ÐÂÐÍDoubleClickjacking©¶´¿ÉÈƹýÍøÕ¾µÄµã»÷½Ù³Ö±£»¤
Ðû²¼Ê±¼ä 2025-01-031. ÐÂÐÍDoubleClickjacking©¶´¿ÉÈƹýÍøÕ¾µÄµã»÷½Ù³Ö±£»¤
1ÔÂ1ÈÕ£¬Äþ¾²×¨¼Ò½ÒʾÁËÒ»ÖÖÐÂÐÍ©¶´DoubleClickjacking£¬ÕâÊÇÒ»ÖÖÆÕ±é´æÔڵĻùÓÚʱ¼äµÄ©¶´£¬Í¨¹ýÀûÓÃË«»÷²Ù×÷Íƶ¯µã»÷½Ù³Ö¹¥»÷£¬¼¸ºõÓ°ÏìËùÓдóÐÍÍøÕ¾¡£¸Ã©¶´ÓÉÄþ¾²Ñо¿Ô±Paulos YibeloÃüÃû£¬ËüÀûÓÃË«»÷ÐòÁжø·Çµ¥Ò»µã»÷£¬ÄÜÈƹýÏÖÓеã»÷½Ù³Ö·À»¤´ëÊ©£¬ÈçX-Frame-OptionsºÍSameSite cookie¡£DoubleClickjacking¹¥»÷ÖУ¬¹¥»÷Õß¿ØÖƵÄÍøÕ¾»áÓÕµ¼Óû§Ë«»÷¿´ËÆÎÞº¦µÄÔªËØ£¬ÈçCAPTCHAÑéÖ¤£¬ÆÚ¼äÀûÓÃJavaScriptÇÄÇÄÖض¨ÏòÖÁ¶ñÒâÒ³Ã棬ÈçÅú×¼¶ñÒâµÄOAuthÓ¦Ó÷¨Ê½£¬Í¬Ê±¹Ø±Õ¶¥²ã´°¿Ú£¬Ê¹Óû§ÔÚ²»ÖªÇéÏÂÊÚÓè·ÃÎÊȨÏÞ¡£YibeloÖ¸³ö£¬´ó¶àÊýWebÓ¦Ó÷¨Ê½ºÍ¿ò¼Üδ¿¼ÂÇË«»÷·çÏÕ£¬ÏÖÓзÀÓù´ëÊ©ÎÞЧ¡£ÍøÕ¾ËùÓÐÕß¿Éͨ¹ý¿Í»§¶ËÊÖ¶ÎÏû³ý©¶´£¬ÈçĬÈϽûÓÃÒªº¦°´Å¥£¬ÔÚ¼ì²âµ½Êó±êÊÖÊÆʱ¼¤»î¡£¾ÃÔ¶À´¿´£¬ä¯ÀÀÆ÷¹©Ó¦ÉÌÓ¦½ÓÄÉг߶ȷÀÓùË«»÷ÀûÓá£DoubleClickjackingÊǵã»÷½Ù³Ö¹¥»÷µÄ±äÖÖ£¬ÀûÓõã»÷¼äµÄʱ¼ä²îÎÞ·ìÌæ»»Á¼ÐÔUIÔªËØΪÃô¸ÐÔªËØ¡£
https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
2. Brain CipherÀÕË÷Èí¼þÍÅ»ïй¶Â޵µºRIBridgesƽ̨Êý¾Ý
1ÔÂ2ÈÕ£¬Brain Cipher ÀÕË÷Èí¼þÍÅ»ï½üÆÚ¿ªÊ¼Ð¹Â¶ÔÚ¹¥»÷Â޵µº¡°RIBridges¡±Éç½»·þÎñƽ̨ʱÇÔÈ¡µÄÎļþ¡£RIBridgesÊÇÒ»¸ö×ÛºÏ×ʸñϵͳ£¬ÓÃÓÚ¹ÜÀíºÍÌṩ°üÂÞÒ½ÁƱ£½¡¡¢Ê³Æ·Ô®Öú¡¢¶ùͯ±£ÓýµÈÉç»áÔ®Öú¼Æ»®¡£Â޵µºÖÝÓÚ12ÔÂ5ÈÕÊ״εÃ֪ϵͳÔâµ½¹¥»÷£¬µ«Ö±µ½12ÔÂ10ÈÕ²ÅÈ·ÈÏÊý¾Ý¿ÉÄÜÒѱ»ÇÔÈ¡¡£12ÔÂ13ÈÕ£¬ÏµÍ³¹©Ó¦É̵ÂÇÚÈ·ÈÏ´æÔÚ¶ñÒâ´úÂ룬ÖÝÕþ¸®Ë漴ָʾ¹Ø±ÕRIBridgesϵͳ¡£ÉÏÖÜ£¬Brain