Ñо¿Ö°Ô±ÑÝʾÔõÑùͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À­

Ðû²¼Ê±¼ä 2022-05-19
1¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À­


¾ÝýÌå5ÔÂ17ÈÕ±¨µÀ £¬£¬£¬£¬£¬NCC GroupµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖ¾ÙÐе͹¦ºÄÀ¶ÑÀ(BLE)Öм̹¥»÷ÐµĹ¤¾ß £¬£¬£¬£¬£¬¿ÉÈÆ¹ýÏÖÓб£»£»£»£»¤ÔÚÄ¿µÄÉϾÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£ÔÚ´ËÀ๥»÷ÖÐ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×èµ²²¢Ê¹ÓÃÁ½·½Ö®¼äµÄͨѶ¡£¡£¡£ÌØË¹À­Model 3ºÍModel Y¶¼Ê¹ÓÃÁË»ùÓÚBLEµÄϵͳ £¬£¬£¬£¬£¬Òò´Ë¹¥»÷¿ÉÓÃÓÚ½âËøºÍÆô¶¯Æû³µ¡£¡£¡£NCCÌåÏÖ £¬£¬£¬£¬£¬¹¥»÷Ö´ÐÐԼνöÐèÊ®ÃëÖÓ¡£¡£¡£ËäÈ»ÕâÖÖBLE¹¥»÷µÄÊÖÒÕϸ½ÚÉÐδÐû²¼ £¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±³ÆËûÃÇÒѾ­ÔÚÌØË¹À­Model 3ÉϲâÊÔÁËÕâÒ»ÒªÁì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/


2¡¢VMware¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2022-22972


5ÔÂ18ÈÕ £¬£¬£¬£¬£¬VMwareÐû²¼Çå¾²¸üР£¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°Ïì¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-22972£©¡£¡£¡£Í¨¸æÖ¸³ö £¬£¬£¬£¬£¬Îó²î»áÓ°ÏìWorkspace ONE Access¡¢VMware Identity Manager(vIDM)ºÍvRealize Automation £¬£¬£¬£¬£¬¾ßÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷ÕßÄܹ»»ñµÃÖÎÀíȨÏÞÇÒ²»ÐèÒª¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£´Ë´Î¸üл¹ÐÞ¸´ÁËÁíÒ»¸öÍâµØÌáȨÎó²î(CVE-2022-22973) £¬£¬£¬£¬£¬¿ÉÓÃÀ´½«È¨ÏÞÌáÉýΪroot¡£¡£¡£VMwareÌåÏÖ £¬£¬£¬£¬£¬¼øÓÚÎó²îµÄÑÏÖØÐÔ £¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÁ¬Ã¦½ÓÄÉÐж¯¾ÙÐÐÐÞ¸´¡£¡£¡£


https://www.bleepingcomputer.com/news/security/vmware-patches-critical-auth-bypass-flaw-in-multiple-products/


3¡¢Ñо¿ÍŶӷ¢Ã÷macOS¶ñÒâÈí¼þUpdateAgentµÄбäÖÖ


Jamf Threat LabsÔÚ5ÔÂ16ÈÕÐû²¼µÄ±¨¸æÖÐÅû¶ÁËmacOS¶ñÒâÈí¼þUpdateAgentбäÖÖµÄϸ½ÚÐÅÏ¢¡£¡£¡£UpdateAgentÓÚ2020Äêµ×Ê״α»·¢Ã÷ £¬£¬£¬£¬£¬ÒÔºóÒÑÑݱäΪ¶ñÒâÈí¼þdropper £¬£¬£¬£¬£¬¿ÉÈÆ¹ýmacOS Gatekeeper±£»£»£»£»¤¡£¡£¡£Õâ´Î·¢Ã÷µÄбäÌå»ùÓÚSwift £¬£¬£¬£¬£¬Î±×°³ÉÃûΪ"PDFCreator"ºÍ"ActiveDirectory"µÄMach-O¶þ½øÖÆÎļþ £¬£¬£¬£¬£¬Ö´ÐÐʱÓëÔ¶³ÌЧÀÍÆ÷½¨ÉèÅþÁ¬²¢¼ìË÷ÒªÖ´ÐеÄbash¾ç±¾¡£¡£¡£ÔÚ·¢Ã÷ʱ £¬£¬£¬£¬£¬ÕâЩ¶þ½øÖÆÎļþÔÚVirusTotalÖеļì²âÂÊΪÁã¡£¡£¡£


https://www.jamf.com/blog/updateagent-adapts-again/


4¡¢ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Omnicell³ÆÆäϵͳÔâµ½ÀÕË÷¹¥»÷


