Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-01-13

1. Banshee¶ñÒâÈí¼þʹÓÃXProtect¼ÓÃÜÌӱܼì²âÇÔÈ¡macOSÃô¸ÐÊý¾Ý


1ÔÂ9ÈÕ£¬£¬ £¬£¬£¬ÒÑÍùÁ½¸öÔ£¬£¬ £¬£¬£¬macOSϵͳµÄBansheeÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ·ºÆðÁËа汾£¬£¬ £¬£¬£¬½ÓÄÉApple XProtectµÄ×Ö·û´®¼ÓÃÜÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£¡£BansheeÊÇÒ»ÖÖÇÔÈ¡¼´Ð§ÀÍ£¬£¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×Ó¿ÉÒÔ¸¶·Ñ»ñµÃ¡£¡£¡£¡£¡£¡£ÆäÔ´´úÂëÓÚ2024Äê11ÔÂй¶£¬£¬ £¬£¬£¬µ¼ÖÂÏîÄ¿¹Ø±Õ£¬£¬ £¬£¬£¬µ«Ò²ÎªÆäËû¿ª·¢Ö°Ô±ÌṩÁËË¢ÐÂʱ»ú¡£¡£¡£¡£¡£¡£Ð°汾ͨ¹ýÈÅÂÒ×Ö·û´®²¢ÔÚÖ´ÐÐʱ´ú½âÃÜ£¬£¬ £¬£¬£¬ÒÔ¼°Õë¶ÔmacOSºÍµÚÈý·½·´¶ñÒâÈí¼þ¹¤¾ß¶ÔÌØ¶¨¼ÓÃÜÊÖÒյĵÍÏÓÒɶÈ£¬£¬ £¬£¬£¬ÌÓ±ÜÁ˱ê×¼¾²Ì¬¼ì²âÒªÁì¡£¡£¡£¡£¡£¡£BansheeÖ÷Ҫͨ¹ýÓÕÆ­ÐÔµÄGitHub´æ´¢¿âÈö²¥£¬£¬ £¬£¬£¬Õë¶ÔmacOSÓû§£¬£¬ £¬£¬£¬Í¬Ê±Ò²Ê¹ÓÃLumma StealerÕë¶ÔWindowsÓû§¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄÄ¿µÄÊÇÇÔÈ¡´æ´¢ÔÚÊ¢ÐÐä¯ÀÀÆ÷ÖеÄÊý¾Ý£¬£¬ £¬£¬£¬ÈçÃÜÂëºÍË«ÒòËØÉí·ÝÑéÖ¤À©Õ¹£¬£¬ £¬£¬£¬ÒÔ¼°ÍøÂçÖ÷»úµÄ»ù±¾ÏµÍ³ºÍÍøÂçÐÅÏ¢£¬£¬ £¬£¬£¬²¢ÌṩÓÕÆ­ÐԵǼÌáÐÑÒÔÇÔÈ¡macOSÃÜÂë¡£¡£¡£¡£¡£¡£Ö»¹ÜBansheeÔËÓª×Ô11ÔÂÒÔÀ´Õϰ­£¬£¬ £¬£¬£¬µ«Ô´´úÂëй¶ºó£¬£¬ £¬£¬£¬¶à¸öÍøÂç´¹ÂڻÈÔÔÚÈö²¥¸Ã¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo/


