Oktaй©ÆäÖ§³ÖÖÎÀíϵͳÔâµ½ÈëÇÖ²¿ÃÅÐÅϢй¶
°ä²¼¹¦·ò 2023-10-231¡¢Oktaй©ÆäÖ§³ÖÖÎÀíϵͳÔâµ½ÈëÇÖ²¿ÃÅÐÅϢй¶
¾ÝýÌå10ÔÂ20ÈÕ±¨Â·£¬¹¥»÷ÕßÀûÓÃÇÔÈ¡µÄÍ´´¦ÈëÇÖÁËOktaµÄÖ§³ÖÖÎÀíϵͳ£¬µ¼ÖÂcookieºÍ»á»°ÁîÅÆµÈÊý¾Ýй¶¡£¸Ã¹«Ë¾ÉÐδÌṩÄÄЩ¿Í»§ÐÅÏ¢Êܵ½Ó°ÏìµÄÏêÇ飬µ«¹¥»÷Õß¿ÉÄܽӼûÁËÓÃÓÚ¸´Ôìä¯ÀÀÆ÷»î¶¯À´ÅųýÎÊÌâµÄHTTP´æµµ(HAR)Îļþ£¬ÒÔ¼°Okta¿Í»§ÉÏ´«µÄ²¿ÃÅÎļþ¡£BeyondTrust°µÊ¾ËüÊÇÊÜÓ°ÏìµÄ¿Í»§Ö®Ò»£¬ÓÚ10ÔÂ2ÈÕ·¢ÏÖ²¢×èÖ¹ÁËʹÓôÓOktaϵͳÇÔÈ¡µÄcookieµÇ¼ÄÚ²¿OktaÖÎÀíÔ¹ØÊ»§µÄ³¢ÊÔ¡£CloudflareÓÚ10ÔÂ18ÈÕÔÚÆä·þÎñÆ÷ÉÏ·¢ÏÖÁËÓëOkta·ì϶ÓйصĶñÒâ»î¶¯¡£
https://securityaffairs.com/152803/data-breach/okta-support-system-breached.html
2¡¢·¨ÂÉ»ú¹¹µ·»ÙRagnar Locker»ù´¡ÉèÊ©²¢¿ÛÁôÆä¿ª·¢Õß
¾Ý10ÔÂ21ÈÕ±¨Â·£¬·¨ÂÉ»ú¹¹ÔÚÒ»´Î½áºÏÐж¯Öе·»ÙÁËÀÕË÷Èí¼þRagnar LockerµÄ»ù´¡ÉèÊ©£¬²¢¿ÛÁôÁËÓйصĿª·¢ÈËÔ±¡£×Ô2020ÄêÒÔÀ´£¬Ragnar LockerÒѹ¥»÷ÁËÈ«Çò168¼Ò¹«Ë¾¡£Å·ÖÞÐ̾¯×éÖ¯°µÊ¾£¬¸ÃÍÅ»ïµÄ¡°ÖØÒªÖ¸±ê¡±ÓÚ10ÔÂ16ÈÕÔÚ·¨¹ú°ÍÀè±»²¶£¬ËûÔڽݿ˵ļÒÒ²±»ËÑ²é¡£Ëæºó¼¸Ì죬·¨ÂÉ»ú¹¹ÔÚÎ÷°àÑÀºÍÀÍÑάÑÇÉóÅÐÁË5ÃûÏÓÒÉÈË¡£ÕâÊÇÕë¶Ô¸ÃÍÅ»ïµÄµÚÈý´ÎÐж¯£¬ÔÚÕâ´Îе÷Ðж¯ÖУ¬¿ÛѺÁ˼ÓÃÜ×ʲú£¬µ·»ÙÁËRagnar LockerµÄTorÍøÕ¾£¬»¹¹Ø¹ØÁË9̨·þÎñÆ÷¡£
https://thehackernews.com/2023/10/europol-dismantles-ragnar-locker.html
3¡¢CiscoÅû¶Òѱ»ÀûÓõÄÐÂIOS XE·ì϶CVE-2023-20273
10ÔÂ20ÈÕ±¨Â·³Æ£¬CiscoÅû¶ÁËÒ»¸öзì϶£¨CVE-2023-20273£©£¬¿ÉÓÃÓÚ²¿Êð¶ñÒâÖ²È뷨ʽ¡£¹¥»÷Õß×Ô9ÔÂ18ÈÕÆð¾ÍÀûÓÃÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2023-20198£©ÈëÇÖIOS XEÉ豸¡£Ëæºó£¬ËûÃÇ»áÀûÓÃÌáȨ·ì϶£¨CVE-2023-20273£©À´»ñµÃroot½Ó¼ûȨÏÞ²¢ÆëÈ«½ÚÔìCisco IOS XEÉ豸£¬ÒÔ×°ÖöñÒâÖ²È뷨ʽ¡£¾Ý¹À¼Æ£¬Óг¬¹ý40000̨IOS XEÉ豸ÒÑÔâµ½ÀûÓÃÕâÁ½¸ö·ì϶µÄ¹¥»÷¡£Cisco´òËãÓÚ10ÔÂ22ÈÕ°ä²¼ÕâÁ½¸ö·ì϶µÄ½¨¸´·¨Ê½¡£
https://www.bleepingcomputer.com/news/security/cisco-discloses-new-ios-xe-zero-day-exploited-to-deploy-malware-implant/
4¡¢ÃÀ¹ú±£ÏÕ¹«Ë¾AmFamÔâµ½¹¥»÷µ¼Ö·þÎñÖжϳ¤´ïÒ»ÖÜ
ýÌå10ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹ú¶ÈÍ¥±£ÏÕ¹«Ë¾(American Family Insurance)Ôâµ½¹¥»÷£¬²¿ÃÅITϵͳ¹Ø¹Ø¡£AmFamÕ¼ÓÐ13000ÃûÔ±¹¤£¬2022ÄêÊÕÈëΪ144ÒÚÃÀÔª¡£×ÔÉÏÖÜÄ©ÒÔÀ´£¬¸Ã¹«Ë¾µÄϵͳ²úÉúÖжϣ¬Ó°ÏìÁ˵绰·þÎñ¡¢Â¥ÓîÏνӺÍÔÚÏß·þÎñµÈ¡£¾ÝϤ£¬Ôâµ½¹¥»÷ºó£¬AmFamÖжÏÁË»¥ÁªÍøÏνӣ¬ÕâÒ²Ó°ÏìÁËͳһ¶°´óÂ¥µÄÆäËû×â»§¡£¿Í»§»ã±¨³ÆÎÞ·¨ÔÚÏßÖ§¸¶Õ˵¥»òÌá³öË÷Å⣬ֻÄÜÊÕµ½ÌáÐÑÐÅÏ¢³ÆÔÚÏßÍøÕ¾ÒṈ̃»¾£¬Çë¸ÄÓõ绰ÁªÏµ¡£Ä¿Ç°Éв»Çå¹¥»÷ÀàÐÍ£¬µ«ÕâЩ¼£ÏóÓëÀÕË÷¹¥»÷ÀàËÆ¡£
https://www.bleepingcomputer.com/news/security/american-family-insurance-confirms-cyberattack-is-behind-it-outages/
5¡¢Î¢ÈíÅû¶¶à¸öºÚ¿ÍÍÅ»ïÀûÓÃTeamCity·ì϶µÄ¹¥»÷»î¶¯
10ÔÂ18ÈÕ£¬Î¢ÈíÅû¶ÁËLazarusºÍAndarielÍÅ»ïÀûÓÃTeamCity·þÎñÆ÷Öзì϶£¨CVE-2023-42793£©µÄ¹¥»÷»î¶¯¡£¸Ã·ì϶¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÀ´Ô¶³ÌÖ´ÐдúÂ룬ÒÑÓÚ9Ô·ݽ¨¸´¡£LazarusÔÚÒ»¸ö¹¥»÷Á´ÖÐ×°ÖÃÁËForestTiger£¬ÔÚÁíÒ»¸ö¹¥»÷Á´ÖÐͨ¹ýDLLËÑË÷°¤´Î½Ù³Ö¹¥»÷À´Æô¶¯¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½FeedLoad£¬¶øºó×°ÖÃÔ¶³Ì½Ó¼ûľÂí¡£Andariel»áÔÚÖ¸±êϵͳÖд´½¨ÖÎÀíÔ¹ØË»§¡°krtbgt¡±£¬ÔËÐкÅÁîÍøÂçϵͳÐÅÏ¢£¬×îºóÏÂÔØÒ»¸ö×°ÖôúÀí¹¤¾ßHazyLoadµÄpayload¡£
https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/
6¡¢Symantec°ä²¼¹ØÓÚAPT34¹¥»÷Öж«µØÓò»ú¹¹µÄ·ÖÎö»ã±¨
10ÔÂ19ÈÕ£¬Symantec°ä²¼Á˹ØÓÚAPT34¹¥»÷Öж«µØÓò»ú¹¹µÄ·ÖÎö»ã±¨¡£APT34£¨±ðÃûOilRig£©ÔÚ½ñÄê2ÔÂÖÁ9Ô¶ÔÖж«µÄ»ú¹¹½øÐÐÁ˳¤´ï8¸öÔµĹ¥»÷¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬¸ÃÍÅ»ïÇÔÈ¡ÁËÎļþºÍÃÜÂ룬²¢ÔÚÒ»¸ö°¸ÀýÖÐ×°ÖÃÁËPowerShellºóÃÅ£¨ÃûΪPowerExchange£©£¬¸ÃºóÃÅ¼à¿Ø´ÓExchange·¢Ë͵ÄÓʼþ£¬À´Ö´ÐÐÒÔÓʼþ´ó¾Ö·¢Ë͵ĺÅÁĿǰ£¬ÖÁÉÙÓÐ12Ì¨ÍÆËã»úÔâµ½¹¥»÷£¬ÓÐÖ¤¾ÝÅú×¢¹¥»÷ÕßÔÚÁí±íÊýÊ®Ì¨ÍÆËã»úÉÏ×°ÖÃÁ˺óÃźͼüÅ̼ͼ·¨Ê½¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/crambus-middle-east-government


¾©¹«Íø°²±¸11010802024551ºÅ