GREFͨ¹ýľÂí»¯SignalºÍTelegram·Ö·¢BadBazaar
°ä²¼¹¦·ò 2023-09-011¡¢GREFͨ¹ýľÂí»¯SignalºÍTelegram·Ö·¢BadBazaar
ESETÔÚ8ÔÂ30ÈÕÅû¶ÁËGREFͨ¹ýGoogle PlayºÍGalaxyÉ̵êµÄľÂí»¯SignalºÍTelegram·Ö·¢BadBazaarµÄ»î¶¯¡£Õâ´Î»î¶¯±ðÀë×Ô2020Äê7ÔºÍ2022Äê7ÔÂÒÔÀ´ÆðÍ·»îÔ¾£¬Õë¶ÔÎÚ¿ËÀ¼¡¢²¨À¼¡¢ºÉÀ¼¡¢Î÷°àÑÀ¡¢ÆÏÌÑÑÀ¡¢µÂ¹úºÍÃÀ¹úµÈ¡£GREFµÄÁ½¸öÀûÓñðÀëÊÇSignal Plus MessengerºÍFlyGram£¬ËüÃÇÊÇ¿ªÔ´IMÀûÓ÷¨Ê½SignalºÍTelegramµÄľÂí»¯°æ±¾¡£ÆäÖУ¬FlyGram¿ÉÇÔÈ¡ÁªÏµÈËÁÐ±í¡¢Í¨»°¼Í¼¡¢GoogleÕÊ»§ºÍWiFiµÈÊý¾Ý£¬Signal Plus Messenger³ýÁËÇÔÊØÐÅÏ¢»¹¼à¶½Ö¸±êµÄSignalͨѶ¡£Ä¿Ç°£¬Google PlayÒÑɾ³ý¶ñÒâÀûÓ㬵«GalaxyÉ̵êÒÀÈ»´æÔÚ¡£
https://www.welivesecurity.com/en/eset-research/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps/
2¡¢ÃÀ¹úNSCÅäÖÃÃýÎóй¶Լ2000¼Ò¹«Ë¾µÄ½üÍò¸öÓÊÏäºÍÃÜÂë
¾ÝýÌå8ÔÂ31ÈÕ±¨Â·£¬¹ú¶È°²È«Î¯Ô±»á(NSC)й¶ÁËÆä³ÉÔ±µÄ½üÍò¸öÓÊÏäºÍÃÜÂë¡£NSCÊÇÃÀ¹úµÄÒ»¸ö·ÇͶ»ú»ú¹¹£¬Ìṩ¹¤×÷³¡ËùºÍ¼ÝÊ»°²È«Åàѵ¡£×êÑÐÈËÔ±ÔÚ3ÔÂ7ÈÕ·¢ÏÖÁËNSCÍøÕ¾µÄÒ»¸ö×ÓÓò£¬¹«¿ªÁËÆäWebĿ¼ÁÐ±í¡£ÔڿɽӼûµÄÎļþÖУ¬×êÑÐÈËÔ±·¢ÏÖÁË´æ´¢Óû§ÓʼþºÍÃÜÂëµÄÊý¾Ý¿â±¸·Ý£¬Ô̺¬Ô¼9500¸öÕÊ»§¼°ÆäÍ´´¦¡£Ó°ÏìÁËÔ¼2000¼Ò´óÐ͹«Ë¾ºÍµ±¾Ö»ú¹¹£¬Èç¿ÇÅÆ¡¢Ó¢Ìضû¡¢²¨Òô¹«Ë¾¡¢Ë¾·¨²¿ºÍFBIµÈ¡£Ð¹Â¶Í´´¦¿ÉÄܱ»ÓÃÓÚײ¿â¹¥»÷À´ÈëÇÖÖ¸±ê¹«Ë¾¡£ÕâЩÊý¾Ý¿É±»¹«¿ª½Ó¼û¹¦·ò³¤´ï5¸öÔ£¬Ä¿Ç°¸ÃÎÊÌâÒѱ»½â¾ö¡£
https://securityaffairs.com/150138/security/nasa-tesla-doj-verizon-2k-leaks.html
3¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÀûÓÃWindowsÈÝÆ÷¸ôÀë¿ò¼ÜÈÆ¹ý¼ì²â
¾Ý8ÔÂ31ÈÕ±¨Â·£¬×êÑÐÈËÔ±Daniel AvinoamÑÝʾÁËÈôºÎÀûÓÃWindowsÈÝÆ÷¸ôÀë¿ò¼ÜÀ´ÈƹýÖն˰²È«½â¾ö¹æ»®¡£×êÑÐÈËÔ±Ú¹ÊÍ˵£¬Windows OS½«Ã¿¸öÈÝÆ÷µ½Ö÷»úµÄÎļþϵͳ·Ö¸ô£¬Ô¤·ÀÁËϵͳÎļþµÄ³Á¸´¡£Ã¿¸öÈÝÆ÷¶¼Ê¹Óö¯Ì¬ÌìÉúµÄ¾µÏñ£¬¸Ã¾µÏñʹÓóÁзÖÎöµãÖ¸ÏòÔʼ¾µÏñ¡£Á˾ÖÊǾµÏñÔ̺¬"¹í»êÎļþ"£¬ÕâЩÎļþ²»´æ´¢ÏÖʵÊý¾Ý£¬µ«Á´½Óµ½ÎļþϵͳÉϵÄÁíÒ»¸ö¾í¡£¶øºó£¬×êÑÐÈËÔ±ÊÔIJÀûÓÃÕâÖÖ³Á¶¨Ïò»úÔìÀ´»ìºÏÎļþϵͳ²Ù×÷£¬²¢Èƹý°²È«²úÆ·¡£
https://securityaffairs.com/150111/hacking/windows-container-isolation-framework-abuse.html
4¡¢WPÊý¾ÝǨáã²å¼þÖзì϶CVE-2023-40004¿Éµ¼ÖÂÊý¾Ýй¶
ýÌå8ÔÂ30Èճƣ¬All-in-One WP Migration²å¼þÖеĽӼû½ÚÔì·ì϶£¨CVE-2023-40004£©¿Éµ¼ÖÂÊý¾Ýй¶¡£ÕâÊÇÒ»¿îWordPressÍøÕ¾Ç¨á㹤¾ß£¬Õ¼ÓÐ500Íò¸ö»îÔ¾µÄ×°Öá£Patchstack³Æ£¬¸Ã²å¼þÌṩÉÌServMaskµÄ¸÷Àà¸ß¼¶À©´ó¶¼Ô̺¬Ò»ÑùµÄÒ×±»¹¥»÷´úÂ룬ÕâЩ´úÂëÔÚinitº¯ÊýÖв»×ãȨÏÞºÍËæ»úÊýÑéÖ¤¡£¸Ã·ì϶¿É±»ÓÃÀ´½Ó¼ûºÍ½ÚÔìÊÜÓ°ÏìÀ©´óµÄÁîÅÆÅäÖ㬴Ӷø½«ÍøÕ¾Ç¨áãÊý¾Ý×ªÒÆµ½×Ô¼ºµÄµÚÈý·½ÔÆ·þÎñÕÊ»§»ò¸´Ô¶ñÒⱸ·Ý£¬³É¹¦ÀûÓÿÉÄܵ¼ÖÂÊý¾Ýй¶¡£×êÑÐÈËÔ±ÔÚ7ÔÂ18ÈÕ·¢ÏÖÁËÕâ¸ö·ì϶£¬¸Ã·ì϶ÔÚ7ÔÂ26ÈÕ±»½¨¸´¡£
https://www.bleepingcomputer.com/news/security/wordpress-migration-add-on-flaw-could-lead-to-data-breaches/
5¡¢Trend Micro°ä²¼Earth Estries¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
8ÔÂ30ÈÕ£¬Trend Micro°ä²¼Á˹ØÓÚEarth Estries¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£¸ÃÍÅ»ïÖÁÉÙ×Ô2020Äê¾ÍÆðÍ·»îÔ¾£¬ÆäTTPÓëÁíÒ»¸öºÚ¿ÍÍÅ»ïFamousSparrow´æÔÚһЩ³Áµþ¡£¹¥»÷Õßͨ³£»áÔÚÈëÇÖÖ¸±êµÄÄÚ²¿·þÎñÆ÷ºó·ÛËéÖÎÀíÔ¹ØÊ»§¡£¶øºóºáÏòÒÆ¶¯²¢×°ÖúóÃÅºÍÆäËü¹¤¾ß£¬²¢ÍøÂçºÍй¶ÓмÛÖµµÄÊý¾Ý¡£¸ÃÍÅ»ïʹÓöñÒâÈí¼þÔ̺¬ºóÃÅZingdoor¡¢ÐÅÏ¢ÇÔÈ¡·¨Ê½TrillClientºÍºóÃÅHemiGate¡£´Ë±í£¬Earth EstriesµÄC&C»ù´¡ÉèÊ©ÒÀÀµÓÚFastly CDN·þÎñ£¬¸Ã·þÎñÔø±»ÓëAPT41ÓйصÄÍÅ»ïÀûÓá£
https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html
6¡¢Kaspersky°ä²¼2023ÄêQ2 ITÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨
8ÔÂ30ÈÕ£¬Kaspersky°ä²¼2023ÄêµÚ¶þ¼¾¶ÈITÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨¼òÊöÁËһЩÓÐÕë¶ÔÐԵĹ¥»÷Ô̺¬£¬Í¨¹ý3CX¹©¸øÁ´¹¥»÷²¿ÊðGopuramºóÃÅ¡¢LazarusµÄDeathNote»î¶¯¡¢TomirisµÄ¹¥»÷»î¶¯ÒÔ¼°Triangulation»î¶¯µÈ¡£»ã±¨»¹ÁгöÁËÆäËü¶ñÒâÈí¼þµÄÍþв£¬ÀýÈçʹÓÃWindows 0dayµÄNokoyawaÀÕË÷¹¥»÷¡¢QBotľÂíϰȾ¼¤Ôö¡¢Minas×ßÏò¸´ÔÓ֮·¡¢SatacomÍÆ³ö¿ÉÇÔÈ¡¼ÓÃÜÇ®±ÒµÄä¯ÀÀÆ÷À©´óÒÔ¼°DoubleFingerÓÃÓÚÇÔÈ¡¼ÓÃÜÇ®±ÒµÈ¡£
https://securelist.com/it-threat-evolution-q2-2023/110355/


¾©¹«Íø°²±¸11010802024551ºÅ