¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»£»HSMÑÏÖØÎó²î£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹

Ðû²¼Ê±¼ä 2019-06-10

1.¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÊ¹ÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¡£¡£¡£¡£¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ï죬£¬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅưüÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¡£¡£¡£¡£¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2.΢ÈíÖÒÑÔʹÓÃOfficeÎó²îµÄÀ¬»øÓʼþ»î¶¯£¬£¬Ö÷ÒªÃé׼ŷÖÞ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


6ÔÂ7ÈÕÍí΢ÈíÐû²¼ÁËÒ»ÔòÕë¶ÔÅ·Ö޵ĻîÔ¾À¬»øÓʼþ»î¶¯µÄÖÒÑÔ¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸ÃÖÒÑÔ£¬£¬¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨OfficeºÍWordpadÎó²î£¨CVE-2017-11882£©µÄRTF¸½¼þѬȾÊܺ¦Õß¡£¡£¡£¡£¡£¡£µ±Êܺ¦Õß·­¿ªÓʼþÖеĸ½¼þʱ£¬£¬¶ñÒâRTFÎĵµ½«Ö´Ðвî±ðÀàÐ͵ľ籾£¨°üÀ¨VBScript¡¢PowerShell¡¢PHPµÈ£©ÒÔÏÂÔØºÍÖ´ÐжñÒâpayload¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-issues-warning-on-spam-campaign-using-office-exploits/

3.ÐÂÍøÂç´¹Âڻ£¬£¬Î±×°³É¶à¸öÀ­ÃÀ¹ú¼ÒµÄÕþ¸®²É¹ºÍøÕ¾

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

5ÔÂ28ÈÕAnomaliÑо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉÄ«Î÷¸ç¡¢ÃØÂ³ºÍÎÚÀ­¹çµÄÕþ¸®²É¹ºÍøÕ¾µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÖÆ×÷ÓÅÒìµÄ´¹ÂÚÍøÕ¾£¬£¬Ô¼ÇëСÎÒ˽¼Ò»ò¹«Ë¾¼ÓÈëÕâЩ¹ú¼ÒµÄÕþ¸®¾º±êÏîÄ¿£¬£¬µ«ÏÖʵÉÏÊÇΪÁËÇÔÈ¡Óû§µÄÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£Ôڸù¥»÷»î¶¯ÖУ¬£¬¹¥»÷ÕßʹÓÃÁù¸ö²î±ðµÄÓòÃû£¨ÆÊÎöÔÚÈý¸ö²î±ðµÄIPµØµãÉÏ£©ÍйÜÁË16¸ö²î±ðµÄ´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ïà¹ØÊÖÒÕÆÊÎö£¬£¬¹¥»÷ÕßÔÚÉèÖÃDNSÉèÖÃʱÖÁÉÙʹÓÃÁËÈý¸ö¿ÉÒɵĵç×ÓÓʼþµØµã¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.anomali.com/blog/phishing-campaign-impersonates-mexico-peru-uruguay-governments-e-procurement-systems

4.ICEFOG APT¶ñÒ⹤¾ßÔÚй¥»÷»î¶¯ÖÐÔٴηºÆð


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


FireEyeÑо¿Ö°Ô±Chi-en (Ashley) Shen·¢Ã÷ICEFOG APTʹÓõĶñÒâÈí¼þÔÚÏûÊŶàÄêºóÔٴηºÆðÔÚÐµĹ¥»÷»î¶¯ÖС£¡£¡£¡£¡£¡£ICEFOG¶ñÒâÈí¼þÊ״ηºÆðÓÚ2013Äê9Ô¿¨°Í˹»ùµÄÑо¿±¨¸æ£¬£¬²¢Ôڸñ¨¸æÐû²¼ºó×èÖ¹Á˻¡£¡£¡£¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±·¢Ã÷ICEFOGµÄÁ½¸öеıäÖÖ£¨ICEFOG-PºÍICEFOG-M£©£¬£¬ÕâÁ½¸ö±äÖÖ»®·Ö±»ÓÃÓÚ´Ó2014ÄêºÍ2018Äê×îÏȵĹ¥»÷ÖС£¡£¡£¡£¡£¡£ÕâÁ½¸ö±äÖÖ¶¼ÓÅÓÚԭʼµÄICEFOG£¬£¬Òâζ׏¥»÷ÕßÒѾÙÐÐÌØÁíÍ⿪·¢ÊÂÇéÒÔÔöÇ¿Æä¹¦Ð§¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÒÔǰδ·ºÆð¹ýµÄMac°æICEFOG±äÖÖ¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/

5.¹úÌ©º½¿ÕÆØ±£´æÊ®ÄêµÄδÐÞ²¹Îó²î£¬£¬µ¼ÖÂ2018ÄêµÄÊý¾Ýй¶


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Kai-yi WongÐû²¼ÁËÕë¶Ô¹úÌ©º½¿Õ2018ÄêÊý¾Ýй¶ÊÂÎñµÄÊӲ챨¸æ¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬¹¥»÷ÕßÓÚ2014Äê10ÔÂÊ״ν«Ò»¸ö¼üÅ̼ͼÆ÷Ö²Èë¹úÌ©º½¿ÕµÄϵͳ¡£¡£¡£¡£¡£¡£¸ÃľÂíʹµÃ¹¥»÷Õß¿ÉÒÔÔÚÍøÂçÖкáÏòÒÆ¶¯²¢ÇÒÍøÂçÆ¾Ö¤ÐÅÏ¢£¨Ö±ÖÁ2018Äê3ÔÂ22ÈÕ£©¡£¡£¡£¡£¡£¡£È»ºó¹¥»÷ÕßʹÓÃЧÀÍÆ÷ÉÏÒ»¸ö±£´æ10ÄêÖ®¾ÃµÄÎó²î£¬£¬ÈƹýЧÀÍÆ÷ÉϵÄÉí·ÝÑéÖ¤²¢ÇÒ»á¼ûÁËÖÎÀí¹¤¾ß¡£¡£¡£¡£¡£¡£½øÒ»²½µÄ±¨¸æÖ¸³ö¹²ÓÐ41¸öÕË»§µÄƾ֤±»ÇÔ£¬£¬°üÀ¨ÖÎÀíÔ±ÕË»§¡¢ÍøÂçÕË»§ºÍЧÀÍÕË»§¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cathay-pacifics-unpatched-decade-old-vulnerability-led-to-2018-breach/

6.HSMÑÏÖØÎó²î£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿£¿£¿£¿£¿£¿é£©ÖеÄÑÏÖØÎó²î£¬£¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸£¬£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆÐ§ÀÍÉ̺͵çÐÅÔËÓªÉ̵È¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/