Cisco͸¶ÆäIOS XEÈí¼þÖÐÉí·ÝÑéÖ¤ÈƹýÎó²îÒѱ»Ê¹ÓÃ
Ðû²¼Ê±¼ä 2023-10-171¡¢Cisco͸¶ÆäIOS XEÈí¼þÖÐÉí·ÝÑéÖ¤ÈƹýÎó²îÒѱ»Ê¹ÓÃ
ýÌå10ÔÂ16ÈÕ±¨µÀ£¬Cisco͸¶ÆäIOS XEÈí¼þÖеÄÉí·ÝÑéÖ¤ÈƹýÎó²î£¨CVE-2023-20198£©Òѱ»×Ô¶¯Ê¹Óá£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î»ñµÃÖÎÀíԱȨÏÞ£¬²¢Ô¶³Ì¿ØÖÆÊÜÓ°ÏìµÄ·ÓÉÆ÷ºÍ½»Á÷»ú¡£¸ÃÎó²î½öÓ°ÏìÆôÓÃÁËWebÓû§½çÃæ(Web UI)¹¦Ð§ÇÒͬʱÆôÓÃÁËHTTP»òHTTPS·þÎñÆ÷¹¦Ð§µÄ×°±¸£¬ÏÖÔÚÈÔÔÚÆÚ´ý²¹¶¡¡£CiscoÓÚ9ÔÂ28ÈÕ·¢Ã÷ÁËÕâЩ¹¥»÷£¬½øÒ»³ÌÐò²é·¢Ã÷¹¥»÷¿É×·Ëݵ½9ÔÂ18ÈÕ£¬²¢ÓÚ10ÔÂ12ÈÕ·¢Ã÷ÁËÓë¸ÃÎó²îʹÓÃÏà¹ØµÄÆäËüÔ˶¯¡£¸Ã¹«Ë¾½¨ÒéÖÎÀíÔ±½ûÓÃÃæÏò»¥ÁªÍøµÄϵͳÉϵÄHTTP·þÎñÆ÷¹¦Ð§£¬ÒÔµÖÓù´ËÀ๥»÷¡£
https://www.bleepingcomputer.com/news/security/cisco-warns-of-new-ios-xe-zero-day-actively-exploited-in-attacks/
2¡¢ALPHV³ÆÒÑÇÔÈ¡Morrison CommunityÒ½Ôº5TBµÄÊý¾Ý
¾Ý10ÔÂ15ÈÕ±¨µÀ£¬ALPHVÉù³ÆÈëÇÖÁËMorrison CommunityÒ½Ôº£¬²¢½«ÆäÌí¼Óµ½TorÍøÕ¾ÖС£¸ÃÍÅ»ïÌåÏÖÒѾÇÔÈ¡ÁË5TBµÄÊý¾Ý£¬°üÀ¨»¼ÕߺÍÔ±¹¤ÐÅÏ¢¡¢±¸·ÝÒÔ¼°PIIÎļþµÈ£¬»¹Ðû²¼ÁËÒ»¸öÑù±¾×÷Ϊ֤¾Ý¡£ÓÉÓÚÒ½ÔºÉÐδ×ö³öÃ÷È·»ØÓ¦£¬¸ÃÍÅ»ïÒÑ×îÏÈÁªÏµ¼ÇÕߣ¬»¹ÍþвºÜ¿ì¾Í»á¸ø²¡ÈË´òµç»°¡£Ñо¿Ö°Ô±³Æ£¬½ñÄêµ½ÏÖÔÚΪֹ£¬ÃÀ¹úÒÑÓÐ29¸öÒ½ÁÆϵͳ£¨°üÀ¨90¼ÒÒ½Ôº£©Ôâµ½ÀÕË÷¹¥»÷¡£
https://securityaffairs.com/152486/cyber-crime/alphv-ransomware-morrison-community-hospital.html
3¡¢·ÆÂɱöͳ¼Æ¾ÖPSAÊÓ²ìй¶²¿·ÖСÎÒ˽¼ÒÐÅÏ¢µÄ¹¥»÷ÊÂÎñ
10ÔÂ11ÈÕ±¨µÀ£¬·ÆÂɱöÐÅÏ¢ºÍͨѶÊÖÒÕ²¿(DICT)֤ʵ£¬ÏÖÔÚÕýÔÚÊÓ²ìÒ»ÆðÕë¶Ô·ÆÂɱöͳ¼Æ¾Ö(PSA)µÄÍøÂç¹¥»÷¡£³õ³ÌÐò²é·¢Ã÷£¬PSAÉçÇø¼à¿Øϵͳ(CBMS)Òѱ»ÈëÇÖ£¬¸Ã»ú¹¹ÕýÔÚÆÀ¹ÀCBMSµÄÄÄЩСÎÒ˽¼ÒÊý¾Ý¿ÉÄÜÒѱ»Ð¹Â¶¡£±ðµÄ£¬PSAÏò¹«ÖÚ°ü¹Ü£¬·ÆÂɱöÉí·Ýϵͳ(PhilSys)ºÍÃñʹҺÅϵͳ(CRS)²¢Î´Êܵ½´Ë´Î鶵ÄÓ°Ïì¡£ÏÖÔÚ£¬¸Ã»ú¹¹ÒÑʵÑéÌØÁíÍâÔ¤·À²½·¥£¬ÒÔÈ·±£ÆäËùÓÐϵͳºÍÊý¾Ý¿âµÄÇå¾²¡£
https://www.bworldonline.com/the-nation/2023/10/11/551140/psa-cyberattack-being-probed/
4¡¢PhylumÔÚNuGetÉϼì²âµ½·Ö·¢SeroXen RATµÄÈí¼þ°ü
PhylumÓÚ10ÔÂ12Èճƣ¬ÆäÔÚNuGetÉϼì²âµ½·Ö·¢SeroXen RATµÄÈí¼þ°ü¡£¸ÃÈí¼þ°üÓÉÃûΪ¡°Disti¡±µÄÓû§ÉÏ´«£¬Æä´æ´¢¿âÖеÄ6¸öÈí¼þ°ü¶¼°üÀ¨ÏàͬµÄXMLÎļþ£¬¿ÉÏÂÔØx.bin£¬ÕâÊÇÒ»¸ö»ìÏýµÄWindowsÅú´¦Öóͷ£Îļþ£¬ÓÃÓÚÔÚ±»ÈëÇÖϵͳÉÏÖ´ÐжñÒâÔ˶¯¡£ÕâЩ°üð³ä¼ÓÃÜÇ®°ü¡¢¼ÓÃÜÇ®±ÒÉúÒâËùºÍDiscord¿â£¬×îÖÕ»á×°ÖÃSeroXen RAT¡£SeroXenÊÇÒ»¿îÏֳɵĶñÒâÈí¼þ£¬ÖÕÉíÊÛ¼ÛΪ60ÃÀÔª£¬ÍŽáÁËQuasar RAT¡¢r77 rootkitºÍWindowsÏÂÁîÐй¤¾ßNirCmdµÄ¹¦Ð§¡£
https://blog.phylum.io/phylum-discovers-seroxen-rat-in-typosquatted-nuget-package/
5¡¢Trend MicroÅû¶DarkGate¶ñÒâÈí¼þ·Ö·¢Ô˶¯ÏêÇé
10ÔÂ12ÈÕ£¬Trend MicroÏêϸÏÈÈÝÁËʹÓÃSkypeºÍTeams·Ö·¢¶ñÒâÈí¼þDarkGateµÄÔ˶¯¡£Ñо¿Ö°Ô±·¢Ã÷£¬7ÔÂÖÁ9Ô£¬DarkGateʹÓñ»ÈëÇÖµÄSkypeÕÊ»§£¬Í¨¹ý°üÀ¨VBA¼ÓÔسÌÐò¾ç±¾¸½¼þµÄÐÂÎÅÀ´Ñ¬È¾Ä¿µÄ¡£¸Ã¾ç±¾ÏÂÔØÁ˵ڶþ½×¶ÎAutoIT¾ç±¾£¬Ö¼ÔÚÏÂÔز¢Ö´ÐÐ×îÖÕµÄpayload¡£±ðµÄ£¬¹¥»÷Õß»¹ÊÔͼͨ¹ýMicrosoft Teams£¬ÔÚ½«·þÎñÉèÖÃΪ½ÓÊÜÀ´×ÔÍⲿÓû§µÄÐÂÎŵÄ×éÖ¯ÖÐÍÆËͶñÒâÈí¼þpayload¡£
https://www.trendmicro.com/en_ph/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html
6¡¢AhnlabÐû²¼Lazarus¶ñÒâÈí¼þVolgmerºÍScoutÆÊÎö±¨¸æ
10ÔÂ13ÈÕ£¬AhnlabÐû²¼Á˺ڿÍÍÅ»ïLazarusµÄ¶ñÒâÈí¼þVolgmerºÍScoutµÄÆÊÎö±¨¸æ¡£Lazarus¿É×·Ëݵ½2009Ä꣬ÔçÆÚÖ÷ÒªÕë¶Ôº«¹ú£¬×Ô2016Äê×îÏȹ¥»÷È«Çò¹ú·À¡¢ÊÖÒպͽðÈÚÐÐÒµ¡£ºóÃÅVolgmer×Ô2014Äê×îÏȱ»Ê¹Óã¬Í¨³£Í¨¹ý×¢²áΪ·þÎñÀ´ÔËÐУ¬×°ÖÃʱαװ³ÉÕýµ±Îļþ¡£×Ô2014ÄêÒÔÀ´£¬VolgmerÂÄÀúÁ˶à´Îת±ä£¬Ö±µ½2021Äê×óÓÒÒ»Ö±±»ÓÃÓÚ¹¥»÷¡£×Ô2022ÄêÒÔÀ´£¬ÏÂÔسÌÐòScoutÈ¡´úVolgmer±»ÓÃÓÚ¹¥»÷¡£ËüµÄÔËÐлúÖÆÓëÇ°ÕßÀàËÆ£¬Ö»ÊÇÏÖʵ¹¦Ð§ÓÐËù²î±ð£¬ËüÏÂÔصÄpayload±»ÒÔΪÊÇ¿ØÖƱ»Ñ¬È¾ÏµÍ³µÄºóÃÅ¡£
https://asec.ahnlab.com/en/57685/