Oktaй©ÆäGitHub´æ´¢¿âÔâµ½ºÚ¿Í¹¥»÷Ô´´úÂëй¶

°ä²¼¹¦·ò 2022-12-22
1¡¢Oktaй©ÆäGitHub´æ´¢¿âÔâµ½ºÚ¿Í¹¥»÷Ô´´úÂëй¶

      

¾Ý12ÔÂ21ÈÕ±¨Â· £¬Éí·ÝÑéÖ¤·þÎñºÍÉí·ÝÓë½Ó¼ûÖÎÀí(IAM)½â¾ö¹æ»®µÄÌṩÉÌOkta°µÊ¾ £¬Æä¸öÈËGitHub´æ´¢¿âÔÚ±¾ÔÂÔâµ½ºÚ¿Í¹¥»÷¡£¾­µ÷²é £¬ºÚ¿ÍÒѾ­¸´ÔìOkta´úÂë´æ´¢¿â £¬µ«²¢Î´Ó°ÏìOkta·þÎñ»ò¿Í»§Êý¾Ý¡£¸ÃÊÂÎñËÆºõ½öÓëOkta Workforce Identity Cloud(WIC)´úÂë´æ´¢¿âÓйØ £¬ÓëAuth0 Customer Identity Cloud²úÆ·Î޹ء£½ñÄê9Ô £¬OktaÆìϵÄAuth0Ò²Ôø²úÉúÁËÀàËÆµÄÊý¾Ýй¶ÊÂÎñ¡£


https://www.bleepingcomputer.com/news/security/okta-says-its-github-account-hacked-source-code-stolen/


2¡¢µÂ¹ú¿ç¹ú¹¤Òµ¹«Ë¾ThyssenKrupp AGÔâµ½ÍøÂç¹¥»÷

      

ýÌå12ÔÂ21ÈÕ±¨Â· £¬µÂ¹ú¿ç¹ú¹¤Òµ¹¤³ÌºÍ¸ÖÌú³ö²ú¹«Ë¾ThyssenKruppй©Æä×ÊÁÏ·þÎñ²¿ºÍ¹«Ë¾×ܲ¿Ôâµ½ÍøÂç¹¥»÷¡£Ä¿Ç° £¬¸Ã¹«Ë¾ÉÐδÅû¶Õâ´Î¹¥»÷µÄÀàÐÍ £¬Ò²Ã»ÓкڿÍÍÅ»ïÐû³Æ¶ÔÕâ´ÎÊÂÕÆ¹Ü £¬µ«¹«Ë¾½²»°ÈËÐû³ÆÃ»º±¼û¾Ýй¶µÄ¼£Ïó¡£Õâ²¢²»ÊǸù«Ë¾µÚÒ»´ÎÔâµ½¹¥»÷ £¬2016Äê £¬¾Ý³Æ¶«ÄÏÑǵĺڿÍÍÅ»ïÇÔÈ¡Æä¹«Ë¾»úÃÜ£»2020Äê12Ô £¬ThyssenKrupp Materials¼¯ÍŹ«Ë¾Ôâµ½NetWalkerÀÕË÷ÍÅ»ïµÄ¹¥»÷¡£


https://securityaffairs.co/wordpress/139870/hacking/thyssenkrupp-targeted-cyberattack.html


3¡¢×êÑÐÍŶӳÆRaspberry Robin½üÆÚÕë¶ÔµçÐź͵±¾Ö×éÖ¯

      

TrendMicroÔÚ12ÔÂ20ÈÕ°ä²¼»ã±¨³Æ·¢ÏÖÁËRaspberry RobinÔÚ½üÆÚÕë¶ÔµçÐź͵±¾Ö×éÖ¯µÄ¹¥»÷»î¶¯¡£¶ñÒâÈí¼þͨ¹ý¶ñÒâUSBÇý¶¯Æ÷½øÐзַ¢ £¬µ±Ö¸±ê²åÈëUSBÇý¶¯Æ÷²¢Ë«»÷ÆäÖеÄ.LNKÎļþʱ £¬É豸¾Í»áϰȾ¶ñÒâÈí¼þ¡£¶øºó»áÀÄÓúϷ¨µÄMSIExec.exe¿ÉÖ´ÐÐÎļþ £¬ÏÂÔØÒ»¸ö¶ñÒâµÄMSI×°Ö÷¨Ê½ £¬×°ÖÃRaspberry RobinµÄpayload¡£´Ë±í £¬¸Ã¶ñÒâÈí¼þ³¢ÊÔͨ¹ýÐéαµÄpayloadÀ´¹Æ»ó×êÑÐÈËÔ± £¬ÒÔ¼°ÔÚ¼ì²âµ½ËüÔÚɳÏäºÍµ÷ÊÔ¹¤¾ßÖÐÔËÐÐÊ±ÈÆ¹ý¼ì²â¡£


https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html


4¡¢ÐÂÐÍAndroidľÂíBrasDex±»ÓÃÓÚÕë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯

      

×êÑÐÍŶÓÔÚ12ÔÂ15ÈÕÅû¶ÁËÕë¶Ô°ÍÎ÷½ðÈÚ»ú¹¹µÄÐÂÐÍAndroidľÂíBrasDex¡£BrasDexÓµÓÐÒ»¸ö¸´ÔӵļüÅ̼ͼϵͳ £¬ÒÔ¼°Ò»¸ö׳´óµÄ×Ô¶¯´«Êäϵͳ£¨ATS£©ÒýÇæ¡£¸Ã»î¶¯ÒѳÖÐøÒ»Äê¶à £¬Ëü×î³õ¼ÙÒâAndroidÉèÖÃÀûÓò¢Õë¶Ô°ÍÎ÷ÒøÐÐÀûÓà £¬ÔÚ×îеĻÖÐ £¬ËüÆðÍ·¼ÙÒâÒ»¸öÌØ¶¨µÄÒøÐÐÀûÓ÷¨Ê½£¨Banco Santander BR£©¡£·ÖÎö·¢ÏÖ £¬ÓÃÓÚBrasDexµÄC2»ù´¡ÉèʩҲ±»ÓÃÀ´½ÚÔìCasbaneiro £¬ºóÕßÖØÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸çµÄÒøÐкͼÓÃÜÇ®±Ò·þÎñ¡£


https://www.threatfabric.com/blogs/brasdex-a-new-brazilian-ats-malware.html


5¡¢Á½ÄÐ×ÓÒò´Û¸Ä¿ÏÄáµÏ¹ú¼Ê»ú³¡µÄ³ö×â³µµ÷¶Èϵͳ±»²¶

      

ýÌå12ÔÂ20ÈÕ³Æ £¬Á½ÃûÄÐ×ÓÒòÈëÇÖ²¢´Û¸Ä¿ÏÄáµÏ¹ú¼Ê»ú³¡µÄ³ö×â³µµ÷¶Èϵͳ±»²¶ £¬²¢Ãæ¶Ô×î¸ß10ÄêµÄ½ûïÀ¡£Æ¾¾Ý¸æ×´Êé £¬ÏÖÄê48ËêµÄDaniel AbayevºÍPeter LeymanÔçÔÚ2019Äê9Ô¾ÍÓë¶íÂÞ˹ºÚ¿ÍºÏıÈëÇÖµ÷¶Èϵͳ £¬ÔÊÐí˾»ú¸¶·Ñ²å¶Ó¡£Í¬Ä¹Øß±»Ö¸¿ØÊÔͼÒÔ¸÷À෽ʽÈëÇÖ¸Ãϵͳ £¬Ô̺¬»ß¸ijÈËͨ¹ýUÅÌ×°ÖöñÒâÈí¼þ £¬Ê¹ÓÃWi-FiÏνӽøÈë¸Ãϵͳ £¬ÒÔ¼°ÍµÇÔÏνӵ½¸Ãƽ̨µÄƽ°åµçÄÔ¡£¼ì²ì¹Ù³Æ £¬ËûÃÇÿÌì²ß¶¯¶à´ï1000´Î¼Ó¿ì²å¶Ó £¬ÆäÖÐ100000ÃÀÔªµÄÊÕÒæ±»»ã¸øÁ˶íÂÞ˹µÄͬı¡£


https://therecord.media/russian-hackers-accessed-jfk-airport-taxi-software-port-authority/


6¡¢Unit 42°ä²¼¹ØÓÚGamaredonµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

12ÔÂ20ÈÕ £¬Unit 42°ä²¼Á˹ØÓÚ¶íÂÞ˹ÍÅ»ïGamaredon¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£Unit 42¶Ô¸ÃÍÅ»ïµÄ³ÖÐø¼à¿Ø·¢ÏÖÁË500¶à¸öÐÂÓòºÍ200¸ö¶ñÒâÈí¼þÑù±¾ £¬²¢·¢ÏÔìäÕ½ÊõÔÚ´Óǰ10¸öÔÂÖвúÉúÁËÂÅ´Îת±ä¡£ÔÚÉó²é¸ÃÍÅ»ïµÄIoCÆÚ¼ä £¬×êÑÐÈËÔ±·¢ÏÖÁËËüÔÚ8ÔÂ30ÈÕÊÔͼ¹¥»÷±±Ô¼³ÉÔ±¹úÄÚÒ»¼Ò´óÐÍʯÓ;«±Ù¹«Ë¾µÄ»î¶¯ £¬µ«ÊÇûÓгɹ¦¡£´Ë±í £¬¸ÃÍŻﻹʹÓÃTelegramÒ³Ãæ²éÕÒC2·þÎñÆ÷ £¬²¢ÀûÓü±¾çͨÁ¿DNSÔڶ̹¦·òÄÚÂÖ»»¶à¸öIPµØÖ·¡£ 


https://unit42.paloaltonetworks.com/trident-ursa/