Nissan ±±ÃÀÊý¾Ýй¶ӰÏìÁè¼Ý 53000 ÃûÔ±¹¤

Ðû²¼Ê±¼ä 2024-05-17
1. Nissan ±±ÃÀÊý¾Ýй¶ӰÏìÁè¼Ý 53000 ÃûÔ±¹¤


5ÔÂ16ÈÕ £¬Nissan North America (Nissan) È¥ÄêÔâÊÜÁËÊý¾Ýй¶ £¬ÆäʱÍþвÕßÃé×¼Á˸ù«Ë¾µÄÍⲿ VPN ²¢¹Ø±ÕϵͳÒÔ»ñÈ¡Êê½ð¡£¸ÃÆû³µÖÆÔìÉÌÓÚ 2023 Äê 11 ÔÂÉÏÑ®·¢Ã÷ÁËÕâÒ»Îó²î £¬²¢ÓÚ×î½ü·¢Ã÷¸ÃÊÂÎñ̻¶ÁËÁè¼Ý 53,000 ÃûÏÖÈκÍÀëÈÎÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡£Nissan ͸¶ £¬ÍþвÐÐΪÕßÃé×¼ÁËÆäÍⲿ VPN £¬È»ºó¹Ø±ÕÁËijЩ¹«Ë¾ÏµÍ³ £¬È»ºóË÷ÒªÊê½ð¡£¸Ã¹«Ë¾Ö¸³ö £¬ÔÚ¹¥»÷ʱ´úÆäϵͳ¾ùδ¼ÓÃÜ¡£¸Ã¹«Ë¾ÓëÍⲿÍøÂçÇ徲ר¼ÒÏàÖú £¬Äܹ»ÆÀ¹ÀÇéÐΡ¢×èÖ¹ÊÂÎñ²¢ÖÕÖ¹Íþв¡£ËæºóµÄÊÓ²ìÏÔʾ £¬ºÚ¿Í»á¼ûÁËÍâµØºÍÍøÂç¹²ÏíÉϵÄһЩÎļþ £¬ÆäÖд󲿷ְüÀ¨ÉÌÒµÐÅÏ¢¡£ÔÚÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ·¢³öµÄÊý¾Ýй¶֪ͨÖÐ £¬¸Ã¹«Ë¾ÌåÏÖ £¬Ì»Â¶µÄÏêϸÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼Ò±êʶ·û£¨ÀýÈçÐÕÃû£©ºÍÉç»áÇå¾²ºÅÂë £¬²¢ÇÒÍþвÐÐΪÕß»á¼ûµÄÎļþÖв»±£´æ²ÆÎñÏêϸÐÅÏ¢¡£ÈÕ²úÖ¸³ö £¬Ëü²»ÖªµÀ̻¶µÄÊý¾ÝÒѱ»ÀÄÓá£


https://www.bleepingcomputer.com/news/security/nissan-north-america-data-breach-impacts-over-53-000-employees/


