CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»ÀûÓõÄÈÎÒâ´úÂëÖ´ÐЩ¶´
Ðû²¼Ê±¼ä 2022-12-15
12ÔÂ13ÈÕ£¬CitrixÐÞ¸´ÁËCitrixÓ¦Ó÷¨Ê½½»¸¶¿ØÖÆÆ÷(ADC)ºÍGatewayÖеÄÈÎÒâ´úÂëÖ´ÐЩ¶´£¨CVE-2022-27518£©¡£¸Ã¹«Ë¾³ÆÒѾ¼ì²âµ½ÀûÓôË©¶´µÄÕë¶ÔÐÔ¹¥»÷»î¶¯£¬½¨Òé¿Í»§¾¡¿ì°²×°¸üС£ÃÀ¹ú¹ú¼ÒÄþ¾²¾Ö(NSA)ÔÚ±¾ÖܶþÌåÏÖ£¬¹¥»÷ÍÅ»ïAPT5Ò»Ö±ÔÚÀûÓÃCitrix ADCºÍGatewayÖеÄÁãÈÕ©¶´À´½Ù³ÖÊÜÓ°ÏìµÄϵͳ¡£µ«ÊÇ£¬ÏëÒªÀûÓøÃ©¶´ÐèÒª½«ADC»òGatewayÉ豸ÅäÖÃΪ SAML SP£¨SAML ·þÎñÌṩÉÌ£©»òSAML IdP£¨SAMLÉí·ÝÌṩÉÌ£©¡£
https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518
2¡¢¼ÓÖÝÐÅ¿¨´¦Öù«Ë¾ÒòÅäÖôíÎó900ÍòÌõ½»Ò׼Ǽй¶
ýÌå12ÔÂ13Èճƣ¬Ñо¿ÍŶӷ¢ÏÖÁËÒ»¸öδÊܱ£»¤µÄÊý¾Ý¿â£¬ÆäÖаüÂÞ9098506ÌõÐÅÓÿ¨½»Ò׼Ǽ¡£¸üÔã¸âµÄÊÇ£¬¸öÈ˺ͲÆÕþÐÅÏ¢Ò²±»Ì»Â¶ÔÚÅäÖôíÎóµÄ·þÎñÆ÷ÉÏ£¬Ã»ÓÐÈκÎÃÜÂë»òÄþ¾²Éí·ÝÑéÖ¤¡£¸ÃÊý¾Ý¿â±»È·¶¨ÊôÓÚCornerstone Payment Systems£¬ÕâÊÇÒ»¼ÒλÓÚ¼ÓÀû¸£ÄáÑǵÄÐÅÓÿ¨´¦Öù«Ë¾¡£¸Ãʼþй¶ÁËÐÅÓÿ¨ºÅ¡¢ÕË»§»ò½»Ò×ÐÅÏ¢¡¢ÐÕÃû¡¢Äþ¾²»ò·ÃÎÊÁîÅÆÒÔ¼°½»Ò×ÐÅÏ¢µÈ£¬¿É±»ÓÃÀ´½øÐеöÓã¹¥»÷¡£»ñϤÎÊÌâºó£¬¸Ã¹«Ë¾Á¢¼´½ÓÄÉÐж¯±£»¤·þÎñÆ÷¡£
https://www.hackread.com/exposed-credit-card-transaction-records/
3¡¢ºÚ¿ÍÔÚ°µÍøÉϳöÊÛFBI InfraGardÊýÍòÓû§µÄÊý¾Ý¿â
¾Ý12ÔÂ13ÈÕ±¨µÀ£¬InfraGardµÄ80000¶àÃû³ÉÔ±µÄÁªÏµÐÅÏ¢Êý¾Ý¿âÔÚ°µÍøBreachedÉϱ»¹ûÈ»³öÊÛ¡£Í¬Ê±£¬ºÚ¿Í»¹Í¨¹ýInfraGardÃÅ»§ÍøÕ¾Ö±½ÓÓë»áÔ±½øÐÐÔÚÏß½»Á÷£¬²¢Ê¹ÓÃÒ»¸öÓÉFBI×Ô¼ºÉóºËµÄ½ðÈÚÒµCEOµÄ¼ÙÉí·ÝµÄÐÂÕË»§¡£InfraGardÊÇFBIÔËÐеÄÒ»¸öÏîÄ¿£¬Ö¼ÔÚÓë˽Ӫ²¿ÃލÁ¢ÍøÂçºÍÎïÀíÍþвÐÅÏ¢¹²ÏíºÏ×÷¹ØÏµ¡£FBIÌåÏÖ£¬ËüÒѾ֪µÀDZÔÚµÄÐé¼ÙÕË»§£¬²¢ÕýÔÚ»ý¼«ÊÓ²ì´ËÊ£¬Ä¿Ç°ÎÞ·¨ÌṩÈκÎÌØ±ðÐÅÏ¢¡£
https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/
4¡¢µçÐŹ«Ë¾TPG TelecomÉÏÍò¸ö¿Í»§ÓÊÏäÔ⵽δÊÚȨ·ÃÎÊ
·͸Éç12ÔÂ14ÈÕ±¨µÀ³Æ£¬°Ä´óÀûÑǵçÐŹ«Ë¾TPG TelecomÔâµ½ÍøÂç¹¥»÷£¬¶à´ï15000¸öÆóÒµ¿Í»§µÄµç×ÓÓʼþ±»Î´ÊÚȨ·ÃÎÊ¡£TPGÌåÏÖ£¬ºÚ¿Í¹¥»÷Íйܽ»Ò×Ëù·þÎñµÄÖ÷ҪĿµÄÊÇΪÁËËÑË÷¿Í»§µÄ¼ÓÃÜ»õ±ÒºÍ½ðÈÚÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄÉ´ëÊ©×èֹδ¾ÊÚȨµÄ·ÃÎÊ£¬²¢ÕýÔÚÁªÏµËùÓÐÊÜ´ËʼþÓ°ÏìµÄ¿Í»§¡£Æä¹É¼ÛÊÜ´ËÏûÏ¢Ó°Ïìϵø£¬ÊÕÅÌϵø 2.8%¡£×Ô10ÔÂÒÔÀ´£¬ÖÁÉÙÓÐ8¼Ò°Ä´óÀûÑǹ«Ë¾Ôâµ½Á˺ڿ͹¥»÷¡£
https://www.reuters.com/world/asia-pacific/tpg-telecom-finds-evidence-unauthorised-access-up-15000-email-accounts-2022-12-13/
5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚ5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄÖ¸ÄÏ
12ÔÂ13ÈÕ£¬ÃÀ¹ú¹ú¼ÒÄþ¾²¾Ö(NSA)¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)ÁªºÏÐû²¼ÁË5GÍøÂçÇÐÆ¬µÄDZÔÚÍþвµÄÖ¸ÄÏ¡£¸ÃÖ¸ÄÏÒÔESFÓÚ2021ÄêÐû²¼µÄ5G»ù´¡ÉèÊ©µÄDZÔÚÍþвΪ»ù´¡£¬½éÉÜÁËÓë5GÍøÂçÇÐÆ¬Ïà¹ØµÄºÃ´¦ºÍ·çÏÕ£¬Ëü»¹ÌṩÁ˽â¾ö5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄ»º½â¼ÆÄ±¡£CISAÃãÀø5GÌṩÉÌ¡¢¼¯³ÉÉ̺ÍÍøÂçÔËÓªÉ̼ì²ì±¾Ö¸Äϲ¢ÊµÊ©½¨ÒéµÄ»º½â´ëÊ©¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network
6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
FortinetÔÚ12ÔÂ12ÈÕÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£GoTrimÊÇ»ùÓÚGoµÄ½©Ê¬ÍøÂ磬ͨ¹ýɨÃèÍøÂçÒÔѰÕÒ×ÔÍйܵÄWordPressÍøÕ¾£¬²¢ÊÔͼ±©Á¦ÆÆ½â¹ÜÀíÔ±ÃÜÂë²¢¿ØÖƸÃÍøÕ¾¡£¹¥»÷»î¶¯Ê¼ÓÚ2022Äê9Ô£¬Ä¿Ç°ÈÔÔÚ½øÐÐÖС£ÕâÖÖ¹¥»÷¿ÉÄܻᵼÖ¶ñÒâÈí¼þ°²×°¡¢ÐÅÓÿ¨ÇÔÈ¡½Å±¾×¢Èë¡¢µöÓãÒ³ÃæµÄÍйÜÒÔ¼°ÆäËüµÄ¹¥»÷³¡¾°£¬Æ¾¾Ý±»ÈëÇÖÍøÕ¾µÄÊÜ»¶Óˮƽ£¬¿ÉÄÜÓ°Ïìµ½Êý°ÙÍòÈË¡£
https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites