APT×éÖ¯BlackTechÀûÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾
Ðû²¼Ê±¼ä 2021-12-30APT×éÖ¯BlackTechÀûÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾
¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬¼äµýAPT×éÖ¯BlackTechÀûÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾¡£´Ë´Î¹¥»÷µÄ³õʼѬȾý½éÊÇαװ³ÉÀ´×ÔÄ¿±êºÏ×÷»ï°éµÄµöÓãÓʼþ£¬Ö®ºó¹¥»÷Õß»áÀûÓÃFlagpro½øÐÐÍøÂçÕì²ì¡¢ÆÀ¹ÀÄ¿±ê»·¾³ÒÔ¼°ÏÂÔØ²¢Ö´Ðеڶþ½×¶Î¶ñÒâÈí¼þ¡£¾ÝNTT Security³Æ£¬´Ë´Î»î¶¯ÖÁÉÙʼÓÚ2020Äê10Ô£¬ÒÑÕë¶ÔÈÕ±¾¹«Ë¾Ò»Äê¶à£¬Éæ¼°¹ú·À¼¼Êõ¡¢Ã½ÌåºÍͨÐÅÐÐÒµÔÚÄڵĶà¸öÁìÓò¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-flagpro-malware-linked-to-chinese-state-backed-hackers/
Morphus Labs·¢ÏÖ¶à¸öÀûÓÃMSBuildµÄ¹¥»÷»î¶¯
12ÔÂ27ÈÕ£¬Morphus LabsºÍSANS ISCÐû²¼³ÂË߳ƣ¬ÔÚ¹ýÈ¥Ò»ÖÜÖмì²âµ½2¸öÀûÓÃMicrosoft Build Engine(MSBuild)µÄ¹¥»÷»î¶¯¡£ÔÚÕâЩ»î¶¯ÖУ¬¹¥»÷Õßͨ³£ÏÈÀûÓÃÔ¶³Ì×ÀÃæÐÒé(RDP)ÕÊ»§·ÃÎÊÄ¿±ê»·¾³£¬È»ºóÀûÓÃÔ¶³ÌWindows·þÎñ(SCM)½øÐкáÏòÒÆ¶¯£¬×îºóÀûÓÃMSBuildÖ´ÐÐCobalt Strike Beacon¡£¹¥»÷ÖÐʹÓõĶñÒâMSBuildÏîÄ¿¿ÉÒÔ±àÒëºÍÖ´ÐÐÌØ¶¨µÄC#´úÂ룬½ø¶ø½âÂëºÍÖ´ÐÐCobalt Strike¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/threat-actors-abuse-msbuild-cobalt-strike-beacon-execution
T-MobileÒòÔâµ½SIM½»»»¹¥»÷£¬Óû§ÐÅÏ¢ÔÙ´Îй¶
12ÔÂ29ÈÕ£¬T-Mobile·¢ÑÔÈË֤ʵÆä²¿ÃÅÓû§Ôâµ½SIM½»»»¹¥»÷£¬ÐÅÏ¢¿ÉÄÜÒѾй¶¡£T-Mobile³ÆÆäÍŶÓÔÚ·¢ÏÖÎÊÌâºóÁ¢¿Ì½ÓÄÉÓ¦¼±´ëÊ©£¬²¢ÒÑÖ÷¶¯½ÓÄÉÌØ±ðµÄ±£»¤´ëÊ©¡£µ±±»ÒªÇóÌṩÓйØÊÜÓ°ÏìÓû§ÊýÁ¿ÒÔ¼°¹¥»÷ÕߵĹ¥»÷·½Ê½Ê±£¬T-Mobile¾Ü¾øÌṩ¸ü¶àÏêϸÐÅÏ¢¡£T-MobileÒÑ·¢Éú¶à´ÎÐÅϢй¶£¬´Ë´ÎʼþÓë½ñÄê2Ô·ݵÄй¶Ê¼þ·Ç³£ÏàËÆ£¬ÆäʱÒòSIM½»»»¹¥»÷й¶400¸öÓû§µÄÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/t-mobile-says-new-data-breach-caused-by-sim-swap-attacks/
Galaxy Store´æÔÚ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ
ýÌå12ÔÂ28Èճƣ¬ÈýÐǵĹٷ½AndroidÓ¦Ó÷¨Ê½É̵êGalaxy Store´æÔÚ¶à¸ö¶ñÒâÓ¦Óá£ÕâЩӦÓÃαװ³ÉÒÑÓÚ2018ÄêÆÆ²úµÄµÁ°æÓ¦ÓÃShowBox£¬ÒÑÔÚ¶à¸öÓû§µÄÉ豸ÉÏ´¥·¢Google Play Protect¾¯±¨¡£Ñо¿ÈËÔ±³Æ£¬ÕâЩӦÓÃÖ®ËùÒԻᴥ·¢¾¯±¨£¬ÊÇÒòΪËüÃÇÇëÇó¾ßÓа²×°¶ñÒâÈí¼þ·çÏÕµÄȨÏÞ£¬µ±Óû§ÔÊÐíºóËüÃǾͿÉÒÔ·ÃÎÊÁªÏµÈËÁбíºÍͨ»°¼Ç¼¡¢Ö´ÐдúÂë¡¢»ñÈ¡¶ñÒâÈí¼þpayloadµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/riskware-android-streaming-apps-found-on-samsungs-galaxy-store/
ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½ÚÆÚ¼äÔâµ½µÄÍøÂç¹¥»÷
¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬ÈøË¹¿¦³¹ÎÂÊ¡¾ÆÀàºÍ²©²Ê¹ÜÀí¾Ö£¨SLGA£©ÕýÔÚ×ÅÊÖÊÓ²ìÆäÔâµ½µÄÍøÂç¹¥»÷¡£SLGAÊÇÃÀ¹ú²ÆÕþ²¿»Ê¹Ú¹«Ë¾ÂôÁ¦·ÖÏú¡¢¿ØÖƺͼà¹Ü¾Æ¾«ÒûÁÏ¡¢´óÂéºÍ´ó¶àÊý¶ÄÇ®µÄ»ú¹¹£¬Î»ÓÚ¼ÓÄôóµÄÈøË¹¿¦³¹ÎÂÊ¡¡£¹¥»÷·¢ÉúÔÚ12ÔÂ25ÈÕ£¬SLGAÌåÏÖ£¬ÊÓ²ìÏÔʾĿǰûÓÐÈκοͻ§¡¢Ô±¹¤»òÆäËüÊý¾Ý±»ÀÄÓã¬ÔÚÍê³É¶Ô¸ÃʼþµÄÆÀ¹Àºó£¬½«Á¢¼´Ê¹ÊÜÓ°ÏìµÄÏµÍ³ÖØÐÂÉÏÏß¡£
ÔÎÄÁ´½Ó£º
https://globalnews.ca/news/8477174/slga-investigating-christmas-day-cybersecurity-incident/
Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄ¼¼Êõ·ÖÎö
12ÔÂ27ÈÕ£¬Check PointÅû¶Equation GroupʹÓõÄÈ«¹¦Ð§¶ñÒâÈí¼þ¿ò¼ÜDanderSpritzµÄ¼¼Êõ·ÖÎö¡£DanderSpritzÓÚ2017Äê4ÔÂ14ÈÕ±»Shadow Brokers¹ûÈ»£¬°üÂÞÓÃÓÚ³Ö¾ÃÐÔ¡¢Õì²ì¡¢ºáÏòÒÆ¶¯¡¢Èƹýɱ¶¾ÒýÇæµÈ»î¶¯µÄ¶àÖÖ¹¤¾ß¡£¸ÃÑо¿Öصã·ÖÎöÆäÖеÄÒ»¸ö×é¼þDoubleFeature£¬ËüÓÃÀ´Éú³É¿É°²×°ÔÚÄ¿±êÉ豸ÖеŤ¾ßÀàÐ͵ÄÈÕÖ¾ºÍ³ÂËߣ¬²¢»áÊÕ¼¯´óÁ¿ÖÖÖÖÀàÐ͵ÄÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/2021/a-deep-dive-into-doublefeature-equation-groups-post-exploitation-dashboard/