Apple°ä²¼´¹Î£¸üн¨¸´±»ÀûÓ÷ì϶CVE-2023-42824

°ä²¼¹¦·ò 2023-10-07

1¡¢Apple°ä²¼´¹Î£¸üн¨¸´±»ÀûÓ÷ì϶CVE-2023-42824


¾ÝýÌå10ÔÂ4ÈÕ±¨Â· £¬Apple°ä²¼ÁË´¹Î£°²È«¸üР£¬À´½¨¸´Ó°ÏìiPhoneºÍiPadµÄÒѱ»ÀûÓ÷ì϶¡£ÕâÊÇ´æÔÚÓÚÄÚºËÖеÄȨÏÞÌáÉý·ì϶£¨CVE-2023-42824£© £¬iOS 16.6֮ǰµÄ°æ±¾¶¼¿ÉÄÜÊÜ´Ë·ì϶µÄÓ°Ïì £¬ÉÐδ°ä²¼¹¥»÷ÕßÉí·Ý¡£ÕâÊÇ×ÔËêÊ×ÒÔÀ´½¨¸´µÄµÚ17¸ö±»ÀûÓ÷ì϶¡£´Ë±í £¬Õâ´Î¸üл¹½¨¸´ÁËWebRTCÖеĻº³åÇøÒç¶Âí½Å£¨CVE-2023-5217£© £¬¿ÉÄܵ¼ÖÂËÁÒâ´úÂëÖ´ÐС£


https://securityaffairs.com/151968/hacking/apple-zero-days-2.html


2¡¢»ùÒò¼ì²â¹«Ë¾23andMeÔ⵽ײ¿â¹¥»÷Êý°ÙÍòÓû§ÐÅϢй¶


¾Ý10ÔÂ6ÈÕ±¨Â· £¬ºÚ¿ÍÐû³Æ´Ó23andMeÇÔÈ¡ÁËÖÁÉÙ700ÍòÓû§µÄÊý¾Ý £¬²¢ÔÚBreachedºÚ¿ÍÂÛ̳ÉÏÏúÊÛ¡£×î³õ¹¥»÷Õß°ä²¼ÁË100ÍòÐеÂÒáÓÌÌ«È˵ÄÊý¾Ý £¬ÔÚ10ÔÂ4ÈÕÓÖÌá³öÒÔÿ¸ö23andMeÕË»§1-10ÃÀÔªµÄ¼ÛÖµÅúÁ¿ÏúÊÛÊý¾Ý×ÊÁÏ £¬¾ßÌå¼Ûֵȡ¾öÓڲɰìÊýÁ¿¡£23andMe½«Õâ´Îй¶¹éÒòÓÚײ¿â¹¥»÷ £¬²¢°µÊ¾ËûÃǵÄϵͳûÓÐÔâµ½¹¥»÷¡£×êÑÐÈËÔ±½¨Òé £¬Óû§Ó¦Ô¤·À³Á¸´Ê¹ÓÃͳһ¸öÃÜÂë¡£


https://www.hackread.com/hacker-claims-dna-service-23andme-users-data/


3¡¢Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½¹¥»÷µ¼Ö·þÎñÁÙʱÖжÏ


ýÌå10ÔÂ5ÈÕ³Æ £¬Ó¢¹úµçÐŹ«Ë¾Lyca MobileÔâµ½ÍøÂç¹¥»÷µ¼ÖÂÆä·þÎñÒâ±íÖÐ¶Ï £¬¿ÉÄÜ»¹»áΣ¼°¿Í»§Êý¾Ý¡£¸Ã¹«Ë¾Îª60¸ö¹ú¶ÈÌá¹©ÒÆ¶¯µçÐźÍÓïÒôIP(VoIP)·þÎñ £¬¹¥»÷²úÉúÔÚÖÜÄ© £¬Ó°ÏìÁ˳ýÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÎÚ¿ËÀ¼ºÍÍ»Äá˹֮±íµÄËùÓйú¶È¡£¾ßÌåÀ´Ëµ £¬¿Í»§ºÍÁãÊÛÉ̳ÆÎÞ·¨½Ó¼û¸Ã¹«Ë¾µÄ³äÖµÃÅ»§ £¬¹úÄں͹ú¼Êºô½Ð·þÎñÒ²´æÔÚÎÊÌâ¡£Lyca³ÆÆäÊ×Òª¹¤×÷ÊÇÈ·±£¿Í»§Êý¾ÝµÄ°²È« £¬Ä¿Ç°ÔÚµ÷²éÊÇ·ñÓÐÓ×ÎÒÐÅϢй¶ £¬²¢°µÊ¾ËùÓмͼ¶¼ÊÇÆëÈ«¼ÓÃܵÄ¡£


https://therecord.media/cyberattack-on-lyca-stops-calls


4¡¢EclecticIQÅû¶ÒǪ̂»ýµçΪµö¶üÕë¶Ô°ëµ¼ÌåÐÐÒµµÄ¹¥»÷


EclecticIQÔÚ10ÔÂ5ÈÕÅû¶ÁËÕë¶Ô¶«Ñǰ뵼ÌåÐÐÒµµÄ¼äµý»î¶¯¡£¹¥»÷ÕßÀûÓÃÒǪ̂»ýµçΪÖ÷ÌâµÄµö¶ü £¬·Ö·¢ÁËHyperBro¼ÓÔØ·¨Ê½ £¬ÒÔÔÚ±»Ï°È¾µÄÉ豸ÉÏ×°ÖÃCobalt Strike beacon £¬´Ó¶ø½øÐÐÔ¶³Ì½Ó¼û¡£×êÑÐÈËÔ±»¹·¢ÏÖÁËÒ»¸ö¶ñÒâÈí¼þÏÂÔØ·¨Ê½ £¬ËüÀûÓÃPowerShellÖеÄBitsTransferÄ£¿é £¬´Ó¿ÉÄÜÊDZ»ÈëÇÖµÄCobra DocGuard·þÎñÆ÷ÉÏ»ñÈ¡¶ñÒâ¶þ½øÔìÎļþ¡£±»ÈëÇÖµÄCobra DocGuard·þÎñÆ÷ÉÏÍйÜÁËÒ»¸ö»ùÓÚGOµÄºóÃÅ"ChargeWeapon" £¬¿ÉÄÜÓÉͳһ¹¥»÷ÕßÓÚ8ÔÂ21ÈÕÉÏ´«¡£ 


https://blog.eclecticiq.com/chinese-state-sponsored-cyber-espionage-activity-targeting-semiconductor-industry-in-east-asia


5¡¢ESET·¢ÏÖÀûÓÃDinodasRAT¹¥»÷¹çÑ͵͵³µ±¾Ö»ú¹¹µÄ»î¶¯


10ÔÂ5ÈÕ £¬ESET³ÆÆä·¢ÏÖÁËÕë¶Ô¹çÑ͵͵³µ±¾Ö»ú¹¹µÄ¹¥»÷»î¶¯Operation Jacana¡£¸Ã»î¶¯ÓÚ½ñÄê2Ô·ݱ»¼ì²âµ½ £¬ËüÉæ¼°µ½Óã²æÊ½ÍøÂç´¹µö¹¥»÷ £¬·Ö·¢ÁËÓÉC++¿ª·¢µÄкóÃÅDinodasRAT¡£DinodasRATʹÓÃTiny¼ÓÃÜËã·¨(TEA)¶ÔÆä·¢Ë͵½C&CµÄÐÅÏ¢½øÐмÓÃÜ £¬¿ÉÇÔÈ¡Îļþ¡¢½ÚÔìWindows×¢²á±íÏîºÍÖ´ÐÐCMDºÅÁîµÈ¡£³ýÁËDinodasRAT Ö®±í £¬¹¥»÷Õß»¹Ê¹ÓÃÁËKorplug £¬¸Ã¹¤¾ßͨ³£ÓëMustang PandaµÈÍÅ»ïÓйØ¡£


https://www.welivesecurity.com/en/eset-research/operation-jacana-spying-guyana-entity/


6¡¢Group-IB¼ì²âµ½Õë¶ÔÔ½ÄϽðÈÚÐÐÒµµÄľÂíGoldDigger


10ÔÂ5ÈÕ £¬Group-IB°ä²¼Á˹ØÓÚÐÂAndroidľÂíGoldDiggerµÄ·ÖÎö»ã±¨¡£¸Ã¶ñÒâÈí¼þÖÁÉÙ×Ô6ÔÂÆð¾ÍÒ»Ïò»îÔ¾ £¬Õë¶Ô50¶à¸öÔ½ÄϵÄÒøÐÓ×¢µç×ÓÇ®°üºÍ¼ÓÃÜÇ®°üÀûÓ÷¨Ê½¡£GoldDigger¼ÙÒâÁËÔ½Äϵ±¾ÖÃÅ»§ÍøÕ¾ºÍ±¾µØÄÜÔ´¹«Ë¾ £¬ÖØÒªÖ÷ÕÅÊÇÇÔÈ¡ÒøÐÐÆ¾Ö¤¡£Óм£ÏóÅú×¢ £¬¸Ã»î¶¯¿ÉÄÜ»áÀ©´óµ½Õû¸öÑÇÌ«µØÓòºÍÎ÷°àÑÀÓï¹ú¶È¡£¸ÃľÂí»¹Ê¹ÓÃÁ˸´Ôӵı£»¤»úÔì £¬ÀûÓúϷ¨Èí¼þVirbox ProtectorÈÆ¹ý¼ì²â¡£


https://www.group-ib.com/blog/golddigger-fraud-matrix/