APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾

Ðû²¼Ê±¼ä 2021-12-30

APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾


APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ìع¤APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾¡£¡£ ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µÄ³õʼѬȾǰÑÔÊÇαװ³ÉÀ´×ÔÄ¿µÄÏàÖúͬ°éµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Ö®ºó¹¥»÷Õß»áʹÓÃFlagpro¾ÙÐÐÍøÂçÕì̽¡¢ÆÀ¹ÀÄ¿µÄÇéÐÎÒÔ¼°ÏÂÔØ²¢Ö´Ðеڶþ½×¶Î¶ñÒâÈí¼þ¡£¡£ ¡£¡£¡£¡£¡£¾ÝNTT Security³Æ£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯ÖÁÉÙʼÓÚ2020Äê10Ô£¬£¬£¬£¬£¬£¬ÒÑÕë¶ÔÈÕ±¾¹«Ë¾Ò»Äê¶à£¬£¬£¬£¬£¬£¬Éæ¼°¹ú·ÀÊÖÒÕ¡¢Ã½ÌåºÍͨѶÐÐÒµÔÚÄڵĶà¸öÁìÓò¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-flagpro-malware-linked-to-chinese-state-backed-hackers/


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯.png


12ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Morphus LabsºÍSANS ISCÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬£¬ÔÚÒÑÍùÒ»ÖÜÖмì²âµ½2¸öʹÓÃMicrosoft Build Engine(MSBuild)µÄ¹¥»÷»î¶¯¡£¡£ ¡£¡£¡£¡£¡£ÔÚÕâЩ»î¶¯ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ³£ÏÈʹÓÃÔ¶³Ì×ÀÃæÐ­Òé(RDP)ÕÊ»§»á¼ûÄ¿µÄÇéÐΣ¬£¬£¬£¬£¬£¬È»ºóʹÓÃÔ¶³ÌWindowsЧÀÍ(SCM)¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬×îºóʹÓÃMSBuildÖ´ÐÐCobalt Strike Beacon¡£¡£ ¡£¡£¡£¡£¡£¹¥»÷ÖÐʹÓõĶñÒâMSBuildÏîÄ¿¿ÉÒÔ±àÒëºÍÖ´ÐÐÌØ¶¨µÄC#´úÂ룬£¬£¬£¬£¬£¬½ø¶ø½âÂëºÍÖ´ÐÐCobalt Strike¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actors-abuse-msbuild-cobalt-strike-beacon-execution


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶.png


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬T-Mobile½²»°ÈË֤ʵÆä²¿·ÖÓû§Ôâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬£¬ÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£ ¡£¡£¡£¡£¡£T-Mobile³ÆÆäÍŶÓÔÚ·¢Ã÷ÎÊÌâºóÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£¬£¬£¬£¬£¬£¬²¢ÒÑ×Ô¶¯½ÓÄÉÌØÁíÍâ±£»£»£»£»£»£»¤²½·¥¡£¡£ ¡£¡£¡£¡£¡£µ±±»ÒªÇóÌṩÓйØÊÜÓ°ÏìÓû§ÊýÄ¿ÒÔ¼°¹¥»÷ÕߵĹ¥»÷·½·¨Ê±£¬£¬£¬£¬£¬£¬T-Mobile¾Ü¾øÌṩ¸ü¶àÏêϸÐÅÏ¢¡£¡£ ¡£¡£¡£¡£¡£T-MobileÒѱ¬·¢¶à´ÎÐÅϢй¶£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓë½ñÄê2Ô·ݵÄй¶ÊÂÎñºÜÊÇÏàËÆ£¬£¬£¬£¬£¬£¬ÆäʱÒòSIM½»Á÷¹¥»÷й¶400¸öÓû§µÄÐÅÏ¢¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-new-data-breach-caused-by-sim-swap-attacks/


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ.png


ýÌå12ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬ÈýÐǵĹٷ½AndroidÓ¦ÓóÌÐòÊÐËÁGalaxy Store±£´æ¶à¸ö¶ñÒâÓ¦Óᣡ£ ¡£¡£¡£¡£¡£ÕâЩӦÓÃαװ³ÉÒÑÓÚ2018ÄêÐÝÒµµÄµÁ°æÓ¦ÓÃShowBox£¬£¬£¬£¬£¬£¬ÒÑÔÚ¶à¸öÓû§µÄ×°±¸ÉÏ´¥·¢Google Play Protect¾¯±¨¡£¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ÕâЩӦÓÃÖ®ÒÔÊǻᴥ·¢¾¯±¨£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚËüÃÇÇëÇó¾ßÓÐ×°ÖöñÒâÈí¼þΣº¦µÄȨÏÞ£¬£¬£¬£¬£¬£¬µ±Óû§ÔÊÐíºóËüÃǾͿÉÒÔ»á¼ûÁªÏµÈËÁбíºÍͨ»°¼Í¼¡¢Ö´ÐдúÂë¡¢»ñÈ¡¶ñÒâÈí¼þpayloadµÈ¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/riskware-android-streaming-apps-found-on-samsungs-galaxy-store/


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÈøË¹¿¦³¹ÎÂÊ¡¾ÆÀàºÍ²©²ÊÖÎÀí¾Ö£¨SLGA£©ÕýÔÚ×ÅÊÖÊÓ²ìÆäÔâµ½µÄÍøÂç¹¥»÷¡£¡£ ¡£¡£¡£¡£¡£SLGAÊÇÃÀ¹ú²ÆÎñ²¿»Ê¹Ú¹«Ë¾ÈÏÕæ·ÖÏú¡¢¿ØÖƺÍî¿Ïµ¾Æ¾«ÒûÁÏ¡¢´óÂéºÍ´ó´ó¶¼¶Ä²©µÄ»ú¹¹£¬£¬£¬£¬£¬£¬Î»ÓÚ¼ÓÄôóµÄÈøË¹¿¦³¹ÎÂÊ¡¡£¡£ ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ12ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬SLGAÌåÏÖ£¬£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾÏÖÔÚûÓÐÈκοͻ§¡¢Ô±¹¤»òÆäËüÊý¾Ý±»ÀÄÓ㬣¬£¬£¬£¬£¬ÔÚÍê³É¶Ô¸ÃÊÂÎñµÄÆÀ¹Àºó£¬£¬£¬£¬£¬£¬½«Á¢×ÝÈ»ÊÜÓ°ÏìµÄÏµÍ³ÖØÐÂÉÏÏß¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://globalnews.ca/news/8477174/slga-investigating-christmas-day-cybersecurity-incident/


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö.png


12ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Check PointÅû¶Equation GroupʹÓõÄÈ«¹¦Ð§¶ñÒâÈí¼þ¿ò¼ÜDanderSpritzµÄÊÖÒÕÆÊÎö¡£¡£ ¡£¡£¡£¡£¡£DanderSpritzÓÚ2017Äê4ÔÂ14ÈÕ±»Shadow Brokers¹ûÕæ£¬£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚ³¤ÆÚÐÔ¡¢Õì̽¡¢ºáÏòÒÆ¶¯¡¢Èƹýɱ¶¾ÒýÇæµÈ»î¶¯µÄ¶àÖÖ¹¤¾ß¡£¡£ ¡£¡£¡£¡£¡£¸ÃÑо¿ÖصãÆÊÎöÆäÖеÄÒ»¸ö×é¼þDoubleFeature£¬£¬£¬£¬£¬£¬ËüÓÃÀ´ÌìÉú¿É×°ÖÃÔÚÄ¿µÄ×°±¸ÖеŤ¾ßÀàÐ͵ÄÈÕÖ¾ºÍ±¨¸æ£¬£¬£¬£¬£¬£¬²¢»áÍøÂç´ó×ÚÖÖÖÖÀàÐ͵ÄÊý¾Ý¡£¡£ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/a-deep-dive-into-doublefeature-equation-groups-post-exploitation-dashboard/