Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-01-131. Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
1ÔÂ9ÈÕ£¬ÒÑÍùÁ½¸öÔ£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃÜÊÖÒÕÌӱܼì²â¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´·þÎñ£¬ÍøÂç·¸·¨·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬µ«Ò²ÎªÆäËû¿ª·¢Ö°Ô±ÌṩÁËË¢ÐÂʱ»ú¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐʱ´ú½âÃÜ£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌض¨¼ÓÃÜÊÖÒյĵÍÏÓÒɶȣ¬ÌÓ±ÜÁ˱ê×¼¾²Ì¬¼ì²âÒªÁì¡£BansheeÖ÷Ҫͨ¹ýÓÕÆÐÔµÄGitHub´æ´¢¿âÈö²¥£¬Õë¶ÔmacOSÓû§£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¸Ã¶ñÒâÈí¼þµÄÄ¿µÄÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬²¢ÌṩÓÕÆÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´ÕÏ°£¬µ«Ô´´úÂëй¶ºó£¬¶à¸öÍøÂç´¹ÂÚÔ˶¯ÈÔÔÚÈö²¥¸Ã¶ñÒâÈí¼þ¡£
https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/
2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬EverestÍŻﱻָΪĻºóºÚÊÖ
1ÔÂ11ÈÕ£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖصÄÊý¾Ýй¶ÊÂÎñ£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢ÀÃ×´ïºÍĪµÂ˹ÍеêËÁ¹ºÖòúÆ·µÄÖ÷¹ËСÎÒ˽¼ÒÐÅÏ¢±»²»·¨»ñÈ¡¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕƬÒÔ¼°ÐÕÃû¡¢ÄêËê¡¢µØµãµÈСÎÒ˽¼Ò×ÊÁÏ£¬ÉÐÓÐÉúÒâÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æ֪ͨ£¬²¢Ïò¼ÓÖÝî¿Ïµ»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¾ÝϤ£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸·¨¼¯ÍÅÌᳫµÄ£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕʱ´úͨ¹ýÏúÊ۵㴦Öóͷ£·þÎñ¹©Ó¦É̵Äϵͳ»ñÈ¡ÁË¿Í»§ÐÅÏ¢¡£EverestÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕ棬²¢Éù³ÆÇÔÈ¡ÁË422,075ÌõСÎÒ˽¼Ò¼Í¼¡£Ö»¹Ü²¿·Ö¿Í»§»ñµÃÁËÃâ·ÑÐÅÓüà¿Ø·þÎñ£¬µ«·þÎñÏÞÆÚδ¹ûÕæ¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õ߶øÖøÃû£¬ËûÃÇÉÆÓÚʹÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄÎó²îºÍÍøÂç´¹ÂÚ¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾ÊÚȨµÄ»á¼ûȨÏÞ£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍÇå¾²ÒªÁìÀ´ÑÚÊÎÆäÔ˶¯¡£
https://therecord.media/marijuana-dispensary-warns-of-data-breach
3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬2.3GBÊý¾Ý±»µÁй¶
1ÔÂ10ÈÕ£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬²¿·ÖÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬ÓªÒµÆÕ±é12¸ö¹ú¼Ò£¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¹¥»÷ÕßʹÓÃ鶵ÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñ·þÎñÆ÷£¬¸Ã·þÎñÆ÷ÓÃÓÚ±¨¸æÏ¢Õù¾öÄÚ²¿ÎÊÌâ¡£¾Ý³Æ£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬ËäȻһЩÊý¾Ý±»±ê¼ÇΪ¿Í»§£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£Telef¨®nicaÒѽÓÄÉÐëÒª²½·¥×èÖ¹ÈκÎδ¾ÊÚȨµÄϵͳ»á¼û£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©Ä͵µçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¹¥»÷ÕßÌåÏÖ£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£
https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷
1ÔÂ11ÈÕ£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ¼äÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬Ä¿µÄÊÇÈÏÕæÖÎÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆͼºÍµØ¼®¾Ö(UGKK)¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬²¢°ü¹ÜËùÓÐȨÊý¾ÝûÓиü¸Ä»òÚ²ÆÐÔת¼µÄΣº¦£¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ±¬·¢ÁËÆÕ±éÓ°Ï죬·¿µØ²úºÍµäÖÊ´û¿îÊг¡ÏÝÈë̱»¾£¬Ïà¹Ø¹«¹²·þÎñÒ²ÎÞ·¨»ñµÃ¡£Í¬Ê±£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÖ÷ҪʱÊÆÕýÔڼӾ磬˹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£´Ë´Î¹¥»÷µÄÏêϸȪԴÉÐδȷ¶¨£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£
https://therecord.media/slovakia-registry-cyberattack-land-agriculture
5. ProtonÈ«Çò·þÎñÖÐÖ¹£ºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö
1ÔÂ10ÈÕ£¬Òþ˽±£»¤·þÎñÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò¹æÄ£µÄ´ó¹æÄ£·þÎñÖÐÖ¹£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÕýÔÚ¾ÙÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬µ¼ÖÂÓû§ÎÞ·¨ÅþÁ¬µ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈ·þÎñ¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÅþÁ¬Ê±»áÊÕµ½¹ýʧÐÂÎÅ£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¾ÓÉԼĪÁ½Ð¡Ê±µÄÆð¾¢£¬ËùÓзþÎñ½Ðø»Ö¸´Õý³££¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄ·þÎñ¡£ProtonÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºó͸¶£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢Ã÷µÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿â·þÎñÆ÷µÄÐÂÅþÁ¬ÊýÄ¿£¬µ¼ÖÂÔÚÅþÁ¬Óû§ÊýÄ¿¼±¾çÔöÌíʱ·ºÆð¸ºÔØ·åÖµ£¬½ø¶øʹ»ù´¡ÉèÊ©³¬¸ººÉ¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌØÊâÈÝÁ¿À´´¦Öóͷ£ÐÂÅþÁ¬£¬µ«ÏòKubernetesµÄǨáãÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£Òò´Ë£¬ÔÚ»Ö¸´Àú³ÌÖУ¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔ·þÎñ²»¿ÉÓõÄÇéÐΡ£
https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/
6. ÍøÂç·¸·¨·Ö×ÓÓÕÆÓû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵÑé´¹ÂÚ¹¥»÷
1ÔÂ12ÈÕ£¬ÍøÂç·¸·¨·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬Í¨¹ýÓÕÆÓû§²Ù×÷£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹ÂÚ±£»¤¹¦Ð§¡£Ëæ×ÅÒƶ¯×°±¸ÔÚÒ»Ñùƽ³£ÉúÑÄÖеÄÆÕ±éÓ¦Óã¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷µÄÖصãÄ¿µÄ¡£Îª±£»¤Óû§£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£È»¶ø£¬Æ»¹ûÖ¸³ö£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁÐ±í£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓá£BleepingComputerÊӲ쵽£¬½ü¼¸¸öÔÂÀ´£¬¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷ÊýÄ¿ÏÔÖøÔöÌí£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶õ辶ͨÐзѵÈÓÕ¶ü£¬ÒªÇóÓû§Ö´ÐÐÌض¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£ÕâÖÖÕ½ÂÔʹÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿µÄ¡£×ÝȻδµã»÷Á´½Ó£¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬Ê¹ÆäÃæÁÙ¸ü´óΣº¦¡£Òò´Ë£¬ÃæÁÙÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇó»Ø¸´µÄ¶ÌÐÅ£¬Óû§Ó¦¼á³ÖСÐÄ£¬Ö±½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯¾ÙÐÐÑéÖ¤£¬¶ø·ÇÈÝÒ׻ظ´¡£ÌØÊâÊÇÍíÄêÓû§£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹ÂÚÐÅÏ¢µÄÖ÷ҪĿµÄ£¬ÐèÉóÉ÷¿´´ý£¬ÒÔÃâй¶СÎÒ˽¼ÒÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/