CallistoÔø¹¥»÷ÃÀ¹úµÄ3¸öºË×êÑг¢ÊÔÊÒ
°ä²¼¹¦·ò 2023-01-10
¾Ý·͸Éç1ÔÂ7ÈÕ±¨Â·£¬¶íÂÞ˹ºÚ¿ÍÍÅ»ïCallisto¹¥»÷ÁËÃÀ¹úµÄ3¸öºË×êÑг¢ÊÔÊÒBNL¡¢ArgonneºÍLLNL¡£¹¥»÷²úÉúÔÚ2022Äê8ÔÂÖÁ9Ô£¬ºÚ¿Íͨ¹ý´¹µö¹¥»÷Ϊÿ¸ö³¢ÊÔÊÒ´´½¨ÐéαµÄµÇÂ¼Ò³Ãæ£¬²¢ÏòºË¿ÆÑ§¼Ò·¢Ë͵ç×ÓÓʼþÒÔÓÕʹËûÃÇй¼ûÜÂë¡£×êÑÐÈËÔ±ÎÞ·¨È·¶¨¹¥»÷ÕßΪºÎÕë¶ÔÕâÈý¸ö³¢ÊÔÊÒ£¬ÒÔ¼°ËûÃǵĹ¥»÷ÊÇ·ñ³É¹¦¡£ÔçÔÚ2020Äê12Ô£¬Ò»Èº¶íÂÞ˹ºÚ¿ÍÒ²Ôø±»Ö¸¿Ø¹¥»÷Ô̺¬ÃÀ¹úºËÄÜ»ú¹¹ÔÚÄÚµÄ40¸ö×éÖ¯¡£
https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/
2¡¢Saint Gheorghe¿µ¸´Ò½Ôº±»ÀÕË÷3¸ö±ÈÌØ±ÒÀ´¸´ÔÊý¾Ý
¾ÝýÌå1ÔÂ6ÈÕ±¨Â·£¬ÂÞÂíÄáÑǵÄSaint Gheorghe¿µ¸´Ò½ÔºÔÚ12ÔÂÔâµ½ÁËÀÕË÷¹¥»÷£¬¸Ã¹¥»÷ÈÔÔÚÓ°ÏìÆäÕý³£Ò½Áƻ¡£¾ÝϤ£¬ºÚ¿Íͨ¹ýʹÓÃÆäÖÐÒ»¼ÒÔËά¹«Ë¾½Ó¼ûµÄÔ¶³ÌÏνÓÀ´ÊµÏÖ¹¥»÷£¬ËûÔÚ½øÈëϵͳºó¼ÓÃÜÁË12ÔµÄÊý¾Ý¿â£¬²¢ÁôÏÂÁËÊê½ð¼Í¼ҪÇó3±ÈÌØ±Ò£¨Ô¼ºÏ46400Å·Ôª£©¡£Ã½Ì峯Õâ´Î¹¥»÷¼«¶È¸´ÔÓ£¬ÂÞÂíÄáÑÇDIICOTºÍ°²È«¹«Ë¾BitDefender¶¼ÎÞ·¨½âÃÜÕâЩÎļþ¡£Ä¿Ç°£¬Õë¶ÔÕâ´Î¹¥»÷»î¶¯µÄµ÷²éÒѾ·¢Õ¹£¬Ò½Áƻ½«ºÜ¿ì¸´Ô¡£
https://securityaffairs.com/140446/cyber-crime/saint-gheorghe-recovery-hospital-ransomware.html
3¡¢Bitdefender°ä²¼ÀÕË÷Èí¼þMegaCortexµÄÃâ·Ñ½âÃÜÆ÷
ýÌå1ÔÂ5Èճƣ¬°²È«¹«Ë¾Bitdefender°ä²¼ÁËÀÕË÷Èí¼þMegaCortexµÄ½âÃÜÆ÷¡£Ê¹ÓýâÃÜÆ÷µÄ²½Ö輫¶Èµ¥Ò»£¬ÓÉÓÚËüÊÇÒ»¸ö¶ÀÁ¢µÄ¿ÉÖ´ÐÐÎļþ£¬²»±ØÒª×°Öò¢Äܹ»×Ô¶¯ÔÚϵͳÉ϶¨Î»¼ÓÃÜÎļþ¡£´Ë±í£¬ÎªÁ˰²È«Æð¼û£¬¸Ã½âÃÜÆ÷Äܹ»±¸·Ý¼ÓÃÜÎļþ£¬ÒÔ·À½âÃܹý³ÌÖгöÏÖÎÊÌ⣬µ¼ÖÂÎļþ°Ü»µ¶øÎÞ·¨¸´Ô¡£¹ÌÈ»BitDefenderûÓÐ×¢Ã÷ËûÃÇÊÇÈôºÎ»ñµÃÁËMegaCortex½âÃÜÆ÷µÄ˽Կ£¬µ«ºÜ¿ÉÄÜÊÇʹÓÃËÕÀèÊÀµ±¾Ö·¢ÏÖµÄÖ÷ÃÜÔ¿´´½¨µÄ¡£
https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-megacortex-ransomware-decryptor/
4¡¢AppleÒòÔÚApp StoreÉÏͶ·Å¸æ°×±»·¨¹ú·£¿î800ÍòÅ·Ôª
