Google PlayÖжñÒâÈí¼þAutolycosÒѱ»ÏÂÔØ300Íò´Î
°ä²¼¹¦·ò 2022-07-15
¾ÝýÌå7ÔÂ13ÈÕ±¨Â·£¬Google PlayÉ̵êÖдæÔÚÒ»¸öеÄAndroid¶ñÒâÈí¼þAutolycos£¬ÏÂÔØÁ¿Òѳ¬¹ý300Íò´Î¡£Autolycos»á°ÂÃØÎªÓû§¶©Ôĸ߼¶·þÎñ£¬ÖÁÉÙ´æÔÚÓÚ8¸öAndroidÀûÓÃÖУ¬ÈçVlog Star Video Editor£¨100Íò´ÎÏÂÔØ£©ºÍCreative 3D Launcher£¨100Íò´ÎÏÂÔØ£©µÈ£¬Evina×êÑÐÈËÔ±ÔÚ2021Äê6Ô·¢ÏÖÕâЩÀûÓá£Autolycos»áÒñ±ÎµØÖ´Ðй¥»÷£¬²¢Äܹ»½Ó¼ûÖ¸±êµÄSMSÎı¾ÐÂÎÅ¡£Ä¿Ç°£¬GoogleÒÑÔÚPlayÉ̵êÖÐɾ³ýÁËÕâЩÀûÓá£
https://www.bleepingcomputer.com/news/security/new-android-malware-on-google-play-installed-3-million-times/
2¡¢Î¢ÈíÅû¶macOSɳºÐÌÓÒÝ·ì϶CVE-2022-26706µÄϸ½Ú
7ÔÂ13ÈÕ£¬Î¢ÈíÅû¶ÁËmacOSÖеÄÒ»¸ö·ì϶£¨CVE-2022-26706£©£¬Ëü¿Éͨ¹ýÌØÔì´úÂëÈÆ¹ýɳºÐÏ޶Ȳ¢ÔÚϵͳÉÏÖ´ÐдúÂë¡£×êÑÐÈËÔ±Ú¹Êͳƣ¬¸Ã·ì϶ÊÇÔÚmacOSÉÏÔËÐкͼì²âMicrosoft OfficeÎĵµÖеĶñÒâºê²½Öèʱ·¢Ïֵġ£ÎªÈ·±£Ïòºó¼æÈÝ£¬Microsoft WordÄܹ»¶Áд´øÓÐǰ׺"~$"µÄÎļþ£¬ÕâÊÇÔÚÀûÓ÷¨Ê½µÄɳºÐ¹æ¶¨Öнç˵µÄ¡£Ê¹ÓÃLaunch Services¶ÔÒ»¸ö´øÓÐÉÏÊöǰ׺µÄÌØÊâPythonÎļþÔËÐÐopen -stdinºÅÁÄܹ»ÔÚmacOSÉϵÄAppɳºÐÌÓÒÝ£¬²¢ÈëÇÖϵͳ¡£¸Ã·ì϶ÔÚ½ñÄê5ÔµÄmacOS°²È«¸üÐÂ(Big Sur 11.6.6)Öн¨¸´¡£
https://www.microsoft.com/security/blog/2022/07/13/uncovering-a-macos-app-sandbox-escape-vulnerability-a-deep-dive-into-cve-2022-26706/
3¡¢AMDºÍIntel CPUÒ×ÊÜ´§Ä¦Ö´Ðй¥»÷RetbleedµÄÓ°Ïì
¾Ý7ÔÂ13ÈÕ±¨Â·£¬ËÕÀèÊÀÁª¹úÀí¹¤Ñ§ÔºµÄ×êÑÐÈËÔ±·¢ÏÖÁË¿ÉÓ°ÏìAMDºÍIntel CPUµÄд§Ä¦Ö´Ðй¥»÷Retbleed¡£RetbleedÒ²³ÆÎªSpectre-BTI£¬Ô̺¬2¸ö·ì϶CVE-2022-29900(AMD)ºÍCVE-2022-29901(Intel)£¬¿ÉÈÆ¹ýµ±Ç°µÄ·ÀÓù²¢µ¼Ö»ùÓÚSpectreµÄ¹¥»÷¡£¹ÌÈ»ºÜ¶à²Ù×÷ϵͳʹÓÃÁËÏñRetpolineÕâÑùµÄ±£»¤´ëÊ©À´·ÀÓù·ÖÖ§Ö¸±ê×¢Èë(BTI)£¬µ«RetbleedÄܹ»ÈƹýÕâÖÖÕ½Êõ£¬½Ù³ÖÄÚºËÖеķµ»ØÖ¸Áî²¢Ö´ÐÐËÁÒⴧĦÐÔ´úÂë¡£
https://thehackernews.com/2022/07/new-retbleed-speculative-execution.html
4¡¢°Í»ù˹̹¿Õ¾ü×ܲ¿Ôâµ½Ó¡¶ÈÍÅ»ïSidewinderµÄ¹¥»÷
Check Point7ÔÂ13Èճƣ¬°Í»ù˹̹¿Õ¾ü×ܲ¿Ôâµ½ÁËÒÉËÆÓ¡¶ÈAPT×éÖ¯SidewinderµÄ¹¥»÷¡£2022Äê5Ô£¬Óë¹¥»÷»î¶¯ÓйصĶà¸ö¶ñÒâÈí¼þÑù±¾ºÍÁ½¸ö¼ÓÃÜÎļþ±»ÉÏ´«µ½VirusTotal¡£ÔÚ½âÃÜÎļþºó£¬CPR·¢ÏÖÒ»¸öÓëSidewinderÍÅ»ïÓйصÄ.NET DLL£¬¸ÃÍÅ»ïÖØÒªÕë¶Ô°Í»ù˹̹µÄʵÌå¡£µÚ¶þ¸ö¼ÓÃÜÎļþÔ̺¬ÁËÖ¸±êÉ豸ÉÏËùÓÐÎļþµÄÁÐ±í£¬ÆäÖдó²¿ÃÅÓë¾üʺͺ½¿ÕÓйء£´Ë±í£¬±»¹¥»÷ϵͳµÄÓû§ÃûÔ̺¬AHQ-STRC3£¬¶øAHQ´ú±í°Í»ù˹̹¿Õ¾ü×ܲ¿¡£
https://blog.checkpoint.com/2022/07/13/a-hit-is-made-suspected-india-based-sidewinder-apt-successfully-cyber-attacks-pakistan-military-focused-targets/
5¡¢ÃÀ¹ú×·Õ®¹«Ë¾PFC½ü200ÍòÒ½ÁÆÊý¾ÝÔÚÀÕË÷¹¥»÷ºóй¶
ýÌå7ÔÂ14Èճƣ¬ÃÀ¹úÊÕÕ®¹«Ë¾Professional Finance Company(PFC)й¶ÁË650¶à¼ÒÒ½ÁÆ»ú¹¹µÄ190ÍòÈ˵ÄÐÅÏ¢¡£PFCÖØÒªÎªÒ½Áƹ«Ë¾´ßÌÖδ³¥Õ®Îñ£¬ÔÚ2ÔÂ26ÈÕ·¢ÏÔìäÔâµ½ÁËÀÕË÷¹¥»÷£¬Ö±µ½5Ô³õ²Å֪ͨ¸ÃÊÂÎñ¡£PFCµÄÉêÃ÷³ÆÎ´¾ÊÚȨµÄµÚÈý·½½Ó¼ûÁËÔ̺¬Ó×ÎÒÐÅÏ¢µÄÎļþ£¬¹ÌÈ»²¢Î´Ð¹Â©ÊÜÓ°ÏìµÄÓ×ÎÒÊýÁ¿£¬µ«ÎÀÉúÓ빫¼Ò·þÎñ²¿(DHHS) ÍøÕ¾ÏÔʾ£¬ÓÐ1918841ÈËÊܵ½´ËÊÂÎñµÄÓ°Ïì¡£PFCÔÚÁªÏµ¿ÉÄÜÊܵ½Ó°ÏìµÄÓ×ÎÒ£¬²¢½«ÎªËûÃÇÌṩÃâ·ÑµÄÐÅÓþ¼à¿Ø¡£
https://www.infosecurity-magazine.com/news/healthcare-records-breaches/
6¡¢Zscaler°ä²¼QakbotʹÓõĶà¸öм¼ÊõµÄ·ÖÎö»ã±¨
7ÔÂ12ÈÕ£¬Zscaler°ä²¼Á˹ØÓÚ¶ñÒâÈí¼þQakbotµÄ¼¼Êõ·ÖÎö»ã±¨¡£Qakbot×Ô2008ÄêÆðÍ·»îÔ¾£¬ÊÇÒ»ÖÖÇÔÈ¡ÃÜÂëµÄ³£¼ûľÂí£¬½üÆÚ£¬Qakbot±³ºóµÄÔËÓªÍÅ»ïÔÚ¸üÐÂÆä´«²¼ÔØÌ壬ÒÔÊÔÍ¼ÈÆ¹ý¼ì²â¡£¹¥»÷Õßͨ¹ýʹÓÃZIPÎļþÀ©´óÃûÒÔ¼°ÓµÓг£¼ûÌåʽµÄÎļþÃûºÍExcel(XLM) 4.0À´ÓÕʹָ±êÏÂÔØ×°ÖÃQakbot¶ñÒ⸽¼þ£¬³ý´ËÖ®±í£¬¹¥»÷Õß»¹ÔÚʹÓÃÁËÆäËü¼¼ÊõÀ´Èƹý×Ô¶¯¼ì²â²¢Ìá¸ßµÄ¹¥»÷³É¹¦ÂÊ£¬°ü·Ñ½âÏý´úÂë¡¢ÀûÓöà¸öURLÀ´·Ö·¢payloadºÍʹÓÃδ֪µÄÎļþÀ©´óÃûÀ´·Ö·¢payloadµÈ¡£
https://www.zscaler.com/blogs/security-research/rise-qakbot-attacks-traced-evolving-threat-techniques


¾©¹«Íø°²±¸11010802024551ºÅ