COOKIE SPIDERµÄ¶ñÒâ¹ã¸æÍ¶·ÅÁËSHAMOS macOS¶ñÒâÈí¼þ

Ðû²¼Ê±¼ä 2025-08-25

1. COOKIE SPIDERµÄ¶ñÒâ¹ã¸æÍ¶·ÅÁËSHAMOS macOS¶ñÒâÈí¼þ


8ÔÂ23ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾CrowdStrikeÅû¶ÁËÒ»ÆðÕë¶ÔmacOSÓû§µÄ¹æÄ£»£»£»£»£»¯ÍøÂç¹¥»÷ÊÂÎñ £¬£¬£¬£¬ÍøÂç·¸·¨×éÖ¯COOKIE SPIDERͨ¹ý¶ñÒâ¹ã¸æÍ¶·ÅºÍGitHubαÔìÏîÄ¿ £¬£¬£¬£¬Èö²¥¾ß±¸ÐÅÏ¢ÇÔÈ¡ÄÜÁ¦µÄÐÂÐͶñÒâÈí¼þSHAMOS£¨AMOS±äÖÖ£©¡£¡£¡£¸Ã×éÖ¯½ÓÄÉ"µ¥ÐÐÏÂÁî"ÊÖÒÕÈÆ¹ýmacOS Gatekeeper·À»¤»úÖÆ £¬£¬£¬£¬ÓÕµ¼Óû§ÔÚÖÕ¶ËÖ´ÐжñÒâÖ¸Áî £¬£¬£¬£¬ÊµÏÖÎÞÖÒÑÔ×°Öᣡ£¡£¹¥»÷Á´Ìõ·ºÆð¶àά¶ÈÉøÍ¸ÌØÕ÷£ºÊ×ÏÈͨ¹ý¹ºÖÃËÑË÷¹ã¸æÎ» £¬£¬£¬£¬½«Î±×°³É"macOSË¢ÐÂÆÊÎöÆ÷»º´æ"µÈ³£¼ûÊÖÒÕÎÊÌâ½â¾ö¼Æ»®µÄÐéα×ÊÖúÍøÕ¾ÍÆÖÁËÑË÷Ч¹ûǰÏß £¬£¬£¬£¬ÓÕµ¼Óû§¸´ÖÆÖ´ÐаüÀ¨curlÏÂÁîµÄÖÕ¶ËÖ¸Áî¡£¡£¡£¸ÃÏÂÁî»áÏÂÔØBash¾ç±¾ £¬£¬£¬£¬ÇÔÈ¡KeychainÃÜÂë¡¢ä¯ÀÀÆ÷ƾ֤¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý £¬£¬£¬£¬²¢´ÓÔ¶³ÌЧÀÍÆ÷¼ÓÔØSHAMOSÖ÷³ÌÐò¡£¡£¡£Æä´Î £¬£¬£¬£¬¹¥»÷ÕßʹÓÃGitHubƽ̨½¨ÉèαÔìµÄiTerm2µÈ×ÅÃûÈí¼þ´æ´¢¿â £¬£¬£¬£¬Í¨¹ýÏÕЩÏàͬµÄÖ¸ÁîÓÕµ¼¿ª·¢ÕßÓû§Ö´ÐжñÒâ´úÂë¡£¡£¡£´Ë´Î¹¥»÷Ó°Ïì¹æÄ£ÁýÕÖÈ«Çò300Óà¸ö¿Í»§ÇéÐÎ £¬£¬£¬£¬Êܺ¦ÕßÂþÑÜÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾µÈ8¸ö¹ú¼Ò¡£¡£¡£SHAMOS²»µ«¾ß±¸»ù´¡ÐÅÏ¢ÇÔÈ¡¹¦Ð§ £¬£¬£¬£¬»¹ÄÜÏÂÔØÎ±ÔìLedger LiveÇ®°üÓ¦Óü°½©Ê¬ÍøÂçÄ£¿£¿ £¿£¿£¿£¿é £¬£¬£¬£¬ÏÔÖøÌáÉýÍþвƷ¼¶¡£¡£¡£


