COOKIE SPIDERµÄ¶ñÒâ¹ã¸æÍ¶·ÅÁËSHAMOS macOS¶ñÒâÈí¼þ
Ðû²¼Ê±¼ä 2025-08-251. COOKIE SPIDERµÄ¶ñÒâ¹ã¸æÍ¶·ÅÁËSHAMOS macOS¶ñÒâÈí¼þ
8ÔÂ23ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾CrowdStrikeÅû¶ÁËÒ»ÆðÕë¶ÔmacOSÓû§µÄ¹æÄ£»£»£»¯ÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬ÍøÂç·¸·¨×éÖ¯COOKIE SPIDERͨ¹ý¶ñÒâ¹ã¸æÍ¶·ÅºÍGitHubαÔìÏîÄ¿£¬£¬£¬Èö²¥¾ß±¸ÐÅÏ¢ÇÔÈ¡ÄÜÁ¦µÄÐÂÐͶñÒâÈí¼þSHAMOS£¨AMOS±äÖÖ£©¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ"µ¥ÐÐÏÂÁî"ÊÖÒÕÈÆ¹ýmacOS Gatekeeper·À»¤»úÖÆ£¬£¬£¬ÓÕµ¼Óû§ÔÚÖÕ¶ËÖ´ÐжñÒâÖ¸Á£¬£¬ÊµÏÖÎÞÖÒÑÔ×°Öᣡ£¡£¹¥»÷Á´Ìõ·ºÆð¶àά¶ÈÉøÍ¸ÌØÕ÷£ºÊ×ÏÈͨ¹ý¹ºÖÃËÑË÷¹ã¸æÎ»£¬£¬£¬½«Î±×°³É"macOSË¢ÐÂÆÊÎöÆ÷»º´æ"µÈ³£¼ûÊÖÒÕÎÊÌâ½â¾ö¼Æ»®µÄÐéα×ÊÖúÍøÕ¾ÍÆÖÁËÑË÷Ч¹ûǰÏߣ¬£¬£¬ÓÕµ¼Óû§¸´ÖÆÖ´ÐаüÀ¨curlÏÂÁîµÄÖÕ¶ËÖ¸Áî¡£¡£¡£¸ÃÏÂÁî»áÏÂÔØBash¾ç±¾£¬£¬£¬ÇÔÈ¡KeychainÃÜÂë¡¢ä¯ÀÀÆ÷ƾ֤¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬²¢´ÓÔ¶³ÌЧÀÍÆ÷¼ÓÔØSHAMOSÖ÷³ÌÐò¡£¡£¡£Æä´Î£¬£¬£¬¹¥»÷ÕßʹÓÃGitHubƽ̨½¨ÉèαÔìµÄiTerm2µÈ×ÅÃûÈí¼þ´æ´¢¿â£¬£¬£¬Í¨¹ýÏÕЩÏàͬµÄÖ¸ÁîÓÕµ¼¿ª·¢ÕßÓû§Ö´ÐжñÒâ´úÂë¡£¡£¡£´Ë´Î¹¥»÷Ó°Ïì¹æÄ£ÁýÕÖÈ«Çò300Óà¸ö¿Í»§ÇéÐΣ¬£¬£¬Êܺ¦ÕßÂþÑÜÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾µÈ8¸ö¹ú¼Ò¡£¡£¡£SHAMOS²»µ«¾ß±¸»ù´¡ÐÅÏ¢ÇÔÈ¡¹¦Ð§£¬£¬£¬»¹ÄÜÏÂÔØÎ±ÔìLedger LiveÇ®°üÓ¦Óü°½©Ê¬ÍøÂçÄ£¿£¿£¿£¿é£¬£¬£¬ÏÔÖøÌáÉýÍþвƷ¼¶¡£¡£¡£
https://hackread.com/cookie-spider-malvertising-new-shamos-macos-malware/
2. CPAPÒ½Áƹ«Ë¾ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬³¬9Íò»¼ÕßÐÅϢй¶
