Ñо¿ÈËÔ±ÑÝʾÈçºÎͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À­

Ðû²¼Ê±¼ä 2022-05-19
1¡¢Ñо¿ÈËÔ±ÑÝʾÈçºÎͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À­


¾ÝýÌå5ÔÂ17ÈÕ±¨µÀ£¬NCC GroupµÄÑо¿ÈËÔ±¿ª·¢ÁËÒ»ÖÖ½øÐе͹¦ºÄÀ¶ÑÀ(BLE)Öм̹¥»÷ÐµĹ¤¾ß£¬¿ÉÈÆ¹ýÏÖÓб£»¤ÔÚÄ¿±êÉϽøÐÐÉí·ÝÑéÖ¤¡£ÔÚ´ËÀ๥»÷ÖУ¬¹¥»÷Õß¿ÉÒÔÀ¹½Ø²¢ÀûÓÃÁ½·½Ö®¼äµÄͨÐÅ¡£ÌØË¹À­Model 3ºÍModel Y¶¼Ê¹ÓÃÁË»ùÓÚBLEµÄϵͳ£¬Òò´Ë¹¥»÷¿ÉÓÃÓÚ½âËøºÍÆô¶¯Æû³µ¡£NCCÌåÏÖ£¬¹¥»÷Ö´ÐÐԼνöÐèÊ®ÃëÖÓ¡£ËäÈ»ÕâÖÖBLE¹¥»÷µÄ¼¼Êõϸ½ÚÉÐδÐû²¼£¬µ«Ñо¿ÈËÔ±³ÆËûÃÇÒѾ­ÔÚÌØË¹À­Model 3ÉϲâÊÔÁËÕâÒ»ÒªÁì¡£


https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/


2¡¢VMware¶à¿î²úÎïµÄÉí·ÝÑéÖ¤ÈÆ¹ý©¶´CVE-2022-22972


5ÔÂ18ÈÕ£¬VMwareÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËÓ°Ïì¶à¿î²úÎïµÄÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨CVE-2022-22972£©¡£Í¨¸æÖ¸³ö£¬Â©¶´»áÓ°ÏìWorkspace ONE Access¡¢VMware Identity Manager(vIDM)ºÍvRealize Automation£¬¾ßÓÐÍøÂç·ÃÎÊȨÏ޵Ĺ¥»÷ÕßÄܹ»»ñµÃ¹ÜÀíȨÏÞÇÒ²»ÐèÒª½øÐÐÉí·ÝÑéÖ¤¡£´Ë´Î¸üл¹ÐÞ¸´ÁËÁíÒ»¸öµ±µØÌáȨ©¶´(CVE-2022-22973)£¬¿ÉÓÃÀ´½«È¨ÏÞÌáÉýΪroot¡£VMwareÌåÏÖ£¬¼øÓÚ©¶´µÄÑÏÖØÐÔ£¬Ç¿ÁÒ½¨ÒéÁ¢¼´½ÓÄÉÐж¯½øÐÐÐÞ¸´¡£


https://www.bleepingcomputer.com/news/security/vmware-patches-critical-auth-bypass-flaw-in-multiple-products/


3¡¢Ñо¿ÍŶӷ¢ÏÖmacOS¶ñÒâÈí¼þUpdateAgentµÄбäÖÖ


Jamf Threat LabsÔÚ5ÔÂ16ÈÕÐû²¼µÄ³ÂËßÖÐÅû¶ÁËmacOS¶ñÒâÈí¼þUpdateAgentбäÖÖµÄϸ½ÚÐÅÏ¢¡£UpdateAgentÓÚ2020Äêµ×Ê״α»·¢ÏÖ£¬½ñºóÒÑÑݱäΪ¶ñÒâÈí¼þdropper£¬¿ÉÈÆ¹ýmacOS Gatekeeper±£»¤¡£Õâ´Î·¢ÏÖµÄбäÌå»ùÓÚSwift£¬Î±×°³ÉÃûΪ"PDFCreator"ºÍ"ActiveDirectory"µÄMach-O¶þ½øÖÆÎļþ£¬Ö´ÐÐʱÓëÔ¶³Ì·þÎñÆ÷½¨Á¢Á¬½Ó²¢¼ìË÷ÒªÖ´ÐеÄbash½Å±¾¡£ÔÚ·¢ÏÖʱ£¬ÕâЩ¶þ½øÖÆÎļþÔÚVirusTotalÖеļì²âÂÊΪÁã¡£


https://www.jamf.com/blog/updateagent-adapts-again/


4¡¢ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Omnicell³ÆÆäϵͳÔâµ½ÀÕË÷¹¥»÷


