ポッドキャスト収録用のメモですよ。
podcast - #セキュリティのアレ - ゆるーいセキュリティのポッドキャストですよ。
事件、事故
マイナ免許証の運用が開始されるが、システム障害やアプリの不具合などが発生
(3/24) マイナンバーカード 運転免許証 一体化初日トラブル相次ぐ 登録できない人も システム障害やアプリ不具合 | NHK | マイナンバー
DrayTek 製ルーターで再起動を繰り返す障害が世界各地で発生
(3/24) DrayTek routers worldwide go into reboot loops over weekend
Many Internet service providers (ISPs) worldwide are alerting customers of an outage that started Saturday night and triggered DrayTek router connectivity problems.
(3/25) Amid Reports of Worldwide Reboots, GreyNoise Observes In-the-Wild Activity Against DrayTek Routers
Following reports of widespread reboots affecting DrayTek routers globally, GreyNoise is bringing awareness to in-the-wild activity against several known vulnerabilities in DrayTek devices. While we cannot confirm a direct connection between this activity and the reported reboots, we are surfacing this data to help defenders monitor and respond accordingly.
米政府高官らが Signal のチャットで軍事作戦に関する情報をやり取り。チャットに The Atlantic 誌の編集長を誤って招待したことから発覚
(3/24) The Trump Administration Accidentally Texted Me Its War Plans - The Atlantic
(3/26) Here Are the Attack Plans That Trump’s Advisers Shared on Signal - The Atlantic
(3/25) 米政府高官ら、保護されていないチャットでイエメン攻撃計画を協議 ジャーナリストに誤って共有 - BBCニュース
(3/25) 米 トランプ政権中枢メンバー 軍事作戦情報を民間のメッセージアプリでやりとりか 米報道 | NHK | アメリカ
Right now there are a lot of new eyes on Signal, and not all of them are familiar with secure messaging and its nuances. Which means there’s misinfo flying around that might drive people away from Signal and private communications.
— Signal (@signalapp) March 25, 2025
One piece of misinfo we need to address is the…
LINEヤフーに対して総務省が行政指導
(3/28) 総務省|報道資料|LINE ヤフー株式会社に対する通信の秘密の保護に係る措置(指導)
(3/28) LINEアプリ(アルバム)に関する総務省からの行政指導について|LINEヤフー株式会社
LINEヤフー株式会社は、2024年11月28日に発生したLINEのアルバムでサムネイル画像が正しく表示されない不具合(以下、本不具合)に関して、本日付で総務省より行政指導を受けました。
攻撃、脅威
Trend Micro がロシアの攻撃者グループ Water Gamayun (EncryptHub) の攻撃活動について報告
(3/25) CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin | Trend Micro (US)
(3/28) A Deep Dive into Water Gamayun's Arsenal and Infrastructure | Trend Micro (US)
ODNI が "2025 Annual Threat Assessment of the U.S. Intelligence Community" を公開
(3/25) 2025 Annual Threat Assessment of the U.S. Intelligence Community
ESET が攻撃者グループ FamousSparrow の攻撃活動について報告
(3/26) You will always remember this as the day you finally caught FamousSparrow
CISA が RESURGE マルウェアの解析レポートを公開
脆弱性
a-blog cms に脆弱性。すでに悪用を確認
(3/22) 【重要なお知らせ】a-blog cmsの脆弱性について | お知らせ | ブログ | a-blog cms developer
(3/24) a-blog cmsの脆弱性対応バージョンの不具合について | お知らせ | ブログ | a-blog cms developer
(3/25) 脆弱性についての対策・対応について | お知らせ | ブログ | a-blog cms developer
(3/28) a-blog cmsにおける信頼できないデータのデシリアライゼーションの脆弱性に関する注意喚起
CISA が Known Exploited Vulnerabilities (KEV) カタログに 1+2+2 個の脆弱性を追加
(3/24) CISA Adds One Known Exploited Vulnerability to Catalog | CISA
- CVE-2025-30154 reviewdog action-setup GitHub Action Embedded Malicious Code Vulnerability
(3/26) CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA
- CVE-2019-9874 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
- CVE-2019-9875 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
(3/27) CISA Adds One Known Exploited Vulnerability to Catalog | CISA
- CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
Google が Windows 版 Chrome のゼロデイ脆弱性を修正。すでに悪用を確認
(3/25) Chrome Releases: Stable Channel Update for Desktop
Google is aware of reports that an exploit for CVE-2025-2783 exists in the wild.
(3/25) Operation ForumTroll exploits zero-days in Google Chrome | Securelist
We have discovered and reported dozens of zero-day exploits actively used in attacks, but this particular exploit is certainly one of the most interesting we’ve encountered. The vulnerability CVE-2025-2783 really left us scratching our heads, as, without doing anything obviously malicious or forbidden, it allowed the attackers to bypass Google Chrome’s sandbox protection as if it didn’t even exist. The cause of this was a logical error at the intersection of Google Chrome’s sandbox and the Windows operating system. We plan to publish the technical details of this vulnerability once the majority of users have installed the updated version of the browser that fixes it.
(3/27) Security Vulnerability fixed in Firefox 136.0.4, Firefox ESR 128.8.1, Firefox ESR 115.21.1 — Mozilla
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.
The original vulnerability was being exploited in the wild.
This only affects Firefox on Windows. Other operating systems are unaffected.