AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§
Ðû²¼Ê±¼ä 2021-11-25AppGalleryÖжà¿îÓÎÏ·Ó¦Óñ£´æÄ¾Âí£¬£¬£¬£¬£¬£¬ÒÑѬȾ900¶àÍò×°±¸
11ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬Dr. WebµÄÑо¿Ö°Ô±Åû¶»ªÎªÓ¦ÓÃÊÐËÁAppGalleryÖеÄ190¿îÓÎÏ·Öб£´æÄ¾ÂíAndroid.Cynos.7.origin£¬£¬£¬£¬£¬£¬ÒÑ×°ÖÃÔ¼9300000´Î¡£¡£¡£¸ÃľÂíÊǶñÒâÈí¼þCynosµÄ±äÌ壬£¬£¬£¬£¬£¬Ö¼ÔÚÍøÂçÓû§µÄÐÅÏ¢¡£¡£¡£ÕâЩÓÎÏ·Ö÷ҪʹÓöíÓï¡¢ÖÐÎĺÍÓ¢Ó£¬£¬£¬£¬£¬ÆäÖÐÓÎÏ·¡°¿ìµã¶ãÆðÀ´¡±µÄÏÂÔØÁ¿¸ß´ï2000000´Î¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬¸ÃľÂí¿É·¢ËͺÍ×èµ²¶ÌÐÅ¡¢ÏÂÔØºÍÆô¶¯ÆäËüÄ£¿£¿é£¬£¬£¬£¬£¬£¬ÒÔ¼°ÏÂÔØºÍ×°ÖÃÆäËûÓ¦Óᣡ£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬»ªÎª¹«Ë¾Òѽ«ÕâЩÓÎϷϼܡ£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/124927/malware/android-cynos-7-origin-trojan-infections.html
BIO-ISAC³Æ¹¥»÷ÕßʹÓÃÐÂTardigradeÃé×¼ÉúÎïÖÆÔìÐÐÒµ
ÉúÎï¾¼ÃÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(BIO-ISAC)ÔÚ11ÔÂ23ÈÕÐû²¼¹ØÓÚʹÓÃTardigradeµÄ¹¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£×Ô2021Äê´º¼¾ÒÔÀ´£¬£¬£¬£¬£¬£¬¹¥»÷Õß×îÏÈʹÓôË×Ô½ç˵¶ñÒâÈí¼þ¹¥»÷ÉúÎïÖÆÔìÐÐÒµµÄ¹«Ë¾¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ÕâÊÇSmokeLoaderµÄ±äÌ壬£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹Âڻ»òUÅ̾ÙÐзַ¢¡£¡£¡£ÓÉÓÚËü¿ÉÒÔ´ÓÄÚ´æÖÐÖØÐ±àÒë¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬£¬Òò´Ë²»»áÁôÏÂÏàͬµÄÊðÃû£¬£¬£¬£¬£¬£¬Õâʹʶ±ð¡¢¸ú×ÙºÍɾ³ý±äµÃÔ½·¢ÄÑÌâ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã±äÌå¿ÉÒÔ×ÔÖ÷ÔËÐУ¬£¬£¬£¬£¬£¬ÉõÖÁÎÞÐèC2ÅþÁ¬¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-target-biomanufacturing-with-stealthy-tardigrade-malware/
AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§
Apple¹«Ë¾ÔÚ11ÔÂ23ÈÕ¶ÔNSO Group¼°Æäĸ¹«Ë¾Q Cyber TechnologiesÌáÆðËßËÏ£¬£¬£¬£¬£¬£¬Ö¸ÔðÆäʹÓÃPegasus²»·¨¼àÊÓiOSÓû§¡£¡£¡£PegasusÊÇÒ»ÖÖ¾üʼ¶Ìع¤Èí¼þ£¬£¬£¬£¬£¬£¬Í¨³£»£»áʹÓÃÁãµã»÷Îó²îÀ´Ñ¬È¾Ä¿µÄ×°±¸£¬£¬£¬£¬£¬£¬AppleÔÚËßËÏÖÐÌØÊâÌá¼°ÆäʹÓÃiMessageÖеÄÎó²îFORCEDENTRY¹¥»÷9¸ö°ÍÁÖÈËÊ¿¡£¡£¡£Apple¹«Ë¾³ÆËûÃǵÄÄ¿µÄÊÇÓÀÊÀµØÕ¥È¡NSO GroupʹÓÃÈκÎAppleÈí¼þ¡¢Ð§ÀÍ»ò×°±¸¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/11/apple-sues-israels-nso-group-for-spying.html
