Twitter³ÆÆ䲿ÃÅÔ´´úÂëй¶ÆäÒÑÒªÇóGitHubɾ³ý

Ðû²¼Ê±¼ä 2023-03-29

1¡¢Twitter³ÆÆ䲿ÃÅÔ´´úÂëй¶ÆäÒÑÒªÇóGitHubɾ³ý 


¾ÝýÌå3ÔÂ27ÈÕ±¨µÀ£¬ÔÚGitHubɾ³ý֮ǰ£¬TwitterµÄÔ´´úÂë¿ÉÄÜÒѾ­¹ûÈ»ÁËÊýÔ¡£Æ¾¾ÝDMCA֪ͨ£¬ÕâЩÊý¾ÝÊÇÓÉGitHubÓû§FreeSpeechEnthusiastÐû²¼µÄ£¬Õâ¸öÃû×ÖÌåÏÖËûÊÇÒ»¸ö¶ÔTwitter²»ÂúµÄÔ±¹¤¡£TwitterÏÖÔÚÕýÊÔͼʹÓô«Æ±ÒªÇóGitHubÌṩÓйظÃÓû§ÒÔ¼°·ÃÎʺÍÁ÷´«TwitterÔ´´úÂëµÄÈ˵ÄÉí·ÝÐÅÏ¢£¬ÕâЩÐÅÏ¢½«ÓÃÓÚ½øÒ»²½µÄÖ´·¨Ðж¯¡£Ä¿Ç°Éв»Çå³þÓм¸¶àÈË·ÃÎÊ»òÏÂÔØÁËTwitterµÄÔ´´úÂë¡£


https://www.bleepingcomputer.com/news/security/twitter-takes-down-source-code-leaked-online-hunts-for-downloaders/


2¡¢Ñо¿ÈËÔ±·¢ÏÖÕë¶ÔÖÇÄÜÊÖ»úºÍÒôÏìµÈÉ豸µÄNUIT¹¥»÷


ýÌå3ÔÂ25Èճƣ¬Ñо¿ÈËÔ±¿ª·¢ÁËÒ»ÖÖÃûΪ¡°½ü³¬ÉùÎÞÉùÌØÂåÒÁľÂí¡±(NUIT)µÄÐÂÐ͹¥»÷£¬¿ÉÒÔ¶ÔÖÇÄÜÊÖ»ú¡¢ÖÇÄÜÑïÉùÆ÷ºÍÆäËüÓÉÓïÒôÖúÊÖÇý¶¯µÄÎïÁªÍøµÈÉ豸ִÐÐÎÞÉù¹¥»÷¡£ÆäÖ÷ÒªÔ­ÀíÊÇ£¬ÖÇÄÜÉ豸ÖеÄÂó¿Ë·ç¿ÉÒÔ¶ÔÈ˶úÎÞ·¨Ìýµ½µÄ½ü³¬Éù²¨×ö³ö·´Ó³£¬´Ó¶øÔÚʹÓô«Í³ÑïÉùÆ÷¼¼ÊõµÄÇé¿öÏ£¬ÒÔ×îСµÄ·çÏÕÖ´Ðй¥»÷¡£NUIT¹¥»÷¿ÉÒÔʹÓÃÁ½ÖÖ²îÒìµÄÒªÁì½øÐУºNUIT-1£¬É豸¼ÈÊǹ¥»÷Ô´ÓÖÊǹ¥»÷Ä¿±ê£»NUIT-2£¬Í¨¹ýÒ»¸öÓÐÑïÉùÆ÷µÄÉ豸¹¥»÷ÁíÒ»¸öÓÐÂó¿Ë·çµÄÉ豸¡£


https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/


3¡¢AppleÐÞ¸´ÔçÆÚµÄiPhoneºÍiPadÖÐÒѱ»ÀûÓõÄWebKit©¶´


¾Ý3ÔÂ27ÈÕ±¨µÀ£¬AppleÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËÔçÆÚµÄiPhoneºÍiPadÖÐÒѱ»ÀûÓõÄ©¶´¡£ÕâÊÇÒ»¸öWebKitÀàÐÍ»ìÏý©¶´(CVE-2023-23529)£¬¸Ã¹«Ë¾ÓÚ2ÔÂ13ÈÕÔÚ½ÏеÄiPhoneºÍiPadÉ豸ÉÏÐÞ¸´Á˸ÃÎÊÌâ¡£Apple´Ë´Î¸üÐÂÐÞ¸´ÁËiOS 15.7.4ºÍiPadOS 15.7.4ÖеÄ©¶´¡£¹¥»÷Õß¿ÉÒÔÓÕʹĿ±ê·ÃÎʶñÒâÍøÒ³£¬À´´¥·¢Â©¶´²¢µ¼Ö²Ù×÷ϵͳ±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£½ñÄê1Ô£¬Apple»¹ÏòÔçÆÚµÄiPhoneºÍiPad·´Ïò¸üÐÂÁË©¶´CVE-2022-42856µÄ²¹¶¡¡£


