ºÚ¿ÍÀûÓõÚÈý·½Â©¶´ÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-311. ºÚ¿ÍÀûÓõÚÈý·½Â©¶´ÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢
12ÔÂ28ÈÕ£¬ZAGG Inc.ÊÇÒ»¼ÒÖªÃûµÄÏû·Ñµç×ÓÅä¼þÖÆÔìÉÌ£¬½üÈÕÔâÓöÁËÒ»ÆðÊý¾Ýй¶Ê¼þ¡£ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µç×ÓÉÌÎñÌṩÉÌBigCommerceµÄµÚÈý·½Ó¦Ó÷¨Ê½FreshClicks£¬²¢ÔÚÆäÖÐ×¢ÈëÁ˶ñÒâ´úÂ룬µ¼ÖÂÔÚ2024Äê10ÔÂ26ÈÕÖÁ11ÔÂ7ÈÕÆڼ䣬zagg.comÉϲ¿ÃŹºÎïÕßµÄÐÅÓÿ¨Êý¾Ý±»Ð¹Â¶¡£ÕâЩ鶵ÄÊý¾Ý°üÂÞ¹ºÎïÕßµÄÐÕÃû¡¢µØÖ·ºÍÖ§¸¶¿¨ÐÅÏ¢¡£BigCommerceÌåÏÖ£¬Æäϵͳ×Ô¼º²¢Î´ÊÜË𣬶øÊÇÔÚ·¢ÏÖFreshClicksÓ¦ÓÃÔâÈëÇÖºó£¬Á¢¼´½«Æä´Ó¿Í»§É̵êÖÐжÔØ£¬ÒÔɾ³ýËùÓÐÊÜѬȾµÄAPIºÍ¶ñÒâ´úÂë¡£ZAGGÒѽÓÄɵ÷Í£´ëÊ©£¬°üÂÞ֪ͨÁª°îÖ´·¨²¿Ãźͼà¹Ü»ú¹¹£¬²¢ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩÃâ·ÑµÄ12¸öÔÂÐÅÓüà¿Ø·þÎñ¡£Í¬Ê±£¬ZAGG»¹½¨ÒéÊÕ¼þÈËÃÜÇмà¿Ø½ðÈÚÕË»§»î¶¯£¬ÉèÖÃÆÛÕ©¾¯±¨£¬²¢¿¼ÂǶ³½áÐÅÓá£È»¶ø£¬ZAGGÉÐδ͸¶¾ßÌåÓм¸¶à¿Í»§Êܵ½ÁË´Ë´ÎÄþ¾²Â©¶´µÄÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/
2. WPA3ÐÒé´æÔÚÄþ¾²Â©¶´£¬ºÚ¿Í¿É»ñÈ¡ÍøÂçÃÜÂë
12ÔÂ30ÈÕ£¬Ñо¿ÈËÔ±ÀֳɽáºÏÁËÖмäÈ˹¥»÷£¨MITM£©ºÍÉç»á¹¤³Ìѧ¼¼Êõ£¬ÈƹýÁË×îеÄWi-Fi±£»¤ÐÒéWPA3£¬»ñÈ¡ÁËÍøÂçÃÜÂë¡£ÕâÏîÑо¿ÓÉÎ÷Ó¡¶È´óѧµÄKyle Chadee¡¢Wayne GoodridgeºÍKoffka KhanÍŶÓÍê³É£¬½ÒʾÁËWPA3ÕâÒ»×îÐÂÎÞÏßÄþ¾²³ß¶È´æÔÚµÄÄþ¾²Â©¶´¡£WPA3ÓÚ2018ÄêÍƳö£¬Ö¼ÔÚÃÖ²¹WPA2µÄȱÏÝ£¬Ìṩ¸üÇ¿µÄÄþ¾²ÐÔ£¬ÆäÒªº¦¹¦Ð§Ö®Ò»Îª¡°¶ÔµÈͬʱÈÏÖ¤¡±£¨SAE£©ÐÒ飬ּÔÚµÖÓùÀëÏß×ֵ乥»÷¡£È»¶ø£¬Ñо¿ÈËÔ±·¢ÏÖ£¬ÀûÓÃWPA3¹ý¶ÉģʽÖеÄÈõµã£¬Í¨¹ý½µ¼¶¹¥»÷¿É²¶×½²¿ÃÅWPA3½»»¥ÐÅÏ¢£¬ÔÙ½áºÏÉç»á¹¤³Ìѧ¼¼Êõ¼´¿É»Ö¸´ÍøÂçÃÜÂë¡£¹¥»÷¹ý³Ì°üÂÞ½µ¼¶¹¥»÷²¶×½ÐÅÏ¢¡¢½â³ýÓû§ÈÏÖ¤ÒÔ¼°´´½¨Ðé¼ÙÕ˺ŽÓÈëµã»ñÈ¡ÃÜÂë¡£Ñо¿ÈËÔ±ÀûÓÃÊ÷Ý®ÅɺͿªÔ´¹¤¾ß´´½¨¶ñÒâ½ÓÈëµã£¬ÓÕʹÓû§ÊäÈëWi-FiÃÜÂë½øÐÐÑéÖ¤¡£ÕâÏîÑо¿Òý·¢Á˶ÔWPA3Äþ¾²ÐԵĵ£ÓÇ£¬ÌرðÊÇÔÚÆä¹ý¶ÉģʽÏ£¬Î´ÊµÊ©±£»¤¹ÜÀíµÄÓû§Ò×Êܹ¥»÷£¬ÇÒһЩÉ豸ÎÞ·¨Á¬½Óµ½WPA3ÍøÂ磬ÓëWi-FiÁªÃ˵Ä˵·¨Ïàì¶Ü¡£¾¡¹Ü¹¥»÷ÐèÌض¨Ìõ¼þºÍÓû§½»»¥£¬µ«ÈÔչʾÁ˱£»¤ÎÞÏßÍøÂçÃæÁÙµÄÌôÕ½¡£
https://cybersecuritynews.com/researchers-bypass-wpa3-password/#google_vignette
3. ΢Èí½ô¼±ÒªÇó.NET¿ª·¢Õ߸üÐÂÓ¦Ó÷¨Ê½
12ÔÂ30ÈÕ£¬Î¢ÈíÕý½ô¼±ÒªÇó.NET¿ª·¢ÈËÔ±¸üÐÂËûÃǵÄÓ¦Ó÷¨Ê½ºÍ¿ª·¢¹ÜµÀ£¬ÖÆֹʹÓü´½«ÒòCDNÌṩÉÌEdgioÆƲú¶ø¹Ø±ÕµÄ¡°azureedge.net¡±ÓòÃûÀ´°²×°.NET×é¼þ¡£ÌرðÊÇ¡°dotnetcli.azureedge.net¡±ºÍ¡°dotnetbuilds.azureedge.net¡±ÕâÁ½¸öÓòÃû½«ÔÚδÀ´¼¸¸öÔÂÄÚÏÂÏߣ¬¿ÉÄÜÓ°ÏìÒÀÀµËüÃǵÄÏîÄ¿¹¦Ð§¡£Î¢Èí½âÊÍ£¬ËûÃÇά»¤µÄ¶à¸öCDNʵÀýÖУ¬²¿ÃÅÒÔ¡°azureedge.net¡±½áβµÄÓòÃûÓÉEdgioÍйܣ¬¸Ã¹«Ë¾¼´½«Í£Ö¹ÔËÓª£¬Òò´ËÐèҪǨÒƵ½ÐµÄCDN²¢Ê¹ÓÃÐÂÓòÃû¡£Î¢Èí½¨Ò鿪·¢ÈËÔ±ËÑË÷²¢Ìæ»»´úÂë¡¢½Å±¾ºÍÅäÖÃÖжÔazureedge.netµÄÒýÓÃΪbuilds.dotnet.microsoft.com¡£¹ý¶ÉÆڼ䣬ÐÂÓòÃû½«ÓÉEdgio¡¢AkamaiºÍAzure Front DoorÁªºÏÌṩ·þÎñ¡£CI/CDÍŶÓÐèÈ·±£GitHub ActionsºÍAzure DevOpsÈÎÎñ¸üÐÂΪ֧³ÖÐÂÓòµÄ°æ±¾¡£´ËÍ⣬ÐèÉèÖ÷À»ðǽÒÔÔÊÐíÀ´×ÔÐÂλÖõÄÁ÷Á¿¡£¾¡¹Ü΢ÈíÒÑÓµÓÐÕâЩÓòÃûµÄËùÓÐȨ£¬µ«ÈÔÐè½øÐÐÓòÃûǨÒÆ£¬ÒÔÖÆÖ¹ÔËÓªÖжϵķçÏÕ¡£ÊÜÓ°ÏìµÄÓû§¿ÉÒÔ¹Ø×¢GitHubÒ³ÃæÉϵÄ״̬¸üС£
https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/
4. µÂ¿ËÈø˹ÖÝÂó¿ËĬÀï´óѧ½ü1.8ÍòÈ˸öÈËÐÅÏ¢Ôâй¶
12ÔÂ24ÈÕ£¬µÂ¿ËÈø˹ÖÝ°¢±ÈÁÖµÄÂó¿ËĬÀï´óѧ½üÆÚÔâÓöÁËÐÅϢй¶Ê¼þ£¬½ü18,000È˵ĸöÈËÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£¸ÃʼþÓÚ½ñÄê6ÔÂ20ÈÕ±»Ñ§Ð£·¢ÏÖ£¬ÆäʱѧУÒâʶµ½ÆäÍøÂç´æÔÚ¿ÉÒɻ¡£¾¹ýÊӲ죬ȷÈÏÒ»Ãûδ֪Éí·ÝµÄÐÐΪÕßÔÚ6ÔÂ18ÈÕÖÁ6ÔÂ20ÈÕÆÚ¼ä·ÃÎÊÁËѧУµÄ²¿ÃÅϵͳ²¢¸´ÖÆÁËÎļþ¡£Âó¿ËĬÀï´óѧ¾¹ý½üÎå¸öÔµÄÊý¾Ý·ÖÎö£¬·¢ÏÖ¿ÉÄÜ鶵ÄÐÅÏ¢°üÂÞÐÕÃûºÍÉç»á±£ÕϺÅÂë¡£¸Ã´óѧÒÑÏòÊÜÓ°ÏìµÄ¸öÈËÌṩÐÅÓüà¿Ø·þÎñ£¬²¢ÕýÔÚ¼ÓÇ¿±£ÕÏ´ëÊ©ºÍÔ±¹¤Åàѵ¡£Ñ§Êõ»ú¹¹¾³£³ÉΪÍøÂç¹¥»÷µÄÄ¿±ê£¬ÒòΪËüÃÇ´¦ÖôóÁ¿¸öÈËÐÅÏ¢ºÍ¸ß¼ÛÖµÊý¾Ý£¬½üÄêÀ´ÒÑÓжàÆðÀàËÆʼþ±»±¨µÀ¡£
https://cybernews.com/news/texas-university-suffers-breach/
5. CISAÐÂÔö©¶´CVE-2024-3393ÖÁÒÑÖª±»ÀûÓ鶴Ŀ¼
12ÔÂ30ÈÕ£¬CISAÔÚÆäÒÑÖª±»ÀûÓ鶴Ŀ¼ÖÐÐÂÔöÁËÒ»¸öÃûΪCVE-2024-3393µÄЩ¶´£¬¸Ã©¶´Éæ¼°Palo Alto Networks PAN-OSÖиñʽ´íÎóµÄDNSÊý¾Ý°ü¡£´ËÀ੶´³£±»¶ñÒâÍøÂçÐÐΪÕßÀûÓ㬶ÔÁª°îÆóÒµ×é³ÉÑÏÖØÍþв¡£¡¶²Ù×÷Ö¸Áî¡·22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹Ôڹ涨ÆÚÏÞÄÚÐÞ¸´ÒÑ·¢Ïֵĩ¶´£¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜÖ÷¶¯Íþв£¬²¢½¨