¼ÓÄô󰲴ÖÂÔÊ¡µÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

°ä²¼¹¦·ò 2022-12-13
1¡¢¼ÓÄô󰲴ÖÂÔÊ¡µÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

      

¾Ý12ÔÂ11ÈÕ±¨Â·£¬¼ÓÄô󰲴ÖÂÔÊ¡µÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¾ÝϤ£¬´ÓÉÏÖÜÎåÆðÍ·£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬·î¸æËûÃǵÄÓ×ÎÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£µ±¾Ö²¢Î´×¢Ã÷¸ÃÊÂÎñÊÇÈôºÎ²úÉúµÄ£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»¸æ×´£¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÏµÖÐÐĵĹÍÔ±¡£Æäʱ£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˻㱨ÁËÀ¬»ø¶ÌÐÅ£¬ÕâЩڲƭÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩÓ×ÎÒÐÅÏ¢¡£


https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714


2¡¢Fortinet½¨¸´SSL-VPNÖÐÒѱ»ÀûÓõÄCVE-2022-42475

      

12ÔÂ12ÈÕ£¬Fortinet°ä²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç¶Âí½Å£¨CVE-2022-42475£©µÄ°²È«²¼¸æ¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÔìÒªÇóÖ´ÐÐËÁÒâ´úÂë»òºÅÁî¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖ͵͵½¨¸´Á˸÷ì϶£¬12ÔÂ12ÈÕFortinetÓÖ°ä²¼²¼¸æÌáÐѸ÷ì϶Òѱ»ÓÃÓÚ¹¥»÷»î¶¯¡£¹ÌÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÈôºÎÀûÓ÷ì϶µÄÐÅÏ¢£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£Fortinet½¨Òé¿Í»§µ±¼´×°Öò¹¶¡¡£


https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/


3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØ³¬¹ý500Íò´Î

      

CybernewsÔÚ12ÔÂ9ÈÕй©£¬AndroidÀûÓ÷¨Ê½Web Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀº¹Çà¼Í¼¡£ÕâÊÇÒ»¿îä¯ÀÀÀûÓã¬ÔÚGoogle PlayÉ̵êÖеÄÏÂÔØÁ¿³¬¹ý500Íò´Î¡£ÆäÊ¢¿ªµÄFirebaseÊ·ý¶³öÁËÀûÓ÷¨Ê½ºÍÓû§µÄÊý¾Ý£¬×êÑÐÈËÔ±°µÊ¾£¬ÈôÊǹ¥»÷Õß¶ÔÀûÓõÄÓû§½øÐÐÈ¥ÄäÃû»¯´¦Ö㬾ͿÉÄܲ鿴ÓйØÌض¨Óû§ä¯ÀÀº¹ÇàµÄ´óÁ¿ÐÅÏ¢£¬²¢ÓÃÓÚڲƭÀÕË÷¡£´Ë±í£¬¸ÃÀûÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚ¸÷Àà¶ñÒâ»î¶¯¡£


https://cybernews.com/security/android-app-leaked-user-browsing-history/


4¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ

      

¾ÝýÌå12ÔÂ10ÈÕ±¨Â·£¬×êÑÐÍŶӷ¢ÏÖÁËÒ»ÖÖÐµĹ¥»÷²½Ö裬¿ÉÈÆ¹ý¸÷À๩¸øÉ̵ÄWebÀûÓ÷¨Ê½·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¸Ã¹¥»÷¼¼ÊõÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨½âÎöµÄSQL×¢Èëpayload£¬´óÎÞÊýWAF¶¼Äܹ»ÇáËɼì²âµ½SQLi¹¥»÷£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÊÓ¶ø²»¼û¡£Ä¿Ç°£¬×êÑÐÈËÔ±Òѳɹ¦ÈƹýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©¸øÉ̵ÄWAF¡£


https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html


5¡¢ThreatFabric·¢ÏÖÕë¶ÔAndroidÀûÓõİµÍøÆ½Ì¨Zombinder

      

ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚ·ÖÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬·¢ÏÖÁËʹÓöà¸öľÂí²¢Í¬Ê¹Øë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯¡£³ýÁËErmac±í£¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£´Ë±í£¬×êÑÐÈËÔ±»¹³Áµã½éÉÜÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½ºÏ·¨µÄAndroidÀûÓã¬Ï°È¾Ö¸±êµÄͬʱÈÔÕ¼ÓÐԭʼÀûÓõÄÈ«ÊýÖ°ÄÜ£¬ÒÔÈÆ¹ý¼ì²â¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÖ¸±ê£¬½öErbium¾Í³É¹¦µØ´Ó1300¶à¸öÖ¸±êÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£


https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html


6¡¢Kaspersky°ä²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

12ÔÂ8ÈÕ£¬Kaspersky°ä²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄJanicab±äÌ壬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ë¾·¨ÐÐÒµµÄ¹¥»÷£¬²¢¿ÉÄÜÔÚ2021ÄêÒÀÈ»»îÔ¾¡£ÓÐȤµÄÊÇ£¬¹¥»÷ÕßÔÚ³ÖÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂç·þÎñ×÷ΪDDR¡£È»¶ø£¬¹Û²ìµ½µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬Äܹ»×·Òäµ½2015Ä꣬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»³Á¸´Ê¹Óá£DeathstalkerÈÔÖØÒªÕë¶ÔÂÉʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬µ«¶Ô½üÆÚ»î¶¯µÄ·ÖÎöÅú×¢¹Û¹âÉç¿ÉÄÜÊÇеÄÖ¸±êÐÐÒµ¡£


https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/