¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳй¶ÊýÊ®Íò¹«ÃñµÄÐÅÏ¢
Ðû²¼Ê±¼ä 2022-12-13
¾Ý12ÔÂ11ÈÕ±¨µÀ£¬£¬£¬¼ÓÄô󰲼òªʡµÄÒßÃçÖÎÀíϵͳÊý¾Ýй¶ӰÏìÁËÊýÊ®Íò¹«Ãñ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬´ÓÉÏÖÜÎå×îÏÈ£¬£¬£¬Ô¼360000ÈË»áÊÕµ½Í¨Öª£¬£¬£¬¼û¸æËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2021Äê11ÔÂCOVAXXϵͳÊý¾Ýй¶ÊÂÎñÖÐÊܵ½Ó°Ïì¡£¡£¡£¡£Õþ¸®²¢Î´ËµÃ÷¸ÃÊÂÎñÊÇÔõÑù±¬·¢µÄ£¬£¬£¬µ«ÓÐÁ½ÈËÒòÎ¥¹æ¶ø±»ÆðËߣ¬£¬£¬ÆäÖÐÒ»ÈËÊÇÒßÃçÁªÂçÖÐÐĵĹÍÔ±¡£¡£¡£¡£Æäʱ£¬£¬£¬¼¸¸öͨ¹ýԤԼϵͳԤԼÒßÃç»ò»ñÈ¡ÒßÃçÖ¤ÊéµÄÈ˱¨¸æÁËÀ¬»ø¶ÌÐÅ£¬£¬£¬ÕâЩڲÆÐÔÀ¬»ø¶ÌÐÅÒªÇóÈËÃÇÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£
https://www.cbc.ca/news/canada/toronto/vaccine-data-breach-ontario-1.6680714
2¡¢FortinetÐÞ¸´SSL-VPNÖÐÒѱ»Ê¹ÓõÄCVE-2022-42475
12ÔÂ12ÈÕ£¬£¬£¬FortinetÐû²¼Á˹ØÓÚFortiOS sslvpndÖлùÓڶѵĻº³åÇøÒç³öÎó²î£¨CVE-2022-42475£©µÄÇ徲ͨ¸æ¡£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁî¡£¡£¡£¡£FortinetÔøÓÚ11ÔÂ28ÈÕÔÚFortiOS 7.2.3ÖÖÇÄÇÄÐÞ¸´Á˸ÃÎó²î£¬£¬£¬12ÔÂ12ÈÕFortinetÓÖÐû²¼Í¨¸æÌáÐѸÃÎó²îÒѱ»ÓÃÓÚ¹¥»÷»î¶¯¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾Ã»ÓÐÌṩÓйØÔõÑùʹÓÃÎó²îµÄÐÅÏ¢£¬£¬£¬µ«ËûÃÇ·ÖÏíÁËÓйع¥»÷µÄIOC¡£¡£¡£¡£Fortinet½¨Òé¿Í»§Á¬Ã¦×°Öò¹¶¡¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks/
3¡¢Web Explorer¿Éй¶Óû§ä¯ÀÀ¼Í¼Òѱ»ÏÂÔØÁè¼Ý500Íò´Î
CybernewsÔÚ12ÔÂ9ÈÕ͸¶£¬£¬£¬AndroidÓ¦ÓóÌÐòWeb Explorer ¨C Fast Internetй¶ÁËÓû§µÄä¯ÀÀÀúÊ·¼Í¼¡£¡£¡£¡£ÕâÊÇÒ»¿îä¯ÀÀÓ¦Ó㬣¬£¬ÔÚGoogle PlayÊÐËÁÖеÄÏÂÔØÁ¿Áè¼Ý500Íò´Î¡£¡£¡£¡£Æä¿ª·ÅµÄFirebaseʵÀý̻¶ÁËÓ¦ÓóÌÐòºÍÓû§µÄÊý¾Ý£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ÈôÊǹ¥»÷Õß¶ÔÓ¦ÓõÄÓû§¾ÙÐÐÈ¥ÄäÃû»¯´¦Öóͷ££¬£¬£¬¾ÍÄܹ»Éó²éÓйØÌض¨Óû§ä¯ÀÀÀúÊ·µÄ´ó×ÚÐÅÏ¢£¬£¬£¬²¢ÓÃÓÚÚ²ÆÀÕË÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸ÃÓ¦ÓõĿͻ§¶ËÓÐÓ²±àÂëµÄÃô¸ÐÐÅÏ¢£¬£¬£¬¿É±»¹¥»÷ÕßÌáÈ¡ÓÃÓÚÖÖÖÖ¶ñÒâ»î¶¯¡£¡£¡£¡£
https://cybernews.com/security/android-app-leaked-user-browsing-history/
4¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ýÊ¢ÐеÄWeb·À»ðǽ²¢ÈëÇÖϵͳ
