APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾

Ðû²¼Ê±¼ä 2021-12-30

APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾


APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬Ìع¤APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾¡£¡£¡£¡£´Ë´Î¹¥»÷µÄ³õʼѬȾǰÑÔÊÇαװ³ÉÀ´×ÔÄ¿µÄÏàÖúͬ°éµÄ´¹ÂÚÓʼþ£¬£¬£¬ £¬£¬£¬Ö®ºó¹¥»÷Õß»áʹÓÃFlagpro¾ÙÐÐÍøÂçÕì̽¡¢ÆÀ¹ÀÄ¿µÄÇéÐÎÒÔ¼°ÏÂÔØ²¢Ö´Ðеڶþ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¡£¾ÝNTT Security³Æ£¬£¬£¬ £¬£¬£¬´Ë´Î»î¶¯ÖÁÉÙʼÓÚ2020Äê10Ô£¬£¬£¬ £¬£¬£¬ÒÑÕë¶ÔÈÕ±¾¹«Ë¾Ò»Äê¶à£¬£¬£¬ £¬£¬£¬Éæ¼°¹ú·ÀÊÖÒÕ¡¢Ã½ÌåºÍͨѶÐÐÒµÔÚÄڵĶà¸öÁìÓò¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-flagpro-malware-linked-to-chinese-state-backed-hackers/


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯.png


12ÔÂ27ÈÕ£¬£¬£¬ £¬£¬£¬Morphus LabsºÍSANS ISCÐû²¼±¨¸æ³Æ£¬£¬£¬ £¬£¬£¬ÔÚÒÑÍùÒ»ÖÜÖмì²âµ½2¸öʹÓÃMicrosoft Build Engine(MSBuild)µÄ¹¥»÷»î¶¯¡£¡£¡£¡£ÔÚÕâЩ»î¶¯ÖУ¬£¬£¬ £¬£¬£¬¹¥»÷Õßͨ³£ÏÈʹÓÃÔ¶³Ì×ÀÃæÐ­Òé(RDP)ÕÊ»§»á¼ûÄ¿µÄÇéÐΣ¬£¬£¬ £¬£¬£¬È»ºóʹÓÃÔ¶³ÌWindowsЧÀÍ(SCM)¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬ £¬£¬£¬×îºóʹÓÃMSBuildÖ´ÐÐCobalt Strike Beacon¡£¡£¡£¡£¹¥»÷ÖÐʹÓõĶñÒâMSBuildÏîÄ¿¿ÉÒÔ±àÒëºÍÖ´ÐÐÌØ¶¨µÄC#´úÂ룬£¬£¬ £¬£¬£¬½ø¶ø½âÂëºÍÖ´ÐÐCobalt Strike¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actors-abuse-msbuild-cobalt-strike-beacon-execution


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬ £¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶.png


12ÔÂ29ÈÕ£¬£¬£¬ £¬£¬£¬T-Mobile½²»°ÈË֤ʵÆä²¿·ÖÓû§Ôâµ½SIM½»Á÷¹¥»÷£¬£¬£¬ £¬£¬£¬ÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£T-Mobile³ÆÆäÍŶÓÔÚ·¢Ã÷ÎÊÌâºóÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£¬£¬£¬ £¬£¬£¬²¢ÒÑ×Ô¶¯½ÓÄÉÌØÁíÍâ±£» £»£»£»£»£»¤²½·¥¡£¡£¡£¡£µ±±»ÒªÇóÌṩÓйØÊÜÓ°ÏìÓû§ÊýÄ¿ÒÔ¼°¹¥»÷ÕߵĹ¥»÷·½·¨Ê±£¬£¬£¬ £¬£¬£¬T-Mobile¾Ü¾øÌṩ¸ü¶àÏêϸÐÅÏ¢¡£¡£¡£¡£T-MobileÒѱ¬·¢¶à´ÎÐÅϢй¶£¬£¬£¬ £¬£¬£¬´Ë´ÎÊÂÎñÓë½ñÄê2Ô·ݵÄй¶ÊÂÎñºÜÊÇÏàËÆ£¬£¬£¬ £¬£¬£¬ÆäʱÒòSIM½»Á÷¹¥»÷й¶400¸öÓû§µÄÐÅÏ¢¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-new-data-breach-caused-by-sim-swap-attacks/


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ.png


ýÌå12ÔÂ28Èճƣ¬£¬£¬ £¬£¬£¬ÈýÐǵĹٷ½AndroidÓ¦ÓóÌÐòÊÐËÁGalaxy Store±£´æ¶à¸ö¶ñÒâÓ¦Óᣡ£¡£¡£ÕâЩӦÓÃαװ³ÉÒÑÓÚ2018ÄêÐÝÒµµÄµÁ°æÓ¦ÓÃShowBox£¬£¬£¬ £¬£¬£¬ÒÑÔÚ¶à¸öÓû§µÄ×°±¸ÉÏ´¥·¢Google Play Protect¾¯±¨¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ £¬£¬£¬ÕâЩӦÓÃÖ®ÒÔÊǻᴥ·¢¾¯±¨£¬£¬£¬ £¬£¬£¬ÊÇÓÉÓÚËüÃÇÇëÇó¾ßÓÐ×°ÖöñÒâÈí¼þΣº¦µÄȨÏÞ£¬£¬£¬ £¬£¬£¬µ±Óû§ÔÊÐíºóËüÃǾͿÉÒÔ»á¼ûÁªÏµÈËÁбíºÍͨ»°¼Í¼¡¢Ö´ÐдúÂë¡¢»ñÈ¡¶ñÒâÈí¼þpayloadµÈ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/riskware-android-streaming-apps-found-on-samsungs-galaxy-store/


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬£¬ £¬£¬£¬ÈøË¹¿¦³¹ÎÂÊ¡¾ÆÀàºÍ²©²ÊÖÎÀí¾Ö£¨SLGA£©ÕýÔÚ×ÅÊÖÊÓ²ìÆäÔâµ½µÄÍøÂç¹¥»÷¡£¡£¡£¡£SLGAÊÇÃÀ¹ú²ÆÎñ²¿»Ê¹Ú¹«Ë¾ÈÏÕæ·ÖÏú¡¢¿ØÖƺÍî¿Ïµ¾Æ¾«ÒûÁÏ¡¢´óÂéºÍ´ó´ó¶¼¶Ä²©µÄ»ú¹¹£¬£¬£¬ £¬£¬£¬Î»ÓÚ¼ÓÄôóµÄÈøË¹¿¦³¹ÎÂÊ¡¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ12ÔÂ25ÈÕ£¬£¬£¬ £¬£¬£¬SLGAÌåÏÖ£¬£¬£¬ £¬£¬£¬ÊÓ²ìÏÔʾÏÖÔÚûÓÐÈκοͻ§¡¢Ô±¹¤»òÆäËüÊý¾Ý±»ÀÄÓ㬣¬£¬ £¬£¬£¬ÔÚÍê³É¶Ô¸ÃÊÂÎñµÄÆÀ¹Àºó£¬£¬£¬ £¬£¬£¬½«Á¢×ÝÈ»ÊÜÓ°ÏìµÄÏµÍ³ÖØÐÂÉÏÏß¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://globalnews.ca/news/8477174/slga-investigating-christmas-day-cybersecurity-incident/


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö.png


12ÔÂ27ÈÕ£¬£¬£¬ £¬£¬£¬Check PointÅû¶Equation GroupʹÓõÄÈ«¹¦Ð§¶ñÒâÈí¼þ¿ò¼ÜDanderSpritzµÄÊÖÒÕÆÊÎö¡£¡£¡£¡£DanderSpritzÓÚ2017Äê4ÔÂ14ÈÕ±»Shadow Brokers¹ûÕæ£¬£¬£¬ £¬£¬£¬°üÀ¨ÓÃÓÚ³¤ÆÚÐÔ¡¢Õì̽¡¢ºáÏòÒÆ¶¯¡¢Èƹýɱ¶¾ÒýÇæµÈ»î¶¯µÄ¶àÖÖ¹¤¾ß¡£¡£¡£¡£¸ÃÑо¿ÖصãÆÊÎöÆäÖеÄÒ»¸ö×é¼þDoubleFeature£¬£¬£¬ £¬£¬£¬ËüÓÃÀ´ÌìÉú¿É×°ÖÃÔÚÄ¿µÄ×°±¸ÖеŤ¾ßÀàÐ͵ÄÈÕÖ¾ºÍ±¨¸æ£¬£¬£¬ £¬£¬£¬²¢»áÍøÂç´ó×ÚÖÖÖÖÀàÐ͵ÄÊý¾Ý¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/a-deep-dive-into-doublefeature-equation-groups-post-exploitation-dashboard/