CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î

Ðû²¼Ê±¼ä 2022-12-15
1¡¢CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î

      

12ÔÂ13ÈÕ£¬ £¬£¬£¬£¬CitrixÐÞ¸´ÁËCitrixÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ºÍGatewayÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27518£©¡£¡£¸Ã¹«Ë¾³ÆÒѾ­¼ì²âµ½Ê¹ÓôËÎó²îµÄÕë¶ÔÐÔ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬½¨Òé¿Í»§¾¡¿ì×°ÖøüС£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)ÔÚ±¾ÖܶþÌåÏÖ£¬ £¬£¬£¬£¬¹¥»÷ÍÅ»ïAPT5Ò»Ö±ÔÚʹÓÃCitrix ADCºÍGatewayÖеÄÁãÈÕÎó²îÀ´Ð®ÖÆÊÜÓ°ÏìµÄϵͳ¡£¡£¿ÉÊÇ£¬ £¬£¬£¬£¬ÏëҪʹÓøÃÎó²îÐèÒª½«ADC»òGateway×°±¸ÉèÖÃΪ SAML SP£¨SAML ЧÀÍÌṩÉÌ£©»òSAML IdP£¨SAMLÉí·ÝÌṩÉÌ£©¡£¡£


https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518 


2¡¢¼ÓÖÝÐÅ¿¨´¦Öóͷ£¹«Ë¾ÒòÉèÖùýʧ900ÍòÌõÉúÒâ¼Í¼й¶

      

ýÌå12ÔÂ13Èճƣ¬ £¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öδÊܱ£»£»£»£»£»¤µÄÊý¾Ý¿â£¬ £¬£¬£¬£¬ÆäÖаüÀ¨9098506ÌõÐÅÓÿ¨ÉúÒâ¼Í¼¡£¡£¸üÔã¸âµÄÊÇ£¬ £¬£¬£¬£¬Ð¡ÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢Ò²±»Ì»Â¶ÔÚÉèÖùýʧµÄЧÀÍÆ÷ÉÏ£¬ £¬£¬£¬£¬Ã»ÓÐÈκÎÃÜÂë»òÇå¾²Éí·ÝÑéÖ¤¡£¡£¸ÃÊý¾Ý¿â±»È·¶¨ÊôÓÚCornerstone Payment Systems£¬ £¬£¬£¬£¬ÕâÊÇÒ»¼ÒλÓÚ¼ÓÀû¸£ÄáÑǵÄÐÅÓÿ¨´¦Öóͷ£¹«Ë¾¡£¡£¸ÃÊÂÎñй¶ÁËÐÅÓÿ¨ºÅ¡¢ÕË»§»òÉúÒâÐÅÏ¢¡¢ÐÕÃû¡¢Çå¾²»ò»á¼ûÁîÅÆÒÔ¼°ÉúÒâÐÅÏ¢µÈ£¬ £¬£¬£¬£¬¿É±»ÓÃÀ´¾ÙÐд¹ÂÚ¹¥»÷¡£¡£»£»£»£»£»ñϤÎÊÌâºó£¬ £¬£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦½ÓÄÉÐж¯±£»£»£»£»£»¤Ð§ÀÍÆ÷¡£¡£


https://www.hackread.com/exposed-credit-card-transaction-records/


3¡¢ºÚ¿ÍÔÚ°µÍøÉϳöÊÛFBI InfraGardÊýÍòÓû§µÄÊý¾Ý¿â

      

¾Ý12ÔÂ13ÈÕ±¨µÀ£¬ £¬£¬£¬£¬InfraGardµÄ80000¶àÃû³ÉÔ±µÄÁªÏµÐÅÏ¢Êý¾Ý¿âÔÚ°µÍøBreachedÉϱ»¹ûÕæ³öÊÛ¡£¡£Í¬Ê±£¬ £¬£¬£¬£¬ºÚ¿Í»¹Í¨¹ýInfraGardÃÅ»§ÍøÕ¾Ö±½ÓÓë»áÔ±¾ÙÐÐÔÚÏß½»Á÷£¬ £¬£¬£¬£¬²¢Ê¹ÓÃÒ»¸öÓÉFBI×Ô¼ºÉóºËµÄ½ðÈÚÒµCEOµÄ¼ÙÉí·ÝµÄÐÂÕË»§¡£¡£InfraGardÊÇFBIÔËÐеÄÒ»¸öÏîÄ¿£¬ £¬£¬£¬£¬Ö¼ÔÚÓë˽Ӫ²¿·Ö½¨ÉèÍøÂçºÍÎïÀíÍþвÐÅÏ¢¹²ÏíÏàÖú¹ØÏµ¡£¡£FBIÌåÏÖ£¬ £¬£¬£¬£¬ËüÒѾ­ÖªµÀDZÔÚµÄÐéαÕË»§£¬ £¬£¬£¬£¬²¢ÕýÔÚÆð¾¢ÊÓ²ì´ËÊ£¬ £¬£¬£¬£¬ÏÖÔÚÎÞ·¨ÌṩÈκÎÌØÊâÐÅÏ¢¡£¡£


https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/


4¡¢µçÐŹ«Ë¾TPG TelecomÉÏÍò¸ö¿Í»§ÓÊÏäÔ⵽δÊÚȨ»á¼û

      

·͸Éç12ÔÂ14ÈÕ±¨µÀ³Æ£¬ £¬£¬£¬£¬°Ä´óÀûÑǵçÐŹ«Ë¾TPG TelecomÔâµ½ÍøÂç¹¥»÷£¬ £¬£¬£¬£¬¶à´ï15000¸öÆóÒµ¿Í»§µÄµç×ÓÓʼþ±»Î´ÊÚȨ»á¼û¡£¡£TPGÌåÏÖ£¬ £¬£¬£¬£¬ºÚ¿Í¹¥»÷ÍйÜÉúÒâËùЧÀ͵ÄÖ÷ҪĿµÄÊÇΪÁËËÑË÷¿Í»§µÄ¼ÓÃÜÇ®±ÒºÍ½ðÈÚÐÅÏ¢¡£¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄɲ½·¥×èֹδ¾­ÊÚȨµÄ»á¼û£¬ £¬£¬£¬£¬²¢ÕýÔÚÁªÏµËùÓÐÊÜ´ËÊÂÎñÓ°ÏìµÄ¿Í»§¡£¡£Æä¹É¼ÛÊÜ´ËÐÂÎÅÓ°Ïìϵø£¬ £¬£¬£¬£¬ÊÕÅÌϵø 2.8%¡£¡£×Ô10ÔÂÒÔÀ´£¬ £¬£¬£¬£¬ÖÁÉÙÓÐ8¼Ò°Ä´óÀûÑǹ«Ë¾Ôâµ½Á˺ڿ͹¥»÷¡£¡£


https://www.reuters.com/world/asia-pacific/tpg-telecom-finds-evidence-unauthorised-access-up-15000-email-accounts-2022-12-13/


5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚ5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄÖ¸ÄÏ

      

12ÔÂ13ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)ÁªºÏÐû²¼ÁË5GÍøÂçÇÐÆ¬µÄDZÔÚÍþвµÄÖ¸ÄÏ¡£¡£¸ÃÖ¸ÄÏÒÔESFÓÚ2021ÄêÐû²¼µÄ5G»ù´¡ÉèÊ©µÄDZÔÚÍþвΪ»ù´¡£¬ £¬£¬£¬£¬ÏÈÈÝÁËÓë5GÍøÂçÇÐÆ¬Ïà¹ØµÄÀûÒæºÍΣº¦£¬ £¬£¬£¬£¬Ëü»¹ÌṩÏàʶ¾ö5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄ»º½âÕ½ÂÔ¡£¡£CISAÃãÀø5GÌṩÉÌ¡¢¼¯³ÉÉ̺ÍÍøÂçÔËÓªÉÌÉó²é±¾Ö¸Äϲ¢ÊµÑ齨ÒéµÄ»º½â²½·¥¡£¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network


6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

      

FortinetÔÚ12ÔÂ12ÈÕÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£GoTrimÊÇ»ùÓÚGoµÄ½©Ê¬ÍøÂ磬 £¬£¬£¬£¬Í¨¹ýɨÃèÍøÂçÒÔѰÕÒ×ÔÍйܵÄWordPressÍøÕ¾£¬ £¬£¬£¬£¬²¢ÊÔͼ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂë²¢¿ØÖƸÃÍøÕ¾¡£¡£¹¥»÷»î¶¯Ê¼ÓÚ2022Äê9Ô£¬ £¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£ÕâÖÖ¹¥»÷¿ÉÄܻᵼÖ¶ñÒâÈí¼þ×°Öá¢ÐÅÓÿ¨ÇÔÈ¡¾ç±¾×¢Èë¡¢´¹ÂÚÒ³ÃæµÄÍйÜÒÔ¼°ÆäËüµÄ¹¥»÷³¡¾°£¬ £¬£¬£¬£¬Æ¾Ö¤±»ÈëÇÖÍøÕ¾µÄÊܽӴýˮƽ£¬ £¬£¬£¬£¬¿ÉÄÜÓ°Ïìµ½Êý°ÙÍòÈË¡£¡£


https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites