Ñо¿Ö°Ô±ÑÝʾÔõÑùͨ¹ýÀ¶ÑÀ¹¥»÷½âËøºÍÆô¶¯ÌØË¹À
Ðû²¼Ê±¼ä 2022-05-19¾ÝýÌå5ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬NCC GroupµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖ¾ÙÐе͹¦ºÄÀ¶ÑÀ(BLE)Öм̹¥»÷ÐµĹ¤¾ß£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÏÖÓб£»£»£»£»¤ÔÚÄ¿µÄÉϾÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£ÔÚ´ËÀ๥»÷ÖУ¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ×èµ²²¢Ê¹ÓÃÁ½·½Ö®¼äµÄͨѶ¡£¡£¡£ÌØË¹ÀModel 3ºÍModel Y¶¼Ê¹ÓÃÁË»ùÓÚBLEµÄϵͳ£¬£¬£¬£¬£¬Òò´Ë¹¥»÷¿ÉÓÃÓÚ½âËøºÍÆô¶¯Æû³µ¡£¡£¡£NCCÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷Ö´ÐÐԼνöÐèÊ®ÃëÖÓ¡£¡£¡£ËäÈ»ÕâÖÖBLE¹¥»÷µÄÊÖÒÕϸ½ÚÉÐδÐû²¼£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±³ÆËûÃÇÒѾÔÚÌØË¹ÀModel 3ÉϲâÊÔÁËÕâÒ»ÒªÁì¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-can-steal-your-tesla-model-3-y-using-new-bluetooth-attack/
2¡¢VMware¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2022-22972
5ÔÂ18ÈÕ£¬£¬£¬£¬£¬VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËÓ°Ïì¶à¿î²úÆ·µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-22972£©¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬Îó²î»áÓ°ÏìWorkspace ONE Access¡¢VMware Identity Manager(vIDM)ºÍvRealize Automation£¬£¬£¬£¬£¬¾ßÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷ÕßÄܹ»»ñµÃÖÎÀíȨÏÞÇÒ²»ÐèÒª¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£´Ë´Î¸üл¹ÐÞ¸´ÁËÁíÒ»¸öÍâµØÌáȨÎó²î(CVE-2022-22973)£¬£¬£¬£¬£¬¿ÉÓÃÀ´½«È¨ÏÞÌáÉýΪroot¡£¡£¡£VMwareÌåÏÖ£¬£¬£¬£¬£¬¼øÓÚÎó²îµÄÑÏÖØÐÔ£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÁ¬Ã¦½ÓÄÉÐж¯¾ÙÐÐÐÞ¸´¡£¡£¡£
https://www.bleepingcomputer.com/news/security/vmware-patches-critical-auth-bypass-flaw-in-multiple-products/
3¡¢Ñо¿ÍŶӷ¢Ã÷macOS¶ñÒâÈí¼þUpdateAgentµÄбäÖÖ
Jamf Threat LabsÔÚ5ÔÂ16ÈÕÐû²¼µÄ±¨¸æÖÐÅû¶ÁËmacOS¶ñÒâÈí¼þUpdateAgentбäÖÖµÄϸ½ÚÐÅÏ¢¡£¡£¡£UpdateAgentÓÚ2020Äêµ×Ê״α»·¢Ã÷£¬£¬£¬£¬£¬ÒÔºóÒÑÑݱäΪ¶ñÒâÈí¼þdropper£¬£¬£¬£¬£¬¿ÉÈÆ¹ýmacOS Gatekeeper±£»£»£»£»¤¡£¡£¡£Õâ´Î·¢Ã÷µÄбäÌå»ùÓÚSwift£¬£¬£¬£¬£¬Î±×°³ÉÃûΪ"PDFCreator"ºÍ"ActiveDirectory"µÄMach-O¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬Ö´ÐÐʱÓëÔ¶³ÌЧÀÍÆ÷½¨ÉèÅþÁ¬²¢¼ìË÷ÒªÖ´ÐеÄbash¾ç±¾¡£¡£¡£ÔÚ·¢Ã÷ʱ£¬£¬£¬£¬£¬ÕâЩ¶þ½øÖÆÎļþÔÚVirusTotalÖеļì²âÂÊΪÁã¡£¡£¡£
