¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸
Ðû²¼Ê±¼ä 2022-02-10¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸
¾ÝýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬ZimperiumÔÚGoogle PlayÉϼì²âµ½470¿î¶ñÒâÓ¦Óᣡ£¡£¡£ÕâЩӦÓÃÒÑÔÚÈ«ÇòÁè¼Ý1.05ÒŲ́Android×°±¸ÉÏ×°ÖÃÁ˶ñÒâÈí¼þDark Herring£¬£¬£¬£¬Ëü¿ÉÒÔͨ¹ýÄ¿µÄµÄ»°·ÑÕ˵¥ÇÔÈ¡×ʽ𡣡£¡£¡£¸Ã»î¶¯Ã¿ÔÂÏòÄ¿µÄµÄ»°·ÑÕ˵¥ÖÐÔöÌí15ÃÀÔªµÄÓöȣ¬£¬£¬£¬ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬²¢Ò»Ö±Ò»Á¬µ½È¥Äê11Ô£¬£¬£¬£¬¾ÝÔ¤¼ÆÇÔÈ¡µÄ½ð¶î×ÜÊýÒÑ´ïÊýÒÚ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬GoogleÒÑÔÚPlayÊÐËÁÖÐɾ³ýÁËÉÏÊöµÄ¶ñÒâÓ¦Óᣡ£¡£¡£
https://threatpost.com/dark-herring-billing-malware-android/178032/
µÂ¹úBfV³ÆAPT27ÍÅ»ïʹÓÃHyperBro¹¥»÷ÆäÉÌÒµ×éÖ¯
1ÔÂ26ÈÕ£¬£¬£¬£¬µÂ¹úÁª°îÏÜ·¨±£»£»£»£»¤°ì¹«ÊÒ(BfV)Ðû²¼Í¨¸æ£¬£¬£¬£¬³ÆAPT27ÍÅ»ïÕýÔÚ¹¥»÷ÆäÉÌÒµ×éÖ¯¡£¡£¡£¡£APT27ÓÖÃûEmissary Panda£¬£¬£¬£¬×Ô2010ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£¡£BfV³Æ£¬£¬£¬£¬×Ô2021Äê3ÔÂÒÔÀ´£¬£¬£¬£¬APT27Ò»Ö±ÔÚʹÓÃMicrosoft ExchangeºÍZoho AdSelf Service Plus1Èí¼þÖеÄÎó²î¹¥»÷µÂ¹úµÄ¹«Ë¾¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹Ê¹ÓÃÁËHyperBro RAT£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄµÄÊý¾Ý£¬£¬£¬£¬²¢ÊÔͼÕë¶ÔÆä¿Í»§Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£
https://securityaffairs.co/wordpress/127230/apt/german-intel-warns-apt27-attacks.html
¹¥»÷ÕßʹÓÃ800¶à¸öÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes
ýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬¹¥»÷ÕßʹÓÃ800¶à¸öÒѱ»ÈëÇÖµÄWordPressÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes¡£¡£¡£¡£µ±Ä¿µÄ»á¼û±»Ñ¬È¾ÍøÕ¾Ê±£¬£¬£¬£¬»á±»ÒªÇó×°ÖÃÒ»¸ö¼ÙµÄJava RuntimeÓ¦Óᣡ£¡£¡£¸ÃMSI×°ÖóÌÐò°üÀ¨Èý¸ö¶ñÒâJavaScriptÎļþ£ºinstall.js¡¢sched.js¡¢sucesso.js£¬£¬£¬£¬ËüÃÇΪÏÂÒ»½×¶ÎµÄ¼ÓÔØ³ÌÐò×¼±¸PythonÇéÐΡ£¡£¡£¡£AvastÌåÏÖ£¬£¬£¬£¬ÒѼì²âµ½ÁË5ÖÖ²î±ðµÄ¶ñÒâChromeÀ©Õ¹³ÌÐò¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÇå¾²¹«Ë¾ÒÑ֪ͨ°ÍÎ÷CERT£¬£¬£¬£¬µ«¹¥»÷»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/chaes-banking-trojan-hijacks-chrome-with-malicious-extensions/
