Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806

Ðû²¼Ê±¼ä 2022-06-21
1¡¢Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806

      

¾ÝýÌå6ÔÂ16ÈÕ±¨µÀ£¬£¬ £¬£¬AnkerµÄÖÐÑëÖÇÄܼҾÓ×°±¸ÖÐÐÄEufy Homebase 2±£´æ3¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£Homebase 2ÊÇËùÓÐAnker EufyÖÇÄܼҾÓ×°±¸µÄÊÓÆµ´æ´¢ºÍÍøÂçÍø¹Ø£¬£¬ £¬£¬×÷ΪÕâЩװ±¸µÄÖÐÐÄÕ¾ÔËÐС£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇÒ»¸ö´úÂëÖ´ÐÐÎó²î£¨CVE-2022-21806£¬£¬ £¬£¬CVSSÆÀ·Ö10)£¬£¬ £¬£¬ÊÇÄÚ²¿Ð§ÀÍÆ÷¹¦Ð§ÖеÄÊͷźóʹÓÃÎó²îµ¼Öµģ¬£¬ £¬£¬¿Éͨ¹ýÏòÄ¿µÄ×°±¸·¢ËÍÌØÖÆµÄÍøÂçÊý¾Ý°üÀ´´¥·¢¡£¡£¡£¡£¡£¡£ÆäËüÁ½¸öÎó²î»®·ÖΪ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2022-26073£©ºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-25989£©¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/anker-eufy-smart-home-hubs-exposed-to-rce-attacks-by-critical-flaw/


2¡¢ÃÀ¹úFlagstarÒøÐÐ֪ͨÆä¿Í»§È¥ÄêÔâµ½¹¥»÷

      

¾Ý6ÔÂ20ÈÕ±¨µÀ£¬£¬ £¬£¬FlagstarÒøÐÐÕýÔÚ֪ͨ¿Í»§¹ØÓÚÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£FlagstarÊÇλÓÚÃÜЪ¸ùÖݵĽðÈÚЧÀÍÌṩÉÌ£¬£¬ £¬£¬Ò²ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬£¬ £¬£¬×Ü×ʲúÁè¼Ý300ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶Í¨Öª£¬£¬ £¬£¬FlagstarµÄÍøÂçÔÚ2021Äê12Ô±»ÈëÇÖ£¬£¬ £¬£¬¸ÃÒøÐÐÓÚ½ñÄê6ÔÂ2ÈÕ·¢Ã÷¡£¡£¡£¡£¡£¡£¾­ÊӲ죬£¬ £¬£¬¹¥»÷Õß»á¼ûÁ˿ͻ§µÄÏêϸÐÅÏ¢£¬£¬ £¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁË1547169ÈË£¬£¬ £¬£¬Flagstar½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêÃâ·ÑµÄÉí·Ý¼à¿ØºÍ±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£2021Äê1Ô£¬£¬ £¬£¬¸ÃÐÐÔøÔâµ½ClopÍÅ»ïµÄÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/flagstar-bank-discloses-data-breach-impacting-15-million-customers/


3¡¢Robert Half³ÆºÚ¿ÍÒѹ¥»÷Æä1000¶à¸ö¿Í»§µÄÕÊ»§

      

ýÌå6ÔÂ17Èճƣ¬£¬ £¬£¬ÈËÁ¦×ÊÔ´¹«Ë¾Robert HalfµÄ1000¶à¸ö¿Í»§µÄÕÊ»§Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬¹¥»÷ÕßÔÚ4ÔÂ26ÈÕÖÁ5ÔÂ16ÈÕʱ´úÈëÇÖÁËRobertHalf.comÍøÕ¾µÄÕÊ»§£¬£¬ £¬£¬¸ÃÊÂÎñÓÚ5ÔÂ31ÈÕ±»·¢Ã÷£¬£¬ £¬£¬Ó°ÏìÁË1058СÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£´Ë´Îй¶Á˿ͻ§ÐÕÃû¡¢µØµãºÍÉç»áÇå¾²ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬ÒÔ¼°ÈËΪºÍ˰ÊյȲÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓйûÕæ¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬ £¬£¬µ«Æ¾Ö¤ÆäÐÎò£¬£¬ £¬£¬ËƺõÉæ¼°Æ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¡£¡£¡£Robert Half½¨Òé¿Í»§¸ü¸ÄʹÓÃÁËÏàͬƾ֤µÄÆäËüÕÊ»§£¬£¬ £¬£¬²¢½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/staffing-firm-robert-half-says-hackers-targeted-over-1000-customer-accounts


4¡¢Lookout³ÆÌع¤Èí¼þHermitÓëÒâ´óÀûRCS LabÓйØ

      

