¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢
Ðû²¼Ê±¼ä 2022-12-13
¾Ý12ÔÂ11ÈÕ±¨µÀ£¬£¬£¬£¬¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¡£¡£¾ÝϤ£¬£¬£¬£¬´ÓÉÏÖÜÎå×îÏÈ£¬£¬£¬£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬£¬£¬£¬¼û¸æËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£¡£¡£Õþ¸®²¢Î´ËµÃ÷¸ÃÊÂÎñÊÇÔõÑù±¬·¢µÄ£¬£¬£¬£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬£¬£¬£¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ±¡£¡£¡£Æäʱ£¬£¬£¬£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˱¨¸æÁËÀ¬»ø¶ÌÐÅ£¬£¬£¬£¬ÕâЩڲÆÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£
https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714
2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»Ê¹ÓõÄCVE-2022-42475
12ÔÂ12ÈÕ£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³öÎó²î£¨CVE-2022-42475£©µÄÇ徲ͨ¸æ¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî¡£¡£¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸÃÎó²îÒѱ»ÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÔõÑùʹÓÃÎó²îµÄÐÅÏ¢£¬£¬£¬£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£¡£¡£Fortinet½¨Òé¿Í»§Á¬Ã¦×°Öò¹¶¡¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/
3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î
CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬£¬£¬£¬AndroidÓ¦ÓóÌÐòWeb Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Í¼¡£¡£¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Ó㬣¬£¬£¬ÔÚGoogle PlayÊÐËÁÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î¡£¡£¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦ÓóÌÐòºÍÓû§µÄÊý¾Ý£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ÈôÊǹ¥»÷Õß¶ÔÓ¦ÓõÄÓû§¾ÙÐÐÈ¥ÄäÃû»¯´¦Öóͷ££¬£¬£¬£¬¾ÍÄܹ»Éó²éÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´ó×ÚÐÅÏ¢£¬£¬£¬£¬²¢ÓÃÓÚÚ²ÆÀÕË÷¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâ»î¶¯¡£¡£¡£
https://cybernews.com/security/android-app-leaked-user-browsing-history/
4¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ
¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬£¬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦ÓóÌÐò·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨ÆÊÎöµÄSQL×¢Èëpayload£¬£¬£¬£¬´ó´ó¶¼WAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬£¬£¬£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÖÃÈôØèÎÅ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF¡£¡£¡£
https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html
5¡¢ThreatFabric·¢Ã÷Õë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder
ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚÆÊÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬£¬£¬£¬·¢Ã÷ÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯¡£¡£¡£³ýÁËErmacÍ⣬£¬£¬£¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÖصãÏÈÈÝÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬£¬£¬£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½Õýµ±µÄAndroidÓ¦Ó㬣¬£¬£¬Ñ¬È¾Ä¿µÄµÄͬʱÈÔÓµÓÐÔʼӦÓõÄËùÓй¦Ð§£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿µÄ£¬£¬£¬£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿µÄÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£
https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html
6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
12ÔÂ8ÈÕ£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄJanicab±äÌ壬£¬£¬£¬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬£¬£¬£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾¡£¡£¡£ÓÐȤµÄÊÇ£¬£¬£¬£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂçЧÀÍ×÷ΪDDR¡£¡£¡£È»¶ø£¬£¬£¬£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬£¬£¬£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬£¬£¬£¬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óᣡ£¡£DeathstalkerÈÔÖ÷ÒªÕë¶Ô״ʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬£¬£¬£¬µ«¶Ô½üÆÚ»î¶¯µÄÆÊÎöÅú×¢ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿µÄÐÐÒµ¡£¡£¡£
https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/


¾©¹«Íø°²±¸11010802024551ºÅ