Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔµ¹ÊÔÓɱ»FTC·£¿î5.2ÒÚÃÀÔª
Ðû²¼Ê±¼ä 2022-12-201¡¢Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔµ¹ÊÔÓɱ»FTC·£¿î5.2ÒÚÃÀÔª
¾Ý12ÔÂ19ÈÕ±¨µÀ£¬±¤ÀÝÖ®Ò¹µÄÖÆÔìÉÌEpic Games½«Ö§¸¶5.2ÒÚÃÀÔª£¬ÒÔÏ¢ÕùÓйØÎ¥·´¶ùͯÒþ˽·¨ºÍʹÓÃÆáºÚģʽÓÕʹÊý°ÙÍòÓÎÏ·Íæ¼Ò¾ÙÐÐÎÞÒâÏûºÄµÄÖ¸¿Ø¡£FTCÔÚͶËßÖгƣ¬EpicÔÚδ֪ͨ»òδÕ÷µÃÆäâïÊÑÔ޳ɵÄÇéÐÎÏ£¬ÍøÂç13ËêÒÔÏÂÍæ¼ÒµÄÐÅϢΥ·´ÁËCOPPA£¬±»·£¿î2.75ÒÚÃÀÔª¡£±ðµÄ£¬Ëü»¹Ê¹ÓÃÆáºÚģʽÓÕÆ°üÀ¨¶ùͯºÍÇàÉÙÄêÔÚÄÚµÄFortniteÍæ¼Ò¾ÙÐв»ÐèÒªµÄÓÎÏ·ÄÚ¹ºÖã¬ÐëÏòÊÜÓ°Ïì¿Í»§Ö§¸¶2.45ÒÚÃÀÔªµÄÍ˿ÏÖÔÚ£¬¸Ã¹«Ë¾ÒÑË¢ÐÂĬÈÏÒþ˽ÉèÖ㬲¢¸ü¸ÄÁËÖ§¸¶Á÷³ÌÒÔ·À²»ÐëÒªµÄÊÕ·Ñ¡£
https://www.bleepingcomputer.com/news/gaming/epic-games-to-pay-520-million-for-privacy-violations-dark-patterns/
2¡¢ºÚ¿Í³öÊ۾ݳÆÊÇ´ÓGeminiÇÔÈ¡µÄ570ÍòÓû§µÄÐÅÏ¢
ýÌå12ÔÂ15Èճƣ¬ºÚ¿ÍÔÚ¶à¸ö°µÍøÆ½Ì¨³öÊ۾ݳÆÊÇÀ´×ÔGeminiµÄÊý¾Ý¿â£¬°üÀ¨570ÍòÓû§µÄÐÅÏ¢¡£¼ÓÃÜÇ®±ÒÉúÒâËùGemini½üÆÚÐû²¼Í¨Öª³Æ£¬µÚÈý·½¹©Ó¦ÉÌÔâµ½ÁËÍøÂç¹¥»÷£¬Î´¾ÊÚȨµÄ¹¥»÷ÕßÇÔÈ¡ÁËGemini¿Í»§µÄÓʼþµØµãºÍµç»°ºÅÂ룬ÏÖÔÚÒÑÓпͻ§ÊÕµ½ÁË´¹ÂÚµç×ÓÓʼþ¡£¸ÃÊý¾Ý¿âËÆºõÔÚ9ÔÂÆð¾Í×îÏȳöÊÛ£¬µ±ÊǼÛǮΪ30¸ö±ÈÌØ±Ò£¨Ô¼ºÏ520000ÃÀÔª£©¡£Gemini½¨Òé¿Í»§Ê¹ÓÃǿʢµÄÉí·ÝÑéÖ¤ÒªÁ죬²¢½¨Ò鼤»î2FA±£»¤»òʹÓÃÓ²¼þÇå¾²ÃÜÔ¿À´»á¼ûÕÊ»§¡£
https://securityaffairs.co/wordpress/139742/data-breach/5-7m-gemini-users-leak.html
3¡¢²ÍÒû¿Í»§ÖÎÀíÆ½Ì¨SevenRooms 427GBµÄÊý¾Ýй¶
¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ£¬ÔÚ¹¥»÷Õß³öÊÛ±»µÁÊý¾Ýºó£¬SevenRoomsÈ·ÈÏÆä±¬·¢ÁËÊý¾Ýй¶¡£SevenRoomsÊǹú¼ÊÁ¬Ëø²ÍÌüºÍÂùݷþÎñÌṩÉÌʹÓõIJÍÌü¿Í»§¹ØÏµÖÎÀí(CRM)ƽ̨£¬°üÀ¨MGM ResortsºÍBloomin' BrandsµÈ¡£12ÔÂ15ÈÕ£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬Éù³ÆÇÔÈ¡ÁËÒ»¸ö427 GBµÄ±¸·ÝÊý¾Ý¿â£¬ÆäÖаüÀ¨ÓйØSevenRooms¿Í»§µÄÐÅÏ¢¡£¾ÝϤ£¬Ð¹Â¶ÊÇÓÉÓÚSevenRoomsµÚÈý·½¹©Ó¦É̵ÄÎļþ´«Êä½Ó¿ÚÔ⵽δ¾ÊÚȨ»á¼ûµ¼Öµġ£
https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/
