Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾Ö§¸¶ÏµÍ³±»ºÚ¿Í»§ÒøÐп¨ÐÅϢй¶
Ðû²¼Ê±¼ä 2023-10-121¡¢Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾Ö§¸¶ÏµÍ³±»ºÚ¿Í»§ÒøÐп¨ÐÅϢй¶
¾ÝýÌå10ÔÂ10ÈÕ±¨µÀ£¬Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾(Air Europa)µÄÖ§¸¶ÏµÍ³Ôâµ½¹¥»÷£¬¿Í»§µÄÐÅÓÿ¨ÐÅϢй¶¡£´Ë´Îʼþ鶵ÄÐÅÏ¢°üÂÞ¿¨ºÅ¡¢ÓÐЧÆÚÒÔ¼°ÒøÐп¨·´ÃæµÄ3λCVV´úÂë¡£¸Ã¹«Ë¾»¹ÌáÐÑÊÜÓ°ÏìµÄ¿Í»§£¬ÒªÇóÒøÐÐ×¢ÏúËûÃÇÔڸú½¿Õ¹«Ë¾ÍøÕ¾ÉÏʹÓõÄÒøÐп¨£¬ÒòΪ"´æÔÚÒøÐп¨ÆÛƺÍÆÛÕ©µÄ·çÏÕ"¡£º½¿Õ¹«Ë¾ÉÐδ͸¶ÊÜÓ°Ïì¿Í»§ÊýÁ¿¡¢¹¥»÷ʱ¼äÒÔ¼°Ê¼þ±»·¢ÏÖµÄʱ¼ä¡£Å·ÖÞº½¿ÕÔøÔÚ2021ÄêÒòй¶Լ489000ÈËÐÅÏ¢±»Î÷°àÑÀÊý¾Ý±£»¤¾Ö(DPA)·£¿î60ÍòÅ·Ôª¡£
https://therecord.media/air-europa-cyberattack-payment-cards
2¡¢CitrixÐÞ¸´NetScaler²úÎïÖЩ¶´CVE-2023-4966
¾Ý10ÔÂ10ÈÕ±¨µÀ£¬CitrixÐÞ¸´ÁËÆäNetScaler ADCºÍNetScaler GatewayÖÐÑÏÖصÄ©¶´£¨CVE-2023-4966£©¡£¸Ã©¶´CVSSÆÀ·ÖΪ9.4£¬ÎÞÐè¸ßȨÏÞ¡¢Óû§½»»¥»ò¸ßÅÓ´óÐÔ¼´¿ÉÔ¶³ÌÀûÓ㬿ÉÄܵ¼ÖÂÃô¸ÐÐÅϢй¶¡£²»Í⣬ǰÌáÌõ¼þÊÇÉ豸±ØÐëÅäÖÃΪÍø¹Ø£¨VPNÐéÄâ·þÎñÆ÷¡¢ICAÊðÀí¡¢CVPN¡¢RDPÊðÀí£©»òAAAÐéÄâ·þÎñÆ÷¡£´Ë´Î»¹ÐÞ¸´ÁËÒ»¸ö©¶´£¨CVE-2023-4967£©£¬¾ßÓÐÏàͬµÄÏȾöÌõ¼þ£¬¿ÉÄܵ¼ÖÂDoS¹¥»÷¡£CitrixûÓÐÌṩ»º½âÒªÁ죬ǿÁÒ½¨ÒéÓû§µÄ°²×°¸üС£
https://www.bleepingcomputer.com/news/security/new-critical-citrix-netscaler-flaw-exposes-sensitive-data/
3¡¢Î¢Èí³ÆStorm-0062×Ô¾ÅÔÂÖÐѮһֱÀûÓÃConfluence©¶´
΢ÈíÓÚ10ÔÂ11ÈÕÔÚXÉÏ·¢Ìû³Æ£¬×Ô9ÔÂ14ÈÕÒÔÀ´£¬ºÚ¿ÍÍÅ»ïStorm-0062£¨ÓÖ³ÆDarkShadow»òOro0lxy£©Ò»Ö±ÔÚÀûÓÃAtlassian ConfluenceÊý¾ÝÖÐÐĺͷþÎñÆ÷ÖеÄ©¶´¡£ÕâÊÇÒ»¸öÌáȨ©¶´£¨CVE-2023-22515£©£¬CVSSÆÀ·ÖΪ10£¬ÔÚ10ÔÂ4ÈÕÐÞ¸´£¬¿É±»ÓÃÀ´ÔÚÓ¦Ó÷¨Ê½Öд´½¨Confluence¹ÜÀíÔ±ÕÊ»§¡£´ËÍ⣬΢Èí»¹¹ûÈ»ÁËÓë¹¥»÷»î¶¯Ïà¹ØµÄ4¸öIPµØÖ·£¬²¢½¨ÒéÓû§¾¡¿ìÉý¼¶µ½Àι̰汾¡£
https://thehackernews.com/2023/10/microsoft-warns-of-nation-state-hackers.html
4¡¢SymantecÅû¶GraylingÕë¶ÔÖÆÔìºÍITµÈÁìÓòµÄ¹¥»÷
SymantecÔÚ10ÔÂ10ÈÕÅû¶ÁËÐÂAPTÍÅ»ïGraylingµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÓÚ2Ô·ݿªÊ¼£¬²¢ÖÁÉÙÁ¬Ðøµ½5Ô·ݣ¬Ö÷ÒªÕë¶ÔÖÆÔì¡¢ITºÍÉúÎïҽѧÁìÓòµÄʵÌå¡£GraylingʹÓÃÁËÒ»ÖÖÌØÊâµÄDLL²à¼ÓÔؼ¼Êõ£¬Ê¹ÓÃ×Ô½ç˵½âÃÜÆ÷À´²¿Êðpayload£¬ËƺõÖ¼ÔÚÊÕ¼¯Ç鱨¡£¹¥»÷Õßͨ¹ýµ¼³öAPI SbieDll_Hook½øÐÐDLL²à¼ÓÔØ£¬Õ⽫¼ÓÔØCobalt Strike¡¢HavocºÍNetSpyµÈÖÖÖÖ¹¤¾ß¡£»¹´Óimfsb.iniÖÐÏÂÔز¢½âÃÜÁËÒ»¸öδ֪payload£¬²¢ÀûÓÃÁË©¶´CVE-2019-0803¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/grayling-taiwan-cyber-attacks
5¡¢Ñо¿ÈËÔ±·¢ÏÖð³ä»º´æ²å¼þ½Ù³ÖWPÍøÕ¾µÄ¶ñÒâÈí¼þ
ýÌå10ÔÂ11ÈÕ±¨µÀ³Æ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖеĶñÒâÈí¼þð³äºÏ·¨µÄ»º´æ²å¼þÀ´¹¥»÷WordPressÍøÕ¾¡£ÕâÊÇÒ»¸ö¶à¹¦Ð§ºóÃÅ£¬¿ÉÒÔ¹ÜÀí²å¼þ£¬²¢½«×Ô¼ºÒþ²ØÔÚÄ¿±êÍøÕ¾µÄ»î¶¯²å¼þÖС¢Ìæ»»ÄÚÈÝ»ò½«Óû§Öض¨Ïòµ½¶ñÒâλÖ㬿ɱ»ÓÃÀ´´´½¨¹ÜÀíÔ±ÕÊ»§²¢¿ØÖÆÍøÕ¾µÄ»î¶¯¡£Ñо¿ÈËÔ±ÔÚ7Ô·ÝÇåÀíÍøվʱ·¢ÏÖÁ˸öñÒâÈí¼þ£¬ÉÐδÌṩÊÜÓ°ÏìÍøÕ¾µÄÏêϸÐÅÏ¢£¬Ò²Î´È·¶¨³õʼ·ÃÎÊÔØÌå¡£
https://www.bleepingcomputer.com/news/security/new-wordpress-backdoor-creates-rogue-admin-to-hijack-websites/
6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçIZ1H9бäÌåµÄ·ÖÎö³ÂËß
10ÔÂ9ÈÕ£¬FortinetÐû²¼»ùÓÚMiraiµÄDDoS½©Ê¬ÍøÂçIZ1H9бäÌåµÄ·ÖÎö³ÂËß¡£¸Ã¶ñÒâÈí¼þÌí¼ÓÁË13¸öеÄpayload£¬ÒÔÕë¶ÔD-LinkÉ豸¡¢Netis·ÓÉÆ÷¡¢Sunhillo SureLineºÍGeutebruck IPÉãÏñ»úµÈÉ豸¡£Æ¾¾ÝIPSÇ©Ãû¼Ç¼µÄ´¥·¢´ÎÊý·¢ÏÖ£¬ÀûÓÃÂÊÔÚ9ÔÂ6ÈÕµ½´ï·åÖµ£¬´¥·¢´ÎÊý´ÓÊýǧµ½ÊýÍò²»µÈ¡£IZ1H9ÀûÓ鶴ÈëÇÖÉ豸£¬²¢½«ËüÃǼÓÈ뽩ʬÍøÂ磬ÒÔÖ´ÐÐDDoS¹¥»÷¡£Ëü»¹°üÂÞÒ»¸öÊý¾Ý²¿ÃÅ£¬ÆäÖаüÂÞÓÃÓÚ±©Á¦¹¥»÷µÄÓ²±àÂëƾ¾Ý¡£
https://www.fortinet.com/blog/threat-research/Iz1h9-campaign-enhances-arsenal-with-scores-of-exploits