Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸

Ðû²¼Ê±¼ä 2022-05-24

1¡¢Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸


5ÔÂ19ÈÕ£¬Google³ÆÆä·¢Ã÷·Ö·¢Ìع¤Èí¼þPredatorµÄÈýÆðÔ˶¯¡£¹¥»÷Ô˶¯±¬·¢ÓÚ2021Äê8ÔÂÖÁ10Ô£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄÎó²îÊÔͼÔÚ×îеÄAndroid×°±¸ÉÏ×°ÖöñÒâÈí¼þ¡£ÕâЩ¹¥»÷Ô˶¯»®·ÖΪChromeÖØ¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÍêÕûµÄAndroid 0-dayʹÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN£¬ÓÃÓÚ¼ÓÔØPredator¡£


https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/


2¡¢Zscaler·¢Ã÷ð³äWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾Èö²¥Vidar


ZscalerÔÚ5ÔÂ19ÈÕÐû²¼±¨¸æ£¬Åû¶ÁËÐÂÒ»ÂֵĴ¹ÂÚÔ˶¯¡£Ñо¿Ö°Ô±ÔÚ½ñÄê4Ô·ݷ¢Ã÷Á˼¸¸öÐÂ×¢²áµÄÓò£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ£¬µ¼ÖÂÄ¿µÄѬȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£Vidar±äÌå»á´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌ寵µÀ»ñÈ¡C2ÉèÖ㬶øISOÎļþÔò°üÀ¨Ò»¸ö¾ÞϸÒì³£µÄ¿ÉÖ´ÐÐÎļþ£¨Áè¼Ý300MB£©£¬ÊÔÍ¼ÈÆ¹ýÇå¾²¼ì²â£¬»¹Ê¹ÓÃÁËAvastµÄÓâÆÚÖ¤ÊéÊðÃû¡£


https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing


3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵµÀ´Èö²¥


¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ£¬HP Wolf SecurityµÄÐÂÑо¿ÐðÊöÁËPDFÊÇÔõÑù±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£´Ë´ÎÔ˶¯ÖÐʹÓõÄÓʼþ°üÀ¨Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£·­¿ªPDFºó£¬Adobe Reader»áÌáÐÑÓû§·­¿ªÆäÖаüÀ¨µÄDOCXÎļþ£¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµÃüÃûΪ¡°ÒÑÑéÖ¤¡±£¬ÒÔÊÇ·­¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£Ä¿µÄ·­¿ªDOCX²¢ÆôÓúêÖ®ºó£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡±£¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger¡£


https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/


4¡¢Í¨ÓÃÆû³µÍ¸Â¶ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÐÅϢй¶


¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷£¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿·ÖÓû§µÄÐÅÏ¢¡£¸ÃÆû³µÖÆÔìÉÌ͸¶£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄÔ˶¯£¬·¢Ã÷¹¥»÷ÕßÒѽ«²¿·ÖÓû§µÄ½±Àø»ý·Ö¶Ò»»ÎªÀñÎ│¡£¸Ã¹«Ë¾ÌåÏÖ£¬´Ë´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ£¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼ÖµÄ£¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§»Ö¸´»ý·Ö£¬²¢½¨ÒéÓû§ÔÚÉϰ¶ÕÊ»§Ö®Ç°ÖØÖÃÃÜÂë¡£


https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/


5¡¢Check Point·¢Ã÷Twisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷Ô˶¯


5ÔÂ19ÈÕ£¬Check Point±¨¸æ·¢Ã÷Twisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷Ô˶¯¡£´Ë´Î¹¥»÷Ô˶¯ÊÇÒ»¸öºã¾ÃÌØ¹¤Ô˶¯µÄÑÓÐø£¬ÖÁÉÙ´Ó2021Äê6ÔÂ×îÏÈ»îÔ¾£¬×î½üÒ»´ÎÔ˶¯ÔÚ2022Äê4Ô±»·¢Ã÷£¬Ä¿µÄ°üÀ¨¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼ÒÑо¿»ú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¹¥»÷ʼÓÚαװ³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹ÂÚÓʼþ£¬Ê¹ÓÃÁËÐµĹ¤¾ß£ºÒ»¸öÖØ´óµÄ¶à²ã¼ÓÔØ³ÌÐòºÍÒ»¸öºóÃÅSPINNER¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3Ô¾Í×îÏÈ¿ª·¢£¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´ÆÊÎöÊÖÒÕ¡£


https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/


6¡¢Group-IBÐû²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


¾Ý5ÔÂ19ÈÕ±¨µÀ£¬Group-IBÐû²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£Æ¾Ö¤±¨¸æµÄÊý¾Ý£¬2021ÄêµÄƽ¾ùÊê½ðÒªÇóΪ247000ÃÀÔª£¬±ÈÉÏÒ»ÄêÔöÌíÁË45%£¬´ó´ó¶¼¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«ÖØÀÕË÷µÄÊÖ¶ÎÇ¿ÖÆÄ¿µÄ¸¶Êê½ð¡£¸üÖØ´óµÄ¹¥»÷ʹĿµÄ¸üÄѻָ´£¬¹¥»÷Ôì³ÉµÄƽ¾ùÍ £»úʱ¼ä´Ó18ÌìÔöÌíµ½22Ìì¡£Ô¶³Ì×ÀÃæÐ­Òé(RDP)ÈÔÈ»Êǹ¥»÷µÄÖ÷ÒªÔØÌ壬ռ±ÈΪ47%£¬Æä´ÎÊÇÍøÂç´¹ÂÚ(26%)¡£È¥ÄêʹÓÃÃæÏò¹«ÖÚµÄÓ¦ÓþÙÐеĹ¥»÷Õ¼±ÈΪ21%£¬2020ÄêΪ17%¡£


https://www.group-ib.com/resources/threat-research/ransomware-2022.html