Avira¸üб£´æBugµ¼ÖÂWindowsÅÌËã»úÔÚÆô¶¯ºóËÀ»ú
Ðû²¼Ê±¼ä 2023-12-14¾ÝýÌå12ÔÂ12ÈÕ±¨µÀ£¬×ÔÉÏÖÜÎåÒÔÀ´£¬Ðí¶àWindowsÓû§±¨¸æÁËϵͳÔÚÆô¶¯ºó²»¾Ã¶³½áµÄÎÊÌ⣬ÕâÓëAviraÇå¾²Èí¼þ¸üÐÂBugÓйء£AviraÆô¶¯ºóԼĪ20Ã룬Õû¸öϵͳ±äµÃÎÞÏìÓ¦£¬Ö»ÄÜͨ¹ý»úÏäÉϵÄÖØÆô°´Å¥À´ÖØÆôµçÄÔ¡£ÊÜÓ°ÏìµÄÓû§·¢Ã÷£¬Î¨Ò»µÄµ÷½â²½·¥¾ÍÊÇÆô¶¯µ½Ç徲ģʽµÄͬʱжÔØAviraµÄÈí¼þ£¬¿ÉÊDz¿·ÖÓû§ÔÚÍêȫɾ³ýAviraÈí¼þʱÓöµ½ÁËÄÑÌâ¡£AviraÌåÏÖ£¬¸ÃÎÊÌâÊÇÓÉAviraÄÚ²¿·À»ðǽµ¼Öµģ¬ÓÚ12ÔÂ9ÈÕÊ״α¨¸æ£¬²¢Ó¦Í¨¹ý12ÔÂ11ÈյĸüÐÂ×Ô¶¯ÐÞ¸´¡£
https://www.bleepingcomputer.com/news/technology/avira-antivirus-causes-windows-computers-to-freeze-after-boot/
2¡¢Insomniac GamesÔâµ½Rhysida¹¥»÷±»ÀÕË÷200ÍòÃÀÔª
ýÌå12ÔÂ14Èճƣ¬Ë÷ÄáÌåÏÖÕýÔÚÊÓ²ìÆä×Ó¹«Ë¾Insomniac GamesÔâµ½µÄÀÕË÷¹¥»÷¡£RhysidaÉù³ÆÈëÇÖÁËInsomniac Games£¬²¢¹ûÕæÁ˲¿·Ö±»µÁÊý¾ÝµÄ½Øͼ£¬Éæ¼°ÄÚ²¿Óʼþ¡¢»¤ÕÕ¸±±¾¡¢Ð¡ÎÒ˽¼ÒÉí·ÝÖ¤ÒÔ¼°ÓëÓÎÏ·×ʲú»òÓÎÏ·Íæ·¨Ïà¹ØµÄͼÏñ¡£¸ÃÍÅ»ïÍþвҪÅÄÂô±»µÁÊý¾Ý£¬¸øÁËInsomniacÒ»ÖܵÄʱ¼äÍù·µÓ¦ËûÃǵÄÒªÇó£¬È»ºó»á½«±»µÁÊý¾ÝÐû²¼¸ø³ö¼Û×î¸ßÕߣ¬ÆðÅļÛΪ50±ÈÌرң¨Ô¼200ÍòÃÀÔª£©¡£
https://therecord.media/sony-investigating-ransomware-insomniac-games
3¡¢Î¢ÈíÅû¶ʹÓÃOAuthÓ¦ÓõÄ×Ô¶¯»¯BECºÍÍÚ¿óµÈ¹¥»÷
12ÔÂ12ÈÕ£¬Î¢ÈíÐû²¼±¨¸æ³Æ£¬³öÓÚ¾¼ÃÄîÍ·µÄ¹¥»÷ÕßÕýÔÚʹÓÃOAuthÓ¦ÓÃÀ´×Ô¶¯Ö´ÐÐBECºÍ´¹ÂÚ¹¥»÷¡¢ÍÆËÍÀ¬»øÓʼþÒÔ¼°×°ÖÃÐéÄâ»ú¾ÙÐмÓÃÜÍÚ¾ò¡£Ò»¸ö°¸ÀýÖУ¬Storm-1283ÍŻィÉèÁËÒ»¸öOAuthÓ¦ÓÃÀ´°²ÅÅÍÚ¿óÐéÄâ»ú¡£¸øÄ¿µÄÔì³ÉÁË1-150ÍòÃÀÔªµÄËðʧ£¬Ïêϸ½ð¶îÈ¡¾öÓÚ¹¥»÷µÄÒ»Á¬Ê±¼ä¡£ÁíÒ»¸ö¹¥»÷ÍÅ»ïʹÓñ»Ñ¬È¾ÕÊ»§½¨ÉèµÄOAuthÓ¦ÓÃÀ´Î¬³Ö³¤ÆÚÐÔ£¬²¢Ê¹ÓÃÖÐÐĵÐÊÖ(AiTM)´¹ÂÚ¹¤¾ß°üÖ´Ðд¹ÂÚ¹¥»÷¡£¶øStorm-1286ÍÅ»ïͨ¹ýOAuthÓ¦ÓþÙÐÐÁË´ó¹æÄ£µÄÀ¬»øÓʼþ·Ö·¢Ô˶¯¡£
https://www.microsoft.com/en-us/security/blog/2023/12/12/threat-actors-misuse-oauth-applications-to-automate-financially-driven-attacks/
