CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î

Ðû²¼Ê±¼ä 2022-12-15
1¡¢CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î

      

12ÔÂ13ÈÕ £¬£¬£¬CitrixÐÞ¸´ÁËCitrixÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ºÍGatewayÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27518£©¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾ­¼ì²âµ½Ê¹ÓôËÎó²îµÄÕë¶ÔÐÔ¹¥»÷»î¶¯ £¬£¬£¬½¨Òé¿Í»§¾¡¿ì×°ÖøüС£¡£¡£¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)ÔÚ±¾ÖܶþÌåÏÖ £¬£¬£¬¹¥»÷ÍÅ»ïAPT5Ò»Ö±ÔÚʹÓÃCitrix ADCºÍGatewayÖеÄÁãÈÕÎó²îÀ´Ð®ÖÆÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£¡£¡£¿ÉÊÇ £¬£¬£¬ÏëҪʹÓøÃÎó²îÐèÒª½«ADC»òGateway×°±¸ÉèÖÃΪ SAML SP£¨SAML ЧÀÍÌṩÉÌ£©»òSAML IdP£¨SAMLÉí·ÝÌṩÉÌ£©¡£¡£¡£¡£¡£¡£


https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518 


2¡¢¼ÓÖÝÐÅ¿¨´¦Öóͷ£¹«Ë¾ÒòÉèÖùýʧ900ÍòÌõÉúÒâ¼Í¼й¶

      

ýÌå12ÔÂ13ÈÕ³Æ £¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öδÊܱ£»£»£»£»£»¤µÄÊý¾Ý¿â £¬£¬£¬ÆäÖаüÀ¨9098506ÌõÐÅÓÿ¨ÉúÒâ¼Í¼¡£¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ £¬£¬£¬Ð¡ÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢Ò²±»Ì»Â¶ÔÚÉèÖùýʧµÄЧÀÍÆ÷ÉÏ £¬£¬£¬Ã»ÓÐÈκÎÃÜÂë»òÇå¾²Éí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â±»È·¶¨ÊôÓÚCornerstone Payment Systems £¬£¬£¬ÕâÊÇÒ»¼ÒλÓÚ¼ÓÀû¸£ÄáÑǵÄÐÅÓÿ¨´¦Öóͷ£¹«Ë¾¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñй¶ÁËÐÅÓÿ¨ºÅ¡¢ÕË»§»òÉúÒâÐÅÏ¢¡¢ÐÕÃû¡¢Çå¾²»ò»á¼ûÁîÅÆÒÔ¼°ÉúÒâÐÅÏ¢µÈ £¬£¬£¬¿É±»ÓÃÀ´¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£»£»£»£»£»ñϤÎÊÌâºó £¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦½ÓÄÉÐж¯±£»£»£»£»£»¤Ð§ÀÍÆ÷¡£¡£¡£¡£¡£¡£


https://www.hackread.com/exposed-credit-card-transaction-records/


3¡¢ºÚ¿ÍÔÚ°µÍøÉϳöÊÛFBI InfraGardÊýÍòÓû§µÄÊý¾Ý¿â

      

¾Ý12ÔÂ13ÈÕ±¨µÀ £¬£¬£¬InfraGardµÄ80000¶àÃû³ÉÔ±µÄÁªÏµÐÅÏ¢Êý¾Ý¿âÔÚ°µÍøBreachedÉϱ»¹ûÕæ³öÊÛ¡£¡£¡£¡£¡£¡£Í¬Ê± £¬£¬£¬ºÚ¿Í»¹Í¨¹ýInfraGardÃÅ»§ÍøÕ¾Ö±½ÓÓë»áÔ±¾ÙÐÐÔÚÏß½»Á÷ £¬£¬£¬²¢Ê¹ÓÃÒ»¸öÓÉFBI×Ô¼ºÉóºËµÄ½ðÈÚÒµCEOµÄ¼ÙÉí·ÝµÄÐÂÕË»§¡£¡£¡£¡£¡£¡£InfraGardÊÇFBIÔËÐеÄÒ»¸öÏîÄ¿ £¬£¬£¬Ö¼ÔÚÓë˽Ӫ²¿·Ö½¨ÉèÍøÂçºÍÎïÀíÍþвÐÅÏ¢¹²ÏíÏàÖú¹ØÏµ¡£¡£¡£¡£¡£¡£FBIÌåÏÖ £¬£¬£¬ËüÒѾ­ÖªµÀDZÔÚµÄÐéαÕË»§ £¬£¬£¬²¢ÕýÔÚÆð¾¢ÊÓ²ì´ËÊ £¬£¬£¬ÏÖÔÚÎÞ·¨ÌṩÈκÎÌØÊâÐÅÏ¢¡£¡£¡£¡£¡£¡£


https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/


4¡¢µçÐŹ«Ë¾TPG TelecomÉÏÍò¸ö¿Í»§ÓÊÏäÔ⵽δÊÚȨ»á¼û

      

·͸Éç12ÔÂ14ÈÕ±¨µÀ³Æ £¬£¬£¬°Ä´óÀûÑǵçÐŹ«Ë¾TPG TelecomÔâµ½ÍøÂç¹¥»÷ £¬£¬£¬¶à´ï15000¸öÆóÒµ¿Í»§µÄµç×ÓÓʼþ±»Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£TPGÌåÏÖ £¬£¬£¬ºÚ¿Í¹¥»÷ÍйÜÉúÒâËùЧÀ͵ÄÖ÷ҪĿµÄÊÇΪÁËËÑË÷¿Í»§µÄ¼ÓÃÜÇ®±ÒºÍ½ðÈÚÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄɲ½·¥×èֹδ¾­ÊÚȨµÄ»á¼û £¬£¬£¬²¢ÕýÔÚÁªÏµËùÓÐÊÜ´ËÊÂÎñÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£¡£Æä¹É¼ÛÊÜ´ËÐÂÎÅÓ°Ïìϵø £¬£¬£¬ÊÕÅÌϵø 2.8%¡£¡£¡£¡£¡£¡£×Ô10ÔÂÒÔÀ´ £¬£¬£¬ÖÁÉÙÓÐ8¼Ò°Ä´óÀûÑǹ«Ë¾Ôâµ½Á˺ڿ͹¥»÷¡£¡£¡£¡£¡£¡£


https://www.reuters.com/world/asia-pacific/tpg-telecom-finds-evidence-unauthorised-access-up-15000-email-accounts-2022-12-13/


5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚ5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄÖ¸ÄÏ

      

12ÔÂ13ÈÕ £¬£¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)ÁªºÏÐû²¼ÁË5GÍøÂçÇÐÆ¬µÄDZÔÚÍþвµÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÒÔESFÓÚ2021ÄêÐû²¼µÄ5G»ù´¡ÉèÊ©µÄDZÔÚÍþвΪ»ù´¡ £¬£¬£¬ÏÈÈÝÁËÓë5GÍøÂçÇÐÆ¬Ïà¹ØµÄÀûÒæºÍΣº¦ £¬£¬£¬Ëü»¹ÌṩÏàʶ¾ö5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄ»º½âÕ½ÂÔ¡£¡£¡£¡£¡£¡£CISAÃãÀø5GÌṩÉÌ¡¢¼¯³ÉÉ̺ÍÍøÂçÔËÓªÉÌÉó²é±¾Ö¸Äϲ¢ÊµÑ齨ÒéµÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£


https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network


6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

      

FortinetÔÚ12ÔÂ12ÈÕÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£GoTrimÊÇ»ùÓÚGoµÄ½©Ê¬ÍøÂç £¬£¬£¬Í¨¹ýɨÃèÍøÂçÒÔѰÕÒ×ÔÍйܵÄWordPressÍøÕ¾ £¬£¬£¬²¢ÊÔͼ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂë²¢¿ØÖƸÃÍøÕ¾¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¼ÓÚ2022Äê9Ô £¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷¿ÉÄܻᵼÖ¶ñÒâÈí¼þ×°Öá¢ÐÅÓÿ¨ÇÔÈ¡¾ç±¾×¢Èë¡¢´¹ÂÚÒ³ÃæµÄÍйÜÒÔ¼°ÆäËüµÄ¹¥»÷³¡¾° £¬£¬£¬Æ¾Ö¤±»ÈëÇÖÍøÕ¾µÄÊܽӴýˮƽ £¬£¬£¬¿ÉÄÜÓ°Ïìµ½Êý°ÙÍòÈË¡£¡£¡£¡£¡£¡£


https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites