Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-01-13

1. Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý


1ÔÂ9ÈÕ£¬£¬£¬£¬ £¬ÒÑÍùÁ½¸öÔ£¬£¬£¬£¬ £¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬£¬£¬£¬ £¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃÜÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´Ð§ÀÍ£¬£¬£¬£¬ £¬ÍøÂç·¸·¨·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£¡£¡£¡£¡£¡£¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬£¬£¬£¬ £¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬£¬£¬£¬ £¬µ«Ò²ÎªÆäËû¿ª·¢Ö°Ô±ÌṩÁËË¢ÐÂʱ»ú¡£¡£¡£¡£¡£¡£¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐʱ´ú½âÃÜ£¬£¬£¬£¬ £¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃÜÊÖÒյĵÍÏÓÒɶȣ¬£¬£¬£¬ £¬ÌÓ±ÜÁ˱ê×¼¾²Ì¬¼ì²âÒªÁì¡£¡£¡£¡£¡£¡£¡£BansheeÖ÷Ҫͨ¹ýÓÕÆ­ÐÔµÄGitHub´æ´¢¿âÈö²¥£¬£¬£¬£¬ £¬Õë¶ÔmacOSÓû§£¬£¬£¬£¬ £¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÄ¿µÄÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬£¬£¬ £¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬£¬£¬£¬ £¬ÒÔ¼°ÍøÂçÖ÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬£¬£¬£¬ £¬²¢ÌṩÓÕÆ­ÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´Õϰ­£¬£¬£¬£¬ £¬µ«Ô´´úÂëй¶ºó£¬£¬£¬£¬ £¬¶à¸öÍøÂç´¹ÂڻÈÔÔÚÈö²¥¸Ã¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/


2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬EverestÍŻﱻָΪĻºóºÚÊÖ


1ÔÂ11ÈÕ£¬£¬£¬£¬ £¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢À­Ã×´ïºÍεÂ˹ÍеêËÁ¹ºÖòúÆ·µÄÖ÷¹ËСÎÒ˽¼ÒÐÅÏ¢±»²»·¨»ñÈ¡¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢ÄêËê¡¢µØµãµÈСÎÒ˽¼Ò×ÊÁÏ£¬£¬£¬£¬ £¬ÉÐÓÐÉúÒâÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æÍ¨Öª£¬£¬£¬£¬ £¬²¢Ïò¼ÓÖÝî¿Ïµ»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬ £¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸·¨¼¯ÍÅÌᳫµÄ£¬£¬£¬£¬ £¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕʱ´úͨ¹ýÏúÊ۵㴦Öóͷ£Ð§À͹©Ó¦É̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£EverestÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬ £¬²¢Éù³ÆÇÔÈ¡ÁË422,075ÌõСÎÒ˽¼Ò¼Í¼¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü²¿·Ö¿Í»§»ñµÃÁËÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬ £¬µ«Ð§ÀÍÏÞÆÚδ¹ûÕæ¡£¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬£¬£¬£¬ £¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÖøÃû£¬£¬£¬£¬ £¬ËûÃÇÉÆÓÚʹÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄÎó²îºÍÍøÂç´¹ÂÚ¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾­ÊÚȨµÄ»á¼ûȨÏÞ£¬£¬£¬£¬ £¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍÇå¾²ÒªÁìÀ´ÑÚÊÎÆä»î¶¯¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/marijuana-dispensary-warns-of-data-breach


3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ £¬2.3GBÊý¾Ý±»µÁй¶


1ÔÂ10ÈÕ£¬£¬£¬£¬ £¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬£¬£¬£¬ £¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ £¬²¿·ÖÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£¡£¡£¡£¡£¡£¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬£¬£¬£¬ £¬ÒÔMovistarÆ·ÅÆÔËÓª£¬£¬£¬£¬ £¬ÓªÒµÆÕ±é12¸ö¹ú¼Ò£¬£¬£¬£¬ £¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñЧÀÍÆ÷£¬£¬£¬£¬ £¬¸ÃЧÀÍÆ÷ÓÃÓÚ±¨¸æÏ¢Õù¾öÄÚ²¿ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬ £¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬£¬£¬£¬ £¬ËäȻһЩÊý¾Ý±»±ê¼ÇΪ¿Í»§£¬£¬£¬£¬ £¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£¡£¡£¡£¡£¡£¡£Telef¨®nicaÒѽÓÄÉÐëÒª²½·¥×èÖ¹ÈκÎδ¾­ÊÚȨµÄϵͳ»á¼û£¬£¬£¬£¬ £¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬£¬£¬£¬ £¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖ£¬£¬£¬£¬ £¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬£¬£¬£¬ £¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/


