìÏ¢¹Ä¶àÄê¡£ValleyRATÓÚ2Ô±»Åû¶£¬Í¨¹ýC++¿ª·¢£¬×Ô3ÔÂ21ÈÕÆð¼ì²âµ½6Æð´«²¼ValleyRATµÄ»î¶¯¡£Proofpoint»¹·¢ÏÖÁËÖÁÉÙ3¸ö·Ö·¢Purple FoxµÄ»î¶¯¡£
https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape
6¡¢ÃÀ¹ú°²È«»ú¹¹¹«¿ª¹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄIoCºÍTTP
ÃÀ¹úFBIºÍCISAÓÚ9ÔÂ20ÈÕ°ä²¼Á˹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄ½áºÏÍøÂ簲ȫÕ÷ѯ(CSA)£¬Éæ¼°IoCºÍTTPµÈÐÅÏ¢¡£SnatchÓÚ2018Äê³õ´Î³öÏÖ£¬Ñ¡È¡RaaSģʽ¡£¸ÃÍÅ»ïÖØÒªÕë¶Ô¹Ø¼üµÄ»ù´¡ÉèÊ©ÁìÓò£¬Ô̺¬¹ú·À¹¤Òµ»ùµØ(DIB)¡¢Á¸Ê³ºÍũҵÒÔ¼°ÐÅÏ¢¼¼ÊõÐÐÒµ¡£SnatchʹÓÃ·ÖÆçµÄTTPÀ´¿úËÅ¡¢ºáÏòÒÆ¶¯ÒÔ¼°ËÑË÷Êý¾Ý¡£ËüʹÓÃsc.exeWindowsºÅÁîÐÐÀ´ÅäÖᢲéÎÊ¡¢ÖÕ³¡¡¢Æô¶¯¡¢É¾³ýºÍÔö³¤ÏµÍ³·þÎñ£¬»¹Ê¹ÓÃMetasploitºÍCobalt StrikeµÈ¹¤¾ß¡£¾Ý¹Û²ì£¬ÔÚ²¿ÊðÀÕË÷Èí¼þ֮ǰ£¬Snatch»áÔÚÖ¸±êϵͳÉÏÆÆ·Ñ³¤´ïÈý¸öԵŦ·ò£¬½øÐкáÏòÒÆ¶¯ÒÔ¾¡¿ÉÄÜ´ó¹æÄ£µØ²¿ÊðÀÕË÷Èí¼þ¡£
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a


¾©¹«Íø°²±¸11010802024551ºÅ