Avira¸üдæÔÚBugµ¼ÖÂWindowsÍÆËã»úÔÚÆô¶¯ºóËÀ»ú
°ä²¼¹¦·ò 2023-12-14¾ÝýÌå12ÔÂ12ÈÕ±¨Â·£¬×ÔÉÏÖÜÎåÒÔÀ´£¬ºÜ¶àWindowsÓû§»ã±¨ÁËϵͳÔÚÆô¶¯ºó²»¾Ã¶³½áµÄÎÊÌ⣬ÕâÓëAvira°²È«Èí¼þ¸üÐÂBugÓйء£AviraÆô¶¯ºóԼĪ20Ã룬Õû¸öϵͳ±äµÃÎÞÏìÓ¦£¬Ö»ÄÜͨ¹ý»úÏäÉϵijÁÆô°´Å¥À´³ÁÆôµçÄÔ¡£ÊÜÓ°ÏìµÄÓû§·¢ÏÖ£¬Î¨Ò»µÄ²¹¾È·¨×Ó¾ÍÊÇÆô¶¯µ½°²È«Ä£Ê½µÄÍ¬Ê±Ð¶ÔØAviraµÄÈí¼þ£¬µ«ÊDz¿ÃÅÓû§ÔÚÆëȫɾ³ýAviraÈí¼þʱÓöµ½ÁËÄÑÌâ¡£Avira°µÊ¾£¬¸ÃÎÊÌâÊÇÓÉAviraÄÚ²¿·À»ðǽµ¼Öµģ¬ÓÚ12ÔÂ9ÈÕ³õ´Î»ã±¨£¬²¢Ó¦Í¨¹ý12ÔÂ11ÈյĸüÐÂ×Ô¶¯½¨¸´¡£
https://www.bleepingcomputer.com/news/technology/avira-antivirus-causes-windows-computers-to-freeze-after-boot/
2¡¢Insomniac GamesÔâµ½Rhysida¹¥»÷±»ÀÕË÷200ÍòÃÀÔª
ýÌå12ÔÂ14Èճƣ¬Ë÷ÄᰵʾÔÚµ÷²éÆä×Ó¹«Ë¾Insomniac GamesÔâµ½µÄÀÕË÷¹¥»÷¡£RhysidaÐû³ÆÈëÇÖÁËInsomniac Games£¬²¢¹«¿ªÁ˲¿Ãű»µÁÊý¾ÝµÄ½ØÍ¼£¬Éæ¼°ÄÚ²¿Óʼþ¡¢»¤ÕÕ¸±±¾¡¢Ó×ÎÒÉí·ÝÖ¤ÒÔ¼°ÓëÓÎÏ·×ʲú»òÓÎÏ·Íæ·¨ÓйصÄͼÏñ¡£¸ÃÍÅ»ïÍþвҪÅÄÂô±»µÁÊý¾Ý£¬¸øÁËInsomniacÒ»ÖܵŦ·òÀ´»ØÓ¦ËûÃǵÄÒªÇ󣬶øºó»á½«±»µÁÊý¾Ý°ä²¼¸ø³ö¼Û×î¸ßÕߣ¬ÆðÅļÛΪ50±ÈÌØ±Ò£¨Ô¼200ÍòÃÀÔª£©¡£
https://therecord.media/sony-investigating-ransomware-insomniac-games
3¡¢Î¢ÈíÅû¶ÀûÓÃOAuthÀûÓõÄ×Ô¶¯»¯BECºÍÍÚ¿óµÈ¹¥»÷
12ÔÂ12ÈÕ£¬Î¢Èí°ä²¼»ã±¨³Æ£¬³öÓÚ¾¼Ã¶¯»úµÄ¹¥»÷ÕßÔÚʹÓÃOAuthÀûÓÃÀ´×Ô¶¯Ö´ÐÐBECºÍ´¹µö¹¥»÷¡¢ÍÆËÍÀ¬»øÓʼþÒÔ¼°×°ÖÃÐé¹¹»ú½øÐмÓÃÜÍÚ¾ò¡£Ò»¸ö°¸ÀýÖУ¬Storm-1283ÍŻﴴ½¨ÁËÒ»¸öOAuthÀûÓÃÀ´²¿ÊðÍÚ¿óÐé¹¹»ú¡£¸øÖ¸±êÔì³ÉÁË1-150ÍòÃÀÔªµÄËðʧ£¬¾ßÌå½ð¶îÈ¡¾öÓÚ¹¥»÷µÄ³ÖÐø¹¦·ò¡£ÁíÒ»¸ö¹¥»÷ÍÅ»ïÀûÓñ»Ï°È¾ÕÊ»§´´½¨µÄOAuthÀûÓÃÀ´Î¬³ÖÓÆ¾ÃÐÔ£¬²¢Ê¹ÓÃÖÐÑëµÐÊÖ(AiTM)´¹µö¹¤¾ß°üÖ´Ðд¹µö¹¥»÷¡£¶øStorm-1286ÍÅ»ïͨ¹ýOAuthÀûÓýøÐÐÁË´ó¹æÄ£µÄÀ¬»øÓʼþ·Ö·¢»î¶¯¡£
https://www.microsoft.com/en-us/security/blog/2023/12/12/threat-actors-misuse-oauth-applications-to-automate-financially-driven-attacks/
4¡¢ÎÚ¿ËÀ¼×î´óÔËÓªÉÌKYIVSTARÔâµ½¹¥»÷·þÎñÁÙʱÖжÏ
¾Ý12ÔÂ12ÈÕ±¨Â·£¬ÎÚ¿ËÀ¼×î´óµÄÔËÓªÉÌKyivstarÔâµ½¹¥»÷£¬Òƶ¯ºÍÊý¾Ý·þÎñÊܵ½Ó°Ïì¡£¸Ã¹«Ë¾ÎªÎÚ¿ËÀ¼Ô¼2600ÍòÒÆ¶¯¿Í»§ºÍ³¬¹ý100Íò¿í´ø¹Ì¶¨»¥ÁªÍø¿Í»§Ìṩ·þÎñ¡£12ÈÕÔçÉÏ£¬¸Ã¹«Ë¾°ä·¢Ôâµ½ÍøÂç¹¥»÷£¬µ¼ÖÂÆä·þÎñÁÙʱÖжϡ£Ä¿Ç°£¬ËùÓÐÒÆ¶¯Í¨Ñ¶ºÍ»¥ÁªÍø½Ó¼û¾ùÎÞ·¨Ê¹Óá£Kyivstar°µÊ¾£¬Õâ´Î°²È«ÊÂÎñ²¢Î´Ó°ÏìÈκÎÓ×ÎÒÊý¾Ý£¬ËùÓÐÊÜÓ°ÏìÇÒÎÞ·¨Ê¹Ó÷þÎñµÄÓû§¶¼½«»ñµÃÅâ³¥¡£
https://securityaffairs.com/155701/hacking/cyberattack-brought-down-ukraine-kyivstar.html
5¡¢Ó¢¹ú¹ú·À²¿ÒòÊý¾Ýй¶±»¼à¹Ü»ú¹¹·£¿î½ü44ÍòÃÀÔª
12ÔÂ13ÈÕ±¨Â·³Æ£¬Ó¢¹ú¹ú·À²¿ÒòδÄܱ£»¤ÔÚ2021ÄêÒÆÃñµÄ°¢¸»º¹È˵ÄÐÅÏ¢£¬±»·£¿î35ÍòÓ¢°÷£¨Ô¼ºÏ44ÍòÃÀÔª£©¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©°µÊ¾£¬Ó¢¹úµÄ°¢¸»º¹³Áа²ÉèºÍÔöÔ®Õþ²ß£¨ARAP£©·¢ËÍÓʼþʱ³öÏÖÃýÎ󣬿ÉÄܻᵼÖÂÈËÔ±ÉËÍö¡£ÓÉÓÚ·¢¼þÈËʹÓÃÁË"ÊÕ¼þÈË"×ֶΣ¬ÆäÖÐ245È˵ÄÐÅÏ¢±»Òâ±íµØÂ¶³ö¸øÁËËùÓÐÊÕ¼þÈË¡£×î³õ£¬¹ú·À²¿±»Åж¨Ã»ÓÐ"²ÉÈ¡Êʵ±µÄ¼¼ÊõºÍ×éÖ¯´ëÊ©"£¬±»´¦ÒÔ100ÍòÓ¢°÷µÄ·£¿î¡£Ëæºó·£¿î¼õÖÁ70ÍòÓ¢°÷£¬ÔÒòÊǸò¿ÃÅÔÚÊÂÎñ²úÉúºó²ÉÈ¡µÄ´ëÊ©¡£×îºó£¬Æ¾¾ÝICO¶Ô¹«¹²²¿ÃÅ·£¿îµÄл®¶¨£¬·£¿î±»¼õ°ëÖÁ35ÍòÓ¢°÷¡£
https://www.infosecurity-magazine.com/news/ministry-defence-fined-afghan-data/
6¡¢Check Point°ä²¼11Ô·ÝÈ«ÇòÍþвָÊýµÄ·ÖÎö»ã±¨
12ÔÂ12ÈÕ£¬Check Point°ä²¼ÁË11Ô·ÝÈ«ÇòÍþвָÊýµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬11Ô·¢ÏÖÁËеÄAsyncRAT»î¶¯£¬Í¨¹ý¶ñÒâHTMLÎļþ±»ÓÃÀ´´«²¼Òñ±ÎµÄ¶ñÒâÈí¼þ¡£ÏÂÔØ·¨Ê½FakeUpdatesÔÚÁÙʱÍ˳öÁ½¸öÔºó³ÁнøÈë¶ñÒâÈí¼þÅÅÐаñ£¬Ö±½ÓÔ¾¾ÓµÚ¶þλ¡£½ÌÓýºÍ×êÑÐÐÐÒµÒÀÈ»ÊÇ11ÔÂÔâµ½¹¥»÷×î¶àµÄÐÐÒµ¡£×îÈÝÒ×±»ÀûÓõķì϶ÊÇHTTPºÅÁî×¢È루CVE-2021-43936ºÍCVE-2022-24086£©£¬Ó°ÏìÁËÈ«Çò45%µÄʵÌå¡£
https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/


¾©¹«Íø°²±¸11010802024551ºÅ