Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔ­Òò±»FTC·£¿î5.2ÒÚÃÀÔª

Ðû²¼Ê±¼ä 2022-12-20

1¡¢Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔ­Òò±»FTC·£¿î5.2ÒÚÃÀÔª

      

¾Ý12ÔÂ19ÈÕ±¨µÀ£¬µï±¤Ö®Ò¹µÄÖÆÔìÉÌEpic Games½«Ö§¸¶5.2ÒÚÃÀÔª£¬ÒԺͽâÓйØÎ¥·´¶ùͯÒþ˽·¨ºÍʹÓúڰµÄ£Ê½ÓÕʹÊý°ÙÍòÓÎÏ·Íæ¼Ò½øÐÐÎÞÒâÏû·ÑµÄÖ¸¿Ø¡£FTCÔÚͶËßÖгÆ£¬EpicÔÚδ֪ͨ»òδÕ÷µÃÆäâïÊÑͬÒâµÄÇé¿öÏ£¬ÊÕ¼¯13ËêÒÔÏÂÍæ¼ÒµÄÐÅϢΥ·´ÁËCOPPA£¬±»·£¿î2.75ÒÚÃÀÔª¡£´ËÍ⣬Ëü»¹Ê¹ÓúڰµÄ£Ê½ÆÛÆ­°üÂÞ¶ùͯºÍÇàÉÙÄêÔÚÄÚµÄFortniteÍæ¼Ò½øÐв»ÐèÒªµÄÓÎÏ·ÄÚ¹ºÖã¬ÐëÏòÊÜÓ°Ïì¿Í»§Ö§¸¶2.45ÒÚÃÀÔªµÄÍ˿Ŀǰ£¬¸Ã¹«Ë¾ÒѸïÐÂĬÈÏÒþ˽ÉèÖ㬲¢¸ü¸ÄÁËÖ§¸¶Á÷³ÌÒÔ·À²»ÐëÒªµÄÊÕ·Ñ¡£


https://www.bleepingcomputer.com/news/gaming/epic-games-to-pay-520-million-for-privacy-violations-dark-patterns/


2¡¢ºÚ¿Í³öÊ۾ݳÆÊÇ´ÓGeminiÇÔÈ¡µÄ570ÍòÓû§µÄÐÅÏ¢

      

ýÌå12ÔÂ15Èճƣ¬ºÚ¿ÍÔÚ¶à¸ö°µÍøÆ½Ì¨³öÊ۾ݳÆÊÇÀ´×ÔGeminiµÄÊý¾Ý¿â£¬°üÂÞ570ÍòÓû§µÄÐÅÏ¢¡£¼ÓÃÜ»õ±Ò½»Ò×ËùGemini½üÆÚÐû²¼Í¨Öª³Æ£¬µÚÈý·½¹©Ó¦ÉÌÔâµ½ÁËÍøÂç¹¥»÷£¬Î´¾­ÊÚȨµÄ¹¥»÷ÕßÇÔÈ¡ÁËGemini¿Í»§µÄÓʼþµØÖ·ºÍµç»°ºÅÂ룬ĿǰÒÑÓпͻ§ÊÕµ½Á˵öÓãµç×ÓÓʼþ¡£¸ÃÊý¾Ý¿âËÆºõÔÚ9ÔÂÆð¾Í¿ªÊ¼³öÊÛ£¬µ±ÊǼ۸ñΪ30¸ö±ÈÌØ±Ò£¨Ô¼ºÏ520000ÃÀÔª£©¡£Gemini½¨Òé¿Í»§Ê¹ÓÃÇ¿´óµÄÉí·ÝÑéÖ¤ÒªÁ죬²¢½¨Ò鼤»î2FA±£»¤»òʹÓÃÓ²¼þÄþ¾²ÃÜÔ¿À´·ÃÎÊÕÊ»§¡£ 


https://securityaffairs.co/wordpress/139742/data-breach/5-7m-gemini-users-leak.html


3¡¢²ÍÒû¿Í»§¹ÜÀíÆ½Ì¨SevenRooms 427GBµÄÊý¾Ýй¶

      

¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ£¬ÔÚ¹¥»÷Õß³öÊÛ±»µÁÊý¾Ýºó£¬SevenRoomsÈ·ÈÏÆä·¢ÉúÁËÊý¾Ýй¶¡£SevenRoomsÊǹú¼ÊÁ¬Ëø²ÍÌüºÍ¾Æµê·þÎñÌṩÉÌʹÓõIJÍÌü¿Í»§¹ØÏµ¹ÜÀí(CRM)ƽ̨£¬°üÂÞMGM ResortsºÍBloomin' BrandsµÈ¡£12ÔÂ15ÈÕ£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬Éù³ÆÇÔÈ¡ÁËÒ»¸ö427 GBµÄ±¸·ÝÊý¾Ý¿â£¬ÆäÖаüÂÞÓйØSevenRooms¿Í»§µÄÐÅÏ¢¡£¾ÝϤ£¬Ð¹Â¶ÊÇÓÉÓÚSevenRoomsµÚÈý·½¹©Ó¦É̵ÄÎļþ´«Êä½Ó¿ÚÔ⵽δ¾­ÊÚȨ·ÃÎʵ¼ÖµÄ¡£


https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/


4¡¢Ñо¿ÍŶÓÅû¶ÀÖ¸ßBrickLinkÍøÕ¾ÖеÄAPIÄþ¾²Â©¶´

      

Salt SecurityÔÚ12ÔÂ15ÈÕÅû¶ÁËBrickLinkÍøÕ¾ÖеÄÁ½¸öAPI©¶´¡£BrickLink.comÊÇLEGO GroupµÄ¹Ù·½¶þÊֺ͹Ƕ­Àָ߻ýľÊг¡£¬ÓµÓÐÁè¼ÝÒ»°ÙÍòµÄ×¢²á»áÔ±¡£ÕâЩ©¶´¿É±»ÓÃÀ´½Ó¹Ü»áÔ±ÕÊ»§¡¢·ÃÎʺÍÇÔÈ¡´æ´¢ÔÚÆ½Ì¨ÉϵĸöÈËÉí·ÝÐÅÏ¢£¬ÉõÖÁ·ÃÎÊÄÚ²¿Éú²úÊý¾Ý²¢ÆÆ»µÄÚ²¿·þÎñÆ÷¡£µÚÒ»¸ö©¶´ÊÇÓÅ»ÝȯËÑË÷²¿ÃŵIJéÕÒÓû§Ãû¶Ô»°¿òÖеÄXSS©¶´£¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆÁ´½ÓÔÚÄ¿±êÖÐ×¢ÈëºÍÖ´ÐдúÂë¡£µÚ¶þ¸ö©¶´Î»ÓÚÉÏ´«µ½Çó¹ºÁбíÒ³Ãæ£¬¿Éͨ¹ýXXE¹¥»÷¶ÁÈ¡Web·þÎñÆ÷ÉϵÄÎļþ²¢Ö´ÐÐSSRF¹¥»÷£¬Õâ¿ÉÄܵ¼ÖÂAWS EC2ÁîÅÆÐ¹Â¶¡£


https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis


5¡¢Mandiant·¢ÏÖUNC4166Õë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯

      

¾ÝMandiant 12ÔÂ15Èճƣ¬Æä·¢ÏÖÁËÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹©Ó¦Á´¹¥»÷»î¶¯¡£±»×·×ÙΪUNC4166µÄ¹¥»÷ÍÅ»ïͨ¹ýÎÚ¿ËÀ¼ÓïºÍ¶íÓïµÄTorrentÎļþ¹²ÏíÍøÕ¾£¬·Ö·¢Î±×°³ÉºÏ·¨Windows 10°²×°·¨Ê½µÄľÂí»¯ISOÎļþ¡£ÕâЩ¶ñÒâ°²×°·¨Ê½ÌṩµÄ¶ñÒâÈí¼þÄܹ»´ÓÄ¿±ê¼ÆËã»úÊÕ¼¯Êý¾Ý¡¢°²×°ÆäËü¶ñÒ⹤¾ß²¢½«ÇÔÈ¡µÄÊý¾Ýй¶µ½¹¥»÷ÕߵķþÎñÆ÷¡£ÔÚ¿ª¶ËÕì²ìÖ®ºó£¬¹¥»÷Õß»¹°²×°Á˺óÃÅStowaway¡¢BeaconºÍSparepart£¬À´±£³Ö¶ÔÄ¿±êµÄ·ÃÎÊ¡¢Ö´ÐÐÃüÁî¡¢´«ÊäÎļþºÍÇÔÈ¡ÐÅÏ¢¡£


https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government


6¡¢TrendMicroÐû²¼¹ØÓÚÀÕË÷Èí¼þAgendaµÄ·ÖÎö³ÂËß

      

12ÔÂ16ÈÕ£¬TrendMicroÐû²¼Á˹ØÓÚÀÕË÷Èí¼þAgendaµÄ·ÖÎö³ÂËß¡£½üÆÚ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»¸öÓÃRust¿ª·¢µÄAgendaÑù±¾£¬¼ì²â½á¹ûΪRansom.Win32.AGENDA.THIAFBB¡£AgendaÔÚÆäÍøÕ¾ÉÏÐû²¼µÄ±»¹¥»÷×é֯λÓÚ²îÒì¹ú¼Ò£¬Ö÷ÒªÊôÓÚÖÆÔìÒµºÍITÐÐÒµ£¬×ÜÊÕÈëÁè¼Ý5.5ÒÚÃÀÔª¡£Óë½ÓÊÜ10¸ö²ÎÊýµÄGolang±äÌå²îÒ죬Rust±äÌåÖ»½ÓÊÜ3¸ö²ÎÊý£¬Ëü»¹Ê¹ÓüäЪÐÔ¼ÓÃܼÆÄ±À´Ìṩ¸ü¿ìµÄ¼ÓÃܲ¢¸üÓÐЧµØÈƹý¼ì²â¡£


https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html