ÐÂÐÍAndroid Hook¶ñÒâÈí¼þ±äÖÖʹÓÃÀÕË÷Èí¼þËø¶¨×°±¸
Ðû²¼Ê±¼ä 2025-08-281. ÐÂÐÍAndroid Hook¶ñÒâÈí¼þ±äÖÖʹÓÃÀÕË÷Èí¼þËø¶¨×°±¸
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Òƶ¯Çå¾²¹«Ë¾Zimperium¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬£¬£¬£¬Õ¹ÏÖÆäzLabsÍŶӷ¢Ã÷µÄÐÂÐÍHook Android¶ñÒâÈí¼þ±äÖÖÒÑÑݱäΪ¼¯ÀÕË÷¡¢Ìع¤ºÍÒøÐÐľÂí¹¦Ð§ÓÚÒ»ÌåµÄ»ìÏýÍþв¡£¡£¡£¡£¡£Õâ¿îÃûΪ"Hook Version 3"µÄ¶ñÒâÈí¼þͨ¹ý´¹ÂÚ¹¥»÷ºÍGitHubµÈ¹«¹²Æ½Ì¨Èö²¥£¬£¬£¬£¬£¬£¬±ê¼Ç×ÅÒÆ¶¯Íþв½øÈë¸üΣÏյĽ׶Ρ£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬Hook 3.0Ö§³Ö¶à´ï107¸öÔ¶³ÌÏÂÁ½Ï¾É°æ±¾ÐÂÔö38¸ö£©£¬£¬£¬£¬£¬£¬¸¶Óë¹¥»÷Õß¶Ô×°±¸Ø¨¹ÅδÓеĿØÖÆÈ¨¡£¡£¡£¡£¡£Æä½¹µã¹¥»÷ÊֶΰüÀ¨£ºÍ¨¹ýÓÕµ¼Óû§ÆôÓÃAndroid¸¨Öú¹¦Ð§£¨Accessibility Service£©ÊµÏÖ×Ô¶¯»¯¶ñÒâ²Ù×÷£»£»£»£»£»£»£»Ê¹ÓÃÐéα͸Ã÷ÆÁÄ»ÁýÕÖÊÖÒÕÇÔÈ¡PINÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ÀýÈçαÔìGoogle Pay½çÃæ»òNFCÌáÐÑ£»£»£»£»£»£»£»¸üÒýÈ붯̬ÀÕË÷¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉÈ«ÆÁÏÔʾ´ÓÔ¶³ÌЧÀÍÆ÷¼ÓÔØµÄÊê½ðÒªÇ󣬣¬£¬£¬£¬£¬Ç®°üµØµãºÍ½ð¶îʵʱ¸üУ¬£¬£¬£¬£¬£¬¼«´óÔöÇ¿¹¥»÷˳ӦÐÔ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ²»µ«¾ß±¸ÊµÊ±´«Êä×°±¸»î¶¯µÄÄÜÁ¦£¬£¬£¬£¬£¬£¬»¹Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâÎļþ£¬£¬£¬£¬£¬£¬ÏÔÖø½µµÍÈö²¥Ãż÷¡£¡£¡£¡£¡£
https://hackread.com/android-hook-malware-variant-locks-devices-ransomware/
2. CISA½«CitrixÓëGit¸ßΣÎó²îÌí¼Óµ½ÒÑ֪ʹÓÃÎó²îĿ¼
8ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Èý¸ö¸ßΣÎó²îÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬£¬Éæ¼°Citrix»á»°¼Í¼ϵͳºÍGit°æ±¾¿ØÖƹ¤¾ß£¬£¬£¬£¬£¬£¬²¢ÒÀ¾Ý¡¶Ô¼ÊøÐÔÔËÓªÖ¸ÁBOD£©22-01¡·ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê9ÔÂ15ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£´Ë´Î¸üÐÂ͹ÏÔÁË»ìÏý°ì¹«ÇéÐÎÏÂÆóÒµ»ù´¡ÉèÊ©ÃæÁÙµÄÐÂÐ͹¥»÷ÃæÎ£º¦¡£¡£¡£¡£¡£´Ë´ÎÊÕ¼µÄÎó²î°üÀ¨Á½¸öCitrix