Á¢ÁËÒÑÖª±»ÀûÓ鶴Ŀ¼£¬×÷Ϊ¶ÔÁª°îÆóÒµÔì³ÉÖØ´ó·çÏÕµÄÒÑÖª³£¼û©¶´ºÍ̻¶(CVE)µÄ¶¯Ì¬ÁÐ±í¡£¾¡¹Ü¸ÃÖ¸Áî½öÊÊÓÃÓÚÁª°îÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×éÖ¯ÓÅÏȼ°Ê±ÐÞ¸´Ä¿Â¼ÖеÄ©¶´£¬ÒÔ½µµÍÔâÊÜÍøÂç¹¥»÷µÄ·çÏÕ¡£CISA½«¼ÌÐø½«ÇкÏÖ¸¶¨³ß¶ÈµÄ©¶´Ìí¼Óµ½¸ÃĿ¼ÖУ¬²¢ÒªÇóÓû§ÔÚʹÓñ¾²úÎïʱ×ñÊØÏà¹Ø֪ͨºÍÒþ˽ʹÓÃÕþ²ß¡£
https://www.cisa.gov/news-events/alerts/2024/12/30/cisa-adds-one-known-exploited-vulnerability-catalog
6. SekoiaÍŶÓÒýÁìÈ«ÇòÐж¯£¬ÀÖ³ÉÇå³ýÊýǧPlugXÈä³æѬȾϵͳ
12ÔÂ29ÈÕ£¬SekoiaÍþв¼ì²âÓëÑо¿ÍŶÓΪÁ˹¥»÷ÓëMustang Panda×éÖ¯Ïà¹ØµÄPlugXÈä³æ¶ñÒâÈí¼þ£¬½ÓÄÉÁËÒ»ÏîÇ°ËùδÓеÄÐж¯¡£¸ÃÐж¯Éæ¼°ÓëÀ´×Ô20¶à¸ö¹ú¼ÒµÄ¹ú¼ÒCERTºÍÖ´·¨»ú¹¹µÄºÏ×÷£¬Ö¼ÔÚÇå³ýÊýǧ¸öÊÜѬȾµÄϵͳ¡£SekoiaÍŶÓͨ¹ý¿ØÖÆPlugXÈä³æʹÓõÄÒªº¦IPµØÖ·£¬·ÖÎöÁ˶ñÒâÈí¼þµÄÐÐΪ²¢¿ª·¢ÁËÏû¶¾ÒªÁì¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÓû§ÓѺõĽçÃ棬ʹ¼ÓÈë¹úÄܹ»·ÃÎÊÒªº¦Í³¼ÆÊý¾Ý¡¢¾«×¼ÇåÀíÄ¿±êºÍÆô¶¯È«¹úÏû¶¾¡£ÎªÁËÈ·±£Äþ¾²£¬¸Ã»î¶¯½ÓÄÉÁË×Ô»ÙÃüÁî×÷ΪÖ÷ÒªÏû¶¾ÒªÁ죬ÆäÖÐSekoiaµÄSinkhole³äµ±ÖÐÑëÖ¸»Óµã¡£½á¹û£¬34¸ö¹ú¼ÒÊÕµ½ÁË©¶´ÈÕÖ¾£¬22¸ö¹ú¼Ò¶ÔÏû¶¾¹ý³ÌÌåÏÖ³öŨºñÐËȤ£¬²¢ÔÚÇ¿ÓÐÁ¦µÄÖ´·¨¿ò¼ÜÖ§³ÖÏ£¬10¸ö¹ú¼Ò»ý¼«¼ÓÈëÁËÏû¶¾Ðж¯¡£Õâ´Î»î¶¯ÀÖ³ÉÏû³ýÁË5,539¸öIPµØÖ·ÉϵÄÍþв£¬¹²·¢ËÍÁË59,475¸öÏû¶¾ÓÐЧÔغɣ¬Ö¤Ã÷ÁËÖ÷ȨÏû¶¾¿´·¨µÄÓÐЧÐÔ¡£
https://securityonline.info/global-cyber-collaboration-takes-down-plugx-worm/