AppleÐû²¼½ôÆȸüÐÂÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-42824
Ðû²¼Ê±¼ä 2023-10-071¡¢AppleÐû²¼½ôÆȸüÐÂÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-42824
¾ÝýÌå10ÔÂ4ÈÕ±¨µÀ£¬AppleÐû²¼Á˽ôÆÈÇå¾²¸üУ¬À´ÐÞ¸´Ó°ÏìiPhoneºÍiPadµÄÒѱ»Ê¹ÓÃÎó²î¡£ÕâÊDZ£´æÓÚÄÚºËÖеÄȨÏÞÌáÉýÎó²î£¨CVE-2023-42824£©£¬iOS 16.6֮ǰµÄ°æ±¾¶¼¿ÉÄÜÊÜ´ËÎó²îµÄÓ°Ï죬ÉÐδÐû²¼¹¥»÷ÕßÉí·Ý¡£ÕâÊÇ×ÔÄêÍ·ÒÔÀ´ÐÞ¸´µÄµÚ17¸ö±»Ê¹ÓÃÎó²î¡£±ðµÄ£¬´Ë´Î¸üл¹ÐÞ¸´ÁËWebRTCÖеĻº³åÇøÒç³öÎó²î£¨CVE-2023-5217£©£¬¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£
https://securityaffairs.com/151968/hacking/apple-zero-days-2.html
2¡¢»ùÒò¼ì²â¹«Ë¾23andMeÔ⵽ײ¿â¹¥»÷Êý°ÙÍòÓû§ÐÅϢй¶
¾Ý10ÔÂ6ÈÕ±¨µÀ£¬ºÚ¿ÍÉù³Æ´Ó23andMeÇÔÈ¡ÁËÖÁÉÙ700ÍòÓû§µÄÊý¾Ý£¬²¢ÔÚBreachedºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£×î³õ¹¥»÷ÕßÐû²¼ÁË100ÍòÐеÂÒáÓÌÌ«È˵ÄÊý¾Ý£¬ÔÚ10ÔÂ4ÈÕÓÖÌá³öÒÔÿ¸ö23andMeÕË»§1-10ÃÀÔªµÄ¼ÛÇ®ÅúÁ¿³öÊÛÊý¾Ý×ÊÁÏ£¬Ïêϸ¼ÛǮȡ¾öÓÚ¹ºÖÃÊýÄ¿¡£23andMe½«´Ë´Îй¶¹éÒòÓÚײ¿â¹¥»÷£¬²¢ÌåÏÖËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷¡£Ñо¿Ö°Ô±½¨Ò飬Óû§Ó¦×èÖ¹Öظ´Ê¹ÓÃͳһ¸öÃÜÂë¡£
https://www.hackread.com/hacker-claims-dna-service-23andme-users-data/
3¡¢Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½¹¥»÷µ¼Ö·þÎñÔÝʱÖÐÖ¹
ýÌå10ÔÂ5Èճƣ¬Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½ÍøÂç¹¥»÷µ¼ÖÂÆä·þÎñÒâÍâÖÐÖ¹£¬¿ÉÄÜ»¹»áΣ¼°¿Í»§Êý¾Ý¡£¸Ã¹«Ë¾Îª60¸ö¹ú¼ÒÌṩÒƶ¯µçÐźÍÓïÒôIP(VoIP)·þÎñ£¬¹¥»÷±¬·¢ÔÚÖÜÄ©£¬Ó°ÏìÁ˳ýÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÎÚ¿ËÀ¼ºÍÍ»Äá˹֮ÍâµÄËùÓйú¼Ò¡£ÏêϸÀ´Ëµ£¬¿Í»§ºÍÁãÊÛÉ̳ÆÎÞ·¨»á¼û¸Ã¹«Ë¾µÄ³äÖµÃÅ»§£¬º£Äں͹ú¼Êºô½Ð·þÎñÒ²±£´æÎÊÌâ¡£Lyca³ÆÆäÖ÷ҪʹÃüÊÇÈ·±£¿Í»§Êý¾ÝµÄÇå¾²£¬ÏÖÔÚÕýÔÚÊÓ²ìÊÇ·ñÓÐСÎÒ˽¼ÒÐÅϢй¶£¬²¢ÌåÏÖËùÓмͼ¶¼ÊÇÍêÈ«¼ÓÃܵġ£
