Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
°ä²¼¹¦·ò 2025-01-131. Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
1ÔÂ9ÈÕ£¬´ÓǰÁ½¸öÔ£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ³öÏÖÁËа汾£¬Ñ¡È¡Apple XProtectµÄ×Ö·û´®¼ÓÃܼ¼ÊõÌӱܼì²â¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´·þÎñ£¬ÍøÂç·¸×ï·Ö×ÓÄܹ»¸¶·Ñ»ñµÃ¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬µ¼ÖÂÏîÄ¿¹Ø¹Ø£¬µ«Ò²ÎªÆäËû¿ª·¢ÈËÔ±ÌṩÁ˸Ľø»úÓö¡£Ð°汾ͨ¹ýÇÖÈÅ×Ö·û´®²¢ÔÚÖ´ÐÐÆÚ¼ä½âÃÜ£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃܼ¼ÊõµÄµÍÒÉ»ó¶È£¬ÌÓ±ÜÁ˳߶Ⱦ²Ì¬¼ì²â²½Öè¡£BansheeÖØÒªÍ¨¹ýºýŪÐÔµÄGitHub´æ´¢¿â´«²¼£¬Õë¶ÔmacOSÓû§£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¸Ã¶ñÒâÈí¼þµÄÖ¸±êÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬ÈçÃÜÂëºÍË«³É·ÖÉí·ÝÑéÖ¤À©´ó£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ¸ù»ùϵͳºÍÍøÂçÐÅÏ¢£¬²¢ÌṩºýŪÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´ÖͰ£¬µ«Ô´´úÂëй¶ºó£¬¶à¸öÍøÂç´¹µö»î¶¯ÈÔÔÚ´«²¼¸Ã¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/
2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬EverestÍŻﱻָΪĻºóºÚÊÖ
1ÔÂ11ÈÕ£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâ·êÁËÒ»´ÎÑϳÁµÄÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢ÀÃ×´ïºÍεÂ˹ÍеêÆÌ²É°ì²úÆ·µÄ¹Ë¿ÍÓ×ÎÒÐÅÏ¢±»·¸·¨»ñÈ¡¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢´ºÇï¡¢µØÖ·µÈÓ×ÎÒ×ÊÁÏ£¬»¹ÓÐÂòÂôº¹ÇàµÈÃô¸ÐÐÅÏ¢¡£STIIIZYÔÚÍøÕ¾Éϰ䲼ÁËÎ¥¹æÍ¨Öª£¬²¢Ïò¼ÓÖݼà¹Ü»ú¹¹Ìá½»ÁËÓйØÎļþ¡£¾ÝϤ£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸×OÍÅÌáÒéµÄ£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕÆÚ¼äͨ¹ýÏúÊ۵㴦Ö÷þÎñ¹©¸øÉ̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£EverestÍøÂç·¸×ïÍÅ»ïÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢Ðû³ÆÇÔÈ¡ÁË422,075ÌõÓ×ÎҼͼ¡£Ö»¹Ü²¿Ãſͻ§»ñµÃÁËÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ£¬µ«·þÎñÆÚÏÞδ¹«¿ª¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÎÅÃû£¬ËûÃÇÉÆÓÚÀûÓÃÈõƾ֤¡¢Î´½¨²¹µÄ·ì϶ºÍÍøÂç´¹µö¹¥»÷µÈ¼¿Á©À´»ñȡδ¾ÊÚȨµÄ½Ó¼ûȨÏÞ£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþ·ºÍ°²È«²½ÖèÀ´¸²¸ÇÆä»î¶¯¡£
https://therecord.media/marijuana-dispensary-warns-of-data-breach
3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬2.3GBÊý¾Ý±»µÁй¶
1ÔÂ10ÈÕ£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬²¿ÃÅÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬ÒµÎñ±é¼°12¸ö¹ú¶È£¬Õ¼Óг¬¹ý104,000ÃûÔ±¹¤¡£¹¥»÷ÕßÀûÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñ·þÎñÆ÷£¬¸Ã·þÎñÆ÷ÓÃÓڻ㱨ºÍ½â¾öÄÚ²¿ÎÊÌâ¡£¾Ý³Æ£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢µ¥¾ÝºÍ¸÷ÀàÊý¾Ý£¬¹ÌȻһЩÊý¾Ý±»ÏóÕ÷Ϊ¿Í»§£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£Telef¨®nicaÒѲÉÈ¡±ØÒª´ëÊ©×èÖ¹ÈκÎδ¾ÊÚȨµÄϵͳ½Ó¼û£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉϳÁÖÃÁËÃÜÂë¡£Õâ´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌáÒéµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬¸ÃÍÅ»ïÔø³É¹¦ÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¹¥»÷Õß°µÊ¾£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£
https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
4. ˹Âå·¥¿ËµØÆ¤µÇ¼Ç´¦Ôâ·êÊ·ÉÏ×î´óÍøÂç¹¥»÷
