CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²¿·Ö²úÆ·ÖеĶà¸öÎó²î

Ðû²¼Ê±¼ä 2022-11-07
1¡¢CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²¿·Ö²úÆ·ÖеĶà¸öÎó²î

      

CiscoÓÚ11ÔÂ2ÈÕÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²¿·Ö²úÆ·ÖеĶà¸öÎó²î ¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÊÇ¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2022-20961£©£¬£¬£¬£¬£¬£¬£¬ËüÓ°ÏìÁËÉí·ÝЧÀÍÒýÇæ(ISE)£¬£¬£¬£¬£¬£¬£¬»ù´¡Ôµ¹ÊÔ­ÓÉÊÇ»ùÓÚWebµÄÖÎÀí½çÃæµÄCSRF±£»£»£»£» £»£»£»£»¤È±·¦ ¡£¡£¡£¡£ÒÔ¼°ISE²úÆ·ÖеĻá¼û¿ØÖÆÈ±·¦Îó²î£¨CVE-2022-20956£©£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÏòÄ¿µÄ·¢ËÍÌØÖÆµÄHTTPÇëÇóÀ´Ê¹Óà ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËCisco ESAºÍCisco Secure Email and Web Manager Next Generation ManagementÖеÄSQL×¢ÈëÎó²î£¨CVE-2022-20867£©ºÍÌáȨÎó²î£¨CVE-2022-20868£©µÈ ¡£¡£¡£¡£


https://securityaffairs.co/wordpress/138068/security/cisco-addressed-multiple-flaws.html


2¡¢LockBitÉù³Æ¶ÔµÂ¹úÆû³µ¹«Ë¾ContinentalµÄ¹¥»÷ÈÏÕæ

      

¾ÝýÌå11ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïLockBitÉù³Æ¶ÔµÂ¹úContinental£¨´ó½Æû³µ£©µÄ¹¥»÷ÈÏÕæ ¡£¡£¡£¡£ÓÉÓÚLockBitÌåÏÖ½«Ðû²¼ËùÓпÉÓÃÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÕâÅú×¢¸Ã¹«Ë¾ÉÐδÓëÀÕË÷ÍÅ»ï¾ÙÐÐ̸ÅУ¬£¬£¬£¬£¬£¬£¬»òÕßËüÒѾ­¾Ü¾øÁËÒªÇó ¡£¡£¡£¡£¸ÃÍÅ»ïÉÐδÌṩÓÐ¹ØÆäй¶µÄÊý¾Ý»òÖ´Ðй¥»÷µÄʱ¼äµÄϸ½ÚÐÅÏ¢ ¡£¡£¡£¡£¸Ã¹«Ë¾²¢Î´Ö¤ÊµLockBitµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬µ«ÆäÔøÔÚ8ÔÂ24ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ8Ô³õ¼ì²âµ½Á˹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÁËContinental¼¯ÍŵIJ¿·ÖITϵͳ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-continental-automotive-giant/


3¡¢²¨Òô×Ó¹«Ë¾JeppesenÔâµ½¹¥»÷µ¼Ö²¿·Öº½ÐÐÍýÏëÖÐÖ¹ 

      

ýÌå10ÔÂ3Èճƣ¬£¬£¬£¬£¬£¬£¬Ìṩµ¼º½ºÍº½ÐÐÍýÏ빤¾ßµÄ²¨ÒôÈ«×Ê×Ó¹«Ë¾JeppesenÕýÔÚ´¦Öóͷ£µ¼Ö²¿·Öº½°àÖÐÖ¹µÄÇå¾²ÊÂÎñ ¡£¡£¡£¡£²¨Òô¹«Ë¾µÄ½²»°È˳Æ£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü¹¥»÷µ¼Ö²¿·Öº½ÐÐÍýÏëÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚûÓжԷɻú»òº½ÐÐÇå¾²×é³ÉÍþв ¡£¡£¡£¡£ËûÃÇÕýÔÚÓë¿Í»§ºÍî¿Ïµ»ú¹¹¾ÙÐÐÏàͬ£¬£¬£¬£¬£¬£¬£¬²¢Æð¾¢¾¡¿ì»Ö¸´Ð§ÀÍ ¡£¡£¡£¡£Ö»¹ÜÖÐÖ¹µÄˮƽÉв»ÇåÎú£¬£¬£¬£¬£¬£¬£¬µ«¸ÃÊÂÎñÓ°ÏìÁËÄ¿½ñºÍеĺ½ÐÐʹÃü֪ͨ£¨NOTAM£©µÄÎüÊպʹ¦Öóͷ££¬£¬£¬£¬£¬£¬£¬ËüÓÃÓÚÏòº½¿ÕÕþ¸®Ìύ֪ͨ£¬£¬£¬£¬£¬£¬£¬ÒÔÌáÐѺ½ÐÐÔ±×¢ÖØº½ÐÐõè¾¶ÉϵÄDZÔÚΣÏÕ ¡£¡£¡£¡£


https://therecord.media/cyber-incident-at-boeing-subsidiary-causes-flight-planning-disruptions/


4¡¢µ¤Âó×î´óÌú·ÔËÓªÉÌDSB±»ºÚºó¸Ã¹ú»ð³µÍ£ÔËÊýСʱ

      

¾Ý·͸Éç11ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬¸Ã¹ú×î´óµÄÌú·ÔËÓª¹«Ë¾DSBµÄËùÓлð³µÔÚÖÜÁùÔçÉÏÍ£ÔË£¬£¬£¬£¬£¬£¬£¬ÇÒÊýСʱÎÞ·¨»Ö¸´ÐÐ³Ì ¡£¡£¡£¡£DSBµÄÇå¾²Ö÷¹Ü͸¶£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÍ£ÔËÊÇÓÉÓÚÆäµÚÈý·½ITЧÀÍÌṩÉÌSupeoµÄ²âÊÔÇéÐα»ÈëÇÖµ¼ÖµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾±»ÆÈ¹Ø±ÕÁËЧÀÍÆ÷ ¡£¡£¡£¡£SupeoÌṩһ¸öÒÆ¶¯Ó¦Ó㬣¬£¬£¬£¬£¬£¬ÓÃÓÚ»ð³µË¾Ê±»ú¼ûÒªº¦µÄÔËÓªÐÅÏ¢ ¡£¡£¡£¡£µ±Supeo¾öÒ鹨±ÕÆäЧÀÍÆ÷ʱ£¬£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓóÌÐò×èÖ¹ÊÂÇ飬£¬£¬£¬£¬£¬£¬Ë¾»ú±»ÆÈÍ£³µ ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬£¬£¬µ«ÊÓ²ìÈÔÔÚ¾ÙÐÐÖÐ ¡£¡£¡£¡£


https://www.reuters.com/technology/danish-train-standstill-saturday-caused-by-cyber-attack-2022-11-03/


5¡¢MicrosoftÐû²¼¹ØÓÚ2022ÄêÊý×Ö·ÀÓùµÄÆÊÎö±¨¸æ

      

¾Ý11ÔÂ5ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË2022ÄêÊý×Ö·ÀÓù±¨¸æ ¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚ¹ûÕæÅû¶Îó²îºó£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÖ»Ðè14Ìì¼´¿É±»ÔÚҰʹÓ㬣¬£¬£¬£¬£¬£¬¶øÔÚGitHubÉÏÐû²¼Îó²îʹÓôúÂëÔòÐèÒª60Ìì ¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽£¬£¬£¬£¬£¬£¬£¬ÁãÈÕÎó²î×î³õÊÇÔÚ¾ßÓÐÕë¶ÔÐԵĹ¥»÷Öб»Ê¹ÓõÄ£¬£¬£¬£¬£¬£¬£¬È»ºóºÜ¿ìÔÚÒ°Íâ¹¥»÷Öб»½ÓÄÉ ¡£¡£¡£¡£¸Ã¹«Ë¾×ܽáµÀ£¬£¬£¬£¬£¬£¬£¬Îó²îÕýÔÚ±»´ó¹æÄ£µØ·¢Ã÷ºÍʹÓ㬣¬£¬£¬£¬£¬£¬²¢ÇÒʱ¼äÔ½À´Ô½¶Ì ¡£¡£¡£¡£ËûÃǽ¨Òé×éÖ¯ÔÚÁãÈÕÎó²îÐû²¼ºóÁ¬Ã¦¾ÙÐÐÐÞ¸´£¬£¬£¬£¬£¬£¬£¬»¹½¨Òé¼Í¼ºÍÇåµãËùÓÐÆóÒµÓ²¼þºÍÈí¼þ×ʲú£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ËüÃÇÔâµ½¹¥»÷µÄΣº¦ ¡£¡£¡£¡£


https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2022


6¡¢SentinelLabsÐû²¼ÀÕË÷Èí¼þBlack BastaµÄÆÊÎö±¨¸æ

      

11ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬SentinelLabsÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlack BastaµÄÆÊÎö±¨¸æ ¡£¡£¡£¡£Black BastaÓÚ2022Äê4Ô·ºÆð£¬£¬£¬£¬£¬£¬£¬±¨¸æÏêϸÆÊÎöÁËBlack BastaµÄTTP£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ê¹ÓÿÉÄÜÓÉFIN7£¨ÓÖÃûCarbanak£©¿ª·¢Ö°Ô±¿ª·¢µÄÖÖÖÖ×Ô½ç˵¹¤¾ß ¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬Black BastaºÜ¿ÉÄÜÓëFIN7ÓйØÁª ¡£¡£¡£¡£Ëü»áά»¤ºÍ°²ÅÅ×Ô½ç˵¹¤¾ß£¬£¬£¬£¬£¬£¬£¬°üÀ¨EDRÈÆ¹ý¹¤¾ß ¡£¡£¡£¡£ÕâЩEDRÈÆ¹ý¹¤¾ßµÄ¿ª·¢ÕߺܿÉÄÜÊÇ»òÒ»¾­ÊÇFIN7µÄ¿ª·¢Õß ¡£¡£¡£¡£¹¥»÷ʹÓÃADFindµÄ»ìÏý°æ±¾£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃPrintNightmare¡¢ZeroLogonºÍNoPac¾ÙÐÐÌáȨ ¡£¡£¡£¡£


https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/