AppleÐû²¼½ô¼±¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚÒ°ÀûÓõÄ©¶´
Ðû²¼Ê±¼ä 2023-09-221¡¢AppleÐû²¼½ô¼±¸üÐÂÐÞ¸´3¸öÒѱ»ÔÚÒ°ÀûÓõÄ©¶´
¾Ý9ÔÂ21ÈÕ±¨µÀ£¬AppleÐû²¼Á˽ô¼±Äþ¾²¸üУ¬ÒÔÐÞ¸´ÔÚÕë¶ÔiPhoneºÍMacµÄ¹¥»÷Öб»ÀûÓõÄ3¸öеĩ¶´¡£±»ÀûÓé¶´·Ö±ðÊÇWebkitÖеÄÈÎÒâ´úÂëÖ´ÐЩ¶´£¨CVE-2023-41993£©£¬¿Éͨ¹ýÓÕÆÄ¿±ê·ÃÎÊÌØÖÆµÄWebÄÚÈÝÀ´µ¼ÖÂÈÎÒâ´úÂëÖ´ÐУ»Äþ¾²¿ò¼ÜÖеÄ©¶´£¨CVE-2023-41991£©£¬¿ÉÒÔʹÓöñÒâÓ¦Ó÷¨Ê½ÈƹýÇ©ÃûÑéÖ¤£»µÚÈý¸öÊÇÄں˿ò¼ÜÖеÄ©¶´£¨CVE-2023-41992£©£¬µ±µØ¹¥»÷Õß¿ÉÒÔÀûÓÃËüÀ´ÌáȨ¡£AppleÔÚ½ñÄêÒÑÐÞ¸´ÁË16¸öÁãÈÕ©¶´¡£
https://securityaffairs.com/151174/hacking/apple-zero-days.html
2¡¢T-Mobile¹Ù·½Ó¦ÓùÊÕÏ¿ÉÒÔ¼ì²ìËûÈËÕÊ»§ºÍÕ˵¥ÐÅÏ¢
¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬T-MobileµÄ¿Í»§³Æ£¬ÔڵǼ¸Ã¹«Ë¾µÄ¹Ù·½Òƶ¯Ó¦Óúó¿ÉÒÔ¼ì²ìÆäËûÈ˵ÄÕÊ»§ºÍÕ˵¥ÐÅÏ¢¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞÐÕÃû¡¢µç»°ºÅÂë¡¢µØÖ·¡¢ÕË»§Óà¶îÒÔ¼°ÐÅÓÿ¨ÏêϸÐÅÏ¢£¬ÀýÈçÈÕÆÚºÍ×îºóËÄλÊý×Ö¡£ËäÈ»´Ó20ÈÕ¿ªÊ¼ÔÚRedditºÍTwitterÓ¿ÏÖÁË´óÁ¿³ÂËߣ¬µ«Ò»Ð©¿Í»§Éù³ÆÔÚ¹ýÈ¥Á½ÖÜÄÚÒ»Ö±´æÔÚÕâÖÖÇé¿ö¡£T-MobileÌåÏÖ£¬´Ë´Îʼþ²¢·ÇÍøÂç¹¥»÷µ¼Öµģ¬ÆäϵͳҲûÓÐÔâµ½ÈëÇÖ¡£ÕâÊÇÒ»¸öÔÝʱµÄϵͳ¹ÊÕÏ£¬Óë¼Æ»®µÄÒ¹¼ä¼¼Êõ¸üÐÂÓйأ¬½öÉæ¼°²»µ½100Ãû¿Í»§µÄÐÅÏ¢£¬ºÜ¿ì¾ÍµÃµ½Á˽â¾ö¡£
https://www.bleepingcomputer.com/news/security/t-mobile-app-glitch-let-users-see-other-peoples-account-info/
3¡¢Check PointÅû¶Õë¶ÔÀ¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ
9ÔÂ20ÈÕ£¬Check PointÅû¶ÁËÕë¶ÔÀ¶¡ÃÀÖÞ·Ö·¢BBTokбäÖֵĻ¡£BBTok×î³õÓÚ2020ÄêÆØ¹â£¬¸´ÖÆÁË40¶à¼ÒÄ«Î÷¸çºÍ°ÍÎ÷ÒøÐеĽçÃæ£¬²¢ÓÕÆÄ¿±êÊäÈëÒøÐÐÕË»§µÄ2FAÂë»òÖ§¸¶¿¨ºÅ¡£¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸ç£¬½ÓÄɶà²ãµØÀíΧÀ¸À´È·±£Ä¿±ê¼ÆËã»ú½öÀ´×ÔÕâЩ¹ú¼Ò¡£Ñ¬È¾Á´Ê¹ÓÃÁËÒ»ÖÖÆæÌصÄLOLBins×éºÏ£¬µ¼Ö¼ì²âÂʽϵ͡£¶ñÒâÈí¼þͨ¹ýµöÓãÁ´½Ó·Ö·¢£¬¶ø²»ÊÇ×÷ΪÓʼþµÄ¸½¼þ¡£
https://blog.checkpoint.com/security/check-point-research-exposes-new-versions-of-the-bbtok-banking-malware-which-targets-clients-of-over-40-mexican-and-brazilian-banks/
