ºÚ¿ÍʹÓõÚÈý·½Îó²îÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢

Ðû²¼Ê±¼ä 2024-12-31

1. ºÚ¿ÍʹÓõÚÈý·½Îó²îÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢


12ÔÂ28ÈÕ£¬ZAGG Inc.ÊÇÒ»¼Ò×ÅÃûµÄÏûºÄµç×ÓÅä¼þÖÆÔìÉÌ£¬¿ËÈÕÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ¡£ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µç×ÓÉÌÎñÌṩÉÌBigCommerceµÄµÚÈý·½Ó¦ÓóÌÐòFreshClicks£¬²¢ÔÚÆäÖÐ×¢ÈëÁ˶ñÒâ´úÂ룬µ¼ÖÂÔÚ2024Äê10ÔÂ26ÈÕÖÁ11ÔÂ7ÈÕʱ´ú£¬zagg.comÉϲ¿·Ö¹ºÎïÕßµÄÐÅÓÿ¨Êý¾Ý±»Ð¹Â¶¡£ÕâЩ鶵ÄÊý¾Ý°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµãºÍÖ§¸¶¿¨ÐÅÏ¢¡£BigCommerceÌåÏÖ£¬Æäϵͳ×Ô¼º²¢Î´ÊÜË𣬶øÊÇÔÚ·¢Ã÷FreshClicksÓ¦ÓÃÔâÈëÇÖºó£¬Á¬Ã¦½«Æä´Ó¿Í»§ÊÐËÁÖÐжÔØ£¬ÒÔɾ³ýËùÓÐÊÜѬȾµÄAPIºÍ¶ñÒâ´úÂë¡£ZAGGÒѽÓÄɵ÷½â²½·¥£¬°üÀ¨Í¨ÖªÁª°îÖ´·¨²¿·ÖºÍî¿Ïµ»ú¹¹£¬²¢ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÃâ·ÑµÄ12¸öÔÂÐÅÓüà¿Ø·þÎñ¡£Í¬Ê±£¬ZAGG»¹½¨ÒéÊÕ¼þÈËÇ×½ü¼à¿Ø½ðÈÚÕË»§Ô˶¯£¬ÉèÖÃڲƭ¾¯±¨£¬²¢Ë¼Á¿¶³½áÐÅÓá£È»¶ø£¬ZAGGÉÐδ͸¶ÏêϸÓм¸¶à¿Í»§Êܵ½ÁË´Ë´ÎÇå¾²Îó²îµÄÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/


2. WPA3ЭÒé±£´æÇå¾²Îó²î£¬ºÚ¿Í¿É»ñÈ¡ÍøÂçÃÜÂë


12ÔÂ30ÈÕ£¬Ñо¿Ö°Ô±ÀÖ³ÉÍŽáÁËÖÐÐÄÈ˹¥»÷£¨MITM£©ºÍÉç»á¹¤³ÌѧÊÖÒÕ£¬ÈƹýÁË×îеÄWi-Fi±£»¤Ð­ÒéWPA3£¬»ñÈ¡ÁËÍøÂçÃÜÂë¡£ÕâÏîÑо¿ÓÉÎ÷Ó¡¶È´óѧµÄKyle Chadee¡¢Wayne GoodridgeºÍKoffka KhanÍŶÓÍê³É£¬Õ¹ÏÖÁËWPA3ÕâÒ»×îÐÂÎÞÏßÇå¾²±ê×¼±£´æµÄÇå¾²Îó²î¡£WPA3ÓÚ2018ÄêÍƳö£¬Ö¼ÔÚÌî²¹WPA2µÄȱÏÝ£¬Ìṩ¸üÇ¿µÄÇå¾²ÐÔ£¬ÆäÒªº¦¹¦Ð§Ö®Ò»Îª¡°¶ÔµÈͬʱÈÏÖ¤¡±£¨SAE£©Ð­Ò飬ּÔÚµÖÓùÀëÏß×ֵ乥»÷¡£È»¶ø£¬Ñо¿Ö°Ô±·¢Ã÷£¬Ê¹ÓÃWPA3¹ý¶ÉģʽÖеÄÈõµã£¬Í¨¹ý½µ¼¶¹¥»÷¿É²¶»ñ²¿·ÖWPA3½»»¥ÐÅÏ¢£¬ÔÙÍŽáÉç»á¹¤³ÌѧÊÖÒÕ¼´¿É»Ö¸´ÍøÂçÃÜÂë¡£¹¥»÷Àú³Ì°üÀ¨½µ¼¶¹¥»÷²¶»ñÐÅÏ¢¡¢É¨³ýÓû§ÈÏÖ¤ÒÔ¼°½¨ÉèÐéαÕ˺ŽÓÈëµã»ñÈ¡ÃÜÂë¡£Ñо¿Ö°Ô±Ê¹ÓÃÊ÷Ý®ÅɺͿªÔ´¹¤¾ß½¨Éè¶ñÒâ½ÓÈëµã£¬ÓÕʹÓû§ÊäÈëWi-FiÃÜÂë¾ÙÐÐÑéÖ¤¡£ÕâÏîÑо¿Òý·¢Á˶ÔWPA3Çå¾²ÐԵĵ£ÐÄ£¬ÌØÊâÊÇÔÚÆä¹ý¶ÉģʽÏ£¬Î´ÊµÑé±£»¤ÖÎÀíµÄÓû§Ò×Êܹ¥»÷£¬ÇÒһЩװ±¸ÎÞ·¨ÅþÁ¬µ½WPA3ÍøÂ磬ÓëWi-FiͬÃ˵Ä˵·¨Ïàì¶Ü¡£Ö»¹Ü¹¥»÷ÐèÌض¨Ìõ¼þºÍÓû§½»»¥£¬µ«ÈÔչʾÁ˱£»¤ÎÞÏßÍøÂçÃæÁÙµÄÌôÕ½¡£


https://cybersecuritynews.com/researchers-bypass-wpa3-password/#google_vignette


3. ΢Èí½ôÆÈÒªÇó.NET¿ª·¢Õ߸üÐÂÓ¦ÓóÌÐò


12ÔÂ30ÈÕ£¬Î¢ÈíÕý½ôÆÈÒªÇó.NET¿ª·¢Ö°Ô±¸üÐÂËûÃǵÄÓ¦ÓóÌÐòºÍ¿ª·¢¹ÜµÀ£¬×èֹʹÓü´½«ÒòCDNÌṩÉÌEdgioÐÝÒµ¶ø¹Ø±ÕµÄ¡°azureedge.net¡±ÓòÃûÀ´×°ÖÃ.NET×é¼þ¡£ÌØÊâÊÇ¡°dotnetcli.azureedge.net¡±ºÍ¡°dotnetbuilds.azureedge.net¡±ÕâÁ½¸öÓòÃû½«ÔÚδÀ´¼¸¸öÔÂÄÚÏÂÏߣ¬¿ÉÄÜÓ°ÏìÒÀÀµËüÃǵÄÏîÄ¿¹¦Ð§¡£Î¢ÈíÚ¹ÊÍ£¬ËûÃÇά»¤µÄ¶à¸öCDNʵÀýÖУ¬²¿·ÖÒÔ¡°azureedge.net¡±×îºóµÄÓòÃûÓÉEdgioÍйÜ£¬¸Ã¹«Ë¾¼´½«×èÖ¹ÔËÓª£¬Òò´ËÐèҪǨá㵽еÄCDN²¢Ê¹ÓÃÐÂÓòÃû¡£Î¢Èí½¨Ò鿪·¢Ö°Ô±ËÑË÷²¢Ìæ»»´úÂë¡¢¾ç±¾ºÍÉèÖÃÖжÔazureedge.netµÄÒýÓÃΪbuilds.dotnet.microsoft.com¡£¹ý¶Éʱ´ú£¬ÐÂÓòÃû½«ÓÉEdgio¡¢AkamaiºÍAzure Front DoorÍŽáÌṩ·þÎñ¡£CI/CDÍŶÓÐèÈ·±£GitHub ActionsºÍAzure DevOpsʹÃü¸üÐÂΪ֧³ÖÐÂÓòµÄ°æ±¾¡£±ðµÄ£¬ÐèÉèÖ÷À»ðǽÒÔÔÊÐíÀ´×ÔÐÂλÖõÄÁ÷Á¿¡£Ö»¹Ü΢ÈíÒÑÓµÓÐÕâЩÓòÃûµÄËùÓÐȨ£¬µ«ÈÔÐè¾ÙÐÐÓòÃûǨá㣬ÒÔ×èÖ¹ÔËÓªÖÐÖ¹µÄΣº¦¡£ÊÜÓ°ÏìµÄÓû§¿ÉÒÔ¹Ø×¢GitHubÒ³ÃæÉϵÄ״̬¸üС£


https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/


4. µÂ¿ËÈø˹ÖÝÂó¿ËĬÀï´óѧ½ü1.8ÍòÈËСÎÒ˽¼ÒÐÅÏ¢Ôâй¶


12ÔÂ24ÈÕ£¬µÂ¿ËÈø˹ÖÝ°¢±ÈÁÖµÄÂó¿ËĬÀï´óѧ½üÆÚÔâÓöÁËÐÅϢй¶ÊÂÎñ£¬½ü18,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£¸ÃÊÂÎñÓÚ½ñÄê6ÔÂ20ÈÕ±»Ñ§Ð£·¢Ã÷£¬ÆäʱѧУÒâʶµ½ÆäÍøÂç±£´æ¿ÉÒÉÔ˶¯¡£¾­ÓÉÊӲ죬ȷÈÏÒ»Ãûδ֪Éí·ÝµÄÐÐΪÕßÔÚ6ÔÂ18ÈÕÖÁ6ÔÂ20ÈÕʱ´ú»á¼ûÁËѧУµÄ²¿·Öϵͳ²¢¸´ÖÆÁËÎļþ¡£Âó¿ËĬÀï´óѧ¾­ÓɽüÎå¸öÔµÄÊý¾ÝÆÊÎö£¬·¢Ã÷¿ÉÄÜ鶵ÄÐÅÏ¢°üÀ¨ÐÕÃûºÍÉç»á°ü¹ÜºÅÂë¡£¸Ã´óѧÒÑÏòÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÐÅÓüà¿Ø·þÎñ£¬²¢ÕýÔÚÔöÇ¿°ü¹Ü²½·¥ºÍÔ±¹¤Åàѵ¡£Ñ§Êõ»ú¹¹¾­³£³ÉΪÍøÂç¹¥»÷µÄÄ¿µÄ£¬ÓÉÓÚËüÃÇ´¦Öóͷ£´ó×ÚСÎÒ˽¼ÒÐÅÏ¢ºÍ¸ß¼ÛÖµÊý¾Ý£¬½üÄêÀ´ÒÑÓжàÆðÀàËÆÊÂÎñ±»±¨µÀ¡£


https://cybernews.com/news/texas-university-suffers-breach/


5. CISAÐÂÔöÎó²îCVE-2024-3393ÖÁÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


12ÔÂ30ÈÕ£¬CISAÔÚÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐÐÂÔöÁËÒ»¸öÃûΪCVE-2024-3393µÄÐÂÎó²î£¬¸ÃÎó²îÉæ¼°Palo Alto Networks PAN-OSÖÐÃûÌùýʧµÄDNSÊý¾Ý°ü¡£´ËÀàÎó²î³£±»¶ñÒâÍøÂçÐÐΪÕßʹÓ㬴ºÁª°îÆóÒµ×é³ÉÑÏÖØÍþв¡£¡¶²Ù×÷Ö¸Áî¡·22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ»®¶¨ÏÞÆÚÄÚÐÞ¸´ÒÑ·¢Ã÷µÄÎó²î£¬ÒÔ±£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв£¬²¢½¨ÉèÁËÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬×÷Ϊ´ºÁª°îÆóÒµÔì³ÉÖØ´óΣº¦µÄÒÑÖª³£¼ûÎó²îºÍ̻¶(CVE)µÄ¶¯Ì¬Áбí¡£Ö»¹Ü¸ÃÖ¸Áî½öÊÊÓÃÓÚÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×éÖ¯ÓÅÏÈʵʱÐÞ¸´Ä¿Â¼ÖеÄÎó²î£¬ÒÔ½µµÍÔâÊÜÍøÂç¹¥»÷µÄΣº¦¡£CISA½«¼ÌÐø½«ÇкÏÖ¸¶¨±ê×¼µÄÎó²îÌí¼Óµ½¸ÃĿ¼ÖУ¬²¢ÒªÇóÓû§ÔÚʹÓñ¾²úƷʱ×ñÊØÏà¹Ø֪ͨºÍÒþ˽ʹÓÃÕþ²ß¡£


https://www.cisa.gov/news-events/alerts/2024/12/30/cisa-adds-one-known-exploited-vulnerability-catalog


6. SekoiaÍŶÓÒýÁìÈ«ÇòÐж¯£¬ÀÖ³Éɨ³ýÊýǧPlugXÈä³æѬȾϵͳ


12ÔÂ29ÈÕ£¬SekoiaÍþв¼ì²âÓëÑо¿ÍŶÓΪÁ˹¥»÷ÓëMustang Panda×éÖ¯Ïà¹ØµÄPlugXÈä³æ¶ñÒâÈí¼þ£¬½ÓÄÉÁËÒ»Ïîب¹ÅδÓеÄÐж¯¡£¸ÃÐж¯Éæ¼°ÓëÀ´×Ô20¶à¸ö¹ú¼ÒµÄ¹ú¼ÒCERTºÍÖ´·¨»ú¹¹µÄÏàÖú£¬Ö¼ÔÚɨ³ýÊýǧ¸öÊÜѬȾµÄϵͳ¡£SekoiaÍŶÓͨ¹ý¿ØÖÆPlugXÈä³æʹÓõÄÒªº¦IPµØµã£¬ÆÊÎöÁ˶ñÒâÈí¼þµÄÐÐΪ²¢¿ª·¢ÁËÏû¶¾ÒªÁì¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÓû§ÓѺõĽçÃ棬ʹ¼ÓÈë¹úÄܹ»»á¼ûÒªº¦Í³¼ÆÊý¾Ý¡¢¾«×¼ÕûÀíÄ¿µÄºÍÆô¶¯ÌìÏÂÏû¶¾¡£ÎªÁËÈ·±£Çå¾²£¬¸ÃÔ˶¯½ÓÄÉÁË×Ô»ÙÏÂÁî×÷ΪÖ÷ÒªÏû¶¾ÒªÁ죬ÆäÖÐSekoiaµÄSinkhole³äµ±ÖÐÑëÖ¸»Óµã¡£Ð§¹û£¬34¸ö¹ú¼ÒÊÕµ½ÁËÎó²îÈÕÖ¾£¬22¸ö¹ú¼Ò¶ÔÏû¶¾Àú³ÌÌåÏÖ³öŨÖØÐËȤ£¬²¢ÔÚÇ¿ÓÐÁ¦µÄÖ´·¨¿ò¼ÜÖ§³ÖÏ£¬10¸ö¹ú¼ÒÆð¾¢¼ÓÈëÁËÏû¶¾Ðж¯¡£Õâ´ÎÔ˶¯ÀÖ³ÉÏû³ýÁË5,539¸öIPµØµãÉϵÄÍþв£¬¹²·¢ËÍÁË59,475¸öÏû¶¾ÓÐÓÃÔغÉ£¬Ö¤ÊµÎúÖ÷ȨÏû¶¾¿´·¨µÄÓÐÓÃÐÔ¡£


https://securityonline.info/global-cyber-collaboration-takes-down-plugx-worm/