Nissan ±±ÃÀÊý¾Ýй¶ӰÏìÁè¼Ý 53000 ÃûÔ±¹¤
Ðû²¼Ê±¼ä 2024-05-175ÔÂ16ÈÕ£¬£¬£¬Nissan North America (Nissan) È¥ÄêÔâÊÜÁËÊý¾Ýй¶£¬£¬£¬ÆäʱÍþвÕßÃé×¼Á˸ù«Ë¾µÄÍⲿ VPN ²¢¹Ø±ÕϵͳÒÔ»ñÈ¡Êê½ð¡£¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌÓÚ 2023 Äê 11 ÔÂÉÏÑ®·¢Ã÷ÁËÕâÒ»Îó²î£¬£¬£¬²¢ÓÚ×î½ü·¢Ã÷¸ÃÊÂÎñ̻¶ÁËÁè¼Ý 53,000 ÃûÏÖÈκÍÀëÈÎÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£Nissan ͸¶£¬£¬£¬ÍþвÐÐΪÕßÃé×¼ÁËÆäÍⲿ VPN£¬£¬£¬È»ºó¹Ø±ÕÁËijЩ¹«Ë¾ÏµÍ³£¬£¬£¬È»ºóË÷ÒªÊê½ð¡£¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£¬£¬£¬ÔÚ¹¥»÷ʱ´úÆäϵͳ¾ùδ¼ÓÃÜ¡£¡£¡£¡£¸Ã¹«Ë¾ÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬Äܹ»ÆÀ¹ÀÇéÐΡ¢×èÖ¹ÊÂÎñ²¢ÖÕÖ¹Íþв¡£¡£¡£¡£ËæºóµÄÊÓ²ìÏÔʾ£¬£¬£¬ºÚ¿Í»á¼ûÁËÍâµØºÍÍøÂç¹²ÏíÉϵÄһЩÎļþ£¬£¬£¬ÆäÖд󲿷ְüÀ¨ÉÌÒµÐÅÏ¢¡£¡£¡£¡£ÔÚÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ·¢³öµÄÊý¾Ýй¶֪ͨÖУ¬£¬£¬¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬Ì»Â¶µÄÏêϸÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼Ò±êʶ·û£¨ÀýÈçÐÕÃû£©ºÍÉç»áÇå¾²ºÅÂ룬£¬£¬²¢ÇÒÍþвÐÐΪÕß»á¼ûµÄÎļþÖв»±£´æ²ÆÎñÏêϸÐÅÏ¢¡£¡£¡£¡£ÈÕ²úÖ¸³ö£¬£¬£¬Ëü²»ÖªµÀ̻¶µÄÊý¾ÝÒѱ»ÀÄÓᣡ£¡£¡£
https://www.bleepingcomputer.com/news/security/nissan-north-america-data-breach-impacts-over-53-000-employees/
2. ÂéÊ¡Àí¹¤Ñ§ÔºµÄѧÉúʹÓÃETHÎó²î¿ÉÇÔÈ¡2500ÍòÃÀÔª