¾ÝýÌå12ÔÂ10ÈÕ±¨µÀ£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬¿ÉÈÆ¹ýÖÖÖÖ¹©Ó¦É̵ÄWebÓ¦ÓóÌÐò·À»ðǽ(WAF)²¢ÈëÇÖϵͳ¡£¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕÉæ¼°½«JSONÓï·¨¸½¼Óµ½WAFÎÞ·¨ÆÊÎöµÄSQL×¢Èëpayload£¬£¬£¬´ó´ó¶¼WAF¶¼¿ÉÒÔÇáËɼì²âµ½SQLi¹¥»÷£¬£¬£¬µ«½«JSON¸½¼Óµ½SQLÓï·¨»áʹWAF¶ÔÕâЩ¹¥»÷ÖÃÈôØèÎÅ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Ñо¿Ö°Ô±ÒÑÀÖ³ÉÈÆ¹ýAWS¡¢Cloudflare¡¢F5¡¢ImpervaºÍPalo Alto NetworksµÈ¹©Ó¦É̵ÄWAF¡£¡£¡£¡£
https://thehackernews.com/2022/12/researchers-detail-new-attack-method-to.html
5¡¢ThreatFabric·¢Ã÷Õë¶ÔAndroidÓ¦ÓõİµÍøÆ½Ì¨Zombinder
ThreatFabricÔÚ12ÔÂ8ÈÕ³ÆÔÚÆÊÎöAndroidľÂíErmacµÄ»î¶¯Ê±£¬£¬£¬·¢Ã÷ÁËʹÓöà¸öľÂí²¢Í¬Ê±Õë¶ÔAndroidºÍWindowsÓû§µÄ»î¶¯¡£¡£¡£¡£³ýÁËErmacÍ⣬£¬£¬¸Ã»î¶¯»¹Éæ¼°Erbium¡¢Aurora stealerºÍLaplas clipperµÈ×ÀÃæ¶ñÒâÈí¼þ¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ñо¿Ö°Ô±»¹ÖصãÏÈÈÝÁËÒ»¸öÐµİµÍøÆ½Ì¨Zombinder£¬£¬£¬Ëü¿É±»¹¥»÷ÕßÓÃÓÚ½«¶ñÒâAPK°ó¶¨µ½Õýµ±µÄAndroidÓ¦Ó㬣¬£¬Ñ¬È¾Ä¿µÄµÄͬʱÈÔÓµÓÐÔʼӦÓõÄËùÓй¦Ð§£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¸Ã»î¶¯Òѹ¥»÷ÁËÊýǧ¸öÄ¿µÄ£¬£¬£¬½öErbium¾ÍÀֳɵشÓ1300¶à¸öÄ¿µÄÄÇÀïÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£
https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html
6¡¢KasperskyÐû²¼¹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
12ÔÂ8ÈÕ£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚJanicab±äÌå¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£ÔÚѰÕÒʹÓÃJanicab¶ñÒâÈí¼þµÄDeathstalker¹¥»÷»î¶¯Ê±£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄJanicab±äÌ壬£¬£¬±»ÓÃÓÚÔÚ2020ÄêÕë¶ÔÖж«Ö´·¨ÐÐÒµµÄ¹¥»÷£¬£¬£¬²¢¿ÉÄÜÔÚ2021ÄêÈÔÈ»»îÔ¾¡£¡£¡£¡£ÓÐȤµÄÊÇ£¬£¬£¬¹¥»÷ÕßÔÚ¼ÌÐøÊ¹ÓÃYouTube¡¢Google+ºÍWordPressÍøÂçЧÀÍ×÷ΪDDR¡£¡£¡£¡£È»¶ø£¬£¬£¬ÊӲ쵽µÄһЩYouTubeÁ´½ÓÊÇδÁгöµÄ£¬£¬£¬¿ÉÒÔ×·Ëݵ½2015Ä꣬£¬£¬ÕâÅú×¢»ù´¡ÉèÊ©µÄ¿ÉÄܱ»Öظ´Ê¹Óᣡ£¡£¡£DeathstalkerÈÔÖ÷ÒªÕë¶Ô״ʦÊÂÎñËùºÍ½ðÈÚ»ú¹¹£¬£¬£¬µ«¶Ô½üÆÚ»î¶¯µÄÆÊÎöÅú×¢ÂÃÐÐÉç¿ÉÄÜÊÇеÄÄ¿µÄÐÐÒµ¡£¡£¡£¡£
https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131/