FlagstarÒøÐеĹ©Ó¦ÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2023-10-10

1¡¢FlagstarÒøÐеĹ©Ó¦ÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶


¾ÝýÌå10ÔÂ8ÈÕ±¨µÀ£¬FlagstarÒøÐеĵÚÈý·½·þÎñÌṩÉÌFiservÔâµ½¹¥»÷£¬µ¼Ö´óÁ¿¿Í»§µÄÐÅϢй¶¡£FlagstarÏÖÔÚ¹éŦԼÉçÇøÒøÐÐËùÓУ¬ÔÚÈ¥Äê±»ÊÕ¹ºÖ®Ç°ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬×Ü×ʲúÁè¼Ý310ÒÚÃÀÔª¡£FiservÊǸÃÒøÐÐÓÃÓÚÖ§¸¶´¦ÖúÍÒƶ¯ÒøÐзþÎñµÄ¹©Ó¦ÉÌ£¬ÆäÔâµ½ÁËCLOPµÄ¹¥»÷¡£ºÚ¿ÍÀûÓÃMOVEit TransferÖеÄ©¶´·ÃÎÊÁËFiservϵͳ£¬²¢ÇÔÈ¡ÁËFlagstarµÄÊý¾Ý£¬¹²Ó°Ïì837390Ãû¿Í»§¡£ÕâÊÇFlagstar×Ô2021Äê3ÔÂÒÔÀ´·¢ÉúµÄµÄµÚÈýÆðÊý¾Ýй¶Ê¼þ¡£


https://www.bleepingcomputer.com/news/security/third-flagstar-bank-data-breach-since-2021-affects-800-000-customers/


2¡¢Ó¢¹úµç×Ó¹«Ë¾VolexµÄϵͳºÍÊý¾ÝÔ⵽δ¾­ÊÚȨ·ÃÎÊ


10ÔÂ9ÈÕ±¨µÀ³Æ£¬Ó¢¹úµç×ÓµçÆø¹«Ë¾ºÀÀûÊ¿£¨Volex£©Ôâµ½ÍøÂç¹¥»÷¡£ÊÓ²ìÏÔʾ£¬¸ÃʼþÊÇÓÉÓÚ¹«Ë¾Î»ÓÚÈ«ÇòµÄ¶à¸öITϵͳºÍÊý¾ÝÔ⵽δ¾­ÊÚȨ·ÃÎʵ¼ÖµÄ¡£¸Ã¹«Ë¾ÌåÏÖ£¬ËûÃÇÒѽÓÄÉÏìÓ¦´ëÊ©½«Ó°Ïì½µÖÁ×îµÍ£¬µ«Ñо¿ÈËÔ±ÔÚUTC 13:25:26·ÃÎÊVolexÍøվʱÏÔʾÒÑÀëÏß¡£Ä¿Ç°£¬¸ÃÍøÕ¾Òѻָ´·ÃÎÊ¡£VolexÉù³Æ¹¥»÷ÕßÎÞ·¨·ÃÎʲÆÕþÊý¾Ý£¬¸ÃʼþûÓÐÔì³ÉÖØ´ó²ÆÕþÓ°Ï죬µ«¸Ã¹«Ë¾µÄ¹É¼ÛÔÚ±¾ÖÜÒ»ÉÏÎçÈÔϵøÁË4%×óÓÒ¡£ 


https://www.hackread.com/uk-power-data-manufacturer-volex-cyberattack/


3¡¢Storm-0324ͨ¹ýTeams»ñµÃ·ÃÎÊȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þ


TrellixÔÚ10ÔÂ5ÈÕ¹ûÈ»ÁËStorm-0324ͨ¹ýTeams»ñµÃ·ÃÎÊȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯¡£7ÔÂÉÏÑ®£¬¸ÃÍŻﱻ·¢ÏÖ¿ªÊ¼Í¨¹ýMicrosoft Teams·¢Ë͵öÓãÏûÏ¢¡£ÔÚ»ñµÃ³õʼ·ÃÎÊȨÏÞºó£¬Storm-0324¾­³£½«·ÃÎÊȨÏÞÒƽ»¸øºÚ¿ÍÍÅ»ïSangria Tempest£¨ÓÖ³ÆFIN7£©ºÍTA543£¬ºóÕßͨ³£»áÖ´ÐÐÀÕË÷¹¥»÷¡£Ñо¿ÈËÔ±·¢ÏÖ£¬Storm-0324ÏÖÕýÔÚÁ÷´«JSSLoader£¬È»ºóÔÙ½«ÔðÈÎת¼Þ¸øÆäËüÀÕË÷ÍŻ


https://www.trellix.com/en-us/about/newsroom/stories/research/storm-0324-an-access-for-the-raas-threat-actor.html


