×êÑÐÈËÔ±·¢ÏÖÊýÊ®¸öAWS API¿É±»ÓÃÀ´ÇÔÊØÐÅÏ¢£»Android°æMessenger´æÔÚ·ì϶£¬ÔÊÐíÓû§Ï໥¼à¶½
°ä²¼¹¦·ò 2020-11-201.×êÑÐÈËÔ±·¢ÏÖÊýÊ®¸öAWS API¿É±»ÓÃÀ´ÇÔÊØÐÅÏ¢

Palo Alto Networks×êÑÐÈËÔ±·¢ÏÖÁË16¸ö·ÖÆçAmazon Web Services£¨AWS£©ÖеÄ22¸öAPI£¬¿É±»ÀÄÓÃÀ´»ñÊØÐÅÏ¢¡£¸ÃÎÊÌâÊÇÓÉÓÚAWSºó¶Ë»á×Ô¶¯ÑéÖ¤¸½¼Óµ½×ÊÔ´µÄËùÓлùÓÚ×ÊÔ´µÄÕ½ÊõËùµ¼Öµġ£ÈôÊÇÕ½ÊõÖÐÔ̺¬²»´æÔÚµÄÉí·Ý£¬Ôò´´½¨»ò¸üÐÂÕ½ÊõµÄAPIŲÓý«Ê§°Ü£¬¹¥»÷ÕßÄܹ»ÀÄÓôËÖ°ÄÜÀ´²é³AWSÕË»§ÖеÄÏÖÓÐÉí·Ý¡£×êÑÐÈËÔ±³Æ£¬¸Ã¹¥»÷¿ÉÔÚaws¡¢aws-us-govºÍaws-cn·ÖÇøÉϽøÐУ¬Ò×Êܹ¥»÷µÄAWS·þÎñÔ̺¬AWS S3¡¢AWS KMSºÍAWS SQS¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/researchers-find-tens-aws-apis-leaking-sensitive-data
2.Android°æMessenger´æÔÚ·ì϶£¬ÔÊÐíÓû§Ï໥¼àÊÓ

Android°æFacebook Messenger´æÔÚ·ì϶£¬¿Éʹºô½ÐÕßÔÚ±»ºô½ÐÕß½ÓÌýµç»°Ö®Ç°ÊÕÌýÆäÖÜΧ»·¾³¡£Google Project Zero×êÑÐÈËÔ±°µÊ¾£¬¹¥»÷Õßͨ¹ý·¢ËÍÌØÊâÀàÐ͵ÄÐÂÎÅSdpUpdate£¬¿ÉÔÚ±»ºô½ÐÕß°´Ï½ÓÌý¼ü֮ǰµ±¼´Ïνӵ½ÆäÉ豸²¢ÆðÍ·´«ÊäÒôƵ£¬À´¼àÌýÆäÖÜΧ»·¾³¡£µ«Êǹ¥»÷ÕßÏëÒªÀûÓø÷ì϶±ØÒªÈƹýijЩ×ʸñ²é³£¬ÈçÓëÖ¸±ê»¥ÎªÀÏÓÑ£¬²¢Ê¹ÓÃÄæÏò¹¤³ÌÀ´°Ñ³Ö×Ô¼ºµÄMessengerÀ´Ç¿Ôì·¢ËÍ×Ô½ç˵ÐÂÎÅ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/facebook-messenger-bug-allowed-android-users-to-spy-on-each-other/
3.×êÑÐÍŶӷ¢ÏÖAPT10ÀûÓÃZerologon¹¥»÷ÈÕ±¾µÄÆóÒµ

×êÑÐÍŶӷ¢ÏÖºÚ¿Í×éÖ¯APT10ÀûÓÃZerologon¹¥»÷À´×ÔÈ«Çò17¸öµØÓòµÄ¶à¸öÐÐÒµµÄÈÕ±¾¹«Ë¾ºÍ×Ó¹«Ë¾¡£APT10×Ô2009ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬ÆäÖ¸±êÊÇÃÀ¹ú¡¢Å·ÖÞºÍÈÕ±¾È·µ±¾Ö×éÖ¯ºÍ¸öÈ˹«Ë¾£¬ÒÔÇÔÈ¡¾üʵý±¨ºÍóÒ×ÐÅÏ¢¶øÎÅÃû¡£×êÑÐÈËÔ±³Æ£¬Õâ´Î¹¥»÷»î¶¯¶¼Ê¹ÓÃÁËÀàËÆµÄ»ìºÏ¼¼Êõ¡¢ÀëµØ¹¥»÷£¨living-off-the-land£©¹¤¾ßºÍQuasarRATÓÐÐ§ÔØºÉ£¬²¢Í¬Ê±¶Ô¶à¸ö×éÖ¯µÄÐͬ¹¥»÷¡£´Ë±í£¬APT10»¹ÀûÓÃZerologon¹¥»÷À´ÇÔÈ¡ÓòÍ´´¦£¬²¢Ôڳɹ¦Ï°È¾Ö¸±êÉ豸ºóÀûÓÃÆäÆëÈ«½ÚÔìÕû¸öÓò¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/chinese-apt10-hackers-use-zerologon-exploits-against-japanese-orgs/
4.LiquidÔâµ½¹¥»÷ÓòÃûÍйܹ¥»÷£¬µ¼ÖÂÓû§ÐÅÏ¢±»Ð¹Â¶

