TwitterÍøÂçÓû§ÐÅÏ¢¶¨ÏòÍÆËÍ¹ã¸æ±»·£¿£¿£¿£¿£¿£¿î1.5ÒÚÃÀÔª

Ðû²¼Ê±¼ä 2022-05-26

1¡¢TwitterÍøÂçÓû§ÐÅÏ¢¶¨ÏòÍÆËÍ¹ã¸æ±»·£¿£¿£¿£¿£¿£¿î1.5ÒÚÃÀÔª


¾Ý5ÔÂ26ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬ÃÀ¹úÁª°îÉÌҵίԱ»áFTCÒѶÔTwitter·£¿£¿£¿£¿£¿£¿î1.5ÒÚÃÀÔª£¬£¬£¬ £¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇËüʹÓÃÍøÂçµÄ2FAÑéÖ¤µÄµç»°ºÅÂëºÍÓʼþµØµãÀ´ÍÆËÍ¹ã¸æ¡£¡£¡£¡£¡£Æ¾Ö¤·¨Í¥Îļþ£¬£¬£¬ £¬£¬£¬´Ó2013Äê×îÏÈ£¬£¬£¬ £¬£¬£¬TwitterÒªÇóÁè¼Ý1.4ÒÚÓû§ÌṩÕâЩÐÅÏ¢ÒÔ±£»£»£»£»£»¤ËûÃǵÄÕË»§£¬£¬£¬ £¬£¬£¬µ«Ã»ÓÐ֪ͨËûÃÇÕâЩÊý¾ÝÒ²½«ÓÃÓÚ¹ã¸æÉÌͶ·Å¹ã¸æ¡£¡£¡£¡£¡£FTCÖ÷ϯ³Æ£¬£¬£¬ £¬£¬£¬TwitterÒÔÓÃÓÚÇ徲ĿµÄΪÄó´Ê´ÓÓû§ÄÇÀï»ñÈ¡Êý¾Ý£¬£¬£¬ £¬£¬£¬µ«×îÖÕ»¹Ê¹ÓÃÕâЩÊý¾ÝÀ´Õë¶ÔÓû§Í¶·Å¹ã¸æ£¬£¬£¬ £¬£¬£¬ÕâÖÖ×ö·¨Ó°ÏìÁË´ó×ÚÓû§µÄͬʱ»¹ÌáÉýÁËTwitterµÄÊÕÈë¡£¡£¡£¡£¡£TwitterÒÑÔÞ³ÉÖ§¸¶1.5ÒÚÃÀÔªµÄ·£¿£¿£¿£¿£¿£¿î¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/ftc-fines-twitter-150m-for-using-2fa-info-for-targeted-advertising/


2¡¢Ç÷ÊÆ¿Æ¼¼ÐÞ¸´Òѱ»Moshen DragonʹÓõÄDLLÐ®ÖÆÎó²î


¾ÝýÌå5ÔÂ24ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬Ç÷ÊÆ¿Æ¼¼ÐÞ¸´ÆäÇå¾²²úÆ·ÖеÄDLLÐ®ÖÆÎó²î¡£¡£¡£¡£¡£ÕýÈçSentinel LabsÔÚ5Ô³õÅû¶µÄÄÇÑù£¬£¬£¬ £¬£¬£¬Moshen DragonÔÚÕë¶ÔÖÐÑǵĵçÐÅÐÐÒµµÄ¹¥»÷ÖУ¬£¬£¬ £¬£¬£¬ÊÔÍ¼Ð®ÖÆÇå¾²¹©Ó¦É̵ijÌÐò£¬£¬£¬ £¬£¬£¬°üÀ¨Symantec¡¢TrendMicro¡¢BitDefender¡¢McAfeeºÍKaspersky¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶à¸ö¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬²¢Í¨¹ýDLLÐ®ÖÆÀ´²à¼ÓÔØShadowPadºÍPlugX¡£¡£¡£¡£¡£Trend MicroÒÑÓÚ5ÔÂ19ÈÕͨ¹ýÆäActiveUpdate(AU)Ðû²¼ÁËÒ»¸öÐÞ¸´³ÌÐò£¬£¬£¬ £¬£¬£¬²¢½¨ÒéÓû§Á¬Ã¦¾ÙÐиüС£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/131635/hacking/trend-micro-flaw-moshen-dragon.html


3¡¢Ä³ÉèÖùýʧµÄESЧÀÍÆ÷й¶Êý°ÙÍò´û¿îÉêÇëÈ˵ÄÐÅÏ¢


¾Ý5ÔÂ24ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬Ò»¸öÉèÖùýʧµÄElasticsearchЧÀÍÆ÷й¶ÁË147 GBµÄÊý¾Ý£¬£¬£¬ £¬£¬£¬¹²8.7ÒÚÌõ¼Í¼¡£¡£¡£¡£¡£¸ÃЧÀÍÆ÷ÓÚ2021Äê12ÔÂ5ÈÕ±»¼ì²âµ½£¬£¬£¬ £¬£¬£¬Ö÷Òª°üÀ¨ÎÚ¿ËÀ¼¡¢¹þÈø¿Ë˹̹ºÍ¶íÂÞ˹С¶î´û¿îµÄÉêÇëÈ˵ÄÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÈçÐÕÃû¡¢×¡Ö·ºÍ»¤ÕÕºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÒÔ¼°Ð½Ë®¡¢´û¿îÏêÇéºÍINN£¨Ë°ºÅ£©µÈ²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬ £¬£¬£¬Ô¼ÓÐ1000ÍòÓû§Êܵ½Ó°Ï죬£¬£¬ £¬£¬£¬ÆäÖд󲿷ÖЧÀÍÆ÷ÈÕÖ¾ºÍ»¤ÕÕºÅÂëÊôÓÚ¶íÂÞ˹£¬£¬£¬ £¬£¬£¬´ó´ó¶¼INNÊôÓÚÎÚ¿ËÀ¼£¬£¬£¬ £¬£¬£¬¶ø¸ÃЧÀÍÆ÷λÓÚºÉÀ¼µÄ°¢Ä·Ë¹Ìص¤¡£¡£¡£¡£¡£


https://www.hackread.com/personal-data-russians-ukrainians-exposed-online/


4¡¢MozillaÐû²¼¸üÐÂÐÞ¸´Pwn2Own´ó»áÖб»Ê¹ÓõĶà¸öÎó²î


5ÔÂ20ÈÕ£¬£¬£¬ £¬£¬£¬MozillaÐû²¼ÁËFirefoxºÍThunderbirdµÄÇå¾²¸üУ¬£¬£¬ £¬£¬£¬ÒÔÐÞ¸´ÔÚPwn2Own 2022´ó»áʱ´ú±»Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£µÚÒ»¸öÎó²îÊÇTop-Level AwaitʵÏÖÖеÄÔ­ÐÍÁ´ÎÛȾ£¨prototype pollution£©Îó²î£¬£¬£¬ £¬£¬£¬×·×ÙΪCVE-2022-1802£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓÃËüÀ´Ö´ÐÐJavaScript´úÂë¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²î( CVE-2022-1529 ) ÊÇJavaScript¹¤¾ßË÷ÒýÖÐʹÓò»ÊÜÐŵÄÊäÈëµ¼ÖµÄÔ­ÐÍÁ´ÎÛȾÎó²î£¬£¬£¬ £¬£¬£¬¿ÉÓÃÀ´ÔÚÌØÈ¨¸¸Àú³ÌÖÐÖ´ÐÐJavaScript¡£¡£¡£¡£¡£CISAÔÚ5ÔÂ23ÈÕÐû²¼Ç徲ͨ¸æ£¬£¬£¬ £¬£¬£¬½¨ÒéÁ¬Ã¦ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mozilla-fixes-firefox-thunderbird-zero-days-exploited-at-pwn2own/


5¡¢ChromeÀ©Õ¹ScreencastifyÐÞ¸´¿ÉÐ®ÖÆÉãÏñÍ·µÄXSSÎó²î


ýÌå5ÔÂ24Èճƣ¬£¬£¬ £¬£¬£¬Ê¢ÐеÄChromeÀ©Õ¹ScreencastifyÐÞ¸´ÁËÒ»¸öXSSÎó²î¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÓÃÓÚ¼ÆÁ¡¢ÊÓÆµ±à¼­ºÍýÌå¹²ÏíµÄä¯ÀÀÆ÷À©Õ¹£¬£¬£¬ £¬£¬£¬ÔÚChromeÖеÄ×°ÖÃÁ¿Áè¼Ý10000000´Î¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÆôÓÃScreencastifyÂ¼ÖÆÊÓÆµ£¬£¬£¬ £¬£¬£¬²¢½«ÆäÉÏ´«µ½Google Drive¡£¡£¡£¡£¡£»£»£»£»£»¹¿ÉÒÔʹÓÃͬÑùµÄÎó²îÀ´ÇÔÈ¡¹È¸èÇý¶¯Æ÷µÄOAuthÁîÅÆ£¬£¬£¬ £¬£¬£¬²¢ÓÃËüÀ´ÏÂÔØÉÏ´«µÄÊÓÆµ£¬£¬£¬ £¬£¬£¬ÒÔ¼°´æ´¢ÔڹȸèÇý¶¯Æ÷ÉÏµÄÆäËü¹¤¾ß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/screencastify-chrome-extension-flaws-allow-webcam-hijacks/


6¡¢BlackBerryÐû²¼¹ØÓÚChaosбäÌåYashmaµÄÆÊÎö±¨¸æ


5ÔÂ24ÈÕ£¬£¬£¬ £¬£¬£¬BlackBerryÐû²¼Á˹ØÓÚÀÕË÷Èí¼þYashma¼°Æä¼Ò×åµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ChaosÊÇÒ»Öֿɶ¨ÖƵÄÀÕË÷Èí¼þ¹¹½¨Æ÷£¬£¬£¬ £¬£¬£¬ÓÚ2021Äê6ÔÂ9ÈÕÊ״ηºÆð£¬£¬£¬ £¬£¬£¬ÒÑÂÄÀúÁË5´Îµü´ú£¬£¬£¬ £¬£¬£¬YashmaÉù³ÆÊÇËüµÄµÚÁù°æ(v6.0)£¬£¬£¬ £¬£¬£¬ÓÚ2022ÄêµÄÄêÖÐÔÚÒ°Íâ±»·¢Ã÷¡£¡£¡£¡£¡£ChaosµÄǰÈý¸ö°æ±¾Óë¹Å°åµÄÀÕË÷Èí¼þ±ÈÆðÀ´¸üÏñÊǾßÓÐÆÆËðÐԵľÂí£¬£¬£¬ £¬£¬£¬µ«Chaos 4.0½øÒ»²½Ë¢Ð£¬£¬£¬ £¬£¬£¬½«¿É¼ÓÃÜÎļþµÄÉÏÏÞÌá¸ßµ½2.1MB¡£¡£¡£¡£¡£Chaos 5.0ʹÓÃÁËAES-256¼ÓÃÜÄ¿µÄÎļþ£¬£¬£¬ £¬£¬£¬¶øYashmaÓëÉÏÒ»¸ö°æ±¾ÏÕЩÏàͬ£¬£¬£¬ £¬£¬£¬½öÌí¼ÓÁËÁ½ÏîÐ޸ġ£¡£¡£¡£¡£ 


https://blogs.blackberry.com/en/2022/05/yashma-ransomware-tracing-the-chaos-family-tree