µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÉèÖùýʧй¶280ÍòÌõ¼Í¼
Ðû²¼Ê±¼ä 2023-06-011¡¢µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÉèÖùýʧй¶280ÍòÌõ¼Í¼
¾ÝýÌå5ÔÂ30ÈÕ±¨µÀ£¬Ñо¿Ö°Ô±·¢Ã÷Á˵ç×ÓÉÌÎñ¹«Ë¾SimpleTireµÄÒ»¸ö²»ÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â¡£¸ÃÊý¾Ý¿â°üÀ¨2808697Ìõ¼Í¼£¬×ܼÆ1 TB¡£ÆäÖÐÓÐ1189151·ÝPDFÃûÌõĶ©µ¥È·ÈÏÎļþ£¬Éæ¼°ÐÕÃû¡¢µç»°¡¢µØµãºÍÐÅÓÿ¨ºÅµÈPIIÐÅÏ¢¡£ÔÚ¸ÃÊý¾Ý¿â±»·¢Ã÷µÄ3ÖܶàµÄʱ¼äÀËüÈÔÈ»¿É±»¹ûÕæ»á¼û¡£ÏÖÔÚ£¬Êý¾Ýй¶ÊÂÎñ¼òÖ±ÇÐʱ¼ä£¬ÒÔ¼°ÊÇ·ñÓй¥»÷Õß»á¼û¹ýËüÈÔȻδ֪¡£
https://www.hackread.com/simpletire-database-leak-records-exposed/
2¡¢Ñо¿Ö°Ô±ÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËƺóÃŵÄÐÐΪӰÏìÔ¼700Íǫ̀װ±¸
¾Ý5ÔÂ31ÈÕ±¨µÀ£¬¹Ì¼þÇå¾²¹«Ë¾EclypsiumÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËƺóÃŵÄÐÐΪ¡£Ñо¿Ö°Ô±ÔÚ4ÔÂÊ״μì²âµ½¸ÃÒì³£ÇéÐΣ¬ÒԺ󣬼¼¼Î¹«Ë¾½â¾öÁËÕâ¸öÎÊÌâ¡£¼¼¼ÎϵͳÖеĹ̼þ»áÔÚϵͳÆô¶¯Àú³ÌÖÐ×°Öò¢Ö´ÐÐWindowsÔÉú¿ÉÖ´ÐÐÎļþ¡£¸Ã¿ÉÖ´ÐÐÎļþÓÃÓÚ²»Çå¾²µØÏÂÔغÍÖ´ÐÐÌØÁíÍâpayload£¬ÕâÓëÆäËüÀàËÆOEMºóÃÅ£¨ÈçComputraceºóÃŵȣ©µÄÐÐΪÏàͬ¡£Ñо¿Ö°Ô±³Æ£¬¸ÃÈí¼þËƺõÊÇ×÷Ϊһ¸öÕýµ±µÄ¸üÐÂÓ¦ÓóÌÐò£¬¸ÃÎÊÌâ¿ÉÄÜ»áÓ°ÏìԼĪ364¸ö¼¼¼Îϵͳ£¬¼òªԤ¼ÆÉæ¼°700Íǫ̀װ±¸¡£
https://securityaffairs.com/146892/hacking/backdoor-like-behavior-gigabyte-systems.html
3¡¢Î¢ÈíÅû¶macOSÖпÉÈƹýSIP rootÏÞÖƵÄMigraineÎó²î
5ÔÂ30ÈÕ£¬Î¢ÈíÅû¶ÁËеÄmacOSÎó²îMigraine£¨CVE-2023-32369£©µÄÏêϸÐÅÏ¢¡£Ê¹ÓøÃÎó²î£¬ÓµÓÐrootȨÏ޵Ĺ¥»÷Õß¿Éͨ¹ýÀÄÓÃmacOSǨáãÖúÊÖ³ÌÐòÀ´ÈƹýϵͳÍêÕûÐÔ±£»¤£¨SIP£©£¬×°ÖÃ"²»¿Éɾ³ý"µÄ¶ñÒâÈí¼þ¡£ÈƹýSIP±£»¤»¹¿ÉÒÔÍêÈ«Èƹý͸Ã÷¡¢Ô޳ɺͿØÖÆ(TCC)Õ½ÂÔ£¬¹¥»÷Õß¿ÉÌæ»»TCCÊý¾Ý¿â²¢»ñµÃÄ¿µÄÊý¾ÝµÄÎÞÏÞÖÆ»á¼ûȨÏÞ¡£¸ÃÎó²îÒÑÔÚ5ÔÂ18ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´¡£
https://www.microsoft.com/en-us/security/blog/2023/05/30/new-macos-vulnerability-migraine-could-bypass-system-integrity-protection/