Bitdefender·¢Ã÷´ó¹æÄ£·Ö·¢FluBotºÍTeaBotµÄ»î¶¯
1ÔÂ26ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÐµÄFluBotºÍTeaBot¶ñÒâÈí¼þ·Ö·¢»î¶¯ÕýÔÚÕë¶Ô°Ä´óÀûÑÇ¡¢µÂ¹ú¡¢²¨À¼¡¢Î÷°àÑÀºÍÂÞÂíÄáÑǵÄAndroidÓû§¡£¡£¡£¡£Bitdefender Labs×Ô2021Äê12ÔÂÒÔÀ´£¬£¬£¬£¬½Ø»ñÁËÁè¼Ý10ÍòÌõ¶ñÒâ¶ÌÐÅ£¬£¬£¬£¬Ö¼ÔÚÈö²¥FluBot¡£¡£¡£¡£¸Ã¹«Ë¾»¹³Æ£¬£¬£¬£¬TeaBotÒѶà´Î·ºÆðÔÚGoogle PlayÊÐËÁÖУ¬£¬£¬£¬2021Äê12ÔÂ6ÈÕµ½2022Äê1ÔÂ17ÈÕ£¬£¬£¬£¬ËûÃǼì²âµ½17¸ö²î±ð°æ±¾µÄTeaBotͨ¹ý¶à¸ö¶ñÒâÓ¦ÓÃѬȾװ±¸¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-flubot-and-teabot-campaigns-target-android-devices-worldwide/
DiscordÒòAPIºÍÊý¾Ý¿â·ºÆðÎÊÌâµ¼Ö´ó¹æÄ£Ð§ÀÍÖÐÖ¹
1ÔÂ26ÈÕ£¬£¬£¬£¬Discord±¬·¢ÁË´ó¹æÄ£ÖÐÖ¹µÄÇéÐΣ¬£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨µÇ¼ЧÀÍ»òʹÓÃÓïÒô̸Ìì¡£¡£¡£¡£ÖÐÖ¹×îÏÈÓÚÃÀ¹ú¶«²¿±ê׼ʱ¼äÏÂÖç2:49£¬£¬£¬£¬×î³õÊÇÓÉAPIÖÐÖ¹ÒýÆðµÄ£¬£¬£¬£¬µ¼Ö¶à¸öЧÀÍÎÞ·¨Ï໥ͨѶ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬ÔÚ½â¾öAPIÎÊÌâºó£¬£¬£¬£¬Discord·¢Ã÷Êý¾Ý¿â¼¯Èº·ºÆðÎÊÌ⣬£¬£¬£¬Õâµ¼ÖÂÁ˸ü¶àÎÊÌâ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÐÞ¸´ÓÐÎÊÌâµÄÊý¾Ý¿â¼¯ÈºÊ±×îÏÈÏÞÖÆµÇ¼ËÙÂÊ£¬£¬£¬£¬ÒÔ±ÜÃâЧÀÍÆ÷¹ýÔØ£¬£¬£¬£¬Ö±µ½ÏÂÖç5:12×óÓÒ£¬£¬£¬£¬ÏÞËÙ±»×÷·Ï¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/major-discord-outage-caused-by-api-and-database-issues/
΢ÈíAzureÔÆÆ½Ì¨ÀֳɵÖÓù¸ß´ï3.47 TbpsµÄDDoS¹¥»÷
΢ÈíÔÚ1ÔÂ25ÈÕÐû²¼µÄ±¨¸æ³Æ£¬£¬£¬£¬ÆäAzureÒѵÖÓùÁ˸ߴï3.47 TbpsµÄDDoS¹¥»÷¡£¡£¡£¡£11Ô£¬£¬£¬£¬Î¢ÈíÑÇÖÞµÄÒ»¸ö¿Í»§Ôâµ½ÁË3.47 TbpsºÍÿÃë3.4ÒÚÊý¾Ý°ü(pps)µÄDDoS¹¥»÷£¬£¬£¬£¬Õâ±»ÒÔΪÕâÊÇÀúÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£¡£´Ë´Î¹¥»÷À´×ÔԼĪ10000¸öÔ´£¬£¬£¬£¬Éæ¼°Öйú¡¢º«¹ú¡¢¶íÂÞ˹¡¢Ì©¹ú¡¢Ó¡¶È¡¢Ô½ÄÏ¡¢ÒÁÀÊ¡¢Ó¡¶ÈÄáÎ÷Ñǵȶà¸ö¹ú¼Ò¡£¡£¡£¡£¹¥»÷ÏòÁ¿ÊÇʹÓÃSSDP¡¢CLDAP¡¢DNSºÍNTPÔÚ80¶Ë¿ÚÉϵÄUDP·´É䣬£¬£¬£¬×ÜÌå¹¥»÷Ò»Á¬ÁËԼĪ15·ÖÖÓ¡£¡£¡£¡£
