{"id":1890,"date":"2023-09-23T18:25:53","date_gmt":"2023-09-23T10:25:53","guid":{"rendered":"https:\/\/www.aqwu.net\/wp\/?p=1890"},"modified":"2023-09-23T18:25:53","modified_gmt":"2023-09-23T10:25:53","slug":"%e6%96%b0%e7%9a%84%e8%8b%b9%e6%9e%9c%e9%9b%b6%e6%97%a5%e6%bc%8f%e6%b4%9e%e8%a2%ab%e7%94%a8%e6%9d%a5%e7%94%a8%e6%8d%95%e9%a3%9f%e8%80%85%e9%97%b4%e8%b0%8d%e8%bd%af%e4%bb%b6%e9%92%88%e5%af%b9%e5%9f%83","status":"publish","type":"post","link":"https:\/\/www.aqwu.net\/wp\/?p=1890","title":{"rendered":"\u65b0\u7684\u82f9\u679c\u96f6\u65e5\u6f0f\u6d1e\u88ab\u7528\u6765\u7528\u6355\u98df\u8005\u95f4\u8c0d\u8f6f\u4ef6\u9488\u5bf9\u57c3\u53ca\u524d\u56fd\u4f1a\u8bae\u5458"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><a href=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEjroDJFbypw1LTIfIeQZFVDLbqPfWQhTyTzvovutwhuTmmcf6FAiqldmVajg_ZdU4xheiVqIkQbeffBKwfIHxmePQYb4GMVMLEu3ImIjCJa3-j9EwOhCy0ISZ17XOkG-QS82UmOmtwJM0YhsnK-xIqDQm0MH52ZCEQPxeDA_NIeVGtbGPhKepqI9IxER-oL\/s728-e365\/Spyware.jpg\"><img decoding=\"async\" src=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEjroDJFbypw1LTIfIeQZFVDLbqPfWQhTyTzvovutwhuTmmcf6FAiqldmVajg_ZdU4xheiVqIkQbeffBKwfIHxmePQYb4GMVMLEu3ImIjCJa3-j9EwOhCy0ISZ17XOkG-QS82UmOmtwJM0YhsnK-xIqDQm0MH52ZCEQPxeDA_NIeVGtbGPhKepqI9IxER-oL\/s728-e3650\/Spyware.jpg\" alt=\"Apple Zero-Day\" title=\"Apple Zero-Day\"\/><\/a><\/figure>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/thehackernews.com\/2023\/09\/apple-rushes-to-patch-3-new-zero-day.html\" rel=\"noreferrer noopener\" target=\"_blank\">three zero-day flaws<\/a>&nbsp;addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called&nbsp;<strong>Predator<\/strong>&nbsp;targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023.<br>Apple \u5728 2023 \u5e74 9 \u6708 21 \u65e5\u89e3\u51b3\u7684\u4e09\u4e2a\u96f6\u65e5\u6f0f\u6d1e\u88ab\u7528\u4f5c iPhone \u6f0f\u6d1e\u5229\u7528\u94fe\u7684\u4e00\u90e8\u5206\uff0c\u8bd5\u56fe\u5728 2023 \u5e74 5 \u6708\u81f3 9 \u6708\u671f\u95f4\u9488\u5bf9\u524d\u57c3\u53ca\u56fd\u4f1a\u8bae\u5458\u827e\u54c8\u8fc8\u5fb7\u00b7\u57c3\u5c14\u5766\u5854\u7ef4\u63d0\u4f9b\u4e00\u79cd\u540d\u4e3a Predator \u7684\u95f4\u8c0d\u8f6f\u4ef6\u3002<\/p>\n\n\n\n<p>&#8220;The targeting took place after Eltantawy publicly&nbsp;<a href=\"https:\/\/www.reuters.com\/world\/africa\/egyptian-ex-mp-planning-presidential-bid-says-relatives-arrested-2023-05-04\/\" rel=\"noreferrer noopener\" target=\"_blank\">stated his plans<\/a>&nbsp;to run for President in the 2024 Egyptian elections,&#8221; the Citizen Lab&nbsp;<a href=\"https:\/\/citizenlab.ca\/2023\/09\/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions\/\" rel=\"noreferrer noopener\" target=\"_blank\">said<\/a>, attributing the attack with high confidence to the Egyptian government owing to it being a known customer of the commercial spying tool.<br>\u201c\u76ee\u6807\u662f\u5728Eltantawy\u516c\u5f00\u8868\u793a\u4ed6\u8ba1\u5212\u57282024\u5e74\u57c3\u53ca\u9009\u4e3e\u4e2d\u7ade\u9009\u603b\u7edf\u4e4b\u540e\u53d1\u751f\u7684\uff0c\u201d\u516c\u6c11\u5b9e\u9a8c\u5ba4\u8bf4\uff0c\u7531\u4e8e\u57c3\u53ca\u653f\u5e9c\u662f\u5546\u4e1a\u95f4\u8c0d\u5de5\u5177\u7684\u5df2\u77e5\u5ba2\u6237\uff0c\u56e0\u6b64\u9ad8\u5ea6\u81ea\u4fe1\u5730\u5c06\u8fd9\u6b21\u88ad\u51fb\u5f52\u56e0\u4e8e\u57c3\u53ca\u653f\u5e9c\u3002<\/p>\n\n\n\n<p>According to a joint investigation conducted by the Canadian interdisciplinary laboratory and Google&#8217;s Threat Analysis Group (TAG), the mercenary surveillance tool is said to have been delivered via links sent on SMS and WhatsApp.<br>\u6839\u636e\u52a0\u62ff\u5927\u8de8\u5b66\u79d1\u5b9e\u9a8c\u5ba4\u548c\u8c37\u6b4c\u5a01\u80c1\u5206\u6790\u5c0f\u7ec4\uff08TAG\uff09\u8fdb\u884c\u7684\u8054\u5408\u8c03\u67e5\uff0c\u636e\u8bf4\u96c7\u4f63\u519b\u76d1\u89c6\u5de5\u5177\u662f\u901a\u8fc7\u77ed\u4fe1\u548cWhatsApp\u4e0a\u53d1\u9001\u7684\u94fe\u63a5\u63d0\u4f9b\u7684\u3002<\/p>\n\n\n\n<p>&#8220;In August and September 2023, Eltantawy&#8217;s Vodafone Egypt mobile connection was persistently selected for targeting via network injection; when Eltantawy visited certain websites not using HTTPS, a device installed at the border of Vodafone Egypt&#8217;s network automatically redirected him to a malicious website to infect his phone with Cytrox&#8217;s Predator spyware,&#8221; the Citizen Lab researchers said.<br>\u201c\u5728 2023 \u5e74 8 \u6708\u548c 9 \u6708\uff0cEltantawy \u7684\u6c83\u8fbe\u4e30\u57c3\u53ca\u79fb\u52a8\u8fde\u63a5\u88ab\u6301\u7eed\u9009\u62e9\u901a\u8fc7\u7f51\u7edc\u6ce8\u5165\u8fdb\u884c\u5b9a\u4f4d;\u5f53Eltantawy\u8bbf\u95ee\u67d0\u4e9b\u4e0d\u4f7f\u7528HTTPS\u7684\u7f51\u7ad9\u65f6\uff0c\u5b89\u88c5\u5728\u6c83\u8fbe\u4e30\u57c3\u53ca\u7f51\u7edc\u8fb9\u754c\u7684\u8bbe\u5907\u4f1a\u81ea\u52a8\u5c06\u4ed6\u91cd\u5b9a\u5411\u5230\u6076\u610f\u7f51\u7ad9\uff0c\u7528Cytrox\u7684Predator\u95f4\u8c0d\u8f6f\u4ef6\u611f\u67d3\u4ed6\u7684\u624b\u673a\uff0c\u201c\u516c\u6c11\u5b9e\u9a8c\u5ba4\u7684\u7814\u7a76\u4eba\u5458\u8bf4\u3002<a href=\"https:\/\/thn.news\/o6a5Vxgy\" rel=\"noreferrer noopener\" target=\"_blank\"><\/a><\/p>\n\n\n\n<p>The exploit chain leveraged a set of three vulnerabilities \u2013&nbsp;<a href=\"https:\/\/thehackernews.com\/2023\/09\/apple-rushes-to-patch-3-new-zero-day.html\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993<\/a>&nbsp;\u2013 which could allow a malicious actor to bypass certificate validation, elevate privileges, and achieve remote code execution on targeted devices upon processing a specially crafted web content.