Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806

Ðû²¼Ê±¼ä 2022-06-21
1¡¢Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806

      

¾ÝýÌå6ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬AnkerµÄÖÐÑëÖÇÄܼҾÓ×°±¸ÖÐÐÄEufy Homebase 2±£´æ3¸öÇå¾²Îó²î¡£¡£¡£¡£ ¡£Homebase 2ÊÇËùÓÐAnker EufyÖÇÄܼҾÓ×°±¸µÄÊÓÆµ´æ´¢ºÍÍøÂçÍø¹Ø£¬£¬£¬£¬×÷ΪÕâЩװ±¸µÄÖÐÐÄÕ¾ÔËÐС£¡£¡£¡£ ¡£ÆäÖÐ×îÑÏÖØµÄÊÇÒ»¸ö´úÂëÖ´ÐÐÎó²î£¨CVE-2022-21806£¬£¬£¬£¬CVSSÆÀ·Ö10)£¬£¬£¬£¬ÊÇÄÚ²¿Ð§ÀÍÆ÷¹¦Ð§ÖеÄÊͷźóʹÓÃÎó²îµ¼ÖµÄ£¬£¬£¬£¬¿Éͨ¹ýÏòÄ¿µÄ×°±¸·¢ËÍÌØÖÆµÄÍøÂçÊý¾Ý°üÀ´´¥·¢¡£¡£¡£¡£ ¡£ÆäËüÁ½¸öÎó²î»®·ÖΪ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2022-26073£©ºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-25989£©¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/anker-eufy-smart-home-hubs-exposed-to-rce-attacks-by-critical-flaw/


2¡¢ÃÀ¹úFlagstarÒøÐÐ֪ͨÆä¿Í»§È¥ÄêÔâµ½¹¥»÷

      

¾Ý6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬FlagstarÒøÐÐÕýÔÚ֪ͨ¿Í»§¹ØÓÚÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£ ¡£FlagstarÊÇλÓÚÃÜЪ¸ùÖݵĽðÈÚЧÀÍÌṩÉÌ£¬£¬£¬£¬Ò²ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬£¬£¬£¬×Ü×ʲúÁè¼Ý300ÒÚÃÀÔª¡£¡£¡£¡£ ¡£Æ¾Ö¤Ð¹Â¶Í¨Öª£¬£¬£¬£¬FlagstarµÄÍøÂçÔÚ2021Äê12Ô±»ÈëÇÖ£¬£¬£¬£¬¸ÃÒøÐÐÓÚ½ñÄê6ÔÂ2ÈÕ·¢Ã÷¡£¡£¡£¡£ ¡£¾­ÊӲ죬£¬£¬£¬¹¥»÷Õß»á¼ûÁ˿ͻ§µÄÏêϸÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñÓ°ÏìÁË1547169ÈË£¬£¬£¬£¬Flagstar½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêÃâ·ÑµÄÉí·Ý¼à¿ØºÍ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£ ¡£2021Äê1Ô£¬£¬£¬£¬¸ÃÐÐÔøÔâµ½ClopÍÅ»ïµÄÀÕË÷¹¥»÷¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/flagstar-bank-discloses-data-breach-impacting-15-million-customers/


3¡¢Robert Half³ÆºÚ¿ÍÒѹ¥»÷Æä1000¶à¸ö¿Í»§µÄÕÊ»§

      

ýÌå6ÔÂ17Èճƣ¬£¬£¬£¬ÈËÁ¦×ÊÔ´¹«Ë¾Robert HalfµÄ1000¶à¸ö¿Í»§µÄÕÊ»§Ôâµ½¹¥»÷¡£¡£¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬¹¥»÷ÕßÔÚ4ÔÂ26ÈÕÖÁ5ÔÂ16ÈÕʱ´úÈëÇÖÁËRobertHalf.comÍøÕ¾µÄÕÊ»§£¬£¬£¬£¬¸ÃÊÂÎñÓÚ5ÔÂ31ÈÕ±»·¢Ã÷£¬£¬£¬£¬Ó°ÏìÁË1058СÎÒ˽¼Ò¡£¡£¡£¡£ ¡£´Ë´Îй¶Á˿ͻ§ÐÕÃû¡¢µØµãºÍÉç»áÇå¾²ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ÒÔ¼°ÈËΪºÍ˰ÊյȲÆÎñÐÅÏ¢¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾Ã»ÓйûÕæ¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬£¬µ«Æ¾Ö¤ÆäÐÎò£¬£¬£¬£¬ËƺõÉæ¼°Æ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¡£ ¡£Robert Half½¨Òé¿Í»§¸ü¸ÄʹÓÃÁËÏàͬƾ֤µÄÆäËüÕÊ»§£¬£¬£¬£¬²¢½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý¼à¿ØÐ§ÀÍ¡£¡£¡£¡£ ¡£


https://www.securityweek.com/staffing-firm-robert-half-says-hackers-targeted-over-1000-customer-accounts


4¡¢Lookout³ÆÌع¤Èí¼þHermitÓëÒâ´óÀûRCS LabÓйØ

      

6ÔÂ16ÈÕ£¬£¬£¬£¬LookoutµÄ×îÐÂÑо¿½«Ìع¤Èí¼þHermitºÍÒâ´óÀûRCS LabÁªÏµÆðÀ´¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ËûÃÇÔÚ2022Äê4Ô¼ì²âµ½ÁËеÄÑù±¾¡£¡£¡£¡£ ¡£HermitÊÇÄ£¿£¿£¿ £¿é»¯¶ñÒâÈí¼þ£¬£¬£¬£¬¾ßÓжàÖÖ¹¦Ð§£¬£¬£¬£¬¿ÉÂ¼ÖÆÒôƵ¡¢²¦´òºÍÖØ¶¨Ïòµç»°ÒÔ¼°ÍøÂç¶àÖÖÊý¾Ý¡£¡£¡£¡£ ¡£Ëüͨ¹ýSMSÐÂΞÙÐÐÈö²¥£¬£¬£¬£¬Ã°³äÈýÐÇ¡¢VivoºÍOppoµÄÓ¦Ó㬣¬£¬£¬Lookout½«¸ÃÆä¹é×ïÓÚÒâ´óÀûRCS Lab SpAºÍÒ»¼ÒµçÐÅЧÀÍÌṩÉÌTykelab Srl¡£¡£¡£¡£ ¡£


https://thehackernews.com/2022/06/researchers-uncover-hermit-android.html


5¡¢CleafyÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ


CleafyÔÚ6ÔÂ17ÈÕÐû²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£BRATAÓÚ2018Äêµ×Ê×´ÎÔÚ°ÍÎ÷±»·¢Ã÷£¬£¬£¬£¬ÓÚ2021Äê·ºÆðÔÚÅ·ÖÞ¡£¡£¡£¡£ ¡£½üÆÚ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÔËÓªÍÅ»ïÔÙ´ÎΪ¸ÃAndroid¶ñÒâÈí¼þÌí¼ÓÁ˸ü¶à¹¦Ð§²¢ÇÒË¢ÐÂÁ˹¥»÷Õ½ÂÔ£¬£¬£¬£¬ÏÖÔÚ¸üÇкϸ߼¶Ò»Á¬Íþв(APT)¹¥»÷»î¶¯µÄģʽ¡£¡£¡£¡£ ¡£Ð°汾µÄBRATA¸ü¾ßÕë¶ÔÐÔ£¬£¬£¬£¬ËüÒ»´ÎÖ»Õë¶ÔÒ»¼Ò½ðÈÚ»ú¹¹£¬£¬£¬£¬Ö»ÓÐÔÚÆä¹¥»÷»î¶¯±äµÃµÍЧʱ²Å»áתÏòÁíÒ»¸öÄ¿µÄ¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬BRATAÌí¼ÓÁ˸ü¶àȨÏÞ£¬£¬£¬£¬ÀýÈç·¢ËͺÍÎüÊÕSMS£¬£¬£¬£¬Õâ¿ÉÓÃÀ´ÇÔÈ¡ÒøÐз¢Ë͸ø¿Í»§µÄÔÝʱÃÜÂë¡£¡£¡£¡£ ¡£


https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat


6¡¢Trend MicroÐû²¼2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ

      

6ÔÂ15ÈÕ£¬£¬£¬£¬Trend MicroÐû²¼ÁË2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±¶Ô2022ÄêÖÆÔì¡¢µçÁ¦ºÍʯÓͺÍ×ÔÈ»Æø¹«Ë¾µÄ¹¤ÒµÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÁËÊӲ졣¡£¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ÔÚÒÑÍù12¸öÔÂÖУ¬£¬£¬£¬Ê®·ÖÖ®¾ÅµÄ×éÖ¯µÄÉú²ú»òÄÜÔ´¹©Ó¦¶¼Êܵ½¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£ ¡£¹ØÓÚϵͳÖÐÖ¹µÄÒ»Á¬Ê±¼äºÍ¾­¼ÃËðʧ£¬£¬£¬£¬56%µÄÊÜ·ÃÕßÌåÏÖÖÐÖ¹»áÒ»Á¬ËÄÌì»ò¸ü³¤Ê±¼ä£»£»£»£»È¥ÄêµÄƽ¾ù¾­¼ÃËðʧԼΪ280ÍòÃÀÔª£»£»£»£»¾­¼ÃËðʧ³ýÁ˰üÀ¨ÀÕË÷¹¥»÷µÄÊê½ðÖ®Í⣬£¬£¬£¬ÉÐÓлָ´ÏµÍ³¡¢µÖÓù¹¥»÷ºÍÕÐÆ¸ÌØÊâÔ±¹¤µÄÓöÈ¡£¡£¡£¡£ ¡£


https://www.trendmicro.com/en_us/research/22/f/state-of-ot-security-2022.html