Nissan ±±ÃÀÊý¾Ýй¶ӰÏìÁè¼Ý 53000 ÃûÔ±¹¤

Ðû²¼Ê±¼ä 2024-05-17
1. Nissan ±±ÃÀÊý¾Ýй¶ӰÏìÁè¼Ý 53000 ÃûÔ±¹¤


5ÔÂ16ÈÕ £¬£¬ £¬£¬£¬£¬Nissan North America (Nissan) È¥ÄêÔâÊÜÁËÊý¾Ýй¶ £¬£¬ £¬£¬£¬£¬ÆäʱÍþвÕßÃé×¼Á˸ù«Ë¾µÄÍⲿ VPN ²¢¹Ø±ÕϵͳÒÔ»ñÈ¡Êê½ð¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌÓÚ 2023 Äê 11 ÔÂÉÏÑ®·¢Ã÷ÁËÕâÒ»Îó²î £¬£¬ £¬£¬£¬£¬²¢ÓÚ×î½ü·¢Ã÷¸ÃÊÂÎñ̻¶ÁËÁè¼Ý 53,000 ÃûÏÖÈκÍÀëÈÎÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£Nissan ͸¶ £¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßÃé×¼ÁËÆäÍⲿ VPN £¬£¬ £¬£¬£¬£¬È»ºó¹Ø±ÕÁËijЩ¹«Ë¾ÏµÍ³ £¬£¬ £¬£¬£¬£¬È»ºóË÷ÒªÊê½ð¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö £¬£¬ £¬£¬£¬£¬ÔÚ¹¥»÷ʱ´úÆäϵͳ¾ùδ¼ÓÃÜ¡£¡£¡£¸Ã¹«Ë¾ÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖú £¬£¬ £¬£¬£¬£¬Äܹ»ÆÀ¹ÀÇéÐΡ¢×èÖ¹ÊÂÎñ²¢ÖÕÖ¹Íþв¡£¡£¡£ËæºóµÄÊÓ²ìÏÔʾ £¬£¬ £¬£¬£¬£¬ºÚ¿Í»á¼ûÁËÍâµØºÍÍøÂç¹²ÏíÉϵÄһЩÎļþ £¬£¬ £¬£¬£¬£¬ÆäÖд󲿷ְüÀ¨ÉÌÒµÐÅÏ¢¡£¡£¡£ÔÚÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ·¢³öµÄÊý¾Ýй¶֪ͨÖÐ £¬£¬ £¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖ £¬£¬ £¬£¬£¬£¬Ì»Â¶µÄÏêϸÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼Ò±êʶ·û£¨ÀýÈçÐÕÃû£©ºÍÉç»áÇå¾²ºÅÂë £¬£¬ £¬£¬£¬£¬²¢ÇÒÍþвÐÐΪÕß»á¼ûµÄÎļþÖв»±£´æ²ÆÎñÏêϸÐÅÏ¢¡£¡£¡£ÈÕ²úÖ¸³ö £¬£¬ £¬£¬£¬£¬Ëü²»ÖªµÀ̻¶µÄÊý¾ÝÒѱ»ÀÄÓᣡ£¡£


https://www.bleepingcomputer.com/news/security/nissan-north-america-data-breach-impacts-over-53-000-employees/


2. ÂéÊ¡Àí¹¤Ñ§ÔºµÄѧÉúʹÓÃETHÎó²î¿ÉÇÔÈ¡2500ÍòÃÀÔª


5ÔÂ16ÈÕ £¬£¬ £¬£¬£¬£¬Æ¾Ö¤ÃÀ¹ú˾·¨²¿Ðû²¼µÄÆðËßÊé £¬£¬ £¬£¬£¬£¬ÔÚԼĪ 12 ÃëÄÚ £¬£¬ £¬£¬£¬£¬Á½ÃûÊܹý¸ßµÈ½ÌÓýµÄÐÖµÜÉæÏÓͨ¹ý¸Ä¶¯ÒÔÌ«·»Çø¿éÁ´ £¬£¬ £¬£¬£¬£¬ÒÔÒ»ÖÖǰËùδ¼ûµÄ¼ÓÃÜÇ®±ÒÍýÏëÇÔÈ¡ÁË 2500 ÍòÃÀÔª¡£¡£¡£ÔÚ˾·¨²¿µÄÒ»·ÝÐÂΟåÖÐ £¬£¬ £¬£¬£¬£¬ÃÀ¹úÉó²é¹Ù´ïÃ×°²¡¤ÍþÁ®Ä·Ë¹ (Damian Williams) ÌåÏÖ £¬£¬ £¬£¬£¬£¬¸ÃÍýÏëºÜÊÇÖØ´ó £¬£¬ £¬£¬£¬£¬ÒÔÖÁÓÚ¡°Ê¹Çø¿éÁ´µÄÍêÕûÐÔÊܵ½ÖÊÒÉ¡±¡£¡£¡£ÍþÁ®Ä·Ë¹Ëµ£º¡°Õâ¶ÔÐÖµÜÔÚÌìÏÂÉÏ×ʢÃûµÄ´óѧ֮һѧϰÅÌËã»ú¿ÆÑ§ºÍÊýѧ £¬£¬ £¬£¬£¬£¬¾Ý³ÆÊ¹ÓÃËûÃǵÄרҵÊÖÒպͽÌÓýÀ´¸Ä¶¯ºÍʹÓÃÈ«ÇòÊý°ÙÍòÒÔÌ«·»Óû§ËùÒÀÀµµÄЭÒé¡£¡£¡£¡± ¡°Ò»µ©ËûÃǽ«ÍýÏ븶ÖîʵÑé £¬£¬ £¬£¬£¬£¬ËûÃǵÄÇÀ½ÙÖ»»¨ÁË 12 Ãë¾ÍÍê³ÉÁË¡£¡£¡£¡± 24 ËêµÄ°²¶«ºÍ 28 ËêµÄղķ˹¡¤ÅåÀ×¶û-²¼°£Åµ±»²¶ £¬£¬ £¬£¬£¬£¬±»Ö¸¿Ø´®Ä±ÊµÑéµç»ãڲƭ¡¢µç»ãڲƭºÍ´®Ä±Ï´Ç®¡£¡£¡£ÃÀ¹ú˾·¨²¿ÌåÏÖ £¬£¬ £¬£¬£¬£¬ÐÖµÜÁ©¡°Ã¿Ïî×ïÃû×î¸ß¿ÉÅд¦ 20 Äêî¿Ïµ¡±¡£¡£¡£


https://news.hitb.org/content/mit-students-stole-25m-seconds-exploiting-eth-blockchain-bug


3. LinuxϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»ÖØ´óµÄ¶ñÒâÈí¼þѬȾÁ½Äê


5ÔÂ16ÈÕ £¬£¬ £¬£¬£¬£¬´Ó 2009 Äê×îÏÈ £¬£¬ £¬£¬£¬£¬ÓÃÓÚά»¤ºÍ·Ö·¢ Linux ²Ù×÷ϵͳÄں˵Ļù´¡ÉèÊ©Òѱ»ÖØ´óµÄ¶ñÒâÈí¼þѬȾÁËÁ½Äê £¬£¬ £¬£¬£¬£¬ÕâЩ¶ñÒâÈí¼þÏë·¨¿ØÖÆÁË¿ª·¢Ö°Ô±±£»£»£»£»£»¤×îÑÏÃܵÄ×ÊÔ´Ö®Ò»£º´æ´¢¼ÓÃÜµÄ /etc/shadow Îļþ¡£¡£¡£ÓÐÁè¼Ý 550 ÃûϵͳÓû§µÄÃÜÂëÊý¾Ý¡£¡£¡£Çå¾²¹«Ë¾ ESET µÄÑо¿Ö°Ô±ÌåÏÖ £¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷±³ºóµÄδ֪¹¥»÷ÕßѬȾÁË kernel.org ÄÚµÄÖÁÉÙËĄ̈ЧÀÍÆ÷ £¬£¬ £¬£¬£¬£¬¸Ã»¥ÁªÍøÓòÖ§³Ö×ÅÖØ´óµÄ Linux ¿ª·¢ºÍ·Ö·¢ÍøÂç¡£¡£¡£ÔÚ»ñµÃÍøÂçÉÏ 551 ¸öÓû§ÕÊ»§µÄ¼ÓÃܹþÏ£Öµºó £¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÃÜÂëÆÆ½âÊÖÒÕºÍʹÓöñÒâÈí¼þÄÚÖõĸ߼¶Æ¾Ö¤ÇÔÈ¡¹¦Ð§ £¬£¬ £¬£¬£¬£¬½«Ò»°ëÃÜÂëת»»ÎªÃ÷ÎÄÃÜÂë¡£¡£¡£´ÓÄÇÀï £¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃЧÀÍÆ÷·¢ËÍÀ¬»øÓʼþ²¢¾ÙÐÐÆäËûа¶ñ»î¶¯¡£¡£¡£ÕâËĄ̈ЧÀÍÆ÷¿ÉÄÜÔÚ²î±ðʱ¼ä±»Ñ¬È¾ºÍÏû¶¾ £¬£¬ £¬£¬£¬£¬×îºóÁ½Ì¨Ð§ÀÍÆ÷ÔÚ 2011 ÄêµÄij¸öʱ¼ä»ñµÃÐÞ¸´¡£¡£¡£kernel.org µÄѬȾÊÂÎñÓÚ 2011 ÄêÆØ¹â £¬£¬ £¬£¬£¬£¬ÆäʱÄÚºËά»¤Ö°Ô±Í¸Â¶ £¬£¬ £¬£¬£¬£¬¹¥»÷ÕßÒÔijÖÖ·½·¨Ïë·¨»ñµÃ¶ÔÅþÁ¬µ½¸ÃÓòµÄЧÀÍÆ÷µÄ²»ÊÜÏÞÖÆµÄϵͳ»á¼ûȨÏÞ£¨¼´¡°root¡±£© £¬£¬ £¬£¬£¬£¬µ¼Ö 448 ¸öÕÊ»§Ô⵽й¶¡£¡£¡£


https://news.hitb.org/content/linux-maintainers-were-infected-2-years-ssh-dwelling-backdoor-huge-reach


4. FBIµ·»ÙBreachForumsÀÕË÷ÍøÕ¾ºÍÆäTelegramƵµÀ


5ÔÂ15ÈÕ £¬£¬ £¬£¬£¬£¬FBI ÓëÌìϸ÷µØµÄ¾¯·½ÁªºÏ¿ØÖÆÁËÀÕË÷Èí¼þ¾­¼ÍÍøÕ¾ BreachForums µÄÍøÕ¾ºÍ Telegram ƵµÀ¡£¡£¡£Ö»¹Ü¸ÃÍøÕ¾µÄÔËÓª¶à´Î±»¹Ø±Õ £¬£¬ £¬£¬£¬£¬µ«¸ÃÍøÕ¾ÈÔȻһֱ·ºÆð £¬£¬ £¬£¬£¬£¬ÏÖÔÚ¾¯Ô±ÔÝʱ¿ØÖÆÁ˸ÃÍøÕ¾¡£¡£¡£¸ÃÍøÕ¾ÏÖÔÚдµÀ£º¡°ÔÚ¹ú¼ÊÏàÖúͬ°éµÄЭÖúÏ £¬£¬ £¬£¬£¬£¬Áª°îÊÓ²ì¾ÖºÍ˾·¨²¿ÒѹرոÃÍøÕ¾¡£¡£¡£¡± ¡°ÎÒÃÇÕýÔÚÉó²é¸ÃÍøÕ¾µÄºó¶ËÊý¾Ý¡£¡£¡£ÈôÊÇÄúÓÐÐÅÏ¢ÐèÒª¾Ù±¨ BreachForums ÉϵÄÍøÂç·¸·¨»î¶¯ £¬£¬ £¬£¬£¬£¬ÇëÁªÏµ¿­·¢k8¡£¡£¡£¡±Õâ´ÎÐж¯ÊÇÓÉÎåÑÛ¹ú¼ÒÒÔ¼°ÈðÊ¿¡¢±ùµººÍÎÚ¿ËÀ¼µÄ¾¯Ô±Ö´Ðеġ£¡£¡£BreachForums ½ÓÊÜÁË֮ǰ±»¹Ø±ÕµÄ RaidForums ÍøÕ¾ £¬£¬ £¬£¬£¬£¬¸ÃÍøÕ¾ÔÚ¾¯·½µÄÁíÒ»´ÎÁªºÏÐж¯ºóÓÚ 2022 Äê¹Ø±Õ¡£¡£¡£ÕâÁ½¸öÍøÕ¾¶¼ÉúÒâ±»µÁÐÅÏ¢ £¬£¬ £¬£¬£¬£¬²¢ÇÒÊÇËùνµÄË«ÖØÀÕË÷¹¥»÷µÄÒªº¦ £¬£¬ £¬£¬£¬£¬ÔÚÕâÖÖ¹¥»÷ÖÐ £¬£¬ £¬£¬£¬£¬Êý¾Ý²»µ«±»¼ÓÃÜÒÔ»ñÈ¡Êê½ð £¬£¬ £¬£¬£¬£¬²¢ÇÒ»¹±»ÇÔÈ¡ £¬£¬ £¬£¬£¬£¬²¢ÓÃÀ´ÍþвÊܺ¦Õß £¬£¬ £¬£¬£¬£¬ÈôÊÇËûÃDz»¸¶¿î £¬£¬ £¬£¬£¬£¬¾Í»á̻¶Êý¾Ý¡£¡£¡£


https://www.theregister.com/2024/05/15/fbi_breachforums_ransomware/


5. Wi-Fi ±ê×¼ÖеÄȱÏÝ¿ÉÄܵ¼Ö SSID »ìÏý¹¥»÷


5ÔÂ16ÈÕ £¬£¬ £¬£¬£¬£¬±ÈÀûʱ³ãë´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁË IEEE 802.11 Wi-Fi ±ê×¼ÖеÄÒ»¸ö»ù±¾Éè¼ÆÈ±ÏÝ £¬£¬ £¬£¬£¬£¬¸ÃȱÏÝΪ¹¥»÷ÕßÌṩÁËÒ»ÖÖÒªÁìÀ´ÓÕÆ­Êܺ¦ÕßÅþÁ¬µ½±ÈËûÃÇÏëÒªÅþÁ¬µÄÍøÂçÇå¾²ÐԽϵ͵ÄÎÞÏßÍøÂç¡£¡£¡£Æ¾Ö¤ VPN ̸ÂÛÍøÕ¾ Top10VPN µÄ˵·¨ £¬£¬ £¬£¬£¬£¬´ËÀ๥»÷¿ÉÄÜ»áʹÊܺ¦ÕßÃæÁÙ¸ü¸ßµÄÁ÷Á¿×èµ²ºÍʹÓÃΣº¦¡£¡£¡£¸ÃÍøÕ¾Óë KU Leuven µÄһλÑо¿Ö°Ô±ÏàÖú £¬£¬ £¬£¬£¬£¬½«ÔÚº«¹úÊ×¶û¼´½«¾ÙÐеľۻáÉϾÙÐÐÑÝʾ֮ǰÐû²¼ÁËÎó²îÏêϸÐÅÏ¢¡£¡£¡£¸ÃÎó²î±àºÅΪ CVE-2023-52424 £¬£¬ £¬£¬£¬£¬Ó°ÏìËùÓвÙ×÷ϵͳÉϵÄËùÓÐ Wi-Fi ¿Í»§¶Ë¡£¡£¡£ÊÜÓ°ÏìµÄ Wi-Fi ÍøÂç°üÀ¨»ùÓÚÆÕ±é°²ÅÅµÄ WPA3 ЭÒé¡¢WEP ºÍ 802.11X/EAP µÄÍøÂç¡£¡£¡£Ñо¿Ö°Ô±Ìá³öÁË Wi-Fi ±ê×¼µÄ¸üÐÂÒÔ¼°Ð¡ÎÒ˽¼ÒºÍ×éÖ¯¿ÉÒÔÓÃÀ´½µµÍΣº¦µÄÒªÁì¡£¡£¡£


https://news.hitb.org/content/flaw-wi-fi-standard-can-enable-ssid-confusion-attacks


6. ºÚ¿Í¹¥»÷ Foxit PDF Reader Óû§ÇÔÈ¡Ãô¸ÐÊý¾Ý


5ÔÂ15ÈÕ £¬£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÕë¶Ô Foxit Reader Óû§µÄ PDF Îó²î £¬£¬ £¬£¬£¬£¬¸ÃÎó²îʹÓÃÁËÒ»¸öÉè¼ÆÈ±ÏÝ £¬£¬ £¬£¬£¬£¬¸ÃȱÏÝ»áͨ¹ýĬÈϵġ°È·¶¨¡±Ñ¡ÏîÏÔʾÇå¾²ÖÒÑÔ £¬£¬ £¬£¬£¬£¬´Ó¶ø¿ÉÄÜÓÕÆ­Óû§Ö´ÐжñÒâ´úÂë¡£¡£¡£ÓÉÓÚ¸ÃÎó²îÖ÷ÒªÕë¶Ô Foxit Reader £¬£¬ £¬£¬£¬£¬ÓëÐÐÒµ±ê×¼ Adobe Acrobat Reader Ïà±È £¬£¬ £¬£¬£¬£¬¸ÃÎó²îÊÇÒ»ÖÖÏÊΪÈËÖªµÄ PDF Éó²éÆ÷ £¬£¬ £¬£¬£¬£¬Òò´Ë¸ÃÎó²î±»ÆÕ±éʹÓò¢ÈƹýÁ˵䷶µÄ¼ì²âÒªÁì¡£¡£¡£ÓÉÓÚÖÒÑÔÐÂÎŵÄÉè¼ÆÈ±ÏÝ £¬£¬ £¬£¬£¬£¬¸£ê¿ÔĶÁÆ÷±£´æÑÏÖØµÄÇå¾²Îó²î £¬£¬ £¬£¬£¬£¬ÈôÊÇÓû§ÔÚûÓÐ×Ðϸ˼Á¿µÄÇéÐÎϵ¥»÷Á½´Î £¬£¬ £¬£¬£¬£¬¾Í»áÔÚ²»Öª²»¾õÖÐΣº¦ÆäÇå¾²¡£¡£¡£¸ÃÎó²îʹ¹¥»÷ÕßÄܹ»´ÓÔ¶³ÌЧÀÍÆ÷ÏÂÔØ²¢Ö´ÐжñÒâ´úÂë £¬£¬ £¬£¬£¬£¬´Ó¶ø¿ÉÄÜʹËûÃÇÄܹ»Î´¾­ÊÚȨ»á¼ûÓû§µÄϵͳºÍÊý¾Ý¡£¡£¡£¸ÃÎó²îÒÑÔÚÏÖʵÌìÏµĹ¥»÷Öб»Æð¾¢Ê¹Óà £¬£¬ £¬£¬£¬£¬ÓÃÓÚÖÖÖÖ¶ñÒâÄ¿µÄ £¬£¬ £¬£¬£¬£¬°üÀ¨Ìع¤»î¶¯ºÍµç×Ó·¸·¨¡£¡£¡£


https://gbhackers.com/hackers-attack-foxit-pdf-reader-users/