¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190314

Ðû²¼Ê±¼ä 2019-03-14
1¡¢Google¡¢AppleºÍGoDaddy¹ýʧǩ·¢100¶àÍòÕÅÊý×ÖÖ¤Êé

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±Adam Caudill·¢Ã÷£¬£¬£¬£¬ÓÉÓÚ²Ù×÷ʧÎ󣬣¬£¬£¬Google¡¢AppleºÍGoDaddy¹ýʧµØÇ©·¢ÁË100¶àÍòÕŲ»ÇкÏÐÐÒµ±ê×¼µÄÊý×ÖÖ¤Êé¡£¡£¡£¡£¡£¡£CaudillÌåÏÖÕâЩ¹«Ë¾ÓÃÓÚÌìÉúÖ¤ÊéµÄEJBCAÈí¼þ°üÉèÖùýʧ£¬£¬£¬£¬µ¼ÖÂËüÃÇÏÖʵÉÏֻʹÓÃ63λÐòÁкÅÌìÉúÖ¤Ê飬£¬£¬£¬ÕâÓë×îµÍ64λµÄÐÐÒµ±ê×¼²¢²»ÇкÏ¡£¡£¡£¡£¡£¡£ÏÖÔÚΪֹÕâЩ֤Ê鲢δ´øÀ´ÈκÎÇ徲Σº¦£¬£¬£¬£¬GoogleÒÑÔÚ5ÌìÄÚ³·»ØÁË95%µÄȱ·¦¸ñÖ¤Ê飬£¬£¬£¬AppleºÍGoDaddyÒ²½«ÔÚ30ÌìÄÚÍê³É´ËÏîʹÃü¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/google-apple-and-godaddy-recall-1m-1/

2¡¢Google PlayÖÐ210¸öAPPѬȾ¹ã¸æÈí¼þSimBad£¬£¬£¬£¬²¨¼°1.5ÒÚÓû§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤Check PointµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚGoogle PlayÖз¢Ã÷210¸öAPPѬȾÁË¹ã¸æÈí¼þSimBad£¬£¬£¬£¬ÕâЩAPPµÄ×Ü×°ÖÃÁ¿´ï1.5ÒڴΡ£¡£¡£¡£¡£¡£´ó´ó¶¼APP¶¼ÊÇÈü³µ»òÉä»÷ÓÎÏ·£¬£¬£¬£¬ÆäÖÐÃûΪSnow Heavy Excavator SimulatorµÄAPPÏÂÔØÁ¿Áè¼Ý1000Íò¡£¡£¡£¡£¡£¡£SimBadαװ³É¹ã¸æ¹¤¾ß°üRXDrioder£¬£¬£¬£¬µ±Óû§×°ÖÃÁËÊÜѬȾµÄAPPºó£¬£¬£¬£¬¸ÃAPP»áÔÚ×°±¸Æô¶¯»òÓû§½âËøÊ±×Ô¶¯Æô¶¯²¢ÏÔʾ¹ã¸æ£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬¶ñÒâ´úÂ뻹»áÖ´ÐдÓC&CЧÀÍÆ÷ÎüÊÕµ½µÄÏÂÁ£¬£¬£¬°üÀ¨É¾³ýͼ±ê¡¢ºǫ́¹ã¸æ¡¢·­¿ªÍøÒ³µÈ¡£¡£¡£¡£¡£¡£GoogleÒѾ­Ï¼ÜÁËÕâЩAPP¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/simbad-adware-found-in-210-android-apps-with-over-150m-installs/

3¡¢ÐÅÏ¢ÇÔȡľÂíUrsnifµÄбäÖÖ£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÈÕ±¾

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤Çå¾²³§ÉÌCybereasonµÄÆÊÎö£¬£¬£¬£¬ÐÅÏ¢ÇÔȡľÂíUrsnifµÄÒ»¸öеıäÖÖÕýÔÚÈÕ±¾Æð¾¢·Ö·¢¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ»ñµÃÁËÐí¶àÐµĹ¦Ð§£¬£¬£¬£¬°üÀ¨Òþ²ØµÄ³¤ÆÚÐÔ»úÖÆ¡¢°üÀ¨¼ÓÃÜÇ®±ÒÄ£¿£¿£¿£¿£¿£¿£¿éºÍ´ÅÅ̼ÓÃÜÄ£¿£¿£¿£¿£¿£¿£¿é¡¢Ó¦¶ÔÈÕ±¾Çå¾²¹¤¾ßPhishwallµÄAnti-PhishwallÄ£¿£¿£¿£¿£¿£¿£¿é¡¢¼ì²âÈÕ±¾ÓïÑÔÉèÖᢼì²âλÖÃÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£ÏêϸIoCÖ¸±êÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/latest-ursnif-variant-targets-japanese-users-to-steal-credentials-190c4a69

4¡¢Õë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯Operation Comando£¬£¬£¬£¬Ö÷Òª·Ö·¢CapturaTela

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӼì²âµ½Õë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯Operation Comando¡£¡£¡£¡£¡£¡£¸Ã»î¶¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÕë¶ÔÂùݿͻ§£¬£¬£¬£¬Ê¹ÓöñÒâÈí¼þCapturaTelaÀ´ÇÔÈ¡¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÀ´Ñ¬È¾Ä¿µÄ£¬£¬£¬£¬³ýÁËCapturaTelaÖ®Í⣬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËÆäËü¼¸ÖÖRAT£¬£¬£¬£¬°üÀ¨LimeRAT¡¢RevengeRAT¡¢NjRAT¡¢AsyncRAT¡¢NanCoreRATºÍRemcosRAT¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/attackers-use-new-capturatela-info-stealing-malware-to-launch-operation-comando-campaign-19cb2bfe

5¡¢Õë¶Ô¶íÂÞ˹½ðÈÚ»ú¹¹µÄ´¹ÂÚ¹¥»÷£¬£¬£¬£¬Ö÷Òª·Ö·¢RTM BotбäÖÖ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Cofense IntelligenceÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶Ô¶íÂÞ˹¼°ÆäÏàÁÚ¹ú¼ÒµÄ½ðÈÚ»ú¹¹µÄд¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÀ´·Ö·¢ÒøÐÐľÂíRTM Bot¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ¿ÉÒÔ´Ó»á¼ÆÈí¼þÖÐÇÔÈ¡Êý¾ÝºÍÒøÐп¨ÐÅÏ¢£¬£¬£¬£¬²¢Ê¹ÓÃTORЭÒéÓëC2¾ÙÐÐͨѶ¡£¡£¡£¡£¡£¡£¸ÃľÂíÇÔÈ¡µÄÐÅÏ¢°üÀ¨ÏêϸµÄϵͳÐÅÏ¢£¬£¬£¬£¬ÈçÓû§Ãû¡¢»úеÃû¡¢²Ù×÷ϵͳ°æ±¾¡¢×°ÖõķÀ²¡¶¾Èí¼þ¡¢Ä¬ÈÏÓïÑԺ͵ØÇøµÈ¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/financial-institutions-in-russia-targeted-using-new-version-of-rtm-bot-in-recent-phishing-campaign-78d8ab5d

6¡¢¿¨°Í˹»ùÐû²¼2018ÄêÀ¬»øÓʼþ¼°´¹ÂÚ¹¥»÷±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿¨°Í˹»ùÐû²¼2018ÄêµÄÀ¬»øÓʼþºÍ´¹ÂÚ¹¥»÷ͳ¼Æ±¨¸æ£¬£¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£ºÈ«Çòµç×ÓÓʼþÁ÷Á¿ÖеÄÀ¬»øÓʼþÊý¾ÝµÄÕ¼±ÈΪ52.48%£¬£¬£¬£¬±È2017Äê½µµÍ4.15¸ö°Ù·Öµã£»£»£»£»2018Äê×î´óµÄÀ¬»øÓʼþȪԴ¹úÊÇÖйú£¨11.69£¥£©£»£»£»£»74.15£¥µÄÀ¬»øÓʼþСÓÚ2 KB£»£»£»£»À¬»øÓʼþÖÐ×î³£±»¼ì²âµ½µÄÎó²îʹÓÃÊÇWin32.CVE-2017-11882¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-and-phishing-in-2018/89701/

ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí