Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸
Ðû²¼Ê±¼ä 2022-05-241¡¢Google³ÆPredatorʹÓöà¸öÎó²îѬȾAndroid×°±¸
5ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Google³ÆÆä·¢Ã÷·Ö·¢Ìع¤Èí¼þPredatorµÄÈýÆð»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯±¬·¢ÓÚ2021Äê8ÔÂÖÁ10Ô£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÕë¶ÔChromeºÍAndroid²Ù×÷ϵͳµÄÎó²îÊÔͼÔÚ×îеÄAndroid×°±¸ÉÏ×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯»®·ÖΪChromeÖØ¶¨Ïòµ½SBrowser(CVE-2021-38000)¡¢ChromeɳºÐÌÓÒÝ£¨CVE-2021-37973ºÍCVE-2021-37976£©ÒÔ¼°ÍêÕûµÄAndroid 0-dayʹÓÃÁ´£¨CVE-2021-38003ºÍCVE-2021-1048£©¡£¡£¡£¡£¡£¡£ËüÃǶ¼Ê×ÏÈ×°ÖÃÁËAndroidľÂíALIEN£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼ÓÔØPredator¡£¡£¡£¡£¡£¡£
https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/
2¡¢Zscaler·¢Ã÷ð³äWin 11ÏÂÔØÃÅ»§µÄÍøÕ¾Èö²¥Vidar
ZscalerÔÚ5ÔÂ19ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬Åû¶ÁËÐÂÒ»ÂֵĴ¹Âڻ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ½ñÄê4Ô·ݷ¢Ã÷Á˼¸¸öÐÂ×¢²áµÄÓò£¬£¬£¬£¬£¬£¬Î±Ôì³ÉMicrosoft Windows 11²Ù×÷ϵͳÏÂÔØÃÅ»§¡£¡£¡£¡£¡£¡£ÕâÐ©ÍøÕ¾»á·Ö·¢¶ñÒâISOÎļþ£¬£¬£¬£¬£¬£¬µ¼ÖÂÄ¿µÄѬȾÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þVidar¡£¡£¡£¡£¡£¡£Vidar±äÌå»á´ÓTelegramºÍMastodonÉÏÍйܵĹ¥»÷ÕßµÄÉ罻ýÌ寵µÀ»ñÈ¡C2ÉèÖ㬣¬£¬£¬£¬£¬¶øISOÎļþÔò°üÀ¨Ò»¸ö¾ÞϸÒì³£µÄ¿ÉÖ´ÐÐÎļþ£¨Áè¼Ý300MB£©£¬£¬£¬£¬£¬£¬ÊÔÍ¼ÈÆ¹ýÇå¾²¼ì²â£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËAvastµÄÓâÆÚÖ¤ÊéÊðÃû¡£¡£¡£¡£¡£¡£
https://www.zscaler.com/blogs/security-research/vidar-distributed-through-backdoored-windows-11-downloads-and-abusing
3¡¢Snake Keyloggerͨ¹ýÔÚPDFÖÐǶÈë¶ñÒâWordÎĵµÀ´Èö²¥
¾ÝýÌå5ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬HP Wolf SecurityµÄÐÂÑо¿ÐðÊöÁËPDFÊÇÔõÑù±»ÓÃ×÷¶ñÒâºêÎĵµµÄ´«Ê乤¾ß¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯ÖÐʹÓõÄÓʼþ°üÀ¨Ò»¸öÃûΪ¡°»ã¿î·¢Æ±¡±µÄPDF¸½¼þ¡£¡£¡£¡£¡£¡£·¿ªPDFºó£¬£¬£¬£¬£¬£¬Adobe Reader»áÌáÐÑÓû§·¿ªÆäÖаüÀ¨µÄDOCXÎļþ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß½«Ç¶ÈëµÄÎĵµÃüÃûΪ¡°ÒÑÑéÖ¤¡±£¬£¬£¬£¬£¬£¬ÒÔÊÇ·¿ªÊ±»áÌáÐÑÎļþ¡°Îļþ¡®ÒÑÑéÖ¤¡¯¡±¡£¡£¡£¡£¡£¡£Ä¿µÄ·¿ªDOCX²¢ÆôÓúêÖ®ºó£¬£¬£¬£¬£¬£¬»áÔ¶³ÌÏÂÔØRTFÎļþ¡°f_document_shp.doc¡±£¬£¬£¬£¬£¬£¬ÆäÖеÄshellcode»áÏÂÔØ²¢ÔËÐÐSnake Keylogger¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pdf-smuggles-microsoft-word-doc-to-drop-snake-keylogger-malware/
4¡¢Í¨ÓÃÆû³µÍ¸Â¶ÆäÔ⵽ײ¿â¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÐÅϢй¶
¾ÝýÌå5ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¹úͨÓÃÆû³µ³ÆÆäÔÚÉϸöÔÂÔâµ½ÁËײ¿â¹¥»÷£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÔÚÏ߯½Ì¨²¿·ÖÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÆû³µÖÆÔìÉÌ͸¶£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ2022Äê4ÔÂ11ÈÕÖÁ29ÈÕ¼ì²âµ½Á˶ñÒâµÇ¼µÄ»î¶¯£¬£¬£¬£¬£¬£¬·¢Ã÷¹¥»÷ÕßÒѽ«²¿·ÖÓû§µÄ½±Àø»ý·Ö¶Ò»»ÎªÀñÎ│¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÎ¥¹æÊÂÎñ²¢²»ÊÇÔ´ÓÚͨÓÃÆû³µµÄϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬¶øÊÇÕë¶ÔÆäƽ̨ÉϿͻ§µÄÒ»²¨×²¿â¹¥»÷µ¼Öµģ¬£¬£¬£¬£¬£¬ËûÃǽ«ÎªËùÓÐÊÜÓ°ÏìµÄÓû§»Ö¸´»ý·Ö£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§ÔÚÉϰ¶ÕÊ»§Ö®Ç°ÖØÖÃÃÜÂë¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/gm-credential-stuffing-attack-exposed-car-owners-personal-info/
5¡¢Check Point·¢Ã÷Twisted PandaÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯
5ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Check Point±¨¸æ·¢Ã÷Twisted PandaÔÚ½üÆÚÕë¶Ô¶íÂÞ˹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯ÊÇÒ»¸öºã¾ÃÌØ¹¤»î¶¯µÄÑÓÐø£¬£¬£¬£¬£¬£¬ÖÁÉÙ´Ó2021Äê6ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬×î½üÒ»´Î»î¶¯ÔÚ2022Äê4Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨¶íÂÞ˹¹ú·À¼¯ÍÅRostec CorporationµÄÁ½¼ÒÑо¿»ú¹¹ºÍ°×¶íÂÞ˹µÄÒ»¸ö×éÖ¯¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚαװ³ÉÀ´×Ô¶íÂÞ˹ÎÀÉú²¿µÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÐµĹ¤¾ß£ºÒ»¸öÖØ´óµÄ¶à²ã¼ÓÔØ³ÌÐòºÍÒ»¸öºóÃÅSPINNER¡£¡£¡£¡£¡£¡£ÕâЩ¹¤¾ßÖÁÉÙ´Ó2021Äê3Ô¾Í×îÏÈ¿ª·¢£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁËÈÆ¹ýºÍ·´ÆÊÎöÊÖÒÕ¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/
6¡¢Group-IBÐû²¼2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ
¾Ý5ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Group-IBÐû²¼ÁË2021-2022ÄêÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æµÄÊý¾Ý£¬£¬£¬£¬£¬£¬2021ÄêµÄƽ¾ùÊê½ðÒªÇóΪ247000ÃÀÔª£¬£¬£¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË45%£¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷Õß¶¼ÊÔͼͨ¹ýË«ÖØÀÕË÷µÄÊÖ¶ÎÇ¿ÖÆÄ¿µÄ¸¶Êê½ð¡£¡£¡£¡£¡£¡£¸üÖØ´óµÄ¹¥»÷ʹĿµÄ¸üÄѻָ´£¬£¬£¬£¬£¬£¬¹¥»÷Ôì³ÉµÄƽ¾ùÍ£»£»£»úʱ¼ä´Ó18ÌìÔöÌíµ½22Ìì¡£¡£¡£¡£¡£¡£Ô¶³Ì×ÀÃæÐÒé(RDP)ÈÔÈ»Êǹ¥»÷µÄÖ÷ÒªÔØÌ壬£¬£¬£¬£¬£¬Õ¼±ÈΪ47%£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÍøÂç´¹ÂÚ(26%)¡£¡£¡£¡£¡£¡£È¥ÄêʹÓÃÃæÏò¹«ÖÚµÄÓ¦ÓþÙÐеĹ¥»÷Õ¼±ÈΪ21%£¬£¬£¬£¬£¬£¬2020ÄêΪ17%¡£¡£¡£¡£¡£¡£
https://www.group-ib.com/resources/threat-research/ransomware-2022.html


¾©¹«Íø°²±¸11010802024551ºÅ