×êÑÐÍŶӳƳ¬¹ý30ÍòGoogle PlayÓû§ÒÑϰȾ¶à¸öÒøÐÐľÂí

°ä²¼¹¦·ò 2021-12-02

KasperskyÅû¶APT37ÀûÓÃChinotto¹¥»÷º«¹úµÄ»î¶¯


KasperskyÅû¶APT37ÀûÓÃChinotto¹¥»÷º«¹úµÄ»î¶¯.png


KasperskyÔÚ11ÔÂ29ÈÕÅû¶³¯ÏʺڿÍ×éÖ¯APT37£¨ÓÖ³ÆScarCruft»òTemp.Reaper£©ÔÚ½üÆÚµÄ¹¥»÷»î¶¯ ¡£ScarCruft´Ó2012ÄêÆðÍ·»îÔ¾ £¬ÖØÒªÕë¶Ôº«¹úµÄ¹Ù·½»ú¹¹»ò¹«Ë¾ ¡£Õâ´Î»î¶¯ÆðÍ·ÓÚ2021Äê8Ô £¬³õʼϰȾý½éÊÇÓã²æÊ½´¹µö»î¶¯ £¬Ö®ºóÀûÓÃIEä¯ÀÀÆ÷ÖеÄÁ½¸ö·ì϶ÔÚº«¹úµÄÍøÕ¾ÖÐ×°ÖÃ×Ô½ç˵¶ñÒâÈí¼þBLUELIGHT £¬ÌáÒéË®¿Ó¹¥»÷ ¡ £»î¶¯»¹ÀûÓÃÁ˶ñÒâÈí¼þChinotto £¬ËüÓµÓÐÕë¶ÔPowerShell¡¢WindowsºÍAndroidµÄ¶à¸ö±äÌå ¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/



Trend Micro·¢ÏÖÀûÓúϷ¨RAT·Ö·¢SpyAgentµÄ»î¶¯


Trend Micro·¢ÏÖÀûÓúϷ¨RAT·Ö·¢SpyAgentµÄ»î¶¯.png


11ÔÂ29ÈÕ £¬Trend Micro¹«¿ªÁ˹ØÓÚSpyAgent¹¥»÷»î¶¯µÄ×êÑÐ ¡£¹¥»÷ÕßÊ×ÏÈ»áÔÚÐéαµÄ¼ÓÃÜÇ®±ÒÓйØÍøÕ¾·Ö·¢Î±Ôì³É¼ÓÃÜÇ®±ÒÇ®°ü¡¢¿ó¹¤Èí¼þ»ò³åÀ˲å¼þµÄDropper ¡£Õâ´Î»î¶¯ÖÐ £¬SpyAgentµÄбäÌåÀûÓÃÁ˶íÂÞ˹ºÏ·¨µÄÔ¶³Ì½Ó¼û¹¤¾ß (RAT) Safib Assistant ¡£´Ë±í £¬»¹ÀûÓÃÁËDLL²à¼ÓÔØ·ì϶ £¬Í¨¹ý¶ñÒâDLL´Û¸ÄRATŲÓõĸ÷ÀàAPIº¯Êý £¬¶ÔÓû§°µ²ØRAT´°¿Ú ¡£Ö®ºó £¬¶ñÒâDLL»á·µ»ØRATµÄID £¬¹¥»÷ÕßÄܹ»ÀûÓøÃIDÏνӲ¢½ÚÔìÖ¸±êÉ豸 ¡£


Ô­ÎÄÁ´½Ó£º

https://www.trendmicro.com/en_us/research/21/k/campaign-abusing-rats-uses-fake-websites.html



×êÑÐÍŶӳƳ¬¹ý30ÍòGoogle PlayÓû§ÒÑϰȾ¶à¸öÒøÐÐľÂí


×êÑÐÍŶӳƳ¬¹ý30ÍòGoogle PlayÓû§ÒÑϰȾ¶à¸öÒøÐÐľÂí.png


°²È«¹«Ë¾ThreatFabric°µÊ¾ÔÚ2021Äê8ÔÂÖÁ11ÔÂÆÚ¼ä £¬4¸ö·ÖÆçµÄÒøÐÐľÂíÒÑϰȾ³¬¹ý30Íò¸öGoogle PlayÓû§ ¡£×êÑÐÈËÔ±³Æ £¬¼ì²âµ½µÄ¶ñÒâ dropper¼Ù×°2FAÉí·ÝÑéÖ¤Æ÷¡¢¶þάÂëɨÃèÆ÷ºÍPDFÎĵµÉ¨ÃèÒǵÅצÓà £¬Ö¼ÔÚ×°ÖÃAnatsa£¨±ðÃûTeaBot£©¡¢Alien¡¢ERMACºÍHydra ¡£ÕâЩľÂíÄܹ»Ê¹ÓÃ×Ô¶¯×ªÕËϵͳATS £¬ÔÚÓû§²»ÖªÇéµÄÇé¿öÏÂÇÔÈ¡Óû§ÃÜÂëºÍ»ùÓÚSMSµÄ2FAÉí·ÝÑéÖ¤´úÂë¡¢ÆÁÄ»½ØÍ¼µÈÐÅÏ¢ £¬ÉõÖÁÇÔÈ¡Óû§ÒøÐÐÕË»§ÖÐ×ʽ𠡣Ŀǰ £¬ÕâЩÀûÓÃÒÑ´ÓGoogle PlayÖÐɾ³ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.threatfabric.com/blogs/deceive-the-heavens-to-cross-the-sea.html



°µÍøÊг¡CannazonÔâµ½´ó¹æÄ£DDoS¹¥»÷ºóÓÀÔ¶¹Ø¹Ø


°µÍøÊг¡CannazonÔâµ½´ó¹æÄ£DDoS¹¥»÷ºóÓÀÔ¶¹Ø¹Ø.png


2021Äê11ÔÂ23ÈÕ £¬°µÍøÊг¡CannazonµÄÖÎÀíÔ±°ä·¢½«ÓÀÔ¶¹Ø¹Ø¸ÃÍøÕ¾ ¡£¾ÝϤ £¬¸ÃÍøÕ¾ÔÚ11Ô³õÔâµ½ÁË´ó¹æÄ£DDoS¹¥»÷ £¬ÖÎÀíԱͨ¹ýÏ÷¼õ¶©µ¥ÊýÁ¿ºÍ¹Ø¹Ø²¿ÃÅϵͳÒÔ»º½âÎÊÌâ ¡£µ«ÕâÔÚÉçÇøÖÐÒýÆðÁ˺䶯 £¬Óû§²»°²ÕâÊÇÒ»³¡Í˳öȦÌ× ¡£ÖÎÀíÔ±ÔÚ°ä²¼¹Ø¹Ø¹«¸æÊ± £¬¶ÔÓÚÕâÖÖ´¦Öò½Ö谵ʾǸÒâ £¬³ÆÃ»Óй«¿ª¹¥»÷»î¶¯ÊÇΪÁ˱ £»¤Óû§ºÍÉçÇø £¬ÒÔÔ¤·À¹©¸øÉÌÊÔͼ·¢Æð¼ÓÃÜÇ®±ÒÍ˳öȦÌ× ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dark-web-market-cannazon-shuts-down-after-massive-ddos-attack/



GoogleÅû¶ZoomÖÐ2¸ö·ì϶µÄϸ½Ú £¬ÏÖÒÑÈ«Êý½¨¸´


GoogleÅû¶ZoomÖÐ2¸ö·ì϶µÄϸ½Ú£¬ÏÖÒÑÈ«Êý½¨¸´.png


Google Project ZeroÔÚ·¢ÏÖÊÓÆµ»áÒéÈí¼þZoomÖдæÔÚ2¸ö·ì϶ ¡£µÚÒ»¸öΪ»º³åÇøÒç¶Âí½Å £¬×·×ÙΪCVE-2021-34423 £¬CVSSÆÀ·ÖÊÇ7.3 £¬¹¥»÷ÕßÀûÓø÷ì϶¿Éµ¼Ö·þÎñ»òÀûÓñÀÀ£ £¬»òÖ´ÐÐËÁÒâ´úÂë ¡£µÚ¶þ¸öΪÄÚ´æ°Ü»µ·ì϶ £¬×·×ÙΪCVE-2021-34424 £¬CVSSÆÀ·ÖÊÇ7.3 £¬¸Ã·ì϶¿ÉÄܻᶳö¹ý³ÌÄÚ´æµÄ״̬ ¡£ZoomÒÑÔÚ11ÔÂ24ÈÕ½¨¸´ÁËÕâ2¸ö·ì϶ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/125122/security/video-conferencing-software-zoom-flaws.html



ÃÀ¹úµÄDNA¼ì²âÖÐÐÄDDCй¶³¬¹ý210ÍòÓû§µÄÐÅÏ¢


ÃÀ¹úµÄDNA¼ì²âÖÐÐÄDDCй¶³¬¹ý210ÍòÓû§µÄÐÅÏ¢.png


ÃÀ¹ú¶íº¥¶íÖݷѶû·Æ¶ûµÂµÄDNA¼ì²âÖÐÐÄ(DDC) й¶ÁË2102436¸ö¿Í»§µÄÓ×ÎҺͲÆÕþÐÅÏ¢ ¡£Õâ´Îй¶ÊÂÎñÔÚ8ÔÂ6ÈÕ¼ì²âµ½ £¬µ«Æä¾ßÌåÐÅÏ¢½öÔÚ11ÔÂ30ÈղŹ«¿ª ¡£¾­µ÷²éÈ·¶¨ £¬¹¥»÷Õß½Ó¼ûÁ˸ûú¹¹µÄÒ»¸öÊý¾Ý¿â £¬ÆäÖаüÁ˺¬2004ÄêÖÁ2012ÄêÓû§µÄÓ×ÎÒÐÅÏ¢ £¬Éæ¼°ÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢²ÆÕþÕ˺źÍÒøÐп¨ºÅÂë¼°ÆäPinÂë»òCVVÂëµÈÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/dna-testing-service-data-breach-users-impacted/