CitrixÐÞ¸´ADCºÍGatewayÖÐÒѱ»Ê¹ÓõÄí§Òâ´úÂëÖ´ÐÐÎó²î
Ðû²¼Ê±¼ä 2022-12-15
12ÔÂ13ÈÕ£¬£¬£¬£¬£¬CitrixÐÞ¸´ÁËCitrixÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ºÍGatewayÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2022-27518£©¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÒѾ¼ì²âµ½Ê¹ÓôËÎó²îµÄÕë¶ÔÐÔ¹¥»÷»î¶¯£¬£¬£¬£¬£¬½¨Òé¿Í»§¾¡¿ì×°ÖøüС£¡£¡£¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)ÔÚ±¾ÖܶþÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷ÍÅ»ïAPT5Ò»Ö±ÔÚʹÓÃCitrix ADCºÍGatewayÖеÄÁãÈÕÎó²îÀ´Ð®ÖÆÊÜÓ°ÏìµÄϵͳ¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬ÏëҪʹÓøÃÎó²îÐèÒª½«ADC»òGateway×°±¸ÉèÖÃΪ SAML SP£¨SAML ЧÀÍÌṩÉÌ£©»òSAML IdP£¨SAMLÉí·ÝÌṩÉÌ£©¡£¡£¡£¡£¡£¡£
https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518
2¡¢¼ÓÖÝÐÅ¿¨´¦Öóͷ£¹«Ë¾ÒòÉèÖùýʧ900ÍòÌõÉúÒâ¼Í¼й¶
ýÌå12ÔÂ13Èճƣ¬£¬£¬£¬£¬Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öδÊܱ£»£»£»£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨9098506ÌõÐÅÓÿ¨ÉúÒâ¼Í¼¡£¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢Ò²±»Ì»Â¶ÔÚÉèÖùýʧµÄЧÀÍÆ÷ÉÏ£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÃÜÂë»òÇå¾²Éí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â±»È·¶¨ÊôÓÚCornerstone Payment Systems£¬£¬£¬£¬£¬ÕâÊÇÒ»¼ÒλÓÚ¼ÓÀû¸£ÄáÑǵÄÐÅÓÿ¨´¦Öóͷ£¹«Ë¾¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñй¶ÁËÐÅÓÿ¨ºÅ¡¢ÕË»§»òÉúÒâÐÅÏ¢¡¢ÐÕÃû¡¢Çå¾²»ò»á¼ûÁîÅÆÒÔ¼°ÉúÒâÐÅÏ¢µÈ£¬£¬£¬£¬£¬¿É±»ÓÃÀ´¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»ñϤÎÊÌâºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦½ÓÄÉÐж¯±£»£»£»£»£»£»£»¤Ð§ÀÍÆ÷¡£¡£¡£¡£¡£¡£
https://www.hackread.com/exposed-credit-card-transaction-records/
3¡¢ºÚ¿ÍÔÚ°µÍøÉϳöÊÛFBI InfraGardÊýÍòÓû§µÄÊý¾Ý¿â
¾Ý12ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬InfraGardµÄ80000¶àÃû³ÉÔ±µÄÁªÏµÐÅÏ¢Êý¾Ý¿âÔÚ°µÍøBreachedÉϱ»¹ûÕæ³öÊÛ¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ºÚ¿Í»¹Í¨¹ýInfraGardÃÅ»§ÍøÕ¾Ö±½ÓÓë»áÔ±¾ÙÐÐÔÚÏß½»Á÷£¬£¬£¬£¬£¬²¢Ê¹ÓÃÒ»¸öÓÉFBI×Ô¼ºÉóºËµÄ½ðÈÚÒµCEOµÄ¼ÙÉí·ÝµÄÐÂÕË»§¡£¡£¡£¡£¡£¡£InfraGardÊÇFBIÔËÐеÄÒ»¸öÏîÄ¿£¬£¬£¬£¬£¬Ö¼ÔÚÓë˽Ӫ²¿·Ö½¨ÉèÍøÂçºÍÎïÀíÍþвÐÅÏ¢¹²ÏíÏàÖú¹ØÏµ¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬ËüÒѾ֪µÀDZÔÚµÄÐéαÕË»§£¬£¬£¬£¬£¬²¢ÕýÔÚÆð¾¢ÊÓ²ì´ËÊ£¬£¬£¬£¬£¬ÏÖÔÚÎÞ·¨ÌṩÈκÎÌØÊâÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/
