Nissan ±±ÃÀÊý¾Ýй¶ӰÏ쳬¹ý 53000 ÃûÔ±¹¤

°ä²¼¹¦·ò 2024-05-17
1. Nissan ±±ÃÀÊý¾Ýй¶ӰÏ쳬¹ý 53000 ÃûÔ±¹¤


5ÔÂ16ÈÕ £¬Nissan North America (Nissan) È¥ÄêÔâ·êÁËÊý¾Ýй¶ £¬ÆäʱÍþвÕß¶Ô×¼Á˸ù«Ë¾µÄ±í²¿ VPN ²¢¹Ø¹ØÏµÍ³ÒÔ»ñÈ¡Êê½ð¡£¸ÃÆû³µÔì×÷ÉÌÓÚ 2023 Äê 11 ÔÂÉÏÑ®·¢ÏÖÁËÕâÒ»·ì϶ £¬²¢ÓÚ×î½ü·¢ÏÖ¸ÃÊÂÎñ¶³öÁ˳¬¹ý 53,000 ÃûÏÖÈκÍÀëÈËÔ±¹¤µÄÓ×ÎÒÊý¾Ý¡£Nissan й© £¬ÍþвÐÐΪÕß¶Ô×¼ÁËÆä±í²¿ VPN £¬¶øºó¹Ø¹ØÁËijЩ¹«Ë¾ÏµÍ³ £¬¶øºóË÷ÒªÊê½ð¡£¸Ã¹«Ë¾Ö¸³ö £¬ÔÚ¹¥»÷ÆÚ¼äÆäϵͳ¾ùδ¼ÓÃÜ¡£¸Ã¹«Ë¾Óë±í²¿ÍøÂ簲ȫר¼ÒºÏ×÷ £¬¿ÉÄÜÆÀ¹ÀÇé¿ö¡¢¶ôÔìÊÂÎñ²¢ÖÕÖ¹Íþв¡£ËæºóµÄµ÷²éÏÔʾ £¬ºÚ¿Í½Ó¼ûÁ˱¾µØºÍÍøÂç¹²ÏíÉϵÄһЩÎļþ £¬ÆäÖдó²¿ÃÅÔ̺¬Ã³Ò×ÐÅÏ¢¡£ÔÚÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ·¢³öµÄÊý¾Ýй¶֪ͨÖÐ £¬¸Ã¹«Ë¾°µÊ¾ £¬Â¶³öµÄ¾ßÌåÐÅÏ¢Ô̺¬Ó×ÎÒ±êʶ·û£¨ÀýÈçÐÕÃû£©ºÍÉç»á°²È«ºÅÂë £¬²¢ÇÒÍþвÐÐΪÕß½Ó¼ûµÄÎļþÖв»´æÔÚ²ÆÕþ¾ßÌåÐÅÏ¢¡£ÈÕ²úÖ¸³ö £¬Ëü²»ÖªÂ·Â¶³öµÄÊý¾ÝÒѱ»ÀÄÓá£


https://www.bleepingcomputer.com/news/security/nissan-north-america-data-breach-impacts-over-53-000-employees/


2. ÂéÊ¡Àí¹¤Ñ§ÔºµÄѧÉúÀûÓÃETH·ì϶¿ÉÇÔÈ¡2500ÍòÃÀÔª


5ÔÂ16ÈÕ £¬Æ¾¾ÝÃÀ¹ú˾·¨²¿°ä²¼µÄ¸æ×´Êé £¬ÔÚԼĪ 12 ÃëÄÚ £¬Á½ÃûÊܹý¸ßµµ½ÌÓýµÄÐÖµÜÉæÏÓͨ¹ý´Û¸ÄÒÔÌ«·»Çø¿éÁ´ £¬ÒÔÒ»ÖÖǰËùδ¼ûµÄ¼ÓÃÜÇ®±Ò´òËãÇÔÈ¡ÁË 2500 ÍòÃÀÔª¡£ÔÚ˾·¨²¿µÄÒ»·ÝÐÂΟåÖÐ £¬ÃÀ¹ú¼ì²ì¹Ù´ïÃ×°²¡¤ÍþÁ®Ä·Ë¹ (Damian Williams) °µÊ¾ £¬¸Ã´òË㼫¶È¸´ÔÓ £¬ÒÔÖÁÓÚ¡°Ê¹Çø¿éÁ´µÄÆëÈ«ÐÔÊܵ½ÖÊÒÉ¡±¡£ÍþÁ®Ä·Ë¹Ëµ£º¡°Õâ¶ÔÐÖµÜÔÚÊÀ½çÉÏ×ʢÃûµÄ´óѧ֮һ½ø½¨ÍÆËã»ú¿ÆÑ§ºÍÊýѧ £¬¾Ý³ÆÀûÓÃËûÃǵÄרҵ¼¼ÊõºÍ½ÌÓýÀ´´Û¸ÄºÍ°Ñ³ÖÈ«ÇòÊý°ÙÍòÒÔÌ«·»Óû§ËùÒÀÀµµÄºÍ̸¡£¡± ¡°Ò»µ©ËûÃǽ«´òË㸶ÖîÖ´ÐÐ £¬ËûÃǵİÂÓÖ»»¨ÁË 12 Ãë¾ÍʵÏÖÁË¡£¡± 24 ËêµÄ°²¶«ºÍ 28 ËêµÄղķ˹¡¤ÅåÀ×¶û-²¼°£Åµ±»²¶ £¬±»Ö¸¿Ø´®Ä±Ö´Ðеç»ãڲƭ¡¢µç»ãڲƭºÍ´®Ä±Ï´Ç®¡£ÃÀ¹ú˾·¨²¿°µÊ¾ £¬ÐÖµÜÁ©¡°Ã¿Ïî×ïÃû×î¸ß¿ÉÅд¦ 20 Äê½ûïÀ¡±¡£


https://news.hitb.org/content/mit-students-stole-25m-seconds-exploiting-eth-blockchain-bug


3. LinuxϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»¸´ÔӵĶñÒâÈí¼þϰȾÁ½Äê


5ÔÂ16ÈÕ £¬´Ó 2009 ÄêÆðÍ· £¬ÓÃÓÚÊØ»¤ºÍ·Ö·¢ Linux ²Ù×÷ϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»¸´ÔӵĶñÒâÈí¼þϰȾÁËÁ½Äê £¬ÕâЩ¶ñÒâÈí¼þÉè·¨½ÚÔìÁË¿ª·¢ÈËÔ±±£»¤×îçÇÃܵÄ×ÊÔ´Ö®Ò»£º´æ´¢¼ÓÃÜµÄ /etc/shadow Îļþ¡£Óг¬¹ý 550 ÃûϵͳÓû§µÄÃÜÂëÊý¾Ý¡£°²È«¹«Ë¾ ESET µÄ×êÑÐÈËÔ±°µÊ¾ £¬Õâ´Î¹¥»÷±³ºóµÄδ֪¹¥»÷ÕßϰȾÁË kernel.org ÄÚµÄÖÁÉÙËĄ̈·þÎñÆ÷ £¬¸Ã»¥ÁªÍøÓòÖ§³Ö×ÅÖØ´óµÄ Linux ¿ª·¢ºÍ·Ö·¢ÍøÂç¡£ÔÚ»ñµÃÍøÂçÉÏ 551 ¸öÓû§ÕÊ»§µÄ¼ÓÃܹþÏ£Öµºó £¬¹¥»÷Õß¿ÉÄÜͨ¹ýÃÜÂëÆÆ½â¼¼ÊõºÍʹÓöñÒâÈí¼þÄÚÖõĸ߼¶Í´´¦ÇÔȡְÄÜ £¬½«Ò»°ëÃÜÂëת»»ÎªÃ÷ÎÄÃÜÂë¡£´ÓÄÇÀï £¬¹¥»÷ÕßÀûÓ÷þÎñÆ÷·¢ËÍÀ¬»øÓʼþ²¢½øÐÐÆäËûа¶ñ»î¶¯¡£ÕâËĄ̈·þÎñÆ÷¿ÉÄÜÔÚ·ÖÆç¹¦·ò±»Ï°È¾ºÍÏû¶¾ £¬×îºóÁ½Ì¨·þÎñÆ÷ÔÚ 2011 ÄêµÄij¸ö¹¦·òµÃµ½½¨¸´¡£kernel.org µÄϰȾÊÂÎñÓÚ 2011 ÄêÆØ¹â £¬ÆäʱÄÚºËÊØ»¤ÈËԱй© £¬¹¥»÷ÕßÒÔijÖÖ·½Ê½Éè·¨»ñµÃ¶ÔÏνӵ½¸ÃÓòµÄ·þÎñÆ÷µÄ²»ÊÜÏ޶ȵÄϵͳ½Ó¼ûȨÏÞ£¨¼´¡°root¡±£© £¬µ¼Ö 448 ¸öÕÊ»§Ô⵽й¶¡£