4¡¢X-ForceÅû¶ÀûÓÃNetScaler GatewayµÄƾ¾ÝÊÕ¼¯»î¶¯


10ÔÂ6ÈÕ£¬X-ForceÅû¶ÁËÒ»Æð´ó¹æÄ£»î¶¯£¬¹¥»÷ÕßÀûÓÃCitrix NetScaler GatewayÖЩ¶´£¨CVE-2023-3519£©ÇÔÈ¡Óû§Æ¾¾Ý¡£X-ForceÔÚÊÓ²ì¿Í»§µÄNetScalerÉ豸Éí·ÝÑéÖ¤ËٶȻºÂýÎÊÌâʱÊ״η¢ÏÖÁ˴˴λ¡£ÊӲ췢ÏÖ£¬ºÚ¿ÍÀûÓ鶴ÔÚÉ豸µÄindex.htmlµÇ¼ҳÃæ×¢ÈëÁ˶ñÒâƾ֤ÇÔÈ¡JavaScript½Å±¾¡£¹¥»÷ÕßΪ´Ë»î¶¯×¢²áÁ˶à¸öÓòÃû£¬X-ForceÒÑʶ±ð³ö½ü600¸öÍйÜÐ޸ĺóµÄNetScaler GatewayµÇ¼ҳÃæµÄIPµØÖ·£¬Ö÷Òª¼¯ÖÐÔÚÃÀ¹úºÍÅ·ÖÞ¡£µÇ¼ҳÃæ×îÔçµÄÐÞ¸Äʱ¼äÊÇ8ÔÂ11ÈÕ£¬Òò´Ë¸Ã»î¶¯ÒѾ­½øÐÐÁËÁ½¸öÔ¡£


https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/


5¡¢Î¬»¤ÕßÅû¶curlÖеÄÁ½¸öÄþ¾²Â©¶´²¢Í¸Â¶¼´½«Ðû²¼²¹¶¡


      ¾Ý10ÔÂ9ÈÕ±¨µÀ£¬curlµÄά»¤ÕßDaniel StenbergÅû¶Á˸ÿªÔ´¹¤¾ßÖдæÔÚµÄÁ½¸öÄþ¾²Â©¶´¡£ÆäÖУ¬2023-38545ͬʱӰÏìÁËcurl¼°Æä¿âlibcurl£¬±»³ÆΪºã¾ÃÒÔÀ´×îÑÏÖصÄcurlÄþ¾²Â©¶´¡£ÁíÒ»¸ö©¶´ÎªCVE-2023-38546£¬½öÓ°Ïìlibcurl¡£Ñо¿ÈËÔ±ÉÐδ͸¶ÓйØ©¶´ºÍÊÜÓ°Ïì°æ±¾·¶Î§µÄ¸ü¶àÐÅÏ¢£¬µ«ÌåÏÖа汾curl 8.4.0ÒÔ¼°ÓйØÁ½¸ö©¶´µÄÏêϸÐÅÏ¢½«ÓÚ10ÔÂ11ÈÕ06:00×óÓÒÐû²¼¡£

https://therecord.media/curl-vulnerabilities-to-be-announced-open-source


6¡¢SentineloneÐû²¼ÐÂÀÕË÷Èí¼þLostTrustµÄ·ÖÎö³ÂËß


10ÔÂ5ÈÕ£¬SentineloneÐû²¼Á˹ØÓÚÐÂÀÕË÷Èí¼þLostTrustµÄ·ÖÎö³ÂËß¡£LostTrustÊÇ9·ÝÔ·ºÆðµÄÒ»ÖÖеĶàÖØÀÕË÷ÍŻÆäÍøÕ¾ÖÐÏÔʾËûÃÇÊÇ"×Ô³ÆΪÍøÂçÄþ¾²ÁìÓòר¼ÒµÄÄêÇáÈË"¡£¶ÔÆäpayloadµÄ·ÖÎö±íÃ÷£¬¸ÃϵÁÐÊÇSFileºÍMindwareµÄ½ø»¯°æ£¬¶øÇÒÈýÕ߶¼×ñÑ­ÓëMetaEncryptorÀàËƵÄÔË×÷ºÍ¼¼Êõ·½Ê½¡£LostTrustµÄÍøÕ¾ºÍMetaEncryptorÔçÆÚµÄÍøÕ¾Ò²ºÜÏàËÆ£¬¶øMetaEncryptor»î¶¯ÖÐʹÓõÄSFile¼ÓÃÜÆ÷ÔÚLostTrustÖÐÈÔÔÚʹÓá£


https://www.sentinelone.com/blog/losttrust-ransomware-latest-multi-extortion-threat-shares-traits-with-sfile-and-mindware/