8ÔÂ22ÈÕ£¬£¬£¬·ðÂÞÀï´ïÖÝCPAPÒ½ÁÆÓÃÆ·ºÍЧÀ͹«Ë¾¿ËÈÕÅû¶һÆðÓ°Ï쳬9ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬¸Ã¹«Ë¾×¨ÃÅΪÃÀ¹úÎäÊ¿¼°Æä¾ìÊôÌṩ˯ÃߺôÎüÔÝÍ£ÖÎÁÆ×°±¸¡£¡£¡£¾ÝÆä¹ÙÍøÐû²¼µÄÇå¾²ÊÂÎñͨ¸æ£¬£¬£¬2024Äê12ÔÂÖÐÑ®£¬£¬£¬¹¥»÷Õßͨ¹ý²»·¨ÊÖ¶ÎÇÖÈëÆäÍøÂçϵͳ£¬£¬£¬²¢Ò»Á¬Ç±ÔÚÁè¼ÝÒ»ÖÜʱ¼ä£¬£¬£¬Ê±´ú¿ÉÄÜÇÔÈ¡Á˰üÀ¨Éç»áÇå¾²ºÅÂë¡¢Êܱ£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©µÈÃô¸ÐÊý¾Ý¡£¡£¡£´Ë´ÎÊÂÎñÒѰ´Ö´·¨ÒªÇóÏòÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©¼°ÖÝî¿Ïµ»ú¹¹±¨±¸¡£¡£¡£Ö»¹Üй¶¹æÄ£ÔÚÒ½ÁÆÐÐÒµ¶¯éüÊýÊ®Íò¡¢ÉϰÙÍòÈ˵ÄÊÂÎñÖÐÏà¶Ô½ÏС£¬£¬£¬µ«ÒòÆäЧÀ͹¤¾ßµÄÌØÊâÐÔÒý·¢¹Ø×¢¡£¡£¡£CPAPÒ½Áƹ«Ë¾ÔÚÉùÃ÷ÖÐÇ¿µ÷£¬£¬£¬ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÐÅÏ¢Òѱ»ÀÄÓûò¼´½«±»ÀÄÓ㬣¬£¬µ«Î´Ã÷ȷ˵Ã÷ÊÇ·ñÒÑÏòÊܺ¦ÕßÌṩÐÅÓÃ¼à¿ØµÈµ÷½â²½·¥¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬±¾´Î¹¥»÷δ±»ÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯ÈÏÁ죬£¬£¬ÒµÄÚÍÆ²â±£´æÁ½ÖÖ¿ÉÄÜÐÔ£º¹¥»÷·½Îª²»¹ûÕæÊܺ¦ÕßÉí·ÝµÄÒþ²ØÍþв×éÖ¯£¬£¬£¬»òCPAPÒÑÖ§¸¶Êê½ðÒÔ×èÖ¹Êý¾Ý¹ûÕæ¡£¡£¡£Ö»¹ÜCPAP¹«Ë¾¹æÄ£ÓÐÏÞ£¬£¬£¬µ«Æä´¦Öóͷ£µÄÃÀÎäʿԱ¿µ½¡Êý¾Ý¾ßÓи߶ÈÃô¸ÐÐÔ£¬£¬£¬Éç»áÇå¾²ºÅÂëµÄй¶¿ÉÄÜΪÉí·Ý͵ÇԵȺóÐø·¸·¨´´Á¢Ìõ¼þ¡£¡£¡£
https://www.securityweek.com/cpap-medical-data-breach-impacts-90000-people/
3. ÃÀ¹úÊý°Ù¸öÊÐÕþ»ú¹¹Èí¼þ±£´æÑÏÖØÊý¾Ýй¶Îó²î
