¼ÓÄô󰲴ÖÂÔÊ¡µÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

°ä²¼¹¦·ò 2022-12-13
1¡¢¼ÓÄô󰲴ÖÂÔÊ¡µÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

      

¾Ý12ÔÂ11ÈÕ±¨Â· £¬¼ÓÄô󰲴ÖÂÔÊ¡µÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ ¡£¾ÝϤ £¬´ÓÉÏÖÜÎåÆðÍ· £¬Ô¼360000ÈË»áÊÕµ½Í¨Öª £¬·î¸æËûÃǵÄÓ×ÎÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì ¡£µ±¾Ö²¢Î´×¢Ã÷¸ÃÊÂÎñÊÇÈôºÎ²úÉúµÄ £¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»¸æ×´ £¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÏµÖÐÐĵĹÍÔ± ¡£Æäʱ £¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˻㱨ÁËÀ¬»ø¶ÌÐÅ £¬ÕâЩڲƭÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩÓ×ÎÒÐÅÏ¢ ¡£


https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714


2¡¢Fortinet½¨¸´SSL-VPNÖÐÒѱ»ÀûÓõÄCVE-2022-42475

      

12ÔÂ12ÈÕ £¬Fortinet°ä²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2022-42475£©µÄ°²È«²¼¸æ ¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÔìÒªÇóÖ´ÐÐËÁÒâ´úÂë»òºÅÁî ¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖ͵͵½¨¸´Á˸÷ì϶ £¬12ÔÂ12ÈÕFortinetÓÖ°ä²¼²¼¸æÌáÐѸ÷ì϶Òѱ»ÓÃÓÚ¹¥»÷»î¶¯ ¡£¹ÌÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÈôºÎÀûÓ÷ì϶µÄÐÅÏ¢ £¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC ¡£Fortinet½¨Òé¿Í»§Á¢¼´×°Öò¹¶¡ ¡£


https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/


3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØ³¬¹ý500Íò´Î

      

CybernewsÔÚ12ÔÂ9ÈÕй© £¬AndroidÀûÓ÷¨Ê½Web Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀº¹Çà¼Í¼ ¡£ÕâÊÇÒ»¿îä¯ÀÀÀûÓà £¬ÔÚGoogle PlayÉ̵êÖеÄÏÂÔØÁ¿³¬¹ý500Íò´Î ¡£ÆäÊ¢¿ªµÄFirebaseÊ·ý¶³öÁËÀûÓ÷¨Ê½ºÍÓû§µÄÊý¾Ý £¬×êÑÐÈËÔ±°µÊ¾ £¬ÈôÊǹ¥»÷Õß¶ÔÀûÓõÄÓû§½øÐÐÈ¥ÄäÃû»¯´¦Öà £¬¾Í¿ÉÄܲ鿴ÓйØÌض¨Óû§ä¯ÀÀº¹ÇàµÄ´óÁ¿ÐÅÏ¢ £¬²¢ÓÃÓÚڲƭÀÕË÷ ¡£´Ë±í £¬¸ÃÀûÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢ £¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚ¸÷Àà¶ñÒâ»î¶¯ ¡£


https://cybernews.com/security/android-app-leaked-user-browsing-history/


4¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ

      

¾ÝýÌå12ÔÂ10ÈÕ±¨Â· £¬×êÑÐÍŶӷ¢ÏÖÁËÒ»ÖÖÐµĹ¥»÷²½Öè £¬¿ÉÈÆ¹ý¸÷À๩¸øÉ̵ÄWebÀûÓ÷¨Ê½·À»ðǽ(WAF)²¢ÈëÇÖϵͳ ¡£¸Ã¹¥»÷¼¼ÊõÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨½âÎöµÄSQL×¢Èëpayload £¬´óÎÞÊýWAF¶¼Äܹ»ÇáËɼì²âµ½SQLi¹¥»÷ £¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÊÓ¶ø²»¼û ¡£Ä¿Ç° £¬×êÑÐÈËÔ±Òѳɹ¦ÈƹýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©¸øÉ̵ÄWAF ¡£


https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html


5¡¢ThreatFabric·¢ÏÖÕë¶ÔAndroidÀûÓõİµÍøÆ½Ì¨Zombinder

      

ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚ·ÖÎöAndroidľÂíErmacµÄ»î¶¯Ê± £¬·¢ÏÖÁËʹÓöà¸öľÂí²¢Í¬Ê¹Øë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯ ¡£³ýÁËErmac±í £¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ ¡£´Ë±í £¬×êÑÐÈËÔ±»¹³Áµã½éÉÜÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder £¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½ºÏ·¨µÄAndroidÀûÓà £¬Ï°È¾Ö¸±êµÄͬʱÈÔÕ¼ÓÐԭʼÀûÓõÄÈ«ÊýÖ°ÄÜ £¬ÒÔÈÆ¹ý¼ì²â ¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÖ¸±ê £¬½öErbium¾Í³É¹¦µØ´Ó1300¶à¸öÖ¸±êÄÇÀïÇÔÈ¡ÁËÊý¾Ý ¡£


https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html


6¡¢Kaspersky°ä²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

12ÔÂ8ÈÕ £¬Kaspersky°ä²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨ ¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê± £¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄJanicab±äÌå £¬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ë¾·¨ÐÐÒµµÄ¹¥»÷ £¬²¢¿ÉÄÜÔÚ2021ÄêÒÀÈ»»îÔ¾ ¡£ÓÐȤµÄÊÇ £¬¹¥»÷ÕßÔÚ³ÖÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂç·þÎñ×÷ΪDDR ¡£È»¶ø £¬¹Û²ìµ½µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ £¬Äܹ»×·Òäµ½2015Äê £¬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»³Á¸´Ê¹Óà ¡£DeathstalkerÈÔÖØÒªÕë¶ÔÂÉʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹ £¬µ«¶Ô½üÆÚ»î¶¯µÄ·ÖÎöÅú×¢¹Û¹âÉç¿ÉÄÜÊÇеÄÖ¸±êÐÐÒµ ¡£


https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/