TwitterÍøÂçÓû§ÐÅÏ¢¶¨ÏòÍÆËÍ¹ã¸æ±»·£¿£¿£¿£¿î1.5ÒÚÃÀÔª

Ðû²¼Ê±¼ä 2022-05-26

1¡¢TwitterÍøÂçÓû§ÐÅÏ¢¶¨ÏòÍÆËÍ¹ã¸æ±»·£¿£¿£¿£¿î1.5ÒÚÃÀÔª


¾Ý5ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îÉÌҵίԱ»áFTCÒѶÔTwitter·£¿£¿£¿£¿î1.5ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇËüʹÓÃÍøÂçµÄ2FAÑéÖ¤µÄµç»°ºÅÂëºÍÓʼþµØµãÀ´ÍÆËÍ¹ã¸æ¡£¡£¡£¡£¡£Æ¾Ö¤·¨Í¥Îļþ£¬£¬£¬£¬£¬£¬£¬´Ó2013Äê×îÏÈ£¬£¬£¬£¬£¬£¬£¬TwitterÒªÇóÁè¼Ý1.4ÒÚÓû§ÌṩÕâЩÐÅÏ¢ÒÔ±£»£»£»£»¤ËûÃǵÄÕË»§£¬£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐ֪ͨËûÃÇÕâЩÊý¾ÝÒ²½«ÓÃÓÚ¹ã¸æÉÌͶ·Å¹ã¸æ¡£¡£¡£¡£¡£FTCÖ÷ϯ³Æ£¬£¬£¬£¬£¬£¬£¬TwitterÒÔÓÃÓÚÇ徲ĿµÄΪÄó´Ê´ÓÓû§ÄÇÀï»ñÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«×îÖÕ»¹Ê¹ÓÃÕâЩÊý¾ÝÀ´Õë¶ÔÓû§Í¶·Å¹ã¸æ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ×ö·¨Ó°ÏìÁË´ó×ÚÓû§µÄͬʱ»¹ÌáÉýÁËTwitterµÄÊÕÈë¡£¡£¡£¡£¡£TwitterÒÑÔÞ³ÉÖ§¸¶1.5ÒÚÃÀÔªµÄ·£¿£¿£¿£¿î¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/ftc-fines-twitter-150m-for-using-2fa-info-for-targeted-advertising/


2¡¢Ç÷ÊÆ¿Æ¼¼ÐÞ¸´Òѱ»Moshen DragonʹÓõÄDLLÐ®ÖÆÎó²î


¾ÝýÌå5ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼ÐÞ¸´ÆäÇå¾²²úÆ·ÖеÄDLLÐ®ÖÆÎó²î¡£¡£¡£¡£¡£ÕýÈçSentinel LabsÔÚ5Ô³õÅû¶µÄÄÇÑù£¬£¬£¬£¬£¬£¬£¬Moshen DragonÔÚÕë¶ÔÖÐÑǵĵçÐÅÐÐÒµµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ÊÔÍ¼Ð®ÖÆÇå¾²¹©Ó¦É̵ijÌÐò£¬£¬£¬£¬£¬£¬£¬°üÀ¨Symantec¡¢TrendMicro¡¢BitDefender¡¢McAfeeºÍKaspersky¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶à¸ö¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýDLLÐ®ÖÆÀ´²à¼ÓÔØShadowPadºÍPlugX¡£¡£¡£¡£¡£Trend MicroÒÑÓÚ5ÔÂ19ÈÕͨ¹ýÆäActiveUpdate(AU)Ðû²¼ÁËÒ»¸öÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§Á¬Ã¦¾ÙÐиüС£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/131635/hacking/trend-micro-flaw-moshen-dragon.html


3¡¢Ä³ÉèÖùýʧµÄESЧÀÍÆ÷й¶Êý°ÙÍò´û¿îÉêÇëÈ˵ÄÐÅÏ¢


¾Ý5ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÉèÖùýʧµÄElasticsearchЧÀÍÆ÷й¶ÁË147 GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¹²8.7ÒÚÌõ¼Í¼¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷ÓÚ2021Äê12ÔÂ5ÈÕ±»¼ì²âµ½£¬£¬£¬£¬£¬£¬£¬Ö÷Òª°üÀ¨ÎÚ¿ËÀ¼¡¢¹þÈø¿Ë˹̹ºÍ¶íÂÞ˹С¶î´û¿îµÄÉêÇëÈ˵ÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢×¡Ö·ºÍ»¤ÕÕºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ð½Ë®¡¢´û¿îÏêÇéºÍINN£¨Ë°ºÅ£©µÈ²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬£¬£¬Ô¼ÓÐ1000ÍòÓû§Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖЧÀÍÆ÷ÈÕÖ¾ºÍ»¤ÕÕºÅÂëÊôÓÚ¶íÂÞ˹£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼INNÊôÓÚÎÚ¿ËÀ¼£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃЧÀÍÆ÷λÓÚºÉÀ¼µÄ°¢Ä·Ë¹Ìص¤¡£¡£¡£¡£¡£


