¹ØÓÚÓ¡·¢¡¶AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÈ϶¨ÒªÁì¡·µÄ֪ͨ£»£»£»£»Ñо¿Ö°Ô±Åû¶RuckusÎÞÏß·ÓÉÆ÷ÖеĶà¸öÎó²î

Ðû²¼Ê±¼ä 2019-12-30


1.¹ØÓÚÓ¡·¢¡¶AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÈ϶¨ÒªÁì¡·µÄ֪ͨ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤¡¶¹ØÓÚ¿ªÕ¹AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅϢרÏîÖÎÀíµÄͨ¸æ¡·£¬£¬£¬£¬ £¬Îª¼àÊÓÖÎÀí²¿·ÖÈ϶¨AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÌṩ²Î¿¼£¬£¬£¬£¬ £¬ÎªAppÔËÓªÕß×Ô²é×Ô¾ÀºÍÍøÃñÉç»á¼àÊÓÌṩָÒý£¬£¬£¬£¬ £¬Âäʵ¡¶ÍøÂçÇå¾²·¨¡·µÈÖ´ÂÉÀýÔò£¬£¬£¬£¬ £¬¹ú¼Ò»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒ¡¢¹¤ÒµºÍÐÅÏ¢»¯²¿¡¢¹«°²²¿¡¢Êг¡î¿Ïµ×ܾÖÁªºÏÖÆ¶©ÁË¡¶AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÈ϶¨ÒªÁì¡·¡£¡£¡£¡£ ¡£¡£


  Ô­ÎÄÁ´½Ó£º

http://www.cac.gov.cn/2019-12/27/c_1578986455686625.htm?scene=2&clicktime=1577670801&enterid=1577670801&from=timeline&isappinstalled=0


2.ÎïÁªÍø¹©Ó¦ÉÌWyzeÒâÍâй¶Լ240Íò¿Í»§ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÎïÁªÍø¹©Ó¦ÉÌWyzeÈ·ÈÏÆäÒ»¸öElasticsearchЧÀÍÆ÷й¶ÁËÔ¼240ÍòÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¸ÃÊý¾Ý¿â²¢²»ÊÇÉú²úϵͳ£¬£¬£¬£¬ £¬µ«´æ´¢ÁËÓÐÓõÄÓû§Êý¾Ý£¬£¬£¬£¬ £¬°üÀ¨ÓÃÓÚ½¨ÉèWyzeÕÊ»§µÄµç×ÓÓʼþµØµã¡¢·ÖÅɸøÆäWyzeÇå¾²ÉãÏñ»úµÄÓû§êdzơ¢WiFiÍøÂç±êʶ·ûSSIDÒÔ¼°2.4ÍòÓû§µÄAlexaÁîÅÆµÈ¡£¡£¡£¡£ ¡£¡£¸ÃÊý¾Ý¿âÓÚ12ÔÂ4ÈÕ±»¹ýʧµØÌ»Â¶ÔÚ¹«ÍøÉÏ£¬£¬£¬£¬ £¬Çå¾²¹«Ë¾Twelve SecurityÓÚ12ÔÂ26ÈÕ·¢Ã÷Á˸ÃÊý¾Ý¿â²¢Í¨ÖªÁËWyze£¬£¬£¬£¬ £¬WyzeËæºó¶ÔÊý¾Ý¿â¾ÙÐÐÁ˱£»£»£»£»¤¡£¡£¡£¡£ ¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iot-vendor-wyze-confirms-server-leak/


3.±ÈÀûʱAllianz Partners¹«Ë¾16Íò¿Í»§Êý¾Ý±»µÁ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±ÈÀûʱ°ü¹ÜºÍÔ®Öú¹«Ë¾Allianz Partners³ÆÆäÒ»¸ö°ü¹ÜÏäÓÚ8Ô·ÝÔÚºÉÀ¼±»µÁ£¬£¬£¬£¬ £¬ÆäÖаüÀ¨Óë16Íò¸ö¿Í»§ÓйصÄÔÖÄÑË÷ÅâÏà¹ØÊý¾Ý±¸·Ý¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤¶ÔÓйØÎļþµÄÉó¼ÆºÍÆÊÎö£¬£¬£¬£¬ £¬Ïà¹ØÎļþÊǿͻ§Æ¾Ö¤ÆäÔ®ÖúÌõÔ¼»òÂÃÐаü¹ÜÌá³öÔÖÄÑ»ò¹ÊÕÏË÷ÅâµÄÎļþ±¸·Ý£¬£¬£¬£¬ £¬¸Ã¹«Ë¾ÒÑÏòºÉÀ¼¾¯·½Ìá³öÁËÉêËߣ¬£¬£¬£¬ £¬Ë¾·¨ÊÓ²ìÕýÔÚ¾ÙÐÐÖС£¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾»¹Í¨ÖªÁ˱ÈÀûʱµÄÊý¾Ý±£»£»£»£»¤»ú¹¹£¬£¬£¬£¬ £¬ÏÖÔÚΪֹûÓм£ÏóÅú×¢¹¥»÷Õß¿ÉÒÔ»á¼ûÕâЩ±¸·ÝÎļþÖаüÀ¨µÄÊý¾Ý¡£¡£¡£¡£ ¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.brusselstimes.com/all-news/business/86376/about-160000-belgian-clients-of-allianz-partners-affected-by-strongbox-theft-in-the-netherlands/


4.Áè¼Ý100¸öAndroid APPʹÓÃSoraka¿â¾ÙÐÐ¹ã¸æÚ²Æ­


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÍþвÇ鱨Ñо¿Ð¡×éWhite Ops·¢Ã÷100¶à¸öAPPʹÓÃSoraka¿âÔÚÓû§µÄAndroid×°±¸ÉϾÙÐÐ¹ã¸æÚ²Æ­£¬£¬£¬£¬ £¬Õâ100¶à¸ö¶ñÒâAndroid APPµÄ×ÜÏÂÔØÁ¿´ï460Íò´Î¡£¡£¡£¡£ ¡£¡£Ñо¿ÍŶÓÔÚÆÊÎöÖз¢Ã÷£¬£¬£¬£¬ £¬ÕâЩAPPÒÀÀµÓÚÃûΪAppsFlyerµÄ¿ò¼ÜÀ´¼àÊÓÊÇ·ñΪڲƭÕߵķַ¢ÇþµÀ×°Ö㬣¬£¬£¬ £¬ËüÃǽöÔÚÕâÖÖÇéÐÎϲÅÏÔʾڲƭÐÔ¹ã¸æ¡£¡£¡£¡£ ¡£¡£ÕâЩAPPʹÓöàÖÖ»ùÓÚJavaµÄ³¤ÆÚÐÔ»úÖÆ£¨°üÀ¨ÉèÖþ¯±¨£©À´±£±£´æÊÜѬȾµÄ×°±¸ÉÏ¡£¡£¡£¡£ ¡£¡£AndroidÓû§Ó¦Ð¶ÔØÑо¿ÍŶӼì²âµ½µÄËùÓжñÒâAPP¡£¡£¡£¡£ ¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/over-100-android-apps-used-soraka-package-to-perform-ad-fraud/


5.Ñо¿Ö°Ô±Åû¶RuckusÎÞÏß·ÓÉÆ÷ÖеĶà¸öÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿Ô±Gal Zror·¢Ã÷RuckusÎÞÏß·ÓÉÆ÷±£´æ3¸öRCEÎó²î£¬£¬£¬£¬ £¬²¢Ôڵ¹úÄê¶È»ìãçͨѶ´ó»áÉÏÅû¶ÁËÕâЩ·¢Ã÷¡£¡£¡£¡£ ¡£¡£Zror³ÆÕâЩÎó²î±£´æÓÚUnleashedϵÁзÓÉÆ÷ÔËÐеÄWebÓû§½çÃæÈí¼þÖУ¬£¬£¬£¬ £¬ÎÞÐè·ÓÉÆ÷ÃÜÂë¼´¿ÉʹÓÃÕâЩÎó²î£¬£¬£¬£¬ £¬²¢¿É´ÓInternetÉÏÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄ·ÓÉÆ÷¡£¡£¡£¡£ ¡£¡£ÕâÈý¸öÎó²î¾ù¿ÉÓÃÓÚ»ñȡ·ÓÉÆ÷rootÌØÈ¨£¬£¬£¬£¬ £¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ²»ÊÜÏÞÖÆµØ»á¼û×°±¸ºÍÍøÂç¡£¡£¡£¡£ ¡£¡£RuckusÔÚ²¹¶¡°ü200.7.10.202.92ÖÐÐÞ¸´ÁËÕâЩÎó²î£¬£¬£¬£¬ £¬µ«Óû§±ØÐè×Ô¼º¸üÐÂÒ×Êܹ¥»÷µÄ×°±¸¡£¡£¡£¡£ ¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/12/28/ruckus-wireless-routers-flaws/


6.LampionľÂíй¥»÷»î¶¯Ö÷ÒªÕë¶ÔÆÏÌÑÑÀ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SI-LAB¼ì²âµ½Î±×°³ÉÆÏÌÑÑÀÕþ¸®²ÆÎñºÍ˰ÊÕµç×ÓÓʼþÈö²¥µÄÐÂľÂíLampion¡£¡£¡£¡£ ¡£¡£¸ÃľÂí¿´ÆðÀ´ÀàËÆÓÚTrojan-Banker.Win32.ChePro¼Ò×壬£¬£¬£¬ £¬µ«¾ÙÐÐÁËˢУ¬£¬£¬£¬ £¬Ê¹ÆäÄÑÒÔ±»¼ì²âºÍÆÊÎö¡£¡£¡£¡£ ¡£¡£Lampion¿ÉÒÔÍøÂçÅÌËã»úÓ²ÅÌ¡¢Ä¿½ñ·­¿ªµÄ´°¿Ú¡¢¼ôÌù°åºÍÒøÐÐÆ¾Ö¤µÈÐÅÏ¢²¢·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£¡£ ¡£¡£¸ÃľÂí£¨P-19-2.dll£©ÔÚVirusTotalÉϵļì²âЧ¹ûΪ12/71£¬£¬£¬£¬ £¬ÕâÅú×¢´ó´ó¶¼·À²¡¶¾ÒýÇæÉÐδ¼ì²âµ½¸Ã¶ñÒâÈí¼þµÄÊðÃû¡£¡£¡£¡£ ¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95731/malware/lampion-malware-targets-portugal.html