µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÅäÖÃÃýÎóй¶280Íò±Ê¼Í¼

°ä²¼¹¦·ò 2023-06-01

1¡¢µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÅäÖÃÃýÎóй¶280Íò±Ê¼Í¼


¾ÝýÌå5ÔÂ30ÈÕ±¨Â· £¬×êÑÐÈËÔ±·¢ÏÖÁ˵ç×ÓÉÌÎñ¹«Ë¾SimpleTireµÄÒ»¸ö²»ÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â ¡£¸ÃÊý¾Ý¿âÔ̺¬2808697±Ê¼Í¼ £¬×ܼÆ1 TB ¡£ÆäÖÐÓÐ1189151·ÝPDFÌåʽµÄ¶©µ¥È·ÈÏÎļþ £¬Éæ¼°ÐÕÃû¡¢µç»°¡¢µØÖ·ºÍÐÅÓþ¿¨ºÅµÈPIIÐÅÏ¢ ¡£ÔÚ¸ÃÊý¾Ý¿â±»·¢ÏÖµÄ3ÖܶàµÄ¹¦·òÀï £¬ËüÒÀÈ»¿É±»¹«¿ª½Ó¼û ¡£Ä¿Ç° £¬Êý¾Ýй¶ÊÂÎñ¼òÖ±Çй¦·ò £¬ÒÔ¼°ÊÇ·ñÓй¥»÷Õß½Ó¼û¹ýËüÒÀȻδ֪ ¡£


https://www.hackread.com/simpletire-database-leak-records-exposed/


2¡¢×êÑÐÈËÔ±ÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËÆºóÃŵÄÐÐΪӰÏìÔ¼700Íǫ̀É豸


¾Ý5ÔÂ31ÈÕ±¨Â· £¬¹Ì¼þ°²È«¹«Ë¾EclypsiumÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËÆºóÃŵÄÐÐΪ ¡£×êÑÐÈËÔ±ÔÚ4Ô³õ´Î¼ì²âµ½¸ÃÒì³£Çé¿ö £¬¶ûºó £¬¼¼¼Î¹«Ë¾½â¾öÁËÕâ¸öÎÊÌâ ¡£¼¼¼ÎϵͳÖеĹ̼þ»áÔÚϵͳÆô¶¯¹ý³ÌÖÐ×°Öò¢Ö´ÐÐWindowsÔ­Éú¿ÉÖ´ÐÐÎļþ ¡£¸Ã¿ÉÖ´ÐÐÎļþÓÃÓÚ²»°²È«µØÏÂÔØºÍÖ´Ðжî±íµÄpayload £¬ÕâÓëÆäËüÀàËÆOEMºóÃÅ£¨ÈçComputraceºóÃŵȣ©µÄÐÐΪһÑù ¡£×êÑÐÈËÔ±³Æ £¬¸ÃÈí¼þËÆºõÊÇ×÷Ϊһ¸öºÏ·¨µÄ¸üÐÂÀûÓ÷¨Ê½ £¬¸ÃÎÊÌâ¿ÉÄÜ»áÓ°ÏìԼĪ364¸ö¼¼¼Îϵͳ £¬´ÖÂÔ¹À¼ÆÉæ¼°700Íǫ̀É豸 ¡£


https://securityaffairs.com/146892/hacking/backdoor-like-behavior-gigabyte-systems.html


3¡¢Î¢ÈíÅû¶macOSÖпÉÈÆ¹ýSIP rootÏ޶ȵÄMigraine·ì϶


5ÔÂ30ÈÕ £¬Î¢ÈíÅû¶ÁËеÄmacOS·ì϶Migraine£¨CVE-2023-32369£©µÄ¾ßÌåÐÅÏ¢ ¡£ÀûÓø÷ì϶ £¬Õ¼ÓÐrootȨÏ޵Ĺ¥»÷Õß¿Éͨ¹ýÀÄÓÃmacOSǨá㸱ÊÖ·¨Ê½À´ÈƹýϵͳÆëÈ«ÐÔ±£»¤£¨SIP£© £¬×°ÖÃ"²»³Éɾ³ý"µÄ¶ñÒâÈí¼þ ¡£ÈƹýSIP±£»¤»¹Äܹ»ÆëÈ«ÈÆ¹ýͨÃ÷¡¢Ô޳ɺͽÚÔì(TCC)Õ½Êõ £¬¹¥»÷Õ߿ɴúÌæTCCÊý¾Ý¿â²¢»ñµÃÖ¸±êÊý¾ÝµÄÎÞÏ޶ȽӼûȨÏÞ ¡£¸Ã·ì϶ÒÑÔÚ5ÔÂ18ÈÕ°ä²¼µÄ°²È«¸üÐÂÖн¨¸´ ¡£


https://www.microsoft.com/en-us/security/blog/2023/05/30/new-macos-vulnerability-migraine-could-bypass-system-integrity-protection/


4¡¢Anonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾ÀÕË÷300ÍòÃÀÔª


ýÌå5ÔÂ30ÈÕ³Æ £¬ºÚ¿ÍÍÅ»ïAnonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾(SAS)Ìá³öÁË300ÍòÃÀÔªµÄÊê½ðÒªÇó £¬ÒÔÖÕ³¡×Ô2ÔÂÒÔÀ´¶Ô¸Ãº½¿Õ¹«Ë¾ÍøÕ¾µÄDDoS¹¥»÷ ¡£Anonymous Sudan³ÆSAS¼°Æä·þÎñÒÑå´»ú³¬¹ýÎåÌì ¡£¸ÃÍŻﲻÐÝÌá¸ßËûÃǵÄÊê½ð £¬´Ó×î³õµÄ3500ÃÀÔªÌá¸ßµ½¾ªÈ˵Ä300ÍòÃÀÔª ¡£SASÒѶÔFacebookÉϵÄÓû§Í¶Ëß×ö³ö»ØÓ¦ £¬ÈÏ¿ÉÆäÍøÕ¾´æÔÚÎÊÌâ £¬²¢Ïò¿Í»§±£ÕÏËûÃÇÔÚÖÂÁ¦½â¾öÎÊÌâ ¡£


https://therecord.media/hacker-group-anonymous-sudan-demands-three-million-from-sas


5¡¢´øÓжñÒâÄ£¿éSpinOkµÄAndroidÀûÓÃÒѱ»×°Öó¬¹ý4ÒÚ´Î


Dr. WebÔÚ5ÔÂ29ÈÕ³ÆÆä·¢ÏÖÁ˶à¸öÔ̺¬SpinOkÄ£¿éµÄAndroidÀûÓà £¬Òѱ»×°Öó¬¹ý421000000´Î ¡£´ËÄ£¿é×÷ΪӪÏúSDK·Ö·¢ £¬Í¨¹ýÓ×ÓÎÏ·¡¢¹¤×÷ϵͳÒÔ¼°³é½±À´Î¬³ÖÓû§µÄÐËÖ ¡£ËüÄܹ»ÇÔÈ¡´æ´¢ÔÚÓû§É豸ÉϵĸöÈËÊý¾Ý²¢½«Æä·¢Ë͵½Ô¶³Ì·þÎñÆ÷ ¡£ÔÚºó¶Ü £¬Ä¾ÂíSDK»á²é³­AndroidÉ豸µÄ´«¸ÐÆ÷Êý¾Ý £¬ÒÔÈ·ÈÏËüÊÇ·ñÔÚɳºÐÖÐÔËÐÐ ¡£Dr. Web°µÊ¾ÔÚGoogle PlayÖеÄ101¸öÀûÓ÷¨Ê½Öз¢ÏÖÁ˸ÃSDK £¬ÀÛ¼ÆÏÂÔØ421290300´Î £¬ÆäÖÐÔ̺¬Noizz£¨1ÒڴΣ©¡¢Zapya£¨1ÒڴΣ©ºÍVFly£¨5ǧÍò´Î£©µÈ ¡£Ä¿Ç° £¬´ó²¿ÃÅÀûÓÃÒѱ»É¾³ý ¡£


https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/


6¡¢Trend Micro°ä²¼¹ØÓÚRomCom½üÆÚ»î¶¯µÄ·ÖÎö»ã±¨


5ÔÂ30ÈÕ £¬Trend Micro°ä²¼Á˹ØÓÚRomCom½üÆÚ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨ ¡£¹¥»÷ÕßÔÚ2022Äê12ÔÂÖÁ2023Äê4Ô¼ÙÒâºÏ·¨Èí¼þµÄÍøÕ¾ £¬ÈçGimp¡¢Go To MeetingºÍChatGPTµÈ ¡£ÕâЩαÔìµÄÍøÕ¾·Ö·¢µÄMSI×°Ö÷¨Ê½±»Ö²ÈëÁËÒ»¸ö¶ñÒâµÄDLLÎļþ£¨"InstallA.dll"£© £¬¸ÃÎļþ½«Áí±íÈý¸öDLLÌáÈ¡µ½Ö¸±êµÄ%PUBLIC%\LibrariesÎļþ¼ÐÖÐ ¡£¶Ô×îа汾RomCom payloadµÄ·ÖÎöÅú×¢ £¬¿ª·¢ÕßÔÚÖÂÁ¦Ö´Ðиü¶à¶ñÒâºÅÁî £¬ÆäºÅÁîÊýÁ¿´Ó20ÌõÔö³¤µ½42Ìõ ¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃVMProtectÈí¼þ½øÐдúÂë±£»¤ºÍ·´VMÖ°ÄÜ ¡£


https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html