4¡¢Ñо¿ÍŶÓÅû¶ÀÖ¸ßBrickLinkÍøÕ¾ÖеÄAPIÇå¾²Îó²î
Salt SecurityÔÚ12ÔÂ15ÈÕÅû¶ÁËBrickLinkÍøÕ¾ÖеÄÁ½¸öAPIÎó²î¡£BrickLink.comÊÇLEGO GroupµÄ¹Ù·½¶þÊֺ͹ǶÀָ߻ýľÊг¡£¬ÓµÓÐÁè¼ÝÒ»°ÙÍòµÄ×¢²á»áÔ±¡£ÕâЩÎó²î¿É±»ÓÃÀ´½ÓÊÜ»áÔ±ÕÊ»§¡¢»á¼ûºÍÇÔÈ¡´æ´¢ÔÚÆ½Ì¨ÉϵÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬ÉõÖÁ»á¼ûÄÚ²¿Éú²úÊý¾Ý²¢ÆÆËðÄÚ²¿·þÎñÆ÷¡£µÚÒ»¸öÎó²îÊÇÓÅ»ÝȯËÑË÷²¿·ÖµÄ²éÕÒÓû§Ãû¶Ô»°¿òÖеÄXSSÎó²î£¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆÁ´½ÓÔÚÄ¿µÄÖÐ×¢ÈëºÍÖ´ÐдúÂë¡£µÚ¶þ¸öÎó²îλÓÚÉÏ´«µ½Çó¹ºÁбíÒ³Ãæ£¬¿Éͨ¹ýXXE¹¥»÷¶ÁÈ¡Web·þÎñÆ÷ÉϵÄÎļþ²¢Ö´ÐÐSSRF¹¥»÷£¬Õâ¿ÉÄܵ¼ÖÂAWS EC2ÁîÅÆÐ¹Â¶¡£
https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis
5¡¢Mandiant·¢Ã÷UNC4166Õë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷Ô˶¯
¾ÝMandiant 12ÔÂ15Èճƣ¬Æä·¢Ã÷ÁËÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹©Ó¦Á´¹¥»÷Ô˶¯¡£±»×·×ÙΪUNC4166µÄ¹¥»÷ÍÅ»ïͨ¹ýÎÚ¿ËÀ¼ÓïºÍ¶íÓïµÄTorrentÎļþ¹²ÏíÍøÕ¾£¬·Ö·¢Î±×°³ÉÕýµ±Windows 10×°ÖóÌÐòµÄľÂí»¯ISOÎļþ¡£ÕâЩ¶ñÒâ×°ÖóÌÐòÌṩµÄ¶ñÒâÈí¼þÄܹ»´ÓÄ¿µÄÅÌËã»úÍøÂçÊý¾Ý¡¢×°ÖÃÆäËü¶ñÒ⹤¾ß²¢½«ÇÔÈ¡µÄÊý¾Ýй¶µ½¹¥»÷ÕߵķþÎñÆ÷¡£ÔÚÆðÔ´Õì֮̽ºó£¬¹¥»÷Õß»¹×°ÖÃÁ˺óÃÅStowaway¡¢BeaconºÍSparepart£¬À´¼á³Ö¶ÔÄ¿µÄµÄ»á¼û¡¢Ö´ÐÐÏÂÁî¡¢´«ÊäÎļþºÍÇÔÊØÐÅÏ¢¡£
https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government
6¡¢TrendMicroÐû²¼¹ØÓÚÀÕË÷Èí¼þAgendaµÄÆÊÎö±¨¸æ
12ÔÂ16ÈÕ£¬TrendMicroÐû²¼Á˹ØÓÚÀÕË÷Èí¼þAgendaµÄÆÊÎö±¨¸æ¡£½üÆÚ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÓÃRust¿ª·¢µÄAgendaÑù±¾£¬¼ì²âЧ¹ûΪRansom.Win32.AGENDA.THIAFBB¡£AgendaÔÚÆäÍøÕ¾ÉÏÐû²¼µÄ±»¹¥»÷×é֯λÓÚ²î±ð¹ú¼Ò£¬Ö÷ÒªÊôÓÚÖÆÔìÒµºÍITÐÐÒµ£¬×ÜÊÕÈëÁè¼Ý5.5ÒÚÃÀÔª¡£Óë½ÓÊÜ10¸ö²ÎÊýµÄGolang±äÌå²î±ð£¬Rust±äÌåÖ»½ÓÊÜ3¸ö²ÎÊý£¬Ëü»¹Ê¹ÓüäЪÐÔ¼ÓÃÜÕ½ÂÔÀ´Ìṩ¸ü¿ìµÄ¼ÓÃܲ¢¸üÓÐÓõØÈƹý¼ì²â¡£
https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html


¾©¹«Íø°²±¸11010802024551ºÅ