SuperCard XÀûÓÃNFCÖм̹¥»÷¶Ô×¼AndroidÉ豸

°ä²¼¹¦·ò 2025-04-21

1. SuperCard XÀûÓÃNFCÖм̹¥»÷¶Ô×¼AndroidÉ豸


4ÔÂ19ÈÕ£¬ÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©Æ½Ì¨¡°SuperCard X¡±ÒÑÏÖÉí£¬¸Ãƽ̨Õë¶ÔAndroidÉ豸£¬Í¨¹ýNFCÖм̹¥»÷Ö´ÐÐÏúÊ۵㼰ATMÂòÂôڲƭ£¬ÀûÓÃй¶µÄÖ§¸¶¿¨Êý¾Ý·¸·¨»ñÀû¡£´Ëƽ̨´úÂëÓ뿪ԴÏîÄ¿NFCGate¼°Æä¶ñÒâ±äÖÖNGate´æÔÚÀàËÆÐÔ£¬ºóÕß×ÔÈ¥ÄêÆðÔÚÅ·ÖÞÆµÈÔ·¢Æð¹¥»÷¡£SuperCard Xͨ¹ýTelegramƵ·½øÐÐÍÆ¹ã£¬²¢Îª¡°¿Í»§¡±Ìṩֱ½ÓÖ§³Ö¡£Òƶ¯°²È«¹«Ë¾CleafyÔÚÒâ´óÀû¼à²âµ½ÀûÓô˶ñÒâÈí¼þµÄ¹¥»÷»î¶¯£¬ÕâЩ¹¥»÷Éæ¼°¶à¸öÑù±¾£¬ÏÔʾÆäͬÃË»áÔ±¿Éƾ¾ÝµØÓò»òÌØ¶¨ÐèÒª¶¨Ôì°æ±¾¡£¹¥»÷Á÷³ÌʼÓÚÊܺ¦ÕßÊÕµ½¼ÙÒâÒøÐеÄÐéαÐÅÏ¢£¬ËæºóÆ­×Óͨ¹ýÉç½»¹¤³Ì¼¿Á©ÓÕÆ­Êܺ¦ÕßÌṩ¿¨ºÅºÍPINÂ룬²¢ÓÕµ¼Æä×°ÖüÙ×°³É°²È«»òÑéÖ¤¹¤¾ßµÄ¶ñÒâÀûÓá°Reader¡±¡£×°Öú󣬸ÃÀûÓýöÒªÇó½Ó¼ûNFCÄ£¿éµÄȨÏÞ£¬½ø¶øÇÔȡ֧¸¶¿¨Êý¾Ý¡£¹¥»÷ÕßÀûÓÃÇÔÈ¡µÄÊý¾ÝÔÚAndroidÉ豸ÉÏ·ÂÕÕÊܺ¦ÕߵĿ¨£¬½øÐзǽӴ¥Ê½Ö§¸¶ºÍATMÈ¡¿î¡£ÖµÍ×ÌùÐĵÄÊÇ£¬SuperCard XĿǰÉÐδ±»VirusTotalÉϵÄÈκηÀ²¡¶¾ÒýÇæÏóÕ÷£¬ÇÒÓÉÓÚ²»Ô̺¬Î£ÏÕȨÏÞÒªÇóºÍ¹¥»÷ÐÔÖ°ÄÜ£¬¿ÉÄܶã±ÜÆô·¢Ê½É¨ÃèµÄ¼ì²â¡£


https://www.bleepingcomputer.com/news/security/supercard-x-android-malware-use-stolen-cards-in-nfc-relay-attacks/