Session RecordingȱÏݺÍÒ»¸öGitÉèÖÃÎó²î¡£¡£¡£¡£¡£CVE-2024-8069£¨CVSS 5.1£©Îª·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíͳһÄÚÍøÖÐÒÑͨ¹ýÉí·ÝÑéÖ¤µÄÓû§Ê¹ÓÃNetworkServiceÕË»§È¨ÏÞÖ´ÐÐÊÜÏÞÔ¶³Ì´úÂ룬£¬£¬£¬£¬£¬µ«Ðè¹¥»÷ÕßÔ¤ÏÈ»ñµÃÄÚÍø»á¼ûȨÏÞ¡£¡£¡£¡£¡£Æä"ÐÖµÜÎó²î"CVE-2024-8068£¨CVSS 5.1£©ÔòÉæ¼°È¨ÏÞÌáÉý£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÓë»á»°¼Í¼ЧÀÍÆ÷´¦ÓÚͳһWindows Active DirectoryÓò£¬£¬£¬£¬£¬£¬Í¨¹ý²»µ±È¨ÏÞÖÎÀí»ñÈ¡¸ü¸ßϵͳȨÏÞ¡£¡£¡£¡£¡£¸ü¾ßÆÕ±éÓ°ÏìµÄÊÇGitÎó²îCVE-2025-48384£¨CVSS 8.1£©¡£¡£¡£¡£¡£¹¥»÷Õ߿ɽṹ°üÀ¨ÌØÊâCR×Ö·ûµÄ¶ñÒâ×ÓÄ£¿£¿£¿£¿£¿é·¾¶£¬£¬£¬£¬£¬£¬²¢Í¨¹ý·ûºÅÁ´½ÓÖ¸Ïò×ÓÄ£¿£¿£¿£¿£¿éhooksĿ¼¡£¡£¡£¡£¡£Ò»µ©¿ª·¢Õ߿ˡ´ËÀà¶ñÒâ¿ÍÕ»£¬£¬£¬£¬£¬£¬×ÓÄ£¿£¿£¿£¿£¿é³õʼ»¯Ê±½«×Ô¶¯´¥·¢hooksĿ¼ÖеĶñÒâpost-checkouthook¾ç±¾£¬£¬£¬£¬£¬£¬ÊµÏÖÎÞ¸ÐÖªµÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£
https://securityaffairs.com/181551/uncategorized/u-s-cisa-adds-citrix-session-recording-and-git-flaws-to-its-known-exploited-vulnerabilities-catalog.html
3. QilinÀÕË÷×éÖ¯Ðû³ÆÈëÇÖ×ÅÃû¹«¹Ø¹«Ë¾Singer Associates
8ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬×ÅÃûΣ»£»£»£»£»£»£»ú¹«¹Ø¹«Ë¾Singer AssociatesÔâÓöÀÕË÷Èí¼þ×éÖ¯QilinµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÒý·¢¶ÔÍøÂçÇå¾²ÓëÉÌÒµÂ×ÀíµÄË«ÖØ¹Ø×¢¡£¡£¡£¡£¡£QilinÍÅ»ïÔÚÆä°µÍøÐ¹Â¶Æ½Ì¨Ðû²¼Í¨¸æ£¬£¬£¬£¬£¬£¬Ðû³ÆÀÖ³ÉÈëÇÖSinger