Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý

°ä²¼¹¦·ò 2025-01-13

1. Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý


1ÔÂ9ÈÕ £¬´ÓǰÁ½¸öÔ £¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ³öÏÖÁËа汾 £¬Ñ¡È¡Apple XProtectµÄ×Ö·û´®¼ÓÃܼ¼ÊõÌӱܼì²â¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´·þÎñ £¬ÍøÂç·¸×ï·Ö×ÓÄܹ»¸¶·Ñ»ñµÃ¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶ £¬µ¼ÖÂÏîÄ¿¹Ø¹Ø £¬µ«Ò²ÎªÆäËû¿ª·¢ÈËÔ±ÌṩÁ˸Ľø»úÓö¡£Ð°汾ͨ¹ýÇÖÈÅ×Ö·û´®²¢ÔÚÖ´ÐÐÆÚ¼ä½âÃÜ £¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃܼ¼ÊõµÄµÍÒÉ»ó¶È £¬ÌÓ±ÜÁ˳߶Ⱦ²Ì¬¼ì²â²½Öè¡£BansheeÖØÒªÍ¨¹ýºýŪÐÔµÄGitHub´æ´¢¿â´«²¼ £¬Õë¶ÔmacOSÓû§ £¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¸Ã¶ñÒâÈí¼þµÄÖ¸±êÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý £¬ÈçÃÜÂëºÍË«³É·ÖÉí·ÝÑéÖ¤À©´ó £¬ÒÔ¼°ÍøÂçÖ÷»úµÄ¸ù»ùϵͳºÍÍøÂçÐÅÏ¢ £¬²¢ÌṩºýŪÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´ÖͰ­ £¬µ«Ô´´úÂëй¶ºó £¬¶à¸öÍøÂç´¹µö»î¶¯ÈÔÔÚ´«²¼¸Ã¶ñÒâÈí¼þ¡£


https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/


2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ £¬EverestÍŻﱻָΪĻºóºÚÊÖ


1ÔÂ11ÈÕ £¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâ·êÁËÒ»´ÎÑϳÁµÄÊý¾Ýй¶ÊÂÎñ £¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢À­Ã×´ïºÍεÂ˹ÍеêÆÌ²É°ì²úÆ·µÄ¹Ë¿ÍÓ×ÎÒÐÅÏ¢±»·¸·¨»ñÈ¡¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢´ºÇï¡¢µØÖ·µÈÓ×ÎÒ×ÊÁÏ £¬»¹ÓÐÂòÂôº¹ÇàµÈÃô¸ÐÐÅÏ¢¡£STIIIZYÔÚÍøÕ¾Éϰ䲼ÁËÎ¥¹æÍ¨Öª £¬²¢Ïò¼ÓÖݼà¹Ü»ú¹¹Ìá½»ÁËÓйØÎļþ¡£¾ÝϤ £¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸×OÍÅÌáÒéµÄ £¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕÆÚ¼äͨ¹ýÏúÊ۵㴦Ö÷þÎñ¹©¸øÉ̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£EverestÍøÂç·¸×ïÍÅ»ïÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü £¬²¢Ðû³ÆÇÔÈ¡ÁË422,075ÌõÓ×ÎҼͼ¡£Ö»¹Ü²¿Ãſͻ§»ñµÃÁËÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ £¬µ«·þÎñÆÚÏÞδ¹«¿ª¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö £¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÎÅÃû £¬ËûÃÇÉÆÓÚÀûÓÃÈõƾ֤¡¢Î´½¨²¹µÄ·ì϶ºÍÍøÂç´¹µö¹¥»÷µÈ¼¿Á©À´»ñȡδ¾­ÊÚȨµÄ½Ó¼ûȨÏÞ £¬²¢Í¨¹ý¼ÓÃÜͨѶÇþ·ºÍ°²È«²½ÖèÀ´¸²¸ÇÆä»î¶¯¡£