1ÔÂ11ÈÕ£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ³½Ôâ·êÁ˺¹ÇàÉÏ×î´óµÄÍøÂç¹¥»÷£¬Ö¸±êÊÇÕÆ¹ÜÖÎÀíµØÆ¤ºÍ²Æ¸»Êý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÔìͼºÍµØ¼®¾Ö(UGKK)¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø¹Ø£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø¹Ø£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£Å©Òµ²¿³¤°µÊ¾½«Í¨¹ý±¸·Ý¸´Ôϵͳ£¬²¢±£ÕÏËùÓÐȨÊý¾ÝûÓиü¸Ä»òÚ²ÆÐÔת¼µÄ·çÏÕ£¬µ«¸´Ô¿ÉÄܱØÒªÊýÔ¹¦·ò¡£Õâ´Î¹¥»÷¶ÔÒÀÀµµØÆ¤µÇ¼ÇÊý¾ÝµÄÐÐÒµ²úÉúÁË¿í·ºÓ°Ï죬·¿µØ²úºÍµÖѺ´û¿îÊг¡ÏÝÈë̱»¾£¬Óйع«¹²·þÎñÒ²ÎÞ·¨»ñµÃ¡£Í¬Ê±£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÑÏÖØ´óÊÆÔڼӾ磬˹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõ±í½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹ»áÉÌ´ËÊ¡£Õâ´Î¹¥»÷µÄ¾ßÌåÆðÔ´ÉÐδȷ¶¨£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£
https://therecord.media/slovakia-registry-cyberattack-land-agriculture
5. ProtonÈ«Çò·þÎñÖжϣºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö
1ÔÂ10ÈÕ£¬ÒþÖÔ±£»¤·þÎñÌṩÉÌProtonÖÜËÄÔâ·êÈ«ÇòÁìÓòµÄ´ó¹æÄ£·þÎñÖжϣ¬Õâ´ÎÖжÏÊÇÓÉÓÚÔÚ½øÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿¹¦·òÉÏÎç10µã×óÓÒ£¬µ¼ÖÂÓû§ÎÞ·¨Ïνӵ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈ·þÎñ¡£ÊÜÓ°ÏìµÄÓû§ÔÚ³¢ÊÔÏνÓʱ»áÊÕµ½ÃýÎóÐÂÎÅ£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¾¹ýԼĪÁ½Ó×ʱµÄÖÂÁ¦£¬ËùÓзþÎñÂ½Ðø¸´ÔÕý³££¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó¸´ÔµÄ·þÎñ¡£ProtonÔÚ¶ÔÊÂÎñ½øÐе÷²éºóй©£¬Õâ´ÎÖжÏÊÇÓÉÕ¾µã¿¿µÃסÐÔ¹¤³ÌÍŶӷ¢ÏÖµÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¸Ã¸ü¸ÄÏÞ¶ÈÁËÊý¾Ý¿â·þÎñÆ÷µÄÐÂÏνÓÊýÁ¿£¬µ¼ÖÂÔÚÏνÓÓû§ÊýÁ¿¼±¾çÔö³¤Ê±³öÏÖ¸ºÔØ·åÖµ£¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¹ÌÈ»ProtonÕ¼ÓÐ×ã¹»µÄ¶î±íÈÝÁ¿À´´¦ÖÃÐÂÏνӣ¬µ«ÏòKubernetesµÄǨáã±ØÒªÍ¬Ê±ÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£Òò¶ø£¬ÔÚ¸´Ô¹ý³ÌÖУ¬Óû§Óöµ½ÁË»úÄܽµÂäºÍ¼äЪÐÔ·þÎñ²»³ÉÓõÄÇé¿ö¡£
https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/
6. ÍøÂç·¸×ï·Ö×ÓÓÕÆÓû§³ÁÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓÖ´Ðд¹µö¹¥»÷
1ÔÂ12ÈÕ£¬ÍøÂç·¸×ï·Ö×Ó½üÆÚѡȡÁËÒ»ÖÖм¼ÇÉ£¬Í¨¹ýÓÕÆÓû§²Ù×÷£¬¹Ø¹ØÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹µö±£»¤Ö°ÄÜ¡£Ëæ×ÅÒÆ¶¯É豸ÔÚÈÕ³£ÉúÑÄÖÐµÄ¿í·ºÀûÓã¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹µö¹¥»÷µÄ³ÁµãÖ¸±ê¡£Îª±£»¤Óû§£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£È»¶ø£¬Æ»¹ûÖ¸³ö£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˲ÎÓëÁªÏµÈËÁÐ±í£¬ÕâЩÁ´½Ó¾Í»á±»³ÁÐÂÆôÓá£BleepingComputer¹Û²ìµ½£¬½ü¼¸¸öÔÂÀ´£¬¶ÌÐÅÍøÂç´¹µö¹¥»÷ÊýÁ¿ÏÔÖøÔö³¤£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´³ÁÐÂÆôÓÃÁ´½Ó¡£´ËÀà¶ÌÐÅͨ³£¼Ù×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶Â·Â·Í¨³©·ÑµÅ×Õ¶ü£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£ÕâÖÖÕ½ÊõÀûÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò»Ø¾ø¶ÌÐŵÄÉúÀí£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÖ¸±ê¡£¼´±ãδµã»÷Á´½Ó£¬»Ø¸´ÐÐΪ×ÔÉíÒ²»á¶³öÓû§µÄÒ׸ÐÐÔ£¬Ê¹ÆäÃæ¶Ô¸ü´ó·çÏÕ¡£Òò¶ø£¬Ãæ¶ÔÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬Óû§Ó¦Î¬³Ö¾¯Ì裬ֱ½ÓÁªÏµÓйع«Ë¾»ò×éÖ¯½øÐÐÑéÖ¤£¬¶ø·ÇµÈÏлظ´¡£³ö¸ñÊÇÀÏÄêÓû§£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹µöÐÅÏ¢µÄÖØÒªÖ¸±ê£¬ÐèÉóÉ÷¶Ô´ý£¬ÒÔÃâй¶Ó×ÎÒÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/


¾©¹«Íø°²±¸11010802024551ºÅ