https://www.jamf.com/blog/updateagent-adapts-again/
4¡¢ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾Omnicell³ÆÆäϵͳÔâµ½ÀÕË÷¹¥»÷
¾Ý5ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹úÒ½ÁƱ£½¡¹«Ë¾OmnicellÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£OmnicellÔÚ5ÔÂ9ÈÕÔÚÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄÎļþÖÐÌåÏÖ£¬£¬£¬£¬£¬ÀÕË÷¹¥»÷±¬·¢ÔÚ5ÔÂ4ÈÕ£¬£¬£¬£¬£¬Æä²¿·ÖÄÚ²¿ÏµÍ³Êܵ½Ó°Ïì¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸ÃÊÂÎñ¿ÉÄܵ¼Ö¸ù«Ë¾µÄÉÌÒµÉñÃØ»òÆäËü֪ʶ²úȨµÄɥʧ£¬£¬£¬£¬£¬ÒÔ¼°¹«Ë¾Ô±¹¤¡¢¿Í»§ºÍ¹©Ó¦É̵ÈÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£×èÖ¹5ÔÂ17ÈÕ£¬£¬£¬£¬£¬OmnicellÈÔδÔÚÆäÍøÕ¾ÉÏÐû²¼ÓйØÎ¥¹æµÄÕýʽ֪ͨ¡£¡£¡£
https://www.infosecurity-magazine.com/news/ransomware-healthcare-omnicell/
5¡¢¶à¹úÇå¾²»ú¹¹ÁªºÏÐû²¼³£¼ûµÄ¹¥»÷ǰÑÔµÄÇå¾²×Éѯ
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬À´×ÔÃÀ¹ú¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼¡¢ºÉÀ¼ºÍÓ¢¹úµÄ¶à¸ö»ú¹¹ÁªºÏÐû²¼ÁËÒ»·ÝÇå¾²×Éѯ¡£¡£¡£×ÉѯչÏÖÁ˹¥»÷Õß×ʹÓÃ10¸ö³õʼ¹¥»÷ǰÑÔ£¬£¬£¬£¬£¬°üÀ¨²»Ç¿ÖÆÖ´ÐжàÒòËØÉí·ÝÑéÖ¤(MFA)¡¢Ã»ÓÐ׼ȷµÄÓ¦ÓÃȨÏÞ¼°»á¼û¿ØÖÆÁбíÖеĹýʧ¡¢Èí¼þδ¸üС¢Ê¹ÓÃĬÈÏÉèÖûòĬÈÏÓû§ÃûºÍÃÜÂë¡¢Ô¶³ÌЧÀÍȱ·¦×ã¹»µÄ¿ØÖƺÍδʵÑéÇ¿ÃÜÂëÕ½ÂԵȡ£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã×Éѯ»¹ÌṩÁË»º½â²½·¥£¬£¬£¬£¬£¬ÒÔ×ÊÖú×éÖ¯ÔöÇ¿ÆäÍøÂç·ÀÓù¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cybersecurity-agencies-reveal-top-initial-access-attack-vectors/
6¡¢MicrosoftÐû²¼Õë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄ±¨¸æ
5ÔÂ17ÈÕ£¬£¬£¬£¬£¬MicrosoftÐû²¼ÁËÕë¶Ô¼ÓÃÜÇ®±ÒµÄÐÂÍþвCrywareµÄÆÊÎö±¨¸æ¡£¡£¡£Ëæ×ÅÕë¶Ô¼ÓÃÜÇ®±ÒµÄ¹¥»÷µÄÏÔÖøÔöÌí£¬£¬£¬£¬£¬MicrosoftÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÍþвÀàÐ͵ķºÆð£¬£¬£¬£¬£¬²¢³ÆÆäΪcryware¡£¡£¡£CrywareÊÇÖ±½Ó´Ó·ÇÍйܼÓÃÜÇ®±ÒÇ®°ü£¨Ò²³ÆÎªÈÈÇ®°ü£©ÍøÂçºÍÇÔÈ¡Êý¾ÝµÄÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£ÏÖÔÚʹÓüÓÃÜÇ®±ÒµÄÍþв°üÀ¨Cryptojackers¡¢ÀÕË÷Èí¼þ¡¢stealersºÍClipBankerľÂí¡£¡£¡£Cryware¿ÉÄÜ»áÔì³ÉÑÏÖØµÄ²ÆÎñËðʧ£¬£¬£¬£¬£¬ÏÖÔÚҲûÓÐÖ§³Öϵͳ¿ÉÒÔ×ÊÖú×·»Ø±»µÁµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£
https://www.microsoft.com/security/blog/2022/05/17/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks/