Google³ÆPredatorÀûÓöà¸ö©¶´Ñ¬È¾AndroidÉ豸
Ðû²¼Ê±¼ä 2022-05-241¡¢Google³ÆPredatorÀûÓöà¸ö©¶´Ñ¬È¾AndroidÉ豸
5ÔÂ19ÈÕ£¬Google³ÆÆä·¢ÏÖ·Ö·¢¼äµýÈí¼þPredatorµÄÈýÆð»î¶¯¡£¹¥»÷»î¶¯·¢ÉúÓÚ2021Äê8ÔÂÖÁ10Ô£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄ©¶´ÊÔͼÔÚ×îеÄAndroidÉ豸ÉÏ°²×°¶ñÒâÈí¼þ¡£ÕâЩ¹¥»÷»î¶¯·Ö±ðΪChromeÖض¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÍêÕûµÄAndroid 0-dayÀûÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£ËüÃǶ¼Ê×ÏÈ°²×°ÁËAndroidľÂíALIEN£¬ÓÃÓÚ¼ÓÔØPredator¡£
https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/
2¡¢Zscaler·¢ÏÖð³äWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾Á÷´«Vidar
ZscalerÔÚ5ÔÂ19ÈÕÐû²¼³ÂËߣ¬Åû¶ÁËÐÂÒ»ÂֵĵöÓã»î¶¯¡£Ñо¿ÈËÔ±ÔÚ½ñÄê4Ô·ݷ¢ÏÖÁ˼¸¸öÐÂ×¢²áµÄÓò£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£ÕâЩÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ£¬µ¼ÖÂÄ¿±êѬȾÇÔÈ¡ÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£Vidar±äÌå»á´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌåƵµÀ»ñÈ¡C2ÅäÖ㬶øISOÎļþÔò°üÂÞÒ»¸ö¾ÞϸÒì³£µÄ¿ÉÖ´ÐÐÎļþ£¨Áè¼Ý300MB£©£¬ÊÔͼÈƹýÄþ¾²¼ì²â£¬»¹Ê¹ÓÃÁËAvastµÄ¹ýÆÚÖ¤ÊéÇ©Ãû¡£
https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing
3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵµÀ´Á÷´«
¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ£¬HP Wolf SecurityµÄÐÂÑо¿ÂÛÊöÁËPDFÊÇÈçºÎ±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£´Ë´Î»î¶¯ÖÐʹÓõÄÓʼþ°üÂÞÒ»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£´ò¿ªPDFºó£¬Adobe Reader»áÌáʾÓû§´ò¿ªÆäÖаüÂÞµÄDOCXÎļþ£¬ÒòΪ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµÃüÃûΪ¡°ÒÑÑéÖ¤¡±£¬ËùÒÔ´ò¿ªÊ±»áÌáʾÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£Ä¿±ê´ò¿ªDOCX²¢ÆôÓúêÖ®ºó£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡±£¬ÆäÖеÄshellcode»áÏÂÔز¢ÔËÐÐSnake Keylogger¡£
https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/
4¡¢Í¨ÓÃÆû³µÍ¸Â¶ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿ÃÅ¿Í»§µÄÐÅϢй¶
¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷£¬Ð¹Â¶ÁËÔÚÏßƽ̨²¿ÃÅÓû§µÄÐÅÏ¢¡£¸ÃÆû³µÖÆÔìÉÌ͸¶£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯£¬·¢ÏÖ¹¥»÷ÕßÒѽ«²¿ÃÅÓû§µÄ½±Àø»ý·Ö¶Ò»»ÎªÀñÆ·¿¨¡£¸Ã¹«Ë¾ÌåÏÖ£¬´Ë´ÎÎ¥¹æʼþ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ£¬¶øÊÇÕë¶ÔÆäƽ̨ÉÏ¿Í»§µÄÒ»²¨×²¿â¹¥»÷µ¼Öµģ¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§»Ö¸´»ý·Ö£¬²¢½¨ÒéÓû§ÔڵǽÕÊ»§Ö®Ç°ÖØÖÃÃÜÂë¡£
https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/
5¡¢Check Point·¢ÏÖTwisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯
5ÔÂ19ÈÕ£¬Check Point³ÂËß·¢ÏÖTwisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯¡£´Ë´Î¹¥»÷»î¶¯ÊÇÒ»¸öºã¾Ã¼äµý»î¶¯µÄÑÓÐø£¬ÖÁÉÙ´Ó2021Äê6Ô¿ªÊ¼»îÔ¾£¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢ÏÖ£¬Ä¿±ê°üÂÞ¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼ÒÑо¿»ú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¹¥»÷ʼÓÚαװ³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄµöÓãÓʼþ£¬ÀûÓÃÁËÐµĹ¤¾ß£ºÒ»¸öÅÓ´óµÄ¶à²ã¼ÓÔØ·¨Ê½ºÍÒ»¸öºóÃÅSPINNER¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3Ô¾ͿªÊ¼¿ª·¢£¬Ê¹ÓÃÁËÈƹýºÍ·´·ÖÎö¼¼Êõ¡£
https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/
6¡¢Group-IBÐû²¼2021-2022ÄêÀÕË÷Èí¼þ̬ÊƵķÖÎö³ÂËß
¾Ý5ÔÂ19ÈÕ±¨µÀ£¬Group-IBÐû²¼ÁË2021-2022ÄêÀÕË÷Èí¼þ̬ÊƵķÖÎö³ÂËß¡£Æ¾¾Ý³ÂËßµÄÊý¾Ý£¬2021ÄêµÄƽ¾ùÊê½ðÒªÇóΪ247000ÃÀÔª£¬±ÈÉÏÒ»ÄêÔö¼ÓÁË45%£¬´ó¶àÊý¹¥»÷Õ߶¼ÊÔͼͨ¹ýË«ÖØÀÕË÷µÄÊÖ¶ÎÇ¿ÖÆÄ¿±ê¸¶Êê½ð¡£¸üÅÓ´óµÄ¹¥»÷ʹĿ±ê¸üÄѻָ´£¬¹¥»÷Ôì³ÉµÄƽ¾ùÍ£»úʱ¼ä´Ó18ÌìÔö¼Óµ½22Ìì¡£Ô¶³Ì×ÀÃæÐÒé(RDP)ÈÔÈ»Êǹ¥»÷µÄÖ÷ÒªÔØÌ壬ռ±ÈΪ47%£¬Æä´ÎÊÇÍøÂçµöÓã(26%)¡£È¥ÄêÀûÓÃÃæÏò¹«ÖÚµÄÓ¦ÓýøÐеĹ¥»÷Õ¼±ÈΪ21%£¬2020ÄêΪ17%¡£
https://www.group-ib.com/resources/threat-research/ransomware-2022.html