以下の内容はhttps://negi.hatenablog.com/entry/2025/01/27/110256より取得しました。


今週の気になるセキュリティニュース - Issue #207

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

TikTok が米国でサービス再開

(1/19) TikTok is restoring service in the US | TechCrunch

(1/20) Application Of Protecting Americans From Foreign Adversary Controlled Applications Act To TikTok – The White House

(1/21) TikTok Emerges from Shutdown Without Bytedance’s US CDN | Kentik Blog

(1/21) The fall and rise of TikTok (traffic)


サンリオピューロランド不正アクセスによるネットワークトラブルの影響で、一部サービスが利用できない状況

(1/23) 当社への不正アクセスによるネットワークトラブルについて

2025年1月23日(木)18時時点で一部のサービスがご利用いただけない状況が続いております。

引き続き全容解明と復旧に努めてまいります。

(1/23) 当社への不正アクセスによるネットワークトラブルについて|ハーモニーランド


北朝鮮の IT 技術者がなりすましなどにより不正に収益を得ている活動について、米司法省が北朝鮮国籍 2人、メキシコ国籍 1人、アメリカ国籍 2人を起訴。また FBI は北朝鮮の IT労働者による不正な活動に関する注意喚起

(1/23) Office of Public Affairs | Two North Korean Nationals and Three Facilitators Indicted for Multi-Year Fraudulent Remote Information Technology Worker Scheme that Generated Revenue for the Democratic People’s Republic of Korea | United States Department of Justice

(1/23) Internet Crime Complaint Center (IC3) | North Korean IT Workers Conducting Data Extortion

The Federal Bureau of Investigation (FBI) is providing an update to previously shared guidance regarding Democratic People's Republic of Korea (North Korea) Information Technology (IT) workers to raise public awareness of their increasingly malicious activity, which has recently included data extortion. FBI is warning the public, private sector, and international community about North Korean IT workers' continued victimization of US-based businesses. In recent months, in addition to data extortion, FBI has observed North Korean IT workers leveraging unlawful access to company networks to exfiltrate proprietary and sensitive data, facilitate cyber-criminal activities, and conduct revenue-generating activity on behalf of the regime.

(1/23) FBI: North Korean IT workers steal source code to extort employers


攻撃、脅威

Cloudflare が 2024年第 4 四半期の DDoS 攻撃レポートを公開

(1/21) Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4


Qualys が Mirai 亜種 Murdoc ボットネットの活動について報告

(1/21) Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog

(1/22) Using Censys to Track the Murdoc Botnet Campaign Targeting AVTECH Cameras and Huawei Routers | Censys


JPRSサブドメイン乗っ取りについての注意喚起

(1/21) サービス終了後に残っているDNS設定を利用したサブドメインの乗っ取りについて

(1/23) go.jpサブドメインが不正利用可能な状態だった件について:Geekなぺーじ


脆弱性

SonicWall SMA1000 に脆弱性。すでに悪用を確認

(1/22) SMA1000 Pre-Authentication Remote Command Execution Vulnerability | Security Advisory

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

IMPORTANT: SonicWall PSIRT has been notified of possible active exploitation of the referenced vulnerability by threat actors. We strongly advises users of the SMA1000 product to upgrade to the hotfix release version to address the vulnerability.

Please note that SonicWall Firewall and SMA 100 series products are not affected by this vulnerability.

(1/23) SonicWall warns of SMA1000 RCE flaw exploited in zero-day attacks


CISA が Known Exploited Vulnerabilities (KEV) カタログに 1+1 個の脆弱性を追加

(1/23) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

(1/24) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2025-23006 SonicWall SMA1000 Appliances Deserialization Vulnerability


その他

MITRE が D3FEND 1.0 をリリース

(1/16) MITRE Launches D3FEND 1.0 – A Milestone in Cybersecurity Ontology | MITRE




以上の内容はhttps://negi.hatenablog.com/entry/2025/01/27/110256より取得しました。
このページはhttp://font.textar.tv/のウェブフォントを使用してます

不具合報告/要望等はこちらへお願いします。
モバイルやる夫Viewer Ver0.14