4¡¢ÎÚ¿ËÀ¼×î´óÔËÓªÉÌKYIVSTARÔâµ½¹¥»÷·þÎñÔÝʱÖÐÖ¹
¾Ý12ÔÂ12ÈÕ±¨µÀ£¬ÎÚ¿ËÀ¼×î´óµÄÔËÓªÉÌKyivstarÔâµ½¹¥»÷£¬Òƶ¯ºÍÊý¾Ý·þÎñÊܵ½Ó°Ïì¡£¸Ã¹«Ë¾ÎªÎÚ¿ËÀ¼Ô¼2600ÍòÒƶ¯¿Í»§ºÍÁè¼Ý100Íò¿í´øÀο¿»¥ÁªÍø¿Í»§Ìṩ·þÎñ¡£12ÈÕÔçÉÏ£¬¸Ã¹«Ë¾Ðû²¼Ôâµ½ÍøÂç¹¥»÷£¬µ¼ÖÂÆä·þÎñÔÝʱÖÐÖ¹¡£ÏÖÔÚ£¬ËùÓÐÒƶ¯Í¨Ñ¶ºÍ»¥ÁªÍø»á¼û¾ùÎÞ·¨Ê¹Óá£KyivstarÌåÏÖ£¬´Ë´ÎÇå¾²ÊÂÎñ²¢Î´Ó°ÏìÈκÎСÎÒ˽¼ÒÊý¾Ý£¬ËùÓÐÊÜÓ°ÏìÇÒÎÞ·¨Ê¹Ó÷þÎñµÄÓû§¶¼½«»ñµÃÅâ³¥¡£
https://securityaffairs.com/155701/hacking/cyberattack-brought-down-ukraine-kyivstar.html
5¡¢Ó¢¹ú¹ú·À²¿ÒòÊý¾Ý鶱»î¿Ïµ»ú¹¹·£¿î½ü44ÍòÃÀÔª
12ÔÂ13ÈÕ±¨µÀ³Æ£¬Ó¢¹ú¹ú·À²¿ÒòδÄܱ£»¤ÔÚ2021ÄêÒÆÃñµÄ°¢¸»º¹È˵ÄÐÅÏ¢£¬±»·£¿î35ÍòÓ¢°÷£¨Ô¼ºÏ44ÍòÃÀÔª£©¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬Ó¢¹úµÄ°¢¸»º¹ÖØа²¶ÙºÍÔ®ÖúÕþ²ß£¨ARAP£©·¢ËÍÓʼþʱ·ºÆð¹ýʧ£¬¿ÉÄܻᵼÖÂÖ°Ô±ÉËÍö¡£ÓÉÓÚ·¢¼þÈËʹÓÃÁË"ÊÕ¼þÈË"×ֶΣ¬ÆäÖÐ245È˵ÄÐÅÏ¢±»ÒâÍâµØ̻¶¸øÁËËùÓÐÊÕ¼þÈË¡£×î³õ£¬¹ú·À²¿±»ÅжÏûÓÐ"½ÓÄÉÊʵ±µÄÊÖÒÕºÍ×éÖ¯²½·¥"£¬±»´¦ÒÔ100ÍòÓ¢°÷µÄ·£¿î¡£Ëæºó·£¿î¼õÖÁ70ÍòÓ¢°÷£¬Ôµ¹ÊÔÓÉÊǸò¿·ÖÔÚÊÂÎñ±¬·¢ºó½ÓÄɵIJ½·¥¡£×îºó£¬Æ¾Ö¤ICO¶Ô¹«¹²²¿·Ö·£¿îµÄ뮶¨£¬·£¿î±»¼õ°ëÖÁ35ÍòÓ¢°÷¡£
https://www.infosecurity-magazine.com/news/ministry-defence-fined-afghan-data/
6¡¢Check PointÐû²¼11Ô·ÝÈ«ÇòÍþвָÊýµÄÆÊÎö±¨¸æ
12ÔÂ12ÈÕ£¬Check PointÐû²¼ÁË11Ô·ÝÈ«ÇòÍþвָÊýµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬11Ô·¢Ã÷ÁËеÄAsyncRATÔ˶¯£¬Í¨¹ý¶ñÒâHTMLÎļþ±»ÓÃÀ´Èö²¥Òþ²ØµÄ¶ñÒâÈí¼þ¡£ÏÂÔسÌÐòFakeUpdatesÔÚÔÝʱÍ˳öÁ½¸öÔºóÖØнøÈë¶ñÒâÈí¼þÅÅÐаñ£¬Ö±½ÓÔ¾¾ÓµÚ¶þλ¡£½ÌÓýºÍÑо¿ÐÐÒµÈÔÈ»ÊÇ11ÔÂÔâµ½¹¥»÷×î¶àµÄÐÐÒµ¡£×îÈÝÒ×±»Ê¹ÓõÄÎó²îÊÇHTTPÏÂÁî×¢È루CVE-2021-43936ºÍCVE-2022-24086£©£¬Ó°ÏìÁËÈ«Çò45%µÄʵÌå
https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/