Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
°ä²¼¹¦·ò 2025-01-131. Banshee¶ñÒâÈí¼þÀûÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
1ÔÂ9ÈÕ£¬£¬£¬´ÓǰÁ½¸öÔ£¬£¬£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ³öÏÖÁËа汾£¬£¬£¬Ñ¡È¡Apple XProtectµÄ×Ö·û´®¼ÓÃܼ¼ÊõÌӱܼì²â¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´·þÎñ£¬£¬£¬ÍøÂç·¸×ï·Ö×ÓÄܹ»¸¶·Ñ»ñµÃ¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬£¬£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬£¬£¬µ«Ò²ÎªÆäËû¿ª·¢ÈËÔ±ÌṩÁ˸Ľø»úÓö¡£Ð°汾ͨ¹ýÇÖÈÅ×Ö·û´®²¢ÔÚÖ´ÐÐÆÚ¼ä½âÃÜ£¬£¬£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃܼ¼ÊõµÄµÍÒÉ»ó¶È£¬£¬£¬ÌÓ±ÜÁ˳߶Ⱦ²Ì¬¼ì²â²½Öè¡£BansheeÖØÒªÍ¨¹ýºýŪÐÔµÄGitHub´æ´¢¿â´«²¼£¬£¬£¬Õë¶ÔmacOSÓû§£¬£¬£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¸Ã¶ñÒâÈí¼þµÄÖ¸±êÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬£¬ÈçÃÜÂëºÍË«³É·ÖÉí·ÝÑéÖ¤À©´ó£¬£¬£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ¸ù»ùϵͳºÍÍøÂçÐÅÏ¢£¬£¬£¬²¢ÌṩºýŪÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´ÖͰ£¬£¬£¬µ«Ô´´úÂëй¶ºó£¬£¬£¬¶à¸öÍøÂç´¹µö»î¶¯ÈÔÔÚ´«²¼¸Ã¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/
2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬£¬£¬EverestÍŻﱻָΪĻºóºÚÊÖ
1ÔÂ11ÈÕ£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâ·êÁËÒ»´ÎÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢¡¢¡¢°¢ÀÃ×´ïºÍεÂ˹ÍеêÆÌ²É°ì²úÆ·µÄ¹Ë¿ÍСÎÒÐÅÏ¢±»·¸·¨»ñÈ¡¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬Éí·ÝÖ¤¡¢¡¢¡¢»¤ÕÕ¡¢¡¢¡¢Ò½ÓôóÂ鿨¡¢¡¢¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢¡¢¡¢´ºÇï¡¢¡¢¡¢µØÖ·µÈСÎÒ×ÊÁÏ£¬£¬£¬»¹ÓÐÂòÂôº¹ÇàµÈÃô¸ÐÐÅÏ¢¡£STIIIZYÔÚÍøÕ¾Éϰ䲼ÁËÎ¥¹æÍ¨Öª£¬£¬£¬²¢Ïò¼ÓÖݼà¹Ü»ú¹¹Ìá½»ÁËÓйØÎļþ¡£¾ÝϤ£¬£¬£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸×OÍÅÌáÒéµÄ£¬£¬£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕÆÚ¼äͨ¹ýÏúÊ۵㴦Ö÷þÎñ¹©¸øÉ̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£EverestÍøÂç·¸×ïÍÅ»ïÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬£¬£¬²¢Ðû³ÆÇÔÈ¡ÁË422,075ÌõСÎҼͼ¡£Ö»¹Ü²¿Ãſͻ§»ñµÃÁËÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ£¬£¬£¬µ«·þÎñÆÚÏÞδ¹«¿ª¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬£¬£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÎÅÃû£¬£¬£¬ËûÃÇÉÆÓÚÀûÓÃÈõƾ֤¡¢¡¢¡¢Î´ÐÞ²¹µÄ·ì϶ºÍÍøÂç´¹µö¹¥»÷µÈ¼¿Á©À´»ñȡδ¾ÊÚȨµÄ½Ó¼ûȨÏÞ£¬£¬£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍ°²È«²½ÖèÀ´¸²¸ÇÆä»î¶¯¡£
https://therecord.media/marijuana-dispensary-warns-of-data-breach
3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬2.3GBÊý¾Ý±»µÁй¶
1ÔÂ10ÈÕ£¬£¬£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬£¬£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬²¿ÃÅÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬£¬£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬£¬£¬ÒµÎñ±é¼°12¸ö¹ú¶È£¬£¬£¬Õ¼Óг¬¹ý104,000ÃûÔ±¹¤¡£¹¥»÷ÕßÀûÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñ·þÎñÆ÷£¬£¬£¬¸Ã·þÎñÆ÷ÓÃÓڻ㱨ºÍ½â¾öÄÚ²¿ÎÊÌâ¡£¾Ý³Æ£¬£¬£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢¡¢¡¢µ¥¾ÝºÍ¸÷ÀàÊý¾Ý£¬£¬£¬¹ÌȻһЩÊý¾Ý±»ÏóÕ÷Ϊ¿Í»§£¬£¬£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£Telef¨®nicaÒѲÉÈ¡±ØÒª´ëÊ©×èÖ¹ÈκÎδ¾ÊÚȨµÄϵͳ½Ó¼û£¬£¬£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£Õâ´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌáÒéµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬£¬£¬¸ÃÍÅ»ïÔø³É¹¦ÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¹¥»÷Õß°µÊ¾£¬£¬£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬£¬£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£
https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
4. ˹Âå·¥¿ËµØÆ¤µÇ¼Ç´¦Ôâ·êÊ·ÉÏ×î´óÍøÂç¹¥»÷
1ÔÂ11ÈÕ£¬£¬£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ³½Ôâ·êÁ˺¹ÇàÉÏ×î´óµÄÍøÂç¹¥»÷£¬£¬£¬Ö¸±êÊÇÕÆ¹ÜÖÎÀíµØÆ¤ºÍ²Æ¸»Êý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢¡¢¡¢ÖÆÍ¼ºÍµØ¼®¾Ö(UGKK)¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬£¬£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬£¬£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£Å©Òµ²¿³¤°µÊ¾½«Í¨¹ý±¸·Ý¸´Ôϵͳ£¬£¬£¬²¢±£ÕÏËùÓÐȨÊý¾ÝûÓиü¸Ä»òÚ²ÆÐÔת¼µÄ·çÏÕ£¬£¬£¬µ«¸´Ô¿ÉÄܱØÒªÊýÔ¹¦·ò¡£Õâ´Î¹¥»÷¶ÔÒÀÀµµØÆ¤µÇ¼ÇÊý¾ÝµÄÐÐÒµ²úÉúÁË¿í·ºÓ°Ï죬£¬£¬·¿µØ²úºÍµÖѺ´û¿îÊг¡ÏÝÈë̱»¾£¬£¬£¬Óйع«¹²·þÎñÒ²ÎÞ·¨»ñµÃ¡£Í¬Ê±£¬£¬£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÑÏÖØ´óÊÆÕýÔڼӾ磬£¬£¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹ»áÉÌ´ËÊ¡£Õâ´Î¹¥»÷µÄ¾ßÌåÆðÔ´ÉÐδȷ¶¨£¬£¬£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£
https://therecord.media/slovakia-registry-cyberattack-land-agriculture
5. ProtonÈ«Çò·þÎñÖжϣºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö
1ÔÂ10ÈÕ£¬£¬£¬ÒþÖÔ±£»£»£»¤·þÎñÌṩÉÌProtonÖÜËÄÔâ·êÈ«ÇòÁìÓòµÄ´ó¹æÄ£·þÎñÖжϣ¬£¬£¬Õâ´ÎÖжÏÊÇÓÉÓÚÕýÔÚ½øÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿¹¦·òÉÏÎç10µã×óÓÒ£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨Ïνӵ½ProtonµÄVPN¡¢¡¢¡¢Mail¡¢¡¢¡¢Calendar¡¢¡¢¡¢Drive¡¢¡¢¡¢PassºÍWalletµÈ·þÎñ¡£ÊÜÓ°ÏìµÄÓû§ÔÚ³¢ÊÔÏνÓʱ»áÊÕµ½ÃýÎóÐÂÎÅ£¬£¬£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¾¹ýԼĪÁ½Ð¡Ê±µÄÖÂÁ¦£¬£¬£¬ËùÓзþÎñÂ½Ðø¸´ÔÕý³££¬£¬£¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó¸´ÔµÄ·þÎñ¡£ProtonÔÚ¶ÔÊÂÎñ½øÐе÷²éºóй©£¬£¬£¬Õâ´ÎÖжÏÊÇÓÉÕ¾µã¿¿µÃסÐÔ¹¤³ÌÍŶӷ¢ÏÖµÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¸Ã¸ü¸ÄÏÞ¶ÈÁËÊý¾Ý¿â·þÎñÆ÷µÄÐÂÏνÓÊýÁ¿£¬£¬£¬µ¼ÖÂÔÚÏνÓÓû§ÊýÁ¿¼±¾çÔö³¤Ê±³öÏÖ¸ºÔØ·åÖµ£¬£¬£¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¹ÌÈ»ProtonÕ¼ÓÐ×ã¹»µÄ¶îÍâÈÝÁ¿À´´¦ÖÃÐÂÏνӣ¬£¬£¬µ«ÏòKubernetesµÄǨáã±ØÒªÍ¬Ê±ÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬£¬£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£Òò¶ø£¬£¬£¬ÔÚ¸´Ô¹ý³ÌÖУ¬£¬£¬Óû§Óöµ½ÁË»úÄܽµÂäºÍ¼äЪÐÔ·þÎñ²»³ÉÓõÄÇé¿ö¡£
https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/
6. ÍøÂç·¸×ï·Ö×ÓÓÕÆÓû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓÖ´Ðд¹µö¹¥»÷
1ÔÂ12ÈÕ£¬£¬£¬ÍøÂç·¸×ï·Ö×Ó½üÆÚѡȡÁËÒ»ÖÖм¼ÇÉ£¬£¬£¬Í¨¹ýÓÕÆÓû§²Ù×÷£¬£¬£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹µö±£»£»£»¤Ö°ÄÜ¡£Ëæ×ÅÒÆ¶¯É豸ÔÚÈÕ³£ÉúÑÄÖÐµÄ¿í·ºÀûÓ㬣¬£¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹µö¹¥»÷µÄÖØµãÖ¸±ê¡£Îª±£»£»£»¤Óû§£¬£¬£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£È»¶ø£¬£¬£¬Æ»¹ûÖ¸³ö£¬£¬£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˲ÎÓëÁªÏµÈËÁÐ±í£¬£¬£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓá£BleepingComputer¹Û²ìµ½£¬£¬£¬½ü¼¸¸öÔÂÀ´£¬£¬£¬¶ÌÐÅÍøÂç´¹µö¹¥»÷ÊýÁ¿ÏÔÖøÔö³¤£¬£¬£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£´ËÀà¶ÌÐÅͨ³£¼Ù×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶Â·Ïßͨ³©·ÑµÈµö¶ü£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£ÕâÖÖÕ½ÊõÀûÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò»Ø¾ø¶ÌÐŵÄÉúÀí£¬£¬£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÖ¸±ê¡£¼´±ãδµã»÷Á´½Ó£¬£¬£¬»Ø¸´ÐÐΪ×ÔÉíÒ²»á¶³öÓû§µÄÒ׸ÐÐÔ£¬£¬£¬Ê¹ÆäÃæ¶Ô¸ü´ó·çÏÕ¡£Òò¶ø£¬£¬£¬Ãæ¶ÔÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬£¬£¬Óû§Ó¦Î¬³Ö¾¯Ì裬£¬£¬Ö±½ÓÁªÏµÓйع«Ë¾»ò×éÖ¯½øÐÐÑéÖ¤£¬£¬£¬¶ø·ÇµÈÏлظ´¡£³ö¸ñÊÇÀÏÄêÓû§£¬£¬£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹µöÐÅÏ¢µÄÖØÒªÖ¸±ê£¬£¬£¬ÐèÉóÉ÷¶Ô´ý£¬£¬£¬ÒÔÃâй¶СÎÒÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/


¾©¹«Íø°²±¸11010802024551ºÅ