Apple½ôÆȸüÐÂÐÞ¸´Òѱ»Ê¹ÓõÄÎó²îCVE-2023-37450
Ðû²¼Ê±¼ä 2023-07-111¡¢Apple½ôÆȸüÐÂÐÞ¸´Òѱ»Ê¹ÓõÄÎó²îCVE-2023-37450
¾ÝýÌå7ÔÂ10ÈÕ±¨µÀ£¬AppleÐû²¼ÁËÐÂÒ»ÂÖ¿ìËÙÇå¾²ÏìÓ¦(RSR)¸üУ¬ÒÔÐÞ¸´ÔÚ¹¥»÷Öб»Ê¹ÓõÄÎó²î£¨CVE-2023-37450£©¡£¸ÃÎó²îÊÇÔÚWebKitä¯ÀÀÆ÷ÒýÇæÖз¢Ã÷µÄ£¬Ó°ÏìÁËmacOS¡¢iOSºÍiPadOS¡£¹¥»÷Õß¿Éͨ¹ýÓÕÆÄ¿µÄ·¿ª°üÀ¨¶ñÒâÖÆ×÷ÄÚÈݵÄÍøÒ³£¬ÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£AppleÌåÏÖÒÑͨ¹ýˢмì²éÀ´ÐÞ¸´¸ÃÎó²î£¬½¨ÒéËùÓÐÓû§Ó¦Óøò¹¶¡¡£ÕâÊÇ×Ô2023ÄêÍ·ÒÔÀ´£¬AppleÐÞ¸´µÄµÚÊ®¸öÁãÈÕÎó²î¡£
https://www.bleepingcomputer.com/news/apple/apple-releases-emergency-update-to-fix-zero-day-exploited-in-attacks/
2¡¢ÃÀ¹ú·Òë·þÎñKings of Translationй¶ÊýÍòÌõ¼Í¼
¾Ý7ÔÂ7ÈÕ±¨µÀ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö²»ÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â£¬ÆäÖаüÀ¨Áè¼Ý25000Ìõ¼Í¼¡£Í¨¹ýÆäÖеIJο¼×ÊÁϺͷ¢Æ±£¬Ñо¿Ö°Ô±È·¶¨¸ÃÊý¾Ý¿âÊôÓÚŦԼ·Òë·þÎñÌṩÉÌKings of Translation¡£Ð¹Â¶Êý¾Ý°üÀ¨Ô´´úÂë½ØͼºÍ¿Í»§ÉÏ´«µÄÎĵµ£¬ÀýÈçË°ÎñÉ걨¡¢»¤ÕÕ¡¢¼ÝʻִÕÕ¡¢³öÉúºÍ»éÒö¼Í¼¡¢ÉÌÒµÎļþºÍÇ©Ö¤ÉêÇëµÈ¡£ÏÖÔÚ£¬¸ÃÊý¾Ý¿âÒѱ»±£»¤ÆðÀ´£¬Éв»ÇåÎúÔÚ´Ë֮ǰÒÑ̻¶Á˶à¾Ã¡£
https://www.hackread.com/global-translation-service-exposed-records/
3¡¢ºÚ¿ÍÉù³ÆÒÑÇÔÈ¡RazerµÄÔ´ÂëºÍÃÜÔ¿µÈÊý¾Ý²¢ÔÚ°µÍø³öÊÛ
ýÌå7ÔÂ8Èճƣ¬ºÚ¿ÍÔÚ°µÍøÒÔ10ÍòÃÀÔªµÄ¼ÛÇ®³öÊÛRazerµÄÊý¾Ý¡£¹¥»÷ÕßÔÚÌû×ÓÖÐÌáµ½£¬ËûÇÔÈ¡ÁËrazer.com¼°Æä²úÆ·µÄÔ´´úÂë¡¢¼ÓÃÜÃÜÔ¿¡¢Êý¾Ý¿âºÍºó¶Ë»á¼ûµÇ¼µÈÐÅÏ¢£¬²¢ÌåÏÖ¸ÃÊý¾Ý¿âÖ»»á³öÊÛÒ»´Î¡£±ðµÄ£¬Âô¼Ò¼á³ÖʹÓÃÖÐÐÄÈË£¬Õâͨ³£ÊǶÔÂò¼ÒºÍÂô¼ÒµÄ±£»¤ºÍ°ü¹Ü£¬¼´Õâ²»ÊÇÒ»¸öȦÌס£Ö¤Êµ°üÀ¨³¤´ï580Ò³µÄÎļþÊ÷ÒÔ¼°²î±ðĿ¼ÏÂÎļþ¼ÐµÄ½ØÆÁ¡£RazerÉÐδ¶Ô´ËÊÂ×ö³ö»Ø¸´¡£
https://www.databreaches.net/intellectual-property-allegedly-from-razer-appears-for-sale-on-hacking-forum/
4¡¢MOVEitÐÞ¸´ÓÖÒ»¸öSQL×¢ÈëÎó²îCVE-2023-36934
7ÔÂ7ÈÕ±¨µÀ³Æ£¬ProgressÔÚÆä²úÆ·MOVEit TransferÖÐÓÖ·¢Ã÷ÁËÒ»¸öÑÏÖصÄSQL×¢ÈëÎó²î£¨CVE-2023-36934£©¡£Ê¹ÓôËÎó²î£¬¹¥»÷Õß¿Éͨ¹ýÏòMOVEit TransferÓ¦ÓÃÌá½»ÌØÖƵÄpayload£¬À´µ¼ÖÂMOVEitÊý¾Ý¿âÄÚÈݸĶ¯ºÍй¶¡£Çå¾²¸üл¹ÐÞ¸´ÁËSQL×¢ÈëÎó²î£¨CVE-2023-36932£©ºÍ¿Éµ¼Ö³ÌÐòÒâÍâÖÕÖ¹µÄÎó²î£¨CVE-2023-36933£©¡£±ðµÄ£¬ProgressÒѾöÒéÍƳöÿÔÂÐû²¼µÄ°´ÆÚÇå¾²¸üУ¬³ÆΪ"Service Packs"¡£Õâ¿ÉÒÔ¼ò»¯Èí¼þÉý¼¶Àú³Ì£¬Ê¹ÖÎÀíÔ±Äܹ»¸ü¿ì¸üÇáËɵØÓ¦ÓÃÐÞ¸´³ÌÐò¡£
https://securityaffairs.com/148252/security/moveit-transfer-critical-flaw.html
5¡¢Ñо¿Ö°Ô±Åû¶Õë¶Ôº«¹úµÄÓïÒô´¹ÂÚ¹¤¾ß¼¯Letscall
ThreatFabricÔÚ7ÔÂ7ÈÕÅû¶ÁËȫеÄÓïÒô´¹ÂÚ¹¤¾ß¼¯Letscall¡£´Ë´Î¹¥»÷Ô˶¯Ö÷ÒªÕë¶Ôº«¹úµÄÓû§£¬½ÓÄɶà½×¶Î¹¥»÷À´ÓÕʹĿµÄ´Óð³äGoogle PlayÊÐËÁµÄ´¹ÂÚÍøÕ¾ÏÂÔضñÒâÓ¦Óá£Ò»µ©×°ÖÃÁ˶ñÒâÈí¼þ£¬Ëü¾Í»áδÀ´µçÖض¨Ïòµ½¹¥»÷Õߵĺô½ÐÖÐÐÄ¡£¾ÓÉѵÁ·µÄÔËÓªÖ°Ô±»áð³äÒøÐÐÔ±¹¤£¬È»ºó´ÓºÁÎÞ½äÐĵÄÄ¿µÄÄÇÀï»ñÈ¡Ãô¸ÐÐÅÏ¢¡£ÎªÁËÀû±ãÓïÒôÁ÷Á¿µÄ·ÓÉ£¬LetscallʹÓÃÁËVOIPºÍWebRTCµÈÊÖÒÕ£¬»¹Ê¹ÓÃÁËSTUNºÍTURNÐÒé¡£
https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset
6¡¢ESET¼òÊöEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷Ô˶¯
7ÔÂ6ÈÕ£¬ESET¼òÊöÁËEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷Ô˶¯¡£2021Äê1Ô£¬ÔÚ¶à¸ö¹ú¼ÒÖ´·¨²¿·ÖµÄе÷ÏÂÀֳɵ·»ÙÁËEmotet£¬µ«ºóÕßÔÚ2021Äê11ÔÂÔٴλع顣2022ÄêÍ·£¬EmotetÖ´ÐÐÁ˶à¸öÀ¬»øÓʼþÔ˶¯¡£2022Äê7Ô£¬Î¢Èí½ûÓÃVBAºêµ¼ÖÂEmotetÔ˶¯ÏÔ×ÅϽµ¡£2023Ä꣬Emotet¿ªÕ¹ÁËÈý´Î¹¥»÷Ô˶¯£¬Ê¹ÓÃÁËǶÈë¶ñÒâVBAºêµÄWordÎļþºÍǶÈëVBScriptµÄOneNoteÎļþµÈ¡£ÕâЩ¹¥»÷´ó¶àÕë¶ÔÈÕ±¾(43%)ºÍÒâ´óÀû(13%)¡£Ñо¿Ö°Ô±³Æ£¬ÏÖÔÚEmotet²»»îÔ¾£¬ºÜ¿ÉÄÜÊÇÓÉÓÚδÄÜÕÒµ½ÓÐÓõÄй¥»÷ÔØÌå¡£
https://www.welivesecurity.com/2023/07/06/whats-up-with-emotet/