HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æÄ£Ð¹Â¶£¬É漰δ°ä²¼ºÍɾ¼õ°æ±¾
°ä²¼¹¦·ò 2024-12-301. HaloϵÁÐ25ÄêÄÚÈÝÔâ´ó¹æÄ£Ð¹Â¶£¬É漰δ°ä²¼ºÍɾ¼õ°æ±¾
12ÔÂ27ÈÕ£¬³¬¹ý25ÄêµÄHaloÓÎÏ·ÄÚÈݽüÈÕÔÚÍøÉϱ»Ð¹Â¶£¬ÆäÖÐÔ̺¬¸Ã±êÖ¾ÐÔµÚÒ»È˳ÆÉä»÷ÓÎϷϵÁвÎÓëXboxǰµÄ¿ÉÍæ°æ±¾£¬ÉõÖÁÊÇ×îÔçµÄFPS°æ±¾¡£¾Ý´§Ä¦£¬Ð¹Â¶ÄÚÈÝÔ´×ÔHalo StudiosÓë·Û˿ģ×éÔì×÷ÕߵĺÏ×÷£¬Ö¼ÔÚ¸´Ô´ÓǰHaloÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£×ÔÈ¥ÄêÏÄÌìÒÔÀ´£¬ModÍŶÓDigsiteÒ»ÏòÔÚÓë343 Industries£¨ÏÖÒѸÄÃûΪHalo Studios£©ºÏ×÷£¬ÎÞ³¥¸´ÔÓÎÏ·ÄÚÈÝ£¬Èç¡¶¹â»·Õ½¶·½ø»¯¡·µÄPC¶Ë¿Ú¶àÈËÓÎÏ·µØÍ¼¼°¾µä¹â»·ÓÎÏ·ÖеÄɾ¼õÄÚÈÝ¡£ÓÈΪÒýÈËÖõÖ÷ÕÅÊÇ£¬1999ÄêÔø´òËã³ÉΪMacµÚÈýÈ˳ƶÀÕ¼ÓÎÏ·µÄ¡¶¹â»·¡·Ê§´«ÒѾõÄMacÊÀ½çÑÝʾ°æÒ²´òË㸴ԣ¬µ«±¾ÖܵÄй¶ÒÑʹ¸Ã°æ±¾¿ÉÔÚPCÉÏÆëÈ«²¥·Å£¬Í¬Ê±»¹Ð¹Â¶Á˽ü100GBµÄÆäËûÎļþ£¬Ô̺¬Bungie¿ª·¢µÄÔ°æHaloÓÎÏ·ÖÐδʵÏÖºÍɾ¼õµÄÄÚÈÝ¡£Digsite modÍŶÓǰ³ÉԱ֤ʵÁËй¶ÄÚÈݵÄÕæÊµÐÔ£¬µ«·ñ¶¨ÏÖÈλòǰÈγÉÔ±¶Ô´ËÕÆ¹Ü£¬²¢Ð¹Â©Òò²»×ãн³êºÍ×ÊÔ´ÕùÒ飬´óÎÞÊýmodÍŶӳÉÔ±ÒÑ´ÇÖ°¡£
https://www.videogameschronicle.com/news/over-25-years-of-classic-halo-content-has-leaked-online/
2. ChromeÀ©´ó·¨Ê½Ôâ´ó¹æÄ£ÈëÇÖ£¬Óû§Ãô¸ÐÐÅϢй¶·çÏÕÔö³¤
12ÔÂ27ÈÕ£¬ÖÁÉÙÓÐÎå¸öChromeÀ©´ó·¨Ê½ÔÚÒ»´ÎÐͬ¹¥»÷ÖÐÔâµ½ÈëÇÖ£¬¹¥»÷Õß×¢ÈëÁËÇÔÈ¡Óû§Ãô¸ÐÐÅÏ¢µÄ´úÂë¡£Êý¾ÝÃÔʧ·À»¤¹«Ë¾CyberhavenÅû¶ÁËÕâ´Î¹¥»÷£¬¸Ã¹«Ë¾Ôڳɹ¦¶ÔGoogle ChromeÉ̵êµÄÖÎÀíÔ¹ØÊ»§½øÐÐÍøÂç´¹µö¹¥»÷ºó£¬ÏòÆä¿Í»§·¢³öÁËÎ¥¹æ¾¯±¨£¬ÆäÖÐÔ̺¬Snowflake¡¢Ä¦ÍÐÂÞÀ¡¢¼ÑÄܵȳÛÃû¹«Ë¾¡£ºÚ¿Í½Ù³ÖÁËÔ±¹¤µÄÕË»§²¢°ä²¼ÁËÔ̺¬¶ñÒâ´úÂëµÄCyberhavenÀ©´ó°æ±¾£¬¸Ã´úÂë¿É½«Óû§µÄ¾¹ýÉí·ÝÑéÖ¤µÄ»á»°ºÍcookieй¶µ½¹¥»÷ÕßÓò¡£CyberhavenµÄÄÚ²¿°²È«ÍŶÓÔÚ·¢ÏÖ¶ñÒâÈí¼þºóѸ¿ì½«Æäɾ³ý£¬²¢°ä²¼ÁË´¿¾»°æ±¾v24.10.5¡£½¨ÒéÓû§Éý¼¶µ½×îа汾£¬²¢³·Ïú·ÇFIDOv2µÄÃÜÂë¡¢ÂÖ»»ËùÓÐAPIÁîÅÆ²¢²é¿´ä¯ÀÀÆ÷ÈÕÖ¾ÒÔÆÀ¹À¶ñÒâ»î¶¯¡£´Ë±í£¬Nudge Security×êÑÐÔ±Jaime Blasco·¢ÏÖ£¬Í³Ò»¹¦·ò»¹ÓÐÆäËûChromeÀ©´ó·¨Ê½Ò²±»×¢ÈëÁ˶ñÒâ´úÂëÆ¬¶Î£¬Ô̺¬Internxt VPN¡¢VPNCity¡¢UvoiceºÍParrotTalksµÈ£¬½¨ÒéÕâЩÀ©´ó·¨Ê½µÄÓû§½«Æä´Óä¯ÀÀÆ÷ÖÐɾ³ý»òÉý¼¶µ½°²È«°æ±¾¡£ÈôÊDz»È·¶¨£¬×îºÃÐ¶ÔØÀ©´ó·¨Ê½£¬³ÁÖóÁÒªÕÊ»§ÃÜÂ룬¶Ï¸ùä¯ÀÀÆ÷Êý¾Ý£¬²¢½«ä¯ÀÀÆ÷ÉèÖóÁÖÃΪÔʼĬÈÏÖµ¡£
https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/
3. ºÚ¿ÍÀûÓÃDoS·ì϶½ûÓÃPalo Alto Networks·À»ðǽ
12ÔÂ27ÈÕ£¬Palo Alto Networks·¢³ö°²È«ÖҸ棬ָ³öºÚ¿ÍÔÚ»ý¼«ÀûÓÃCVE-2024-3393»Ø¾ø·þÎñ·ì϶£¬Í¨¹ý·¢ËͶñÒâÊý¾Ý°üÇ¿Ôì³ÁÆô·À»ðǽ£¬´Ó¶ø½ûÓÃÆä±£»¤¡£¸Ã·ì϶´æÔÚÓÚPalo Alto Networks PAN-OSÈí¼þµÄDNS°²È«Ö°ÄÜÖУ¬½öÓ°ÏìÆôÓÃÁË¡°DNS°²È«¡±ÈÕÖ¾¼Í¼µÄÉ豸¡£¾ÝPalo Alto Networksй©£¬¸Ã·ì϶Òѱ»ºÚ¿Í»ý¼«ÀûÓ㬵±·À»ðǽ×èÖ¹¶ñÒâDNSÊý¾Ý°üʱ£¬¿Í»§¿ÉÄÜ»áÓöµ½·þÎñÖжϡ£¸Ã¹«Ë¾ÒѾÕë¶Ô²¿ÃŰ汾°ä²¼Á˲¹¶¡£¬µ«PAN-OS 11.0ÒòÒÑ´ïµ½ÐÔÃüÖÜÆÚÖÕÖ¹ÈÕÆÚ½«²»»áÊÕµ½²¹¶¡¡£¶ÔÓÚÎÞ·¨µ±¼´¸üеÄÓû§£¬Palo Alto NetworksÌṩÏàʶ¾ö²½Ö軺ºÍ½â²½Ö裬Ô̺¬½ûÓÃDNS°²È«ÈÕÖ¾¼Í¼µÈ£¬ÒÔÈ·±£É豸µÄ°²È«ÔËÐС£Óû§Ó¦Æ¾¾Ý×Ô¼ºµÄÉ豸ÀàÐͺÍÖÎÀí·½Ê½£¬²ÉÈ¡ÏàÓ¦µÄ´ëÊ©À´Ó¦¶Ô¸Ã·ì϶¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/
4. ¹«¹²Æû³µÈí¼þ¹«Ë¾CariadÔ¼80ÍòÁ¾µç¶¯Æû³µÐÅÏ¢ÔâÆØ¹â
12ÔÂ28ÈÕ£¬¹«¹²Æû³µÈí¼þ¹«Ë¾CariadʧÉ÷¶³öÁËÔ¼80ÍòÁ¾µç¶¯Æû³µµÄÊý¾Ý£¬Ô̺¬¿ÉÄÜÓë¼ÝʻԱÐÕÃûÓйصÄÐÅÏ¢ºÍ³µÁ¾µÄ¾«È·µØÎ»£¬ÕâЩÊý¾ÝÔÚÑÇÂíÑ·ÔÆ´æ´¢Öд¦ÓÚδÊܱ£»¤×´Ì¬³¤´ïÊýÔ¡£Â¶³öµÄÊý¾Ý¿âº¸ÇÁ˹«¹²¡¢Î÷ÑÅÌØ¡¢°ÂµÏºÍ˹¿Â´ïµÈÆ·ÅÆ£¬²¿ÃųµÁ¾µÄµØÀíµØÎ»Êý¾Ý¾«È·µ½¼¸ÀåÃס£¾Ý³Æ£¬ÕâÊÇÓÉÓÚCariadÔÚÁ½¸öITÀûÓ÷¨Ê½ÖеÄÅäÖò»ÕýÈ·µ¼Öµġ£Å·ÖÞ·µÂºÚ¿Í×éÖ¯»ìãçÍÆËã»ú¾ãÀÖ²¿(CCC)·¢ÏÖÁËÕâÒ»·ì϶£¬²¢ÔÚÏòCariadºÍ¹«¹²¹«Ë¾´«µÝǰ½øÐÐÁ˲âÊÔ¡£Cariad°µÊ¾£¬Ð¹Â¶µÄÊý¾Ý½öÓ°ÏìÒÑÏνӵ½»¥ÁªÍø²¢ÒÑ×¢²áÔÚÏß·þÎñµÄ³µÁ¾£¬²¢Ç¿µ÷Ö»ÓÐÈÆ¹ý¶àÖÖ°²È«»úÔìÄÜÁ¦½Ó¼ûÊý¾Ý£¬ÇÒµ¥¸ö³µÁ¾Êý¾Ý±»ÄäÃû»¯¡£È»¶ø£¬¡¼û÷¾µ¡·ÖÜ¿¯µÄÍŶӷ¢ÏÖÓÐÈËʹÓÃÃâ·ÑÈí¼þÍøÂçÁ˵¹úÕþ¿ÍµÄÆû³µµØÎ»¾ßÌåÐÅÏ¢¡£CariadÔÚÊÕµ½CCCµÄ»ã±¨ºóѸ¿ì·´Ó³£¬½â¾öÁËÎÊÌâ²¢¹Ø¹ØÁ˽ӼûȨÏÞ¡£¸Ã¹«Ë¾Ã»ÓÐÖ¤¾ÝÅú×¢³ýCCCºÚ¿ÍÖ®±íµÄÆäËû·½Äܹ»½Ó¼ûÒÑй¶µÄ³µÁ¾Êý¾Ý£¬»òÕâЩÐÅÏ¢±»µÚÈý·½ÀÄÓá£Cariad°µÊ¾£¬´Ó³µÁ¾ÍøÂçµÄÊý¾ÝÓÐÖúÓÚΪ¿Í»§Ìṩ¡¢¿ª·¢ºÍ¸Ä½øÊý×ÖÖ°ÄÜ£¬²¢²ÉÈ¡ÁË׳´óµÄÊý¾Ý±£»¤´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/customer-data-from-800-000-electric-cars-and-owners-exposed-online/
5. Ç×¶í×éÖ¯NoName057¶ÔÒâ´óÀûÌáÒéÐÂÒ»ÂÖDDoS¹¥»÷
12ÔÂ28ÈÕ£¬ÔÚµØÔµÕþÖÎÑÏÖØ´óÊÆ¼Ó¾çµÄ²¼¾°Ï£¬Ç×¶í×éÖ¯NoName057¶ÔÒâ´óÀû»ù´¡ÉèÊ©ÌáÒéÁËÐÂÒ»ÂÖDDoS¹¥»÷¡£Õâ´Î¹¥»÷Ö¸±êÔ̺¬Âí¶ûÅíÈø»ú³¡¡¢ÀûÄÉÌØ»ú³¡¡¢±í½»²¿¼°¶¼Á齻ͨ¼¯ÍŵÄÍøÕ¾¡£Ö»¹ÜÕâЩ¹¥»÷¶Ô»ú³¡µÄÏÖʵÔËӪδÔì³ÉÓ°Ï죬µ«ÓйØÍøÕ¾¾ù³öÏÖÁ˽ӼûÎÊÌâ¡£NoName057×éÖ¯ÔÚÆäTelegramƵ·ÉÏÐû³Æ£¬Õâ´ÎÏ®»÷ÊǶÔÒâ´óÀû¿Ö¶íÈËÊ¿µÄ»ØÓ¦¡£Òâ´óÀûÓÊÕþ¾¯Ô±¾ÖµÄCnaipicÔÚµ÷²éÕâ´ÎÍøÂç¹¥»÷£¬²¢Ô®ÊÖÊܺ¦Õß¼õÇá¹¥»÷¡£¾ÝÓÊÕþºÍͨѶ¾¯Ô±¾Ö¾Ö³¤Ð¹Â©£¬Ï®»÷ÕßÊÇ×·Çó³ÛÃû¶ÈµÄÒâʶ״̬Çý¶¯µÄÍøÂç·¸×ï·Ö×Ó£¬¶ø·ÇÖ¼ÔÚÔì³ÉÏÖʵÇÖº¦¡£´Ë±í£¬NoName057×éÖ¯×Ô2022Äê3ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬Ö¸±êÊÇÈ«Çòµ±¾ÖºÍ¹Ø¼ü»ù´¡ÉèÊ©×éÖ¯£¬ËûÃÇʹÓöàÖÖ¹¤¾ß½øÐй¥»÷£¬²¢ÔÚµØÔµÕþÖÎÑÏÖØÊ±ÆÚÉý¼¶Ï®»÷¡£Õâ´Î¹¥»÷²úÉúÔÚÊ¥µ®½Ú¼ÙÆÚ£¬ÓµÓÐÕ½ÊõÒâ˼£¬ÓÉÓÚ´Ëʱ×éÖ¯ÈËÔ±Ï÷¼õ¡¢ÏìÓ¦¹¦·ò±äÂý£¬Ê¹µÃʵʱ·¢ÏÖ¡¢»º½âºÍ´Ó¹¥»÷Öи´Ô±äµÃÔ½·¢ÄÑÌâ¡£
https://securityaffairs.com/172395/security/pro-russia-group-noname057-targets-italian-airports.html
6. FICORAÓëCAPSAICIN½©Ê¬ÍøÂçÒý·¢È«Çò°²È«¾¯±¨
12ÔÂ28ÈÕ£¬2024Äê10ÔºÍ11ÔÂÆÚ¼ä£¬FortiGuard Labs¹Û²ìµ½Á½¸öеĽ©Ê¬ÍøÂç¡°FICORA¡±ºÍ¡°CAPSAICIN¡±µÄ»î¶¯ÏÔÖøÔö³¤¡£ÕâÁ½¸ö½©Ê¬ÍøÂç±»ÒÔΪÊdzÛÃûµÄMiraiºÍKaiten½©Ê¬ÍøÂçµÄ±äÌ壬¿ÉÄÜÖ´ÐжñÒâºÅÁî¡£ËüÃÇʹÓÃshell¾ç±¾£¬ÖØÒªÕë¶ÔLinuxϵͳ£¬²»½ö¿ÉÄÜɱËÀ¶ñÒâÈí¼þ¹ý³Ì£¬»¹ÄÜ·¢ÆðDDoS¹¥»÷¡£³ö¸ñµØ£¬¡°FICORA¡±½©Ê¬ÍøÂçÓ°ÏìÁ˶à¸ö¹ú¶È£¬¶ø¡°CAPSAICIN¡±ÔòÖØÒªÕë¶Ô¶«ÑǵØÓò£¬²¢ÔÚ¸ÃÇøÓò³ÖÐø»îÔ¾ÁËÁ½Ìì¶à¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓÃÒÑÖªµÄD-Link·ÓÉÆ÷·ì϶£¨ÈçCVE-2015-2051ºÍCVE-2024-33112£©À´Ö´ÐжñÒâ²Ù×÷¡£Õë¶ÔÕâЩÍþв£¬FortiGuard Labs½¨ÒéÓû§¶¨ÆÚ¸üй̼þ£¬²¢Ö´ÐÐ׳´óµÄÍøÂç¼à¿Ø´ëÊ©ÒÔÔ¤·À¹¥»÷¡£
https://hackread.com/ficora-capsaicin-botnet-d-link-router-flaws-ddos-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