AppleÐû²¼½ô¼±¸üÐÂÐÞ¸´±»ÀûÓé¶´CVE-2023-42824

Ðû²¼Ê±¼ä 2023-10-07

1¡¢AppleÐû²¼½ô¼±¸üÐÂÐÞ¸´±»ÀûÓé¶´CVE-2023-42824


¾ÝýÌå10ÔÂ4ÈÕ±¨µÀ  £¬AppleÐû²¼Á˽ô¼±Äþ¾²¸üР £¬À´ÐÞ¸´Ó°ÏìiPhoneºÍiPadµÄÒѱ»ÀûÓé¶´¡£ÕâÊÇ´æÔÚÓÚÄÚºËÖеÄȨÏÞÌáÉý©¶´£¨CVE-2023-42824£©  £¬iOS 16.6֮ǰµÄ°æ±¾¶¼¿ÉÄÜÊÜ´Ë©¶´µÄÓ°Ïì  £¬ÉÐδÐû²¼¹¥»÷ÕßÉí·Ý¡£ÕâÊÇ×ÔÄê³õÒÔÀ´ÐÞ¸´µÄµÚ17¸ö±»ÀûÓé¶´¡£´ËÍâ  £¬´Ë´Î¸üл¹ÐÞ¸´ÁËWebRTCÖеĻº³åÇøÒç³ö©¶´£¨CVE-2023-5217£©  £¬¿ÉÄܵ¼ÖÂÈÎÒâ´úÂëÖ´ÐС£


https://securityaffairs.com/151968/hacking/apple-zero-days-2.html


2¡¢»ùÒò¼ì²â¹«Ë¾23andMeÔ⵽ײ¿â¹¥»÷Êý°ÙÍòÓû§ÐÅϢй¶


¾Ý10ÔÂ6ÈÕ±¨µÀ  £¬ºÚ¿ÍÉù³Æ´Ó23andMeÇÔÈ¡ÁËÖÁÉÙ700ÍòÓû§µÄÊý¾Ý  £¬²¢ÔÚBreachedºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£×î³õ¹¥»÷ÕßÐû²¼ÁË100ÍòÐеÂÒáÓÌÌ«È˵ÄÊý¾Ý  £¬ÔÚ10ÔÂ4ÈÕÓÖÌá³öÒÔÿ¸ö23andMeÕË»§1-10ÃÀÔªµÄ¼Û¸ñÅúÁ¿³öÊÛÊý¾Ý×ÊÁÏ  £¬¾ßÌå¼Û¸ñÈ¡¾öÓÚ¹ºÖÃÊýÁ¿¡£23andMe½«´Ë´Îй¶¹éÒòÓÚײ¿â¹¥»÷  £¬²¢ÌåÏÖËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷¡£Ñо¿ÈËÔ±½¨Òé  £¬Óû§Ó¦ÖÆÖ¹Öظ´Ê¹ÓÃͬһ¸öÃÜÂë¡£


https://www.hackread.com/hacker-claims-dna-service-23andme-users-data/


3¡¢Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½¹¥»÷µ¼Ö·þÎñÔÝʱÖжÏ


ýÌå10ÔÂ5ÈÕ³Æ  £¬Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½ÍøÂç¹¥»÷µ¼ÖÂÆä·þÎñÒâÍâÖÐ¶Ï  £¬¿ÉÄÜ»¹»áΣ¼°¿Í»§Êý¾Ý¡£¸Ã¹«Ë¾Îª60¸ö¹ú¼ÒÌá¹©ÒÆ¶¯µçÐźÍÓïÒôIP(VoIP)·þÎñ  £¬¹¥»÷·¢ÉúÔÚÖÜÄ©  £¬Ó°ÏìÁ˳ýÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÎÚ¿ËÀ¼ºÍÍ»Äá˹֮ÍâµÄËùÓйú¼Ò¡£¾ßÌåÀ´Ëµ  £¬¿Í»§ºÍÁãÊÛÉ̳ÆÎÞ·¨·ÃÎʸù«Ë¾µÄ³äÖµÃÅ»§  £¬¹úÄں͹ú¼Êºô½Ð·þÎñÒ²´æÔÚÎÊÌâ¡£Lyca³ÆÆäÊ×ÒªÈÎÎñÊÇÈ·±£¿Í»§Êý¾ÝµÄÄþ¾²  £¬Ä¿Ç°ÕýÔÚÊÓ²ìÊÇ·ñÓиöÈËÐÅϢй¶  £¬²¢ÌåÏÖËùÓмǼ¶¼ÊÇÍêÈ«¼ÓÃܵÄ¡£