<br>\u6f0f\u6d1e\u5229\u7528\u94fe\u5229\u7528\u4e86\u4e00\u7ec4\u4e09\u4e2a\u6f0f\u6d1e\uff08CVE-2023-41991\u3001CVE-2023-41992 \u548c CVE-2023-41993\uff09\uff0c\u8fd9\u53ef\u80fd\u5141\u8bb8\u6076\u610f\u884c\u4e3a\u8005\u5728\u5904\u7406\u7279\u5236 Web \u5185\u5bb9\u65f6\u7ed5\u8fc7\u8bc1\u4e66\u9a8c\u8bc1\u3001\u63d0\u5347\u6743\u9650\u5e76\u5728\u76ee\u6807\u8bbe\u5907\u4e0a\u5b9e\u73b0\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2023\/05\/predator-android-spyware-researchers.html\" rel=\"noreferrer noopener\" target=\"_blank\">Predator<\/a>, made by a company called Cytrox, is analogous to NSO Group&#8217;s Pegasus, enabling its customers to surveil targets of interest and harvest sensitive data from compromised devices. Part of a consortium of spyware vendors called the Intellexa Alliance, it was&nbsp;<a href=\"https:\/\/thehackernews.com\/2023\/07\/us-government-blacklists-cytrox-and.html\" rel=\"noreferrer noopener\" target=\"_blank\">blocklisted<\/a>&nbsp;by the U.S. government in July 2023 for &#8220;enabling campaigns of repression and other human rights abuses.&#8221;<br>\u7531\u4e00\u5bb6\u540d\u4e3aCytrox\u7684\u516c\u53f8\u5236\u9020\u7684Predator\u7c7b\u4f3c\u4e8eNSO\u96c6\u56e2\u7684Pegasus\uff0c\u4f7f\u5176\u5ba2\u6237\u80fd\u591f\u76d1\u89c6\u611f\u5174\u8da3\u7684\u76ee\u6807\u5e76\u4ece\u53d7\u611f\u67d3\u7684\u8bbe\u5907\u4e2d\u6536\u96c6\u654f\u611f\u6570\u636e\u3002\u4f5c\u4e3a\u95f4\u8c0d\u8f6f\u4ef6\u4f9b\u5e94\u5546\u8054\u76df\u7684\u4e00\u90e8\u5206\uff0c\u5b83\u4e8e 2023 \u5e74 7 \u6708\u88ab\u7f8e\u56fd\u653f\u5e9c\u5c01\u9501\uff0c\u7f6a\u540d\u662f\u201c\u4fc3\u6210\u9547\u538b\u548c\u5176\u4ed6\u4fb5\u72af\u4eba\u6743\u8fd0\u52a8\u201d\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEh5XRDDj4d5LjL_O4cNgWGDMnLyJkOmuklg2fSq_eDHFnrNoEAhauZZ4wXUyYqrN5DD5vetgDZSGXtyud1Bu6AMJlDhah-LdurMTLJa1StG-yPzD9AbDoXcTtBB5IIKYuAwPl3itCjgW1bH9M2jt-3nx3OghJcv0wY9Qf89VWvjy8LIlZizgldX5L-5obWh\/s728-e365\/Spyware.jpg\"><img decoding=\"async\" src=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEh5XRDDj4d5LjL_O4cNgWGDMnLyJkOmuklg2fSq_eDHFnrNoEAhauZZ4wXUyYqrN5DD5vetgDZSGXtyud1Bu6AMJlDhah-LdurMTLJa1StG-yPzD9AbDoXcTtBB5IIKYuAwPl3itCjgW1bH9M2jt-3nx3OghJcv0wY9Qf89VWvjy8LIlZizgldX5L-5obWh\/s728-e3650\/Spyware.jpg\" alt=\"Apple Zero-Day\" title=\"Apple Zero-Day\"\/><\/a><\/figure>\n\n\n\n<p>The exploit, hosted on a domain named sec-flare[.]com, is said to have been delivered after Eltantawy was redirected to a website named c.betly[.]me by means of a sophisticated network injection attack using&nbsp;<a href=\"https:\/\/citizenlab.ca\/2018\/03\/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria\/\" rel=\"noreferrer noopener\" target=\"_blank\">Sandvine&#8217;s PacketLogic middlebox<\/a>&nbsp;situated on a link between Telecom Egypt and Vodafone Egypt.