Associatesϵͳ£¬£¬£¬£¬£¬£¬²¢¹ûÕæ²¿·Ö¾Ý³ÆÇÔÈ¡µÄÊý¾ÝƬ¶Ï£¬£¬£¬£¬£¬£¬°üÀ¨Ö´·¨Îļþ½ØÍ¼¼°ÄÚ²¿µµ°¸¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÉùÃ÷ÖÐÖ¸¿ØSinger±£´æ"ʹÓÃÑ¡Ãñ¼Æ»®¡¢Î±ÔìÐÅÏ¢¡¢ÓÕÆ¿Í»§"µÈ²»µÀÆ·ÐÐΪ£¬£¬£¬£¬£¬£¬Éù³ÆÒÑ»ñÈ¡"°üÀ¨¹«Ë¾ËùÓÐÄÚ²¿ÔË×÷µÄµµ°¸"£¬£¬£¬£¬£¬£¬Éæ¼°ÆäΪѩ·ðÁú¡¢°Ý¶ú¡¢°®±Ëӵȿç¹úÆóҵЧÀ͵ÄÕ½ÂÔϸ½Ú¡£¡£¡£¡£¡£Ö»¹ÜÊý¾ÝÕæÊµÐÔÉÐδͨ¹ýÍêÕûÑù±¾ÑéÖ¤£¬£¬£¬£¬£¬£¬µ«CybernewsÑо¿ÍŶӯÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬Ð¹Â¶ÎļþÏÔʾSingerÔøÎªÄÜÔ´¾ÞÍ·Ñ©·ðÁúÖÆ¶©Ó¦¶Ô¶ò¹Ï¶à¶ûÎÛȾËßËϰ¸µÄÓßÂ۲ٿؼƻ®£¬£¬£¬£¬£¬£¬°üÀ¨¼à¿Ø»·±£»£»£»£»£»£»£»î¸ÐÈËÊ¿¼°ÊÓ²ì×ÊÖú·½¶¯Ïò¡£¡£¡£¡£¡£¾ÝCybernews°µÍø¼à¿ØÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬QilinÔÚÒÑÍù12¸öÔÂÄÚ¹¥»÷ÖÁÉÙ503¼Ò»ú¹¹£¬£¬£¬£¬£¬£¬Êܺ¦Õߺ¸ÇÖÆÒ©¡¢ÄÜÔ´¡¢Ã½Ìå¡¢Ò½ÁƵȶà¸öÁìÓò¡£¡£¡£¡£¡£
https://cybernews.com/security/singer-associates-ransomware-attack-qilin/
4. ShadowSilkʹÓÃTelegram»úеÈ˹¥»÷ÑÇÌ«µØÇøµÄ35¸ö×éÖ¯
8ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Group-IB¿ËÈÕÅû¶ÃûΪShadowSilkµÄÐÂÐÍÍþв×éÖ¯ÔÚÖÐÑǼ°ÑÇÌ«µØÇø£¨APAC£©Õë¶ÔÕþ¸®»ú¹¹Ìᳫ¶¨Ïò¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÑÉøÍ¸Áè¼Ý30¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬½¹µãÄîͷΪÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£ÆäÊÖÒÕÕ»Ó빤¾ß¼¯ÓëYoroTrooper¡¢SturgeonPhisher¼°Silent LynxµÈÒÑÖªºÚ¿ÍÕûÌå±£´æÏÔÖøÖØµþ£¬£¬£¬£¬£¬£¬¹¥»÷¹æÄ£ÁýÕÖÎÚ×ȱð¿Ë˹̹¡¢¼ª¶û¼ªË¹Ë¹Ì¹¡¢Ãåµé¡¢Ëþ¼ª¿Ë˹̹¡¢°Í»ù˹̹¼°ÍÁ¿âÂü˹̹£¬£¬£¬£¬£¬£¬³ýÕþ¸®»ú¹¹Í⣬£¬£¬£¬£¬£¬ÄÜÔ´¡¢ÖÆÔì¡¢ÁãÊÛºÍÔËÊäҵʵÌåÒàÔⲨ¼°¡£¡£¡£¡£¡£¹¥»÷ÊÖ·¨·½Ã棬£¬£¬£¬£¬£¬ShadowSilkÑÓÐøÁËYoroTrooperµÄÊÖÒÕÂöÂ磬£¬£¬£¬£¬£¬³õʼÈëÇÖͨ¹ýÓã²æÊ½´¹ÂÚÓʼþͶµÝÊÜÃÜÂë±£»£»£»£»£»£»£»¤µÄѹËõÎļþ£¬£¬£¬£¬£¬£¬ÊÍ·Å×Ô½ç˵¼ÓÔØÆ÷ºó£¬£¬£¬£¬£¬£¬½«ÏÂÁî¿ØÖÆ£¨C2£©Á÷Á¿Î±×°ÎªTelegram»úеÈËͨѶÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÐÞ¸ÄWindows×¢²á±íʵÏÖ³¤ÆÚ»¯×¤Áô£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃDrupal£¨CVE-2018-7600/7602£©ºÍWP-Automatic²å¼þÎó²î£¨CVE-2024-27956£©À©´ó¹¥»÷Ãæ¡£¡£¡£¡£¡£Æä¹¤¾ßÁ´º¸ÇÍøÂçɨÃ裨FOFA¡¢FscanµÈ£©¡¢Îó²îʹÓÿò¼Ü£¨Metasploit¡¢Cobalt