HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æģй¶£¬É漰δÐû²¼ºÍɾ¼õ°æ±¾
Ðû²¼Ê±¼ä 2024-12-301. HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æģй¶£¬É漰δÐû²¼ºÍɾ¼õ°æ±¾
12ÔÂ27ÈÕ£¬Áè¼Ý25ÄêµÄHaloÓÎÏ·ÄÚÈÝ¿ËÈÕÔÚÍøÉϱ»Ð¹Â¶£¬ÆäÖаüÀ¨¸Ã±ê¼ÇÐÔµÚÒ»È˳ÆÉä»÷ÓÎϷϵÁмÓÈëXboxÇ°µÄ¿ÉÍæ°æ±¾£¬ÉõÖÁÊÇ×îÔçµÄFPS°æ±¾¡£¾ÝÍƲ⣬й¶ÄÚÈÝÔ´×ÔHalo StudiosÓë·ÛË¿Ä£×éÖÆ×÷ÕßµÄÏàÖú£¬Ö¼ÔÚ»Ö¸´ÒÑÍùHaloÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£×ÔÈ¥ÄêÑ×ÌìÒÔÀ´£¬ModÍŶÓDigsiteÒ»Ö±ÔÚÓë343 Industries£¨ÏÖÒѸüÃûΪHalo Studios£©ÏàÖú£¬ÎÞ³¥»Ö¸´ÓÎÏ·ÄÚÈÝ£¬È硶¹â»·Õ½¶·½ø»¯¡·µÄPC¶Ë¿Ú¶àÈËÓÎÏ·µØͼ¼°¾µä¹âÖÜÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£ÓÈΪÒýÈËעĿµÄÊÇ£¬1999ÄêÔøÍýÏë³ÉΪMacµÚÈýÈ˳ƶÀÍÌÓÎÏ·µÄ¡¶¹â»·¡·Ê§´«ÒѾõÄMacÌìÏÂÑÝʾ°æÒ²ÍýÏë»Ö¸´£¬µ«±¾ÖܵÄй¶ÒÑʹ¸Ã°æ±¾¿ÉÔÚPCÉÏÍêÕû²¥·Å£¬Í¬Ê±»¹Ð¹Â¶Á˽ü100GBµÄÆäËûÎļþ£¬°üÀ¨Bungie¿ª·¢µÄÔ°æHaloÓÎÏ·ÖÐδÍê³ÉºÍɾ¼õµÄÄÚÈÝ¡£Digsite modÍŶÓÇ°³ÉԱ֤ʵÁËй¶ÄÚÈݵÄÕæʵÐÔ£¬µ«·ñ¶¨ÏÖÈλòÇ°ÈγÉÔ±¶Ô´ËÈÏÕ棬²¢Í¸Â¶Òòȱ·¦Ð½³êºÍ×ÊÔ´ÕùÒ飬´ó´ó¶¼modÍŶӳÉÔ±ÒѸæÍË¡£
https://www.videogameschronicle.com/news/over-25-years-of-classic-halo-content-has-leaked-online/
2. ChromeÀ©Õ¹³ÌÐòÔâ´ó¹æÄ£ÈëÇÖ£¬Óû§Ãô¸ÐÐÅϢй¶Σº¦ÔöÌí
12ÔÂ27ÈÕ£¬ÖÁÉÙÓÐÎå¸öChromeÀ©Õ¹³ÌÐòÔÚÒ»´ÎÐͬ¹¥»÷ÖÐÔâµ½ÈëÇÖ£¬¹¥»÷Õß×¢ÈëÁËÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢µÄ´úÂë¡£Êý¾Ýɥʧ·À»¤¹«Ë¾CyberhavenÅû¶Á˴˴ι¥»÷£¬¸Ã¹«Ë¾ÔÚÀֳɶÔGoogle ChromeÊÐËÁµÄÖÎÀíÔ±ÕÊ»§¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷ºó£¬ÏòÆä¿Í»§·¢³öÁËÎ¥¹æ¾¯±¨£¬ÆäÖаüÀ¨Snowflake¡¢Ä¦ÍÐÂÞÀ¡¢¼ÑÄܵÈ×ÅÃû¹«Ë¾¡£ºÚ¿ÍЮÖÆÁËÔ±¹¤µÄÕË»§²¢Ðû²¼ÁË°üÀ¨¶ñÒâ´úÂëµÄCyberhavenÀ©Õ¹°æ±¾£¬¸Ã´úÂë¿É½«Óû§µÄ¾ÓÉÉí·ÝÑéÖ¤µÄ»á»°ºÍcookie鶵½¹¥»÷ÕßÓò¡£CyberhavenµÄÄÚ²¿Çå¾²ÍŶÓÔÚ·¢Ã÷¶ñÒâÈí¼þºóѸËÙ½«Æäɾ³ý£¬²¢Ðû²¼ÁË´¿¾»°æ±¾v24.10.5¡£½¨ÒéÓû§Éý¼¶µ½×îа汾£¬²¢×÷·Ï·ÇFIDOv2µÄÃÜÂë¡¢ÂÖ»»ËùÓÐAPIÁîÅƲ¢Éó²éä¯ÀÀÆ÷ÈÕÖ¾ÒÔÆÀ¹À¶ñÒâÔ˶¯¡£±ðµÄ£¬Nudge SecurityÑо¿Ô±Jaime Blasco·¢Ã÷£¬Í³Ò»Ê±¼äÉÐÓÐÆäËûChromeÀ©Õ¹³ÌÐòÒ²±»×¢ÈëÁ˶ñÒâ´úÂëƬ¶Ï£¬°üÀ¨Internxt VPN¡¢VPNCity¡¢UvoiceºÍParrotTalksµÈ£¬½¨ÒéÕâЩÀ©Õ¹³ÌÐòµÄÓû§½«Æä´Óä¯ÀÀÆ÷ÖÐɾ³ý»òÉý¼¶µ½Çå¾²°æ±¾¡£ÈôÊDz»È·¶¨£¬×îºÃжÔØÀ©Õ¹³ÌÐò£¬ÖØÖÃÖ÷ÒªÕÊ»§ÃÜÂ룬ɨ³ýä¯ÀÀÆ÷Êý¾Ý£¬²¢½«ä¯ÀÀÆ÷ÉèÖÃÖØÖÃΪÔʼĬÈÏÖµ¡£
https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/
3. ºÚ¿ÍʹÓÃDoSÎó²î½ûÓÃPalo Alto Networks·À»ðǽ
12ÔÂ27ÈÕ£¬Palo Alto Networks·¢³öÇå¾²ÖÒÑÔ£¬Ö¸³öºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃCVE-2024-3393¾Ü¾ø·þÎñÎó²î£¬Í¨¹ý·¢ËͶñÒâÊý¾Ý°üÇ¿ÖÆÖØÆô·À»ðǽ£¬´Ó¶ø½ûÓÃÆä±£»¤¡£¸ÃÎó²î±£´æÓÚPalo Alto Networks PAN-OSÈí¼þµÄDNSÇå¾²¹¦Ð§ÖУ¬½öÓ°ÏìÆôÓÃÁË¡°DNSÇå¾²¡±ÈÕÖ¾¼Í¼µÄ×°±¸¡£¾ÝPalo Alto Networks͸¶£¬¸ÃÎó²îÒѱ»ºÚ¿ÍÆð¾¢Ê¹Ó㬵±·À»ðǽ×èÖ¹¶ñÒâDNSÊý¾Ý°üʱ£¬¿Í»§¿ÉÄÜ»áÓöµ½·þÎñÖÐÖ¹¡£¸Ã¹«Ë¾ÒѾÕë¶Ô²¿·Ö°æ±¾Ðû²¼Á˲¹¶¡£¬µ«PAN-OS 11.0ÒòÒѵִïÉúÃüÖÜÆÚÖÕÖ¹ÈÕÆÚ½«²»»áÊÕµ½²¹¶¡¡£¹ØÓÚÎÞ·¨Á¬Ã¦¸üеÄÓû§£¬Palo Alto NetworksÌṩÏàʶ¾öÒªÁ컺ºÍ½â°ì·¨£¬°üÀ¨½ûÓÃDNSÇå¾²ÈÕÖ¾¼Í¼µÈ£¬ÒÔÈ·±£×°±¸µÄÇå¾²ÔËÐС£Óû§Ó¦Æ¾Ö¤×Ô¼ºµÄ×°±¸ÀàÐͺÍÖÎÀí·½·¨£¬½ÓÄÉÏìÓ¦µÄ²½·¥À´Ó¦¶Ô¸ÃÎó²î¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/
4. ¹«¹²Æû³µÈí¼þ¹«Ë¾CariadÔ¼80ÍòÁ¾µç¶¯Æû³µÐÅÏ¢ÔâÆعâ
12ÔÂ28ÈÕ£¬¹«¹²Æû³µÈí¼þ¹«Ë¾CariadʧÉ÷̻¶ÁËÔ¼80ÍòÁ¾µç¶¯Æû³µµÄÊý¾Ý£¬°üÀ¨¿ÉÄÜÓë¼ÝʻԱÐÕÃûÏà¹ØµÄÐÅÏ¢ºÍ³µÁ¾µÄ׼ȷλÖã¬ÕâЩÊý¾ÝÔÚÑÇÂíÑ·ÔÆ´æ´¢Öд¦ÓÚδÊܱ£»¤×´Ì¬³¤´ïÊýÔ¡£Ì»Â¶µÄÊý¾Ý¿âº¸ÇÁ˹«¹²¡¢Î÷ÑÅÌØ¡¢°ÂµÏºÍ˹¿Â´ïµÈÆ·ÅÆ£¬²¿·Ö³µÁ¾µÄµØÀíλÖÃÊý¾Ý׼ȷµ½¼¸ÀåÃס£¾Ý³Æ£¬ÕâÊÇÓÉÓÚCariadÔÚÁ½¸öITÓ¦ÓóÌÐòÖеÄÉèÖò»×¼È·µ¼Öµġ£Å·ÖÞÆ·µÂºÚ¿Í×éÖ¯»ìãçÅÌËã»ú¾ãÀÖ²¿(CCC)·¢Ã÷ÁËÕâÒ»Îó²î£¬²¢ÔÚÏòCariadºÍ¹«¹²¹«Ë¾×ª´ïÇ°¾ÙÐÐÁ˲âÊÔ¡£CariadÌåÏÖ£¬Ð¹Â¶µÄÊý¾Ý½öÓ°ÏìÒÑÅþÁ¬µ½»¥ÁªÍø²¢ÒÑ×¢²áÔÚÏß·þÎñµÄ³µÁ¾£¬²¢Ç¿µ÷Ö»ÓÐÈƹý¶àÖÖÇå¾²»úÖƲŻª»á¼ûÊý¾Ý£¬ÇÒµ¥¸ö³µÁ¾Êý¾Ý±»ÄäÃû»¯¡£È»¶ø£¬¡¶Ã÷¾µ¡·ÖÜ¿¯µÄÍŶӷ¢Ã÷ÓÐÈËʹÓÃÃâ·ÑÈí¼þÍøÂçÁ˵¹úÕþ¿ÍµÄÆû³µÎ»ÖÃÏêϸÐÅÏ¢¡£CariadÔÚÊÕµ½CCCµÄ±¨¸æºóѸËÙ·´Ó¦£¬½â¾öÁËÎÊÌâ²¢¹Ø±ÕÁË»á¼ûȨÏÞ¡£¸Ã¹«Ë¾Ã»ÓÐÖ¤¾ÝÅú×¢³ýCCCºÚ¿ÍÖ®ÍâµÄÆäËû·½¿ÉÒÔ»á¼ûÒÑй¶µÄ³µÁ¾Êý¾Ý£¬»òÕâЩÐÅÏ¢±»µÚÈý·½ÀÄÓá£CariadÌåÏÖ£¬´Ó³µÁ¾ÍøÂçµÄÊý¾ÝÓÐÖúÓÚΪ¿Í»§Ìṩ¡¢¿ª·¢ºÍË¢ÐÂÊý×Ö¹¦Ð§£¬²¢½ÓÄÉÁËÇ¿Ê¢µÄÊý¾Ý±£»¤²½·¥¡£
https://www.bleepingcomputer.com/news/security/customer-data-from-800-000-electric-cars-and-owners-exposed-online/
5. Ç׶í×éÖ¯NoName057¶ÔÒâ´óÀûÌᳫÐÂÒ»ÂÖDDoS¹¥»÷
12ÔÂ28ÈÕ£¬ÔÚµØÔµÕþÖÎÖ÷ҪʱÊƼӾçµÄÅä¾°Ï£¬Ç׶í×éÖ¯NoName057¶ÔÒâ´óÀû»ù´¡ÉèÊ©ÌᳫÁËÐÂÒ»ÂÖDDoS¹¥»÷¡£´Ë´Î¹¥»÷Ä¿µÄ°üÀ¨Âí¶ûÅíÈø»ú³¡¡¢ÀûÄÉÌØ»ú³¡¡¢Íâ½»²¿¼°¶¼Á齻ͨ¼¯ÍŵÄÍøÕ¾¡£Ö»¹ÜÕâЩ¹¥»÷¶Ô»ú³¡µÄÏÖʵÔËӪδÔì³ÉÓ°Ï죬µ«Ïà¹ØÍøÕ¾