https://news.hitb.org/content/linux-maintainers-were-infected-2-years-ssh-dwelling-backdoor-huge-reach


4. FBIµ·»ÙBreachForumsÀÕË÷ÍøÕ¾ºÍÆäTelegramƵ·


5ÔÂ15ÈÕ £¬FBI ÓëÊÀ½ç¸÷µØµÄ¾¯·½½áºÏ½ÚÔìÁËÀÕË÷Èí¼þ¾­¼ÍÍøÕ¾ BreachForums µÄÍøÕ¾ºÍ Telegram Ƶ·¡£Ö»¹Ü¸ÃÍøÕ¾µÄÔËÓªÂŴα»¹Ø¹Ø £¬µ«¸ÃÍøÕ¾ÒÀÈ»²»ÐݳöÏÖ £¬´Ë¿Ì¾¯Ô±ÁÙ¼¾½ÚÔìÁ˸ÃÍøÕ¾¡£¸ÃÍøÕ¾´Ë¿Ìд·£º¡°ÔÚ¹ú¼ÊºÏ×÷ͬ°éµÄЭÖúÏ £¬Áª¹úµ÷²é¾ÖºÍ˾·¨²¿ÒѹعظÃÍøÕ¾¡£¡± ¡°ÎÒÃÇÔÚÉó²é¸ÃÍøÕ¾µÄºó¶ËÊý¾Ý¡£ÈôÊÇÄúÓÐÐÅÏ¢±ØÒª¾Ù±¨ BreachForums ÉϵÄÍøÂç·¸×ï»î¶¯ £¬ÇëÁªÏµ±¦ÔËÀ³¹Ù·½ÍøÕ¾¡£¡¹Øâ´ÎÐж¯ÊÇÓÉÎåÑÛ¹ú¶ÈÒÔ¼°ÈðÊ¿¡¢±ùµººÍÎÚ¿ËÀ¼µÄ¾¯Ô±Ö´ÐеÄ¡£BreachForums ÊÕÊÜÁË֮ǰ±»¹Ø¹ØµÄ RaidForums ÍøÕ¾ £¬¸ÃÍøÕ¾ÔÚ¾¯·½µÄÁíÒ»´Î½áºÏÐж¯ºóÓÚ 2022 Äê¹Ø¹Ø¡£ÕâÁ½¸öÍøÕ¾¶¼ÂòÂô±»µÁÐÅÏ¢ £¬²¢ÇÒÊÇËùνµÄË«³ÁÀÕË÷¹¥»÷µÄ¹Ø¼ü £¬ÔÚÕâÖÖ¹¥»÷ÖÐ £¬Êý¾Ý²»½ö±»¼ÓÃÜÒÔ»ñÈ¡Êê½ð £¬²¢ÇÒ»¹±»ÇÔÈ¡ £¬²¢ÓÃÀ´ÍþвÊܺ¦Õß £¬ÈôÊÇËûÃDz»¸¶¿î £¬¾Í»á¶³öÊý¾Ý¡£


