¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»HSMÑϳÁ·ì϶£¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹
°ä²¼¹¦·ò 2019-06-101.¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ
¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÀûÓõÚÈý·½¹©¸øÉ̹¹½¨µÄ·¨Ê½´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¹È¸èûÓоßÌå×¢Ã÷ÄÄЩÉ豸Êܵ½ÁËÓ°Ï죬µ«°²È«³§ÉÌDr.WebÔøÔÚ2017ÄêµÄ×êÑл㱨ÖÐÖ¸³öÊÜÓ°ÏìµÄÉè±¸Æ·ÅÆÔ̺¬Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄÉè±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¸æ°×µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/2.΢ÈíÖÒ¸æÀûÓÃOffice·ì϶µÄÀ¬»øÓʼþ»î¶¯£¬ÖØÒª¶Ô׼ŷÖÞ
6ÔÂ7ÈÕÍí΢Èí°ä²¼ÁËÒ»ÔòÕë¶ÔÅ·Ö޵ĻîÔ¾À¬»øÓʼþ»î¶¯µÄÖҸ档ƾ¾Ý¸ÃÖҸ棬¹¥»÷ÕßÖØÒªÀûÓÃÔ̺¬OfficeºÍWordpad·ì϶£¨CVE-2017-11882£©µÄRTF¸½¼þϰȾÊܺ¦Õß¡£µ±Êܺ¦Õß´ò¿ªÓʼþÖеĸ½¼þʱ£¬¶ñÒâRTFÎĵµ½«Ö´ÐÐ·ÖÆçÀàÐ͵ľ籾£¨Ô̺¬VBScript¡¢PowerShell¡¢PHPµÈ£©ÒÔÏÂÔØºÍÖ´ÐжñÒâpayload¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-warning-on-spam-campaign-using-office-exploits/3.ÐÂÍøÂç´¹µö»î¶¯£¬¼Ù×°³É¶à¸öÀÃÀ¹ú¶ÈÈ·µ±¾Ö²É¹ºÍøÕ¾
5ÔÂ28ÈÕAnomali×êÑÐÈËÔ±·¢ÏÖÒ»¸ö¼Ù×°³ÉÄ«Î÷¸ç¡¢ÃØÂ³ºÍÎÚÀ¹çÈ·µ±¾Ö²É¹ºÍøÕ¾µÄ´¹µö¹¥»÷»î¶¯¡£¹¥»÷ÕßÀûÓÃÔì×÷ÓÅÔ½µÄ´¹µöÍøÕ¾£¬Ô¼ÇëÓ×ÎÒ»ò¹«Ë¾²Î¼ÓÕâЩ¹ú¶ÈÈ·µ±¾Ö¾º±êÏîÄ¿£¬µ«ÏÖʵÉÏÊÇΪÁËÇÔÈ¡Óû§µÄÕË»§Í´´¦¡£Ôڸù¥»÷»î¶¯ÖУ¬¹¥»÷ÕßÀûÓÃÁù¸ö·ÖÆçµÄÓòÃû£¨½âÎöÔÚÈý¸ö·ÖÆçµÄIPµØÖ·ÉÏ£©ÍйÜÁË16¸ö·ÖÆçµÄ´¹µöÍøÒ³¡£Æ¾¾ÝÓйؼ¼Êõ·ÖÎö£¬¹¥»÷ÕßÔÚÅäÖÃDNSÉèÖÃʱÖÁÉÙʹÓÃÁËÈý¸ö¿ÉÒɵĵç×ÓÓʼþµØÖ·¡£
ÔÎÄÁ´½Ó£º
https://www.anomali.com/blog/phishing-campaign-impersonates-mexico-peru-uruguay-governments-e-procurement-systems4.ICEFOG APT¶ñÒ⹤¾ßÔÚй¥»÷»î¶¯ÖÐÔٴγöÏÖ
FireEye×êÑÐÈËÔ±Chi-en (Ashley) Shen·¢ÏÖICEFOG APTʹÓõĶñÒâÈí¼þÔÚÒþû¶àÄêºóÔٴγʴ˿ÌÐµĹ¥»÷»î¶¯ÖС£ICEFOG¶ñÒâÈí¼þ³õ´Î³öÏÖÓÚ2013Äê9Ô¿¨°Í˹»ùµÄ×êÑл㱨£¬²¢Ôڸû㱨°ä²¼ºóÖÕ³¡Á˻¡£´Ë¿Ì×êÑÐÈËÔ±·¢ÏÖICEFOGµÄÁ½¸öеıäÖÖ£¨ICEFOG-PºÍICEFOG-M£©£¬ÕâÁ½¸ö±äÖÖ±ðÀë±»ÓÃÓÚ´Ó2014ÄêºÍ2018ÄêÆðÍ·µÄ¹¥»÷ÖС£ÕâÁ½¸ö±äÖÖ¶¼ÓÅÓÚÔʼµÄICEFOG£¬Òâζ׏¥»÷ÕßÒѽøÐжî±íµÄ¿ª·¢¹¤×÷ÒÔ¼ÓÇ¿ÆäÖ°ÄÜ¡£´Ë±í£¬×êÑÐÈËÔ±»¹·¢ÏÖÒÔǰδ³öÏÖ¹ýµÄMac°æICEFOG±äÖÖ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/5.¹úÌ©º½¿ÕÆØ´æÔÚÊ®ÄêµÄ佨²¹·ì϶£¬µ¼ÖÂ2018ÄêµÄÊý¾Ýй¶
×êÑÐÈËÔ±Kai-yi Wong°ä²¼ÁËÕë¶Ô¹úÌ©º½¿Õ2018ÄêÊý¾Ýй¶ÊÂÎñµÄµ÷²é»ã±¨¡£Æ¾¾Ý¸Ã»ã±¨£¬¹¥»÷ÕßÓÚ2014Äê10Ô³õ´Î½«Ò»¸ö¼üÅ̼ͼÆ÷Ö²Èë¹úÌ©º½¿ÕµÄϵͳ¡£¸ÃľÂíʹµÃ¹¥»÷ÕßÄܹ»ÔÚÍøÂçÖкáÏòÒÆ¶¯²¢ÇÒÍøÂçÍ´´¦ÐÅÏ¢£¨Ö±ÖÁ2018Äê3ÔÂ22ÈÕ£©¡£¶øºó¹¥»÷ÕßÀûÓ÷þÎñÆ÷ÉÏÒ»¸ö´æÔÚ10ÄêÖ®¾ÃµÄ·ì϶£¬Èƹý·þÎñÆ÷ÉϵÄÉí·ÝÑéÖ¤²¢ÇÒ½Ó¼ûÁËÖÎÀí¹¤¾ß¡£½øÒ»²½µÄ»ã±¨Ö¸³ö¹²ÓÐ41¸öÕË»§µÄÍ´´¦±»ÇÔ£¬Ô̺¬ÖÎÀíÔ¹ØË»§¡¢ÍøÂçÕË»§ºÍ·þÎñÕË»§¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cathay-pacifics-unpatched-decade-old-vulnerability-led-to-2018-breach/6.HSMÑϳÁ·ì϶£¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹
Ledger°²È«×êÑÐÈËÔ±Åû¶һ¼ÒÖØÒª³§É̵ÄHSM£¨Ó²¼þ°²È«Ä£¿é£©ÖеÄÑϳÁ·ì϶£¬¸Ã·ì϶¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£HSMÊÇÓ²¼þ¸ôÀëÉ豸£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢µ±¾Ö»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉ̵ȡ£Æ¾¾Ý×êÑÐÈËÔ±µÄ»ã±¨£¬¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õ߯ëÈ«½ÚÔìHSM£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱʹ´¦µÈÐÅÏ¢¡£×êÑÐÈËÔ±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/


¾©¹«Íø°²±¸11010802024551ºÅ