¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸

Ðû²¼Ê±¼ä 2022-02-10

¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸


¾ÝýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬ZimperiumÔÚGoogle PlayÉϼì²âµ½470¿î¶ñÒâÓ¦Óᣡ£¡£ ¡£ÕâЩӦÓÃÒÑÔÚÈ«ÇòÁè¼Ý1.05ÒŲ́Android×°±¸ÉÏ×°ÖÃÁ˶ñÒâÈí¼þDark Herring£¬£¬£¬£¬Ëü¿ÉÒÔͨ¹ýÄ¿µÄµÄ»°·ÑÕ˵¥ÇÔÈ¡×ʽ𡣡£¡£ ¡£¸Ã»î¶¯Ã¿ÔÂÏòÄ¿µÄµÄ»°·ÑÕ˵¥ÖÐÔöÌí15ÃÀÔªµÄÓöÈ£¬£¬£¬£¬ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬²¢Ò»Ö±Ò»Á¬µ½È¥Äê11Ô£¬£¬£¬£¬¾ÝÔ¤¼ÆÇÔÈ¡µÄ½ð¶î×ÜÊýÒÑ´ïÊýÒÚ¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬GoogleÒÑÔÚPlayÊÐËÁÖÐɾ³ýÁËÉÏÊöµÄ¶ñÒâÓ¦Óᣡ£¡£ ¡£


https://threatpost.com/dark-herring-billing-malware-android/178032/


µÂ¹úBfV³ÆAPT27ÍÅ»ïʹÓÃHyperBro¹¥»÷ÆäÉÌÒµ×éÖ¯ 


1ÔÂ26ÈÕ£¬£¬£¬£¬µÂ¹úÁª°îÏÜ·¨±£»£»£»£»¤°ì¹«ÊÒ(BfV)Ðû²¼Í¨¸æ£¬£¬£¬£¬³ÆAPT27ÍÅ»ïÕýÔÚ¹¥»÷ÆäÉÌÒµ×éÖ¯¡£¡£¡£ ¡£APT27ÓÖÃûEmissary Panda£¬£¬£¬£¬×Ô2010ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£ ¡£BfV³Æ£¬£¬£¬£¬×Ô2021Äê3ÔÂÒÔÀ´£¬£¬£¬£¬APT27Ò»Ö±ÔÚʹÓÃMicrosoft ExchangeºÍZoho AdSelf Service Plus1Èí¼þÖеÄÎó²î¹¥»÷µÂ¹úµÄ¹«Ë¾¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬»¹Ê¹ÓÃÁËHyperBro RAT£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄµÄÊý¾Ý£¬£¬£¬£¬²¢ÊÔͼÕë¶ÔÆä¿Í»§Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£ ¡£


https://securityaffairs.co/wordpress/127230/apt/german-intel-warns-apt27-attacks.html


¹¥»÷ÕßʹÓÃ800¶à¸öÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes


ýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬¹¥»÷ÕßʹÓÃ800¶à¸öÒѱ»ÈëÇÖµÄWordPressÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes¡£¡£¡£ ¡£µ±Ä¿µÄ»á¼û±»Ñ¬È¾ÍøÕ¾Ê±£¬£¬£¬£¬»á±»ÒªÇó×°ÖÃÒ»¸ö¼ÙµÄJava RuntimeÓ¦Óᣡ£¡£ ¡£¸ÃMSI×°ÖóÌÐò°üÀ¨Èý¸ö¶ñÒâJavaScriptÎļþ£ºinstall.js¡¢sched.js¡¢sucesso.js£¬£¬£¬£¬ËüÃÇΪÏÂÒ»½×¶ÎµÄ¼ÓÔØ³ÌÐò×¼±¸PythonÇéÐΡ£¡£¡£ ¡£AvastÌåÏÖ£¬£¬£¬£¬ÒѼì²âµ½ÁË5ÖÖ²î±ðµÄ¶ñÒâChromeÀ©Õ¹³ÌÐò¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÇå¾²¹«Ë¾ÒÑ֪ͨ°ÍÎ÷CERT£¬£¬£¬£¬µ«¹¥»÷»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/chaes-banking-trojan-hijacks-chrome-with-malicious-extensions/


Bitdefender·¢Ã÷´ó¹æÄ£·Ö·¢FluBotºÍTeaBotµÄ»î¶¯


1ÔÂ26ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÐµÄFluBotºÍTeaBot¶ñÒâÈí¼þ·Ö·¢»î¶¯ÕýÔÚÕë¶Ô°Ä´óÀûÑÇ¡¢µÂ¹ú¡¢²¨À¼¡¢Î÷°àÑÀºÍÂÞÂíÄáÑǵÄAndroidÓû§¡£¡£¡£ ¡£Bitdefender Labs×Ô2021Äê12ÔÂÒÔÀ´£¬£¬£¬£¬½Ø»ñÁËÁè¼Ý10ÍòÌõ¶ñÒâ¶ÌÐÅ£¬£¬£¬£¬Ö¼ÔÚÈö²¥FluBot¡£¡£¡£ ¡£¸Ã¹«Ë¾»¹³Æ£¬£¬£¬£¬TeaBotÒѶà´Î·ºÆðÔÚGoogle PlayÊÐËÁÖУ¬£¬£¬£¬2021Äê12ÔÂ6ÈÕµ½2022Äê1ÔÂ17ÈÕ£¬£¬£¬£¬ËûÃǼì²âµ½17¸ö²î±ð°æ±¾µÄTeaBotͨ¹ý¶à¸ö¶ñÒâÓ¦ÓÃѬȾװ±¸¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-flubot-and-teabot-campaigns-target-android-devices-worldwide/


DiscordÒòAPIºÍÊý¾Ý¿â·ºÆðÎÊÌâµ¼Ö´ó¹æÄ£Ð§ÀÍÖÐÖ¹


1ÔÂ26ÈÕ£¬£¬£¬£¬Discord±¬·¢ÁË´ó¹æÄ£ÖÐÖ¹µÄÇéÐΣ¬£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨µÇ¼ЧÀÍ»òʹÓÃÓïÒô̸Ìì¡£¡£¡£ ¡£ÖÐÖ¹×îÏÈÓÚÃÀ¹ú¶«²¿±ê׼ʱ¼äÏÂÖç2:49£¬£¬£¬£¬×î³õÊÇÓÉAPIÖÐÖ¹ÒýÆðµÄ£¬£¬£¬£¬µ¼Ö¶à¸öЧÀÍÎÞ·¨Ï໥ͨѶ¡£¡£¡£ ¡£È»¶ø£¬£¬£¬£¬ÔÚ½â¾öAPIÎÊÌâºó£¬£¬£¬£¬Discord·¢Ã÷Êý¾Ý¿â¼¯Èº·ºÆðÎÊÌ⣬£¬£¬£¬Õâµ¼ÖÂÁ˸ü¶àÎÊÌâ¡£¡£¡£ ¡£¸Ã¹«Ë¾ÔÚÐÞ¸´ÓÐÎÊÌâµÄÊý¾Ý¿â¼¯ÈºÊ±×îÏÈÏÞÖÆµÇ¼ËÙÂÊ£¬£¬£¬£¬ÒÔ±ÜÃâЧÀÍÆ÷¹ýÔØ£¬£¬£¬£¬Ö±µ½ÏÂÖç5:12×óÓÒ£¬£¬£¬£¬ÏÞËÙ±»×÷·Ï¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/technology/major-discord-outage-caused-by-api-and-database-issues/


΢ÈíAzureÔÆÆ½Ì¨ÀֳɵÖÓù¸ß´ï3.47 TbpsµÄDDoS¹¥»÷


΢ÈíÔÚ1ÔÂ25ÈÕÐû²¼µÄ±¨¸æ³Æ£¬£¬£¬£¬ÆäAzureÒѵÖÓùÁ˸ߴï3.47 TbpsµÄDDoS¹¥»÷¡£¡£¡£ ¡£11Ô£¬£¬£¬£¬Î¢ÈíÑÇÖÞµÄÒ»¸ö¿Í»§Ôâµ½ÁË3.47 TbpsºÍÿÃë3.4ÒÚÊý¾Ý°ü(pps)µÄDDoS¹¥»÷£¬£¬£¬£¬Õâ±»ÒÔΪÕâÊÇÀúÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£ ¡£´Ë´Î¹¥»÷À´×ÔԼĪ10000¸öÔ´£¬£¬£¬£¬Éæ¼°Öйú¡¢º«¹ú¡¢¶íÂÞ˹¡¢Ì©¹ú¡¢Ó¡¶È¡¢Ô½ÄÏ¡¢ÒÁÀÊ¡¢Ó¡¶ÈÄáÎ÷Ñǵȶà¸ö¹ú¼Ò¡£¡£¡£ ¡£¹¥»÷ÏòÁ¿ÊÇʹÓÃSSDP¡¢CLDAP¡¢DNSºÍNTPÔÚ80¶Ë¿ÚÉϵÄUDP·´É䣬£¬£¬£¬×ÜÌå¹¥»÷Ò»Á¬ÁËԼĪ15·ÖÖÓ¡£¡£¡£ ¡£


https://azure.microsoft.com/en-us/blog/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends/


Çå¾²¹¤¾ß


jfrog-npm-tools


JFrogÐû²¼Èý¿î¿ªÔ´¹¤¾ß£¬£¬£¬£¬¿É´Ó npm °ü¹ÜÀíÆ÷ÏÂÔØºÍ×°ÖöñÒâ JavaScript °ü֮ǰ¶ÔÆä¾ÙÐбê¼Ç¡£¡£¡£ ¡£


https://github.com/jfrog/jfrog-npm-tools


EtherNet/IP & CIP Stack Detector


Çå¾²¹«Ë¾ ClarotyÐû²¼ÐµĿªÔ´¹¤¾ßÓÐÖúÓÚʶ±ðÓÃÓÚ ICS Ñо¿ºÍÆÊÎöµÄ EtherNet/IP ¿ÍÕ»¡£¡£¡£ ¡£


https://www.securityweek.com/new-open-source-tool-helps-identify-ethernetip-stacks-ics-research-analysis


Wireshark Forensics Toolkit 


¿çƽ̨µÄ Wireshark ²å¼þ£¬£¬£¬£¬¿É½«ÍøÂçÁ÷Á¿Êý¾ÝÓëÍþвÇ鱨¡¢×ʲú·ÖÀàºÍÎó²îÊý¾Ý¹ØÁªÆðÀ´£¬£¬£¬£¬ÒÔ¼ÓËÙÍøÂçȡ֤ÆÊÎö¡£¡£¡£ ¡£


https://github.com/rjbhide/wireshark-forensics-plugin


T-Reqs


ÊÇÒ»ÖÖ»ùÓÚÓï·¨µÄ HTTP Fuzzer¡£¡£¡£ ¡£


https://github.com/bahruzjabiyev/T-Reqs-HTTP-Fuzzer


DotGit


¼ì²é .git ÊÇ·ñÔÚ»á¼ûµÄÍøÕ¾ÖÐ̻¶µÄÀ©Õ¹¡£¡£¡£ ¡£


https://github.com/davtur19/DotGit


Çå¾²ÆÊÎö


°×¹¬Ï£ÍûÃÀ¹úÕþ¸®Ê¹ÓÃÁãÐÅÈÎÇ徲ģ×Ó


https://www.bleepingcomputer.com/news/security/white-house-wants-us-govt-to-use-a-zero-trust-security-model/



΢ÈíÖÒÑÔ´¹ÂÚ OAuth Ó¦ÓóÌÐò


https://blog.malwarebytes.com/privacy-2/2022/01/microsoft-warns-of-phishy-oauth-apps/


¹È¸è·ÅÆú FLoC ²¢ÒýÈëÖ÷Ìâ API À´Ìæ»»¹ã¸æµÄ¸ú×Ù Cookie


https://thehackernews.com/2022/01/google-drops-floc-and-introduces-topics.html


ÀÕË÷Èí¼þ¹¥»÷ÕßʹÓõÄÎó²î¼¤Ôö 29%


https://www.infosecurity-magazine.com/news/29-surge-bugs-used-ransomware/


Let's Encrypt ÔÚÁ½ÌìÄÚ×÷·Ï´ó×Ú SSL Ö¤Êé


https://www.bleepingcomputer.com/news/security/lets-encrypt-is-revoking-lots-of-ssl-certificates-in-two-days/


MalwarebytesÐû²¼¹ØÓÚKONNI RATµÄÊÖÒÕÆÊÎö±¨¸æ


https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/