2. STIIIZY´óÂéÒ©·¿Êý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬EverestÍŻﱻָΪĻºóºÚÊÖ


1ÔÂ11ÈÕ£¬£¬ £¬£¬£¬¼ÓÀû¸£ÄáÑÇÖݵĴóÐÍ´óÂéÒ©·¿STIIIZY½üÆÚÔâÓöÁËÒ»´ÎÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬µ¼Ö´Ӹù«Ë¾¾É½ðɽ¡¢°¢À­Ã×´ïºÍεÂ˹ÍеêËÁ¹ºÖòúÆ·µÄÖ÷¹ËСÎÒ˽¼ÒÐÅÏ¢±»²»·¨»ñÈ¡¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Éí·ÝÖ¤¡¢»¤ÕÕ¡¢Ò½ÓôóÂ鿨¡¢ÕÕÆ¬ÒÔ¼°ÐÕÃû¡¢ÄêËê¡¢µØµãµÈСÎÒ˽¼Ò×ÊÁÏ£¬£¬ £¬£¬£¬ÉÐÓÐÉúÒâÀúÊ·µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£STIIIZYÔÚÍøÕ¾ÉÏÐû²¼ÁËÎ¥¹æÍ¨Öª£¬£¬ £¬£¬£¬²¢Ïò¼ÓÖÝî¿Ïµ»ú¹¹Ìá½»ÁËÏà¹ØÎļþ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬£¬Õâ´Î¹¥»÷ÊÇÓÉÒ»¸öÓÐ×éÖ¯µÄÍøÂç·¸·¨¼¯ÍÅÌᳫµÄ£¬£¬ £¬£¬£¬ËûÃÇÔÚ2024Äê10ÔÂ10ÈÕÖÁ11ÔÂ10ÈÕʱ´úͨ¹ýÏúÊ۵㴦Öóͷ£Ð§À͹©Ó¦É̵Äϵͳ»ñÈ¡Á˿ͻ§ÐÅÏ¢¡£¡£¡£¡£¡£¡£EverestÍøÂç·¸·¨ÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË422,075ÌõСÎÒ˽¼Ò¼Í¼¡£¡£¡£¡£¡£¡£Ö»¹Ü²¿·Ö¿Í»§»ñµÃÁËÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬ £¬£¬£¬µ«Ð§ÀÍÏÞÆÚδ¹ûÕæ¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þר¼ÒÖ¸³ö£¬£¬ £¬£¬£¬EverestÍÅ»ïÒÔÀÕË÷Êܺ¦Õß¶øÖøÃû£¬£¬ £¬£¬£¬ËûÃÇÉÆÓÚʹÓÃÈõƾ֤¡¢Î´ÐÞ²¹µÄÎó²îºÍÍøÂç´¹ÂÚ¹¥»÷µÈÊÖ¶ÎÀ´»ñȡδ¾­ÊÚȨµÄ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬²¢Í¨¹ý¼ÓÃÜͨѶÇþµÀºÍÇå¾²ÒªÁìÀ´ÑÚÊÎÆä»î¶¯¡£¡£¡£¡£¡£¡£


https://therecord.media/marijuana-dispensary-warns-of-data-breach


3. Telef¨®nicaÄÚ²¿Æ±ÎñϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬2.3GBÊý¾Ý±»µÁй¶


1ÔÂ10ÈÕ£¬£¬ £¬£¬£¬Î÷°àÑÀ¿ç¹úµçÐŹ«Ë¾Telef¨®nica֤ʵ£¬£¬ £¬£¬£¬ÆäÄÚ²¿Æ±ÎñϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬²¿·ÖÊý¾ÝÒÑÔÚºÚ¿ÍÂÛ̳ÉÏй¶¡£¡£¡£¡£¡£¡£Telef¨®nicaÊÇÎ÷°àÑÀ×î´óµÄµçÐŹ«Ë¾£¬£¬ £¬£¬£¬ÒÔMovistarÆ·ÅÆÔËÓª£¬£¬ £¬£¬£¬ÓªÒµÆÕ±é12¸ö¹ú¼Ò£¬£¬ £¬£¬£¬ÓµÓÐÁè¼Ý104,000ÃûÔ±¹¤¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃй¶µÄÔ±¹¤Æ¾Ö¤ÈëÇÖÁ˹«Ë¾µÄJira¿ª·¢ºÍƱÎñЧÀÍÆ÷£¬£¬ £¬£¬£¬¸ÃЧÀÍÆ÷ÓÃÓÚ±¨¸æÏ¢Õù¾öÄÚ²¿ÎÊÌâ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬£¬¹¥»÷ÕßץȡÁËԼĪ2.3 GBµÄÎĵµ¡¢Æ±¾ÝºÍÖÖÖÖÊý¾Ý£¬£¬ £¬£¬£¬ËäȻһЩÊý¾Ý±»±ê¼ÇΪ¿Í»§£¬£¬ £¬£¬£¬µ«¿ÉÄÜÊÇÒÔ¿Í»§ÃûÒ忪¾ßµÄ¡£¡£¡£¡£¡£¡£Telef¨®nicaÒѽÓÄÉÐëÒª²½·¥×èÖ¹ÈκÎδ¾­ÊÚȨµÄϵͳ»á¼û£¬£¬ £¬£¬£¬²¢ÔÚÊÜÓ°ÏìµÄÕË»§ÉÏÖØÖÃÁËÃÜÂë¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄÈýÈËÒ²ÊÇ×î½üÌᳫµÄÀÕË÷Èí¼þÐж¯¡°Hellcat Ransomware¡±µÄ³ÉÔ±£¬£¬ £¬£¬£¬¸ÃÍÅ»ïÔøÀÖ³ÉÈëÇÖÊ©ÄÍµÂµçÆø¹«Ë¾²¢ÇÔÈ¡40GBÊý¾Ý¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÌåÏÖ£¬£¬ £¬£¬£¬ËûÃÇÔÚÍøÉÏй¶Êý¾Ý֮ǰ£¬£¬ £¬£¬£¬Ã»ÓÐÁªÏµTelef¨®nica»òÊÔͼÀÕË÷ËûÃÇ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/telefonica-confirms-internal-ticketing-system-breach-after-data-leak/


