×êÑÐÈËÔ±ÑÝʾÈôºÎͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À­

°ä²¼¹¦·ò 2022-05-19
1¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À­


¾ÝýÌå5ÔÂ17ÈÕ±¨Â·£¬NCC GroupµÄ×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖ½øÐе͹¦ºÄÀ¶ÑÀ(BLE)Öм̹¥»÷ÐµĹ¤¾ß£¬¿ÉÈÆ¹ýÏÖÓб £»¤ÔÚÖ¸±êÉϽøÐÐÉí·ÝÑéÖ¤¡£ÔÚ´ËÀ๥»÷ÖУ¬¹¥»÷ÕßÄܹ»À¹½Ø²¢°Ñ³ÖÁ½·½Ö®¼äµÄͨѶ¡£ÌØË¹À­Model 3ºÍModel Y¶¼Ê¹ÓÃÁË»ùÓÚBLEµÄϵͳ£¬Òò¶ø¹¥»÷¿ÉÓÃÓÚ½âËøºÍÆô¶¯Æû³µ¡£NCC°µÊ¾£¬¹¥»÷Ö´ÐÐԼνöÐèÊ®ÃëÖÓ¡£¹ÌÈ»ÕâÖÖBLE¹¥»÷µÄ¼¼Êõϸ½ÚÉÐδ°ä²¼£¬µ«×êÑÐÈËÔ±³ÆËûÃÇÒѾ­ÔÚÌØË¹À­Model 3ÉϲâÊÔÁËÕâÒ»²½Öè¡£


https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/


2¡¢VMware¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶CVE-2022-22972


5ÔÂ18ÈÕ£¬VMware°ä²¼°²È«¸üУ¬½¨¸´ÁËÓ°Ïì¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2022-22972£©¡£²¼¸æÖ¸³ö£¬·ì϶»áÓ°ÏìWorkspace ONE Access¡¢VMware Identity Manager(vIDM)ºÍvRealize Automation£¬ÓµÓÐÍøÂç½Ó¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÄÜ»ñµÃÖÎÀíȨÏÞÇÒ²»±ØÒª½øÐÐÉí·ÝÑéÖ¤¡£Õâ´Î¸üл¹½¨¸´ÁËÁíÒ»¸ö±¾µØÌáȨ·ì϶(CVE-2022-22973)£¬¿ÉÓÃÀ´½«È¨ÏÞÌáÉýΪroot¡£VMware°µÊ¾£¬¼øÓÚ·ì϶µÄÑϳÁÐÔ£¬Ç¿ÁÒ½¨Òéµ±¼´²ÉÈ¡Ðж¯½øÐн¨¸´¡£


https://www.bleepingcomputer.com/news/security/vmware-patches-critical-auth-bypass-flaw-in-multiple-products/


3¡¢×êÑÐÍŶӷ¢ÏÖmacOS¶ñÒâÈí¼þUpdateAgentµÄбäÖÖ


Jamf Threat LabsÔÚ5ÔÂ16ÈÕ°ä²¼µÄ»ã±¨ÖÐÅû¶ÁËmacOS¶ñÒâÈí¼þUpdateAgentбäÖÖµÄϸ½ÚÐÅÏ¢¡£UpdateAgentÓÚ2020Äêµ×³õ´Î±»·¢ÏÖ£¬¶ûºóÒÑÑݱäΪ¶ñÒâÈí¼þdropper£¬¿ÉÈÆ¹ýmacOS Gatekeeper± £»¤¡£Õâ´Î·¢ÏÖµÄбäÌå»ùÓÚSwift£¬¼Ù×°³ÉÃûΪ"PDFCreator"ºÍ"ActiveDirectory"µÄMach-O¶þ½øÔìÎļþ£¬Ö´ÐÐʱÓëÔ¶³Ì·þÎñÆ÷³ÉÁ¢ÏνӲ¢¼ìË÷ÒªÖ´ÐеÄbash¾ç±¾¡£ÔÚ·¢ÏÖʱ£¬ÕâЩ¶þ½øÔìÎļþÔÚVirusTotalÖеļì²âÂÊΪÁã¡£


https://www.jamf.com/blog/updateagent-adapts-again/


4¡¢ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Omnicell³ÆÆäϵͳÔâµ½ÀÕË÷¹¥»÷


¾Ý5ÔÂ17ÈÕ±¨Â·£¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾OmnicellÔâµ½ÁËÀÕË÷¹¥»÷¡£OmnicellÔÚ5ÔÂ9ÈÕÔÚÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄÎļþÖаµÊ¾£¬ÀÕË÷¹¥»÷²úÉúÔÚ5ÔÂ4ÈÕ£¬Æä²¿ÃÅÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì¡£´Ë±í£¬¸ÃÊÂÎñ¿ÉÄܵ¼Ö¸ù«Ë¾µÄóÒ×»úÃÜ»òÆäËü֪ʶ²úȨµÄÃÔʧ£¬ÒÔ¼°¹«Ë¾Ô±¹¤¡¢¿Í»§ºÍ¹©¸øÉ̵ÈÈ˵ÄÓ×ÎÒÐÅϢй¶¡£½ØÖÁ5ÔÂ17ÈÕ£¬OmnicellÈÔδÔÚÆäÍøÕ¾Éϰ䲼ÓйØÎ¥¹æµÄÕýʽ֪ͨ¡£


https://www.infosecurity-magazine.com/news/ransomware-healthcare-omnicell/


5¡¢¶à¹ú°²È«»ú¹¹½áºÏ°ä²¼³£¼ûµÄ¹¥»÷ý½éµÄ°²È«Õ÷ѯ


5ÔÂ17ÈÕ£¬À´×ÔÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢ºÉÀ¼ºÍÓ¢¹úµÄ¶à¸ö»ú¹¹½áºÏ°ä²¼ÁËÒ»·Ý°²È«Õ÷ѯ¡£Õ÷ѯ½ÒʾÁ˹¥»÷Õß×î³£ÀûÓÃ10¸ö³õʼ¹¥»÷ý½é£¬Ô̺¬²»Ç¿ÔìÖ´Ðжà³É·ÖÉí·ÝÑéÖ¤(MFA)¡¢Ã»ÓÐÕýÈ·µÄÀûÓÃȨÏÞ¼°½Ó¼û½ÚÔìÁбíÖеÄÃýÎó¡¢Èí¼þδ¸üС¢Ê¹ÓÃĬÈÏÅäÖûòĬÈÏÓû§ÃûºÍÃÜÂë¡¢Ô¶³Ì·þÎñ²»×ã×ã¹»µÄ½ÚÔìºÍδִÐÐÇ¿ÃÜÂëÕ½ÊõµÈ¡£´Ë±í£¬¸ÃÕ÷ѯ»¹ÌṩÁË»º½â´ëÊ©£¬ÒÔÔ®ÊÖ×éÖ¯¼ÓÇ¿ÆäÍøÂç·ÀÓù¡£


https://www.bleepingcomputer.com/news/security/cybersecurity-agencies-reveal-top-initial-access-attack-vectors/


6¡¢Microsoft°ä²¼Õë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ»ã±¨


5ÔÂ17ÈÕ£¬Microsoft°ä²¼ÁËÕë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ·ÖÎö»ã±¨¡£Ëæ×ÅÕë¶Ô¼ÓÃÜÇ®±ÒµÄ¹¥»÷µÄÏÔÖøÔö³¤£¬Microsoft×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÐÂÍþвÀàÐ͵ijöÏÖ£¬²¢³ÆÆäΪcryware¡£CrywareÊÇÖ±½Ó´Ó·ÇÍйܼÓÃÜÇ®±ÒÇ®°ü£¨Ò²³ÆÎªÈÈÇ®°ü£©ÍøÂçºÍÇÔÈ¡Êý¾ÝµÄÐÅÏ¢ÇÔÈ¡·¨Ê½¡£Ä¿Ç°ÀûÓüÓÃÜÇ®±ÒµÄÍþвÔ̺¬Cryptojackers¡¢ÀÕË÷Èí¼þ¡¢stealersºÍClipBankerľÂí¡£Cryware¿ÉÄÜ»áÔì³ÉÑϳÁµÄ²ÆÕþËðʧ£¬´Ë¿ÌҲûÓÐÖ§³ÖϵͳÄܹ»Ô®ÊÖ×·»Ø±»µÁµÄ¼ÓÃÜÇ®±Ò¡£


https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/