¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190314

Ðû²¼Ê±¼ä 2019-03-14
1¡¢Google¡¢AppleºÍGoDaddy¹ýʧǩ·¢100¶àÍòÕÅÊý×ÖÖ¤Êé

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ñо¿Ö°Ô±Adam Caudill·¢Ã÷£¬£¬£¬£¬£¬£¬ÓÉÓÚ²Ù×÷ʧÎ󣬣¬£¬£¬£¬£¬Google¡¢AppleºÍGoDaddy¹ýʧµØÇ©·¢ÁË100¶àÍòÕŲ»ÇкÏÐÐÒµ±ê×¼µÄÊý×ÖÖ¤Êé¡£¡£¡£¡£ ¡£CaudillÌåÏÖÕâЩ¹«Ë¾ÓÃÓÚÌìÉúÖ¤ÊéµÄEJBCAÈí¼þ°üÉèÖùýʧ£¬£¬£¬£¬£¬£¬µ¼ÖÂËüÃÇÏÖʵÉÏֻʹÓÃ63λÐòÁкÅÌìÉúÖ¤Ê飬£¬£¬£¬£¬£¬ÕâÓë×îµÍ64λµÄÐÐÒµ±ê×¼²¢²»ÇкÏ¡£¡£¡£¡£ ¡£ÏÖÔÚΪֹÕâЩ֤Ê鲢δ´øÀ´ÈκÎÇ徲Σº¦£¬£¬£¬£¬£¬£¬GoogleÒÑÔÚ5ÌìÄÚ³·»ØÁË95%µÄȱ·¦¸ñÖ¤Ê飬£¬£¬£¬£¬£¬AppleºÍGoDaddyÒ²½«ÔÚ30ÌìÄÚÍê³É´ËÏîʹÃü¡£¡£¡£¡£ ¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/google-apple-and-godaddy-recall-1m-1/

2¡¢Google PlayÖÐ210¸öAPPѬȾ¹ã¸æÈí¼þSimBad£¬£¬£¬£¬£¬£¬²¨¼°1.5ÒÚÓû§

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤Check PointµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚGoogle PlayÖз¢Ã÷210¸öAPPѬȾÁË¹ã¸æÈí¼þSimBad£¬£¬£¬£¬£¬£¬ÕâЩAPPµÄ×Ü×°ÖÃÁ¿´ï1.5ÒڴΡ£¡£¡£¡£ ¡£´ó´ó¶¼APP¶¼ÊÇÈü³µ»òÉä»÷ÓÎÏ·£¬£¬£¬£¬£¬£¬ÆäÖÐÃûΪSnow Heavy Excavator SimulatorµÄAPPÏÂÔØÁ¿Áè¼Ý1000Íò¡£¡£¡£¡£ ¡£SimBadαװ³É¹ã¸æ¹¤¾ß°üRXDrioder£¬£¬£¬£¬£¬£¬µ±Óû§×°ÖÃÁËÊÜѬȾµÄAPPºó£¬£¬£¬£¬£¬£¬¸ÃAPP»áÔÚ×°±¸Æô¶¯»òÓû§½âËøÊ±×Ô¶¯Æô¶¯²¢ÏÔʾ¹ã¸æ£¬£¬£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂ뻹»áÖ´ÐдÓC&CЧÀÍÆ÷ÎüÊÕµ½µÄÏÂÁ£¬£¬£¬£¬£¬°üÀ¨É¾³ýͼ±ê¡¢ºǫ́¹ã¸æ¡¢·­¿ªÍøÒ³µÈ¡£¡£¡£¡£ ¡£GoogleÒѾ­Ï¼ÜÁËÕâЩAPP¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/simbad-adware-found-in-210-android-apps-with-over-150m-installs/

3¡¢ÐÅÏ¢ÇÔȡľÂíUrsnifµÄбäÖÖ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÈÕ±¾

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

ƾ֤Çå¾²³§ÉÌCybereasonµÄÆÊÎö£¬£¬£¬£¬£¬£¬ÐÅÏ¢ÇÔȡľÂíUrsnifµÄÒ»¸öеıäÖÖÕýÔÚÈÕ±¾Æð¾¢·Ö·¢¡£¡£¡£¡£ ¡£¸Ã±äÖÖ»ñµÃÁËÐí¶àÐµĹ¦Ð§£¬£¬£¬£¬£¬£¬°üÀ¨Òþ²ØµÄ³¤ÆÚÐÔ»úÖÆ¡¢°üÀ¨¼ÓÃÜÇ®±ÒÄ£¿£¿£¿£¿£¿£¿éºÍ´ÅÅ̼ÓÃÜÄ£¿£¿£¿£¿£¿£¿é¡¢Ó¦¶ÔÈÕ±¾Çå¾²¹¤¾ßPhishwallµÄAnti-PhishwallÄ£¿£¿£¿£¿£¿£¿é¡¢¼ì²âÈÕ±¾ÓïÑÔÉèÖᢼì²âλÖÃÐÅÏ¢µÈ¡£¡£¡£¡£ ¡£ÏêϸIoCÖ¸±êÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/latest-ursnif-variant-targets-japanese-users-to-steal-credentials-190c4a69

4¡¢Õë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯Operation Comando£¬£¬£¬£¬£¬£¬Ö÷Òª·Ö·¢CapturaTela

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӼì²âµ½Õë¶Ô°ÍÎ÷µÄ¹¥»÷»î¶¯Operation Comando¡£¡£¡£¡£ ¡£¸Ã»î¶¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÕë¶ÔÂùݿͻ§£¬£¬£¬£¬£¬£¬Ê¹ÓöñÒâÈí¼þCapturaTelaÀ´ÇÔÈ¡¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£ ¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÀ´Ñ¬È¾Ä¿µÄ£¬£¬£¬£¬£¬£¬³ýÁËCapturaTelaÖ®Í⣬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËÆäËü¼¸ÖÖRAT£¬£¬£¬£¬£¬£¬°üÀ¨LimeRAT¡¢RevengeRAT¡¢NjRAT¡¢AsyncRAT¡¢NanCoreRATºÍRemcosRAT¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/attackers-use-new-capturatela-info-stealing-malware-to-launch-operation-comando-campaign-19cb2bfe

5¡¢Õë¶Ô¶íÂÞ˹½ðÈÚ»ú¹¹µÄ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Ö÷Òª·Ö·¢RTM BotбäÖÖ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Cofense IntelligenceÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶Ô¶íÂÞ˹¼°ÆäÏàÁÚ¹ú¼ÒµÄ½ðÈÚ»ú¹¹µÄд¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÀ´·Ö·¢ÒøÐÐľÂíRTM Bot¡£¡£¡£¡£ ¡£¸Ã±äÖÖ¿ÉÒÔ´Ó»á¼ÆÈí¼þÖÐÇÔÈ¡Êý¾ÝºÍÒøÐп¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃTORЭÒéÓëC2¾ÙÐÐͨѶ¡£¡£¡£¡£ ¡£¸ÃľÂíÇÔÈ¡µÄÐÅÏ¢°üÀ¨ÏêϸµÄϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈçÓû§Ãû¡¢»úеÃû¡¢²Ù×÷ϵͳ°æ±¾¡¢×°ÖõķÀ²¡¶¾Èí¼þ¡¢Ä¬ÈÏÓïÑԺ͵ØÇøµÈ¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/financial-institutions-in-russia-targeted-using-new-version-of-rtm-bot-in-recent-phishing-campaign-78d8ab5d

6¡¢¿¨°Í˹»ùÐû²¼2018ÄêÀ¬»øÓʼþ¼°´¹ÂÚ¹¥»÷±¨¸æ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¿¨°Í˹»ùÐû²¼2018ÄêµÄÀ¬»øÓʼþºÍ´¹ÂÚ¹¥»÷ͳ¼Æ±¨¸æ£¬£¬£¬£¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£ºÈ«Çòµç×ÓÓʼþÁ÷Á¿ÖеÄÀ¬»øÓʼþÊý¾ÝµÄÕ¼±ÈΪ52.48%£¬£¬£¬£¬£¬£¬±È2017Äê½µµÍ4.15¸ö°Ù·Öµã£»£»£»2018Äê×î´óµÄÀ¬»øÓʼþȪԴ¹úÊÇÖйú£¨11.69£¥£©£»£»£»74.15£¥µÄÀ¬»øÓʼþСÓÚ2 KB£»£»£»À¬»øÓʼþÖÐ×î³£±»¼ì²âµ½µÄÎó²îʹÓÃÊÇWin32.CVE-2017-11882¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-and-phishing-in-2018/89701/

ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí