Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-01-13

1. Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý


1ÔÂ9ÈÕ£¬£¬£¬£¬£¬ÒÑÍùÁ½¸öÔ£¬£¬£¬£¬£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬£¬£¬£¬£¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃÜÊÖÒÕÌӱܼì²â¡£¡£¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´Ð§ÀÍ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£¡£¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬£¬£¬£¬£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬£¬£¬£¬£¬µ«Ò²ÎªÆäËû¿ª·¢Ö°Ô±ÌṩÁËË¢ÐÂʱ»ú¡£¡£¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐʱ´ú½âÃÜ£¬£¬£¬£¬£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃÜÊÖÒյĵÍÏÓÒɶȣ¬£¬£¬£¬£¬ÌÓ±ÜÁ˱ê×¼¾²Ì¬¼ì²âÒªÁì¡£¡£¡£BansheeÖ÷Ҫͨ¹ýÓÕÆ­ÐÔµÄGitHub´æ´¢¿âÈö²¥£¬£¬£¬£¬£¬Õë¶ÔmacOSÓû§£¬£¬£¬£¬£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÄ¿µÄÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬£¬£¬£¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬£¬£¬£¬£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬£¬£¬£¬£¬²¢ÌṩÓÕÆ­ÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£¡£¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´Õϰ­£¬£¬£¬£¬£¬µ«Ô´´úÂëй¶ºó£¬£¬£¬£¬£¬¶à¸öÍøÂç´¹ÂڻÈÔÔÚÈö²¥¸Ã¶ñÒâÈí¼þ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/


2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬EverestÍŻﱻָΪĻºóºÚÊÖ


1ÔÂ11ÈÕ£¬£¬£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢À­Ã×´ïºÍεÂ˹ÍеêËÁ¹ºÖòúÆ·µÄÖ÷¹ËСÎÒ˽¼ÒÐÅÏ¢±»²»·¨»ñÈ¡¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢ÄêËê¡¢µØµãµÈСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬£¬£¬ÉÐÓÐÉúÒâÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£¡£¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æÍ¨Öª£¬£¬£¬£¬£¬²¢Ïò¼ÓÖÝî¿Ïµ»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸·¨¼¯ÍÅÌᳫµÄ£¬£¬£¬£¬£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕʱ´úͨ¹ýÏúÊ۵㴦Öóͷ£Ð§À͹©Ó¦É̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£¡£¡£EverestÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË422,075ÌõСÎÒ˽¼Ò¼Í¼¡£¡£¡£Ö»¹Ü²¿·Ö¿Í»§»ñµÃÁËÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬µ«Ð§ÀÍÏÞÆÚδ¹ûÕæ¡£¡£¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬£¬£¬£¬£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÖøÃû£¬£¬£¬£¬£¬ËûÃÇÉÆÓÚʹÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄÎó²îºÍÍøÂç´¹ÂÚ¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾­ÊÚȨµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍÇå¾²ÒªÁìÀ´ÑÚÊÎÆä»î¶¯¡£¡£¡£


https://therecord.media/marijuana-dispensary-warns-of-data-breach


3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬2.3GBÊý¾Ý±»µÁй¶


1ÔÂ10ÈÕ£¬£¬£¬£¬£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬£¬£¬£¬£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬²¿·ÖÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£¡£¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬£¬£¬£¬£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬£¬£¬£¬£¬ÓªÒµÆÕ±é12¸ö¹ú¼Ò£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¡£¡£¹¥»÷ÕßʹÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñЧÀÍÆ÷£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÓÃÓÚ±¨¸æÏ¢Õù¾öÄÚ²¿ÎÊÌâ¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬£¬£¬£¬£¬ËäȻһЩÊý¾Ý±»±ê¼ÇΪ¿Í»§£¬£¬£¬£¬£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£¡£¡£Telef¨®nicaÒѽÓÄÉÐëÒª²½·¥×èÖ¹ÈκÎδ¾­ÊÚȨµÄϵͳ»á¼û£¬£¬£¬£¬£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¡£¡£¹¥»÷ÕßÌåÏÖ£¬£¬£¬£¬£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬£¬£¬£¬£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/