1ÔÂ5ÈÕ±¨Â·³Æ£¬Apple±»·¨¹úÊý¾Ý±£»¤»ú¹¹(CNIL)·£¿î800ÍòÅ·Ôª£¨850ÍòÃÀÔª£©¡£ÔÒòÊÇAppleÔÚδÕ÷µÃÓû§Ô޳ɵÄÇé¿öÏÂÍøÂçÓû§Êý¾ÝÓÃÓÚApp StoreÉϵĸæ°×Ͷ·Å£¬ÕâÎ¥·´ÁË¡¶·¨¹úÊý¾Ý±£»¤·¨¡·(DPA)µÚ82Ìõ¡£CNIL²¼¸æÖ¸³ö£¬ÔÚiOS 14.6Ï£¬µ±Óû§½Ó¼ûApp Storeʱ£¬ÓÃÓÚ¶àÖÖÖ÷Õŵıêʶ·û£¬Ô̺¬App StoreÉϵĸæ°×¸öÐÔ»¯£¬Ä¬ÈÏÇé¿öÏ»áÔÚÖÕ¶ËÉÏ×Ô¶¯¶ÁÈ¡¶øÎÞÐèÕ÷µÃÔ޳ɡ£¹ÌÈ»AppleÒѶÔÕâÒ»ÎÊÌâ½øÐв¹¾È£¬µ«CNIL²»µÃ²»ºÏÎ¥¹æÆÚ¼äµÄÐÐΪ·£¿î¡£Apple France½²»°È˰µÊ¾£¬ËûÃÇ´òËã¶ÔCNILµÄ¾ö¶¨Ìá³öÉÏËß¡£
https://www.bleepingcomputer.com/news/apple/france-fines-apple-for-targeted-app-store-ads-without-consent/
5¡¢Unit 42Åû¶JsonWebTokenÖеÄRCE·ì϶CVE-2022-23529
Unit 42ÔÚ1ÔÂ9ÈÕÅû¶ÁË¿ªÔ´¿âJsonWebTokenÖеÄRCE·ì϶£¨CVE-2022-23529£©¡£¸Ã¿â±»³¬¹ý22000¸öÏîĿʹÓã¬Ã¿ÔÂÔÚNPMÉϵÄÏÂÔØÁ¿³¬¹ý3600Íò´Î¡£·ì϶´æÔÚÓÚJsonWebTokenµÄverify()²½ÖèÖУ¬ÆäÓÃÓÚÑéÖ¤JWT²¢·µ»Ø½âÂëÐÅÏ¢¡£ÓÉÓÚ²»×ã¶ÔsecretOrPublicKey²ÎÊýµÄ²é³ÒÔÈ·¶¨ËüÊÇ×Ö·û´®»¹ÊÇ»º³åÇø£¬¹¥»÷ÕßÄܹ»·¢ËÍÌØÔìµÄ¶ÔÏóÔÚÖ¸±êÉÏÖ´ÐÐËÁÒâÎļþдÈë¡£³É¹¦ÀûÓô˷ì϶¿ÉÔÚÑéÖ¤¶ñÒâJWTÒªÇóµÄ·þÎñÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂ롣Ŀǰ£¬Auth0ÍŶÓÒѽ¨¸´¸Ã·ì϶¡£
https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
6¡¢Î¢Èí°ä²¼¹ØÓÚÕë¶ÔMacÉ豸µÄÀÕË÷Èí¼þµÄ¼¼Êõ·ÖÎö»ã±¨
1ÔÂ6ÈÕ£¬Î¢ÈíÏêÊöÁËÕë¶ÔApple macOSϵͳµÄ·ÖÆçÀÕË÷Èí¼þϵÁС£»ã±¨Ö¸³ö£¬MacÀÕË÷¹¥»÷µÄ³õʼý½éͨ³£ÒÀÀµÓÚÓû§¸¨ÖúµÄ²½Ö裬ÀýÈçÏÂÔØºÍÔËÐÐαÔìµÄ»ò±øÆ÷»¯µÄÀûÓá£Ò²Äܹ»×÷ΪµÚ¶þ½×¶ÎµÄpayload·Ö·¢£¬»òÓÉÆäËü¶ñÒâÈí¼þ»ò¹©¸øÁ´¹¥»÷»î¶¯·Ö·¢»òÏÂÔØ¡£´Ë±í£¬¶ñÒâÈí¼þ¿ª·¢Õß»áÀÄÓúϷ¨Ö°Äܲ¢Í¨¹ý¸÷À༼ÊõÀ´ÀûÓ÷ì϶¡¢Èƹý·ÀÓù»òвÆÅ×û§À´Ï°È¾ËûÃǵÄÉ豸¡£¸Ã»ã±¨ÖØÒªÆ¾¾Ý¶Ô4ÖÖÀÕË÷Èí¼þ£¨KeRanger¡¢FileCoder¡¢MacRansomºÍEvilQuest£©µÄ·ÖÎö£¬À´¾ßÌåÃèÊöÕâЩ¼¼Êõ¡£
https://thehackernews.com/2023/01/microsoft-reveals-tactics-used-by-4.html


¾©¹«Íø°²±¸11010802024551ºÅ