COOKIE SPIDERµÄ¶ñÒâ¸æ°×Ͷ·ÅÁËSHAMOS macOS¶ñÒâÈí¼þ
°ä²¼¹¦·ò 2025-08-251. COOKIE SPIDERµÄ¶ñÒâ¸æ°×Ͷ·ÅÁËSHAMOS macOS¶ñÒâÈí¼þ
8ÔÂ23ÈÕ£¬£¬£¬ÍøÂ簲ȫ¹«Ë¾CrowdStrikeÅû¶ÁËһ·Õë¶ÔmacOSÓû§µÄ¹æÄ£»£»£»¯ÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬ÍøÂç·¸×ï×éÖ¯COOKIE SPIDERͨ¹ý¶ñÒâ¸æ°×Ͷ·ÅºÍGitHubαÔìÏîÄ¿£¬£¬£¬´«²¼¾ß±¸ÐÅÏ¢ÇÔÈ¡ÄÜÁ¦µÄÐÂÐͶñÒâÈí¼þSHAMOS£¨AMOS±äÖÖ£©¡£¡£¡£¸Ã×é֯ѡȡ"µ¥ÐкÅÁî"¼¼ÊõÈÆ¹ýmacOS Gatekeeper·À»¤»úÖÆ£¬£¬£¬ÓÕµ¼Óû§ÔÚÖÕ¶ËÖ´ÐжñÒâÖ¸Á£¬£¬ÊµÏÖÎÞÖÒ¸æ×°Öᣡ£¡£¹¥»÷Á´Ìõ³öÏÖ¶àά¶ÈÉøÈëÌØµã£º£º£ºÊ×ÏÈͨ¹ý²É°ìËÑË÷¸æ°×룬£¬£¬½«¼Ù×°³É"macOSˢнâÎöÆ÷»º´æ"µÈ³£¼û¼¼ÊõÎÊÌâ½â¾ö¹æ»®µÄÐéαԮÊÖÍøÕ¾ÍÆÖÁËÑË÷Á˾ÖǰÁУ¬£¬£¬ÓÕµ¼Óû§¸´ÖÆÖ´ÐÐÔ̺¬curlºÅÁîµÄÖÕ¶ËÖ¸Áî¡£¡£¡£¸ÃºÅÁî»áÏÂÔØBash¾ç±¾£¬£¬£¬ÇÔÈ¡KeychainÃÜÂë¡¢ä¯ÀÀÆ÷ƾ֤¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬²¢´ÓÔ¶³Ì·þÎñÆ÷¼ÓÔØSHAMOSÖ÷·¨Ê½¡£¡£¡£Æä´Î£¬£¬£¬¹¥»÷ÕßÀûÓÃGitHubƽ̨´´½¨Î±ÔìµÄiTerm2µÈ³ÛÃûÈí¼þ´æ´¢¿â£¬£¬£¬Í¨¹ýÏÕЩһÑùµÄÖ¸ÁîÓÕµ¼¿ª·¢ÕßÓû§Ö´ÐжñÒâ´úÂë¡£¡£¡£Õâ´Î¹¥»÷Ó°ÏìÁìÓò¸²¸ÇÈ«Çò300Óà¸ö¿Í»§»·¾³£¬£¬£¬Êܺ¦ÕßÉ¢²¼ÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾µÈ8¸ö¹ú¶È¡£¡£¡£SHAMOS²»½ö¾ß±¸»ù´¡ÐÅÏ¢ÇÔȡְÄÜ£¬£¬£¬»¹ÄÜÏÂÔØÎ±ÔìLedger LiveÇ®°üÀûÓü°½©Ê¬ÍøÂçÄ£¿é£¬£¬£¬ÏÔÖøÌáÉýÍþвµÈ¼¶¡£¡£¡£
https://hackread.com/cookie-spider-malvertising-new-shamos-macos-malware/
2. CPAPÒ½Áƹ«Ë¾ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬³¬9Íò»¼ÕßÐÅϢй¶
