Epic GamesÒòÎ¥·´ÒþÖÔ·¨µÈÔÒò±»FTC·£¿î5.2ÒÚÃÀÔª
°ä²¼¹¦·ò 2022-12-201¡¢Epic GamesÒòÎ¥·´ÒþÖÔ·¨µÈÔÒò±»FTC·£¿î5.2ÒÚÃÀÔª
¾Ý12ÔÂ19ÈÕ±¨Â·£¬µï±¤Ö®Ò¹µÄÔì×÷ÉÌEpic Games½«Ö§¸¶5.2ÒÚÃÀÔª£¬ÒԺͽâÓйØÎ¥·´¶ùͯÒþÖÔ·¨ºÍʹÓÃÒõÓôģʽÓÕʹÊý°ÙÍòÓÎÏ·Íæ¼Ò½øÐÐÎÞÒâÏû·ÑµÄÖ¸¿Ø¡£FTCÔÚͶËßÖгƣ¬EpicÔÚδ֪ͨ»òδÕ÷µÃÆä¸¸Ä¸Ô޳ɵÄÇé¿öÏ£¬ÍøÂç13ËêÒÔÏÂÍæ¼ÒµÄÐÅϢΥ·´ÁËCOPPA£¬±»·£¿î2.75ÒÚÃÀÔª¡£´Ë±í£¬Ëü»¹Ê¹ÓÃÒõÓôģʽºýŪÔ̺¬¶ùͯºÍÇàÉÙÄêÔÚÄÚµÄFortniteÍæ¼Ò½øÐв»±ØÒªµÄÓÎÏ·Äڲɰ죬ÐëÏòÊÜÓ°Ïì¿Í»§Ö§¸¶2.45ÒÚÃÀÔªµÄÍ˿Ŀǰ£¬¸Ã¹«Ë¾ÒѸĽøÄ¬ÈÏÒþÖÔÉèÖ㬲¢¸ü¸ÄÁËÖ§¸¶Á÷³ÌÒÔ·À²»ÓÃÒªµÄÊÕ·Ñ¡£
https://www.bleepingcomputer.com/news/gaming/epic-games-to-pay-520-million-for-privacy-violations-dark-patterns/
2¡¢ºÚ¿ÍÏúÊ۾ݳÆÊÇ´ÓGeminiÇÔÈ¡µÄ570ÍòÓû§µÄÐÅÏ¢
ýÌå12ÔÂ15Èճƣ¬ºÚ¿ÍÔÚ¶à¸ö°µÍøÆ½Ì¨ÏúÊ۾ݳÆÊÇÀ´×ÔGeminiµÄÊý¾Ý¿â£¬Ô̺¬570ÍòÓû§µÄÐÅÏ¢¡£¼ÓÃÜÇ®±ÒÂòÂôËùGemini½üÆÚ°ä²¼Í¨Öª³Æ£¬µÚÈý·½¹©¸øÉÌÔâµ½ÁËÍøÂç¹¥»÷£¬Î´¾ÊÚȨµÄ¹¥»÷ÕßÇÔÈ¡ÁËGemini¿Í»§µÄÓʼþµØÖ·ºÍµç»°ºÅÂ룬ĿǰÒÑÓпͻ§ÊÕµ½ÁË´¹µöµç×ÓÓʼþ¡£¸ÃÊý¾Ý¿âËÆºõÔÚ9ÔÂÆð¾ÍÆðÍ·ÏúÊÛ£¬µ±ÊǼÛֵΪ30¸ö±ÈÌØ±Ò£¨Ô¼ºÏ520000ÃÀÔª£©¡£Gemini½¨Òé¿Í»§Ê¹ÓÃ׳´óµÄÉí·ÝÑéÖ¤²½Ö裬²¢½¨Ò鼤»î2FA±£»¤»òʹÓÃÓ²¼þ°²È«ÃÜÔ¿À´½Ó¼ûÕÊ»§¡£
https://securityaffairs.co/wordpress/139742/data-breach/5-7m-gemini-users-leak.html
3¡¢²ÍÒû¿Í»§ÖÎÀíÆ½Ì¨SevenRooms 427GBµÄÊý¾Ýй¶
¾ÝýÌå12ÔÂ18ÈÕ±¨Â·£¬ÔÚ¹¥»÷ÕßÏúÊÛ±»µÁÊý¾Ýºó£¬SevenRoomsÈ·ÈÏÆä²úÉúÁËÊý¾Ýй¶¡£SevenRoomsÊǹú¼ÊÁ¬Ëø²ÍÌüºÍ¾Æµê·þÎñÌṩÉÌʹÓõIJÍÌü¿Í»§¹ØÏµÖÎÀí(CRM)ƽ̨£¬Ô̺¬MGM ResortsºÍBloomin' BrandsµÈ¡£12ÔÂ15ÈÕ£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉϰ䲼ÁËÊý¾ÝÑù±¾£¬Ðû³ÆÇÔÈ¡ÁËÒ»¸ö427 GBµÄ±¸·ÝÊý¾Ý¿â£¬ÆäÖÐÔ̺¬ÓйØSevenRooms¿Í»§µÄÐÅÏ¢¡£¾ÝϤ£¬Ð¹Â¶ÊÇÓÉÓÚSevenRoomsµÚÈý·½¹©¸øÉ̵ÄÎļþ´«Êä½Ó¿ÚÔ⵽δ¾ÊÚȨ½Ó¼ûµ¼Öµġ£
