Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔµ¹ÊÔ­Óɱ»FTC·£¿ £¿£¿£¿£¿ £¿î5.2ÒÚÃÀÔª

Ðû²¼Ê±¼ä 2022-12-20

1¡¢Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔµ¹ÊÔ­Óɱ»FTC·£¿ £¿£¿£¿£¿ £¿î5.2ÒÚÃÀÔª

      

¾Ý12ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬±¤ÀÝÖ®Ò¹µÄÖÆÔìÉÌEpic Games½«Ö§¸¶5.2ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÒÔÏ¢ÕùÓйØÎ¥·´¶ùͯÒþ˽·¨ºÍʹÓÃÆáºÚģʽÓÕʹÊý°ÙÍòÓÎÏ·Íæ¼Ò¾ÙÐÐÎÞÒâÏûºÄµÄÖ¸¿Ø¡£ ¡£¡£FTCÔÚͶËßÖгÆ£¬£¬£¬£¬£¬£¬EpicÔÚδ֪ͨ»òδÕ÷µÃÆäâïÊÑÔ޳ɵÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬ÍøÂç13ËêÒÔÏÂÍæ¼ÒµÄÐÅϢΥ·´ÁËCOPPA£¬£¬£¬£¬£¬£¬±»·£¿ £¿£¿£¿£¿ £¿î2.75ÒÚÃÀÔª¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ëü»¹Ê¹ÓÃÆáºÚģʽÓÕÆ­°üÀ¨¶ùͯºÍÇàÉÙÄêÔÚÄÚµÄFortniteÍæ¼Ò¾ÙÐв»ÐèÒªµÄÓÎÏ·ÄÚ¹ºÖ㬣¬£¬£¬£¬£¬ÐëÏòÊÜÓ°Ïì¿Í»§Ö§¸¶2.45ÒÚÃÀÔªµÄÍ˿ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑË¢ÐÂĬÈÏÒþ˽ÉèÖ㬣¬£¬£¬£¬£¬²¢¸ü¸ÄÁËÖ§¸¶Á÷³ÌÒÔ·À²»ÐëÒªµÄÊÕ·Ñ¡£ ¡£¡£


https://www.bleepingcomputer.com/news/gaming/epic-games-to-pay-520-million-for-privacy-violations-dark-patterns/


2¡¢ºÚ¿Í³öÊ۾ݳÆÊÇ´ÓGeminiÇÔÈ¡µÄ570ÍòÓû§µÄÐÅÏ¢

      

ýÌå12ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ¶à¸ö°µÍøÆ½Ì¨³öÊ۾ݳÆÊÇÀ´×ÔGeminiµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬°üÀ¨570ÍòÓû§µÄÐÅÏ¢¡£ ¡£¡£¼ÓÃÜÇ®±ÒÉúÒâËùGemini½üÆÚÐû²¼Í¨Öª³Æ£¬£¬£¬£¬£¬£¬µÚÈý·½¹©Ó¦ÉÌÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄ¹¥»÷ÕßÇÔÈ¡ÁËGemini¿Í»§µÄÓʼþµØµãºÍµç»°ºÅÂ룬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓпͻ§ÊÕµ½ÁË´¹ÂÚµç×ÓÓʼþ¡£ ¡£¡£¸ÃÊý¾Ý¿âËÆºõÔÚ9ÔÂÆð¾Í×îÏȳöÊÛ£¬£¬£¬£¬£¬£¬µ±ÊǼÛǮΪ30¸ö±ÈÌØ±Ò£¨Ô¼ºÏ520000ÃÀÔª£©¡£ ¡£¡£Gemini½¨Òé¿Í»§Ê¹ÓÃǿʢµÄÉí·ÝÑéÖ¤ÒªÁ죬£¬£¬£¬£¬£¬²¢½¨Ò鼤»î2FA±£»£»£»£»£» £»¤»òʹÓÃÓ²¼þÇå¾²ÃÜÔ¿À´»á¼ûÕÊ»§¡£ ¡£¡£ 


https://securityaffairs.co/wordpress/139742/data-breach/5-7m-gemini-users-leak.html


3¡¢²ÍÒû¿Í»§ÖÎÀíÆ½Ì¨SevenRooms 427GBµÄÊý¾Ýй¶

      

¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÔÚ¹¥»÷Õß³öÊÛ±»µÁÊý¾Ýºó£¬£¬£¬£¬£¬£¬SevenRoomsÈ·ÈÏÆä±¬·¢ÁËÊý¾Ýй¶¡£ ¡£¡£SevenRoomsÊǹú¼ÊÁ¬Ëø²ÍÌüºÍÂùÝЧÀÍÌṩÉÌʹÓõIJÍÌü¿Í»§¹ØÏµÖÎÀí(CRM)ƽ̨£¬£¬£¬£¬£¬£¬°üÀ¨MGM ResortsºÍBloomin' BrandsµÈ¡£ ¡£¡£12ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁËÒ»¸ö427 GBµÄ±¸·ÝÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓйØSevenRooms¿Í»§µÄÐÅÏ¢¡£ ¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÊÇÓÉÓÚSevenRoomsµÚÈý·½¹©Ó¦É̵ÄÎļþ´«Êä½Ó¿ÚÔ⵽δ¾­ÊÚȨ»á¼ûµ¼Öµġ£ ¡£¡£


https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/


4¡¢Ñо¿ÍŶÓÅû¶ÀÖ¸ßBrickLinkÍøÕ¾ÖеÄAPIÇå¾²Îó²î

      

