ºÚ¿ÍÔÚ°µÍø³öÊÛº¬½ü5ÒÚÌõWhatsAppÓû§¼Í¼µÄÊý¾Ý¿â

Ðû²¼Ê±¼ä 2022-11-28
1¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛº¬½ü5ÒÚÌõWhatsAppÓû§¼Í¼µÄÊý¾Ý¿â

¾ÝCybernewsÔÚ11ÔÂ26ÈÕ±¨µÀ£¬ £¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛÒ»¸ö°üÀ¨2022Äê4.87ÒÚWhatsAppÓû§ÊÖ»úºÅÂëµÄÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¼¯°üÀ¨À´×Ô84¸ö¹ú¼Ò/µØÇøµÄÓû§Êý¾Ý£¬ £¬£¬£¬Éæ¼°ÃÀ¹ú£¨3200Íò£©¡¢°£¼°£¨4500Íò£©¡¢Òâ´óÀû£¨3500Íò£©¡¢É³Ìذ¢À­²®£¨2900Íò£©¡¢·¨¹ú£¨2000Íò£©ºÍÍÁ¶úÆä£¨2000Íò£©¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÒÔ7000ÃÀÔªµÄ¼ÛÇ®³öÊÛÃÀ¹úÊý¾Ý£¬ £¬£¬£¬Ó¢¹úµÄ2500ÃÀÔª£¬ £¬£¬£¬µÂ¹úµÄ2000ÃÀÔª¡£¡£¡£¡£¡£¡£¡£MetaµÄ½²»°ÈË˵£¬ £¬£¬£¬¸Ã±¨¸æÊÇÍÆ²âÐÔ×ӵģ¬ £¬£¬£¬»ùÓÚδ¾­Ö¤ÊµµÄ½ØÍ¼£¬ £¬£¬£¬²¢Ôö²¹Ëµ¸Ã¹«Ë¾Ã»Óз¢Ã÷WhatsAppϵͳÓÐÈκÎÊý¾Ýй¶ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£

https://cybernews.com/news/whatsapp-data-leak/

2¡¢ÐÁÐÁÄÇÌáÖÝÁ¢´óѧÔâµ½ÀÕË÷ÍÅ»ïVice SocietyµÄ¹¥»÷

¾Ý11ÔÂ25ÈÕ±¨µÀ£¬ £¬£¬£¬ÐÁÐÁÄÇÌáÖÝÁ¢ÊÖÒÕºÍÉçÇøÑ§ÔºÔâµ½ÀÕË÷ÍÅ»ïVice SocietyµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚËûÃǵÄÍøÕ¾¹ûÕæÁËÒ»³¤´®±»µÁÎļþ£¬ £¬£¬£¬ÕâЩÎļþµÄÈÕÆÚ´Ó¼¸Äêǰһֱµ½2022Äê11ÔÂ24ÈÕ£¬ £¬£¬£¬ÕâÅúעѧУ²¢Î´Ö§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£¸ÃѧУÒÑ֪ͨÆäѧÉúºÍÔ±¹¤´Ë´Î¹¥»÷ÊÂÎñ£¬ £¬£¬£¬²¢ÌåÏÖÔÚÏßЧÀͺÍÕý³£ÔËÓªµÄ»Ö¸´ÐèÒªÒ»¶Îʱ¼ä¡£¡£¡£¡£¡£¡£¡£Vice Societyºã¾ÃÒÔÀ´Ò»Ö±Õë¶ÔK-12ѧУºÍ´óѧµÈ½ÌÓý»ú¹¹¡£¡£¡£¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-cincinnati-state-college/

3¡¢Sysdig͸¶Áè¼Ý1600¸öDocker Hub¾µÏñÒþ²Ø¶ñÒâ´úÂë

11ÔÂ23ÈÕ£¬ £¬£¬£¬SysdigÐû²¼±¨¸æÍ¸Â¶£¬ £¬£¬£¬1652¸ö¹ûÕæµÄDocker Hub¾µÏñÒþ²ØÁ˶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£×î³£¼ûµÄÀàÐÍÊǼÓÃܿ󹤣¬ £¬£¬£¬ÔÚ608¸öÈÝÆ÷¾µÏñÖз¢Ã÷£¬ £¬£¬£¬ËüÃÇÒÔЧÀÍÆ÷×ÊԴΪĿµÄ£¬ £¬£¬£¬Îª¹¥»÷ÕßÍÚ¾ò¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£Æä´ÎÊÇÒþ²ØÇ¶ÈëʽÉñÃØµÄ¾µÏñ£¬ £¬£¬£¬¹²281¸ö£¬ £¬£¬£¬ÕâЩ¾µÏñÖÐǶÈëÁËSSHÃÜÔ¿¡¢AWSƾ֤¡¢GitHubÁîÅÆºÍNPMÁîÅÆµÈ¡£¡£¡£¡£¡£¡£¡£Sysdig»¹·¢Ã÷Ðí¶à¶ñÒâ¾µÏñʹÓÃÓòÃû·Âðαװ³ÉÕýµ±¾µÏñ£¬ £¬£¬£¬Ö¼ÔÚÈÃÓû§Ñ¬È¾¼ÓÃܿ󹤣¬ £¬£¬£¬ÆäÖÐÁ½¸öÑù±¾Òѱ»ÏÂÔØ½ü17000´Î¡£¡£¡£¡£¡£¡£¡£

https://sysdig.com/blog/analysis-of-supply-chain-attacks-through-public-docker-images/

