FlagstarÒøÐеĹ©¸øÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶

°ä²¼¹¦·ò 2023-10-10

1¡¢FlagstarÒøÐеĹ©¸øÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶


¾ÝýÌå10ÔÂ8ÈÕ±¨Â· £¬FlagstarÒøÐеĵÚÈý·½·þÎñÌṩÉÌFiservÔâµ½¹¥»÷ £¬µ¼Ö´óÁ¿¿Í»§µÄÐÅϢй¶¡£Flagstar´Ë¿Ì¹éŦԼÉçÇøÒøÐÐËùÓÐ £¬ÔÚÈ¥Äê±»ÊÕ¹ºÖ®Ç°ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò» £¬×Ü×ʲú³¬¹ý310ÒÚÃÀÔª¡£FiservÊǸÃÒøÐÐÓÃÓÚÖ§¸¶´¦ÖúÍÒÆ¶¯ÒøÐзþÎñµÄ¹©¸øÉÌ £¬ÆäÔâµ½ÁËCLOPµÄ¹¥»÷¡£ºÚ¿ÍÀûÓÃMOVEit TransferÖеķì϶½Ó¼ûÁËFiservϵͳ £¬²¢ÇÔÈ¡ÁËFlagstarµÄÊý¾Ý £¬¹²Ó°Ïì837390Ãû¿Í»§¡£ÕâÊÇFlagstar×Ô2021Äê3ÔÂÒÔÀ´²úÉúµÄµÄµÚÈýÆðÊý¾Ýй¶ÊÂÎñ¡£


https://www.bleepingcomputer.com/news/security/third-flagstar-bank-data-breach-since-2021-affects-800-000-customers/


2¡¢Ó¢¹úµç×Ó¹«Ë¾VolexµÄϵͳºÍÊý¾ÝÔ⵽δ¾­ÊÚȨ½Ó¼û


10ÔÂ9ÈÕ±¨Â·³Æ £¬Ó¢¹úµç×ÓµçÆø¹«Ë¾ºÀÀûÊ¿£¨Volex£©Ôâµ½ÍøÂç¹¥»÷¡£µ÷²éÏÔʾ £¬¸ÃÊÂÎñÊÇÓÉÓÚ¹«Ë¾Î»ÓÚÈ«ÇòµÄ¶à¸öITϵͳºÍÊý¾ÝÔ⵽δ¾­ÊÚȨ½Ó¼ûµ¼ÖµÄ¡£¸Ã¹«Ë¾°µÊ¾ £¬ËûÃÇÒѲÉÈ¡ÏìÓ¦´ëÊ©½«Ó°Ïì½µÖÁ×îµÍ £¬µ«×êÑÐÈËÔ±ÔÚUTC 13:25:26½Ó¼ûVolexÍøÕ¾Ê±ÏÔʾÒÑÀëÏß¡£Ä¿Ç° £¬¸ÃÍøÕ¾ÒѸ´Ô­½Ó¼û¡£VolexÐû³Æ¹¥»÷ÕßÎÞ·¨½Ó¼û²ÆÕþÊý¾Ý £¬¸ÃÊÂÎñûÓÐÔì³É³Á´ó²ÆÕþÓ°Ïì £¬µ«¸Ã¹«Ë¾µÄ¹É¼ÛÔÚ±¾ÖÜÒ»ÉÏÎçÈÔ×ÅÂäÁË4%×óÓÒ¡£ 


https://www.hackread.com/uk-power-data-manufacturer-volex-cyberattack/


3¡¢Storm-0324ͨ¹ýTeams»ñµÃ½Ó¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þ


TrellixÔÚ10ÔÂ5ÈÕ¹«¿ªÁËStorm-0324ͨ¹ýTeams»ñµÃ½Ó¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯¡£7ÔÂÉÏÑ® £¬¸ÃÍŻﱻ·¢ÏÔìðͷͨ¹ýMicrosoft Teams·¢ËÍ´¹µöÐÂÎÅ¡£ÔÚ»ñµÃ³õʼ½Ó¼ûȨÏÞºó £¬Storm-0324ʱʱ½«½Ó¼ûȨÏÞÒÆ½»¸øºÚ¿ÍÍÅ»ïSangria Tempest£¨ÓÖ³ÆFIN7£©ºÍTA543 £¬ºóÕßͨ³£»áÖ´ÐÐÀÕË÷¹¥»÷¡£×êÑÐÈËÔ±·¢ÏÖ £¬Storm-0324Èç½ñ´«²¼JSSLoader £¬¶øºóÔÙ½«ÔðÈÎת¼Þ¸øÆäËüÀÕË÷ÍŻ


https://www.trellix.com/en-us/about/newsroom/stories/research/storm-0324-an-access-for-the-raas-threat-actor.html


