###### tags: `資安事件新聞週報`
# 資安事件新聞週報 2024/1/15 ~ 2024/1/19
1.重大弱點漏洞/後門/Exploit/Zero Day
Citrix NetScaler設備管理介面存在零時差漏洞,逾1,500臺系統曝險
https://www.bleepingcomputer.com/news/security/citrix-warns-of-new-netscaler-zero-days-exploited-in-attacks/
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
https://dashboard.shadowserver.org/statistics/iot-devices/time-series/?date_range=7&vendor=citrix&model=netscaler+management+interface&group_by=geo&style=stacked
針對5月丹麥能源業者遭到兆勤防火牆漏洞攻擊,有研究人員找到新的證據,認為是大規模漏洞攻擊的一部分
https://www.forescout.com/blog/analysis-of-energy-sector-cyberattacks-in-denmark-and-ukraine/
Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits - Act Now
https://thehackernews.com/2024/01/alert-over-178000-sonicwall-firewalls.html
逾17萬臺SonicWall防火牆容易受到DoS及RCE攻擊
https://bishopfox.com/blog/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable
Ivanti上週公布的SSL VPN零時差漏洞遭到大規模利用
https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/
Ivanti Connect Secure VPN Exploitation: New Observations
https://www.volexity.com/blog/2024/01/18/ivanti-connect-secure-vpn-exploitation-new-observations/
https://github.com/volexity/threat-intel/blob/main/2024/2024-01-18%20Ivanti%20Connect%20Secure%20pt3/indicators/iocs.csv
美國CISA示警Microsoft SharePoint 的關鍵漏洞已被積極利用
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10901
Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families
https://thehackernews.com/2024/01/nation-state-actors-weaponize-ivanti.html
Citrix, VMware, and Atlassian Hit with Critical Flaws — Patch ASAP!
https://thehackernews.com/2024/01/citrix-vmware-and-atlassian-hit-with.html
Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation
https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day
Oracle Critical Patch Update for January 2024
https://www.oracle.com/security-alerts/cpujan2024.html
Apache ActiveMQ Vulnerability Leads to Stealthy Godzilla Webshell
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/apache-activemq-vulnerability-leads-to-stealthy-godzilla-webshell/
FLASH: Security Bulletin: IBM QRadar SIEM contains multiple vulnerabilities (2024.01.17)
https://www.ibm.com/support/pages/node/7108657?myns=swgother&mynp=OCSSBQAC&mync=E&cm_sp=swgother-_-OCSSBQAC-_-E
Cisco 近日發布更新以解決 Cisco Unity Connection 的安全性弱點
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-unauth-afu-FROYsCsD
Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches
https://thehackernews.com/2024/01/critical-rce-vulnerability-uncovered-in.html
Juniper 針對 Junos OS 和 Junos OS Evolved 中的弱點安全報告
https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611?language=en_US
Fortinet 發布 FortiOS 和 FortiProxy 安全更新
https://www.fortiguard.com/psirt/FG-IR-23-315
微軟發布多個產品的安全性更新公告
https://msrc.microsoft.com/update-guide/releaseNote/2024-Jan
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
https://documents.trendmicro.com/images/TEx/20240111-cve-2023%E2%80%9336025-phemedrone-iocs8L7B0q0.txt
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability
https://thehackernews.com/2024/01/balada-injector-infects-over-7100.html
WordPress寄信外掛程式POST SMTP Mailer存在漏洞,攻擊者有可能用於挾持網站
https://www.bleepingcomputer.com/news/security/over-150k-wordpress-sites-at-takeover-risk-via-vulnerable-plugin/
https://www.wordfence.com/blog/2024/01/type-juggling-leads-to-two-vulnerabilities-in-post-smtp-mailer-wordpress-plugin/
https://www.bleepingcomputer.com/news/security/over-150k-wordpress-sites-at-takeover-risk-via-vulnerable-plugin/
AI Engine 外掛程式存在漏洞! 5萬個 WordPress 網站可能遭受遠端攻擊
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10895
程式碼儲存庫GitLab存在零點擊帳號劫持漏洞,攻擊過程無須使用者互動就能進行
https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/
https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591