https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/
4¡¢×êÑÐÍŶÓÅû¶ÀÖ¸ßBrickLinkÍøÕ¾ÖеÄAPI°²È«·ì϶
Salt SecurityÔÚ12ÔÂ15ÈÕÅû¶ÁËBrickLinkÍøÕ¾ÖеÄÁ½¸öAPI·ì϶¡£BrickLink.comÊÇLEGO GroupµÄ¹Ù·½¶þÊֺ͹ŶÀָ߻ýľÊг¡£¬Õ¼Óг¬¹ýÒ»°ÙÍòµÄ×¢²á»áÔ±¡£ÕâЩ·ì϶¿É±»ÓÃÀ´ÊÕÊÜ»áÔ¹ØÊ»§¡¢½Ó¼ûºÍÇÔÈ¡´æ´¢ÔÚÆ½Ì¨ÉϵÄÓ×ÎÒÉí·ÝÐÅÏ¢£¬ÉõÖÁ½Ó¼ûÄÚ²¿³ö²úÊý¾Ý²¢·ÛËéÄÚ²¿·þÎñÆ÷¡£µÚÒ»¸ö·ì϶ÊÇÓÅ»ÝȯËÑË÷²¿ÃŵIJéÕÒÓû§Ãû¶Ô»°¿òÖеÄXSS·ì϶£¬¹¥»÷ÕßÄܹ»Ê¹ÓÃÌØÔìÁ´½ÓÔÚÖ¸±êÖÐ×¢ÈëºÍÖ´ÐдúÂë¡£µÚ¶þ¸ö·ì϶λÓÚÉÏ´«µ½Çó¹ºÁбíÒ³Ãæ£¬¿Éͨ¹ýXXE¹¥»÷¶ÁÈ¡Web·þÎñÆ÷ÉϵÄÎļþ²¢Ö´ÐÐSSRF¹¥»÷£¬Õâ¿ÉÄܵ¼ÖÂAWS EC2ÁîÅÆÐ¹Â¶¡£
https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis
5¡¢Mandiant·¢ÏÖUNC4166Õë¶ÔÎÚ¿ËÀ¼µ±¾ÖµÄ¹¥»÷»î¶¯
¾ÝMandiant 12ÔÂ15Èճƣ¬Æä·¢ÏÖÁËÕë¶ÔÎÚ¿ËÀ¼µ±¾ÖµÄ¹©¸øÁ´¹¥»÷»î¶¯¡£±»×·×ÙΪUNC4166µÄ¹¥»÷ÍÅ»ïͨ¹ýÎÚ¿ËÀ¼ÓïºÍ¶íÓïµÄTorrentÎļþ¹²ÏíÍøÕ¾£¬·Ö·¢¼Ù×°³ÉºÏ·¨Windows 10×°Ö÷¨Ê½µÄľÂí»¯ISOÎļþ¡£ÕâЩ¶ñÒâ×°Ö÷¨Ê½ÌṩµÄ¶ñÒâÈí¼þ¿ÉÄÜ´ÓÖ¸±êÍÆËã»úÍøÂçÊý¾Ý¡¢×°ÖÃÆäËü¶ñÒ⹤¾ß²¢½«ÇÔÈ¡µÄÊý¾Ýй¶µ½¹¥»÷ÕߵķþÎñÆ÷¡£ÔÚ³õ²½¿úËÅÖ®ºó£¬¹¥»÷Õß»¹×°ÖÃÁ˺óÃÅStowaway¡¢BeaconºÍSparepart£¬À´Î¬³Ö¶ÔÖ¸±êµÄ½Ó¼û¡¢Ö´ÐкÅÁî¡¢´«ÊäÎļþºÍÇÔÊØÐÅÏ¢¡£
https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government
6¡¢TrendMicro°ä²¼¹ØÓÚÀÕË÷Èí¼þAgendaµÄ·ÖÎö»ã±¨
12ÔÂ16ÈÕ£¬TrendMicro°ä²¼Á˹ØÓÚÀÕË÷Èí¼þAgendaµÄ·ÖÎö»ã±¨¡£½üÆÚ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»¸öÓÃRust¿ª·¢µÄAgendaÑù±¾£¬¼ì²âÁ˾ÖΪRansom.Win32.AGENDA.THIAFBB¡£AgendaÔÚÆäÍøÕ¾Éϰ䲼µÄ±»¹¥»÷×é֯λÓÚ·ÖÆç¹ú¶È£¬ÖØÒªÊôÓÚÔì×÷ÒµºÍITÐÐÒµ£¬×ÜÊÕÈ볬¹ý5.5ÒÚÃÀÔª¡£Óë½ÓÊÜ10¸ö²ÎÊýµÄGolang±äÌå·ÖÆç£¬Rust±äÌåÖ»½ÓÊÜ3¸ö²ÎÊý£¬Ëü»¹Ê¹ÓüäЪÐÔ¼ÓÃÜÕ½ÊõÀ´Ìṩ¸ü¿ìµÄ¼ÓÃܲ¢¸üÓÐЧµØÈƹý¼ì²â¡£
https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html


¾©¹«Íø°²±¸11010802024551ºÅ