AtlassianÐÞ¸´Confluence©¶´CVE-2023-22518
Ðû²¼Ê±¼ä 2023-11-021¡¢AtlassianÐÞ¸´Confluence©¶´CVE-2023-22518
¾ÝýÌå10ÔÂ31Èճƣ¬AtlassianÐÞ¸´ÁËÒ»¸öÑÏÖØµÄ©¶´£¨CVE-2023-22518£©£¬ËüÓ°ÏìÁËËùÓа汾µÄConfluence Data CenterºÍConfluence Server¡£ÕâÊÇÒ»¸öÊÚȨ²»Íש¶´£¬¹¥»÷Õß¿ÉÀûÓøÃ©¶´ÆÆ»µÊÜÓ°Ïì·þÎñÆ÷ÉϵÄÊý¾Ý£¬µ¼ÖÂÊý¾Ý¶ªÊ§£¬µ«ÎÞ·¨±»ÓÃÀ´ÇÔÈ¡Êý¾Ý¡£Í¨¹ýatlassian.netÓò·ÃÎʵÄAtlassian CloudÍøÕ¾²»ÊÜ´Ë©¶´µÄÓ°Ïì¡£´Ë©¶´ÉÐδ±»Ö÷¶¯ÀûÓ㬸ù«Ë¾½¨ÒéÓû§Á¢¼´Ó¦ÓøüС£
https://www.bleepingcomputer.com/news/security/atlassian-warns-of-critical-confluence-flaw-leading-to-data-loss/
2¡¢Avastɱ¶¾Èí¼þ½«Android Google±ê־Ϊ¶ñÒâÈí¼þ
¾Ý10ÔÂ31ÈÕ±¨µÀ£¬Äþ¾²¹«Ë¾Avast³Æ×ÔÖÜÁùÒÔÀ´£¬Æäɱ¶¾Èí¼þ½«²¿ÃÅÐͺŵÄÖÇÄÜÊÖ»úÉϵÄGoogle AndroidÓ¦Óñê־Ϊ¶ñÒâÈí¼þ¡£ÔÚÊÜÓ°ÏìÉ豸ÉÏ£¬Óû§±»ÌáÐÑÁ¢¼´Ð¶ÔØGoogleÓ¦Óã¬ÒòΪËü¿ÉÄÜ»áÃØÃÜ·¢ËͶÌÐÅ¡¢ÏÂÔØºÍ°²×°ÆäËüÓ¦ÓûòÇÔÈ¡Óû§ÐÅÏ¢¡£»¹ÓÐÈË¿´µ½Á˲îÒìµÄÌáÐÑ£¬³ÆGoogleÓ¦ÓÃÊÇÒ»¸öľÂí£¬¿ÉÒÔÔ¶³Ì·ÃÎÊËûÃǵÄÉ豸£¬±»¹¥»÷ÕßÓÃÀ´°²×°¶ñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£Avast͸¶£¬Æäɱ¶¾SDKÎó½«Google¿ìËÙËÑË÷¿òÓ¦Ó÷¨Ê½Æô¶¯Æ÷±ê־Ϊ¶ñÒâÈí¼þ£¬¸ÃÎÊÌâÒÑÓÚ10ÔÂ30ÈÕ½â¾ö¡£
https://www.bleepingcomputer.com/news/security/avast-confirms-it-tagged-google-app-as-malware-on-android-phones/
3¡¢Scarred ManticoreÀûÓÃLIONTAIL¹¥»÷Öж«µÄ¹ú¼Ò
Check PointÓÚ10ÔÂ31ÈÕÅû¶ÁËScarred ManticoreÕë¶ÔÖж«¹ú¼Ò¾üÕþ»ú¹¹ºÍµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ï´Ó2019ÄêÆðÒ»Ö±»îÔ¾£¬Ä¿Ç°µÄ»î¶¯ÔÚ2023ÄêÖÐÆÚµ½´ïáÛ·å¡£×îлÀûÓÃÁËLIONTAIL£¬ÕâÊÇÒ»ÖÖ°²×°ÔÚWindows·þÎñÆ÷Éϵı»¶¯¶ñÒâÈí¼þ¿ò¼Ü¡£³öÓÚÒþ±ÎÐÔ£¬LIONTIALÖ²È뷨ʽÀûÓöÔWindows HTTPÕ»Çý¶¯·¨Ê½HTTP.sysµÄÖ±½Óµ÷ÓÃÀ´¼ÓÔØ³£×¤ÄÚ´æµÄpayload¡£Ñо¿ÈËÔ±»¹³Æ£¬Scarred ManticoreÓëOilRig£¨ÓÖÃûAPT34£©ÓйØÁª¡£
