Ñо¿Ö°Ô±Åû¶AWSÖÐʹÓÃAppSyncµÄ¿ç×â»§Îó²îµÄÏêÇé

Ðû²¼Ê±¼ä 2022-11-30
1¡¢Ñо¿Ö°Ô±Åû¶AWSÖÐʹÓÃAppSyncµÄ¿ç×â»§Îó²îµÄÏêÇé

¾Ý11ÔÂ28ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬£¬Ñо¿Ö°Ô±Åû¶ÁËAmazon Web ServicesÖеĿç×â»§Îó²î£¬£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î»ñµÃ¶Ô×ÊԴδ¾­ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¸ÃÎó²îÓë»ìÏýÊðÀíÎÊÌâÓйأ¬£¬£¬ £¬£¬£¬£¬£¬ÊÇÒ»ÖÖÌáȨÎó²î¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÁËAppSyncЧÀÍÀ´¼ç¸ºÆäËûAWSÕË»§ÖеÄIAM½ÇÉ«£¬£¬£¬ £¬£¬£¬£¬£¬ÕâʹµÃ¹¥»÷ÕßÄܹ»½øÈ뵽ĿµÄ×éÖ¯Öв¢»á¼ûÕâЩÕË»§ÖеÄ×ÊÔ´¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2022Äê9ÔÂ1ÈÕ±¨¸æÁ˸ÃÎÊÌ⣬£¬£¬ £¬£¬£¬£¬£¬AWSÓÚ9ÔÂ6ÈÕÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£

https://thehackernews.com/2022/11/researchers-detail-appsync-cross-tenant.html

2¡¢Checkmarx·¢Ã÷ʹÓÃTikTokÌôÕ½À´·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯

CheckmarxÔÚ11ÔÂ28ÈÕ³ÆÆä·¢Ã÷ÁËʹÓÃTikTok¡°ÒþÐÎÌôÕ½¡±·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¡£¡£¸ÃÌôÕ½ÒªÇóÓû§Ê¹ÓÃTikTokµÄ¡°ÉíÌåÒþÐΡ±Â˾µÅÄÉãÂãÌ壬£¬£¬ £¬£¬£¬£¬£¬¸ÃÂ˾µ»á´ÓÊÓÆµÖÐÒÆ³ýÉíÌ岿·Ö²¢ÓÃÄ£ºýÅä¾°È¡´ú¡£¡£¡£¡£¡£¹¥»÷ÕßÖÆ×÷ÁËTikTokÊÓÆµ£¬£¬£¬ £¬£¬£¬£¬£¬Éù³Æ¿ÉÒÔÌṩһÖÖÌØÊâµÄ¹ýÂËÆ÷£¬£¬£¬ £¬£¬£¬£¬£¬Ïû³ýTikTokµÄ¡°ÉíÌåÒþÐΡ±Ð§¹û¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬£¬£¬¸ÃÈí¼þ»á×°ÖÃWASP Stealer£¬£¬£¬ £¬£¬£¬£¬£¬ËüÄܹ»ÇÔÈ¡´æ´¢ÔÚä¯ÀÀÆ÷¡¢¼ÓÃÜÇ®±ÒÇ®°üÖеÄDiscordÕÊ»§¡¢ÃÜÂëºÍÐÅÓÿ¨£¬£¬£¬ £¬£¬£¬£¬£¬ÉõÖÁÊÇÄ¿µÄÅÌËã»úÖеÄÎļþ¡£¡£¡£¡£¡£

https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/

3¡¢BianLianÍÅ»ïÐû²¼´Ó¼ÓÄôóHarry RosenÇÔÈ¡µÄ1GBÊý¾Ý

¾ÝýÌå11ÔÂ25ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬£¬£¬¼ÓÄôóÄÐ×°Á¬ËøµêHarry RosenÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ͸¶¹¥»÷ÀàÐÍ£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°ÊÇ·ñÓ°ÏìÁ˹«Ë¾µÄÔËÓª¡£¡£¡£¡£¡£BianLianÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬ £¬£¬£¬£¬£¬²¢Ðû²¼ÁËÒ»¸ö1 GBµÄÎļþ×÷Ϊ¹¥»÷µÄÖ¤¾Ý£¬£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨Harry RosenµÄGold+¿Í»§ÁÐ±í¡¢ÏúÊÛÐÅÏ¢ºÍÖÖÖÖÆäËüÀàÐ͵ÄÎļþ¡£¡£¡£¡£¡£BianLianÓÚ8Ô·ÝÊ״α»·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬£¬ÀÕË÷Èí¼þÊÇÓÃGoÓïÑÔΪWindowsϵͳ¿ª·¢µÄ£¬£¬£¬ £¬£¬£¬£¬£¬Æä³õʼ»á¼û¿ÉÄÜÊÇͨ¹ýWindows ProxyShellÎó²î»òSonicWall VPN¹Ì¼þÎó²î»ñµÃµÄ¡£¡£¡£¡£¡£

https://www.itworldcanada.com/article/canadian-menswear-chain-harry-rosen-confirms-cyber-attack/515325

