µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÅäÖôíÎóй¶280ÍòÌõ¼Ç¼

Ðû²¼Ê±¼ä 2023-06-01

1¡¢µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÅäÖôíÎóй¶280ÍòÌõ¼Ç¼


¾ÝýÌå5ÔÂ30ÈÕ±¨µÀ  £¬Ñо¿ÈËÔ±·¢ÏÖÁ˵ç×ÓÉÌÎñ¹«Ë¾SimpleTireµÄÒ»¸ö²»ÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â ¡£¸ÃÊý¾Ý¿â°üÂÞ2808697Ìõ¼Ç¼  £¬×ܼÆ1 TB ¡£ÆäÖÐÓÐ1189151·ÝPDF¸ñʽµÄ¶©µ¥È·ÈÏÎļþ  £¬Éæ¼°ÐÕÃû¡¢µç»°¡¢µØÖ·ºÍÐÅÓÿ¨ºÅµÈPIIÐÅÏ¢ ¡£ÔÚ¸ÃÊý¾Ý¿â±»·¢ÏÖµÄ3ÖܶàµÄʱ¼äÀï  £¬ËüÈÔÈ»¿É±»¹ûÈ»·ÃÎÊ ¡£Ä¿Ç°  £¬Êý¾Ýй¶Ê¼þ¼òÖ±ÇÐʱ¼ä  £¬ÒÔ¼°ÊÇ·ñÓй¥»÷Õß·ÃÎʹýËüÈÔȻδ֪ ¡£


https://www.hackread.com/simpletire-database-leak-records-exposed/


2¡¢Ñо¿ÈËÔ±ÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËÆºóÃŵÄÐÐΪӰÏìÔ¼700Íǫ̀É豸


¾Ý5ÔÂ31ÈÕ±¨µÀ  £¬¹Ì¼þÄþ¾²¹«Ë¾EclypsiumÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËÆºóÃŵÄÐÐΪ ¡£Ñо¿ÈËÔ±ÔÚ4ÔÂÊ״μì²âµ½¸ÃÒì³£Çé¿ö  £¬½ñºó  £¬¼¼¼Î¹«Ë¾½â¾öÁËÕâ¸öÎÊÌâ ¡£¼¼¼ÎϵͳÖеĹ̼þ»áÔÚϵͳÆô¶¯¹ý³ÌÖа²×°²¢Ö´ÐÐWindowsÔ­Éú¿ÉÖ´ÐÐÎļþ ¡£¸Ã¿ÉÖ´ÐÐÎļþÓÃÓÚ²»Äþ¾²µØÏÂÔØºÍÖ´ÐÐÌØ±ðµÄpayload  £¬ÕâÓëÆäËüÀàËÆOEMºóÃÅ£¨ÈçComputraceºóÃŵȣ©µÄÐÐΪÏàͬ ¡£Ñо¿ÈËÔ±³Æ  £¬¸ÃÈí¼þËÆºõÊÇ×÷Ϊһ¸öºÏ·¨µÄ¸üÐÂÓ¦Ó÷¨Ê½  £¬¸ÃÎÊÌâ¿ÉÄÜ»áÓ°ÏìԼĪ364¸ö¼¼¼Îϵͳ  £¬´óÂÔÔ¤¼ÆÉæ¼°700Íǫ̀É豸 ¡£


https://securityaffairs.com/146892/hacking/backdoor-like-behavior-gigabyte-systems.html


3¡¢Î¢ÈíÅû¶macOSÖпÉÈÆ¹ýSIP rootÏÞÖÆµÄMigraine©¶´


5ÔÂ30ÈÕ  £¬Î¢ÈíÅû¶ÁËеÄmacOS©¶´Migraine£¨CVE-2023-32369£©µÄÏêϸÐÅÏ¢ ¡£ÀûÓøÃ©¶´  £¬ÓµÓÐrootȨÏ޵Ĺ¥»÷Õß¿Éͨ¹ýÀÄÓÃmacOSÇ¨ÒÆÖúÊÖ·¨Ê½À´ÈƹýϵͳÍêÕûÐÔ±£»¤£¨SIP£©  £¬°²×°"²»ÐÐɾ³ý"µÄ¶ñÒâÈí¼þ ¡£ÈƹýSIP±£»¤»¹¿ÉÒÔÍêÈ«ÈÆ¹ý͸Ã÷¡¢Í¬ÒâºÍ¿ØÖÆ(TCC)¼ÆÄ±  £¬¹¥»÷Õß¿ÉÌæ»»TCCÊý¾Ý¿â²¢»ñµÃÄ¿±êÊý¾ÝµÄÎÞÏÞÖÆ·ÃÎÊȨÏÞ ¡£¸Ã©¶´ÒÑÔÚ5ÔÂ18ÈÕÐû²¼µÄÄþ¾²¸üÐÂÖÐÐÞ¸´ ¡£


https://www.microsoft.com/en-us/security/blog/2023/05/30/new-macos-vulnerability-migraine-could-bypass-system-integrity-protection/


4¡¢Anonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾ÀÕË÷300ÍòÃÀÔª


ýÌå5ÔÂ30ÈÕ³Æ  £¬ºÚ¿ÍÍÅ»ïAnonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾(SAS)Ìá³öÁË300ÍòÃÀÔªµÄÊê½ðÒªÇó  £¬ÒÔÍ£Ö¹×Ô2ÔÂÒÔÀ´¶Ô¸Ãº½¿Õ¹«Ë¾ÍøÕ¾µÄDDoS¹¥»÷ ¡£Anonymous Sudan³ÆSAS¼°Æä·þÎñÒÑå´»úÁè¼ÝÎåÌì ¡£¸ÃÍŻﲻͣÌá¸ßËûÃǵÄÊê½ð  £¬´Ó×î³õµÄ3500ÃÀÔªÌá¸ßµ½¾ªÈ˵Ä300ÍòÃÀÔª ¡£SASÒѶÔFacebookÉϵÄÓû§Í¶Ëß×ö³ö»ØÓ¦  £¬ÈÏ¿ÉÆäÍøÕ¾´æÔÚÎÊÌâ  £¬²¢Ïò¿Í»§±£Ö¤ËûÃÇÕýÔÚŬÁ¦½â¾öÎÊÌâ ¡£


https://therecord.media/hacker-group-anonymous-sudan-demands-three-million-from-sas


5¡¢´øÓжñÒâÄ£¿éSpinOkµÄAndroidÓ¦ÓÃÒѱ»°²×°Áè¼Ý4ÒÚ´Î


Dr. WebÔÚ5ÔÂ29ÈÕ³ÆÆä·¢ÏÖÁ˶à¸ö°üÂÞSpinOkÄ£¿éµÄAndroidÓ¦Óà  £¬Òѱ»°²×°Áè¼Ý421000000´Î ¡£´ËÄ£¿é×÷ΪӪÏúSDK·Ö·¢  £¬Í¨¹ýСÓÎÏ·¡¢ÈÎÎñϵͳÒÔ¼°³é½±À´Î¬³ÖÓû§µÄÐËȤ ¡£Ëü¿ÉÒÔÇÔÈ¡´æ´¢ÔÚÓû§Éè±¹ØÁ¬Ä˽ÈËÊý¾Ý²¢½«Æä·¢Ë͵½Ô¶³Ì·þÎñÆ÷ ¡£ÔÚºǫ́  £¬Ä¾ÂíSDK»á¼ì²éAndroidÉ豸µÄ´«¸ÐÆ÷Êý¾Ý  £¬ÒÔÈ·ÈÏËüÊÇ·ñÔÚɳºÐÖÐÔËÐÐ ¡£Dr. WebÌåÏÖÔÚGoogle PlayÖеÄ101¸öÓ¦Ó÷¨Ê½Öз¢ÏÖÁ˸ÃSDK  £¬ÀÛ¼ÆÏÂÔØ421290300´Î  £¬ÆäÖаüÂÞNoizz£¨1ÒڴΣ©¡¢Zapya£¨1ÒڴΣ©ºÍVFly£¨5ǧÍò´Î£©µÈ ¡£Ä¿Ç°  £¬´ó²¿ÃÅÓ¦ÓÃÒѱ»É¾³ý ¡£


https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/


6¡¢Trend MicroÐû²¼¹ØÓÚRomCom½üÆÚ»î¶¯µÄ·ÖÎö³ÂËß


5ÔÂ30ÈÕ  £¬Trend MicroÐû²¼Á˹ØÓÚRomCom½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß ¡£¹¥»÷ÕßÔÚ2022Äê12ÔÂÖÁ2023Äê4ÔÂð³äºÏ·¨Èí¼þµÄÍøÕ¾  £¬ÈçGimp¡¢Go To MeetingºÍChatGPTµÈ ¡£ÕâЩαÔìµÄÍøÕ¾·Ö·¢µÄMSI°²×°·¨Ê½±»Ö²ÈëÁËÒ»¸ö¶ñÒâµÄDLLÎļþ£¨"InstallA.dll"£©  £¬¸ÃÎļþ½«ÁíÍâÈý¸öDLLÌáÈ¡µ½Ä¿±êµÄ%PUBLIC%\LibrariesÎļþ¼ÐÖÐ ¡£¶Ô×îа汾RomCom payloadµÄ·ÖÎö±íÃ÷  £¬¿ª·¢ÕßÔÚŬÁ¦ÊµÊ©¸ü¶à¶ñÒâÃüÁî  £¬ÆäÃüÁîÊýÁ¿´Ó20ÌõÔö¼Óµ½42Ìõ ¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃVMProtectÈí¼þ½øÐдúÂë±£»¤ºÍ·´VM¹¦Ð§ ¡£


https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html