Cuckoo macOS¶ñÒâÈí¼þ¿É¿ØÖÆMac²¢ÇÔÈ¡ÃÜÂë
Ðû²¼Ê±¼ä 2024-05-085ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÐ嵀 Mac ¶ñÒâÈí¼þ¶ÔÔËÐÐ Apple Silicon µÄÐÂÐÍ Mac ÒÔ¼°»ùÓÚ Intel µÄ¾É Mac Ìᳫ¹¥»÷¡£¡£¡£¡£¾Ý¡¶ºÚ¿ÍÐÂÎÅ¡·±¨µÀ£¬£¬£¬£¬£¬£¬Kandji µÄÇå¾²Ñо¿Ö°Ô±½«ÕâÖÖ¶ñÒâÈí¼þ³ÆÎª Cuckoo¡£¡£¡£¡£³ýÁËÕë¶Ô½ÏÐÂºÍ½Ï¾ÉµÄ Mac µçÄÔÍ⣬£¬£¬£¬£¬£¬Cuckoo µÄÓëÖÚ²î±ðÖ®´¦»¹ÔÚÓÚËüµÄÐÐΪÀàËÆÓÚÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þºÍÌØ¹¤Èí¼þµÄ»ìÏýÌå¡£¡£¡£¡£ÔÚһƪ²©¿ÍÎÄÕÂÖУ¬£¬£¬£¬£¬£¬Kandji µÄ Adam Kohler ºÍ Christopher Lopez Ú¹ÊÍ˵£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ¶ñÒâÈí¼þ¸ú×ÙÍøÕ¾ VirusTotal ÉÏ·¢Ã÷ÁËÒ»¸öÒÔǰδ¼ì²âµ½µÄ¶ñÒâ Mach-O ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬ÆäÃû³ÆÎª¡°DumpMedia Spotify Music Converter¡±¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬ËûÃÇÔÚÍøÉϲéÕҸóÌÐòµÄÃû³Æ£¬£¬£¬£¬£¬£¬·¢Ã÷¸Ã³ÌÐòÊÇ´ÓÒ»¸öÃûΪ dumpmedia[.]com µÄÍøÕ¾·Ö·¢µÄ£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾Ìṩ¶à¸öÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬¿ÉÒÔ×ÊÖúÓû§½«Á÷ýÌåЧÀÍÖеÄÒôÀÖת»»Îª MP3 Îļþ¡£¡£¡£¡£
https://news.hitb.org/content/new-cuckoo-macos-malware-can-take-over-all-macs-and-steals-your-passwords-too
2. Ñо¿ÍŶÓÑÝʾÕë¶ÔËùÓÐVPN³ÌÐòµÄ¹¥»÷TunnelVision
5ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖÕë¶ÔÏÕЩËùÓÐÐéÄâרÓÃÍøÂçÓ¦ÓóÌÐòµÄ¹¥»÷£¬£¬£¬£¬£¬£¬ÆÈʹËüÃÇÔÚ¼ÓÃÜËíµÀÖ®Íâ·¢ËͺÍÎüÊÕ²¿·Ö»òËùÓÐÁ÷Á¿£¬£¬£¬£¬£¬£¬Ö¼ÔÚ±£»£»£»£»£»¤ÆäÃâÔâ¿ú̽»ò¸Ä¶¯¡£¡£¡£¡£Ñо¿Ö°Ô±½«Æä¹¥»÷ÃüÃûΪ TunnelVision£¬£¬£¬£¬£¬£¬½«´«ÈëºÍ´«³öµÄ»¥ÁªÍøÁ÷Á¿·â×°ÔÚ¼ÓÃÜËíµÀÖв¢Òþ²ØÓû§µÄ IP µØµã¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬µ±ËùÓÐ VPN Ó¦ÓóÌÐòÅþÁ¬µ½¶ñÒâÍøÂçʱ£¬£¬£¬£¬£¬£¬Ëü¶¼»áÓ°ÏìËüÃÇ£¬£¬£¬£¬£¬£¬²¢ÇÒ³ýÁ˵±Óû§µÄ VPN