Avira¸üб£´æBugµ¼ÖÂWindowsÅÌËã»úÔÚÆô¶¯ºóËÀ»ú

Ðû²¼Ê±¼ä 2023-12-14
1¡¢Avira¸üб£´æBugµ¼ÖÂWindowsÅÌËã»úÔÚÆô¶¯ºóËÀ»ú


¾ÝýÌå12ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬×ÔÉÏÖÜÎåÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Ðí¶àWindowsÓû§±¨¸æÁËϵͳÔÚÆô¶¯ºó²»¾Ã¶³½áµÄÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÕâÓëAviraÇå¾²Èí¼þ¸üÐÂBugÓйØ¡£¡£¡£¡£¡£¡£AviraÆô¶¯ºóԼĪ20Ã룬£¬£¬£¬£¬£¬£¬Õû¸öϵͳ±äµÃÎÞÏìÓ¦£¬£¬£¬£¬£¬£¬£¬Ö»ÄÜͨ¹ý»úÏäÉϵÄÖØÆô°´Å¥À´ÖØÆôµçÄÔ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Î¨Ò»µÄµ÷½â²½·¥¾ÍÊÇÆô¶¯µ½Ç徲ģʽµÄÍ¬Ê±Ð¶ÔØAviraµÄÈí¼þ£¬£¬£¬£¬£¬£¬£¬¿ÉÊDz¿·ÖÓû§ÔÚÍêȫɾ³ýAviraÈí¼þʱÓöµ½ÁËÄÑÌâ¡£¡£¡£¡£¡£¡£AviraÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÊÇÓÉAviraÄÚ²¿·À»ðǽµ¼Öµģ¬£¬£¬£¬£¬£¬£¬ÓÚ12ÔÂ9ÈÕÊ״α¨¸æ£¬£¬£¬£¬£¬£¬£¬²¢Ó¦Í¨¹ý12ÔÂ11ÈյĸüÐÂ×Ô¶¯ÐÞ¸´¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/avira-antivirus-causes-windows-computers-to-freeze-after-boot/


2¡¢Insomniac GamesÔâµ½Rhysida¹¥»÷±»ÀÕË÷200ÍòÃÀÔª


ýÌå12ÔÂ14Èճƣ¬£¬£¬£¬£¬£¬£¬Ë÷ÄáÌåÏÖÕýÔÚÊÓ²ìÆä×Ó¹«Ë¾Insomniac GamesÔâµ½µÄÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£RhysidaÉù³ÆÈëÇÖÁËInsomniac Games£¬£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁ˲¿·Ö±»µÁÊý¾ÝµÄ½ØÍ¼£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÄÚ²¿Óʼþ¡¢»¤ÕÕ¸±±¾¡¢Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤ÒÔ¼°ÓëÓÎÏ·×ʲú»òÓÎÏ·Íæ·¨Ïà¹ØµÄͼÏñ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÍþвҪÅÄÂô±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¸øÁËInsomniacÒ»ÖܵÄʱ¼äÍù·µÓ¦ËûÃǵÄÒªÇ󣬣¬£¬£¬£¬£¬£¬È»ºó»á½«±»µÁÊý¾ÝÐû²¼¸ø³ö¼Û×î¸ßÕߣ¬£¬£¬£¬£¬£¬£¬ÆðÅļÛΪ50±ÈÌØ±Ò£¨Ô¼200ÍòÃÀÔª£©¡£¡£¡£¡£¡£¡£


https://therecord.media/sony-investigating-ransomware-insomniac-games


3¡¢Î¢ÈíÅû¶ʹÓÃOAuthÓ¦ÓõÄ×Ô¶¯»¯BECºÍÍÚ¿óµÈ¹¥»÷


12ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬³öÓÚ¾­¼ÃÄîÍ·µÄ¹¥»÷ÕßÕýÔÚʹÓÃOAuthÓ¦ÓÃÀ´×Ô¶¯Ö´ÐÐBECºÍ´¹ÂÚ¹¥»÷¡¢ÍÆËÍÀ¬»øÓʼþÒÔ¼°×°ÖÃÐéÄâ»ú¾ÙÐмÓÃÜÍÚ¾ò¡£¡£¡£¡£¡£¡£Ò»¸ö°¸ÀýÖУ¬£¬£¬£¬£¬£¬£¬Storm-1283ÍŻィÉèÁËÒ»¸öOAuthÓ¦ÓÃÀ´°²ÅÅÍÚ¿óÐéÄâ»ú¡£¡£¡£¡£¡£¡£¸øÄ¿µÄÔì³ÉÁË1-150ÍòÃÀÔªµÄËðʧ£¬£¬£¬£¬£¬£¬£¬Ïêϸ½ð¶îÈ¡¾öÓÚ¹¥»÷µÄÒ»Á¬Ê±¼ä¡£¡£¡£¡£¡£¡£ÁíÒ»¸ö¹¥»÷ÍÅ»ïʹÓñ»Ñ¬È¾ÕÊ»§½¨ÉèµÄOAuthÓ¦ÓÃÀ´Î¬³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÖÐÐĵÐÊÖ(AiTM)´¹ÂÚ¹¤¾ß°üÖ´Ðд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¶øStorm-1286ÍÅ»ïͨ¹ýOAuthÓ¦ÓþÙÐÐÁË´ó¹æÄ£µÄÀ¬»øÓʼþ·Ö·¢»î¶¯¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/12/12/threat-actors-misuse-oauth-applications-to-automate-financially-driven-attacks/


4¡¢ÎÚ¿ËÀ¼×î´óÔËÓªÉÌKYIVSTARÔâµ½¹¥»÷ЧÀÍÔÝʱÖÐÖ¹


¾Ý12ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼×î´óµÄÔËÓªÉÌKyivstarÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Òƶ¯ºÍÊý¾ÝЧÀÍÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÎÚ¿ËÀ¼Ô¼2600ÍòÒÆ¶¯¿Í»§ºÍÁè¼Ý100Íò¿í´øÀο¿»¥ÁªÍø¿Í»§ÌṩЧÀÍ¡£¡£¡£¡£¡£¡£12ÈÕÔçÉÏ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ðû²¼Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀÍÔÝʱÖÐÖ¹¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ËùÓÐÒÆ¶¯Í¨Ñ¶ºÍ»¥ÁªÍø»á¼û¾ùÎÞ·¨Ê¹Óᣡ£¡£¡£¡£¡£KyivstarÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÇå¾²ÊÂÎñ²¢Î´Ó°ÏìÈκÎСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ËùÓÐÊÜÓ°ÏìÇÒÎÞ·¨Ê¹ÓÃЧÀ͵ÄÓû§¶¼½«»ñµÃÅâ³¥¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/155701/hacking/cyberattack-brought-down-ukraine-kyivstar.html


5¡¢Ó¢¹ú¹ú·À²¿ÒòÊý¾Ýй¶±»î¿Ïµ»ú¹¹·£¿£¿£¿£¿î½ü44ÍòÃÀÔª


12ÔÂ13ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Ó¢¹ú¹ú·À²¿ÒòδÄܱ£»£»£»£»£»¤ÔÚ2021ÄêÒÆÃñµÄ°¢¸»º¹È˵ÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬±»·£¿£¿£¿£¿î35ÍòÓ¢°÷£¨Ô¼ºÏ44ÍòÃÀÔª£©¡£¡£¡£¡£¡£¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ó¢¹úµÄ°¢¸»º¹ÖØÐ°²¶ÙºÍÔ®ÖúÕþ²ß£¨ARAP£©·¢ËÍÓʼþʱ·ºÆð¹ýʧ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂÖ°Ô±ÉËÍö¡£¡£¡£¡£¡£¡£ÓÉÓÚ·¢¼þÈËʹÓÃÁË"ÊÕ¼þÈË"×ֶΣ¬£¬£¬£¬£¬£¬£¬ÆäÖÐ245È˵ÄÐÅÏ¢±»ÒâÍâµØÌ»Â¶¸øÁËËùÓÐÊÕ¼þÈË¡£¡£¡£¡£¡£¡£×î³õ£¬£¬£¬£¬£¬£¬£¬¹ú·À²¿±»ÅжÏûÓÐ"½ÓÄÉÊʵ±µÄÊÖÒÕºÍ×éÖ¯²½·¥"£¬£¬£¬£¬£¬£¬£¬±»´¦ÒÔ100ÍòÓ¢°÷µÄ·£¿£¿£¿£¿î¡£¡£¡£¡£¡£¡£Ëæºó·£¿£¿£¿£¿î¼õÖÁ70ÍòÓ¢°÷£¬£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊǸò¿·ÖÔÚÊÂÎñ±¬·¢ºó½ÓÄɵIJ½·¥¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤ICO¶Ô¹«¹²²¿·Ö·£¿£¿£¿£¿îµÄл®¶¨£¬£¬£¬£¬£¬£¬£¬·£¿£¿£¿£¿î±»¼õ°ëÖÁ35ÍòÓ¢°÷¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ministry-defence-fined-afghan-data/


6¡¢Check PointÐû²¼11Ô·ÝÈ«ÇòÍþвָÊýµÄÆÊÎö±¨¸æ


12ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬Check PointÐû²¼ÁË11Ô·ÝÈ«ÇòÍþвָÊýµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬11Ô·¢Ã÷ÁËеÄAsyncRAT»î¶¯£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâHTMLÎļþ±»ÓÃÀ´Èö²¥Òþ²ØµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÏÂÔØ³ÌÐòFakeUpdatesÔÚÔÝʱÍ˳öÁ½¸öÔºóÖØÐ½øÈë¶ñÒâÈí¼þÅÅÐаñ£¬£¬£¬£¬£¬£¬£¬Ö±½ÓÔ¾¾ÓµÚ¶þλ¡£¡£¡£¡£¡£¡£½ÌÓýºÍÑо¿ÐÐÒµÈÔÈ»ÊÇ11ÔÂÔâµ½¹¥»÷×î¶àµÄÐÐÒµ¡£¡£¡£¡£¡£¡£×îÈÝÒ×±»Ê¹ÓõÄÎó²îÊÇHTTPÏÂÁî×¢È루CVE-2021-43936ºÍCVE-2022-24086£©£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÈ«Çò45%µÄʵÌå¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/