5ÔÂ16ÈÕ£¬£¬£¬Æ¾Ö¤ÃÀ¹ú˾·¨²¿Ðû²¼µÄÆðËßÊ飬£¬£¬ÔÚԼĪ 12 ÃëÄÚ£¬£¬£¬Á½ÃûÊܹý¸ßµÈ½ÌÓýµÄÐÖµÜÉæÏÓͨ¹ý¸Ä¶¯ÒÔÌ«·»Çø¿éÁ´£¬£¬£¬ÒÔÒ»ÖÖǰËùδ¼ûµÄ¼ÓÃÜÇ®±ÒÍýÏëÇÔÈ¡ÁË 2500 ÍòÃÀÔª¡£¡£¡£¡£ÔÚ˾·¨²¿µÄÒ»·ÝÐÂΟåÖУ¬£¬£¬ÃÀ¹úÉó²é¹Ù´ïÃ×°²¡¤ÍþÁ®Ä·Ë¹ (Damian Williams) ÌåÏÖ£¬£¬£¬¸ÃÍýÏëºÜÊÇÖØ´ó£¬£¬£¬ÒÔÖÁÓÚ¡°Ê¹Çø¿éÁ´µÄÍêÕûÐÔÊܵ½ÖÊÒÉ¡±¡£¡£¡£¡£ÍþÁ®Ä·Ë¹Ëµ£º¡°Õâ¶ÔÐÖµÜÔÚÌìÏÂÉÏ×ʢÃûµÄ´óѧ֮һѧϰÅÌËã»ú¿ÆÑ§ºÍÊýѧ£¬£¬£¬¾Ý³ÆÊ¹ÓÃËûÃǵÄרҵÊÖÒպͽÌÓýÀ´¸Ä¶¯ºÍʹÓÃÈ«ÇòÊý°ÙÍòÒÔÌ«·»Óû§ËùÒÀÀµµÄÐÒé¡£¡£¡£¡£¡± ¡°Ò»µ©ËûÃǽ«ÍýÏ븶ÖîʵÑ飬£¬£¬ËûÃǵÄÇÀ½ÙÖ»»¨ÁË 12 Ãë¾ÍÍê³ÉÁË¡£¡£¡£¡£¡± 24 ËêµÄ°²¶«ºÍ 28 ËêµÄղķ˹¡¤ÅåÀ×¶û-²¼°£Åµ±»²¶£¬£¬£¬±»Ö¸¿Ø´®Ä±ÊµÑéµç»ãڲơ¢µç»ãڲƺʹ®Ä±Ï´Ç®¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿ÌåÏÖ£¬£¬£¬ÐÖµÜÁ©¡°Ã¿Ïî×ïÃû×î¸ß¿ÉÅд¦ 20 Äêî¿Ïµ¡±¡£¡£¡£¡£
https://news.hitb.org/content/mit-students-stole-25m-seconds-exploiting-eth-blockchain-bug
3. LinuxϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»ÖØ´óµÄ¶ñÒâÈí¼þѬȾÁ½Äê
5ÔÂ16ÈÕ£¬£¬£¬´Ó 2009 Äê×îÏÈ£¬£¬£¬ÓÃÓÚά»¤ºÍ·Ö·¢ Linux ²Ù×÷ϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»ÖØ´óµÄ¶ñÒâÈí¼þѬȾÁËÁ½Ä꣬£¬£¬ÕâЩ¶ñÒâÈí¼þÏë·¨¿ØÖÆÁË¿ª·¢Ö°Ô±±£»£»£»£»¤×îÑÏÃܵÄ×ÊÔ´Ö®Ò»£º´æ´¢¼ÓÃÜµÄ /etc/shadow Îļþ¡£¡£¡£¡£ÓÐÁè¼Ý 550 ÃûϵͳÓû§µÄÃÜÂëÊý¾Ý¡£¡£¡£¡£Çå¾²¹«Ë¾ ESET µÄÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬´Ë´Î¹¥»÷±³ºóµÄδ֪¹¥»÷ÕßѬȾÁË kernel.org ÄÚµÄÖÁÉÙËĄ̈ЧÀÍÆ÷£¬£¬£¬¸Ã»¥ÁªÍøÓòÖ§³Ö×ÅÖØ´óµÄ Linux ¿ª·¢ºÍ·Ö·¢ÍøÂç¡£¡£¡£¡£ÔÚ»ñµÃÍøÂçÉÏ 551 ¸öÓû§ÕÊ»§µÄ¼ÓÃܹþÏ£Öµºó£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÃÜÂëÆÆ½âÊÖÒÕºÍʹÓöñÒâÈí¼þÄÚÖõĸ߼¶Æ¾Ö¤ÇÔÈ¡¹¦Ð§£¬£¬£¬½«Ò»°ëÃÜÂëת»»ÎªÃ÷ÎÄÃÜÂë¡£¡£¡£¡£´ÓÄÇÀ£¬£¬¹¥»÷ÕßʹÓÃЧÀÍÆ÷·¢ËÍÀ¬»øÓʼþ²¢¾ÙÐÐÆäËûа¶ñ»î¶¯¡£¡£¡£¡£ÕâËĄ̈ЧÀÍÆ÷¿ÉÄÜÔÚ²î±ðʱ¼ä±»Ñ¬È¾ºÍÏû¶¾£¬£¬£¬×îºóÁ½Ì¨Ð§ÀÍÆ÷ÔÚ 