Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806
Ðû²¼Ê±¼ä 2022-06-21
¾ÝýÌå6ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬AnkerµÄÖÐÑëÖÇÄܼҾÓ×°±¸ÖÐÐÄEufy Homebase 2±£´æ3¸öÇå¾²Îó²î¡£¡£¡£¡£Homebase 2ÊÇËùÓÐAnker EufyÖÇÄܼҾÓ×°±¸µÄÊÓÆµ´æ´¢ºÍÍøÂçÍø¹Ø£¬£¬£¬£¬£¬£¬×÷ΪÕâЩװ±¸µÄÖÐÐÄÕ¾ÔËÐС£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇÒ»¸ö´úÂëÖ´ÐÐÎó²î£¨CVE-2022-21806£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö10)£¬£¬£¬£¬£¬£¬ÊÇÄÚ²¿Ð§ÀÍÆ÷¹¦Ð§ÖеÄÊͷźóʹÓÃÎó²îµ¼Öµģ¬£¬£¬£¬£¬£¬¿Éͨ¹ýÏòÄ¿µÄ×°±¸·¢ËÍÌØÖÆµÄÍøÂçÊý¾Ý°üÀ´´¥·¢¡£¡£¡£¡£ÆäËüÁ½¸öÎó²î»®·ÖΪ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2022-26073£©ºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-25989£©¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/anker-eufy-smart-home-hubs-exposed-to-rce-attacks-by-critical-flaw/
2¡¢ÃÀ¹úFlagstarÒøÐÐ֪ͨÆä¿Í»§È¥ÄêÔâµ½¹¥»÷
¾Ý6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬FlagstarÒøÐÐÕýÔÚ֪ͨ¿Í»§¹ØÓÚÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£FlagstarÊÇλÓÚÃÜЪ¸ùÖݵĽðÈÚЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬Ò²ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬£¬£¬£¬£¬£¬×Ü×ʲúÁè¼Ý300ÒÚÃÀÔª¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶Í¨Öª£¬£¬£¬£¬£¬£¬FlagstarµÄÍøÂçÔÚ2021Äê12Ô±»ÈëÇÖ£¬£¬£¬£¬£¬£¬¸ÃÒøÐÐÓÚ½ñÄê6ÔÂ2ÈÕ·¢Ã÷¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬£¬£¬¹¥»÷Õß»á¼ûÁ˿ͻ§µÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁË1547169ÈË£¬£¬£¬£¬£¬£¬Flagstar½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêÃâ·ÑµÄÉí·Ý¼à¿ØºÍ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£2021Äê1Ô£¬£¬£¬£¬£¬£¬¸ÃÐÐÔøÔâµ½ClopÍÅ»ïµÄÀÕË÷¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/flagstar-bank-discloses-data-breach-impacting-15-million-customers/
3¡¢Robert Half³ÆºÚ¿ÍÒѹ¥»÷Æä1000¶à¸ö¿Í»§µÄÕÊ»§
ýÌå6ÔÂ17Èճƣ¬£¬£¬£¬£¬£¬ÈËÁ¦×ÊÔ´¹«Ë¾Robert HalfµÄ1000¶à¸ö¿Í»§µÄÕÊ»§Ôâµ½¹¥»÷¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ4ÔÂ26ÈÕÖÁ5ÔÂ16ÈÕʱ´úÈëÇÖÁËRobertHalf.comÍøÕ¾µÄÕÊ»§£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÓÚ5ÔÂ31ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ó°ÏìÁË1058СÎÒ˽¼Ò¡£¡£¡£¡£´Ë´Îй¶Á˿ͻ§ÐÕÃû¡¢µØµãºÍÉç»áÇå¾²ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¼°ÈËΪºÍ˰ÊյȲÆÎñÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓйûÕæ¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤ÆäÐÎò£¬£¬£¬£¬£¬£¬ËƺõÉæ¼°Æ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¡£Robert Half½¨Òé¿Í»§¸ü¸ÄʹÓÃÁËÏàͬƾ֤µÄÆäËüÕÊ»§£¬£¬£¬£¬£¬£¬²¢½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý¼à¿ØÐ§ÀÍ¡£¡£¡£¡£