4¡¢µçÐŹ«Ë¾TPG TelecomÉÏÍò¸ö¿Í»§ÓÊÏäÔ⵽δÊÚȨ»á¼û
·͸Éç12ÔÂ14ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬°Ä´óÀûÑǵçÐŹ«Ë¾TPG TelecomÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬¶à´ï15000¸öÆóÒµ¿Í»§µÄµç×ÓÓʼþ±»Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£TPGÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷ÍйÜÉúÒâËùЧÀ͵ÄÖ÷ҪĿµÄÊÇΪÁËËÑË÷¿Í»§µÄ¼ÓÃÜÇ®±ÒºÍ½ðÈÚÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÒѽÓÄɲ½·¥×èֹδ¾ÊÚȨµÄ»á¼û£¬£¬£¬£¬£¬²¢ÕýÔÚÁªÏµËùÓÐÊÜ´ËÊÂÎñÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£¡£Æä¹É¼ÛÊÜ´ËÐÂÎÅÓ°Ïìϵø£¬£¬£¬£¬£¬ÊÕÅÌϵø 2.8%¡£¡£¡£¡£¡£¡£×Ô10ÔÂÒÔÀ´£¬£¬£¬£¬£¬ÖÁÉÙÓÐ8¼Ò°Ä´óÀûÑǹ«Ë¾Ôâµ½Á˺ڿ͹¥»÷¡£¡£¡£¡£¡£¡£
https://www.reuters.com/world/asia-pacific/tpg-telecom-finds-evidence-unauthorised-access-up-15000-email-accounts-2022-12-13/
5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚ5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄÖ¸ÄÏ
12ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)¡¢CISAºÍ¹ú¼ÒÇ鱨×ܼà°ì¹«ÊÒ(ODNI)ÁªºÏÐû²¼ÁË5GÍøÂçÇÐÆ¬µÄDZÔÚÍþвµÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÒÔESFÓÚ2021ÄêÐû²¼µÄ5G»ù´¡ÉèÊ©µÄDZÔÚÍþвΪ»ù´¡£¬£¬£¬£¬£¬ÏÈÈÝÁËÓë5GÍøÂçÇÐÆ¬Ïà¹ØµÄÀûÒæºÍΣº¦£¬£¬£¬£¬£¬Ëü»¹ÌṩÏàʶ¾ö5GÍøÂçÇÐÆ¬Ç±ÔÚÍþвµÄ»º½âÕ½ÂÔ¡£¡£¡£¡£¡£¡£CISAÃãÀø5GÌṩÉÌ¡¢¼¯³ÉÉ̺ÍÍøÂçÔËÓªÉÌÉó²é±¾Ö¸Äϲ¢ÊµÑ齨ÒéµÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network
6¡¢FortinetÐû²¼¹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
FortinetÔÚ12ÔÂ12ÈÕÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçGoTrim¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£GoTrimÊÇ»ùÓÚGoµÄ½©Ê¬ÍøÂ磬£¬£¬£¬£¬Í¨¹ýɨÃèÍøÂçÒÔѰÕÒ×ÔÍйܵÄWordPressÍøÕ¾£¬£¬£¬£¬£¬²¢ÊÔͼ±©Á¦ÆÆ½âÖÎÀíÔ±ÃÜÂë²¢¿ØÖƸÃÍøÕ¾¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¼ÓÚ2022Äê9Ô£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷¿ÉÄܻᵼÖ¶ñÒâÈí¼þ×°Öá¢ÐÅÓÿ¨ÇÔÈ¡¾ç±¾×¢Èë¡¢´¹ÂÚÒ³ÃæµÄÍйÜÒÔ¼°ÆäËüµÄ¹¥»÷³¡¾°£¬£¬£¬£¬£¬Æ¾Ö¤±»ÈëÇÖÍøÕ¾µÄÊܽӴýˮƽ£¬£¬£¬£¬£¬¿ÉÄÜÓ°Ïìµ½Êý°ÙÍòÈË¡£¡£¡£¡£¡£¡£
https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites