¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

Ðû²¼Ê±¼ä 2022-12-13
1¡¢¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢

      

¾Ý12ÔÂ11ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬ £¬£¬£¬£¬£¬£¬´ÓÉÏÖÜÎå×îÏÈ£¬ £¬£¬£¬£¬£¬£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬ £¬£¬£¬£¬£¬£¬¼û¸æËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Õþ¸®²¢Î´ËµÃ÷¸ÃÊÂÎñÊÇÔõÑù±¬·¢µÄ£¬ £¬£¬£¬£¬£¬£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬ £¬£¬£¬£¬£¬£¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ±¡£¡£¡£¡£¡£¡£¡£Æäʱ£¬ £¬£¬£¬£¬£¬£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˱¨¸æÁËÀ¬»ø¶ÌÐÅ£¬ £¬£¬£¬£¬£¬£¬ÕâЩڲƭÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£


https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714


2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»Ê¹ÓõÄCVE-2022-42475

      

12ÔÂ12ÈÕ£¬ £¬£¬£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³öÎó²î£¨CVE-2022-42475£©µÄÇ徲ͨ¸æ¡£¡£¡£¡£¡£¡£¡£Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî¡£¡£¡£¡£¡£¡£¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸ÃÎó²î£¬ £¬£¬£¬£¬£¬£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸÃÎó²îÒѱ»ÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÔõÑùʹÓÃÎó²îµÄÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£¡£¡£¡£¡£¡£¡£Fortinet½¨Òé¿Í»§Á¬Ã¦×°Öò¹¶¡¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/


3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î

      

CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬ £¬£¬£¬£¬£¬£¬AndroidÓ¦ÓóÌÐòWeb Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Í¼¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Ó㬠£¬£¬£¬£¬£¬£¬ÔÚGoogle PlayÊÐËÁÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î¡£¡£¡£¡£¡£¡£¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦ÓóÌÐòºÍÓû§µÄÊý¾Ý£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬ÈôÊǹ¥»÷Õß¶ÔÓ¦ÓõÄÓû§¾ÙÐÐÈ¥ÄäÃû»¯´¦Öóͷ££¬ £¬£¬£¬£¬£¬£¬¾ÍÄܹ»Éó²éÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´ó×ÚÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬²¢ÓÃÓÚڲƭÀÕË÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/android-app-leaked-user-browsing-history/


4¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ

      

¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬 £¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦ÓóÌÐò·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨ÆÊÎöµÄSQL×¢Èëpayload£¬ £¬£¬£¬£¬£¬£¬´ó´ó¶¼WAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬ £¬£¬£¬£¬£¬£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÖÃÈôØèÎÅ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html


5¡¢ThreatFabric·¢Ã÷Õë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder

      

ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚÆÊÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬ £¬£¬£¬£¬£¬£¬·¢Ã÷ÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£³ýÁËErmacÍ⣬ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÖصãÏÈÈÝÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬ £¬£¬£¬£¬£¬£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½Õýµ±µÄAndroidÓ¦Ó㬠£¬£¬£¬£¬£¬£¬Ñ¬È¾Ä¿µÄµÄͬʱÈÔÓµÓÐԭʼӦÓõÄËùÓй¦Ð§£¬ £¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿µÄ£¬ £¬£¬£¬£¬£¬£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿µÄÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£


https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html


6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

      

12ÔÂ8ÈÕ£¬ £¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄJanicab±äÌ壬 £¬£¬£¬£¬£¬£¬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾¡£¡£¡£¡£¡£¡£¡£ÓÐȤµÄÊÇ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂçЧÀÍ×÷ΪDDR¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬ £¬£¬£¬£¬£¬£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬ £¬£¬£¬£¬£¬£¬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óᣡ£¡£¡£¡£¡£¡£DeathstalkerÈÔÖ÷ÒªÕë¶Ô״ʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬ £¬£¬£¬£¬£¬£¬µ«¶Ô½üÆÚ»î¶¯µÄÆÊÎöÅú×¢ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿µÄÐÐÒµ¡£¡£¡£¡£¡£¡£¡£


https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/