https://dashboard.shadowserver.org/statistics/iot-devices/time-series/?date_range=7&vendor=juniper&model=web+device+manager&group_by=geo&style=stacked
https://dashboard.shadowserver.org/statistics/iot-devices/tree/?day=2023-08-28&vendor=juniper&model=web+device+manager&geo=all&data_set=count&scale=log
Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP
https://thehackernews.com/2024/01/urgent-gitlab-releases-patch-for.html
Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows
https://thehackernews.com/2024/01/opera-myflaw-bug-could-let-hackers-run.html
GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials
https://thehackernews.com/2024/01/github-rotates-keys-after-high-severity.html
Zero-Day Alert: Update Chrome Now to Fix New Actively Exploited Vulnerability
https://thehackernews.com/2024/01/zero-day-alert-update-chrome-now-to-fix.html
研究人員揭露PixieFail弱點,恐影響企業主機的PXE網路開機功能
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft
https://thehackernews.com/2024/01/pixiefail-uefi-flaws-expose-millions-of.html
U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability
https://thehackernews.com/2024/01/us-cybersecurity-agency-warns-of.html
研究人員公布9個UEFI安全漏洞,波及微軟、AMI與Arm等業者
https://www.ithome.com.tw/news/160908
蘋果、AMD、高通GPU存在名為LeftoverLocals的弱點,有可能洩露AI相關資料
http://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/
研究人員揭露PixieFail弱點,恐影響企業主機的PXE網路開機功能
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
VMware修補雲端基礎架構自動化平臺Aria Automation重大漏洞
https://www.vmware.com/security/advisories/VMSA-2024-0001.html
DevOps協作平臺Atlassian Confluence存在重大漏洞,攻擊者無須通過身分驗證就能發動RCE攻擊
https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html
Google修補2024年Chrome第1個零時差漏洞
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
微軟SharePoint權限提升漏洞CVE-2023-29357已被用於攻擊行動
https://www.cisa.gov/news-events/alerts/2024/01/10/cisa-adds-one-known-exploited-vulnerability-catalog
Opera瀏覽器檔案共用功能My Flow存在漏洞,可被用於執行作業系統底層任意檔案
https://labs.guard.io/myflaw-cross-platform-0-day-rce-vulnerability-discovered-in-operas-browser-099361a808ab
2.銀行/金融/保險/證券/金融監理 新聞及資安
國泰金控以保險雲中臺打造產品工廠,商品上線數位通路時程縮短至兩天內
https://www.ithome.com.tw/news/160927
OneDegree Global: 將提高攻擊者成本作為資安主要戰略,聚焦三大策略
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10905
金管會盯銀行春節資安
https://money.udn.com/money/story/5613/7705320
F5:金融3.0 即將上路,API 盤點六大機制保護安全
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10882
3.信用卡/電子支付/行動支付/pay/支付系統/資安
歐盟委員會徵求反饋 了解蘋果是否開放競爭對手行動支付科技
https://news.cnyes.com/news/id/5434341
行動支付鹹水雞顧客遭控「假明細」騙餐
https://reurl.cc/2zzgpX
去年120萬港澳人士內地消費快捷電子支付金額逾48億增長逾1.12倍
https://www.tkww.hk/a/202401/16/AP65a678c4e4b05c88581d6ffa.html
內地支付方式一文睇!手機支付有優勢?刷掌、刷臉支付有缺點
https://reurl.cc/dLL5R6
4.加密貨幣/數位貨幣/挖礦/區塊鍊/智能合約/WEB3 資安
29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services
https://thehackernews.com/2024/01/29-year-old-ukrainian-cryptojacking.html
Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks
https://thehackernews.com/2024/01/cryptominers-targeting-misconfigured.html
Bitfinex CTO:駭客試圖利用150億美元的XRP進行「部分支付漏洞」攻擊但未成功
https://www.panewslab.com/zh_hk/sqarticledetails/50dnfpz0Ft.html
韓國金融監管機構考慮對加密貨幣混幣器實施監管
https://news.cnyes.com/news/id/5431414
Curve團隊建議提供約604萬枚veCRV以補償JPEG'd DAO於7月因駭客攻擊造成的損失
https://news.cnyes.com/news/id/5431146
Solana 駭客:複雜的騙局竊取了數百萬加密資產
https://portalcripto.com.br/zh-TW/solana-%E9%A7%AD%E5%AE%A2%E8%A4%87%E9%9B%9C%E7%9A%84%E9%A8%99%E5%B1%80%E7%AB%8A%E5%8F%96%E4%BA%86%E6%95%B8%E7%99%BE%E8%90%AC%E5%8A%A0%E5%AF%86%E8%B3%87%E7%94%A2/
因應 Orbit Bridge 被駭,南韓監管將著手打擊混幣器的非法使用
https://abmedia.io/korea-to-monitor-vasp-mixer-tx
Coinbase獨佔8家比特幣現貨ETF託管,若「被駭」會發生什麼災難
https://www.blocktempo.com/will-coinbase-compensate-if-bitcoins-held-by-bitcoin-spot-etfs-are-stolen/
三年內兩度被攻擊、8億損失自己吞!營運長回首關鍵24小時,逆境如何讓Kronos更強大
https://web3plus.bnext.com.tw/article/2141?
