Agent TeslaʵÑé¸Ä¶¯Î¢ÈíAMSIÀ´Èƹýɱ¶¾Èí¼þ¼ì²â£»£»£»£»£»£»GoogleÐû²¼AndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´40¶à¸öÎó²î
Ðû²¼Ê±¼ä 2021-02-041.Agent TeslaʵÑé¸Ä¶¯Î¢ÈíAMSIÀ´Èƹýɱ¶¾Èí¼þ¼ì²â
SophosÑо¿Ö°Ô±·¢Ã÷ÌØ¹¤Èí¼þAgent TeslaʵÑé¸Ä¶¯Î¢Èí·À¶ñÒâÈí¼þÈí¼þ½Ó¿Ú£¨AMSI£©£¬£¬£¬£¬£¬£¬À´Èƹýɱ¶¾Èí¼þµÄɨÃèºÍÆÊÎö¡£¡£¡£Agent TeslaÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÓÃ.NET±àдµÄÉÌÒµRAT¡£¡£¡£SophosÌåÏÖ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÕýÔÚÒ»Ö±¿ª·¢ÖУ¬£¬£¬£¬£¬£¬Æä.NETÏÂÔØ³ÌÐò¿ÉŲÓò¢ÏÂÔØÍйÜÔÚÕýµ±ÍøÕ¾ÉϵĶñÒâ´úÂë¡£¡£¡£ÔÚÀֳɸ͝AMSIºó¸Ã¶ñÒâÈí¼þ¿ÉÔÚûÓÐÈκÎ×ÌÈŵÄÇéÐÎÏÂÍêÕû°²ÅÅ£¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔOpera¡¢Chromium¡¢Chrome¡¢Firefox¡¢OpenVPNºÍOutlookµÈÓ¦Óᣡ£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/agent-tesla-ramps-up-its-game-in-bypassing-security-walls-attacks-endpoint-protection/
2.GoogleÐû²¼AndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´40¶à¸öÎó²î
GoogleÐû²¼ÁË2Ô·ÝAndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´40¶à¸öÎó²î¡£¡£¡£ÕâЩÎó²îÖнÏΪÖ÷ÒªµÄÎó²îÊÇMedia Framework×é¼þÖеĴúÂëÖ´ÐÐÎó²î£¨CVE-2021-0325)¡¢ÌáȨÎó²î£¨CVE-2021-0332£©ºÍÐÅϢй¶Îó²î£¨CVE-2021-0335£©¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸üл¹ÐÞ¸´ÁËÄÚºËÖеĴúÂëÖ´ÐÐÎó²î£¨CVE-2017-18509£©ÒÔ¼°Qualcomm×é¼þÖеĶà¸öÎó²î£¨CVE-2020-11272¡¢CVE-2020-11163ºÍCVE-2020-11170µÈ£©¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/google-patches-16-high-severity-privilege-escalation-vulnerabilities-android
3.ºÚ¿Í³öÊÛAirtelIndiaµÄ250ÍòÓû§ÐÅÏ¢£¬£¬£¬£¬£¬£¬±»¸Ã¹«Ë¾·ñ¶¨
ºÚ¿Í×éÖ¯Red RabbitÔÚ°µÍøÒÔ3500ÃÀÔªµÄ¼ÛÇ®³öÊÛAirtelIndiaµÄ250ÍòÓû§ÐÅÏ¢¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨ÊС¢ÐÔ±ð¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Ð§ÀÍ״̬¡¢µç»°ºÅÂë¡¢ÃÅÅÆºÅÂë¡¢AadhaarºÅÂë¡¢»¤ÕÕºÅÂ롢ѡÃñ±àºÅ¡¢¸¸Ç×»òÕÉ·òµÄÃû×ÖºÍIMSI£¨¹ú¼ÊÒÆ¶¯Óû§Éí·Ý£©ºÅÂë¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ºÚ¿Í»¹Ðû²¼ÁËÆäÔÚAirtelµÄһ̨ЧÀÍÆ÷ÉÏ´«ShellµÄÆÁÄ»½ØÍ¼¡£¡£¡£µ«Airtel·ñ¶¨Æä±¬·¢ÁËÊý¾Ýй¶£¬£¬£¬£¬£¬£¬²¢Ö¸³ö´ó´ó¶¼µÄÊý¾Ý²»ÊôÓÚAirtelµÄ¿Í»§¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Red RabbitÔËÓªµÄÍøÕ¾Ò²Òѹرա£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/hackers-leak-airtel-india-user-data-aadhaar-numbers/
4.Èí¼þ¹«Ë¾Wind River³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅϢй¶
¼ÓÀû¸£ÄáÑǵÄÈí¼þ¹«Ë¾Wind River³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¸Ã¹«Ë¾³ÆÊÂÎñ±¬·¢ÔÚ2020Äê9ÔÂ29ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜÒѾÇÔÈ¡ÁËÒ»¸ö»ò¶à¸öÎļþ¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢¹«ÃñÉí·ÝÖ¤ºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕ»òǩ֤ºÅÂë¡¢¿µ½¡ÏêϸÐÅÏ¢ºÍ²ÆÎñÕÊ»§ÐÅÏ¢µÈ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Wind RiverÉÐδÌṩÓйØÊÜÓ°ÏìÔ±¹¤µÄÊýÄ¿»ò¹¥»÷ÕßÔõÑùÆÆËðÆäϵͳµÄÏêϸÐÅÏ¢¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114151/data-breach/wind-river-data-breach.html
5.»õÔ˹«Ë¾Forward AirѬȾHades£¬£¬£¬£¬£¬£¬Ëðʧ´ï750ÍòÃÀÔª
»õÔ˹«Ë¾Forward AirÔâµ½ÁËHadesÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ôì³ÉµÄËðʧ´ï750ÍòÃÀÔª¡£¡£¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚÈ¥Äê12ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ÒòѬȾHadesµ¼Ö¸ù«Ë¾½«ËùÓÐITϵͳÍÑ»úÒÔÓ¦¶ÔÈëÇÖ¡£¡£¡£µ¼Ö¼ÝʻԱºÍÔ±¹¤ÎÞ·¨»ñÈ¡ÐëÒªµÄÎļþÒÔͨ¹ýº£¹ØÇ幨ÔËÊ䣬£¬£¬£¬£¬£¬ÆäÔËÓªÊܵ½ÑÏÖØÆÆË𡣡£¡£Ö»¹ÜForward AirÌåÏÖÆäÒÑÀֳɵشӹ¥»÷Öлָ´£¬£¬£¬£¬£¬£¬µ«ÕÕ¾ÉÖ§¸¶Á˼«ÖؼÛÇ®£¬£¬£¬£¬£¬£¬ÆäÔÚµÚËÄÐò¶ÈµÄ²ÆÎñÒµ¼¨ÖеÄËðʧ¸ß´ï750ÍòÃÀÔª¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/trucking-company-forward-air-said-its-ransomware-incident-cost-it-7-5-million/
6.ChainalysisÐû²¼2020ÄêÀÕË÷Èí¼þ¹¥»÷µÄ»ØÊ×±¨¸æ
ChainalysisÐû²¼ÁË2020ÄêÀÕË÷Èí¼þ¹¥»÷µÄ»ØÊ×±¨¸æ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þµÄÊܺ¦ÕßÔÚ2020ÄêÖÁÉÙ×ܹ²Ö§¸¶ÁË3.5ÒÚÃÀÔªÊê½ð£¬£¬£¬£¬£¬£¬±È2019Äêͬ±ÈÔöÌíÁË311£¥¡£¡£¡£È¥ÄêÓ¯Àû×î¶àµÄÍÅ»ïΪRyuk¡¢Maze¡¢Doppelpaymer¡¢Netwalker¡¢ContiºÍREvil£¬£¬£¬£¬£¬£¬Æä´ÎΪSnatch¡¢Defray777£¨RansomExx£©ºÍDharmaµÈ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷½öÕ¼ËùÓлùÓÚ¼ÓÃÜÇ®±ÒµÄ·¸·¨»î¶¯µÄ7£¥£¬£¬£¬£¬£¬£¬Ö»¹ÜÕâ¸öÊý×ֺܵͣ¬£¬£¬£¬£¬£¬µ«´ËÀ๥»÷ÊýÄ¿×ÅʵÕýÔÚÔöÌí¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.chainalysis.com/reports/ransomware-ecosystem-crypto-crime-2021