https://www.hackread.com/personal-data-russians-ukrainians-exposed-online/


4¡¢MozillaÐû²¼¸üÐÂÐÞ¸´Pwn2Own´ó»áÖб»Ê¹ÓõĶà¸öÎó²î


5ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬MozillaÐû²¼ÁËFirefoxºÍThunderbirdµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´ÔÚPwn2Own 2022´ó»áʱ´ú±»Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£µÚÒ»¸öÎó²îÊÇTop-Level AwaitʵÏÖÖеÄÔ­ÐÍÁ´ÎÛȾ£¨prototype pollution£©Îó²î£¬£¬£¬£¬£¬£¬£¬×·×ÙΪCVE-2022-1802£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃËüÀ´Ö´ÐÐJavaScript´úÂë¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²î( CVE-2022-1529 ) ÊÇJavaScript¹¤¾ßË÷ÒýÖÐʹÓò»ÊÜÐŵÄÊäÈëµ¼ÖµÄÔ­ÐÍÁ´ÎÛȾÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚÌØÈ¨¸¸Àú³ÌÖÐÖ´ÐÐJavaScript¡£¡£¡£¡£¡£CISAÔÚ5ÔÂ23ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬½¨ÒéÁ¬Ã¦ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mozilla-fixes-firefox-thunderbird-zero-days-exploited-at-pwn2own/


5¡¢ChromeÀ©Õ¹ScreencastifyÐÞ¸´¿ÉÐ®ÖÆÉãÏñÍ·µÄXSSÎó²î


ýÌå5ÔÂ24Èճƣ¬£¬£¬£¬£¬£¬£¬Ê¢ÐеÄChromeÀ©Õ¹ScreencastifyÐÞ¸´ÁËÒ»¸öXSSÎó²î¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÓÃÓÚ¼ÆÁ¡¢ÊÓÆµ±à¼­ºÍýÌå¹²ÏíµÄä¯ÀÀÆ÷À©Õ¹£¬£¬£¬£¬£¬£¬£¬ÔÚChromeÖеÄ×°ÖÃÁ¿Áè¼Ý10000000´Î¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÆôÓÃScreencastifyÂ¼ÖÆÊÓÆµ£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÉÏ´«µ½Google Drive¡£¡£¡£¡£¡£»£»£»£»¹¿ÉÒÔʹÓÃͬÑùµÄÎó²îÀ´ÇÔÈ¡¹È¸èÇý¶¯Æ÷µÄOAuthÁîÅÆ£¬£¬£¬£¬£¬£¬£¬²¢ÓÃËüÀ´ÏÂÔØÉÏ´«µÄÊÓÆµ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°´æ´¢ÔڹȸèÇý¶¯Æ÷ÉÏµÄÆäËü¹¤¾ß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/screencastify-chrome-extension-flaws-allow-webcam-hijacks/


6¡¢BlackBerryÐû²¼¹ØÓÚChaosбäÌåYashmaµÄÆÊÎö±¨¸æ


5ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬BlackBerryÐû²¼Á˹ØÓÚÀÕË÷Èí¼þYashma¼°Æä¼Ò×åµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ChaosÊÇÒ»Öֿɶ¨ÖƵÄÀÕË÷Èí¼þ¹¹½¨Æ÷£¬£¬£¬£¬£¬£¬£¬ÓÚ2021Äê6ÔÂ9ÈÕÊ״ηºÆð£¬£¬£¬£¬£¬£¬£¬ÒÑÂÄÀúÁË5´Îµü´ú£¬£¬£¬£¬£¬£¬£¬YashmaÉù³ÆÊÇËüµÄµÚÁù°æ(v6.0)£¬£¬£¬£¬£¬£¬£¬ÓÚ2022ÄêµÄÄêÖÐÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£¡£¡£ChaosµÄǰÈý¸ö°æ±¾Óë¹Å°åµÄÀÕË÷Èí¼þ±ÈÆðÀ´¸üÏñÊǾßÓÐÆÆËðÐԵľÂí£¬£¬£¬£¬£¬£¬£¬µ«Chaos 4.0½øÒ»²½Ë¢Ð£¬£¬£¬£¬£¬£¬£¬½«¿É¼ÓÃÜÎļþµÄÉÏÏÞÌá¸ßµ½2.1MB¡£¡£¡£¡£¡£Chaos 5.0ʹÓÃÁËAES-256¼ÓÃÜÄ¿µÄÎļþ£¬£¬£¬£¬£¬£¬£¬¶øYashmaÓëÉÏÒ»¸ö°æ±¾ÏÕЩÏàͬ£¬£¬£¬£¬£¬£¬£¬½öÌí¼ÓÁËÁ½ÏîÐ޸ġ£¡£¡£¡£¡£ 


https://blogs.blackberry.com/en/2022/05/yashma-ransomware-tracing-the-chaos-family-tree