https://therecord.media/marijuana-dispensary-warns-of-data-breach


3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ £¬2.3GBÊý¾Ý±»µÁй¶


1ÔÂ10ÈÕ £¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ £¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ £¬²¿ÃÅÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾ £¬ÒÔMovistarÆ·ÅÆÔËÓª £¬ÒµÎñ±é¼°12¸ö¹ú¶È £¬Õ¼Óг¬¹ý104,000ÃûÔ±¹¤¡£¹¥»÷ÕßÀûÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñ·þÎñÆ÷ £¬¸Ã·þÎñÆ÷ÓÃÓڻ㱨ºÍ½â¾öÄÚ²¿ÎÊÌâ¡£¾Ý³Æ £¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢µ¥¾ÝºÍ¸÷ÀàÊý¾Ý £¬¹ÌȻһЩÊý¾Ý±»ÏóÕ÷Ϊ¿Í»§ £¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£Telef¨®nicaÒѲÉÈ¡±ØÒª´ëÊ©×èÖ¹ÈκÎδ¾­ÊÚȨµÄϵͳ½Ó¼û £¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉϳÁÖÃÁËÃÜÂë¡£Õâ´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌáÒéµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ± £¬¸ÃÍÅ»ïÔø³É¹¦ÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¹¥»÷Õß°µÊ¾ £¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ £¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£


https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/


4. ˹Âå·¥¿ËµØÆ¤µÇ¼Ç´¦Ôâ·êÊ·ÉÏ×î´óÍøÂç¹¥»÷


1ÔÂ11ÈÕ £¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ³½Ôâ·êÁ˺¹ÇàÉÏ×î´óµÄÍøÂç¹¥»÷ £¬Ö¸±êÊÇÕÆ¹ÜÖÎÀíµØÆ¤ºÍ²Æ¸»Êý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÔìͼºÍµØ¼®¾Ö(UGKK)¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø¹Ø £¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø¹Ø £¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£Å©Òµ²¿³¤°µÊ¾½«Í¨¹ý±¸·Ý¸´Ô­ÏµÍ³ £¬²¢±£ÕÏËùÓÐȨÊý¾ÝûÓиü¸Ä»òڲƭÐÔת¼µÄ·çÏÕ £¬µ«¸´Ô­¿ÉÄܱØÒªÊýÔ¹¦·ò¡£Õâ´Î¹¥»÷¶ÔÒÀÀµµØÆ¤µÇ¼ÇÊý¾ÝµÄÐÐÒµ²úÉúÁË¿í·ºÓ°Ïì £¬·¿µØ²úºÍµÖѺ´û¿îÊг¡ÏÝÈë̱»¾ £¬Óйع«¹²·þÎñÒ²ÎÞ·¨»ñµÃ¡£Í¬Ê± £¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÑÏÖØ´óÊÆÔÚ¼Ó¾ç £¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõ±í½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹ»áÉÌ´ËÊ¡£Õâ´Î¹¥»÷µÄ¾ßÌåÆðÔ´ÉÐδȷ¶¨ £¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£


https://therecord.media/slovakia-registry-cyberattack-land-agriculture


5. ProtonÈ«Çò·þÎñÖжϣºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö


1ÔÂ10ÈÕ £¬ÒþÖÔ±£»¤·þÎñÌṩÉÌProtonÖÜËÄÔâ·êÈ«ÇòÁìÓòµÄ´ó¹æÄ£·þÎñÖжÏ £¬Õâ´ÎÖжÏÊÇÓÉÓÚÔÚ½øÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿¹¦·òÉÏÎç10µã×óÓÒ £¬µ¼ÖÂÓû§ÎÞ·¨Ïνӵ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈ·þÎñ¡£ÊÜÓ°ÏìµÄÓû§ÔÚ³¢ÊÔÏνÓʱ»áÊÕµ½ÃýÎóÐÂÎÅ £¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¾­¹ýԼĪÁ½Ó×ʱµÄÖÂÁ¦ £¬ËùÓзþÎñÂ½Ðø¸´Ô­Õý³£ £¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó¸´Ô­µÄ·þÎñ¡£ProtonÔÚ¶ÔÊÂÎñ½øÐе÷²éºóй© £¬Õâ´ÎÖжÏÊÇÓÉÕ¾µã¿¿µÃסÐÔ¹¤³ÌÍŶӷ¢ÏÖµÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¸Ã¸ü¸ÄÏÞ¶ÈÁËÊý¾Ý¿â·þÎñÆ÷µÄÐÂÏνÓÊýÁ¿ £¬µ¼ÖÂÔÚÏνÓÓû§ÊýÁ¿¼±¾çÔö³¤Ê±³öÏÖ¸ºÔØ·åÖµ £¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¹ÌÈ»ProtonÕ¼ÓÐ×ã¹»µÄ¶î±íÈÝÁ¿À´´¦ÖÃÐÂÏνÓ £¬µ«ÏòKubernetesµÄǨáã±ØÒªÍ¬Ê±ÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ© £¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£Òò¶ø £¬ÔÚ¸´Ô­¹ý³ÌÖÐ £¬Óû§Óöµ½ÁË»úÄܽµÂäºÍ¼äЪÐÔ·þÎñ²»³ÉÓõÄÇé¿ö¡£


https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/


6. ÍøÂç·¸×ï·Ö×ÓÓÕÆ­Óû§³ÁÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓÖ´Ðд¹µö¹¥»÷


1ÔÂ12ÈÕ £¬ÍøÂç·¸×ï·Ö×Ó½üÆÚѡȡÁËÒ»ÖÖм¼ÇÉ £¬Í¨¹ýÓÕÆ­Óû§²Ù×÷ £¬¹Ø¹ØÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹µö±£»¤Ö°ÄÜ¡£Ëæ×ÅÒÆ¶¯É豸ÔÚÈÕ³£ÉúÑÄÖÐµÄ¿í·ºÀûÓà £¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹µö¹¥»÷µÄ³ÁµãÖ¸±ê¡£Îª±£»¤Óû§ £¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£È»¶ø £¬Æ»¹ûÖ¸³ö £¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˲ÎÓëÁªÏµÈËÁбí £¬ÕâЩÁ´½Ó¾Í»á±»³ÁÐÂÆôÓá£BleepingComputer¹Û²ìµ½ £¬½ü¼¸¸öÔÂÀ´ £¬¶ÌÐÅÍøÂç´¹µö¹¥»÷ÊýÁ¿ÏÔÖøÔö³¤ £¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´³ÁÐÂÆôÓÃÁ´½Ó¡£´ËÀà¶ÌÐÅͨ³£¼Ù×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶Â·Â·Í¨³©·ÑµÅ×Õ¶ü £¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£ÕâÖÖÕ½ÊõÀûÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò»Ø¾ø¶ÌÐŵÄÉúÀí £¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÖ¸±ê¡£¼´±ãδµã»÷Á´½Ó £¬»Ø¸´ÐÐΪ×ÔÉíÒ²»á¶³öÓû§µÄÒ׸ÐÐÔ £¬Ê¹ÆäÃæ¶Ô¸ü´ó·çÏÕ¡£Òò¶ø £¬Ãæ¶ÔÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ £¬Óû§Ó¦Î¬³Ö¾¯Ìè £¬Ö±½ÓÁªÏµÓйع«Ë¾»ò×éÖ¯½øÐÐÑéÖ¤ £¬¶ø·ÇµÈÏлظ´¡£³ö¸ñÊÇÀÏÄêÓû§ £¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹µöÐÅÏ¢µÄÖØÒªÖ¸±ê £¬ÐèÉóÉ÷¶Ô´ý £¬ÒÔÃâй¶Ó×ÎÒÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/