Ñо¿Ö°Ô±Åû¶AWSÖÐʹÓÃAppSyncµÄ¿ç×â»§Îó²îµÄÏêÇé

Ðû²¼Ê±¼ä 2022-11-30
1¡¢Ñо¿Ö°Ô±Åû¶AWSÖÐʹÓÃAppSyncµÄ¿ç×â»§Îó²îµÄÏêÇé

¾Ý11ÔÂ28ÈÕ±¨µÀ£¬ £¬£¬ £¬ £¬£¬Ñо¿Ö°Ô±Åû¶ÁËAmazon Web ServicesÖеĿç×â»§Îó²î£¬ £¬£¬ £¬ £¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î»ñµÃ¶Ô×ÊԴδ¾­ÊÚȨµÄ»á¼û¡£¡£ ¡£¡£¸ÃÎó²îÓë»ìÏýÊðÀíÎÊÌâÓйØ£¬ £¬£¬ £¬ £¬£¬ÊÇÒ»ÖÖÌáȨÎó²î¡£¡£ ¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÁËAppSyncЧÀÍÀ´¼ç¸ºÆäËûAWSÕË»§ÖеÄIAM½ÇÉ«£¬ £¬£¬ £¬ £¬£¬ÕâʹµÃ¹¥»÷ÕßÄܹ»½øÈ뵽ĿµÄ×éÖ¯Öв¢»á¼ûÕâЩÕË»§ÖеÄ×ÊÔ´¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê9ÔÂ1ÈÕ±¨¸æÁ˸ÃÎÊÌ⣬ £¬£¬ £¬ £¬£¬AWSÓÚ9ÔÂ6ÈÕÐÞ¸´Á˸ÃÎó²î¡£¡£ ¡£¡£

https://thehackernews.com/2022/11/researchers-detail-appsync-cross-tenant.html

2¡¢Checkmarx·¢Ã÷ʹÓÃTikTokÌôÕ½À´·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯

CheckmarxÔÚ11ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÃTikTok¡°ÒþÐÎÌôÕ½¡±·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£¡£ ¡£¡£¸ÃÌôÕ½ÒªÇóÓû§Ê¹ÓÃTikTokµÄ¡°ÉíÌåÒþÐΡ±Â˾µÅÄÉãÂãÌ壬 £¬£¬ £¬ £¬£¬¸ÃÂ˾µ»á´ÓÊÓÆµÖÐÒÆ³ýÉíÌ岿·Ö²¢ÓÃÄ£ºýÅä¾°È¡´ú¡£¡£ ¡£¡£¹¥»÷ÕßÖÆ×÷ÁËTikTokÊÓÆµ£¬ £¬£¬ £¬ £¬£¬Éù³Æ¿ÉÒÔÌṩһÖÖÌØÊâµÄ¹ýÂËÆ÷£¬ £¬£¬ £¬ £¬£¬Ïû³ýTikTokµÄ¡°ÉíÌåÒþÐΡ±Ð§¹û¡£¡£ ¡£¡£È»¶ø£¬ £¬£¬ £¬ £¬£¬¸ÃÈí¼þ»á×°ÖÃWASP Stealer£¬ £¬£¬ £¬ £¬£¬ËüÄܹ»ÇÔÈ¡´æ´¢ÔÚä¯ÀÀÆ÷¡¢¼ÓÃÜÇ®±ÒÇ®°üÖеÄDiscordÕÊ»§¡¢ÃÜÂëºÍÐÅÓÿ¨£¬ £¬£¬ £¬ £¬£¬ÉõÖÁÊÇÄ¿µÄÅÌËã»úÖеÄÎļþ¡£¡£ ¡£¡£

https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/

3¡¢BianLianÍÅ»ïÐû²¼´Ó¼ÓÄôóHarry RosenÇÔÈ¡µÄ1GBÊý¾Ý

¾ÝýÌå11ÔÂ25ÈÕ±¨µÀ£¬ £¬£¬ £¬ £¬£¬¼ÓÄôóÄÐ×°Á¬ËøµêHarry RosenÔâµ½ÁËÍøÂç¹¥»÷¡£¡£ ¡£¡£¸Ã¹«Ë¾ÉÐδ͸¶¹¥»÷ÀàÐÍ£¬ £¬£¬ £¬ £¬£¬ÒÔ¼°ÊÇ·ñÓ°ÏìÁ˹«Ë¾µÄÔËÓª¡£¡£ ¡£¡£BianLianÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬ £¬£¬ £¬ £¬£¬²¢Ðû²¼ÁËÒ»¸ö1 GBµÄÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬ £¬£¬ £¬ £¬£¬ÆäÖаüÀ¨Harry RosenµÄGold+¿Í»§ÁÐ±í¡¢ÏúÊÛÐÅÏ¢ºÍÖÖÖÖÆäËüÀàÐ͵ÄÎļþ¡£¡£ ¡£¡£BianLianÓÚ8Ô·ÝÊ״α»·¢Ã÷£¬ £¬£¬ £¬ £¬£¬ÀÕË÷Èí¼þÊÇÓÃGoÓïÑÔΪWindowsϵͳ¿ª·¢µÄ£¬ £¬£¬ £¬ £¬£¬Æä³õʼ»á¼û¿ÉÄÜÊÇͨ¹ýWindows ProxyShellÎó²î»òSonicWall VPN¹Ì¼þÎó²î»ñµÃµÄ¡£¡£ ¡£¡£

https://www.itworldcanada.com/article/canadian-menswear-chain-harry-rosen-confirms-cyber-attack/515325

4¡¢Ã°³äµÄSMSÓ¦ÓÃSymoo³äµ±ÕÊ»§½¨ÉèЧÀ͵ÄSMSÖмÌ

ýÌå11ÔÂ28Èճƣ¬ £¬£¬ £¬ £¬£¬ÔÚGoogle PlayÊÐËÁÖÐ100000´ÎÏÂÔØÁ¿µÄð³äAndroid SMSÓ¦Ó㬠£¬£¬ £¬ £¬£¬ÉñÃØµØ³äµ±Microsoft¡¢Google¡¢Instagram¡¢TelegramºÍFacebookµÈÍøÕ¾µÄÕÊ»§½¨ÉèЧÀ͵ÄSMSÖм̡£¡£ ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬ £¬ £¬£¬±»Ñ¬È¾µÄ×°±¸Ëæºó»á×÷Ϊ¡°ÐéÄâºÅÂ롱³ö×⣬ £¬£¬ £¬ £¬£¬ÓÃÓÚÔÚ½¨ÉèÐÂÕË»§Ê±×ª·¢ÑéÖ¤Óû§µÄÒ»´ÎÐÔÃÜÂë¡£¡£ ¡£¡£ËäȻδ¾­Ö¤Êµ£¬ £¬£¬ £¬ £¬£¬µ«¾ÝÐÅSymooÓ¦ÓÃÓÃÓÚÎüÊÕºÍת·¢Ê¹ÓÃActivationPW½¨ÉèÕÊ»§Ê±ÌìÉúµÄOTPÑéÖ¤Âë¡£¡£ ¡£¡£ÏÖÔÚ£¬ £¬£¬ £¬ £¬£¬¸ÃÓ¦ÓÃÈÔÔÚGoogle PlayÉÏ¿ÉÓᣡ£ ¡£¡£

https://www.bleepingcomputer.com/news/security/malicious-android-app-found-powering-account-creation-service/

5¡¢Group-IB·¢Ã÷¶àÆðÕë¶Ô2022ÄêFIFAÌìϱ­µÄ´¹Âڻ

11ÔÂ29ÈÕ£¬ £¬£¬ £¬ £¬£¬Group-IB͸¶Æä·¢Ã÷¶àÆðÕë¶Ô¿¨Ëþ¶û2022ÄêFIFAÌìϱ­ÃÅÆ±¡¢¹Ù·½ÉÌÆ·ºÍÊÂÇéµÄÕ©Æ­ºÍ´¹ÂÚ¹¥»÷¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚ¿¨Ëþ¶û2022Äê¹Ù·½ÇòÃÔIDÃÅ»§ÍøÕ¾HayyaÉÏ·¢Ã÷ÁË90¶à¸ö¿ÉÄÜÔâµ½ÈëÇÖµÄÕË»§£¬ £¬£¬ £¬ £¬£¬ÕâÊÇΪÌìϱ­¹ÛÖÚ½¨ÉèµÄÇ¿ÖÆÐÔϵͳ£¬ £¬£¬ £¬ £¬£¬¿ÉÒÔ½øÈ뿨Ëþ¶û²¢»ñµÃÃÅÆ±ºÍ½»Í¨µÈЧÀÍ¡£¡£ ¡£¡£¾ÝÊӲ죬 £¬£¬ £¬ £¬£¬¹¥»÷ÕßʹÓÃRedLineºÍErbiumµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ñµÃÁËÕâЩÕË»§µÄÃÜÂë¡£¡£ ¡£¡£±ðµÄ£¬ £¬£¬ £¬ £¬£¬Group-IB»¹È·¶¨ÁË4ÖÖ²î±ðµÄÕ©Æ­ºÍ´¹ÂÚ¹¥»÷À˳±£¬ £¬£¬ £¬ £¬£¬ÒÔ¼°´ó×Ú¿É´ÓGoogle PlayÊÐËÁÏÂÔØµÄÐéαӦÓᣡ£ ¡£¡£

https://www.group-ib.com/media-center/press-releases/scammers-on-the-pitch/

6¡¢KasperskyÐû²¼2023Äê¹ØÓÚÏûºÄÕßµÄÍþвµÄÕ¹Íû±¨¸æ

11ÔÂ28ÈÕ£¬ £¬£¬ £¬ £¬£¬KasperskyÐû²¼ÁË2023Äê¹ØÓÚÏûºÄÕßµÄÍþвµÄÕ¹Íû±¨¸æ¡£¡£ ¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬ £¬ £¬£¬ÔÚÓÎÏ·ºÍÁ÷ýÌåЧÀÍ·½Ã棬 £¬£¬ £¬ £¬£¬Óû§½«ÃæÁÙ¸ü¶àµÄÓÎÏ·¶©ÔÄڲƭ¡¢ÓÎÏ·»úµÄǷȱ½«±»Ê¹Óᢹ¥»÷Õß½«ÐèÒªÓÎÏ·ÖеÄÐéÄâÇ®±Ò¡¢¹¥»÷Õß»áʹÓÃÆÚ´ýÒѾõÄÓÎÏ·£¬ £¬£¬ £¬ £¬£¬ÒÔ¼°Á÷ýÌåÈÔ½«Êǹ¥»÷Õßȡ֮²»¾¡µÄÊÕÈëȪԴ£»£»£»ÔÚÉ罻ýÌåºÍÔªÓîÖæ·½Ã棬 £¬£¬ £¬ £¬£¬ÐµÄÉ罻ýÌ彫´øÀ´¸ü¶àµÄÒþ˽Σº¦ºÍÔªÓîÖæµÄ¿ª·¢´øÀ´µÄΣº¦£»£»£»À´×ÔÐÄÀí¿µ½¡Ó¦ÓóÌÐòµÄÊý¾Ý½«ÓÃÓÚ׼ȷ¶¨Î»µÄÉç»á¹¤³Ì¹¥»÷£»£»£»ÒÔ¼°£¬ £¬£¬ £¬ £¬£¬ÔÚÏß½ÌÓýƽ̨½«ÎüÒý¸ü¶à·¸·¨»î¶¯µÈ¡£¡£ ¡£¡£

https://securelist.com/consumer-threats-2023/108112/