Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸

Ðû²¼Ê±¼ä 2022-05-24

1¡¢Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸


5ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬Google³ÆÆä·¢Ã÷·Ö·¢Ìع¤Èí¼þPredatorµÄÈýÆð»î¶¯¡£¡£ ¡£¡£¡£¡£¹¥»÷»î¶¯±¬·¢ÓÚ2021Äê8ÔÂÖÁ10Ô£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄÎó²îÊÔͼÔÚ×îеÄAndroid×°±¸ÉÏ×°ÖöñÒâÈí¼þ¡£¡£ ¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯»®·ÖΪChromeÖØ¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÍêÕûµÄAndroid 0-dayʹÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£¡£ ¡£¡£¡£¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN£¬£¬£¬£¬ £¬£¬ÓÃÓÚ¼ÓÔØPredator¡£¡£ ¡£¡£¡£¡£


https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/


2¡¢Zscaler·¢Ã÷ð³äWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾Èö²¥Vidar


ZscalerÔÚ5ÔÂ19ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬ £¬£¬Åû¶ÁËÐÂÒ»ÂֵĴ¹Âڻ¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ½ñÄê4Ô·ݷ¢Ã÷Á˼¸¸öÐÂ×¢²áµÄÓò£¬£¬£¬£¬ £¬£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£¡£ ¡£¡£¡£¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ£¬£¬£¬£¬ £¬£¬µ¼ÖÂÄ¿µÄѬȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£¡£ ¡£¡£¡£¡£Vidar±äÌå»á´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌ寵µÀ»ñÈ¡C2ÉèÖ㬣¬£¬£¬ £¬£¬¶øISOÎļþÔò°üÀ¨Ò»¸ö¾ÞϸÒì³£µÄ¿ÉÖ´ÐÐÎļþ£¨Áè¼Ý300MB£©£¬£¬£¬£¬ £¬£¬ÊÔÍ¼ÈÆ¹ýÇå¾²¼ì²â£¬£¬£¬£¬ £¬£¬»¹Ê¹ÓÃÁËAvastµÄÓâÆÚÖ¤ÊéÊðÃû¡£¡£ ¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing


3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵµÀ´Èö²¥


¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬HP Wolf SecurityµÄÐÂÑо¿ÐðÊöÁËPDFÊÇÔõÑù±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£¡£ ¡£¡£¡£¡£´Ë´Î»î¶¯ÖÐʹÓõÄÓʼþ°üÀ¨Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£¡£ ¡£¡£¡£¡£·­¿ªPDFºó£¬£¬£¬£¬ £¬£¬Adobe Reader»áÌáÐÑÓû§·­¿ªÆäÖаüÀ¨µÄDOCXÎļþ£¬£¬£¬£¬ £¬£¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµÃüÃûΪ¡°ÒÑÑéÖ¤¡±£¬£¬£¬£¬ £¬£¬ÒÔÊÇ·­¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£¡£ ¡£¡£¡£¡£Ä¿µÄ·­¿ªDOCX²¢ÆôÓúêÖ®ºó£¬£¬£¬£¬ £¬£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡±£¬£¬£¬£¬ £¬£¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/


4¡¢Í¨ÓÃÆû³µÍ¸Â¶ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÐÅϢй¶


¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷£¬£¬£¬£¬ £¬£¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿·ÖÓû§µÄÐÅÏ¢¡£¡£ ¡£¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌ͸¶£¬£¬£¬£¬ £¬£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯£¬£¬£¬£¬ £¬£¬·¢Ã÷¹¥»÷ÕßÒѽ«²¿·ÖÓû§µÄ½±Àø»ý·Ö¶Ò»»ÎªÀñÎ│¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ £¬£¬´Ë´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬ £¬£¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼Öµģ¬£¬£¬£¬ £¬£¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§»Ö¸´»ý·Ö£¬£¬£¬£¬ £¬£¬²¢½¨ÒéÓû§ÔÚÉϰ¶ÕÊ»§Ö®Ç°ÖØÖÃÃÜÂë¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/


5¡¢Check Point·¢Ã÷Twisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯


5ÔÂ19ÈÕ£¬£¬£¬£¬ £¬£¬Check Point±¨¸æ·¢Ã÷Twisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯¡£¡£ ¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÊÇÒ»¸öºã¾ÃÌØ¹¤»î¶¯µÄÑÓÐø£¬£¬£¬£¬ £¬£¬ÖÁÉÙ´Ó2021Äê6ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬ £¬£¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢Ã÷£¬£¬£¬£¬ £¬£¬Ä¿µÄ°üÀ¨¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼ÒÑо¿»ú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¡£ ¡£¡£¡£¡£¹¥»÷ʼÓÚαװ³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹ÂÚÓʼþ£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÁËÐµĹ¤¾ß£ºÒ»¸öÖØ´óµÄ¶à²ã¼ÓÔØ³ÌÐòºÍÒ»¸öºóÃÅSPINNER¡£¡£ ¡£¡£¡£¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3Ô¾Í×îÏÈ¿ª·¢£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´ÆÊÎöÊÖÒÕ¡£¡£ ¡£¡£¡£¡£


https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/


6¡¢Group-IBÐû²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


¾Ý5ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬Group-IBÐû²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤±¨¸æµÄÊý¾Ý£¬£¬£¬£¬ £¬£¬2021ÄêµÄƽ¾ùÊê½ðÒªÇóΪ247000ÃÀÔª£¬£¬£¬£¬ £¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË45%£¬£¬£¬£¬ £¬£¬´ó´ó¶¼¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«ÖØÀÕË÷µÄÊÖ¶ÎÇ¿ÖÆÄ¿µÄ¸¶Êê½ð¡£¡£ ¡£¡£¡£¡£¸üÖØ´óµÄ¹¥»÷ʹĿµÄ¸üÄѻָ´£¬£¬£¬£¬ £¬£¬¹¥»÷Ôì³ÉµÄƽ¾ùÍ£»£» £»£»úʱ¼ä´Ó18ÌìÔöÌíµ½22Ìì¡£¡£ ¡£¡£¡£¡£Ô¶³Ì×ÀÃæÐ­Òé(RDP)ÈÔÈ»Êǹ¥»÷µÄÖ÷ÒªÔØÌ壬£¬£¬£¬ £¬£¬Õ¼±ÈΪ47%£¬£¬£¬£¬ £¬£¬Æä´ÎÊÇÍøÂç´¹ÂÚ(26%)¡£¡£ ¡£¡£¡£¡£È¥ÄêʹÓÃÃæÏò¹«ÖÚµÄÓ¦ÓþÙÐеĹ¥»÷Õ¼±ÈΪ21%£¬£¬£¬£¬ £¬£¬2020ÄêΪ17%¡£¡£ ¡£¡£¡£¡£


https://www.group-ib.com/resources/threat-research/ransomware-2022.html