4¡¢Sonatype¼ì²âµ½14¸öÇÔÈ¡SSHÃÜÔ¿µÈÐÅÏ¢µÄ¶ñÒânpm°ü
SonatypeÓÚ9ÔÂ19ÈÕ³ÆÆäÔÚnpmÈí¼þ°ü×¢²á±í¼ì²âµ½Ò»ÅúеĶñÒâÈí¼þ°ü£¬Ö¼ÔÚÇÔÈ¡KubernetesÅäÖúÍSSHÃÜÔ¿¡£ÕâЩÈí¼þ°üÊÔͼð³äJavaScript¿âºÍ×é¼þ£¬ÀýÈçESLint²å¼þºÍTypeScript SDK¹¤¾ß¡£µ«ÊÇ£¬ÔÚ°²×°ºóËü»áÔËÐлìÏý´úÂ룬ÒÔ´ÓÄ¿±ê¼ÆËã»úÇÔÈ¡Ãô¸ÐÎļþ¡£³ýÁËKubernetesÅäÖúÍSSHÃÜÔ¿Í⣬»¹ÇÔÈ¡Óû§Ãû¡¢IPµØÖ·ºÍÖ÷»úÃûµÈÏµÍ³Ö¸ÎÆÐÅÏ¢¡£ÕâЩÈí¼þ°üÓɲîÒìµÄnpmÕË»§·ÖÅúÐû²¼£¬µ«ÏàͬµãÊǶ¼Ê¹ÓÃÁËÓòÃû¡°app.thretest.com¡±¡£
https://blog.sonatype.com/npm-packages-caught-exfiltrating-kubernetes-config-ssh-keys
5¡¢ProofpointÏêÊöÀûÓÃValleyRATºÍSainbox RATµÄ¹¥»÷
9ÔÂ20ÈÕ£¬ProofpointÏêÊöÁËÀûÓÃValleyRATºÍSainbox RAT£¨Gh0stRAT±äÖÖ£©µÄ¹¥»÷»î¶¯¡£Ñо¿ÈËÔ±ÔÚ2023ÄêÒѼì²âµ½30¶à¸ö´ËÀà»î¶¯¡£½üÆÚµÄ»î¶¯Ê¹ÓÃÁé»îµÄ·Ö·¢ÒªÁ죬ͨ¹ýExcelºÍPDF¸½¼þ·Ö·¢£¬ÆäÖаüÂÞÁ´½Óµ½Ñ¹Ëõ¿ÉÖ´ÐÐÎļþµÄURL¡£SainboxÓÚ2020Äê±»·¢ÏÖ£¬½ñÄê4ÔÂÒÔÀ´ÒѼì²âµ½½ü20ÆðÁ÷´«¸ÃRATµÄ»î¶¯£¬¶øÔÚ´Ë֮ǰ£¬SainboxÒÑÔÚ¶ñÒâÓʼþÁìÓòÏúÉùÄä¼£¶àÄê¡£ValleyRATÓÚ2Ô±»Åû¶£¬Í¨¹ýC++¿ª·¢£¬×Ô3ÔÂ21ÈÕÆð¼ì²âµ½6ÆðÁ÷´«ValleyRATµÄ»î¶¯¡£Proofpoint»¹·¢ÏÖÁËÖÁÉÙ3¸ö·Ö·¢Purple FoxµÄ»î¶¯¡£
https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape
6¡¢ÃÀ¹úÄþ¾²»ú¹¹¹ûÈ»¹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄIoCºÍTTP
ÃÀ¹úFBIºÍCISAÓÚ9ÔÂ20ÈÕÐû²¼Á˹ØÓÚÀÕË÷ÍÅ»ïSnatchµÄÁªºÏÍøÂçÄþ¾²×Éѯ(CSA)£¬Éæ¼°IoCºÍTTPµÈÐÅÏ¢¡£SnatchÓÚ2018ÄêÊ״ηºÆð£¬½ÓÄÉRaaSģʽ¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÒªº¦µÄ»ù´¡ÉèÊ©ÁìÓò£¬°üÂÞ¹ú·À¹¤Òµ»ùµØ(DIB)¡¢Á¸Ê³ºÍũҵÒÔ¼°ÐÅÏ¢¼¼ÊõÐÐÒµ¡£SnatchʹÓòîÒìµÄTTPÀ´Õì²ì¡¢ºáÏòÒÆ¶¯ÒÔ¼°ËÑË÷Êý¾Ý¡£ËüʹÓÃsc.exeWindowsÃüÁîÐÐÀ´ÅäÖᢲéѯ¡¢Í£Ö¹¡¢Æô¶¯¡¢É¾³ýºÍÌí¼Óϵͳ·þÎñ£¬»¹Ê¹ÓÃMetasploitºÍCobalt StrikeµÈ¹¤¾ß¡£¾ÝÊӲ죬ÔÚ²¿ÊðÀÕË÷Èí¼þ֮ǰ£¬Snatch»áÔÚÄ¿±êϵͳÉÏ»¨·Ñ³¤´ïÈý¸öÔµÄʱ¼ä£¬½øÐкáÏòÒÆ¶¯ÒÔ¾¡¿ÉÄÜ´ó¹æÄ£µØ²¿ÊðÀÕË÷Èí¼þ¡£
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a