FlagstarÒøÐеĹ©¸øÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶
°ä²¼¹¦·ò 2023-10-101¡¢FlagstarÒøÐеĹ©¸øÉÌÔâ¹¥»÷µ¼ÖÂ80¶àÍò¿Í»§ÐÅϢй¶
¾ÝýÌå10ÔÂ8ÈÕ±¨Â·£¬FlagstarÒøÐеĵÚÈý·½·þÎñÌṩÉÌFiservÔâµ½¹¥»÷£¬µ¼Ö´óÁ¿¿Í»§µÄÐÅϢй¶¡£Flagstar´Ë¿Ì¹éŦԼÉçÇøÒøÐÐËùÓУ¬ÔÚÈ¥Äê±»ÊÕ¹ºÖ®Ç°ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬×Ü×ʲú³¬¹ý310ÒÚÃÀÔª¡£FiservÊǸÃÒøÐÐÓÃÓÚÖ§¸¶´¦ÖúÍÒÆ¶¯ÒøÐзþÎñµÄ¹©¸øÉÌ£¬ÆäÔâµ½ÁËCLOPµÄ¹¥»÷¡£ºÚ¿ÍÀûÓÃMOVEit TransferÖеķì϶½Ó¼ûÁËFiservϵͳ£¬²¢ÇÔÈ¡ÁËFlagstarµÄÊý¾Ý£¬¹²Ó°Ïì837390Ãû¿Í»§¡£ÕâÊÇFlagstar×Ô2021Äê3ÔÂÒÔÀ´²úÉúµÄµÄµÚÈýÆðÊý¾Ýй¶ÊÂÎñ¡£
https://www.bleepingcomputer.com/news/security/third-flagstar-bank-data-breach-since-2021-affects-800-000-customers/
2¡¢Ó¢¹úµç×Ó¹«Ë¾VolexµÄϵͳºÍÊý¾ÝÔ⵽δ¾ÊÚȨ½Ó¼û
10ÔÂ9ÈÕ±¨Â·³Æ£¬Ó¢¹úµç×ÓµçÆø¹«Ë¾ºÀÀûÊ¿£¨Volex£©Ôâµ½ÍøÂç¹¥»÷¡£µ÷²éÏÔʾ£¬¸ÃÊÂÎñÊÇÓÉÓÚ¹«Ë¾Î»ÓÚÈ«ÇòµÄ¶à¸öITϵͳºÍÊý¾ÝÔ⵽δ¾ÊÚȨ½Ó¼ûµ¼Öµġ£¸Ã¹«Ë¾°µÊ¾£¬ËûÃÇÒѲÉÈ¡ÏìÓ¦´ëÊ©½«Ó°Ïì½µÖÁ×îµÍ£¬µ«×êÑÐÈËÔ±ÔÚUTC 13:25:26½Ó¼ûVolexÍøÕ¾Ê±ÏÔʾÒÑÀëÏß¡£Ä¿Ç°£¬¸ÃÍøÕ¾ÒѸ´Ô½Ó¼û¡£VolexÐû³Æ¹¥»÷ÕßÎÞ·¨½Ó¼û²ÆÕþÊý¾Ý£¬¸ÃÊÂÎñûÓÐÔì³É³Á´ó²ÆÕþÓ°Ï죬µ«¸Ã¹«Ë¾µÄ¹É¼ÛÔÚ±¾ÖÜÒ»ÉÏÎçÈÔ×ÅÂäÁË4%×óÓÒ¡£
https://www.hackread.com/uk-power-data-manufacturer-volex-cyberattack/
3¡¢Storm-0324ͨ¹ýTeams»ñµÃ½Ó¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þ
TrellixÔÚ10ÔÂ5ÈÕ¹«¿ªÁËStorm-0324ͨ¹ýTeams»ñµÃ½Ó¼ûȨÏÞ²¢·Ö·¢ÀÕË÷Èí¼þµÄ»î¶¯¡£7ÔÂÉÏÑ®£¬¸ÃÍŻﱻ·¢ÏÔìðͷͨ¹ýMicrosoft Teams·¢ËÍ´¹µöÐÂÎÅ¡£ÔÚ»ñµÃ³õʼ½Ó¼ûȨÏÞºó£¬Storm-0324ʱʱ½«½Ó¼ûȨÏÞÒÆ½»¸øºÚ¿ÍÍÅ»ïSangria Tempest£¨ÓÖ³ÆFIN7£©ºÍTA543£¬ºóÕßͨ³£»áÖ´ÐÐÀÕË÷¹¥»÷¡£×êÑÐÈËÔ±·¢ÏÖ£¬Storm-0324Èç½ñ´«²¼JSSLoader£¬¶øºóÔÙ½«ÔðÈÎת¼Þ¸øÆäËüÀÕË÷ÍŻ
https://www.trellix.com/en-us/about/newsroom/stories/research/storm-0324-an-access-for-the-raas-threat-actor.html
4¡¢X-ForceÅû¶ÀûÓÃNetScaler GatewayµÄÍ´´¦ÍøÂç»î¶¯
10ÔÂ6ÈÕ£¬X-ForceÅû¶ÁËһ·´ó¹æÄ£»î¶¯£¬¹¥»÷ÕßÀûÓÃCitrix NetScaler GatewayÖзì϶£¨CVE-2023-3519£©ÇÔÈ¡Óû§Í´´¦¡£X-ForceÔÚµ÷²é¿Í»§µÄNetScalerÉ豸Éí·ÝÑéÖ¤¿ìÂÊ»ºÂýÎÊÌâʱ³õ´Î·¢ÏÖÁËÕâ´Î»î¶¯¡£µ÷²é·¢ÏÖ£¬ºÚ¿ÍÀûÓ÷ì϶ÔÚÉ豸µÄindex.htmlµÇÂ¼Ò³Ãæ×¢ÈëÁ˶ñÒâÆ¾Ö¤ÇÔÈ¡JavaScript¾ç±¾¡£¹¥»÷ÕßΪ´Ë»î¶¯×¢²áÁ˶à¸öÓòÃû£¬X-ForceÒѼø±ð³ö½ü600¸öÍйÜÅú¸ÄºóµÄNetScaler GatewayµÇÂ¼Ò³ÃæµÄIPµØÖ·£¬ÖØÒª¼¯ÖÐÔÚÃÀ¹úºÍÅ·ÖÞ¡£µÇÂ¼Ò³Ãæ×îÔçµÄÅú¸Ä¹¦·òÊÇ8ÔÂ11ÈÕ£¬Òò¶ø¸Ã»î¶¯ÒѾ½øÐÐÁËÁ½¸öÔ¡£
https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/
5¡¢ÊØ»¤ÕßÅû¶curlÖеÄÁ½¸ö°²È«·ì϶²¢Ð¹Â©¼´½«°ä²¼²¹¶¡
¾Ý10ÔÂ9ÈÕ±¨Â·£¬curlµÄÊØ»¤ÕßDaniel StenbergÅû¶Á˸ÿªÔ´¹¤¾ßÖдæÔÚµÄÁ½¸ö°²È«·ì϶¡£ÆäÖУ¬2023-38545ͬʱӰÏìÁËcurl¼°Æä¿âlibcurl£¬±»³ÆÎª³Ö¾ÃÒÔÀ´×îÑϳÁµÄcurl°²È«·ì϶¡£ÁíÒ»¸ö·ì϶ΪCVE-2023-38546£¬½öÓ°Ïìlibcurl¡£×êÑÐÈËÔ±ÉÐδй©Óйطì϶ºÍÊÜÓ°Ïì°æ¼¼ÇÉÓòµÄ¸ü¶àÐÅÏ¢£¬µ«°µÊ¾Ð°汾curl 8.4.0ÒÔ¼°ÓйØÁ½¸ö·ì϶µÄ¾ßÌåÐÅÏ¢½«ÓÚ10ÔÂ11ÈÕ06:00×óÓÒ°ä²¼¡£
https://therecord.media/curl-vulnerabilities-to-be-announced-open-source
6¡¢Sentinelone°ä²¼ÐÂÀÕË÷Èí¼þLostTrustµÄ·ÖÎö»ã±¨
10ÔÂ5ÈÕ£¬Sentinelone°ä²¼Á˹ØÓÚÐÂÀÕË÷Èí¼þLostTrustµÄ·ÖÎö»ã±¨¡£LostTrustÊÇ9·ÝÔ³öÏÖµÄÒ»ÖÖеĶà³ÁÀÕË÷ÍŻÆäÍøÕ¾ÖÐÏÔʾËûÃÇÊÇ"×Ô³ÆÎªÍøÂ簲ȫÁìÓòר¼ÒµÄÄêÇáÈË"¡£¶ÔÆäpayloadµÄ·ÖÎöÅú×¢£¬¸ÃϵÁÐÊÇSFileºÍMindwareµÄ½ø»¯°æ£¬²¢ÇÒÈýÕß¶¼×ñÑÓëMetaEncryptorÀàËÆµÄÔË×÷ºÍ¼¼Êõ·½Ê½¡£LostTrustµÄÍøÕ¾ºÍMetaEncryptorÔçÆÚµÄÍøÕ¾Ò²ºÜÀàËÆ£¬¶øMetaEncryptor»î¶¯ÖÐʹÓõÄSFile¼ÓÃÜÆ÷ÔÚLostTrustÖÐÈÔÔÚʹÓá£
https://www.sentinelone.com/blog/losttrust-ransomware-latest-multi-extortion-threat-shares-traits-with-sfile-and-mindware/


¾©¹«Íø°²±¸11010802024551ºÅ