4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄÖ´·¨Ðж¯HAECHI-III½É»ñ1.3ÒÚÃÀÔª

¾ÝýÌå11ÔÂ24Èճƣ¬ £¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯´úºÅΪHAECHI IIIµÄÖ´·¨Ðж¯£¬ £¬£¬£¬ÒѽɻñÓëÖÖÖÖÍøÂç·¸·¨»î¶¯Ïà¹ØµÄ1.3ÒÚÃÀÔªµÄ×ʲú¡£¡£¡£¡£¡£¡£¡£¸ÃÐж¯µÄʱ¼äΪ2022Äê6ÔÂ28ÈÕÖÁ11ÔÂ23ÈÕ£¬ £¬£¬£¬×ܹ²¾Ð²¶ÁË975ÈË£¬ £¬£¬£¬·âÁ˽ü2800¸öÒøÐкÍÐéÄâ×ʲúÕË»§£¬ £¬£¬£¬²¢½â¾öÁË1600¶àÆð°¸¼þ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÖ´·¨Ðж¯»¹·¢Ã÷ÁË16ÖÖÐµķ¸·¨Ç÷ÊÆ£¬ £¬£¬£¬Éæ¼°ÖÖÖÖÀËÂþȦÌ׺ÍͶ×Êڲƭ»î¶¯£¬ £¬£¬£¬ÕâÓÐÖúÓÚÈ«ÇòÖ´·¨²¿·Ö½ÓÄɸüÓÐÕë¶ÔÐÔµÄÖ´·¨Ðж¯¡£¡£¡£¡£¡£¡£¡£

https://thehackernews.com/2022/11/interpol-seized-130-million-from.html

5¡¢´÷¶û¡¢»ÝÆÕºÍåÚÏëµÄ×°±¸ÈÔʹÓùýʱµÄOpenSSL¼ÓÃÜ¿â

¾ÝýÌå11ÔÂ25ÈÕ±¨µÀ£¬ £¬£¬£¬Binarly·¢Ã÷£¬ £¬£¬£¬´÷¶û¡¢»ÝÆÕºÍåÚÏëµÄ×°±¸ÈÔÔÚʹÓùýʱ°æ±¾µÄOpenSSL¼ÓÃܿ⡣¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬ £¬£¬£¬ÓëåÚÏëThinkpadÆóÒµ×°±¸Ïà¹ØµÄ¹Ì¼þ¾µÏñʹÓÃÁËÈý¸ö²î±ð°æ±¾µÄOpenSSL£º0.9.8zb¡¢1.0.0aºÍ1.0.2j£¬ £¬£¬£¬×îºóÒ»¸ö°æ±¾ÓÚ2018ÄêÐû²¼¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬µ±Éæ¼°µ½±àÒë´úÂëʱ£¬ £¬£¬£¬ÆÈÇÐÐèÒªÒ»¸öÌØÁíÍâSBOMÑéÖ¤²ã£¬ £¬£¬£¬ÒÔ±ãÔÚ¶þ½øÖƲãÃæÉÏÑéÖ¤Ó빩ӦÉÌÌṩµÄÏÖʵSBOMÏàÆ¥ÅäµÄµÚÈý·½ÒÀÀµÐÅÏ¢ÁÐ±í£¬ £¬£¬£¬trust-but-verifÒªÁìÊÇ´¦Öóͷ£SBOM¹ÊÕϺÍïÔÌ­¹©Ó¦Á´Î£º¦µÄ×î¼Ñ·½·¨¡£¡£¡£¡£¡£¡£¡£

https://thehackernews.com/2022/11/dell-hp-and-lenovo-devices-found-using.html

6¡¢Dragos³ÆºÚ¿ÍÍÅ»ïÊÔͼ¹¥»÷ºÉÀ¼Òº»¯×ÔÈ»ÆøÕ¾µÄϵͳ

11ÔÂ27ÈÕ±¨µÀ£¬ £¬£¬£¬ºÚ¿ÍÍÅ»ïXenotimeºÍKamaciteÒ»Ö±ÔÚÊÔͼ¹¥»÷ºÉÀ¼Â¹Ìص¤GasunieÒº»¯×ÔÈ»ÆøÕ¾µÄϵͳ¡£¡£¡£¡£¡£¡£¡£FBI͸¶XenotimeºÍKamaciteÓë¶íÂÞ˹ÓйØÁª¡£¡£¡£¡£¡£¡£¡£ºÉÀ¼¹«Ë¾ElectricIQÒ²±¨¸æËµ£¬ £¬£¬£¬Õë¶ÔÅ·Ö޺ͺÉÀ¼Ö÷Òª»ù´¡ÉèÊ©µÄ»î¶¯ÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£¡£Fox-ITÌåÏÖ£¬ £¬£¬£¬ÓÉÓÚÈ«ÇòÄÜԴΣ»£»£»£»£»£»ú£¬ £¬£¬£¬ºÚ¿ÍÍÅ»ïÒ»Ö±ÔÚ¹¥»÷ÄÜÔ´ÐÐÒµµÄ×éÖ¯£¬ £¬£¬£¬ÌØÊâÊÇÒº»¯×ÔÈ»Æø¹©Ó¦ºÍ·ÖÏúµÄ¹©Ó¦Á´¡£¡£¡£¡£¡£¡£¡£

https://www.databreaches.net/russian-hackers-target-dutch-lng-terminal/