8ÔÂ22ÈÕ£¬£¬£¬·ðÂÞÀï´ïÖÝCPAPÒ½ÁÆÓÃÆ·ºÍ·þÎñ¹«Ë¾½üÈÕÅû¶һ·ӰÏ쳬9ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬¸Ã¹«Ë¾×¨ÃÅΪÃÀ¹úÎäÊ¿¼°Æä¾ìÊôÌṩ˯ÃߺôÎüÔÝÍ£Ò½ÖÎÉ豸¡£¡£¡£¾ÝÆä¹ÙÍø°ä²¼µÄ°²È«ÊÂÎñ²¼¸æ£¬£¬£¬2024Äê12ÔÂÖÐÑ®£¬£¬£¬¹¥»÷Õßͨ¹ý·¸·¨¼¿Á©ÇÖÈëÆäÍøÂçϵͳ£¬£¬£¬²¢³ÖÐøÂñ·ü³¬¹ýÒ»Öܹ¦·ò£¬£¬£¬ÆÚ¼ä¿ÉÄÜÇÔÈ¡ÁËÔ̺¬Éç»á°²È«ºÅÂë¡¢Êܱ£»£»£»¤½¡¿µÐÅÏ¢£¨PHI£©µÈÃô¸ÐÊý¾Ý¡£¡£¡£Õâ´ÎÊÂÎñÒѰ´Ë¾·¨ÒªÇóÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿£¨HHS£©¼°Öݼà¹Ü»ú¹¹±¨±¸¡£¡£¡£Ö»¹Üй¶¹æÄ£ÔÚÒ½ÁÆÐÐÒµ¶¯éüÊýÊ®Íò¡¢ÉϰÙÍòÈ˵ÄÊÂÎñÖÐÏà¶Ô½ÏС£¡£¡£¬£¬£¬µ«ÒòÆä·þÎñ¶ÔÏóµÄÌØÊâÐÔÒý·¢¹Ø×¢¡£¡£¡£CPAPÒ½Áƹ«Ë¾ÔÚÉêÃ÷ÖÐÇ¿µ÷£¬£¬£¬Ä¿Ç°ÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÐÅÏ¢Òѱ»ÀÄÓûò¼´½«±»ÀÄÓ㬣¬£¬µ«Î´Ã÷È·×¢Ã÷ÊÇ·ñÒÑÏòÊܺ¦ÕßÌṩÐÅÓþ¼à¿ØµÈ²¹¾È´ëÊ©¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬±¾´Î¹¥»÷δ±»ÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯ÈÏÁ죬£¬£¬ÒµÄÚ´§Ä¦´æÔÚÁ½ÖÖ¿ÉÄÜÐÔ£º£º£º¹¥»÷·½Îª²»¹«¿ªÊܺ¦ÕßÉí·ÝµÄÒñ±ÎÍþв×éÖ¯£¬£¬£¬»òCPAPÒÑÖ§¸¶Êê½ðÒÔ×èÖ¹Êý¾Ý¹«¿ª¡£¡£¡£Ö»¹ÜCPAP¹«Ë¾¹æÄ£ÓÐÏÞ£¬£¬£¬µ«Æä´¦ÖõÄÃÀÎäʿԱ½¡¿µÊý¾ÝÓµÓи߶ÈÃô¸ÐÐÔ£¬£¬£¬Éç»á°²È«ºÅÂëµÄй¶¿ÉÄÜΪÉí·Ý͵ÇԵȺóÐø·¸×ï´´ÖÆÇ°Ìá¡£¡£¡£
https://www.securityweek.com/cpap-medical-data-breach-impacts-90000-people/
3. ÃÀ¹úÊý°Ù¸öÊÐÕþ»ú¹¹Èí¼þ´æÔÚÑÏÖØÊý¾Ýй¶·ì϶
8ÔÂ21ÈÕ£¬£¬£¬¿¨ÄÍ»ù÷¡´óѧCERTе÷ÖÐÐÄ£¨CERT/CC£©½üÈÕÅû¶ÃÀ¹úÊý°Ù¸öÊÐÏØµÐÔÖʹÓõÄWorkhorse SoftwareÊÐÕþ¹ÜÕÊÈí¼þ´æÔÚÁ½¸öÑÏÖØÉè¼ÆÈ±µã£¬£¬£¬Óйطì϶ÔÚ³§ÉÌÐÞ¸´ºó²Å±»¹«¿ª¡£¡£¡£Õâ´ÎÊÂÎñÓÉSparrow IT Solutions×êÑÐԱղķ˹¡¤¹þÂ޵·¢ÏÖ£¬£¬£¬Ó°Ïì1.9.4.48019°æ±¾Ö®Ç°µÄÈí¼þϵͳ£¬£¬£¬Íþ˹¿µÐÇÖݵȵصÄÊÐÕþµ¥ÔªÃæ¶ÔÉç±£º£º£ºÅ¡¢²ÆÕþ¼Í¼µÈÃô¸ÐÐÅϢй¶·çÏÕ¡£¡£¡£·ì϶¼¼Êõϸ½ÚÏÔʾ£¬£¬£¬¸ÃÈí¼þ´æÔÚË«ÖØ°²È«Òþ»¼£º£º£ºÆäÒ»£¬£¬£¬SQL ServerÊý¾Ý¿âÏνÓÍ´´¦ÒÔÃ÷ÎÄ´ó¾Ö´æ´¢ÔÚ¿ÉÖ´ÐÐÎļþÅÔµÄÅäÖÃÎļþÖУ¬£¬£¬¸ÃĿ¼ͨ³£Î»ÓÚÓëÊý¾Ý¿â·þÎñÆ÷¹²ÏíµÄÍøÂçÎļþ¼ÐÄÚ¡£¡£¡£¹¥»÷ÕßÈôͨ¹ýÎïÀíÉ豸½Ó¼û¡¢¶ñÒâÈí¼þ¶ÁÈ¡ÍøÂç¹²ÏíÎļþ»òÉç»á¹¤³Ì¼¿Á©»ñȡϵͳÈë¿Ú£¬£¬£¬¼´¿ÉÖ±½ÓÇÔÈ¡Êý¾Ý¿âƾ֤¡£¡£¡£Æä¶þ£¬£¬£¬Èí¼þ"Îļþ"²Ëµ¥ÔÊÐíδµÇ¼Óû§´´½¨Î´¼ÓÃܵÄZIPÌåʽÊý¾Ý¿â±¸·Ý£¬£¬£¬ÌìÉúµÄ.bakÎļþ¿ÉÔÚÖ°ºÎSQL ServerÉÏÎÞÐèÃÜÂëÖ±½Ó»¹Ô£¬£¬£¬ÐγÉÊý¾ÝÍâйµÄÆëÈ«õè¾¶¡£¡£¡£CERT/CCÔÚ²¼¸æÖÐÇ¿µ÷£¬£¬£¬´ËÀàÉè¼ÆÈ±µã¿ÉÄܵ¼Ö¹¥»÷Õ߯ëÈ«»ñÈ¡ÊÐÕþÊý¾Ý¿â£¬£¬£¬²»½öÉæ¼°¹«ÃñÒþÖÔй¶£¬£¬£¬¸ü¿ÉÄܴ۸IJÆÕþÊý¾Ý¡¢·ÛËéÉó¼Æ×·ÒäÐÔ¼°ÏµÍ³ÆëÈ«ÐÔ¡£¡£¡£
https://securityaffairs.com/181363/security/us-cert-cc-warns-of-flaws-in-workhorse-software-accounting-software-used-by-hundreds-of-municipalities-in-wisconsin.html
4. ÷è÷ëÀÕË÷Èí¼þÐû³ÆÈëÇÖÈÕ²ú×Ó¹«Ë¾²¢ÇÔÈ¡4TBÉè¼ÆÊý¾Ý
8ÔÂ21ÈÕ£¬£¬£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯£¨ÓÖ³ÆAgenda£©½üÈÕÐû³Æ³É¹¦ÈëÇÖÈÕ²úÆû³µÎ»ÓÚ¶«¾©µÄÉè¼Æ×Ó¹«Ë¾ÈÕ²ú´´ÒâºÐ×Ó¹«Ë¾£¨CBI£©£¬£¬£¬²¢ÇÔÈ¡³¬¹ý4TBµÄÃô¸ÐÊý¾Ý£¬£¬£¬ÍþвÈô²»Âú×ãÆäÒªÇ󽫹«¿ªÎļþ¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾°ä²¼²¼¸æ£¬£¬£¬Ðû³Æ»ñÈ¡µÄÎļþÔ̺¬405,882¸öÉæ¼°Æû³µÉè¼ÆµÄ3DÄ£ÐÍ¡¢²ÆÕþÊý¾Ý¡¢VRÉè¼ÆÍ¼Ïñ¼°ÄÚ²¿Îĵµ£¬£¬£¬²¢¸½ÉÏËÄ·ÝʾÀýÎļþ×ôÖ¤Æä˵·¨¡£¡£¡£Ð¹Â¶µÄʾÀýÎļþÏÔʾ£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁËÈÕ²úÆû³µµÄ¸ß¾«¶ÈÉè¼ÆÊý¾Ý£º£º£ºÒ»·Ý±ê×¢¶à±ßÐÎÈý½ÇÐÎÊýÁ¿µÄ3D