BasketDAO合約被駭客入侵,損失超10萬美元
https://news.cnyes.com/news/id/5433177
Socket駭客已將盜取的USDC和USDT兌換成1137枚ETH,約合291萬美元
https://www.panewslab.com/zh_hk/sqarticledetails/2w3d66c6Ft.html
5.資安事件新聞
A.病毒木馬 / 殭屍網路 / 勒索軟體 / Adware /APT /後門程式/IOC
韓國城市的政府伺服器「感染加密挖礦惡意軟體」
https://news.knowing.asia/news/e26f90fa-bb2a-4b03-965f-7b1cff9c8ee5
駭客假冒加密貨幣交易所Coinbase,散布惡意程式Inferno Drainer
https://www.group-ib.com/blog/inferno-drainer/
遠端桌面軟體TeamViewer遭濫用,駭客對受害電腦植入勒索軟體
https://www.huntress.com/blog/ransomware-deployment-attempts-via-teamviewer
惡意程式Balada Injector鎖定外掛程式Popup Builder漏洞,感染逾7千個WordPress網站
https://www.bleepingcomputer.com/news/security/new-balada-injector-campaign-infects-6-700-wordpress-sites/
https://blog.sucuri.net/2024/01/thousands-of-sites-with-popup-builder-compromised-by-balada-injector.html
https://wpscan.com/blog/stored-xss-fixed-in-popup-builder-4-2-3/
https://infosec.exchange/@rmceoin/111665788958104483
Mirai變種殭屍網路NoaBot針對SSH伺服器而來,將其用於挖礦
https://www.akamai.com/blog/security-research/mirai-based-noabot-crypto-mining
伊朗駭客Charming Kitten鎖定歐美研究構散布惡意程式MediaPl
https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
Linux惡意軟體DreamBus鎖定Metabase、Apache RocketMQ等應用系統而來
https://www.zscaler.com/blogs/security-research/dreambus-unleashes-metabase-mayhem-new-exploit-module
竊資軟體鎖定Mac電腦而來,繞過作業系統的防護機制XProtect
https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/
惡意軟體Phemedrone Stealer透過Windows已知漏洞散布
https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
WorkersDevBackdoor Delivered via Malvertising
https://www.esentire.com/blog/workersdevbackdoor-delivered-via-malvertising
3 Ransomware Group Newcomers to Watch in 2024
https://thehackernews.com/2024/01/3-ransomware-group-newcomers-to-watch.html
Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families
https://thehackernews.com/2024/01/nation-state-actors-weaponize-ivanti.html
Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion
https://thehackernews.com/2024/01/medusa-ransomware-on-rise-from-data.html
A Victim of Mallox Ransomware
https://www.truesec.com/hub/blog/a-victim-of-mallox-ransomware-how-truesec-csirt-fought-back
殭屍網路Androxgh0st竊取AWS及微軟帳密
https://www.bleepingcomputer.com/news/security/fbi-androxgh0st-malware-botnet-steals-aws-microsoft-credentials/
Known Indicators of Compromise Associated with Androxgh0st Malware
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-016a
Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims
https://thehackernews.com/2024/01/inferno-malware-masqueraded-as-coinbase.html
This Free Discovery Tool Finds and Mitigates AI-SaaS Risks
https://thehackernews.com/2024/01/combating-ip-leaks-into-ai-applications.html
Npm Trojan Bypasses UAC, Installs AnyDesk with "Oscompatible" Package
https://thehackernews.com/2024/01/npm-trojan-bypasses-uac-installs.html
New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic
https://thehackernews.com/2024/01/new-docker-malware-steals-cpu-for.html
Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware
https://thehackernews.com/2024/01/russian-coldriver-hackers-expand-beyond.html
殭屍網路Androxgh0st鎖定PHPUnit、Laravel、Apache HTTP伺服器弱點,竊取AWS及微軟帳密
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-016a
竊資軟體Azorult捲土重來,透過冒充PDF文件的捷徑檔案散布
https://cyble.com/blog/sneaky-azorult-back-in-action-and-goes-undetected/
