Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔ­Òò±»FTC·£¿î5.2ÒÚÃÀÔª

Ðû²¼Ê±¼ä 2022-12-20

1¡¢Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔ­Òò±»FTC·£¿î5.2ÒÚÃÀÔª

      

¾Ý12ÔÂ19ÈÕ±¨µÀ £¬µï±¤Ö®Ò¹µÄÖÆÔìÉÌEpic Games½«Ö§¸¶5.2ÒÚÃÀÔª £¬ÒԺͽâÓйØÎ¥·´¶ùͯÒþ˽·¨ºÍʹÓúڰµÄ£Ê½ÓÕʹÊý°ÙÍòÓÎÏ·Íæ¼Ò½øÐÐÎÞÒâÏû·ÑµÄÖ¸¿Ø¡£FTCÔÚͶËßÖÐ³Æ £¬EpicÔÚδ֪ͨ»òδÕ÷µÃÆäâïÊÑͬÒâµÄÇé¿öÏ £¬ÊÕ¼¯13ËêÒÔÏÂÍæ¼ÒµÄÐÅϢΥ·´ÁËCOPPA £¬±»·£¿î2.75ÒÚÃÀÔª¡£´ËÍâ £¬Ëü»¹Ê¹ÓúڰµÄ£Ê½ÆÛÆ­°üÂÞ¶ùͯºÍÇàÉÙÄêÔÚÄÚµÄFortniteÍæ¼Ò½øÐв»ÐèÒªµÄÓÎÏ·ÄÚ¹ºÖà £¬ÐëÏòÊÜÓ°Ïì¿Í»§Ö§¸¶2.45ÒÚÃÀÔªµÄÍ˿Ŀǰ £¬¸Ã¹«Ë¾ÒѸïÐÂĬÈÏÒþ˽ÉèÖà £¬²¢¸ü¸ÄÁËÖ§¸¶Á÷³ÌÒÔ·À²»ÐëÒªµÄÊÕ·Ñ¡£


https://www.bleepingcomputer.com/news/gaming/epic-games-to-pay-520-million-for-privacy-violations-dark-patterns/


2¡¢ºÚ¿Í³öÊ۾ݳÆÊÇ´ÓGeminiÇÔÈ¡µÄ570ÍòÓû§µÄÐÅÏ¢

      

ýÌå12ÔÂ15ÈÕ³Æ £¬ºÚ¿ÍÔÚ¶à¸ö°µÍøÆ½Ì¨³öÊ۾ݳÆÊÇÀ´×ÔGeminiµÄÊý¾Ý¿â £¬°üÂÞ570ÍòÓû§µÄÐÅÏ¢¡£¼ÓÃÜ»õ±Ò½»Ò×ËùGemini½üÆÚÐû²¼Í¨Öª³Æ £¬µÚÈý·½¹©Ó¦ÉÌÔâµ½ÁËÍøÂç¹¥»÷ £¬Î´¾­ÊÚȨµÄ¹¥»÷ÕßÇÔÈ¡ÁËGemini¿Í»§µÄÓʼþµØÖ·ºÍµç»°ºÅÂë £¬Ä¿Ç°ÒÑÓпͻ§ÊÕµ½Á˵öÓãµç×ÓÓʼþ¡£¸ÃÊý¾Ý¿âËÆºõÔÚ9ÔÂÆð¾Í¿ªÊ¼³öÊÛ £¬µ±ÊǼ۸ñΪ30¸ö±ÈÌØ±Ò£¨Ô¼ºÏ520000ÃÀÔª£©¡£Gemini½¨Òé¿Í»§Ê¹ÓÃÇ¿´óµÄÉí·ÝÑéÖ¤ÒªÁì £¬²¢½¨Ò鼤»î2FA± £»¤»òʹÓÃÓ²¼þÄþ¾²ÃÜÔ¿À´·ÃÎÊÕÊ»§¡£ 


https://securityaffairs.co/wordpress/139742/data-breach/5-7m-gemini-users-leak.html


3¡¢²ÍÒû¿Í»§¹ÜÀíÆ½Ì¨SevenRooms 427GBµÄÊý¾Ýй¶

      

¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ £¬ÔÚ¹¥»÷Õß³öÊÛ±»µÁÊý¾Ýºó £¬SevenRoomsÈ·ÈÏÆä·¢ÉúÁËÊý¾Ýй¶¡£SevenRoomsÊǹú¼ÊÁ¬Ëø²ÍÌüºÍ¾Æµê·þÎñÌṩÉÌʹÓõIJÍÌü¿Í»§¹ØÏµ¹ÜÀí(CRM)ƽ̨ £¬°üÂÞMGM ResortsºÍBloomin' BrandsµÈ¡£12ÔÂ15ÈÕ £¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁËÊý¾ÝÑù±¾ £¬Éù³ÆÇÔÈ¡ÁËÒ»¸ö427 GBµÄ±¸·ÝÊý¾Ý¿â £¬ÆäÖаüÂÞÓйØSevenRooms¿Í»§µÄÐÅÏ¢¡£¾ÝϤ £¬Ð¹Â¶ÊÇÓÉÓÚSevenRoomsµÚÈý·½¹©Ó¦É̵ÄÎļþ´«Êä½Ó¿ÚÔ⵽δ¾­ÊÚȨ·ÃÎʵ¼ÖµÄ¡£


https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/


4¡¢Ñо¿ÍŶÓÅû¶ÀÖ¸ßBrickLinkÍøÕ¾ÖеÄAPIÄþ¾²Â©¶´

      

Salt SecurityÔÚ12ÔÂ15ÈÕÅû¶ÁËBrickLinkÍøÕ¾ÖеÄÁ½¸öAPI©¶´¡£BrickLink.comÊÇLEGO GroupµÄ¹Ù·½¶þÊֺ͹Ƕ­Àָ߻ýľÊг¡ £¬ÓµÓÐÁè¼ÝÒ»°ÙÍòµÄ×¢²á»áÔ±¡£ÕâЩ©¶´¿É±»ÓÃÀ´½Ó¹Ü»áÔ±ÕÊ»§¡¢·ÃÎʺÍÇÔÈ¡´æ´¢ÔÚÆ½Ì¨ÉϵĸöÈËÉí·ÝÐÅÏ¢ £¬ÉõÖÁ·ÃÎÊÄÚ²¿Éú²úÊý¾Ý²¢ÆÆ»µÄÚ²¿·þÎñÆ÷¡£µÚÒ»¸ö©¶´ÊÇÓÅ»ÝȯËÑË÷²¿ÃŵIJéÕÒÓû§Ãû¶Ô»°¿òÖеÄXSS©¶´ £¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆÁ´½ÓÔÚÄ¿±êÖÐ×¢ÈëºÍÖ´ÐдúÂë¡£µÚ¶þ¸ö©¶´Î»ÓÚÉÏ´«µ½Çó¹ºÁбíÒ³Ãæ £¬¿Éͨ¹ýXXE¹¥»÷¶ÁÈ¡Web·þÎñÆ÷ÉϵÄÎļþ²¢Ö´ÐÐSSRF¹¥»÷ £¬Õâ¿ÉÄܵ¼ÖÂAWS EC2ÁîÅÆÐ¹Â¶¡£


https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis


5¡¢Mandiant·¢ÏÖUNC4166Õë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯

      

¾ÝMandiant 12ÔÂ15ÈÕ³Æ £¬Æä·¢ÏÖÁËÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹©Ó¦Á´¹¥»÷»î¶¯¡£±»×·×ÙΪUNC4166µÄ¹¥»÷ÍÅ»ïͨ¹ýÎÚ¿ËÀ¼ÓïºÍ¶íÓïµÄTorrentÎļþ¹²ÏíÍøÕ¾ £¬·Ö·¢Î±×°³ÉºÏ·¨Windows 10°²×°·¨Ê½µÄľÂí»¯ISOÎļþ¡£ÕâЩ¶ñÒâ°²×°·¨Ê½ÌṩµÄ¶ñÒâÈí¼þÄܹ»´ÓÄ¿±ê¼ÆËã»úÊÕ¼¯Êý¾Ý¡¢°²×°ÆäËü¶ñÒ⹤¾ß²¢½«ÇÔÈ¡µÄÊý¾Ýй¶µ½¹¥»÷ÕߵķþÎñÆ÷¡£ÔÚ¿ª¶ËÕì²ìÖ®ºó £¬¹¥»÷Õß»¹°²×°Á˺óÃÅStowaway¡¢BeaconºÍSparepart £¬À´±£³Ö¶ÔÄ¿±êµÄ·ÃÎÊ¡¢Ö´ÐÐÃüÁî¡¢´«ÊäÎļþºÍÇÔÈ¡ÐÅÏ¢¡£


https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government


6¡¢TrendMicroÐû²¼¹ØÓÚÀÕË÷Èí¼þAgendaµÄ·ÖÎö³ÂËß

      

12ÔÂ16ÈÕ £¬TrendMicroÐû²¼Á˹ØÓÚÀÕË÷Èí¼þAgendaµÄ·ÖÎö³ÂËß¡£½üÆÚ £¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÓÃRust¿ª·¢µÄAgendaÑù±¾ £¬¼ì²â½á¹ûΪRansom.Win32.AGENDA.THIAFBB¡£AgendaÔÚÆäÍøÕ¾ÉÏÐû²¼µÄ±»¹¥»÷×é֯λÓÚ²îÒì¹ú¼Ò £¬Ö÷ÒªÊôÓÚÖÆÔìÒµºÍITÐÐÒµ £¬×ÜÊÕÈëÁè¼Ý5.5ÒÚÃÀÔª¡£Óë½ÓÊÜ10¸ö²ÎÊýµÄGolang±äÌå²îÒì £¬Rust±äÌåÖ»½ÓÊÜ3¸ö²ÎÊý £¬Ëü»¹Ê¹ÓüäЪÐÔ¼ÓÃܼÆÄ±À´Ìṩ¸ü¿ìµÄ¼ÓÃܲ¢¸üÓÐЧµØÈƹý¼ì²â¡£


https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html