Ñо¿Ö°Ô±ÑÝʾÔõÑùͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À
Ðû²¼Ê±¼ä 2022-05-19¾ÝýÌå5ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬NCC GroupµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖ¾ÙÐе͹¦ºÄÀ¶ÑÀ(BLE)Öм̹¥»÷ÐµĹ¤¾ß£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÏÖÓб£»£»£»£»¤ÔÚÄ¿µÄÉϾÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£ÔÚ´ËÀ๥»÷ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×èµ²²¢Ê¹ÓÃÁ½·½Ö®¼äµÄͨѶ¡£¡£¡£¡£ÌØË¹ÀModel 3ºÍModel Y¶¼Ê¹ÓÃÁË»ùÓÚBLEµÄϵͳ£¬£¬£¬£¬£¬£¬Òò´Ë¹¥»÷¿ÉÓÃÓÚ½âËøºÍÆô¶¯Æû³µ¡£¡£¡£¡£NCCÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷Ö´ÐÐԼνöÐèÊ®ÃëÖÓ¡£¡£¡£¡£ËäÈ»ÕâÖÖBLE¹¥»÷µÄÊÖÒÕϸ½ÚÉÐδÐû²¼£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±³ÆËûÃÇÒѾÔÚÌØË¹ÀModel 3ÉϲâÊÔÁËÕâÒ»ÒªÁì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/
2¡¢VMware¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2022-22972
5ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°Ïì¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-22972£©¡£¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Îó²î»áÓ°ÏìWorkspace ONE Access¡¢VMware Identity Manager(vIDM)ºÍvRealize Automation£¬£¬£¬£¬£¬£¬¾ßÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷ÕßÄܹ»»ñµÃÖÎÀíȨÏÞÇÒ²»ÐèÒª¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£´Ë´Î¸üл¹ÐÞ¸´ÁËÁíÒ»¸öÍâµØÌáȨÎó²î(CVE-2022-22973)£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´½«È¨ÏÞÌáÉýΪroot¡£¡£¡£¡£VMwareÌåÏÖ£¬£¬£¬£¬£¬£¬¼øÓÚÎó²îµÄÑÏÖØÐÔ£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÁ¬Ã¦½ÓÄÉÐж¯¾ÙÐÐÐÞ¸´¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/vmware-patches-critical-auth-bypass-flaw-in-multiple-products/
3¡¢Ñо¿ÍŶӷ¢Ã÷macOS¶ñÒâÈí¼þUpdateAgentµÄбäÖÖ
Jamf Threat LabsÔÚ5ÔÂ16ÈÕÐû²¼µÄ±¨¸æÖÐÅû¶ÁËmacOS¶ñÒâÈí¼þUpdateAgentбäÖÖµÄϸ½ÚÐÅÏ¢¡£¡£¡£¡£UpdateAgentÓÚ2020Äêµ×Ê״α»·¢Ã÷£¬£¬£¬£¬£¬£¬ÒÔºóÒÑÑݱäΪ¶ñÒâÈí¼þdropper£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýmacOS Gatekeeper±£»£»£»£»¤¡£¡£¡£¡£Õâ´Î·¢Ã÷µÄбäÌå»ùÓÚSwift£¬£¬£¬£¬£¬£¬Î±×°³ÉÃûΪ"PDFCreator"ºÍ"ActiveDirectory"µÄMach-O¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬Ö´ÐÐʱÓëÔ¶³ÌЧÀÍÆ÷½¨ÉèÅþÁ¬²¢¼ìË÷ÒªÖ´ÐеÄbash¾ç±¾¡£¡£¡£¡£ÔÚ·¢Ã÷ʱ£¬£¬£¬£¬£¬£¬ÕâЩ¶þ½øÖÆÎļþÔÚVirusTotalÖеļì²âÂÊΪÁã¡£¡£¡£¡£
https://www.jamf.com/blog/updateagent-adapts-again/
4¡¢ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Omnicell³ÆÆäϵͳÔâµ½ÀÕË÷¹¥»÷
¾Ý5ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾OmnicellÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£OmnicellÔÚ5ÔÂ9ÈÕÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬ÀÕË÷¹¥»÷±¬·¢ÔÚ5ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Æä²¿·ÖÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄܵ¼Ö¸ù«Ë¾µÄÉÌÒµÉñÃØ»òÆäËü֪ʶ²úȨµÄɥʧ£¬£¬£¬£¬£¬£¬ÒÔ¼°¹«Ë¾Ô±¹¤¡¢¿Í»§ºÍ¹©Ó¦É̵ÈÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£×èÖ¹5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬OmnicellÈÔδÔÚÆäÍøÕ¾ÉÏÐû²¼ÓйØÎ¥¹æµÄÕýʽ֪ͨ¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/ransomware-healthcare-omnicell/
5¡¢¶à¹úÇå¾²»ú¹¹ÁªºÏÐû²¼³£¼ûµÄ¹¥»÷ǰÑÔµÄÇå¾²×Éѯ
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬À´×ÔÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢ºÉÀ¼ºÍÓ¢¹úµÄ¶à¸ö»ú¹¹ÁªºÏÐû²¼ÁËÒ»·ÝÇå¾²×Éѯ¡£¡£¡£¡£×ÉѯչÏÖÁ˹¥»÷Õß×ʹÓÃ10¸ö³õʼ¹¥»÷ǰÑÔ£¬£¬£¬£¬£¬£¬°üÀ¨²»Ç¿ÖÆÖ´ÐжàÒòËØÉí·ÝÑéÖ¤(MFA)¡¢Ã»ÓÐ׼ȷµÄÓ¦ÓÃȨÏÞ¼°»á¼û¿ØÖÆÁбíÖеĹýʧ¡¢Èí¼þδ¸üС¢Ê¹ÓÃĬÈÏÉèÖûòĬÈÏÓû§ÃûºÍÃÜÂë¡¢Ô¶³ÌЧÀÍȱ·¦×ã¹»µÄ¿ØÖƺÍδʵÑéÇ¿ÃÜÂëÕ½ÂԵȡ£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã×Éѯ»¹ÌṩÁË»º½â²½·¥£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú×éÖ¯ÔöÇ¿ÆäÍøÂç·ÀÓù¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cybersecurity-agencies-reveal-top-initial-access-attack-vectors/
6¡¢MicrosoftÐû²¼Õë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ±¨¸æ
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬MicrosoftÐû²¼ÁËÕë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Ëæ×ÅÕë¶Ô¼ÓÃÜÇ®±ÒµÄ¹¥»÷µÄÏÔÖøÔöÌí£¬£¬£¬£¬£¬£¬MicrosoftÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÍþвÀàÐ͵ķºÆð£¬£¬£¬£¬£¬£¬²¢³ÆÆäΪcryware¡£¡£¡£¡£CrywareÊÇÖ±½Ó´Ó·ÇÍйܼÓÃÜÇ®±ÒÇ®°ü£¨Ò²³ÆÎªÈÈÇ®°ü£©ÍøÂçºÍÇÔÈ¡Êý¾ÝµÄÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£ÏÖÔÚʹÓüÓÃÜÇ®±ÒµÄÍþв°üÀ¨Cryptojackers¡¢ÀÕË÷Èí¼þ¡¢stealersºÍClipBankerľÂí¡£¡£¡£¡£Cryware¿ÉÄÜ»áÔì³ÉÑÏÖØµÄ²ÆÎñËðʧ£¬£¬£¬£¬£¬£¬ÏÖÔÚҲûÓÐÖ§³Öϵͳ¿ÉÒÔ×ÊÖú×·»Ø±»µÁµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