Ñо¿Ö°Ô±Åû¶AWSÖÐʹÓÃAppSyncµÄ¿ç×â»§Îó²îµÄÏêÇé

Ðû²¼Ê±¼ä 2022-11-30
1¡¢Ñо¿Ö°Ô±Åû¶AWSÖÐʹÓÃAppSyncµÄ¿ç×â»§Îó²îµÄÏêÇé

¾Ý11ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËAmazon Web ServicesÖеĿç×â»§Îó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î»ñµÃ¶Ô×ÊԴδ¾­ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓë»ìÏýÊðÀíÎÊÌâÓйأ¬£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÌáȨÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÁËAppSyncЧÀÍÀ´¼ç¸ºÆäËûAWSÕË»§ÖеÄIAM½ÇÉ«£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃ¹¥»÷ÕßÄܹ»½øÈ뵽ĿµÄ×éÖ¯Öв¢»á¼ûÕâЩÕË»§ÖеÄ×ÊÔ´¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê9ÔÂ1ÈÕ±¨¸æÁ˸ÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬AWSÓÚ9ÔÂ6ÈÕÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£

https://thehackernews.com/2022/11/researchers-detail-appsync-cross-tenant.html

2¡¢Checkmarx·¢Ã÷ʹÓÃTikTokÌôÕ½À´·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯

CheckmarxÔÚ11ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÃTikTok¡°ÒþÐÎÌôÕ½¡±·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£¸ÃÌôÕ½ÒªÇóÓû§Ê¹ÓÃTikTokµÄ¡°ÉíÌåÒþÐΡ±Â˾µÅÄÉãÂãÌ壬£¬£¬£¬£¬£¬£¬¸ÃÂ˾µ»á´ÓÊÓÆµÖÐÒÆ³ýÉíÌ岿·Ö²¢ÓÃÄ£ºýÅä¾°È¡´ú¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖÆ×÷ÁËTikTokÊÓÆµ£¬£¬£¬£¬£¬£¬£¬Éù³Æ¿ÉÒÔÌṩһÖÖÌØÊâµÄ¹ýÂËÆ÷£¬£¬£¬£¬£¬£¬£¬Ïû³ýTikTokµÄ¡°ÉíÌåÒþÐΡ±Ð§¹û¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ»á×°ÖÃWASP Stealer£¬£¬£¬£¬£¬£¬£¬ËüÄܹ»ÇÔÈ¡´æ´¢ÔÚä¯ÀÀÆ÷¡¢¼ÓÃÜÇ®±ÒÇ®°üÖеÄDiscordÕÊ»§¡¢ÃÜÂëºÍÐÅÓÿ¨£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÊÇÄ¿µÄÅÌËã»úÖеÄÎļþ¡£¡£¡£¡£¡£¡£¡£

https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/

3¡¢BianLianÍÅ»ïÐû²¼´Ó¼ÓÄôóHarry RosenÇÔÈ¡µÄ1GBÊý¾Ý

¾ÝýÌå11ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬¼ÓÄôóÄÐ×°Á¬ËøµêHarry RosenÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ͸¶¹¥»÷ÀàÐÍ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÊÇ·ñÓ°ÏìÁ˹«Ë¾µÄÔËÓª¡£¡£¡£¡£¡£¡£¡£BianLianÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÒ»¸ö1 GBµÄÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Harry RosenµÄGold+¿Í»§ÁÐ±í¡¢ÏúÊÛÐÅÏ¢ºÍÖÖÖÖÆäËüÀàÐ͵ÄÎļþ¡£¡£¡£¡£¡£¡£¡£BianLianÓÚ8Ô·ÝÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÊÇÓÃGoÓïÑÔΪWindowsϵͳ¿ª·¢µÄ£¬£¬£¬£¬£¬£¬£¬Æä³õʼ»á¼û¿ÉÄÜÊÇͨ¹ýWindows ProxyShellÎó²î»òSonicWall VPN¹Ì¼þÎó²î»ñµÃµÄ¡£¡£¡£¡£¡£¡£¡£

https://www.itworldcanada.com/article/canadian-menswear-chain-harry-rosen-confirms-cyber-attack/515325

4¡¢Ã°³äµÄSMSÓ¦ÓÃSymoo³äµ±ÕÊ»§½¨ÉèЧÀ͵ÄSMSÖмÌ

ýÌå11ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬£¬ÔÚGoogle PlayÊÐËÁÖÐ100000´ÎÏÂÔØÁ¿µÄð³äAndroid SMSÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÉñÃØµØ³äµ±Microsoft¡¢Google¡¢Instagram¡¢TelegramºÍFacebookµÈÍøÕ¾µÄÕÊ»§½¨ÉèЧÀ͵ÄSMSÖмÌ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬±»Ñ¬È¾µÄ×°±¸Ëæºó»á×÷Ϊ¡°ÐéÄâºÅÂ롱³ö×⣬£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚ½¨ÉèÐÂÕË»§Ê±×ª·¢ÑéÖ¤Óû§µÄÒ»´ÎÐÔÃÜÂë¡£¡£¡£¡£¡£¡£¡£ËäȻδ¾­Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬µ«¾ÝÐÅSymooÓ¦ÓÃÓÃÓÚÎüÊÕºÍת·¢Ê¹ÓÃActivationPW½¨ÉèÕÊ»§Ê±ÌìÉúµÄOTPÑéÖ¤Âë¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓÃÈÔÔÚGoogle PlayÉÏ¿ÉÓᣡ£¡£¡£¡£¡£¡£

https://www.bleepingcomputer.com/news/security/malicious-android-app-found-powering-account-creation-service/

5¡¢Group-IB·¢Ã÷¶àÆðÕë¶Ô2022ÄêFIFAÌìϱ­µÄ´¹Âڻ

11ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬Group-IB͸¶Æä·¢Ã÷¶àÆðÕë¶Ô¿¨Ëþ¶û2022ÄêFIFAÌìϱ­ÃÅÆ±¡¢¹Ù·½ÉÌÆ·ºÍÊÂÇéµÄÕ©Æ­ºÍ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ¿¨Ëþ¶û2022Äê¹Ù·½ÇòÃÔIDÃÅ»§ÍøÕ¾HayyaÉÏ·¢Ã÷ÁË90¶à¸ö¿ÉÄÜÔâµ½ÈëÇÖµÄÕË»§£¬£¬£¬£¬£¬£¬£¬ÕâÊÇΪÌìϱ­¹ÛÖÚ½¨ÉèµÄÇ¿ÖÆÐÔϵͳ£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ½øÈ뿨Ëþ¶û²¢»ñµÃÃÅÆ±ºÍ½»Í¨µÈЧÀÍ¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃRedLineºÍErbiumµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ñµÃÁËÕâЩÕË»§µÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Group-IB»¹È·¶¨ÁË4ÖÖ²î±ðµÄÕ©Æ­ºÍ´¹ÂÚ¹¥»÷À˳±£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°´ó×Ú¿É´ÓGoogle PlayÊÐËÁÏÂÔØµÄÐéαӦÓᣡ£¡£¡£¡£¡£¡£

https://www.group-ib.com/media-center/press-releases/scammers-on-the-pitch/

6¡¢KasperskyÐû²¼2023Äê¹ØÓÚÏûºÄÕßµÄÍþвµÄÕ¹Íû±¨¸æ

11ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼ÁË2023Äê¹ØÓÚÏûºÄÕßµÄÍþвµÄÕ¹Íû±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚÓÎÏ·ºÍÁ÷ýÌåЧÀÍ·½Ã棬£¬£¬£¬£¬£¬£¬Óû§½«ÃæÁÙ¸ü¶àµÄÓÎÏ·¶©ÔÄڲƭ¡¢ÓÎÏ·»úµÄǷȱ½«±»Ê¹Óᢹ¥»÷Õß½«ÐèÒªÓÎÏ·ÖеÄÐéÄâÇ®±Ò¡¢¹¥»÷Õß»áʹÓÃÆÚ´ýÒѾõÄÓÎÏ·£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Á÷ýÌåÈÔ½«Êǹ¥»÷Õßȡ֮²»¾¡µÄÊÕÈëȪԴ£»£»£»£»£»ÔÚÉ罻ýÌåºÍÔªÓîÖæ·½Ã棬£¬£¬£¬£¬£¬£¬ÐµÄÉ罻ýÌ彫´øÀ´¸ü¶àµÄÒþ˽Σº¦ºÍÔªÓîÖæµÄ¿ª·¢´øÀ´µÄΣº¦£»£»£»£»£»À´×ÔÐÄÀí¿µ½¡Ó¦ÓóÌÐòµÄÊý¾Ý½«ÓÃÓÚ׼ȷ¶¨Î»µÄÉç»á¹¤³Ì¹¥»÷£»£»£»£»£»ÒÔ¼°£¬£¬£¬£¬£¬£¬£¬ÔÚÏß½ÌÓýƽ̨½«ÎüÒý¸ü¶à·¸·¨»î¶¯µÈ¡£¡£¡£¡£¡£¡£¡£

https://securelist.com/consumer-threats-2023/108112/