https://research.checkpoint.com/2023/from-albania-to-the-middle-east-the-scarred-manticore-is-listening/
4¡¢Mandiant¼ì²âµ½¶àÆðÀûÓÃCitrix Bleed©¶´µÄ»î¶¯
10ÔÂ31ÈÕ£¬Mandiant³ÆÆä¼ì²âµ½¶àÆðÀûÓÃCitrix Bleed©¶´£¬À´¹¥»÷ÃÀÖÞ¡¢Å·ÖÞ¡¢·ÇÖÞºÍÑÇÌ«µØÓòµÄ»î¶¯¡£ÕâÊÇNetScaler ADCºÍNetScaler GatewayÉ豸ÖеÄÐÅϢй¶©¶´£¨CVE-2023-4966£©£¬×Ô8ÔÂÏÂÑ®ÒÔÀ´Ò»Ö±ÔÚ±»ÀûÓá£ÀûÓé¶´ºó£¬¹¥»÷Õß»á½øÐÐÍøÂçÕì²ì¡¢ÇÔÈ¡ÕÊ»§Æ¾¾Ý²¢Í¨¹ýRDP½øÐкáÏòÒÆ¶¯¡£MandiantÌåÏÖ£¬ÔÚÖÖÖֻÖÐÀûÓÃCVE-2023-4966µÄ4¸ö¹¥»÷ÍŻÔÚPost-Exploitation½×¶Î´æÔÚÒ»Ð©ÖØµþ¡£
https://www.mandiant.com/resources/blog/session-hijacking-citrix-cve-2023-4966
5¡¢¶ñÒâNuGet°üÀûÓÃMSBuild¼¯³ÉÀ´·Ö·¢¶ñÒâÈí¼þ
ReversingLabsÔÚ10ÔÂ31ÈÕÅû¶ÁËͨ¹ý¶ñÒâNuGet°üÀ´·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£Ñо¿ÈËÔ±ÓÚ10ÔÂ15ÈÕ·¢ÏÖÁË×îÐÂNuGet»î¶¯£¬ÀûÓòîÒìµÄƴд´íÎóµÄÈí¼þ°üÀ´°²×°¶ñÒâÈí¼þ¡£´Ë»î¶¯µÄÐÂÓ±Ö®´¦ÔÚÓÚ£¬ÕâЩÈí¼þ°üûÓÐʹÓÃÔÚ°²×°½Å±¾ÖÐÖ²ÈëÏÂÔØ·¨Ê½µÄ³£ÓÃÒªÁ죬¶øÊÇÀûÓÃNuGetµÄMSBuild¼¯³ÉÀ´Ö´ÐдúÂë¡£ÕâÊÇ8Ô³õÒÔÀ´µÄÁ¬Ðø»î¶¯µÄÒ»²¿ÃÅ£¬Ö±µ½10ÔÂÖÐÑ®£¬¹¥»÷Õ߲ſªÊ¼ÀûÓÃMSBuild¼¯³É¡£ÔçÆÚ°æ±¾ÀûÓÃPowerShell½Å±¾£¨init.ps1£©´ÓGitHub´æ´¢¿â»ñÈ¡¶ñÒâÈí¼þpayload¡£
https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole
6¡¢CiscoÐû²¼¹ØÓÚArid Viper¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
10ÔÂ31ÈÕ£¬Cisco TalosÐû²¼Á˹ØÓÚArid Viper¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸Ã»î¶¯×Ô2022Äê4Ô¿ªÊ¼»îÔ¾£¬Ò»Ö±Õë¶Ô°¢À²®ÓïµØÓò¡£¹¥»÷ÕßÀûÓÃαÔìµÄ¶ñÒâAndroidÓ¦Óã¬Ö¼ÔÚ´ÓÄ¿±êÊÖ»úÖÐÊÕ¼¯Êý¾Ý¡£ÓÐȤµÄÊÇ£¬¸Ã¶ñÒâÈí¼þÓëÔ¼»áÈí¼þSkippedµÄÔ´´úÂëÏàËÆ£¬Õâ±íÃ÷ÔËÓªÍÅ»ïҪôÓëSkippedµÄ¿ª·¢ÈËÔ±ÓÐÁªÏµ£¬ÒªÃ´·Ç·¨»ñµÃÁËÏîÄ¿µÄ·ÃÎÊȨÏÞ¡£¹¥»÷Õß»á·Ö·¢Î±×°³ÉÔ¼»áÓ¦ÓøüеĶñÒâÁ´½Ó£¬´Ó¶ø½«¶ñÒâÈí¼þ°²×°µ½Óû§µÄÉ豸¡£
https://blog.talosintelligence.com/arid-viper-mobile-spyware/