以下の内容はhttps://negi.hatenablog.com/entry/2025/12/07/221814より取得しました。


今週の気になるセキュリティニュース - Issue #252

ポッドキャスト収録用のメモですよ。

podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。



事件、事故

国内証券会社の口座乗っ取りおよび不正取引被害に関して、警視庁が中国籍の 2人を逮捕

(11/28) 証券口座乗っ取り、中国人2人を相場操縦容疑などで逮捕…70万株売り抜け売却益860万円得たか : 読売新聞

(参考) 相場操縦容疑で摘発された国内証券口座のっとり事案についてまとめてみた - piyolog


韓国大手通販サイト Coupang から 3,370万件の個人情報が流出

(11/29) [쿠팡 개인정보 유출 통지] 자주 묻는 질문(FAQ)

(11/30) 고객 신고 뒤에야 인지한 쿠팡 … 정보 빼간 中직원은 '협박 메일' - 매일경제

(11/30) Coupang criticized over lax spending on security in wake of large-scale hack

(12/1) 韓国ネット通販大手で「史上最悪」個人情報流出「4人中3人が被害」:朝日新聞

(12/2) クーパンの個人情報流出 ぜい弱なセキュリティー体制が浮き彫りに l KBS WORLD Japanese

(12/2) クーパンの個人情報流出 初の集団訴訟「20万ウォンずつ請求」 l KBS WORLD Japanese


Europol および Eurojust とドイツ、スイスの法執行機関の協力により、暗号資産のミキシングサービス Cryptomixer を摘発

(12/1) Europol and partners shut down ‘Cryptomixer’ - EUR 25 million in cryptocurrency seized during the operation | Europol

From 24 to 28 November 2025, Europol supported an action week conducted by law enforcement authorities from Switzerland and Germany in Zurich, Switzerland. The operation focused on taking down the illegal cryptocurrency mixing service ‘Cryptomixer’, which is suspected of facilitating cybercrime and money laundering.

Three servers were seized in Switzerland, along with the cryptomixer.io domain. The operation resulted in the confiscation of over 12 terabytes of data and more than EUR 25 million worth of the cryptocurrency Bitcoin. After the illegal service was taken over and shut down, law enforcement placed a seizure banner on the website.


欧州委員会が X に対して Digital Services Act にもとづく€120M の制裁金

(12/5) Commission fines X €120 million under the Digital Services Act


攻撃、脅威

Cloudflare が 2025年第 3 四半期の DDoS 脅威レポートを公開

(12/3) Cloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnets


CISA が BRICKSTORM マルウェアの攻撃活動に関する注意喚起

(12/4) PRC State-Sponsored Actors Use BRICKSTORM Malware Across Public Sector and Information Technology Systems | CISA

(12/4) BRICKSTORM Backdoor | CISA


Amnesty International などが共同で、商用スパイウェアベンダー Intellexa の活動に関する調査レポートを公開

(12/4) To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab

The “Intellexa Leaks”, a new investigation published jointly by Inside Story, Haaretz and WAV Research Collective, presents troubling revelations about the surveillance company Intellexa and its signature product Predator, a form of highly invasive spyware that has been linked to human rights abuses in multiple countries.

(12/4) Intellexa’s Global Corporate Web

(12/4) Intellexa’s Prolific Zero-Day Exploits Continue | Google Cloud Blog


脆弱性

Android が複数の脆弱性を修正。すでに悪用が確認されている脆弱性を含む。

(12/1) Android Security Bulletin—December 2025 | Android Open Source Project

Note: There are indications that the following may be under limited, targeted exploitation.

  • CVE-2025-48633
  • CVE-2025-48572


CISA が Known Exploited Vulnerabilities (KEV) カタログに 2+1+1 個の脆弱性を追加

(12/2) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

(12/3) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2021-26828 OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability

(12/5) CISA Adds One Known Exploited Vulnerability to Catalog | CISA

  • CVE-2025-55182 Meta React Server Components Remote Code Execution Vulnerability


JPCERT/CC が Array Networks Array AGシリーズにおけるコマンドインジェクションの脆弱性に関する注意喚起

(12/3) Array Networks Array AGシリーズにおけるコマンドインジェクションの脆弱性に関する注意喚起


React Server Components にリモートコード実行可能な脆弱性。すでに悪用が確認されている

(12/3) Critical Security Vulnerability in React Server Components – React

(12/3) Security Advisory: CVE-2025-66478 | Next.js

(12/3) React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically for the Next.js framework.

This vulnerability was responsibly disclosed by myself, Lachlan Davidson on 29 November 2025 PT to the Meta team. Initial disclosure and patch release was performed by React and Vercel on 3 December 2025 PT.

(12/4) China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) | AWS Security Blog

(12/4) High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) › Searchlight Cyber

(12/5) Cloudflare outage on December 5, 2025

On December 5, 2025, at 08:47 UTC (all times in this blog are UTC), a portion of Cloudflare’s network began experiencing significant failures. The incident was resolved at 09:12 (~25 minutes total impact), when all services were fully restored.

A subset of customers were impacted, accounting for approximately 28% of all HTTP traffic served by Cloudflare. Several factors needed to combine for an individual customer to be affected as described below.

The issue was not caused, directly or indirectly, by a cyber attack on Cloudflare’s systems or malicious activity of any kind. Instead, it was triggered by changes being made to our body parsing logic while attempting to detect and mitigate an industry-wide vulnerability disclosed this week in React Server Components.

(12/5) CVE-2025-55182 (React2Shell) Opportunistic Exploitation In The Wild: What The GreyNoise Observation Grid Is Seeing So Far

(12/5) React Server Componentsの脆弱性(CVE-2025-55182)について


その他




以上の内容はhttps://negi.hatenablog.com/entry/2025/12/07/221814より取得しました。
このページはhttp://font.textar.tv/のウェブフォントを使用してます

不具合報告/要望等はこちらへお願いします。
モバイルやる夫Viewer Ver0.14