ÔÚ Linux »ò Android ÉÏÔËÐÐʱ֮Í⣬£¬£¬£¬£¬£¬Ã»ÓÐÆäËûÒªÁì¿ÉÒÔ±ÜÃâ´ËÀ๥»÷¡£¡£¡£¡£ËûÃÇ»¹ÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃǵĹ¥»÷ÊÖÒÕ¿ÉÄÜ×Ô 2002 ÄêÒÔÀ´¾ÍÒѳÉΪ¿ÉÄÜ£¬£¬£¬£¬£¬£¬²¢ÇÒ´ÓÄÇʱÆð¾ÍÒѾ±»·¢Ã÷²¢ÔÚÒ°ÍâʹÓᣡ£¡£¡£Ò»¶ÎÊÓÆµÑÝʾڹÊ͵À£¬£¬£¬£¬£¬£¬TunnelVision µÄЧ¹ûÊÇ¡°Êܺ¦ÕßµÄÁ÷Á¿ÏÖÔÚÒѱ»½Ò¿ª²¢Ö±½Óͨ¹ý¹¥»÷Õß¾ÙÐзÓÉ¡±¡£¡£¡£¡£¡°¹¥»÷Õß¿ÉÒÔ¶ÁÈ¡¡¢É¾³ý»òÐÞ¸Äй¶µÄÁ÷Á¿£¬£¬£¬£¬£¬£¬¶øÊܺ¦ÕßÔò¼á³ÖÓë VPN ºÍ»¥ÁªÍøµÄÅþÁ¬¡£¡£¡£¡£¡±
https://news.hitb.org/content/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose
3. αװ³ÉÖ¤ÊéµÄ LNK Îļþ·Ö·¢ RokRAT ¶ñÒâÈí¼þ
5ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬AhnLabÇå¾²Ç鱨ÖÐÐÄ£¨ASEC£©ÒÑÈ·ÈÏÒ»Á¬Èö²¥Òì³£¾ÞϸµÄ¿ì½Ý·½·¨Îļþ£¨*.LNK£©£¬£¬£¬£¬£¬£¬ÓÃÓÚÈö²¥ºóÃÅÀàÐ͵ĶñÒâÈí¼þ¡£¡£¡£¡£×î½üÈ·ÈϵĿì½Ý·½·¨Îļþ£¨*.LNK£©±»·¢Ã÷ÊÇÕë¶Ôº«¹úÓû§£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÓ볯ÏÊÓйصÄÓû§¡£¡£¡£¡£È·ÈϵÄLNKÎļþÃûÈçÏ£º¹ú¼ÒÐÅϢѧԺµÚ°ËÆÚ×ۺϿγÌÖ¤Ê飨×îÖÕ£©.lnk¡¢ÃŽûÃû²á2024.lnk¡¢¶«±±ÏîÄ¿£¨ÃÀ¹ú¹ú»áÑо¿Ð§ÀÍ´¦£¨CRS ±¨¸æ£©.lnkºÍÉèÊ©Çåµ¥.lnk¡£¡£¡£¡£ÒÑÈ·ÈϵÄLNKÎļþ°üÀ¨Í¨¹ýCMDÖ´ÐÐPowerShellµÄÏÂÁ£¬£¬£¬£¬£¬ÆäÀàÐÍÓëÈ¥ÄêÐû²¼µÄ¡°RokRAT Malware Distributed Through LNK Files (*.lnk): RedEyes (ScarCruft)¡± [1]Öз¢Ã÷µÄÀàÐÍÀàËÆ¡£¡£¡£¡£¹ØÓÚÕâÖÖÀàÐ͵ÄÒ»¸öÖµµÃ×¢ÖØµÄÊÂʵÊÇ£¬£¬£¬£¬£¬£¬ËüÔÚ LNK ÎļþÖаüÀ¨Õýµ±ÎĵµÎļþ¡¢¾ç±¾´úÂëºÍ¶ñÒâ PE Êý¾Ý¡£¡£¡£¡£
https://asec.ahnlab.com/en/65076/
4. 2023ÄêµÚÈý·½Ôì³ÉµÄÊý¾Ýй¶ÔöÌíÁË68%
5ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬½üÄêÀ´¹©Ó¦Á´Î¥¹æÊÂÎñÒ»Ö±³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£¡£Æ¾Ö¤ Verizon ×îеÄÊý¾Ýй¶ÊӲ챨¸æ (DBIR)£¬£¬£¬£¬£¬£¬½ü¼¸¸öÔÂÀ´ÕâÒ»ÔöÌíÓÈΪ¼±¾ç¡£¡£¡£¡£2023 ÄêËùÓÐÎ¥¹æÐÐΪÖÐÔ¼ÓÐ 15% Éæ¼°µÚÈý·½£¬£¬£¬£¬£¬£¬±È 2022 ÄêµÄ 9% ÏÔ×ÅÔöÌí¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬£¬ÕâЩÊý×ÖÓë»á¼ÆºÍ¹¥»÷µÄ¹ØÏµÍ¬ÑùÖ÷Òª¡£¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬£¬£¬£¬±»Ê¹ÓõÄÎó²îÊÇ DBIR ¹©Ó¦Á´Ö¸±êÖÐ×î³£¼ûµÄÊÂÎñ¼Í¼ºÍÊÂÎñ¹²Ïí (VERIS) ÐÐΪ´Ê»ã£¬£¬£¬£¬£¬£¬Æä´ÎÊǺóÃÅ/ÏÂÁîÓë¿ØÖÆ (C2) ºÍÀÕË÷¡£¡£¡£¡£Verizon ÍþвÇ鱨¸±×ܼà Alex Pinto ÌåÏÖ£ºÈ¥Ä꣬£¬£¬£¬£¬£¬ÔÚÀÕË÷Èí¼þÁìÓò£¬£¬£¬£¬£¬£¬ÎÒÃÇ¿´µ½£¬£¬£¬£¬£¬£¬ÎÞÂÛÊÇ×Ô¼ºÑо¿ÕվɹºÖ㬣¬£¬£¬£¬£¬[ÍþвÐÐΪÕß]ÒÑ¾ÕÆÎÕÁËÔÆÔÆ¶àµÄÁãÈÕÎó²î¡£¡£¡£¡£¹ØÓÚ DBIR ÍŶÓÀ´Ëµ£¬£¬£¬£¬£¬£¬½â¾ö¹ýʧ²»µ«½öÊÇÔÚ¹ýʧ·ºÆðʱ¾ÙÐÐÐÞ²¹¡£¡£¡£¡£ÕâÊǹØÓÚ×éÖ¯ÔõÑùÑ¡Ôñ¹©Ó¦É̲¢ÓëÆäÏàÖúµÄÎÊÌâ¡£¡£¡£¡£Ã»ÓÐ×éÖ¯¿ÉÒÔ×èÖ¹ËûÃÇʹÓõÄÈí¼þÖеÄÿ¸öDZÔÚÎó²î£¬£¬£¬£¬£¬£¬µ«¹©Ó¦ÉÌȷʵ¡°×ß©¡±ÁËijЩ¿ÉÄÜÅú×¢Æä¼ÛÖµµÄÐźš£¡£¡£¡£
https://www.darkreading.com/cyber-risk/supply-chain-breaches-up-68-yoy-according-to-dbir
5. TinyproxyÑÏÖØÎó²îµ¼ÖÂÁè¼Ý5Íǫ̀Ö÷»ú¿ÉÖ´ÐÐÔ¶³Ì´úÂë
5ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬90310 ̨Ö÷»úÖÐÁè¼Ý 50% ±»·¢Ã÷ÔÚ»¥ÁªÍøÉÏ̻¶ÁËTinyproxy ЧÀÍ£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÈÝÒ×Êܵ½ HTTP/HTTPS ÊðÀí¹¤¾ßÖÐδÐÞ²¹µÄÑÏÖØÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£¡£Æ¾Ö¤ Cisco Talos £¬£¬£¬£¬£¬£¬¸ÃÎÊÌâµÄ±àºÅΪCVE-2023-49606£¬£¬£¬£¬£¬£¬CVSS ÆÀ·ÖΪ 9.8 ·Ö£¨Âú·Ö 10 ·Ö£©£¬£¬£¬£¬£¬£¬¸ÃÎÊÌ⽫ÆäÐÎòΪӰÏì°æ±¾ 1.10.0 ºÍ 1.11.1 µÄÊͷźóʹÓùýʧ¡£¡£¡£¡£TalosÔÚÒ»·Ýͨ¸æÖÐÌåÏÖ£ºÌØÖÆµÄ HTTP ±êÍ·¿ÉÄܻᴥ·¢ÏÈǰÊͷŵÄÄÚ´æµÄÖØÓ㬣¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÄÚ´æË𻵲¢¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¹¥»÷ÕßÐèÒª·¢³öδ¾Éí·ÝÑéÖ¤µÄ HTTP ÇëÇó²Å»ª´¥·¢´ËÎó²î¡£¡£¡£¡£»£»£»£»£»»¾ä»°Ëµ£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÍþв¼ÓÈëÕß¿ÉÒÔ·¢ËÍÌØÖÆµÄHTTP ÅþÁ¬±êÍ·À´´¥·¢ÄÚ´æË𻵣¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£Æ¾Ö¤¹¥»÷ÃæÖÎÀí¹«Ë¾ Censys ¹²ÏíµÄÊý¾Ý£¬£¬£¬£¬£¬£¬×èÖ¹ 2024 Äê 5 Ô 3 ÈÕ£¬£¬£¬£¬£¬£¬ÔÚÏò¹«¹²»¥ÁªÍø¹ûÕæ Tinyproxy ЧÀ굀 90,310 ̨Ö÷»úÖУ¬£¬£¬£¬£¬£¬ÆäÖÐ 52,000 ̨£¨Ô¼ 57%£©ÔËÐÐ×ű£´æÎó²îµÄ Tinyproxy °æ±¾¡£¡£¡£¡£´ó´ó¶¼¿É¹ûÕæ»á¼ûµÄÖ÷»úλÓÚÃÀ¹ú£¨32,846£©¡¢º«¹ú£¨18,358£©¡¢Öйú£¨7,808£©¡¢·¨¹ú£¨5,208£©ºÍµÂ¹ú£¨3,680£©¡£¡£¡£¡£
https://thehackernews.com/2024/05/critical-tinyproxy-flaw-opens-over.html
6. ¶íÂÞ˹ BTC-e ¼ÓÃÜÇ®±ÒÉúÒâËùÔËÓªÉÌÈÏ¿ÉÏ´Ç®×ï
5ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÃÀ¹ú˾·¨²¿µÄÒ»·ÝÉùÃ÷£¬£¬£¬£¬£¬£¬Ò»¾ÊÇÌìÏÂÉÏ×î´óµÄÐéÄâÇ®±ÒÉúÒâËùÖ®Ò»µÄ¶íÂÞ˹ÔËÓªÉÌ BTC-e ÈϿɼÓÈëÏ´Ç®ÍýÏë¡£¡£¡£¡£44 ËêµÄÑÇÀúɽ´ó¡¤ÎÄÄá¿Ë (Alexander Vinnik) ÔÚ 2011 ÄêÖÁ 2017 Äêʱ´úÔËÓª BTC-e£¬£¬£¬£¬£¬£¬ØÊºó¸ÃЧÀͱ»Ö´·¨²¿·Ö¹Ø±Õ¡£¡£¡£¡£ÔÚ´Ëʱ´ú£¬£¬£¬£¬£¬£¬¸ÃÉúÒâËù´¦Öóͷ£ÁËÁè¼Ý 90 ÒÚÃÀÔªµÄÉúÒ⣬£¬£¬£¬£¬£¬²¢ÎªÈ«ÇòÁè¼Ý 100 ÍòÓû§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÖÚ¶àÃÀ¹ú¿Í»§¡£¡£¡£¡£Æ¾Ö¤·¨Í¥Îļþ£¬£¬£¬£¬£¬£¬×÷Ϊ²»·¨»î¶¯µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬Vinnik ͨ¹ý BTC-e Ôì³ÉÁËÖÁÉÙ 1.21 ÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£Ëû»¹ÔÚÈ«Çò¹æÄ£ÄÚÉèÁ¢ÁËÖÚ¶à¿Õ¿Ç¹«Ë¾ºÍ½ðÈÚÕË»§£¬£¬£¬£¬£¬£¬ÒÔÔÊÐí BTC-e ÎÞÐ轫¸Ãƽ̨ע²áΪǮ±ÒЧÀÍÓªÒµ¼´¿ÉÔËÓª¡£¡£¡£¡£Ó¦ÃÀ¹úÒªÇ󣬣¬£¬£¬£¬£¬ÎÄÄá¿Ë×î³õÓÚ 2017 ÄêÔÚÏ£À°±»²¶¡£¡£¡£¡£2020 Ä꣬£¬£¬£¬£¬£¬Ëû±»Òý¶Éµ½·¨¹ú£¬£¬£¬£¬£¬£¬ÍâµØ·¨ÔºÖ¸¿ØËûÈëÇÖÊýǧ¸öµç×ÓÓʼþÕÊ»§²¢ÏòÆäËùÓÐÕßÀÕË÷Ç®²Æ¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬Ëû±»Ç²·µ»ØÏ£À°£¬£¬£¬£¬£¬£¬È»ºó±»Òý¶Éµ½ÃÀ¹ú¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬¶íÂÞ˹»¹ÒªÇóÏ£À°Õþ¸®½«ÎÄÄá¿ËDzËͻعú£¬£¬£¬£¬£¬£¬ÒÔÖ¸¿ØËû·¸ÓнÏСµÄÚ²Æ×ï¡£¡£¡£¡£
https://therecord.media/btce-cryptocurrency-exchange-alexander-vinnik-money-laundering-guilty-plea


¾©¹«Íø°²±¸11010802024551ºÅ