B.行動安全 / iPhone / Android /穿戴裝置 /App / 5G / 即時通訊
New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone
https://thehackernews.com/2024/01/new-ishutdown-method-exposes-hidden.html
MFA Spamming and Fatigue: When Security Measures Go Wrong
https://thehackernews.com/2024/01/mfa-spamming-and-fatigue-when-security.html
中國防堵 AirDrop 點對點通訊 聲稱破解加密可得知用戶身分
https://netmag.tw/2024/01/16/china-claims-to-crack-apple-airdrop-encryption-to-track-user-identity
C.事件 / 駭客 / DDOS / APT / 雲端/ 暗網/ 徵才 / 國際資安事件 / 資安人力
非營利組織Water for People遭勒索軟體Medusa攻擊
https://therecord.media/water-for-people-medusa-ransomware
英國美妝業者Lush遭遇網路攻擊
https://therecord.media/british-cosmetics-lush-cyberattack
資安量能不足 白帽駭客認為多家公司早就被駭
https://www.merit-times.com/NewsPage.aspx?unid=874924
Hadoop與Flink遭到鎖定,駭客針對不當配置下手,執行任意程式碼
https://blog.aquasec.com/threat-alert-apache-applications-targeted-by-stealthy-attacker
KKday 後台系統遭駭 472 次!Klook 高薪挖角對手經理,盜取營運策略遭起訴
https://www.managertoday.com.tw/articles/view/68018?utm_source=copyshare
旅遊業者KKday前員工帶槍投靠新東家,竟是藉由沒有修改密碼的帳號存取後臺
https://tw.nextapple.com/local/20240117/C0733ECAB34F4AAD1A3FF4ECF0CF4FA1
https://news.ltn.com.tw/news/society/breakingnews/4554650
https://www.chinatimes.com/realtimenews/20240117001501-260402
北韓駭客正洗錢!利用東南亞犯罪網絡 聯合國公開調查報告
https://www.nownews.com/news/6346637
四大攻擊類型並存!美國NIST 示警軟體設計快速導入AI可能產生的安全和隱私風險
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10892
上市半導體大廠遭駭客入侵 官網被挾持 嗆聲「公布機密」
https://www.chinatimes.com/realtimenews/20240116003087-260410?ctrack=pc_main_rtime_p03&chdtv
遭駭客入侵 京鼎:全面掃描檢測 以日常備份復原運作
https://www.fountmedia.io/article/182572
京鼎遭駭客入侵挾持官網 公司:已可復原運作無重大影響
https://www.inside.com.tw/article/33938-foxsemicon-hacker
京鼎遭駭客入侵 金管會:證交所將提醒檢視資安
https://reurl.cc/YVV6QL
京鼎遭駭客入侵 分析:應優先強化攻擊前期防護
https://www.cna.com.tw/news/ait/202401160307.aspx
京鼎遭駭客入侵!證交所親赴公司 資安查核「要求做3事」
https://www.setn.com/news.aspx?newsid=1414729
京鼎遭駭客攻擊,證交所:已派員前往查核
https://infosecu.technews.tw/2024/01/17/foxsemicon-hack/
不只京鼎!PCB廠恩德也遭駭客攻擊 公司證實:啟動防禦機制
https://news.tvbs.com.tw/life/2370444
印刷電路板業者恩德證實部分資訊系統遭遇網路攻擊
https://mops.twse.com.tw/mops/web/ajax_t05sr01_1?firstin=true&stp=1&step=1&SEQ_NO=1&SPOKE_TIME=161057&SPOKE_DATE=20240117&COMPANY_ID=1528
瑞士政府稱多個網站遭俄羅斯駭客攻擊 對其接待澤連斯基進行報復
https://reurl.cc/VNNXo5
駭客組織Anonymous Sudan聲稱攻擊倫敦網際網路交換中心得逞
https://www.hackread.com/anonymous-sudan-london-internet-exchange-attack/
立陶宛網站遭到俄羅斯駭客NoName攻擊,起因是該國聲援烏克蘭
https://thecyberexpress.com/cyberattack-on-lithuania-websites/
「伏特颱風」強度再增加! 近一個月系統性攻擊美、英、澳關鍵基礎設施
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10900
老舊思科路由器遭中國駭客組織Volt Typhoon鎖定,被用於部署殭屍網路基礎設施
https://resources.securityscorecard.com/research/volt-typhoon
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
https://resources.securityscorecard.com/research/volt-typhoon
Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts
https://thehackernews.com/2024/01/iranian-hackers-masquerades-as.html
From Russia With Code: Disarming Atomic Stealer
https://russianpanda.com/2024/01/15/Atomic-Stealer-AMOS/
https://github.com/RussianPanda95/Yara-Rules/blob/main/AtomicStealer/Atomic_Stealer.yar
Bigpanzi Exposed: The Hidden Cyber Threat Behind Your Set-Top Box
https://blog.xlab.qianxin.com/bigpanzi-exposed-hidden-cyber-threat-behind-your-stb/
DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023
