Okta͸¶ÆäÖ§³Ö¹ÜÀíϵͳÔâµ½ÈëÇÖ²¿ÃÅÐÅϢй¶

Ðû²¼Ê±¼ä 2023-10-23

1¡¢Okta͸¶ÆäÖ§³Ö¹ÜÀíϵͳÔâµ½ÈëÇÖ²¿ÃÅÐÅϢй¶


¾ÝýÌå10ÔÂ20ÈÕ±¨µÀ£¬¹¥»÷ÕßÀûÓÃÇÔÈ¡µÄƾ¾ÝÈëÇÖÁËOktaµÄÖ§³Ö¹ÜÀíϵͳ£¬µ¼ÖÂcookieºÍ»á»°ÁîÅÆµÈÊý¾Ýй¶¡£¸Ã¹«Ë¾ÉÐδÌṩÄÄЩ¿Í»§ÐÅÏ¢Êܵ½Ó°ÏìµÄÏêÇ飬µ«¹¥»÷Õß¿ÉÄÜ·ÃÎÊÁËÓÃÓÚ¸´ÖÆä¯ÀÀÆ÷»î¶¯À´ÅųýÎÊÌâµÄHTTP´æµµ(HAR)Îļþ£¬ÒÔ¼°Okta¿Í»§ÉÏ´«µÄ²¿ÃÅÎļþ¡£BeyondTrustÌåÏÖËüÊÇÊÜÓ°ÏìµÄ¿Í»§Ö®Ò»£¬ÓÚ10ÔÂ2ÈÕ·¢ÏÖ²¢×èÖ¹ÁËʹÓôÓOktaϵͳÇÔÈ¡µÄcookieµÇ¼ÄÚ²¿Okta¹ÜÀíÔ±ÕÊ»§µÄʵÑé¡£CloudflareÓÚ10ÔÂ18ÈÕÔÚÆä·þÎñÆ÷ÉÏ·¢ÏÖÁËÓëOkta©¶´Ïà¹ØµÄ¶ñÒâ»î¶¯¡£


https://securityaffairs.com/152803/data-breach/okta-support-system-breached.html


2¡¢Ö´·¨»ú¹¹µ·»ÙRagnar Locker»ù´¡ÉèÊ©²¢´þ²¶Æä¿ª·¢Õß


¾Ý10ÔÂ21ÈÕ±¨µÀ£¬Ö´·¨»ú¹¹ÔÚÒ»´ÎÁªºÏÐж¯Öе·»ÙÁËÀÕË÷Èí¼þRagnar LockerµÄ»ù´¡ÉèÊ©£¬²¢´þ²¶ÁËÏà¹ØµÄ¿ª·¢ÈËÔ±¡£×Ô2020ÄêÒÔÀ´£¬Ragnar LockerÒѹ¥»÷ÁËÈ«Çò168¼Ò¹«Ë¾¡£Å·ÖÞÐ̾¯×éÖ¯ÌåÏÖ£¬¸ÃÍÅ»ïµÄ¡°Ö÷ҪĿ±ê¡±ÓÚ10ÔÂ16ÈÕÔÚ·¨¹ú°ÍÀè±»²¶£¬ËûÔڽݿ˵ļÒÒ²±»ËѲé¡£Ëæºó¼¸Ì죬ִ·¨»ú¹¹ÔÚÎ÷°àÑÀºÍÀ­ÍÑάÑÇÉóÎÊÁË5ÃûÏÓÒÉÈË¡£ÕâÊÇÕë¶Ô¸ÃÍÅ»ïµÄµÚÈý´ÎÐж¯£¬ÔÚ´Ë´ÎЭµ÷Ðж¯ÖУ¬¿ÛѺÁ˼ÓÃÜ×ʲú£¬µ·»ÙÁËRagnar LockerµÄTorÍøÕ¾£¬»¹¹Ø±ÕÁË9̨·þÎñÆ÷¡£


https://thehackernews.com/2023/10/europol-dismantles-ragnar-locker.html


3¡¢CiscoÅû¶Òѱ»ÀûÓõÄÐÂIOS XE©¶´CVE-2023-20273


10ÔÂ20ÈÕ±¨µÀ³Æ£¬CiscoÅû¶ÁËÒ»¸öЩ¶´£¨CVE-2023-20273£©£¬¿ÉÓÃÓÚ²¿Êð¶ñÒâÖ²È뷨ʽ¡£¹¥»÷Õß×Ô9ÔÂ18ÈÕÆð¾ÍÀûÓÃÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨CVE-2023-20198£©ÈëÇÖIOS XEÉ豸¡£Ëæºó£¬ËûÃÇ»áÀûÓÃÌáȨ©¶´£¨CVE-2023-20273£©À´»ñµÃroot·ÃÎÊȨÏÞ²¢ÍêÈ«¿ØÖÆCisco IOS XEÉ豸£¬ÒÔ°²×°¶ñÒâÖ²È뷨ʽ¡£¾ÝÔ¤¼Æ£¬ÓÐÁè¼Ý40000̨IOS XEÉ豸ÒÑÔâµ½ÀûÓÃÕâÁ½¸ö©¶´µÄ¹¥»÷¡£Cisco¼Æ»®ÓÚ10ÔÂ22ÈÕÐû²¼ÕâÁ½¸ö©¶´µÄÐÞ¸´·¨Ê½¡£


https://www.bleepingcomputer.com/news/security/cisco-discloses-new-ios-xe-zero-day-exploited-to-deploy-malware-implant/


4¡¢ÃÀ¹ú±£ÏÕ¹«Ë¾AmFamÔâµ½¹¥»÷µ¼Ö·þÎñÖжϳ¤´ïÒ»ÖÜ


ýÌå10ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹ú¼ÒÍ¥±£ÏÕ¹«Ë¾(American Family Insurance)Ôâµ½¹¥»÷£¬²¿ÃÅITϵͳ¹Ø±Õ¡£AmFamÓµÓÐ13000ÃûÔ±¹¤£¬2022ÄêÊÕÈëΪ144ÒÚÃÀÔª¡£×ÔÉÏÖÜÄ©ÒÔÀ´£¬¸Ã¹«Ë¾µÄϵͳ·¢ÉúÖжÏ£¬Ó°ÏìÁ˵绰·þÎñ¡¢Â¥ÓîÁ¬½ÓºÍÔÚÏß·þÎñµÈ¡£¾ÝϤ£¬Ôâµ½¹¥»÷ºó£¬AmFamÖжÏÁË»¥ÁªÍøÁ¬½Ó£¬ÕâÒ²Ó°ÏìÁËͬһ¶°´óÂ¥µÄÆäËû×â»§¡£¿Í»§³ÂËß³ÆÎÞ·¨ÔÚÏßÖ§¸¶Õ˵¥»òÌá³öË÷Å⣬ֻÄÜÊÕµ½ÌáʾÐÅÏ¢³ÆÔÚÏßÍøÕ¾ÒṈ̃»¾£¬Çë¸ÄÓõ绰ÁªÏµ¡£Ä¿Ç°Éв»Çå¹¥»÷ÀàÐÍ£¬µ«ÕâЩ¼£ÏóÓëÀÕË÷¹¥»÷ÀàËÆ¡£


https://www.bleepingcomputer.com/news/security/american-family-insurance-confirms-cyberattack-is-behind-it-outages/


5¡¢Î¢ÈíÅû¶¶à¸öºÚ¿ÍÍÅ»ïÀûÓÃTeamCity©¶´µÄ¹¥»÷»î¶¯


10ÔÂ18ÈÕ£¬Î¢ÈíÅû¶ÁËLazarusºÍAndarielÍÅ»ïÀûÓÃTeamCity·þÎñÆ÷ÖЩ¶´£¨CVE-2023-42793£©µÄ¹¥»÷»î¶¯¡£¸Ã©¶´¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÀ´Ô¶³ÌÖ´ÐдúÂ룬ÒÑÓÚ9Ô·ÝÐÞ¸´¡£LazarusÔÚÒ»¸ö¹¥»÷Á´Öа²×°ÁËForestTiger£¬ÔÚÁíÒ»¸ö¹¥»÷Á´ÖÐͨ¹ýDLLËÑË÷˳Ðò½Ù³Ö¹¥»÷À´Æô¶¯¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½FeedLoad£¬È»ºó°²×°Ô¶³Ì·ÃÎÊľÂí¡£Andariel»áÔÚÄ¿±êϵͳÖд´½¨¹ÜÀíÔ±ÕË»§¡°krtbgt¡±£¬ÔËÐÐÃüÁîÊÕ¼¯ÏµÍ³ÐÅÏ¢£¬×îºóÏÂÔØÒ»¸ö°²×°ÊðÀí¹¤¾ßHazyLoadµÄpayload¡£


https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-2023-42793-vulnerability/


6¡¢SymantecÐû²¼¹ØÓÚAPT34¹¥»÷Öж«µØÓò»ú¹¹µÄ·ÖÎö³ÂËß


10ÔÂ19ÈÕ£¬SymantecÐû²¼Á˹ØÓÚAPT34¹¥»÷Öж«µØÓò»ú¹¹µÄ·ÖÎö³ÂËß¡£APT34£¨ÓÖÃûOilRig£©ÔÚ½ñÄê2ÔÂÖÁ9Ô¶ÔÖж«µÄ»ú¹¹½øÐÐÁ˳¤´ï8¸öÔµĹ¥»÷¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬¸ÃÍÅ»ïÇÔÈ¡ÁËÎļþºÍÃÜÂ룬²¢ÔÚÒ»¸ö°¸ÀýÖа²×°ÁËPowerShellºóÃÅ£¨ÃûΪPowerExchange£©£¬¸ÃºóÃÅ¼à¿Ø´ÓExchange·¢Ë͵ÄÓʼþ£¬À´Ö´ÐÐÒÔÓʼþÐÎʽ·¢Ë͵ÄÃüÁĿǰ£¬ÖÁÉÙÓÐ12̨¼ÆËã»úÔâµ½¹¥»÷£¬ÓÐÖ¤¾Ý±íÃ÷¹¥»÷ÕßÔÚÁíÍâÊýʮ̨¼ÆËã»úÉϰ²×°Á˺óÃźͼüÅ̼Ǽ·¨Ê½¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/crambus-middle-east-government