2. Erlang/OTP SSHÑϳÁ·ì϶ÏÖÒѹ«¿ª£¬Çëµ±¼´½¨²¹


4ÔÂ19ÈÕ£¬½üÈÕ£¬Õë¶ÔErlang/OTP SSHµÄÒ»¸öÑϳÁ·ì϶£¨CVE-2025-32433£©µÄ¹«¿ª¹¥»÷ÒѸ¡³öË®Ãæ£¬¸Ã·ì϶ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÊÜÓ°ÏìÉ豸ÉÏÔ¶³ÌÖ´ÐдúÂ룬µÂ¹ú²¨ºè³¶û´óѧ×êÑÐÈËÔ±ÓÚÖÜÈýÅû¶ÁË´Ë·ì϶£¬²¢ÖÒ¸æËùÓÐÔËÐиÃÊØ»¤¹ý³ÌµÄÉ豸¾ù´æÔÚ·çÏÕ¡£·ì϶ԴÓÚSSHºÍ̸ÐÂÎÅ´¦ÖÃÖеÄÒ»¸öȱµã£¬Ê¹µÃ¹¥»÷ÕßÄÜÔÚÉí·ÝÑé֤ǰ·¢ËÍÏνӺÍ̸ÐÂÎÅ¡£Ö»¹Ü¸Ã·ì϶ÒÑÔÚ25.3.2.10ºÍ26.2.4°æ±¾Öн¨¸´£¬µ«ÓÉÓÚErlang/OTP³£ÓÃÓÚµçÐÅ»ù´¡ÉèÊ©¡¢Êý¾Ý¿âºÍ¸ß¿ÉÓÃÐÔϵͳ£¬É豸¸üпÉÄܲ¢²»ÈÝÒס£È»¶ø£¬Çé¿ö¸üΪ½ôÆÈµÄÊÇ£¬¶àÃûÍøÂ簲ȫ×êÑÐÈËÔ±ÒѰµÀï´´½¨ÁË¿ÉÔÚÒ×Êܹ¥»÷É豸ÉÏʵÏÖÔ¶³Ì´úÂëÖ´Ðеķì϶£¬ÆäÖÐÔ̺¬Zero Day InitiativeµÄPeter GirnusºÍHorizon3µÄ×êÑÐÈËÔ±£¬ËûÃǾù°µÊ¾¸Ã·ì϶¼«Ò×±»ÀûÓᣲ»¾Ãºó£¬ProDefenseÔÚGitHubÉϰ䲼ÁËPoC·ì϶£¬²¢ÔÚPastebinÉÏÄäÃû°ä²¼ÁËÁíÒ»¸ö·ì϶£¬Á½Õß¾ùÔÚÉ罻ýÌåÉÏѸ¿ì´«²¼¡£¼øÓÚSSHÊÇ×î³£ÓõÄÔ¶³Ì½Ó¼ûÖÎÀíºÍ̸£¬ÇÒµçÐŹ«Ë¾ÆµÈÔ³ÉΪ¹ú¶È¼¶APT¹¥»÷µÄÖ¸±ê£¬×êÑÐÈËԱǿÁÒ½¨ÒéËùÓÐÔËÐÐErlang OTP SSHµÄÉ豸ÔÚÊܵ½ÍþвÕß¹¥»÷֮ǰµ±¼´Éý¼¶¡£


https://www.bleepingcomputer.com/news/security/public-exploits-released-for-critical-erlang-otp-ssh-flaw-patch-now/


3. Kairos×é֯й¶°Í¶ûµÄĦÊмì²ì¹Ù°ì¹«ÊÒÊý¾Ý


4ÔÂ19ÈÕ£¬½üÈÕ£¬Ò»Â·Éæ¼°ÂíÀïÀ¼ÖݰͶûµÄĦÊмì²ì¹Ù°ì¹«ÊÒµÄÊý¾Ýй¶ÊÂÎñÒý·¢¹Ø×¢¡£ÃûΪKairosµÄ×éÖ¯ÓÚ2025Äê3ÔÂ31ÈÕ½«stattorney[.]orgÔö³¤µ½ÆäйÃÜÍøÕ¾£¬²¢Ðû³Æ»ñÈ¡ÁË325GBÎļþ£¬Ô̺¬·¸×ïÊܺ¦Õߺͷ¸×ïÕßµÄÃô¸ÐÐÅÏ¢¡£Ö»¹ÜDataBreachesÂÅ´ÎѯÎÊ£¬µ«Öݼì²ì¹Ù°ì¹«ÊÒʼÖÕδ¾ÍÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬ÆäÍøÕ¾ÉÏÒàÎÞÓйØÅû¶¡£¾ÝKairos³Æ£¬ËûÃÇͨ³£´ÍÓëÖ¸±ê7Ì칦·òÁªÏµ£¬²»È»½«ÔÚÍøÕ¾Éϰ䲼µ¹¼ÆÊ±¡£ÔÚ±¾°¸ÖУ¬KairosÔÚ½«Öݵ±¾Ö»ú¹¹ÁÐÈëйÃÜÍøÕ¾Ô¼5Ììºó£¬ÊÕµ½Öݼì²ì¹Ù°ì¹«Êҵĺ¯¼þ£¬ÒªÇó²»Òª°ä²¼ÈκÎÐÅÏ¢£¬ËæºóË«·½ÆðÍ·½»É档Ȼ¶ø£¬½»Éæ¶ÌÔÝÇÒδ¹û£¬Öݼì²ì¹Ù°ì¹«ÊÒÒªÇóÌṩËùÓÐÏÂÔØÎļþµÄÇåµ¥£¬²¢Ñ¡Ôñ5¸öÎļþ½øÐÐÌá½»£¬Ö®ºó½»ÉæÊµÏÖ¡£DataBreaches¶ÔÊý¾Ý¼¯µÄ²é³­Ö¤ÊµÁËKairosµÄ˵·¨£¬ËûÃÇÏÂÔØÁË´óÁ¿ÐÌʰ¸¼þÎļþ£¬Ô̺¬×ï·¸ºÍÊܺ¦ÕßµÄÓ×ÎÒÐÅÏ¢£¬ÆäÖкܶà¼ÍÂ¼Éæ¼°ÇàÉÙÄ꣬²¢ÌṩÁËËûÃǵķ¸×ï¡¢°²Éè¡¢Ò½ÖκÍÖ°ÒµÔÙÅàѵµÈϸ½Ú¡£´Ë±í£¬DataBreaches»¹·¢ÏÖÁ˹ØÓÚ¾¯Ô±µ÷²éµÄ»ã±¨£¬ÒÔ¼°Ô̺¬°Í¶ûµÄĦ¾¯Ô±¾Ö6350¶àÃû¾¯Ô±ÐÕÃû¡¢Ö°¼¶ºÍÒÉËÆÓ×Îҵ绰ºÅÂëµÄµç×Ó±í¸ñ¡£


https://databreaches.net/2025/04/19/baltimore-city-states-attorneys-office-hacked-data-leaked/


4. »ªË¶Â·ÓÉÆ÷AiCloudÖ°ÄÜÏÖÑϳÁÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶


4ÔÂ18ÈÕ£¬»ªË¶½üÈÕ·¢³ö°²È«ÖҸ棬ָ³öÆôÓÃAiCloudÖ°ÄܵÄ·ÓÉÆ÷´æÔÚÑϳÁÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2025-2492£¬CVSS v4ÆÀ·Ö£º9.2£©¡£¸Ã·ì϶ÔÊÐíÔ¶³Ì¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤£¬Í¨¹ýÌØÔìÒªÇóÔÚÉ豸ÉÏÖ´ÐÐδ¾­ÊÚȨµÄÖ°ÄÜ£¬·çÏÕ¼«¸ß¡ £»ªË¶²¼¸æÖ¸³ö£¬²¿õè¾¶ÓÉÆ÷¹Ì¼þϵÁдæÔÚ²»µ±µÄÉí·ÝÑéÖ¤½ÚÔ죬¸Ã·ì϶¿ÉÄÜÓɾ«ÐÄÉè¼ÆµÄÒªÇó´¥·¢£¬½ø¶øµ¼ÖÂδ¾­ÊÚȨµÄÖ°ÄÜÖ´ÐС£AiCloud×÷Ϊ»ªË¶Â·ÓÉÆ÷ÄÚÖõĻùÓÚÔÆµÄÔ¶³Ì½Ó¼ûÖ°ÄÜ£¬¿É½«Â·ÓÉÆ÷ת±äΪ΢ÐÍ˽ÓÐÔÆ·þÎñÆ÷£¬ÔÊÐíÓû§Ô¶³Ì½Ó¼ûÎļþ¡¢Á÷ýÌ塢ͬ²½Îļþ¼°¹²ÏíÎļþ¡£È»¶ø£¬´Ë·ì϶ӰÏì¿í·º£¬ÒÑÕë¶Ô¶à¸ö¹Ì¼þ·ÖÖ§°ä²¼½¨¸´·¨Ê½£¬Ô̺¬3.0.0.4_382ϵÁеÈ¡£Îª±£ÏÕ°²È«£¬»ªË¶½¨ÒéÓû§µ±¼´Éý¼¶µ½×îй̼þ°æ±¾£¬¿ÉÔÚ¹©¸øÉ̵ÄÖ§³ÖÃÅ»§»ò²úÆ·²éÕÒÒ³Ãæ»ñÈ¡¡£Í¬Ê±£¬Óû§Ó¦Ê¹ÓÃ·ÖÆçÃÜÂë± £»¤ÎÞÏßÍøÂçºÍ·ÓÉÆ÷ÖÎÀíÒ³Ãæ£¬È·±£ÃÜÂëÖÁÉÙ10¸ö×Ö·û³¤ÇÒÔ̺¬×Öĸ¡¢Êý×ֺͷûºÅ¡£¶ÔÓÚÊÜÓ°ÏìµÄÍ£²ú²úÆ·Óû§£¬½¨ÒéÆëÈ«½ûÓÃAiCloud²¢¹Ø¹ØÓйطþÎñµÄ»¥ÁªÍø½Ó¼û¡£


https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-routers-using-aicloud/


5. ChromeÀ©´ó·¨Ê½¶ñÒâÖ°ÄÜÍøÂ磬600ÍòÓû§ÊÜÓ°Ïì


4ÔÂ18ÈÕ£¬Secure Annex×êÑÐÔ±John Tuckner·¢ÏÖÒ»¸öÓÉ58¸öChromeÀ©´ó·¨Ê½×é³ÉµÄ¶ñÒâÍøÂ磬×Ü×°ÖÃÁ¿´ï600Íò´Î¡£ÕâЩÀ©´ó·¨Ê½¼Ù×°³ÉÒþÖÔ»òʵÓù¤¾ß£¬ÈçÓÅ»Ýȯ²éÕÒÆ÷¡¢¸æ°×À¹½ØÆ÷µÈ£¬ÉõÖ¶ñϰ©Ðû³ÆÄܱ £»¤Óû§ÃâÊÜÆäËû¶ñÒâÀ©´ó·¨Ê½ÇÖº¦£¬µ«¾ù»ñµÃ¹ýÓÚ¿í·ºµÄȨÏÞ£¬²¢Ô̺¬°µ²ØµÄDZÔÚ¶ñÒâÖ°ÄÜ£¬Èç½Ó¼ûCookieºÍÁîÅÆ¡¢¼à¶½Óû§ÐÐΪ¡¢ÔËÐÐÔ¶³Ì´úÂëÒÔ¼°¼ìË÷ÆäËûÃô¸ÐÊý¾Ý¡£ÕâЩÀ©´ó·¨Ê½´ó¶àδ¹«¿ª£¬ÎÞ·¨Í¨¹ýChromeÍøÉÏÀûÓõê»òËÑË÷ÒýÇæÕÒµ½£¬Ö»ÄÜͨ¹ý¶ñÒâÁ´½Ó´«²¼¡£×êÑÐÈËÔ±Ö¸³ö£¬´ËÀàÀ©´ó·¨Ê½´æÔÚ¾Þ´ó°²È«Òþ»¼£¬²¿ÃÅÒѱ»¹È¸èÆÀΪ¡°ÍƼö¡±È´ÎÞ·¨±»·¢ÏÖ£¬ÈÝÒ×Îóµ¼Óû§¡£Tuckner×î³õͨ¹ýƴдÃýÎóµÄÓòÃû¼ø±ð³ö35¸öδ¹«¿ªµÄÒÉËÆ¶ñÒâÀ©´ó·¨Ê½£¬ºóÔÚObsidian SecurityµÄÔ®ÊÖϸüÐÂÁËÁбí¡£¾Ý±¨Â·£¬¹È¸èÒÑͨ´ïÕâÏî×êÑУ¬²¢ÒÑϼܲ¿ÃÅ¿ÉÒÉÀ©´ó·¨Ê½£¬µ«²¢·ÇÈ«Êý¡£»ã±¨ÌṩÁËÆëÈ«µÄÈëÇÖÖ¸±êÁбí£¬²¢ÖÒ¸æ³Æ£¬¹ýÓÚ¿í·ººÍÇÖÈëÐÔµÄȨÏÞ¡¢ÓòÃûƴдÃýÎóÒÔ¼°´óÁ¿¾­¹ýÑϳÁ»ìºÏµÄ´úÂ룬¶¼ÊÇÀ©´ó·¨Ê½¿ÉÄÜ´æÔÚ¶ñÒâÐÐΪµÄ¼£Ïó¡£


https://cybernews.com/security/network-of-chrome-extensions-contain-secret-code-to-track-users/


6. ÐÂÐÍGorilla Android¶ñÒâÈí¼þÀ¹½ØOTP¶ÌÐÅ


4ÔÂ19ÈÕ£¬ÍøÂ簲ȫÁìÓò³öÏÖÒ»ÖÖÃûΪ¡°Gorilla¡±µÄ¸´ÔÓÐÂÐÍAndroid¶ñÒâÈí¼þ£¬ÆäÖ¸±êÖ±Ö¸Ô̺¬Ò»´ÎÐÔÃÜÂë(OTP)µÄ¶ÌÐÅÀ¹½Ø¡£¸Ã¶ñÒâÈí¼þÔÚºó¶ÜÇÄÈ»ÔËÐУ¬½èÖúAndroidȨÏÞϵͳÇÔÈ¡ÊÜϰȾÉ豸ÉϵÄÃô¸ÐÐÅÏ¢¡£³õ²½·ÖÎöÏÔʾ£¬GorillaÖØÒª¶Ô×¼ÒøÐпͻ§¼°YandexµÈÈȵã·þÎñÓû§£¬¶ÔÇÔÈ¡µÄ¶ÌÐŽøÐÐÏêϸ·ÖÀ࣬ÒԱ㹥»÷ÕßÇáËÉÀûÓá£GorillaÀûÓùؼüµÄAndroidȨÏÞ½Ó¼ûSIM¿¨ÐÅÏ¢¼°É豸µç»°ºÅÂ룬²¢Í¨¹ýWebSocketºÍ̸ÓëC2»ù´¡ÉèÊ©³ÉÁ¢ÓƾÃÏνÓ£¬ÊµÏÖʵʱͨѶÓëÊý¾Ýй¶¡£ÎªÌӱܼì²â£¬¸Ã¶ñÒâÈí¼þѡȡ²»Ñ°³£¼¼Êõ£¬Ô¤·ÀʹÓÿÉÄÜÒýÆðÒÉ»óµÄ API£¬×ª¶ø²éÎÊÆô¶¯Æ÷ÒâͼÒÔÍøÂçÒÑ×°ÖÃÀûÓ÷¨Ê½ÐÅÏ¢¡£C2Ãæ°å½ÒʾÁËGorillaµÄ¸´ÔÓ²Ù×÷£¬ÇÔÈ¡µÄ¶ÌÐű»¾®¾®ÓÐÌõµØ×éÖ¯ÔÚ¡°ÒøÐÓ×±ºÍ¡°Yandex¡±µÈ±êǩϣ¬ÏÔʾ³öÆäÕë¶Ô½ðÈÚÐÅÏ¢ºÍÈȵã·þÎñµÄ¾«×¼½ø¹¥¡£¸Ã¶ñÒâÈí¼þͨ¹ýһϵÁкó¶Ü·þÎñ³ÖÐøÔËÐУ¬ÀûÓÃstartForeground API¼°FOREGROUND_SERVICEȨÏÞÏÔʾ֪ͨ£¬¸²¸ÇÆä¶ñÒâ»î¶¯¡£¼¼Êõ·ÖÎöÏÔʾ£¬GorillaµÄºÅÁî½á¹¹Ô̺¬ÈýÖÖÖØÒª²Ù×÷ÀàÐÍ£¬ÆäÖÓ×°send_sms¡±ºÅÁîÓÈΪ¹Ø¼ü£¬ÔÊÐí¹¥»÷Õß´ÓÊÜϰȾÉ豸·¢ËÍ×Ô½ç˵¶ÌÐÅ¡£


https://cybersecuritynews.com/new-gorilla-android-malware-intercept-sms-messages/