Avira¸üдæÔÚBugµ¼ÖÂWindows¼ÆËã»úÔÚÆô¶¯ºóËÀ»ú
Ðû²¼Ê±¼ä 2023-12-14¾ÝýÌå12ÔÂ12ÈÕ±¨µÀ£¬×ÔÉÏÖÜÎåÒÔÀ´£¬Ðí¶àWindowsÓû§³ÂËßÁËϵͳÔÚÆô¶¯ºó²»¾Ã¶³½áµÄÎÊÌ⣬ÕâÓëAviraÄþ¾²Èí¼þ¸üÐÂBugÓйء£AviraÆô¶¯ºóԼĪ20Ã룬Õû¸öϵͳ±äµÃÎÞÏìÓ¦£¬Ö»ÄÜͨ¹ý»úÏäÉϵÄÖØÆô°´Å¥À´ÖØÆôµçÄÔ¡£ÊÜÓ°ÏìµÄÓû§·¢ÏÖ£¬Î¨Ò»µÄµ÷Í£´ëÊ©¾ÍÊÇÆô¶¯µ½Äþ¾²Ä£Ê½µÄÍ¬Ê±Ð¶ÔØAviraµÄÈí¼þ£¬µ«ÊDz¿ÃÅÓû§ÔÚÍêȫɾ³ýAviraÈí¼þʱÓöµ½ÁËÀ§ÄÑ¡£AviraÌåÏÖ£¬¸ÃÎÊÌâÊÇÓÉAviraÄÚ²¿·À»ðǽµ¼Öµģ¬ÓÚ12ÔÂ9ÈÕÊ״γÂËߣ¬²¢Ó¦Í¨¹ý12ÔÂ11ÈյĸüÐÂ×Ô¶¯ÐÞ¸´¡£
https://www.bleepingcomputer.com/news/technology/avira-antivirus-causes-windows-computers-to-freeze-after-boot/
2¡¢Insomniac GamesÔâµ½Rhysida¹¥»÷±»ÀÕË÷200ÍòÃÀÔª
ýÌå12ÔÂ14Èճƣ¬Ë÷ÄáÌåÏÖÕýÔÚÊÓ²ìÆä×Ó¹«Ë¾Insomniac GamesÔâµ½µÄÀÕË÷¹¥»÷¡£RhysidaÉù³ÆÈëÇÖÁËInsomniac Games£¬²¢¹ûÈ»Á˲¿Ãű»µÁÊý¾ÝµÄ½ØÍ¼£¬Éæ¼°ÄÚ²¿Óʼþ¡¢»¤ÕÕ¸±±¾¡¢¸öÈËÉí·ÝÖ¤ÒÔ¼°ÓëÓÎÏ·×ʲú»òÓÎÏ·Íæ·¨Ïà¹ØµÄͼÏñ¡£¸ÃÍÅ»ïÍþвҪÅÄÂô±»µÁÊý¾Ý£¬¸øÁËInsomniacÒ»ÖܵÄʱ¼äÀ´»ØÓ¦ËûÃǵÄÒªÇó£¬È»ºó»á½«±»µÁÊý¾ÝÐû²¼¸ø³ö¼Û×î¸ßÕߣ¬ÆðÅļÛΪ50±ÈÌØ±Ò£¨Ô¼200ÍòÃÀÔª£©¡£
https://therecord.media/sony-investigating-ransomware-insomniac-games
3¡¢Î¢ÈíÅû¶ÀûÓÃOAuthÓ¦ÓõÄ×Ô¶¯»¯BECºÍÍÚ¿óµÈ¹¥»÷
12ÔÂ12ÈÕ£¬Î¢ÈíÐû²¼³ÂË߳ƣ¬³öÓÚ¾¼Ã¶¯»úµÄ¹¥»÷ÕßÕýÔÚʹÓÃOAuthÓ¦ÓÃÀ´×Ô¶¯Ö´ÐÐBECºÍµöÓã¹¥»÷¡¢ÍÆËÍÀ¬»øÓʼþÒÔ¼°°²×°ÐéÄâ»ú½øÐмÓÃÜÍÚ¾ò¡£Ò»¸ö°¸ÀýÖУ¬Storm-1283ÍŻﴴ½¨ÁËÒ»¸öOAuthÓ¦ÓÃÀ´²¿ÊðÍÚ¿óÐéÄâ»ú¡£¸øÄ¿±êÔì³ÉÁË1-150ÍòÃÀÔªµÄËðʧ£¬¾ßÌå½ð¶îÈ¡¾öÓÚ¹¥»÷µÄÁ¬ÐøÊ±¼ä¡£ÁíÒ»¸ö¹¥»÷ÍÅ»ïÀûÓñ»Ñ¬È¾ÕÊ»§´´½¨µÄOAuthÓ¦ÓÃÀ´Î¬³Ö³Ö¾ÃÐÔ£¬²¢Ê¹ÓÃÖмä¶ÔÊÖ(AiTM)µöÓ㹤¾ß°üÖ´ÐеöÓã¹¥»÷¡£¶øStorm-1286ÍÅ»ïͨ¹ýOAuthÓ¦ÓýøÐÐÁË´ó¹æÄ£µÄÀ¬»øÓʼþ·Ö·¢»î¶¯¡£
https://www.microsoft.com/en-us/security/blog/2023/12/12/threat-actors-misuse-oauth-applications-to-automate-financially-driven-attacks/
4¡¢ÎÚ¿ËÀ¼×î´óÔËÓªÉÌKYIVSTARÔâµ½¹¥»÷·þÎñÔÝʱÖжÏ
¾Ý12ÔÂ12ÈÕ±¨µÀ£¬ÎÚ¿ËÀ¼×î´óµÄÔËÓªÉÌKyivstarÔâµ½¹¥»÷£¬Òƶ¯ºÍÊý¾Ý·þÎñÊܵ½Ó°Ïì¡£¸Ã¹«Ë¾ÎªÎÚ¿ËÀ¼Ô¼2600ÍòÒÆ¶¯¿Í»§ºÍÁè¼Ý100Íò¿í´øÀι̻¥ÁªÍø¿Í»§Ìṩ·þÎñ¡£12ÈÕÔçÉÏ£¬¸Ã¹«Ë¾Ðû²¼Ôâµ½ÍøÂç¹¥»÷£¬µ¼ÖÂÆä·þÎñÔÝʱÖжϡ£Ä¿Ç°£¬ËùÓÐÒÆ¶¯Í¨Ðźͻ¥ÁªÍø·ÃÎʾùÎÞ·¨Ê¹Óá£KyivstarÌåÏÖ£¬´Ë´ÎÄþ¾²Ê¼þ²¢Î´Ó°ÏìÈκθöÈËÊý¾Ý£¬ËùÓÐÊÜÓ°ÏìÇÒÎÞ·¨Ê¹Ó÷þÎñµÄÓû§¶¼½«»ñµÃÅâ³¥¡£
https://securityaffairs.com/155701/hacking/cyberattack-brought-down-ukraine-kyivstar.html
5¡¢Ó¢¹ú¹ú·À²¿ÒòÊý¾Ýй¶±»¼à¹Ü»ú¹¹·£¿î½ü44ÍòÃÀÔª
12ÔÂ13ÈÕ±¨µÀ³Æ£¬Ó¢¹ú¹ú·À²¿ÒòδÄܱ£»¤ÔÚ2021ÄêÒÆÃñµÄ°¢¸»º¹È˵ÄÐÅÏ¢£¬±»·£¿î35ÍòÓ¢°÷£¨Ô¼ºÏ44ÍòÃÀÔª£©¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬Ó¢¹úµÄ°¢¸»º¹ÖØÐ°²ÖúÍÔ®ÖúÕþ²ß£¨ARAP£©·¢ËÍÓʼþʱ·ºÆð´íÎ󣬿ÉÄܻᵼÖÂÈËÔ±ÉËÍö¡£ÓÉÓÚ·¢¼þÈËʹÓÃÁË"ÊÕ¼þÈË"×ֶΣ¬ÆäÖÐ245È˵ÄÐÅÏ¢±»ÒâÍâµØÌ»Â¶¸øÁËËùÓÐÊÕ¼þÈË¡£×î³õ£¬¹ú·À²¿±»Åж¨Ã»ÓÐ"½ÓÄÉÊʵ±µÄ¼¼ÊõºÍ×éÖ¯´ëÊ©"£¬±»´¦ÒÔ100ÍòÓ¢°÷µÄ·£¿î¡£Ëæºó·£¿î¼õÖÁ70ÍòÓ¢°÷£¬ÔÒòÊǸò¿ÃÅÔÚʼþ·¢Éúºó½ÓÄɵĴëÊ©¡£×îºó£¬Æ¾¾ÝICO¶Ô¹«¹²²¿ÃÅ·£¿îµÄй涨£¬·£¿î±»¼õ°ëÖÁ35ÍòÓ¢°÷¡£
https://www.infosecurity-magazine.com/news/ministry-defence-fined-afghan-data/
6¡¢Check PointÐû²¼11Ô·ÝÈ«ÇòÍþвָÊýµÄ·ÖÎö³ÂËß
12ÔÂ12ÈÕ£¬Check PointÐû²¼ÁË11Ô·ÝÈ«ÇòÍþвָÊýµÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬11Ô·¢ÏÖÁËеÄAsyncRAT»î¶¯£¬Í¨¹ý¶ñÒâHTMLÎļþ±»ÓÃÀ´Á÷´«Òþ±ÎµÄ¶ñÒâÈí¼þ¡£ÏÂÔØ·¨Ê½FakeUpdatesÔÚÔÝʱÍ˳öÁ½¸öÔºóÖØÐ½øÈë¶ñÒâÈí¼þÅÅÐаñ£¬Ö±½ÓÔ¾¾ÓµÚ¶þλ¡£½ÌÓýºÍÑо¿ÐÐÒµÈÔÈ»ÊÇ11ÔÂÔâµ½¹¥»÷×î¶àµÄÐÐÒµ¡£×îÈÝÒ×±»ÀûÓõÄ©¶´ÊÇHTTPÃüÁî×¢È루CVE-2021-43936ºÍCVE-2022-24086£©£¬Ó°ÏìÁËÈ«Çò45%µÄʵÌå
https://blog.checkpoint.com/research/november-2023s-most-wanted-malware-new-asyncrat-campaign-discovered-while-fakeupdates-re-entered-the-top-ten-after-brief-hiatus/