Cisco͸¶ÆäIOS XEÈí¼þÖÐÉí·ÝÑéÖ¤ÈÆ¹ý©¶´Òѱ»ÀûÓÃ

Ðû²¼Ê±¼ä 2023-10-17

1¡¢Cisco͸¶ÆäIOS XEÈí¼þÖÐÉí·ÝÑéÖ¤ÈÆ¹ý©¶´Òѱ»ÀûÓÃ


ýÌå10ÔÂ16ÈÕ±¨µÀ£¬Cisco͸¶ÆäIOS XEÈí¼þÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨CVE-2023-20198£©Òѱ»Ö÷¶¯ÀûÓá£Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÀûÓøÃ©¶´»ñµÃ¹ÜÀíԱȨÏÞ£¬²¢Ô¶³Ì¿ØÖÆÊÜÓ°ÏìµÄ·ÓÉÆ÷ºÍ½»»»»ú¡£¸Ã©¶´½öÓ°ÏìÆôÓÃÁËWebÓû§½çÃæ(Web UI)¹¦Ð§ÇÒͬʱÆôÓÃÁËHTTP»òHTTPS·þÎñÆ÷¹¦Ð§µÄÉ豸£¬Ä¿Ç°ÈÔÔÚÆÚ´ý²¹¶¡¡£CiscoÓÚ9ÔÂ28ÈÕ·¢ÏÖÁËÕâЩ¹¥»÷£¬½øÒ»·¨Ê½²é·¢ÏÖ¹¥»÷¿É×·Ëݵ½9ÔÂ18ÈÕ£¬²¢ÓÚ10ÔÂ12ÈÕ·¢ÏÖÁËÓë¸Ã©¶´ÀûÓÃÏà¹ØµÄÆäËü»î¶¯¡£¸Ã¹«Ë¾½¨Òé¹ÜÀíÔ±½ûÓÃÃæÏò»¥ÁªÍøµÄϵͳÉϵÄHTTP·þÎñÆ÷¹¦Ð§£¬ÒÔµÖÓù´ËÀ๥»÷¡£


https://www.bleepingcomputer.com/news/security/cisco-warns-of-new-ios-xe-zero-day-actively-exploited-in-attacks/


2¡¢ALPHV³ÆÒÑÇÔÈ¡Morrison CommunityÒ½Ôº5TBµÄÊý¾Ý


¾Ý10ÔÂ15ÈÕ±¨µÀ£¬ALPHVÉù³ÆÈëÇÖÁËMorrison CommunityÒ½Ôº£¬²¢½«ÆäÌí¼Óµ½TorÍøÕ¾ÖС£¸ÃÍÅ»ïÌåÏÖÒѾ­ÇÔÈ¡ÁË5TBµÄÊý¾Ý£¬°üÂÞ»¼ÕߺÍÔ±¹¤ÐÅÏ¢¡¢±¸·ÝÒÔ¼°PIIÎļþµÈ£¬»¹Ðû²¼ÁËÒ»¸öÑù±¾×÷Ϊ֤¾Ý¡£ÓÉÓÚÒ½ÔºÉÐδ×ö³öÃ÷È·»ØÓ¦£¬¸ÃÍÅ»ïÒÑ¿ªÊ¼ÁªÏµ¼ÇÕߣ¬»¹ÍþвºÜ¿ì¾Í»á¸ø²¡ÈË´òµç»°¡£Ñо¿ÈËÔ±³Æ£¬½ñÄ굽ĿǰΪֹ£¬ÃÀ¹úÒÑÓÐ29¸öÒ½ÁÆÏµÍ³£¨°üÂÞ90¼ÒÒ½Ôº£©Ôâµ½ÀÕË÷¹¥»÷¡£


https://securityaffairs.com/152486/cyber-crime/alphv-ransomware-morrison-community-hospital.html


3¡¢·ÆÂɱöͳ¼Æ¾ÖPSAÊÓ²ìй¶²¿ÃŸöÈËÐÅÏ¢µÄ¹¥»÷ʼþ


10ÔÂ11ÈÕ±¨µÀ£¬·ÆÂɱöÐÅÏ¢ºÍͨÐż¼Êõ²¿(DICT)֤ʵ£¬Ä¿Ç°ÕýÔÚÊÓ²ìÒ»ÆðÕë¶Ô·ÆÂɱöͳ¼Æ¾Ö(PSA)µÄÍøÂç¹¥»÷¡£³õ·¨Ê½²é·¢ÏÖ£¬PSAÉçÇø¼à¿ØÏµÍ³(CBMS)Òѱ»ÈëÇÖ£¬¸Ã»ú¹¹ÕýÔÚÆÀ¹ÀCBMSµÄÄÄЩ¸öÈËÊý¾Ý¿ÉÄÜÒѱ»Ð¹Â¶¡£´ËÍ⣬PSAÏò¹«ÖÚ±£Ö¤£¬·ÆÂɱöÉí·Ýϵͳ(PhilSys)ºÍÃñʹҺÅϵͳ(CRS)²¢Î´Êܵ½´Ë´Îй¶µÄÓ°Ï졣Ŀǰ£¬¸Ã»ú¹¹ÒÑÊµÊ©ÌØ±ðµÄÔ¤·À´ëÊ©£¬ÒÔÈ·±£ÆäËùÓÐϵͳºÍÊý¾Ý¿âµÄÄþ¾²¡£


https://www.bworldonline.com/the-nation/2023/10/11/551140/psa-cyberattack-being-probed/