¾Ý5ÔÂ17ÈÕ±¨µÀ£¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾OmnicellÔâµ½ÁËÀÕË÷¹¥»÷¡£OmnicellÔÚ5ÔÂ9ÈÕÔÚÏòÃÀ¹ú֤ȯ½»Ò×ίԱ»áÌá½»µÄÎļþÖÐÌåÏÖ£¬ÀÕË÷¹¥»÷·¢ÉúÔÚ5ÔÂ4ÈÕ£¬Æä²¿ÃÅÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì¡£´ËÍ⣬¸Ãʼþ¿ÉÄܵ¼Ö¸ù«Ë¾µÄÉÌÒµ»úÃÜ»òÆäËü֪ʶ²úȨµÄ¶ªÊ§£¬ÒÔ¼°¹«Ë¾Ô±¹¤¡¢¿Í»§ºÍ¹©Ó¦É̵ÈÈ˵ĸöÈËÐÅϢй¶¡£½ØÖÁ5ÔÂ17ÈÕ£¬OmnicellÈÔδÔÚÆäÍøÕ¾ÉÏÐû²¼ÓйØÎ¥¹æµÄÕýʽ֪ͨ¡£


https://www.infosecurity-magazine.com/news/ransomware-healthcare-omnicell/


5¡¢¶à¹úÄþ¾²»ú¹¹ÁªºÏÐû²¼³£¼ûµÄ¹¥»÷ý½éµÄÄþ¾²×Éѯ


5ÔÂ17ÈÕ£¬À´×ÔÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢ºÉÀ¼ºÍÓ¢¹úµÄ¶à¸ö»ú¹¹ÁªºÏÐû²¼ÁËÒ»·ÝÄþ¾²×Éѯ¡£×Éѯ½ÒʾÁ˹¥»÷Õß×î³£ÀûÓÃ10¸ö³õʼ¹¥»÷ý½é£¬°üÂÞ²»Ç¿ÖÆÖ´ÐжàÒòËØÉí·ÝÑéÖ¤(MFA)¡¢Ã»ÓÐÕýÈ·µÄÓ¦ÓÃȨÏÞ¼°·ÃÎÊ¿ØÖÆÁбíÖеĴíÎó¡¢Èí¼þδ¸üС¢Ê¹ÓÃĬÈÏÅäÖûòĬÈÏÓû§ÃûºÍÃÜÂë¡¢Ô¶³Ì·þÎñȱ·¦×ã¹»µÄ¿ØÖƺÍδʵʩǿÃÜÂë¼ÆÄ±µÈ¡£´ËÍ⣬¸Ã×Éѯ»¹ÌṩÁË»º½â´ëÊ©£¬ÒÔ×ÊÖú×éÖ¯¼ÓÇ¿ÆäÍøÂç·ÀÓù¡£


https://www.bleepingcomputer.com/news/security/cybersecurity-agencies-reveal-top-initial-access-attack-vectors/


6¡¢MicrosoftÐû²¼Õë¶Ô¼ÓÃÜ»õ±ÒµÄÐÂÍþвCrywareµÄ³ÂËß


5ÔÂ17ÈÕ£¬MicrosoftÐû²¼ÁËÕë¶Ô¼ÓÃÜ»õ±ÒµÄÐÂÍþвCrywareµÄ·ÖÎö³ÂËß¡£Ëæ×ÅÕë¶Ô¼ÓÃÜ»õ±ÒµÄ¹¥»÷µÄÏÔÖøÔö¼Ó£¬MicrosoftÑо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÐÂÍþвÀàÐ͵ķºÆð£¬²¢³ÆÆäΪcryware¡£CrywareÊÇÖ±½Ó´Ó·ÇÍйܼÓÃÜ»õ±ÒÇ®°ü£¨Ò²³ÆÎªÈÈÇ®°ü£©ÊÕ¼¯ºÍÇÔÈ¡Êý¾ÝµÄÐÅÏ¢ÇÔÈ¡·¨Ê½¡£Ä¿Ç°ÀûÓüÓÃÜ»õ±ÒµÄÍþв°üÂÞCryptojackers¡¢ÀÕË÷Èí¼þ¡¢stealersºÍClipBankerľÂí¡£Cryware¿ÉÄÜ»áÔì³ÉÑÏÖØµÄ²ÆÕþËðʧ£¬ÏÖÔÚҲûÓÐÖ§³Öϵͳ¿ÉÒÔ×ÊÖú×·»Ø±»µÁµÄ¼ÓÃÜ»õ±Ò¡£


https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/