AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§
Ðû²¼Ê±¼ä 2021-11-25AppGalleryÖжà¿îÓÎÏ·Ó¦Óñ£´æÄ¾Âí£¬£¬£¬ÒÑѬȾ900¶àÍò×°±¸

11ÔÂ23ÈÕ£¬£¬£¬Dr. WebµÄÑо¿Ö°Ô±Åû¶»ªÎªÓ¦ÓÃÊÐËÁAppGalleryÖеÄ190¿îÓÎÏ·Öб£´æÄ¾ÂíAndroid.Cynos.7.origin£¬£¬£¬ÒÑ×°ÖÃÔ¼9300000´Î¡£¡£¡£¡£¡£¸ÃľÂíÊǶñÒâÈí¼þCynosµÄ±äÌ壬£¬£¬Ö¼ÔÚÍøÂçÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£ÕâЩÓÎÏ·Ö÷ҪʹÓöíÓï¡¢ÖÐÎĺÍÓ¢Ó£¬£¬ÆäÖÐÓÎÏ·¡°¿ìµã¶ãÆðÀ´¡±µÄÏÂÔØÁ¿¸ß´ï2000000´Î¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬¸ÃľÂí¿É·¢ËͺÍ×èµ²¶ÌÐÅ¡¢ÏÂÔØºÍÆô¶¯ÆäËüÄ£¿£¿£¿é£¬£¬£¬ÒÔ¼°ÏÂÔØºÍ×°ÖÃÆäËûÓ¦Óᣡ£¡£¡£¡£ÏÖÔÚ£¬£¬£¬»ªÎª¹«Ë¾Òѽ«ÕâЩÓÎϷϼܡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/124927/malware/android-cynos-7-origin-trojan-infections.html
BIO-ISAC³Æ¹¥»÷ÕßʹÓÃÐÂTardigradeÃé×¼ÉúÎïÖÆÔìÐÐÒµ

ÉúÎï¾¼ÃÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(BIO-ISAC)ÔÚ11ÔÂ23ÈÕÐû²¼¹ØÓÚʹÓÃTardigradeµÄ¹¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¡£×Ô2021Äê´º¼¾ÒÔÀ´£¬£¬£¬¹¥»÷Õß×îÏÈʹÓôË×Ô½ç˵¶ñÒâÈí¼þ¹¥»÷ÉúÎïÖÆÔìÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ÕâÊÇSmokeLoaderµÄ±äÌ壬£¬£¬Ö÷Ҫͨ¹ý´¹Âڻ»òUÅ̾ÙÐзַ¢¡£¡£¡£¡£¡£ÓÉÓÚËü¿ÉÒÔ´ÓÄÚ´æÖÐÖØÐ±àÒë¼ÓÔØ³ÌÐò£¬£¬£¬Òò´Ë²»»áÁôÏÂÏàͬµÄÊðÃû£¬£¬£¬Õâʹʶ±ð¡¢¸ú×ÙºÍɾ³ý±äµÃÔ½·¢ÄÑÌâ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸Ã±äÌå¿ÉÒÔ×ÔÖ÷ÔËÐУ¬£¬£¬ÉõÖÁÎÞÐèC2ÅþÁ¬¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-target-biomanufacturing-with-stealthy-tardigrade-malware/
AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§

Apple¹«Ë¾ÔÚ11ÔÂ23ÈÕ¶ÔNSO Group¼°Æäĸ¹«Ë¾Q Cyber TechnologiesÌáÆðËßËÏ£¬£¬£¬Ö¸ÔðÆäʹÓÃPegasus²»·¨¼àÊÓiOSÓû§¡£¡£¡£¡£¡£PegasusÊÇÒ»ÖÖ¾üʼ¶Ìع¤Èí¼þ£¬£¬£¬Í¨³£»£»£»áʹÓÃÁãµã»÷Îó²îÀ´Ñ¬È¾Ä¿µÄ×°±¸£¬£¬£¬AppleÔÚËßËÏÖÐÌØÊâÌá¼°ÆäʹÓÃiMessageÖеÄÎó²îFORCEDENTRY¹¥»÷9¸ö°ÍÁÖÈËÊ¿¡£¡£¡£¡£¡£Apple¹«Ë¾³ÆËûÃǵÄÄ¿µÄÊÇÓÀÊÀµØÕ¥È¡NSO GroupʹÓÃÈκÎAppleÈí¼þ¡¢Ð§ÀÍ»ò×°±¸¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/11/apple-sues-israels-nso-group-for-spying.html
Ñо¿ÍŶÓչʾÔõÑùʹÓôòÓ¡»úµÄ3ÖÖ¹¥»÷ģʽPrintjack

