CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î

Ðû²¼Ê±¼ä 2022-12-15
1¡¢CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î

      

12ÔÂ13ÈÕ£¬£¬£¬CitrixÐÞ¸´ÁËCitrixÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ºÍGatewayÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27518£©¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾ­¼ì²âµ½Ê¹ÓôËÎó²îµÄÕë¶ÔÐÔ¹¥»÷»î¶¯£¬£¬£¬½¨Òé¿Í»§¾¡¿ì×°ÖøüС£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)ÔÚ±¾ÖܶþÌåÏÖ£¬£¬£¬¹¥»÷ÍÅ»ïAPT5Ò»Ö±ÔÚʹÓÃCitrix ADCºÍGatewayÖеÄÁãÈÕÎó²îÀ´Ð®ÖÆÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¿ÉÊÇ£¬£¬£¬ÏëҪʹÓøÃÎó²îÐèÒª½«ADC»òGateway×°±¸ÉèÖÃΪ SAML SP£¨SAML ЧÀÍÌṩÉÌ£©»òSAML IdP£¨SAMLÉí·ÝÌṩÉÌ£©¡£¡£¡£


https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518 


2¡¢¼ÓÖÝÐÅ¿¨´¦Öóͷ£¹«Ë¾ÒòÉèÖùýʧ900ÍòÌõÉúÒâ¼Í¼й¶

      

ýÌå12ÔÂ13Èճƣ¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öδÊܱ£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬ÆäÖаüÀ¨9098506ÌõÐÅÓÿ¨ÉúÒâ¼Í¼¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬Ð¡ÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢Ò²±»Ì»Â¶ÔÚÉèÖùýʧµÄЧÀÍÆ÷ÉÏ£¬£¬£¬Ã»ÓÐÈκÎÃÜÂë»òÇå¾²Éí·ÝÑéÖ¤¡£¡£¡£¸ÃÊý¾Ý¿â±»È·¶¨ÊôÓÚCornerstone Payment Systems£¬£¬£¬ÕâÊÇÒ»¼ÒλÓÚ¼ÓÀû¸£ÄáÑǵÄÐÅÓÿ¨´¦Öóͷ£¹«Ë¾¡£¡£¡£¸ÃÊÂÎñй¶ÁËÐÅÓÿ¨ºÅ¡¢ÕË»§»òÉúÒâÐÅÏ¢¡¢ÐÕÃû¡¢Çå¾²»ò»á¼ûÁîÅÆÒÔ¼°ÉúÒâÐÅÏ¢µÈ£¬£¬£¬¿É±»ÓÃÀ´¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£»£»£»ñϤÎÊÌâºó£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦½ÓÄÉÐж¯±£»£»£»¤Ð§ÀÍÆ÷¡£¡£¡£


https://www.hackread.com/exposed-credit-card-transaction-records/


3¡¢ºÚ¿ÍÔÚ°µÍøÉϳöÊÛFBI InfraGardÊýÍòÓû§µÄÊý¾Ý¿â

      

¾Ý12ÔÂ13ÈÕ±¨µÀ£¬£¬£¬InfraGardµÄ80000¶àÃû³ÉÔ±µÄÁªÏµÐÅÏ¢Êý¾Ý¿âÔÚ°µÍøBreachedÉϱ»¹ûÕæ³öÊÛ¡£¡£¡£Í¬Ê±£¬£¬£¬ºÚ¿Í»¹Í¨¹ýInfraGardÃÅ»§ÍøÕ¾Ö±½ÓÓë»áÔ±¾ÙÐÐÔÚÏß½»Á÷£¬£¬£¬²¢Ê¹ÓÃÒ»¸öÓÉFBI×Ô¼ºÉóºËµÄ½ðÈÚÒµCEOµÄ¼ÙÉí·ÝµÄÐÂÕË»§¡£¡£¡£InfraGardÊÇFBIÔËÐеÄÒ»¸öÏîÄ¿£¬£¬£¬Ö¼ÔÚÓë˽Ӫ²¿·Ö½¨ÉèÍøÂçºÍÎïÀíÍþвÐÅÏ¢¹²ÏíÏàÖú¹ØÏµ¡£¡£¡£FBIÌåÏÖ£¬£¬£¬ËüÒѾ­ÖªµÀDZÔÚµÄÐéαÕË»§£¬£¬£¬²¢ÕýÔÚÆð¾¢ÊÓ²ì´ËÊ£¬£¬£¬ÏÖÔÚÎÞ·¨ÌṩÈκÎÌØÊâÐÅÏ¢¡£¡£¡£


https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/


4¡¢µçÐŹ«Ë¾TPG TelecomÉÏÍò¸ö¿Í»§ÓÊÏäÔ⵽δÊÚȨ»á¼û

      

·͸Éç12ÔÂ14ÈÕ±¨µÀ³Æ£¬£¬£¬°Ä´óÀûÑǵçÐŹ«Ë¾TPG TelecomÔâµ½ÍøÂç¹¥»÷£¬£¬£¬¶à´ï15000¸öÆóÒµ¿Í»§µÄµç×ÓÓʼþ±»Î´ÊÚȨ»á¼û¡£¡£¡£TPGÌåÏÖ£¬£¬£¬ºÚ¿Í¹¥»÷ÍйÜÉúÒâËùЧÀ͵ÄÖ÷ҪĿµÄÊÇΪÁËËÑË÷¿Í»§µÄ¼ÓÃÜÇ®±ÒºÍ½ðÈÚÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄɲ½·¥×èֹδ¾­ÊÚȨµÄ»á¼û£¬£¬£¬²¢ÕýÔÚÁªÏµËùÓÐÊÜ´ËÊÂÎñÓ°ÏìµÄ¿Í»§¡£¡£¡£Æä¹É¼ÛÊÜ´ËÐÂÎÅÓ°Ïìϵø£¬£¬£¬ÊÕÅÌϵø 2.8%¡£¡£¡£×Ô10ÔÂÒÔÀ´£¬£¬£¬ÖÁÉÙÓÐ8¼Ò°Ä´óÀûÑǹ«Ë¾Ôâµ½Á˺ڿ͹¥»÷¡£¡£¡£


https://www.reuters.com/world/asia-pacific/tpg-telecom-finds-evidence-unauthorised-access-up-15000-email-accounts-2022-12-13/


5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚ5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄÖ¸ÄÏ

      

12ÔÂ13ÈÕ£¬£¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)ÁªºÏÐû²¼ÁË5GÍøÂçÇÐÆ¬µÄDZÔÚÍþвµÄÖ¸ÄÏ¡£¡£¡£¸ÃÖ¸ÄÏÒÔESFÓÚ2021ÄêÐû²¼µÄ5G»ù´¡ÉèÊ©µÄDZÔÚÍþвΪ»ù´¡£¬£¬£¬ÏÈÈÝÁËÓë5GÍøÂçÇÐÆ¬Ïà¹ØµÄÀûÒæºÍΣº¦£¬£¬£¬Ëü»¹ÌṩÏàʶ¾ö5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄ»º½âÕ½ÂÔ¡£¡£¡£CISAÃãÀø5GÌṩÉÌ¡¢¼¯³ÉÉ̺ÍÍøÂçÔËÓªÉÌÉó²é±¾Ö¸Äϲ¢ÊµÑ齨ÒéµÄ»º½â²½·¥¡£¡£¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network


6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

      

FortinetÔÚ12ÔÂ12ÈÕÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£GoTrimÊÇ»ùÓÚGoµÄ½©Ê¬ÍøÂ磬£¬£¬Í¨¹ýɨÃèÍøÂçÒÔѰÕÒ×ÔÍйܵÄWordPressÍøÕ¾£¬£¬£¬²¢ÊÔͼ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂë²¢¿ØÖƸÃÍøÕ¾¡£¡£¡£¹¥»÷»î¶¯Ê¼ÓÚ2022Äê9Ô£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£ÕâÖÖ¹¥»÷¿ÉÄܻᵼÖ¶ñÒâÈí¼þ×°Öá¢ÐÅÓÿ¨ÇÔÈ¡¾ç±¾×¢Èë¡¢´¹ÂÚÒ³ÃæµÄÍйÜÒÔ¼°ÆäËüµÄ¹¥»÷³¡¾°£¬£¬£¬Æ¾Ö¤±»ÈëÇÖÍøÕ¾µÄÊܽӴýˮƽ£¬£¬£¬¿ÉÄÜÓ°Ïìµ½Êý°ÙÍòÈË¡£¡£¡£


https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites