ºÚ¿ÍʹÓõÚÈý·½Îó²îÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢

Ðû²¼Ê±¼ä 2024-12-31

1. ºÚ¿ÍʹÓõÚÈý·½Îó²îÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢


12ÔÂ28ÈÕ £¬£¬£¬ZAGG Inc.ÊÇÒ»¼Ò×ÅÃûµÄÏûºÄµç×ÓÅä¼þÖÆÔìÉÌ £¬£¬£¬¿ËÈÕÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ¡£ ¡£¡£¡£¡£ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µç×ÓÉÌÎñÌṩÉÌBigCommerceµÄµÚÈý·½Ó¦ÓóÌÐòFreshClicks £¬£¬£¬²¢ÔÚÆäÖÐ×¢ÈëÁ˶ñÒâ´úÂë £¬£¬£¬µ¼ÖÂÔÚ2024Äê10ÔÂ26ÈÕÖÁ11ÔÂ7ÈÕʱ´ú £¬£¬£¬zagg.comÉϲ¿·Ö¹ºÎïÕßµÄÐÅÓÿ¨Êý¾Ý±»Ð¹Â¶¡£ ¡£¡£¡£¡£ÕâЩй¶µÄÊý¾Ý°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµãºÍÖ§¸¶¿¨ÐÅÏ¢¡£ ¡£¡£¡£¡£BigCommerceÌåÏÖ £¬£¬£¬Æäϵͳ×Ô¼º²¢Î´ÊÜË𠣬£¬£¬¶øÊÇÔÚ·¢Ã÷FreshClicksÓ¦ÓÃÔâÈëÇÖºó £¬£¬£¬Á¬Ã¦½«Æä´Ó¿Í»§ÊÐËÁÖÐÐ¶ÔØ £¬£¬£¬ÒÔɾ³ýËùÓÐÊÜѬȾµÄAPIºÍ¶ñÒâ´úÂë¡£ ¡£¡£¡£¡£ZAGGÒѽÓÄɵ÷½â²½·¥ £¬£¬£¬°üÀ¨Í¨ÖªÁª°îÖ´·¨²¿·ÖºÍî¿Ïµ»ú¹¹ £¬£¬£¬²¢ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÃâ·ÑµÄ12¸öÔÂÐÅÓÃ¼à¿ØÐ§ÀÍ¡£ ¡£¡£¡£¡£Í¬Ê± £¬£¬£¬ZAGG»¹½¨ÒéÊÕ¼þÈËÇ×½ü¼à¿Ø½ðÈÚÕË»§»î¶¯ £¬£¬£¬ÉèÖÃڲƭ¾¯±¨ £¬£¬£¬²¢Ë¼Á¿¶³½áÐÅÓᣠ¡£¡£¡£¡£È»¶ø £¬£¬£¬ZAGGÉÐδ͸¶ÏêϸÓм¸¶à¿Í»§Êܵ½ÁË´Ë´ÎÇå¾²Îó²îµÄÓ°Ïì¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/