Òâ´óÀûÑо¿ÍŶÓչʾͳ³ÆÎªPrintjackµÄ3ÖÖй¥»÷ģʽ£¬£¬£¬¿ÉʹÓôòÓ¡»úÔì³ÉÑÏÖØµÄЧ¹û¡£¡£¡£¡£¡£Ö÷ҪʹÓÃShodanɨÃèTCP¶Ë¿Ú9100¿ª·ÅµÄ×°±¸£¬£¬£¬ÆäÖе¹ú¡¢¶íÂÞ˹¡¢·¨¹ú¡¢ºÉÀ¼ºÍÓ¢¹úµÄ̻¶װ±¸×î¶à¡£¡£¡£¡£¡£µÚÒ»ÖÖ¹¥»÷ÊÇʹÓÃCVE-2014-3741µÈÎó²î£¬£¬£¬¿ØÖÆ´òÓ¡»úÌᳫDDoS¹¥»÷£»£»£»µÚ¶þÖÖÊÇÖ½ÕÅDoS¹¥»÷£¬£¬£¬Ëüͨ¹ý·¢ËÍÖØ¸´µÄ´òӡʹÃüÀ´ºÄ¾¡Ä¿µÄ×°±¸ÖеÄËùÓÐÖ½ÕÅ£»£»£»×îÑÏÖØµÄÊÇʹÓÃÆä¾ÙÐÐÖÐÐÄÈ˹¥»÷£¬£¬£¬²¢ÇÔÈ¡´òÓ¡µÄÄÚÈÝ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/researchers-warn-of-severe-risks-from-printjack-printer-attacks/
°ëµ¼Ì幫˾MediaTekÐÞ¸´ÆäоƬÖеĶà¸öÇå¾²Îó²î

Check PointÔÚ11ÔÂ24ÈÕÅû¶ÁËÖйų́Í幫˾Áª·¢¿Æ£¨MediaTek£©²úÆ·ÖÐ4¸öÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£MediaTekÊÇÈ«Çò×î´óµÄ°ëµ¼Ì幫˾֮һ£¬£¬£¬×èÖ¹2021ÄêµÚ¶þ¼¾¶È£¬£¬£¬43%µÄÖÇÄÜÊÖ»ú¶¼½ÓÄÉÁËÁª·¢¿ÆÏµÍ³Ð¾Æ¬ (SoC) £¬£¬£¬°üÀ¨Ð¡Ãס¢Oppo¡¢RealmeºÍVivoµÈ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬MediaTekÒÑÔÚ10Ô·ÝÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÆäÖеÄ3¸öÔ½½çдÈëºÍÍâµØÌáȨÎó²î£¨CVE-2021-0661¡¢CVE-2021-0662ºÍCVE-2021-0663£©£¬£¬£¬²¢Ô¤¼ÆÔÚ12ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÚ4¸öÎó²î£¨CVE-2021-0673£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/mediatek-eavesdropping-bug-impacts-30-percent-of-all-android-smartphones/
KasperskyÐû²¼2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ

KasperskyÓÚ11ÔÂ23ÈÕÐû²¼ÁË2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚδÀ´¹¥»÷Õß¿ÉÄÜ»áïÔÌÿ´Î¹¥»÷µÄÄ¿µÄÊýÄ¿£¬£¬£¬Ëõ¶Ì¶ñÒâÈí¼þµÄÉúÃüÖÜÆÚ²¢×î´óÏ޶ȵØïÔ̶ñÒâ»ù´¡ÉèÊ©µÄʹÓᣡ£¡£¡£¡£±ðµÄ£¬£¬£¬±¨¸æÌåÏÖÒÔϹ¥»÷Õ½ÂÔºÍÊÖÒÕÎÞÒɽ«ÔÚÀ´Äê±»Æð¾¢Ê¹Ó㺴¹ÂÚ¹¥»÷¡¢½«Ó²¼þÖеÄÒÑÖªÎó²î×÷ÎªÉøÍ¸Ç°ÑÔ¡¢Ê¹ÓòÙ×÷ϵͳ×é¼þºÍIT²úÆ·ÖеÄÁãÈÕÎó²î¡¢ÈëÇÖÓòÃû×¢²áÉ̺ÍÈÏÖ¤»ú¹¹ÒÔ¼°Õë¶Ô¹©Ó¦É̵Ĺ¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threats-to-ics-and-industrial-enterprises-in-2022/104957/


¾©¹«Íø°²±¸11010802024551ºÅ