¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢
Ðû²¼Ê±¼ä 2022-12-13
¾Ý12ÔÂ11ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬´ÓÉÏÖÜÎå×îÏÈ£¬£¬£¬£¬£¬£¬£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬£¬£¬£¬£¬£¬£¬¼û¸æËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Õþ¸®²¢Î´ËµÃ÷¸ÃÊÂÎñÊÇÔõÑù±¬·¢µÄ£¬£¬£¬£¬£¬£¬£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ±¡£¡£¡£¡£¡£¡£¡£Æäʱ£¬£¬£¬£¬£¬£¬£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˱¨¸æÁËÀ¬»ø¶ÌÐÅ£¬£¬£¬£¬£¬£¬£¬ÕâЩڲÆÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714
2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»Ê¹ÓõÄCVE-2022-42475
12ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³öÎó²î£¨CVE-2022-42475£©µÄÇ徲ͨ¸æ¡£¡£¡£¡£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî¡£¡£¡£¡£¡£¡£¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸÃÎó²îÒѱ»ÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÔõÑùʹÓÃÎó²îµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£¡£¡£¡£¡£¡£¡£Fortinet½¨Òé¿Í»§Á¬Ã¦×°Öò¹¶¡¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/
3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î
CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬AndroidÓ¦ÓóÌÐòWeb Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Í¼¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÔÚGoogle PlayÊÐËÁÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î¡£¡£¡£¡£¡£¡£¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦ÓóÌÐòºÍÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÈôÊǹ¥»÷Õß¶ÔÓ¦ÓõÄÓû§¾ÙÐÐÈ¥ÄäÃû»¯´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬¾ÍÄܹ»Éó²éÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´ó×ÚÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢ÓÃÓÚÚ²ÆÀÕË÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/android-app-leaked-user-browsing-history/
4¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ
¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦ÓóÌÐò·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨ÆÊÎöµÄSQL×¢Èëpayload£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼WAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÖÃÈôØèÎÅ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html
5¡¢ThreatFabric·¢Ã÷Õë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder
ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚÆÊÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£³ýÁËErmacÍ⣬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÖصãÏÈÈÝÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬£¬£¬£¬£¬£¬£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½Õýµ±µÄAndroidÓ¦Ó㬣¬£¬£¬£¬£¬£¬Ñ¬È¾Ä¿µÄµÄͬʱÈÔÓµÓÐÔʼӦÓõÄËùÓй¦Ð§£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿µÄÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html
6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
12ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄJanicab±äÌ壬£¬£¬£¬£¬£¬£¬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾¡£¡£¡£¡£¡£¡£¡£ÓÐȤµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂçЧÀÍ×÷ΪDDR¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬£¬£¬£¬£¬£¬£¬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óᣡ£¡£¡£¡£¡£¡£DeathstalkerÈÔÖ÷ÒªÕë¶Ô״ʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬£¬£¬£¬£¬£¬£¬µ«¶Ô½üÆÚ»î¶¯µÄÆÊÎöÅú×¢ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿µÄÐÐÒµ¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/


¾©¹«Íø°²±¸11010802024551ºÅ