Apple´¹Î£¸üн¨¸´Òѱ»ÀûÓõķì϶CVE-2023-37450
°ä²¼¹¦·ò 2023-07-111¡¢Apple´¹Î£¸üн¨¸´Òѱ»ÀûÓõķì϶CVE-2023-37450
¾ÝýÌå7ÔÂ10ÈÕ±¨Â·£¬Apple°ä²¼ÁËÐÂÒ»ÂÖ¼±¾ç°²È«ÏìÓ¦(RSR)¸üУ¬ÒÔ½¨¸´ÔÚ¹¥»÷Öб»ÀûÓõķì϶£¨CVE-2023-37450£©¡£¸Ã·ì϶ÊÇÔÚWebKitä¯ÀÀÆ÷ÒýÇæÖз¢Ïֵģ¬Ó°ÏìÁËmacOS¡¢iOSºÍiPadOS¡£¹¥»÷Õß¿Éͨ¹ýÓÕÆÖ¸±ê´ò¿ªÔ̺¬¶ñÒâÔì×÷ÄÚÈݵÄÍøÒ³£¬ÔÚÖ¸±êÉ豸ÉÏÖ´ÐÐËÁÒâ´úÂë¡£Apple°µÊ¾ÒÑͨ¹ý¸Ä½ø²é³À´½¨¸´¸Ã·ì϶£¬½¨ÒéËùÓÐЧ»§ÀûÓøò¹¶¡¡£ÕâÊÇ×Ô2023ËêÊ×ÒÔÀ´£¬Apple½¨¸´µÄµÚÊ®¸öÁãÈÕ·ì϶¡£
https://www.bleepingcomputer.com/news/apple/apple-releases-emergency-update-to-fix-zero-day-exploited-in-attacks/
2¡¢ÃÀ¹ú·Òë·þÎñKings of Translationй¶ÊýÍò±Ê¼Í¼
¾Ý7ÔÂ7ÈÕ±¨Â·£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸ö²»ÊÜÃÜÂë±£»¤µÄÊý¾Ý¿â£¬ÆäÖÐÔ̺¬³¬¹ý25000±Ê¼Í¼¡£Í¨¹ýÆäÖеIJο¼×ÊÁϺͷ¢Æ±£¬×êÑÐÈËԱȷ¶¨¸ÃÊý¾Ý¿âÊôÓÚŦԼ·Òë·þÎñÌṩÉÌKings of Translation¡£Ð¹Â¶Êý¾ÝÔ̺¬Ô´´úÂë½ØÍ¼ºÍ¿Í»§ÉÏ´«µÄÎĵµ£¬ÀýÈç˰ÎñÉ걨¡¢»¤ÕÕ¡¢¼ÝÊ»ÅÆÕÕ¡¢µ®ÉúºÍ»éÒö¼Í¼¡¢Ã³Ò×ÎļþºÍǩ֤ÉêÇëµÈ¡£Ä¿Ç°£¬¸ÃÊý¾Ý¿âÒѱ»±£»¤ÆðÀ´£¬Éв»Ã÷ÏÔÔÚ´Ë֮ǰÒѶ³öÁ˶à¾Ã¡£
https://www.hackread.com/global-translation-service-exposed-records/
3¡¢ºÚ¿ÍÐû³ÆÒÑÇÔÈ¡RazerµÄÔ´ÂëºÍÃÜÔ¿µÈÊý¾Ý²¢ÔÚ°µÍøÏúÊÛ
ýÌå7ÔÂ8Èճƣ¬ºÚ¿ÍÔÚ°µÍøÒÔ10ÍòÃÀÔªµÄ¼ÛÖµÏúÊÛRazerµÄÊý¾Ý¡£¹¥»÷ÕßÔÚÌû×ÓÖÐÌáµ½£¬ËûÇÔÈ¡ÁËrazer.com¼°Æä²úÆ·µÄÔ´´úÂë¡¢¼ÓÃÜÃÜÔ¿¡¢Êý¾Ý¿âºÍºó¶Ë½Ó¼ûµÇ¼µÈÐÅÏ¢£¬²¢°µÊ¾¸ÃÊý¾Ý¿âÖ»»áÏúÊÛÒ»´Î¡£´Ë±í£¬Âô¼Ò¶ÔÖÅʹÓÃÖÐÑëÈË£¬Õâͨ³£ÊǶÔÂò¼ÒºÍÂô¼ÒµÄ±£»¤ºÍ±£ÕÏ£¬¼´Õâ²»ÊÇÒ»¸öȦÌס£Ö¤Ã÷Ô̺¬³¤´ï580Ò³µÄÎļþÊ÷ÒÔ¼°·ÖÆçĿ¼ÏÂÎļþ¼ÐµÄ½ØÆÁ¡£RazerÉÐδ¶Ô´ËÊÂ×ö³ö»Ø¸´¡£
https://www.databreaches.net/intellectual-property-allegedly-from-razer-appears-for-sale-on-hacking-forum/
4¡¢MOVEit½¨¸´ÓÖÒ»¸öSQL×¢Èë·ì϶CVE-2023-36934
7ÔÂ7ÈÕ±¨Â·³Æ£¬ProgressÔÚÆä²úÆ·MOVEit TransferÖÐÓÖ·¢ÏÖÁËÒ»¸öÑϳÁµÄSQL×¢Èë·ì϶£¨CVE-2023-36934£©¡£ÀûÓô˷ì϶£¬¹¥»÷Õß¿Éͨ¹ýÏòMOVEit TransferÀûÓÃÌá½»ÌØÔìµÄpayload£¬À´µ¼ÖÂMOVEitÊý¾Ý¿âÄÚÈݴ۸ĺÍй¶¡£°²È«¸üл¹½¨¸´ÁËSQL×¢Èë·ì϶£¨CVE-2023-36932£©ºÍ¿Éµ¼Ö·¨Ê½Òâ±íÖÕÖ¹µÄ·ì϶£¨CVE-2023-36933£©¡£´Ë±í£¬ProgressÒѾö¶¨ÍƳöÿÔ°䲼µÄ¶¨ÆÚ°²È«¸üУ¬³ÆÎª"Service Packs"¡£ÕâÄܹ»¼ò»¯Èí¼þÉý¼¶¹ý³Ì£¬Ê¹ÖÎÀíÔ±¿ÉÄܸü¿ì¸üÇáËɵØÀûÓý¨¸´·¨Ê½¡£
https://securityaffairs.com/148252/security/moveit-transfer-critical-flaw.html
5¡¢×êÑÐÈËÔ±Åû¶Õë¶Ôº«¹úµÄÓïÒô´¹µö¹¤¾ß¼¯Letscall
ThreatFabricÔÚ7ÔÂ7ÈÕÅû¶ÁËȫеÄÓïÒô´¹µö¹¤¾ß¼¯Letscall¡£Õâ´Î¹¥»÷»î¶¯ÖØÒªÕë¶Ôº«¹úµÄÓû§£¬Ñ¡È¡¶à½×¶Î¹¥»÷À´ÓÕʹָ±ê´Ó¼ÙÒâGoogle PlayÉ̵êµÄ´¹µöÍøÕ¾ÏÂÔØ¶ñÒâÀûÓá£Ò»µ©×°ÖÃÁ˶ñÒâÈí¼þ£¬Ëü¾Í»á½«À´µç³Á¶¨Ïòµ½¹¥»÷Õߵĺô½ÐÖÐÐÄ¡£¾¹ýѵÁ·µÄÔËÓªÈËÔ±»á¼ÙÒâÒøÐÐÔ±¹¤£¬¶øºó´ÓºÁÎÞ½äÐĵÄÖ¸±êÄÇÀï»ñÈ¡Ãô¸ÐÐÅÏ¢¡£ÎªÁË·½±ãÓïÒôÁ÷Á¿µÄ·ÓÉ£¬LetscallÀûÓÃÁËVOIPºÍWebRTCµÈ¼¼Êõ£¬»¹ÀûÓÃÁËSTUNºÍTURNºÍ̸¡£
https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset
6¡¢ESET¼òÊöEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷»î¶¯
7ÔÂ6ÈÕ£¬ESET¼òÊöÁËEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷»î¶¯¡£2021Äê1Ô£¬ÔÚ¶à¸ö¹ú¶È·¨Âɲ¿ÃŵÄе÷ϳɹ¦µ·»ÙÁËEmotet£¬µ«ºóÕßÔÚ2021Äê11ÔÂÔٴλع顣2022ËêÊ×£¬EmotetÖ´ÐÐÁ˶à¸öÀ¬»øÓʼþ»î¶¯¡£2022Äê7Ô£¬Î¢ÓĽûÓÃVBAºêµ¼ÖÂEmotet»î¶¯ÏÔ׎µÂä¡£2023Ä꣬Emotet·¢Õ¹ÁËÈý´Î¹¥»÷»î¶¯£¬Ê¹ÓÃÁËǶÈë¶ñÒâVBAºêµÄWordÎļþºÍǶÈëVBScriptµÄOneNoteÎļþµÈ¡£ÕâЩ¹¥»÷´ó¶àÕë¶ÔÈÕ±¾(43%)ºÍÒâ´óÀû(13%)¡£×êÑÐÈËÔ±³Æ£¬Ä¿Ç°Emotet²»»îÔ¾£¬ºÜ¿ÉÄÜÊÇÓÉÓÚδÄÜÕÒµ½ÓÐЧµÄй¥»÷ÔØÌå¡£
https://www.welivesecurity.com/2023/07/06/whats-up-with-emotet/


¾©¹«Íø°²±¸11010802024551ºÅ