ºÚ¿ÍÔÚ°µÍø³öÊÛº¬½ü5ÒÚÌõWhatsAppÓû§¼Í¼µÄÊý¾Ý¿â

Ðû²¼Ê±¼ä 2022-11-28
1¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛº¬½ü5ÒÚÌõWhatsAppÓû§¼Í¼µÄÊý¾Ý¿â

¾ÝCybernewsÔÚ11ÔÂ26ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛÒ»¸ö°üÀ¨2022Äê4.87ÒÚWhatsAppÓû§ÊÖ»úºÅÂëµÄÊý¾Ý¿â¡£¡£¡£¡£¡£ ¡£¸ÃÊý¾Ý¼¯°üÀ¨À´×Ô84¸ö¹ú¼Ò/µØÇøµÄÓû§Êý¾Ý£¬£¬ £¬£¬£¬Éæ¼°ÃÀ¹ú£¨3200Íò£©¡¢°£¼°£¨4500Íò£©¡¢Òâ´óÀû£¨3500Íò£©¡¢É³Ìذ¢À­²®£¨2900Íò£©¡¢·¨¹ú£¨2000Íò£©ºÍÍÁ¶úÆä£¨2000Íò£©¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÒÔ7000ÃÀÔªµÄ¼ÛÇ®³öÊÛÃÀ¹úÊý¾Ý£¬£¬ £¬£¬£¬Ó¢¹úµÄ2500ÃÀÔª£¬£¬ £¬£¬£¬µÂ¹úµÄ2000ÃÀÔª¡£¡£¡£¡£¡£ ¡£MetaµÄ½²»°ÈË˵£¬£¬ £¬£¬£¬¸Ã±¨¸æÊÇÍÆ²âÐÔ×ӵ쬣¬ £¬£¬£¬»ùÓÚδ¾­Ö¤ÊµµÄ½ØÍ¼£¬£¬ £¬£¬£¬²¢Ôö²¹Ëµ¸Ã¹«Ë¾Ã»Óз¢Ã÷WhatsAppϵͳÓÐÈκÎÊý¾Ýй¶ÎÊÌâ¡£¡£¡£¡£¡£ ¡£

https://cybernews.com/news/whatsapp-data-leak/

2¡¢ÐÁÐÁÄÇÌáÖÝÁ¢´óѧÔâµ½ÀÕË÷ÍÅ»ïVice SocietyµÄ¹¥»÷

¾Ý11ÔÂ25ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ÐÁÐÁÄÇÌáÖÝÁ¢ÊÖÒÕºÍÉçÇøÑ§ÔºÔâµ½ÀÕË÷ÍÅ»ïVice SocietyµÄ¹¥»÷¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÔÚËûÃǵÄÍøÕ¾¹ûÕæÁËÒ»³¤´®±»µÁÎļþ£¬£¬ £¬£¬£¬ÕâЩÎļþµÄÈÕÆÚ´Ó¼¸Äêǰһֱµ½2022Äê11ÔÂ24ÈÕ£¬£¬ £¬£¬£¬ÕâÅúעѧУ²¢Î´Ö§¸¶Êê½ð¡£¡£¡£¡£¡£ ¡£¸ÃѧУÒÑ֪ͨÆäѧÉúºÍÔ±¹¤´Ë´Î¹¥»÷ÊÂÎñ£¬£¬ £¬£¬£¬²¢ÌåÏÖÔÚÏßЧÀͺÍÕý³£ÔËÓªµÄ»Ö¸´ÐèÒªÒ»¶Îʱ¼ä¡£¡£¡£¡£¡£ ¡£Vice Societyºã¾ÃÒÔÀ´Ò»Ö±Õë¶ÔK-12ѧУºÍ´óѧµÈ½ÌÓý»ú¹¹¡£¡£¡£¡£¡£ ¡£

https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-cincinnati-state-college/

