΢Èí³ÆÊý°ÙÍò¸öAndroid×°±¸Ô¤×°µÄÓ¦Óñ£´æ¶à¸öÎó²î

Ðû²¼Ê±¼ä 2022-05-30

1¡¢Î¢Èí³ÆÊý°ÙÍò¸öAndroid×°±¸Ô¤×°µÄÓ¦Óñ£´æ¶à¸öÎó²î


΢ÈíÔÚ5ÔÂ27ÈÕÐû²¼±¨¸æ³Æ£¬£¬ £¬£¬ÔÚÊý°ÙÍò¸öAndroid×°±¸Ô¤×°µÄÓ¦Óñ£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬Ñо¿Ö°Ô±ÔÚmce SystemsµÄÒÆ¶¯¿ò¼ÜÖз¢Ã÷ÁË4¸öÎó²î£¬£¬ £¬£¬»®·ÖΪCVE-2021-42598¡¢CVE-2021-42599¡¢ CVE-2021-42600ºÍCVE-2021-42601£¬£¬ £¬£¬¿Éµ¼ÖÂÏÂÁî×¢ÈëºÍÌáȨµÈ¡£¡£¡£Æ¾Ö¤mce SystemsµÄ˵·¨£¬£¬ £¬£¬ÆäÖв¿·ÖÎó²î»¹Ó°ÏìÁËAndroidºÍiOSÉè±¹ØÁ¬ÄÆäËüÓ¦Óᣡ£¡£ÊÜÓ°ÏìÓ¦ÓÃÔÚGoogle PlayÉÏÓÐÊý°ÙÍò´ÎÏÂÔØÁ¿£¬£¬ £¬£¬×÷ΪϵͳӦÓóÌÐòԤװÔÚ´ÓAT&TºÍTELUSµÈÔËÓªÉÌ´¦¹ºÖõÄ×°±¸ÉÏ¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬ÕâЩÎó²îÒѱ»ÐÞ¸´¡£¡£¡£


https://www.microsoft.com/security/blog/2022/05/27/android-apps-with-millions-of-downloads-exposed-to-high-severity-vulnerabilities/


2¡¢ÐÂAndroidľÂíERMAC 2.0¿ÉÒÔ´Ó467¸öÓ¦ÓÃÖÐÇÔÊØÐÅÏ¢


¾ÝýÌå5ÔÂ26ÈÕ±¨µÀ£¬£¬ £¬£¬AndroidÒøÐÐľÂíERMACÒÑÒÑ·ºÆð2.0°æ±¾£¬£¬ £¬£¬Õë¶ÔµÄÄ¿µÄÓ¦ÓÃÊýÄ¿´Ó֮ǰµÄ378¸öÔöÌíµ½467¸ö¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ¼ÔÚÇÔȡĿµÄµÄµÇ¼ƾ֤²¢·¢Ë͸ø¹¥»÷Õߣ¬£¬ £¬£¬È»ºóʹÓÃÇÔÈ¡µÄƾ֤À´¿ØÖÆÄ¿µÄµÄÒøÐкͼÓÃÜÇ®±ÒÕË»§£¬£¬ £¬£¬¾ÙÐнðÈÚ»òÆäËüÐÎʽµÄڲƭ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄµÚÒ»¸öʹÓÃÁËERMAC 2.0µÄ»î¶¯ÊÇÕë¶Ô²¨À¼µÄ£¬£¬ £¬£¬¹¥»÷Õßð³äÁËÅ·ÖÞÍâÂôЧÀÍBolt Food£¬£¬ £¬£¬Í¨¹ýbolt-food[.]siteÍøÕ¾·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£Îª±ÜÃâAndroidľÂíѬȾ£¬£¬ £¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§Ö»¹Ü×èÖ¹´ÓPlay StoreÒÔÍâÏÂÔØAPK¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-ermac-20-android-malware-steals-accounts-wallets-from-467-apps/


3¡¢ÀÕË÷ÍÅ»ïClop¾íÍÁÖØÀ´£¬£¬ £¬£¬½ö½ñÄê4Ô¾ÍÒѹ¥»÷21¸öÄ¿µÄ


ýÌå5ÔÂ28Èճƣ¬£¬ £¬£¬ÀÕË÷ÍÅ»ïClopÔÚÈ¥Äê11ÔÂÖÁ½ñÄê2Ô¶ÌÔݵعرÕÊýԺ󣬣¬ £¬£¬ÓÖ¾íÍÁÖØÀ´¡£¡£¡£ÔÚ¹ú¼ÊÐ̾¯×é֯Эµ÷µÄ´úºÅΪOperation CycloneµÄÖ´·¨Ðж¯Ö®ºó£¬£¬ £¬£¬Clop²¿·Ö»ù´¡ÉèÊ©ÓÚ2021Äê6Ô¹رÕ£¬£¬ £¬£¬6¸ö³ÉÔ±±»²¶¡£¡£¡£NCC GroupµÄÊý¾ÝÏÔʾ£¬£¬ £¬£¬4Ô·ÝClopÔÚÆäÍøÕ¾ÐÂÔöÁË21¸öÒѱ»¹¥»÷µÄÄ¿µÄ£¬£¬ £¬£¬ÆäÖ÷ÒªÕë¶Ô¹¤ÒµÐÐÒµ£¬£¬ £¬£¬Õ¼±ÈΪ45%£¬£¬ £¬£¬Æä´ÎÊǿƼ¼¹«Ë¾£¨27%£©¡£¡£¡£±ðµÄ£¬£¬ £¬£¬Lockbit 2.0ºÍContiÊÇ4Ô·Ý×î»îÔ¾µÄÍŻ£¬ £¬£¬»®·Ö¹¥»÷ÁË103ºÍ45¸öÄ¿µÄ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/clop-ransomware-gang-is-back-hits-21-victims-in-a-single-month/


4¡¢GitHub¹ûÕæ½ü10ÍòNPMÓû§Æ¾Ö¤µÄOAuthÁîÅÆ±»µÁµÄÐÅÏ¢


GitHubÔÚ5ÔÂ26ÈÕ͸¶£¬£¬ £¬£¬4ÔÂÖÐÑ®µÄÇå¾²ÊÂÎñÖУ¬£¬ £¬£¬¹¥»÷ÕßʹÓÃHerokuºÍTravis-CIµÄ±»µÁOAuthÓ¦ÓõÄÁîÅÆÇÔÈ¡ÁËÔ¼100000¸önpmÕÊ»§µÄµÇ¼ÐÅÏ¢¡£¡£¡£×Ô4ÔÂ12ÈÕÔâµ½ÒÔÀ´£¬£¬ £¬£¬GitHubÒ»Ö±ÔÚÊÓ²ìÕâ´Î¹¥»÷¶ÔnpmµÄÓ°Ï죬£¬ £¬£¬²¢ÔÚ½üÆÚ·¢Ã÷ÁËеÄÐÅÏ¢¡£¡£¡£¹¥»÷Õß¿ÉʹÓñ»µÁÁîÅÆÉý¼¶¶Ônpm»ù´¡ÉèÊ©µÄ»á¼ûȨÏÞ£¬£¬ £¬£¬²¢ÇÔÈ¡skimdb.npmjs.comµÄÊý¾Ý¿â±¸·ÝÖÐ×èÖ¹2021Äê4ÔÂ7ÈÕµÄÊý¾Ý£¨°üÀ¨Ô¼10ÍònpmÓû§ÐÅÏ¢£©¡¢×èÖ¹2022Äê4ÔÂ10ÈÕËùÓÐnpm˽ÓаüµÄÒÑÐû²¼°æ±¾Ãû³ÆºÍ°æ±¾ºÅ(semVer)µÄ´æµµ£¬£¬ £¬£¬ÒÔ¼°Á½¸ö×éÖ¯µÄ²¿·Ö˽Óаü¡£¡£¡£