¾ù·ºÆðÁË»á¼ûÎÊÌâ¡£NoName057×éÖ¯ÔÚÆäTelegramƵµÀÉÏÉù³Æ£¬´Ë´ÎÏ®»÷ÊǶÔÒâ´óÀû¿Ö¶íÈËÊ¿µÄ»ØÓ¦¡£Òâ´óÀûÓÊÕþ¾¯Ô±¾ÖµÄCnaipicÕýÔÚÊÓ²ì´Ë´ÎÍøÂç¹¥»÷£¬²¢×ÊÖúÊܺ¦Õß¼õÇá¹¥»÷¡£¾ÝÓÊÕþºÍͨѶ¾¯Ô±¾Ö¾Ö³¤Í¸Â¶£¬Ï®»÷ÕßÊÇ×·Çó×ÅÃû¶ÈµÄÒâʶÐÎ̬Çý¶¯µÄÍøÂç·¸·¨·Ö×Ó£¬¶ø·ÇÖ¼ÔÚÔì³ÉÏÖʵË𺦡£±ðµÄ£¬NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬Ä¿µÄÊÇÈ«ÇòÕþ¸®ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯£¬ËûÃÇʹÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷£¬²¢ÔÚµØÔµÕþÖÎÖ÷ҪʱÆÚÉý¼¶Ï®»÷¡£´Ë´Î¹¥»÷±¬·¢ÔÚÊ¥µ®½Ú¼ÙÆÚ£¬¾ßÓÐÕ½ÂÔÒâÒ壬ÓÉÓÚ´Ëʱ×éÖ¯Ö°Ô±ïÔÌ¡¢ÏìӦʱ¼ä±äÂý£¬Ê¹µÃʵʱ·¢Ã÷¡¢»º½âºÍ´Ó¹¥»÷Öлָ´±äµÃÔ½·¢ÄÑÌâ¡£
https://securityaffairs.com/172395/security/pro-russia-group-noname057-targets-italian-airports.html
6. FICORAÓëCAPSAICIN½©Ê¬ÍøÂçÒý·¢È«ÇòÇå¾²¾¯±¨
12ÔÂ28ÈÕ£¬2024Äê10ÔºÍ11ÔÂʱ´ú£¬FortiGuard LabsÊӲ쵽Á½¸öеĽ©Ê¬ÍøÂç¡°FICORA¡±ºÍ¡°CAPSAICIN¡±µÄÔ˶¯ÏÔÖøÔöÌí¡£ÕâÁ½¸ö½©Ê¬ÍøÂç±»ÒÔΪÊÇÖøÃûµÄMiraiºÍKaiten½©Ê¬ÍøÂçµÄ±äÌ壬Äܹ»Ö´ÐжñÒâÏÂÁî¡£ËüÃÇʹÓÃshell¾ç±¾£¬Ö÷ÒªÕë¶ÔLinuxϵͳ£¬²»µ«Äܹ»É±ËÀ¶ñÒâÈí¼þÀú³Ì£¬»¹ÄÜ·¢¶¯DDoS¹¥»÷¡£ÌØÊâµØ£¬¡°FICORA¡±½©Ê¬ÍøÂçÓ°ÏìÁ˶à¸ö¹ú¼Ò£¬¶ø¡°CAPSAICIN¡±ÔòÖ÷ÒªÕë¶Ô¶«ÑǵØÇø£¬²¢ÔÚ¸ÃÇøÓòÒ»Á¬»îÔ¾ÁËÁ½Ìì¶à¡£±ðµÄ£¬¹¥»÷Õß»¹Ê¹ÓÃÒÑÖªµÄD-Link·ÓÉÆ÷Îó²î£¨ÈçCVE-2015-2051ºÍCVE-2024-33112£©À´Ö´ÐжñÒâ²Ù×÷¡£Õë¶ÔÕâЩÍþв£¬FortiGuard Labs½¨ÒéÓû§°´ÆÚ¸üй̼þ£¬²¢ÊµÑéÇ¿Ê¢µÄÍøÂç¼à¿Ø²½·¥ÒÔ±ÜÃâ¹¥»÷¡£
https://hackread.com/ficora-capsaicin-botnet-d-link-router-flaws-ddos-attacks/