CallistoÔø¹¥»÷ÃÀ¹úµÄ3¸öºËÑо¿ÊµÑéÊÒ

Ðû²¼Ê±¼ä 2023-01-10
1¡¢ºÚ¿ÍÍÅ»ïCallistoÔø¹¥»÷ÃÀ¹úµÄ3¸öºËÑо¿ÊµÑéÊÒ

      

¾Ý·͸Éç1ÔÂ7ÈÕ±¨µÀ£¬ £¬£¬ £¬£¬¶íÂÞ˹ºÚ¿ÍÍÅ»ïCallisto¹¥»÷ÁËÃÀ¹úµÄ3¸öºËÑо¿ÊµÑéÊÒBNL¡¢ArgonneºÍLLNL¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ2022Äê8ÔÂÖÁ9Ô£¬ £¬£¬ £¬£¬ºÚ¿Íͨ¹ý´¹ÂÚ¹¥»÷Ϊÿ¸öʵÑéÊÒ½¨ÉèÐéαµÄµÇÂ¼Ò³Ãæ£¬ £¬£¬ £¬£¬²¢ÏòºË¿ÆÑ§¼Ò·¢Ë͵ç×ÓÓʼþÒÔÓÕʹËûÃÇй¶ÃÜÂë¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÎÞ·¨È·¶¨¹¥»÷ÕßΪºÎÕë¶ÔÕâÈý¸öʵÑéÊÒ£¬ £¬£¬ £¬£¬ÒÔ¼°ËûÃǵĹ¥»÷ÊÇ·ñÀֳɡ£¡£¡£¡£¡£ÔçÔÚ2020Äê12Ô£¬ £¬£¬ £¬£¬Ò»Èº¶íÂÞ˹ºÚ¿ÍÒ²Ôø±»Ö¸¿Ø¹¥»÷°üÀ¨ÃÀ¹úºËÄÜ»ú¹¹ÔÚÄÚµÄ40¸ö×éÖ¯¡£¡£¡£¡£¡£


https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/


2¡¢Saint Gheorghe¿µ¸´Ò½Ôº±»ÀÕË÷3¸ö±ÈÌØ±ÒÀ´»Ö¸´Êý¾Ý

      

¾ÝýÌå1ÔÂ6ÈÕ±¨µÀ£¬ £¬£¬ £¬£¬ÂÞÂíÄáÑǵÄSaint Gheorghe¿µ¸´Ò½ÔºÔÚ12ÔÂÔâµ½ÁËÀÕË÷¹¥»÷£¬ £¬£¬ £¬£¬¸Ã¹¥»÷ÈÔÔÚÓ°ÏìÆäÕý³£Ò½Áƻ¡£¡£¡£¡£¡£¾ÝϤ£¬ £¬£¬ £¬£¬ºÚ¿Íͨ¹ýʹÓÃÆäÖÐÒ»¼ÒÔËά¹«Ë¾»á¼ûµÄÔ¶³ÌÅþÁ¬À´Íê³É¹¥»÷£¬ £¬£¬ £¬£¬ËûÔÚ½øÈëϵͳºó¼ÓÃÜÁË12ÔµÄÊý¾Ý¿â£¬ £¬£¬ £¬£¬²¢ÁôÏÂÁËÊê½ð¼Í¼ҪÇó3±ÈÌØ±Ò£¨Ô¼ºÏ46400Å·Ôª£©¡£¡£¡£¡£¡£Ã½Ì峯´Ë´Î¹¥»÷ºÜÊÇÖØ´ó£¬ £¬£¬ £¬£¬ÂÞÂíÄáÑÇDIICOTºÍÇå¾²¹«Ë¾BitDefender¶¼ÎÞ·¨½âÃÜÕâЩÎļþ¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬ £¬£¬Õë¶Ô´Ë´Î¹¥»÷»î¶¯µÄÊÓ²ìÒѾ­Õö¿ª£¬ £¬£¬ £¬£¬Ò½Áƻ½«ºÜ¿ì»Ö¸´¡£¡£¡£¡£¡£


https://securityaffairs.com/140446/cyber-crime/saint-gheorghe-recovery-hospital-ransomware.html


3¡¢BitdefenderÐû²¼ÀÕË÷Èí¼þMegaCortexµÄÃ⺬»ìÃÜÆ÷

      

ýÌå1ÔÂ5Èճƣ¬ £¬£¬ £¬£¬Çå¾²¹«Ë¾BitdefenderÐû²¼ÁËÀÕË÷Èí¼þMegaCortexµÄ½âÃÜÆ÷¡£¡£¡£¡£¡£Ê¹ÓýâÃÜÆ÷µÄÒªÁìºÜÊǼòÆÓ£¬ £¬£¬ £¬£¬ÓÉÓÚËüÊÇÒ»¸ö×ÔÁ¦µÄ¿ÉÖ´ÐÐÎļþ£¬ £¬£¬ £¬£¬²»ÐèҪװÖò¢¿ÉÒÔ×Ô¶¯ÔÚϵͳÉ϶¨Î»¼ÓÃÜÎļþ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬ÎªÁËÇå¾²Æð¼û£¬ £¬£¬ £¬£¬¸Ã½âÃÜÆ÷¿ÉÒÔ±¸·Ý¼ÓÃÜÎļþ£¬ £¬£¬ £¬£¬ÒÔ·À½âÃÜÀú³ÌÖзºÆðÎÊÌ⣬ £¬£¬ £¬£¬µ¼ÖÂÎļþË𻵶øÎÞ·¨»Ö¸´¡£¡£¡£¡£¡£ËäÈ»BitDefenderûÓÐ˵Ã÷ËûÃÇÊÇÔõÑù»ñµÃÁËMegaCortex½âÃÜÆ÷µÄ˽Կ£¬ £¬£¬ £¬£¬µ«ºÜ¿ÉÄÜÊÇʹÓÃËÕÀèÊÀÕþ¸®·¢Ã÷µÄÖ÷ÃÜÔ¿½¨ÉèµÄ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-megacortex-ransomware-decryptor/


4¡¢AppleÒòÔÚApp StoreÉÏͶ·Å¹ã¸æ±»·¨¹ú·£¿£¿ £¿£¿£¿£¿î800ÍòÅ·Ôª

      

1ÔÂ5ÈÕ±¨µÀ³Æ£¬ £¬£¬ £¬£¬Apple±»·¨¹úÊý¾Ý±£»£»£»£»¤»ú¹¹(CNIL)·£¿£¿ £¿£¿£¿£¿î800ÍòÅ·Ôª£¨850ÍòÃÀÔª£©¡£¡£¡£¡£¡£Ôµ¹ÊÔ­ÓÉÊÇAppleÔÚδÕ÷µÃÓû§Ô޳ɵÄÇéÐÎÏÂÍøÂçÓû§Êý¾ÝÓÃÓÚApp StoreÉÏµÄ¹ã¸æÍ¶·Å£¬ £¬£¬ £¬£¬ÕâÎ¥·´ÁË¡¶·¨¹úÊý¾Ý±£»£»£»£»¤·¨¡·(DPA)µÚ82Ìõ¡£¡£¡£¡£¡£CNILͨ¸æÖ¸³ö£¬ £¬£¬ £¬£¬ÔÚiOS 14.6Ï£¬ £¬£¬ £¬£¬µ±Óû§»á¼ûApp Storeʱ£¬ £¬£¬ £¬£¬ÓÃÓÚ¶àÖÖÄ¿µÄµÄ±êʶ·û£¬ £¬£¬ £¬£¬°üÀ¨App StoreÉÏµÄ¹ã¸æ¸öÐÔ»¯£¬ £¬£¬ £¬£¬Ä¬ÈÏÇéÐÎÏ»áÔÚÖÕ¶ËÉÏ×Ô¶¯¶ÁÈ¡¶øÎÞÐèÕ÷µÃÔ޳ɡ£¡£¡£¡£¡£ËäÈ»AppleÒѶÔÕâÒ»ÎÊÌâ¾ÙÐе÷½â£¬ £¬£¬ £¬£¬µ«CNIL²»µÃ²î³ØÎ¥¹æÊ±´úµÄÐÐΪ·£¿£¿ £¿£¿£¿£¿î¡£¡£¡£¡£¡£Apple France½²»°ÈËÌåÏÖ£¬ £¬£¬ £¬£¬ËûÃÇÍýÏë¶ÔCNILµÄ¾öÒéÌá³öÉÏËß¡£¡£¡£¡£¡£ 


https://www.bleepingcomputer.com/news/apple/france-fines-apple-for-targeted-app-store-ads-without-consent/


5¡¢Unit 42Åû¶JsonWebTokenÖеÄRCEÎó²îCVE-2022-23529

      

Unit 42ÔÚ1ÔÂ9ÈÕÅû¶ÁË¿ªÔ´¿âJsonWebTokenÖеÄRCEÎó²î£¨CVE-2022-23529£©¡£¡£¡£¡£¡£¸Ã¿â±»Áè¼Ý22000¸öÏîĿʹÓ㬠£¬£¬ £¬£¬Ã¿ÔÂÔÚNPMÉϵÄÏÂÔØÁ¿Áè¼Ý3600Íò´Î¡£¡£¡£¡£¡£Îó²î±£´æÓÚJsonWebTokenµÄverify()ÒªÁìÖУ¬ £¬£¬ £¬£¬ÆäÓÃÓÚÑéÖ¤JWT²¢·µ»Ø½âÂëÐÅÏ¢¡£¡£¡£¡£¡£ÓÉÓÚȱ·¦¶ÔsecretOrPublicKey²ÎÊýµÄ¼ì²éÒÔÈ·¶¨ËüÊÇ×Ö·û´®Õվɻº³åÇø£¬ £¬£¬ £¬£¬¹¥»÷Õß¿ÉÒÔ·¢ËÍÌØÖÆµÄ¹¤¾ßÔÚÄ¿µÄÉÏÖ´ÐÐí§ÒâÎļþдÈë¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÔÚÑéÖ¤¶ñÒâJWTÇëÇóµÄЧÀÍÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬ £¬£¬Auth0ÍŶÓÒÑÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/


6¡¢Î¢ÈíÐû²¼¹ØÓÚÕë¶ÔMac×°±¸µÄÀÕË÷Èí¼þµÄÊÖÒÕÆÊÎö±¨¸æ

      

1ÔÂ6ÈÕ£¬ £¬£¬ £¬£¬Î¢ÈíÏêÊöÁËÕë¶ÔApple macOSϵͳµÄ²î±ðÀÕË÷Èí¼þϵÁС£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬ £¬£¬MacÀÕË÷¹¥»÷µÄ³õʼǰÑÔͨ³£ÒÀÀµÓÚÓû§¸¨ÖúµÄÒªÁ죬 £¬£¬ £¬£¬ÀýÈçÏÂÔØºÍÔËÐÐαÔìµÄ»òÎäÆ÷»¯µÄÓ¦Óᣡ£¡£¡£¡£Ò²¿ÉÒÔ×÷ΪµÚ¶þ½×¶ÎµÄpayload·Ö·¢£¬ £¬£¬ £¬£¬»òÓÉÆäËü¶ñÒâÈí¼þ»ò¹©Ó¦Á´¹¥»÷»î¶¯·Ö·¢»òÏÂÔØ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬¶ñÒâÈí¼þ¿ª·¢Õß»áÀÄÓÃÕýµ±¹¦Ð§²¢Í¨¹ýÖÖÖÖÊÖÒÕÀ´Ê¹ÓÃÎó²î¡¢Èƹý·ÀÓù»òвÆÈÓû§À´Ñ¬È¾ËûÃǵÄ×°±¸¡£¡£¡£¡£¡£¸Ã±¨¸æÖ÷Ҫƾ֤¶Ô4ÖÖÀÕË÷Èí¼þ£¨KeRanger¡¢FileCoder¡¢MacRansomºÍEvilQuest£©µÄÆÊÎö£¬ £¬£¬ £¬£¬À´ÏêϸÐÎòÕâЩÊÖÒÕ¡£¡£¡£¡£¡£


https://thehackernews.com/2023/01/microsoft-reveals-tactics-used-by-4.html