<br>\u8be5\u6f0f\u6d1e\u6258\u7ba1\u5728\u540d\u4e3asec-flare\u7684\u57df\u4e0a\u3002com\uff0c\u636e\u8bf4\u662f\u5728Eltantawy\u88ab\u91cd\u5b9a\u5411\u5230\u4e00\u4e2a\u540d\u4e3ac.betly\u7684\u7f51\u7ad9\u540e\u4ea4\u4ed8\u7684\u3002\u6211\u901a\u8fc7\u4f7f\u7528\u4f4d\u4e8e\u57c3\u53ca\u7535\u4fe1\u548c\u6c83\u8fbe\u4e30\u57c3\u53ca\u4e4b\u95f4\u94fe\u8def\u4e0a\u7684Sandvine\u7684PacketLogic\u4e2d\u95f4\u76d2\u8fdb\u884c\u590d\u6742\u7684\u7f51\u7edc\u6ce8\u5165\u653b\u51fb\u3002<\/p>\n\n\n\n<p>&#8220;The body of the destination website included two iframes, ID &#8216;if1&#8217; which contained apparently benign bait content (in this case a link to an APK file not containing spyware) and ID &#8216;if2&#8217; which was an invisible iframe containing a Predator infection link hosted on sec-flare[.]com,&#8221; the Citizen Lab said.<br>\u201c\u76ee\u6807\u7f51\u7ad9\u7684\u6b63\u6587\u5305\u62ec\u4e24\u4e2aiframe\uff0cID &#8216;if1&#8217;\uff0c\u5176\u4e2d\u5305\u542b\u660e\u663e\u826f\u6027\u7684\u8bf1\u9975\u5185\u5bb9\uff08\u5728\u672c\u4f8b\u4e2d\u662f\u6307\u5411\u4e0d\u5305\u542b\u95f4\u8c0d\u8f6f\u4ef6\u7684APK\u6587\u4ef6\u7684\u94fe\u63a5\uff09\u548cID &#8216;if2&#8217;\uff0c\u8fd9\u662f\u4e00\u4e2a\u4e0d\u53ef\u89c1\u7684iframe\uff0c\u5176\u4e2d\u5305\u542b\u6258\u7ba1\u5728sec-flare\u4e0a\u7684Predator\u611f\u67d3\u94fe\u63a5\u3002com\uff0c\u201c\u516c\u6c11\u5b9e\u9a8c\u5ba4\u8bf4\u3002<\/p>\n\n\n\n<p>Google TAG researcher Maddie Stone characterized it as a case of an adversary-in-the-middle (AitM) attack that takes advantage of a visit to a website using HTTP (as opposed to HTTPS) to intercept and force the victim to visit a different site operated by the threat actor.<br>Google TAG\u7814\u7a76\u5458Maddie Stone\u5c06\u5176\u63cf\u8ff0\u4e3a\u4e2d\u95f4\u5bf9\u624b\uff08AitM\uff09\u653b\u51fb\u7684\u6848\u4f8b\uff0c\u8be5\u653b\u51fb\u5229\u7528\u4f7f\u7528HTTP\uff08\u800c\u4e0d\u662fHTTPS\uff09\u8bbf\u95ee\u7f51\u7ad9\u6765\u62e6\u622a\u5e76\u8feb\u4f7f\u53d7\u5bb3\u8005\u8bbf\u95ee\u7531\u5a01\u80c1\u884c\u4e3a\u8005\u8fd0\u8425\u7684\u5176\u4ed6\u7ad9\u70b9\u3002<\/p>\n\n\n\n<p>&#8220;In the case of this campaign, if the target went to any &#8216;http&#8217; site, the attackers injected traffic to silently redirect them to an Intellexa site, c.betly[.]me,&#8221; Stone&nbsp;<a href=\"https:\/\/blog.google\/threat-analysis-group\/0-days-exploited-by-commercial-surveillance-vendor-in-egypt\/\" rel=\"noreferrer noopener\" target=\"_blank\">explained<\/a>. &#8220;If the user was the expected targeted user, the site would then redirect the target to the exploit server, sec-flare[.]com.&#8221;<br>\u201c\u5728\u8fd9\u6b21\u6d3b\u52a8\u4e2d\uff0c\u5982\u679c\u76ee\u6807\u8f6c\u5230\u4efb\u4f55&#8217;http&#8217;\u7ad9\u70b9\uff0c\u653b\u51fb\u8005\u4f1a\u6ce8\u5165\u6d41\u91cf\u4ee5\u9759\u9ed8\u5730\u5c06\u4ed6\u4eec\u91cd\u5b9a\u5411\u5230Intellexa\u7ad9\u70b9\uff0cc.betly[\u3002\u6211\uff0c\u201c\u65af\u901a\u89e3\u91ca\u9053\u3002\u201c\u5982\u679c\u7528\u6237\u662f\u9884\u671f\u7684\u76ee\u6807\u7528\u6237\uff0c\u90a3\u4e48\u8be5\u7ad9\u70b9\u4f1a\u5c06\u76ee\u6807\u91cd\u5b9a\u5411\u5230\u6f0f\u6d1e\u5229\u7528\u670d\u52a1\u5668sec-flare[\u3002\u201c\u5530\u5530\ufffd<\/p>\n\n\n\n<p>Eltantawy received three SMS messages in September 2021, May 2023, and September 2023 that masqueraded as security alerts from WhatsApp urging Eltantawy to click on a link to terminate a suspicious login session originating from a purported Windows device.<br>Eltantawy \u5206\u522b\u4e8e 2021 \u5e74 9 \u6708\u30012023 \u5e74 5 \u6708\u548c 2023 \u5e74 9 \u6708\u6536\u5230\u4e09\u6761\u77ed\u4fe1\uff0c\u4f2a\u88c5\u6210\u6765\u81ea WhatsApp \u7684\u5b89\u5168\u8b66\u62a5\uff0c\u6566\u4fc3 Eltantawy \u5355\u51fb\u94fe\u63a5\u4ee5\u7ec8\u6b62\u6e90\u81ea\u636e\u79f0 Windows \u8bbe\u5907\u7684\u53ef\u7591\u767b\u5f55\u4f1a\u8bdd\u3002<\/p>\n\n\n\n<p>While these links don&#8217;t match the fingerprint of the aforementioned domain, the investigation revealed that the Predator spyware was installed on the device approximately 2 minutes and 30 seconds after Eltantawy read the message sent in September 2021.<br>\u867d\u7136\u8fd9\u4e9b\u94fe\u63a5\u4e0e\u4e0a\u8ff0\u57df\u7684\u6307\u7eb9\u4e0d\u5339\u914d\uff0c\u4f46\u8c03\u67e5\u663e\u793a\uff0c\u5728 Eltantawy \u9605\u8bfb 2021 \u5e74 9 \u6708\u53d1\u9001\u7684\u6d88\u606f\u540e\u5927\u7ea6 2 \u5206 30 \u79d2\uff0c\u8bbe\u5907\u4e0a\u5b89\u88c5\u4e86 Predator \u95f4\u8c0d\u8f6f\u4ef6\u3002<\/p>\n\n\n\n<p>He also received two WhatsApp messages on June 24, 2023, and July 12, 2023, in which an individual claiming to be working for the International Federation for Human Rights (FIDH) solicited his opinion on an article that pointed to the website sec-flare[.]com. The messages were left unread.<br>\u4ed6\u8fd8\u5728 2023 \u5e74 6 \u6708 24 \u65e5\u548c 2023 \u5e74 7 \u6708 12 \u65e5\u6536\u5230\u4e86\u4e24\u6761 WhatsApp \u6d88\u606f\uff0c\u5176\u4e2d\u4e00\u540d\u81ea\u79f0\u4e3a\u56fd\u9645\u4eba\u6743\u8054\u5408\u4f1a \uff08FIDH\uff09 \u5de5\u4f5c\u7684\u4e2a\u4eba\u5c31\u4e00\u7bc7\u6307\u5411\u7f51\u7ad9 sec-flare[..com\u3002\u8fd9\u4e9b\u6d88\u606f\u672a\u88ab\u9605\u8bfb\u3002<\/p>\n\n\n\n<p>Google TAG said it also detected an exploit chain that weaponized a remote code execution flaw in the Chrome web browser (CVE-2023-4762) to deliver Predator on Android devices using two methods: the AitM injection and via one-time links sent directly to the target.