¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

Ðû²¼Ê±¼ä 2022-12-13
1¡¢¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

      

¾Ý12ÔÂ11ÈÕ±¨µÀ£¬ £¬£¬£¬¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¡£¡£¾ÝϤ£¬ £¬£¬£¬´ÓÉÏÖÜÎå×îÏÈ£¬ £¬£¬£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬ £¬£¬£¬¼û¸æËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£¡£¡£Õþ¸®²¢Î´ËµÃ÷¸ÃÊÂÎñÊÇÔõÑù±¬·¢µÄ£¬ £¬£¬£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬ £¬£¬£¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ±¡£¡£¡£Æäʱ£¬ £¬£¬£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˱¨¸æÁËÀ¬»ø¶ÌÐÅ£¬ £¬£¬£¬ÕâЩڲƭÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£


https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714


2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»Ê¹ÓõÄCVE-2022-42475

      

12ÔÂ12ÈÕ£¬ £¬£¬£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³öÎó²î£¨CVE-2022-42475£©µÄÇ徲ͨ¸æ¡£¡£¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî¡£¡£¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸ÃÎó²î£¬ £¬£¬£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸÃÎó²îÒѱ»ÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÔõÑùʹÓÃÎó²îµÄÐÅÏ¢£¬ £¬£¬£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£¡£¡£Fortinet½¨Òé¿Í»§Á¬Ã¦×°Öò¹¶¡¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/


3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î

      

CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬ £¬£¬£¬AndroidÓ¦ÓóÌÐòWeb Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Í¼¡£¡£¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Ó㬠£¬£¬£¬ÔÚGoogle PlayÊÐËÁÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î¡£¡£¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦ÓóÌÐòºÍÓû§µÄÊý¾Ý£¬ £¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬ÈôÊǹ¥»÷Õß¶ÔÓ¦ÓõÄÓû§¾ÙÐÐÈ¥ÄäÃû»¯´¦Öóͷ££¬ £¬£¬£¬¾ÍÄܹ»Éó²éÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´ó×ÚÐÅÏ¢£¬ £¬£¬£¬²¢ÓÃÓÚڲƭÀÕË÷¡£¡£¡£±ðµÄ£¬ £¬£¬£¬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâ»î¶¯¡£¡£¡£


https://cybernews.com/security/android-app-leaked-user-browsing-history/


4¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ

      

¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬ £¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬 £¬£¬£¬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦ÓóÌÐò·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨ÆÊÎöµÄSQL×¢Èëpayload£¬ £¬£¬£¬´ó´ó¶¼WAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬ £¬£¬£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÖÃÈôØèÎÅ¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬Ñо¿Ö°Ô±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF¡£¡£¡£


https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html


5¡¢ThreatFabric·¢Ã÷Õë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder

      

ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚÆÊÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬ £¬£¬£¬·¢Ã÷ÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯¡£¡£¡£³ýÁËErmacÍ⣬ £¬£¬£¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬Ñо¿Ö°Ô±»¹ÖصãÏÈÈÝÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬ £¬£¬£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½Õýµ±µÄAndroidÓ¦Ó㬠£¬£¬£¬Ñ¬È¾Ä¿µÄµÄͬʱÈÔÓµÓÐԭʼӦÓõÄËùÓй¦Ð§£¬ £¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿µÄ£¬ £¬£¬£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿µÄÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£


https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html


6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

      

12ÔÂ8ÈÕ£¬ £¬£¬£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄJanicab±äÌ壬 £¬£¬£¬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬ £¬£¬£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾¡£¡£¡£ÓÐȤµÄÊÇ£¬ £¬£¬£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂçЧÀÍ×÷ΪDDR¡£¡£¡£È»¶ø£¬ £¬£¬£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬ £¬£¬£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬ £¬£¬£¬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óᣡ£¡£DeathstalkerÈÔÖ÷ÒªÕë¶Ô״ʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬ £¬£¬£¬µ«¶Ô½üÆÚ»î¶¯µÄÆÊÎöÅú×¢ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿µÄÐÐÒµ¡£¡£¡£


https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/