https://www.securityweek.com/staffing-firm-robert-half-says-hackers-targeted-over-1000-customer-accounts
4¡¢Lookout³ÆÌع¤Èí¼þHermitÓëÒâ´óÀûRCS LabÓйØ
6ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬LookoutµÄ×îÐÂÑо¿½«Ìع¤Èí¼þHermitºÍÒâ´óÀûRCS LabÁªÏµÆðÀ´¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ2022Äê4Ô¼ì²âµ½ÁËеÄÑù±¾¡£¡£¡£¡£HermitÊÇÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¾ßÓжàÖÖ¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉÂ¼ÖÆÒôƵ¡¢²¦´òºÍÖØ¶¨Ïòµç»°ÒÔ¼°ÍøÂç¶àÖÖÊý¾Ý¡£¡£¡£¡£Ëüͨ¹ýSMSÐÂΞÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬Ã°³äÈýÐÇ¡¢VivoºÍOppoµÄÓ¦Ó㬣¬£¬£¬£¬£¬Lookout½«¸ÃÆä¹é×ïÓÚÒâ´óÀûRCS Lab SpAºÍÒ»¼ÒµçÐÅЧÀÍÌṩÉÌTykelab Srl¡£¡£¡£¡£
https://thehackernews.com/2022/06/researchers-uncover-hermit-android.html
5¡¢CleafyÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ
CleafyÔÚ6ÔÂ17ÈÕÐû²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ¡£¡£¡£¡£BRATAÓÚ2018Äêµ×Ê×´ÎÔÚ°ÍÎ÷±»·¢Ã÷£¬£¬£¬£¬£¬£¬ÓÚ2021Äê·ºÆðÔÚÅ·ÖÞ¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÔËÓªÍÅ»ïÔÙ´ÎΪ¸ÃAndroid¶ñÒâÈí¼þÌí¼ÓÁ˸ü¶à¹¦Ð§²¢ÇÒË¢ÐÂÁ˹¥»÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬ÏÖÔÚ¸üÇкϸ߼¶Ò»Á¬Íþв(APT)¹¥»÷»î¶¯µÄģʽ¡£¡£¡£¡£Ð°汾µÄBRATA¸ü¾ßÕë¶ÔÐÔ£¬£¬£¬£¬£¬£¬ËüÒ»´ÎÖ»Õë¶ÔÒ»¼Ò½ðÈÚ»ú¹¹£¬£¬£¬£¬£¬£¬Ö»ÓÐÔÚÆä¹¥»÷»î¶¯±äµÃµÍЧʱ²Å»áתÏòÁíÒ»¸öÄ¿µÄ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬BRATAÌí¼ÓÁ˸ü¶àȨÏÞ£¬£¬£¬£¬£¬£¬ÀýÈç·¢ËͺÍÎüÊÕSMS£¬£¬£¬£¬£¬£¬Õâ¿ÉÓÃÀ´ÇÔÈ¡ÒøÐз¢Ë͸ø¿Í»§µÄÔÝʱÃÜÂë¡£¡£¡£¡£
https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat
6¡¢Trend MicroÐû²¼2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ
6ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Trend MicroÐû²¼ÁË2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ¡£¡£¡£¡£Ñо¿Ö°Ô±¶Ô2022ÄêÖÆÔì¡¢µçÁ¦ºÍʯÓͺÍ×ÔÈ»Æø¹«Ë¾µÄ¹¤ÒµÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÁËÊӲ졣¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù12¸öÔÂÖУ¬£¬£¬£¬£¬£¬Ê®·ÖÖ®¾ÅµÄ×éÖ¯µÄÉú²ú»òÄÜÔ´¹©Ó¦¶¼Êܵ½¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¹ØÓÚϵͳÖÐÖ¹µÄÒ»Á¬Ê±¼äºÍ¾¼ÃËðʧ£¬£¬£¬£¬£¬£¬56%µÄÊÜ·ÃÕßÌåÏÖÖÐÖ¹»áÒ»Á¬ËÄÌì»ò¸ü³¤Ê±¼ä£»£»£»£»È¥ÄêµÄƽ¾ù¾¼ÃËðʧԼΪ280ÍòÃÀÔª£»£»£»£»¾¼ÃËðʧ³ýÁ˰üÀ¨ÀÕË÷¹¥»÷µÄÊê½ðÖ®Í⣬£¬£¬£¬£¬£¬ÉÐÓлָ´ÏµÍ³¡¢µÖÓù¹¥»÷ºÍÕÐÆ¸ÌØÊâÔ±¹¤µÄÓöȡ£¡£¡£¡£
https://www.trendmicro.com/en_us/research/22/f/state-of-ot-security-2022.html


¾©¹«Íø°²±¸11010802024551ºÅ