¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»HSMÑϳÁ·ì϶ £¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹

°ä²¼¹¦·ò 2019-06-10

1.¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÀûÓõÚÈý·½¹©¸øÉ̹¹½¨µÄ·¨Ê½´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¹È¸èûÓоßÌå×¢Ã÷ÄÄЩÉ豸Êܵ½ÁËÓ°Ïì £¬µ«°²È«³§ÉÌDr.WebÔøÔÚ2017ÄêµÄ×êÑл㱨ÖÐÖ¸³öÊÜÓ°ÏìµÄÉè±¸Æ·ÅÆÔ̺¬Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄÉè±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¸æ°×µÈ¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2.΢ÈíÖÒ¸æÀûÓÃOffice·ì϶µÄÀ¬»øÓʼþ»î¶¯ £¬ÖØÒª¶Ô׼ŷÖÞ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


6ÔÂ7ÈÕÍí΢Èí°ä²¼ÁËÒ»ÔòÕë¶ÔÅ·Ö޵ĻîÔ¾À¬»øÓʼþ»î¶¯µÄÖҸ档ƾ¾Ý¸ÃÖÒ¸æ £¬¹¥»÷ÕßÖØÒªÀûÓÃÔ̺¬OfficeºÍWordpad·ì϶£¨CVE-2017-11882£©µÄRTF¸½¼þϰȾÊܺ¦Õß¡£µ±Êܺ¦Õß´ò¿ªÓʼþÖеĸ½¼þʱ £¬¶ñÒâRTFÎĵµ½«Ö´ÐÐ·ÖÆçÀàÐ͵ľ籾£¨Ô̺¬VBScript¡¢PowerShell¡¢PHPµÈ£©ÒÔÏÂÔØºÍÖ´ÐжñÒâpayload¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-issues-warning-on-spam-campaign-using-office-exploits/

3.ÐÂÍøÂç´¹µö»î¶¯ £¬¼Ù×°³É¶à¸öÀ­ÃÀ¹ú¶ÈÈ·µ±¾Ö²É¹ºÍøÕ¾

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

5ÔÂ28ÈÕAnomali×êÑÐÈËÔ±·¢ÏÖÒ»¸ö¼Ù×°³ÉÄ«Î÷¸ç¡¢ÃØÂ³ºÍÎÚÀ­¹çÈ·µ±¾Ö²É¹ºÍøÕ¾µÄ´¹µö¹¥»÷»î¶¯¡£¹¥»÷ÕßÀûÓÃÔì×÷ÓÅÔ½µÄ´¹µöÍøÕ¾ £¬Ô¼ÇëÓ×ÎÒ»ò¹«Ë¾²Î¼ÓÕâЩ¹ú¶ÈÈ·µ±¾Ö¾º±êÏîÄ¿ £¬µ«ÏÖʵÉÏÊÇΪÁËÇÔÈ¡Óû§µÄÕË»§Í´´¦¡£Ôڸù¥»÷»î¶¯ÖÐ £¬¹¥»÷ÕßÀûÓÃÁù¸ö·ÖÆçµÄÓòÃû£¨½âÎöÔÚÈý¸ö·ÖÆçµÄIPµØÖ·ÉÏ£©ÍйÜÁË16¸ö·ÖÆçµÄ´¹µöÍøÒ³¡£Æ¾¾ÝÓйؼ¼Êõ·ÖÎö £¬¹¥»÷ÕßÔÚÅäÖÃDNSÉèÖÃʱÖÁÉÙʹÓÃÁËÈý¸ö¿ÉÒɵĵç×ÓÓʼþµØÖ·¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.anomali.com/blog/phishing-campaign-impersonates-mexico-peru-uruguay-governments-e-procurement-systems

4.ICEFOG APT¶ñÒ⹤¾ßÔÚй¥»÷»î¶¯ÖÐÔٴγöÏÖ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


FireEye×êÑÐÈËÔ±Chi-en (Ashley) Shen·¢ÏÖICEFOG APTʹÓõĶñÒâÈí¼þÔÚÒþû¶àÄêºóÔٴγʴ˿ÌÐµĹ¥»÷»î¶¯ÖС£ICEFOG¶ñÒâÈí¼þ³õ´Î³öÏÖÓÚ2013Äê9Ô¿¨°Í˹»ùµÄ×êÑл㱨 £¬²¢Ôڸû㱨°ä²¼ºóÖÕ³¡Á˻¡£´Ë¿Ì×êÑÐÈËÔ±·¢ÏÖICEFOGµÄÁ½¸öеıäÖÖ£¨ICEFOG-PºÍICEFOG-M£© £¬ÕâÁ½¸ö±äÖÖ±ðÀë±»ÓÃÓÚ´Ó2014ÄêºÍ2018ÄêÆðÍ·µÄ¹¥»÷ÖС£ÕâÁ½¸ö±äÖÖ¶¼ÓÅÓÚԭʼµÄICEFOG £¬Òâζ׏¥»÷ÕßÒѽøÐжî±íµÄ¿ª·¢¹¤×÷ÒÔ¼ÓÇ¿ÆäÖ°ÄÜ¡£´Ë±í £¬×êÑÐÈËÔ±»¹·¢ÏÖÒÔǰδ³öÏÖ¹ýµÄMac°æICEFOG±äÖÖ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/

5.¹úÌ©º½¿ÕÆØ´æÔÚÊ®ÄêµÄ佨²¹·ì϶ £¬µ¼ÖÂ2018ÄêµÄÊý¾Ýй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±Kai-yi Wong°ä²¼ÁËÕë¶Ô¹úÌ©º½¿Õ2018ÄêÊý¾Ýй¶ÊÂÎñµÄµ÷²é»ã±¨¡£Æ¾¾Ý¸Ã»ã±¨ £¬¹¥»÷ÕßÓÚ2014Äê10Ô³õ´Î½«Ò»¸ö¼üÅ̼ͼÆ÷Ö²Èë¹úÌ©º½¿ÕµÄϵͳ¡£¸ÃľÂíʹµÃ¹¥»÷ÕßÄܹ»ÔÚÍøÂçÖкáÏòÒÆ¶¯²¢ÇÒÍøÂçÍ´´¦ÐÅÏ¢£¨Ö±ÖÁ2018Äê3ÔÂ22ÈÕ£©¡£¶øºó¹¥»÷ÕßÀûÓ÷þÎñÆ÷ÉÏÒ»¸ö´æÔÚ10ÄêÖ®¾ÃµÄ·ì϶ £¬Èƹý·þÎñÆ÷ÉϵÄÉí·ÝÑéÖ¤²¢ÇÒ½Ó¼ûÁËÖÎÀí¹¤¾ß¡£½øÒ»²½µÄ»ã±¨Ö¸³ö¹²ÓÐ41¸öÕË»§µÄÍ´´¦±»ÇÔ £¬Ô̺¬ÖÎÀíÔ¹ØË»§¡¢ÍøÂçÕË»§ºÍ·þÎñÕË»§¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cathay-pacifics-unpatched-decade-old-vulnerability-led-to-2018-breach/

6.HSMÑϳÁ·ì϶ £¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ledger°²È«×êÑÐÈËÔ±Åû¶һ¼ÒÖØÒª³§É̵ÄHSM£¨Ó²¼þ°²È«Ä£¿é£©ÖеÄÑϳÁ·ì϶ £¬¸Ã·ì϶¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£HSMÊÇÓ²¼þ¸ôÀëÉ豸 £¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢µ±¾Ö»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉ̵È¡£Æ¾¾Ý×êÑÐÈËÔ±µÄ»ã±¨ £¬¸Ã·ì϶ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õ߯ëÈ«½ÚÔìHSM £¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱʹ´¦µÈÐÅÏ¢¡£×êÑÐÈËÔ±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ £¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/