AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§

Ðû²¼Ê±¼ä 2021-11-25

AppGalleryÖжà¿îÓÎÏ·Ó¦Óñ£´æÄ¾Âí£¬£¬£¬ÒÑѬȾ900¶àÍò×°±¸


AppGalleryÖжà¿îÓÎÏ·Ó¦Óñ£´æÄ¾Âí£¬£¬£¬ÒÑѬȾ900¶àÍò×°±¸.png


11ÔÂ23ÈÕ£¬£¬£¬Dr. WebµÄÑо¿Ö°Ô±Åû¶»ªÎªÓ¦ÓÃÊÐËÁAppGalleryÖеÄ190¿îÓÎÏ·Öб£´æÄ¾ÂíAndroid.Cynos.7.origin£¬£¬£¬ÒÑ×°ÖÃÔ¼9300000´Î¡£¡£ ¡£¸ÃľÂíÊǶñÒâÈí¼þCynosµÄ±äÌ壬£¬£¬Ö¼ÔÚÍøÂçÓû§µÄÐÅÏ¢¡£¡£ ¡£ÕâЩÓÎÏ·Ö÷ҪʹÓöíÓï¡¢ÖÐÎĺÍÓ¢Ó£¬£¬ÆäÖÐÓÎÏ·¡°¿ìµã¶ãÆðÀ´¡±µÄÏÂÔØÁ¿¸ß´ï2000000´Î¡£¡£ ¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬¸ÃľÂí¿É·¢ËͺÍ×èµ²¶ÌÐÅ¡¢ÏÂÔØºÍÆô¶¯ÆäËüÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬ÒÔ¼°ÏÂÔØºÍ×°ÖÃÆäËûÓ¦Óᣡ£ ¡£ÏÖÔÚ£¬£¬£¬»ªÎª¹«Ë¾Òѽ«ÕâЩÓÎϷϼܡ£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/124927/malware/android-cynos-7-origin-trojan-infections.html


BIO-ISAC³Æ¹¥»÷ÕßʹÓÃÐÂTardigradeÃé×¼ÉúÎïÖÆÔìÐÐÒµ


BIO-ISAC³Æ¹¥»÷ÕßʹÓÃÐÂTardigradeÃé×¼ÉúÎïÖÆÔìÐÐÒµ.png


ÉúÎï¾­¼ÃÐÅÏ¢¹²ÏíºÍÆÊÎöÖÐÐÄ(BIO-ISAC)ÔÚ11ÔÂ23ÈÕÐû²¼¹ØÓÚʹÓÃTardigradeµÄ¹¥»÷»î¶¯µÄ¾¯±¨¡£¡£ ¡£×Ô2021Äê´º¼¾ÒÔÀ´£¬£¬£¬¹¥»÷Õß×îÏÈʹÓôË×Ô½ç˵¶ñÒâÈí¼þ¹¥»÷ÉúÎïÖÆÔìÐÐÒµµÄ¹«Ë¾¡£¡£ ¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ÕâÊÇSmokeLoaderµÄ±äÌ壬£¬£¬Ö÷Ҫͨ¹ý´¹Âڻ»òUÅ̾ÙÐзַ¢¡£¡£ ¡£ÓÉÓÚËü¿ÉÒÔ´ÓÄÚ´æÖÐÖØÐ±àÒë¼ÓÔØ³ÌÐò£¬£¬£¬Òò´Ë²»»áÁôÏÂÏàͬµÄÊðÃû£¬£¬£¬Õâʹʶ±ð¡¢¸ú×ÙºÍɾ³ý±äµÃÔ½·¢ÄÑÌâ¡£¡£ ¡£±ðµÄ£¬£¬£¬¸Ã±äÌå¿ÉÒÔ×ÔÖ÷ÔËÐУ¬£¬£¬ÉõÖÁÎÞÐèC2ÅþÁ¬¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-target-biomanufacturing-with-stealthy-tardigrade-malware/


AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§


AppleÆðËßNSO Group¼°Æäĸ¹«Ë¾ÓÃPegasus¼àÊÓiOSÓû§.png


Apple¹«Ë¾ÔÚ11ÔÂ23ÈÕ¶ÔNSO Group¼°Æäĸ¹«Ë¾Q Cyber TechnologiesÌáÆðËßËÏ£¬£¬£¬Ö¸ÔðÆäʹÓÃPegasus²»·¨¼àÊÓiOSÓû§¡£¡£ ¡£PegasusÊÇÒ»ÖÖ¾üʼ¶Ìع¤Èí¼þ£¬£¬£¬Í¨³£»£»£»áʹÓÃÁãµã»÷Îó²îÀ´Ñ¬È¾Ä¿µÄ×°±¸£¬£¬£¬AppleÔÚËßËÏÖÐÌØÊâÌá¼°ÆäʹÓÃiMessageÖеÄÎó²îFORCEDENTRY¹¥»÷9¸ö°ÍÁÖÈËÊ¿¡£¡£ ¡£Apple¹«Ë¾³ÆËûÃǵÄÄ¿µÄÊÇÓÀÊÀµØÕ¥È¡NSO GroupʹÓÃÈκÎAppleÈí¼þ¡¢Ð§ÀÍ»ò×°±¸¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/11/apple-sues-israels-nso-group-for-spying.html


