¹È¸è½«Ö§¸¶3.91ÒÚÃÀÔª½â¾ö¹ØÓÚAndroidµØÎ»¸ú×ÙµÄËßËÏ

°ä²¼¹¦·ò 2022-11-16
1¡¢¹È¸è½«Ö§¸¶3.91ÒÚÃÀÔª½â¾ö¹ØÓÚAndroidµØÎ»¸ú×ÙµÄËßËÏ

¾ÝýÌå11ÔÂ14ÈÕ±¨Â·£¬¹È¸èÒÑÔÞ³ÉÖ§¸¶3.915ÒÚÃÀÔª£¬À´½â¾öÃÀ¹ú40¸öÖÝÌáÆðµÄ¹ØÓÚÒþÖÔµÄËßËÏ¡£¶íÀÕ¸ÔÖÝ×ܼì²ì³¤³Æ£¬¹È¸èÎóµ¼Óû§ÒÔΪ×Ô¼ºÔÚÕË»§ÉèÖÃÖйعØÁ˵ØÎ»¸ú×Ù£¬¶øÊÂʵÉÏËüÈÔÔÚÍøÂçËûÃǵÄλÏàÐÅÏ¢¡£Õâ´ÎºÍ½â»¹ÒªÇó¹È¸èÒýÈë¸ü¶àÓû§¶ØÄÀÐ͵ÄÕË»§½ÚÔ죬²¢Ï޶ȹ«Ë¾¶ÔijЩÀàÐ͵ØÎ»Êý¾ÝµÄʹÓúʹ洢¡£°Ä´óÀûÑÇACCCÔøÔÚ8Ô¶Թȸ账ÒÔ6000ÍòÃÀÔªµÄ· £¿î£¬Ô­ÒòÊÇËüʹÓÃÒ»ÑùµÄ²½ÖèÍøÂç°Ä´óÀûÑÇÓû§µÄµØÎ»Êý¾Ý½üÁ½Äê¡£

https://www.bleepingcomputer.com/news/google/google-will-pay-391m-to-settle-android-location-tracking-lawsuit/


2¡¢OxeyeÅû¶Spotify BackstageÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶

OxeyeÓÚ11ÔÂ15ÈÕ³ÆÆäÔÚSpotify Backstage·¢ÏÖÁËÒ»¸öÑϳÁµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVSSÆÀ·ÖΪ9.8£©¡£BackstageÊÇSpotifyÓÃÓÚ¹¹½¨¿ª·¢ÕßÃÅ»§µÄ¿ªÔ´Æ½Ì¨£¬Ëü±»Ô̺¬ÃÀ¹úº½¿Õ¹«Ë¾ºÍNetflixµÈ¶à¼Ò×é֯ʹÓá£×êÑÐÈËÔ±³Æ£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»Í¨¹ýÀûÓÃScaffolderÖ÷Ìâ²å¼þÖеÄvm2ɳÏäÌÓÒÝ·ì϶£¨CVE-2022-36067±ðÃûSandbreak£©ÔÚBackstageÀûÓ÷¨Ê½ÉÏÖ´ÐÐËÁÒâϵͳºÅÁî¡£OxeyeÓÚ2022Äê8ÔÂ18ÈÕÏòSpotify»ã±¨Á˸÷ì϶£¬ºóÕßÔÚ8ÔÂ29ÈÕ°ä²¼µÄ¸üÐÂ(v 1.5.1)Öнâ¾öÁËÕâ¸öÎÊÌâ¡£

https://www.oxeye.io/blog/remote-code-execution-in-spotifys-backstage

3¡¢Î¢Èí11Ô·ݰ²È«¸üпɵ¼ÖÂKerberosÉí·ÝÑéÖ¤³öÏÖÎÊÌâ

¾Ý11ÔÂ14ÈÕ±¨Â·£¬Î¢ÈíĿǰÔÚµ÷²éµ¼ÖÂÆóÒµÓò½ÚÔìÆ÷ÔÚ×°Öñ¾Ô°²È«¸üкó³öÏÖKerberosµÇ¼ʧ°ÜµÈÃýÎóµÄÎÊÌâ¡£KerberosÒѾ­È¡´úNTLMºÍ̸³ÉΪWindows 2000ÒÔÉÏËùÓа汾ÖÐÓòÏνÓÉ豸µÄĬÈÏÈÏÖ¤ºÍ̸¡£Óöµ½´ËÎÊÌâµÄÓû§¿ÉÄÜ»áÔÚÓò½ÚÔìÆ÷ÉϵÄÊÂÎñÈÕÖ¾µÄSystem²¿ÃÅÊÕµ½Microsoft-Windows-Kerberos-Key-Distribution-CenterÊÂÎñID 14µÄÃýʧÊÂÎñ¡£Î¢Èí°µÊ¾ÔÚÖÂÁ¦½¨¸´´ËÎÊÌ⣬²¢Ô¤¼Æ½«ÔÚ½«À´¼¸ÖÜÄÚÌṩ½â¾ö¹æ»®¡£

https://www.bleepingcomputer.com/news/microsoft/windows-kerberos-authentication-breaks-after-november-updates/

