ÐÂÐÍDoubleClickjackingÎó²î¿ÉÈƹýÍøÕ¾µÄµã»÷ЮÖƱ £»¤

Ðû²¼Ê±¼ä 2025-01-03

1. ÐÂÐÍDoubleClickjackingÎó²î¿ÉÈƹýÍøÕ¾µÄµã»÷ЮÖƱ £»¤


1ÔÂ1ÈÕ£¬Ç徲ר¼ÒÕ¹ÏÖÁËÒ»ÖÖÐÂÐÍÎó²îDoubleClickjacking£¬ÕâÊÇÒ»ÖÖÆձ鱣´æµÄ»ùÓÚʱ¼äµÄÎó²î£¬Í¨¹ýʹÓÃË«»÷²Ù×÷Íƶ¯µã»÷ЮÖƹ¥»÷£¬ÏÕЩӰÏìËùÓдóÐÍÍøÕ¾¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Paulos YibeloÃüÃû£¬ËüʹÓÃË«»÷ÐòÁжø·Ç¼òµ¥µã»÷£¬ÄÜÈƹýÏÖÓеã»÷ЮÖÆ·À»¤²½·¥£¬ÈçX-Frame-OptionsºÍSameSite cookie¡£DoubleClickjacking¹¥»÷ÖУ¬¹¥»÷Õß¿ØÖƵÄÍøÕ¾»áÓÕµ¼Óû§Ë«»÷¿´ËÆÎÞº¦µÄÔªËØ£¬ÈçCAPTCHAÑéÖ¤£¬Ê±´úʹÓÃJavaScriptÇÄÇÄÖض¨ÏòÖÁ¶ñÒâÒ³Ã棬ÈçÅú×¼¶ñÒâµÄOAuthÓ¦ÓóÌÐò£¬Í¬Ê±¹Ø±Õ¶¥²ã´°¿Ú£¬Ê¹Óû§ÔÚ²»ÖªÇéÏÂÊÚÓè»á¼ûȨÏÞ¡£YibeloÖ¸³ö£¬´ó´ó¶¼WebÓ¦ÓóÌÐòºÍ¿ò¼Üδ˼Á¿Ë«»÷Σº¦£¬ÏÖÓзÀÓù²½·¥ÎÞЧ¡£ÍøÕ¾ËùÓÐÕß¿Éͨ¹ý¿Í»§¶ËÊÖ¶ÎÏû³ýÎó²î£¬ÈçĬÈϽûÓÃÒªº¦°´Å¥£¬ÔÚ¼ì²âµ½Êó±êÊÖÊÆʱ¼¤»î¡£¾ÃÔ¶À´¿´£¬ä¯ÀÀÆ÷¹©Ó¦ÉÌÓ¦½ÓÄÉбê×¼·ÀÓùË«»÷ʹÓá£DoubleClickjackingÊǵã»÷ЮÖƹ¥»÷µÄ±äÖÖ£¬Ê¹Óõã»÷¼äµÄʱ¼ä²îÎÞ·ìÌæ»»Á¼ÐÔUIÔªËØΪÃô¸ÐÔªËØ¡£


https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html


2. Brain CipherÀÕË÷Èí¼þÍÅ»ïй¶Â޵µºRIBridgesƽ̨Êý¾Ý


1ÔÂ2ÈÕ£¬Brain Cipher ÀÕË÷Èí¼þÍÅ»ï½üÆÚ×îÏÈй¶ÔÚ¹¥»÷Â޵µº¡°RIBridges¡±Éç½»·þÎñƽ̨ʱÇÔÈ¡µÄÎļþ¡£RIBridgesÊÇÒ»¸ö×ÛºÏ×ʸñϵͳ£¬ÓÃÓÚÖÎÀíºÍÌṩ°üÀ¨Ò½ÁƱ£½¡¡¢Ê³ÎïÔ®Öú¡¢¶ùͯ±£ÓýµÈÉç»áÔ®ÖúÍýÏë¡£Â޵µºÖÝÓÚ12ÔÂ5ÈÕÊ״εÃ֪ϵͳÔâµ½¹¥»÷£¬µ«Ö±µ½12ÔÂ10ÈÕ²ÅÈ·ÈÏÊý¾Ý¿ÉÄÜÒѱ»ÇÔÈ¡¡£12ÔÂ13ÈÕ£¬ÏµÍ³¹©Ó¦É̵ÂÇÚÈ·Èϱ£´æ¶ñÒâ´úÂ룬ÖÝÕþ¸®Ë漴ָʾ¹Ø±ÕRIBridgesϵͳ¡£ÉÏÖÜ£¬Brain Cipher×îÏÈÔÚÆäÊý¾Ýй¶ÍøÕ¾ÉÏÐû²¼²¿·Ö±»µÁÊý¾Ý£¬°üÀ¨³ÉÄêÈ˺Íδ³ÉÄêÈ˵ÄСÎÒ˽¼ÒÊý¾Ý¡£ÍøÂçÇå¾²Ñо¿Ô±Connor GoodwolfÏÂÔØÁËÕâЩÊý¾Ý²¢Ö¤ÊµÁËÆäÕæʵÐÔ¡£¾ÝÔ¤¼Æ£¬Ô¼ÓÐ65ÍòÈËÊܵ½´Ë´Î¹¥»÷µÄÓ°Ï죬ËûÃǵÄÃô¸ÐÐÅÏ¢ÈçÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍijЩÒøÐÐÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£ÖÝÕþ¸®¹ÙÔ±½¨ÒéÂ޵µº×¡Ãñ¶³½á²¢¼à¿ØÆäÐÅÓã¬ÒÔ·ÀڲƭÔ˶¯£¬²¢Ð¡ÐÄʹÓñ»µÁÊý¾Ý¾ÙÐÐÍøÂç´¹ÂÚÕ©Æ­¡£


https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-stolen-in-rhode-islands-ribridges-breach/


3. ÈÕ±¾Òƶ¯ÔËÓªÉÌNTT DocomoÔâDDoS¹¥»÷µ¼Ö²¿·Ö·þÎñÖÐÖ¹


1ÔÂ2ÈÕ£¬ÈÕ±¾×î´óµÄÒƶ¯ÔËÓªÉÌNTT DocomoÔâÓöÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬µ¼Ö²¿·Ö·þÎñÔÝʱÖÐÖ¹£¬°üÀ¨ÐÂÎÅÍøÕ¾¡¢ÊÓƵÁ÷ýÌåƽ̨¡¢Òƶ¯Ö§¸¶ºÍÍøÂçÓʼþ·þÎñÒÔ¼°¸ß¶û·òϲ»¶ÕßÍøÕ¾µÈ¡£¸Ã¹«Ë¾ÔÚÉùÃ÷ÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬²¢ÌåÏÖÕýÔÚÆð¾¢»Ö¸´·þÎñ£¬´ó´ó¶¼·þÎñµÄ»á¼ûÒѻָ´£¬µ«²¿·ÖÄÚÈݸüпÉÄÜÑÓ³Ù¡£NTT Docomo佫´ËÊÂÎñ¹é×ïÓÚÈκÎÌض¨µÄÍþвÐÐΪÕߣ¬µ«ÖµµÃ×¢ÖصÄÊÇ£¬¸Ã¹«Ë¾ÔÚ2023ÄêÒѳÉΪRansomed.vcÍÅ»ïÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£×î½ü¼¸¸öÔ£¬ÈÕ±¾¶à¼Ò¹«Ë¾Ò²ÔâÊÜÁËÍøÂç¹¥»÷£¬°üÀ¨ÈÕ±¾º½¿Õ¡¢Èý¾®×¡ÓѺ£ÉÏ°ü¹Ü¹«Ë¾¡¢½Ç´¨¡¢¿¨Î÷Å·µÈ×ÅÃûÆóÒµ£¬ÒÔ¼°µçÄîÍ·ÖÆÔìÉÌNidec¡¢Æû³µÁ㲿¼þÖÆÔìÉÌYorozuºÍÑз¢»ú¹¹MonohakobiµÈ¡£±ðµÄ£¬ÈÕ±¾Ö÷Òª½ðÈÚ»ú¹¹ÈçÈýÁâÈÕÁªÒøÐС¢ÀïË÷ÄÉÒøÐкÍÈðËëÒøÐеÄÍøÉÏÒøÐзþÎñÒ²ÒòÉæÏÓÍøÂç¹¥»÷¶øÖÐÖ¹¡£


https://therecord.media/ntt-docomo-japan-mobile-carrier-ddos-incident


4. ³¬Èý°ÙÍòÓʼþ·þÎñÆ÷δ¼ÓÃÜ£¬Ò×ÊÜÍøÂçÐá̽¹¥»÷


1ÔÂ2ÈÕ£¬ÏÖÔÚ»¥ÁªÍøÉϱ£´æÁè¼ÝÈý°ÙÍò¸öδ½ÓÄÉTLS¼ÓÃܵÄPOP3ºÍIMAPÓʼþ·þÎñÆ÷£¬ÕâЩ·þÎñÆ÷ÈÝÒ×ÔâÊÜÍøÂçÐá̽¹¥»÷¡£IMAPºÍPOP3ÊÇ»á¼ûµç×ÓÓʼþµÄÁ½ÖÖÒªÁ죬ÆäÖÐIMAP½¨ÒéÓÃÓÚ¶à×°±¸Í¬²½£¬¶øPOP3ÔòÏÂÔØÓʼþµ½ÍâµØ×°±¸¡£µ±TLS¼ÓÃÜδÆôÓÃʱ£¬ÓʼþÄÚÈݺÍƾ֤½«ÒÔÃ÷ÎÄÐÎʽ·¢ËÍ£¬ÔöÌíÁ˱»¹¥»÷µÄΣº¦¡£ShadowServerÇå¾²Íþв¼à¿Øƽ̨µÄɨÃèÏÔʾ£¬ÕâЩδ¼ÓÃܵÄÓʼþ·þÎñÆ÷̻¶ÁËÓû§ÃûºÍÃÜÂ룬ʹÆäÒ×Êܹ¥»÷¡£ShadowServerÕýÔÚ֪ͨÏà¹ØÔËÓªÉÌÆôÓÃTLSÖ§³Ö£¬ÒÔ± £»¤Óû§Êý¾Ý¡£±ðµÄ£¬Ëæ×ÅTLSЭÒéµÄÒ»Ö±Éú³¤£¬²»Çå¾²µÄTLS 1.0ºÍTLS 1.1ЭÒéÒѱ»ïÔÌ­£¬ÏÖ´ú²Ù×÷ϵͳĬÈÏÆôÓøüÇå¾²µÄTLS 1.3°æ±¾¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÒ²ÌṩÁËÌæ»»¹ýʱTLSЭÒéÉèÖõÄÖ¸µ¼£¬ÒÔ±ÜÃâ¹¥»÷ÕßʹÓÃÕâЩÉèÖûá¼ûÃô¸ÐÊý¾Ý¡£


https://www.bleepingcomputer.com/news/security/over-3-million-mail-servers-without-encryption-exposed-to-sniffing-attacks/


5. RansomHubÉù³ÆÈëÇִ󶼻áÈËÊÙ£¬°ü¹Ü¾ÞÍ··ñ¶¨


12ÔÂ31ÈÕ£¬RansomHub×éÖ¯Éù³ÆÔÚÐÂÄêǰϦÈëÇÖÁËÈ«Çò×î´ó°ü¹Ü¡¢Äê½ðºÍÔ±¹¤¸£ÀûÍýÏëÌṩÉÌÖ®Ò»µÄ´ó¶¼»áÈËÊÙ°ü¹Ü¹«Ë¾(MetLife)£¬²¢ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˹¥»÷ÐÅÏ¢£¬Éù³ÆÇÔÈ¡ÁË1TBÃô¸ÐÊý¾Ý¡£È»¶ø£¬´ó¶¼»áÈËÊÙ·ñ¶¨±¬·¢ÀÕË÷Èí¼þ¹¥»÷£¬½öÈ·ÈÏÆä×Ó¹«Ë¾Fondo GenesisÔÚ¶ò¹Ï¶à¶ûÔâÓöÍøÂçÊÂÎñ£¬ÇÒÓëÆóҵϵͳÍÑÀëÔËÓª¡£RansomHubÐû²¼µÄÑù±¾Îļþ¶àΪÎ÷°àÑÀÓ¾ÝÍƲâÀ´×Դ󶼻áÈËÊÙÀ­¶¡ÃÀÖÞ·Ö²¿¡£´ó¶¼»áÈËÊÙÔÚÈ«Çò115¸ö¹ú¼ÒΪÁè¼Ý1ÒÚ¿Í»§Ìṩ·þÎñ£¬ÆäÖаüÀ¨1000ÍòÃÀ¹úÒÔÍâµØÇø¿Í»§¡£±ðµÄ£¬Æ¾Ö¤ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾Hudson Rock 11 Ô·ݵı¨¸æ£¬Ò»ÃûºÚ¿Íй¶Á˽ü60ÍòÌõ¾Ý³ÆÊôÓڴ󶼻áÈËÊÙµÄÊý¾Ý¼Í¼£¬Ñо¿Ö°Ô±ÏÓÒÉÕâÓë MOVEit Îó²îÓйØ£¬µ«´ó¶¼»áÈËÊÙ·ñ¶¨ÓëCl0pÀÕË÷Èí¼þ×éÖ¯µÄMOVEitºÚ¿Í¹¥»÷ÓйØ¡£


https://cybernews.com/news/metlife-latin-america-claimed-by-ransomhub-group/


6. ÒÔÌ«·»¿ª·¢Ö°Ô±ÔâÓöʹÓöñÒânpm°üµÄÖØ´ó¹©Ó¦Á´¹¥»÷


1ÔÂ2ÈÕ£¬¾ÝSocketÑо¿ÍŶÓÅû¶£¬ÒÔÌ«·»¿ª·¢Ö°Ô±ÒѳÉΪÖØ´ó¹©Ó¦Á´¹¥»÷µÄÄ¿µÄ£¬¹¥»÷ÕßʹÓÃÈËÃǶԿªÔ´Éú̬ϵͳµÄÐÅÍУ¬ÔÚnpmÉú̬ϵͳÖÐÐû²¼ÁËÖÁÉÙ20¸ö¶ñÒâHardhat²å¼þ£¬ÕâЩ²å¼þÃû³ÆÓëÕýµ±Èí¼þ°üºÍ×éÖ¯ÏàËÆ£¬ÀýÈç@nomisfoundation/hardhat-configureºÍhardhat-deploy-others£¬ÆäÖÐһλ×÷ÕßµÄÏÂÔØÁ¿Áè¼Ý1,000´Î¡£ÕâЩ¶ñÒâÈí¼þ°üÉù³Æ¿ÉÒÔÔöÇ¿ÊÂÇéÁ÷³Ì£¬ÊµÔòÉñÃØÇÔÈ¡ÊÜѬȾµÄ¿ª·¢ÇéÐÎÖеÄÃô¸ÐÊý¾Ý£¬ÈçÖú¼Ç·ûºÍ˽ԿµÈ¡£¹¥»÷Õß½ÓÄɶàÌõÀíÕ½ÂÔ£¬°üÀ¨´ÓHardhatÔËÐÐÇéÐÎÖÐÌáÈ¡Òªº¦ÐÅÏ¢£¬Ê¹ÓÃAESÃÜÔ¿¼ÓÃÜÊý¾Ý²¢´«Êäµ½¹¥»÷Õß¿ØÖƵĶ˵㣬ÒÔ¼°Ê¹ÓÃÒÔÌ«·»ÖÇÄܺÏÔ¼¶¯Ì¬¼ìË÷ÏÂÁîÓë¿ØÖÆ£¨C2£©·þÎñÆ÷µØµã£¬ÊµÏÖC2»ù´¡ÉèÊ©µÄÈ¥ÖÐÐÄ»¯ºÍ²»¿É¸Ä¶¯ÌØÕ÷£¬ÔöÌíÁËÆÆËðÄѶÈ¡£´Ë´ÎÔ˶¯¸øÒÔÌ«·»¿ª·¢ÉçÇø´øÀ´ÁËÖØ´óΣº¦£¬Ç¿µ÷ÁË¿ªÔ´Éú̬ϵͳÖеÄÇå¾²ÎÊÌâ¡£


https://securityonline.info/supply-chain-attack-on-ethereum-developers-via-malicious-npm-packages/