APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾

Ðû²¼Ê±¼ä 2021-12-30

APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾


APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬Ìع¤APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾¡£¡£¡£´Ë´Î¹¥»÷µÄ³õʼѬȾǰÑÔÊÇαװ³ÉÀ´×ÔÄ¿µÄÏàÖúͬ°éµÄ´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬Ö®ºó¹¥»÷Õß»áʹÓÃFlagpro¾ÙÐÐÍøÂçÕì̽¡¢ÆÀ¹ÀÄ¿µÄÇéÐÎÒÔ¼°ÏÂÔØ²¢Ö´Ðеڶþ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¾ÝNTT Security³Æ£¬£¬ £¬£¬£¬£¬´Ë´Î»î¶¯ÖÁÉÙʼÓÚ2020Äê10Ô£¬£¬ £¬£¬£¬£¬ÒÑÕë¶ÔÈÕ±¾¹«Ë¾Ò»Äê¶à£¬£¬ £¬£¬£¬£¬Éæ¼°¹ú·ÀÊÖÒÕ¡¢Ã½ÌåºÍͨѶÐÐÒµÔÚÄڵĶà¸öÁìÓò¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-flagpro-malware-linked-to-chinese-state-backed-hackers/


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯.png


12ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬Morphus LabsºÍSANS ISCÐû²¼±¨¸æ³Æ£¬£¬ £¬£¬£¬£¬ÔÚÒÑÍùÒ»ÖÜÖмì²âµ½2¸öʹÓÃMicrosoft Build Engine(MSBuild)µÄ¹¥»÷»î¶¯¡£¡£¡£ÔÚÕâЩ»î¶¯ÖУ¬£¬ £¬£¬£¬£¬¹¥»÷Õßͨ³£ÏÈʹÓÃÔ¶³Ì×ÀÃæÐ­Òé(RDP)ÕÊ»§»á¼ûÄ¿µÄÇéÐΣ¬£¬ £¬£¬£¬£¬È»ºóʹÓÃÔ¶³ÌWindowsЧÀÍ(SCM)¾ÙÐкáÏòÒÆ¶¯£¬£¬ £¬£¬£¬£¬×îºóʹÓÃMSBuildÖ´ÐÐCobalt Strike Beacon¡£¡£¡£¹¥»÷ÖÐʹÓõĶñÒâMSBuildÏîÄ¿¿ÉÒÔ±àÒëºÍÖ´ÐÐÌØ¶¨µÄC#´úÂ룬£¬ £¬£¬£¬£¬½ø¶ø½âÂëºÍÖ´ÐÐCobalt Strike¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actors-abuse-msbuild-cobalt-strike-beacon-execution


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬ £¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶.png


12ÔÂ29ÈÕ£¬£¬ £¬£¬£¬£¬T-Mobile½²»°ÈË֤ʵÆä²¿·ÖÓû§Ôâµ½SIM½»Á÷¹¥»÷£¬£¬ £¬£¬£¬£¬ÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£T-Mobile³ÆÆäÍŶÓÔÚ·¢Ã÷ÎÊÌâºóÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£¬£¬ £¬£¬£¬£¬²¢ÒÑ×Ô¶¯½ÓÄÉÌØÁíÍâ± £»£»£»£»¤²½·¥¡£¡£¡£µ±±»ÒªÇóÌṩÓйØÊÜÓ°ÏìÓû§ÊýÄ¿ÒÔ¼°¹¥»÷ÕߵĹ¥»÷·½·¨Ê±£¬£¬ £¬£¬£¬£¬T-Mobile¾Ü¾øÌṩ¸ü¶àÏêϸÐÅÏ¢¡£¡£¡£T-MobileÒѱ¬·¢¶à´ÎÐÅϢй¶£¬£¬ £¬£¬£¬£¬´Ë´ÎÊÂÎñÓë½ñÄê2Ô·ݵÄй¶ÊÂÎñºÜÊÇÏàËÆ£¬£¬ £¬£¬£¬£¬ÆäʱÒòSIM½»Á÷¹¥»÷й¶400¸öÓû§µÄÐÅÏ¢¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-new-data-breach-caused-by-sim-swap-attacks/


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ.png


ýÌå12ÔÂ28Èճƣ¬£¬ £¬£¬£¬£¬ÈýÐǵĹٷ½AndroidÓ¦ÓóÌÐòÊÐËÁGalaxy Store±£´æ¶à¸ö¶ñÒâÓ¦Óᣡ£¡£ÕâЩӦÓÃαװ³ÉÒÑÓÚ2018ÄêÐÝÒµµÄµÁ°æÓ¦ÓÃShowBox£¬£¬ £¬£¬£¬£¬ÒÑÔÚ¶à¸öÓû§µÄ×°±¸ÉÏ´¥·¢Google Play Protect¾¯±¨¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬£¬£¬ÕâЩӦÓÃÖ®ÒÔÊǻᴥ·¢¾¯±¨£¬£¬ £¬£¬£¬£¬ÊÇÓÉÓÚËüÃÇÇëÇó¾ßÓÐ×°ÖöñÒâÈí¼þΣº¦µÄȨÏÞ£¬£¬ £¬£¬£¬£¬µ±Óû§ÔÊÐíºóËüÃǾͿÉÒÔ»á¼ûÁªÏµÈËÁбíºÍͨ»°¼Í¼¡¢Ö´ÐдúÂë¡¢»ñÈ¡¶ñÒâÈí¼þpayloadµÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/riskware-android-streaming-apps-found-on-samsungs-galaxy-store/


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬ÈøË¹¿¦³¹ÎÂÊ¡¾ÆÀàºÍ²©²ÊÖÎÀí¾Ö£¨SLGA£©ÕýÔÚ×ÅÊÖÊÓ²ìÆäÔâµ½µÄÍøÂç¹¥»÷¡£¡£¡£SLGAÊÇÃÀ¹ú²ÆÎñ²¿»Ê¹Ú¹«Ë¾ÈÏÕæ·ÖÏú¡¢¿ØÖƺÍî¿Ïµ¾Æ¾«ÒûÁÏ¡¢´óÂéºÍ´ó´ó¶¼¶Ä²©µÄ»ú¹¹£¬£¬ £¬£¬£¬£¬Î»ÓÚ¼ÓÄôóµÄÈøË¹¿¦³¹ÎÂÊ¡¡£¡£¡£¹¥»÷±¬·¢ÔÚ12ÔÂ25ÈÕ£¬£¬ £¬£¬£¬£¬SLGAÌåÏÖ£¬£¬ £¬£¬£¬£¬ÊÓ²ìÏÔʾÏÖÔÚûÓÐÈκοͻ§¡¢Ô±¹¤»òÆäËüÊý¾Ý±»ÀÄÓ㬣¬ £¬£¬£¬£¬ÔÚÍê³É¶Ô¸ÃÊÂÎñµÄÆÀ¹Àºó£¬£¬ £¬£¬£¬£¬½«Á¢×ÝÈ»ÊÜÓ°ÏìµÄÏµÍ³ÖØÐÂÉÏÏß¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://globalnews.ca/news/8477174/slga-investigating-christmas-day-cybersecurity-incident/


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö.png


12ÔÂ27ÈÕ£¬£¬ £¬£¬£¬£¬Check PointÅû¶Equation GroupʹÓõÄÈ«¹¦Ð§¶ñÒâÈí¼þ¿ò¼ÜDanderSpritzµÄÊÖÒÕÆÊÎö¡£¡£¡£DanderSpritzÓÚ2017Äê4ÔÂ14ÈÕ±»Shadow Brokers¹ûÕæ£¬£¬ £¬£¬£¬£¬°üÀ¨ÓÃÓÚ³¤ÆÚÐÔ¡¢Õì̽¡¢ºáÏòÒÆ¶¯¡¢Èƹýɱ¶¾ÒýÇæµÈ»î¶¯µÄ¶àÖÖ¹¤¾ß¡£¡£¡£¸ÃÑо¿ÖصãÆÊÎöÆäÖеÄÒ»¸ö×é¼þDoubleFeature£¬£¬ £¬£¬£¬£¬ËüÓÃÀ´ÌìÉú¿É×°ÖÃÔÚÄ¿µÄ×°±¸ÖеŤ¾ßÀàÐ͵ÄÈÕÖ¾ºÍ±¨¸æ£¬£¬ £¬£¬£¬£¬²¢»áÍøÂç´ó×ÚÖÖÖÖÀàÐ͵ÄÊý¾Ý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/a-deep-dive-into-doublefeature-equation-groups-post-exploitation-dashboard/