Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾Ö§¸¶ÏµÍ³±»ºÚ¿Í»§ÒøÐп¨ÐÅϢй¶

°ä²¼¹¦·ò 2023-10-12

1¡¢Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾Ö§¸¶ÏµÍ³±»ºÚ¿Í»§ÒøÐп¨ÐÅϢй¶


¾ÝýÌå10ÔÂ10ÈÕ±¨Â·£¬Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾(Air Europa)µÄÖ§¸¶ÏµÍ³Ôâµ½¹¥»÷£¬¿Í»§µÄÐÅÓþ¿¨ÐÅϢй¶¡£Õâ´ÎÊÂÎñй¶µÄÐÅÏ¢Ô̺¬¿¨ºÅ¡¢ÓÐЧÆÚÒÔ¼°ÒøÐп¨±³ÃæµÄ3λCVV´úÂë¡£¸Ã¹«Ë¾»¹ÌáÐÑÊÜÓ°ÏìµÄ¿Í»§£¬ÒªÇóÒøÐÐ×¢ÏúËûÃÇÔڸú½¿Õ¹«Ë¾ÍøÕ¾ÉÏʹÓõÄÒøÐп¨£¬ÓÉÓÚ"´æÔÚÒøÐп¨ºýŪºÍڲƭµÄ·çÏÕ"¡£º½¿Õ¹«Ë¾ÉÐδй©ÊÜÓ°Ïì¿Í»§ÊýÁ¿¡¢¹¥»÷¹¦·òÒÔ¼°ÊÂÎñ±»·¢ÏֵŦ·ò¡£Å·ÖÞº½¿ÕÔøÔÚ2021ÄêÒòй¶Լ489000ÈËÐÅÏ¢±»Î÷°àÑÀÊý¾Ý± £»¤¾Ö(DPA)·£¿î60ÍòÅ·Ôª¡£


https://therecord.media/air-europa-cyberattack-payment-cards


2¡¢Citrix½¨¸´NetScaler²úÆ·Öзì϶CVE-2023-4966


¾Ý10ÔÂ10ÈÕ±¨Â·£¬Citrix½¨¸´ÁËÆäNetScaler ADCºÍNetScaler GatewayÖÐÑϳÁµÄ·ì϶£¨CVE-2023-4966£©¡£¸Ã·ì϶CVSSÆÀ·ÖΪ9.4£¬ÎÞÐè¸ßȨÏÞ¡¢Óû§½»»¥»ò¸ß¸´ÔÓÐÔ¼´¿ÉÔ¶³ÌÀûÓ㬿ÉÄܵ¼ÖÂÃô¸ÐÐÅϢй¶¡£²»Í⣬ǰÌáǰÌáÊÇÉ豸±ØÐëÅäÖÃÎªÍø¹Ø£¨VPNÐé¹¹·þÎñÆ÷¡¢ICA´úÀí¡¢CVPN¡¢RDP´úÀí£©»òAAAÐé¹¹·þÎñÆ÷¡£Õâ´Î»¹½¨¸´ÁËÒ»¸ö·ì϶£¨CVE-2023-4967£©£¬ÓµÓÐÒ»ÑùµÄÏȾöǰÌᣬ¿ÉÄܵ¼ÖÂDoS¹¥»÷¡£CitrixûÓÐÌṩ»º½â²½Ö裬ǿÁÒ½¨ÒéÓû§µÄ×°ÖøüС£


https://www.bleepingcomputer.com/news/security/new-critical-citrix-netscaler-flaw-exposes-sensitive-data/


3¡¢Î¢Èí³ÆStorm-0062×Ô¾ÅÔÂÖÐѮһÏòÀûÓÃConfluence·ì϶


΢ÈíÓÚ10ÔÂ11ÈÕÔÚXÉÏ·¢Ìû³Æ£¬×Ô9ÔÂ14ÈÕÒÔÀ´£¬ºÚ¿ÍÍÅ»ïStorm-0062£¨ÓÖ³ÆDarkShadow»òOro0lxy£©Ò»ÏòÔÚÀûÓÃAtlassian ConfluenceÊý¾ÝÖÐÐĺͷþÎñÆ÷Öеķì϶¡£ÕâÊÇÒ»¸öÌáȨ·ì϶£¨CVE-2023-22515£©£¬CVSSÆÀ·ÖΪ10£¬ÔÚ10ÔÂ4ÈÕ½¨¸´£¬¿É±»ÓÃÀ´ÔÚÀûÓ÷¨Ê½Öд´½¨ConfluenceÖÎÀíÔ¹ØÊ»§¡£´Ë±í£¬Î¢Èí»¹¹«¿ªÁËÓë¹¥»÷»î¶¯ÓйصÄ4¸öIPµØÖ·£¬²¢½¨ÒéÓû§¾¡¿ìÉý¼¶µ½¹Ì¶¨°æ±¾¡£


