CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²¿·Ö²úÆ·ÖеĶà¸öÎó²î
Ðû²¼Ê±¼ä 2022-11-07
CiscoÓÚ11ÔÂ2ÈÕÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²¿·Ö²úÆ·ÖеĶà¸öÎó²î¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇ¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2022-20961£©£¬£¬£¬£¬£¬£¬ËüÓ°ÏìÁËÉí·ÝЧÀÍÒýÇæ(ISE)£¬£¬£¬£¬£¬£¬»ù´¡Ôµ¹ÊÔÓÉÊÇ»ùÓÚWebµÄÖÎÀí½çÃæµÄCSRF±£»£»£»£»¤È±·¦¡£¡£¡£¡£ÒÔ¼°ISE²úÆ·ÖеĻá¼û¿ØÖÆÈ±·¦Îó²î£¨CVE-2022-20956£©£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÏòÄ¿µÄ·¢ËÍÌØÖÆµÄHTTPÇëÇóÀ´Ê¹Óᣡ£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËCisco ESAºÍCisco Secure Email and Web Manager Next Generation ManagementÖеÄSQL×¢ÈëÎó²î£¨CVE-2022-20867£©ºÍÌáȨÎó²î£¨CVE-2022-20868£©µÈ¡£¡£¡£¡£
https://securityaffairs.co/wordpress/138068/security/cisco-addressed-multiple-flaws.html
2¡¢LockBitÉù³Æ¶ÔµÂ¹úÆû³µ¹«Ë¾ContinentalµÄ¹¥»÷ÈÏÕæ
¾ÝýÌå11ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³Æ¶ÔµÂ¹úContinental£¨´ó½Æû³µ£©µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£ÓÉÓÚLockBitÌåÏÖ½«Ðû²¼ËùÓпÉÓÃÊý¾Ý£¬£¬£¬£¬£¬£¬ÕâÅú×¢¸Ã¹«Ë¾ÉÐδÓëÀÕË÷ÍÅ»ï¾ÙÐÐ̸ÅУ¬£¬£¬£¬£¬£¬»òÕßËüÒѾ¾Ü¾øÁËÒªÇ󡣡£¡£¡£¸ÃÍÅ»ïÉÐδÌṩÓÐ¹ØÆäй¶µÄÊý¾Ý»òÖ´Ðй¥»÷µÄʱ¼äµÄϸ½ÚÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾²¢Î´Ö¤ÊµLockBitµÄ˵·¨£¬£¬£¬£¬£¬£¬µ«ÆäÔøÔÚ8ÔÂ24ÈÕ͸¶£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ8Ô³õ¼ì²âµ½Á˹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÁËContinental¼¯ÍŵIJ¿·ÖITϵͳ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-continental-automotive-giant/
3¡¢²¨Òô×Ó¹«Ë¾JeppesenÔâµ½¹¥»÷µ¼Ö²¿·Öº½ÐÐÍýÏëÖÐÖ¹
ýÌå10ÔÂ3Èճƣ¬£¬£¬£¬£¬£¬Ìṩµ¼º½ºÍº½ÐÐÍýÏ빤¾ßµÄ²¨ÒôÈ«×Ê×Ó¹«Ë¾JeppesenÕýÔÚ´¦Öóͷ£µ¼Ö²¿·Öº½°àÖÐÖ¹µÄÇå¾²ÊÂÎñ¡£¡£¡£¡£²¨Òô¹«Ë¾µÄ½²»°È˳ƣ¬£¬£¬£¬£¬£¬Ö»¹Ü¹¥»÷µ¼Ö²¿·Öº½ÐÐÍýÏëÖÐÖ¹£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚûÓжԷɻú»òº½ÐÐÇå¾²×é³ÉÍþв¡£¡£¡£¡£ËûÃÇÕýÔÚÓë¿Í»§ºÍî¿Ïµ»ú¹¹¾ÙÐÐÏàͬ£¬£¬£¬£¬£¬£¬²¢Æð¾¢¾¡¿ì»Ö¸´Ð§ÀÍ¡£¡£¡£¡£Ö»¹ÜÖÐÖ¹µÄˮƽÉв»ÇåÎú£¬£¬£¬£¬£¬£¬µ«¸ÃÊÂÎñÓ°ÏìÁËÄ¿½ñºÍеĺ½ÐÐʹÃü֪ͨ£¨NOTAM£©µÄÎüÊպʹ¦Öóͷ££¬£¬£¬£¬£¬£¬ËüÓÃÓÚÏòº½¿ÕÕþ¸®Ìύ֪ͨ£¬£¬£¬£¬£¬£¬ÒÔÌáÐѺ½ÐÐÔ±×¢ÖØº½ÐÐõè¾¶ÉϵÄDZÔÚΣÏÕ¡£¡£¡£¡£
https://therecord.media/cyber-incident-at-boeing-subsidiary-causes-flight-planning-disruptions/
4¡¢µ¤Âó×î´óÌú·ÔËÓªÉÌDSB±»ºÚºó¸Ã¹ú»ð³µÍ£ÔËÊýСʱ
¾Ý·͸Éç11ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¸Ã¹ú×î´óµÄÌú·ÔËÓª¹«Ë¾DSBµÄËùÓлð³µÔÚÖÜÁùÔçÉÏÍ£ÔË£¬£¬£¬£¬£¬£¬ÇÒÊýСʱÎÞ·¨»Ö¸´Ðг̡£¡£¡£¡£DSBµÄÇå¾²Ö÷¹Ü͸¶£¬£¬£¬£¬£¬£¬´Ë´ÎÍ£ÔËÊÇÓÉÓÚÆäµÚÈý·½ITЧÀÍÌṩÉÌSupeoµÄ²âÊÔÇéÐα»ÈëÇÖµ¼Öµģ¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾±»ÆÈ¹Ø±ÕÁËЧÀÍÆ÷¡£¡£¡£¡£SupeoÌṩһ¸öÒÆ¶¯Ó¦Ó㬣¬£¬£¬£¬£¬ÓÃÓÚ»ð³µË¾Ê±»ú¼ûÒªº¦µÄÔËÓªÐÅÏ¢¡£¡£¡£¡£µ±Supeo¾öÒ鹨±ÕÆäЧÀÍÆ÷ʱ£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓóÌÐò×èÖ¹ÊÂÇ飬£¬£¬£¬£¬£¬Ë¾»ú±»ÆÈÍ£³µ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬£¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£
https://www.reuters.com/technology/danish-train-standstill-saturday-caused-by-cyber-attack-2022-11-03/
5¡¢MicrosoftÐû²¼¹ØÓÚ2022ÄêÊý×Ö·ÀÓùµÄÆÊÎö±¨¸æ
¾Ý11ÔÂ5ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË2022ÄêÊý×Ö·ÀÓù±¨¸æ¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚ¹ûÕæÅû¶Îó²îºó£¬£¬£¬£¬£¬£¬Æ½¾ùÖ»Ðè14Ìì¼´¿É±»ÔÚҰʹÓ㬣¬£¬£¬£¬£¬¶øÔÚGitHubÉÏÐû²¼Îó²îʹÓôúÂëÔòÐèÒª60Ìì¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬£¬£¬ÁãÈÕÎó²î×î³õÊÇÔÚ¾ßÓÐÕë¶ÔÐԵĹ¥»÷Öб»Ê¹Óõ쬣¬£¬£¬£¬£¬È»ºóºÜ¿ìÔÚÒ°Íâ¹¥»÷Öб»½ÓÄÉ¡£¡£¡£¡£¸Ã¹«Ë¾×ܽáµÀ£¬£¬£¬£¬£¬£¬Îó²îÕýÔÚ±»´ó¹æÄ£µØ·¢Ã÷ºÍʹÓ㬣¬£¬£¬£¬£¬²¢ÇÒʱ¼äÔ½À´Ô½¶Ì¡£¡£¡£¡£ËûÃǽ¨Òé×éÖ¯ÔÚÁãÈÕÎó²îÐû²¼ºóÁ¬Ã¦¾ÙÐÐÐÞ¸´£¬£¬£¬£¬£¬£¬»¹½¨Òé¼Í¼ºÍÇåµãËùÓÐÆóÒµÓ²¼þºÍÈí¼þ×ʲú£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ËüÃÇÔâµ½¹¥»÷µÄΣº¦¡£¡£¡£¡£
https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2022
6¡¢SentinelLabsÐû²¼ÀÕË÷Èí¼þBlack BastaµÄÆÊÎö±¨¸æ
11ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬SentinelLabsÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlack BastaµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Black BastaÓÚ2022Äê4Ô·ºÆð£¬£¬£¬£¬£¬£¬±¨¸æÏêϸÆÊÎöÁËBlack BastaµÄTTP£¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÿÉÄÜÓÉFIN7£¨ÓÖÃûCarbanak£©¿ª·¢Ö°Ô±¿ª·¢µÄÖÖÖÖ×Ô½ç˵¹¤¾ß¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬Black BastaºÜ¿ÉÄÜÓëFIN7ÓйØÁª¡£¡£¡£¡£Ëü»áά»¤ºÍ°²ÅÅ×Ô½ç˵¹¤¾ß£¬£¬£¬£¬£¬£¬°üÀ¨EDRÈÆ¹ý¹¤¾ß¡£¡£¡£¡£ÕâЩEDRÈÆ¹ý¹¤¾ßµÄ¿ª·¢ÕߺܿÉÄÜÊÇ»òÒ»¾ÊÇFIN7µÄ¿ª·¢Õß¡£¡£¡£¡£¹¥»÷ʹÓÃADFindµÄ»ìÏý°æ±¾£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃPrintNightmare¡¢ZeroLogonºÍNoPac¾ÙÐÐÌáȨ¡£¡£¡£¡£
https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/


¾©¹«Íø°²±¸11010802024551ºÅ