4¡¢X-ForceÅû¶ÀûÓÃNetScaler GatewayµÄÍ´´¦ÍøÂç»î¶¯


10ÔÂ6ÈÕ £¬X-ForceÅû¶ÁËһ·´ó¹æÄ£»î¶¯ £¬¹¥»÷ÕßÀûÓÃCitrix NetScaler GatewayÖзì϶£¨CVE-2023-3519£©ÇÔÈ¡Óû§Í´´¦¡£X-ForceÔÚµ÷²é¿Í»§µÄNetScalerÉ豸Éí·ÝÑéÖ¤¿ìÂÊ»ºÂýÎÊÌâʱ³õ´Î·¢ÏÖÁËÕâ´Î»î¶¯¡£µ÷²é·¢ÏÖ £¬ºÚ¿ÍÀûÓ÷ì϶ÔÚÉ豸µÄindex.htmlµÇÂ¼Ò³Ãæ×¢ÈëÁ˶ñÒâÆ¾Ö¤ÇÔÈ¡JavaScript¾ç±¾¡£¹¥»÷ÕßΪ´Ë»î¶¯×¢²áÁ˶à¸öÓòÃû £¬X-ForceÒѼø±ð³ö½ü600¸öÍйÜÅú¸ÄºóµÄNetScaler GatewayµÇÂ¼Ò³ÃæµÄIPµØÖ· £¬ÖØÒª¼¯ÖÐÔÚÃÀ¹úºÍÅ·ÖÞ¡£µÇÂ¼Ò³Ãæ×îÔçµÄÅú¸Ä¹¦·òÊÇ8ÔÂ11ÈÕ £¬Òò¶ø¸Ã»î¶¯ÒѾ­½øÐÐÁËÁ½¸öÔ¡£


https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/


5¡¢ÊØ»¤ÕßÅû¶curlÖеÄÁ½¸ö°²È«·ì϶²¢Ð¹Â©¼´½«°ä²¼²¹¶¡


      ¾Ý10ÔÂ9ÈÕ±¨Â· £¬curlµÄÊØ»¤ÕßDaniel StenbergÅû¶Á˸ÿªÔ´¹¤¾ßÖдæÔÚµÄÁ½¸ö°²È«·ì϶¡£ÆäÖÐ £¬2023-38545ͬʱӰÏìÁËcurl¼°Æä¿âlibcurl £¬±»³ÆÎª³Ö¾ÃÒÔÀ´×îÑϳÁµÄcurl°²È«·ì϶¡£ÁíÒ»¸ö·ì϶ΪCVE-2023-38546 £¬½öÓ°Ïìlibcurl¡£×êÑÐÈËÔ±ÉÐδй©Óйطì϶ºÍÊÜÓ°Ïì°æ¼¼ÇÉÓòµÄ¸ü¶àÐÅÏ¢ £¬µ«°µÊ¾Ð°汾curl 8.4.0ÒÔ¼°ÓйØÁ½¸ö·ì϶µÄ¾ßÌåÐÅÏ¢½«ÓÚ10ÔÂ11ÈÕ06:00×óÓÒ°ä²¼¡£

https://therecord.media/curl-vulnerabilities-to-be-announced-open-source


6¡¢Sentinelone°ä²¼ÐÂÀÕË÷Èí¼þLostTrustµÄ·ÖÎö»ã±¨


10ÔÂ5ÈÕ £¬Sentinelone°ä²¼Á˹ØÓÚÐÂÀÕË÷Èí¼þLostTrustµÄ·ÖÎö»ã±¨¡£LostTrustÊÇ9·ÝÔ³öÏÖµÄÒ»ÖÖеĶà³ÁÀÕË÷ÍÅ»ï £¬ÆäÍøÕ¾ÖÐÏÔʾËûÃÇÊÇ"×Ô³ÆÎªÍøÂ簲ȫÁìÓòר¼ÒµÄÄêÇáÈË"¡£¶ÔÆäpayloadµÄ·ÖÎöÅú×¢ £¬¸ÃϵÁÐÊÇSFileºÍMindwareµÄ½ø»¯°æ £¬²¢ÇÒÈýÕß¶¼×ñÑ­ÓëMetaEncryptorÀàËÆµÄÔË×÷ºÍ¼¼Êõ·½Ê½¡£LostTrustµÄÍøÕ¾ºÍMetaEncryptorÔçÆÚµÄÍøÕ¾Ò²ºÜÀàËÆ £¬¶øMetaEncryptor»î¶¯ÖÐʹÓõÄSFile¼ÓÃÜÆ÷ÔÚLostTrustÖÐÈÔÔÚʹÓá£


https://www.sentinelone.com/blog/losttrust-ransomware-latest-multi-extortion-threat-shares-traits-with-sfile-and-mindware/