Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾Ö§¸¶ÏµÍ³±»ºÚ¿Í»§ÒøÐп¨ÐÅϢй¶
Ðû²¼Ê±¼ä 2023-10-121¡¢Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾Ö§¸¶ÏµÍ³±»ºÚ¿Í»§ÒøÐп¨ÐÅϢй¶
¾ÝýÌå10ÔÂ10ÈÕ±¨µÀ£¬Î÷°àÑÀÅ·ÖÞº½¿Õ¹«Ë¾(Air Europa)µÄÖ§¸¶ÏµÍ³Ôâµ½¹¥»÷£¬¿Í»§µÄÐÅÓÿ¨ÐÅϢй¶¡£´Ë´ÎÊÂÎñ鶵ÄÐÅÏ¢°üÀ¨¿¨ºÅ¡¢ÓÐÓÃÆÚÒÔ¼°ÒøÐп¨±³ÃæµÄ3λCVV´úÂë¡£¸Ã¹«Ë¾»¹ÌáÐÑÊÜÓ°ÏìµÄ¿Í»§£¬ÒªÇóÒøÐÐ×¢ÏúËûÃÇÔڸú½¿Õ¹«Ë¾ÍøÕ¾ÉÏʹÓõÄÒøÐп¨£¬ÓÉÓÚ"±£´æÒøÐп¨ÓÕƺÍڲƵÄΣº¦"¡£º½¿Õ¹«Ë¾ÉÐδ͸¶ÊÜÓ°Ïì¿Í»§ÊýÄ¿¡¢¹¥»÷ʱ¼äÒÔ¼°ÊÂÎñ±»·¢Ã÷µÄʱ¼ä¡£Å·ÖÞº½¿ÕÔøÔÚ2021ÄêÒòй¶Լ489000ÈËÐÅÏ¢±»Î÷°àÑÀÊý¾Ý±£»¤¾Ö(DPA)·£¿î60ÍòÅ·Ôª¡£
https://therecord.media/air-europa-cyberattack-payment-cards
2¡¢CitrixÐÞ¸´NetScaler²úÆ·ÖÐÎó²îCVE-2023-4966
¾Ý10ÔÂ10ÈÕ±¨µÀ£¬CitrixÐÞ¸´ÁËÆäNetScaler ADCºÍNetScaler GatewayÖÐÑÏÖصÄÎó²î£¨CVE-2023-4966£©¡£¸ÃÎó²îCVSSÆÀ·ÖΪ9.4£¬ÎÞÐè¸ßȨÏÞ¡¢Óû§½»»¥»ò¸ßÖØ´óÐÔ¼´¿ÉÔ¶³ÌʹÓ㬿ÉÄܵ¼ÖÂÃô¸ÐÐÅϢй¶¡£²»¹ý£¬Ìõ¼þÌõ¼þÊÇ×°±¸±ØÐèÉèÖÃΪÍø¹Ø£¨VPNÐéÄâ·þÎñÆ÷¡¢ICAÊðÀí¡¢CVPN¡¢RDPÊðÀí£©»òAAAÐéÄâ·þÎñÆ÷¡£´Ë´Î»¹ÐÞ¸´ÁËÒ»¸öÎó²î£¨CVE-2023-4967£©£¬¾ßÓÐÏàͬµÄÏȾöÌõ¼þ£¬¿ÉÄܵ¼ÖÂDoS¹¥»÷¡£CitrixûÓÐÌṩ»º½âÒªÁ죬ǿÁÒ½¨ÒéÓû§µÄ×°ÖøüС£
https://www.bleepingcomputer.com/news/security/new-critical-citrix-netscaler-flaw-exposes-sensitive-data/
3¡¢Î¢Èí³ÆStorm-0062×Ô¾ÅÔÂÖÐѮһֱʹÓÃConfluenceÎó²î
΢ÈíÓÚ10ÔÂ11ÈÕÔÚXÉÏ·¢Ìû³Æ£¬×Ô9ÔÂ14ÈÕÒÔÀ´£¬ºÚ¿ÍÍÅ»ïStorm-0062£¨ÓÖ³ÆDarkShadow»òOro0lxy£©Ò»Ö±ÔÚʹÓÃAtlassian ConfluenceÊý¾ÝÖÐÐĺͷþÎñÆ÷ÖеÄÎó²î¡£ÕâÊÇÒ»¸öÌáȨÎó²î£¨CVE-2023-22515£©£¬CVSSÆÀ·ÖΪ10£¬ÔÚ10ÔÂ4ÈÕÐÞ¸´£¬¿É±»ÓÃÀ´ÔÚÓ¦ÓóÌÐòÖн¨ÉèConfluenceÖÎÀíÔ±ÕÊ»§¡£±ðµÄ£¬Î¢Èí»¹¹ûÕæÁËÓë¹¥»÷Ô˶¯Ïà¹ØµÄ4¸öIPµØµã£¬²¢½¨ÒéÓû§¾¡¿ìÉý¼¶µ½Àο¿°æ±¾¡£
https://thehackernews.com/2023/10/microsoft-warns-of-nation-state-hackers.html
4¡¢SymantecÅû¶GraylingÕë¶ÔÖÆÔìºÍITµÈÁìÓòµÄ¹¥»÷
SymantecÔÚ10ÔÂ10ÈÕÅû¶ÁËÐÂAPTÍÅ»ïGraylingµÄ¹¥»÷Ô˶¯¡£¸ÃÔ˶¯ÓÚ2Ô·Ý×îÏÈ£¬²¢ÖÁÉÙÒ»Á¬µ½5Ô·ݣ¬Ö÷ÒªÕë¶ÔÖÆÔì¡¢ITºÍÉúÎïҽѧÁìÓòµÄʵÌå¡£GraylingʹÓÃÁËÒ»ÖÖÌØÊâµÄDLL²à¼ÓÔØÊÖÒÕ£¬Ê¹ÓÃ×Ô½ç˵½âÃÜÆ÷À´°²ÅÅpayload£¬ËƺõÖ¼ÔÚÍøÂçÇ鱨¡£¹¥»÷Õßͨ¹ýµ¼³öAPI SbieDll_Hook¾ÙÐÐDLL²à¼ÓÔØ£¬Õ⽫¼ÓÔØCobalt Strike¡¢HavocºÍNetSpyµÈÖÖÖÖ¹¤¾ß¡£»¹´Óimfsb.iniÖÐÏÂÔز¢½âÃÜÁËÒ»¸öδ֪payload£¬²¢Ê¹ÓÃÁËÎó²îCVE-2019-0803¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/grayling-taiwan-cyber-attacks
5¡¢Ñо¿Ö°Ô±·¢Ã÷ð³ä»º´æ²å¼þЮÖÆWPÍøÕ¾µÄ¶ñÒâÈí¼þ
ýÌå10ÔÂ11ÈÕ±¨µÀ³Æ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеĶñÒâÈí¼þð³äÕýµ±µÄ»º´æ²å¼þÀ´¹¥»÷WordPressÍøÕ¾¡£ÕâÊÇÒ»¸ö¶à¹¦Ð§ºóÃÅ£¬¿ÉÒÔÖÎÀí²å¼þ£¬²¢½«×Ô¼ºÒþ²ØÔÚÄ¿µÄÍøÕ¾µÄÔ˶¯²å¼þÖС¢Ìæ»»ÄÚÈÝ»ò½«Óû§Öض¨Ïòµ½¶ñÒâλÖ㬿ɱ»ÓÃÀ´½¨ÉèÖÎÀíÔ±ÕÊ»§²¢¿ØÖÆÍøÕ¾µÄÔ˶¯¡£Ñо¿Ö°Ô±ÔÚ7Ô·ÝÕûÀíÍøվʱ·¢Ã÷Á˸öñÒâÈí¼þ£¬ÉÐδÌṩÊÜÓ°ÏìÍøÕ¾µÄÏêϸÐÅÏ¢£¬Ò²Î´È·¶¨³õʼ»á¼ûÔØÌå¡£
https://www.bleepingcomputer.com/news/security/new-wordpress-backdoor-creates-rogue-admin-to-hijack-websites/
6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçIZ1H9бäÌåµÄÆÊÎö±¨¸æ
10ÔÂ9ÈÕ£¬FortinetÐû²¼»ùÓÚMiraiµÄDDoS½©Ê¬ÍøÂçIZ1H9бäÌåµÄÆÊÎö±¨¸æ¡£¸Ã¶ñÒâÈí¼þÌí¼ÓÁË13¸öеÄpayload£¬ÒÔÕë¶ÔD-Link×°±¸¡¢Netis·ÓÉÆ÷¡¢Sunhillo SureLineºÍGeutebruck IPÉãÏñ»úµÈ×°±¸¡£Æ¾Ö¤IPSÊðÃû¼Í¼µÄ´¥·¢´ÎÊý·¢Ã÷£¬Ê¹ÓÃÂÊÔÚ9ÔÂ6ÈÕµÖ´ï·åÖµ£¬´¥·¢´ÎÊý´ÓÊýǧµ½ÊýÍò²»µÈ¡£IZ1H9ʹÓÃÎó²îÈëÇÖ×°±¸£¬²¢½«ËüÃǼÓÈ뽩ʬÍøÂ磬ÒÔÖ´ÐÐDDoS¹¥»÷¡£Ëü»¹°üÀ¨Ò»¸öÊý¾Ý²¿·Ö£¬ÆäÖаüÀ¨ÓÃÓÚ±©Á¦¹¥»÷µÄÓ²±àÂëƾ֤¡£
https://www.fortinet.com/blog/threat-research/Iz1h9-campaign-enhances-arsenal-with-scores-of-exploits