6ÔÂ16ÈÕ£¬£¬ £¬£¬LookoutµÄ×îÐÂÑо¿½«Ìع¤Èí¼þHermitºÍÒâ´óÀûRCS LabÁªÏµÆðÀ´¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬ËûÃÇÔÚ2022Äê4Ô¼ì²âµ½ÁËеÄÑù±¾¡£¡£¡£¡£¡£¡£HermitÊÇÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ£¬£¬ £¬£¬¾ßÓжàÖÖ¹¦Ð§£¬£¬ £¬£¬¿ÉÂ¼ÖÆÒôƵ¡¢²¦´òºÍÖØ¶¨Ïòµç»°ÒÔ¼°ÍøÂç¶àÖÖÊý¾Ý¡£¡£¡£¡£¡£¡£Ëüͨ¹ýSMSÐÂΞÙÐÐÈö²¥£¬£¬ £¬£¬Ã°³äÈýÐÇ¡¢VivoºÍOppoµÄÓ¦Ó㬣¬ £¬£¬Lookout½«¸ÃÆä¹é×ïÓÚÒâ´óÀûRCS Lab SpAºÍÒ»¼ÒµçÐÅЧÀÍÌṩÉÌTykelab Srl¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/06/researchers-uncover-hermit-android.html


5¡¢CleafyÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ


CleafyÔÚ6ÔÂ17ÈÕÐû²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£BRATAÓÚ2018Äêµ×Ê×´ÎÔÚ°ÍÎ÷±»·¢Ã÷£¬£¬ £¬£¬ÓÚ2021Äê·ºÆðÔÚÅ·ÖÞ¡£¡£¡£¡£¡£¡£½üÆÚ£¬£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷ÔËÓªÍÅ»ïÔÙ´ÎΪ¸ÃAndroid¶ñÒâÈí¼þÌí¼ÓÁ˸ü¶à¹¦Ð§²¢ÇÒË¢ÐÂÁ˹¥»÷Õ½ÂÔ£¬£¬ £¬£¬ÏÖÔÚ¸üÇкϸ߼¶Ò»Á¬Íþв(APT)¹¥»÷»î¶¯µÄģʽ¡£¡£¡£¡£¡£¡£Ð°汾µÄBRATA¸ü¾ßÕë¶ÔÐÔ£¬£¬ £¬£¬ËüÒ»´ÎÖ»Õë¶ÔÒ»¼Ò½ðÈÚ»ú¹¹£¬£¬ £¬£¬Ö»ÓÐÔÚÆä¹¥»÷»î¶¯±äµÃµÍЧʱ²Å»áתÏòÁíÒ»¸öÄ¿µÄ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬BRATAÌí¼ÓÁ˸ü¶àȨÏÞ£¬£¬ £¬£¬ÀýÈç·¢ËͺÍÎüÊÕSMS£¬£¬ £¬£¬Õâ¿ÉÓÃÀ´ÇÔÈ¡ÒøÐз¢Ë͸ø¿Í»§µÄÔÝʱÃÜÂë¡£¡£¡£¡£¡£¡£


https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat


6¡¢Trend MicroÐû²¼2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ

      

6ÔÂ15ÈÕ£¬£¬ £¬£¬Trend MicroÐû²¼ÁË2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¶Ô2022ÄêÖÆÔì¡¢µçÁ¦ºÍʯÓͺÍ×ÔÈ»Æø¹«Ë¾µÄ¹¤ÒµÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÁËÊӲ졣¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬£¬ÔÚÒÑÍù12¸öÔÂÖУ¬£¬ £¬£¬Ê®·ÖÖ®¾ÅµÄ×éÖ¯µÄÉú²ú»òÄÜÔ´¹©Ó¦¶¼Êܵ½¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¹ØÓÚϵͳÖÐÖ¹µÄÒ»Á¬Ê±¼äºÍ¾­¼ÃËðʧ£¬£¬ £¬£¬56%µÄÊÜ·ÃÕßÌåÏÖÖÐÖ¹»áÒ»Á¬ËÄÌì»ò¸ü³¤Ê±¼ä£»£»£»È¥ÄêµÄƽ¾ù¾­¼ÃËðʧԼΪ280ÍòÃÀÔª£»£»£»¾­¼ÃËðʧ³ýÁ˰üÀ¨ÀÕË÷¹¥»÷µÄÊê½ðÖ®Í⣬£¬ £¬£¬ÉÐÓлָ´ÏµÍ³¡¢µÖÓù¹¥»÷ºÍÕÐÆ¸ÌØÊâÔ±¹¤µÄÓöÈ¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/f/state-of-ot-security-2022.html