Oktaй©ÆäGitHub´æ´¢¿âÔâµ½ºÚ¿Í¹¥»÷Ô´´úÂëй¶

°ä²¼¹¦·ò 2022-12-22
1¡¢Oktaй©ÆäGitHub´æ´¢¿âÔâµ½ºÚ¿Í¹¥»÷Ô´´úÂëй¶

      

¾Ý12ÔÂ21ÈÕ±¨Â·£¬Éí·ÝÑéÖ¤·þÎñºÍÉí·ÝÓë½Ó¼ûÖÎÀí(IAM)½â¾ö¹æ»®µÄÌṩÉÌOkta°µÊ¾£¬Æä¸öÈËGitHub´æ´¢¿âÔÚ±¾ÔÂÔâµ½ºÚ¿Í¹¥»÷  ¡£¾­µ÷²é£¬ºÚ¿ÍÒѾ­¸´ÔìOkta´úÂë´æ´¢¿â£¬µ«²¢Î´Ó°ÏìOkta·þÎñ»ò¿Í»§Êý¾Ý  ¡£¸ÃÊÂÎñËÆºõ½öÓëOkta Workforce Identity Cloud(WIC)´úÂë´æ´¢¿âÓйØ£¬ÓëAuth0 Customer Identity Cloud²úÆ·ÎÞ¹Ø  ¡£½ñÄê9Ô£¬OktaÆìϵÄAuth0Ò²Ôø²úÉúÁËÀàËÆµÄÊý¾Ýй¶ÊÂÎñ  ¡£


https://www.bleepingcomputer.com/news/security/okta-says-its-github-account-hacked-source-code-stolen/


2¡¢µÂ¹ú¿ç¹ú¹¤Òµ¹«Ë¾ThyssenKrupp AGÔâµ½ÍøÂç¹¥»÷

      

ýÌå12ÔÂ21ÈÕ±¨Â·£¬µÂ¹ú¿ç¹ú¹¤Òµ¹¤³ÌºÍ¸ÖÌú³ö²ú¹«Ë¾ThyssenKruppй©Æä×ÊÁÏ·þÎñ²¿ºÍ¹«Ë¾×ܲ¿Ôâµ½ÍøÂç¹¥»÷  ¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÉÐδÅû¶Õâ´Î¹¥»÷µÄÀàÐÍ£¬Ò²Ã»ÓкڿÍÍÅ»ïÐû³Æ¶ÔÕâ´ÎÊÂÕÆ¹Ü£¬µ«¹«Ë¾½²»°ÈËÐû³ÆÃ»º±¼û¾Ýй¶µÄ¼£Ïó  ¡£Õâ²¢²»ÊǸù«Ë¾µÚÒ»´ÎÔâµ½¹¥»÷£¬2016Ä꣬¾Ý³Æ¶«ÄÏÑǵĺڿÍÍÅ»ïÇÔÈ¡Æä¹«Ë¾»úÃÜ£»2020Äê12Ô£¬ThyssenKrupp Materials¼¯ÍŹ«Ë¾Ôâµ½NetWalkerÀÕË÷ÍÅ»ïµÄ¹¥»÷  ¡£


https://securityaffairs.co/wordpress/139870/hacking/thyssenkrupp-targeted-cyberattack.html


3¡¢×êÑÐÍŶӳÆRaspberry Robin½üÆÚÕë¶ÔµçÐź͵±¾Ö×éÖ¯

      

TrendMicroÔÚ12ÔÂ20ÈÕ°ä²¼»ã±¨³Æ·¢ÏÖÁËRaspberry RobinÔÚ½üÆÚÕë¶ÔµçÐź͵±¾Ö×éÖ¯µÄ¹¥»÷»î¶¯  ¡£¶ñÒâÈí¼þͨ¹ý¶ñÒâUSBÇý¶¯Æ÷½øÐзַ¢£¬µ±Ö¸±ê²åÈëUSBÇý¶¯Æ÷²¢Ë«»÷ÆäÖеÄ.LNKÎļþʱ£¬É豸¾Í»áϰȾ¶ñÒâÈí¼þ  ¡£¶øºó»áÀÄÓúϷ¨µÄMSIExec.exe¿ÉÖ´ÐÐÎļþ£¬ÏÂÔØÒ»¸ö¶ñÒâµÄMSI×°Ö÷¨Ê½£¬×°ÖÃRaspberry RobinµÄpayload  ¡£´Ë±í£¬¸Ã¶ñÒâÈí¼þ³¢ÊÔͨ¹ýÐéαµÄpayloadÀ´¹Æ»ó×êÑÐÈËÔ±£¬ÒÔ¼°ÔÚ¼ì²âµ½ËüÔÚɳÏäºÍµ÷ÊÔ¹¤¾ßÖÐÔËÐÐÊ±ÈÆ¹ý¼ì²â  ¡£


https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html


4¡¢ÐÂÐÍAndroidľÂíBrasDex±»ÓÃÓÚÕë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯

      

×êÑÐÍŶÓÔÚ12ÔÂ15ÈÕÅû¶ÁËÕë¶Ô°ÍÎ÷½ðÈÚ»ú¹¹µÄÐÂÐÍAndroidľÂíBrasDex  ¡£BrasDexÓµÓÐÒ»¸ö¸´ÔӵļüÅ̼ͼϵͳ£¬ÒÔ¼°Ò»¸ö׳´óµÄ×Ô¶¯´«Êäϵͳ£¨ATS£©ÒýÇæ  ¡£¸Ã»î¶¯ÒѳÖÐøÒ»Äê¶à£¬Ëü×î³õ¼ÙÒâAndroidÉèÖÃÀûÓò¢Õë¶Ô°ÍÎ÷ÒøÐÐÀûÓã¬ÔÚ×îеĻÖУ¬ËüÆðÍ·¼ÙÒâÒ»¸öÌØ¶¨µÄÒøÐÐÀûÓ÷¨Ê½£¨Banco Santander BR£©  ¡£·ÖÎö·¢ÏÖ£¬ÓÃÓÚBrasDexµÄC2»ù´¡ÉèʩҲ±»ÓÃÀ´½ÚÔìCasbaneiro£¬ºóÕßÖØÒªÕë¶Ô°ÍÎ÷ºÍÄ«Î÷¸çµÄÒøÐкͼÓÃÜÇ®±Ò·þÎñ  ¡£


https://www.threatfabric.com/blogs/brasdex-a-new-brazilian-ats-malware.html


5¡¢Á½ÄÐ×ÓÒò´Û¸Ä¿ÏÄáµÏ¹ú¼Ê»ú³¡µÄ³ö×â³µµ÷¶Èϵͳ±»²¶

      

ýÌå12ÔÂ20Èճƣ¬Á½ÃûÄÐ×ÓÒòÈëÇÖ²¢´Û¸Ä¿ÏÄáµÏ¹ú¼Ê»ú³¡µÄ³ö×â³µµ÷¶Èϵͳ±»²¶£¬²¢Ãæ¶Ô×î¸ß10ÄêµÄ½ûïÀ  ¡£Æ¾¾Ý¸æ×´Ê飬ÏÖÄê48ËêµÄDaniel AbayevºÍPeter LeymanÔçÔÚ2019Äê9Ô¾ÍÓë¶íÂÞ˹ºÚ¿ÍºÏıÈëÇÖµ÷¶Èϵͳ£¬ÔÊÐí˾»ú¸¶·Ñ²å¶Ó  ¡£Í¬Ä¹Øß±»Ö¸¿ØÊÔͼÒÔ¸÷À෽ʽÈëÇÖ¸Ãϵͳ£¬Ô̺¬»ß¸ijÈËͨ¹ýUÅÌ×°ÖöñÒâÈí¼þ£¬Ê¹ÓÃWi-FiÏνӽøÈë¸Ãϵͳ£¬ÒÔ¼°ÍµÇÔÏνӵ½¸Ãƽ̨µÄƽ°åµçÄÔ  ¡£¼ì²ì¹Ù³Æ£¬ËûÃÇÿÌì²ß¶¯¶à´ï1000´Î¼Ó¿ì²å¶Ó£¬ÆäÖÐ100000ÃÀÔªµÄÊÕÒæ±»»ã¸øÁ˶íÂÞ˹µÄͬı  ¡£


https://therecord.media/russian-hackers-accessed-jfk-airport-taxi-software-port-authority/


6¡¢Unit 42°ä²¼¹ØÓÚGamaredonµÄ¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨

      

12ÔÂ20ÈÕ£¬Unit 42°ä²¼Á˹ØÓÚ¶íÂÞ˹ÍÅ»ïGamaredon¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨  ¡£Unit 42¶Ô¸ÃÍÅ»ïµÄ³ÖÐø¼à¿Ø·¢ÏÖÁË500¶à¸öÐÂÓòºÍ200¸ö¶ñÒâÈí¼þÑù±¾£¬²¢·¢ÏÔìäÕ½ÊõÔÚ´Óǰ10¸öÔÂÖвúÉúÁËÂÅ´Îת±ä  ¡£ÔÚÉó²é¸ÃÍÅ»ïµÄIoCÆÚ¼ä£¬×êÑÐÈËÔ±·¢ÏÖÁËËüÔÚ8ÔÂ30ÈÕÊÔͼ¹¥»÷±±Ô¼³ÉÔ±¹úÄÚÒ»¼Ò´óÐÍʯÓ;«±Ù¹«Ë¾µÄ»î¶¯£¬µ«ÊÇûÓгɹ¦  ¡£´Ë±í£¬¸ÃÍŻﻹʹÓÃTelegramÒ³Ãæ²éÕÒC2·þÎñÆ÷£¬²¢ÀûÓü±¾çͨÁ¿DNSÔڶ̹¦·òÄÚÂÖ»»¶à¸öIPµØÖ·  ¡£ 


https://unit42.paloaltonetworks.com/trident-ursa/