FlagstarÒøÐеĹ©Ó¦ÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶
Ðû²¼Ê±¼ä 2023-10-101¡¢FlagstarÒøÐеĹ©Ó¦ÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶
¾ÝýÌå10ÔÂ8ÈÕ±¨µÀ£¬FlagstarÒøÐеĵÚÈý·½·þÎñÌṩÉÌFiservÔâµ½¹¥»÷£¬µ¼Ö´ó×Ú¿Í»§µÄÐÅϢй¶¡£FlagstarÏÖÔÚ¹éŦԼÉçÇøÒøÐÐËùÓУ¬ÔÚÈ¥Äê±»ÊÕ¹ºÖ®Ç°ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬×Ü×ʲúÁè¼Ý310ÒÚÃÀÔª¡£FiservÊǸÃÒøÐÐÓÃÓÚÖ§¸¶´¦Öóͷ£ºÍÒƶ¯ÒøÐзþÎñµÄ¹©Ó¦ÉÌ£¬ÆäÔâµ½ÁËCLOPµÄ¹¥»÷¡£ºÚ¿ÍʹÓÃMOVEit TransferÖеÄÎó²î»á¼ûÁËFiservϵͳ£¬²¢ÇÔÈ¡ÁËFlagstarµÄÊý¾Ý£¬¹²Ó°Ïì837390Ãû¿Í»§¡£ÕâÊÇFlagstar×Ô2021Äê3ÔÂÒÔÀ´±¬·¢µÄµÄµÚÈýÆðÊý¾Ýй¶ÊÂÎñ¡£
https://www.bleepingcomputer.com/news/security/third-flagstar-bank-data-breach-since-2021-affects-800-000-customers/
2¡¢Ó¢¹úµç×Ó¹«Ë¾VolexµÄϵͳºÍÊý¾ÝÔ⵽δ¾ÊÚȨ»á¼û
10ÔÂ9ÈÕ±¨µÀ³Æ£¬Ó¢¹úµç×ÓµçÆø¹«Ë¾ºÀÀûÊ¿£¨Volex£©Ôâµ½ÍøÂç¹¥»÷¡£ÊÓ²ìÏÔʾ£¬¸ÃÊÂÎñÊÇÓÉÓÚ¹«Ë¾Î»ÓÚÈ«ÇòµÄ¶à¸öITϵͳºÍÊý¾ÝÔ⵽δ¾ÊÚȨ»á¼ûµ¼Öµġ£¸Ã¹«Ë¾ÌåÏÖ£¬ËûÃÇÒѽÓÄÉÏìÓ¦²½·¥½«Ó°Ïì½µÖÁ×îµÍ£¬µ«Ñо¿Ö°Ô±ÔÚUTC 13:25:26»á¼ûVolexÍøվʱÏÔʾÒÑÀëÏß¡£ÏÖÔÚ£¬¸ÃÍøÕ¾Òѻָ´»á¼û¡£VolexÉù³Æ¹¥»÷ÕßÎÞ·¨»á¼û²ÆÎñÊý¾Ý£¬¸ÃÊÂÎñûÓÐÔì³ÉÖØ´ó²ÆÎñÓ°Ï죬µ«¸Ã¹«Ë¾µÄ¹É¼ÛÔÚ±¾ÖÜÒ»ÉÏÎçÈÔϵøÁË4%×óÓÒ¡£
https://www.hackread.com/uk-power-data-manufacturer-volex-cyberattack/
3¡¢Storm-0324ͨ¹ýTeams»ñµÃ»á¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þ
TrellixÔÚ10ÔÂ5ÈÕ¹ûÕæÁËStorm-0324ͨ¹ýTeams»ñµÃ»á¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þµÄÔ˶¯¡£7ÔÂÉÏÑ®£¬¸ÃÍŻﱻ·¢Ã÷×îÏÈͨ¹ýMicrosoft Teams·¢ËÍ´¹ÂÚÐÂÎÅ¡£ÔÚ»ñµÃ³õʼ»á¼ûȨÏÞºó£¬Storm-0324¾³£½«»á¼ûȨÏÞÒƽ»¸øºÚ¿ÍÍÅ»ïSangria Tempest£¨ÓÖ³ÆFIN7£©ºÍTA543£¬ºóÕßͨ³£»áÖ´ÐÐÀÕË÷¹¥»÷¡£Ñо¿Ö°Ô±·¢Ã÷£¬Storm-0324ÏÖÕýÔÚÈö²¥JSSLoader£¬È»ºóÔÙ½«ÔðÈÎת¼Þ¸øÆäËüÀÕË÷ÍŻ
