Oktaй©ÆäGitHub´æ´¢¿âÔâµ½ºÚ¿Í¹¥»÷Ô´´úÂëй¶
°ä²¼¹¦·ò 2022-12-22
¾Ý12ÔÂ21ÈÕ±¨Â·£¬Éí·ÝÑéÖ¤·þÎñºÍÉí·ÝÓë½Ó¼ûÖÎÀí(IAM)½â¾ö¹æ»®µÄÌṩÉÌOkta°µÊ¾£¬Æä¸öÈËGitHub´æ´¢¿âÔÚ±¾ÔÂÔâµ½ºÚ¿Í¹¥»÷¡£¾µ÷²é£¬ºÚ¿ÍÒѾ¸´ÔìOkta´úÂë´æ´¢¿â£¬µ«²¢Î´Ó°ÏìOkta·þÎñ»ò¿Í»§Êý¾Ý¡£¸ÃÊÂÎñËÆºõ½öÓëOkta Workforce Identity Cloud(WIC)´úÂë´æ´¢¿âÓйأ¬ÓëAuth0 Customer Identity Cloud²úÆ·Î޹ء£½ñÄê9Ô£¬OktaÆìϵÄAuth0Ò²Ôø²úÉúÁËÀàËÆµÄÊý¾Ýй¶ÊÂÎñ¡£
https://www.bleepingcomputer.com/news/security/okta-says-its-github-account-hacked-source-code-stolen/
2¡¢µÂ¹ú¿ç¹ú¹¤Òµ¹«Ë¾ThyssenKrupp AGÔâµ½ÍøÂç¹¥»÷
ýÌå12ÔÂ21ÈÕ±¨Â·£¬µÂ¹ú¿ç¹ú¹¤Òµ¹¤³ÌºÍ¸ÖÌú³ö²ú¹«Ë¾ThyssenKruppй©Æä×ÊÁÏ·þÎñ²¿ºÍ¹«Ë¾×ܲ¿Ôâµ½ÍøÂç¹¥»÷¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÉÐδÅû¶Õâ´Î¹¥»÷µÄÀàÐÍ£¬Ò²Ã»ÓкڿÍÍÅ»ïÐû³Æ¶ÔÕâ´ÎÊÂÕÆ¹Ü£¬µ«¹«Ë¾½²»°ÈËÐû³ÆÃ»º±¼û¾Ýй¶µÄ¼£Ïó¡£Õâ²¢²»ÊǸù«Ë¾µÚÒ»´ÎÔâµ½¹¥»÷£¬2016Ä꣬¾Ý³Æ¶«ÄÏÑǵĺڿÍÍÅ»ïÇÔÈ¡Æä¹«Ë¾»úÃÜ£»2020Äê12Ô£¬ThyssenKrupp Materials¼¯ÍŹ«Ë¾Ôâµ½NetWalkerÀÕË÷ÍÅ»ïµÄ¹¥»÷¡£
https://securityaffairs.co/wordpress/139870/hacking/thyssenkrupp-targeted-cyberattack.html
3¡¢×êÑÐÍŶӳÆRaspberry Robin½üÆÚÕë¶ÔµçÐź͵±¾Ö×éÖ¯
TrendMicroÔÚ12ÔÂ20ÈÕ°ä²¼»ã±¨³Æ·¢ÏÖÁËRaspberry RobinÔÚ½üÆÚÕë¶ÔµçÐź͵±¾Ö×éÖ¯µÄ¹¥»÷»î¶¯¡£¶ñÒâÈí¼þͨ¹ý¶ñÒâUSBÇý¶¯Æ÷½øÐзַ¢£¬µ±Ö¸±ê²åÈëUSBÇý¶¯Æ÷²¢Ë«»÷ÆäÖеÄ.LNKÎļþʱ£¬É豸¾Í»áϰȾ¶ñÒâÈí¼þ¡£¶øºó»áÀÄÓúϷ¨µÄMSIExec.exe¿ÉÖ´ÐÐÎļþ£¬ÏÂÔØÒ»¸ö¶ñÒâµÄMSI×°Ö÷¨Ê½£¬×°ÖÃRaspberry RobinµÄpayload¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þ³¢ÊÔͨ¹ýÐéαµÄpayloadÀ´¹Æ»ó×êÑÐÈËÔ±£¬ÒÔ¼°ÔÚ¼ì²âµ½ËüÔÚɳÏäºÍµ÷ÊÔ¹¤¾ßÖÐÔËÐÐÊ±ÈÆ¹ý¼ì²â¡£
https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html
4¡¢ÐÂÐÍAndroidľÂíBrasDex±»ÓÃÓÚÕë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯
×êÑÐÍŶÓÔÚ12ÔÂ15ÈÕÅû¶ÁËÕë¶Ô°ÍÎ÷½ðÈÚ»ú¹¹µÄÐÂÐÍAndroidľÂíBrasDex¡£BrasDexÓµÓÐÒ»¸ö¸´ÔӵļüÅ̼ͼϵͳ£¬ÒÔ¼°Ò»¸ö׳´óµÄ×Ô¶¯´«Êäϵͳ£¨ATS£©ÒýÇæ¡£¸Ã»î¶¯ÒѳÖÐøÒ»Äê¶à£¬Ëü×î³õ¼ÙÒâAndroidÉèÖÃÀûÓò¢Õë¶Ô°ÍÎ÷ÒøÐÐÀûÓã¬ÔÚ×îеĻÖУ¬ËüÆðÍ·¼ÙÒâÒ»¸öÌØ¶¨µÄÒøÐÐÀûÓ÷¨Ê½£¨Banco Santander BR£©¡£·ÖÎö·¢ÏÖ£¬ÓÃÓÚBrasDexµÄC2»ù´¡ÉèʩҲ±»ÓÃÀ´½ÚÔìCasbaneiro£¬ºóÕßÖØÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸çµÄÒøÐкͼÓÃÜÇ®±Ò·þÎñ¡£
https://www.threatfabric.com/blogs/brasdex-a-new-brazilian-ats-malware.html
5¡¢Á½ÄÐ×ÓÒò´Û¸Ä¿ÏÄáµÏ¹ú¼Ê»ú³¡µÄ³ö×â³µµ÷¶Èϵͳ±»²¶
ýÌå12ÔÂ20Èճƣ¬Á½ÃûÄÐ×ÓÒòÈëÇÖ²¢´Û¸Ä¿ÏÄáµÏ¹ú¼Ê»ú³¡µÄ³ö×â³µµ÷¶Èϵͳ±»²¶£¬²¢Ãæ¶Ô×î¸ß10ÄêµÄ½ûïÀ¡£Æ¾¾Ý¸æ×´Ê飬ÏÖÄê48ËêµÄDaniel AbayevºÍPeter LeymanÔçÔÚ2019Äê9Ô¾ÍÓë¶íÂÞ˹ºÚ¿ÍºÏıÈëÇÖµ÷¶Èϵͳ£¬ÔÊÐí˾»ú¸¶·Ñ²å¶Ó¡£Í¬Ä¹Øß±»Ö¸¿ØÊÔͼÒÔ¸÷À෽ʽÈëÇÖ¸Ãϵͳ£¬Ô̺¬»ß¸ijÈËͨ¹ýUÅÌ×°ÖöñÒâÈí¼þ£¬Ê¹ÓÃWi-FiÏνӽøÈë¸Ãϵͳ£¬ÒÔ¼°ÍµÇÔÏνӵ½¸Ãƽ̨µÄƽ°åµçÄÔ¡£¼ì²ì¹Ù³Æ£¬ËûÃÇÿÌì²ß¶¯¶à´ï1000´Î¼Ó¿ì²å¶Ó£¬ÆäÖÐ100000ÃÀÔªµÄÊÕÒæ±»»ã¸øÁ˶íÂÞ˹µÄͬı¡£
https://therecord.media/russian-hackers-accessed-jfk-airport-taxi-software-port-authority/
6¡¢Unit 42°ä²¼¹ØÓÚGamaredonµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
12ÔÂ20ÈÕ£¬Unit 42°ä²¼Á˹ØÓÚ¶íÂÞ˹ÍÅ»ïGamaredon¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£Unit 42¶Ô¸ÃÍÅ»ïµÄ³ÖÐø¼à¿Ø·¢ÏÖÁË500¶à¸öÐÂÓòºÍ200¸ö¶ñÒâÈí¼þÑù±¾£¬²¢·¢ÏÔìäÕ½ÊõÔÚ´Óǰ10¸öÔÂÖвúÉúÁËÂÅ´Îת±ä¡£ÔÚÉó²é¸ÃÍÅ»ïµÄIoCÆÚ¼ä£¬×êÑÐÈËÔ±·¢ÏÖÁËËüÔÚ8ÔÂ30ÈÕÊÔͼ¹¥»÷±±Ô¼³ÉÔ±¹úÄÚÒ»¼Ò´óÐÍʯÓ;«±Ù¹«Ë¾µÄ»î¶¯£¬µ«ÊÇûÓгɹ¦¡£´Ë±í£¬¸ÃÍŻﻹʹÓÃTelegramÒ³Ãæ²éÕÒC2·þÎñÆ÷£¬²¢ÀûÓü±¾çͨÁ¿DNSÔڶ̹¦·òÄÚÂÖ»»¶à¸öIPµØÖ·¡£
https://unit42.paloaltonetworks.com/trident-ursa/


¾©¹«Íø°²±¸11010802024551ºÅ