¼ÓÄô󰲴óÂÔÊ¡µÄÒßÃç¹ÜÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

Ðû²¼Ê±¼ä 2022-12-13
1¡¢¼ÓÄô󰲴óÂÔÊ¡µÄÒßÃç¹ÜÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

      

¾Ý12ÔÂ11ÈÕ±¨µÀ£¬¼ÓÄô󰲴óÂÔÊ¡µÄÒßÃç¹ÜÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ ¡£¾ÝϤ£¬´ÓÉÏÖÜÎ忪ʼ£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬¼û¸æËûÃǵĸöÈËÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶Ê¼þÖÐÊܵ½Ó°Ïì ¡£Õþ¸®²¢Î´ËµÃ÷¸ÃʼþÊÇÈçºÎ·¢ÉúµÄ£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ± ¡£Æäʱ£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˳ÂËßÁËÀ¬»ø¶ÌÐÅ£¬ÕâЩÆÛÕ©ÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩ¸öÈËÐÅÏ¢ ¡£


https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714


2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»ÀûÓõÄCVE-2022-42475

      

12ÔÂ12ÈÕ£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³ö©¶´£¨CVE-2022-42475£©µÄÄþ¾²Í¨¸æ ¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐÈÎÒâ´úÂë»òÃüÁî ¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸é¶´£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸé¶´Òѱ»ÓÃÓÚ¹¥»÷»î¶¯ ¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÈçºÎÀûÓé¶´µÄÐÅÏ¢£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC ¡£Fortinet½¨Òé¿Í»§Á¢¼´°²×°²¹¶¡ ¡£


https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/


3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Ç¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î

      

CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬AndroidÓ¦Ó÷¨Ê½Web Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Ç¼ ¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Óã¬ÔÚGoogle PlayÉ̵êÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î ¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦Ó÷¨Ê½ºÍÓû§µÄÊý¾Ý£¬Ñо¿ÈËÔ±ÌåÏÖ£¬Èç¹û¹¥»÷Õß¶ÔÓ¦ÓõÄÓû§½øÐÐÈ¥ÄäÃû»¯´¦Ö㬾ÍÄܹ»¼ì²ìÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´óÁ¿ÐÅÏ¢£¬²¢ÓÃÓÚÇÃÕ©ÀÕË÷ ¡£´ËÍ⣬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâ»î¶¯ ¡£


https://cybernews.com/security/android-app-leaked-user-browsing-history/


4¡¢Ñо¿ÈËÔ±ÑÝʾÈçºÎÈÆ¹ýÁ÷ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ

      

¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬Ñо¿ÍŶӷ¢ÏÖÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦Ó÷¨Ê½·À»ðǽ(WAF)²¢ÈëÇÖϵͳ ¡£¸Ã¹¥»÷¼¼ÊõÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨½âÎöµÄSQL×¢Èëpayload£¬´ó¶àÊýWAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÊÓ¶ø²»¼û ¡£Ä¿Ç°£¬Ñо¿ÈËÔ±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF ¡£


https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html


5¡¢ThreatFabric·¢ÏÖÕë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder

      

ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚ·ÖÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬·¢ÏÖÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯ ¡£³ýÁËErmacÍ⣬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ ¡£´ËÍ⣬Ñо¿ÈËÔ±»¹Öصã½éÉÜÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½ºÏ·¨µÄAndroidÓ¦Óã¬Ñ¬È¾Ä¿±êµÄͬʱÈÔÓµÓÐԭʼӦÓõÄÈ«²¿¹¦Ð§£¬ÒÔÈÆ¹ý¼ì²â ¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿±ê£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿±êÄÇÀïÇÔÈ¡ÁËÊý¾Ý ¡£


https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html


6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß

      

12ÔÂ8ÈÕ£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß ¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄJanicab±äÌ壬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾ ¡£ÓÐȤµÄÊÇ£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂç·þÎñ×÷ΪDDR ¡£È»¶ø£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬Õâ±íÃ÷»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óà ¡£DeathstalkerÈÔÖ÷ÒªÕë¶ÔÂÉʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬µ«¶Ô½üÆÚ»î¶¯µÄ·ÖÎö±íÃ÷ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿±êÐÐÒµ ¡£


https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/