¾ÅÓÎÀÏ¸ç¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.03.23~2020.03.29£©
2020-03-30
Ò»¡¢Íþвͨ¸æ
- VMwareȨÏÞÌáÉýÎó²î
¡¾Ðû²¼Ê±¼ä¡¿2020-03-24 10:00:00 GMT
¡¾¸ÅÊö¡¿3ÔÂ24ÈÕ£¬Î¢ÈíÐû²¼Á˱àºÅΪADV200006µÄÇ徲ͨ¸æ£¬Í¨¸æÖ¸³öAdobe Type Manager LibraryÔÚ´¦Öóͷ£multi-master×ÖÌ壨Adobe Type 1 PostScript ÃûÌã©Ê±±£´æÈ±ÏÝ£¬¹¥»÷Õß¿ÉÒÔÈ«ÐĽṹ¶ñÒâÎĵµ²¢ÓÕʹÓû§Ê¹ÓÃWindows Preview paneÔ¤ÀÀ£¬´Ó¶øÊ¹ÓøÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂë¡£
http://blog.nsfocus.net/type1-threat-0day-0324/
¶þ¡¢ÈÈÃÅ×ÊѶ
- APT37¸´ÅÌÆÊÎö±¨¸æ
¡¾¸ÅÊö¡¿½üÄêÀ´£¬Ëæ×ÅAPT37µÄÔ˶¯Ôö¶à£¬ÆäÊֶκ͹¤¾ßÌØÕ÷Ò²Ô½À´Ô½ÏÔ×Å£¬Óë¹ãÒåÉÏLazarus×éÖ¯¹¥»÷ÐÐΪµÄ²î±ðÒ²±äµÃÏÔÖø¡£ÏÖÔÚ£¬APT37Òѱ»È·ÒÔΪÕë¶Ôº«¹úÕþÆóÓëÍѱ±Ö°Ô±µÈÕþÖÎÄ¿µÄ£¬Ê¹ÓÃRokRat¡¢NavRat¡¢KevDroid¡¢PoorWebµÈ±ê¼ÇÐÔľÂí·¢¶¯¹¥»÷µÄ¸ßЧºÚ¿ÍÕûÌå¡£¾ÅÓÎÀÏ¸ç¿Æ¼¼·üӰʵÑéÊÒ¸´ÅÌÆÊÎöAPT37Íþв×éÖ¯µÄ³£Óù¥»÷ÊֶκÍľÂí¹¤¾ß¡£
http://blog.nsfocus.net/apt37-part1-0325/http://blog.nsfocus.net/apt37-part2-0325/
- ·üӰʵÑéÊÒÔٴη¢Ã÷ºÚ¿ÍʹÓÃйÚÒßÇéʵÑéÍøÂç´¹ÂÚ¹¥»÷
¡¾¸ÅÊö¡¿½üÆÚ¾ÅÓÎÀÏ¸ç¿Æ¼¼·üӰʵÑéÊÒÔٴη¢Ã÷Ò»ÆðºÚ¿ÍʹÓÃйÚÒßÇéʵÑé´¹ÂÚÓʼþ¹¥»÷µÄ°¸Àý£¬´Ë´Î°¸ÀýµÄ¹¥»÷Ä¿µÄÊÇÒ»¼ÒλÓÚÖйų́ÍåµÄPOS½â¾ö¼Æ»®ÌṩÉÌ¡£ºÚ¿ÍαÔì³ÉÃÀ¹ú¼²²¡Ô¤·ÀÓë¿ØÖÆÖÐÐÄ·¢ËÍÓʼþ£¬´¹ÂÚÓʼþÄÚÈݺ͸½¼þÃû³ÆÒ²ÓëÒßÇéÏà¹Ø£¬Í¨¹ýÓʼþÄÚÈÝÓÕµ¼Óû§·¿ª²¢Éó²é¸½¼þÎĵµ¡¶COVID-19 – nCoV – Special Update.doc¡·£¬·¿ªµÄÎĵµÃ»ÓÐÈκÎÄÚÈÝÏÔʾ£¬¿´ËÆÎÞº¦£¬¿ÉÊÇÏÖʵÉϰüÀ¨ÁËCVE-2017-11882µÄÎó²îʹÓá£
https://mp.weixin.qq.com/s/DpYobO3KmVzuyhXxMani3A
- APT41×é֯ʹÓöà¸öÎó²îÌᳫȫÇòÈëÇÖÔ˶¯
¡¾¸ÅÊö¡¿APT41ÊÇÒ»¸öÓëÖйúÓйصÄÍþв×éÖ¯£¬ÖÁÉÙ´Ó2012Äê»îÔ¾ÖÁ½ñ£¬Ö÷ÒªÓªÒµ°üÀ¨¹ú¼ÒÔÞÖúµÄÍøÂçÌØ¹¤Ô˶¯ºÍ³öÓÚ¾¼ÃÄîÍ·µÄÈëÇÖÔ˶¯¡£½üÆÚAPT41×éÖ¯ÊÔͼʹÓÃCitrix NetScaler/ADC¡¢Cisco·ÓÉÆ÷ºÍZoho ManageEngine Desktop CentralÖеÄ©Õë¶ÔÈ«Çò¶à¸öÐÐÒµÌᳫÈëÇÖÔ˶¯¡£
https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
- Operation Poisoned NewsÕë¶ÔÏã¸ÛiOSÓû§
¡¾¸ÅÊö¡¿×î½ü·¢Ã÷µÄË®¿Ó¹¥»÷Õë¶ÔÏã¸ÛµÄiOSÓû§£¬¸ÃÔ˶¯Ê¹ÓÃÔÚ¶à¸öÂÛ̳ÉÏÐû²¼Á´½Ó£¬ÕâЩÁ´½ÓÊÇÖÖÖÖÐÂÎű¨µÀ£¬½«Óû§Ö¸µ¼µ½ÐÂÎÅÕ¾µãʱ£¬»¹Ê¹ÓÃÒþ²ØµÄiframe¼ÓÔØºÍÖ´ÐÐÒ»¸öеÄiOS¶ñÒâÈí¼þ±äÌålightSpy£¬¸Ã¶ñÒâÈí¼þ´úÂë°üÀ¨Õë¶ÔiOS 12.1ºÍ12.2Öб£´æµÄÎó²îµÄ¹¥»÷¡£
https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/
- WildPressureÃé×¼Öж«¹¤ÒµÏà¹ØÊµÌå
¡¾¸ÅÊö¡¿WildPressure¶¨Ïò¹¥»÷Ô˶¯·Ö·¢Ò»¸ö³ÉÊìµÄC++ľÂíMilum£¬¹¥»÷Ô˶¯µÄÊܺ¦ÕßÖ÷ÒªÀ´×ÔÖж«µØÇø£¬ÊÇһЩ¹¤Òµ²¿·ÖÏà¹ØµÄʵÌå¡£Milum¶ñÒâÈí¼þʹÓÃJSONÃûÌô洢ÉèÖÃÊý¾Ý£¬²¢Ê¹ÓÃHTTP×÷ΪC2ͨѶÐÒ飬Õë¶Ô²î±ðÊܺ¦Õß¾ßÓвî±ð64×Ö½ÚÃÜÔ¿µÄRC4Ëã·¨¡£
https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/
- TrickBotÒøÐÐľÂíÈÆ¹ý2FAÑéÖ¤
¡¾¸ÅÊö¡¿½üÆÚ·¢Ã÷Ò»¸öÐÂAndroid¶ñÒâÈí¼þÓ¦ÓóÌÐòTrickMo£¬¸ÃÓ¦ÓóÌÐòÖ¼ÔÚÈÆ¹ýµÚ¶þÒòËØ£¬²¢ÔÚÐèÒªÊÚȨÉúÒâµÄÒøÐпͻ§ÖÐÇ¿ÖÆÊ¹ÓÃÇ¿Éí·ÝÑéÖ¤£¬Ò²¾ÍÊÇ˵¿ÉÒÔ×赲ͨ¹ýSMS»òÏà¶Ô¸üÇå¾²µÄÍÆËÍ֪ͨ·¢Ë͸øInternetÒøÐпͻ§µÄÒ»´ÎÐÔÊÚȨÂ룬²¢Íê³ÉÚ²ÆÐÔÉúÒâ¡£TrickMoרÃÅÕë¶ÔÒÑѬȾTrickBot¶ñÒâÈí¼þµÄµÂ¹úÓû§¡£
https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/
- RyukÀÕË÷Èí¼þÔÚCOVID-19 ±¬·¢Ê±´úÈÔÒÔҽԺΪĿµÄ
¡¾¸ÅÊö¡¿ÔÚÐÂÐ͹Ú×´²¡¶¾È«Çò´ó±¬·¢Ê±´ú£¬ÎÛÃûÕÑÖøµÄRyukÀÕË÷Èí¼þÈÔÈ»ÒÔÒ½ÁÆ»ú¹¹×÷Ϊ¹¥»÷Ä¿µÄ£¬ÏÖÔÚÃÀ¹úÒÑÓÐ10¼ÒÒ½ÁÆ»ú¹¹ÔÚ¹Ú×´²¡¶¾±¬·¢Ê±´úÊܵ½RyukÀÕË÷Èí¼þµÄ¹¥»÷¡£
https://securityaffairs.co/wordpress/100548/malware/ryuk-ransomware-hospitals-covid19.html

¾ÅÓÎÀϸçÔÆ