4. ˹Âå·¥¿ËÍÁµØ¹ÒºÅ´¦ÔâÊÜÊ·ÉÏ×î´óÍøÂç¹¥»÷


1ÔÂ11ÈÕ£¬£¬ £¬£¬£¬Ë¹Âå·¥¿Ë±¾ÖÜÔçЩʱ¼äÔâÊÜÁËÀúÊ·ÉÏ×î´óµÄÍøÂç¹¥»÷£¬£¬ £¬£¬£¬Ä¿µÄÊÇÈÏÕæÖÎÀíÍÁµØºÍ¹¤ÒµÊý¾ÝµÄ˹Âå·¥¿Ë´óµØÕÉÁ¿¡¢ÖÆÍ¼ºÍµØ¼®¾Ö(UGKK)¡£¡£¡£¡£¡£¡£¸Ã¾Öϵͳ±»ÀÕË÷Èí¼þ¹¥»÷ºó¹Ø±Õ£¬£¬ £¬£¬£¬ÊµÌå°ì¹«ÊÒÒ²ÓÚÖܶþ¹Ø±Õ£¬£¬ £¬£¬£¬¹¥»÷ÕßË÷ÒªÊý°ÙÍòÅ·ÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£Å©Òµ²¿³¤ÌåÏÖ½«Í¨¹ý±¸·Ý»Ö¸´ÏµÍ³£¬£¬ £¬£¬£¬²¢°ü¹ÜËùÓÐȨÊý¾ÝûÓиü¸Ä»òڲƭÐÔת¼µÄΣº¦£¬£¬ £¬£¬£¬µ«»Ö¸´¿ÉÄÜÐèÒªÊýÔÂʱ¼ä¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¶ÔÒÀÀµÍÁµØ¹ÒºÅÊý¾ÝµÄÐÐÒµ±¬·¢ÁËÆÕ±éÓ°Ï죬£¬ £¬£¬£¬·¿µØ²úºÍµäÖÊ´û¿îÊг¡ÏÝÈë̱»¾£¬£¬ £¬£¬£¬Ïà¹Ø¹«¹²Ð§ÀÍÒ²ÎÞ·¨»ñµÃ¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬Ë¹Âå·¥¿ËºÍÎÚ¿ËÀ¼Ö®¼äµÄÖ÷ÒªÊ±ÊÆÕýÔڼӾ磬£¬ £¬£¬£¬Ë¹Âå·¥¿ËÃñ×åÖ÷ÒåÕþµ³ºôÓõÍâ½»²¿³¤ÕÙ¼ûÎÚ¿ËÀ¼´óʹÌÖÂÛ´ËÊ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µÄÏêϸȪԴÉÐδȷ¶¨£¬£¬ £¬£¬£¬µ«Ë¹Âå·¥¿Ë·½ÃæÓÐÇ¿ÁÒ¼£ÏóÅú×¢¹¥»÷Ô´×ÔÎÚ¿ËÀ¼¡£¡£¡£¡£¡£¡£


