Google³ÆPredatorÀûÓöà¸ö·ì϶ϰȾAndroidÉ豸

°ä²¼¹¦·ò 2022-05-24

1¡¢Google³ÆPredatorÀûÓöà¸ö·ì϶ϰȾAndroidÉ豸


5ÔÂ19ÈÕ £¬Google³ÆÆä·¢ÏÖ·Ö·¢¼äµýÈí¼þPredatorµÄÈýÆð»î¶¯¡£¹¥»÷»î¶¯²úÉúÓÚ2021Äê8ÔÂÖÁ10Ô £¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄ·ì϶ÊÔͼÔÚ×îеÄAndroidÉ豸ÉÏ×°ÖöñÒâÈí¼þ¡£ÕâЩ¹¥»÷»î¶¯±ðÀëΪChrome³Á¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÆëÈ«µÄAndroid 0-dayÀûÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN £¬ÓÃÓÚ¼ÓÔØPredator¡£


https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/


2¡¢Zscaler·¢ÏÖ¼ÙÒâWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾´«²¼Vidar


ZscalerÔÚ5ÔÂ19ÈÕ°ä²¼»ã±¨ £¬Åû¶ÁËÐÂÒ»ÂֵĴ¹µö»î¶¯¡£×êÑÐÈËÔ±ÔÚ½ñÄê4Ô·ݷ¢ÏÖÁ˼¸¸öÐÂ×¢²áµÄÓò £¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ £¬µ¼ÖÂÖ¸±êϰȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£Vidar±äÌåζ´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌåÆµÂ·»ñÈ¡C2ÅäÖà £¬¶øISOÎļþÔòÔ̺¬Ò»¸ö´óÓ×Òì³£µÄ¿ÉÖ´ÐÐÎļþ£¨³¬¹ý300MB£© £¬ÊÔÍ¼ÈÆ¹ý°²È«¼ì²â £¬»¹Ê¹ÓÃÁËAvastµÄ¹ýÆÚÖ¤ÊéÊðÃû¡£


https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing


3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵ·´´«²¼


¾ÝýÌå5ÔÂ22ÈÕ±¨Â· £¬HP Wolf SecurityµÄÐÂ×êÑÐÂÛÊöÁËPDFÊÇÈôºÎ±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£Õâ´Î»î¶¯ÖÐʹÓõÄÓʼþÔ̺¬Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£´ò¿ªPDFºó £¬Adobe Reader»áÌáÐÑÓû§´ò¿ªÆäÖÐÔ̺¬µÄDOCXÎļþ £¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµ¶¨ÃûΪ¡°ÒÑÑéÖ¤¡± £¬ËùÒÔ´ò¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£Ö¸±ê´ò¿ªDOCX²¢ÆôÓúêÖ®ºó £¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡± £¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger¡£


https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/


4¡¢Í¨ÓÃÆû³µÐ¹Â©ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿Ãſͻ§µÄÐÅϢй¶


¾ÝýÌå5ÔÂ23ÈÕ±¨Â· £¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷ £¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿ÃÅÓû§µÄÐÅÏ¢¡£¸ÃÆû³µÔì×÷ÉÌй© £¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯ £¬·¢ÏÖ¹¥»÷ÕßÒѽ«²¿ÃÅÓû§µÄ¼Î½±»ý·Ö¶Ò»»ÎªÀñÎ│¡£¸Ã¹«Ë¾°µÊ¾ £¬Õâ´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ £¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼ÖµÄ £¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§¸´Ô­»ý·Ö £¬²¢½¨ÒéÓû§ÔڵǽÕÊ»§Ö®Ç°³ÁÖÃÃÜÂë¡£


https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/


5¡¢Check Point·¢ÏÖTwisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯


5ÔÂ19ÈÕ £¬Check Point»ã±¨·¢ÏÖTwisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯¡£Õâ´Î¹¥»÷»î¶¯ÊÇÒ»¸ö³Ö¾Ã¼äµý»î¶¯µÄÒ»Á¬ £¬ÖÁÉÙ´Ó2021Äê6ÔÂÆðÍ·»îÔ¾ £¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢ÏÖ £¬Ö¸±êÔ̺¬¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼Ò×êÑлú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¹¥»÷ʼÓÚ¼Ù×°³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹µöÓʼþ £¬ÀûÓÃÁËÐµĹ¤¾ß£ºÒ»¸ö¸´ÔӵĶà²ã¼ÓÔØ·¨Ê½ºÍÒ»¸öºóÃÅSPINNER¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3ÔÂ¾ÍÆðÍ·¿ª·¢ £¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´·ÖÎö¼¼Êõ¡£


https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/


6¡¢Group-IB°ä²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨


¾Ý5ÔÂ19ÈÕ±¨Â· £¬Group-IB°ä²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£Æ¾¾Ý»ã±¨µÄÊý¾Ý £¬2021ÄêµÄ¾ùÔÈÊê½ðÒªÇóΪ247000ÃÀÔª £¬±ÈÉÏÒ»ÄêÔö³¤ÁË45% £¬´óÎÞÊý¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«³ÁÀÕË÷µÄ¼¿Á©Ç¿ÔìÖ¸±ê¸¶Êê½ð¡£¸ü¸´ÔӵĹ¥»÷ʹָ±ê¸üÄѸ´Ô­ £¬¹¥»÷Ôì³ÉµÄ¾ùÔÈÍ£»ú¹¦·ò´Ó18ÌìÔö³¤µ½22Ìì¡£Ô¶³Ì×ÀÃæºÍ̸(RDP)ÒÀÈ»Êǹ¥»÷µÄÖØÒªÔØÌå £¬Õ¼±ÈΪ47% £¬Æä´ÎÊÇÍøÂç´¹µö(26%)¡£È¥ÄêÀûÓÃÃæÏò¹«¼ÒµÄÀûÓýøÐеĹ¥»÷Õ¼±ÈΪ21% £¬2020ÄêΪ17%¡£


https://www.group-ib.com/resources/threat-research/ransomware-2022.html