4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷


1ÔÂ11ÈÕ£¬£¬£¬£¬ £¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ¼äÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬£¬£¬£¬ £¬Ä¿µÄÊÇÈÏÕæÖÎÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆÍ¼ºÍµØ¼®¾Ö(UGKK)¡£¡£¡£¡£¡£¡£¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬£¬£¬£¬ £¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬£¬£¬£¬ £¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬£¬£¬£¬ £¬²¢°ü¹ÜËùÓÐȨÊý¾ÝûÓиü¸Ä»òڲƭÐÔת¼µÄΣº¦£¬£¬£¬£¬ £¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ±¬·¢ÁËÆÕ±éÓ°Ï죬£¬£¬£¬ £¬·¿µØ²úºÍµäÖÊ´û¿îÊг¡ÏÝÈë̱»¾£¬£¬£¬£¬ £¬Ïà¹Ø¹«¹²Ð§ÀÍÒ²ÎÞ·¨»ñµÃ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬ £¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÖ÷ÒªÊ±ÊÆÕýÔڼӾ磬£¬£¬£¬ £¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÏêϸȪԴÉÐδȷ¶¨£¬£¬£¬£¬ £¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/slovakia-registry-cyberattack-land-agriculture


5. ProtonÈ«ÇòЧÀÍÖÐÖ¹£ºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö


1ÔÂ10ÈÕ£¬£¬£¬£¬ £¬Òþ˽±£»£»£»£»£» £»¤Ð§ÀÍÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò¹æÄ£µÄ´ó¹æÄ£Ð§ÀÍÖÐÖ¹£¬£¬£¬£¬ £¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÕýÔÚ¾ÙÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£¡£¡£¡£¡£¡£¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬£¬£¬£¬ £¬µ¼ÖÂÓû§ÎÞ·¨ÅþÁ¬µ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈЧÀÍ¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÅþÁ¬Ê±»áÊÕµ½¹ýʧÐÂÎÅ£¬£¬£¬£¬ £¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£¾­ÓÉԼĪÁ½Ð¡Ê±µÄÆð¾¢£¬£¬£¬£¬ £¬ËùÓÐЧÀÍÂ½Ðø»Ö¸´Õý³££¬£¬£¬£¬ £¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄЧÀÍ¡£¡£¡£¡£¡£¡£¡£ProtonÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºó͸¶£¬£¬£¬£¬ £¬´Ë´ÎÖÐÖ¹ÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢Ã÷µÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¡£¡£¡£¡£¡£¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿âЧÀÍÆ÷µÄÐÂÅþÁ¬ÊýÄ¿£¬£¬£¬£¬ £¬µ¼ÖÂÔÚÅþÁ¬Óû§ÊýÄ¿¼±¾çÔöÌíʱ·ºÆð¸ºÔØ·åÖµ£¬£¬£¬£¬ £¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¡£¡£¡£¡£¡£¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌØÊâÈÝÁ¿À´´¦Öóͷ£ÐÂÅþÁ¬£¬£¬£¬£¬ £¬µ«ÏòKubernetesµÄǨáãÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬£¬£¬£¬ £¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬ £¬ÔÚ»Ö¸´Àú³ÌÖУ¬£¬£¬£¬ £¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔЧÀͲ»¿ÉÓõÄÇéÐΡ£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/


6. ÍøÂç·¸·¨·Ö×ÓÓÕÆ­Óû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵÑé´¹ÂÚ¹¥»÷


1ÔÂ12ÈÕ£¬£¬£¬£¬ £¬ÍøÂç·¸·¨·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬£¬£¬£¬ £¬Í¨¹ýÓÕÆ­Óû§²Ù×÷£¬£¬£¬£¬ £¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹ÂÚ±£»£»£»£»£» £»¤¹¦Ð§¡£¡£¡£¡£¡£¡£¡£Ëæ×ÅÒÆ¶¯×°±¸ÔÚÒ»Ñùƽ³£ÉúÑÄÖÐµÄÆÕ±éÓ¦Ó㬣¬£¬£¬ £¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷µÄÖØµãÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£Îª±£»£»£»£»£» £»¤Óû§£¬£¬£¬£¬ £¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬Æ»¹ûÖ¸³ö£¬£¬£¬£¬ £¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁÐ±í£¬£¬£¬£¬ £¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓᣡ£¡£¡£¡£¡£¡£BleepingComputerÊӲ쵽£¬£¬£¬£¬ £¬½ü¼¸¸öÔÂÀ´£¬£¬£¬£¬ £¬¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷ÊýÄ¿ÏÔÖøÔöÌí£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£¡£¡£¡£¡£¡£¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶õ辶ͨÐзѵÈÓÕ¶ü£¬£¬£¬£¬ £¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÕ½ÂÔʹÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬£¬£¬£¬ £¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£×ÝȻδµã»÷Á´½Ó£¬£¬£¬£¬ £¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬£¬£¬£¬ £¬Ê¹ÆäÃæÁÙ¸ü´óΣº¦¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬ £¬ÃæÁÙÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬£¬£¬£¬ £¬Óû§Ó¦¼á³ÖСÐÄ£¬£¬£¬£¬ £¬Ö±½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯¾ÙÐÐÑéÖ¤£¬£¬£¬£¬ £¬¶ø·ÇÈÝÒ׻ظ´¡£¡£¡£¡£¡£¡£¡£ÌØÊâÊÇÍíÄêÓû§£¬£¬£¬£¬ £¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹ÂÚÐÅÏ¢µÄÖ÷ҪĿµÄ£¬£¬£¬£¬ £¬ÐèÉóÉ÷¿´´ý£¬£¬£¬£¬ £¬ÒÔÃâй¶СÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/