Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-01-131. Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý
1ÔÂ9ÈÕ£¬£¬£¬ÒÑÍùÁ½¸öÔ£¬£¬£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬£¬£¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃÜÊÖÒÕÌӱܼì²â¡£¡£¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´Ð§ÀÍ£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£¡£¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬£¬£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬£¬£¬µ«Ò²ÎªÆäËû¿ª·¢Ö°Ô±ÌṩÁËË¢ÐÂʱ»ú¡£¡£¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐʱ´ú½âÃÜ£¬£¬£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃÜÊÖÒյĵÍÏÓÒɶȣ¬£¬£¬ÌÓ±ÜÁ˱ê×¼¾²Ì¬¼ì²âÒªÁì¡£¡£¡£BansheeÖ÷Ҫͨ¹ýÓÕÆÐÔµÄGitHub´æ´¢¿âÈö²¥£¬£¬£¬Õë¶ÔmacOSÓû§£¬£¬£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÄ¿µÄÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬£¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬£¬£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬£¬£¬²¢ÌṩÓÕÆÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£¡£¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´Õϰ£¬£¬£¬µ«Ô´´úÂëй¶ºó£¬£¬£¬¶à¸öÍøÂç´¹ÂڻÈÔÔÚÈö²¥¸Ã¶ñÒâÈí¼þ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/
2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬£¬£¬EverestÍŻﱻָΪĻºóºÚÊÖ
1ÔÂ11ÈÕ£¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢ÀÃ×´ïºÍεÂ˹ÍеêËÁ¹ºÖòúÆ·µÄÖ÷¹ËСÎÒ˽¼ÒÐÅÏ¢±»²»·¨»ñÈ¡¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢ÄêËê¡¢µØµãµÈСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬ÉÐÓÐÉúÒâÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£¡£¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æÍ¨Öª£¬£¬£¬²¢Ïò¼ÓÖÝî¿Ïµ»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¡£¡£¾ÝϤ£¬£¬£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸·¨¼¯ÍÅÌᳫµÄ£¬£¬£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕʱ´úͨ¹ýÏúÊ۵㴦Öóͷ£Ð§À͹©Ó¦É̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£¡£¡£EverestÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË422,075ÌõСÎÒ˽¼Ò¼Í¼¡£¡£¡£Ö»¹Ü²¿·Ö¿Í»§»ñµÃÁËÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬µ«Ð§ÀÍÏÞÆÚδ¹ûÕæ¡£¡£¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬£¬£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÖøÃû£¬£¬£¬ËûÃÇÉÆÓÚʹÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄÎó²îºÍÍøÂç´¹ÂÚ¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾ÊÚȨµÄ»á¼ûȨÏÞ£¬£¬£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍÇå¾²ÒªÁìÀ´ÑÚÊÎÆä»î¶¯¡£¡£¡£
https://therecord.media/marijuana-dispensary-warns-of-data-breach
3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬2.3GBÊý¾Ý±»µÁй¶
1ÔÂ10ÈÕ£¬£¬£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬£¬£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬²¿·ÖÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£¡£¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬£¬£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬£¬£¬ÓªÒµÆÕ±é12¸ö¹ú¼Ò£¬£¬£¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¡£¡£¹¥»÷ÕßʹÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñЧÀÍÆ÷£¬£¬£¬¸ÃЧÀÍÆ÷ÓÃÓÚ±¨¸æÏ¢Õù¾öÄÚ²¿ÎÊÌâ¡£¡£¡£¾Ý³Æ£¬£¬£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬£¬£¬ËäȻһЩÊý¾Ý±»±ê¼ÇΪ¿Í»§£¬£¬£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£¡£¡£Telef¨®nicaÒѽÓÄÉÐëÒª²½·¥×èÖ¹ÈκÎδ¾ÊÚȨµÄϵͳ»á¼û£¬£¬£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬£¬£¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¡£¡£¹¥»÷ÕßÌåÏÖ£¬£¬£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬£¬£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/
4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷
1ÔÂ11ÈÕ£¬£¬£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ¼äÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬£¬£¬Ä¿µÄÊÇÈÏÕæÖÎÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆÍ¼ºÍµØ¼®¾Ö(UGKK)¡£¡£¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬£¬£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬£¬£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£¡£¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬£¬£¬²¢°ü¹ÜËùÓÐȨÊý¾ÝûÓиü¸Ä»òÚ²ÆÐÔת¼µÄΣº¦£¬£¬£¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£¡£¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ±¬·¢ÁËÆÕ±éÓ°Ï죬£¬£¬·¿µØ²úºÍµäÖÊ´û¿îÊг¡ÏÝÈë̱»¾£¬£¬£¬Ïà¹Ø¹«¹²Ð§ÀÍÒ²ÎÞ·¨»ñµÃ¡£¡£¡£Í¬Ê±£¬£¬£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÖ÷ÒªÊ±ÊÆÕýÔڼӾ磬£¬£¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£¡£¡£´Ë´Î¹¥»÷µÄÏêϸȪԴÉÐδȷ¶¨£¬£¬£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£¡£¡£
https://therecord.media/slovakia-registry-cyberattack-land-agriculture
5. ProtonÈ«ÇòЧÀÍÖÐÖ¹£ºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö
1ÔÂ10ÈÕ£¬£¬£¬Òþ˽±£»£»£»£»£»£»¤Ð§ÀÍÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò¹æÄ£µÄ´ó¹æÄ£Ð§ÀÍÖÐÖ¹£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÕýÔÚ¾ÙÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£¡£¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨ÅþÁ¬µ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈЧÀÍ¡£¡£¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÅþÁ¬Ê±»áÊÕµ½¹ýʧÐÂÎÅ£¬£¬£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¡£¡£¾ÓÉԼĪÁ½Ð¡Ê±µÄÆð¾¢£¬£¬£¬ËùÓÐЧÀÍÂ½Ðø»Ö¸´Õý³££¬£¬£¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄЧÀÍ¡£¡£¡£ProtonÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºó͸¶£¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢Ã÷µÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¡£¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿âЧÀÍÆ÷µÄÐÂÅþÁ¬ÊýÄ¿£¬£¬£¬µ¼ÖÂÔÚÅþÁ¬Óû§ÊýÄ¿¼±¾çÔöÌíʱ·ºÆð¸ºÔØ·åÖµ£¬£¬£¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¡£¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌØÊâÈÝÁ¿À´´¦Öóͷ£ÐÂÅþÁ¬£¬£¬£¬µ«ÏòKubernetesµÄǨáãÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬£¬£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£¡£¡£Òò´Ë£¬£¬£¬ÔÚ»Ö¸´Àú³ÌÖУ¬£¬£¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔЧÀͲ»¿ÉÓõÄÇéÐΡ£¡£¡£
https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/
6. ÍøÂç·¸·¨·Ö×ÓÓÕÆÓû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵÑé´¹ÂÚ¹¥»÷
1ÔÂ12ÈÕ£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬£¬£¬Í¨¹ýÓÕÆÓû§²Ù×÷£¬£¬£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹ÂÚ±£»£»£»£»£»£»¤¹¦Ð§¡£¡£¡£Ëæ×ÅÒÆ¶¯×°±¸ÔÚÒ»Ñùƽ³£ÉúÑÄÖÐµÄÆÕ±éÓ¦Ó㬣¬£¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷µÄÖØµãÄ¿µÄ¡£¡£¡£Îª±£»£»£»£»£»£»¤Óû§£¬£¬£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£¡£¡£È»¶ø£¬£¬£¬Æ»¹ûÖ¸³ö£¬£¬£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁÐ±í£¬£¬£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓᣡ£¡£BleepingComputerÊӲ쵽£¬£¬£¬½ü¼¸¸öÔÂÀ´£¬£¬£¬¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷ÊýÄ¿ÏÔÖøÔöÌí£¬£¬£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£¡£¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶õ辶ͨÐзѵÈÓÕ¶ü£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£¡£¡£ÕâÖÖÕ½ÂÔʹÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬£¬£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿µÄ¡£¡£¡£×ÝȻδµã»÷Á´½Ó£¬£¬£¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬£¬£¬Ê¹ÆäÃæÁÙ¸ü´óΣº¦¡£¡£¡£Òò´Ë£¬£¬£¬ÃæÁÙÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬£¬£¬Óû§Ó¦¼á³ÖСÐÄ£¬£¬£¬Ö±½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯¾ÙÐÐÑéÖ¤£¬£¬£¬¶ø·ÇÈÝÒ׻ظ´¡£¡£¡£ÌØÊâÊÇÍíÄêÓû§£¬£¬£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹ÂÚÐÅÏ¢µÄÖ÷ҪĿµÄ£¬£¬£¬ÐèÉóÉ÷¿´´ý£¬£¬£¬ÒÔÃâй¶СÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£
https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/


¾©¹«Íø°²±¸11010802024551ºÅ