FlagstarÒøÐеũӦÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2023-10-10

1¡¢FlagstarÒøÐеũӦÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶


¾ÝýÌå10ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬£¬FlagstarÒøÐеĵÚÈý·½Ð§ÀÍÌṩÉÌFiservÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬ £¬£¬µ¼Ö´ó×Ú¿Í»§µÄÐÅϢй¶¡£¡£ ¡£¡£¡£FlagstarÏÖÔÚ¹éŦԼÉçÇøÒøÐÐËùÓУ¬£¬£¬£¬£¬£¬ £¬£¬ÔÚÈ¥Äê±»ÊÕ¹ºÖ®Ç°ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬£¬£¬£¬£¬£¬ £¬£¬×Ü×ʲúÁè¼Ý310ÒÚÃÀÔª¡£¡£ ¡£¡£¡£FiservÊǸÃÒøÐÐÓÃÓÚÖ§¸¶´¦Öóͷ£ºÍÒÆ¶¯ÒøÐÐЧÀ͵ũӦÉÌ£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÔâµ½ÁËCLOPµÄ¹¥»÷¡£¡£ ¡£¡£¡£ºÚ¿ÍʹÓÃMOVEit TransferÖеÄÎó²î»á¼ûÁËFiservϵͳ£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÇÔÈ¡ÁËFlagstarµÄÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬¹²Ó°Ïì837390Ãû¿Í»§¡£¡£ ¡£¡£¡£ÕâÊÇFlagstar×Ô2021Äê3ÔÂÒÔÀ´±¬·¢µÄµÄµÚÈýÆðÊý¾Ýй¶ÊÂÎñ¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/third-flagstar-bank-data-breach-since-2021-affects-800-000-customers/


2¡¢Ó¢¹úµç×Ó¹«Ë¾VolexµÄϵͳºÍÊý¾ÝÔ⵽δ¾­ÊÚȨ»á¼û


10ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ £¬£¬Ó¢¹úµç×ÓµçÆø¹«Ë¾ºÀÀûÊ¿£¨Volex£©Ôâµ½ÍøÂç¹¥»÷¡£¡£ ¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬ £¬£¬¸ÃÊÂÎñÊÇÓÉÓÚ¹«Ë¾Î»ÓÚÈ«ÇòµÄ¶à¸öITϵͳºÍÊý¾ÝÔ⵽δ¾­ÊÚȨ»á¼ûµ¼ÖµÄ¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬ £¬£¬ËûÃÇÒѽÓÄÉÏìÓ¦²½·¥½«Ó°Ïì½µÖÁ×îµÍ£¬£¬£¬£¬£¬£¬ £¬£¬µ«Ñо¿Ö°Ô±ÔÚUTC 13:25:26»á¼ûVolexÍøÕ¾Ê±ÏÔʾÒÑÀëÏß¡£¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ £¬£¬¸ÃÍøÕ¾Òѻָ´»á¼û¡£¡£ ¡£¡£¡£VolexÉù³Æ¹¥»÷ÕßÎÞ·¨»á¼û²ÆÎñÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬¸ÃÊÂÎñûÓÐÔì³ÉÖØ´ó²ÆÎñÓ°Ï죬£¬£¬£¬£¬£¬ £¬£¬µ«¸Ã¹«Ë¾µÄ¹É¼ÛÔÚ±¾ÖÜÒ»ÉÏÎçÈÔϵøÁË4%×óÓÒ¡£¡£ ¡£¡£¡£ 


https://www.hackread.com/uk-power-data-manufacturer-volex-cyberattack/


3¡¢Storm-0324ͨ¹ýTeams»ñµÃ»á¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þ


TrellixÔÚ10ÔÂ5ÈÕ¹ûÕæÁËStorm-0324ͨ¹ýTeams»ñµÃ»á¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯¡£¡£ ¡£¡£¡£7ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬ £¬£¬¸ÃÍŻﱻ·¢Ã÷×îÏÈͨ¹ýMicrosoft Teams·¢ËÍ´¹ÂÚÐÂÎÅ¡£¡£ ¡£¡£¡£ÔÚ»ñµÃ³õʼ»á¼ûȨÏ޺󣬣¬£¬£¬£¬£¬ £¬£¬Storm-0324¾­³£½«»á¼ûȨÏÞÒÆ½»¸øºÚ¿ÍÍÅ»ïSangria Tempest£¨ÓÖ³ÆFIN7£©ºÍTA543£¬£¬£¬£¬£¬£¬ £¬£¬ºóÕßͨ³£»£»£»£»£»£»£»£»áÖ´ÐÐÀÕË÷¹¥»÷¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ £¬£¬Storm-0324ÏÖÕýÔÚÈö²¥JSSLoader£¬£¬£¬£¬£¬£¬ £¬£¬È»ºóÔÙ½«ÔðÈÎת¼Þ¸øÆäËüÀÕË÷ÍŻ¡£ ¡£¡£¡£


https://www.trellix.com/en-us/about/newsroom/stories/research/storm-0324-an-access-for-the-raas-threat-actor.html


4¡¢X-ForceÅû¶ʹÓÃNetScaler GatewayµÄÆ¾Ö¤ÍøÂç»î¶¯


10ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬X-ForceÅû¶ÁËÒ»Æð´ó¹æÄ£»£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓÃCitrix NetScaler GatewayÖÐÎó²î£¨CVE-2023-3519£©ÇÔÈ¡Óû§Æ¾Ö¤¡£¡£ ¡£¡£¡£X-ForceÔÚÊÓ²ì¿Í»§µÄNetScaler×°±¸Éí·ÝÑéÖ¤ËÙÂÊ»ºÂýÎÊÌâʱÊ״η¢Ã÷Á˴˴λ¡£¡£ ¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬ £¬£¬ºÚ¿ÍʹÓÃÎó²îÔÚ×°±¸µÄindex.htmlµÇÂ¼Ò³Ãæ×¢ÈëÁ˶ñÒâÆ¾Ö¤ÇÔÈ¡JavaScript¾ç±¾¡£¡£ ¡£¡£¡£¹¥»÷ÕßΪ´Ë»î¶¯×¢²áÁ˶à¸öÓòÃû£¬£¬£¬£¬£¬£¬ £¬£¬X-ForceÒÑʶ±ð³ö½ü600¸öÍйÜÐ޸ĺóµÄNetScaler GatewayµÇÂ¼Ò³ÃæµÄIPµØµã£¬£¬£¬£¬£¬£¬ £¬£¬Ö÷Òª¼¯ÖÐÔÚÃÀ¹úºÍÅ·ÖÞ¡£¡£ ¡£¡£¡£µÇÂ¼Ò³Ãæ×îÔçµÄÐÞ¸Äʱ¼äÊÇ8ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬Òò´Ë¸Ã»î¶¯ÒѾ­¾ÙÐÐÁËÁ½¸öÔ¡£¡£ ¡£¡£¡£


https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/


5¡¢Î¬»¤ÕßÅû¶curlÖеÄÁ½¸öÇå¾²Îó²î²¢Í¸Â¶¼´½«Ðû²¼²¹¶¡


      ¾Ý10ÔÂ9ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬£¬curlµÄά»¤ÕßDaniel StenbergÅû¶Á˸ÿªÔ´¹¤¾ßÖб£´æµÄÁ½¸öÇå¾²Îó²î¡£¡£ ¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬ £¬£¬2023-38545ͬʱӰÏìÁËcurl¼°Æä¿âlibcurl£¬£¬£¬£¬£¬£¬ £¬£¬±»³ÆÎªºã¾ÃÒÔÀ´×îÑÏÖØµÄcurlÇå¾²Îó²î¡£¡£ ¡£¡£¡£ÁíÒ»¸öÎó²îΪCVE-2023-38546£¬£¬£¬£¬£¬£¬ £¬£¬½öÓ°Ïìlibcurl¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±ÉÐδ͸¶ÓйØÎó²îºÍÊÜÓ°Ïì°æ±¾¹æÄ£µÄ¸ü¶àÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬£¬µ«ÌåÏÖа汾curl 8.4.0ÒÔ¼°ÓйØÁ½¸öÎó²îµÄÏêϸÐÅÏ¢½«ÓÚ10ÔÂ11ÈÕ06:00×óÓÒÐû²¼¡£¡£ ¡£¡£¡£

https://therecord.media/curl-vulnerabilities-to-be-announced-open-source


6¡¢SentineloneÐû²¼ÐÂÀÕË÷Èí¼þLostTrustµÄÆÊÎö±¨¸æ


10ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬SentineloneÐû²¼Á˹ØÓÚÐÂÀÕË÷Èí¼þLostTrustµÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£¡£LostTrustÊÇ9·ÝÔ·ºÆðµÄÒ»ÖÖеĶàÖØÀÕË÷ÍŻ£¬£¬£¬£¬£¬ £¬£¬ÆäÍøÕ¾ÖÐÏÔʾËûÃÇÊÇ"×Ô³ÆÎªÍøÂçÇå¾²ÁìÓòר¼ÒµÄÄêÇáÈË"¡£¡£ ¡£¡£¡£¶ÔÆäpayloadµÄÆÊÎöÅú×¢£¬£¬£¬£¬£¬£¬ £¬£¬¸ÃϵÁÐÊÇSFileºÍMindwareµÄ½ø»¯°æ£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÇÒÈýÕß¶¼×ñÕÕÓëMetaEncryptorÀàËÆµÄÔË×÷ºÍÊÖÒÕ·½·¨¡£¡£ ¡£¡£¡£LostTrustµÄÍøÕ¾ºÍMetaEncryptorÔçÆÚµÄÍøÕ¾Ò²ºÜÏàËÆ£¬£¬£¬£¬£¬£¬ £¬£¬¶øMetaEncryptor»î¶¯ÖÐʹÓõÄSFile¼ÓÃÜÆ÷ÔÚLostTrustÖÐÈÔÔÚʹÓᣡ£ ¡£¡£¡£


https://www.sentinelone.com/blog/losttrust-ransomware-latest-multi-extortion-threat-shares-traits-with-sfile-and-mindware/