https://securityaffairs.com/144114/hacking/cve-2023-23529-apple-zero-day.html


4¡¢AT&TÅû¶ÐÅÏ¢ÇÔÈ¡·¨Ê½BlackGuardбäÌåµÄ¼¼Êõϸ½Ú


AT&TÔÚ3ÔÂ23ÈÕ³ÆÆä·¢ÏÖÁ˶ñÒâÈí¼þBlackGuardµÄбäÌ壬¾ßÓкܶàй¦Ð§¡£¸Ã¶ñÒâÈí¼þͨ¹ýÓã²æʽµöÓã»î¶¯½øÐзַ¢£¬Ö¼ÔÚ´ÓÖÖÖÖÓ¦Ó÷¨Ê½ºÍä¯ÀÀÆ÷ÖÐÇÔÈ¡Óû§ÐÅÏ¢¡£Æäй¦Ð§°üÂÞ£¬¿Éͨ¹ýUÅ̺ÍÆäËü¿ÉÒƶ¯É豸Á÷´«²¢×Ô¶¯Ñ¬È¾ÐÂÖ÷»ú£¬Äܹ»´ÓC2·þÎñÆ÷ÏÂÔØÌرðµÄpayload£¬Ìí¼Óµ½"Run"×¢²á±íÏîÏÂÀ´»ñµÃ³Ö¾ÃÐÔ£¬½«¶ñÒâÈí¼þÎļþ¸´ÖƵ½C:\ÖеÄÿ¸öÎļþ¼Ð²¢ÎªÃ¿¸öÎļþ¸±±¾Ëæ»úÃüÃû¡£³ýÁËÕâЩ¹¦Ð§Ö®Í⣬BlackGuardÏÖÕë¶Ô57¸ö¼ÓÃÜ»õ±Òä¯ÀÀÆ÷À©Õ¹ºÍÇ®°ü£¬ÊÔͼÇÔÈ¡Êý¾Ý²¢ºÄ¾¡×ʲú¡£


https://cybersecurity.att.com/blogs/labs-research/blackguard-stealer-extends-its-capabilities-in-new-variant


5¡¢Trend MicroÐû²¼Earth Preta×îÐÂÈƹý¼ÆıµÄ·ÖÎö³ÂËß


Trend MicroÓÚ3ÔÂ23ÈÕÐû²¼Á˹ØÓÚEarth Preta×îÐÂÈƹý¼ÆıµÄ·ÖÎö³ÂËß¡£¹¥»÷ʼÓÚÓã²æʽµöÓãÓʼþÒÔ¼°Google DriveÁ´½Ó£¬´Ó2022Äê10ÔºÍ11Ô¿ªÊ¼£¬¹¥»÷Õ߸ü¸ÄÆäTTPÒÔ·Ö·¢¶ñÒâÈí¼þTONEINS¡¢TONESHELLºÍPUBLOAD¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁ˼¸¸öÓÃÓÚÔÚWindows 10ÖÐÈƹýUACµÄ¹¤¾ß£¬°üÂÞHackTool.Win32.ABPASS¡¢HackTool.Win32.CCPASSºÍSilentCleanup¡£Earth PretaÔÚC&C½×¶ÎʹÓÃÁ˶àÖÖ¹¤¾ßºÍÃüÁÀýÈ磬ʹÓÃcertutil.exe´Ó·þÎñÆ÷ÏÂÔغϷ¨µÄWinRAR¶þ½øÖÆÎļþ¡£


https://www.trendmicro.com/en_us/research/23/c/earth-preta-updated-stealthy-strategies.html


6¡¢TrellixÐû²¼¹ØÓÚÐÂÀÕË÷ÍÅ»ïDark PowerµÄ·ÖÎö³ÂËß


3ÔÂ23ÈÕ£¬Ðû²¼Á˹ØÓÚÐÂÀÕË÷ÍÅ»ïDark PowerµÄ·ÖÎö³ÂËß¡£Dark PowerµÄpayloadÊÇÓÃNim¿ª·¢µÄ£¬±àÒëÈÕÆÚÊÇ2023Äê1ÔÂ29ÈÕ£¬¼´¹¥»÷¿ªÊ¼µÄʱ¼ä¡£ÓÐȤµÄÊÇ£¬¸ÃÀÕË÷Èí¼þÓÐÁ½¸ö°æ±¾ÔÚÒ°ÍâÁ÷´«£¬Ã¿¸ö°æ±¾¶¼ÓвîÒìµÄ¼ÓÃÜÃÜÔ¿·½°¸¡£Êê½ð¼Ç¼×îºóÒ»´ÎÐÞ¸ÄÊÇÔÚ2ÔÂ9ÈÕ£¬Ëü¸øÄ¿±ê72СʱµÄʱ¼ä½«10000ÃÀÔªµÄXMR£¨ÃÅÂÞ±Ò£©·¢Ë͵½Ö¸¶¨µÄÇ®°üµØÖ·£¬ÒÔ»ñµÃ½âÃÜÆ÷¡£TrellixÌåÏÖ£¬ÒѾ­¿´µ½À´×ÔÃÀ¹ú¡¢·¨¹ú¡¢ÒÔÉ«ÁС¢ÍÁ¶úÆä¡¢½Ý¿Ë¹²ºÍ¹ú¡¢°¢¶û¼°ÀûÑÇ¡¢°£¼°ºÍÃسµÄ10¸ö±»¹¥»÷Ä¿±ê¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/shining-light-on-dark-power.html