Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸

Ðû²¼Ê±¼ä 2022-05-24

1¡¢Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸


5ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Google³ÆÆä·¢Ã÷·Ö·¢Ìع¤Èí¼þPredatorµÄÈýÆð»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯±¬·¢ÓÚ2021Äê8ÔÂÖÁ10Ô£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄÎó²îÊÔͼÔÚ×îеÄAndroid×°±¸ÉÏ×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯»®·ÖΪChromeÖØ¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÍêÕûµÄAndroid 0-dayʹÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£¡£¡£¡£¡£¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼ÓÔØPredator¡£¡£¡£¡£¡£¡£


https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/


2¡¢Zscaler·¢Ã÷ð³äWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾Èö²¥Vidar


ZscalerÔÚ5ÔÂ19ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬Åû¶ÁËÐÂÒ»ÂֵĴ¹Âڻ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ½ñÄê4Ô·ݷ¢Ã÷Á˼¸¸öÐÂ×¢²áµÄÓò£¬£¬£¬£¬£¬£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£¡£¡£¡£¡£¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ£¬£¬£¬£¬£¬£¬µ¼ÖÂÄ¿µÄѬȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£¡£¡£¡£¡£¡£Vidar±äÌå»á´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌ寵µÀ»ñÈ¡C2ÉèÖ㬣¬£¬£¬£¬£¬¶øISOÎļþÔò°üÀ¨Ò»¸ö¾ÞϸÒì³£µÄ¿ÉÖ´ÐÐÎļþ£¨Áè¼Ý300MB£©£¬£¬£¬£¬£¬£¬ÊÔÍ¼ÈÆ¹ýÇå¾²¼ì²â£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËAvastµÄÓâÆÚÖ¤ÊéÊðÃû¡£¡£¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing


3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵµÀ´Èö²¥


¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬HP Wolf SecurityµÄÐÂÑо¿ÐðÊöÁËPDFÊÇÔõÑù±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÖÐʹÓõÄÓʼþ°üÀ¨Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£¡£¡£¡£¡£¡£·­¿ªPDFºó£¬£¬£¬£¬£¬£¬Adobe Reader»áÌáÐÑÓû§·­¿ªÆäÖаüÀ¨µÄDOCXÎļþ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµÃüÃûΪ¡°ÒÑÑéÖ¤¡±£¬£¬£¬£¬£¬£¬ÒÔÊÇ·­¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£¡£¡£¡£¡£¡£Ä¿µÄ·­¿ªDOCX²¢ÆôÓúêÖ®ºó£¬£¬£¬£¬£¬£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡±£¬£¬£¬£¬£¬£¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/


4¡¢Í¨ÓÃÆû³µÍ¸Â¶ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÐÅϢй¶


¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿·ÖÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌ͸¶£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯£¬£¬£¬£¬£¬£¬·¢Ã÷¹¥»÷ÕßÒѽ«²¿·ÖÓû§µÄ½±Àø»ý·Ö¶Ò»»ÎªÀñÎ│¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼ÖµÄ£¬£¬£¬£¬£¬£¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§»Ö¸´»ý·Ö£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§ÔÚÉϰ¶ÕÊ»§Ö®Ç°ÖØÖÃÃÜÂë¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/


5¡¢Check Point·¢Ã÷Twisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯


5ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Check Point±¨¸æ·¢Ã÷Twisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÊÇÒ»¸öºã¾ÃÌØ¹¤»î¶¯µÄÑÓÐø£¬£¬£¬£¬£¬£¬ÖÁÉÙ´Ó2021Äê6ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼ÒÑо¿»ú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚαװ³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÐµĹ¤¾ß£ºÒ»¸öÖØ´óµÄ¶à²ã¼ÓÔØ³ÌÐòºÍÒ»¸öºóÃÅSPINNER¡£¡£¡£¡£¡£¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3Ô¾Í×îÏÈ¿ª·¢£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´ÆÊÎöÊÖÒÕ¡£¡£¡£¡£¡£¡£


https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/


6¡¢Group-IBÐû²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


¾Ý5ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Group-IBÐû²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æµÄÊý¾Ý£¬£¬£¬£¬£¬£¬2021ÄêµÄƽ¾ùÊê½ðÒªÇóΪ247000ÃÀÔª£¬£¬£¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË45%£¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«ÖØÀÕË÷µÄÊÖ¶ÎÇ¿ÖÆÄ¿µÄ¸¶Êê½ð¡£¡£¡£¡£¡£¡£¸üÖØ´óµÄ¹¥»÷ʹĿµÄ¸üÄѻָ´£¬£¬£¬£¬£¬£¬¹¥»÷Ôì³ÉµÄƽ¾ùÍ£» £»£»úʱ¼ä´Ó18ÌìÔöÌíµ½22Ìì¡£¡£¡£¡£¡£¡£Ô¶³Ì×ÀÃæÐ­Òé(RDP)ÈÔÈ»Êǹ¥»÷µÄÖ÷ÒªÔØÌ壬£¬£¬£¬£¬£¬Õ¼±ÈΪ47%£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÍøÂç´¹ÂÚ(26%)¡£¡£¡£¡£¡£¡£È¥ÄêʹÓÃÃæÏò¹«ÖÚµÄÓ¦ÓþÙÐеĹ¥»÷Õ¼±ÈΪ21%£¬£¬£¬£¬£¬£¬2020ÄêΪ17%¡£¡£¡£¡£¡£¡£


https://www.group-ib.com/resources/threat-research/ransomware-2022.html