AIR-FIÊÖÒÕ¿ÉʹÓÃRAMÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý£»SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M

Ðû²¼Ê±¼ä 2020-12-17

1.еÄAIR-FIÊÖÒÕ¿ÉʹÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý


1.jpg


ÒÔÉ«ÁÐѧÕß·¢Ã÷еÄAIR-FIÊÖÒÕ£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£AIR-FIÊÖÒյĽ¹µãÊÇ£¬µ±µçÁ÷ͨ¹ýʱ£¬Èκεç×ÓÔª¼þ¶¼»á±¬·¢µç´Å²¨¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬¶øÎÞÏßµç»ù±¾ÉÏÊǵç´Å²¨£¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂ룬À´¿ÉÒÔʹÓÃRAM¿¨ÄÚ²¿µÄµçÁ÷±¬·¢ÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨¡£È»ºóʹÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄ×°±¸À´»ñÈ¡¸ÃÐźÅ£¬ÒԸߴï100 b/sµÄËÙÂÊÇÔÈ¡Ãô¸ÐÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/


2.ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª


2.jpg


ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª¡£ºÚ¿ÍʹÓÃÁè¼Ý20¸öÄ£ÄâÆ÷ÓÕÆ­Áè¼Ý16000̨ÊÜѬȾµÄ×°±¸£¬Öظ´»á¼ûÊýǧ¸ö¿Í»§ÕÊ»§£¬½öÓö̶̼¸ÌìµÄʱ¼ä¾ÍÇÔÈ¡ÁËÊý°ÙÍòÃÀÔª¡£¸ÃڲƭÔ˶¯ÀֳɵØÊµÏÖÁË×Ô¶¯»á¼ûÕÊ»§¡¢Æô¶¯ÉúÒâ¡¢ÎüÊÕºÍÇÔÈ¡2FAµÄÀú³Ì£¬²¢Ê¹ÓÃÇÔÈ¡µ½µÄ´úÂëÀ´Íê³É²»·¨ÉúÒâ¡£ÕâЩģÄâÆ÷ÉõÖÁÄܹ»Ê¹ÓÃÐéÄâרÓÃÍøÂ磨VPN£©·þÎñÀ´ÓÕÆ­ÊÜѬȾװ±¸µÄGPSλÖã¬ÒÔÒþ²ØÆä¶ñÒâÔ˶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/emulated-mobile-devices-used-to-steal-millions-from-us-eu-banks/


3.½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬Í¨¹ýGitHubºÍPastebinÈö²¥


3.jpg


½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬Í¨¹ýGitHubºÍPastebinÈö²¥¡£Æä×î³õÊÇͨ¹ýX10-unix¾ÙÐÐÈö²¥µÄ£¬È»ºó´ÓGitHubÏÂÔØÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£Juniper³Æ£¬¸ÃÈ䳿Õë¶ÔWebÓ¦ÓóÌÐò¡¢IPÉãÏñ»úºÍ·ÓÉÆ÷µÈ¾ÙÐÐÁËһϵÁеĹ¥»÷£¬°üÀ¨ÖÁÉÙ31¸öÒÑÖªÎó²î£¬²¢ÊÔͼ¹¥»÷¿ª·ÅµÄAndroid Debug BridgeÅþÁ¬ºÍÏÖÓеĶñÒâÈí¼þºóÃųÌÐò¡£Æ¾Ö¤JuniperµÄÔ¤¼Æ£¬¸Ã¶ñÒâÈí¼þʹÓÃÁËÖÁÉÙ100¸ö²î±ðµÄËÞÖ÷À´¾ÙÐÐÈö²¥¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/12/wormable-gitpaste-12-botnet-returns-to.html


4.ÐÂÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý


4.jpg


Ñо¿Ö°Ô±·¢Ã÷ÁËеÄÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý¡£¸ÃÈí¼þ¿ÉÔÚAndroidºÍiOS°æ±¾ÖÐʹÓã¬Ö÷ÒªÕë¶ÔÖÐÎĵĹú¼Ò¡¢º«¹úºÍÈÕ±¾£¬Äܹ»´ÓÊÜѬȾµÄÊܺ¦ÕßÄÇÀïÍøÂçÊý¾Ý£¬ÀýÈçµç»°±êʶ·û¡¢ÁªÏµÈË¡¢SMSÐÂÎÅ¡¢ÕÕÆ¬ºÍλÖÃÐÅÏ¢£¬ÏÖÔÚÉÐδÔÚAppleºÍGoogle¹Ù·½Ó¦ÓÃÊÐËÁÉϼÜ¡£Ñо¿Ö°Ô±ÍƲ⣬¸ÃÓ¦ÓóÌÐòµÄÊý¾Ý¿ÉÄܻᱻÓÃÓÚÀÕË÷Êܺ¦ÕßÒÔÖ§¸¶Ð¡¶îÊê½ð¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-goontact-spyware-discovered-targeting-android-and-ios-users/


5.SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M


5.jpg


SophosºÍReversingLabsÍŽáÐû²¼Á˰üÀ¨1000Íò¸ö¶ñÒâÈí¼þÑù±¾µÄSoReL-20MÊý¾Ý¿â¡£SoReL-20MΪһ×é¾­ÓÉÕûÀíºÍ±ê¼ÇµÄÑù±¾ºÍÇå¾²Ïà¹ØÔªÊý¾Ý£¬¿ÉÓÃÓÚ·´¶ñÒâÈí¼þ½â¾ö¼Æ»®ÖÐʹÓõĻúеѧϰÒýÇæµÄѵÁ·Êý¾Ý¼¯¡£°üÀ¨ÁË2000Íò¸öWindows Portable¿ÉÖ´ÐÐÎļþµÄÔªÊý¾Ý¡¢±êÇ©ºÍ¹¦Ð§£¬ÆäÖаüÀ¨1000Íò¶ñÒâÈí¼þÑù±¾¡£ReversinglabsÌåÏÖÕâЩÊý¾Ý¿ÉΪ¿Í»§ÌṩÃ÷È·µÄÍþвÇ鱨Êý¾Ý¼¯£¬²¢ÔÚËûÃǵķÀÓùÖÐʩչ×÷Óá£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112302/malware/sorel-20m-free-malware-dataset.html


6.CybelAngelÔÚÍøÉÏ·¢Ã÷Áè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ


6.jpg


CybelAngelÔÚÍøÉÏ·¢Ã÷ÁËÁè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ£¨°üÀ¨XÉäÏߺÍCTɨÃ裩¡£ÕâЩҽѧͼÏñµÄÿÌõ¼Í¼Óжà´ï200ÐеÄÔªÊý¾Ý£¬°üÀ¨¸öÐÕÃû¡¢³öÉúÈÕÆÚºÍµØµãµÈPII(СÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©ºÍPHIÉí¸ß£¬ÌåÖØºÍÕï¶ÏµÈPHI£¨Ð¡ÎÒ˽¼ÒÒ½ÁÆÐÅÏ¢£©£¬ÇÒÎÞÐèÓû§Ãû»òÃÜÂë¼´¿É»á¼û¡£CybelAngel³ÆÕâЩÊý¾Ý¿É±»ÓÃÓÚڲƭÔ˶¯£¬»òÔÚ°µÍøÉϾÙÐгöÊÛ¡£


Ô­ÎÄÁ´½Ó£º

https://cybelangel.com/blog/medical-data-leaks/