4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷


1ÔÂ11ÈÕ£¬£¬£¬£¬£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ¼äÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ä¿µÄÊÇÈÏÕæÖÎÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆÍ¼ºÍµØ¼®¾Ö(UGKK)¡£¡£¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬£¬£¬£¬£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬£¬£¬£¬£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£¡£¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬£¬£¬£¬£¬²¢°ü¹ÜËùÓÐȨÊý¾ÝûÓиü¸Ä»òڲƭÐÔת¼µÄΣº¦£¬£¬£¬£¬£¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£¡£¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ±¬·¢ÁËÆÕ±éÓ°Ï죬£¬£¬£¬£¬·¿µØ²úºÍµäÖÊ´û¿îÊг¡ÏÝÈë̱»¾£¬£¬£¬£¬£¬Ïà¹Ø¹«¹²Ð§ÀÍÒ²ÎÞ·¨»ñµÃ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÖ÷ÒªÊ±ÊÆÕýÔڼӾ磬£¬£¬£¬£¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£¡£¡£´Ë´Î¹¥»÷µÄÏêϸȪԴÉÐδȷ¶¨£¬£¬£¬£¬£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£¡£¡£


https://therecord.media/slovakia-registry-cyberattack-land-agriculture


5. ProtonÈ«ÇòЧÀÍÖÐÖ¹£ºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö


1ÔÂ10ÈÕ£¬£¬£¬£¬£¬Òþ˽±£» £»£»£»¤Ð§ÀÍÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò¹æÄ£µÄ´ó¹æÄ£Ð§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÕýÔÚ¾ÙÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£¡£¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬£¬£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨ÅþÁ¬µ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈЧÀÍ¡£¡£¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÅþÁ¬Ê±»áÊÕµ½¹ýʧÐÂÎÅ£¬£¬£¬£¬£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¡£¡£¾­ÓÉԼĪÁ½Ð¡Ê±µÄÆð¾¢£¬£¬£¬£¬£¬ËùÓÐЧÀÍÂ½Ðø»Ö¸´Õý³££¬£¬£¬£¬£¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄЧÀÍ¡£¡£¡£ProtonÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºó͸¶£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢Ã÷µÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¡£¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿âЧÀÍÆ÷µÄÐÂÅþÁ¬ÊýÄ¿£¬£¬£¬£¬£¬µ¼ÖÂÔÚÅþÁ¬Óû§ÊýÄ¿¼±¾çÔöÌíʱ·ºÆð¸ºÔØ·åÖµ£¬£¬£¬£¬£¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¡£¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌØÊâÈÝÁ¿À´´¦Öóͷ£ÐÂÅþÁ¬£¬£¬£¬£¬£¬µ«ÏòKubernetesµÄǨáãÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬£¬£¬£¬£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÔÚ»Ö¸´Àú³ÌÖУ¬£¬£¬£¬£¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔЧÀͲ»¿ÉÓõÄÇéÐΡ£¡£¡£


https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/


6. ÍøÂç·¸·¨·Ö×ÓÓÕÆ­Óû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵÑé´¹ÂÚ¹¥»÷


1ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬£¬£¬£¬£¬Í¨¹ýÓÕÆ­Óû§²Ù×÷£¬£¬£¬£¬£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹ÂÚ±£» £»£»£»¤¹¦Ð§¡£¡£¡£Ëæ×ÅÒÆ¶¯×°±¸ÔÚÒ»Ñùƽ³£ÉúÑÄÖÐµÄÆÕ±éÓ¦Ó㬣¬£¬£¬£¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷µÄÖØµãÄ¿µÄ¡£¡£¡£Îª±£» £»£»£»¤Óû§£¬£¬£¬£¬£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Æ»¹ûÖ¸³ö£¬£¬£¬£¬£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁÐ±í£¬£¬£¬£¬£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓᣡ£¡£BleepingComputerÊӲ쵽£¬£¬£¬£¬£¬½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬£¬¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷ÊýÄ¿ÏÔÖøÔöÌí£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£¡£¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶õ辶ͨÐзѵÈÓÕ¶ü£¬£¬£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£¡£¡£ÕâÖÖÕ½ÂÔʹÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬£¬£¬£¬£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿µÄ¡£¡£¡£×ÝȻδµã»÷Á´½Ó£¬£¬£¬£¬£¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬£¬£¬£¬£¬Ê¹ÆäÃæÁÙ¸ü´óΣº¦¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÃæÁÙÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬£¬£¬£¬£¬Óû§Ó¦¼á³ÖСÐÄ£¬£¬£¬£¬£¬Ö±½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬¶ø·ÇÈÝÒ׻ظ´¡£¡£¡£ÌØÊâÊÇÍíÄêÓû§£¬£¬£¬£¬£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹ÂÚÐÅÏ¢µÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬ÐèÉóÉ÷¿´´ý£¬£¬£¬£¬£¬ÒÔÃâй¶СÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£


https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/