https://thehackernews.com/2024/01/ddos-attacks-on-environmental-services.html
New Findings Challenge Attribution in Denmark's Energy Sector Cyberattacks
https://thehackernews.com/2024/01/new-findings-challenge-attribution-in.html
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware
https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/
D.資料外洩/個資法/GDPR/網路詐騙/網路釣魚/盜刷/假新聞/網路霸凌/帳號安全
印度網際網路服務供應商Hathway資料外洩,駭客架設搜尋引擎供受害客戶確認,藉此向該ISP施壓
https://www.hackread.com/indian-isp-hathway-data-breach-user-data-kyc-leak/
Security Brief: TA866 Returns with a Large Email Campaign
https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta866-returns-large-email-campaign
Surfing the Tidal Waves of HR-Themed Spam Emails
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/surfing-the-tidal-waves-of-hr-themed-spam-emails/
Financial Fraud APK Campaign
https://unit42.paloaltonetworks.com/malicious-apks-steal-pii-from-chinese-users/
Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer
https://thehackernews.com/2024/01/hackers-weaponize-windows-flaw-to.html
Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials
https://thehackernews.com/2024/01/feds-warn-of-androxgh0st-botnet.html
Preventing Data Loss: Backup and Recovery Strategies for Exchange Server Administrators
https://thehackernews.com/2024/01/preventing-data-loss-backup-and.html
94%企業在2023年遭遇網路釣魚攻擊
https://pages.egress.com/whitepaper-email-risk-report-01-24.html
E.研究報告/工具
Docker主機遭到鎖定,被用於挖礦及盜賣流量牟利
https://www.cadosecurity.com/containerised-clicks-malicious-use-of-9hits-on-vulnerable-docker-hosts/
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
Rimasuta New Variant Switches to ChaCha20 Encryption Algorithm
https://blog.xlab.qianxin.com/rimasuta-new-variant-switches-to-chacha20-encryption-en/
Fortinet 詳細揭露駭客組織利用YouTube散播Lumma變種攻擊手法
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10898
安永:68%執行長認為生成式AI不確定性 帶來運用上挑戰
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10894
Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO
https://thehackernews.com/2024/01/applying-tyson-principle-to.html
The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic and CherryPie Continue to Adapt
https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/
Analysis of the Pure Malware Family: Unique and Growing Threat
https://any.run/cybersecurity-blog/pure-malware-family-analysis/
Detailed Analysis of DarkGate; Investigating new top-trend backdoor malware
https://medium.com/s2wblog/detailed-analysis-of-darkgate-investigating-new-top-trend-backdoor-malware-0545ecf5f606
Burnout: Inferno Drainer’s multimillion-dollar scam scheme detailed
https://otx.alienvault.com/pulse/65a90b0cfd7d892f1197f724
Case Study: The Cookie Privacy Monster in Big Global Retail
https://thehackernews.com/2024/01/case-study-cookie-privacy-monster-in.html
機器學習框架PyTorch存在軟體供應鏈弱點,攻擊者可鎖定CI/CD流程下手
https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/#identifying-the-vulnerability
TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks
https://thehackernews.com/2024/01/tensorflow-cicd-flaw-exposed-supply.html
Fortinet 詳細揭露駭客組織利用YouTube散播Lumma變種攻擊手法
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10898
Google揭露俄羅斯駭客ColdRiver的最新戰術,以PDF檔遞送後門程式
https://www.ithome.com.tw/news/160928
「潛伏AI間諜」系統知道如何找到繞過檢查的方法,包括竊取數據、破壞系統或傳播惡意軟體
https://www.techbang.com/posts/112493-ai-spy-systems
機器學習框架TensorFlow存在CI/CD缺陷,恐被用於供應鏈攻擊
https://www.praetorian.com/blog/tensorflow-supply-chain-compromise-via-self-hosted-runner-attack/
GitHub針對12月揭露的高風險漏洞輪調金鑰
https://thehackernews.com/2024/01/github-rotates-keys-after-high-severity.html
https://github.blog/2024-01-16-rotating-credentials-for-github-com-and-new-ghes-patches/
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes
AI模型有可能躲過相關資安訓練,埋藏欺騙性的後門
https://www.ithome.com.tw/news/160838
竊資軟體鎖定Mac電腦而來,繞過作業系統的防護機制XProtect來迴避偵測
https://www.ithome.com.tw/news/160906#:~:text=%E7%AB%8A%E8%B3%87%E8%BB%9F%E9%AB%94%E9%8E%96%E5%AE%9AMac%E9%9B%BB%E8%85%A6%E8%80%8C%E4%BE%86%EF%BC%8C%E7%B9%9E%E9%81%8E%E4%BD%9C%E6%A5%AD%E7%B3%BB%E7%B5%B1%E7%9A%84%E9%98%B2%E8%AD%B7%E6%A9%9F%E5%88%B6XProtect%E4%BE%86%E8%BF%B4%E9%81%BF%E5%81%B5%E6%B8%AC
F.商業
HPE 即將完成收購Juniper Networks 連接AI原生和雲端原生世界
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10897
亞利安科技攜手PacketX重塑網路安全防禦對策
https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=10896
Google雲端成為 Flare 網路驗證者,FLR 上漲超 18%
https://portalcripto.com.br/zh-TW/google-cloud-se-torna-validador-da-flare-network/#google_vignette
NetApp 從網路韌性出發,有效對抗頑強勒索攻擊
https://www.cio.com.tw/netapp-is-resilient-from-network-resilience-against-tenacious-extortion-attacks/
G.政府
調查局新任副局長2+1!增「科技」領域 主秘兼資安長吳富梅升任
https://www.ettoday.net/news/20240115/2664629.htm
臺灣也要推Digital Wallet,數位部明年將推數位皮夾,可望整合自然人憑證、駕照等證件
https://www.ithome.com.tw/news/160933
台灣大選前「網路攻擊」數量暴增3370% 美專家:與中國有關
https://www.ettoday.net/news/20240115/2664755.htm
網攻不斷!大選前「駭客」入侵頻繁 資安院戒備
https://www.setn.com/news.aspx?newsid=1415754
駭客?台中市府官網進不去 數位局致歉解釋了
https://tw.nextapple.com/politics/20240116/23E6A86D847A86332C1CA23F57C67836
台中市府官網「轉圈圈」疑遭駭?數位局長親解謎:資料庫更新
https://reurl.cc/099OQM
國科會:資安威脅日益嚴峻 持續公私協力精進聯防
https://www.cna.com.tw/news/afe/202401170301.aspx
上市櫃科技公司遭駭 資安署:疑點擊釣魚連結|20240118 公視晚間新聞
https://www.youtube.com/watch?v=yvs2yr8Povc
上市櫃公司陸續遭駭 數位部為何示警社交工程欺騙
https://news.pts.org.tw/article/677146
LINE台灣用戶資料百筆外洩 數位部:已完成行政調查
https://www.cna.com.tw/news/afe/202401180275.aspx
抵禦網路癱瘓攻擊! 資安實兵"紅藍隊演練"攻守交戰 網路防衛戰! 中共61726部隊對決"台駭客部隊"
https://www.youtube.com/watch?v=QzHtjgJs3mw
H.工控系統/ICS/SCADA/IOT/物聯網/車聯網/電動車/人工智慧/AI/ML/人臉辨識/醫療 相關資安
逾17萬臺安卓智慧電視、電視盒感染殭屍網路病毒,從事攻擊的駭客組織Bigpanzi背後可能有企業在撐腰
https://blog.xlab.qianxin.com/bigpanzi-exposed-hidden-cyber-threat-behind-your-stb/
17萬臺安卓電視盒感染殭屍網路病毒Bigpanzi
https://blog.xlab.qianxin.com/bigpanzi-exposed-hidden-cyber-threat-behind-your-stb/
Mirai Zombie Network Variant "Aquabot" Analysis
https://www.antiy.cn/research/notice&report/research_report/Aquabot.html
Bosch恆溫器存在漏洞,有可能被用於部署惡意軟體
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-bosch-bcc100-thermostat/
High-Severity Flaws Uncovered in Bosch Thermostats and Smart Nutrunners
https://thehackernews.com/2024/01/high-severity-flaws-uncovered-in-bosch.html
PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions
https://thehackernews.com/2024/01/pax-pos-terminal-flaw-could-allow.html
PAX執行安卓作業系統的PoS機臺存在漏洞,攻擊者有可能竄改交易金額及其他資料
https://cert.pl/en/posts/2024/01/CVE-2023-4818/
I.教育訓練
iPAS資訊安全工程師中級筆記
https://hackmd.io/@Not/iPASInformationSecuritySpecialist
iPas資安工程師證照考前研習
https://reurl.cc/GEbA3p
Coursera 盤點 7 項雲端資安認證,高薪跳板都在這了!
https://buzzorange.com/techorange/2022/07/12/cloud-security-certificates/
全球網絡安全勞動力失衡 (ISC)2免費課程及考試填補人才缺口
https://reurl.cc/m39MDj
CISSP資安認證的8大領域
https://2formosa.blogspot.com/2022/12/CISSP-topic-domains.html
CISSP考試心得
https://reurl.cc/KbY83j
CISSP考試心得 – Benson
https://reurl.cc/GbWvxd
目標導向-20天光速考過CISSP
https://reurl.cc/2Zq6zn
CISSP證照考試實戰心得 第一章:初期準備工作
https://netmag.tw/2022/06/17/the-cissp-has-learned-the-first-chapter-in-actual-combat
CISSP證照考試實戰心得 第二章:規律且有紀律的讀書策略
https://netmag.tw/2022/07/01/the-cissp-is-in-the-field-of-combat-chapter-two-regular-and-disciplined-reading-strategies
CISSP證照考試實戰心得 第三章:終極一戰
https://netmag.tw/2022/07/12/the-cissp-has-learned-a-third-chapter-in-actual-combat-experience-the-ultimate-battle
Quick CISSP Infographic for IPSec
https://www.studynotesandtheory.com/single-post/quick-cissp-infographic-for-ipsec
CSSLP Certification - Security models in F#
https://github.com/vbocan/csslp
Certified Secure Software Lifecycle Professional in bullet points
https://github.com/joeyhage/csslp-notes
CPSA(CREST Practitioner Security Analyst) 資安分析師考試心得
https://tech-blog.cymetrics.io/posts/huli/crest-cpsa-prepare/
EC-Council CEH v11 考試心得、改版資訊以及準備方向 2021、2022
https://reurl.cc/1oyEM8
CEH v11 考試心得與準備方式
https://blog.sean.taipei/2022/01/ceh
CEH
https://github.com/a3cipher/CEH
CodeRed by EC-Council
https://github.com/codered-by-ec-council
EC-Council CEH Practical / Master 準備心得 — 讓理論與實作相輔相成的學習
https://medium.com/blacksecurity/ceh-practical-master-3e80cac180a2
EC-Council CEHP考試準備心得
https://hackmd.io/@9dCJrgb6QHGd8dRfgHO0zg/r14xNn1po
ECSA v10 考試心得與讀書資料分享/ ECSA v10 Review and Study Materials
https://medium.com/blacksecurity/ecsa-v10-1ec76c0eb7d4
EC-Council ECSA資安分析專家 v10 考試心得分享
https://javaxtalk.blogspot.com/2019/05/ec-council-ecsa-v10.html
20180817 EC-Council ECSA v10 PASS
https://www.ptt.cc/bbs/License/M.1534571704.A.5BA.html
關於EC-Council CPENT和LPT Master滲透測試證照準備方式及心得分享
https://medium.com/@ChadSecurity/%E9%97%9C%E6%96%BCec-council-cpent%E5%92%8Clpt-master%E6%BB%B2%E9%80%8F%E6%B8%AC%E8%A9%A6%E8%AD%89%E7%85%A7%E6%BA%96%E5%82%99%E6%96%B9%E5%BC%8F%E5%8F%8A%E5%BF%83%E5%BE%97%E5%88%86%E4%BA%AB-efb63de00a8d
深度解析 CPENT 考試心得、以及與 OSCP 的比較
https://reurl.cc/41eL8v
EC-Council CPENT v1 滲透測試認證 – 內容及心得分享
https://hackercat.org/pentesting/ec-council-cpent-v1-experience-review
CPENT 從暴力到破解
https://hackmd.io/@3WAsoRFgSlyy7pm10p60kg/ByO0zs295
Ec-Council CPENT心得 - 資安菜鳥從CEH到LPT Master
https://4hsienyang.medium.com/cpent-lpt-master-ccaebf2dbc7f
CPENT考試心得分享:一次拿到 LPT 滲透測試大師認證
https://ucom.uuu.com.tw/web/Testimony/Article/4404
kaizensecurity/CPENT
https://github.com/kaizensecurity/CPENT/tree/master
CPENT : Pentesting like NO OTHERS !
https://www.linkedin.com/pulse/cpent-pentesting-like-others-belly-rachdianto/
Journey of My CPENT Exam
https://medium.com/techiepedia/journey-of-my-cpent-exam-3a5d7ee6d917
[備考心得]CompTIA Security+ (SY0–601) 上篇
https://reurl.cc/M053DK
[備考心得]CompTIA Security+ (SY0–601) 下篇
https://reurl.cc/M053Gv
comptia-security-plus
https://github.com/ajfuto/comptia-security-plus
security-plus
https://github.com/fjavierm/security-plus
CompTIA Security+ Certification Practice Test Questions
https://www.examcompass.com/comptia/security-plus-certification/free-security-plus-practice-tests#google_vignette
不只是工程師才要懂的 App 資訊安全:取得資安檢測合格證書血淚史(iT邦幫忙鐵人賽系列書)
https://news.pchome.com.tw/living/books/20220202/index-64375841669874292009.html
OSEP (Evasion Techniques and Breaching Defenses (PEN-300) 心得分享
https://hackmd.io/@henry-ko/HyQ56e8eF
OSCP(Offensive Security Certified Professional)
https://github.com/0x584A/oscp-notes/tree/master
ISACA Certified Information Systems Auditor® (CISA) 國際電腦稽核師認證準備歷程心得、申請流程分享- 2023年
https://reurl.cc/aVLoX9
Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
https://thehackernews.com/2022/06/learn-nist-inside-out-with-21-hours-of.html
駭客與國家: 網路攻擊與地緣政治新常態
The hacker and the state: cyber attacks and the new normal of geopolitic
https://reurl.cc/D3nKKj
Practical Network Penetration Tester (PNPT) Certification Review
https://tmc222.medium.com/practical-network-penetration-tester-pnpt-certification-review-4280e4e164df
WUSON常用的基本詞彙
https://choson.lifenet.com.tw/?p=1958
證照仍是學習資安基本功的主要管道,有專家打造「資安證照地圖」
https://www.ithome.com.tw/news/156754
用證照證明自己實力之餘,更應將證照視為督促學習的最大動力
https://www.ithome.com.tw/news/156756
打破證照誤解與迷思,資安專家帶你釐清資安證照的意義
https://www.ithome.com.tw/news/156755
Accelerate Your Career with the Global Leader in Cyber Security Training
https://www.sans.org/mlp/promo-partnership-hacker-news/
6.近期資安活動及研討會
2024 Global NF Conference 2024/1/20 ~ 2024/1/25
https://www.ctf.org/events/2024-joint-global-nf-conference#
獲利究竟被誰偷走了-Excel樞紐分析編製各式報表與查核 2024/1/24
https://www.caa.org.tw/coursedetail-36599.html
Cyber Range in 2024 2024/1/24 ~ 2024/1/25
https://www.wwt.com/event/64e4ebafc176b30347f0568a
SyntaxError 2024/1/24
https://www.meetup.com/pythonhug/events/pqnsctygccbgc/
SANS Cyber Threat Intelligence Summit & Training 2024 2024/1/29 - 2024/2/5
https://www.sans.org/cyber-security-training-events/cyber-threat-intelligence-summit-2024/
SyntaxError 2024/1/31
https://www.meetup.com/pythonhug/events/pqnsctygccbpc/
第七屆《Hit AI & Blockchain》人工智慧暨區塊鏈產業高峰會 2024/2/6
https://www.accupass.com/event/2311160625102022535520
資安五四三 2024/2/21
https://csa.kktix.cc/events/202402-543
2024資安365年會 2024/2/22
https://www.informationsecurity.com.tw/seminar/2024_TPinfosecurity365/register.aspx
【安碁學苑】IPAS 資訊安全工程師中級證照培訓班 2024/2/20-2024/2/3/5
https://www.accupass.com/event/2312151022301066488466
資安事件調查與實務分析 2024/3/6(三)
https://docs.google.com/forms/d/1bO_IhZ9gxZ-nFNGVva7ZfRWyX5B3n-sKEdW6nkPtj50/edit
黑客視角:網站漏洞挖掘與防禦 2024/3/20
https://docs.google.com/forms/d/1OGcXzbo2vG9_DU5oQ9DCAF2zWJtewqrd4OM28zdatw4/edit