AIR-FIÊÖÒÕ¿ÉʹÓÃRAMÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý£»£»£»£»SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M
Ðû²¼Ê±¼ä 2020-12-171.еÄAIR-FIÊÖÒÕ¿ÉʹÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý

ÒÔÉ«ÁÐѧÕß·¢Ã÷еÄAIR-FIÊÖÒÕ£¬£¬£¬£¬£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬£¬£¬£¬£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£AIR-FIÊÖÒյĽ¹µãÊÇ£¬£¬£¬£¬£¬µ±µçÁ÷ͨ¹ýʱ£¬£¬£¬£¬£¬Èκεç×ÓÔª¼þ¶¼»á±¬·¢µç´Å²¨¡£¡£¡£¡£¡£¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬£¬£¬£¬£¬¶øÎÞÏßµç»ù±¾ÉÏÊǵç´Å²¨£¬£¬£¬£¬£¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬À´¿ÉÒÔʹÓÃRAM¿¨ÄÚ²¿µÄµçÁ÷±¬·¢ÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨¡£¡£¡£¡£¡£¡£È»ºóʹÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄ×°±¸À´»ñÈ¡¸ÃÐźţ¬£¬£¬£¬£¬ÒԸߴï100 b/sµÄËÙÂÊÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/
2.ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª

ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃÁè¼Ý20¸öÄ£ÄâÆ÷ÓÕÆÁè¼Ý16000̨ÊÜѬȾµÄ×°±¸£¬£¬£¬£¬£¬Öظ´»á¼ûÊýǧ¸ö¿Í»§ÕÊ»§£¬£¬£¬£¬£¬½öÓö̶̼¸ÌìµÄʱ¼ä¾ÍÇÔÈ¡ÁËÊý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£¡£¸ÃڲƻÀֳɵØÊµÏÖÁË×Ô¶¯»á¼ûÕÊ»§¡¢Æô¶¯ÉúÒâ¡¢ÎüÊÕºÍÇÔÈ¡2FAµÄÀú³Ì£¬£¬£¬£¬£¬²¢Ê¹ÓÃÇÔÈ¡µ½µÄ´úÂëÀ´Íê³É²»·¨ÉúÒâ¡£¡£¡£¡£¡£¡£ÕâЩģÄâÆ÷ÉõÖÁÄܹ»Ê¹ÓÃÐéÄâרÓÃÍøÂ磨VPN£©Ð§ÀÍÀ´ÓÕÆÊÜѬȾװ±¸µÄGPSλÖ㬣¬£¬£¬£¬ÒÔÒþ²ØÆä¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/emulated-mobile-devices-used-to-steal-millions-from-us-eu-banks/
3.½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬£¬£¬£¬£¬Í¨¹ýGitHubºÍPastebinÈö²¥

½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬£¬£¬£¬£¬Í¨¹ýGitHubºÍPastebinÈö²¥¡£¡£¡£¡£¡£¡£Æä×î³õÊÇͨ¹ýX10-unix¾ÙÐÐÈö²¥µÄ£¬£¬£¬£¬£¬È»ºó´ÓGitHubÏÂÔØÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£Juniper³Æ£¬£¬£¬£¬£¬¸ÃÈ䳿Õë¶ÔWebÓ¦ÓóÌÐò¡¢IPÉãÏñ»úºÍ·ÓÉÆ÷µÈ¾ÙÐÐÁËһϵÁеĹ¥»÷£¬£¬£¬£¬£¬°üÀ¨ÖÁÉÙ31¸öÒÑÖªÎó²î£¬£¬£¬£¬£¬²¢ÊÔͼ¹¥»÷¿ª·ÅµÄAndroid Debug BridgeÅþÁ¬ºÍÏÖÓеĶñÒâÈí¼þºóÃųÌÐò¡£¡£¡£¡£¡£¡£Æ¾Ö¤JuniperµÄÔ¤¼Æ£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÁËÖÁÉÙ100¸ö²î±ðµÄËÞÖ÷À´¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/12/wormable-gitpaste-12-botnet-returns-to.html
4.ÐÂÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý

Ñо¿Ö°Ô±·¢Ã÷ÁËеÄÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÈí¼þ¿ÉÔÚAndroidºÍiOS°æ±¾ÖÐʹÓ㬣¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÐÎĵĹú¼Ò¡¢º«¹úºÍÈÕ±¾£¬£¬£¬£¬£¬Äܹ»´ÓÊÜѬȾµÄÊܺ¦ÕßÄÇÀïÍøÂçÊý¾Ý£¬£¬£¬£¬£¬ÀýÈçµç»°±êʶ·û¡¢ÁªÏµÈË¡¢SMSÐÂÎÅ¡¢ÕÕÆ¬ºÍλÖÃÐÅÏ¢£¬£¬£¬£¬£¬ÏÖÔÚÉÐδÔÚAppleºÍGoogle¹Ù·½Ó¦ÓÃÊÐËÁÉϼܡ£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬£¬£¬¸ÃÓ¦ÓóÌÐòµÄÊý¾Ý¿ÉÄܻᱻÓÃÓÚÀÕË÷Êܺ¦ÕßÒÔÖ§¸¶Ð¡¶îÊê½ð¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-goontact-spyware-discovered-targeting-android-and-ios-users/
5.SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M

SophosºÍReversingLabsÁªºÏÐû²¼Á˰üÀ¨1000Íò¸ö¶ñÒâÈí¼þÑù±¾µÄSoReL-20MÊý¾Ý¿â¡£¡£¡£¡£¡£¡£SoReL-20MΪһ×é¾ÓÉÕûÀíºÍ±ê¼ÇµÄÑù±¾ºÍÇå¾²Ïà¹ØÔªÊý¾Ý£¬£¬£¬£¬£¬¿ÉÓÃÓÚ·´¶ñÒâÈí¼þ½â¾ö¼Æ»®ÖÐʹÓõĻúеѧϰÒýÇæµÄѵÁ·Êý¾Ý¼¯¡£¡£¡£¡£¡£¡£°üÀ¨ÁË2000Íò¸öWindows Portable¿ÉÖ´ÐÐÎļþµÄÔªÊý¾Ý¡¢±êÇ©ºÍ¹¦Ð§£¬£¬£¬£¬£¬ÆäÖаüÀ¨1000Íò¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£¡£ReversinglabsÌåÏÖÕâЩÊý¾Ý¿ÉΪ¿Í»§ÌṩÃ÷È·µÄÍþвÇ鱨Êý¾Ý¼¯£¬£¬£¬£¬£¬²¢ÔÚËûÃǵķÀÓùÖÐʩչ×÷Óᣡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112302/malware/sorel-20m-free-malware-dataset.html
6.CybelAngelÔÚÍøÉÏ·¢Ã÷Áè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ

CybelAngelÔÚÍøÉÏ·¢Ã÷ÁËÁè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ£¨°üÀ¨XÉäÏߺÍCTɨÃ裩¡£¡£¡£¡£¡£¡£ÕâЩҽѧͼÏñµÄÿÌõ¼Í¼Óжà´ï200ÐеÄÔªÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨¸öÐÕÃû¡¢³öÉúÈÕÆÚºÍµØµãµÈPII(СÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©ºÍPHIÉí¸ß£¬£¬£¬£¬£¬ÌåÖØºÍÕï¶ÏµÈPHI£¨Ð¡ÎÒ˽¼ÒÒ½ÁÆÐÅÏ¢£©£¬£¬£¬£¬£¬ÇÒÎÞÐèÓû§Ãû»òÃÜÂë¼´¿É»á¼û¡£¡£¡£¡£¡£¡£CybelAngel³ÆÕâЩÊý¾Ý¿É±»ÓÃÓÚڲƻ£¬£¬£¬£¬£¬»òÔÚ°µÍøÉϾÙÐгöÊÛ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cybelangel.com/blog/medical-data-leaks/


¾©¹«Íø°²±¸11010802024551ºÅ