GREFͨ¹ýľÂí»¯SignalºÍTelegram·Ö·¢BadBazaar

Ðû²¼Ê±¼ä 2023-09-01

1¡¢GREFͨ¹ýľÂí»¯SignalºÍTelegram·Ö·¢BadBazaar


ESETÔÚ8ÔÂ30ÈÕÅû¶ÁËGREFͨ¹ýGoogle PlayºÍGalaxyÉ̵êµÄľÂí»¯SignalºÍTelegram·Ö·¢BadBazaarµÄ»î¶¯¡£´Ë´Î»î¶¯·Ö±ð×Ô2020Äê7ÔºÍ2022Äê7ÔÂÒÔÀ´¿ªÊ¼»îÔ¾£¬Õë¶ÔÎÚ¿ËÀ¼¡¢²¨À¼¡¢ºÉÀ¼¡¢Î÷°àÑÀ¡¢ÆÏÌÑÑÀ¡¢µÂ¹úºÍÃÀ¹úµÈ¡£GREFµÄÁ½¸öÓ¦Ó÷ֱðÊÇSignal Plus MessengerºÍFlyGram£¬ËüÃÇÊÇ¿ªÔ´IMÓ¦Ó÷¨Ê½SignalºÍTelegramµÄľÂí»¯°æ±¾¡£ÆäÖУ¬FlyGram¿ÉÇÔÈ¡ÁªÏµÈËÁÐ±í¡¢Í¨»°¼Ç¼¡¢GoogleÕÊ»§ºÍWiFiµÈÊý¾Ý£¬Signal Plus Messenger³ýÁËÇÔÈ¡ÐÅÏ¢»¹¼àÊÓÄ¿±êµÄSignalͨÐÅ¡£Ä¿Ç°£¬Google PlayÒÑɾ³ý¶ñÒâÓ¦Ó㬵«GalaxyÉ̵êÈÔÈ»´æÔÚ¡£


https://www.welivesecurity.com/en/eset-research/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps/


2¡¢ÃÀ¹úNSCÅäÖôíÎóй¶Լ2000¼Ò¹«Ë¾µÄ½üÍò¸öÓÊÏäºÍÃÜÂë


¾ÝýÌå8ÔÂ31ÈÕ±¨µÀ£¬¹ú¼ÒÄþ¾²Î¯Ô±»á(NSC)й¶ÁËÆä³ÉÔ±µÄ½üÍò¸öÓÊÏäºÍÃÜÂë¡£NSCÊÇÃÀ¹úµÄÒ»¸ö·ÇÓªÀû»ú¹¹£¬ÌṩÊÂÇ鳡ËùºÍ¼ÝÊ»Äþ¾²Åàѵ¡£Ñо¿ÈËÔ±ÔÚ3ÔÂ7ÈÕ·¢ÏÖÁËNSCÍøÕ¾µÄÒ»¸ö×ÓÓò£¬¹ûÈ»ÁËÆäWebĿ¼Áбí¡£ÔÚ¿É·ÃÎʵÄÎļþÖУ¬Ñо¿ÈËÔ±·¢ÏÖÁË´æ´¢Óû§ÓʼþºÍÃÜÂëµÄÊý¾Ý¿â±¸·Ý£¬°üÂÞÔ¼9500¸öÕÊ»§¼°Æäƾ¾Ý¡£Ó°ÏìÁËÔ¼2000¼Ò´óÐ͹«Ë¾ºÍÕþ¸®»ú¹¹£¬Èç¿ÇÅÆ¡¢Ó¢Ìضû¡¢²¨Òô¹«Ë¾¡¢Ë¾·¨²¿ºÍFBIµÈ¡£Ð¹Â¶Æ¾¾Ý¿ÉÄܱ»ÓÃÓÚײ¿â¹¥»÷À´ÈëÇÖÄ¿±ê¹«Ë¾¡£ÕâЩÊý¾Ý¿É±»¹ûÈ»·ÃÎÊʱ¼ä³¤´ï5¸öÔ£¬Ä¿Ç°¸ÃÎÊÌâÒѱ»½â¾ö¡£


https://securityaffairs.com/150138/security/nasa-tesla-doj-verizon-2k-leaks.html


3¡¢Ñо¿ÈËÔ±ÑÝʾÈçºÎÀûÓÃWindowsÈÝÆ÷¸ôÀë¿ò¼ÜÈÆ¹ý¼ì²â


¾Ý8ÔÂ31ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±Daniel AvinoamÑÝʾÁËÈçºÎÀûÓÃWindowsÈÝÆ÷¸ôÀë¿ò¼ÜÀ´ÈƹýÖÕ¶ËÄþ¾²½â¾ö·½°¸¡£Ñо¿ÈËÔ±½âÊÍ˵£¬Windows OS½«Ã¿¸öÈÝÆ÷µ½Ö÷»úµÄÎļþϵͳÀ뿪£¬ÖÆÖ¹ÁËϵͳÎļþµÄÖØ¸´¡£Ã¿¸öÈÝÆ÷¶¼Ê¹Óö¯Ì¬Éú³ÉµÄ¾µÏñ£¬¸Ã¾µÏñʹÓÃÖØÐ·ÖÎöµãÖ¸Ïòԭʼ¾µÏñ¡£½á¹ûÊǾµÏñ°üÂÞ"ÓÄÁéÎļþ"£¬ÕâЩÎļþ²»´æ´¢Êµ¼ÊÊý¾Ý£¬µ«Á´½Óµ½ÎļþϵͳÉϵÄÁíÒ»¸ö¾í¡£È»ºó£¬Ñо¿ÈËÔ±ÊÔͼÀûÓÃÕâÖÖÖØ¶¨Ïò»úÖÆÀ´»ìÏýÎļþϵͳ²Ù×÷£¬²¢ÈƹýÄþ¾²²úÎï¡£


https://securityaffairs.com/150111/hacking/windows-container-isolation-framework-abuse.html