3¡¢Sysdig͸¶Áè¼Ý1600¸öDocker Hub¾µÏñÒþ²Ø¶ñÒâ´úÂë

11ÔÂ23ÈÕ£¬£¬ £¬£¬£¬SysdigÐû²¼±¨¸æÍ¸Â¶£¬£¬ £¬£¬£¬1652¸ö¹ûÕæµÄDocker Hub¾µÏñÒþ²ØÁ˶ñÒâ´úÂë¡£¡£¡£¡£¡£ ¡£×î³£¼ûµÄÀàÐÍÊǼÓÃܿ󹤣¬£¬ £¬£¬£¬ÔÚ608¸öÈÝÆ÷¾µÏñÖз¢Ã÷£¬£¬ £¬£¬£¬ËüÃÇÒÔЧÀÍÆ÷×ÊԴΪĿµÄ£¬£¬ £¬£¬£¬Îª¹¥»÷ÕßÍÚ¾ò¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£ ¡£Æä´ÎÊÇÒþ²ØÇ¶ÈëʽÉñÃØµÄ¾µÏñ£¬£¬ £¬£¬£¬¹²281¸ö£¬£¬ £¬£¬£¬ÕâЩ¾µÏñÖÐǶÈëÁËSSHÃÜÔ¿¡¢AWSƾ֤¡¢GitHubÁîÅÆºÍNPMÁîÅÆµÈ¡£¡£¡£¡£¡£ ¡£Sysdig»¹·¢Ã÷Ðí¶à¶ñÒâ¾µÏñʹÓÃÓòÃû·Âðαװ³ÉÕýµ±¾µÏñ£¬£¬ £¬£¬£¬Ö¼ÔÚÈÃÓû§Ñ¬È¾¼ÓÃܿ󹤣¬£¬ £¬£¬£¬ÆäÖÐÁ½¸öÑù±¾Òѱ»ÏÂÔØ½ü17000´Î¡£¡£¡£¡£¡£ ¡£

https://sysdig.com/blog/analysis-of-supply-chain-attacks-through-public-docker-images/

4¡¢¹ú¼ÊÐ̾¯×éÖ¯µÄÖ´·¨Ðж¯HAECHI-III½É»ñ1.3ÒÚÃÀÔª

¾ÝýÌå11ÔÂ24Èճƣ¬£¬ £¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯´úºÅΪHAECHI IIIµÄÖ´·¨Ðж¯£¬£¬ £¬£¬£¬ÒѽɻñÓëÖÖÖÖÍøÂç·¸·¨»î¶¯Ïà¹ØµÄ1.3ÒÚÃÀÔªµÄ×ʲú¡£¡£¡£¡£¡£ ¡£¸ÃÐж¯µÄʱ¼äΪ2022Äê6ÔÂ28ÈÕÖÁ11ÔÂ23ÈÕ£¬£¬ £¬£¬£¬×ܹ²¾Ð²¶ÁË975ÈË£¬£¬ £¬£¬£¬·âÁ˽ü2800¸öÒøÐкÍÐéÄâ×ʲúÕË»§£¬£¬ £¬£¬£¬²¢½â¾öÁË1600¶àÆð°¸¼þ¡£¡£¡£¡£¡£ ¡£´Ë´ÎÖ´·¨Ðж¯»¹·¢Ã÷ÁË16ÖÖÐµķ¸·¨Ç÷ÊÆ£¬£¬ £¬£¬£¬Éæ¼°ÖÖÖÖÀËÂþȦÌ׺ÍͶ×Êڲƭ»î¶¯£¬£¬ £¬£¬£¬ÕâÓÐÖúÓÚÈ«ÇòÖ´·¨²¿·Ö½ÓÄɸüÓÐÕë¶ÔÐÔµÄÖ´·¨Ðж¯¡£¡£¡£¡£¡£ ¡£

