ÐÂÐÍDoubleClickjackingÎó²î¿ÉÈÆ¹ýÍøÕ¾µÄµã»÷Ð®ÖÆ±£»£»£»£»£»£»¤

Ðû²¼Ê±¼ä 2025-01-03

1. ÐÂÐÍDoubleClickjackingÎó²î¿ÉÈÆ¹ýÍøÕ¾µÄµã»÷Ð®ÖÆ±£»£»£»£»£»£»¤


1ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬Ç徲ר¼ÒÕ¹ÏÖÁËÒ»ÖÖÐÂÐÍÎó²îDoubleClickjacking£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»Ö֯ձ鱣´æµÄ»ùÓÚʱ¼äµÄÎó²î£¬£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓÃË«»÷²Ù×÷ÍÆ¶¯µã»÷Ð®ÖÆ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏÕЩӰÏìËùÓдóÐÍÍøÕ¾¡£ ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Paulos YibeloÃüÃû£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃË«»÷ÐòÁжø·Ç¼òµ¥µã»÷£¬£¬£¬£¬£¬£¬£¬ÄÜÈÆ¹ýÏÖÓеã»÷Ð®ÖÆ·À»¤²½·¥£¬£¬£¬£¬£¬£¬£¬ÈçX-Frame-OptionsºÍSameSite cookie¡£ ¡£¡£¡£¡£¡£¡£DoubleClickjacking¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ØÖƵÄÍøÕ¾»áÓÕµ¼Óû§Ë«»÷¿´ËÆÎÞº¦µÄÔªËØ£¬£¬£¬£¬£¬£¬£¬ÈçCAPTCHAÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Ê±´úʹÓÃJavaScriptÇÄÇÄÖØ¶¨ÏòÖÁ¶ñÒâÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬ÈçÅú×¼¶ñÒâµÄOAuthÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¹Ø±Õ¶¥²ã´°¿Ú£¬£¬£¬£¬£¬£¬£¬Ê¹Óû§ÔÚ²»ÖªÇéÏÂÊÚÓè»á¼ûȨÏÞ¡£ ¡£¡£¡£¡£¡£¡£YibeloÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼WebÓ¦ÓóÌÐòºÍ¿ò¼Üδ˼Á¿Ë«»÷Σº¦£¬£¬£¬£¬£¬£¬£¬ÏÖÓзÀÓù²½·¥ÎÞЧ¡£ ¡£¡£¡£¡£¡£¡£ÍøÕ¾ËùÓÐÕß¿Éͨ¹ý¿Í»§¶ËÊÖ¶ÎÏû³ýÎó²î£¬£¬£¬£¬£¬£¬£¬ÈçĬÈϽûÓÃÒªº¦°´Å¥£¬£¬£¬£¬£¬£¬£¬ÔÚ¼ì²âµ½Êó±êÊÖÊÆÊ±¼¤»î¡£ ¡£¡£¡£¡£¡£¡£¾ÃÔ¶À´¿´£¬£¬£¬£¬£¬£¬£¬ä¯ÀÀÆ÷¹©Ó¦ÉÌÓ¦½ÓÄÉбê×¼·ÀÓùË«»÷ʹÓᣠ¡£¡£¡£¡£¡£¡£DoubleClickjackingÊǵã»÷Ð®ÖÆ¹¥»÷µÄ±äÖÖ£¬£¬£¬£¬£¬£¬£¬Ê¹Óõã»÷¼äµÄʱ¼ä²îÎÞ·ìÌæ»»Á¼ÐÔUIÔªËØÎªÃô¸ÐÔªËØ¡£ ¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html


2. Brain CipherÀÕË÷Èí¼þÍÅ»ïй¶Â޵µºRIBridgesƽ̨Êý¾Ý


1ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬Brain Cipher ÀÕË÷Èí¼þÍÅ»ï½üÆÚ×îÏÈй¶ÔÚ¹¥»÷Â޵µº¡°RIBridges¡±É罻ЧÀÍÆ½Ì¨Ê±ÇÔÈ¡µÄÎļþ¡£ ¡£¡£¡£¡£¡£¡£RIBridgesÊÇÒ»¸ö×ÛºÏ×ʸñϵͳ£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÖÎÀíºÍÌṩ°üÀ¨Ò½ÁƱ£½¡¡¢Ê³ÎïÔ®Öú¡¢¶ùͯ±£ÓýµÈÉç»áÔ®ÖúÍýÏë¡£ ¡£¡£¡£¡£¡£¡£Â޵µºÖÝÓÚ12ÔÂ5ÈÕÊ״εÃ֪ϵͳÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«Ö±µ½12ÔÂ10ÈÕ²ÅÈ·ÈÏÊý¾Ý¿ÉÄÜÒѱ»ÇÔÈ¡¡£ ¡£¡£¡£¡£¡£¡£12ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬£¬ÏµÍ³¹©Ó¦É̵ÂÇÚÈ·Èϱ£´æ¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬ÖÝÕþ¸®Ë漴ָʾ¹Ø±ÕRIBridgesϵͳ¡£ ¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬£¬£¬Brain Cipher×îÏÈÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼²¿·Ö±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨³ÉÄêÈ˺Íδ³ÉÄêÈ˵ÄСÎÒ˽¼ÒÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±Connor GoodwolfÏÂÔØÁËÕâЩÊý¾Ý²¢Ö¤ÊµÁËÆäÕæÊµÐÔ¡£ ¡£¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬£¬£¬Ô¼ÓÐ65ÍòÈËÊܵ½´Ë´Î¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬£¬£¬ËûÃǵÄÃô¸ÐÐÅÏ¢ÈçÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºÍÄ³Ð©ÒøÐÐÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£ ¡£¡£¡£¡£¡£¡£ÖÝÕþ¸®¹ÙÔ±½¨ÒéÂ޵µº×¡Ãñ¶³½á²¢¼à¿ØÆäÐÅÓ㬣¬£¬£¬£¬£¬£¬ÒÔ·Àڲƭ»î¶¯£¬£¬£¬£¬£¬£¬£¬²¢Ð¡ÐÄʹÓñ»µÁÊý¾Ý¾ÙÐÐÍøÂç´¹ÂÚÕ©Æ­¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-stolen-in-rhode-islands-ribridges-breach/


3. ÈÕ±¾Òƶ¯ÔËÓªÉÌNTT DocomoÔâDDoS¹¥»÷µ¼Ö²¿·ÖЧÀÍÖÐÖ¹


1ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾×î´óµÄÒÆ¶¯ÔËÓªÉÌNTT DocomoÔâÓöÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖЧÀÍÔÝʱÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÂÎÅÍøÕ¾¡¢ÊÓÆµÁ÷ýÌåÆ½Ì¨¡¢Òƶ¯Ö§¸¶ºÍÍøÂçÓʼþЧÀÍÒÔ¼°¸ß¶û·òϲ»¶ÕßÍøÕ¾µÈ¡£ ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÉùÃ÷ÖÐÈ·ÈÏÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÆð¾¢»Ö¸´Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼Ð§À͵Ļá¼ûÒѻָ´£¬£¬£¬£¬£¬£¬£¬µ«²¿·ÖÄÚÈݸüпÉÄÜÑÓ³Ù¡£ ¡£¡£¡£¡£¡£¡£NTT Docomo佫´ËÊÂÎñ¹é×ïÓÚÈκÎÌØ¶¨µÄÍþвÐÐΪÕߣ¬£¬£¬£¬£¬£¬£¬µ«ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ2023ÄêÒѳÉΪRansomed.vcÍÅ»ïÀÕË÷Èí¼þ¹¥»÷µÄÊܺ¦Õß¡£ ¡£¡£¡£¡£¡£¡£×î½ü¼¸¸öÔ£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾¶à¼Ò¹«Ë¾Ò²ÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÈÕ±¾º½¿Õ¡¢Èý¾®×¡ÓѺ£Éϰü¹Ü¹«Ë¾¡¢½Ç´¨¡¢¿¨Î÷Å·µÈ×ÅÃûÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°µçÄîÍ·ÖÆÔìÉÌNidec¡¢Æû³µÁ㲿¼þÖÆÔìÉÌYorozuºÍÑз¢»ú¹¹MonohakobiµÈ¡£ ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾Ö÷Òª½ðÈÚ»ú¹¹ÈçÈýÁâÈÕÁªÒøÐС¢ÀïË÷ÄÉÒøÐкÍÈðËëÒøÐеÄÍøÉÏÒøÐÐЧÀÍÒ²ÒòÉæÏÓÍøÂç¹¥»÷¶øÖÐÖ¹¡£ ¡£¡£¡£¡£¡£¡£


https://therecord.media/ntt-docomo-japan-mobile-carrier-ddos-incident


4. ³¬Èý°ÙÍòÓʼþЧÀÍÆ÷δ¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬Ò×ÊÜÍøÂçÐá̽¹¥»÷


1ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ»¥ÁªÍøÉϱ£´æÁè¼ÝÈý°ÙÍò¸öδ½ÓÄÉTLS¼ÓÃܵÄPOP3ºÍIMAPÓʼþЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÕâЩЧÀÍÆ÷ÈÝÒ×ÔâÊÜÍøÂçÐá̽¹¥»÷¡£ ¡£¡£¡£¡£¡£¡£IMAPºÍPOP3ÊÇ»á¼ûµç×ÓÓʼþµÄÁ½ÖÖÒªÁ죬£¬£¬£¬£¬£¬£¬ÆäÖÐIMAP½¨ÒéÓÃÓÚ¶à×°±¸Í¬²½£¬£¬£¬£¬£¬£¬£¬¶øPOP3ÔòÏÂÔØÓʼþµ½ÍâµØ×°±¸¡£ ¡£¡£¡£¡£¡£¡£µ±TLS¼ÓÃÜδÆôÓÃʱ£¬£¬£¬£¬£¬£¬£¬ÓʼþÄÚÈÝºÍÆ¾Ö¤½«ÒÔÃ÷ÎÄÐÎʽ·¢ËÍ£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁ˱»¹¥»÷µÄΣº¦¡£ ¡£¡£¡£¡£¡£¡£ShadowServerÇå¾²Íþв¼à¿ØÆ½Ì¨µÄɨÃèÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÕâЩδ¼ÓÃܵÄÓʼþЧÀÍÆ÷̻¶ÁËÓû§ÃûºÍÃÜÂ룬£¬£¬£¬£¬£¬£¬Ê¹ÆäÒ×Êܹ¥»÷¡£ ¡£¡£¡£¡£¡£¡£ShadowServerÕýÔÚ֪ͨÏà¹ØÔËÓªÉÌÆôÓÃTLSÖ§³Ö£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤Óû§Êý¾Ý¡£ ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ëæ×ÅTLSЭÒéµÄÒ»Ö±Éú³¤£¬£¬£¬£¬£¬£¬£¬²»Çå¾²µÄTLS 1.0ºÍTLS 1.1ЭÒéÒѱ»ïÔÌ­£¬£¬£¬£¬£¬£¬£¬ÏÖ´ú²Ù×÷ϵͳĬÈÏÆôÓøüÇå¾²µÄTLS 1.3°æ±¾¡£ ¡£¡£¡£¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÒ²ÌṩÁËÌæ»»¹ýʱTLSЭÒéÉèÖõÄÖ¸µ¼£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ¹¥»÷ÕßʹÓÃÕâЩÉèÖûá¼ûÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-3-million-mail-servers-without-encryption-exposed-to-sniffing-attacks/