https://therecord.media/cyberattack-on-lyca-stops-calls


4¡¢EclecticIQÅû¶ÒǪ̂»ýµçΪÓÕ¶üÕë¶Ô°ëµ¼ÌåÐÐÒµµÄ¹¥»÷


EclecticIQÔÚ10ÔÂ5ÈÕÅû¶ÁËÕë¶Ô¶«Ñǰ뵼ÌåÐÐÒµµÄ¼äµý»î¶¯¡£¹¥»÷ÕßÀûÓÃÒǪ̂»ýµçΪÖ÷ÌâµÄÓÕ¶ü  £¬·Ö·¢ÁËHyperBro¼ÓÔØ·¨Ê½  £¬ÒÔÔÚ±»Ñ¬È¾µÄÉ豸Éϰ²×°Cobalt Strike beacon  £¬´Ó¶ø½øÐÐÔ¶³Ì·ÃÎÊ¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁËÒ»¸ö¶ñÒâÈí¼þÏÂÔØ·¨Ê½  £¬ËüÀûÓÃPowerShellÖеÄBitsTransferÄ£¿é  £¬´Ó¿ÉÄÜÊDZ»ÈëÇÖµÄCobra DocGuard·þÎñÆ÷ÉÏ»ñÈ¡¶ñÒâ¶þ½øÖÆÎļþ¡£±»ÈëÇÖµÄCobra DocGuard·þÎñÆ÷ÉÏÍйÜÁËÒ»¸ö»ùÓÚGOµÄºóÃÅ"ChargeWeapon"  £¬¿ÉÄÜÓÉͬһ¹¥»÷ÕßÓÚ8ÔÂ21ÈÕÉÏ´«¡£ 


https://blog.eclecticiq.com/chinese-state-sponsored-cyber-espionage-activity-targeting-semiconductor-industry-in-east-asia


5¡¢ESET·¢ÏÖÀûÓÃDinodasRAT¹¥»÷¹çÑÇÄÇijÕþ¸®»ú¹¹µÄ»î¶¯


10ÔÂ5ÈÕ  £¬ESET³ÆÆä·¢ÏÖÁËÕë¶Ô¹çÑÇÄÇijÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯Operation Jacana¡£¸Ã»î¶¯ÓÚ½ñÄê2Ô·ݱ»¼ì²âµ½  £¬ËüÉæ¼°µ½Óã²æÊ½ÍøÂçµöÓã¹¥»÷  £¬·Ö·¢ÁËÓÉC++¿ª·¢µÄкóÃÅDinodasRAT¡£DinodasRATʹÓÃTiny¼ÓÃÜËã·¨(TEA)¶ÔÆä·¢Ë͵½C&CµÄÐÅÏ¢½øÐмÓÃÜ  £¬¿ÉÇÔÈ¡Îļþ¡¢¿ØÖÆWindows×¢²á±íÏîºÍÖ´ÐÐCMDÃüÁîµÈ¡£³ýÁËDinodasRAT Ö®Íâ  £¬¹¥»÷Õß»¹Ê¹ÓÃÁËKorplug  £¬¸Ã¹¤¾ßͨ³£ÓëMustang PandaµÈÍÅ»ïÓйØ¡£


https://www.welivesecurity.com/en/eset-research/operation-jacana-spying-guyana-entity/


6¡¢Group-IB¼ì²âµ½Õë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄľÂíGoldDigger


10ÔÂ5ÈÕ  £¬Group-IBÐû²¼Á˹ØÓÚÐÂAndroidľÂíGoldDiggerµÄ·ÖÎö³ÂËß¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô6ÔÂÆð¾ÍÒ»Ö±»îÔ¾  £¬Õë¶Ô50¶à¸öÔ½ÄϵÄÒøÐС¢µç×ÓÇ®°üºÍ¼ÓÃÜÇ®°üÓ¦Ó÷¨Ê½¡£GoldDiggerð³äÁËÔ½ÄÏÕþ¸®ÃÅ»§ÍøÕ¾ºÍµ±µØÄÜÔ´¹«Ë¾  £¬Ö÷ҪĿµÄÊÇÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£Óм£Ïó±íÃ÷  £¬¸Ã»î¶¯¿ÉÄÜ»áÀ©´óµ½Õû¸öÑÇÌ«µØÓòºÍÎ÷°àÑÀÓï¹ú¼Ò¡£¸ÃľÂí»¹Ê¹ÓÃÁËÅÓ´óµÄ±£»¤»úÖÆ  £¬ÀûÓúϷ¨Èí¼þVirbox ProtectorÈÆ¹ý¼ì²â¡£


https://www.group-ib.com/blog/golddigger-fraud-matrix/