¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢
Ðû²¼Ê±¼ä 2022-12-13
¾Ý12ÔÂ11ÈÕ±¨µÀ£¬¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¾ÝϤ£¬´ÓÉÏÖÜÎå×îÏÈ£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬¼û¸æËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£Õþ¸®²¢Î´ËµÃ÷¸ÃÊÂÎñÊÇÔõÑù±¬·¢µÄ£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ±¡£Æäʱ£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˱¨¸æÁËÀ¬»ø¶ÌÐÅ£¬ÕâЩڲÆÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩСÎÒ˽¼ÒÐÅÏ¢¡£
https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714
2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»Ê¹ÓõÄCVE-2022-42475
12ÔÂ12ÈÕ£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³öÎó²î£¨CVE-2022-42475£©µÄÇ徲ͨ¸æ¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸ÃÎó²î£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸÃÎó²îÒѱ»ÓÃÓÚ¹¥»÷Ô˶¯¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÔõÑùʹÓÃÎó²îµÄÐÅÏ¢£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£Fortinet½¨Òé¿Í»§Á¬Ã¦×°Öò¹¶¡¡£
https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/
3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î
CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬AndroidÓ¦ÓóÌÐòWeb Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Í¼¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Óã¬ÔÚGoogle PlayÊÐËÁÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦ÓóÌÐòºÍÓû§µÄÊý¾Ý£¬Ñо¿Ö°Ô±ÌåÏÖ£¬ÈôÊǹ¥»÷Õß¶ÔÓ¦ÓõÄÓû§¾ÙÐÐÈ¥ÄäÃû»¯´¦Öóͷ££¬¾ÍÄܹ»Éó²éÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´ó×ÚÐÅÏ¢£¬²¢ÓÃÓÚÚ²ÆÀÕË÷¡£±ðµÄ£¬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâÔ˶¯¡£
https://cybernews.com/security/android-app-leaked-user-browsing-history/
4¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ
¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦ÓóÌÐò·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¸Ã¹¥»÷ÊÖÒÕÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨ÆÊÎöµÄSQL×¢Èëpayload£¬´ó´ó¶¼WAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÖÃÈôØèÎÅ¡£ÏÖÔÚ£¬Ñо¿Ö°Ô±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF¡£
https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html
5¡¢ThreatFabric·¢Ã÷Õë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder
ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚÆÊÎöAndroidľÂíErmacµÄÔ˶¯Ê±£¬·¢Ã÷ÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄÔ˶¯¡£³ýÁËErmacÍ⣬¸ÃÔ˶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£±ðµÄ£¬Ñо¿Ö°Ô±»¹ÖصãÏÈÈÝÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½Õýµ±µÄAndroidÓ¦Óã¬Ñ¬È¾Ä¿µÄµÄͬʱÈÔÓµÓÐÔʼӦÓõÄËùÓй¦Ð§£¬ÒÔÈÆ¹ý¼ì²â¡£¸ÃÔ˶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿µÄ£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿µÄÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£
https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html
6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
12ÔÂ8ÈÕ£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷Ô˶¯Ê±£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄJanicab±äÌ壬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾¡£ÓÐȤµÄÊÇ£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂç·þÎñ×÷ΪDDR¡£È»¶ø£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óá£DeathstalkerÈÔÖ÷ÒªÕë¶Ô״ʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬µ«¶Ô½üÆÚÔ˶¯µÄÆÊÎöÅú×¢ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿µÄÐÐÒµ¡£
https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/


¾©¹«Íø°²±¸11010802024551ºÅ