5. RansomHubÉù³ÆÈëÇÖ´ó¶¼»áÈËÊÙ£¬£¬£¬£¬£¬£¬£¬°ü¹Ü¾ÞÍ··ñ¶¨


12ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬RansomHub×éÖ¯Éù³ÆÔÚÐÂÄêǰϦÈëÇÖÁËÈ«Çò×î´ó°ü¹Ü¡¢Äê½ðºÍÔ±¹¤¸£ÀûÍýÏëÌṩÉÌÖ®Ò»µÄ´ó¶¼»áÈËÊÙ°ü¹Ü¹«Ë¾(MetLife)£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍø²©¿ÍÉÏÐû²¼Á˹¥»÷ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁË1TBÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬´ó¶¼»áÈËÊÙ·ñ¶¨±¬·¢ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬½öÈ·ÈÏÆä×Ó¹«Ë¾Fondo GenesisÔÚ¶ò¹Ï¶à¶ûÔâÓöÍøÂçÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÇÒÓëÆóҵϵͳÍÑÀëÔËÓª¡£ ¡£¡£¡£¡£¡£¡£RansomHubÐû²¼µÄÑù±¾Îļþ¶àΪÎ÷°àÑÀÓ£¬£¬£¬£¬£¬£¬¾ÝÍÆ²âÀ´×Ô´ó¶¼»áÈËÊÙÀ­¶¡ÃÀÖÞ·Ö²¿¡£ ¡£¡£¡£¡£¡£¡£´ó¶¼»áÈËÊÙÔÚÈ«Çò115¸ö¹ú¼ÒΪÁè¼Ý1ÒÚ¿Í»§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨1000ÍòÃÀ¹úÒÔÍâµØÇø¿Í»§¡£ ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾Hudson Rock 11 Ô·ݵı¨¸æ£¬£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿Íй¶Á˽ü60ÍòÌõ¾Ý³ÆÊôÓÚ´ó¶¼»áÈËÊÙµÄÊý¾Ý¼Í¼£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÏÓÒÉÕâÓë MOVEit Îó²îÓйØ£¬£¬£¬£¬£¬£¬£¬µ«´ó¶¼»áÈËÊÙ·ñ¶¨ÓëCl0pÀÕË÷Èí¼þ×éÖ¯µÄMOVEitºÚ¿Í¹¥»÷ÓйØ¡£ ¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/metlife-latin-america-claimed-by-ransomhub-group/


6. ÒÔÌ«·»¿ª·¢Ö°Ô±ÔâÓöʹÓöñÒânpm°üµÄÖØ´ó¹©Ó¦Á´¹¥»÷


1ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬¾ÝSocketÑо¿ÍŶÓÅû¶£¬£¬£¬£¬£¬£¬£¬ÒÔÌ«·»¿ª·¢Ö°Ô±ÒѳÉÎªÖØ´ó¹©Ó¦Á´¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÈËÃǶԿªÔ´Éú̬ϵͳµÄÐÅÈΣ¬£¬£¬£¬£¬£¬£¬ÔÚnpmÉú̬ϵͳÖÐÐû²¼ÁËÖÁÉÙ20¸ö¶ñÒâHardhat²å¼þ£¬£¬£¬£¬£¬£¬£¬ÕâЩ²å¼þÃû³ÆÓëÕýµ±Èí¼þ°üºÍ×éÖ¯ÏàËÆ£¬£¬£¬£¬£¬£¬£¬ÀýÈç@nomisfoundation/hardhat-configureºÍhardhat-deploy-others£¬£¬£¬£¬£¬£¬£¬ÆäÖÐһλ×÷ÕßµÄÏÂÔØÁ¿Áè¼Ý1,000´Î¡£ ¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÉù³Æ¿ÉÒÔÔöÇ¿ÊÂÇéÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬ÊµÔòÉñÃØÇÔÈ¡ÊÜѬȾµÄ¿ª·¢ÇéÐÎÖеÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÈçÖú¼Ç·ûºÍ˽ԿµÈ¡£ ¡£¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄɶàÌõÀíÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬°üÀ¨´ÓHardhatÔËÐÐÇéÐÎÖÐÌáȡҪº¦ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃAESÃÜÔ¿¼ÓÃÜÊý¾Ý²¢´«Êäµ½¹¥»÷Õß¿ØÖƵĶ˵㣬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃÒÔÌ«·»ÖÇÄܺÏÔ¼¶¯Ì¬¼ìË÷ÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷µØµã£¬£¬£¬£¬£¬£¬£¬ÊµÏÖC2»ù´¡ÉèÊ©µÄÈ¥ÖÐÐÄ»¯ºÍ²»¿É¸Ä¶¯ÌØÕ÷£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁËÆÆËðÄѶÈ¡£ ¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯¸øÒÔÌ«·»¿ª·¢ÉçÇø´øÀ´ÁËÖØ´óΣº¦£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁË¿ªÔ´Éú̬ϵͳÖеÄÇå¾²ÎÊÌâ¡£ ¡£¡£¡£¡£¡£¡£


https://securityonline.info/supply-chain-attack-on-ethereum-developers-via-malicious-npm-packages/