2011 ÄêµÄij¸öʱ¼ä»ñµÃÐÞ¸´¡£¡£¡£¡£kernel.org µÄѬȾÊÂÎñÓÚ 2011 ÄêÆØ¹â£¬£¬£¬ÆäʱÄÚºËά»¤Ö°Ô±Í¸Â¶£¬£¬£¬¹¥»÷ÕßÒÔijÖÖ·½·¨Ïë·¨»ñµÃ¶ÔÅþÁ¬µ½¸ÃÓòµÄЧÀÍÆ÷µÄ²»ÊÜÏÞÖÆµÄϵͳ»á¼ûȨÏÞ£¨¼´¡°root¡±£©£¬£¬£¬µ¼Ö 448 ¸öÕÊ»§Ô⵽й¶¡£¡£¡£¡£
https://news.hitb.org/content/linux-maintainers-were-infected-2-years-ssh-dwelling-backdoor-huge-reach
4. FBIµ·»ÙBreachForumsÀÕË÷ÍøÕ¾ºÍÆäTelegramƵµÀ
5ÔÂ15ÈÕ£¬£¬£¬FBI ÓëÌìϸ÷µØµÄ¾¯·½ÁªºÏ¿ØÖÆÁËÀÕË÷Èí¼þ¾¼ÍÍøÕ¾ BreachForums µÄÍøÕ¾ºÍ Telegram ƵµÀ¡£¡£¡£¡£Ö»¹Ü¸ÃÍøÕ¾µÄÔËÓª¶à´Î±»¹Ø±Õ£¬£¬£¬µ«¸ÃÍøÕ¾ÈÔȻһֱ·ºÆð£¬£¬£¬ÏÖÔÚ¾¯Ô±ÔÝʱ¿ØÖÆÁ˸ÃÍøÕ¾¡£¡£¡£¡£¸ÃÍøÕ¾ÏÖÔÚдµÀ£º¡°ÔÚ¹ú¼ÊÏàÖúͬ°éµÄÐÖúÏ£¬£¬£¬Áª°îÊÓ²ì¾ÖºÍ˾·¨²¿ÒѹرոÃÍøÕ¾¡£¡£¡£¡£¡± ¡°ÎÒÃÇÕýÔÚÉó²é¸ÃÍøÕ¾µÄºó¶ËÊý¾Ý¡£¡£¡£¡£ÈôÊÇÄúÓÐÐÅÏ¢ÐèÒª¾Ù±¨ BreachForums ÉϵÄÍøÂç·¸·¨»î¶¯£¬£¬£¬ÇëÁªÏµZ6×ðÁú¿Ê±¡£¡£¡£¡£¡±Õâ´ÎÐж¯ÊÇÓÉÎåÑÛ¹ú¼ÒÒÔ¼°ÈðÊ¿¡¢±ùµººÍÎÚ¿ËÀ¼µÄ¾¯Ô±Ö´Ðеġ£¡£¡£¡£BreachForums ½ÓÊÜÁË֮ǰ±»¹Ø±ÕµÄ RaidForums ÍøÕ¾£¬£¬£¬¸ÃÍøÕ¾ÔÚ¾¯·½µÄÁíÒ»´ÎÁªºÏÐж¯ºóÓÚ 2022 Äê¹Ø±Õ¡£¡£¡£¡£ÕâÁ½¸öÍøÕ¾¶¼ÉúÒâ±»µÁÐÅÏ¢£¬£¬£¬²¢ÇÒÊÇËùνµÄË«ÖØÀÕË÷¹¥»÷µÄÒªº¦£¬£¬£¬ÔÚÕâÖÖ¹¥»÷ÖУ¬£¬£¬Êý¾Ý²»µ«±»¼ÓÃÜÒÔ»ñÈ¡Êê½ð£¬£¬£¬²¢ÇÒ»¹±»ÇÔÈ¡£¬£¬£¬²¢ÓÃÀ´ÍþвÊܺ¦Õߣ¬£¬£¬ÈôÊÇËûÃDz»¸¶¿î£¬£¬£¬¾Í»á̻¶Êý¾Ý¡£¡£¡£¡£
https://www.theregister.com/2024/05/15/fbi_breachforums_ransomware/
5. Wi-Fi ±ê×¼ÖеÄȱÏÝ¿ÉÄܵ¼Ö SSID »ìÏý¹¥»÷
