Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸

Ðû²¼Ê±¼ä 2022-05-24

1¡¢Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸


5ÔÂ19ÈÕ £¬£¬£¬£¬Google³ÆÆä·¢Ã÷·Ö·¢Ìع¤Èí¼þPredatorµÄÈýÆð»î¶¯ ¡£¡£¡£¡£¹¥»÷»î¶¯±¬·¢ÓÚ2021Äê8ÔÂÖÁ10Ô £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄÎó²îÊÔͼÔÚ×îеÄAndroid×°±¸ÉÏ×°ÖöñÒâÈí¼þ ¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯»®·ÖΪChromeÖØ¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÍêÕûµÄAndroid 0-dayʹÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£© ¡£¡£¡£¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN £¬£¬£¬£¬ÓÃÓÚ¼ÓÔØPredator ¡£¡£¡£¡£


https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/


2¡¢Zscaler·¢Ã÷ð³äWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾Èö²¥Vidar


ZscalerÔÚ5ÔÂ19ÈÕÐû²¼±¨¸æ £¬£¬£¬£¬Åû¶ÁËÐÂÒ»ÂֵĴ¹Âڻ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ½ñÄê4Ô·ݷ¢Ã÷Á˼¸¸öÐÂ×¢²áµÄÓò £¬£¬£¬£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§ ¡£¡£¡£¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ £¬£¬£¬£¬µ¼ÖÂÄ¿µÄѬȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar ¡£¡£¡£¡£Vidar±äÌå»á´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌ寵µÀ»ñÈ¡C2ÉèÖà £¬£¬£¬£¬¶øISOÎļþÔò°üÀ¨Ò»¸ö¾ÞϸÒì³£µÄ¿ÉÖ´ÐÐÎļþ£¨Áè¼Ý300MB£© £¬£¬£¬£¬ÊÔÍ¼ÈÆ¹ýÇå¾²¼ì²â £¬£¬£¬£¬»¹Ê¹ÓÃÁËAvastµÄÓâÆÚÖ¤ÊéÊðÃû ¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing


3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵµÀ´Èö²¥


¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ £¬£¬£¬£¬HP Wolf SecurityµÄÐÂÑо¿ÐðÊöÁËPDFÊÇÔõÑù±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß ¡£¡£¡£¡£´Ë´Î»î¶¯ÖÐʹÓõÄÓʼþ°üÀ¨Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ ¡£¡£¡£¡£·­¿ªPDFºó £¬£¬£¬£¬Adobe Reader»áÌáÐÑÓû§·­¿ªÆäÖаüÀ¨µÄDOCXÎļþ £¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµÃüÃûΪ¡°ÒÑÑéÖ¤¡± £¬£¬£¬£¬ÒÔÊÇ·­¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡± ¡£¡£¡£¡£Ä¿µÄ·­¿ªDOCX²¢ÆôÓúêÖ®ºó £¬£¬£¬£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡± £¬£¬£¬£¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/


4¡¢Í¨ÓÃÆû³µÍ¸Â¶ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÐÅϢй¶


¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ £¬£¬£¬£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷ £¬£¬£¬£¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿·ÖÓû§µÄÐÅÏ¢ ¡£¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌ͸¶ £¬£¬£¬£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯ £¬£¬£¬£¬·¢Ã÷¹¥»÷ÕßÒѽ«²¿·ÖÓû§µÄ½±Àø»ý·Ö¶Ò»»ÎªÀñÎ│ ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ £¬£¬£¬£¬´Ë´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ £¬£¬£¬£¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼Ö嵀 £¬£¬£¬£¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§»Ö¸´»ý·Ö £¬£¬£¬£¬²¢½¨ÒéÓû§ÔÚÉϰ¶ÕÊ»§Ö®Ç°ÖØÖÃÃÜÂë ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/


5¡¢Check Point·¢Ã÷Twisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯


5ÔÂ19ÈÕ £¬£¬£¬£¬Check Point±¨¸æ·¢Ã÷Twisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯ ¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÊÇÒ»¸öºã¾ÃÌØ¹¤»î¶¯µÄÑÓÐø £¬£¬£¬£¬ÖÁÉÙ´Ó2021Äê6ÔÂ×îÏÈ»îÔ¾ £¬£¬£¬£¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢Ã÷ £¬£¬£¬£¬Ä¿µÄ°üÀ¨¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼ÒÑо¿»ú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯ ¡£¡£¡£¡£¹¥»÷ʼÓÚαװ³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹ÂÚÓʼþ £¬£¬£¬£¬Ê¹ÓÃÁËÐµĹ¤¾ß£ºÒ»¸öÖØ´óµÄ¶à²ã¼ÓÔØ³ÌÐòºÍÒ»¸öºóÃÅSPINNER ¡£¡£¡£¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3Ô¾Í×îÏÈ¿ª·¢ £¬£¬£¬£¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´ÆÊÎöÊÖÒÕ ¡£¡£¡£¡£


https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/


6¡¢Group-IBÐû²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


¾Ý5ÔÂ19ÈÕ±¨µÀ £¬£¬£¬£¬Group-IBÐû²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ ¡£¡£¡£¡£Æ¾Ö¤±¨¸æµÄÊý¾Ý £¬£¬£¬£¬2021ÄêµÄƽ¾ùÊê½ðÒªÇóΪ247000ÃÀÔª £¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË45% £¬£¬£¬£¬´ó´ó¶¼¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«ÖØÀÕË÷µÄÊÖ¶ÎÇ¿ÖÆÄ¿µÄ¸¶Êê½ð ¡£¡£¡£¡£¸üÖØ´óµÄ¹¥»÷ʹĿµÄ¸üÄѻָ´ £¬£¬£¬£¬¹¥»÷Ôì³ÉµÄƽ¾ùÍ£»£»£»£»£»úʱ¼ä´Ó18ÌìÔöÌíµ½22Ìì ¡£¡£¡£¡£Ô¶³Ì×ÀÃæÐ­Òé(RDP)ÈÔÈ»Êǹ¥»÷µÄÖ÷ÒªÔØÌå £¬£¬£¬£¬Õ¼±ÈΪ47% £¬£¬£¬£¬Æä´ÎÊÇÍøÂç´¹ÂÚ(26%) ¡£¡£¡£¡£È¥ÄêʹÓÃÃæÏò¹«ÖÚµÄÓ¦ÓþÙÐеĹ¥»÷Õ¼±ÈΪ21% £¬£¬£¬£¬2020ÄêΪ17% ¡£¡£¡£¡£


https://www.group-ib.com/resources/threat-research/ransomware-2022.html