Ñо¿ÍŶӳÆÁè¼Ý30ÍòGoogle PlayÓû§ÒÑѬȾ¶à¸öÒøÐÐľÂí

Ðû²¼Ê±¼ä 2021-12-02

KasperskyÅû¶APT37ÀûÓÃChinotto¹¥»÷º«¹úµÄ»î¶¯


KasperskyÅû¶APT37ÀûÓÃChinotto¹¥»÷º«¹úµÄ»î¶¯.png


KasperskyÔÚ11ÔÂ29ÈÕÅû¶³¯ÏʺڿÍ×éÖ¯APT37£¨ÓÖ³ÆScarCruft»òTemp.Reaper£©ÔÚ½üÆÚµÄ¹¥»÷»î¶¯¡£ScarCruft´Ó2012Ä꿪ʼ»îÔ¾£¬Ö÷ÒªÕë¶Ôº«¹úµÄ¹Ù·½»ú¹¹»ò¹«Ë¾¡£´Ë´Î»î¶¯¿ªÊ¼ÓÚ2021Äê8Ô£¬³õʼѬȾý½éÊÇÓã²æÊ½µöÓã»î¶¯£¬Ö®ºóÀûÓÃIEä¯ÀÀÆ÷ÖеÄÁ½¸ö©¶´ÔÚº«¹úµÄÍøÕ¾Öа²×°×Ô½ç˵¶ñÒâÈí¼þBLUELIGHT£¬Ìᳫˮ¿Ó¹¥»÷¡£»î¶¯»¹ÀûÓÃÁ˶ñÒâÈí¼þChinotto£¬Ëü¾ßÓÐÕë¶ÔPowerShell¡¢WindowsºÍAndroidµÄ¶à¸ö±äÌå¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/



Trend Micro·¢ÏÖÀûÓúϷ¨RAT·Ö·¢SpyAgentµÄ»î¶¯


Trend Micro·¢ÏÖÀûÓúϷ¨RAT·Ö·¢SpyAgentµÄ»î¶¯.png


11ÔÂ29ÈÕ£¬Trend Micro¹ûÈ»Á˹ØÓÚSpyAgent¹¥»÷»î¶¯µÄÑо¿¡£¹¥»÷ÕßÊ×ÏÈ»áÔÚÐé¼ÙµÄ¼ÓÃÜ»õ±ÒÏà¹ØÍøÕ¾·Ö·¢Î±Ôì³É¼ÓÃÜ»õ±ÒÇ®°ü¡¢¿ó¹¤Èí¼þ»ò³åÀ˲å¼þµÄDropper¡£´Ë´Î»î¶¯ÖУ¬SpyAgentµÄбäÌåÀûÓÃÁ˶íÂÞ˹ºÏ·¨µÄÔ¶³Ì·ÃÎʹ¤¾ß (RAT) Safib Assistant¡£´ËÍ⣬»¹ÀûÓÃÁËDLL²à¼ÓÔØÂ©¶´£¬Í¨¹ý¶ñÒâDLL¸Ä¶¯RATµ÷ÓõÄÖÖÖÖAPIº¯Êý£¬¶ÔÓû§Òþ²ØRAT´°¿Ú¡£Ö®ºó£¬¶ñÒâDLL»á·µ»ØRATµÄID£¬¹¥»÷Õß¿ÉÒÔÀûÓøÃIDÁ¬½Ó²¢¿ØÖÆÄ¿±êÉ豸¡£


Ô­ÎÄÁ´½Ó£º

https://www.trendmicro.com/en_us/research/21/k/campaign-abusing-rats-uses-fake-websites.html



Ñо¿ÍŶӳÆÁè¼Ý30ÍòGoogle PlayÓû§ÒÑѬȾ¶à¸öÒøÐÐľÂí


Ñо¿ÍŶӳÆÁè¼Ý30ÍòGoogle PlayÓû§ÒÑѬȾ¶à¸öÒøÐÐľÂí.png


Äþ¾²¹«Ë¾ThreatFabricÌåÏÖÔÚ2021Äê8ÔÂÖÁ11ÔÂÆÚ¼ä£¬4¸ö²îÒìµÄÒøÐÐľÂíÒÑѬȾÁè¼Ý30Íò¸öGoogle PlayÓû§¡£Ñо¿ÈËÔ±³Æ£¬¼ì²âµ½µÄ¶ñÒâ dropperαװ2FAÉí·ÝÑéÖ¤Æ÷¡¢¶þάÂëɨÃèÆ÷ºÍPDFÎĵµÉ¨ÃèÒǵÈÓ¦Óã¬Ö¼ÔÚ°²×°Anatsa£¨ÓÖÃûTeaBot£©¡¢Alien¡¢ERMACºÍHydra¡£ÕâЩľÂí¿ÉÒÔʹÓÃ×Ô¶¯×ªÕËϵͳATS£¬ÔÚÓû§²»ÖªÇéµÄÇé¿öÏÂÇÔÈ¡Óû§ÃÜÂëºÍ»ùÓÚSMSµÄ2FAÉí·ÝÑéÖ¤´úÂë¡¢ÆÁÄ»½ØÍ¼µÈÐÅÏ¢£¬ÉõÖÁÇÔÈ¡Óû§ÒøÐÐÕË»§ÖÐ×ʽð¡£Ä¿Ç°£¬ÕâЩӦÓÃÒÑ´ÓGoogle PlayÖÐɾ³ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html



°µÍøÊг¡CannazonÔâµ½´ó¹æÄ£DDoS¹¥»÷ºóÓÀ¾Ã¹Ø±Õ


°µÍøÊг¡CannazonÔâµ½´ó¹æÄ£DDoS¹¥»÷ºóÓÀ¾Ã¹Ø±Õ.png


2021Äê11ÔÂ23ÈÕ£¬°µÍøÊг¡CannazonµÄ¹ÜÀíÔ±Ðû²¼½«ÓÀ¾Ã¹Ø±Õ¸ÃÍøÕ¾¡£¾ÝϤ£¬¸ÃÍøÕ¾ÔÚ11Ô³õÔâµ½ÁË´ó¹æÄ£DDoS¹¥»÷£¬¹ÜÀíԱͨ¹ý¼õÉÙ¶©µ¥ÊýÁ¿ºÍ¹Ø±Õ²¿ÃÅϵͳÒÔ»º½âÎÊÌâ¡£µ«ÕâÔÚÉçÇøÖÐÒýÆðÁ˺䶯£¬Óû§µ£ÓÇÕâÊÇÒ»³¡Í˳öÆ­¾Ö¡£¹ÜÀíÔ±ÔÚÐû²¼¹Ø±Õͨ¸æÊ±£¬¶ÔÓÚÕâÖÖ´¦ÖÃÒªÁìÌåÏÖǸÒ⣬³ÆÃ»ÓйûÈ»¹¥»÷»î¶¯ÊÇΪÁ˱£»¤Óû§ºÍÉçÇø£¬ÒÔ·ÀÖ¹¹©Ó¦ÉÌÊÔͼ·¢¶¯¼ÓÃÜ»õ±ÒÍ˳öÆ­¾Ö¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dark-web-market-cannazon-shuts-down-after-massive-ddos-attack/



GoogleÅû¶ZoomÖÐ2¸ö©¶´µÄϸ½Ú£¬ÏÖÒÑÈ«²¿ÐÞ¸´


GoogleÅû¶ZoomÖÐ2¸ö©¶´µÄϸ½Ú£¬ÏÖÒÑÈ«²¿ÐÞ¸´.png


Google Project ZeroÔÚ·¢ÏÖÊÓÆµ»áÒéÈí¼þZoomÖдæÔÚ2¸ö©¶´¡£µÚÒ»¸öΪ»º³åÇøÒç³ö©¶´£¬×·×ÙΪCVE-2021-34423£¬CVSSÆÀ·ÖÊÇ7.3£¬¹¥»÷ÕßÀûÓøÃ©¶´¿Éµ¼Ö·þÎñ»òÓ¦ÓÃÍ߽⣬»òÖ´ÐÐÈÎÒâ´úÂë¡£µÚ¶þ¸öΪÄÚ´æËð»µÂ©¶´£¬×·×ÙΪCVE-2021-34424£¬CVSSÆÀ·ÖÊÇ7.3£¬¸Ã©¶´¿ÉÄÜ»á̻¶½ø³ÌÄÚ´æµÄ״̬¡£ZoomÒÑÔÚ11ÔÂ24ÈÕÐÞ¸´ÁËÕâ2¸ö©¶´¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125122/security/video-conferencing-software-zoom-flaws.html



ÃÀ¹úµÄDNA¼ì²âÖÐÐÄDDCй¶Áè¼Ý210ÍòÓû§µÄÐÅÏ¢


ÃÀ¹úµÄDNA¼ì²âÖÐÐÄDDCй¶Áè¼Ý210ÍòÓû§µÄÐÅÏ¢.png


ÃÀ¹ú¶íº¥¶íÖݷѶû·Æ¶ûµÂµÄDNA¼ì²âÖÐÐÄ(DDC) й¶ÁË2102436¸ö¿Í»§µÄ¸öÈ˺ͲÆÕþÐÅÏ¢¡£´Ë´Îй¶Ê¼þÔÚ8ÔÂ6ÈÕ¼ì²âµ½£¬µ«ÆäÏêϸÐÅÏ¢½öÔÚ11ÔÂ30ÈղŹûÈ»¡£¾­ÊÓ²ìÈ·¶¨£¬¹¥»÷Õß·ÃÎÊÁ˸ûú¹¹µÄÒ»¸öÊý¾Ý¿â£¬ÆäÖаüÁ˺¬2004ÄêÖÁ2012ÄêÓû§µÄ¸öÈËÐÅÏ¢£¬Éæ¼°ÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢²ÆÕþÕ˺źÍÒøÐп¨ºÅÂë¼°ÆäPinÂë»òCVVÂëµÈÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/dna-testing-service-data-breach-users-impacted/