CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î
Ðû²¼Ê±¼ä 2022-12-15
12ÔÂ13ÈÕ£¬CitrixÐÞ¸´ÁËCitrixÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ºÍGatewayÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27518£©¡£¸Ã¹«Ë¾³ÆÒѾ¼ì²âµ½Ê¹ÓôËÎó²îµÄÕë¶ÔÐÔ¹¥»÷Ô˶¯£¬½¨Òé¿Í»§¾¡¿ì×°ÖøüС£ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)ÔÚ±¾ÖܶþÌåÏÖ£¬¹¥»÷ÍÅ»ïAPT5Ò»Ö±ÔÚʹÓÃCitrix ADCºÍGatewayÖеÄÁãÈÕÎó²îÀ´Ð®ÖÆÊÜÓ°ÏìµÄϵͳ¡£¿ÉÊÇ£¬ÏëҪʹÓøÃÎó²îÐèÒª½«ADC»òGateway×°±¸ÉèÖÃΪ SAML SP£¨SAML ·þÎñÌṩÉÌ£©»òSAML IdP£¨SAMLÉí·ÝÌṩÉÌ£©¡£
https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518
2¡¢¼ÓÖÝÐÅ¿¨´¦Öóͷ£¹«Ë¾ÒòÉèÖùýʧ900ÍòÌõÉúÒâ¼Í¼й¶
ýÌå12ÔÂ13Èճƣ¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öδÊܱ£»¤µÄÊý¾Ý¿â£¬ÆäÖаüÀ¨9098506ÌõÐÅÓÿ¨ÉúÒâ¼Í¼¡£¸üÔã¸âµÄÊÇ£¬Ð¡ÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢Ò²±»Ì»Â¶ÔÚÉèÖùýʧµÄ·þÎñÆ÷ÉÏ£¬Ã»ÓÐÈκÎÃÜÂë»òÇå¾²Éí·ÝÑéÖ¤¡£¸ÃÊý¾Ý¿â±»È·¶¨ÊôÓÚCornerstone Payment Systems£¬ÕâÊÇÒ»¼ÒλÓÚ¼ÓÀû¸£ÄáÑǵÄÐÅÓÿ¨´¦Öóͷ£¹«Ë¾¡£¸ÃÊÂÎñй¶ÁËÐÅÓÿ¨ºÅ¡¢ÕË»§»òÉúÒâÐÅÏ¢¡¢ÐÕÃû¡¢Çå¾²»ò»á¼ûÁîÅÆÒÔ¼°ÉúÒâÐÅÏ¢µÈ£¬¿É±»ÓÃÀ´¾ÙÐд¹ÂÚ¹¥»÷¡£»ñϤÎÊÌâºó£¬¸Ã¹«Ë¾Á¬Ã¦½ÓÄÉÐж¯±£»¤·þÎñÆ÷¡£
https://www.hackread.com/exposed-credit-card-transaction-records/
3¡¢ºÚ¿ÍÔÚ°µÍøÉϳöÊÛFBI InfraGardÊýÍòÓû§µÄÊý¾Ý¿â
¾Ý12ÔÂ13ÈÕ±¨µÀ£¬InfraGardµÄ80000¶àÃû³ÉÔ±µÄÁªÏµÐÅÏ¢Êý¾Ý¿âÔÚ°µÍøBreachedÉϱ»¹ûÕæ³öÊÛ¡£Í¬Ê±£¬ºÚ¿Í»¹Í¨¹ýInfraGardÃÅ»§ÍøÕ¾Ö±½ÓÓë»áÔ±¾ÙÐÐÔÚÏß½»Á÷£¬²¢Ê¹ÓÃÒ»¸öÓÉFBI×Ô¼ºÉóºËµÄ½ðÈÚÒµCEOµÄ¼ÙÉí·ÝµÄÐÂÕË»§¡£InfraGardÊÇFBIÔËÐеÄÒ»¸öÏîÄ¿£¬Ö¼ÔÚÓë˽Ӫ²¿·Ö½¨ÉèÍøÂçºÍÎïÀíÍþвÐÅÏ¢¹²ÏíÏàÖú¹ØÏµ¡£FBIÌåÏÖ£¬ËüÒѾ֪µÀDZÔÚµÄÐéαÕË»§£¬²¢ÕýÔÚÆð¾¢ÊÓ²ì´ËÊ£¬ÏÖÔÚÎÞ·¨ÌṩÈκÎÌØÊâÐÅÏ¢¡£
https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/
4¡¢µçÐŹ«Ë¾TPG TelecomÉÏÍò¸ö¿Í»§ÓÊÏäÔ⵽δÊÚȨ»á¼û
·͸Éç12ÔÂ14ÈÕ±¨µÀ³Æ£¬°Ä´óÀûÑǵçÐŹ«Ë¾TPG TelecomÔâµ½ÍøÂç¹¥»÷£¬¶à´ï15000¸öÆóÒµ¿Í»§µÄµç×ÓÓʼþ±»Î´ÊÚȨ»á¼û¡£TPGÌåÏÖ£¬ºÚ¿Í¹¥»÷ÍйÜÉúÒâËù·þÎñµÄÖ÷ҪĿµÄÊÇΪÁËËÑË÷¿Í»§µÄ¼ÓÃÜÇ®±ÒºÍ½ðÈÚÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄɲ½·¥×èֹδ¾ÊÚȨµÄ»á¼û£¬²¢ÕýÔÚÁªÏµËùÓÐÊÜ´ËÊÂÎñÓ°ÏìµÄ¿Í»§¡£Æä¹É¼ÛÊÜ´ËÐÂÎÅÓ°Ïìϵø£¬ÊÕÅÌϵø 2.8%¡£×Ô10ÔÂÒÔÀ´£¬ÖÁÉÙÓÐ8¼Ò°Ä´óÀûÑǹ«Ë¾Ôâµ½Á˺ڿ͹¥»÷¡£
https://www.reuters.com/world/asia-pacific/tpg-telecom-finds-evidence-unauthorised-access-up-15000-email-accounts-2022-12-13/
5¡¢CISAµÈ»ú¹¹ÍŽáÐû²¼¹ØÓÚ5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄÖ¸ÄÏ
12ÔÂ13ÈÕ£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)ÍŽáÐû²¼ÁË5GÍøÂçÇÐÆ¬µÄDZÔÚÍþвµÄÖ¸ÄÏ¡£¸ÃÖ¸ÄÏÒÔESFÓÚ2021ÄêÐû²¼µÄ5G»ù´¡ÉèÊ©µÄDZÔÚÍþвΪ»ù´¡£¬ÏÈÈÝÁËÓë5GÍøÂçÇÐÆ¬Ïà¹ØµÄÀûÒæºÍΣº¦£¬Ëü»¹ÌṩÏàʶ¾ö5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄ»º½âÕ½ÂÔ¡£CISAÃãÀø5GÌṩÉÌ¡¢¼¯³ÉÉ̺ÍÍøÂçÔËÓªÉÌÉó²é±¾Ö¸Äϲ¢ÊµÑ齨ÒéµÄ»º½â²½·¥¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network
6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
FortinetÔÚ12ÔÂ12ÈÕÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£GoTrimÊÇ»ùÓÚGoµÄ½©Ê¬ÍøÂ磬ͨ¹ýɨÃèÍøÂçÒÔѰÕÒ×ÔÍйܵÄWordPressÍøÕ¾£¬²¢ÊÔͼ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂë²¢¿ØÖƸÃÍøÕ¾¡£¹¥»÷Ô˶¯Ê¼ÓÚ2022Äê9Ô£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£ÕâÖÖ¹¥»÷¿ÉÄܻᵼÖ¶ñÒâÈí¼þ×°Öá¢ÐÅÓÿ¨ÇÔÈ¡¾ç±¾×¢Èë¡¢´¹ÂÚÒ³ÃæµÄÍйÜÒÔ¼°ÆäËüµÄ¹¥»÷³¡¾°£¬Æ¾Ö¤±»ÈëÇÖÍøÕ¾µÄÊܽӴýˮƽ£¬¿ÉÄÜÓ°Ïìµ½Êý°ÙÍòÈË¡£
https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites


¾©¹«Íø°²±¸11010802024551ºÅ