Strike£©¼°°µÍø»ñÈ¡µÄJRATºÍMorf Project¿ØÖÆÃæ°å£¬£¬£¬£¬£¬£¬Êý¾ÝÇÔÈ¡»·½ÚÔò°²ÅŶ¨Öƹ¤¾ßÌáÈ¡ChromeÃÜÂë´æ´¢Îļþ¼°½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£
https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html
5. ΢ÈíÕ¹ÏÖStorm-0501ºÚ¿ÍתÏòÔÆ¶ËÀÕË÷Èí¼þ¹¥»÷
8ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬Î¢Èí¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬Õ¹ÏÖºã¾Ã»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Storm-0501Òѳ¹µ×תÐÍ£¬£¬£¬£¬£¬£¬´Ó¹Å°åÍâµØ¼ÓÃܹ¥»÷תÏò»ùÓÚÔÆµÄÖØ´óÊý¾ÝÀÕË÷ģʽ¡£¡£¡£¡£¡£Storm-0501µÄ×îй¥»÷Á´¾Û½¹»ìÏýÔÆÇéÐΣ¬£¬£¬£¬£¬£¬Í¨¹ýÈëÇÖMicrosoft DefenderÎó²î»ñÈ¡Active DirectoryÓëEntra ID×â»§¿ØÖÆÈ¨¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈʹÓÃÇÔÈ¡µÄĿ¼ͬ²½ÕË»§£¨DSA£©Á¬ÏµAzureHound¹¤¾ßö¾ÙÓû§È¨ÏÞÓëAzure×ÊÔ´£¬£¬£¬£¬£¬£¬×îÖÕËø¶¨È±·¦¶àÒòËØÈÏÖ¤£¨MFA£©µÄÈ«¾ÖÖÎÀíÔ±ÕË»§¡£¡£¡£¡£¡£Í¨¹ýÖØÖÃÖÎÀíÔ±ÃÜÂë²¢ÀÄÓÃMicrosoft.Authorization/elevateAccess/action½Ó¿Ú£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«×ÔÉíÌáÉýÖÁAzureËùÓÐÕß½ÇÉ«£¬£¬£¬£¬£¬£¬ÖÜÈ«½ÓÊÜÊܺ¦ÕßÔÆÇéÐΡ£¡£¡£¡£¡£ÕÆ¿ØÔƶËȨÏ޺󣬣¬£¬£¬£¬£¬Storm-0501Õö¿ªÈý½×¶ÎÆÆËð£ºÊ×ÏȽûÓÃÇå¾²·ÀÓùϵͳ£¬£¬£¬£¬£¬£¬Æä´ÎÇÔÈ¡Azure´æ´¢ÕË»§ÖеÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬×îºóͨ¹ýÆÆËð´æ´¢¿ìÕÕ¡¢»Ö¸´±£¹Ü¿â¼°±¸·Ý½Úµã£¬£¬£¬£¬£¬£¬×è¶ÏÊܺ¦ÕßÊý¾Ý»Ö¸´Â·¾¶¡£¡£¡£¡£¡£Èô±¸·ÝÎÞ·¨É¾³ý£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔò½¨ÉèÐÂÃÜÔ¿¿âÓë¿Í»§ÖÎÀíÃÜÔ¿£¬£¬£¬£¬£¬£¬Ö±½Ó¼ÓÃÜÔÆÊý¾ÝʵÏÖ"ÔÆ¶ËËø¶¨"¡£¡£¡£¡£¡£Íê³ÉÊý¾ÝÇÔÈ¡Óë¼ÓÃܺ󣬣¬£¬£¬£¬£¬Íþв×é֯ͨ¹ý±»¿ØµÄMicrosoft TeamsÕË»§ÁªÏµÊܺ¦Õߣ¬£¬£¬£¬£¬£¬ÕýʽÌá³öÊê½ðÒªÇ󡣡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/
6. ÈðµäÊÐÕþIT¾ÞÍ·ÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬200ÓàµØÇøÐ§ÀÍ̱»¾
8ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ÈðµäÖ÷ÒªÊÐÕþϵͳ¹©Ó¦ÉÌMilj?data ¿ËÈÕÔâÓöÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÌìÏÂ200¶à¸öµØÇø¹«¹²Ð§ÀÍÊÜ×裬£¬£¬£¬£¬£¬²¢Òý·¢Ãô¸ÐÊý¾Ýй¶Σº¦¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÎªÈðµäÔ¼80%µÄÊÐÕþ»ú¹¹ÌṩÊÂÇéÇéÐÎÓëÈËÁ¦×ÊÔ´ÖÎÀíϵͳ£¬£¬£¬£¬£¬£¬Éæ¼°Ò½ÁÆÖ¤Êµ´¦Öóͷ£¡¢Ö°ÒµÎ£ÏÕÉ걨¡¢¿µ¸´°¸ÀýÖÎÀíµÈ½¹µã¹«¹²Ð§ÀÍ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÓÚÖÜÄ©£¬£¬£¬£¬£¬£¬Ê×ϯִÐйÙErik Hall¨¦nÓÚ8ÔÂ25ÈÕ֤ʵϵͳ̱»¾£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÓëÍⲿר¼ÒÏàÖúÊÓ²ìÊÂÎñÓ°Ïì¹æÄ£¡¢»Ö¸´ÏµÍ³¹¦Ð§²¢È·ÈÏÊܺ¦ÕßÐÅÏ¢¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÍÅ»ïÏò¸Ã¹«Ë¾Ë÷Òª1.5±ÈÌØ±Ò£¨Ô¼ºÏ16.8ÍòÃÀÔª£©Êê½ð£¬£¬£¬£¬£¬£¬Íþв²»¸¶¿î½«¹ûÕæÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬£¬£¬£¬¹þÀ¼¡¢¸çÌØÀ¼¡¢Ð»À³·òÌØ°ÂµÈ¶àµØÊÐÕþÒÑÐû²¼Í¨¸æ£¬£¬£¬£¬£¬£¬ÖÒÑÔ¹«ÃñÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÔâй¶¡£¡£¡£¡£¡£ÈðµäÃñ·À²¿³¤Carl-Oskar Bohlinͨ¹ýÉ罻ƽ̨ÌåÏÖ£¬£¬£¬£¬£¬£¬Õþ¸®ÕýÁªºÏÍøÂçÇå¾²Ó¦¼±»ú¹¹CERT-SEÆÀ¹ÀÊÂÎñÓ°Ï죬£¬£¬£¬£¬£¬¾¯·½Òà½éÈëÊӲ죬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐδÃ÷È·ÏÖʵЧ¹û¹æÄ£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂMilj?data ¹Ù·½ÍøÕ¾ÀëÏߣ¬£¬£¬£¬£¬£¬Æäµç×ÓÓʼþЧÀÍÆ÷Òà´¦ÓÚ̱»¾×´Ì¬£¬£¬£¬£¬£¬£¬½øÒ»²½¼Ó¾çÁËÏàͬÓë»Ö¸´ÄѶȡ£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/it-system-supplier-cyberattack-impacts-200-municipalities-in-sweden/


¾©¹«Íø°²±¸11010802024551ºÅ