Twitter³ÆÆä²¿·ÖÔ´´úÂëй¶ÆäÒÑÒªÇóGitHubɾ³ý

Ðû²¼Ê±¼ä 2023-03-29

1¡¢Twitter³ÆÆä²¿·ÖÔ´´úÂëй¶ÆäÒÑÒªÇóGitHubɾ³ý 


¾ÝýÌå3ÔÂ27ÈÕ±¨µÀ £¬£¬£¬ £¬£¬ÔÚGitHubɾ³ý֮ǰ £¬£¬£¬ £¬£¬TwitterµÄÔ´´úÂë¿ÉÄÜÒѾ­¹ûÕæÁËÊýÔ¡£¡£¡£¡£¡£ ¡£Æ¾Ö¤DMCA֪ͨ £¬£¬£¬ £¬£¬ÕâЩÊý¾ÝÊÇÓÉGitHubÓû§FreeSpeechEnthusiastÐû²¼µÄ £¬£¬£¬ £¬£¬Õâ¸öÃû×ÖÌåÏÖËûÊÇÒ»¸ö¶ÔTwitter²»ÂúµÄÔ±¹¤¡£¡£¡£¡£¡£ ¡£TwitterÏÖÔÚÕýÊÔͼʹÓô«Æ±ÒªÇóGitHubÌṩÓйظÃÓû§ÒÔ¼°»á¼ûºÍÈö²¥TwitterÔ´´úÂëµÄÈ˵ÄÉí·ÝÐÅÏ¢ £¬£¬£¬ £¬£¬ÕâЩÐÅÏ¢½«ÓÃÓÚ½øÒ»²½µÄÖ´·¨Ðж¯¡£¡£¡£¡£¡£ ¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÈË»á¼û»òÏÂÔØÁËTwitterµÄÔ´´úÂë¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/twitter-takes-down-source-code-leaked-online-hunts-for-downloaders/


2¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖÇÄÜÊÖ»úºÍÒôÏìµÈ×°±¸µÄNUIT¹¥»÷


ýÌå3ÔÂ25ÈÕ³Æ £¬£¬£¬ £¬£¬Ñо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÃûΪ¡°½ü³¬ÉùÎÞÉùÌØÂåÒÁľÂí¡±(NUIT)µÄÐÂÐ͹¥»÷ £¬£¬£¬ £¬£¬¿ÉÒÔ¶ÔÖÇÄÜÊÖ»ú¡¢ÖÇÄÜÑïÉùÆ÷ºÍÆäËüÓÉÓïÒôÖúÊÖÇý¶¯µÄÎïÁªÍøµÈ×°±¸Ö´ÐÐÎÞÉù¹¥»÷¡£¡£¡£¡£¡£ ¡£ÆäÖ÷ÒªÔ­ÀíÊÇ £¬£¬£¬ £¬£¬ÖÇÄÜ×°±¸ÖеÄÂó¿Ë·ç¿ÉÒÔ¶ÔÈ˶úÎÞ·¨Ìýµ½µÄ½ü³¬Éù²¨×ö³ö·´Ó¦ £¬£¬£¬ £¬£¬´Ó¶øÔÚʹÓùŰåÑïÉùÆ÷ÊÖÒÕµÄÇéÐÎÏ £¬£¬£¬ £¬£¬ÒÔ×îСµÄΣº¦Ö´Ðй¥»÷¡£¡£¡£¡£¡£ ¡£NUIT¹¥»÷¿ÉÒÔʹÓÃÁ½ÖÖ²î±ðµÄÒªÁì¾ÙÐУºNUIT-1 £¬£¬£¬ £¬£¬×°±¸¼ÈÊǹ¥»÷Ô´ÓÖÊǹ¥»÷Ä¿µÄ£» £»£»£»£»£»NUIT-2 £¬£¬£¬ £¬£¬Í¨¹ýÒ»¸öÓÐÑïÉùÆ÷µÄ×°±¸¹¥»÷ÁíÒ»¸öÓÐÂó¿Ë·çµÄ×°±¸¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/


3¡¢AppleÐÞ¸´ÔçÆÚµÄiPhoneºÍiPadÖÐÒѱ»Ê¹ÓõÄWebKitÎó²î


¾Ý3ÔÂ27ÈÕ±¨µÀ £¬£¬£¬ £¬£¬AppleÐû²¼Çå¾²¸üР£¬£¬£¬ £¬£¬ÐÞ¸´ÁËÔçÆÚµÄiPhoneºÍiPadÖÐÒѱ»Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£ ¡£ÕâÊÇÒ»¸öWebKitÀàÐÍ»ìÏýÎó²î(CVE-2023-23529) £¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÓÚ2ÔÂ13ÈÕÔÚ½ÏеÄiPhoneºÍiPad×°±¸ÉÏÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£ ¡£Apple´Ë´Î¸üÐÂÐÞ¸´ÁËiOS 15.7.4ºÍiPadOS 15.7.4ÖеÄÎó²î¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ÉÒÔÓÕʹĿµÄ»á¼û¶ñÒâÍøÒ³ £¬£¬£¬ £¬£¬À´´¥·¢Îó²î²¢µ¼Ö²Ù×÷ϵͳ±ÀÀ£» £»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£½ñÄê1Ô £¬£¬£¬ £¬£¬Apple»¹ÏòÔçÆÚµÄiPhoneºÍiPad·´Ïò¸üÐÂÁËÎó²îCVE-2022-42856µÄ²¹¶¡¡£¡£¡£¡£¡£ ¡£


https://securityaffairs.com/144114/hacking/cve-2023-23529-apple-zero-day.html


4¡¢AT&TÅû¶ÐÅÏ¢ÇÔÈ¡³ÌÐòBlackGuardбäÌåµÄÊÖÒÕϸ½Ú


AT&TÔÚ3ÔÂ23ÈÕ³ÆÆä·¢Ã÷Á˶ñÒâÈí¼þBlackGuardµÄбäÌå £¬£¬£¬ £¬£¬¾ßÓÐÐí¶àй¦Ð§¡£¡£¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÓã²æÊ½´¹Âڻ¾ÙÐзַ¢ £¬£¬£¬ £¬£¬Ö¼ÔÚ´ÓÖÖÖÖÓ¦ÓóÌÐòºÍä¯ÀÀÆ÷ÖÐÇÔÈ¡Óû§ÐÅÏ¢¡£¡£¡£¡£¡£ ¡£Æäй¦Ð§°üÀ¨ £¬£¬£¬ £¬£¬¿Éͨ¹ýUÅÌºÍÆäËü¿ÉÒÆ¶¯×°±¸Èö²¥²¢×Ô¶¯Ñ¬È¾ÐÂÖ÷»ú £¬£¬£¬ £¬£¬Äܹ»´ÓC2ЧÀÍÆ÷ÏÂÔØÌØÁíÍâpayload £¬£¬£¬ £¬£¬Ìí¼Óµ½"Run"×¢²á±íÏîÏÂÀ´»ñµÃ³¤ÆÚÐÔ £¬£¬£¬ £¬£¬½«¶ñÒâÈí¼þÎļþ¸´ÖƵ½C:\ÖеÄÿ¸öÎļþ¼Ð²¢ÎªÃ¿¸öÎļþ¸±±¾Ëæ»úÃüÃû¡£¡£¡£¡£¡£ ¡£³ýÁËÕâЩ¹¦Ð§Ö®Íâ £¬£¬£¬ £¬£¬BlackGuardÏÖÕë¶Ô57¸ö¼ÓÃÜÇ®±Òä¯ÀÀÆ÷À©Õ¹ºÍÇ®°ü £¬£¬£¬ £¬£¬ÊÔͼÇÔÈ¡Êý¾Ý²¢ºÄ¾¡×ʲú¡£¡£¡£¡£¡£ ¡£


https://cybersecurity.att.com/blogs/labs-research/blackguard-stealer-extends-its-capabilities-in-new-variant


5¡¢Trend MicroÐû²¼Earth Preta×îÐÂÈÆ¹ýÕ½ÂÔµÄÆÊÎö±¨¸æ


Trend MicroÓÚ3ÔÂ23ÈÕÐû²¼Á˹ØÓÚEarth Preta×îÐÂÈÆ¹ýÕ½ÂÔµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ ¡£¹¥»÷ʼÓÚÓã²æÊ½´¹ÂÚÓʼþÒÔ¼°Google DriveÁ´½Ó £¬£¬£¬ £¬£¬´Ó2022Äê10ÔºÍ11ÔÂ×îÏÈ £¬£¬£¬ £¬£¬¹¥»÷Õ߸ü¸ÄÆäTTPÒÔ·Ö·¢¶ñÒâÈí¼þTONEINS¡¢TONESHELLºÍPUBLOAD¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±»¹·¢Ã÷Á˼¸¸öÓÃÓÚÔÚWindows 10ÖÐÈÆ¹ýUACµÄ¹¤¾ß £¬£¬£¬ £¬£¬°üÀ¨HackTool.Win32.ABPASS¡¢HackTool.Win32.CCPASSºÍSilentCleanup¡£¡£¡£¡£¡£ ¡£Earth PretaÔÚC&C½×¶ÎʹÓÃÁ˶àÖÖ¹¤¾ßºÍÏÂÁî £¬£¬£¬ £¬£¬ÀýÈç £¬£¬£¬ £¬£¬Ê¹ÓÃcertutil.exe´ÓЧÀÍÆ÷ÏÂÔØÕýµ±µÄWinRAR¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£ ¡£


https://www.trendmicro.com/en_us/research/23/c/earth-preta-updated-stealthy-strategies.html


6¡¢TrellixÐû²¼¹ØÓÚÐÂÀÕË÷ÍÅ»ïDark PowerµÄÆÊÎö±¨¸æ


3ÔÂ23ÈÕ £¬£¬£¬ £¬£¬Ðû²¼Á˹ØÓÚÐÂÀÕË÷ÍÅ»ïDark PowerµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ ¡£Dark PowerµÄpayloadÊÇÓÃNim¿ª·¢µÄ £¬£¬£¬ £¬£¬±àÒëÈÕÆÚÊÇ2023Äê1ÔÂ29ÈÕ £¬£¬£¬ £¬£¬¼´¹¥»÷×îÏȵÄʱ¼ä¡£¡£¡£¡£¡£ ¡£ÓÐȤµÄÊÇ £¬£¬£¬ £¬£¬¸ÃÀÕË÷Èí¼þÓÐÁ½¸ö°æ±¾ÔÚÒ°ÍâÈö²¥ £¬£¬£¬ £¬£¬Ã¿¸ö°æ±¾¶¼Óвî±ðµÄ¼ÓÃÜÃÜÔ¿¼Æ»®¡£¡£¡£¡£¡£ ¡£Êê½ð¼Í¼×îºóÒ»´ÎÐÞ¸ÄÊÇÔÚ2ÔÂ9ÈÕ £¬£¬£¬ £¬£¬Ëü¸øÄ¿µÄ72СʱµÄʱ¼ä½«10000ÃÀÔªµÄXMR£¨ÃÅÂÞ±Ò£©·¢Ë͵½Ö¸¶¨µÄÇ®°üµØµã £¬£¬£¬ £¬£¬ÒÔ»ñµÃ½âÃÜÆ÷¡£¡£¡£¡£¡£ ¡£TrellixÌåÏÖ £¬£¬£¬ £¬£¬ÒѾ­¿´µ½À´×ÔÃÀ¹ú¡¢·¨¹ú¡¢ÒÔÉ«ÁС¢ÍÁ¶úÆä¡¢½Ý¿Ë¹²ºÍ¹ú¡¢°¢¶û¼°ÀûÑÇ¡¢°£¼°ºÍÃØÂ³µÄ10¸ö±»¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£ ¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/shining-light-on-dark-power.html