¹È¸è½«Ö§¸¶3.91ÒÚÃÀÔª½â¾ö¹ØÓÚAndroidλÖøú×ÙµÄËßËÏ

Ðû²¼Ê±¼ä 2022-11-16
1¡¢¹È¸è½«Ö§¸¶3.91ÒÚÃÀÔª½â¾ö¹ØÓÚAndroidλÖøú×ÙµÄËßËÏ

¾ÝýÌå11ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬¹È¸èÒÑÔÞ³ÉÖ§¸¶3.915ÒÚÃÀÔª£¬£¬£¬£¬£¬À´½â¾öÃÀ¹ú40¸öÖÝÌáÆðµÄ¹ØÓÚÒþ˽µÄËßËÏ¡£¡£¡£¡£¡£¡£¶íÀÕ¸ÔÖÝ×ÜÉó²é³¤³Æ£¬£¬£¬£¬£¬¹È¸èÎóµ¼Óû§ÒÔΪ×Ô¼ºÔÚÕË»§ÉèÖÃÖйرÕÁËλÖøú×Ù£¬£¬£¬£¬£¬¶øÊÂʵÉÏËüÈÔÔÚÍøÂçËûÃǵÄλÖÃÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´ÎÏ¢Õù»¹ÒªÇó¹È¸èÒýÈë¸ü¶àÓû§ÓѺÃÐ͵ÄÕË»§¿ØÖÆ£¬£¬£¬£¬£¬²¢ÏÞÖÆ¹«Ë¾¶ÔijЩÀàÐÍλÖÃÊý¾ÝµÄʹÓúʹ洢¡£¡£¡£¡£¡£¡£°Ä´óÀûÑÇACCCÔøÔÚ8Ô¶Թȸ账ÒÔ6000ÍòÃÀÔªµÄ· £¿ £¿£¿£¿î£¬£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇËüʹÓÃÏàͬµÄÒªÁìÍøÂç°Ä´óÀûÑÇÓû§µÄλÖÃÊý¾Ý½üÁ½Äê¡£¡£¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/google/google-will-pay-391m-to-settle-android-location-tracking-lawsuit/


2¡¢OxeyeÅû¶Spotify BackstageÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î

OxeyeÓÚ11ÔÂ15ÈÕ³ÆÆäÔÚSpotify Backstage·¢Ã÷ÁËÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVSSÆÀ·ÖΪ9.8£©¡£¡£¡£¡£¡£¡£BackstageÊÇSpotifyÓÃÓÚ¹¹½¨¿ª·¢ÕßÃÅ»§µÄ¿ªÔ´Æ½Ì¨£¬£¬£¬£¬£¬Ëü±»°üÀ¨ÃÀ¹úº½¿Õ¹«Ë¾ºÍNetflixµÈ¶à¼Ò×é֯ʹÓᣡ£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔͨ¹ýʹÓÃScaffolder½¹µã²å¼þÖеÄvm2ɳÏäÌÓÒÝÎó²î£¨CVE-2022-36067ÓÖÃûSandbreak£©ÔÚBackstageÓ¦ÓóÌÐòÉÏÖ´ÐÐí§ÒâϵͳÏÂÁî¡£¡£¡£¡£¡£¡£OxeyeÓÚ2022Äê8ÔÂ18ÈÕÏòSpotify±¨¸æÁ˸ÃÎó²î£¬£¬£¬£¬£¬ºóÕßÔÚ8ÔÂ29ÈÕÐû²¼µÄ¸üÐÂ(v 1.5.1)Öнâ¾öÁËÕâ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£

https://www.oxeye.io/blog/remote-code-execution-in-spotifys-backstage

3¡¢Î¢Èí11Ô·ÝÇå¾²¸üпɵ¼ÖÂKerberosÉí·ÝÑéÖ¤·ºÆðÎÊÌâ

¾Ý11ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬Î¢ÈíÏÖÔÚÔÚÊӲ쵼ÖÂÆóÒµÓò¿ØÖÆÆ÷ÔÚ×°Öñ¾ÔÂÇå¾²¸üÐ弗ἮðKerberosµÇ¼ʧ°ÜµÈ¹ýʧµÄÎÊÌâ¡£¡£¡£¡£¡£¡£KerberosÒѾ­È¡´úNTLMЭÒé³ÉΪWindows 2000ÒÔÉÏËùÓа汾ÖÐÓòÅþÁ¬×°±¸µÄĬÈÏÈÏ֤ЭÒé¡£¡£¡£¡£¡£¡£Óöµ½´ËÎÊÌâµÄÓû§¿ÉÄÜ»áÔÚÓò¿ØÖÆÆ÷ÉϵÄÊÂÎñÈÕÖ¾µÄSystem²¿·ÖÊÕµ½Microsoft-Windows-Kerberos-Key-Distribution-CenterÊÂÎñID 14µÄ¹ýʧÊÂÎñ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖÕýÔÚÆð¾¢ÐÞ¸´´ËÎÊÌ⣬£¬£¬£¬£¬²¢Ô¤¼Æ½«ÔÚδÀ´¼¸ÖÜÄÚÌṩ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/microsoft/windows-kerberos-authentication-breaks-after-november-updates/

4¡¢AkamaiÅû¶ÓÃÓÚÍÚ¿óºÍDDoS¹¥»÷µÄжñÒâÈí¼þKmsdBot

AkamaiÓÚ11ÔÂ10ÈÕÅû¶ÁËÒ»¸öÓÉGolang¿ª·¢µÄжñÒâÈí¼þKmsdBot¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃSSH¼ÓÃÜЭÒé½øÈëÄ¿µÄϵͳ£¬£¬£¬£¬£¬Ê¹ÓÃUDP¡¢TCP¡¢HTTP POSTºÍGETÒÔ¼°Í¨¹ýTCPͨѶµÄC2¾ÙÐй¥»÷£¬£¬£¬£¬£¬Ä¿µÄÊÇÍÚ¾ò¼ÓÃÜÇ®±Ò²¢Ö´ÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£¡£ËüÒѱ»·¢Ã÷Õë¶ÔÓÎÏ·ÐÐÒµ¡¢¿Æ¼¼ÐÐÒµºÍºÀ»ªÆû³µÖÆÔìÉ̵ȶà¸öÐÐÒµ£¬£¬£¬£¬£¬²¢Ö§³Ö¶àÖּܹ¹£¬£¬£¬£¬£¬ÀýÈçWinx86¡¢Arm64ºÍmips64¡¢x86_64¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÎªÁËÈÆ¹ý¼ì²â£¬£¬£¬£¬£¬KmsdBot²»»áÔÚ±»Ñ¬È¾µÄϵͳÉϳ¤ÆÚ±£´æ¡£¡£¡£¡£¡£¡£

https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware

5¡¢Cyjax·¢Ã÷FangxiaoÔÚÈ«Çò¹æÄ£ÄڵĴó¹æÄ£´¹Âڻ

11ÔÂ14ÈÕ£¬£¬£¬£¬£¬Cyjax³ÆÆä½üÆÚÊÓ²ìÁËÒ»ÆðÖØ´óµÄ´ó¹æÄ£´¹Âڻ£¬£¬£¬£¬£¬¸Ã»î¶¯Õë¶Ô¶à¸ö±ÊÖ±ÐÐÒµµÄÆóÒµ£¬£¬£¬£¬£¬°üÀ¨ÁãÊÛ¡¢ÒøÐС¢ÂÃÓΡ¢ÖÆÒ©¡¢ÂÃÓκÍÄÜÔ´µÄ400¶à¸ö×ÅÃûÆ·ÅÆ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯±³ºóµÄ¹¥»÷ÕßΪFangxiao£¬£¬£¬£¬£¬×Ô2019ÄêÒÔÀ´Ê¹ÓÃÁËÁè¼Ý42000¸öÓò¡£¡£¡£¡£¡£¡£Í¨³££¬£¬£¬£¬£¬Ä¿µÄ»á±»Öض¨Ïòµ½Óô¹ÂÚÍøÕ¾²¢ÏÂÔØTriadaľÂíµÈ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Fanxgiaoͨ¹ý¶àÖÖÕ½ÂÔÀ´¼á³ÖÄäÃû£¬£¬£¬£¬£¬Æä´ó²¿·Ö»ù´¡ÉèÊ©¶¼Êܵ½CloudFlareµÄ±£»£»£»£»£»¤£¬£¬£¬£¬£¬²¢ÇÒÓòÃû»á°´ÆÚ¸üУ¬£¬£¬£¬£¬½öÔÚ2022Äê10ÔµÄÒ»Ìì¾ÍʹÓÃÁË300¶à¸öеÄÓòÃû¡£¡£¡£¡£¡£¡£

https://www.cyjax.com/2022/11/14/fangxiao-a-chinese-threat-actor/

6¡¢ESETÐû²¼¹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

11ÔÂ14ÈÕ£¬£¬£¬£¬£¬ESETÐû²¼Á˹ØÓÚ2022ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬×ܽáÁË´Ó2022Äê5ÔÂÖÁ8ÔÂβÊӲ졢ÊÓ²ìºÍÆÊÎöµÄAPT×éÖ¯µÄ»î¶¯¡£¡£¡£¡£¡£¡£ÔÚµÚ¶þ¼¾¶È£¬£¬£¬£¬£¬Óë¶íÂÞ˹¡¢ÒÁÀʺͳ¯ÏʵÈÏà¹ØµÄAPT»î¶¯Ã»ÓÐϽµ¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ÈÔÈ»ÊDz¿·ÖAPTÍÅ»ïµÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬ÀýÈçSandworm¡¢Gamaredon¡¢InvisiMole¡¢CallistoºÍTurla¡£¡£¡£¡£¡£¡£³¯ÏÊÏà¹ØµÄ¹¥»÷ÍÅ»ï¶Ôº½¿Õº½Ìì¡¢¹ú·À¹¤ÒµÒÔ¼°½ðÈںͼÓÃÜÇ®±ÒÏà¹Ø×éÖ¯¸ÐÐËȤ£»£»£»£»£»ÔÚÖж«£¬£¬£¬£¬£¬AgriusÖ÷ÒªÕë¶Ô×êʯÐÐÒµµÄÏà¹Ø×éÖ¯¡£¡£¡£¡£¡£¡£

https://www.welivesecurity.com/wp-content/uploads/2022/11/eset_apt_activity_report_t22022.pdf