HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æÄ£Ð¹Â¶ £¬É漰δÐû²¼ºÍɾ¼õ°æ±¾

Ðû²¼Ê±¼ä 2024-12-30

1. HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æÄ£Ð¹Â¶ £¬É漰δÐû²¼ºÍɾ¼õ°æ±¾


12ÔÂ27ÈÕ £¬Áè¼Ý25ÄêµÄHaloÓÎÏ·ÄÚÈÝ¿ËÈÕÔÚÍøÉϱ»Ð¹Â¶ £¬ÆäÖаüÀ¨¸Ã±ê¼ÇÐÔµÚÒ»È˳ÆÉä»÷ÓÎϷϵÁмÓÈëXboxǰµÄ¿ÉÍæ°æ±¾ £¬ÉõÖÁÊÇ×îÔçµÄFPS°æ±¾¡£¾ÝÍÆ²â £¬Ð¹Â¶ÄÚÈÝÔ´×ÔHalo StudiosÓë·Û˿ģ×éÖÆ×÷ÕߵĺÏ×÷ £¬Ö¼ÔÚ»Ö¸´ÒÑÍùHaloÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£×ÔÈ¥ÄêÑ×ÌìÒÔÀ´ £¬ModÍŶÓDigsiteÒ»Ö±ÔÚÓë343 Industries£¨ÏÖÒѸüÃûΪHalo Studios£©ºÏ×÷ £¬ÎÞ³¥»Ö¸´ÓÎÏ·ÄÚÈÝ £¬Èç¡¶¹â»·Õ½¶·½ø»¯¡·µÄPC¶Ë¿Ú¶àÈËÓÎÏ·µØÍ¼¼°¾­µä¹âÖÜÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£ÓÈΪÒýÈËעĿµÄÊÇ £¬1999ÄêÔøÍýÏë³ÉΪMacµÚÈýÈ˳ƶÀÍÌÓÎÏ·µÄ¡¶¹â»·¡·Ê§´«ÒѾõÄMacÌìÏÂÑÝʾ°æÒ²ÍýÏë»Ö¸´ £¬µ«±¾ÖܵÄй¶ÒÑʹ¸Ã°æ±¾¿ÉÔÚPCÉÏÍêÕû²¥·Å £¬Í¬Ê±»¹Ð¹Â¶Á˽ü100GBµÄÆäËûÎļþ £¬°üÀ¨Bungie¿ª·¢µÄÔ­°æHaloÓÎÏ·ÖÐδÍê³ÉºÍɾ¼õµÄÄÚÈÝ¡£Digsite modÍŶÓǰ³ÉԱ֤ʵÁËй¶ÄÚÈݵÄÕæÊµÐÔ £¬µ«·ñ¶¨ÏÖÈλòǰÈγÉÔ±¶Ô´ËÈÏÕæ £¬²¢Í¸Â¶Òòȱ·¦Ð½³êºÍ×ÊÔ´ÕùÒé £¬´ó´ó¶¼modÍŶӳÉÔ±ÒѸæÍË¡£


https://www.videogameschronicle.com/news/over-25-years-of-classic-halo-content-has-leaked-online/


2. ChromeÀ©Õ¹³ÌÐòÔâ´ó¹æÄ£ÈëÇÖ £¬Óû§Ãô¸ÐÐÅϢй¶Σº¦ÔöÌí


12ÔÂ27ÈÕ £¬ÖÁÉÙÓÐÎå¸öChromeÀ©Õ¹³ÌÐòÔÚÒ»´ÎЭͬ¹¥»÷ÖÐÔâµ½ÈëÇÖ £¬¹¥»÷Õß×¢ÈëÁËÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢µÄ´úÂë¡£Êý¾Ýɥʧ·À»¤¹«Ë¾CyberhavenÅû¶Á˴˴ι¥»÷ £¬¸Ã¹«Ë¾ÔÚÀֳɶÔGoogle ChromeÊÐËÁµÄ¹ÜÀíÔ±ÕÊ»§¾ÙÐÐÍøÂç´¹ÂÚ¹¥»÷ºó £¬ÏòÆä¿Í»§·¢³öÁËÎ¥¹æ¾¯±¨ £¬ÆäÖаüÀ¨Snowflake¡¢Ä¦ÍÐÂÞÀ­¡¢¼ÑÄܵÈ×ÅÃû¹«Ë¾¡£ºÚ¿ÍÐ®ÖÆÁËÔ±¹¤µÄÕË»§²¢Ðû²¼Á˰üÀ¨¶ñÒâ´úÂëµÄCyberhavenÀ©Õ¹°æ±¾ £¬¸Ã´úÂë¿É½«Óû§µÄ¾­ÓÉÉí·ÝÑéÖ¤µÄ»á»°ºÍcookieй¶µ½¹¥»÷ÕßÓò¡£CyberhavenµÄÄÚ²¿Çå¾²ÍŶÓÔÚ·¢Ã÷¶ñÒâÈí¼þºóѸËÙ½«Æäɾ³ý £¬²¢Ðû²¼ÁË´¿¾»°æ±¾v24.10.5¡£½¨ÒéÓû§Éý¼¶µ½×îа汾 £¬²¢×÷·Ï·ÇFIDOv2µÄÃÜÂë¡¢ÂÖ»»ËùÓÐAPIÁîÅÆ²¢Éó²éä¯ÀÀÆ÷ÈÕÖ¾ÒÔÆÀ¹À¶ñÒâÔ˶¯¡£±ðµÄ £¬Nudge SecurityÑо¿Ô±Jaime Blasco·¢Ã÷ £¬Í³Ò»Ê±¼äÉÐÓÐÆäËûChromeÀ©Õ¹³ÌÐòÒ²±»×¢ÈëÁ˶ñÒâ´úÂëÆ¬¶Ï £¬°üÀ¨Internxt VPN¡¢VPNCity¡¢UvoiceºÍParrotTalksµÈ £¬½¨ÒéÕâЩÀ©Õ¹³ÌÐòµÄÓû§½«Æä´Óä¯ÀÀÆ÷ÖÐɾ³ý»òÉý¼¶µ½Çå¾²°æ±¾¡£ÈôÊDz»È·¶¨ £¬×îºÃÐ¶ÔØÀ©Õ¹³ÌÐò £¬ÖØÖÃÖ÷ÒªÕÊ»§ÃÜÂë £¬É¨³ýä¯ÀÀÆ÷Êý¾Ý £¬²¢½«ä¯ÀÀÆ÷ÉèÖÃÖØÖÃΪԭʼĬÈÏÖµ¡£


https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/


3. ºÚ¿ÍʹÓÃDoSÎó²î½ûÓÃPalo Alto Networks·À»ðǽ


12ÔÂ27ÈÕ £¬Palo Alto Networks·¢³öÇå¾²ÖÒÑÔ £¬Ö¸³öºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃCVE-2024-3393¾Ü¾ø·þÎñÎó²î £¬Í¨¹ý·¢ËͶñÒâÊý¾Ý°üÇ¿ÖÆÖØÆô·À»ðǽ £¬´Ó¶ø½ûÓÃÆä±£»¤¡£¸ÃÎó²î±£´æÓÚPalo Alto Networks PAN-OSÈí¼þµÄDNSÇå¾²¹¦Ð§ÖÐ £¬½öÓ°ÏìÆôÓÃÁË¡°DNSÇå¾²¡±ÈÕÖ¾¼Í¼µÄ×°±¸¡£¾ÝPalo Alto Networks͸¶ £¬¸ÃÎó²îÒѱ»ºÚ¿ÍÆð¾¢Ê¹Óà £¬µ±·À»ðǽ×èÖ¹¶ñÒâDNSÊý¾Ý°üʱ £¬¿Í»§¿ÉÄÜ»áÓöµ½·þÎñÖÐÖ¹¡£¸Ã¹«Ë¾ÒѾ­Õë¶Ô²¿·Ö°æ±¾Ðû²¼Á˲¹¶¡ £¬µ«PAN-OS 11.0ÒòÒѵִïÉúÃüÖÜÆÚÖÕÖ¹ÈÕÆÚ½«²»»áÊÕµ½²¹¶¡¡£¹ØÓÚÎÞ·¨Á¬Ã¦¸üеÄÓû§ £¬Palo Alto NetworksÌṩÏàʶ¾öÒªÁ컺ºÍ½â°ì·¨ £¬°üÀ¨½ûÓÃDNSÇå¾²ÈÕÖ¾¼Í¼µÈ £¬ÒÔÈ·±£×°±¸µÄÇå¾²ÔËÐС£Óû§Ó¦Æ¾Ö¤×Ô¼ºµÄ×°±¸ÀàÐͺ͹ÜÀí·½·¨ £¬½ÓÄÉÏìÓ¦µÄ²½·¥À´Ó¦¶Ô¸ÃÎó²î¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/


4. ¹«¹²Æû³µÈí¼þ¹«Ë¾CariadÔ¼80ÍòÁ¾µç¶¯Æû³µÐÅÏ¢ÔâÆØ¹â


12ÔÂ28ÈÕ £¬¹«¹²Æû³µÈí¼þ¹«Ë¾CariadʧÉ÷̻¶ÁËÔ¼80ÍòÁ¾µç¶¯Æû³µµÄÊý¾Ý £¬°üÀ¨¿ÉÄÜÓë¼ÝʻԱÐÕÃûÏà¹ØµÄÐÅÏ¢ºÍ³µÁ¾µÄ׼ȷλÖà £¬ÕâЩÊý¾ÝÔÚÑÇÂíÑ·ÔÆ´æ´¢Öд¦ÓÚδÊܱ£»¤×´Ì¬³¤´ïÊýÔ¡£Ì»Â¶µÄÊý¾Ý¿âº­¸ÇÁ˹«¹²¡¢Î÷ÑÅÌØ¡¢°ÂµÏºÍ˹¿Â´ïµÈÆ·ÅÆ £¬²¿·Ö³µÁ¾µÄµØÀíλÖÃÊý¾Ý׼ȷµ½¼¸ÀåÃס£¾Ý³Æ £¬ÕâÊÇÓÉÓÚCariadÔÚÁ½¸öITÓ¦ÓóÌÐòÖеÄÉèÖò»×¼È·µ¼ÖµÄ¡£Å·ÖÞÆ·µÂºÚ¿Í×éÖ¯»ìãçÅÌËã»ú¾ãÀÖ²¿(CCC)·¢Ã÷ÁËÕâÒ»Îó²î £¬²¢ÔÚÏòCariadºÍ¹«¹²¹«Ë¾×ª´ïǰ¾ÙÐÐÁ˲âÊÔ¡£CariadÌåÏÖ £¬Ð¹Â¶µÄÊý¾Ý½öÓ°ÏìÒÑÅþÁ¬µ½»¥ÁªÍø²¢ÒÑ×¢²áÔÚÏß·þÎñµÄ³µÁ¾ £¬²¢Ç¿µ÷Ö»ÓÐÈÆ¹ý¶àÖÖÇå¾²»úÖÆ²Å»ª»á¼ûÊý¾Ý £¬ÇÒµ¥¸ö³µÁ¾Êý¾Ý±»ÄäÃû»¯¡£È»¶ø £¬¡¶Ã÷¾µ¡·ÖÜ¿¯µÄÍŶӷ¢Ã÷ÓÐÈËʹÓÃÃâ·ÑÈí¼þÍøÂçÁ˵¹úÕþ¿ÍµÄÆû³µÎ»ÖÃÏêϸÐÅÏ¢¡£CariadÔÚÊÕµ½CCCµÄ±¨¸æºóѸËÙ·´Ó¦ £¬½â¾öÁËÎÊÌâ²¢¹Ø±ÕÁË»á¼ûȨÏÞ¡£¸Ã¹«Ë¾Ã»ÓÐÖ¤¾ÝÅú×¢³ýCCCºÚ¿ÍÖ®ÍâµÄÆäËû·½¿ÉÒÔ»á¼ûÒÑй¶µÄ³µÁ¾Êý¾Ý £¬»òÕâЩÐÅÏ¢±»µÚÈý·½ÀÄÓá£CariadÌåÏÖ £¬´Ó³µÁ¾ÍøÂçµÄÊý¾ÝÓÐÖúÓÚΪ¿Í»§Ìṩ¡¢¿ª·¢ºÍË¢ÐÂÊý×Ö¹¦Ð§ £¬²¢½ÓÄÉÁËǿʢµÄÊý¾Ý±£»¤²½·¥¡£


https://www.bleepingcomputer.com/news/security/customer-data-from-800-000-electric-cars-and-owners-exposed-online/


5. Ç×¶í×éÖ¯NoName057¶ÔÒâ´óÀûÌᳫÐÂÒ»ÂÖDDoS¹¥»÷


12ÔÂ28ÈÕ £¬ÔÚµØÔµÕþÖÎÖ÷ÒªÊ±ÊÆ¼Ó¾çµÄÅä¾°Ï £¬Ç×¶í×éÖ¯NoName057¶ÔÒâ´óÀû»ù´¡ÉèÊ©ÌᳫÁËÐÂÒ»ÂÖDDoS¹¥»÷¡£´Ë´Î¹¥»÷Ä¿µÄ°üÀ¨Âí¶ûÅíÈø»ú³¡¡¢ÀûÄÉÌØ»ú³¡¡¢Íâ½»²¿¼°¶¼Á齻ͨ¼¯ÍŵÄÍøÕ¾¡£Ö»¹ÜÕâЩ¹¥»÷¶Ô»ú³¡µÄÏÖʵÔËӪδÔì³ÉÓ°Ïì £¬µ«Ïà¹ØÍøÕ¾¾ù·ºÆðÁË»á¼ûÎÊÌâ¡£NoName057×éÖ¯ÔÚÆäTelegramƵµÀÉÏÉù³Æ £¬´Ë´ÎÏ®»÷ÊǶÔÒâ´óÀû¿Ö¶íÈËÊ¿µÄ»ØÓ¦¡£Òâ´óÀûÓÊÕþ¾¯Ô±¾ÖµÄCnaipicÕýÔÚÊÓ²ì´Ë´ÎÍøÂç¹¥»÷ £¬²¢×ÊÖúÊܺ¦Õß¼õÇá¹¥»÷¡£¾ÝÓÊÕþºÍͨѶ¾¯Ô±¾Ö¾Ö³¤Í¸Â¶ £¬Ï®»÷ÕßÊÇ×·Çó×ÅÃû¶ÈµÄÒâʶÐÎ̬Çý¶¯µÄÍøÂç·¸·¨·Ö×Ó £¬¶ø·ÇÖ¼ÔÚÔì³ÉÏÖʵË𺦡£±ðµÄ £¬NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ö±»îÔ¾ £¬Ä¿µÄÊÇÈ«ÇòÕþ¸®ºÍÒªº¦»ù´¡ÉèÊ©×éÖ¯ £¬ËûÃÇʹÓöàÖÖ¹¤¾ß¾ÙÐй¥»÷ £¬²¢ÔÚµØÔµÕþÖÎÖ÷ҪʱÆÚÉý¼¶Ï®»÷¡£´Ë´Î¹¥»÷±¬·¢ÔÚÊ¥µ®½Ú¼ÙÆÚ £¬¾ßÓÐÕ½ÂÔÒâÒå £¬ÓÉÓÚ´Ëʱ×éÖ¯Ö°Ô±ïÔÌ­¡¢ÏìӦʱ¼ä±äÂý £¬Ê¹µÃʵʱ·¢Ã÷¡¢»º½âºÍ´Ó¹¥»÷Öлָ´±äµÃÔ½·¢ÄÑÌâ¡£


https://securityaffairs.com/172395/security/pro-russia-group-noname057-targets-italian-airports.html


6. FICORAÓëCAPSAICIN½©Ê¬ÍøÂçÒý·¢È«ÇòÇå¾²¾¯±¨


12ÔÂ28ÈÕ £¬2024Äê10ÔºÍ11ÔÂʱ´ú £¬FortiGuard LabsÊӲ쵽Á½¸öеĽ©Ê¬ÍøÂç¡°FICORA¡±ºÍ¡°CAPSAICIN¡±µÄÔ˶¯ÏÔÖøÔöÌí¡£ÕâÁ½¸ö½©Ê¬ÍøÂç±»ÒÔΪÊÇÖøÃûµÄMiraiºÍKaiten½©Ê¬ÍøÂçµÄ±äÌå £¬Äܹ»Ö´ÐжñÒâÏÂÁî¡£ËüÃÇʹÓÃshell¾ç±¾ £¬Ö÷ÒªÕë¶ÔLinuxϵͳ £¬²»µ«Äܹ»É±ËÀ¶ñÒâÈí¼þÀú³Ì £¬»¹ÄÜ·¢¶¯DDoS¹¥»÷¡£ÌØÊâµØ £¬¡°FICORA¡±½©Ê¬ÍøÂçÓ°ÏìÁ˶à¸ö¹ú¼Ò £¬¶ø¡°CAPSAICIN¡±ÔòÖ÷ÒªÕë¶Ô¶«ÑǵØÇø £¬²¢ÔÚ¸ÃÇøÓòÒ»Á¬»îÔ¾ÁËÁ½Ìì¶à¡£±ðµÄ £¬¹¥»÷Õß»¹Ê¹ÓÃÒÑÖªµÄD-Link·ÓÉÆ÷Îó²î£¨ÈçCVE-2015-2051ºÍCVE-2024-33112£©À´Ö´ÐжñÒâ²Ù×÷¡£Õë¶ÔÕâЩÍþв £¬FortiGuard Labs½¨ÒéÓû§°´ÆÚ¸üй̼þ £¬²¢ÊµÑéǿʢµÄÍøÂç¼à¿Ø²½·¥ÒÔ±ÜÃâ¹¥»÷¡£


https://hackread.com/ficora-capsaicin-botnet-d-link-router-flaws-ddos-attacks/