2. WPA3ЭÒé±£´æÇå¾²Îó²î £¬£¬£¬ºÚ¿Í¿É»ñÈ¡ÍøÂçÃÜÂë


12ÔÂ30ÈÕ £¬£¬£¬Ñо¿Ö°Ô±ÀÖ³ÉÁ¬ÏµÁËÖÐÐÄÈ˹¥»÷£¨MITM£©ºÍÉç»á¹¤³ÌѧÊÖÒÕ £¬£¬£¬ÈƹýÁË×îеÄWi-Fi±£» £»£»£»£»£»¤Ð­ÒéWPA3 £¬£¬£¬»ñÈ¡ÁËÍøÂçÃÜÂë¡£ ¡£¡£¡£¡£ÕâÏîÑо¿ÓÉÎ÷Ó¡¶È´óѧµÄKyle Chadee¡¢Wayne GoodridgeºÍKoffka KhanÍŶÓÍê³É £¬£¬£¬Õ¹ÏÖÁËWPA3ÕâÒ»×îÐÂÎÞÏßÇå¾²±ê×¼±£´æµÄÇå¾²Îó²î¡£ ¡£¡£¡£¡£WPA3ÓÚ2018ÄêÍÆ³ö £¬£¬£¬Ö¼ÔÚÌî²¹WPA2µÄȱÏÝ £¬£¬£¬Ìṩ¸üÇ¿µÄÇå¾²ÐÔ £¬£¬£¬ÆäÒªº¦¹¦Ð§Ö®Ò»Îª¡°¶ÔµÈͬʱÈÏÖ¤¡±£¨SAE£©Ð­Òé £¬£¬£¬Ö¼ÔÚµÖÓùÀëÏß×ֵ乥»÷¡£ ¡£¡£¡£¡£È»¶ø £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬Ê¹ÓÃWPA3¹ý¶ÉģʽÖеÄÈõµã £¬£¬£¬Í¨¹ý½µ¼¶¹¥»÷¿É²¶»ñ²¿·ÖWPA3½»»¥ÐÅÏ¢ £¬£¬£¬ÔÙÁ¬ÏµÉç»á¹¤³ÌѧÊÖÒÕ¼´¿É»Ö¸´ÍøÂçÃÜÂë¡£ ¡£¡£¡£¡£¹¥»÷Àú³Ì°üÀ¨½µ¼¶¹¥»÷²¶»ñÐÅÏ¢¡¢É¨³ýÓû§ÈÏÖ¤ÒÔ¼°½¨ÉèÐéαÕ˺ŽÓÈëµã»ñÈ¡ÃÜÂë¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÊ÷Ý®ÅɺͿªÔ´¹¤¾ß½¨Éè¶ñÒâ½ÓÈëµã £¬£¬£¬ÓÕʹÓû§ÊäÈëWi-FiÃÜÂë¾ÙÐÐÑéÖ¤¡£ ¡£¡£¡£¡£ÕâÏîÑо¿Òý·¢Á˶ÔWPA3Çå¾²ÐԵĵ£ÐÄ £¬£¬£¬ÌØÊâÊÇÔÚÆä¹ý¶ÉģʽÏ £¬£¬£¬Î´ÊµÑé±£» £»£»£»£»£»¤ÖÎÀíµÄÓû§Ò×Êܹ¥»÷ £¬£¬£¬ÇÒһЩװ±¸ÎÞ·¨ÅþÁ¬µ½WPA3ÍøÂç £¬£¬£¬ÓëWi-FiͬÃ˵Ä˵·¨Ïàì¶Ü¡£ ¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÐèÌØ¶¨Ìõ¼þºÍÓû§½»»¥ £¬£¬£¬µ«ÈÔչʾÁ˱£» £»£»£»£»£»¤ÎÞÏßÍøÂçÃæÁÙµÄÌôÕ½¡£ ¡£¡£¡£¡£


https://cybersecuritynews.com/researchers-bypass-wpa3-password/#google_vignette


3. ΢Èí½ôÆÈÒªÇó.NET¿ª·¢Õ߸üÐÂÓ¦ÓóÌÐò


12ÔÂ30ÈÕ £¬£¬£¬Î¢ÈíÕý½ôÆÈÒªÇó.NET¿ª·¢Ö°Ô±¸üÐÂËûÃǵÄÓ¦ÓóÌÐòºÍ¿ª·¢¹ÜµÀ £¬£¬£¬×èֹʹÓü´½«ÒòCDNÌṩÉÌEdgioÐÝÒµ¶ø¹Ø±ÕµÄ¡°azureedge.net¡±ÓòÃûÀ´×°ÖÃ.NET×é¼þ¡£ ¡£¡£¡£¡£ÌØÊâÊÇ¡°dotnetcli.azureedge.net¡±ºÍ¡°dotnetbuilds.azureedge.net¡±ÕâÁ½¸öÓòÃû½«ÔÚδÀ´¼¸¸öÔÂÄÚÏÂÏß £¬£¬£¬¿ÉÄÜÓ°ÏìÒÀÀµËüÃǵÄÏîÄ¿¹¦Ð§¡£ ¡£¡£¡£¡£Î¢ÈíÚ¹ÊÍ £¬£¬£¬ËûÃÇά»¤µÄ¶à¸öCDNʵÀýÖÐ £¬£¬£¬²¿·ÖÒÔ¡°azureedge.net¡±×îºóµÄÓòÃûÓÉEdgioÍÐ¹Ü £¬£¬£¬¸Ã¹«Ë¾¼´½«×èÖ¹ÔËÓª £¬£¬£¬Òò´ËÐèҪǨá㵽еÄCDN²¢Ê¹ÓÃÐÂÓòÃû¡£ ¡£¡£¡£¡£Î¢Èí½¨Ò鿪·¢Ö°Ô±ËÑË÷²¢Ìæ»»´úÂë¡¢¾ç±¾ºÍÉèÖÃÖжÔazureedge.netµÄÒýÓÃΪbuilds.dotnet.microsoft.com¡£ ¡£¡£¡£¡£¹ý¶Éʱ´ú £¬£¬£¬ÐÂÓòÃû½«ÓÉEdgio¡¢AkamaiºÍAzure Front DoorÁªºÏÌṩЧÀÍ¡£ ¡£¡£¡£¡£CI/CDÍŶÓÐèÈ·±£GitHub ActionsºÍAzure DevOpsʹÃü¸üÐÂΪ֧³ÖÐÂÓòµÄ°æ±¾¡£ ¡£¡£¡£¡£±ðµÄ £¬£¬£¬ÐèÉèÖ÷À»ðǽÒÔÔÊÐíÀ´×ÔÐÂλÖõÄÁ÷Á¿¡£ ¡£¡£¡£¡£Ö»¹Ü΢ÈíÒÑÓµÓÐÕâЩÓòÃûµÄËùÓÐȨ £¬£¬£¬µ«ÈÔÐè¾ÙÐÐÓòÃûǨáã £¬£¬£¬ÒÔ×èÖ¹ÔËÓªÖÐÖ¹µÄΣº¦¡£ ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÓû§¿ÉÒÔ¹Ø×¢GitHubÒ³ÃæÉϵÄ״̬¸üС£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/


4. µÂ¿ËÈøË¹ÖÝÂó¿ËĬÀï´óѧ½ü1.8ÍòÈËСÎÒ˽¼ÒÐÅÏ¢Ôâй¶


12ÔÂ24ÈÕ £¬£¬£¬µÂ¿ËÈøË¹Öݰ¢±ÈÁÖµÄÂó¿ËĬÀï´óѧ½üÆÚÔâÓöÁËÐÅϢй¶ÊÂÎñ £¬£¬£¬½ü18,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£ ¡£¡£¡£¡£¸ÃÊÂÎñÓÚ½ñÄê6ÔÂ20ÈÕ±»Ñ§Ð£·¢Ã÷ £¬£¬£¬ÆäʱѧУÒâʶµ½ÆäÍøÂç±£´æ¿ÉÒɻ¡£ ¡£¡£¡£¡£¾­ÓÉÊÓ²ì £¬£¬£¬È·ÈÏÒ»Ãûδ֪Éí·ÝµÄÐÐΪÕßÔÚ6ÔÂ18ÈÕÖÁ6ÔÂ20ÈÕʱ´ú»á¼ûÁËѧУµÄ²¿·Öϵͳ²¢¸´ÖÆÁËÎļþ¡£ ¡£¡£¡£¡£Âó¿ËĬÀï´óѧ¾­ÓɽüÎå¸öÔµÄÊý¾ÝÆÊÎö £¬£¬£¬·¢Ã÷¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨ÐÕÃûºÍÉç»á°ü¹ÜºÅÂë¡£ ¡£¡£¡£¡£¸Ã´óѧÒÑÏòÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÐÅÓÃ¼à¿ØÐ§ÀÍ £¬£¬£¬²¢ÕýÔÚÔöÇ¿°ü¹Ü²½·¥ºÍÔ±¹¤Åàѵ¡£ ¡£¡£¡£¡£Ñ§Êõ»ú¹¹¾­³£³ÉÎªÍøÂç¹¥»÷µÄÄ¿µÄ £¬£¬£¬ÓÉÓÚËüÃÇ´¦Öóͷ£´ó×ÚСÎÒ˽¼ÒÐÅÏ¢ºÍ¸ß¼ÛÖµÊý¾Ý £¬£¬£¬½üÄêÀ´ÒÑÓжàÆðÀàËÆÊÂÎñ±»±¨µÀ¡£ ¡£¡£¡£¡£