4¡¢AkamaiÅû¶ÓÃÓÚÍÚ¿óºÍDDoS¹¥»÷µÄжñÒâÈí¼þKmsdBot

AkamaiÓÚ11ÔÂ10ÈÕÅû¶ÁËÒ»¸öÓÉGolang¿ª·¢µÄжñÒâÈí¼þKmsdBot¡£¸Ã¶ñÒâÈí¼þÀûÓÃSSH¼ÓÃܺÍ̸½øÈëÖ¸±êϵͳ£¬Ê¹ÓÃUDP¡¢TCP¡¢HTTP POSTºÍGETÒÔ¼°Í¨¹ýTCPͨѶµÄC2½øÐй¥»÷£¬Ö÷ÕÅÊÇÍÚ¾ò¼ÓÃÜÇ®±Ò²¢Ö´ÐÐDDoS¹¥»÷¡£ËüÒѱ»·¢ÏÖÕë¶ÔÓÎÏ·ÐÐÒµ¡¢¿Æ¼¼ÐÐÒµºÍÉÝ»ªÆû³µÔì×÷É̵ȶà¸öÐÐÒµ£¬²¢Ö§³Ö¶àÖּܹ¹£¬ÀýÈçWinx86¡¢Arm64ºÍmips64¡¢x86_64¡£´Ë±í£¬ÎªÁËÈÆ¹ý¼ì²â£¬KmsdBot²»»áÔÚ±»Ï°È¾µÄϵͳÉÏÓÆ¾Ã´æÔÚ¡£

https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware

5¡¢Cyjax·¢ÏÖFangxiaoÔÚÈ«ÇòÁìÓòÄڵĴó¹æÄ£´¹µö»î¶¯

11ÔÂ14ÈÕ£¬Cyjax³ÆÆä½üÆÚµ÷²éÁËһ·¸´ÔӵĴó¹æÄ£´¹µö»î¶¯£¬¸Ã»î¶¯Õë¶Ô¶à¸ö´¹Ö±ÐÐÒµµÄÆóÒµ£¬Ô̺¬ÁãÊÛ¡¢ÒøÐÓ×¢ÓÎÀÀ¡¢ÔìÒ©¡¢ÓÎÀÀºÍÄÜÔ´µÄ400¶à¸ö³ÛÃûÆ·ÅÆ¡£¸Ã»î¶¯±³ºóµÄ¹¥»÷ÕßΪFangxiao£¬×Ô2019ÄêÒÔÀ´Ê¹ÓÃÁ˳¬¹ý42000¸öÓò¡£Í¨³££¬Ö¸±ê»á±»³Á¶¨Ïòµ½Óô¹µöÍøÕ¾²¢ÏÂÔØTriadaľÂíµÈ¶ñÒâÈí¼þ¡£´Ë±í£¬Fanxgiaoͨ¹ý¶àÖÖÕ½ÊõÀ´Î¬³ÖÄäÃû£¬Æä´ó²¿ÃÅ»ù´¡ÉèÊ©¶¼Êܵ½CloudFlareµÄ±£»¤£¬²¢ÇÒÓòÃû»á¶¨ÆÚ¸üУ¬½öÔÚ2022Äê10ÔµÄÒ»Ìì¾ÍʹÓÃÁË300¶à¸öеÄÓòÃû¡£

https://www.cyjax.com/2022/11/14/fangxiao-a-chinese-threat-actor/

6¡¢ESET°ä²¼¹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

11ÔÂ14ÈÕ£¬ESET°ä²¼Á˹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨£¬×ܽáÁË´Ó2022Äê5ÔÂÖÁ8Ôµ׹۲졢µ÷²éºÍ·ÖÎöµÄAPT×éÖ¯µÄ»î¶¯¡£ÔÚµÚ¶þ¼¾¶È£¬Óë¶íÂÞ˹¡¢ÒÁÀʺͳ¯ÏʵÈÓйصÄAPT»î¶¯Ã»ÓнµÂä¡£ÎÚ¿ËÀ¼ÒÀÈ»ÊDz¿ÃÅAPTÍÅ»ïµÄÖØÒªÖ¸±ê£¬ÀýÈçSandworm¡¢Gamaredon¡¢InvisiMole¡¢CallistoºÍTurla¡£³¯ÏÊÓйصĹ¥»÷ÍÅ»ï¶Ôº½¿Õº½Ìì¡¢¹ú·À¹¤ÒµÒÔ¼°½ðÈںͼÓÃÜÇ®±ÒÓйØ×éÖ¯¸ÐÐËÖ£»ÔÚÖж«£¬AgriusÖØÒªÕë¶Ô×êʯÐÐÒµµÄÓйØ×éÖ¯¡£

https://www.welivesecurity.com/wp-content/uploads/2022/11/eset_apt_activity_report_t22022.pdf