жñÒâÈí¼þSilver SparrowÒÑѬȾ½ü3Íǫ̀Mac×°±¸£»£»£»£»£»£»£»BitglassÐû²¼2020ÄêÒ½ÁƱ£½¡ÐÅϢй¶µÄ»ØÊ×±¨¸æ
Ðû²¼Ê±¼ä 2021-02-231.жñÒâÈí¼þSilver SparrowÒÑѬȾ½ü3Íǫ̀Mac×°±¸
Red CanaryÑо¿Ö°Ô±·¢Ã÷Õë¶ÔMac×°±¸µÄжñÒâÈí¼þSilver Sparrow¡£¡£¡£¡£×èÖ¹2ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Silver SparrowÒÑÔÚ153¸ö¹ú¼ÒºÍµØÇøÑ¬È¾ÁË29139¸ömacOSÖÕ¶Ë£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÃÀ¹ú¡¢Ó¢¹ú¡¢¼ÓÄô󡢷¨¹úºÍµÂ¹ú´ó×ÚÈö²¥¡£¡£¡£¡£Óë´ó´ó¶¼Ê¹ÓÃ'preinstall'ºÍ'postinstall'¾ç±¾µÄ¶ñÒâÈí¼þ²î±ð£¬£¬£¬£¬£¬£¬£¬Silver SparrowʹÓÃJavaScriptÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬£¬´Ó¶øºÜÄÑÆ¾Ö¤ÏÂÁîÐвÎÊý¼ì²â¶ñÒâ»î¶¯¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þµÄÕæÕýÄ¿µÄÏÖÔÚÈÔÈ»ÊǸöÃÕ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/30000-macs-infected-with-new-silver-sparrow-malware/
2.BitglassÐû²¼2020ÄêÒ½ÁƱ£½¡ÐÅϢй¶µÄ»ØÊ×±¨¸æ
BitglassÐû²¼ÁË2020ÄêÒ½ÁƱ£½¡ÐÅϢй¶µÄ»ØÊ×±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬µ½2020Ä꣬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¹²ÓÐ599ÆðÒ½±£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬±ÈÉÏÒ»ÄêÔöÌíÁË55.1£¥£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁË2640ÍòÈË¡£¡£¡£¡£¾ø´ó´ó¶¼£¨67£¥£©Ð¹Â¶ÊÂÎñ¹éÒòÓÚÀ´×ÔÍⲿ¹¥»÷Õߵġ°ºÚ¿ÍºÍITÊÂÎñ¡±£¬£¬£¬£¬£¬£¬£¬Æäй¶µÄÊý¾ÝÕ¼±È´ï91£¥ÒÔÉÏ¡£¡£¡£¡£Æä´ÎÊǶ˵ã×°±¸µÄɥʧ»òʧÔô£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁË584000¶àÈË£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÏµÍ³Î´¾ÊÚȨµØÐ¹Â¶Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ó°Ïì763000ÈË¡£¡£¡£¡£Ö»¹ÜÊܺ¦ÈËÊý±È2019ÄêµÄ2750ÍòÈËÂÔÓÐϽµ£¬£¬£¬£¬£¬£¬£¬µ«Ã¿Ìõй¶Êý¾ÝµÄƽ¾ù±¾Ç®´Ó429ÃÀÔªÔöÌíµ½499ÃÀÔª£¬£¬£¬£¬£¬£¬£¬×ܹ²Ôì³É132ÒÚÃÀÔªËðʧ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bitglass.com/blog/hacking-and-it-incidents-on-the-rise
3.MalwarebytesÐû²¼2020Äê¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ
MalwarebytesÐû²¼ÁË2020Äê¶ñÒâÈí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬WindowsÉ϶ñÒâÈí¼þµÄ¼ìÕÉÁ¿Ï½µÁË24£¥£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¹¤¾ßºÍÌØ¹¤Èí¼þµÄ¼ìÕÉÁ¿¼±¾çÔöÌí£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁË147£¥ºÍ24£¥¡£¡£¡£¡£EmotetºÍTrickbot»®·ÖϽµÁË89£¥ºÍ68£¥¡£¡£¡£¡£Õë¶ÔũҵÐÐÒµµÄ¶ñÒâÈí¼þ¼ìÕÉÁ¿ÔöÌíÁË607£¥£¬£¬£¬£¬£¬£¬£¬Ê³ÎïºÍÒûÁÏÐÐÒµµÄ¼ìÕÉÁ¿ÔöÌíÁË67£¥£¬£¬£¬£¬£¬£¬£¬ÖÆÔìÒµ¡¢Ò½ÁƱ£½¡ºÍÒ½ÁÆÒÔ¼°Æû³µµÈ¸ü¹Å°åµÄÐÐÒµÖжñÒâÈí¼þµÄ¼ìÕÉÁ¿¾ùÓÐËùϽµ£¬£¬£¬£¬£¬£¬£¬»®·ÖΪ17£¥¡¢22£¥ºÍ18£¥¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/reports/2021/02/state-of-malware-2021-report/
4.Ó¡¶ÈµÄ·ÀÓùϵͳÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕþ¸®ÉÐδ½ÓÄɵ÷½â²½·¥
Ó¡¶ÈµÄ·ÀÓùϵͳÔâµ½ÃûΪSakura SamuraiµÄºÚ¿ÍµÄÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕþ¸®ÉÐδ½ÓÄɵ÷½â²½·¥¡£¡£¡£¡£Í¨Ì«¹ýÎö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ôâµ½¹¥»÷µÄЧÀÍÆ÷Éæ¼°µ½´ó×Ú²ÆÎñ¼Í¼±¸·Ý¡¢ÊýÊ®·Ý°üÀ¨Êܺ¦ÕßÊý¾ÝµÄ¾¯·½±¨¸æ¡¢¼«ÆäÃô¸ÐµÄÕþ¸®ÏµÍ³ºÍÆäËûÐÅÏ¢Êý¾Ý¿â¡£¡£¡£¡£ºÚ¿Í¿ÉÒÔ»ñµÃÁè¼Ý13000¶à¸öÕþ¸®¹ÍÔ±ºÍ¹«ÃñµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°¿ÉÒÔÉó²é¸Ã¹ú¾¯Ô±¾ÖµÄ·¨Ò½±¨¸æ¡¢¹¤¾ßºÍÆäËûÃô¸ÐµÄ¾¯¾Ö¼Í¼µÄÓ¦ÓóÌÐò¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹úÕþ¸®ÈÔδ½ÓÄɵ÷½â²½·¥¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.thehindu.com/sci-tech/technology/indias-cyber-defenses-breached-and-reported-govt-yet-to-fix-it/article33888110.ece
5.Tokyo Shoko³Æ2020ÄêÈÕ±¾ÓÐ2515ÍòÈËÔâÐÅϢй¶
¶«¾©ÉÌÊÂÑо¿ÓÐÏÞ¹«Ë¾£¨Tokyo Shoko Research Ltd£©³Æ2020ÄêÈÕ±¾ÓÐ2515ÍòÈËÔâÐÅϢй¶¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾¾ÙÐеÄÒ»ÏîÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬µ½2020Ä꣬£¬£¬£¬£¬£¬£¬ÈÕ±¾¹²ÓÐ88¼ÒÉÏÊй«Ë¾¼°Æä×Ó¹«Ë¾µÄСÎÒ˽¼ÒÐÅϢй¶»òɥʧ£¬£¬£¬£¬£¬£¬£¬Éæ¼°µ½2515ÍòÈË£¬£¬£¬£¬£¬£¬£¬ÕâÊÇ×Ô2012ÄêÒÔÀ´µÄ·åÖµ¡£¡£¡£¡£ÅÌËã»ú²¡¶¾ºÍδ¾ÊÚȨµÄ»á¼ûµ¼ÖµÄй¶ÊÂÎñÔ¼Õ¼×ÜÊýµÄÒ»°ë£¬£¬£¬£¬£¬£¬£¬Îó·¢Ë͵ç×ÓÓʼþÖ®ÀàµÄ¹ýʧԼռ30£¥¡£¡£¡£¡£ÐÅϢй¶°¸¼þ¼¤ÔöµÄ±³ºó£¬£¬£¬£¬£¬£¬£¬ÊÇÐí¶à¹«Ë¾¶¼ÔÚÕùÏàÍÆ¶¯Êý×Ö»¯ºÍÔ¶³ÌÊÂÇ飬£¬£¬£¬£¬£¬£¬µ«¿ÉÄÜÎÞ·¨½ÓÄÉ×ã¹»µÄÇå¾²²½·¥¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.japantimes.co.jp/news/2021/02/21/national/crime-legal/computer-viruses-big-data-cybersecurity/
6.Check Point·¢Ã÷Office¶ñÒâÈí¼þÌìÉúÆ÷APOMacroSploit
Check PointµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÃûΪAPOMacroSploitµÄÐÂOffice¶ñÒâÈí¼þÌìÉúÆ÷¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿É½¨ÉèÍøÂç´¹ÂÚ¹¥»÷ËùʹÓõÄÎäÆ÷»¯ExcelÎĵµ£¬£¬£¬£¬£¬£¬£¬Òѱ»ÓÃÓÚÕë¶ÔÈ«Çò80¶à¸ö¿Í»§µÄ¹¥»÷ÖС£¡£¡£¡£Ê¹ÓÃAPOMacroSploit builder½¨ÉèµÄExcelÎĵµÄܹ»Èƹýɱ¶¾Èí¼þ¡¢Windows·´¶ñÒâÈí¼þɨÃè½çÃæ(AMSI)¡¢GmailºÍÆäËûµç×ÓÓʼþµÄ´¹ÂÚ¼ì²â¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬£¬£¬£¬£¬ÆäÊÇÓÉ·¨¹úºÚ¿ÍApocaliptiqueºÍNitrix¿ª·¢µÄµÄ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚHackForums.netÉϾÙÐгöÊÛ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114880/cyber-crime/apomacrosploit-macro-builder.html