Ñо¿ÍŶÓչʾÔõÑùʹÓôòÓ¡»úµÄ3ÖÖ¹¥»÷ģʽPrintjack
Òâ´óÀûÑо¿ÍŶÓչʾͳ³ÆÎªPrintjackµÄ3ÖÖй¥»÷ģʽ£¬£¬£¬£¬£¬£¬¿ÉʹÓôòÓ¡»úÔì³ÉÑÏÖØµÄЧ¹û¡£¡£¡£Ö÷ҪʹÓÃShodanɨÃèTCP¶Ë¿Ú9100¿ª·ÅµÄ×°±¸£¬£¬£¬£¬£¬£¬ÆäÖе¹ú¡¢¶íÂÞ˹¡¢·¨¹ú¡¢ºÉÀ¼ºÍÓ¢¹úµÄ̻¶װ±¸×î¶à¡£¡£¡£µÚÒ»ÖÖ¹¥»÷ÊÇʹÓÃCVE-2014-3741µÈÎó²î£¬£¬£¬£¬£¬£¬¿ØÖÆ´òÓ¡»úÌᳫDDoS¹¥»÷£»£»µÚ¶þÖÖÊÇÖ½ÕÅDoS¹¥»÷£¬£¬£¬£¬£¬£¬Ëüͨ¹ý·¢ËÍÖØ¸´µÄ´òӡʹÃüÀ´ºÄ¾¡Ä¿µÄ×°±¸ÖеÄËùÓÐÖ½ÕÅ£»£»×îÑÏÖØµÄÊÇʹÓÃÆä¾ÙÐÐÖÐÐÄÈ˹¥»÷£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡´òÓ¡µÄÄÚÈÝ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/researchers-warn-of-severe-risks-from-printjack-printer-attacks/
°ëµ¼Ì幫˾MediaTekÐÞ¸´ÆäоƬÖеĶà¸öÇå¾²Îó²î
Check PointÔÚ11ÔÂ24ÈÕÅû¶ÁËÖйų́Í幫˾Áª·¢¿Æ£¨MediaTek£©²úÆ·ÖÐ4¸öÎó²îµÄϸ½Ú¡£¡£¡£MediaTekÊÇÈ«Çò×î´óµÄ°ëµ¼Ì幫˾֮һ£¬£¬£¬£¬£¬£¬×èÖ¹2021ÄêµÚ¶þ¼¾¶È£¬£¬£¬£¬£¬£¬43%µÄÖÇÄÜÊÖ»ú¶¼½ÓÄÉÁËÁª·¢¿ÆÏµÍ³Ð¾Æ¬ (SoC) £¬£¬£¬£¬£¬£¬°üÀ¨Ð¡Ãס¢Oppo¡¢RealmeºÍVivoµÈ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬MediaTekÒÑÔÚ10Ô·ÝÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÆäÖеÄ3¸öÔ½½çдÈëºÍÍâµØÌáȨÎó²î£¨CVE-2021-0661¡¢CVE-2021-0662ºÍCVE-2021-0663£©£¬£¬£¬£¬£¬£¬²¢Ô¤¼ÆÔÚ12ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÚ4¸öÎó²î£¨CVE-2021-0673£©¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/mediatek-eavesdropping-bug-impacts-30-percent-of-all-android-smartphones/
KasperskyÐû²¼2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ
KasperskyÓÚ11ÔÂ23ÈÕÐû²¼ÁË2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚδÀ´¹¥»÷Õß¿ÉÄÜ»áïÔÌÿ´Î¹¥»÷µÄÄ¿µÄÊýÄ¿£¬£¬£¬£¬£¬£¬Ëõ¶Ì¶ñÒâÈí¼þµÄÉúÃüÖÜÆÚ²¢×î´óÏ޶ȵØïÔ̶ñÒâ»ù´¡ÉèÊ©µÄʹÓᣡ£¡£±ðµÄ£¬£¬£¬£¬£¬£¬±¨¸æÌåÏÖÒÔϹ¥»÷Õ½ÂÔºÍÊÖÒÕÎÞÒɽ«ÔÚÀ´Äê±»Æð¾¢Ê¹Ó㺴¹ÂÚ¹¥»÷¡¢½«Ó²¼þÖеÄÒÑÖªÎó²î×÷ÎªÉøÍ¸Ç°ÑÔ¡¢Ê¹ÓòÙ×÷ϵͳ×é¼þºÍIT²úÆ·ÖеÄÁãÈÕÎó²î¡¢ÈëÇÖÓòÃû×¢²áÉ̺ÍÈÏÖ¤»ú¹¹ÒÔ¼°Õë¶Ô¹©Ó¦É̵Ĺ¥»÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threats-to-ics-and-industrial-enterprises-in-2022/104957/