https://cybernews.com/news/texas-university-suffers-breach/


5. CISAÐÂÔöÎó²îCVE-2024-3393ÖÁÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


12ÔÂ30ÈÕ £¬£¬£¬CISAÔÚÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐÐÂÔöÁËÒ»¸öÃûΪCVE-2024-3393µÄÐÂÎó²î £¬£¬£¬¸ÃÎó²îÉæ¼°Palo Alto Networks PAN-OSÖÐÃûÌùýʧµÄDNSÊý¾Ý°ü¡£ ¡£¡£¡£¡£´ËÀàÎó²î³£±»¶ñÒâÍøÂçÐÐΪÕßʹÓà £¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÑÏÖØÍþв¡£ ¡£¡£¡£¡£¡¶²Ù×÷Ö¸Áî¡·22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ»®¶¨ÏÞÆÚÄÚÐÞ¸´ÒÑ·¢Ã÷µÄÎó²î £¬£¬£¬ÒÔ±£» £»£»£»£»£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв £¬£¬£¬²¢½¨ÉèÁËÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ £¬£¬£¬×÷Ϊ´ºÁª°îÆóÒµÔì³ÉÖØ´óΣº¦µÄÒÑÖª³£¼ûÎó²îºÍ̻¶(CVE)µÄ¶¯Ì¬Áбí¡£ ¡£¡£¡£¡£Ö»¹Ü¸ÃÖ¸Áî½öÊÊÓÃÓÚÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ £¬£¬£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×éÖ¯ÓÅÏÈʵʱÐÞ¸´Ä¿Â¼ÖеÄÎó²î £¬£¬£¬ÒÔ½µµÍÔâÊÜÍøÂç¹¥»÷µÄΣº¦¡£ ¡£¡£¡£¡£CISA½«¼ÌÐø½«ÇкÏÖ¸¶¨±ê×¼µÄÎó²îÌí¼Óµ½¸ÃĿ¼ÖÐ £¬£¬£¬²¢ÒªÇóÓû§ÔÚʹÓñ¾²úƷʱ×ñÊØÏà¹ØÍ¨ÖªºÍÒþ˽ʹÓÃÕþ²ß¡£ ¡£¡£¡£¡£


https://www.cisa.gov/news-events/alerts/2024/12/30/cisa-adds-one-known-exploited-vulnerability-catalog


6. SekoiaÍŶÓÒýÁìÈ«ÇòÐж¯ £¬£¬£¬ÀÖ³Éɨ³ýÊýǧPlugXÈä³æÑ¬È¾ÏµÍ³


12ÔÂ29ÈÕ £¬£¬£¬SekoiaÍþв¼ì²âÓëÑо¿ÍŶÓΪÁ˹¥»÷ÓëMustang Panda×éÖ¯Ïà¹ØµÄPlugXÈ䳿¶ñÒâÈí¼þ £¬£¬£¬½ÓÄÉÁËÒ»ÏîØ¨¹ÅδÓеÄÐж¯¡£ ¡£¡£¡£¡£¸ÃÐж¯Éæ¼°ÓëÀ´×Ô20¶à¸ö¹ú¼ÒµÄ¹ú¼ÒCERTºÍÖ´·¨»ú¹¹µÄÏàÖú £¬£¬£¬Ö¼ÔÚɨ³ýÊýǧ¸öÊÜѬȾµÄϵͳ¡£ ¡£¡£¡£¡£SekoiaÍŶÓͨ¹ý¿ØÖÆPlugXÈä³æÊ¹ÓõÄÒªº¦IPµØµã £¬£¬£¬ÆÊÎöÁ˶ñÒâÈí¼þµÄÐÐΪ²¢¿ª·¢ÁËÏû¶¾ÒªÁì¡£ ¡£¡£¡£¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÓû§ÓѺõĽçÃæ £¬£¬£¬Ê¹¼ÓÈë¹úÄܹ»»á¼ûÒªº¦Í³¼ÆÊý¾Ý¡¢¾«×¼ÕûÀíÄ¿µÄºÍÆô¶¯ÌìÏÂÏû¶¾¡£ ¡£¡£¡£¡£ÎªÁËÈ·±£Çå¾² £¬£¬£¬¸Ã»î¶¯½ÓÄÉÁË×Ô»ÙÏÂÁî×÷ΪÖ÷ÒªÏû¶¾ÒªÁì £¬£¬£¬ÆäÖÐSekoiaµÄSinkhole³äµ±ÖÐÑëÖ¸»Óµã¡£ ¡£¡£¡£¡£Ð§¹û £¬£¬£¬34¸ö¹ú¼ÒÊÕµ½ÁËÎó²îÈÕÖ¾ £¬£¬£¬22¸ö¹ú¼Ò¶ÔÏû¶¾Àú³ÌÌåÏÖ³öō֨ÐËȤ £¬£¬£¬²¢ÔÚÇ¿ÓÐÁ¦µÄÖ´·¨¿ò¼ÜÖ§³ÖÏ £¬£¬£¬10¸ö¹ú¼ÒÆð¾¢¼ÓÈëÁËÏû¶¾Ðж¯¡£ ¡£¡£¡£¡£Õâ´Î»î¶¯ÀÖ³ÉÏû³ýÁË5,539¸öIPµØµãÉϵÄÍþв £¬£¬£¬¹²·¢ËÍÁË59,475¸öÏû¶¾ÓÐÓÃÔØºÉ £¬£¬£¬Ö¤ÊµÎúÖ÷ȨÏû¶¾¿´·¨µÄÓÐÓÃÐÔ¡£ ¡£¡£¡£¡£


https://securityonline.info/global-cyber-collaboration-takes-down-plugx-worm/