https://thehackernews.com/2023/10/microsoft-warns-of-nation-state-hackers.html


4¡¢SymantecÅû¶GraylingÕë¶ÔÔì×÷ºÍITµÈÁìÓòµÄ¹¥»÷


SymantecÔÚ10ÔÂ10ÈÕÅû¶ÁËÐÂAPTÍÅ»ïGraylingµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÓÚ2ÔÂ·ÝÆðÍ·£¬²¢ÖÁÉÙ³ÖÐøµ½5Ô·Ý£¬ÖØÒªÕë¶ÔÔì×÷¡¢ITºÍÉúÎïҽѧÁìÓòµÄʵÌå¡£GraylingʹÓÃÁËÒ»ÖÖÌØÊâµÄDLL²à¼ÓÔØ¼¼Êõ£¬Ê¹ÓÃ×Ô½ç˵½âÃÜÆ÷À´²¿Êðpayload£¬ËƺõÖ¼ÔÚÍøÂçµý±¨¡£¹¥»÷Õßͨ¹ýµ¼³öAPI SbieDll_Hook½øÐÐDLL²à¼ÓÔØ£¬Õ⽫¼ÓÔØCobalt Strike¡¢HavocºÍNetSpyµÈ¸÷À๤¾ß¡ £»¹´Óimfsb.iniÖÐÏÂÔØ²¢½âÃÜÁËÒ»¸öδ֪payload£¬²¢ÀûÓÃÁË·ì϶CVE-2019-0803¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/grayling-taiwan-cyber-attacks


5¡¢×êÑÐÈËÔ±·¢ÏÖ¼ÙÒ⻺´æ²å¼þ½Ù³ÖWPÍøÕ¾µÄ¶ñÒâÈí¼þ


ýÌå10ÔÂ11ÈÕ±¨Â·³Æ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖеĶñÒâÈí¼þ¼ÙÒâºÏ·¨µÄ»º´æ²å¼þÀ´¹¥»÷WordPressÍøÕ¾¡£ÕâÊÇÒ»¸ö¶àÖ°ÄܺóÃÅ£¬Äܹ»ÖÎÀí²å¼þ£¬²¢½«×Ô¼º°µ²ØÔÚÖ¸±êÍøÕ¾µÄ»î¶¯²å¼þÖÓ×¢´úÌæÄÚÈÝ»ò½«Óû§³Á¶¨Ïòµ½¶ñÒâµØÎ»£¬¿É±»ÓÃÀ´´´½¨ÖÎÀíÔ¹ØÊ»§²¢½ÚÔìÍøÕ¾µÄ»î¶¯¡£×êÑÐÈËÔ±ÔÚ7Ô·ÝËãÕÊÍøÕ¾Ê±·¢ÏÖÁ˸öñÒâÈí¼þ£¬ÉÐδÌṩÊÜÓ°ÏìÍøÕ¾µÄ¾ßÌåÐÅÏ¢£¬Ò²Î´È·¶¨³õʼ½Ó¼ûÔØÌå¡£


https://www.bleepingcomputer.com/news/security/new-wordpress-backdoor-creates-rogue-admin-to-hijack-websites/


6¡¢Fortinet°ä²¼¹ØÓÚ½©Ê¬ÍøÂçIZ1H9бäÌåµÄ·ÖÎö»ã±¨


10ÔÂ9ÈÕ£¬Fortinet°ä²¼»ùÓÚMiraiµÄDDoS½©Ê¬ÍøÂçIZ1H9бäÌåµÄ·ÖÎö»ã±¨¡£¸Ã¶ñÒâÈí¼þÔö³¤ÁË13¸öеÄpayload£¬ÒÔÕë¶ÔD-LinkÉ豸¡¢Netis·ÓÉÆ÷¡¢Sunhillo SureLineºÍGeutebruck IPÉãÏñ»úµÈÉ豸¡£Æ¾¾ÝIPSÊðÃû¼Í¼µÄ´¥·¢´ÎÊý·¢ÏÖ£¬ÀûÓÃÂÊÔÚ9ÔÂ6ÈÕ´ïµ½·åÖµ£¬´¥·¢´ÎÊý´ÓÊýǧµ½ÊýÍò²»µÈ¡£IZ1H9ÀûÓ÷ì϶ÈëÇÖÉ豸£¬²¢½«ËüÃDzÎÓë½©Ê¬ÍøÂ磬ÒÔÖ´ÐÐDDoS¹¥»÷¡£Ëü»¹Ô̺¬Ò»¸öÊý¾Ý²¿ÃÅ£¬ÆäÖÐÔ̺¬ÓÃÓÚ±©Á¦¹¥»÷µÄÓ²±àÂëÍ´´¦¡£


https://www.fortinet.com/blog/threat-research/Iz1h9-campaign-enhances-arsenal-with-scores-of-exploits