ºÚ¿ÍÀûÓõÚÈý·½·ì϶ÇÔÈ¡ZAGG¿Í»§µÄÐÅÓþ¿¨ÐÅÏ¢
°ä²¼¹¦·ò 2024-12-311. ºÚ¿ÍÀûÓõÚÈý·½·ì϶ÇÔÈ¡ZAGG¿Í»§µÄÐÅÓþ¿¨ÐÅÏ¢
12ÔÂ28ÈÕ£¬ZAGG Inc.ÊÇÒ»¼Ò³ÛÃûµÄÏû·Ñµç×ÓÅä¼þÔì×÷ÉÌ£¬½üÈÕÔâ·êÁËһ·Êý¾Ýй¶ÊÂÎñ¡£ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µç×ÓÉÌÎñÌṩÉÌBigCommerceµÄµÚÈý·½ÀûÓ÷¨Ê½FreshClicks£¬²¢ÔÚÆäÖÐ×¢ÈëÁ˶ñÒâ´úÂ룬µ¼ÖÂÔÚ2024Äê10ÔÂ26ÈÕÖÁ11ÔÂ7ÈÕÆÚ¼ä£¬zagg.comÉϲ¿ÃŹºÎïÕßµÄÐÅÓþ¿¨Êý¾Ý±»Ð¹Â¶¡£ÕâЩй¶µÄÊý¾ÝÔ̺¬¹ºÎïÕßµÄÐÕÃû¡¢µØÖ·ºÍÖ§¸¶¿¨ÐÅÏ¢¡£BigCommerce°µÊ¾£¬Æäϵͳ×ÔÉí²¢Î´ÊÜË𣬶øÊÇÔÚ·¢ÏÖFreshClicksÀûÓÃÔâÈëÇֺ󣬵±¼´½«Æä´Ó¿Í»§É̵êÖÐÐ¶ÔØ£¬ÒÔɾ³ýËùÓÐÊÜϰȾµÄAPIºÍ¶ñÒâ´úÂë¡£ZAGGÒѲÉÈ¡²¹¾È´ëÊ©£¬Ô̺¬Í¨ÖªÁª¹ú·¨Âɲ¿Ãźͼà¹Ü»ú¹¹£¬²¢ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩÃâ·ÑµÄ12¸öÔÂÐÅÓþ¼à¿Ø·þÎñ¡£Í¬Ê±£¬ZAGG»¹½¨ÒéÊÕ¼þÈËÇ×êÇ¼à¿Ø½ðÈÚÕË»§»î¶¯£¬ÉèÖÃڲƾ¯±¨£¬²¢Ë¼¿¼¶³½áÐÅÓþ¡£È»¶ø£¬ZAGGÉÐδй©¾ßÌåÓм¸¶à¿Í»§Êܵ½ÁËÕâ´Î°²È«·ì϶µÄÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/
2. WPA3ºÍ̸´æÔÚ°²È«·ì϶£¬ºÚ¿Í¿É»ñÈ¡ÍøÂçÃÜÂë
12ÔÂ30ÈÕ£¬×êÑÐÈËÔ±³É¹¦½áºÏÁËÖÐÑëÈ˹¥»÷£¨MITM£©ºÍÉç»á¹¤³Ìѧ¼¼Êõ£¬ÈƹýÁË×îеÄWi-Fi±£»¤ºÍ̸WPA3£¬»ñÈ¡ÁËÍøÂçÃÜÂë¡£ÕâÏî×êÑÐÓÉÎ÷Ó¡¶È´óѧµÄKyle Chadee¡¢Wayne GoodridgeºÍKoffka