Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806
Ðû²¼Ê±¼ä 2022-06-21
¾ÝýÌå6ÔÂ16ÈÕ±¨µÀ£¬£¬£¬AnkerµÄÖÐÑëÖÇÄܼҾÓ×°±¸ÖÐÐÄEufy Homebase 2±£´æ3¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£Homebase 2ÊÇËùÓÐAnker EufyÖÇÄܼҾÓ×°±¸µÄÊÓÆµ´æ´¢ºÍÍøÂçÍø¹Ø£¬£¬£¬×÷ΪÕâЩװ±¸µÄÖÐÐÄÕ¾ÔËÐС£¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇÒ»¸ö´úÂëÖ´ÐÐÎó²î£¨CVE-2022-21806£¬£¬£¬CVSSÆÀ·Ö10)£¬£¬£¬ÊÇÄÚ²¿Ð§ÀÍÆ÷¹¦Ð§ÖеÄÊͷźóʹÓÃÎó²îµ¼Öµģ¬£¬£¬¿Éͨ¹ýÏòÄ¿µÄ×°±¸·¢ËÍÌØÖÆµÄÍøÂçÊý¾Ý°üÀ´´¥·¢¡£¡£¡£¡£¡£¡£¡£ÆäËüÁ½¸öÎó²î»®·ÖΪ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2022-26073£©ºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-25989£©¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/anker-eufy-smart-home-hubs-exposed-to-rce-attacks-by-critical-flaw/
2¡¢ÃÀ¹úFlagstarÒøÐÐ֪ͨÆä¿Í»§È¥ÄêÔâµ½¹¥»÷
¾Ý6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬FlagstarÒøÐÐÕýÔÚ֪ͨ¿Í»§¹ØÓÚÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£FlagstarÊÇλÓÚÃÜЪ¸ùÖݵĽðÈÚЧÀÍÌṩÉÌ£¬£¬£¬Ò²ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬£¬£¬×Ü×ʲúÁè¼Ý300ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶Í¨Öª£¬£¬£¬FlagstarµÄÍøÂçÔÚ2021Äê12Ô±»ÈëÇÖ£¬£¬£¬¸ÃÒøÐÐÓÚ½ñÄê6ÔÂ2ÈÕ·¢Ã÷¡£¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬¹¥»÷Õß»á¼ûÁ˿ͻ§µÄÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁË1547169ÈË£¬£¬£¬Flagstar½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêÃâ·ÑµÄÉí·Ý¼à¿ØºÍ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£2021Äê1Ô£¬£¬£¬¸ÃÐÐÔøÔâµ½ClopÍÅ»ïµÄÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/flagstar-bank-discloses-data-breach-impacting-15-million-customers/
3¡¢Robert Half³ÆºÚ¿ÍÒѹ¥»÷Æä1000¶à¸ö¿Í»§µÄÕÊ»§
ýÌå6ÔÂ17Èճƣ¬£¬£¬ÈËÁ¦×ÊÔ´¹«Ë¾Robert HalfµÄ1000¶à¸ö¿Í»§µÄÕÊ»§Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬¹¥»÷ÕßÔÚ4ÔÂ26ÈÕÖÁ5ÔÂ16ÈÕʱ´úÈëÇÖÁËRobertHalf.comÍøÕ¾µÄÕÊ»§£¬£¬£¬¸ÃÊÂÎñÓÚ5ÔÂ31ÈÕ±»·¢Ã÷£¬£¬£¬Ó°ÏìÁË1058СÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶Á˿ͻ§ÐÕÃû¡¢µØµãºÍÉç»áÇå¾²ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ÒÔ¼°ÈËΪºÍ˰ÊյȲÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓйûÕæ¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬µ«Æ¾Ö¤ÆäÐÎò£¬£¬£¬ËƺõÉæ¼°Æ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¡£¡£¡£¡£Robert Half½¨Òé¿Í»§¸ü¸ÄʹÓÃÁËÏàͬƾ֤µÄÆäËüÕÊ»§£¬£¬£¬²¢½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/staffing-firm-robert-half-says-hackers-targeted-over-1000-customer-accounts
