Cuckoo macOS¶ñÒâÈí¼þ¿É¿ØÖÆMac²¢ÇÔÈ¡ÃÜÂë
Ðû²¼Ê±¼ä 2024-05-085ÔÂ7ÈÕ£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÐ嵀 Mac ¶ñÒâÈí¼þ¶ÔÔËÐÐ Apple Silicon µÄÐÂÐÍ Mac ÒÔ¼°»ùÓÚ Intel µÄ¾É Mac Ìᳫ¹¥»÷¡£¡£¡£¡£¾Ý¡¶ºÚ¿ÍÐÂÎÅ¡·±¨µÀ£¬£¬£¬Kandji µÄÇå¾²Ñо¿Ö°Ô±½«ÕâÖÖ¶ñÒâÈí¼þ³ÆÎª Cuckoo¡£¡£¡£¡£³ýÁËÕë¶Ô½ÏÐÂºÍ½Ï¾ÉµÄ Mac µçÄÔÍ⣬£¬£¬Cuckoo µÄÓëÖÚ²î±ðÖ®´¦»¹ÔÚÓÚËüµÄÐÐΪÀàËÆÓÚÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þºÍÌØ¹¤Èí¼þµÄ»ìÏýÌå¡£¡£¡£¡£ÔÚһƪ²©¿ÍÎÄÕÂÖУ¬£¬£¬Kandji µÄ Adam Kohler ºÍ Christopher Lopez Ú¹ÊÍ˵£¬£¬£¬ËûÃÇÔÚ¶ñÒâÈí¼þ¸ú×ÙÍøÕ¾ VirusTotal ÉÏ·¢Ã÷ÁËÒ»¸öÒÔǰδ¼ì²âµ½µÄ¶ñÒâ Mach-O ¶þ½øÖÆÎļþ£¬£¬£¬ÆäÃû³ÆÎª¡°DumpMedia Spotify Music Converter¡±¡£¡£¡£¡£È»ºó£¬£¬£¬ËûÃÇÔÚÍøÉϲéÕҸóÌÐòµÄÃû³Æ£¬£¬£¬·¢Ã÷¸Ã³ÌÐòÊÇ´ÓÒ»¸öÃûΪ dumpmedia[.]com µÄÍøÕ¾·Ö·¢µÄ£¬£¬£¬¸ÃÍøÕ¾Ìṩ¶à¸öÓ¦ÓóÌÐò£¬£¬£¬¿ÉÒÔ×ÊÖúÓû§½«Á÷ýÌåЧÀÍÖеÄÒôÀÖת»»Îª MP3 Îļþ¡£¡£¡£¡£
https://news.hitb.org/content/new-cuckoo-macos-malware-can-take-over-all-macs-and-steals-your-passwords-too
2. Ñо¿ÍŶÓÑÝʾÕë¶ÔËùÓÐVPN³ÌÐòµÄ¹¥»÷TunnelVision
5ÔÂ7ÈÕ£¬£¬£¬Ñо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖÕë¶ÔÏÕЩËùÓÐÐéÄâרÓÃÍøÂçÓ¦ÓóÌÐòµÄ¹¥»÷£¬£¬£¬ÆÈʹËüÃÇÔÚ¼ÓÃÜËíµÀÖ®Íâ·¢ËͺÍÎüÊÕ²¿·Ö»òËùÓÐÁ÷Á¿£¬£¬£¬Ö¼ÔÚ±£»£»£»¤ÆäÃâÔâ¿ú̽»ò¸Ä¶¯¡£¡£¡£¡£Ñо¿Ö°Ô±½«Æä¹¥»÷ÃüÃûΪ TunnelVision£¬£¬£¬½«´«ÈëºÍ´«³öµÄ»¥ÁªÍøÁ÷Á¿·â×°ÔÚ¼ÓÃÜËíµÀÖв¢Òþ²ØÓû§µÄ IP µØµã¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬µ±ËùÓÐ VPN Ó¦ÓóÌÐòÅþÁ¬µ½¶ñÒâÍøÂçʱ£¬£¬£¬Ëü¶¼»áÓ°ÏìËüÃÇ£¬£¬£¬²¢ÇÒ³ýÁ˵±Óû§µÄ VPN ÔÚ Linux »ò Android ÉÏÔËÐÐʱ֮Í⣬£¬£¬Ã»ÓÐÆäËûÒªÁì¿ÉÒÔ±ÜÃâ´ËÀ๥»÷¡£¡£¡£¡£ËûÃÇ»¹ÌåÏÖ£¬£¬£¬ËûÃǵĹ¥»÷ÊÖÒÕ¿ÉÄÜ×Ô 2002 ÄêÒÔÀ´¾ÍÒѳÉΪ¿ÉÄÜ£¬£¬£¬²¢ÇÒ´ÓÄÇʱÆð¾ÍÒѾ±»·¢Ã÷²¢ÔÚÒ°ÍâʹÓᣡ£¡£¡£Ò»¶ÎÊÓÆµÑÝʾڹÊ͵À£¬£¬£¬TunnelVision µÄЧ¹ûÊÇ¡°Êܺ¦ÕßµÄÁ÷Á¿ÏÖÔÚÒѱ»½Ò¿ª²¢Ö±½Óͨ¹ý¹¥»÷Õß¾ÙÐзÓÉ¡±¡£¡£¡£¡£¡°¹¥»÷Õß¿ÉÒÔ¶ÁÈ¡¡¢É¾³ý»òÐÞ¸Äй¶µÄÁ÷Á¿£¬£¬£¬¶øÊܺ¦ÕßÔò¼á³ÖÓë VPN ºÍ»¥ÁªÍøµÄÅþÁ¬¡£¡£¡£¡£¡±
https://news.hitb.org/content/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose
3. αװ³ÉÖ¤ÊéµÄ LNK Îļþ·Ö·¢ RokRAT ¶ñÒâÈí¼þ
5ÔÂ7ÈÕ£¬£¬£¬AhnLabÇå¾²Ç鱨ÖÐÐÄ£¨ASEC£©ÒÑÈ·ÈÏÒ»Á¬Èö²¥Òì³£¾ÞϸµÄ¿ì½Ý·½·¨Îļþ£¨*.LNK£©£¬£¬£¬ÓÃÓÚÈö²¥ºóÃÅÀàÐ͵ĶñÒâÈí¼þ¡£¡£¡£¡£×î½üÈ·ÈϵĿì½Ý·½·¨Îļþ£¨*.LNK£©±»·¢Ã÷ÊÇÕë¶Ôº«¹úÓû§£¬£¬£¬ÌØÊâÊÇÓ볯ÏÊÓйصÄÓû§¡£¡£¡£¡£È·ÈϵÄLNKÎļþÃûÈçÏ£º¹ú¼ÒÐÅϢѧԺµÚ°ËÆÚ×ۺϿγÌÖ¤Ê飨×îÖÕ£©.lnk¡¢ÃŽûÃû²á2024.lnk¡¢¶«±±ÏîÄ¿£¨ÃÀ¹ú¹ú»áÑо¿Ð§ÀÍ´¦£¨CRS ±¨¸æ£©.lnkºÍÉèÊ©Çåµ¥.lnk¡£¡£¡£¡£ÒÑÈ·ÈϵÄLNKÎļþ°üÀ¨Í¨¹ýCMDÖ´ÐÐPowerShellµÄÏÂÁ£¬£¬ÆäÀàÐÍÓëÈ¥ÄêÐû²¼µÄ¡°RokRAT Malware Distributed Through LNK Files (*.lnk): RedEyes (ScarCruft)¡± [1]Öз¢Ã÷µÄÀàÐÍÀàËÆ¡£¡£¡£¡£¹ØÓÚÕâÖÖÀàÐ͵ÄÒ»¸öÖµµÃ×¢ÖØµÄÊÂʵÊÇ£¬£¬£¬ËüÔÚ LNK ÎļþÖаüÀ¨Õýµ±ÎĵµÎļþ¡¢¾ç±¾´úÂëºÍ¶ñÒâ PE Êý¾Ý¡£¡£¡£¡£
https://asec.ahnlab.com/en/65076/
4. 2023ÄêµÚÈý·½Ôì³ÉµÄÊý¾Ýй¶ÔöÌíÁË68%
5ÔÂ7ÈÕ£¬£¬£¬½üÄêÀ´¹©Ó¦Á´Î¥¹æÊÂÎñÒ»Ö±³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£¡£Æ¾Ö¤ Verizon ×îеÄÊý¾Ýй¶ÊӲ챨¸æ (DBIR)£¬£¬£¬½ü¼¸¸öÔÂÀ´ÕâÒ»ÔöÌíÓÈΪ¼±¾ç¡£¡£¡£¡£2023 ÄêËùÓÐÎ¥¹æÐÐΪÖÐÔ¼ÓÐ 15% Éæ¼°µÚÈý·½£¬£¬£¬±È 2022 ÄêµÄ 9% ÏÔ×ÅÔöÌí¡£¡£¡£¡£²»¹ý£¬£¬£¬ÕâЩÊý×ÖÓë»á¼ÆºÍ¹¥»÷µÄ¹ØÏµÍ¬ÑùÖ÷Òª¡£¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬±»Ê¹ÓõÄÎó²îÊÇ DBIR ¹©Ó¦Á´Ö¸±êÖÐ×î³£¼ûµÄÊÂÎñ¼Í¼ºÍÊÂÎñ¹²Ïí (VERIS) ÐÐΪ´Ê»ã£¬£¬£¬Æä´ÎÊǺóÃÅ/ÏÂÁîÓë¿ØÖÆ (C2) ºÍÀÕË÷¡£¡£¡£¡£Verizon ÍþвÇ鱨¸±×ܼà Alex Pinto ÌåÏÖ£ºÈ¥Ä꣬£¬£¬ÔÚÀÕË÷Èí¼þÁìÓò£¬£¬£¬ÎÒÃÇ¿´µ½£¬£¬£¬ÎÞÂÛÊÇ×Ô¼ºÑо¿ÕվɹºÖ㬣¬£¬[ÍþвÐÐΪÕß]ÒÑ¾ÕÆÎÕÁËÔÆÔÆ¶àµÄÁãÈÕÎó²î¡£¡£¡£¡£¹ØÓÚ DBIR ÍŶÓÀ´Ëµ£¬£¬£¬½â¾ö¹ýʧ²»µ«½öÊÇÔÚ¹ýʧ·ºÆðʱ¾ÙÐÐÐÞ²¹¡£¡£¡£¡£ÕâÊǹØÓÚ×éÖ¯ÔõÑùÑ¡Ôñ¹©Ó¦É̲¢ÓëÆäÏàÖúµÄÎÊÌâ¡£¡£¡£¡£Ã»ÓÐ×éÖ¯¿ÉÒÔ×èÖ¹ËûÃÇʹÓõÄÈí¼þÖеÄÿ¸öDZÔÚÎó²î£¬£¬£¬µ«¹©Ó¦ÉÌȷʵ¡°×ß©¡±ÁËijЩ¿ÉÄÜÅú×¢Æä¼ÛÖµµÄÐźš£¡£¡£¡£
https://www.darkreading.com/cyber-risk/supply-chain-breaches-up-68-yoy-according-to-dbir
5. TinyproxyÑÏÖØÎó²îµ¼ÖÂÁè¼Ý5Íǫ̀Ö÷»ú¿ÉÖ´ÐÐÔ¶³Ì´úÂë
5ÔÂ6ÈÕ£¬£¬£¬90310 ̨Ö÷»úÖÐÁè¼Ý 50% ±»·¢Ã÷ÔÚ»¥ÁªÍøÉÏ̻¶ÁËTinyproxy ЧÀÍ£¬£¬£¬¸ÃЧÀÍÈÝÒ×Êܵ½ HTTP/HTTPS ÊðÀí¹¤¾ßÖÐδÐÞ²¹µÄÑÏÖØÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£¡£Æ¾Ö¤ Cisco Talos £¬£¬£¬¸ÃÎÊÌâµÄ±àºÅΪCVE-2023-49606£¬£¬£¬CVSS ÆÀ·ÖΪ 9.8 ·Ö£¨Âú·Ö 10 ·Ö£©£¬£¬£¬¸ÃÎÊÌ⽫ÆäÐÎòΪӰÏì°æ±¾ 1.10.0 ºÍ 1.11.1 µÄÊͷźóʹÓùýʧ¡£¡£¡£¡£TalosÔÚÒ»·Ýͨ¸æÖÐÌåÏÖ£ºÌØÖÆµÄ HTTP ±êÍ·¿ÉÄܻᴥ·¢ÏÈǰÊͷŵÄÄÚ´æµÄÖØÓ㬣¬£¬´Ó¶øµ¼ÖÂÄÚ´æË𻵲¢¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¹¥»÷ÕßÐèÒª·¢³öδ¾Éí·ÝÑéÖ¤µÄ HTTP ÇëÇó²Å»ª´¥·¢´ËÎó²î¡£¡£¡£¡£»£»£»»¾ä»°Ëµ£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÍþв¼ÓÈëÕß¿ÉÒÔ·¢ËÍÌØÖÆµÄHTTP ÅþÁ¬±êÍ·À´´¥·¢ÄÚ´æË𻵣¬£¬£¬´Ó¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£Æ¾Ö¤¹¥»÷ÃæÖÎÀí¹«Ë¾ Censys ¹²ÏíµÄÊý¾Ý£¬£¬£¬×èÖ¹ 2024 Äê 5 Ô 3 ÈÕ£¬£¬£¬ÔÚÏò¹«¹²»¥ÁªÍø¹ûÕæ Tinyproxy ЧÀ굀 90,310 ̨Ö÷»úÖУ¬£¬£¬ÆäÖÐ 52,000 ̨£¨Ô¼ 57%£©ÔËÐÐ×ű£´æÎó²îµÄ Tinyproxy °æ±¾¡£¡£¡£¡£´ó´ó¶¼¿É¹ûÕæ»á¼ûµÄÖ÷»úλÓÚÃÀ¹ú£¨32,846£©¡¢º«¹ú£¨18,358£©¡¢Öйú£¨7,808£©¡¢·¨¹ú£¨5,208£©ºÍµÂ¹ú£¨3,680£©¡£¡£¡£¡£
https://thehackernews.com/2024/05/critical-tinyproxy-flaw-opens-over.html
6. ¶íÂÞ˹ BTC-e ¼ÓÃÜÇ®±ÒÉúÒâËùÔËÓªÉÌÈÏ¿ÉÏ´Ç®×ï
5ÔÂ6ÈÕ£¬£¬£¬Æ¾Ö¤ÃÀ¹ú˾·¨²¿µÄÒ»·ÝÉùÃ÷£¬£¬£¬Ò»¾ÊÇÌìÏÂÉÏ×î´óµÄÐéÄâÇ®±ÒÉúÒâËùÖ®Ò»µÄ¶íÂÞ˹ÔËÓªÉÌ BTC-e ÈϿɼÓÈëÏ´Ç®ÍýÏë¡£¡£¡£¡£44 ËêµÄÑÇÀúɽ´ó¡¤ÎÄÄá¿Ë (Alexander Vinnik) ÔÚ 2011 ÄêÖÁ 2017 Äêʱ´úÔËÓª BTC-e£¬£¬£¬ØÊºó¸ÃЧÀͱ»Ö´·¨²¿·Ö¹Ø±Õ¡£¡£¡£¡£ÔÚ´Ëʱ´ú£¬£¬£¬¸ÃÉúÒâËù´¦Öóͷ£ÁËÁè¼Ý 90 ÒÚÃÀÔªµÄÉúÒ⣬£¬£¬²¢ÎªÈ«ÇòÁè¼Ý 100 ÍòÓû§ÌṩЧÀÍ£¬£¬£¬ÆäÖаüÀ¨ÖÚ¶àÃÀ¹ú¿Í»§¡£¡£¡£¡£Æ¾Ö¤·¨Í¥Îļþ£¬£¬£¬×÷Ϊ²»·¨»î¶¯µÄÒ»²¿·Ö£¬£¬£¬Vinnik ͨ¹ý BTC-e Ôì³ÉÁËÖÁÉÙ 1.21 ÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£Ëû»¹ÔÚÈ«Çò¹æÄ£ÄÚÉèÁ¢ÁËÖÚ¶à¿Õ¿Ç¹«Ë¾ºÍ½ðÈÚÕË»§£¬£¬£¬ÒÔÔÊÐí BTC-e ÎÞÐ轫¸Ãƽ̨ע²áΪǮ±ÒЧÀÍÓªÒµ¼´¿ÉÔËÓª¡£¡£¡£¡£Ó¦ÃÀ¹úÒªÇ󣬣¬£¬ÎÄÄá¿Ë×î³õÓÚ 2017 ÄêÔÚÏ£À°±»²¶¡£¡£¡£¡£2020 Ä꣬£¬£¬Ëû±»Òý¶Éµ½·¨¹ú£¬£¬£¬ÍâµØ·¨ÔºÖ¸¿ØËûÈëÇÖÊýǧ¸öµç×ÓÓʼþÕÊ»§²¢ÏòÆäËùÓÐÕßÀÕË÷Ç®²Æ¡£¡£¡£¡£Ëæºó£¬£¬£¬Ëû±»Ç²·µ»ØÏ£À°£¬£¬£¬È»ºó±»Òý¶Éµ½ÃÀ¹ú¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬¶íÂÞ˹»¹ÒªÇóÏ£À°Õþ¸®½«ÎÄÄá¿ËDzËͻعú£¬£¬£¬ÒÔÖ¸¿ØËû·¸ÓнÏСµÄÚ²Æ×ï¡£¡£¡£¡£
https://therecord.media/btce-cryptocurrency-exchange-alexander-vinnik-money-laundering-guilty-plea