µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÉèÖùýʧй¶280ÍòÌõ¼Í¼

Ðû²¼Ê±¼ä 2023-06-01

1¡¢µçÉ̹«Ë¾SimpleTireÊý¾Ý¿âÉèÖùýʧй¶280ÍòÌõ¼Í¼


¾ÝýÌå5ÔÂ30ÈÕ±¨µÀ£¬ £¬ £¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷Á˵ç×ÓÉÌÎñ¹«Ë¾SimpleTireµÄÒ»¸ö²»ÊÜÃÜÂë±£»£»£»£»£»¤µÄÊý¾Ý¿â ¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨2808697Ìõ¼Í¼£¬ £¬ £¬£¬ £¬×ܼÆ1 TB ¡£¡£¡£¡£¡£¡£ÆäÖÐÓÐ1189151·ÝPDFÃûÌõĶ©µ¥È·ÈÏÎļþ£¬ £¬ £¬£¬ £¬Éæ¼°ÐÕÃû¡¢µç»°¡¢µØµãºÍÐÅÓÿ¨ºÅµÈPIIÐÅÏ¢ ¡£¡£¡£¡£¡£¡£ÔÚ¸ÃÊý¾Ý¿â±»·¢Ã÷µÄ3ÖܶàµÄʱ¼äÀ £¬ £¬£¬ £¬ËüÈÔÈ»¿É±»¹ûÕæ»á¼û ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬ £¬£¬ £¬Êý¾Ýй¶ÊÂÎñ¼òÖ±ÇÐʱ¼ä£¬ £¬ £¬£¬ £¬ÒÔ¼°ÊÇ·ñÓй¥»÷Õß»á¼û¹ýËüÈÔȻδ֪ ¡£¡£¡£¡£¡£¡£


https://www.hackread.com/simpletire-database-leak-records-exposed/


2¡¢Ñо¿Ö°Ô±ÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËÆºóÃŵÄÐÐΪӰÏìÔ¼700Íǫ̀װ±¸


¾Ý5ÔÂ31ÈÕ±¨µÀ£¬ £¬ £¬£¬ £¬¹Ì¼þÇå¾²¹«Ë¾EclypsiumÔÚ¼¼¼ÎϵͳÖмì²âµ½ÒÉËÆºóÃŵÄÐÐΪ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ4ÔÂÊ״μì²âµ½¸ÃÒì³£ÇéÐΣ¬ £¬ £¬£¬ £¬ÒÔºó£¬ £¬ £¬£¬ £¬¼¼¼Î¹«Ë¾½â¾öÁËÕâ¸öÎÊÌâ ¡£¡£¡£¡£¡£¡£¼¼¼ÎϵͳÖеĹ̼þ»áÔÚϵͳÆô¶¯Àú³ÌÖÐ×°Öò¢Ö´ÐÐWindowsÔ­Éú¿ÉÖ´ÐÐÎļþ ¡£¡£¡£¡£¡£¡£¸Ã¿ÉÖ´ÐÐÎļþÓÃÓÚ²»Çå¾²µØÏÂÔØºÍÖ´ÐÐÌØÁíÍâpayload£¬ £¬ £¬£¬ £¬ÕâÓëÆäËüÀàËÆOEMºóÃÅ£¨ÈçComputraceºóÃŵȣ©µÄÐÐΪÏàͬ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬ £¬£¬ £¬¸ÃÈí¼þËÆºõÊÇ×÷Ϊһ¸öÕýµ±µÄ¸üÐÂÓ¦ÓóÌÐò£¬ £¬ £¬£¬ £¬¸ÃÎÊÌâ¿ÉÄÜ»áÓ°ÏìԼĪ364¸ö¼¼¼Îϵͳ£¬ £¬ £¬£¬ £¬¼òªԤ¼ÆÉæ¼°700Íǫ̀װ±¸ ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/146892/hacking/backdoor-like-behavior-gigabyte-systems.html


3¡¢Î¢ÈíÅû¶macOSÖпÉÈÆ¹ýSIP rootÏÞÖÆµÄMigraineÎó²î


5ÔÂ30ÈÕ£¬ £¬ £¬£¬ £¬Î¢ÈíÅû¶ÁËеÄmacOSÎó²îMigraine£¨CVE-2023-32369£©µÄÏêϸÐÅÏ¢ ¡£¡£¡£¡£¡£¡£Ê¹ÓøÃÎó²î£¬ £¬ £¬£¬ £¬ÓµÓÐrootȨÏ޵Ĺ¥»÷Õß¿Éͨ¹ýÀÄÓÃmacOSǨáãÖúÊÖ³ÌÐòÀ´ÈƹýϵͳÍêÕûÐÔ±£»£»£»£»£»¤£¨SIP£©£¬ £¬ £¬£¬ £¬×°ÖÃ"²»¿Éɾ³ý"µÄ¶ñÒâÈí¼þ ¡£¡£¡£¡£¡£¡£ÈƹýSIP±£»£»£»£»£»¤»¹¿ÉÒÔÍêÈ«ÈÆ¹ý͸Ã÷¡¢Ô޳ɺͿØÖÆ(TCC)Õ½ÂÔ£¬ £¬ £¬£¬ £¬¹¥»÷Õß¿ÉÌæ»»TCCÊý¾Ý¿â²¢»ñµÃÄ¿µÄÊý¾ÝµÄÎÞÏÞÖÆ»á¼ûȨÏÞ ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÒÑÔÚ5ÔÂ18ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´ ¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/05/30/new-macos-vulnerability-migraine-could-bypass-system-integrity-protection/


4¡¢Anonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾ÀÕË÷300ÍòÃÀÔª


ýÌå5ÔÂ30Èճƣ¬ £¬ £¬£¬ £¬ºÚ¿ÍÍÅ»ïAnonymous SudanÏòÄÉάÑǺ½¿Õ¹«Ë¾(SAS)Ìá³öÁË300ÍòÃÀÔªµÄÊê½ðÒªÇó£¬ £¬ £¬£¬ £¬ÒÔ×èÖ¹×Ô2ÔÂÒÔÀ´¶Ô¸Ãº½¿Õ¹«Ë¾ÍøÕ¾µÄDDoS¹¥»÷ ¡£¡£¡£¡£¡£¡£Anonymous Sudan³ÆSAS¼°ÆäЧÀÍÒÑå´»úÁè¼ÝÎåÌì ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÒ»Ö±Ìá¸ßËûÃǵÄÊê½ð£¬ £¬ £¬£¬ £¬´Ó×î³õµÄ3500ÃÀÔªÌá¸ßµ½¾ªÈ˵Ä300ÍòÃÀÔª ¡£¡£¡£¡£¡£¡£SASÒѶÔFacebookÉϵÄÓû§Í¶Ëß×ö³ö»ØÓ¦£¬ £¬ £¬£¬ £¬ÈÏ¿ÉÆäÍøÕ¾±£´æÎÊÌ⣬ £¬ £¬£¬ £¬²¢Ïò¿Í»§°ü¹ÜËûÃÇÕýÔÚÆð¾¢½â¾öÎÊÌâ ¡£¡£¡£¡£¡£¡£


https://therecord.media/hacker-group-anonymous-sudan-demands-three-million-from-sas


5¡¢´øÓжñÒâÄ£¿£¿£¿éSpinOkµÄAndroidÓ¦ÓÃÒѱ»×°ÖÃÁè¼Ý4ÒÚ´Î


Dr. WebÔÚ5ÔÂ29ÈÕ³ÆÆä·¢Ã÷Á˶à¸ö°üÀ¨SpinOkÄ£¿£¿£¿éµÄAndroidÓ¦Ó㬠£¬ £¬£¬ £¬Òѱ»×°ÖÃÁè¼Ý421000000´Î ¡£¡£¡£¡£¡£¡£´ËÄ£¿£¿£¿é×÷ΪӪÏúSDK·Ö·¢£¬ £¬ £¬£¬ £¬Í¨¹ýСÓÎÏ·¡¢Ê¹ÃüϵͳÒÔ¼°³é½±À´Î¬³ÖÓû§µÄÐËȤ ¡£¡£¡£¡£¡£¡£Ëü¿ÉÒÔÇÔÈ¡´æ´¢ÔÚÓû§Éè±¹ØÁ¬Ä˽ÈËÊý¾Ý²¢½«Æä·¢Ë͵½Ô¶³ÌЧÀÍÆ÷ ¡£¡£¡£¡£¡£¡£ÔÚºǫ́£¬ £¬ £¬£¬ £¬Ä¾ÂíSDK»á¼ì²éAndroid×°±¸µÄ´«¸ÐÆ÷Êý¾Ý£¬ £¬ £¬£¬ £¬ÒÔÈ·ÈÏËüÊÇ·ñÔÚɳºÐÖÐÔËÐÐ ¡£¡£¡£¡£¡£¡£Dr. WebÌåÏÖÔÚGoogle PlayÖеÄ101¸öÓ¦ÓóÌÐòÖз¢Ã÷Á˸ÃSDK£¬ £¬ £¬£¬ £¬ÀÛ¼ÆÏÂÔØ421290300´Î£¬ £¬ £¬£¬ £¬ÆäÖаüÀ¨Noizz£¨1ÒڴΣ©¡¢Zapya£¨1ÒڴΣ©ºÍVFly£¨5ÍòÍò´Î£©µÈ ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬ £¬£¬ £¬´ó²¿·ÖÓ¦ÓÃÒѱ»É¾³ý ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/


6¡¢Trend MicroÐû²¼¹ØÓÚRomCom½üÆÚ»î¶¯µÄÆÊÎö±¨¸æ


5ÔÂ30ÈÕ£¬ £¬ £¬£¬ £¬Trend MicroÐû²¼Á˹ØÓÚRomCom½üÆÚ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚ2022Äê12ÔÂÖÁ2023Äê4ÔÂð³äÕýµ±Èí¼þµÄÍøÕ¾£¬ £¬ £¬£¬ £¬ÈçGimp¡¢Go To MeetingºÍChatGPTµÈ ¡£¡£¡£¡£¡£¡£ÕâЩαÔìµÄÍøÕ¾·Ö·¢µÄMSI×°ÖóÌÐò±»Ö²ÈëÁËÒ»¸ö¶ñÒâµÄDLLÎļþ£¨"InstallA.dll"£©£¬ £¬ £¬£¬ £¬¸ÃÎļþ½«ÁíÍâÈý¸öDLLÌáÈ¡µ½Ä¿µÄµÄ%PUBLIC%\LibrariesÎļþ¼ÐÖÐ ¡£¡£¡£¡£¡£¡£¶Ô×îа汾RomCom payloadµÄÆÊÎöÅú×¢£¬ £¬ £¬£¬ £¬¿ª·¢ÕßÔÚÆð¾¢ÊµÑé¸ü¶à¶ñÒâÏÂÁ £¬ £¬£¬ £¬ÆäÏÂÁîÊýÄ¿´Ó20ÌõÔöÌíµ½42Ìõ ¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þ»¹Ê¹ÓÃVMProtectÈí¼þ¾ÙÐдúÂë±£»£»£»£»£»¤ºÍ·´VM¹¦Ð§ ¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html