Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-01-131. Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
1ÔÂ9ÈÕ£¬¹ýÈ¥Á½¸öÔ£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃܼ¼ÊõÌӱܼì²â¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´·þÎñ£¬ÍøÂç·¸×ï·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬µ«Ò²ÎªÆäËû¿ª·¢ÈËÔ±ÌṩÁ˸ïлú»á¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐÆÚ¼ä½âÃÜ£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌض¨¼ÓÃܼ¼ÊõµÄµÍ»³Òɶȣ¬ÌÓ±ÜÁ˳߶Ⱦ²Ì¬¼ì²âÒªÁì¡£BansheeÖ÷Ҫͨ¹ýÆÛÆÐÔµÄGitHub´æ´¢¿âÁ÷´«£¬Õë¶ÔmacOSÓû§£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¸Ã¶ñÒâÈí¼þµÄÄ¿±êÊÇÇÔÈ¡´æ´¢ÔÚÁ÷ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬ÒÔ¼°ÊÕ¼¯Ö÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬²¢ÌṩÆÛÆÐԵǼÌáʾÒÔÇÔÈ¡macOSÃÜÂë¡£¾¡¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´Í£ÖÍ£¬µ«Ô´´úÂëй¶ºó£¬¶à¸öÍøÂçµöÓã»î¶¯ÈÔÔÚÁ÷´«¸Ã¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/
2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶Ê¼þ£¬EverestÍŻﱻָΪĻºóºÚÊÖ
1ÔÂ11ÈÕ£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖصÄÊý¾Ýй¶Ê¼þ£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢ÀÃ×´ïºÍĪµÂ˹ÍеêËÁ¹ºÖòúÎïµÄÖ÷¹Ë¸öÈËÐÅÏ¢±»·Ç·¨»ñÈ¡¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞÉí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕƬÒÔ¼°ÐÕÃû¡¢ÄêÁä¡¢µØÖ·µÈ¸öÈË×ÊÁÏ£¬»¹Óн»Ò×ÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æ֪ͨ£¬²¢Ïò¼ÓÖݼà¹Ü»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¾ÝϤ£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸×OÍÅÌᳫµÄ£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕÆÚ¼äͨ¹ýÏúÊ۵㴦Ö÷þÎñ¹©Ó¦É̵Äϵͳ»ñÈ¡ÁË¿Í»§ÐÅÏ¢¡£EverestÍøÂç·¸×ïÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢Éù³ÆÇÔÈ¡ÁË422,075Ìõ¸öÈ˼Ǽ¡£¾¡¹Ü²¿ÃÅ¿Í»§»ñµÃÁËÃâ·ÑÐÅÓüà¿Ø·þÎñ£¬µ«·þÎñÆÚÏÞδ¹ûÈ»¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õ߶øÎÅÃû£¬ËûÃÇÉó¤ÀûÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄ©¶´ºÍÍøÂçµöÓã¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾ÊÚȨµÄ·ÃÎÊȨÏÞ£¬²¢Í¨¹ý¼ÓÃÜͨÐÅÇþµÀºÍÄþ¾²ÒªÁìÀ´ÑÚ¸ÇÆä»î¶¯¡£
https://therecord.media/marijuana-dispensary-warns-of-data-breach
3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬2.3GBÊý¾Ý±»µÁй¶
1ÔÂ10ÈÕ£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬²¿ÃÅÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬ÒµÎñ±é¼°12¸ö¹ú¼Ò£¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¹¥»÷ÕßÀûÓÃ鶵ÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñ·þÎñÆ÷£¬¸Ã·þÎñÆ÷ÓÃÓÚ³ÂËߺͽâ¾öÄÚ²¿ÎÊÌâ¡£¾Ý³Æ£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬ËäȻһЩÊý¾Ý±»±ê־Ϊ¿Í»§£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£Telef¨®nicaÒѽÓÄÉÐëÒª´ëÊ©×èÖ¹ÈκÎδ¾ÊÚȨµÄϵͳ·ÃÎÊ£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©Ä͵µçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¹¥»÷ÕßÌåÏÖ£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£
https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷
1ÔÂ11ÈÕ£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱºòÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬Ä¿±êÊÇÂôÁ¦¹ÜÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆͼºÍµØ¼®¾Ö(UGKK)¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬²¢±£Ö¤ËùÓÐȨÊý¾ÝûÓиü¸Ä»òÆÛÕ©ÐÔת¼µÄ·çÏÕ£¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ·¢ÉúÁ˹㷺ӰÏ죬·¿µØ²úºÍµÖѺ´û¿îÊг¡ÏÝÈë̱»¾£¬Ïà¹Ø¹«¹²·þÎñÒ²ÎÞ·¨»ñµÃ¡£Í¬Ê±£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄ½ôÕžÖÊÆÕýÔڼӾ磬˹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£´Ë´Î¹¥»÷µÄ¾ßÌåÀ´Ô´ÉÐδȷ¶¨£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£Ïó±íÃ÷¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£
https://therecord.media/slovakia-registry-cyberattack-land-agriculture
5. ProtonÈ«Çò·þÎñÖжϣºKubernetesǨÒÆÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö
1ÔÂ10ÈÕ£¬Òþ˽±£»¤·þÎñÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò·¶Î§µÄ´ó¹æÄ£·þÎñÖжϣ¬´Ë´ÎÖжÏÊÇÓÉÓÚÕýÔÚ½øÐеĻù´¡ÉèÊ©ÏòKubernetesǨÒÆÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£Ê¼þʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬µ¼ÖÂÓû§ÎÞ·¨Á¬½Óµ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈ·þÎñ¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÁ¬½Óʱ»áÊÕµ½´íÎóÏûÏ¢£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¾¹ýԼĪÁ½Ð¡Ê±µÄŬÁ¦£¬ËùÓзþÎñ½Ðø»Ö¸´Õý³££¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄ·þÎñ¡£ProtonÔÚ¶Ôʼþ½øÐÐÊÓ²ìºó͸¶£¬´Ë´ÎÖжÏÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢ÏÖµÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿â·þÎñÆ÷µÄÐÂÁ¬½ÓÊýÁ¿£¬µ¼ÖÂÔÚÁ¬½ÓÓû§ÊýÁ¿¼±¾çÔö¼Óʱ·ºÆð¸ºÔØ·åÖµ£¬½ø¶øʹ»ù´¡ÉèÊ©³¬¸ººÉ¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌرðÈÝÁ¿À´´¦ÖÃÐÂÁ¬½Ó£¬µ«ÏòKubernetesµÄǨÒÆÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬Ê¹µÃƽºâ¸ºÔرäµÃÀ§ÄÑ¡£Òò´Ë£¬ÔÚ»Ö¸´¹ý³ÌÖУ¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔ·þÎñ²»ÐÐÓõÄÇé¿ö¡£
https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/
6. ÍøÂç·¸×ï·Ö×ÓÓÕÆÓû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵʩµöÓã¹¥»÷
1ÔÂ12ÈÕ£¬ÍøÂç·¸×ï·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬Í¨¹ýÓÕÆÓû§²Ù×÷£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂçµöÓã±£»¤¹¦Ð§¡£Ëæ×ÅÒƶ¯É豸ÔÚÈÕ³£Éú»îÖеĹ㷺ӦÓã¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂçµöÓã¹¥»÷µÄÖصãÄ¿±ê¡£Îª±£»¤Óû§£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÏûÏ¢ÖеÄÁ´½Ó¡£È»¶ø£¬Æ»¹ûÖ¸³ö£¬Ò»µ©Óû§»Ø¸´´ËÀàÏûÏ¢»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁÐ±í£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓá£BleepingComputerÊӲ쵽£¬½ü¼¸¸öÔÂÀ´£¬¶ÌÐÅÍøÂçµöÓã¹¥»÷ÊýÁ¿ÏÔÖøÔö¼Ó£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶ÃÅ·ͨÐзѵÈÓÕ¶ü£¬ÒªÇóÓû§Ö´ÐÐÌض¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£ÕâÖÖ¼ÆıÀûÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿±ê¡£¼´Ê¹Î´µã»÷Á´½Ó£¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬Ê¹ÆäÃæÁÙ¸ü´ó·çÏÕ¡£Òò´Ë£¬Ãæ¶ÔÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇó»Ø¸´µÄ¶ÌÐÅ£¬Óû§Ó¦±£³Ö¾¯Ì裬ֱ½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯½øÐÐÑéÖ¤£¬¶ø·ÇÇáÒ׻ظ´¡£ÌرðÊÇÀÏÄêÓû§£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂçµöÓãÐÅÏ¢µÄÖ÷ҪĿ±ê£¬Ðè½÷É÷¿´´ý£¬ÒÔÃâй¶¸öÈËÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/