2. ÂéÊ¡Àí¹¤Ñ§ÔºµÄѧÉúʹÓÃETHÎó²î¿ÉÇÔÈ¡2500ÍòÃÀÔª


5ÔÂ16ÈÕ £¬Æ¾Ö¤ÃÀ¹ú˾·¨²¿Ðû²¼µÄÆðËßÊé £¬ÔÚԼĪ 12 ÃëÄÚ £¬Á½ÃûÊܹý¸ßµÈ½ÌÓýµÄÐÖµÜÉæÏÓͨ¹ý¸Ä¶¯ÒÔÌ«·»Çø¿éÁ´ £¬ÒÔÒ»ÖÖÇ°Ëùδ¼ûµÄ¼ÓÃÜÇ®±ÒÍýÏëÇÔÈ¡ÁË 2500 ÍòÃÀÔª¡£ÔÚ˾·¨²¿µÄÒ»·ÝÐÂΟåÖÐ £¬ÃÀ¹úÉó²é¹Ù´ïÃ×°²¡¤ÍþÁ®Ä·Ë¹ (Damian Williams) ÌåÏÖ £¬¸ÃÍýÏëºÜÊÇÖØ´ó £¬ÒÔÖÁÓÚ¡°Ê¹Çø¿éÁ´µÄÍêÕûÐÔÊܵ½ÖÊÒÉ¡±¡£ÍþÁ®Ä·Ë¹Ëµ£º¡°Õâ¶ÔÐÖµÜÔÚÌìÏÂÉÏ×ʢÃûµÄ´óѧ֮һѧϰÅÌËã»ú¿ÆѧºÍÊýѧ £¬¾Ý³ÆʹÓÃËûÃǵÄרҵÊÖÒպͽÌÓýÀ´¸Ä¶¯ºÍʹÓÃÈ«ÇòÊý°ÙÍòÒÔÌ«·»Óû§ËùÒÀÀµµÄЭÒé¡£¡± ¡°Ò»µ©ËûÃǽ«ÍýÏ븶ÖîʵÑé £¬ËûÃǵÄÇÀ½ÙÖ»»¨ÁË 12 Ãë¾ÍÍê³ÉÁË¡£¡± 24 ËêµÄ°²¶«ºÍ 28 ËêµÄղķ˹¡¤ÅåÀ׶û-²¼°£Åµ±»²¶ £¬±»Ö¸¿Ø´®Ä±ÊµÑéµç»ãڲƭ¡¢µç»ãڲƭºÍ´®Ä±Ï´Ç®¡£ÃÀ¹ú˾·¨²¿ÌåÏÖ £¬ÐÖµÜÁ©¡°Ã¿Ïî×ïÃû×î¸ß¿ÉÅд¦ 20 Äêî¿Ïµ¡±¡£


https://news.hitb.org/content/mit-students-stole-25m-seconds-exploiting-eth-blockchain-bug


3. LinuxϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»ÖØ´óµÄ¶ñÒâÈí¼þѬȾÁ½Äê


5ÔÂ16ÈÕ £¬´Ó 2009 Äê×îÏÈ £¬ÓÃÓÚά»¤ºÍ·Ö·¢ Linux ²Ù×÷ϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»ÖØ´óµÄ¶ñÒâÈí¼þѬȾÁËÁ½Äê £¬ÕâЩ¶ñÒâÈí¼þÏë·¨¿ØÖÆÁË¿ª·¢Ö°Ô±±£»¤×îÑÏÃܵÄ×ÊÔ´Ö®Ò»£º´æ´¢¼ÓÃÜµÄ /etc/shadow Îļþ¡£ÓÐÁè¼Ý 550 ÃûϵͳÓû§µÄÃÜÂëÊý¾Ý¡£Çå¾²¹«Ë¾ ESET µÄÑо¿Ö°Ô±ÌåÏÖ £¬´Ë´Î¹¥»÷±³ºóµÄδ֪¹¥»÷ÕßѬȾÁË kernel.org ÄÚµÄÖÁÉÙËĄ̈·þÎñÆ÷ £¬¸Ã»¥ÁªÍøÓòÖ§³Ö×ÅÖØ´óµÄ Linux ¿ª·¢ºÍ·Ö·¢ÍøÂç¡£ÔÚ»ñµÃÍøÂçÉÏ 551 ¸öÓû§ÕÊ»§µÄ¼ÓÃܹþÏ£Öµºó £¬¹¥»÷Õß¿ÉÄÜͨ¹ýÃÜÂëÆƽâÊÖÒÕºÍʹÓöñÒâÈí¼þÄÚÖõĸ߼¶Æ¾Ö¤ÇÔÈ¡¹¦Ð§ £¬½«Ò»°ëÃÜÂëת»»ÎªÃ÷ÎÄÃÜÂë¡£´ÓÄÇÀï £¬¹¥»÷ÕßʹÓ÷þÎñÆ÷·¢ËÍÀ¬»øÓʼþ²¢¾ÙÐÐÆäËûа¶ñÔ˶¯¡£ÕâËĄ̈·þÎñÆ÷¿ÉÄÜÔÚ²î±ðʱ¼ä±»Ñ¬È¾ºÍÏû¶¾ £¬×îºóÁ½Ì¨·þÎñÆ÷ÔÚ 2011 ÄêµÄij¸öʱ¼ä»ñµÃÐÞ¸´¡£kernel.org µÄѬȾÊÂÎñÓÚ 2011 ÄêÆعâ £¬ÆäʱÄÚºËά»¤Ö°Ô±Í¸Â¶ £¬¹¥»÷ÕßÒÔijÖÖ·½·¨Ïë·¨»ñµÃ¶ÔÅþÁ¬µ½¸ÃÓòµÄ·þÎñÆ÷µÄ²»ÊÜÏÞÖƵÄϵͳ»á¼ûȨÏÞ£¨¼´¡°root¡±£© £¬µ¼Ö 448 ¸öÕÊ»§Ô⵽й¶¡£


https://news.hitb.org/content/linux-maintainers-were-infected-2-years-ssh-dwelling-backdoor-huge-reach


4. FBIµ·»ÙBreachForumsÀÕË÷ÍøÕ¾ºÍÆäTelegramƵµÀ


5ÔÂ15ÈÕ £¬FBI ÓëÌìϸ÷µØµÄ¾¯·½ÍŽá¿ØÖÆÁËÀÕË÷Èí¼þ¾­¼ÍÍøÕ¾ BreachForums µÄÍøÕ¾ºÍ Telegram ƵµÀ¡£Ö»¹Ü¸ÃÍøÕ¾µÄÔËÓª¶à´Î±»¹Ø±Õ £¬µ«¸ÃÍøÕ¾ÈÔȻһֱ·ºÆ𠣬ÏÖÔÚ¾¯Ô±ÔÝʱ¿ØÖÆÁ˸ÃÍøÕ¾¡£¸ÃÍøÕ¾ÏÖÔÚдµÀ£º¡°ÔÚ¹ú¼ÊÏàÖúͬ°éµÄЭÖúÏ £¬Áª°îÊÓ²ì¾ÖºÍ˾·¨²¿ÒѹرոÃÍøÕ¾¡£¡± ¡°ÎÒÃÇÕýÔÚÉó²é¸ÃÍøÕ¾µÄºó¶ËÊý¾Ý¡£ÈôÊÇÄúÓÐÐÅÏ¢ÐèÒª¾Ù±¨ BreachForums ÉϵÄÍøÂç·¸·¨Ô˶¯ £¬ÇëÁªÏµÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø¡£¡±Õâ´ÎÐж¯ÊÇÓÉÎåÑÛ¹ú¼ÒÒÔ¼°ÈðÊ¿¡¢±ùµººÍÎÚ¿ËÀ¼µÄ¾¯Ô±Ö´ÐеÄ¡£BreachForums ½ÓÊÜÁË֮ǰ±»¹Ø±ÕµÄ RaidForums ÍøÕ¾ £¬¸ÃÍøÕ¾ÔÚ¾¯·½µÄÁíÒ»´ÎÍŽáÐж¯ºóÓÚ 2022 Äê¹Ø±Õ¡£ÕâÁ½¸öÍøÕ¾¶¼ÉúÒâ±»µÁÐÅÏ¢ £¬²¢ÇÒÊÇËùνµÄË«ÖØÀÕË÷¹¥»÷µÄÒªº¦ £¬ÔÚÕâÖÖ¹¥»÷ÖÐ £¬Êý¾Ý²»µ«±»¼ÓÃÜÒÔ»ñÈ¡Êê½ð £¬²¢ÇÒ»¹±»ÇÔÈ¡ £¬²¢ÓÃÀ´ÍþвÊܺ¦Õß £¬ÈôÊÇËûÃDz»¸¶¿î £¬¾Í»á̻¶Êý¾Ý¡£


https://www.theregister.com/2024/05/15/fbi_breachforums_ransomware/


5. Wi-Fi ±ê×¼ÖеÄȱÏÝ¿ÉÄܵ¼Ö SSID »ìÏý¹¥»÷


5ÔÂ16ÈÕ £¬±ÈÀûʱ³ãë´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁË IEEE 802.11 Wi-Fi ±ê×¼ÖеÄÒ»¸ö»ù±¾Éè¼ÆȱÏÝ £¬¸ÃȱÏÝΪ¹¥»÷ÕßÌṩÁËÒ»ÖÖÒªÁìÀ´ÓÕÆ­Êܺ¦ÕßÅþÁ¬µ½±ÈËûÃÇÏëÒªÅþÁ¬µÄÍøÂçÇå¾²ÐԽϵ͵ÄÎÞÏßÍøÂ硣ƾ֤ VPN ̸ÂÛÍøÕ¾ Top10VPN µÄ˵·¨ £¬´ËÀ๥»÷¿ÉÄÜ»áʹÊܺ¦ÕßÃæÁÙ¸ü¸ßµÄÁ÷Á¿×èµ²ºÍʹÓÃΣº¦¡£¸ÃÍøÕ¾Óë KU Leuven µÄһλÑо¿Ö°Ô±ÏàÖú £¬½«ÔÚº«¹úÊ׶û¼´½«¾ÙÐеľۻáÉϾÙÐÐÑÝʾ֮ǰÐû²¼ÁËÎó²îÏêϸÐÅÏ¢¡£¸ÃÎó²î±àºÅΪ CVE-2023-52424 £¬Ó°ÏìËùÓвÙ×÷ϵͳÉϵÄËùÓÐ Wi-Fi ¿Í»§¶Ë¡£ÊÜÓ°ÏìµÄ Wi-Fi ÍøÂç°üÀ¨»ùÓÚÆձ鰲ÅÅµÄ WPA3 ЭÒé¡¢WEP ºÍ 802.11X/EAP µÄÍøÂç¡£Ñо¿Ö°Ô±Ìá³öÁË Wi-Fi ±ê×¼µÄ¸üÐÂÒÔ¼°Ð¡ÎÒ˽¼ÒºÍ×éÖ¯¿ÉÒÔÓÃÀ´½µµÍΣº¦µÄÒªÁì¡£


https://news.hitb.org/content/flaw-wi-fi-standard-can-enable-ssid-confusion-attacks


6. ºÚ¿Í¹¥»÷ Foxit PDF Reader Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý


5ÔÂ15ÈÕ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÕë¶Ô Foxit Reader Óû§µÄ PDF Îó²î £¬¸ÃÎó²îʹÓÃÁËÒ»¸öÉè¼ÆȱÏÝ £¬¸ÃȱÏÝ»áͨ¹ýĬÈϵġ°È·¶¨¡±Ñ¡ÏîÏÔʾÇå¾²ÖÒÑÔ £¬´Ó¶ø¿ÉÄÜÓÕÆ­Óû§Ö´ÐжñÒâ´úÂë¡£ÓÉÓÚ¸ÃÎó²îÖ÷ÒªÕë¶Ô Foxit Reader £¬ÓëÐÐÒµ±ê×¼ Adobe Acrobat Reader Ïà±È £¬¸ÃÎó²îÊÇÒ»ÖÖÏÊΪÈËÖªµÄ PDF Éó²éÆ÷ £¬Òò´Ë¸ÃÎó²î±»ÆÕ±éʹÓò¢ÈƹýÁ˵䷶µÄ¼ì²âÒªÁì¡£ÓÉÓÚÖÒÑÔÐÂÎŵÄÉè¼ÆȱÏÝ £¬¸£ê¿ÔĶÁÆ÷±£´æÑÏÖصÄÇå¾²Îó²î £¬ÈôÊÇÓû§ÔÚûÓÐ×Ðϸ˼Á¿µÄÇéÐÎϵ¥»÷Á½´Î £¬¾Í»áÔÚ²»Öª²»¾õÖÐΣº¦ÆäÇå¾²¡£¸ÃÎó²îʹ¹¥»÷ÕßÄܹ»´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔز¢Ö´ÐжñÒâ´úÂë £¬´Ó¶ø¿ÉÄÜʹËûÃÇÄܹ»Î´¾­ÊÚȨ»á¼ûÓû§µÄϵͳºÍÊý¾Ý¡£¸ÃÎó²îÒÑÔÚÏÖʵÌìÏµĹ¥»÷Öб»Æð¾¢Ê¹Óà £¬ÓÃÓÚÖÖÖÖ¶ñÒâÄ¿µÄ £¬°üÀ¨Ìع¤Ô˶¯ºÍµç×Ó·¸·¨¡£


https://gbhackers.com/hackers-attack-foxit-pdf-reader-users/