<br>Google TAG\u8868\u793a\uff0c\u5b83\u8fd8\u68c0\u6d4b\u5230\u4e00\u4e2a\u6f0f\u6d1e\u5229\u7528\u94fe\uff0c\u8be5\u6f0f\u6d1e\u5229\u7528Chrome\u7f51\u7edc\u6d4f\u89c8\u5668\u4e2d\u7684\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u7f3a\u9677\uff08CVE-2023-4762\uff09\u6b66\u5668\u5316\uff0c\u4f7f\u7528\u4e24\u79cd\u65b9\u6cd5\u5728Android\u8bbe\u5907\u4e0a\u4ea4\u4ed8Predator\uff1aAitM\u6ce8\u5165\u548c\u901a\u8fc7\u76f4\u63a5\u53d1\u9001\u5230\u76ee\u6807\u7684\u4e00\u6b21\u6027\u94fe\u63a5\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEjmtQW30pPznXPIrBDZrE69PJISfXrnQHFnJ41FK3ukP7jN-deUfo9sAdG6nCi7ynhRGSZYeKgMnzkcSNTEHNygePNEUeKcbl72RB9WPe2CYpdQRxUeEFTpXJXgNyuPmOPohjBbzw96EToXqPxtkgs3VXkxSO22jW_wxgLxk4I4QEgcv7a5agQ2c0AXPm41\/s728-e365\/hacking.jpg\"><img decoding=\"async\" src=\"https:\/\/thehackernews.com\/new-images\/img\/b\/R29vZ2xl\/AVvXsEjmtQW30pPznXPIrBDZrE69PJISfXrnQHFnJ41FK3ukP7jN-deUfo9sAdG6nCi7ynhRGSZYeKgMnzkcSNTEHNygePNEUeKcbl72RB9WPe2CYpdQRxUeEFTpXJXgNyuPmOPohjBbzw96EToXqPxtkgs3VXkxSO22jW_wxgLxk4I4QEgcv7a5agQ2c0AXPm41\/s728-e3650\/hacking.jpg\" alt=\"Apple Zero-Day\" title=\"Apple Zero-Day\"\/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-4762\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-4762<\/a>, a type confusion vulnerability in the V8 engine, was anonymously reported on August 16, 2023, and&nbsp;<a href=\"https:\/\/chromereleases.googleblog.com\/2023\/09\/stable-channel-update-for-desktop.html\" rel=\"noreferrer noopener\" target=\"_blank\">patched<\/a>&nbsp;by Google on September 5, 2023, although the internet giant assesses that Cytrox\/Intellexa may have used this vulnerability as a zero-day.<br>CVE-2023-4762 \u662f V8 \u5f15\u64ce\u4e2d\u7684\u4e00\u4e2a\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff0c\u4e8e 2023 \u5e74 8 \u6708 16 \u65e5\u533f\u540d\u62a5\u544a\uff0c\u5e76\u4e8e 2023 \u5e74 9 \u6708 5 \u65e5\u7531 Google \u4fee\u8865\uff0c\u5c3d\u7ba1\u8fd9\u5bb6\u4e92\u8054\u7f51\u5de8\u5934\u8bc4\u4f30 Cytrox\/Intellexa \u53ef\u80fd\u5df2\u5c06\u6b64\u6f0f\u6d1e\u7528\u4f5c\u96f6\u65e5\u6f0f\u6d1e\u3002<\/p>\n\n\n\n<p>According to a brief description on the National Vulnerability Database (NVD), CVE-2023-4762 concerns a &#8220;type confusion in V8 in Google Chrome prior to 116.0.5845.179 [that] allowed a remote attacker to execute arbitrary code via a crafted HTML page.&#8221;<br>\u6839\u636e\u56fd\u5bb6\u6f0f\u6d1e\u6570\u636e\u5e93 \uff08NVD\uff09 \u7684\u7b80\u8981\u63cf\u8ff0\uff0cCVE-2023-4762 \u6d89\u53ca\u201c116.0.5845.179 \u4e4b\u524d\u7684 Google Chrome V8 \u4e2d\u7684\u7c7b\u578b\u6df7\u6dc6\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u6784\u5efa\u7684 HTML \u9875\u9762\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002<\/p>\n\n\n\n<p>The latest findings, besides highlighting the abuse of surveillance tools to target the civil society, underscores the blindspots in the telecom ecosystem that could be exploited to intercept network traffic and inject malware into targets&#8217; devices.<br>\u6700\u65b0\u8c03\u67e5\u7ed3\u679c\u9664\u4e86\u5f3a\u8c03\u6ee5\u7528\u76d1\u63a7\u5de5\u5177\u9488\u5bf9\u6c11\u95f4\u793e\u4f1a\u5916\uff0c\u8fd8\u5f3a\u8c03\u4e86\u7535\u4fe1\u751f\u6001\u7cfb\u7edf\u4e2d\u7684\u76f2\u70b9\uff0c\u8fd9\u4e9b\u76f2\u70b9\u53ef\u80fd\u88ab\u7528\u6765\u62e6\u622a\u7f51\u7edc\u6d41\u91cf\u5e76\u5c06\u6076\u610f\u8f6f\u4ef6\u6ce8\u5165\u76ee\u6807\u7684\u8bbe\u5907\u3002<\/p>\n\n\n\n<p>&#8220;Although great strides have been made in recent years to &#8216;encrypt the web,&#8217; users still occasionally visit websites without HTTPS, and a single non-HTTPS website visit can result in spyware infection,&#8221; the Citizen Lab said.<br>\u201c\u5c3d\u7ba1\u8fd1\u5e74\u6765\u5728&#8217;\u52a0\u5bc6\u7f51\u7edc&#8217;\u65b9\u9762\u53d6\u5f97\u4e86\u957f\u8db3\u7684\u8fdb\u6b65\uff0c\u4f46\u7528\u6237\u4ecd\u7136\u5076\u5c14\u8bbf\u95ee\u6ca1\u6709HTTPS\u7684\u7f51\u7ad9\uff0c\u4e00\u6b21\u975eHTTPS\u7f51\u7ad9\u8bbf\u95ee\u90fd\u53ef\u80fd\u5bfc\u81f4\u95f4\u8c0d\u8f6f\u4ef6\u611f\u67d3\uff0c\u201d\u516c\u6c11\u5b9e\u9a8c\u5ba4\u8bf4\u3002<\/p>\n\n\n\n<p>Users who are at risk of spyware threats because of &#8220;who they are or what they do&#8221; are recommended to keep their devices up-to-date and\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/thehackernews.com\/2023\/09\/russian-journalists-iphone-compromised.html\" target=\"_blank\">enable Lockdown Mode<\/a>\u00a0on iPhones, iPads, and Macs to stave off such risks.<br>\u5efa\u8bae\u56e0\u201c\u4ed6\u4eec\u662f\u8c01\u6216\u4ed6\u4eec\u505a\u4ec0\u4e48\u201d\u800c\u9762\u4e34\u95f4\u8c0d\u8f6f\u4ef6\u5a01\u80c1\u98ce\u9669\u7684\u7528\u6237\u4f7f\u5176\u8bbe\u5907\u4fdd\u6301\u6700\u65b0\u72b6\u6001\uff0c\u5e76\u5728 iPhone\u3001iPad \u548c Mac \u4e0a\u542f\u7528\u9501\u5b9a\u6a21\u5f0f\u4ee5\u907f\u514d\u6b64\u7c7b\u98ce\u9669\u3002<\/p>\n\n\n\n<p>\u539f\u6587\u94fe\u63a5\uff1a<a href=\"https:\/\/thehackernews.com\/2023\/09\/latest-apple-zero-days-used-to-hack.html\">New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware &#8212; \u65b0\u7684\u82f9\u679c\u96f6\u65e5\u6f0f\u6d1e\u88ab\u7528\u6765\u7528\u6355\u98df\u8005\u95f4\u8c0d\u8f6f\u4ef6\u9488\u5bf9\u57c3\u53ca\u524d\u56fd\u4f1a\u8bae\u5458 (thehackernews.com)<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The&nbsp;three zero-day flaws&nbsp;addressed by Apple o [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[95,43,17],"tags":[242],"class_list":["post-1890","post","type-post","status-publish","format-standard","hentry","category-ios","category-infoarticle","category-infonews","tag-chatgpt"],"views":2107,"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1890"}],"version-history":[{"count":1,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1890\/revisions"}],"predecessor-version":[{"id":1891,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1890\/revisions\/1891"}],"wp:attachment":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}