Ò½ÁÆÈí¼þ¹«Ë¾ESOÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬270ÍòÈËÊܵ½Ó°Ïì

Ðû²¼Ê±¼ä 2023-12-26
1¡¢Ò½ÁÆÈí¼þ¹«Ë¾ESOÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬270ÍòÈËÊܵ½Ó°Ïì


¾Ý12ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ò½ÁÆ»ú¹¹µÄÊý¾ÝºÍÈí¼þÌṩÉÌESO SolutionsÒÑ×îÏÈÏò270ÍòÈË·¢ËÍÊý¾Ýй¶֪ͨ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÓÚ9ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ESOÔâµ½ÁËÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÆÈʹÆäÔÝʱ¹Ø±Õϵͳ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷Õß»á¼û²¢¼ÓÃÜÁËÄÚ²¿ÏµÍ³£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾ÌåÏÖÒÑʹÓñ¸·Ý»Ö¸´ÁËÕâЩϵͳ¡£¡£¡£¡£¡£¡£¡£ËäÈ»ÀÕË÷¹¥»÷ÍÅ»ïµÄÉí·ÝÈÔδȷ¶¨£¬£¬£¬£¬£¬£¬µ«ESOµÄÉùÃ÷Åú×¢¸Ã¹«Ë¾¿ÉÄÜÒѽ»Êê½ðÀ´È·±£É¾³ý±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/eso-hit-ransomware-27m-impacted/


2¡¢¡¶ÏÀµÁÁÔ³µÊÖ5¡·£¨GTA 5£©µÄÔ´´úÂë±»¹ûÕæÔÚ¶à¸öÇþµÀ


¾ÝýÌå12ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¡¶ÏÀµÁÁÔ³µÊÖ5¡·£¨GTA 5£©µÄÔ´´úÂëÔÚÊ¥µ®Ò¹±»Ð¹Â¶£¬£¬£¬£¬£¬£¬Õâ¾àÀëLapsus$ÈëÇÖRockstar Games²¢ÇÔÈ¡¹«Ë¾Êý¾ÝÒѾ­ÒÑÍùÁËÒ»Äê¶à¡£¡£¡£¡£¡£¡£¡£ÏÂÔØÔ´´úÂëµÄÁ´½Ó±»·ÖÏíµ½¶à¸öÇþµÀ£¬£¬£¬£¬£¬£¬°üÀ¨DiscordÒÔ¼°Telegram¡£¡£¡£¡£¡£¡£¡£ÔÚTelegramÉÏ£¬£¬£¬£¬£¬£¬ÃûΪPhilµÄÓû§Ðû²¼Á˱»µÁÔ´´úÂëµÄÁ´½Ó£¬£¬£¬£¬£¬£¬²¢·ÖÏíÁËÆäÖÐÒ»¸öÎļþ¼ÐµÄ½ØÍ¼¡£¡£¡£¡£¡£¡£¡£DiscordÉϵÄй¶ÕßÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ8Ô·ݾÍÊÕµ½ÁËÔ´´úÂë¡£¡£¡£¡£¡£¡£¡£ËûÃǵÄÄîÍ·Êǹ¥»÷¡¶GTA 5¡·¸Ä×°³¡¾°ÖеÄÕ©Æ­ÐÐΪ£¬£¬£¬£¬£¬£¬Ðí¶àÈ˱»Éù³ÆÓµÓÐÔ´´úÂëµÄÈËÓÕÆ­¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gta-5-source-code-reportedly-leaked-online-a-year-after-rockstar-hack/


3¡¢Å·ÃËÖ´·¨»ú¹¹³Æ443¸öµçÉÌÆ½Ì¨Ôâµ½¶ñÒâ¾ç±¾µÄ¹¥»÷


ýÌå12ÔÂ24Èճƣ¬£¬£¬£¬£¬£¬Å·ÖÞÐ̾¯×éÖ¯ºÍENISAÏàÖú¿ªÕ¹ÁËÒ»ÏîÁªºÏÖ´·¨Ðж¯£¬£¬£¬£¬£¬£¬·¢Ã÷443¸öµçÉÌÆ½Ì¨Ñ¬È¾ÁËskimmer¡£¡£¡£¡£¡£¡£¡£SkimmerÊÇÌí¼Óµ½½áÕËÒ³Ãæ»ò´ÓÔ¶³Ì×ÊÔ´¼ÓÔØµÄһС¶ÎJavaScript´úÂ룬£¬£¬£¬£¬£¬Ö¼ÔÚ×èµ²ºÍÇÔȡ֧¸¶¿¨ºÅ¡¢ÓÐÓÃÆÚ¡¢ÑéÖ¤Âë¡¢ÐÕÃûºÍËÍ»õµØµã£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓõçÉÌÆ½Ì¨ºÍÄÚÈÝÖÎÀíϵͳÖеÄÎó²îÀ´×¢Èë¶ñÒâ¾ç±¾¡£¡£¡£¡£¡£¡£¡£Group-IBÐû²¼µÄÆäËüÐÅÏ¢ÏÔʾ£¬£¬£¬£¬£¬£¬Õâ´ÎÐж¯·¢Ã÷ÁË23¸ö²î±ðµÄJavaScriptÐá̽¹¤¾ß£¬£¬£¬£¬£¬£¬°üÀ¨ATMZOW¡¢health_check¡¢FirstKiss¡¢FakeGA¡¢AngryBeaver¡¢InterºÍR3ninµÈ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/156340/security/europol-and-enisa-spotted-443-e-stores-compromised-with-digital-skimming.html


4¡¢GoogleÒÑɾ³ý3¸öð³äVPNµÄ¶ñÒâChromeÀ©Õ¹³ÌÐò


ýÌå12ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬3¸öð³äVPNµÄ¶ñÒâChromeÀ©Õ¹±»ÒÑÏÂÔØÁË150Íò´Î¡£¡£¡£¡£¡£¡£¡£ËüÃÇ×÷Ϊä¯ÀÀÆ÷Ð®ÖÆ¹¤¾ß¡¢Ïֽ𷵻¹ºÚ¿Í¹¤¾ßºÍÊý¾ÝÇÔÈ¡¹¤¾ß£¬£¬£¬£¬£¬£¬Òþ²ØÔÚ¡¶ÏÀµÁÁÔ³µÊÖ¡·¡¢¡¶´Ì¿ÍÐÅÌõ¡·ºÍ¡¶Ä£ÄâÈËÉú4¡·µÈÈÈÃÅÓÎÏ·µÄµÁ°æ×°ÖóÌÐò¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬¶øÕâЩµÁ°æÓÎÏ·¶¼ÊÇ´ÓtorrentÍøÕ¾·Ö·¢µÄ¡£¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬¶ñÒâÀ©Õ¹ÊÇnetPlus£¨100Íò´Î×°Öã©¡¢netSaveºÍnetWin£¨50Íò´Î£©£¬£¬£¬£¬£¬£¬´ó´ó¶¼Ñ¬È¾±¬·¢ÔÚ¶íÂÞ˹ÒÔ¼°ÎÚ¿ËÀ¼¡¢¹þÈø¿Ë˹̹ºÍ°×¶íÂÞ˹µÈ¹ú¼Ò¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬GoogleÒÑÔÚChromeÍøÉÏÓ¦ÓõêÖÐɾ³ýÁËÕâЩ¶ñÒâÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-vpn-chrome-extensions-force-installed-15-million-times/


5¡¢Ñо¿ÍŶÓÅû¶Õë¶ÔÓ¡¶ÈÕþ¸®»ú¹¹µÄRusticWebÐж¯


SEQRITEÓÚ12ÔÂ21ÈÕÅû¶Á˶ÔÓ¡¶ÈµÄ´úºÅΪ¡°Operation RusticWeb¡±µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ10Ô·ÝÊ״α»¼ì²âµ½£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¡¶ÈÕþ¸®»ú¹¹ºÍ¹ú·À²¿·Ö£¬£¬£¬£¬£¬£¬Ö¼ÔÚ·Ö·¢»ùÓÚRustµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬À´¾ÙÐÐÇé±¨ÍøÂç¡£¡£¡£¡£¡£¡£¡£ÐµĻùÓÚRustµÄpayloadºÍ¼ÓÃܵÄPowerShellÏÂÁî±»ÓÃÀ´½«ÉñÃØÎĵµÐ¹Â¶µ½»ùÓÚWebµÄЧÀÍÒýÇæ£¬£¬£¬£¬£¬£¬¶ø²»ÊÇרÓõÄC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÓëTransparent TribeºÍSideCopyÔÚÕ½ÊõÉϱ£´æÖصþ¡£¡£¡£¡£¡£¡£¡£

https://thehackernews.com/2023/12/operation-rusticweb-rust-based-malware.html


6¡¢ThreatFabricÐû²¼AndroidľÂíChameleonµÄ±¨¸æ


12ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ThreatFabricÐû²¼Á˹ØÓÚAndroidľÂíChameleonа汾µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×Ô2023ÄêÍ·×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬×î³õÖ÷ÒªÕë¶Ô°Ä´óÀûÑǺͲ¨À¼µÄÊÖ»úÒøÐÐÓ¦Ó㬣¬£¬£¬£¬£¬ÏÖÔÚÆäÓ°Ïì¹æÄ£À©´óµ½ÁËÓ¢¹úºÍÒâ´óÀû¡£¡£¡£¡£¡£¡£¡£Ð°汾ChameleonÓÐÁ½ÏîÒýÈËעĿµÄй¦Ð§£ºËü¿ÉÒÔÈÆ¹ýÉúÎïʶ±ðÌáÐÑ£¬£¬£¬£¬£¬£¬»¹¿ÉÒÔÏÔʾHTMLÒ³Ãæ£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚʹÓÃAndroid 13µÄ"Restricted Settings"¹¦Ð§µÄ×°±¸ÉÏÆôÓÃÎÞÕϰ­Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£


https://www.threatfabric.com/blogs/android-banking-trojan-chameleon-is-back-in-action