5ÔÂ16ÈÕ£¬£¬£¬±ÈÀûʱ³ãë´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁË IEEE 802.11 Wi-Fi ±ê×¼ÖеÄÒ»¸ö»ù±¾Éè¼ÆÈ±ÏÝ£¬£¬£¬¸ÃȱÏÝΪ¹¥»÷ÕßÌṩÁËÒ»ÖÖÒªÁìÀ´ÓÕÆÊܺ¦ÕßÅþÁ¬µ½±ÈËûÃÇÏëÒªÅþÁ¬µÄÍøÂçÇå¾²ÐԽϵ͵ÄÎÞÏßÍøÂç¡£¡£¡£¡£Æ¾Ö¤ VPN ̸ÂÛÍøÕ¾ Top10VPN µÄ˵·¨£¬£¬£¬´ËÀ๥»÷¿ÉÄÜ»áʹÊܺ¦ÕßÃæÁÙ¸ü¸ßµÄÁ÷Á¿×èµ²ºÍʹÓÃΣº¦¡£¡£¡£¡£¸ÃÍøÕ¾Óë KU Leuven µÄһλÑо¿Ö°Ô±ÏàÖú£¬£¬£¬½«ÔÚº«¹úÊ×¶û¼´½«¾ÙÐеľۻáÉϾÙÐÐÑÝʾ֮ǰÐû²¼ÁËÎó²îÏêϸÐÅÏ¢¡£¡£¡£¡£¸ÃÎó²î±àºÅΪ CVE-2023-52424£¬£¬£¬Ó°ÏìËùÓвÙ×÷ϵͳÉϵÄËùÓÐ Wi-Fi ¿Í»§¶Ë¡£¡£¡£¡£ÊÜÓ°ÏìµÄ Wi-Fi ÍøÂç°üÀ¨»ùÓÚÆÕ±é°²ÅÅµÄ WPA3 ÐÒé¡¢WEP ºÍ 802.11X/EAP µÄÍøÂç¡£¡£¡£¡£Ñо¿Ö°Ô±Ìá³öÁË Wi-Fi ±ê×¼µÄ¸üÐÂÒÔ¼°Ð¡ÎÒ˽¼ÒºÍ×éÖ¯¿ÉÒÔÓÃÀ´½µµÍΣº¦µÄÒªÁì¡£¡£¡£¡£
https://news.hitb.org/content/flaw-wi-fi-standard-can-enable-ssid-confusion-attacks
6. ºÚ¿Í¹¥»÷ Foxit PDF Reader Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý
5ÔÂ15ÈÕ£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÕë¶Ô Foxit Reader Óû§µÄ PDF Îó²î£¬£¬£¬¸ÃÎó²îʹÓÃÁËÒ»¸öÉè¼ÆÈ±ÏÝ£¬£¬£¬¸ÃȱÏÝ»áͨ¹ýĬÈϵġ°È·¶¨¡±Ñ¡ÏîÏÔʾÇå¾²ÖÒÑÔ£¬£¬£¬´Ó¶ø¿ÉÄÜÓÕÆÓû§Ö´ÐжñÒâ´úÂë¡£¡£¡£¡£ÓÉÓÚ¸ÃÎó²îÖ÷ÒªÕë¶Ô Foxit Reader£¬£¬£¬ÓëÐÐÒµ±ê×¼ Adobe Acrobat Reader Ïà±È£¬£¬£¬¸ÃÎó²îÊÇÒ»ÖÖÏÊΪÈËÖªµÄ PDF Éó²éÆ÷£¬£¬£¬Òò´Ë¸ÃÎó²î±»ÆÕ±éʹÓò¢ÈƹýÁ˵䷶µÄ¼ì²âÒªÁì¡£¡£¡£¡£ÓÉÓÚÖÒÑÔÐÂÎŵÄÉè¼ÆÈ±ÏÝ£¬£¬£¬¸£ê¿ÔĶÁÆ÷±£´æÑÏÖØµÄÇå¾²Îó²î£¬£¬£¬ÈôÊÇÓû§ÔÚûÓÐ×Ðϸ˼Á¿µÄÇéÐÎϵ¥»÷Á½´Î£¬£¬£¬¾Í»áÔÚ²»Öª²»¾õÖÐΣº¦ÆäÇå¾²¡£¡£¡£¡£¸ÃÎó²îʹ¹¥»÷ÕßÄܹ»´ÓÔ¶³ÌЧÀÍÆ÷ÏÂÔØ²¢Ö´ÐжñÒâ´úÂ룬£¬£¬´Ó¶ø¿ÉÄÜʹËûÃÇÄܹ»Î´¾ÊÚȨ»á¼ûÓû§µÄϵͳºÍÊý¾Ý¡£¡£¡£¡£¸ÃÎó²îÒÑÔÚÏÖʵÌìÏµĹ¥»÷Öб»Æð¾¢Ê¹Ó㬣¬£¬ÓÃÓÚÖÖÖÖ¶ñÒâÄ¿µÄ£¬£¬£¬°üÀ¨Ìع¤»î¶¯ºÍµç×Ó·¸·¨¡£¡£¡£¡£
https://gbhackers.com/hackers-attack-foxit-pdf-reader-users/


¾©¹«Íø°²±¸11010802024551ºÅ