https://www.theregister.com/2024/05/15/fbi_breachforums_ransomware/


5. Wi-Fi ³ß¶ÈÖеÄȱµã¿ÉÄܵ¼Ö SSID »ìºÏ¹¥»÷


5ÔÂ16ÈÕ £¬±ÈÀûʱ³ãë´óѧµÄ×êÑÐÈËÔ±·¢ÏÖÁË IEEE 802.11 Wi-Fi ³ß¶ÈÖеÄÒ»¸ö¸ù»ùÉè¼ÆÈ±µã £¬¸ÃȱµãΪ¹¥»÷ÕßÌṩÁËÒ»ÖÖ²½ÖèÀ´ÓÕÆ­Êܺ¦ÕßÏνӵ½±ÈËûÃÇÏëÒªÏνӵÄÍøÂ簲ȫÐԽϵ͵ÄÎÞÏßÍøÂ硣ƾ¾Ý VPN ÆÀÂÛÍøÕ¾ Top10VPN µÄ˵·¨ £¬´ËÀ๥»÷¿ÉÄÜ»áʹÊܺ¦ÕßÃæ¶Ô¸ü¸ßµÄÁ÷Á¿À¹½ØºÍ°Ñ³Ö·çÏÕ¡£¸ÃÍøÕ¾Óë KU Leuven µÄһλ×êÑÐÈËÔ±ºÏ×÷ £¬½«ÔÚº«¹úÊ×¶û¼´½«½øÐеĻáÒéÉϽøÐÐÑÝʾ֮ǰ°ä²¼ÁË·ì϶¾ßÌåÐÅÏ¢¡£¸Ã·ì϶±àºÅΪ CVE-2023-52424 £¬Ó°ÏìËùÓвÙ×÷ϵͳÉϵÄËùÓÐ Wi-Fi ¿Í»§¶Ë¡£ÊÜÓ°ÏìµÄ Wi-Fi ÍøÂçÔ̺¬»ùÓÚ¿í·º²¿ÊðµÄ WPA3 ºÍ̸¡¢WEP ºÍ 802.11X/EAP µÄÍøÂç¡£×êÑÐÈËÔ±Ìá³öÁË Wi-Fi ³ß¶ÈµÄ¸üÐÂÒÔ¼°Ó×ÎÒºÍ×éÖ¯Äܹ»ÓÃÀ´½µµÍ·çÏյIJ½Öè¡£


https://news.hitb.org/content/flaw-wi-fi-standard-can-enable-ssid-confusion-attacks


6. ºÚ¿Í¹¥»÷ Foxit PDF Reader Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý


5ÔÂ15ÈÕ £¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÕë¶Ô Foxit Reader Óû§µÄ PDF ·ì϶ £¬¸Ã·ì϶ÀûÓÃÁËÒ»¸öÉè¼ÆÈ±µã £¬¸Ãȱµã»áͨ¹ýĬÈϵġ°È·¶¨¡±Ñ¡ÏîÏÔʾ°²È«ÖÒ¸æ £¬´Ó¶ø¿ÉÄÜÓÕÆ­Óû§Ö´ÐжñÒâ´úÂë¡£ÓÉÓڸ÷ìÏ¶ÖØÒªÕë¶Ô Foxit Reader £¬ÓëÐÐÒµ³ß¶È Adobe Acrobat Reader Ïà±È £¬¸Ã·ì϶ÊÇÒ»ÖÖÏÊΪÈËÖªµÄ PDF ²é¿´Æ÷ £¬Òò¶ø¸Ã·ì϶±»¿í·ºÊ¹Óò¢ÈƹýÁ˵äÐ͵ļì²â²½Öè¡£ÓÉÓÚÖÒ¸æÐÂÎŵÄÉè¼ÆÈ±µã £¬¸£ê¿ÔĶÁÆ÷´æÔÚÑϳÁµÄ°²È«·ì϶ £¬ÈôÊÇÓû§ÔÚûÓÐ×Ðϸ˼¿¼µÄÇé¿öϵ¥»÷Á½´Î £¬¾Í»áÔÚ²»Öª²»¾õÖзçÏÕÆä°²È«¡£¸Ã·ì϶ʹ¹¥»÷Õß¿ÉÄÜ´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔØ²¢Ö´ÐжñÒâ´úÂë £¬´Ó¶ø¿ÉÄÜʹËûÃÇ¿ÉÄÜδ¾­ÊÚȨ½Ó¼ûÓû§µÄϵͳºÍÊý¾Ý¡£¸Ã·ì϶ÒÑÔÚÏÖʵÊÀ½çµÄ¹¥»÷Öб»»ý¼«ÀûÓà £¬ÓÃÓÚ¸÷Àà¶ñÒâÖ÷ÕÅ £¬Ô̺¬¼äµý»î¶¯ºÍµç×Ó·¸×ï¡£


https://gbhackers.com/hackers-attack-foxit-pdf-reader-users/