https://www.trellix.com/en-us/about/newsroom/stories/research/storm-0324-an-access-for-the-raas-threat-actor.html
4¡¢X-ForceÅû¶ʹÓÃNetScaler GatewayµÄƾ֤ÍøÂçÔ˶¯
10ÔÂ6ÈÕ£¬X-ForceÅû¶ÁËÒ»Æð´ó¹æÄ£Ô˶¯£¬¹¥»÷ÕßʹÓÃCitrix NetScaler GatewayÖÐÎó²î£¨CVE-2023-3519£©ÇÔÈ¡Óû§Æ¾Ö¤¡£X-ForceÔÚÊÓ²ì¿Í»§µÄNetScaler×°±¸Éí·ÝÑéÖ¤ËÙÂÊ»ºÂýÎÊÌâʱÊ״η¢Ã÷ÁË´Ë´ÎÔ˶¯¡£ÊӲ췢Ã÷£¬ºÚ¿ÍʹÓÃÎó²îÔÚ×°±¸µÄindex.htmlµÇ¼ҳÃæ×¢ÈëÁ˶ñÒâƾ֤ÇÔÈ¡JavaScript¾ç±¾¡£¹¥»÷ÕßΪ´ËÔ˶¯×¢²áÁ˶à¸öÓòÃû£¬X-ForceÒÑʶ±ð³ö½ü600¸öÍйÜÐ޸ĺóµÄNetScaler GatewayµÇ¼ҳÃæµÄIPµØµã£¬Ö÷Òª¼¯ÖÐÔÚÃÀ¹úºÍÅ·ÖÞ¡£µÇ¼ҳÃæ×îÔçµÄÐÞ¸Äʱ¼äÊÇ8ÔÂ11ÈÕ£¬Òò´Ë¸ÃÔ˶¯ÒѾ¾ÙÐÐÁËÁ½¸öÔ¡£
https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/
5¡¢Î¬»¤ÕßÅû¶curlÖеÄÁ½¸öÇå¾²Îó²î²¢Í¸Â¶¼´½«Ðû²¼²¹¶¡
¾Ý10ÔÂ9ÈÕ±¨µÀ£¬curlµÄά»¤ÕßDaniel StenbergÅû¶Á˸ÿªÔ´¹¤¾ßÖб£´æµÄÁ½¸öÇå¾²Îó²î¡£ÆäÖУ¬2023-38545ͬʱӰÏìÁËcurl¼°Æä¿âlibcurl£¬±»³ÆΪºã¾ÃÒÔÀ´×îÑÏÖصÄcurlÇå¾²Îó²î¡£ÁíÒ»¸öÎó²îΪCVE-2023-38546£¬½öÓ°Ïìlibcurl¡£Ñо¿Ö°Ô±ÉÐδ͸¶ÓйØÎó²îºÍÊÜÓ°Ïì°æ±¾¹æÄ£µÄ¸ü¶àÐÅÏ¢£¬µ«ÌåÏÖа汾curl 8.4.0ÒÔ¼°ÓйØÁ½¸öÎó²îµÄÏêϸÐÅÏ¢½«ÓÚ10ÔÂ11ÈÕ06:00×óÓÒÐû²¼¡£
https://therecord.media/curl-vulnerabilities-to-be-announced-open-source
6¡¢SentineloneÐû²¼ÐÂÀÕË÷Èí¼þLostTrustµÄÆÊÎö±¨¸æ
10ÔÂ5ÈÕ£¬SentineloneÐû²¼Á˹ØÓÚÐÂÀÕË÷Èí¼þLostTrustµÄÆÊÎö±¨¸æ¡£LostTrustÊÇ9·ÝÔ·ºÆðµÄÒ»ÖÖеĶàÖØÀÕË÷ÍŻÆäÍøÕ¾ÖÐÏÔʾËûÃÇÊÇ"×Ô³ÆΪÍøÂçÇå¾²ÁìÓòר¼ÒµÄÄêÇáÈË"¡£¶ÔÆäpayloadµÄÆÊÎöÅú×¢£¬¸ÃϵÁÐÊÇSFileºÍMindwareµÄ½ø»¯°æ£¬²¢ÇÒÈýÕ߶¼×ñÕÕÓëMetaEncryptorÀàËƵÄÔË×÷ºÍÊÖÒÕ·½·¨¡£LostTrustµÄÍøÕ¾ºÍMetaEncryptorÔçÆÚµÄÍøÕ¾Ò²ºÜÏàËÆ£¬¶øMetaEncryptorÔ˶¯ÖÐʹÓõÄSFile¼ÓÃÜÆ÷ÔÚLostTrustÖÐÈÔÔÚʹÓá£
https://www.sentinelone.com/blog/losttrust-ransomware-latest-multi-extortion-threat-shares-traits-with-sfile-and-mindware/