8ÔÂ21ÈÕ£¬£¬£¬¿¨ÄÍ»ù÷¡´óѧCERTе÷ÖÐÐÄ£¨CERT/CC£©¿ËÈÕÅû¶ÃÀ¹úÊý°Ù¸öÊÐÏØÕþ¸®Ê¹ÓõÄWorkhorse SoftwareÊÐÕþ»á¼ÆÈí¼þ±£´æÁ½¸öÑÏÖØÉè¼ÆÈ±ÏÝ£¬£¬£¬Ïà¹ØÎó²îÔÚ³§ÉÌÐÞ¸´ºó²Å±»¹ûÕæ¡£¡£¡£´Ë´ÎÊÂÎñÓÉSparrow IT SolutionsÑо¿Ô±Õ²Ä·Ë¹¡¤¹þÂ޵·¢Ã÷£¬£¬£¬Ó°Ïì1.9.4.48019°æ±¾Ö®Ç°µÄÈí¼þϵͳ£¬£¬£¬Íþ˹¿µÐÇÖݵȵصÄÊÐÕþµ¥Î»ÃæÁÙÉç±£ºÅ¡¢²ÆÎñ¼Í¼µÈÃô¸ÐÐÅϢй¶Σº¦¡£¡£¡£Îó²îÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬¸ÃÈí¼þ±£´æË«ÖØÇå¾²Òþ»¼£ºÆäÒ»£¬£¬£¬SQL ServerÊý¾Ý¿âÅþÁ¬Æ¾Ö¤ÒÔÃ÷ÎÄÐÎʽ´æ´¢ÔÚ¿ÉÖ´ÐÐÎļþÅÔµÄÉèÖÃÎļþÖУ¬£¬£¬¸ÃĿ¼ͨ³£Î»ÓÚÓëÊý¾Ý¿âЧÀÍÆ÷¹²ÏíµÄÍøÂçÎļþ¼ÐÄÚ¡£¡£¡£¹¥»÷ÕßÈôͨ¹ýÎïÀí×°±¸»á¼û¡¢¶ñÒâÈí¼þ¶ÁÈ¡ÍøÂç¹²ÏíÎļþ»òÉç»á¹¤³ÌÊֶλñȡϵͳÈë¿Ú£¬£¬£¬¼´¿ÉÖ±½ÓÇÔÈ¡Êý¾Ý¿âƾ֤¡£¡£¡£Æä¶þ£¬£¬£¬Èí¼þ"Îļþ"²Ëµ¥ÔÊÐíδµÇÈÎÃü»§½¨Éèδ¼ÓÃܵÄZIPÃûÌÃÊý¾Ý¿â±¸·Ý£¬£¬£¬ÌìÉúµÄ.bakÎļþ¿ÉÔÚÈκÎSQL ServerÉÏÎÞÐèÃÜÂëÖ±½Ó»¹Ô£¬£¬£¬ÐγÉÊý¾ÝÍâйµÄÍêÕû·¾¶¡£¡£¡£CERT/CCÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬´ËÀàÉè¼ÆÈ±ÏÝ¿ÉÄܵ¼Ö¹¥»÷ÕßÍêÕû»ñÈ¡ÊÐÕþÊý¾Ý¿â£¬£¬£¬²»µ«Éæ¼°¹«ÃñÒþ˽й¶£¬£¬£¬¸ü¿ÉÄܸ͝²ÆÎñÊý¾Ý¡¢ÆÆËðÉó¼Æ×·ËÝÐÔ¼°ÏµÍ³ÍêÕûÐÔ¡£¡£¡£
https://securityaffairs.com/181363/security/us-cert-cc-warns-of-flaws-in-workhorse-software-accounting-software-used-by-hundreds-of-municipalities-in-wisconsin.html
4. ÷è÷ëÀÕË÷Èí¼þÉù³ÆÈëÇÖÈÕ²ú×Ó¹«Ë¾²¢ÇÔÈ¡4TBÉè¼ÆÊý¾Ý
8ÔÂ21ÈÕ£¬£¬£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯£¨ÓÖ³ÆAgenda£©¿ËÈÕÐû³ÆÀÖ³ÉÈëÇÖÈÕ²úÆû³µÎ»ÓÚ¶«¾©µÄÉè¼Æ×Ó¹«Ë¾ÈÕ²ú´´ÒâºÐ×Ó¹«Ë¾£¨CBI£©£¬£¬£¬²¢ÇÔÈ¡Áè¼Ý4TBµÄÃô¸ÐÊý¾Ý£¬£¬£¬ÍþвÈô²»Öª×ãÆäÒªÇ󽫹ûÕæÎļþ¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼Í¨¸æ£¬£¬£¬Éù³Æ»ñÈ¡µÄÎļþ°üÀ¨405,882¸öÉæ¼°Æû³µÉè¼ÆµÄ3DÄ£×Ó¡¢²ÆÎñÊý¾Ý¡¢VRÉè¼ÆÍ¼Ïñ¼°ÄÚ²¿Îĵµ£¬£¬£¬²¢¸½ÉÏËÄ·ÝʾÀýÎļþ×ôÖ¤Æä˵·¨¡£¡£¡£Ð¹Â¶µÄʾÀýÎļþÏÔʾ£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁËÈÕ²úÆû³µµÄ¸ß¾«¶ÈÉè¼ÆÊý¾Ý£ºÒ»·Ý±ê×¢¶à±ßÐÎÈý½ÇÐÎÊýÄ¿µÄ3D CADäÖȾͼ£¬£¬£¬Åú×¢Æä½Ó´¥ÁËÔÐÍÉè¼Æ½×¶ÎµÄ½¹µãÊý¾Ý£»£»£»Ò»·ÝÈÕÓï²ÆÎñµç×Ó±í¸ñ°üÀ¨ÏîĿʱ¼ä±í¡¢±¾Ç®¹ÀËã¼°ÑÕÉ«±àÂëµÄÔ¤ËãÍýÏ룻£»£»ÉÐÓиßϸ½ÚÄÚÊÎäÖȾͼ¼°Ô±¹¤Ê¹ÓÃVR×°±¸²Ù×÷3DÉè¼ÆµÄÕÕÆ¬£¬£¬£¬Õ¹ÏÖÈÕ²ú½«ÐéÄâÏÖʵÊÖÒÕÈÚÈëÉè¼ÆÁ÷³Ì¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬¾ºÕùµÐÊÖ»òÔì¼ÙÕß¿Éͨ¹ýÕâЩÎļþÆÊÎöÈÕ²úµÄÉè¼ÆÁ÷³ÌÓëÉÌÒµÉñÃØ£¬£¬£¬¶ÔÆóÒµÔì³Éºã¾Ã¾ºÕùΣº¦¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ÈÕ²úÆû³µÉÐδ¾ÍÊÂÎñÐû²¼¹Ù·½ÉùÃ÷¡£¡£¡£
https://hackread.com/qilin-ransomware-gang-4tb-data-breach-nissan-cbi/
5. ¶íº¥¶íÒ½ÁÆÍ¬ÃËÒ½ÓôóÂ黼ÕßÊý¾Ý¿âй¶
8ÔÂ21ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler¿ËÈÕ·¢Ã÷£¬£¬£¬¶íº¥¶íÒ½ÁÆÍ¬ÃËÓÐÏÞÔðÈι«Ë¾£¨Ohio Medical Alliance LLC£¬£¬£¬Æ·ÅÆÃû¡°¶íº¥¶í´óÂ鿨¡±£©µÄÁ½¸öÉèÖùýʧµÄÊý¾Ý¿â´¦ÓÚÍêÈ«¿ª·Å״̬£¬£¬£¬Î´¾ÙÐÐÈκμÓÃÜ»òÃÜÂë±£»£»£»¤£¬£¬£¬µ¼ÖÂÔ¼95.7ÍòÌõ»¼Õß¼°¹ØÁªÖ°Ô±µÄÃô¸ÐÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¸ÃÊý¾Ý¿â×ÜÈÝÁ¿´ï323GB£¬£¬£¬°üÀ¨957,434Ìõ¼Í¼£¬£¬£¬Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢³öÉúÈÕÆÚ¡¢¼Òͥסַ¡¢¼ÝʻִÕÕ¸ßÇåͼÏñµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬ÒÔ¼°ÈëÔº±í¸ñ¡¢Ò½Éú֤ʵ¡¢´´É˺óÓ¦¼¤Õϰ£¨PTSD£©ºÍ½¹ÂÇÖ¢Ïà¹ØµÄÒ½ÁÆÆÀ¹ÀµÈ¸ß¶È˽ÃܵĿµ½¡µµ°¸¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÒÔ»¼ÕßÐÕÃûÃüÃûµÄÎļþ¼Ð£¬£¬£¬ÄÚº¬PDFºÍͼÏñÃûÌõÄÒ½ÁÆÎļþ£»£»£»Ò»¸öÃûΪ¡°Ô±¹¤Ì¸ÂÛ¡±µÄCSVÎļþÔò¼Í¼ÁËÄÚ²¿ÔËÓªÐÅÏ¢¡¢¿Í»§¸üÐÂÈÕÖ¾£¬£¬£¬ÒÔ¼°Áè¼Ý21Íò¸ö»¼Õß¡¢Ô±¹¤¼°ÓªÒµÏàÖúͬ°éµÄµç×ÓÓʼþµØµã¡£¡£¡£Fowlerͨ¹ýWebsite Planet±¨¸æ¸ÃÎÊÌâºó£¬£¬£¬Êý¾Ý¿â»á¼ûȨÏÞÔÚÔ½ÈÕ±»ÏÞÖÆ£¬£¬£¬µ«¹«Ë¾Î´×÷³öÈκÎÖ±½Ó»ØÓ¦¡£¡£¡£