https://azure.microsoft.com/en-us/blog/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends/
Çå¾²¹¤¾ß
jfrog-npm-tools
JFrogÐû²¼Èý¿î¿ªÔ´¹¤¾ß£¬£¬£¬£¬¿É´Ó npm °ü¹ÜÀíÆ÷ÏÂÔØºÍ×°ÖöñÒâ JavaScript °ü֮ǰ¶ÔÆä¾ÙÐбê¼Ç¡£¡£¡£¡£
https://github.com/jfrog/jfrog-npm-tools
EtherNet/IP & CIP Stack Detector
Çå¾²¹«Ë¾ ClarotyÐû²¼ÐµĿªÔ´¹¤¾ßÓÐÖúÓÚʶ±ðÓÃÓÚ ICS Ñо¿ºÍÆÊÎöµÄ EtherNet/IP ¿ÍÕ»¡£¡£¡£¡£
https://www.securityweek.com/new-open-source-tool-helps-identify-ethernetip-stacks-ics-research-analysis
Wireshark Forensics Toolkit
¿çƽ̨µÄ Wireshark ²å¼þ£¬£¬£¬£¬¿É½«ÍøÂçÁ÷Á¿Êý¾ÝÓëÍþвÇ鱨¡¢×ʲú·ÖÀàºÍÎó²îÊý¾Ý¹ØÁªÆðÀ´£¬£¬£¬£¬ÒÔ¼ÓËÙÍøÂçȡ֤ÆÊÎö¡£¡£¡£¡£
https://github.com/rjbhide/wireshark-forensics-plugin
T-Reqs
ÊÇÒ»ÖÖ»ùÓÚÓï·¨µÄ HTTP Fuzzer¡£¡£¡£¡£
https://github.com/bahruzjabiyev/T-Reqs-HTTP-Fuzzer
DotGit
¼ì²é .git ÊÇ·ñÔÚ»á¼ûµÄÍøÕ¾ÖÐ̻¶µÄÀ©Õ¹¡£¡£¡£¡£
Çå¾²ÆÊÎö
°×¹¬Ï£ÍûÃÀ¹úÕþ¸®Ê¹ÓÃÁãÐÅÈÎÇ徲ģ×Ó
https://www.bleepingcomputer.com/news/security/white-house-wants-us-govt-to-use-a-zero-trust-security-model/
΢ÈíÖÒÑÔ´¹ÂÚ OAuth Ó¦ÓóÌÐò
https://blog.malwarebytes.com/privacy-2/2022/01/microsoft-warns-of-phishy-oauth-apps/
¹È¸è·ÅÆú FLoC ²¢ÒýÈëÖ÷Ìâ API À´Ìæ»»¹ã¸æµÄ¸ú×Ù Cookie
https://thehackernews.com/2022/01/google-drops-floc-and-introduces-topics.html
ÀÕË÷Èí¼þ¹¥»÷ÕßʹÓõÄÎó²î¼¤Ôö 29%
https://www.infosecurity-magazine.com/news/29-surge-bugs-used-ransomware/
Let's Encrypt ÔÚÁ½ÌìÄÚ×÷·Ï´ó×Ú SSL Ö¤Êé
https://www.bleepingcomputer.com/news/security/lets-encrypt-is-revoking-lots-of-ssl-certificates-in-two-days/
MalwarebytesÐû²¼¹ØÓÚKONNI RATµÄÊÖÒÕÆÊÎö±¨¸æ
https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/