ÐÂÐÍAndroid Hook¶ñÒâÈí¼þ±äÖÖÀûÓÃÀÕË÷Èí¼þËø¶¨É豸

°ä²¼¹¦·ò 2025-08-28

1. ÐÂÐÍAndroid Hook¶ñÒâÈí¼þ±äÖÖÀûÓÃÀÕË÷Èí¼þËø¶¨É豸


8ÔÂ26ÈÕ £¬Òƶ¯°²È«¹«Ë¾Zimperium½üÈÕ°ä²¼¾¯±¨ £¬½ÒʾÆäzLabsÍŶӷ¢ÏÖµÄÐÂÐÍHook Android¶ñÒâÈí¼þ±äÖÖÒÑÑݱäΪ¼¯ÀÕË÷¡¢¼äµýºÍÒøÐÐľÂíÖ°ÄÜÓÚÒ»ÌåµÄ»ìºÏÍþв ¡£Õâ¿îÃûΪ"Hook Version 3"µÄ¶ñÒâÈí¼þͨ¹ý´¹µö¹¥»÷ºÍGitHubµÈ¹«¹²Æ½Ì¨´«²¼ £¬±êÖ¾È¡ÒÆ¶¯Íþв½øÈë¸üΣÏյĽ׶Î ¡£×êÑÐÏÔʾ £¬Hook 3.0Ö§³Ö¶à´ï107¸öÔ¶³ÌºÅÁ½Ï¾É°æ±¾ÐÂÔö38¸ö£© £¬¸³Óè¹¥»÷Õß¶ÔÉ豸ǰËùδÓеĽÚÔìȨ ¡£ÆäÖ÷Ìâ¹¥»÷¼¿Á©Ô̺¬£ºÍ¨¹ýÓÕµ¼Óû§ÆôÓÃAndroid¸¨ÖúÖ°ÄÜ£¨Accessibility Service£©ÊµÏÖ×Ô¶¯»¯¶ñÒâ²Ù×÷£»ÀûÓÃÐéαͨÃ÷ÆÁÄ»¸²¸Ç¼¼ÊõÇÔÈ¡PINÂë¡¢ÐÅÓþ¿¨ÐÅÏ¢¼°Ãô¸ÐÊý¾Ý £¬ÀýÈçαÔìGoogle Pay½çÃæ»òNFCÌáÐÑ£»¸üÒýÈ붯̬ÀÕË÷Ö°ÄÜ £¬¿ÉÈ«ÆÁÏÔʾ´ÓÔ¶³Ì·þÎñÆ÷¼ÓÔØµÄÊê½ðÒªÇó £¬Ç®°üµØÖ·ºÍ½ð¶îʵʱ¸üР£¬¼«´ó¼ÓÇ¿¹¥»÷ÊÊÓ¦ÐÔ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬¸Ã¶ñÒâÈí¼þ²»½ö¾ß±¸ÊµÊ±´«ÊäÉ豸»î¶¯µÄÄÜÁ¦ £¬»¹Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâÎļþ £¬ÏÔÖø½µµÍ´«²¼Ãż÷ ¡£


https://hackread.com/android-hook-malware-variant-locks-devices-ransomware/


2. CISA½«CitrixÓëGit¸ßΣ·ì϶Ôö³¤µ½ÒÑÖªÀûÓ÷ì϶Ŀ¼


8ÔÂ26ÈÕ £¬ÃÀ¹úÍøÂ簲ȫÓë»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Èý¸ö¸ßΣ·ì϶ÄÉÈëÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ £¬Éæ¼°Citrix»á»°¼Í¼ϵͳºÍGit°æ±¾½ÚÔ칤¾ß £¬²¢Æ¾¾Ý¡¶Ô¼ÊøÐÔÔËÓªÖ¸ÁBOD£©22-01¡·ÒªÇóÁª¹ú»ú¹¹ÔÚ2025Äê9ÔÂ15ÈÕǰʵÏÖ½¨¸´ ¡£Õâ´Î¸üÐÂ͹ÏÔÁË»ìºÏ°ì¹«»·¾³ÏÂÆóÒµ»ù´¡ÉèÊ©Ãæ¶ÔµÄÐÂÐ͹¥»÷Ãæ·çÏÕ ¡£Õâ´ÎÊÕ¼µÄ·ì϶Ô̺¬Á½¸öCitrix Session RecordingȱµãºÍÒ»¸öGitÅäÖ÷ì϶ ¡£CVE-2024-8069£¨CVSS 5.1£©Îª·´ÐòÁл¯·ì϶ £¬ÔÊÐíͳһÄÚÍøÖÐÒÑͨ¹ýÉí·ÝÑéÖ¤µÄÓû§ÀûÓÃNetworkServiceÕË»§È¨ÏÞÖ´ÐÐÊÜÏÞÔ¶³Ì´úÂë £¬µ«Ðè¹¥»÷ÕßÔ¤ÏÈ»ñµÃÄÚÍø½Ó¼ûȨÏÞ ¡£Æä"Ðֵܷì϶"CVE-2024-8068£¨CVSS 5.1£©ÔòÉæ¼°È¨ÏÞÌáÉý £¬¹¥»÷ÕßÐèÓë»á»°¼Í¼·þÎñÆ÷´¦ÓÚͳһWindows Active DirectoryÓò £¬Í¨¹ý²»µ±È¨ÏÞÖÎÀí»ñÈ¡¸ü¸ßϵͳȨÏÞ ¡£¸ü¾ß¿í·ºÓ°ÏìµÄÊÇGit·ì϶CVE-2025-48384£¨CVSS 8.1£© ¡£¹¥»÷Õ߿ɻú¹ØÔ̺¬ÌØÊâCR×Ö·ûµÄ¶ñÒâ×ÓÄ£¿éõè¾¶ £¬²¢Í¨¹ý·ûºÅÁ´½ÓÖ¸Ïò×ÓÄ£¿éhooksĿ¼ ¡£Ò»µ©¿ª·¢Õ߿ˡ´ËÀà¶ñÒâ²Ö¿â £¬×ÓÄ£¿é³õʼ»¯Ê±½«×Ô¶¯´¥·¢hooksĿ¼ÖеĶñÒâpost-checkouthook¾ç±¾ £¬ÊµÏÖÎÞ¸ÐÖªµÄÔ¶³Ì´úÂëÖ´ÐÐ ¡£


https://securityaffairs.com/181551/uncategorized/u-s-cisa-adds-citrix-session-recording-and-git-flaws-to-its-known-exploited-vulnerabilities-catalog.html


3. QilinÀÕË÷×éÖ¯Ðû³ÆÈëÇÖ³ÛÃû¹«¹Ø¹«Ë¾Singer Associates


8ÔÂ28ÈÕ £¬³ÛÃûΣ»ú¹«¹Ø¹«Ë¾Singer AssociatesÔâ·êÀÕË÷Èí¼þ×éÖ¯QilinµÄÍøÂç¹¥»÷ £¬¸ÃÊÂÎñÒý·¢¶ÔÍøÂ簲ȫÓëóÒ×Â×ÀíµÄË«³Á¹Ø×¢ ¡£QilinÍÅ»ïÔÚÆä°µÍøÐ¹Â¶Æ½Ì¨°ä²¼²¼¸æ £¬Ðû³Æ³É¹¦ÈëÇÖSinger Associatesϵͳ £¬²¢¹«¿ª²¿ÃžݳÆÇÔÈ¡µÄÊý¾ÝƬ¶Î £¬Ô̺¬Ë¾·¨Îļþ½ØÍ¼¼°ÄÚ²¿µµ°¸ ¡£¸Ã×éÖ¯ÔÚÉêÃ÷ÖÐÖ¸¿ØSinger´æÔÚ"°Ñ³ÖÑ¡Ãñ¹æ»®¡¢Î±ÔìÐÅÏ¢¡¢ºýŪ¿Í»§"µÈ²»Â·µÂÐÔΪ £¬Ðû³ÆÒÑ»ñÈ¡"Ô̺¬¹«Ë¾È«ÊýÄÚ²¿ÔË×÷µÄµµ°¸" £¬Éæ¼°ÆäΪѩ·ðÁú¡¢°Ý¶ú¡¢°®±ËÓ­µÈ¿ç¹úÆóÒµ·þÎñµÄÕ½Êõϸ½Ú ¡£Ö»¹ÜÊý¾ÝÕæÊµÐÔÉÐδͨ¹ýÆëÈ«Ñù±¾ÑéÖ¤ £¬µ«Cybernews×êÑÐÍŶӷÖÎöÖ¸³ö £¬Ð¹Â¶ÎļþÏÔʾSingerÔøÎªÄÜÔ´¾ÞÍ·Ñ©·ðÁúÔì¶©Ó¦¶Ô¶ò¹Ï¶à¶û´«È¾ËßËϰ¸µÄÓßÂ۲ٿع滮 £¬Ô̺¬¼à¿Ø»·±£»î¶¯ÈËÊ¿¼°µ÷²éÔÞÖú·½¶¯Ïò ¡£¾ÝCybernews°µÍø¼à¿ØÊý¾ÝÏÔʾ £¬QilinÔÚ´Óǰ12¸öÔÂÄÚ¹¥»÷ÖÁÉÙ503¼Ò»ú¹¹ £¬Êܺ¦Õߺ­¸ÇÔìÒ©¡¢ÄÜÔ´¡¢Ã½Ìå¡¢Ò½ÁƵȶà¸öÁìÓò ¡£


https://cybernews.com/security/singer-associates-ransomware-attack-qilin/


4. ShadowSilkÀûÓÃTelegram»úеÈ˹¥»÷ÑÇÌ«µØÓòµÄ35¸ö×éÖ¯


8ÔÂ27ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾Group-IB½üÈÕÅû¼ûûΪShadowSilkµÄÐÂÐÍÍþв×éÖ¯ÔÚÖÐÑǼ°ÑÇÌ«µØÓò£¨APAC£©Õë¶Ôµ±¾Ö»ú¹¹ÌáÒ鶨Ïò¹¥»÷ £¬¸Ã×éÖ¯ÒÑÉøÈ볬¹ý30¸öÖ¸±ê £¬Ö÷Ì⶯»úΪÊý¾ÝÇÔÈ¡ ¡£Æä¼¼ÊõÕ»Ó빤¾ß¼¯ÓëYoroTrooper¡¢SturgeonPhisher¼°Silent LynxµÈÒÑÖªºÚ¿Í¼¯Ìå´æÔÚÏÔÖø³Áµþ £¬¹¥»÷ÁìÓò¸²¸ÇÎÚ×ȱð¿Ë˹̹¡¢¼ª¶û¼ªË¹Ë¹Ì¹¡¢Ãåµé¡¢Ëþ¼ª¿Ë˹̹¡¢°Í»ù˹̹¼°ÍÁ¿âÂü˹̹ £¬³ýµ±¾Ö»ú¹¹±í £¬ÄÜÔ´¡¢Ôì×÷¡¢ÁãÊÛºÍÔËÊäҵʵÌåÒàÔⲨ¼° ¡£¹¥»÷ÊÖ·¨·½Ãæ £¬ShadowSilkÒ»Á¬ÁËYoroTrooperµÄ¼¼ÊõÂöÂç £¬³õʼÈëÇÖͨ¹ýÓã²æÊ½´¹µöÓʼþͶµÝÊÜÃÜÂë±£»¤µÄѹËõÎļþ £¬¿ªÊÍ×Ô½ç˵¼ÓÔØÆ÷ºó £¬½«ºÅÁî½ÚÔ죨C2£©Á÷Á¿¼ÙװΪTelegram»úеÈËͨѶÒÔ¶ã±Ü¼ì²â ¡£¹¥»÷Õßͨ¹ýÅú¸ÄWindows×¢²á±íʵÏÖÓÆ¾Ã»¯×¤Áô £¬²¢ÀûÓÃDrupal£¨CVE-2018-7600/7602£©ºÍWP-Automatic²å¼þ·ì϶£¨CVE-2024-27956£©À©´ó¹¥»÷Ãæ ¡£Æä¹¤¾ßÁ´º­¸ÇÍøÂçɨÃ裨FOFA¡¢FscanµÈ£©¡¢·ì϶ÀûÓÿò¼Ü£¨Metasploit¡¢Cobalt Strike£©¼°°µÍø»ñÈ¡µÄJRATºÍMorf Project½ÚÔìÃæ°å £¬Êý¾ÝÇÔÈ¡»·½ÚÔò²¿Êð¶¨Ô칤¾ßÌáÈ¡ChromeÃÜÂë´æ´¢Îļþ¼°½âÃÜÃÜÔ¿ ¡£


https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html


5. ΢Èí½ÒʾStorm-0501ºÚ¿ÍתÏòÔÆ¶ËÀÕË÷Èí¼þ¹¥»÷


8ÔÂ27ÈÕ £¬Î¢Èí½üÈÕ°ä²¼»ã±¨ £¬½Òʾ³Ö¾Ã»îÔ¾µÄÀÕË÷Èí¼þ×éÖ¯Storm-0501Òѳ¹µ×תÐÍ £¬´Ó´«Í³±¾µØ¼ÓÃܹ¥»÷תÏò»ùÓÚÔÆµÄ¸´ÔÓÊý¾ÝÀÕË÷ģʽ ¡£Storm-0501µÄ×îй¥»÷Á´¾Û½¹»ìºÏÔÆ»·¾³ £¬Í¨¹ýÈëÇÖMicrosoft Defender·ì϶»ñÈ¡Active DirectoryÓëEntra ID×â»§½ÚÔìȨ ¡£¹¥»÷ÕßÊ×ÏÈÀûÓÃÇÔÈ¡µÄĿ¼ͬ²½ÕË»§£¨DSA£©½áºÏAzureHound¹¤¾ßö¾ÙÓû§È¨ÏÞÓëAzure×ÊÔ´ £¬×îÖÕËø¶¨²»×ã¶à³É·ÖÈÏÖ¤£¨MFA£©µÄÈ«¾ÖÖÎÀíÔ¹ØË»§ ¡£Í¨¹ý³ÁÖÃÖÎÀíÔ±ÃÜÂë²¢ÀÄÓÃMicrosoft.Authorization/elevateAccess/action½Ó¿Ú £¬¹¥»÷Õß½«×ÔÉíÌáÉýÖÁAzureËùÓÐÕß½ÇÉ« £¬È«ÃæÊÕÊÜÊܺ¦ÕßÔÆ»·¾³ ¡£ÕÆ¿ØÔƶËȨÏÞºó £¬Storm-0501·¢Õ¹Èý½×¶Î·ÛË飺Ê×ÏȽûÓð²È«·ÀÓùϵͳ £¬Æä´ÎÇÔÈ¡Azure´æ´¢ÕË»§ÖеÄÃô¸ÐÊý¾Ý £¬×îºóͨ¹ý·ÛËé´æ´¢¿ìÕÕ¡¢¸´Ô­±£Ë¾¿â¼°±¸·Ý½Úµã £¬×è¶ÏÊܺ¦ÕßÊý¾Ý¸´Ô­õè¾¶ ¡£Èô±¸·ÝÎÞ·¨É¾³ý £¬¹¥»÷ÕßÔò´´½¨ÐÂÃÜÔ¿¿âÓë¿Í»§ÖÎÀíÃÜÔ¿ £¬Ö±½Ó¼ÓÃÜÔÆÊý¾ÝʵÏÖ"ÔÆ¶ËËø¶¨" ¡£ÊµÏÖÊý¾ÝÇÔÈ¡Óë¼ÓÃܺó £¬Íþв×é֯ͨ¹ý±»¿ØµÄMicrosoft TeamsÕË»§ÁªÏµÊܺ¦Õß £¬ÕýʽÌá³öÊê½ðÒªÇó ¡£


https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/


6. ÈðµäÊÐÕþIT¾ÞÍ·ÔâÀÕË÷¹¥»÷ £¬200ÓàµØÓò·þÎṉ̃»¾


8ÔÂ27ÈÕ £¬Èðµä³ÁÒªÊÐÕþϵͳ¹©¸øÉÌMilj?data ½üÈÕÔâ·ê³Á´óÍøÂç¹¥»÷ £¬µ¼ÖÂÈ«¹ú200¶à¸öµØÓò¹«¹²·þÎñÅö±Ú £¬²¢Òý·¢Ãô¸ÐÊý¾Ýй¶·çÏÕ ¡£¸Ã¹«Ë¾ÎªÈðµäÔ¼80%µÄÊÐÕþ»ú¹¹Ìṩ¹¤×÷»·¾³ÓëÈËÁ¦×ÊÔ´ÖÎÀíϵͳ £¬Éæ¼°Ò½ÁÆÖ¤Ã÷´¦Öá¢Ö°ÒµÖÐÉËÉ걨¡¢¿µ¸´°¸ÀýÖÎÀíµÈÖ÷Ì⹫¹²·þÎñ ¡£¹¥»÷²úÉúÓÚÖÜÄ© £¬Ê×ϯִÐйÙErik Hall¨¦nÓÚ8ÔÂ25ÈÕ֤ʵϵͳ̱»¾ £¬²¢°µÊ¾ÕýÓë±í²¿×¨¼ÒºÏ×÷µ÷²éÊÂÎñÓ°ÏìÁìÓò¡¢¸´Ô­ÏµÍ³Ö°Äܲ¢È·ÈÏÊܺ¦ÕßÐÅÏ¢ ¡£ÀÕË÷Èí¼þÍÅ»ïÏò¸Ã¹«Ë¾Ë÷Òª1.5±ÈÌØ±Ò£¨Ô¼ºÏ16.8ÍòÃÀÔª£©Êê½ð £¬Íþв²»¸¶¿î½«¹«¿ªÇÔÈ¡µÄÊý¾Ý ¡£¾Ý±¾µØÃ½Ì屨· £¬¹þÀ¼¡¢¸çÌØÀ¼¡¢Ð»À³·òÌØ°ÂµÈ¶àµØÊÐÕþÒѰ䲼²¼¸æ £¬ÖҸ湫ÃñÃô¸ÐÓ×ÎÒÐÅÏ¢¿ÉÄÜÔâй¶ ¡£ÈðµäÃñ·À²¿³¤Carl-Oskar Bohlinͨ¹ýÉ罻ƽ̨°µÊ¾ £¬µ±¾ÖÕý½áºÏÍøÂ簲ȫӦ¼±»ú¹¹CERT-SEÆÀ¹ÀÊÂÎñÓ°Ïì £¬¾¯·½ÒàȾָµ÷²é £¬µ«Ä¿Ç°ÉÐδÃ÷È·ÏÖʵºó¹ûÁìÓò ¡£Õâ´Î¹¥»÷µ¼ÖÂMilj?data ¹Ù·½ÍøÕ¾ÀëÏß £¬Æäµç×ÓÓʼþ·þÎñÆ÷Òà´¦ÓÚ̱»¾×´Ì¬ £¬½øÒ»²½¼Ó¾çÁ˹µÍ¨Ó븴ԭÄѶÈ ¡£


https://www.bleepingcomputer.com/news/security/it-system-supplier-cyberattack-impacts-200-municipalities-in-sweden/