https://thehackernews.com/2022/11/interpol-seized-130-million-from.html

5¡¢´÷¶û¡¢»ÝÆÕºÍåÚÏëµÄ×°±¸ÈÔʹÓùýʱµÄOpenSSL¼ÓÃÜ¿â

¾ÝýÌå11ÔÂ25ÈÕ±¨µÀ£¬£¬ £¬£¬£¬Binarly·¢Ã÷£¬£¬ £¬£¬£¬´÷¶û¡¢»ÝÆÕºÍåÚÏëµÄ×°±¸ÈÔÔÚʹÓùýʱ°æ±¾µÄOpenSSL¼ÓÃܿ⡣¡£¡£¡£¡£ ¡£Ñо¿·¢Ã÷£¬£¬ £¬£¬£¬ÓëåÚÏëThinkpadÆóÒµ×°±¸Ïà¹ØµÄ¹Ì¼þ¾µÏñʹÓÃÁËÈý¸ö²î±ð°æ±¾µÄOpenSSL£º0.9.8zb¡¢1.0.0aºÍ1.0.2j£¬£¬ £¬£¬£¬×îºóÒ»¸ö°æ±¾ÓÚ2018ÄêÐû²¼¡£¡£¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬µ±Éæ¼°µ½±àÒë´úÂëʱ£¬£¬ £¬£¬£¬ÆÈÇÐÐèÒªÒ»¸öÌØÁíÍâSBOMÑéÖ¤²ã£¬£¬ £¬£¬£¬ÒÔ±ãÔÚ¶þ½øÖƲãÃæÉÏÑéÖ¤Ó빩ӦÉÌÌṩµÄÏÖʵSBOMÏàÆ¥ÅäµÄµÚÈý·½ÒÀÀµÐÅÏ¢Áбí£¬£¬ £¬£¬£¬trust-but-verifÒªÁìÊÇ´¦Öóͷ£SBOM¹ÊÕϺÍïÔÌ­¹©Ó¦Á´Î£º¦µÄ×î¼Ñ·½·¨¡£¡£¡£¡£¡£ ¡£

https://thehackernews.com/2022/11/dell-hp-and-lenovo-devices-found-using.html

6¡¢Dragos³ÆºÚ¿ÍÍÅ»ïÊÔͼ¹¥»÷ºÉÀ¼Òº»¯×ÔÈ»ÆøÕ¾µÄϵͳ

11ÔÂ27ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ºÚ¿ÍÍÅ»ïXenotimeºÍKamaciteÒ»Ö±ÔÚÊÔͼ¹¥»÷ºÉÀ¼Â¹Ìص¤GasunieÒº»¯×ÔÈ»ÆøÕ¾µÄϵͳ¡£¡£¡£¡£¡£ ¡£FBI͸¶XenotimeºÍKamaciteÓë¶íÂÞ˹ÓйØÁª¡£¡£¡£¡£¡£ ¡£ºÉÀ¼¹«Ë¾ElectricIQÒ²±¨¸æËµ£¬£¬ £¬£¬£¬Õë¶ÔÅ·Ö޺ͺÉÀ¼Ö÷Òª»ù´¡ÉèÊ©µÄ»î¶¯ÓÐËùÔöÌí¡£¡£¡£¡£¡£ ¡£Fox-ITÌåÏÖ£¬£¬ £¬£¬£¬ÓÉÓÚÈ«ÇòÄÜԴΣ»£»£»£»ú£¬£¬ £¬£¬£¬ºÚ¿ÍÍÅ»ïÒ»Ö±ÔÚ¹¥»÷ÄÜÔ´ÐÐÒµµÄ×éÖ¯£¬£¬ £¬£¬£¬ÌØÊâÊÇÒº»¯×ÔÈ»Æø¹©Ó¦ºÍ·ÖÏúµÄ¹©Ó¦Á´¡£¡£¡£¡£¡£ ¡£

https://www.databreaches.net/russian-hackers-target-dutch-lng-terminal/