¹ØÓÚÓ¡·¢¡¶AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÈ϶¨ÒªÁì¡·µÄ֪ͨ£»£»£»£»£»Ñо¿Ö°Ô±Åû¶RuckusÎÞÏß·ÓÉÆ÷ÖеĶà¸öÎó²î

Ðû²¼Ê±¼ä 2019-12-30


1.¹ØÓÚÓ¡·¢¡¶AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÈ϶¨ÒªÁì¡·µÄ֪ͨ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤¡¶¹ØÓÚ¿ªÕ¹AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅϢרÏîÖÎÀíµÄͨ¸æ¡· £¬£¬£¬£¬Îª¼àÊÓÖÎÀí²¿·ÖÈ϶¨AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÌṩ²Î¿¼ £¬£¬£¬£¬ÎªAppÔËÓªÕß×Ô²é×Ô¾ÀºÍÍøÃñÉç»á¼àÊÓÌṩָÒý £¬£¬£¬£¬Âäʵ¡¶ÍøÂçÇå¾²·¨¡·µÈÖ´ÂÉÀýÔò £¬£¬£¬£¬¹ú¼Ò»¥ÁªÍøÐÅÏ¢°ì¹«ÊÒ¡¢¹¤ÒµºÍÐÅÏ¢»¯²¿¡¢¹«°²²¿¡¢Êг¡î¿Ïµ×ܾÖÁªºÏÖÆ¶©ÁË¡¶AppÎ¥·¨Î¥¹æÍøÂçʹÓÃСÎÒ˽¼ÒÐÅÏ¢ÐÐΪÈ϶¨ÒªÁì¡·¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

http://www.cac.gov.cn/2019-12/27/c_1578986455686625.htm?scene=2&clicktime=1577670801&enterid=1577670801&from=timeline&isappinstalled=0


2.ÎïÁªÍø¹©Ó¦ÉÌWyzeÒâÍâй¶Լ240Íò¿Í»§ÐÅÏ¢


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÎïÁªÍø¹©Ó¦ÉÌWyzeÈ·ÈÏÆäÒ»¸öElasticsearchЧÀÍÆ÷й¶ÁËÔ¼240ÍòÓû§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â²¢²»ÊÇÉú²úϵͳ £¬£¬£¬£¬µ«´æ´¢ÁËÓÐÓõÄÓû§Êý¾Ý £¬£¬£¬£¬°üÀ¨ÓÃÓÚ½¨ÉèWyzeÕÊ»§µÄµç×ÓÓʼþµØµã¡¢·ÖÅɸøÆäWyzeÇå¾²ÉãÏñ»úµÄÓû§êdzơ¢WiFiÍøÂç±êʶ·ûSSIDÒÔ¼°2.4ÍòÓû§µÄAlexaÁîÅÆµÈ¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÓÚ12ÔÂ4ÈÕ±»¹ýʧµØÌ»Â¶ÔÚ¹«ÍøÉÏ £¬£¬£¬£¬Çå¾²¹«Ë¾Twelve SecurityÓÚ12ÔÂ26ÈÕ·¢Ã÷Á˸ÃÊý¾Ý¿â²¢Í¨ÖªÁËWyze £¬£¬£¬£¬WyzeËæºó¶ÔÊý¾Ý¿â¾ÙÐÐÁ˱£»£»£»£»£»¤¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iot-vendor-wyze-confirms-server-leak/


3.±ÈÀûʱAllianz Partners¹«Ë¾16Íò¿Í»§Êý¾Ý±»µÁ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


±ÈÀûʱ°ü¹ÜºÍÔ®Öú¹«Ë¾Allianz Partners³ÆÆäÒ»¸ö°ü¹ÜÏäÓÚ8Ô·ÝÔÚºÉÀ¼±»µÁ £¬£¬£¬£¬ÆäÖаüÀ¨Óë16Íò¸ö¿Í»§ÓйصÄÔÖÄÑË÷ÅâÏà¹ØÊý¾Ý±¸·Ý¡£¡£¡£¡£¡£Æ¾Ö¤¶ÔÓйØÎļþµÄÉó¼ÆºÍÆÊÎö £¬£¬£¬£¬Ïà¹ØÎļþÊǿͻ§Æ¾Ö¤ÆäÔ®ÖúÌõÔ¼»òÂÃÐаü¹ÜÌá³öÔÖÄÑ»ò¹ÊÕÏË÷ÅâµÄÎļþ±¸·Ý £¬£¬£¬£¬¸Ã¹«Ë¾ÒÑÏòºÉÀ¼¾¯·½Ìá³öÁËÉêËß £¬£¬£¬£¬Ë¾·¨ÊÓ²ìÕýÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¸Ã¹«Ë¾»¹Í¨ÖªÁ˱ÈÀûʱµÄÊý¾Ý±£»£»£»£»£»¤»ú¹¹ £¬£¬£¬£¬ÏÖÔÚΪֹûÓм£ÏóÅú×¢¹¥»÷Õß¿ÉÒÔ»á¼ûÕâЩ±¸·ÝÎļþÖаüÀ¨µÄÊý¾Ý¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.brusselstimes.com/all-news/business/86376/about-160000-belgian-clients-of-allianz-partners-affected-by-strongbox-theft-in-the-netherlands/


