Google³ÆPredatorÀûÓöà¸ö·ì϶ϰȾAndroidÉ豸

°ä²¼¹¦·ò 2022-05-24

1¡¢Google³ÆPredatorÀûÓöà¸ö·ì϶ϰȾAndroidÉ豸


5ÔÂ19ÈÕ£¬Google³ÆÆä·¢ÏÖ·Ö·¢¼äµýÈí¼þPredatorµÄÈýÆð»î¶¯¡£¹¥»÷»î¶¯²úÉúÓÚ2021Äê8ÔÂÖÁ10Ô£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄ·ì϶ÊÔͼÔÚ×îеÄAndroidÉ豸ÉÏ×°ÖöñÒâÈí¼þ¡£ÕâЩ¹¥»÷»î¶¯±ðÀëΪChrome³Á¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÆëÈ«µÄAndroid 0-dayÀûÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN£¬ÓÃÓÚ¼ÓÔØPredator¡£


https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/


2¡¢Zscaler·¢ÏÖ¼ÙÒâWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾´«²¼Vidar


ZscalerÔÚ5ÔÂ19ÈÕ°ä²¼»ã±¨£¬Åû¶ÁËÐÂÒ»ÂֵĴ¹µö»î¶¯¡£×êÑÐÈËÔ±ÔÚ½ñÄê4Ô·ݷ¢ÏÖÁ˼¸¸öÐÂ×¢²áµÄÓò£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ£¬µ¼ÖÂÖ¸±êϰȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£Vidar±äÌåζ´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌåÆµÂ·»ñÈ¡C2ÅäÖ㬶øISOÎļþÔòÔ̺¬Ò»¸ö´óÓ×Òì³£µÄ¿ÉÖ´ÐÐÎļþ£¨³¬¹ý300MB£©£¬ÊÔÍ¼ÈÆ¹ý°²È«¼ì²â£¬»¹Ê¹ÓÃÁËAvastµÄ¹ýÆÚÖ¤ÊéÊðÃû¡£


https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing


3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵ·´´«²¼


¾ÝýÌå5ÔÂ22ÈÕ±¨Â·£¬HP Wolf SecurityµÄÐÂ×êÑÐÂÛÊöÁËPDFÊÇÈôºÎ±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£Õâ´Î»î¶¯ÖÐʹÓõÄÓʼþÔ̺¬Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£´ò¿ªPDFºó£¬Adobe Reader»áÌáÐÑÓû§´ò¿ªÆäÖÐÔ̺¬µÄDOCXÎļþ£¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµ¶¨ÃûΪ¡°ÒÑÑéÖ¤¡±£¬ËùÒÔ´ò¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£Ö¸±ê´ò¿ªDOCX²¢ÆôÓúêÖ®ºó£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡±£¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger¡£


https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/


4¡¢Í¨ÓÃÆû³µÐ¹Â©ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿Ãſͻ§µÄÐÅϢй¶


¾ÝýÌå5ÔÂ23ÈÕ±¨Â·£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷£¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿ÃÅÓû§µÄÐÅÏ¢¡£¸ÃÆû³µÔì×÷ÉÌй©£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯£¬·¢ÏÖ¹¥»÷ÕßÒѽ«²¿ÃÅÓû§µÄ¼Î½±»ý·Ö¶Ò»»ÎªÀñÎ│¡£¸Ã¹«Ë¾°µÊ¾£¬Õâ´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ£¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼ÖµÄ£¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§¸´Ô­»ý·Ö£¬²¢½¨ÒéÓû§ÔڵǽÕÊ»§Ö®Ç°³ÁÖÃÃÜÂë¡£


https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/


5¡¢Check Point·¢ÏÖTwisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯


5ÔÂ19ÈÕ£¬Check Point»ã±¨·¢ÏÖTwisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯¡£Õâ´Î¹¥»÷»î¶¯ÊÇÒ»¸ö³Ö¾Ã¼äµý»î¶¯µÄÒ»Á¬£¬ÖÁÉÙ´Ó2021Äê6ÔÂÆðÍ·»îÔ¾£¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢ÏÖ£¬Ö¸±êÔ̺¬¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼Ò×êÑлú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¹¥»÷ʼÓÚ¼Ù×°³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹µöÓʼþ£¬ÀûÓÃÁËÐµĹ¤¾ß£ºÒ»¸ö¸´ÔӵĶà²ã¼ÓÔØ·¨Ê½ºÍÒ»¸öºóÃÅSPINNER¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3ÔÂ¾ÍÆðÍ·¿ª·¢£¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´·ÖÎö¼¼Êõ¡£


https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/


6¡¢Group-IB°ä²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨


¾Ý5ÔÂ19ÈÕ±¨Â·£¬Group-IB°ä²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£Æ¾¾Ý»ã±¨µÄÊý¾Ý£¬2021ÄêµÄ¾ùÔÈÊê½ðÒªÇóΪ247000ÃÀÔª£¬±ÈÉÏÒ»ÄêÔö³¤ÁË45%£¬´óÎÞÊý¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«³ÁÀÕË÷µÄ¼¿Á©Ç¿ÔìÖ¸±ê¸¶Êê½ð¡£¸ü¸´ÔӵĹ¥»÷ʹָ±ê¸üÄѸ´Ô­£¬¹¥»÷Ôì³ÉµÄ¾ùÔÈÍ£»ú¹¦·ò´Ó18ÌìÔö³¤µ½22Ìì¡£Ô¶³Ì×ÀÃæºÍ̸(RDP)ÒÀÈ»Êǹ¥»÷µÄÖØÒªÔØÌ壬ռ±ÈΪ47%£¬Æä´ÎÊÇÍøÂç´¹µö(26%)¡£È¥ÄêÀûÓÃÃæÏò¹«¼ÒµÄÀûÓýøÐеĹ¥»÷Õ¼±ÈΪ21%£¬2020ÄêΪ17%¡£


https://www.group-ib.com/resources/threat-research/ransomware-2022.html