KhanÍŶÓʵÏÖ£¬½ÒʾÁËWPA3ÕâÒ»×îÐÂÎÞÏß°²È«³ß¶È´æÔڵݲȫ·ì϶¡£WPA3ÓÚ2018ÄêÍÆ³ö£¬Ö¼ÔÚÌí²¹WPA2µÄȱµã£¬Ìṩ¸üÇ¿µÄ°²È«ÐÔ£¬Æä¹Ø¼üÖ°ÄÜ֮һΪ¡°¶ÔµÈͬʱÈÏÖ¤¡±£¨SAE£©ºÍ̸£¬Ö¼ÔÚÕмÜÀëÏß×ֵ乥»÷¡£È»¶ø£¬×êÑÐÈËÔ±·¢ÏÖ£¬ÀûÓÃWPA3¹ý¶ÉģʽÖеÄÈõµã£¬Í¨¹ý½µ¼¶¹¥»÷¿É²¶»ñ²¿ÃÅWPA3½»»¥ÐÅÏ¢£¬ÔÙ½áºÏÉç»á¹¤³Ìѧ¼¼Êõ¼´¿É¸´ÔÍøÂçÃÜÂë¡£¹¥»÷¹ý³ÌÔ̺¬½µ¼¶¹¥»÷²¶»ñÐÅÏ¢¡¢½â³ýÓû§ÈÏÖ¤ÒÔ¼°´´½¨ÐéαÕ˺ŽÓÈëµã»ñÈ¡ÃÜÂë¡£×êÑÐÈËÔ±ÀûÓÃÊ÷Ý®ÅɺͿªÔ´¹¤¾ß´´½¨¶ñÒâ½ÓÈëµã£¬ÓÕʹÓû§ÊäÈëWi-FiÃÜÂë½øÐÐÑéÖ¤¡£ÕâÏî×êÑÐÒý·¢Á˶ÔWPA3°²È«ÐÔµÄÓÇÓô£¬³ö¸ñÊÇÔÚÆä¹ý¶ÉģʽÏ£¬Î´Ö´Ðб£»¤ÖÎÀíµÄÓû§Ò×Êܹ¥»÷£¬ÇÒһЩÉ豸ÎÞ·¨Ïνӵ½WPA3ÍøÂ磬ÓëWi-FiͬÃ˵Ä˵·¨Ïàì¶Ü¡£Ö»¹Ü¹¥»÷ÐèÌØ¶¨Ç°ÌáºÍÓû§½»»¥£¬µ«ÈÔչʾÁ˱£»¤ÎÞÏßÍøÂçÃæ¶ÔµÄÌôÕ½¡£
https://cybersecuritynews.com/researchers-bypass-wpa3-password/#google_vignette
3. ΢Èí´¹Î£ÒªÇó.NET¿ª·¢Õ߸üÐÂÀûÓ÷¨Ê½
12ÔÂ30ÈÕ£¬Î¢ÈíÕý´¹Î£ÒªÇó.NET¿ª·¢ÈËÔ±¸üÐÂËûÃǵÄÀûÓ÷¨Ê½ºÍ¿ª·¢¹Ü·£¬Ô¤·ÀʹÓü´½«ÒòCDNÌṩÉÌEdgioÆÆ²ú¶ø¹Ø¹ØµÄ¡°azureedge.net¡±ÓòÃûÀ´×°ÖÃ.NET×é¼þ¡£³ö¸ñÊÇ¡°dotnetcli.azureedge.net¡±ºÍ¡°dotnetbuilds.azureedge.net¡¹ØâÁ½¸öÓòÃû½«ÔÚ½«À´¼¸¸öÔÂÄÚÏÂÏߣ¬¿ÉÄÜÓ°ÏìÒÀÀµËüÃǵÄÏîĿְÄÜ¡£Î¢ÈíÚ¹ÊÍ£¬ËûÃÇÊØ»¤µÄ¶à¸öCDNÊ·ýÖУ¬²¿ÃÅÒÔ¡°azureedge.net¡±½áβµÄÓòÃûÓÉEdgioÍйܣ¬¸Ã¹«Ë¾¼´½«ÖÕ³¡ÔËÓª£¬Òò¶ø±ØÒªÇ¨á㵽еÄCDN²¢Ê¹ÓÃÐÂÓòÃû¡£Î¢Èí½¨Ò鿪·¢ÈËÔ±ËÑË÷²¢´úÌæ´úÂë¡¢¾ç±¾ºÍÅäÖÃÖжÔazureedge.netµÄÒýÓÃΪbuilds.dotnet.microsoft.com¡£¹ý¶ÉÆÚ¼ä£¬ÐÂÓòÃû½«ÓÉEdgio¡¢AkamaiºÍAzure Front Door½áºÏÌṩ·þÎñ¡£CI/CDÍŶÓÐèÈ·±£GitHub ActionsºÍAzure DevOps¹¤×÷¸üÐÂΪ֧³ÖÐÂÓòµÄ°æ±¾¡£´Ë±í£¬ÐèÉèÖ÷À»ðǽÒÔÔÊÐíÀ´×ÔеØÎ»µÄÁ÷Á¿¡£Ö»¹Ü΢ÈíÒÑÕ¼ÓÐÕâЩÓòÃûµÄËùÓÐȨ£¬µ«ÈÔÐè½øÐÐÓòÃûǨá㣬ÒÔÔ¤·ÀÔËÓªÖжϵķçÏÕ¡£ÊÜÓ°ÏìµÄÓû§Äܹ»¹Ø×¢GitHubÒ³ÃæÉϵÄ״̬¸üС£
https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/
4. µÂ¿ËÈøË¹ÖÝÂó¿ËĬÀï´óѧ½ü1.8ÍòÈËÓ×ÎÒÐÅÏ¢Ôâй¶
12ÔÂ24ÈÕ£¬µÂ¿ËÈøË¹Öݰ¢±ÈÁÖµÄÂó¿ËĬÀï´óѧ½üÆÚÔâ·êÁËÐÅϢй¶ÊÂÎñ£¬½ü18,000È˵ÄÓ×ÎÒÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£¸ÃÊÂÎñÓÚ½ñÄê6ÔÂ20ÈÕ±»Ñ§Ì÷¢ÏÖ£¬ÆäʱѧÌÃÒâʶµ½ÆäÍøÂç´æÔÚ¿ÉÒɻ¡£¾¹ýµ÷²é£¬È·ÈÏÒ»Ãûδ֪Éí·ÝµÄÐÐΪÕßÔÚ6ÔÂ18ÈÕÖÁ6ÔÂ20ÈÕÆÚ¼ä½Ó¼ûÁËѧÌõIJ¿ÃÅϵͳ²¢¸´ÔìÁËÎļþ¡£Âó¿ËĬÀï´óѧ¾¹ý½üÎå¸öÔµÄÊý¾Ý·ÖÎö£¬·¢ÏÖ¿ÉÄÜй¶µÄÐÅÏ¢Ô̺¬ÐÕÃûºÍÉç»á±£ÏÕºÅÂë¡£¸Ã´óѧÒÑÏòÊÜÓ°ÏìµÄÓ×ÎÒÌṩÐÅÓþ¼à¿Ø·þÎñ£¬²¢ÔÚ¼ÓÇ¿±£ÏÕ´ëÊ©ºÍÔ±¹¤Åàѵ¡£Ñ§Êõ»ú¹¹Ê±Ê±³ÉÎªÍøÂç¹¥»÷µÄÖ¸±ê£¬ÓÉÓÚËüÃÇ´¦ÖôóÁ¿Ó×ÎÒÐÅÏ¢ºÍ¸ß¼ÛÖµÊý¾Ý£¬½üÄêÀ´ÒÑÓжàÆðÀàËÆÊÂÎñ±»±¨Â·¡£
https://cybernews.com/news/texas-university-suffers-breach/
5. CISAÐÂÔö·ì϶CVE-2024-3393ÖÁÒÑÖª±»ÀûÓ÷ì϶Ŀ¼
12ÔÂ30ÈÕ£¬CISAÔÚÆäÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖÐÐÂÔöÁËÒ»¸öÃûΪCVE-2024-3393µÄзì϶£¬¸Ã·ìÏ¶Éæ¼°Palo Alto Networks PAN-OSÖÐÌåʽÃýÎóµÄDNSÊý¾Ý°ü¡£´ËÀà·ì϶³£±»¶ñÒâÍøÂçÐÐΪÕßÀûÓ㬴ºÁª¹úÆóÒµ×é³ÉÑϳÁÍþв¡£¡¶²Ù×÷Ö¸Áî¡·22-01ÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÔÚ»®¶¨ÆÚÏÞÄÚ½¨¸´ÒÑ·¢Ïֵķì϶£¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв£¬²¢³ÉÁ¢ÁËÒÑÖª±»ÀûÓ÷ì϶Ŀ¼£¬×÷Ϊ´ºÁª¹úÆóÒµÔì³É³Á´ó·çÏÕµÄÒÑÖª³£¼û·ì϶ºÍ¶³ö(CVE)µÄ¶¯Ì¬ÁÐ±í¡£Ö»¹Ü¸ÃÖ¸Áî½öºÏÓÃÓÚÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×éÖ¯ÓÅÏÈʵʱ½¨¸´Ä¿Â¼Öеķì϶£¬ÒÔ½µµÍÔâ·êÍøÂç¹¥»÷µÄ·çÏÕ¡£CISA½«³ÖÐø½«ÇкÏÖ¸¶¨³ß¶ÈµÄ·ì϶Ôö³¤µ½¸ÃĿ¼ÖУ¬²¢ÒªÇóÓû§ÔÚʹÓñ¾²úƷʱ×ñÊØÓйØÍ¨ÖªºÍÒþÖÔʹÓÃÕþ²ß¡£
https://www.cisa.gov/news-events/alerts/2024/12/30/cisa-adds-one-known-exploited-vulnerability-catalog
6. SekoiaÍŶÓÒýÁìÈ«ÇòÐж¯£¬³É¹¦¶Ï¸ùÊýǧPlugXÈä³æÏ°È¾ÏµÍ³
12ÔÂ29ÈÕ£¬SekoiaÍþв¼ì²âÓë×êÑÐÍŶÓΪÁ˽ø¹¥ÓëMustang Panda×éÖ¯ÓйصÄPlugXÈ䳿¶ñÒâÈí¼þ£¬²ÉÈ¡ÁËÒ»ÏîǰËùδÓеÄÐж¯¡£¸ÃÐж¯Éæ¼°ÓëÀ´×Ô20¶à¸ö¹ú¶ÈµÄ¹ú¶ÈCERTºÍ·¨ÂÉ»ú¹¹µÄºÏ×÷£¬Ö¼ÔڶϸùÊýǧ¸öÊÜϰȾµÄϵͳ¡£SekoiaÍŶÓͨ¹ý½ÚÔìPlugXÈä³æÊ¹ÓõĹؼüIPµØÖ·£¬·ÖÎöÁ˶ñÒâÈí¼þµÄÐÐΪ²¢¿ª·¢ÁËÏû¶¾²½Öè¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÓû§¶ØÄÀµÄ½çÃæ£¬Ê¹²Î¼Ó¹ú¿ÉÄܽӼû¹Ø¼üͳ¼ÆÊý¾Ý¡¢¾«×¼ËãÕÊÖ¸±êºÍÆô¶¯È«¹úÏû¶¾¡£ÎªÁËÈ·±£°²È«£¬¸Ã»î¶¯Ñ¡È¡ÁË×Ô»ÙºÅÁî×÷ÎªÖØÒªÏû¶¾²½Ö裬ÆäÖÐSekoiaµÄSinkhole³ä°ø±ßÑëÖ¸»Óµã¡£Á˾֣¬34¸ö¹ú¶ÈÊÕµ½ÁË·ì϶ÈÕÖ¾£¬22¸ö¹ú¶È¶ÔÏû¶¾¹ý³Ì²û·¢³öŨÃÜÐËÖ£¬²¢ÔÚÇ¿ÓÐÁ¦µÄ˾·¨¿ò¼ÜÖ§³ÖÏ£¬10¸ö¹ú¶È»ý¼«²Î¼ÓÁËÏû¶¾Ðж¯¡£Õâ´Î»î¶¯³É¹¦½â³ýÁË5,539¸öIPµØÖ·ÉϵÄÍþв£¬¹²·¢ËÍÁË59,475¸öÏû¶¾ÓÐÐ§ÔØºÉ£¬Ö¤ÁËÈ»Ö÷ȨÏû¶¾¸ÅÏëµÄÓÐЧÐÔ¡£
https://securityonline.info/global-cyber-collaboration-takes-down-plugx-worm/


¾©¹«Íø°²±¸11010802024551ºÅ