https://hackread.com/cookie-spider-malvertising-new-shamos-macos-malware/


2. CPAPÒ½Áƹ«Ë¾ÔâºÚ¿ÍÈëÇÖ £¬£¬£¬£¬³¬9Íò»¼ÕßÐÅϢй¶


8ÔÂ22ÈÕ £¬£¬£¬£¬·ðÂÞÀï´ïÖÝCPAPÒ½ÁÆÓÃÆ·ºÍЧÀ͹«Ë¾¿ËÈÕÅû¶һÆðÓ°Ï쳬9ÍòÈ˵ÄÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬¸Ã¹«Ë¾×¨ÃÅΪÃÀ¹úÎäÊ¿¼°Æä¾ìÊôÌṩ˯ÃߺôÎüÔÝÍ£ÖÎÁÆ×°±¸¡£¡£¡£¾ÝÆä¹ÙÍøÐû²¼µÄÇå¾²ÊÂÎñͨ¸æ £¬£¬£¬£¬2024Äê12ÔÂÖÐÑ® £¬£¬£¬£¬¹¥»÷Õßͨ¹ý²»·¨ÊÖ¶ÎÇÖÈëÆäÍøÂçϵͳ £¬£¬£¬£¬²¢Ò»Á¬Ç±ÔÚÁè¼ÝÒ»ÖÜʱ¼ä £¬£¬£¬£¬Ê±´ú¿ÉÄÜÇÔÈ¡Á˰üÀ¨Éç»áÇå¾²ºÅÂë¡¢Êܱ£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©µÈÃô¸ÐÊý¾Ý¡£¡£¡£´Ë´ÎÊÂÎñÒѰ´Ö´·¨ÒªÇóÏòÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©¼°ÖÝî¿Ïµ»ú¹¹±¨±¸¡£¡£¡£Ö»¹Üй¶¹æÄ£ÔÚÒ½ÁÆÐÐÒµ¶¯éüÊýÊ®Íò¡¢ÉϰÙÍòÈ˵ÄÊÂÎñÖÐÏà¶Ô½ÏС £¬£¬£¬£¬µ«ÒòÆäЧÀ͹¤¾ßµÄÌØÊâÐÔÒý·¢¹Ø×¢¡£¡£¡£CPAPÒ½Áƹ«Ë¾ÔÚÉùÃ÷ÖÐÇ¿µ÷ £¬£¬£¬£¬ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÐÅÏ¢Òѱ»ÀÄÓûò¼´½«±»ÀÄÓà £¬£¬£¬£¬µ«Î´Ã÷ȷ˵Ã÷ÊÇ·ñÒÑÏòÊܺ¦ÕßÌṩÐÅÓÃ¼à¿ØµÈµ÷½â²½·¥¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬±¾´Î¹¥»÷δ±»ÈκÎÒÑÖªÀÕË÷Èí¼þ×éÖ¯ÈÏÁì £¬£¬£¬£¬ÒµÄÚÍÆ²â±£´æÁ½ÖÖ¿ÉÄÜÐÔ£º¹¥»÷·½Îª²»¹ûÕæÊܺ¦ÕßÉí·ÝµÄÒþ²ØÍþв×éÖ¯ £¬£¬£¬£¬»òCPAPÒÑÖ§¸¶Êê½ðÒÔ×èÖ¹Êý¾Ý¹ûÕæ¡£¡£¡£Ö»¹ÜCPAP¹«Ë¾¹æÄ£ÓÐÏÞ £¬£¬£¬£¬µ«Æä´¦Öóͷ£µÄÃÀÎäʿԱ¿µ½¡Êý¾Ý¾ßÓи߶ÈÃô¸ÐÐÔ £¬£¬£¬£¬Éç»áÇå¾²ºÅÂëµÄй¶¿ÉÄÜΪÉí·Ý͵ÇԵȺóÐø·¸·¨´´Á¢Ìõ¼þ¡£¡£¡£


