Cuckoo macOS¶ñÒâÈí¼þ¿É¿ØÖÆMac²¢ÇÔÈ¡ÃÜÂë
Ðû²¼Ê±¼ä 2024-05-085ÔÂ7ÈÕ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÐ嵀 Mac ¶ñÒâÈí¼þ¶ÔÔËÐÐ Apple Silicon µÄÐÂÐÍ Mac ÒÔ¼°»ùÓÚ Intel µÄ¾É Mac Ìᳫ¹¥»÷¡£¡£¡£¾Ý¡¶ºÚ¿ÍÐÂÎÅ¡·±¨µÀ£¬£¬£¬£¬Kandji µÄÇå¾²Ñо¿Ö°Ô±½«ÕâÖÖ¶ñÒâÈí¼þ³ÆÎª Cuckoo¡£¡£¡£³ýÁËÕë¶Ô½ÏÐÂºÍ½Ï¾ÉµÄ Mac µçÄÔÍ⣬£¬£¬£¬Cuckoo µÄÓëÖÚ²î±ðÖ®´¦»¹ÔÚÓÚËüµÄÐÐΪÀàËÆÓÚÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þºÍÌØ¹¤Èí¼þµÄ»ìÏýÌå¡£¡£¡£ÔÚһƪ²©¿ÍÎÄÕÂÖУ¬£¬£¬£¬Kandji µÄ Adam Kohler ºÍ Christopher Lopez Ú¹ÊÍ˵£¬£¬£¬£¬ËûÃÇÔÚ¶ñÒâÈí¼þ¸ú×ÙÍøÕ¾ VirusTotal ÉÏ·¢Ã÷ÁËÒ»¸öÒÔǰδ¼ì²âµ½µÄ¶ñÒâ Mach-O ¶þ½øÖÆÎļþ£¬£¬£¬£¬ÆäÃû³ÆÎª¡°DumpMedia Spotify Music Converter¡±¡£¡£¡£È»ºó£¬£¬£¬£¬ËûÃÇÔÚÍøÉϲéÕҸóÌÐòµÄÃû³Æ£¬£¬£¬£¬·¢Ã÷¸Ã³ÌÐòÊÇ´ÓÒ»¸öÃûΪ dumpmedia[.]com µÄÍøÕ¾·Ö·¢µÄ£¬£¬£¬£¬¸ÃÍøÕ¾Ìṩ¶à¸öÓ¦ÓóÌÐò£¬£¬£¬£¬¿ÉÒÔ×ÊÖúÓû§½«Á÷ýÌåЧÀÍÖеÄÒôÀÖת»»Îª MP3 Îļþ¡£¡£¡£
https://news.hitb.org/content/new-cuckoo-macos-malware-can-take-over-all-macs-and-steals-your-passwords-too
2. Ñо¿ÍŶÓÑÝʾÕë¶ÔËùÓÐVPN³ÌÐòµÄ¹¥»÷TunnelVision
5ÔÂ7ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±Éè¼ÆÁËÒ»ÖÖÕë¶ÔÏÕЩËùÓÐÐéÄâרÓÃÍøÂçÓ¦ÓóÌÐòµÄ¹¥»÷£¬£¬£¬£¬ÆÈʹËüÃÇÔÚ¼ÓÃÜËíµÀÖ®Íâ·¢ËͺÍÎüÊÕ²¿·Ö»òËùÓÐÁ÷Á¿£¬£¬£¬£¬Ö¼ÔÚ±£»£»£»£»£»£»¤ÆäÃâÔâ¿ú̽»ò¸Ä¶¯¡£¡£¡£Ñо¿Ö°Ô±½«Æä¹¥»÷ÃüÃûΪ TunnelVision£¬£¬£¬£¬½«´«ÈëºÍ´«³öµÄ»¥ÁªÍøÁ÷Á¿·â×°ÔÚ¼ÓÃÜËíµÀÖв¢Òþ²ØÓû§µÄ IP µØµã¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬µ±ËùÓÐ VPN Ó¦ÓóÌÐòÅþÁ¬µ½¶ñÒâÍøÂçʱ£¬£¬£¬£¬Ëü¶¼»áÓ°ÏìËüÃÇ£¬£¬£¬£¬²¢ÇÒ³ýÁ˵±Óû§µÄ VPN ÔÚ Linux »ò Android ÉÏÔËÐÐʱ֮Í⣬£¬£¬£¬Ã»ÓÐÆäËûÒªÁì¿ÉÒÔ±ÜÃâ´ËÀ๥»÷¡£¡£¡£ËûÃÇ»¹ÌåÏÖ£¬£¬£¬£¬ËûÃǵĹ¥»÷ÊÖÒÕ¿ÉÄÜ×Ô 2002 ÄêÒÔÀ´¾ÍÒѳÉΪ¿ÉÄÜ£¬£¬£¬£¬²¢ÇÒ´ÓÄÇʱÆð¾ÍÒѾ±»·¢Ã÷²¢ÔÚÒ°ÍâʹÓᣡ£¡£Ò»¶ÎÊÓÆµÑÝʾڹÊ͵À£¬£¬£¬£¬TunnelVision µÄЧ¹ûÊÇ¡°Êܺ¦ÕßµÄÁ÷Á¿ÏÖÔÚÒѱ»½Ò¿ª²¢Ö±½Óͨ¹ý¹¥»÷Õß¾ÙÐзÓÉ¡±¡£¡£¡£¡°¹¥»÷Õß¿ÉÒÔ¶ÁÈ¡¡¢É¾³ý»òÐÞ¸Äй¶µÄÁ÷Á¿£¬£¬£¬£¬¶øÊܺ¦ÕßÔò¼á³ÖÓë VPN ºÍ»¥ÁªÍøµÄÅþÁ¬¡£¡£¡£¡±
https://news.hitb.org/content/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose
3. αװ³ÉÖ¤ÊéµÄ LNK Îļþ·Ö·¢ RokRAT ¶ñÒâÈí¼þ
5ÔÂ7ÈÕ£¬£¬£¬£¬AhnLabÇå¾²Ç鱨ÖÐÐÄ£¨ASEC£©ÒÑÈ·ÈÏÒ»Á¬Èö²¥Òì³£¾ÞϸµÄ¿ì½Ý·½·¨Îļþ£¨*.LNK£©£¬£¬£¬£¬ÓÃÓÚÈö²¥ºóÃÅÀàÐ͵ĶñÒâÈí¼þ¡£¡£¡£×î½üÈ·ÈϵĿì½Ý·½·¨Îļþ£¨*.LNK£©±»·¢Ã÷ÊÇÕë¶Ôº«¹úÓû§£¬£¬£¬£¬ÌØÊâÊÇÓ볯ÏÊÓйصÄÓû§¡£¡£¡£È·ÈϵÄLNKÎļþÃûÈçÏ£º¹ú¼ÒÐÅϢѧԺµÚ°ËÆÚ×ۺϿγÌÖ¤Ê飨×îÖÕ£©.lnk¡¢ÃŽûÃû²á2024.lnk¡¢¶«±±ÏîÄ¿£¨ÃÀ¹ú¹ú»áÑо¿Ð§ÀÍ´¦£¨CRS ±¨¸æ£©.lnkºÍÉèÊ©Çåµ¥.lnk¡£¡£¡£ÒÑÈ·ÈϵÄLNKÎļþ°üÀ¨Í¨¹ýCMDÖ´ÐÐPowerShellµÄÏÂÁ£¬£¬£¬ÆäÀàÐÍÓëÈ¥ÄêÐû²¼µÄ¡°RokRAT Malware Distributed Through LNK Files (*.lnk): RedEyes (ScarCruft)¡± [1]Öз¢Ã÷µÄÀàÐÍÀàËÆ¡£¡£¡£¹ØÓÚÕâÖÖÀàÐ͵ÄÒ»¸öÖµµÃ×¢ÖØµÄÊÂʵÊÇ£¬£¬£¬£¬ËüÔÚ LNK ÎļþÖаüÀ¨Õýµ±ÎĵµÎļþ¡¢¾ç±¾´úÂëºÍ¶ñÒâ PE Êý¾Ý¡£¡£¡£
https://asec.ahnlab.com/en/65076/
4. 2023ÄêµÚÈý·½Ôì³ÉµÄÊý¾Ýй¶ÔöÌíÁË68%
5ÔÂ7ÈÕ£¬£¬£¬£¬½üÄêÀ´¹©Ó¦Á´Î¥¹æÊÂÎñÒ»Ö±³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£Æ¾Ö¤ Verizon ×îеÄÊý¾Ýй¶ÊӲ챨¸æ (DBIR)£¬£¬£¬£¬½ü¼¸¸öÔÂÀ´ÕâÒ»ÔöÌíÓÈΪ¼±¾ç¡£¡£¡£2023 ÄêËùÓÐÎ¥¹æÐÐΪÖÐÔ¼ÓÐ 15% Éæ¼°µÚÈý·½£¬£¬£¬£¬±È 