¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸
Ðû²¼Ê±¼ä 2022-02-10¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸
¾ÝýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬ZimperiumÔÚGoogle PlayÉϼì²âµ½470¿î¶ñÒâÓ¦Óᣡ£¡£ÕâЩӦÓÃÒÑÔÚÈ«ÇòÁè¼Ý1.05ÒŲ́Android×°±¸ÉÏ×°ÖÃÁ˶ñÒâÈí¼þDark Herring£¬£¬Ëü¿ÉÒÔͨ¹ýÄ¿µÄµÄ»°·ÑÕ˵¥ÇÔÈ¡×ʽ𡣡£¡£¸Ã»î¶¯Ã¿ÔÂÏòÄ¿µÄµÄ»°·ÑÕ˵¥ÖÐÔöÌí15ÃÀÔªµÄÓöȣ¬£¬ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬²¢Ò»Ö±Ò»Á¬µ½È¥Äê11Ô£¬£¬¾ÝÔ¤¼ÆÇÔÈ¡µÄ½ð¶î×ÜÊýÒÑ´ïÊýÒÚ¡£¡£¡£ÏÖÔÚ£¬£¬GoogleÒÑÔÚPlayÊÐËÁÖÐɾ³ýÁËÉÏÊöµÄ¶ñÒâÓ¦Óᣡ£¡£
https://threatpost.com/dark-herring-billing-malware-android/178032/
µÂ¹úBfV³ÆAPT27ÍÅ»ïʹÓÃHyperBro¹¥»÷ÆäÉÌÒµ×éÖ¯
1ÔÂ26ÈÕ£¬£¬µÂ¹úÁª°îÏÜ·¨±£»£»£»£»£»¤°ì¹«ÊÒ(BfV)Ðû²¼Í¨¸æ£¬£¬³ÆAPT27ÍÅ»ïÕýÔÚ¹¥»÷ÆäÉÌÒµ×éÖ¯¡£¡£¡£APT27ÓÖÃûEmissary Panda£¬£¬×Ô2010ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£BfV³Æ£¬£¬×Ô2021Äê3ÔÂÒÔÀ´£¬£¬APT27Ò»Ö±ÔÚʹÓÃMicrosoft ExchangeºÍZoho AdSelf Service Plus1Èí¼þÖеÄÎó²î¹¥»÷µÂ¹úµÄ¹«Ë¾¡£¡£¡£±ðµÄ£¬£¬»¹Ê¹ÓÃÁËHyperBro RAT£¬£¬Ö¼ÔÚÇÔȡĿµÄµÄÊý¾Ý£¬£¬²¢ÊÔͼÕë¶ÔÆä¿Í»§Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£
https://securityaffairs.co/wordpress/127230/apt/german-intel-warns-apt27-attacks.html
¹¥»÷ÕßʹÓÃ800¶à¸öÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes
ýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬¹¥»÷ÕßʹÓÃ800¶à¸öÒѱ»ÈëÇÖµÄWordPressÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes¡£¡£¡£µ±Ä¿µÄ»á¼û±»Ñ¬È¾ÍøÕ¾Ê±£¬£¬»á±»ÒªÇó×°ÖÃÒ»¸ö¼ÙµÄJava RuntimeÓ¦Óᣡ£¡£¸ÃMSI×°ÖóÌÐò°üÀ¨Èý¸ö¶ñÒâJavaScriptÎļþ£ºinstall.js¡¢sched.js¡¢sucesso.js£¬£¬ËüÃÇΪÏÂÒ»½×¶ÎµÄ¼ÓÔØ³ÌÐò×¼±¸PythonÇéÐΡ£¡£¡£AvastÌåÏÖ£¬£¬ÒѼì²âµ½ÁË5ÖÖ²î±ðµÄ¶ñÒâChromeÀ©Õ¹³ÌÐò¡£¡£¡£ÏÖÔÚ£¬£¬¸ÃÇå¾²¹«Ë¾ÒÑ֪ͨ°ÍÎ÷CERT£¬£¬µ«¹¥»÷»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£
https://www.bleepingcomputer.com/news/security/chaes-banking-trojan-hijacks-chrome-with-malicious-extensions/
Bitdefender·¢Ã÷´ó¹æÄ£·Ö·¢FluBotºÍTeaBotµÄ»î¶¯
1ÔÂ26ÈÕ±¨µÀ³Æ£¬£¬ÐµÄFluBotºÍTeaBot¶ñÒâÈí¼þ·Ö·¢»î¶¯ÕýÔÚÕë¶Ô°Ä´óÀûÑÇ¡¢µÂ¹ú¡¢²¨À¼¡¢Î÷°àÑÀºÍÂÞÂíÄáÑǵÄAndroidÓû§¡£¡£¡£Bitdefender Labs×Ô2021Äê12ÔÂÒÔÀ´£¬£¬½Ø»ñÁËÁè¼Ý10ÍòÌõ¶ñÒâ¶ÌÐÅ£¬£¬Ö¼ÔÚÈö²¥FluBot¡£¡£¡£¸Ã¹«Ë¾»¹³Æ£¬£¬TeaBotÒѶà´Î·ºÆðÔÚGoogle PlayÊÐËÁÖУ¬£¬2021Äê12ÔÂ6ÈÕµ½2022Äê1ÔÂ17ÈÕ£¬£¬ËûÃǼì²âµ½17¸ö²î±ð°æ±¾µÄTeaBotͨ¹ý¶à¸ö¶ñÒâÓ¦ÓÃѬȾװ±¸¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-flubot-and-teabot-campaigns-target-android-devices-worldwide/
DiscordÒòAPIºÍÊý¾Ý¿â·ºÆðÎÊÌâµ¼Ö´ó¹æÄ£Ð§ÀÍÖÐÖ¹
1ÔÂ26ÈÕ£¬£¬Discord±¬·¢ÁË´ó¹æÄ£ÖÐÖ¹µÄÇéÐΣ¬£¬µ¼ÖÂÓû§ÎÞ·¨µÇ¼ЧÀÍ»òʹÓÃÓïÒô̸Ìì¡£¡£¡£ÖÐÖ¹×îÏÈÓÚÃÀ¹ú¶«²¿±ê׼ʱ¼äÏÂÖç2:49£¬£¬×î³õÊÇÓÉAPIÖÐÖ¹ÒýÆðµÄ£¬£¬µ¼Ö¶à¸öЧÀÍÎÞ·¨Ï໥ͨѶ¡£¡£¡£È»¶ø£¬£¬ÔÚ½â¾öAPIÎÊÌâºó£¬£¬Discord·¢Ã÷Êý¾Ý¿â¼¯Èº·ºÆðÎÊÌ⣬£¬Õâµ¼ÖÂÁ˸ü¶àÎÊÌâ¡£¡£¡£¸Ã¹«Ë¾ÔÚÐÞ¸´ÓÐÎÊÌâµÄÊý¾Ý¿â¼¯ÈºÊ±×îÏÈÏÞÖÆµÇ¼ËÙÂÊ£¬£¬ÒÔ±ÜÃâЧÀÍÆ÷¹ýÔØ£¬£¬Ö±µ½ÏÂÖç5:12×óÓÒ£¬£¬ÏÞËÙ±»×÷·Ï¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/major-discord-outage-caused-by-api-and-database-issues/
΢ÈíAzureÔÆÆ½Ì¨ÀֳɵÖÓù¸ß´ï3.47 TbpsµÄDDoS¹¥»÷
΢ÈíÔÚ1ÔÂ25ÈÕÐû²¼µÄ±¨¸æ³Æ£¬£¬ÆäAzureÒѵÖÓùÁ˸ߴï3.47 TbpsµÄDDoS¹¥»÷¡£¡£¡£11Ô£¬£¬Î¢ÈíÑÇÖÞµÄÒ»¸ö¿Í»§Ôâµ½ÁË3.47 TbpsºÍÿÃë3.4ÒÚÊý¾Ý°ü(pps)µÄDDoS¹¥»÷£¬£¬Õâ±»ÒÔΪÕâÊÇÀúÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£´Ë´Î¹¥»÷À´×ÔԼĪ10000¸öÔ´£¬£¬Éæ¼°Öйú¡¢º«¹ú¡¢¶íÂÞ˹¡¢Ì©¹ú¡¢Ó¡¶È¡¢Ô½ÄÏ¡¢ÒÁÀÊ¡¢Ó¡¶ÈÄáÎ÷Ñǵȶà¸ö¹ú¼Ò¡£¡£¡£¹¥»÷ÏòÁ¿ÊÇʹÓÃSSDP¡¢CLDAP¡¢DNSºÍNTPÔÚ80¶Ë¿ÚÉϵÄUDP·´É䣬£¬×ÜÌå¹¥»÷Ò»Á¬ÁËԼĪ15·ÖÖÓ¡£¡£¡£
https://azure.microsoft.com/en-us/blog/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends/
Çå¾²¹¤¾ß
jfrog-npm-tools
JFrogÐû²¼Èý¿î¿ªÔ´¹¤¾ß£¬£¬¿É´Ó npm °ü¹ÜÀíÆ÷ÏÂÔØºÍ×°ÖöñÒâ JavaScript °ü֮ǰ¶ÔÆä¾ÙÐбê¼Ç¡£¡£¡£
https://github.com/jfrog/jfrog-npm-tools
EtherNet/IP & CIP Stack Detector
Çå¾²¹«Ë¾ ClarotyÐû²¼ÐµĿªÔ´¹¤¾ßÓÐÖúÓÚʶ±ðÓÃÓÚ ICS Ñо¿ºÍÆÊÎöµÄ EtherNet/IP ¿ÍÕ»¡£¡£¡£
https://www.securityweek.com/new-open-source-tool-helps-identify-ethernetip-stacks-ics-research-analysis
Wireshark Forensics Toolkit
¿çƽ̨µÄ Wireshark ²å¼þ£¬£¬¿É½«ÍøÂçÁ÷Á¿Êý¾ÝÓëÍþвÇ鱨¡¢×ʲú·ÖÀàºÍÎó²îÊý¾Ý¹ØÁªÆðÀ´£¬£¬ÒÔ¼ÓËÙÍøÂçȡ֤ÆÊÎö¡£¡£¡£
https://github.com/rjbhide/wireshark-forensics-plugin
T-Reqs
ÊÇÒ»ÖÖ»ùÓÚÓï·¨µÄ HTTP Fuzzer¡£¡£¡£
https://github.com/bahruzjabiyev/T-Reqs-HTTP-Fuzzer
DotGit
¼ì²é .git ÊÇ·ñÔÚ»á¼ûµÄÍøÕ¾ÖÐ̻¶µÄÀ©Õ¹¡£¡£¡£
Çå¾²ÆÊÎö
°×¹¬Ï£ÍûÃÀ¹úÕþ¸®Ê¹ÓÃÁãÐÅÈÎÇ徲ģ×Ó
https://www.bleepingcomputer.com/news/security/white-house-wants-us-govt-to-use-a-zero-trust-security-model/
΢ÈíÖÒÑÔ´¹ÂÚ OAuth Ó¦ÓóÌÐò
https://blog.malwarebytes.com/privacy-2/2022/01/microsoft-warns-of-phishy-oauth-apps/
¹È¸è·ÅÆú FLoC ²¢ÒýÈëÖ÷Ìâ API À´Ìæ»»¹ã¸æµÄ¸ú×Ù Cookie
https://thehackernews.com/2022/01/google-drops-floc-and-introduces-topics.html
ÀÕË÷Èí¼þ¹¥»÷ÕßʹÓõÄÎó²î¼¤Ôö 29%
https://www.infosecurity-magazine.com/news/29-surge-bugs-used-ransomware/
Let's Encrypt ÔÚÁ½ÌìÄÚ×÷·Ï´ó×Ú SSL Ö¤Êé
https://www.bleepingcomputer.com/news/security/lets-encrypt-is-revoking-lots-of-ssl-certificates-in-two-days/
MalwarebytesÐû²¼¹ØÓÚKONNI RATµÄÊÖÒÕÆÊÎö±¨¸æ
https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/


¾©¹«Íø°²±¸11010802024551ºÅ