¾Ý5ÔÂ17ÈÕ±¨µÀ £¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾OmnicellÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£OmnicellÔÚ5ÔÂ9ÈÕÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþÖÐÌåÏÖ £¬£¬£¬£¬£¬ÀÕË÷¹¥»÷±¬·¢ÔÚ5ÔÂ4ÈÕ £¬£¬£¬£¬£¬Æä²¿·ÖÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄܵ¼Ö¸ù«Ë¾µÄÉÌÒµÉñÃØ»òÆäËü֪ʶ²úȨµÄɥʧ £¬£¬£¬£¬£¬ÒÔ¼°¹«Ë¾Ô±¹¤¡¢¿Í»§ºÍ¹©Ó¦É̵ÈÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£×èÖ¹5ÔÂ17ÈÕ £¬£¬£¬£¬£¬OmnicellÈÔδÔÚÆäÍøÕ¾ÉÏÐû²¼ÓйØÎ¥¹æµÄÕýʽ֪ͨ¡£¡£¡£


https://www.infosecurity-magazine.com/news/ransomware-healthcare-omnicell/


5¡¢¶à¹úÇå¾²»ú¹¹ÁªºÏÐû²¼³£¼ûµÄ¹¥»÷ǰÑÔµÄÇå¾²×Éѯ


5ÔÂ17ÈÕ £¬£¬£¬£¬£¬À´×ÔÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢ºÉÀ¼ºÍÓ¢¹úµÄ¶à¸ö»ú¹¹ÁªºÏÐû²¼ÁËÒ»·ÝÇå¾²×Éѯ¡£¡£¡£×ÉѯչÏÖÁ˹¥»÷Õß×ʹÓÃ10¸ö³õʼ¹¥»÷ǰÑÔ £¬£¬£¬£¬£¬°üÀ¨²»Ç¿ÖÆÖ´ÐжàÒòËØÉí·ÝÑéÖ¤(MFA)¡¢Ã»ÓÐ׼ȷµÄÓ¦ÓÃȨÏÞ¼°»á¼û¿ØÖÆÁбíÖеĹýʧ¡¢Èí¼þδ¸üС¢Ê¹ÓÃĬÈÏÉèÖûòĬÈÏÓû§ÃûºÍÃÜÂë¡¢Ô¶³ÌЧÀÍȱ·¦×ã¹»µÄ¿ØÖƺÍδʵÑéÇ¿ÃÜÂëÕ½ÂԵȡ£¡£¡£±ðµÄ £¬£¬£¬£¬£¬¸Ã×Éѯ»¹ÌṩÁË»º½â²½·¥ £¬£¬£¬£¬£¬ÒÔ×ÊÖú×éÖ¯ÔöÇ¿ÆäÍøÂç·ÀÓù¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cybersecurity-agencies-reveal-top-initial-access-attack-vectors/


6¡¢MicrosoftÐû²¼Õë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ±¨¸æ


5ÔÂ17ÈÕ £¬£¬£¬£¬£¬MicrosoftÐû²¼ÁËÕë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄÆÊÎö±¨¸æ¡£¡£¡£Ëæ×ÅÕë¶Ô¼ÓÃÜÇ®±ÒµÄ¹¥»÷µÄÏÔÖøÔöÌí £¬£¬£¬£¬£¬MicrosoftÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÍþвÀàÐ͵ķºÆð £¬£¬£¬£¬£¬²¢³ÆÆäΪcryware¡£¡£¡£CrywareÊÇÖ±½Ó´Ó·ÇÍйܼÓÃÜÇ®±ÒÇ®°ü£¨Ò²³ÆÎªÈÈÇ®°ü£©ÍøÂçºÍÇÔÈ¡Êý¾ÝµÄÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£ÏÖÔÚʹÓüÓÃÜÇ®±ÒµÄÍþв°üÀ¨Cryptojackers¡¢ÀÕË÷Èí¼þ¡¢stealersºÍClipBankerľÂí¡£¡£¡£Cryware¿ÉÄÜ»áÔì³ÉÑÏÖØµÄ²ÆÎñËðʧ £¬£¬£¬£¬£¬ÏÖÔÚҲûÓÐÖ§³Öϵͳ¿ÉÒÔ×ÊÖú×·»Ø±»µÁµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£


https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/