CallistoÔø¹¥»÷ÃÀ¹úµÄ3¸öºËÑо¿ÊµÑéÊÒ
Ðû²¼Ê±¼ä 2023-01-10
¾Ý·͸Éç1ÔÂ7ÈÕ±¨µÀ£¬¶íÂÞ˹ºÚ¿ÍÍÅ»ïCallisto¹¥»÷ÁËÃÀ¹úµÄ3¸öºËÑо¿ÊµÑéÊÒBNL¡¢ArgonneºÍLLNL¡£¹¥»÷±¬·¢ÔÚ2022Äê8ÔÂÖÁ9Ô£¬ºÚ¿Íͨ¹ý´¹ÂÚ¹¥»÷Ϊÿ¸öʵÑéÊÒ½¨ÉèÐéαµÄµÇÂ¼Ò³Ãæ£¬²¢ÏòºË¿ÆÑ§¼Ò·¢Ë͵ç×ÓÓʼþÒÔÓÕʹËûÃÇй¶ÃÜÂë¡£Ñо¿Ö°Ô±ÎÞ·¨È·¶¨¹¥»÷ÕßΪºÎÕë¶ÔÕâÈý¸öʵÑéÊÒ£¬ÒÔ¼°ËûÃǵĹ¥»÷ÊÇ·ñÀֳɡ£ÔçÔÚ2020Äê12Ô£¬Ò»Èº¶íÂÞ˹ºÚ¿ÍÒ²Ôø±»Ö¸¿Ø¹¥»÷°üÀ¨ÃÀ¹úºËÄÜ»ú¹¹ÔÚÄÚµÄ40¸ö×éÖ¯¡£
https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/
2¡¢Saint Gheorghe¿µ¸´Ò½Ôº±»ÀÕË÷3¸ö±ÈÌØ±ÒÀ´»Ö¸´Êý¾Ý
¾ÝýÌå1ÔÂ6ÈÕ±¨µÀ£¬ÂÞÂíÄáÑǵÄSaint Gheorghe¿µ¸´Ò½ÔºÔÚ12ÔÂÔâµ½ÁËÀÕË÷¹¥»÷£¬¸Ã¹¥»÷ÈÔÔÚÓ°ÏìÆäÕý³£Ò½ÁÆÔ˶¯¡£¾ÝϤ£¬ºÚ¿Íͨ¹ýʹÓÃÆäÖÐÒ»¼ÒÔËά¹«Ë¾»á¼ûµÄÔ¶³ÌÅþÁ¬À´Íê³É¹¥»÷£¬ËûÔÚ½øÈëϵͳºó¼ÓÃÜÁË12ÔµÄÊý¾Ý¿â£¬²¢ÁôÏÂÁËÊê½ð¼Í¼ҪÇó3±ÈÌØ±Ò£¨Ô¼ºÏ46400Å·Ôª£©¡£Ã½Ì峯´Ë´Î¹¥»÷ºÜÊÇÖØ´ó£¬ÂÞÂíÄáÑÇDIICOTºÍÇå¾²¹«Ë¾BitDefender¶¼ÎÞ·¨½âÃÜÕâЩÎļþ¡£ÏÖÔÚ£¬Õë¶Ô´Ë´Î¹¥»÷Ô˶¯µÄÊÓ²ìÒѾÕö¿ª£¬Ò½ÁÆÔ˶¯½«ºÜ¿ì»Ö¸´¡£
https://securityaffairs.com/140446/cyber-crime/saint-gheorghe-recovery-hospital-ransomware.html
3¡¢BitdefenderÐû²¼ÀÕË÷Èí¼þMegaCortexµÄÃ⺬»ìÃÜÆ÷
ýÌå1ÔÂ5Èճƣ¬Çå¾²¹«Ë¾BitdefenderÐû²¼ÁËÀÕË÷Èí¼þMegaCortexµÄ½âÃÜÆ÷¡£Ê¹ÓýâÃÜÆ÷µÄÒªÁìºÜÊǼòÆÓ£¬ÓÉÓÚËüÊÇÒ»¸ö×ÔÁ¦µÄ¿ÉÖ´ÐÐÎļþ£¬²»ÐèҪװÖò¢¿ÉÒÔ×Ô¶¯ÔÚϵͳÉ϶¨Î»¼ÓÃÜÎļþ¡£±ðµÄ£¬ÎªÁËÇå¾²Æð¼û£¬¸Ã½âÃÜÆ÷¿ÉÒÔ±¸·Ý¼ÓÃÜÎļþ£¬ÒÔ·À½âÃÜÀú³ÌÖзºÆðÎÊÌ⣬µ¼ÖÂÎļþË𻵶øÎÞ·¨»Ö¸´¡£ËäÈ»BitDefenderûÓÐ˵Ã÷ËûÃÇÊÇÔõÑù»ñµÃÁËMegaCortex½âÃÜÆ÷µÄ˽Կ£¬µ«ºÜ¿ÉÄÜÊÇʹÓÃËÕÀèÊÀÕþ¸®·¢Ã÷µÄÖ÷ÃÜÔ¿½¨ÉèµÄ¡£
https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-megacortex-ransomware-decryptor/
4¡¢AppleÒòÔÚApp StoreÉÏͶ·Å¹ã¸æ±»·¨¹ú·£¿î800ÍòÅ·Ôª