https://www.securityweek.com/cpap-medical-data-breach-impacts-90000-people/


3. ÃÀ¹úÊý°Ù¸öÊÐÕþ»ú¹¹Èí¼þ±£´æÑÏÖØÊý¾Ýй¶Îó²î


8ÔÂ21ÈÕ £¬£¬£¬£¬¿¨ÄÍ»ù÷¡´óѧCERTЭµ÷ÖÐÐÄ£¨CERT/CC£©¿ËÈÕÅû¶ÃÀ¹úÊý°Ù¸öÊÐÏØÕþ¸®Ê¹ÓõÄWorkhorse SoftwareÊÐÕþ»á¼ÆÈí¼þ±£´æÁ½¸öÑÏÖØÉè¼ÆÈ±ÏÝ £¬£¬£¬£¬Ïà¹ØÎó²îÔÚ³§ÉÌÐÞ¸´ºó²Å±»¹ûÕæ¡£¡£¡£´Ë´ÎÊÂÎñÓÉSparrow IT SolutionsÑо¿Ô±Õ²Ä·Ë¹¡¤¹þÂ޵·¢Ã÷ £¬£¬£¬£¬Ó°Ïì1.9.4.48019°æ±¾Ö®Ç°µÄÈí¼þϵͳ £¬£¬£¬£¬Íþ˹¿µÐÇÖݵȵصÄÊÐÕþµ¥Î»ÃæÁÙÉç±£ºÅ¡¢²ÆÎñ¼Í¼µÈÃô¸ÐÐÅϢй¶Σº¦¡£¡£¡£Îó²îÊÖÒÕϸ½ÚÏÔʾ £¬£¬£¬£¬¸ÃÈí¼þ±£´æË«ÖØÇå¾²Òþ»¼£ºÆäÒ» £¬£¬£¬£¬SQL ServerÊý¾Ý¿âÅþÁ¬Æ¾Ö¤ÒÔÃ÷ÎÄÐÎʽ´æ´¢ÔÚ¿ÉÖ´ÐÐÎļþÅÔµÄÉèÖÃÎļþÖÐ £¬£¬£¬£¬¸ÃĿ¼ͨ³£Î»ÓÚÓëÊý¾Ý¿âЧÀÍÆ÷¹²ÏíµÄÍøÂçÎļþ¼ÐÄÚ¡£¡£¡£¹¥»÷ÕßÈôͨ¹ýÎïÀí×°±¸»á¼û¡¢¶ñÒâÈí¼þ¶ÁÈ¡ÍøÂç¹²ÏíÎļþ»òÉç»á¹¤³ÌÊֶλñȡϵͳÈë¿Ú £¬£¬£¬£¬¼´¿ÉÖ±½ÓÇÔÈ¡Êý¾Ý¿âƾ֤¡£¡£¡£Æä¶þ £¬£¬£¬£¬Èí¼þ"Îļþ"²Ëµ¥ÔÊÐíδµÇÈÎÃü»§½¨Éèδ¼ÓÃܵÄZIPÃûÌÃÊý¾Ý¿â±¸·Ý £¬£¬£¬£¬ÌìÉúµÄ.bakÎļþ¿ÉÔÚÈκÎSQL ServerÉÏÎÞÐèÃÜÂëÖ±½Ó»¹Ô­ £¬£¬£¬£¬ÐγÉÊý¾ÝÍâйµÄÍêÕû·¾¶¡£¡£¡£CERT/CCÔÚͨ¸æÖÐÇ¿µ÷ £¬£¬£¬£¬´ËÀàÉè¼ÆÈ±ÏÝ¿ÉÄܵ¼Ö¹¥»÷ÕßÍêÕû»ñÈ¡ÊÐÕþÊý¾Ý¿â £¬£¬£¬£¬²»µ«Éæ¼°¹«ÃñÒþ˽й¶ £¬£¬£¬£¬¸ü¿ÉÄܸ͝²ÆÎñÊý¾Ý¡¢ÆÆËðÉó¼Æ×·ËÝÐÔ¼°ÏµÍ³ÍêÕûÐÔ¡£¡£¡£


https://securityaffairs.com/181363/security/us-cert-cc-warns-of-flaws-in-workhorse-software-accounting-software-used-by-hundreds-of-municipalities-in-wisconsin.html


4. ÷è÷ëÀÕË÷Èí¼þÉù³ÆÈëÇÖÈÕ²ú×Ó¹«Ë¾²¢ÇÔÈ¡4TBÉè¼ÆÊý¾Ý


8ÔÂ21ÈÕ £¬£¬£¬£¬÷è÷ëÀÕË÷Èí¼þ×éÖ¯£¨ÓÖ³ÆAgenda£©¿ËÈÕÐû³ÆÀÖ³ÉÈëÇÖÈÕ²úÆû³µÎ»ÓÚ¶«¾©µÄÉè¼Æ×Ó¹«Ë¾ÈÕ²ú´´ÒâºÐ×Ó¹«Ë¾£¨CBI£© £¬£¬£¬£¬²¢ÇÔÈ¡Áè¼Ý4TBµÄÃô¸ÐÊý¾Ý £¬£¬£¬£¬ÍþвÈô²»Öª×ãÆäÒªÇ󽫹ûÕæÎļþ¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû²¼Í¨¸æ £¬£¬£¬£¬Éù³Æ»ñÈ¡µÄÎļþ°üÀ¨405,882¸öÉæ¼°Æû³µÉè¼ÆµÄ3DÄ£×Ó¡¢²ÆÎñÊý¾Ý¡¢VRÉè¼ÆÍ¼Ïñ¼°ÄÚ²¿Îĵµ £¬£¬£¬£¬²¢¸½ÉÏËÄ·ÝʾÀýÎļþ×ôÖ¤Æä˵·¨¡£¡£¡£Ð¹Â¶µÄʾÀýÎļþÏÔʾ £¬£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁËÈÕ²úÆû³µµÄ¸ß¾«¶ÈÉè¼ÆÊý¾Ý£ºÒ»·Ý±ê×¢¶à±ßÐÎÈý½ÇÐÎÊýÄ¿µÄ3D CADäÖȾͼ £¬£¬£¬£¬Åú×¢Æä½Ó´¥ÁËÔ­ÐÍÉè¼Æ½×¶ÎµÄ½¹µãÊý¾Ý£»£»£»£»£»Ò»·ÝÈÕÓï²ÆÎñµç×Ó±í¸ñ°üÀ¨ÏîĿʱ¼ä±í¡¢±¾Ç®¹ÀËã¼°ÑÕÉ«±àÂëµÄÔ¤ËãÍýÏ룻£»£»£»£»ÉÐÓиßϸ½ÚÄÚÊÎäÖȾͼ¼°Ô±¹¤Ê¹ÓÃVR×°±¸²Ù×÷3DÉè¼ÆµÄÕÕÆ¬ £¬£¬£¬£¬Õ¹ÏÖÈÕ²ú½«ÐéÄâÏÖʵÊÖÒÕÈÚÈëÉè¼ÆÁ÷³Ì¡£¡£¡£ÈôÊý¾ÝÊôʵ £¬£¬£¬£¬¾ºÕùµÐÊÖ»òÔì¼ÙÕß¿Éͨ¹ýÕâЩÎļþÆÊÎöÈÕ²úµÄÉè¼ÆÁ÷³ÌÓëÉÌÒµÉñÃØ £¬£¬£¬£¬¶ÔÆóÒµÔì³Éºã¾Ã¾ºÕùΣº¦¡£¡£¡£×èÖ¹ÏÖÔÚ £¬£¬£¬£¬ÈÕ²úÆû³µÉÐδ¾ÍÊÂÎñÐû²¼¹Ù·½ÉùÃ÷¡£¡£¡£


https://hackread.com/qilin-ransomware-gang-4tb-data-breach-nissan-cbi/


5. ¶íº¥¶íÒ½ÁÆÍ¬ÃËÒ½ÓôóÂ黼ÕßÊý¾Ý¿âй¶


8ÔÂ21ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah Fowler¿ËÈÕ·¢Ã÷ £¬£¬£¬£¬¶íº¥¶íÒ½ÁÆÍ¬ÃËÓÐÏÞÔðÈι«Ë¾£¨Ohio Medical Alliance LLC £¬£¬£¬£¬Æ·ÅÆÃû¡°¶íº¥¶í´óÂ鿨¡±£©µÄÁ½¸öÉèÖùýʧµÄÊý¾Ý¿â´¦ÓÚÍêÈ«¿ª·Å״̬ £¬£¬£¬£¬Î´¾ÙÐÐÈκμÓÃÜ»òÃÜÂë±£»£»£»£»£»¤ £¬£¬£¬£¬µ¼ÖÂÔ¼95.7ÍòÌõ»¼Õß¼°¹ØÁªÖ°Ô±µÄÃô¸ÐÐÅÏ¢ÃæÁÙй¶Σº¦¡£¡£¡£¸ÃÊý¾Ý¿â×ÜÈÝÁ¿´ï323GB £¬£¬£¬£¬°üÀ¨957,434Ìõ¼Í¼ £¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢³öÉúÈÕÆÚ¡¢¼Òͥסַ¡¢¼ÝʻִÕÕ¸ßÇåͼÏñµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ £¬£¬£¬£¬ÒÔ¼°ÈëÔº±í¸ñ¡¢Ò½Éú֤ʵ¡¢´´É˺óÓ¦¼¤Õϰ­£¨PTSD£©ºÍ½¹ÂÇÖ¢Ïà¹ØµÄÒ½ÁÆÆÀ¹ÀµÈ¸ß¶È˽ÃܵĿµ½¡µµ°¸¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬Êý¾Ý¿âÖл¹°üÀ¨ÒÔ»¼ÕßÐÕÃûÃüÃûµÄÎļþ¼Ð £¬£¬£¬£¬ÄÚº¬PDFºÍͼÏñÃûÌõÄÒ½ÁÆÎļþ£»£»£»£»£»Ò»¸öÃûΪ¡°Ô±¹¤Ì¸ÂÛ¡±µÄCSVÎļþÔò¼Í¼ÁËÄÚ²¿ÔËÓªÐÅÏ¢¡¢¿Í»§¸üÐÂÈÕÖ¾ £¬£¬£¬£¬ÒÔ¼°Áè¼Ý21Íò¸ö»¼Õß¡¢Ô±¹¤¼°ÓªÒµÏàÖúͬ°éµÄµç×ÓÓʼþµØµã¡£¡£¡£Fowlerͨ¹ýWebsite Planet±¨¸æ¸ÃÎÊÌâºó £¬£¬£¬£¬Êý¾Ý¿â»á¼ûȨÏÞÔÚÔ½ÈÕ±»ÏÞÖÆ £¬£¬£¬£¬µ«¹«Ë¾Î´×÷³öÈκÎÖ±½Ó»ØÓ¦¡£¡£¡£


https://hackread.com/ssns-health-records-exposed-marijuana-patient-database/


6. CISA½«Æ»¹ûÁãÈÕÎó²îCVE-2025-43300ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


8ÔÂ22ÈÕ £¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Æ»¹ûiOS¡¢iPadOS¼°macOSϵͳÖеÄÁãÈÕÎó²îCVE-2025-43300ÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ £¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê9ÔÂ11ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¸ÃÎó²îÓÉÆ»¹û¹«Ë¾±¾ÖܽôÆÈÐÞ¸´ £¬£¬£¬£¬Éæ¼°ImageIO¿ò¼ÜµÄÔ½½çдÈëȱÏÝ £¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕµ¼Óû§´¦Öóͷ£¶ñÒâͼÏñÎļþ´¥·¢ÄÚ´æË𻵠£¬£¬£¬£¬½ø¶øÖ´ÐÐÖØ´ó¶¨Ïò¹¥»÷¡£¡£¡£Æ»¹ûÇ徲ͨ¸æÈ·ÈÏ £¬£¬£¬£¬CVE-2025-43300ÒÑÊÕµ½±»Ê¹Óõı¨¸æ £¬£¬£¬£¬Æä¹¥»÷³¡¾°Õë¶ÔÌØ¶¨Ä¿µÄÓû§ £¬£¬£¬£¬¾ß±¸¸ß¶ÈÕë¶ÔÐÔ¡£¡£¡£Îó²î³ÉÒòÔ´ÓÚͼÏñ´¦Öóͷ£Á÷³ÌÖнçÏß¼ì²é²»³ä·Ö £¬£¬£¬£¬µ¼Ö¶ñÒâ½á¹¹µÄͼÏñÎļþ¿ÉÔ½½çдÈëÄÚ´æÇøÓò¡£¡£¡£Îª½â¾ö¸ÃÎÊÌâ £¬£¬£¬£¬Æ»¹ûͨ¹ýÇ¿»¯½çÏß¼ì²é»úÖÆÐû²¼¶àƽ̨¸üС£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬Æ»¹ûδ¹ûÕæÎó²îʹÓõÄÊÖÒÕϸ½Ú £¬£¬£¬£¬µ«Ç¿µ÷´Ë´ÎÐÞ¸´Õë¶Ô"¼«ÆäÖØ´óµÄ¹¥»÷"¡£¡£¡£Æ¾Ö¤CISA¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD 22-01£© £¬£¬£¬£¬Áª°î»ú¹¹ÐèÓÅÏÈ´¦Öóͷ£KEVĿ¼ÖеÄÎó²î £¬£¬£¬£¬ÒÔÌá·ÀDZÔÚ¹ú¼Ò¼¶Íþв¡£¡£¡£


https://securityaffairs.com/181406/security/u-s-cisa-adds-apple-ios-ipados-and-macos-flaw-to-its-known-exploited-vulnerabilities-catalog.html