HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æģй¶£¬É漰δÐû²¼ºÍɾ¼õ°æ±¾

Ðû²¼Ê±¼ä 2024-12-30

1. HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æģй¶£¬É漰δÐû²¼ºÍɾ¼õ°æ±¾


12ÔÂ27ÈÕ£¬Áè¼Ý25ÄêµÄHaloÓÎÏ·ÄÚÈݽüÈÕÔÚÍøÉϱ»Ð¹Â¶£¬ÆäÖаüÂ޸ñêÖ¾ÐÔµÚÒ»È˳ÆÉä»÷ÓÎϷϵÁмÓÈëXboxÇ°µÄ¿ÉÍæ°æ±¾£¬ÉõÖÁÊÇ×îÔçµÄFPS°æ±¾¡£¾ÝÍƲ⣬й¶ÄÚÈÝÔ´×ÔHalo StudiosÓë·ÛË¿Ä£×éÖÆ×÷ÕߵĺÏ×÷£¬Ö¼ÔÚ»Ö¸´¹ýÈ¥HaloÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£×ÔÈ¥ÄêÏÄÌìÒÔÀ´£¬ModÍŶÓDigsiteÒ»Ö±ÔÚÓë343 Industries£¨ÏÖÒѸüÃûΪHalo Studios£©ºÏ×÷£¬ÎÞ³¥»Ö¸´ÓÎÏ·ÄÚÈÝ£¬È硶¹â»·Õ½¶·½ø»¯¡·µÄPC¶Ë¿Ú¶àÈËÓÎÏ·µØͼ¼°¾­µä¹â»·ÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£ÓÈΪÒýÈËעĿµÄÊÇ£¬1999ÄêÔø¼Æ»®³ÉΪMacµÚÈýÈ˳ƶÀÕ¼ÓÎÏ·µÄ¡¶¹â»·¡·Ê§´«ÒѾõÄMacÊÀ½çÑÝʾ°æÒ²¼Æ»®»Ö¸´£¬µ«±¾ÖܵÄй¶ÒÑʹ¸Ã°æ±¾¿ÉÔÚPCÉÏÍêÕû²¥·Å£¬Í¬Ê±»¹Ð¹Â¶Á˽ü100GBµÄÆäËûÎļþ£¬°üÂÞBungie¿ª·¢µÄÔ­°æHaloÓÎÏ·ÖÐδÍê³ÉºÍɾ¼õµÄÄÚÈÝ¡£Digsite modÍŶÓÇ°³ÉԱ֤ʵÁËй¶ÄÚÈݵÄÕæʵÐÔ£¬µ«·ñÈÏÏÖÈλòÇ°ÈγÉÔ±¶Ô´ËÂôÁ¦£¬²¢Í¸Â¶Òòȱ·¦Ð½³êºÍ×ÊÔ´ÕùÒ飬´ó¶àÊýmodÍŶӳÉÔ±ÒѸæÍË¡£


https://www.videogameschronicle.com/news/over-25-years-of-classic-halo-content-has-leaked-online/


2. ChromeÀ©Õ¹·¨Ê½Ôâ´ó¹æÄ£ÈëÇÖ£¬Óû§Ãô¸ÐÐÅϢй¶·çÏÕÔö¼Ó


12ÔÂ27ÈÕ£¬ÖÁÉÙÓÐÎå¸öChromeÀ©Õ¹·¨Ê½ÔÚÒ»´ÎЭͬ¹¥»÷ÖÐÔâµ½ÈëÇÖ£¬¹¥»÷Õß×¢ÈëÁËÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢µÄ´úÂë¡£Êý¾Ý¶ªÊ§·À»¤¹«Ë¾CyberhavenÅû¶Á˴˴ι¥»÷£¬¸Ã¹«Ë¾ÔÚÀֳɶÔGoogle ChromeÉ̵êµÄ¹ÜÀíÔ±ÕÊ»§½øÐÐÍøÂçµöÓã¹¥»÷ºó£¬ÏòÆä¿Í»§·¢³öÁËÎ¥¹æ¾¯±¨£¬ÆäÖаüÂÞSnowflake¡¢Ä¦ÍÐÂÞÀ­¡¢¼ÑÄܵÈÖªÃû¹«Ë¾¡£ºÚ¿Í½Ù³ÖÁËÔ±¹¤µÄÕË»§²¢Ðû²¼ÁË°üÂÞ¶ñÒâ´úÂëµÄCyberhavenÀ©Õ¹°æ±¾£¬¸Ã´úÂë¿É½«Óû§µÄ¾­¹ýÉí·ÝÑéÖ¤µÄ»á»°ºÍcookie鶵½¹¥»÷ÕßÓò¡£CyberhavenµÄÄÚ²¿Äþ¾²ÍŶÓÔÚ·¢ÏÖ¶ñÒâÈí¼þºóѸËÙ½«Æäɾ³ý£¬²¢Ðû²¼ÁË´¿¾»°æ±¾v24.10.5¡£½¨ÒéÓû§Éý¼¶µ½×îа汾£¬²¢È¡Ïû·ÇFIDOv2µÄÃÜÂë¡¢ÂÖ»»ËùÓÐAPIÁîÅƲ¢¼ì²ìä¯ÀÀÆ÷ÈÕÖ¾ÒÔÆÀ¹À¶ñÒâ»î¶¯¡£´ËÍ⣬Nudge SecurityÑо¿Ô±Jaime Blasco·¢ÏÖ£¬Í¬Ò»Ê±¼ä»¹ÓÐÆäËûChromeÀ©Õ¹·¨Ê½Ò²±»×¢ÈëÁ˶ñÒâ´úÂëƬ¶Î£¬°üÂÞInternxt VPN¡¢VPNCity¡¢UvoiceºÍParrotTalksµÈ£¬½¨ÒéÕâЩÀ©Õ¹·¨Ê½µÄÓû§½«Æä´Óä¯ÀÀÆ÷ÖÐɾ³ý»òÉý¼¶µ½Äþ¾²°æ±¾¡£Èç¹û²»È·¶¨£¬×îºÃжÔØÀ©Õ¹·¨Ê½£¬ÖØÖÃÖØÒªÕÊ»§ÃÜÂ룬Çå³ýä¯ÀÀÆ÷Êý¾Ý£¬²¢½«ä¯ÀÀÆ÷ÉèÖÃÖØÖÃΪԭʼĬÈÏÖµ¡£


https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/


3. ºÚ¿ÍÀûÓÃDoS©¶´½ûÓÃPalo Alto Networks·À»ðǽ


12ÔÂ27ÈÕ£¬Palo Alto Networks·¢³öÄþ¾²¾¯¸æ£¬Ö¸³öºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃCVE-2024-3393¾Ü¾ø·þÎñ©¶´£¬Í¨¹ý·¢ËͶñÒâÊý¾Ý°üÇ¿ÖÆÖØÆô·À»ðǽ£¬´Ó¶ø½ûÓÃÆä±£»¤¡£¸Ã©¶´´æÔÚÓÚPalo Alto Networks PAN-OSÈí¼þµÄDNSÄþ¾²¹¦Ð§ÖУ¬½öÓ°ÏìÆôÓÃÁË¡°DNSÄþ¾²¡±ÈÕÖ¾¼Ç¼µÄÉ豸¡£¾ÝPalo Alto Networks͸¶£¬¸Ã©¶´Òѱ»ºÚ¿Í»ý¼«ÀûÓ㬵±·À»ðǽ×èÖ¹¶ñÒâDNSÊý¾Ý°üʱ£¬¿Í»§¿ÉÄÜ»áÓöµ½·þÎñÖжÏ¡£¸Ã¹«Ë¾ÒѾ­Õë¶Ô²¿ÃÅ°æ±¾Ðû²¼Á˲¹¶¡£¬µ«PAN-OS 11.0ÒòÒѵ½´ïÉúÃüÖÜÆÚÖÕÖ¹ÈÕÆÚ½«²»»áÊÕµ½²¹¶¡¡£¶ÔÓÚÎÞ·¨Á¢¼´¸üеÄÓû§£¬Palo Alto NetworksÌṩÁ˽â¾öÒªÁìºÍ»º½â²½Ö裬°üÂÞ½ûÓÃDNSÄþ¾²ÈÕÖ¾¼Ç¼µÈ£¬ÒÔÈ·±£É豸µÄÄþ¾²ÔËÐС£Óû§Ó¦Æ¾¾Ý×Ô¼ºµÄÉ豸ÀàÐͺ͹ÜÀí·½Ê½£¬½ÓÄÉÏàÓ¦µÄ´ëÊ©À´Ó¦¶Ô¸Ã©¶´¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/


4. ¹«¹²Æû³µÈí¼þ¹«Ë¾CariadÔ¼80ÍòÁ¾µç¶¯Æû³µÐÅÏ¢ÔâÆعâ


12ÔÂ28ÈÕ£¬¹«¹²Æû³µÈí¼þ¹«Ë¾Cariad²»É÷̻¶ÁËÔ¼80ÍòÁ¾µç¶¯Æû³µµÄÊý¾Ý£¬°üÂÞ¿ÉÄÜÓë¼ÝʻԱÐÕÃûÏà¹ØµÄÐÅÏ¢ºÍ³µÁ¾µÄ¾«È·Î»Öã¬ÕâЩÊý¾ÝÔÚÑÇÂíÑ·ÔÆ´æ´¢Öд¦ÓÚδÊܱ£»¤×´Ì¬³¤´ïÊýÔ¡£Ì»Â¶µÄÊý¾Ý¿âº­¸ÇÁ˹«¹²¡¢Î÷ÑÅÌØ¡¢°ÂµÏºÍ˹¿Â´ïµÈÆ·ÅÆ£¬²¿ÃųµÁ¾µÄµØÀíλÖÃÊý¾Ý¾«È·µ½¼¸ÀåÃס£¾Ý³Æ£¬ÕâÊÇÓÉÓÚCariadÔÚÁ½¸öITÓ¦Ó÷¨Ê½ÖеÄÅäÖò»ÕýÈ·µ¼ÖµÄ¡£Å·ÖÞµÀµÂºÚ¿Í×éÖ¯»ìãç¼ÆËã»ú¾ãÀÖ²¿(CCC)·¢ÏÖÁËÕâһ©¶´£¬²¢ÔÚÏòCariadºÍ¹«¹²¹«Ë¾Í¨±¨Ç°½øÐÐÁ˲âÊÔ¡£CariadÌåÏÖ£¬Ð¹Â¶µÄÊý¾Ý½öÓ°ÏìÒÑÁ¬½Óµ½»¥ÁªÍø²¢ÒÑ×¢²áÔÚÏß·þÎñµÄ³µÁ¾£¬²¢Ç¿µ÷Ö»ÓÐÈƹý¶àÖÖÄþ¾²»úÖƲÅÆø·ÃÎÊÊý¾Ý£¬ÇÒµ¥¸ö³µÁ¾Êý¾Ý±»ÄäÃû»¯¡£È»¶ø£¬¡¶Ã÷¾µ¡·ÖÜ¿¯µÄÍŶӷ¢ÏÖÓÐÈËʹÓÃÃâ·ÑÈí¼þÊÕ¼¯Á˵¹úÕþ¿ÍµÄÆû³µÎ»ÖÃÏêϸÐÅÏ¢¡£CariadÔÚÊÕµ½CCCµÄ³ÂËߺóѸËÙ·´Ó³£¬½â¾öÁËÎÊÌâ²¢¹Ø±ÕÁË·ÃÎÊȨÏÞ¡£¸Ã¹«Ë¾Ã»ÓÐÖ¤¾Ý±íÃ÷³ýCCCºÚ¿ÍÖ®ÍâµÄÆäËû·½¿ÉÒÔ·ÃÎÊÒÑй¶µÄ³µÁ¾Êý¾Ý£¬»òÕâЩÐÅÏ¢±»µÚÈý·½ÀÄÓá£CariadÌåÏÖ£¬´Ó³µÁ¾ÊÕ¼¯µÄÊý¾ÝÓÐÖúÓÚΪ¿Í»§Ìṩ¡¢¿ª·¢ºÍ¸ïÐÂÊý×Ö¹¦Ð§£¬²¢½ÓÄÉÁËÇ¿´óµÄÊý¾Ý±£»¤´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/customer-data-from-800-000-electric-cars-and-owners-exposed-online/


5. Ç׶í×éÖ¯NoName057¶ÔÒâ´óÀûÌᳫÐÂÒ»ÂÖDDoS¹¥»÷


12ÔÂ28ÈÕ£¬ÔÚµØÔµÕþÖνôÕžÖÊƼӾçµÄÅä¾°Ï£¬Ç׶í×éÖ¯NoName057¶ÔÒâ´óÀû»ù´¡ÉèÊ©ÌᳫÁËÐÂÒ»ÂÖDDoS¹¥»÷¡£´Ë´Î¹¥»÷Ä¿±ê°üÂÞÂí¶ûÅíÈø»ú³¡¡¢ÀûÄÉÌØ»ú³¡¡¢Íâ½»²¿¼°¶¼Á齻ͨ¼¯ÍŵÄÍøÕ¾¡£¾¡¹ÜÕâЩ¹¥»÷¶Ô»ú³¡µÄʵ¼ÊÔËӪδÔì³ÉÓ°Ï죬µ«Ïà¹ØÍøÕ¾¾ù·ºÆðÁË·ÃÎÊÎÊÌâ¡£NoName057×éÖ¯ÔÚÆäTelegramƵµÀÉÏÉù³Æ£¬´Ë´ÎÏ®»÷ÊǶÔÒâ´óÀû¿Ö¶íÈËÊ¿µÄ»ØÓ¦¡£Òâ´óÀûÓÊÕþ¾¯²ì¾ÖµÄCnaipicÕýÔÚÊÓ²ì´Ë´ÎÍøÂç¹¥»÷£¬²¢×ÊÖúÊܺ¦Õß¼õÇá¹¥»÷¡£¾ÝÓÊÕþºÍͨО¯²ì¾Ö¾Ö³¤Í¸Â¶£¬Ï®»÷ÕßÊÇÑ°ÇóÖªÃû¶ÈµÄÒâʶÐÎ̬Çý¶¯µÄÍøÂç·¸×ï·Ö×Ó£¬¶ø·ÇÖ¼ÔÚÔì³Éʵ¼ÊË𺦡£´ËÍ⣬NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬Ä¿±êÊÇÈ«ÇòÕþ¸®ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯£¬ËûÃÇʹÓöàÖÖ¹¤¾ß½øÐй¥»÷£¬²¢ÔÚµØÔµÕþÖνôÕÅʱÆÚÉý¼¶Ï®»÷¡£´Ë´Î¹¥»÷·¢ÉúÔÚÊ¥µ®½Ú¼ÙÆÚ£¬¾ßÓÐÕ½ÂÔÒâÒ壬ÒòΪ´Ëʱ×éÖ¯ÈËÔ±¼õÉÙ¡¢ÏìӦʱ¼ä±äÂý£¬Ê¹µÃ¼°Ê±·¢ÏÖ¡¢»º½âºÍ´Ó¹¥»÷Öлָ´±äµÃÔ½·¢À§ÄÑ¡£


https://securityaffairs.com/172395/security/pro-russia-group-noname057-targets-italian-airports.html


6. FICORAÓëCAPSAICIN½©Ê¬ÍøÂçÒý·¢È«ÇòÄþ¾²¾¯±¨


12ÔÂ28ÈÕ£¬2024Äê10ÔºÍ11ÔÂÆڼ䣬FortiGuard LabsÊӲ쵽Á½¸öеĽ©Ê¬ÍøÂç¡°FICORA¡±ºÍ¡°CAPSAICIN¡±µÄ»î¶¯ÏÔÖøÔö¼Ó¡£ÕâÁ½¸ö½©Ê¬ÍøÂç±»ÈÏΪÊÇÖøÃûµÄMiraiºÍKaiten½©Ê¬ÍøÂçµÄ±äÌ壬Äܹ»Ö´ÐжñÒâÃüÁî¡£ËüÃÇʹÓÃshell½Å±¾£¬Ö÷ÒªÕë¶ÔLinuxϵͳ£¬²»½öÄܹ»É±ËÀ¶ñÒâÈí¼þ½ø³Ì£¬»¹ÄÜ·¢¶¯DDoS¹¥»÷¡£ÌرðµØ£¬¡°FICORA¡±½©Ê¬ÍøÂçÓ°ÏìÁ˶à¸ö¹ú¼Ò£¬¶ø¡°CAPSAICIN¡±ÔòÖ÷ÒªÕë¶Ô¶«ÑǵØÓò£¬²¢ÔÚ¸ÃÇøÓòÁ¬Ðø»îÔ¾ÁËÁ½Ìì¶à¡£´ËÍ⣬¹¥»÷Õß»¹ÀûÓÃÒÑÖªµÄD-Link·ÓÉÆ÷©¶´£¨ÈçCVE-2015-2051ºÍCVE-2024-33112£©À´Ö´ÐжñÒâ²Ù×÷¡£Õë¶ÔÕâЩÍþв£¬FortiGuard Labs½¨ÒéÓû§¶¨ÆÚ¸üй̼þ£¬²¢ÊµÊ©Ç¿´óµÄÍøÂç¼à¿Ø´ëÊ©ÒÔ·ÀÖ¹¹¥»÷¡£


https://hackread.com/ficora-capsaicin-botnet-d-link-router-flaws-ddos-attacks/