Ñо¿ÍŶÓչʾÔõÑùʹÓôòÓ¡»úµÄ3ÖÖ¹¥»÷ģʽPrintjack


Ñо¿ÍŶÓչʾÔõÑùʹÓôòÓ¡»úµÄ3ÖÖ¹¥»÷ģʽPrintjack.png


Òâ´óÀûÑо¿ÍŶÓչʾͳ³ÆÎªPrintjackµÄ3ÖÖй¥»÷ģʽ£¬£¬£¬¿ÉʹÓôòÓ¡»úÔì³ÉÑÏÖØµÄЧ¹û¡£¡£ ¡£Ö÷ҪʹÓÃShodanɨÃèTCP¶Ë¿Ú9100¿ª·ÅµÄ×°±¸£¬£¬£¬ÆäÖе¹ú¡¢¶íÂÞ˹¡¢·¨¹ú¡¢ºÉÀ¼ºÍÓ¢¹úµÄ̻¶װ±¸×î¶à¡£¡£ ¡£µÚÒ»ÖÖ¹¥»÷ÊÇʹÓÃCVE-2014-3741µÈÎó²î£¬£¬£¬¿ØÖÆ´òÓ¡»úÌᳫDDoS¹¥»÷£»£»£»µÚ¶þÖÖÊÇÖ½ÕÅDoS¹¥»÷£¬£¬£¬Ëüͨ¹ý·¢ËÍÖØ¸´µÄ´òӡʹÃüÀ´ºÄ¾¡Ä¿µÄ×°±¸ÖеÄËùÓÐÖ½ÕÅ£»£»£»×îÑÏÖØµÄÊÇʹÓÃÆä¾ÙÐÐÖÐÐÄÈ˹¥»÷£¬£¬£¬²¢ÇÔÈ¡´òÓ¡µÄÄÚÈÝ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/researchers-warn-of-severe-risks-from-printjack-printer-attacks/


°ëµ¼Ì幫˾MediaTekÐÞ¸´ÆäоƬÖеĶà¸öÇå¾²Îó²î


°ëµ¼Ì幫˾MediaTekÐÞ¸´ÆäоƬÖеĶà¸öÇå¾²Îó²î.png


Check PointÔÚ11ÔÂ24ÈÕÅû¶ÁËÖйų́Í幫˾Áª·¢¿Æ£¨MediaTek£©²úÆ·ÖÐ4¸öÎó²îµÄϸ½Ú¡£¡£ ¡£MediaTekÊÇÈ«Çò×î´óµÄ°ëµ¼Ì幫˾֮һ£¬£¬£¬×èÖ¹2021ÄêµÚ¶þ¼¾¶È£¬£¬£¬43%µÄÖÇÄÜÊÖ»ú¶¼½ÓÄÉÁËÁª·¢¿ÆÏµÍ³Ð¾Æ¬ (SoC) £¬£¬£¬°üÀ¨Ð¡Ãס¢Oppo¡¢RealmeºÍVivoµÈ¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬MediaTekÒÑÔÚ10Ô·ÝÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÆäÖеÄ3¸öÔ½½çдÈëºÍÍâµØÌáȨÎó²î£¨CVE-2021-0661¡¢CVE-2021-0662ºÍCVE-2021-0663£©£¬£¬£¬²¢Ô¤¼ÆÔÚ12ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÚ4¸öÎó²î£¨CVE-2021-0673£©¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mediatek-eavesdropping-bug-impacts-30-percent-of-all-android-smartphones/


KasperskyÐû²¼2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ


KasperskyÐû²¼2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ.png


KasperskyÓÚ11ÔÂ23ÈÕÐû²¼ÁË2022ÄêICSºÍ¹¤ÒµÐÐÒµÍþвµÄÕ¹Íû±¨¸æ¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚδÀ´¹¥»÷Õß¿ÉÄÜ»áïÔ̭ÿ´Î¹¥»÷µÄÄ¿µÄÊýÄ¿£¬£¬£¬Ëõ¶Ì¶ñÒâÈí¼þµÄÉúÃüÖÜÆÚ²¢×î´óÏ޶ȵØïÔÌ­¶ñÒâ»ù´¡ÉèÊ©µÄʹÓᣡ£ ¡£±ðµÄ£¬£¬£¬±¨¸æÌåÏÖÒÔϹ¥»÷Õ½ÂÔºÍÊÖÒÕÎÞÒɽ«ÔÚÀ´Äê±»Æð¾¢Ê¹Ó㺴¹ÂÚ¹¥»÷¡¢½«Ó²¼þÖеÄÒÑÖªÎó²î×÷ÎªÉøÍ¸Ç°ÑÔ¡¢Ê¹ÓòÙ×÷ϵͳ×é¼þºÍIT²úÆ·ÖеÄÁãÈÕÎó²î¡¢ÈëÇÖÓòÃû×¢²áÉ̺ÍÈÏÖ¤»ú¹¹ÒÔ¼°Õë¶Ô¹©Ó¦É̵Ĺ¥»÷¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/threats-to-ics-and-industrial-enterprises-in-2022/104957/