Cipher¿ªÊ¼ÔÚÆäÊý¾Ýй¶ÍøÕ¾ÉÏÐû²¼²¿Ãű»µÁÊý¾Ý£¬°üÂÞ³ÉÄêÈ˺Íδ³ÉÄêÈ˵ĸöÈËÊý¾Ý¡£ÍøÂçÄþ¾²Ñо¿Ô±Connor GoodwolfÏÂÔØÁËÕâЩÊý¾Ý²¢Ö¤ÊµÁËÆäÕæʵÐÔ¡£¾ÝÔ¤¼Æ£¬Ô¼ÓÐ65ÍòÈËÊܵ½´Ë´Î¹¥»÷µÄÓ°Ï죬ËûÃǵÄÃô¸ÐÐÅÏ¢ÈçÐÕÃû¡¢µØÖ·¡¢³öÉúÈÕÆÚ¡¢Éç»áÄþ¾²ºÅÂëºÍijЩÒøÐÐÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£ÖÝÕþ¸®¹ÙÔ±½¨ÒéÂ޵µº¾ÓÃñ¶³½á²¢¼à¿ØÆäÐÅÓã¬ÒÔ·ÀÆÛÕ©»î¶¯£¬²¢¾¯ÌèÀûÓñ»µÁÊý¾Ý½øÐÐÍøÂçµöÓãÕ©Æ¡£
https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-stolen-in-rhode-islands-ribridges-breach/
3. ÈÕ±¾Òƶ¯ÔËÓªÉÌNTT DocomoÔâDDoS¹¥»÷µ¼Ö²¿ÃÅ·þÎñÖжÏ
1ÔÂ2ÈÕ£¬ÈÕ±¾×î´óµÄÒƶ¯ÔËÓªÉÌNTT DocomoÔâÓöÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬µ¼Ö²¿ÃÅ·þÎñÔÝʱÖжϣ¬°üÂÞÐÂÎÅÍøÕ¾¡¢ÊÓƵÁ÷ýÌåƽ̨¡¢Òƶ¯Ö§¸¶ºÍÍøÂçÓʼþ·þÎñÒÔ¼°¸ß¶û·òϲºÃÕßÍøÕ¾µÈ¡£¸Ã¹«Ë¾ÔÚÉùÃ÷ÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬²¢ÌåÏÖÕýÔÚŬÁ¦»Ö¸´·þÎñ£¬´ó¶àÊý·þÎñµÄ·ÃÎÊÒѻָ´£¬µ«²¿ÃÅÄÚÈݸüпÉÄÜÑÓ³Ù¡£NTT Docomo佫´Ëʼþ¹é¾ÌÓÚÈκÎÌض¨µÄÍþвÐÐΪÕߣ¬µ«ÖµµÃ×¢ÒâµÄÊÇ£¬¸Ã¹«Ë¾ÔÚ2023ÄêÒѳÉΪRansomed.vcÍÅ»ïÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£×î½ü¼¸¸öÔ£¬ÈÕ±¾¶à¼Ò¹«Ë¾Ò²ÔâÊÜÁËÍøÂç¹¥»÷£¬°üÂÞÈÕ±¾º½¿Õ¡¢Èý¾®×¡ÓѺ£Éϱ£ÏÕ¹«Ë¾¡¢½Ç´¨¡¢¿¨Î÷Å·µÈÖªÃûÆóÒµ£¬ÒÔ¼°µç¶¯»úÖÆÔìÉÌNidec¡¢Æû³µÁ㲿¼þÖÆÔìÉÌYorozuºÍÑз¢»ú¹¹MonohakobiµÈ¡£´ËÍ⣬ÈÕ±¾Ö÷Òª½ðÈÚ»ú¹¹ÈçÈýÁâÈÕÁªÒøÐС¢ÀïË÷ÄÉÒøÐкÍÈðËëÒøÐеÄÍøÉÏÒøÐзþÎñÒ²ÒòÉæÏÓÍøÂç¹¥»÷¶øÖжϡ£
https://therecord.media/ntt-docomo-japan-mobile-carrier-ddos-incident
4. ³¬Èý°ÙÍòÓʼþ·þÎñÆ÷δ¼ÓÃÜ£¬Ò×ÊÜÍøÂçÐá̽¹¥»÷
1ÔÂ2ÈÕ£¬Ä¿Ç°»¥ÁªÍøÉÏ´æÔÚÁè¼ÝÈý°ÙÍò¸öδ½ÓÄÉTLS¼ÓÃܵÄPOP3ºÍIMAPÓʼþ·þÎñÆ÷£¬ÕâЩ·þÎñÆ÷ÈÝÒ×ÔâÊÜÍøÂçÐá̽¹¥»÷¡£IMAPºÍPOP3ÊÇ·ÃÎʵç×ÓÓʼþµÄÁ½ÖÖÒªÁ죬ÆäÖÐIMAP½¨ÒéÓÃÓÚ¶àÉ豸ͬ²½£¬¶øPOP3ÔòÏÂÔØÓʼþµ½µ±µØÉ豸¡£µ±TLS¼ÓÃÜδÆôÓÃʱ£¬ÓʼþÄÚÈݺÍƾ¾Ý½«ÒÔÃ÷ÎÄÐÎʽ·¢ËÍ£¬Ôö¼ÓÁ˱»¹¥»÷µÄ·çÏÕ¡£ShadowServerÄþ¾²Íþв¼à¿Øƽ̨µÄɨÃèÏÔʾ£¬ÕâЩδ¼ÓÃܵÄÓʼþ·þÎñÆ÷̻¶ÁËÓû§ÃûºÍÃÜÂ룬ʹÆäÒ×Êܹ¥»÷¡£ShadowServerÕýÔÚ֪ͨÏà¹ØÔËÓªÉÌÆôÓÃTLSÖ§³Ö£¬ÒÔ±£»¤Óû§Êý¾Ý¡£´ËÍ⣬Ëæ×ÅTLSÐÒéµÄ²»Í£Éú³¤£¬²»Äþ¾²µÄTLS 1.0ºÍTLS 1.1ÐÒéÒѱ»ÌÔÌ£¬ÏÖ´ú²Ù×÷ϵͳĬÈÏÆôÓøüÄþ¾²µÄTLS 1.3°æ±¾¡£ÃÀ¹ú¹ú¼ÒÄþ¾²¾ÖÒ²ÌṩÁËÌæ»»¹ýʱTLSÐÒéÅäÖõÄÖ¸µ¼£¬ÒÔ·ÀÖ¹¹¥»÷ÕßÀûÓÃÕâЩÅäÖ÷ÃÎÊÃô¸ÐÊý¾Ý¡£
https://www.bleepingcomputer.com/news/security/over-3-million-mail-servers-without-encryption-exposed-to-sniffing-attacks/
5. RansomHubÉù³ÆÈëÇÖ¶àÊý»áÈËÊÙ£¬±£ÏÕ¾ÞÍ··ñÈÏ
12ÔÂ31ÈÕ£¬RansomHub×éÖ¯Éù³ÆÔÚÐÂÄêǰϦÈëÇÖÁËÈ«Çò×î´ó±£ÏÕ¡¢Äê½ðºÍÔ±¹¤¸£Àû¼Æ»®ÌṩÉÌÖ®Ò»µÄ¶àÊý»áÈËÊÙ±£ÏÕ¹«Ë¾(MetLife)£¬²¢ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˹¥»÷ÐÅÏ¢£¬Éù³ÆÇÔÈ¡ÁË1TBÃô¸ÐÊý¾Ý¡£È»¶ø£¬¶àÊý»áÈËÊÙ·ñÈÏ·¢ÉúÀÕË÷Èí¼þ¹¥»÷£¬½öÈ·ÈÏÆä×Ó¹«Ë¾Fondo GenesisÔÚ¶ò¹Ï¶à¶ûÔâÓöÍøÂçʼþ£¬ÇÒÓëÆóҵϵͳÀ뿪ÔËÓª¡£RansomHubÐû²¼µÄÑù±¾Îļþ¶àΪÎ÷°àÑÀÓ¾ÝÍƲâÀ´×Ô¶àÊý»áÈËÊÙÀ¶¡ÃÀÖÞ·Ö²¿¡£¶àÊý»áÈËÊÙÔÚÈ«Çò115¸ö¹ú¼ÒΪÁè¼Ý1ÒÚ¿Í»§Ìṩ·þÎñ£¬ÆäÖаüÂÞ1000ÍòÃÀ¹úÒÔÍâµØÓò¿Í»§¡£´ËÍ⣬ƾ¾ÝÒÔÉ«ÁÐÍøÂçÄþ¾²¹«Ë¾Hudson Rock 11 Ô·ݵijÂËߣ¬Ò»ÃûºÚ¿Íй¶Á˽ü60ÍòÌõ¾Ý³ÆÊôÓÚ¶àÊý»áÈËÊÙµÄÊý¾Ý¼Ç¼£¬Ñо¿ÈËÔ±»³ÒÉÕâÓë MOVEit ©¶´Óйأ¬µ«¶àÊý»áÈËÊÙ·ñÈÏÓëCl0pÀÕË÷Èí¼þ×éÖ¯µÄMOVEitºÚ¿Í¹¥»÷Óйء£
https://cybernews.com/news/metlife-latin-america-claimed-by-ransomhub-group/
6. ÒÔÌ«·»¿ª·¢ÈËÔ±ÔâÓöÀûÓöñÒânpm°üµÄÅÓ´ó¹©Ó¦Á´¹¥»÷
1ÔÂ2ÈÕ£¬¾ÝSocketÑо¿ÍŶÓÅû¶£¬ÒÔÌ«·»¿ª·¢ÈËÔ±ÒѳÉΪÅÓ´ó¹©Ó¦Á´¹¥»÷µÄÄ¿±ê£¬¹¥»÷ÕßÀûÓÃÈËÃǶԿªÔ´Éú̬ϵͳµÄÐÅÈΣ¬ÔÚnpmÉú̬ϵͳÖÐÐû²¼ÁËÖÁÉÙ20¸ö¶ñÒâHardhat²å¼þ£¬ÕâЩ²å¼þÃû³ÆÓëºÏ·¨Èí¼þ°üºÍ×éÖ¯ÏàËÆ£¬ÀýÈç@nomisfoundation/hardhat-configureºÍhardhat-deploy-others£¬ÆäÖÐһλ×÷ÕßµÄÏÂÔØÁ¿Áè¼Ý1,000´Î¡£ÕâЩ¶ñÒâÈí¼þ°üÉù³Æ¿ÉÒÔÔöÇ¿ÊÂÇéÁ÷³Ì£¬ÊµÔòÃØÃÜÇÔÈ¡ÊÜѬȾµÄ¿ª·¢»·¾³ÖеÄÃô¸ÐÊý¾Ý£¬ÈçÖú¼Ç·ûºÍ˽ԿµÈ¡£¹¥»÷Õß½ÓÄɶàÌõÀí¼Æı£¬°üÂÞ´ÓHardhatÔËÐл·¾³ÖÐÌáÈ¡Òªº¦ÐÅÏ¢£¬Ê¹ÓÃAESÃÜÔ¿¼ÓÃÜÊý¾Ý²¢´«Êäµ½¹¥»÷Õß¿ØÖƵĶ˵㣬ÒÔ¼°ÀûÓÃÒÔÌ«·»ÖÇÄܺÏÔ¼¶¯Ì¬¼ìË÷ÃüÁîÓë¿ØÖÆ£¨C2£©·þÎñÆ÷µØÖ·£¬ÊµÏÖC2»ù´¡ÉèÊ©µÄÈ¥ÖÐÐÄ»¯ºÍ²»ÐиĶ¯ÌØÐÔ£¬Ôö¼ÓÁËÆÆ»µÄѶȡ£´Ë´Î»î¶¯¸øÒÔÌ«·»¿ª·¢ÉçÇø´øÀ´ÁËÖØ´ó·çÏÕ£¬Ç¿µ÷ÁË¿ªÔ´Éú̬ϵͳÖеÄÄþ¾²ÎÊÌâ¡£
https://securityonline.info/supply-chain-attack-on-ethereum-developers-via-malicious-npm-packages/