4¡¢PhylumÔÚNuGetÉϼì²âµ½·Ö·¢SeroXen RATµÄÈí¼þ°ü


PhylumÓÚ10ÔÂ12Èճƣ¬ÆäÔÚNuGetÉϼì²âµ½·Ö·¢SeroXen RATµÄÈí¼þ°ü¡£¸ÃÈí¼þ°üÓÉÃûΪ¡°Disti¡±µÄÓû§ÉÏ´«£¬Æä´æ´¢¿âÖеÄ6¸öÈí¼þ°ü¶¼°üÂÞÏàͬµÄXMLÎļþ£¬¿ÉÏÂÔØx.bin£¬ÕâÊÇÒ»¸ö»ìÏýµÄWindowsÅú´¦ÖÃÎļþ£¬ÓÃÓÚÔÚ±»ÈëÇÖϵͳÉÏÖ´ÐжñÒâ»î¶¯¡£ÕâЩ°üð³ä¼ÓÃÜÇ®°ü¡¢¼ÓÃÜ»õ±Ò½»Ò×ËùºÍDiscord¿â£¬×îÖջᰲװSeroXen RAT¡£SeroXenÊÇÒ»¿îÏֳɵĶñÒâÈí¼þ£¬ÖÕÉíÊÛ¼ÛΪ60ÃÀÔª£¬½áºÏÁËQuasar RAT¡¢r77 rootkitºÍWindowsÃüÁîÐй¤¾ßNirCmdµÄ¹¦Ð§¡£


https://blog.phylum.io/phylum-discovers-seroxen-rat-in-typosquatted-nuget-package/


5¡¢Trend MicroÅû¶DarkGate¶ñÒâÈí¼þ·Ö·¢»î¶¯ÏêÇé


10ÔÂ12ÈÕ£¬Trend MicroÏêϸ½éÉÜÁËÀûÓÃSkypeºÍTeams·Ö·¢¶ñÒâÈí¼þDarkGateµÄ»î¶¯¡£Ñо¿ÈËÔ±·¢ÏÖ£¬7ÔÂÖÁ9Ô£¬DarkGateÀûÓñ»ÈëÇÖµÄSkypeÕÊ»§£¬Í¨¹ý°üÂÞVBA¼ÓÔØ·¨Ê½½Å±¾¸½¼þµÄÏûÏ¢À´Ñ¬È¾Ä¿±ê¡£¸Ã½Å±¾ÏÂÔØÁ˵ڶþ½×¶ÎAutoIT½Å±¾£¬Ö¼ÔÚÏÂÔØ²¢Ö´ÐÐ×îÖÕµÄpayload¡£´ËÍ⣬¹¥»÷Õß»¹ÊÔͼͨ¹ýMicrosoft Teams£¬ÔÚ½«·þÎñÅäÖÃΪ½ÓÊÜÀ´×ÔÍⲿÓû§µÄÏûÏ¢µÄ×éÖ¯ÖÐÍÆËͶñÒâÈí¼þpayload¡£


https://www.trendmicro.com/en_ph/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html


6¡¢AhnlabÐû²¼Lazarus¶ñÒâÈí¼þVolgmerºÍScout·ÖÎö³ÂËß


10ÔÂ13ÈÕ£¬AhnlabÐû²¼Á˺ڿÍÍÅ»ïLazarusµÄ¶ñÒâÈí¼þVolgmerºÍScoutµÄ·ÖÎö³ÂËß¡£Lazarus¿É×·Ëݵ½2009Ä꣬ÔçÆÚÖ÷ÒªÕë¶Ôº«¹ú£¬×Ô2016Ä꿪ʼ¹¥»÷È«Çò¹ú·À¡¢¼¼ÊõºÍ½ðÈÚÐÐÒµ¡£ºóÃÅVolgmer×Ô2014Ä꿪ʼ±»Ê¹Óã¬Í¨³£Í¨¹ý×¢²áΪ·þÎñÀ´ÔËÐУ¬°²×°Ê±Î±×°³ÉºÏ·¨Îļþ¡£×Ô2014ÄêÒÔÀ´£¬Volgmer¾­ÀúÁ˶à´Î±ä»¯£¬Ö±µ½2021Äê×óÓÒÒ»Ö±±»ÓÃÓÚ¹¥»÷¡£×Ô2022ÄêÒÔÀ´£¬ÏÂÔØ·¨Ê½ScoutÈ¡´úVolgmer±»ÓÃÓÚ¹¥»÷¡£ËüµÄÔËÐлúÖÆÓëǰÕßÀàËÆ£¬Ö»ÊÇʵ¼Ê¹¦Ð§ÓÐËù²îÒ죬ËüÏÂÔØµÄpayload±»ÈÏΪÊÇ¿ØÖƱ»Ñ¬È¾ÏµÍ³µÄºóÃÅ¡£


https://asec.ahnlab.com/en/57685/