https://therecord.media/cyberattack-on-lyca-stops-calls
4¡¢EclecticIQÅû¶ÒǪ̂»ýµçΪÓÕ¶üÕë¶Ô°ëµ¼ÌåÐÐÒµµÄ¹¥»÷
EclecticIQÔÚ10ÔÂ5ÈÕÅû¶ÁËÕë¶Ô¶«ÑÇ°ëµ¼ÌåÐÐÒµµÄÌع¤Ô˶¯¡£¹¥»÷ÕßʹÓÃÒǪ̂»ýµçΪÖ÷ÌâµÄÓÕ¶ü£¬·Ö·¢ÁËHyperBro¼ÓÔسÌÐò£¬ÒÔÔÚ±»Ñ¬È¾µÄ×°±¸ÉÏ×°ÖÃCobalt Strike beacon£¬´Ó¶ø¾ÙÐÐÔ¶³Ì»á¼û¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÒ»¸ö¶ñÒâÈí¼þÏÂÔسÌÐò£¬ËüʹÓÃPowerShellÖеÄBitsTransferÄ£¿é£¬´Ó¿ÉÄÜÊDZ»ÈëÇÖµÄCobra DocGuard·þÎñÆ÷ÉÏ»ñÈ¡¶ñÒâ¶þ½øÖÆÎļþ¡£±»ÈëÇÖµÄCobra DocGuard·þÎñÆ÷ÉÏÍйÜÁËÒ»¸ö»ùÓÚGOµÄºóÃÅ"ChargeWeapon"£¬¿ÉÄÜÓÉͳһ¹¥»÷ÕßÓÚ8ÔÂ21ÈÕÉÏ´«¡£
https://blog.eclecticiq.com/chinese-state-sponsored-cyber-espionage-activity-targeting-semiconductor-industry-in-east-asia
5¡¢ESET·¢Ã÷ʹÓÃDinodasRAT¹¥»÷¹çÑÇÄÇijÕþ¸®»ú¹¹µÄÔ˶¯
10ÔÂ5ÈÕ£¬ESET³ÆÆä·¢Ã÷ÁËÕë¶Ô¹çÑÇÄÇijÕþ¸®»ú¹¹µÄ¹¥»÷Ô˶¯Operation Jacana¡£¸ÃÔ˶¯ÓÚ½ñÄê2Ô·ݱ»¼ì²âµ½£¬ËüÉæ¼°µ½Óã²æʽÍøÂç´¹ÂÚ¹¥»÷£¬·Ö·¢ÁËÓÉC++¿ª·¢µÄкóÃÅDinodasRAT¡£DinodasRATʹÓÃTiny¼ÓÃÜËã·¨(TEA)¶ÔÆä·¢Ë͵½C&CµÄÐÅÏ¢¾ÙÐмÓÃÜ£¬¿ÉÇÔÈ¡Îļþ¡¢¿ØÖÆWindows×¢²á±íÏîºÍÖ´ÐÐCMDÏÂÁîµÈ¡£³ýÁËDinodasRAT Ö®Í⣬¹¥»÷Õß»¹Ê¹ÓÃÁËKorplug£¬¸Ã¹¤¾ßͨ³£ÓëMustang PandaµÈÍÅ»ïÓйء£
https://www.welivesecurity.com/en/eset-research/operation-jacana-spying-guyana-entity/
6¡¢Group-IB¼ì²âµ½Õë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄľÂíGoldDigger
10ÔÂ5ÈÕ£¬Group-IBÐû²¼Á˹ØÓÚÐÂAndroidľÂíGoldDiggerµÄÆÊÎö±¨¸æ¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô6ÔÂÆð¾ÍÒ»Ö±»îÔ¾£¬Õë¶Ô50¶à¸öÔ½ÄϵÄÒøÐС¢µç×ÓÇ®°üºÍ¼ÓÃÜÇ®°üÓ¦ÓóÌÐò¡£GoldDiggerð³äÁËÔ½ÄÏÕþ¸®ÃÅ»§ÍøÕ¾ºÍÍâµØÄÜÔ´¹«Ë¾£¬Ö÷ҪĿµÄÊÇÇÔÈ¡ÒøÐÐƾ֤¡£Óм£ÏóÅú×¢£¬¸ÃÔ˶¯¿ÉÄÜ»áÀ©´óµ½Õû¸öÑÇÌ«µØÇøºÍÎ÷°àÑÀÓï¹ú¼Ò¡£¸ÃľÂí»¹Ê¹ÓÃÁËÖØ´óµÄ±£»¤»úÖÆ£¬Ê¹ÓÃÕýµ±Èí¼þVirbox ProtectorÈƹý¼ì²â¡£
https://www.group-ib.com/blog/golddigger-fraud-matrix/