CADäÖȾͼ£¬£¬£¬Åú×¢Æä½Ó´¥ÁËÔÐÍÉè¼Æ½×¶ÎµÄÖ÷ÌâÊý¾Ý£»£»£»Ò»·ÝÈÕÓï²ÆÕþµç×Ó±í¸ñÔ̺¬ÏîÄ¿¹¦·ò±í¡¢³É±¾¹ÀËã¼°É«²Ê±àÂëµÄÔ¤Ëã¹æ»®£»£»£»»¹Óиßϸ½ÚÄÚÊÎäÖȾͼ¼°Ô±¹¤Ê¹ÓÃVRÉ豸²Ù×÷3DÉè¼ÆµÄÕÕÆ¬£¬£¬£¬½ÒʾÈÕ²ú½«Ðé¹¹ÏÖʵ¼¼ÊõÈÚÈëÉè¼ÆÁ÷³Ì¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬¾ºÕùµÐÊÖ»òÔì¼ÙÕß¿Éͨ¹ýÕâЩÎļþ½âÎöÈÕ²úµÄÉè¼ÆÁ÷³ÌÓëóÒ×»úÃÜ£¬£¬£¬¶ÔÆóÒµÔì³É³Ö¾Ã¾ºÕù·çÏÕ¡£¡£¡£½ØÖÁĿǰ£¬£¬£¬ÈÕ²úÆû³µÉÐδ¾ÍÊÂÎñ°ä²¼¹Ù·½ÉêÃ÷¡£¡£¡£
https://hackread.com/qilin-ransomware-gang-4tb-data-breach-nissan-cbi/
5. ¶íº¥¶íÒ½ÁÆÁªÃËÒ½ÓôóÂ黼ÕßÊý¾Ý¿âй¶
8ÔÂ21ÈÕ£¬£¬£¬ÍøÂ簲ȫ×êÑÐÔ±Jeremiah Fowler½üÈÕ·¢ÏÖ£¬£¬£¬¶íº¥¶íÒ½ÁÆÁªÃËÓÐÏÞÔðÈι«Ë¾£¨Ohio Medical Alliance LLC£¬£¬£¬Æ·ÅÆÃû¡°¶íº¥¶í´óÂ鿨¡±£©µÄÁ½¸öÅäÖÃÃýÎóµÄÊý¾Ý¿â´¦ÓÚÆëȫʢ¿ª×´Ì¬£¬£¬£¬Î´½øÐÐÈκμÓÃÜ»òÃÜÂë±£»£»£»¤£¬£¬£¬µ¼ÖÂÔ¼95.7ÍòÌõ»¼Õß¼°¹ØÁªÈËÔ±µÄÃô¸ÐÐÅÏ¢Ãæ¶Ôй¶·çÏÕ¡£¡£¡£¸ÃÊý¾Ý¿â×ÜÈÝÁ¿´ï323GB£¬£¬£¬Ô̺¬957,434±Ê¼Í¼£¬£¬£¬Éæ¼°ÐÕÃû¡¢Éç»á°²È«ºÅÂ루SSN£©¡¢µ®ÉúÈÕÆÚ¡¢¼Òͥסַ¡¢¼ÝÊ»ÅÆÕÕ¸ßÇåͼÏñµÈСÎÒÉí·ÝÐÅÏ¢£¬£¬£¬ÒÔ¼°ÈëÔº±í¸ñ¡¢Ò½ÉúÖ¤Ã÷¡¢´´É˺óÓ¦¼¤×è°£¨PTSD£©ºÍ½¹ÂÇÖ¢ÓйصÄÒ½ÁÆÆÀ¹ÀµÈ¸ß¶È˽ÃܵĽ¡¿µµµ°¸¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Êý¾Ý¿âÖл¹Ô̺¬ÒÔ»¼ÕßÐÕÃû¶¨ÃûµÄÎļþ¼Ð£¬£¬£¬ÄÚº¬PDFºÍͼÏñÌåʽµÄÒ½ÁÆÎļþ£»£»£»Ò»¸öÃûΪ¡°Ô±¹¤ÆÀÂÛ¡±µÄCSVÎļþÔò¼Í¼ÁËÄÚ²¿ÔËÓªÐÅÏ¢¡¢¿Í»§¸üÐÂÈÕÖ¾£¬£¬£¬ÒÔ¼°³¬¹ý21Íò¸ö»¼Õß¡¢Ô±¹¤¼°ÒµÎñºÏ×÷ͬ°éµÄµç×ÓÓʼþµØÖ·¡£¡£¡£Fowlerͨ¹ýWebsite Planet»ã±¨¸ÃÎÊÌâºó£¬£¬£¬Êý¾Ý¿â½Ó¼ûȨÏÞÔÚ´ÎÈÕ±»ÏÞ¶È£¬£¬£¬µ«¹«Ë¾Î´×÷³öÈκÎÖ±½Ó»ØÓ¦¡£¡£¡£