4¡¢Ã°³äµÄSMSÓ¦ÓÃSymoo³äµ±ÕÊ»§½¨ÉèЧÀ͵ÄSMSÖмÌ

ýÌå11ÔÂ28Èճƣ¬£¬£¬ £¬£¬£¬£¬£¬ÔÚGoogle PlayÊÐËÁÖÐ100000´ÎÏÂÔØÁ¿µÄð³äAndroid SMSÓ¦Ó㬣¬£¬ £¬£¬£¬£¬£¬ÉñÃØµØ³äµ±Microsoft¡¢Google¡¢Instagram¡¢TelegramºÍFacebookµÈÍøÕ¾µÄÕÊ»§½¨ÉèЧÀ͵ÄSMSÖмÌ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬£¬±»Ñ¬È¾µÄ×°±¸Ëæºó»á×÷Ϊ¡°ÐéÄâºÅÂ롱³ö×⣬£¬£¬ £¬£¬£¬£¬£¬ÓÃÓÚÔÚ½¨ÉèÐÂÕË»§Ê±×ª·¢ÑéÖ¤Óû§µÄÒ»´ÎÐÔÃÜÂë¡£¡£¡£¡£¡£ËäȻδ¾­Ö¤Êµ£¬£¬£¬ £¬£¬£¬£¬£¬µ«¾ÝÐÅSymooÓ¦ÓÃÓÃÓÚÎüÊÕºÍת·¢Ê¹ÓÃActivationPW½¨ÉèÕÊ»§Ê±ÌìÉúµÄOTPÑéÖ¤Âë¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬£¬£¬¸ÃÓ¦ÓÃÈÔÔÚGoogle PlayÉÏ¿ÉÓᣡ£¡£¡£¡£

https://www.bleepingcomputer.com/news/security/malicious-android-app-found-powering-account-creation-service/

5¡¢Group-IB·¢Ã÷¶àÆðÕë¶Ô2022ÄêFIFAÌìϱ­µÄ´¹Âڻ

11ÔÂ29ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬Group-IB͸¶Æä·¢Ã÷¶àÆðÕë¶Ô¿¨Ëþ¶û2022ÄêFIFAÌìϱ­ÃÅÆ±¡¢¹Ù·½ÉÌÆ·ºÍÊÂÇéµÄÕ©Æ­ºÍ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ¿¨Ëþ¶û2022Äê¹Ù·½ÇòÃÔIDÃÅ»§ÍøÕ¾HayyaÉÏ·¢Ã÷ÁË90¶à¸ö¿ÉÄÜÔâµ½ÈëÇÖµÄÕË»§£¬£¬£¬ £¬£¬£¬£¬£¬ÕâÊÇΪÌìϱ­¹ÛÖÚ½¨ÉèµÄÇ¿ÖÆÐÔϵͳ£¬£¬£¬ £¬£¬£¬£¬£¬¿ÉÒÔ½øÈ뿨Ëþ¶û²¢»ñµÃÃÅÆ±ºÍ½»Í¨µÈЧÀÍ¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃRedLineºÍErbiumµÈÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ñµÃÁËÕâЩÕË»§µÄÃÜÂë¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬Group-IB»¹È·¶¨ÁË4ÖÖ²î±ðµÄÕ©Æ­ºÍ´¹ÂÚ¹¥»÷À˳±£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°´ó×Ú¿É´ÓGoogle PlayÊÐËÁÏÂÔØµÄÐéαӦÓᣡ£¡£¡£¡£

https://www.group-ib.com/media-center/press-releases/scammers-on-the-pitch/

6¡¢KasperskyÐû²¼2023Äê¹ØÓÚÏûºÄÕßµÄÍþвµÄÕ¹Íû±¨¸æ

11ÔÂ28ÈÕ£¬£¬£¬ £¬£¬£¬£¬£¬KasperskyÐû²¼ÁË2023Äê¹ØÓÚÏûºÄÕßµÄÍþвµÄÕ¹Íû±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ £¬£¬£¬£¬£¬ÔÚÓÎÏ·ºÍÁ÷ýÌåЧÀÍ·½Ã棬£¬£¬ £¬£¬£¬£¬£¬Óû§½«ÃæÁÙ¸ü¶àµÄÓÎÏ·¶©ÔÄڲƭ¡¢ÓÎÏ·»úµÄǷȱ½«±»Ê¹Óᢹ¥»÷Õß½«ÐèÒªÓÎÏ·ÖеÄÐéÄâÇ®±Ò¡¢¹¥»÷Õß»áʹÓÃÆÚ´ýÒѾõÄÓÎÏ·£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°Á÷ýÌåÈÔ½«Êǹ¥»÷Õßȡ֮²»¾¡µÄÊÕÈëȪԴ£»£»£»£»£»£»£»£»ÔÚÉ罻ýÌåºÍÔªÓîÖæ·½Ã棬£¬£¬ £¬£¬£¬£¬£¬ÐµÄÉ罻ýÌ彫´øÀ´¸ü¶àµÄÒþ˽Σº¦ºÍÔªÓîÖæµÄ¿ª·¢´øÀ´µÄΣº¦£»£»£»£»£»£»£»£»À´×ÔÐÄÀí¿µ½¡Ó¦ÓóÌÐòµÄÊý¾Ý½«ÓÃÓÚ׼ȷ¶¨Î»µÄÉç»á¹¤³Ì¹¥»÷£»£»£»£»£»£»£»£»ÒÔ¼°£¬£¬£¬ £¬£¬£¬£¬£¬ÔÚÏß½ÌÓýƽ̨½«ÎüÒý¸ü¶à·¸·¨»î¶¯µÈ¡£¡£¡£¡£¡£

https://securelist.com/consumer-threats-2023/108112/