4¡¢Anonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾ÀÕË÷300ÍòÃÀÔª
ýÌå5ÔÂ30Èճƣ¬ºÚ¿ÍÍÅ»ïAnonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾(SAS)Ìá³öÁË300ÍòÃÀÔªµÄÊê½ðÒªÇó£¬ÒÔ×èÖ¹×Ô2ÔÂÒÔÀ´¶Ô¸Ãº½¿Õ¹«Ë¾ÍøÕ¾µÄDDoS¹¥»÷¡£Anonymous Sudan³ÆSAS¼°Æä·þÎñÒÑå´»úÁè¼ÝÎåÌì¡£¸ÃÍÅ»ïÒ»Ö±Ìá¸ßËûÃǵÄÊê½ð£¬´Ó×î³õµÄ3500ÃÀÔªÌá¸ßµ½¾ªÈ˵Ä300ÍòÃÀÔª¡£SASÒѶÔFacebookÉϵÄÓû§Í¶Ëß×ö³ö»ØÓ¦£¬ÈÏ¿ÉÆäÍøÕ¾±£´æÎÊÌ⣬²¢Ïò¿Í»§°ü¹ÜËûÃÇÕýÔÚÆð¾¢½â¾öÎÊÌâ¡£
https://therecord.media/hacker-group-anonymous-sudan-demands-three-million-from-sas
5¡¢´øÓжñÒâÄ£¿éSpinOkµÄAndroidÓ¦ÓÃÒѱ»×°ÖÃÁè¼Ý4ÒÚ´Î
Dr. WebÔÚ5ÔÂ29ÈÕ³ÆÆä·¢Ã÷Á˶à¸ö°üÀ¨SpinOkÄ£¿éµÄAndroidÓ¦Óã¬Òѱ»×°ÖÃÁè¼Ý421000000´Î¡£´ËÄ£¿é×÷ΪӪÏúSDK·Ö·¢£¬Í¨¹ýСÓÎÏ·¡¢Ê¹ÃüϵͳÒÔ¼°³é½±À´Î¬³ÖÓû§µÄÐËȤ¡£Ëü¿ÉÒÔÇÔÈ¡´æ´¢ÔÚÓû§Éè±¹ØÁ¬Ä˽ÈËÊý¾Ý²¢½«Æä·¢Ë͵½Ô¶³Ì·þÎñÆ÷¡£ÔÚºǫ́£¬Ä¾ÂíSDK»á¼ì²éAndroid×°±¸µÄ´«¸ÐÆ÷Êý¾Ý£¬ÒÔÈ·ÈÏËüÊÇ·ñÔÚɳºÐÖÐÔËÐС£Dr. WebÌåÏÖÔÚGoogle PlayÖеÄ101¸öÓ¦ÓóÌÐòÖз¢Ã÷Á˸ÃSDK£¬ÀÛ¼ÆÏÂÔØ421290300´Î£¬ÆäÖаüÀ¨Noizz£¨1ÒڴΣ©¡¢Zapya£¨1ÒڴΣ©ºÍVFly£¨5ÍòÍò´Î£©µÈ¡£ÏÖÔÚ£¬´ó²¿·ÖÓ¦ÓÃÒѱ»É¾³ý¡£
https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/
6¡¢Trend MicroÐû²¼¹ØÓÚRomCom½üÆÚÔ˶¯µÄÆÊÎö±¨¸æ
5ÔÂ30ÈÕ£¬Trend MicroÐû²¼Á˹ØÓÚRomCom½üÆÚ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£¹¥»÷ÕßÔÚ2022Äê12ÔÂÖÁ2023Äê4ÔÂð³äÕýµ±Èí¼þµÄÍøÕ¾£¬ÈçGimp¡¢Go To MeetingºÍChatGPTµÈ¡£ÕâЩαÔìµÄÍøÕ¾·Ö·¢µÄMSI×°ÖóÌÐò±»Ö²ÈëÁËÒ»¸ö¶ñÒâµÄDLLÎļþ£¨"InstallA.dll"£©£¬¸ÃÎļþ½«ÁíÍâÈý¸öDLLÌáÈ¡µ½Ä¿µÄµÄ%PUBLIC%\LibrariesÎļþ¼ÐÖС£¶Ô×îа汾RomCom payloadµÄÆÊÎöÅú×¢£¬¿ª·¢ÕßÔÚÆð¾¢ÊµÑé¸ü¶à¶ñÒâÏÂÁÆäÏÂÁîÊýÄ¿´Ó20ÌõÔöÌíµ½42Ìõ¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃVMProtectÈí¼þ¾ÙÐдúÂë±£»¤ºÍ·´VM¹¦Ð§¡£
https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html