https://hackread.com/ssns-health-records-exposed-marijuana-patient-database/
6. CISA½«Æ»¹ûÁãÈÕ·ì϶CVE-2025-43300ÁÐÈëÒÑÖª±»ÀûÓ÷ì϶Ŀ¼
8ÔÂ22ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Æ»¹ûiOS¡¢iPadOS¼°macOSϵͳÖеÄÁãÈÕ·ì϶CVE-2025-43300ÄÉÈëÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê9ÔÂ11ÈÕǰʵÏÖÐÞ¸´¡£¡£¡£¸Ã·ì϶ÓÉÆ»¹û¹«Ë¾±¾ÖÜ´¹Î£ÐÞ¸´£¬£¬£¬Éæ¼°ImageIO¿ò¼ÜµÄÔ½½çдÈëȱµã£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕµ¼Óû§´¦ÖöñÒâͼÏñÎļþ´¥·¢ÄÚ´æ°Ü»µ£¬£¬£¬½ø¶øÖ´Ðи´ÔÓ¶¨Ïò¹¥»÷¡£¡£¡£Æ»¹û°²È«²¼¸æÈ·ÈÏ£¬£¬£¬CVE-2025-43300ÒÑÊÕµ½±»ÀûÓõĻ㱨£¬£¬£¬Æä¹¥»÷³¡¾°Õë¶ÔÌØ¶¨Ö¸±êÓû§£¬£¬£¬¾ß±¸¸ß¶ÈÕë¶ÔÐÔ¡£¡£¡£·ì϶³ÉÒòÔ´ÓÚͼÏñ´¦ÖÃÁ÷³ÌÖÐÌìǵ²é³²»³ä·Ö£¬£¬£¬µ¼Ö¶ñÒâ»ú¹ØµÄͼÏñÎļþ¿ÉÔ½½çдÈëÄÚ´æÇøÓò¡£¡£¡£Îª½â¾ö¸ÃÎÊÌ⣬£¬£¬Æ»¹ûͨ¹ýÇ¿»¯Ììǵ²é³»úÖÆ°ä²¼¶àƽ̨¸üС£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Æ»¹ûδ¹«¿ª·ì϶ÀûÓõļ¼Êõϸ½Ú£¬£¬£¬µ«Ç¿µ÷Õâ´ÎÐÞ¸´Õë¶Ô"¼«Æä¸´ÔӵĹ¥»÷"¡£¡£¡£Æ¾¾ÝCISAÓµÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD 22-01£©£¬£¬£¬Áª°î»ú¹¹ÐèÓÅÏÈ´¦ÖÃKEVĿ¼Öеķì϶£¬£¬£¬ÒÔ·À±¸Ç±ÔÚ¹ú¶È¼¶Íþв¡£¡£¡£
https://securityaffairs.com/181406/security/u-s-cisa-adds-apple-ios-ipados-and-macos-flaw-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