2022 ÄêµÄ 9% ÏÔ×ÅÔöÌí¡£¡£¡£²»¹ý£¬£¬£¬£¬ÕâЩÊý×ÖÓë»á¼ÆºÍ¹¥»÷µÄ¹ØÏµÍ¬ÑùÖ÷Òª¡£¡£¡£ÊÂʵÉÏ£¬£¬£¬£¬±»Ê¹ÓõÄÎó²îÊÇ DBIR ¹©Ó¦Á´Ö¸±êÖÐ×î³£¼ûµÄÊÂÎñ¼Í¼ºÍÊÂÎñ¹²Ïí (VERIS) ÐÐΪ´Ê»ã£¬£¬£¬£¬Æä´ÎÊǺóÃÅ/ÏÂÁîÓë¿ØÖÆ (C2) ºÍÀÕË÷¡£¡£¡£Verizon ÍþвÇ鱨¸±×ܼà Alex Pinto ÌåÏÖ£ºÈ¥Ä꣬£¬£¬£¬ÔÚÀÕË÷Èí¼þÁìÓò£¬£¬£¬£¬ÎÒÃÇ¿´µ½£¬£¬£¬£¬ÎÞÂÛÊÇ×Ô¼ºÑо¿ÕվɹºÖ㬣¬£¬£¬[ÍþвÐÐΪÕß]ÒÑ¾ÕÆÎÕÁËÔÆÔÆ¶àµÄÁãÈÕÎó²î¡£¡£¡£¹ØÓÚ DBIR ÍŶÓÀ´Ëµ£¬£¬£¬£¬½â¾ö¹ýʧ²»µ«½öÊÇÔÚ¹ýʧ·ºÆðʱ¾ÙÐÐÐÞ²¹¡£¡£¡£ÕâÊǹØÓÚ×éÖ¯ÔõÑùÑ¡Ôñ¹©Ó¦É̲¢ÓëÆäÏàÖúµÄÎÊÌâ¡£¡£¡£Ã»ÓÐ×éÖ¯¿ÉÒÔ×èÖ¹ËûÃÇʹÓõÄÈí¼þÖеÄÿ¸öDZÔÚÎó²î£¬£¬£¬£¬µ«¹©Ó¦ÉÌȷʵ¡°×ß©¡±ÁËijЩ¿ÉÄÜÅú×¢Æä¼ÛÖµµÄÐźš£¡£¡£
https://www.darkreading.com/cyber-risk/supply-chain-breaches-up-68-yoy-according-to-dbir
5. TinyproxyÑÏÖØÎó²îµ¼ÖÂÁè¼Ý5Íǫ̀Ö÷»ú¿ÉÖ´ÐÐÔ¶³Ì´úÂë
5ÔÂ6ÈÕ£¬£¬£¬£¬90310 ̨Ö÷»úÖÐÁè¼Ý 50% ±»·¢Ã÷ÔÚ»¥ÁªÍøÉÏ̻¶ÁËTinyproxy ЧÀÍ£¬£¬£¬£¬¸ÃЧÀÍÈÝÒ×Êܵ½ HTTP/HTTPS ÊðÀí¹¤¾ßÖÐδÐÞ²¹µÄÑÏÖØÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£Æ¾Ö¤ Cisco Talos £¬£¬£¬£¬¸ÃÎÊÌâµÄ±àºÅΪCVE-2023-49606£¬£¬£¬£¬CVSS ÆÀ·ÖΪ 9.8 ·Ö£¨Âú·Ö 10 ·Ö£©£¬£¬£¬£¬¸ÃÎÊÌ⽫ÆäÐÎòΪӰÏì°æ±¾ 1.10.0 ºÍ 1.11.1 µÄÊͷźóʹÓùýʧ¡£¡£¡£TalosÔÚÒ»·Ýͨ¸æÖÐÌåÏÖ£ºÌØÖÆµÄ HTTP ±êÍ·¿ÉÄܻᴥ·¢ÏÈǰÊͷŵÄÄÚ´æµÄÖØÓ㬣¬£¬£¬´Ó¶øµ¼ÖÂÄÚ´æË𻵲¢¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¹¥»÷ÕßÐèÒª·¢³öδ¾Éí·ÝÑéÖ¤µÄ HTTP ÇëÇó²Å»ª´¥·¢´ËÎó²î¡£¡£¡£»£»£»£»£»£»»¾ä»°Ëµ£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÍþв¼ÓÈëÕß¿ÉÒÔ·¢ËÍÌØÖÆµÄHTTP ÅþÁ¬±êÍ·À´´¥·¢ÄÚ´æË𻵣¬£¬£¬£¬´Ó¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£Æ¾Ö¤¹¥»÷ÃæÖÎÀí¹«Ë¾ Censys ¹²ÏíµÄÊý¾Ý£¬£¬£¬£¬×èÖ¹ 2024 Äê 5 Ô 3 ÈÕ£¬£¬£¬£¬ÔÚÏò¹«¹²»¥ÁªÍø¹ûÕæ Tinyproxy ЧÀ굀 90,310 ̨Ö÷»úÖУ¬£¬£¬£¬ÆäÖÐ 52,000 ̨£¨Ô¼ 57%£©ÔËÐÐ×ű£´æÎó²îµÄ Tinyproxy °æ±¾¡£¡£¡£´ó´ó¶¼¿É¹ûÕæ»á¼ûµÄÖ÷»úλÓÚÃÀ¹ú£¨32,846£©¡¢º«¹ú£¨18,358£©¡¢Öйú£¨7,808£©¡¢·¨¹ú£¨5,208£©ºÍµÂ¹ú£¨3,680£©¡£¡£¡£
https://thehackernews.com/2024/05/critical-tinyproxy-flaw-opens-over.html
6. ¶íÂÞ˹ BTC-e ¼ÓÃÜÇ®±ÒÉúÒâËùÔËÓªÉÌÈÏ¿ÉÏ´Ç®×ï
5ÔÂ6ÈÕ£¬£¬£¬£¬Æ¾Ö¤ÃÀ¹ú˾·¨²¿µÄÒ»·ÝÉùÃ÷£¬£¬£¬£¬Ò»¾ÊÇÌìÏÂÉÏ×î´óµÄÐéÄâÇ®±ÒÉúÒâËùÖ®Ò»µÄ¶íÂÞ˹ÔËÓªÉÌ BTC-e ÈϿɼÓÈëÏ´Ç®ÍýÏë¡£¡£¡£44 ËêµÄÑÇÀúɽ´ó¡¤ÎÄÄá¿Ë (Alexander Vinnik) ÔÚ 2011 ÄêÖÁ 2017 Äêʱ´úÔËÓª BTC-e£¬£¬£¬£¬ØÊºó¸ÃЧÀͱ»Ö´·¨²¿·Ö¹Ø±Õ¡£¡£¡£ÔÚ´Ëʱ´ú£¬£¬£¬£¬¸ÃÉúÒâËù´¦Öóͷ£ÁËÁè¼Ý 90 ÒÚÃÀÔªµÄÉúÒ⣬£¬£¬£¬²¢ÎªÈ«ÇòÁè¼Ý 100 ÍòÓû§ÌṩЧÀÍ£¬£¬£¬£¬ÆäÖаüÀ¨ÖÚ¶àÃÀ¹ú¿Í»§¡£¡£¡£Æ¾Ö¤·¨Í¥Îļþ£¬£¬£¬£¬×÷Ϊ²»·¨»î¶¯µÄÒ»²¿·Ö£¬£¬£¬£¬Vinnik ͨ¹ý BTC-e Ôì³ÉÁËÖÁÉÙ 1.21 ÒÚÃÀÔªµÄËðʧ¡£¡£¡£Ëû»¹ÔÚÈ«Çò¹æÄ£ÄÚÉèÁ¢ÁËÖÚ¶à¿Õ¿Ç¹«Ë¾ºÍ½ðÈÚÕË»§£¬£¬£¬£¬ÒÔÔÊÐí BTC-e ÎÞÐ轫¸Ãƽ̨ע²áΪǮ±ÒЧÀÍÓªÒµ¼´¿ÉÔËÓª¡£¡£¡£Ó¦ÃÀ¹úÒªÇ󣬣¬£¬£¬ÎÄÄá¿Ë×î³õÓÚ 2017 ÄêÔÚÏ£À°±»²¶¡£¡£¡£2020 Ä꣬£¬£¬£¬Ëû±»Òý¶Éµ½·¨¹ú£¬£¬£¬£¬ÍâµØ·¨ÔºÖ¸¿ØËûÈëÇÖÊýǧ¸öµç×ÓÓʼþÕÊ»§²¢ÏòÆäËùÓÐÕßÀÕË÷Ç®²Æ¡£¡£¡£Ëæºó£¬£¬£¬£¬Ëû±»Ç²·µ»ØÏ£À°£¬£¬£¬£¬È»ºó±»Òý¶Éµ½ÃÀ¹ú¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬¶íÂÞ˹»¹ÒªÇóÏ£À°Õþ¸®½«ÎÄÄá¿ËDzËͻعú£¬£¬£¬£¬ÒÔÖ¸¿ØËû·¸ÓнÏСµÄÚ²Æ×ï¡£¡£¡£
https://therecord.media/btce-cryptocurrency-exchange-alexander-vinnik-money-laundering-guilty-plea