4¡¢Lookout³ÆÌع¤Èí¼þHermitÓëÒâ´óÀûRCS LabÓйØ
6ÔÂ16ÈÕ£¬£¬£¬LookoutµÄ×îÐÂÑо¿½«Ìع¤Èí¼þHermitºÍÒâ´óÀûRCS LabÁªÏµÆðÀ´¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ËûÃÇÔÚ2022Äê4Ô¼ì²âµ½ÁËеÄÑù±¾¡£¡£¡£¡£¡£¡£¡£HermitÊÇÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ£¬£¬£¬¾ßÓжàÖÖ¹¦Ð§£¬£¬£¬¿ÉÂ¼ÖÆÒôƵ¡¢²¦´òºÍÖØ¶¨Ïòµç»°ÒÔ¼°ÍøÂç¶àÖÖÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ëüͨ¹ýSMSÐÂΞÙÐÐÈö²¥£¬£¬£¬Ã°³äÈýÐÇ¡¢VivoºÍOppoµÄÓ¦Ó㬣¬£¬Lookout½«¸ÃÆä¹é×ïÓÚÒâ´óÀûRCS Lab SpAºÍÒ»¼ÒµçÐÅЧÀÍÌṩÉÌTykelab Srl¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/researchers-uncover-hermit-android.html
5¡¢CleafyÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ
CleafyÔÚ6ÔÂ17ÈÕÐû²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£BRATAÓÚ2018Äêµ×Ê×´ÎÔÚ°ÍÎ÷±»·¢Ã÷£¬£¬£¬ÓÚ2021Äê·ºÆðÔÚÅ·ÖÞ¡£¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÔËÓªÍÅ»ïÔÙ´ÎΪ¸ÃAndroid¶ñÒâÈí¼þÌí¼ÓÁ˸ü¶à¹¦Ð§²¢ÇÒË¢ÐÂÁ˹¥»÷Õ½ÂÔ£¬£¬£¬ÏÖÔÚ¸üÇкϸ߼¶Ò»Á¬Íþв(APT)¹¥»÷»î¶¯µÄģʽ¡£¡£¡£¡£¡£¡£¡£Ð°汾µÄBRATA¸ü¾ßÕë¶ÔÐÔ£¬£¬£¬ËüÒ»´ÎÖ»Õë¶ÔÒ»¼Ò½ðÈÚ»ú¹¹£¬£¬£¬Ö»ÓÐÔÚÆä¹¥»÷»î¶¯±äµÃµÍЧʱ²Å»áתÏòÁíÒ»¸öÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬BRATAÌí¼ÓÁ˸ü¶àȨÏÞ£¬£¬£¬ÀýÈç·¢ËͺÍÎüÊÕSMS£¬£¬£¬Õâ¿ÉÓÃÀ´ÇÔÈ¡ÒøÐз¢Ë͸ø¿Í»§µÄÔÝʱÃÜÂë¡£¡£¡£¡£¡£¡£¡£
https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat
6¡¢Trend MicroÐû²¼2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ
6ÔÂ15ÈÕ£¬£¬£¬Trend MicroÐû²¼ÁË2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¶Ô2022ÄêÖÆÔì¡¢µçÁ¦ºÍʯÓͺÍ×ÔÈ»Æø¹«Ë¾µÄ¹¤ÒµÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÁËÊӲ졣¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬ÔÚÒÑÍù12¸öÔÂÖУ¬£¬£¬Ê®·ÖÖ®¾ÅµÄ×éÖ¯µÄÉú²ú»òÄÜÔ´¹©Ó¦¶¼Êܵ½¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¹ØÓÚϵͳÖÐÖ¹µÄÒ»Á¬Ê±¼äºÍ¾¼ÃËðʧ£¬£¬£¬56%µÄÊÜ·ÃÕßÌåÏÖÖÐÖ¹»áÒ»Á¬ËÄÌì»ò¸ü³¤Ê±¼ä£»£»£»£»È¥ÄêµÄƽ¾ù¾¼ÃËðʧԼΪ280ÍòÃÀÔª£»£»£»£»¾¼ÃËðʧ³ýÁ˰üÀ¨ÀÕË÷¹¥»÷µÄÊê½ðÖ®Í⣬£¬£¬ÉÐÓлָ´ÏµÍ³¡¢µÖÓù¹¥»÷ºÍÕÐÆ¸ÌØÊâÔ±¹¤µÄÓöȡ£¡£¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/22/f/state-of-ot-security-2022.html


¾©¹«Íø°²±¸11010802024551ºÅ