AppleÐÞ¸´±»Ê¹ÓõÄÔ½½çдÈëÎó²îCVE-2022-42827
Ðû²¼Ê±¼ä 2022-10-25
AppleÔÚ10ÔÂ24ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¿ÉÄÜÒѱ»Æð¾¢Ê¹ÓõÄÎó²î£¨CVE-2022-42827£©¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎó²î£¬£¬£¬£¬£¬£¬ÓÉÈí¼þÔÚÄ¿½ñÄڴ滺³åÇø½çÏßÖ®ÍâдÈëÊý¾ÝÒýÆð£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÊý¾ÝË𻵡¢Ó¦ÓóÌÐò±ÀÀ£»£»£»£»£»£»ò´úÂëÖ´ÐС£¡£¡£ÊÜÓ°Ïì×°±¸°üÀ¨iPhone 8¼°ÒÔÉÏ»úÐÍ¡¢iPad ProËùÓÐÐͺš¢iPad AirµÚ3´ú¼°ÒÔÉÏ»úÐ͵ȡ£¡£¡£Appleͨ¹ýˢнçÏß¼ì²éÐÞ¸´ÁËiOS 16.1ºÍiPadOS 16ÖеÄÎó²î£¬£¬£¬£¬£¬£¬ÕâÊǸù«Ë¾×ÔÄêÍ·ÒÔÀ´ÐÞ¸´µÄµÚ9¸öÁãÈÕÎó²î¡£¡£¡£
https://www.bleepingcomputer.com/news/apple/apple-fixes-new-zero-day-used-in-attacks-against-iphones-ipads/
2¡¢Êýǧ¸öGitHub´æ´¢¿âÌṩ°üÀ¨¶ñÒâÈí¼þµÄÐéαPoC
¾Ý10ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚGitHubÉÏ·¢Ã÷ÁËÊýǧ¸öÌṩÕë¶ÔÖÖÖÖÎó²îµÄÐéα¿´·¨ÑéÖ¤(PoC)µÄ´æ´¢¿â£¬£¬£¬£¬£¬£¬ÆäÖÐһЩ°üÀ¨¶ñÒâÈí¼þ¡£¡£¡£ÔÚ²âÊÔµÄ47313¸ö´æ´¢¿âÖУ¬£¬£¬£¬£¬£¬×ܹ²ÓÐ4893¸öÊǶñÒâµÄ£¬£¬£¬£¬£¬£¬ÆäÖдó¶àÓë2020ÄêÒÔÀ´µÄÎó²îÓйء£¡£¡£Í¨¹ýÑо¿ÆäÖеÄһЩ°¸Àý£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË´ó×ڵĶñÒâÈí¼þºÍ¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬£¬´ÓÔ¶³Ì»á¼ûľÂíµ½Cobalt Strike¡£¡£¡£ÀýÈçCVE-2019-0708µÄPoC£¬£¬£¬£¬£¬£¬°üÀ¨Ò»¸öbase64»ìÏýµÄPython¾ç±¾£¬£¬£¬£¬£¬£¬¿É´ÓPastebin»ñÈ¡VBScript¡£¡£¡£¸Ã¾ç±¾ÊÇHoudini RAT£¬£¬£¬£¬£¬£¬¿Éͨ¹ýWindows CMDÖ´ÐÐÔ¶³ÌÏÂÁî¡£¡£¡£
https://www.bleepingcomputer.com/news/security/thousands-of-github-repositories-deliver-fake-poc-exploits-with-malware/
3¡¢BlackByteʹÓÃ×Ô½ç˵¹¤¾ßExByte¿ìËÙÇÔȡĿµÄÊý¾Ý
SymantecÔÚ10ÔÂ21ÈÕÅû¶ÁËÀÕË÷ÍÅ»ïBlackByteʹÓõĿìËÙÇÔȡĿµÄÊý¾ÝµÄй¤¾ßExByte¡£¡£¡£ExbyteÊÇÓÃGo±àдµÄ£¬£¬£¬£¬£¬£¬Ö¼ÔÚ½«±»µÁÎļþÉÏ´«µ½Mega.co.nzÔÆ´æ´¢Ð§ÀÍ¡£¡£¡£ÔÚÖ´ÐÐʱ£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß»áÖ´Ðз´ÆÊÎö¼ì²éÒÔÈ·¶¨ËüÊÇ·ñÔÚɳºÐÇéÐÎÖÐÔËÐУ¬£¬£¬£¬£¬£¬²¢¼ì²éµ÷ÊÔÆ÷ºÍɱ¶¾Àú³Ì¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬Exbyte»áö¾ÙϵͳÉϵÄËùÓÐÎĵµÎļþ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÓ²±àÂëµÄÕÊ»§Æ¾Ö¤½«ËüÃÇÉÏ´«µ½MegaÉÏн¨ÉèµÄÎļþ¼Ð¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬½üÆÚµÄBlackByte¹¥»÷»î¶¯ÒÀÀµÓÚÈ¥ÄêµÄProxyShellºÍProxyLogonÎó²î£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃAdFind¡¢AnyDesk¡¢NetScanºÍPowerViewµÈ¹¤¾ßºáÏòÒÆ¶¯¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware
4¡¢EyeMedÒò2020ÄêÊý¾Ýй¶ÊÂÎñ±»Å¦Ô¼·£¿£¿£¿£¿£¿î450ÍòÃÀÔª
ýÌå10ÔÂ19Èճƣ¬£¬£¬£¬£¬£¬EyeMedÒò2020Äê´ó¹æÄ£µç×ÓÓʼþºÍÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ±»Å¦Ô¼ÖÝÔٴη£¿£¿£¿£¿£¿î¡£¡£¡£½ñÄêÄêÍ·£¬£¬£¬£¬£¬£¬Å¦Ô¼ÔøÒò2020ÄêÓ°Ïì210ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ¶ÔEyeMed´¦ÒÔ60ÍòÃÀÔªµÄ·£¿£¿£¿£¿£¿î¡£¡£¡£Ö®ºóµÄÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬Ð¹Â¶ÊÂÎñÓëEyeMedµÄÎ¥¹æÍ¨Öª±£´æÒ»Ð©²î±ð£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬EyeMedûÓÐ͸¶¹¥»÷ÕßÔÚÒÑ´Ó±»Ñ¬È¾µÄÕÊ»§·¢ËÍÁËÖÁÉÙ2000·â´¹ÂÚÓʼþ¡£¡£¡£¸Ã¹«Ë¾½«Îªµ¼ÖÂÊý¾Ýй¶µÄ¶àÏîÇ徲Υ¹æÐÐΪ֧¸¶450ÍòÃÀÔªµÄ·£¿£¿£¿£¿£¿î¡£¡£¡£
https://www.scmagazine.com/analysis/privacy/new-york-fines-eyemed-4-5-million-for-2020-email-hack-data-breach
5¡¢ºÚ¿ÍÔÚ°µÍøÊг¡³öÊÛCarousell 260Íò¸öÕË»§µÄÐÅÏ¢
¾ÝýÌå10ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ò»¸ö¾ÝÐÅ´ÓÔÚÏßÊг¡Carousell±»µÁµÄÕÊ»§Êý¾Ý¿âÕýÔÚ°µÍøºÍºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨260Íò¸öÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÊÛ¼ÛΪ1000ÃÀÔª¡£¡£¡£CarousellÉÏÖÜÎåÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÐ195ÍòÓû§Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬²¢ÌåÏÖËûÃǵÄÊý¾ÝÔÚÒ»´ÎϵͳǨáãÖÐÒýÈëÁËÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬²¢±»µÚÈý·½ÓÃÀ´»ñµÃδ¾ÊÚȨµÄ»á¼û£¬£¬£¬£¬£¬£¬¸ÃÎó²îÏÖÔÚÒѾ±»ÐÞ¸´¡£¡£¡£ºÚ¿ÍÓÚ10ÔÂ12ÈÕÉÏ´«ÁË2 GBµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÒÔ¼°°üÀ¨1000¸öÓû§Êý¾ÝµÄÑù±¾Îļþ¡£¡£¡£×èÖ¹ÉÏÖÜÁù£¬£¬£¬£¬£¬£¬ºÚ¿Í͸¶ÒÑÊÛ³öÁ½·Ý¡£¡£¡£
https://www.asiaone.com/singapore/carousell-data-breach-info-26-million-accounts-allegedly-sold-dark-web-hacking-forums
6¡¢Fortinet·¢Ã÷ʹÓÃVMwareÎó²îÈö²¥¶à¸ö¶ñÒâÈí¼þµÄ»î¶¯
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Fortinet³ÆÆäÊӲ쵽ʹÓÃVMware Workspace One AccessÖÐÎó²îÀ´Èö²¥ÖÖÖÖ¶ñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2022-22954£¬£¬£¬£¬£¬£¬ÊÇÒ»¸öͨ¹ýЧÀÍÆ÷¶ËÄ£°å×¢Èë´¥·¢µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬ÒÑÔÚ2022Äê4Ô±»ÐÞ¸´¡£¡£¡£FortinetÔÚ8Ô·ÝÊӲ쵽ÐÂÒ»Âֻ£¬£¬£¬£¬£¬£¬ÊÔͼʹÓÃÎó²îÔÚLinux×°±¸×°ÖÃMirai½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±WinRaR·Ö·¢¼ÓÃܵÄRAR1ransom£¬£¬£¬£¬£¬£¬ÒÔ¼°ÍÚ¾òÃÅÂÞ±ÒµÄxmrig±äÌåGuardMiner¡£¡£¡£
https://www.fortinet.com/blog/threat-research/multiple-malware-campaigns-target-vmware-vulnerability


¾©¹«Íø°²±¸11010802024551ºÅ