https://hackread.com/ssns-health-records-exposed-marijuana-patient-database/
6. CISA½«Æ»¹ûÁãÈÕÎó²îCVE-2025-43300ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼
8ÔÂ22ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Æ»¹ûiOS¡¢iPadOS¼°macOSϵͳÖеÄÁãÈÕÎó²îCVE-2025-43300ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê9ÔÂ11ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¸ÃÎó²îÓÉÆ»¹û¹«Ë¾±¾ÖܽôÆÈÐÞ¸´£¬£¬£¬Éæ¼°ImageIO¿ò¼ÜµÄÔ½½çдÈëȱÏÝ£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕµ¼Óû§´¦Öóͷ£¶ñÒâͼÏñÎļþ´¥·¢ÄÚ´æË𻵣¬£¬£¬½ø¶øÖ´ÐÐÖØ´ó¶¨Ïò¹¥»÷¡£¡£¡£Æ»¹ûÇ徲ͨ¸æÈ·ÈÏ£¬£¬£¬CVE-2025-43300ÒÑÊÕµ½±»Ê¹Óõı¨¸æ£¬£¬£¬Æä¹¥»÷³¡¾°Õë¶ÔÌØ¶¨Ä¿µÄÓû§£¬£¬£¬¾ß±¸¸ß¶ÈÕë¶ÔÐÔ¡£¡£¡£Îó²î³ÉÒòÔ´ÓÚͼÏñ´¦Öóͷ£Á÷³ÌÖнçÏß¼ì²é²»³ä·Ö£¬£¬£¬µ¼Ö¶ñÒâ½á¹¹µÄͼÏñÎļþ¿ÉÔ½½çдÈëÄÚ´æÇøÓò¡£¡£¡£Îª½â¾ö¸ÃÎÊÌ⣬£¬£¬Æ»¹ûͨ¹ýÇ¿»¯½çÏß¼ì²é»úÖÆÐû²¼¶àƽ̨¸üС£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Æ»¹ûδ¹ûÕæÎó²îʹÓõÄÊÖÒÕϸ½Ú£¬£¬£¬µ«Ç¿µ÷´Ë´ÎÐÞ¸´Õë¶Ô"¼«ÆäÖØ´óµÄ¹¥»÷"¡£¡£¡£Æ¾Ö¤CISA¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD 22-01£©£¬£¬£¬Áª°î»ú¹¹ÐèÓÅÏÈ´¦Öóͷ£KEVĿ¼ÖеÄÎó²î£¬£¬£¬ÒÔÌá·ÀDZÔÚ¹ú¼Ò¼¶Íþв¡£¡£¡£
https://securityaffairs.com/181406/security/u-s-cisa-adds-apple-ios-ipados-and-macos-flaw-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