1ÔÂ5ÈÕ±¨µÀ³Æ£¬Apple±»·¨¹úÊý¾Ý±£»¤»ú¹¹(CNIL)·£¿î800ÍòÅ·Ôª£¨850ÍòÃÀÔª£©¡£Ôµ¹ÊÔÓÉÊÇAppleÔÚδÕ÷µÃÓû§Ô޳ɵÄÇéÐÎÏÂÍøÂçÓû§Êý¾ÝÓÃÓÚApp StoreÉÏµÄ¹ã¸æÍ¶·Å£¬ÕâÎ¥·´ÁË¡¶·¨¹úÊý¾Ý±£»¤·¨¡·(DPA)µÚ82Ìõ¡£CNILͨ¸æÖ¸³ö£¬ÔÚiOS 14.6Ï£¬µ±Óû§»á¼ûApp Storeʱ£¬ÓÃÓÚ¶àÖÖÄ¿µÄµÄ±êʶ·û£¬°üÀ¨App StoreÉÏµÄ¹ã¸æ¸öÐÔ»¯£¬Ä¬ÈÏÇéÐÎÏ»áÔÚÖÕ¶ËÉÏ×Ô¶¯¶ÁÈ¡¶øÎÞÐèÕ÷µÃÔ޳ɡ£ËäÈ»AppleÒѶÔÕâÒ»ÎÊÌâ¾ÙÐе÷½â£¬µ«CNIL²»µÃ²î³ØÎ¥¹æÊ±´úµÄÐÐΪ·£¿î¡£Apple France½²»°ÈËÌåÏÖ£¬ËûÃÇÍýÏë¶ÔCNILµÄ¾öÒéÌá³öÉÏËß¡£
https://www.bleepingcomputer.com/news/apple/france-fines-apple-for-targeted-app-store-ads-without-consent/
5¡¢Unit 42Åû¶JsonWebTokenÖеÄRCEÎó²îCVE-2022-23529
Unit 42ÔÚ1ÔÂ9ÈÕÅû¶ÁË¿ªÔ´¿âJsonWebTokenÖеÄRCEÎó²î£¨CVE-2022-23529£©¡£¸Ã¿â±»Áè¼Ý22000¸öÏîĿʹÓã¬Ã¿ÔÂÔÚNPMÉϵÄÏÂÔØÁ¿Áè¼Ý3600Íò´Î¡£Îó²î±£´æÓÚJsonWebTokenµÄverify()ÒªÁìÖУ¬ÆäÓÃÓÚÑéÖ¤JWT²¢·µ»Ø½âÂëÐÅÏ¢¡£ÓÉÓÚȱ·¦¶ÔsecretOrPublicKey²ÎÊýµÄ¼ì²éÒÔÈ·¶¨ËüÊÇ×Ö·û´®Õվɻº³åÇø£¬¹¥»÷Õß¿ÉÒÔ·¢ËÍÌØÖÆµÄ¹¤¾ßÔÚÄ¿µÄÉÏÖ´ÐÐí§ÒâÎļþдÈë¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÔÚÑéÖ¤¶ñÒâJWTÇëÇóµÄ·þÎñÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂë¡£ÏÖÔÚ£¬Auth0ÍŶÓÒÑÐÞ¸´¸ÃÎó²î¡£
https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
6¡¢Î¢ÈíÐû²¼¹ØÓÚÕë¶ÔMac×°±¸µÄÀÕË÷Èí¼þµÄÊÖÒÕÆÊÎö±¨¸æ
1ÔÂ6ÈÕ£¬Î¢ÈíÏêÊöÁËÕë¶ÔApple macOSϵͳµÄ²î±ðÀÕË÷Èí¼þϵÁС£±¨¸æÖ¸³ö£¬MacÀÕË÷¹¥»÷µÄ³õʼǰÑÔͨ³£ÒÀÀµÓÚÓû§¸¨ÖúµÄÒªÁ죬ÀýÈçÏÂÔØºÍÔËÐÐαÔìµÄ»òÎäÆ÷»¯µÄÓ¦Óá£Ò²¿ÉÒÔ×÷ΪµÚ¶þ½×¶ÎµÄpayload·Ö·¢£¬»òÓÉÆäËü¶ñÒâÈí¼þ»ò¹©Ó¦Á´¹¥»÷Ô˶¯·Ö·¢»òÏÂÔØ¡£±ðµÄ£¬¶ñÒâÈí¼þ¿ª·¢Õß»áÀÄÓÃÕýµ±¹¦Ð§²¢Í¨¹ýÖÖÖÖÊÖÒÕÀ´Ê¹ÓÃÎó²î¡¢Èƹý·ÀÓù»òвÆÈÓû§À´Ñ¬È¾ËûÃǵÄ×°±¸¡£¸Ã±¨¸æÖ÷Ҫƾ֤¶Ô4ÖÖÀÕË÷Èí¼þ£¨KeRanger¡¢FileCoder¡¢MacRansomºÍEvilQuest£©µÄÆÊÎö£¬À´ÏêϸÐÎòÕâЩÊÖÒÕ¡£
https://thehackernews.com/2023/01/microsoft-reveals-tactics-used-by-4.html


¾©¹«Íø°²±¸11010802024551ºÅ