https://therecord.media/slovakia-registry-cyberattack-land-agriculture


5. ProtonÈ«ÇòЧÀÍÖÐÖ¹£ºKubernetesǨáãÓëÈí¼þ¸ü¸ÄÖ¸ºÔؼ¤Ôö


1ÔÂ10ÈÕ£¬£¬ £¬£¬£¬Òþ˽±£»£»£»£»¤Ð§ÀÍÌṩÉÌProtonÖÜËÄÔâÓöÈ«Çò¹æÄ£µÄ´ó¹æÄ£Ð§ÀÍÖÐÖ¹£¬£¬ £¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚÕýÔÚ¾ÙÐеĻù´¡ÉèÊ©ÏòKubernetesǨáãÒÔ¼°Èí¼þ¸ü¸ÄËùÒý·¢µÄ³õʼ¸ºÔؼ¤ÔöËùÖ¡£¡£¡£¡£¡£¡£ÊÂÎñʼÓÚÃÀ¹ú¶«²¿Ê±¼äÉÏÎç10µã×óÓÒ£¬£¬ £¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨ÅþÁ¬µ½ProtonµÄVPN¡¢Mail¡¢Calendar¡¢Drive¡¢PassºÍWalletµÈЧÀÍ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§ÔÚʵÑéÅþÁ¬Ê±»áÊÕµ½¹ýʧÐÂÎÅ£¬£¬ £¬£¬£¬Ö¸³öÎÞ·¨¼ÓÔØÒ³Ãæ¡£¡£¡£¡£¡£¡£¾­ÓÉԼĪÁ½Ð¡Ê±µÄÆð¾¢£¬£¬ £¬£¬£¬ËùÓÐЧÀÍÂ½Ðø»Ö¸´Õý³££¬£¬ £¬£¬£¬ÆäÖÐProton MailºÍCalendarÊÇ×îºó»Ö¸´µÄЧÀÍ¡£¡£¡£¡£¡£¡£ProtonÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºó͸¶£¬£¬ £¬£¬£¬´Ë´ÎÖÐÖ¹ÊÇÓÉÕ¾µã¿É¿¿ÐÔ¹¤³ÌÍŶӷ¢Ã÷µÄÈí¼þ¸ü¸ÄËùÒý·¢µÄ¡£¡£¡£¡£¡£¡£¸Ã¸ü¸ÄÏÞÖÆÁËÊý¾Ý¿âЧÀÍÆ÷µÄÐÂÅþÁ¬ÊýÄ¿£¬£¬ £¬£¬£¬µ¼ÖÂÔÚÅþÁ¬Óû§ÊýÄ¿¼±¾çÔöÌíʱ·ºÆð¸ºÔØ·åÖµ£¬£¬ £¬£¬£¬½ø¶øÊ¹»ù´¡ÉèÊ©³¬¸ººÉ¡£¡£¡£¡£¡£¡£ËäÈ»ProtonÓµÓÐ×ã¹»µÄÌØÊâÈÝÁ¿À´´¦Öóͷ£ÐÂÅþÁ¬£¬£¬ £¬£¬£¬µ«ÏòKubernetesµÄǨáãÐèҪͬʱÔËÐÐÁ½¸ö²¢Ðлù´¡ÉèÊ©£¬£¬ £¬£¬£¬Ê¹µÃƽºâ¸ºÔرäµÃÄÑÌâ¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬ £¬£¬£¬ÔÚ»Ö¸´Àú³ÌÖУ¬£¬ £¬£¬£¬Óû§Óöµ½ÁËÐÔÄÜϽµºÍ¼äЪÐÔЧÀͲ»¿ÉÓõÄÇéÐΡ£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/proton-worldwide-outage-caused-by-kubernetes-migration-software-change/


6. ÍøÂç·¸·¨·Ö×ÓÓÕÆ­Óû§ÖØÐÂÆôÓÃiMessage½ûÓÃÁ´½ÓʵÑé´¹ÂÚ¹¥»÷


1ÔÂ12ÈÕ£¬£¬ £¬£¬£¬ÍøÂç·¸·¨·Ö×Ó½üÆÚ½ÓÄÉÁËÒ»ÖÖм¼ÇÉ£¬£¬ £¬£¬£¬Í¨¹ýÓÕÆ­Óû§²Ù×÷£¬£¬ £¬£¬£¬¹Ø±ÕÁËApple iMessageÄÚÖõĶÌÐÅÍøÂç´¹ÂÚ±£»£»£»£»¤¹¦Ð§¡£¡£¡£¡£¡£¡£Ëæ×ÅÒÆ¶¯×°±¸ÔÚÒ»Ñùƽ³£ÉúÑÄÖÐµÄÆÕ±éÓ¦Ó㬣¬ £¬£¬£¬ÊÖ»úºÅÂë³ÉΪ¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷µÄÖØµãÄ¿µÄ¡£¡£¡£¡£¡£¡£Îª±£»£»£»£»¤Óû§£¬£¬ £¬£¬£¬iMessageĬÈϽûÓÃδ֪·¢¼þÈËÐÂÎÅÖеÄÁ´½Ó¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬Æ»¹ûÖ¸³ö£¬£¬ £¬£¬£¬Ò»µ©Óû§»Ø¸´´ËÀàÐÂÎÅ»ò½«·¢¼þÈ˼ÓÈëÁªÏµÈËÁбí£¬£¬ £¬£¬£¬ÕâЩÁ´½Ó¾Í»á±»ÖØÐÂÆôÓᣡ£¡£¡£¡£¡£BleepingComputerÊӲ쵽£¬£¬ £¬£¬£¬½ü¼¸¸öÔÂÀ´£¬£¬ £¬£¬£¬¶ÌÐÅÍøÂç´¹ÂÚ¹¥»÷ÊýÄ¿ÏÔÖøÔöÌí£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ýÓÕµ¼Óû§»Ø¸´¶ÌÐÅ£¨Èç»Ø¸´¡°Y¡±£©À´ÖØÐÂÆôÓÃÁ´½Ó¡£¡£¡£¡£¡£¡£´ËÀà¶ÌÐÅͨ³£Î±×°³ÉUSPSÔËÊäÎÊÌâ»òδ¸¶õ辶ͨÐзѵÈÓÕ¶ü£¬£¬ £¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ÒÔ¼¤»îÁ´½Ó¡£¡£¡£¡£¡£¡£ÕâÖÖÕ½ÂÔʹÓÃÁËÓû§Ï°¹ßÈ·ÈÏ»ò¾Ü¾ø¶ÌÐŵÄÐÄÀí£¬£¬ £¬£¬£¬Ê¹ËûÃdzÉΪÒ×Êܹ¥»÷µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£×ÝȻδµã»÷Á´½Ó£¬£¬ £¬£¬£¬»Ø¸´ÐÐΪ×Ô¼ºÒ²»á̻¶Óû§µÄÒ׸ÐÐÔ£¬£¬ £¬£¬£¬Ê¹ÆäÃæÁÙ¸ü´óΣº¦¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬ £¬£¬£¬ÃæÁÙÁ´½Ó±»½ûÓûòÀ´×Ôδ֪·¢¼þÈ˵ÄÒªÇ󻨏´µÄ¶ÌÐÅ£¬£¬ £¬£¬£¬Óû§Ó¦¼á³ÖСÐÄ£¬£¬ £¬£¬£¬Ö±½ÓÁªÏµÏà¹Ø¹«Ë¾»ò×éÖ¯¾ÙÐÐÑéÖ¤£¬£¬ £¬£¬£¬¶ø·ÇÈÝÒ׻ظ´¡£¡£¡£¡£¡£¡£ÌØÊâÊÇÍíÄêÓû§£¬£¬ £¬£¬£¬ËûÃÇÍùÍùÊÇ´ËÀàÍøÂç´¹ÂÚÐÅÏ¢µÄÖ÷ҪĿµÄ£¬£¬ £¬£¬£¬ÐèÉóÉ÷¿´´ý£¬£¬ £¬£¬£¬ÒÔÃâй¶СÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/phishing-texts-trick-apple-imessage-users-into-disabling-protection/