4.Áè¼Ý100¸öAndroid APPʹÓÃSoraka¿â¾ÙÐÐ¹ã¸æÚ²Æ­


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÍþвÇ鱨Ñо¿Ð¡×éWhite Ops·¢Ã÷100¶à¸öAPPʹÓÃSoraka¿âÔÚÓû§µÄAndroid×°±¸ÉϾÙÐÐ¹ã¸æÚ²Æ­ £¬£¬£¬£¬Õâ100¶à¸ö¶ñÒâAndroid APPµÄ×ÜÏÂÔØÁ¿´ï460Íò´Î¡£¡£¡£¡£¡£Ñо¿ÍŶÓÔÚÆÊÎöÖз¢Ã÷ £¬£¬£¬£¬ÕâЩAPPÒÀÀµÓÚÃûΪAppsFlyerµÄ¿ò¼ÜÀ´¼àÊÓÊÇ·ñΪڲƭÕߵķַ¢ÇþµÀ×°Öà £¬£¬£¬£¬ËüÃǽöÔÚÕâÖÖÇéÐÎϲÅÏÔʾڲƭÐÔ¹ã¸æ¡£¡£¡£¡£¡£ÕâЩAPPʹÓöàÖÖ»ùÓÚJavaµÄ³¤ÆÚÐÔ»úÖÆ£¨°üÀ¨ÉèÖþ¯±¨£©À´±£±£´æÊÜѬȾµÄ×°±¸ÉÏ¡£¡£¡£¡£¡£AndroidÓû§Ó¦Ð¶ÔØÑо¿ÍŶӼì²âµ½µÄËùÓжñÒâAPP¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/over-100-android-apps-used-soraka-package-to-perform-ad-fraud/


5.Ñо¿Ö°Ô±Åû¶RuckusÎÞÏß·ÓÉÆ÷ÖеĶà¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ô±Gal Zror·¢Ã÷RuckusÎÞÏß·ÓÉÆ÷±£´æ3¸öRCEÎó²î £¬£¬£¬£¬²¢Ôڵ¹úÄê¶È»ìãçͨѶ´ó»áÉÏÅû¶ÁËÕâЩ·¢Ã÷¡£¡£¡£¡£¡£Zror³ÆÕâЩÎó²î±£´æÓÚUnleashedϵÁзÓÉÆ÷ÔËÐеÄWebÓû§½çÃæÈí¼þÖÐ £¬£¬£¬£¬ÎÞÐè·ÓÉÆ÷ÃÜÂë¼´¿ÉʹÓÃÕâЩÎó²î £¬£¬£¬£¬²¢¿É´ÓInternetÉÏÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄ·ÓÉÆ÷¡£¡£¡£¡£¡£ÕâÈý¸öÎó²î¾ù¿ÉÓÃÓÚ»ñȡ·ÓÉÆ÷rootÌØÈ¨ £¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ²»ÊÜÏÞÖÆµØ»á¼û×°±¸ºÍÍøÂç¡£¡£¡£¡£¡£RuckusÔÚ²¹¶¡°ü200.7.10.202.92ÖÐÐÞ¸´ÁËÕâЩÎó²î £¬£¬£¬£¬µ«Óû§±ØÐè×Ô¼º¸üÐÂÒ×Êܹ¥»÷µÄ×°±¸¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/12/28/ruckus-wireless-routers-flaws/


6.LampionľÂíй¥»÷»î¶¯Ö÷ÒªÕë¶ÔÆÏÌÑÑÀ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


SI-LAB¼ì²âµ½Î±×°³ÉÆÏÌÑÑÀÕþ¸®²ÆÎñºÍ˰ÊÕµç×ÓÓʼþÈö²¥µÄÐÂľÂíLampion¡£¡£¡£¡£¡£¸ÃľÂí¿´ÆðÀ´ÀàËÆÓÚTrojan-Banker.Win32.ChePro¼Ò×å £¬£¬£¬£¬µ«¾ÙÐÐÁËˢР£¬£¬£¬£¬Ê¹ÆäÄÑÒÔ±»¼ì²âºÍÆÊÎö¡£¡£¡£¡£¡£Lampion¿ÉÒÔÍøÂçÅÌËã»úÓ²ÅÌ¡¢Ä¿½ñ·­¿ªµÄ´°¿Ú¡¢¼ôÌù°åºÍÒøÐÐÆ¾Ö¤µÈÐÅÏ¢²¢·¢ËÍÖÁC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¸ÃľÂí£¨P-19-2.dll£©ÔÚVirusTotalÉϵļì²âЧ¹ûΪ12/71 £¬£¬£¬£¬ÕâÅú×¢´ó´ó¶¼·À²¡¶¾ÒýÇæÉÐδ¼ì²âµ½¸Ã¶ñÒâÈí¼þµÄÊðÃû¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95731/malware/lampion-malware-targets-portugal.html