https://github.blog/2022-05-26-npm-security-update-oauth-tokens/


5¡¢°ÂµØÀû¿Ë¶÷¶ÙÖÝÔâµ½BlackCatµÄ¹¥»÷²¢±»ÀÕË÷500ÍòÃÀÔª


¾Ý5ÔÂ27ÈÕ±¨µÀ£¬£¬ £¬£¬°ÂµØÀû¿Ë¶÷¶ÙÖÝ£¨Carinthia£©Ôâµ½ÁËBlackCatµÄÀÕË÷¹¥»÷¡£¡£¡£¹¥»÷±¬·¢ÔÚÉÏÖܶþ£¬£¬ £¬£¬¸ÃÖÝÕþ¸®Ð§À͵ÄÔËÓª±¬·¢ÖÐÖ¹£¬£¬ £¬£¬²¢±»ÀÕË÷500ÍòÃÀÔª¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬Êýǧ¸öÊÂÇéÕ¾Òѱ»¼ÓÃÜ£¬£¬ £¬£¬CarinthiaµÄ¹ÙÍøºÍÓʼþЧÀÍ´¦ÓÚÀëÏß״̬£¬£¬ £¬£¬Õþ¸®ÎÞ·¨Ç©·¢»¤ÕÕ»ò´¦Öóͷ£½»Í¨·£¿ £¿£¿î¡£¡£¡£¸ÃÖݽ²»°ÈËGerd KurathÌåÏÖ£¬£¬ £¬£¬ËûÃDz»»áÖª×ã¹¥»÷ÕßµÄÒªÇ󣬣¬ £¬£¬BlackCatûÓдÓËûÃǵÄϵͳÖÐÇÔÈ¡ÈκÎÊý¾Ý£¬£¬ £¬£¬¶øËûÃÇ¿ÉÒÔÓñ¸·Ý»Ö¸´×°±¸¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ÔÚÊÜÓ°ÏìµÄ3000¸öϵͳÖУ¬£¬ £¬£¬µÚÒ»ÅúϵͳԤ¼ÆÔÚ5ÔÂ27ÈÕ¿ÉÖØÐÂÆôÓᣡ£¡£


https://www.bleepingcomputer.com/news/security/blackcat-alphv-ransomware-asks-5-million-to-unlock-austrian-state/


6¡¢KasperskyÐû²¼2022ÄêQ1ÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


5ÔÂ27ÈÕ£¬£¬ £¬£¬KasperskyÐû²¼ÁË2022ÄêµÚÒ»¼¾¶ÈÍøÂçÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æ¸ÅÊöÁËÒ»ÔÙÓÐÕë¶ÔÐԵĹ¥»÷£¬£¬ £¬£¬»®·ÖΪ¶ñÒâÈí¼þMoonBounce¹¥»÷UEFI¹Ì¼þ¡¢APT×éÖ¯BlueNoroff¼ÌÐøÑ°ÕÒ¼ÓÃÜÇ®±Ò¡¢Roaming MantisÒѽ«¹¥»÷¹æÄ£À©Õ¹µ½Å·ÖÞ¡¢ÓëÎÚ¿ËÀ¼Î£»£»£»£»£»£»£»úÓйصÄÍøÂç¹¥»÷£¬£¬ £¬£¬ÒÔ¼°LazarusʹÓÃľÂí»¯DeFiÓ¦ÓÃÀ´·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£±ðµÄ£¬£¬ £¬£¬±¨¸æ»¹°üÀ¨ÆäËüµÄ¶ñÒâÈí¼þ»î¶¯£¬£¬ £¬£¬ÈçNorebootð³äiPhoneÖØÆô¡¢ÔÚICSÍøÂçÉÏѰÕÒ¹«Ë¾Æ¾Ö¤¡¢Lapsus$×éÈëÇÖOktaºÍÍøÂç´¹ÂÚ¹¤¾ß°üÊг¡¡£¡£¡£


https://securelist.com/it-threat-evolution-q1-2022/106513/