4¡¢WPÊý¾ÝÇ¨ÒÆ²å¼þÖЩ¶´CVE-2023-40004¿Éµ¼ÖÂÊý¾Ýй¶


ýÌå8ÔÂ30Èճƣ¬All-in-One WP Migration²å¼þÖеķÃÎÊ¿ØÖÆÂ©¶´£¨CVE-2023-40004£©¿Éµ¼ÖÂÊý¾Ýй¶¡£ÕâÊÇÒ»¿îWordPressÍøÕ¾Ç¨ÒÆ¹¤¾ß£¬ÓµÓÐ500Íò¸ö»îÔ¾µÄ°²×°¡£Patchstack³Æ£¬¸Ã²å¼þÌṩÉÌServMaskµÄÖÖÖָ߼¶À©Õ¹¶¼°üÂÞÏàͬµÄÒ×±»¹¥»÷´úÂ룬ÕâЩ´úÂëÔÚinitº¯ÊýÖÐȱ·¦È¨ÏÞºÍËæ»úÊýÑéÖ¤¡£¸Ã©¶´¿É±»ÓÃÀ´·ÃÎʺͿØÖÆÊÜÓ°ÏìÀ©Õ¹µÄÁîÅÆÅäÖ㬴Ӷø½«ÍøÕ¾Ç¨ÒÆÊý¾Ý×ªÒÆµ½×Ô¼ºµÄµÚÈý·½ÔÆ·þÎñÕÊ»§»ò»Ö¸´¶ñÒⱸ·Ý£¬ÀÖ³ÉÀûÓÿÉÄܵ¼ÖÂÊý¾Ýй¶¡£Ñо¿ÈËÔ±ÔÚ7ÔÂ18ÈÕ·¢ÏÖÁËÕâ¸ö©¶´£¬¸Ã©¶´ÔÚ7ÔÂ26ÈÕ±»ÐÞ¸´¡£

https://www.bleepingcomputer.com/news/security/wordpress-migration-add-on-flaw-could-lead-to-data-breaches/


5¡¢Trend MicroÐû²¼Earth Estries¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


8ÔÂ30ÈÕ£¬Trend MicroÐû²¼Á˹ØÓÚEarth Estries¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£¸ÃÍÅ»ïÖÁÉÙ×Ô2020Äê¾Í¿ªÊ¼»îÔ¾£¬ÆäTTPÓëÁíÒ»¸öºÚ¿ÍÍÅ»ïFamousSparrow´æÔÚÒ»Ð©ÖØµþ¡£¹¥»÷Õßͨ³£»áÔÚÈëÇÖÄ¿±êµÄÄÚ²¿·þÎñÆ÷ºóÆÆ»µ¹ÜÀíÔ±ÕÊ»§¡£È»ºóºáÏòÒÆ¶¯²¢°²×°ºóÃÅºÍÆäËü¹¤¾ß£¬²¢ÊÕ¼¯ºÍй¶ÓмÛÖµµÄÊý¾Ý¡£¸ÃÍÅ»ïʹÓöñÒâÈí¼þ°üÂÞºóÃÅZingdoor¡¢ÐÅÏ¢ÇÔÈ¡·¨Ê½TrillClientºÍºóÃÅHemiGate¡£´ËÍ⣬Earth EstriesµÄC&C»ù´¡ÉèÊ©ÒÀÀµÓÚFastly CDN·þÎñ£¬¸Ã·þÎñÔø±»ÓëAPT41Ïà¹ØµÄÍÅ»ïÀûÓᣠ


https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html


6¡¢KasperskyÐû²¼2023ÄêQ2 ITÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß


8ÔÂ30ÈÕ£¬KasperskyÐû²¼2023ÄêµÚ¶þ¼¾¶ÈITÍþÐ²Ì¬ÊÆµÄ·ÖÎö³ÂËß¡£³ÂËß¼òÊöÁËһЩÓÐÕë¶ÔÐԵĹ¥»÷°üÂÞ£¬Í¨¹ý3CX¹©Ó¦Á´¹¥»÷²¿ÊðGopuramºóÃÅ¡¢LazarusµÄDeathNote»î¶¯¡¢TomirisµÄ¹¥»÷»î¶¯ÒÔ¼°Triangulation»î¶¯µÈ¡£³ÂËß»¹ÁгöÁËÆäËü¶ñÒâÈí¼þµÄÍþв£¬ÀýÈçʹÓÃWindows 0dayµÄNokoyawaÀÕË÷¹¥»÷¡¢QBotľÂíѬȾ¼¤Ôö¡¢Minas×ßÏòÅÓ´ó֮·¡¢SatacomÍÆ³ö¿ÉÇÔÈ¡¼ÓÃÜ»õ±ÒµÄä¯ÀÀÆ÷À©Õ¹ÒÔ¼°DoubleFingerÓÃÓÚÇÔÈ¡¼ÓÃÜ»õ±ÒµÈ¡£


https://securelist.com/it-threat-evolution-q2-2023/110355/