¼ÓÃÜÇ®±ÒÂòÂôËùLiquidÔâµ½ÓòÃûÍйܹ¥»÷£¬µ¼ÖÂÓû§ÐÅÏ¢±»Ð¹Â¶¡£Liquid CEO Mike Kayamori³ÆºÚ¿Í´ÓÆäÓòÃûÍйܷþÎñÌṩÉÌ´¦»ñµÃÁËÕÊ»§µÄ½ÚÔì£¬Ëæºó¸ü¸ÄÁËDNS¼Í¼²¢»ñµÃÁ˶ÔLiquidµÄÎĵµ´æ´¢ÏµÍ³µÄ½Ó¼ûȨÏÞ¡£Õâ´ÎÊÂÎñй¶ÁËÓû§µÄµç×ÓÓʼþ¡¢ÐÕÃû¡¢µØÖ·ºÍ¼ÓÃÜÃÜÂë¡£¸Ã¹«Ë¾³Æ£¬ÔÚºÚ¿ÍÇÔÈ¡×ʽð֮ǰ¾ÍÒѼì²âµ½ÈëÇÖ£¬Òò¶ø²¢Î´Ôì³ÉÈκβÆÎïËðʧ¡£´Ë±í£¬LiquidÔÚÔâµ½¹¥»÷ºó£¬µ±¼´½¨ÒéÆä¿Í»§¸ü¸ÄÃÜÂëºÍ2FAÍ´´¦¡£
ÔÎÄÁ´½Ó£º
https://www.finextra.com/newsarticle/36968/crypto-trading-platform-liquid-hacked/wholesale
5.Ô¼»áÀûÓÃBumbleÖеÄAPI·ì϶¿Éй¶1ÒÚÓû§µÄÊý¾Ý

×êÑÐÈËÔ±Sanjana Sarda·¢ÏÖBumbleÖдæÔÚAPI·ì϶£¬¿Éй¶1ÒÚÓû§µÄÃô¸ÐÊý¾Ý¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬FacebookÐÅÏ¢¡¢ÐËÖ°®ºÃ¡¢µØÎ»¡¢Éí¸ß¡¢Ìå³Á¡¢ÕþÖÎְλ¡¢Ñ§ÀúºÍÕ¼ÐÇÊõ¼£Ï󣬿ɱ»¹¥»÷ÕßÓÃÀ´½øÐÐÉç»á¹¤³Ì¹¥»÷¡£¸Ã·ì϶»¹¿É±»ÓÃÀ´Ãâ·ÑʹÓøÃÀûÓõĸ¶·ÑÖ°ÄÜ¡£ÔÚSarda»ã±¨¸ÃÎÊÌâµÄ225Ììºó£¬¸Ã¹«Ë¾×÷³öÁË»ØÓ¦£¬Ðû³ÆÒѲ»ÔÙʹÓð¤´ÎÓû§ID²¢¸üÐÂÁËÆä¼ÓÃÜ·½Ê½£¬¹¥»÷ÕßÎÞ·¨ÔÙʹÓô˴ËÀ๥»÷À´×ª´¢Bumble¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/dating-app-bumble-vulerability-risked-user-data/
6.Cisco Talos°ä²¼2020ÄêEmotet¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

Cisco Talos°ä²¼ÓйØEmotetÔÚ2020ÄêµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£Emotet×î³õÊÇ´ÓÒøÐÐľÂíÆðÍ·µÄ£¬Èç½ñÑÝÔì³É¸ß¶ÈÄ£¿é»¯µÄÍþв£¬¿ÉÓÃÓÚ¶àÖÖÖ÷ÕÅ¡£EmotetÔÚ2020Äê·¢ËÍÁË´óÁ¿¶ñÒâµç×ÓÓʼþ£¬²¢Ô̺¬Á˶ñÒ⸽¼þÀ´³äÈζñÒâÈí¼þÏÂÔØÆ÷¡£ÆäÖоø´óÎÞÊý¸½¼þÀûÓöñÒâµÄMicrosoft OfficeÎĵµ£¨¼´DOC¡¢DOCX¡¢XLSºÍXLSX£©£¬µ«ÊÇÒ²ÓÐEmotetÀ¬»øÓʼþÓµÓÐZIP´æµµ£¬PDFµÈÄÚÈÝ£¬»òʹÓó¬Á´½ÓÓÕʹÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2020/11/emotet-2020.html


¾©¹«Íø°²±¸11010802024551ºÅ