Salt SecurityÔÚ12ÔÂ15ÈÕÅû¶ÁËBrickLinkÍøÕ¾ÖеÄÁ½¸öAPIÎó²î¡£ ¡£¡£BrickLink.comÊÇLEGO GroupµÄ¹Ù·½¶þÊֺ͹Ƕ­Àָ߻ýľÊг¡£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼ÝÒ»°ÙÍòµÄ×¢²á»áÔ±¡£ ¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´½ÓÊÜ»áÔ±ÕÊ»§¡¢»á¼ûºÍÇÔÈ¡´æ´¢ÔÚÆ½Ì¨ÉϵÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬ÉõÖÁ»á¼ûÄÚ²¿Éú²úÊý¾Ý²¢ÆÆËðÄÚ²¿Ð§ÀÍÆ÷¡£ ¡£¡£µÚÒ»¸öÎó²îÊÇÓÅ»ÝȯËÑË÷²¿·ÖµÄ²éÕÒÓû§Ãû¶Ô»°¿òÖеÄXSSÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆÁ´½ÓÔÚÄ¿µÄÖÐ×¢ÈëºÍÖ´ÐдúÂë¡£ ¡£¡£µÚ¶þ¸öÎó²îλÓÚÉÏ´«µ½Çó¹ºÁбíÒ³Ãæ£¬£¬£¬£¬£¬£¬¿Éͨ¹ýXXE¹¥»÷¶ÁÈ¡WebЧÀÍÆ÷ÉϵÄÎļþ²¢Ö´ÐÐSSRF¹¥»÷£¬£¬£¬£¬£¬£¬Õâ¿ÉÄܵ¼ÖÂAWS EC2ÁîÅÆÐ¹Â¶¡£ ¡£¡£


https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis


5¡¢Mandiant·¢Ã÷UNC4166Õë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯

      

¾ÝMandiant 12ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬Æä·¢Ã÷ÁËÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹©Ó¦Á´¹¥»÷»î¶¯¡£ ¡£¡£±»×·×ÙΪUNC4166µÄ¹¥»÷ÍÅ»ïͨ¹ýÎÚ¿ËÀ¼ÓïºÍ¶íÓïµÄTorrentÎļþ¹²ÏíÍøÕ¾£¬£¬£¬£¬£¬£¬·Ö·¢Î±×°³ÉÕýµ±Windows 10×°ÖóÌÐòµÄľÂí»¯ISOÎļþ¡£ ¡£¡£ÕâЩ¶ñÒâ×°ÖóÌÐòÌṩµÄ¶ñÒâÈí¼þÄܹ»´ÓÄ¿µÄÅÌËã»úÍøÂçÊý¾Ý¡¢×°ÖÃÆäËü¶ñÒ⹤¾ß²¢½«ÇÔÈ¡µÄÊý¾Ýй¶µ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£ ¡£¡£ÔÚÆðÔ´Õì֮̽ºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹×°ÖÃÁ˺óÃÅStowaway¡¢BeaconºÍSparepart£¬£¬£¬£¬£¬£¬À´¼á³Ö¶ÔÄ¿µÄµÄ»á¼û¡¢Ö´ÐÐÏÂÁî¡¢´«ÊäÎļþºÍÇÔÊØÐÅÏ¢¡£ ¡£¡£


https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government


6¡¢TrendMicroÐû²¼¹ØÓÚÀÕË÷Èí¼þAgendaµÄÆÊÎö±¨¸æ

      

12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬TrendMicroÐû²¼Á˹ØÓÚÀÕË÷Èí¼þAgendaµÄÆÊÎö±¨¸æ¡£ ¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÓÃRust¿ª·¢µÄAgendaÑù±¾£¬£¬£¬£¬£¬£¬¼ì²âЧ¹ûΪRansom.Win32.AGENDA.THIAFBB¡£ ¡£¡£AgendaÔÚÆäÍøÕ¾ÉÏÐû²¼µÄ±»¹¥»÷×é֯λÓÚ²î±ð¹ú¼Ò£¬£¬£¬£¬£¬£¬Ö÷ÒªÊôÓÚÖÆÔìÒµºÍITÐÐÒµ£¬£¬£¬£¬£¬£¬×ÜÊÕÈëÁè¼Ý5.5ÒÚÃÀÔª¡£ ¡£¡£Óë½ÓÊÜ10¸ö²ÎÊýµÄGolang±äÌå²î±ð£¬£¬£¬£¬£¬£¬Rust±äÌåÖ»½ÓÊÜ3¸ö²ÎÊý£¬£¬£¬£¬£¬£¬Ëü»¹Ê¹ÓüäЪÐÔ¼ÓÃÜÕ½ÂÔÀ´Ìṩ¸ü¿ìµÄ¼ÓÃܲ¢¸üÓÐÓõØÈƹý¼ì²â¡£ ¡£¡£


https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html