¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»£»£»£»£»HSMÑÏÖØÎó²î£¬£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹
Ðû²¼Ê±¼ä 2019-06-101.¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ
¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÊ¹ÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¡£¡£¡£¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ï죬£¬£¬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅưüÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¡£¡£¡£¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/2.΢ÈíÖÒÑÔʹÓÃOfficeÎó²îµÄÀ¬»øÓʼþ»î¶¯£¬£¬£¬Ö÷ÒªÃé׼ŷÖÞ
6ÔÂ7ÈÕÍí΢ÈíÐû²¼ÁËÒ»ÔòÕë¶ÔÅ·Ö޵ĻîÔ¾À¬»øÓʼþ»î¶¯µÄÖÒÑÔ¡£¡£¡£¡£¡£Æ¾Ö¤¸ÃÖÒÑÔ£¬£¬£¬¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨OfficeºÍWordpadÎó²î£¨CVE-2017-11882£©µÄRTF¸½¼þѬȾÊܺ¦Õß¡£¡£¡£¡£¡£µ±Êܺ¦Õß·¿ªÓʼþÖеĸ½¼þʱ£¬£¬£¬¶ñÒâRTFÎĵµ½«Ö´Ðвî±ðÀàÐ͵ľ籾£¨°üÀ¨VBScript¡¢PowerShell¡¢PHPµÈ£©ÒÔÏÂÔØºÍÖ´ÐжñÒâpayload¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-warning-on-spam-campaign-using-office-exploits/3.ÐÂÍøÂç´¹Âڻ£¬£¬£¬Î±×°³É¶à¸öÀÃÀ¹ú¼ÒµÄÕþ¸®²É¹ºÍøÕ¾

5ÔÂ28ÈÕAnomaliÑо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉÄ«Î÷¸ç¡¢ÃØÂ³ºÍÎÚÀ¹çµÄÕþ¸®²É¹ºÍøÕ¾µÄ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÖÆ×÷ÓÅÒìµÄ´¹ÂÚÍøÕ¾£¬£¬£¬Ô¼ÇëСÎÒ˽¼Ò»ò¹«Ë¾¼ÓÈëÕâЩ¹ú¼ÒµÄÕþ¸®¾º±êÏîÄ¿£¬£¬£¬µ«ÏÖʵÉÏÊÇΪÁËÇÔÈ¡Óû§µÄÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£Ôڸù¥»÷»î¶¯ÖУ¬£¬£¬¹¥»÷ÕßʹÓÃÁù¸ö²î±ðµÄÓòÃû£¨ÆÊÎöÔÚÈý¸ö²î±ðµÄIPµØµãÉÏ£©ÍйÜÁË16¸ö²î±ðµÄ´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£Æ¾Ö¤Ïà¹ØÊÖÒÕÆÊÎö£¬£¬£¬¹¥»÷ÕßÔÚÉèÖÃDNSÉèÖÃʱÖÁÉÙʹÓÃÁËÈý¸ö¿ÉÒɵĵç×ÓÓʼþµØµã¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.anomali.com/blog/phishing-campaign-impersonates-mexico-peru-uruguay-governments-e-procurement-systems4.ICEFOG APT¶ñÒ⹤¾ßÔÚй¥»÷»î¶¯ÖÐÔٴηºÆð
FireEyeÑо¿Ö°Ô±Chi-en (Ashley) Shen·¢Ã÷ICEFOG APTʹÓõĶñÒâÈí¼þÔÚÏûÊŶàÄêºóÔٴηºÆðÔÚÐµĹ¥»÷»î¶¯ÖС£¡£¡£¡£¡£ICEFOG¶ñÒâÈí¼þÊ״ηºÆðÓÚ2013Äê9Ô¿¨°Í˹»ùµÄÑо¿±¨¸æ£¬£¬£¬²¢Ôڸñ¨¸æÐû²¼ºó×èÖ¹Á˻¡£¡£¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±·¢Ã÷ICEFOGµÄÁ½¸öеıäÖÖ£¨ICEFOG-PºÍICEFOG-M£©£¬£¬£¬ÕâÁ½¸ö±äÖÖ»®·Ö±»ÓÃÓÚ´Ó2014ÄêºÍ2018Äê×îÏȵĹ¥»÷ÖС£¡£¡£¡£¡£ÕâÁ½¸ö±äÖÖ¶¼ÓÅÓÚÔʼµÄICEFOG£¬£¬£¬Òâζ׏¥»÷ÕßÒѾÙÐÐÌØÁíÍ⿪·¢ÊÂÇéÒÔÔöÇ¿Æä¹¦Ð§¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÒÔǰδ·ºÆð¹ýµÄMac°æICEFOG±äÖÖ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/5.¹úÌ©º½¿ÕÆØ±£´æÊ®ÄêµÄδÐÞ²¹Îó²î£¬£¬£¬µ¼ÖÂ2018ÄêµÄÊý¾Ýй¶
Ñо¿Ö°Ô±Kai-yi WongÐû²¼ÁËÕë¶Ô¹úÌ©º½¿Õ2018ÄêÊý¾Ýй¶ÊÂÎñµÄÊӲ챨¸æ¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬£¬¹¥»÷ÕßÓÚ2014Äê10ÔÂÊ״ν«Ò»¸ö¼üÅ̼ͼÆ÷Ö²Èë¹úÌ©º½¿ÕµÄϵͳ¡£¡£¡£¡£¡£¸ÃľÂíʹµÃ¹¥»÷Õß¿ÉÒÔÔÚÍøÂçÖкáÏòÒÆ¶¯²¢ÇÒÍøÂçÆ¾Ö¤ÐÅÏ¢£¨Ö±ÖÁ2018Äê3ÔÂ22ÈÕ£©¡£¡£¡£¡£¡£È»ºó¹¥»÷ÕßʹÓÃЧÀÍÆ÷ÉÏÒ»¸ö±£´æ10ÄêÖ®¾ÃµÄÎó²î£¬£¬£¬ÈƹýЧÀÍÆ÷ÉϵÄÉí·ÝÑéÖ¤²¢ÇÒ»á¼ûÁËÖÎÀí¹¤¾ß¡£¡£¡£¡£¡£½øÒ»²½µÄ±¨¸æÖ¸³ö¹²ÓÐ41¸öÕË»§µÄƾ֤±»ÇÔ£¬£¬£¬°üÀ¨ÖÎÀíÔ±ÕË»§¡¢ÍøÂçÕË»§ºÍЧÀÍÕË»§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cathay-pacifics-unpatched-decade-old-vulnerability-led-to-2018-breach/6.HSMÑÏÖØÎó²î£¬£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹
LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿£¿£¿£¿£¿é£©ÖеÄÑÏÖØÎó²î£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸£¬£¬£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆÐ§ÀÍÉ̺͵çÐÅÔËÓªÉ̵ȡ£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬£¬£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬£¬£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/