¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»HSMÑÏÖØÎó²î£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆ·þÎñÉ̺ÍÕþ¸®»ú¹¹
Ðû²¼Ê±¼ä 2019-06-101.¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ
¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÊ¹ÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ï죬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅưüÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/2.΢ÈíÖÒÑÔʹÓÃOfficeÎó²îµÄÀ¬»øÓʼþÔ˶¯£¬Ö÷ÒªÃé׼ŷÖÞ
6ÔÂ7ÈÕÍí΢ÈíÐû²¼ÁËÒ»ÔòÕë¶ÔÅ·Ö޵ĻîÔ¾À¬»øÓʼþÔ˶¯µÄÖÒÑÔ¡£Æ¾Ö¤¸ÃÖÒÑÔ£¬¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨OfficeºÍWordpadÎó²î£¨CVE-2017-11882£©µÄRTF¸½¼þѬȾÊܺ¦Õß¡£µ±Êܺ¦Õß·¿ªÓʼþÖеĸ½¼þʱ£¬¶ñÒâRTFÎĵµ½«Ö´Ðвî±ðÀàÐ͵ľ籾£¨°üÀ¨VBScript¡¢PowerShell¡¢PHPµÈ£©ÒÔÏÂÔØºÍÖ´ÐжñÒâpayload¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-warning-on-spam-campaign-using-office-exploits/3.ÐÂÍøÂç´¹ÂÚÔ˶¯£¬Î±×°³É¶à¸öÀÃÀ¹ú¼ÒµÄÕþ¸®²É¹ºÍøÕ¾
5ÔÂ28ÈÕAnomaliÑо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉÄ«Î÷¸ç¡¢ÃØÂ³ºÍÎÚÀ¹çµÄÕþ¸®²É¹ºÍøÕ¾µÄ´¹ÂÚ¹¥»÷Ô˶¯¡£¹¥»÷ÕßʹÓÃÖÆ×÷ÓÅÒìµÄ´¹ÂÚÍøÕ¾£¬Ô¼ÇëСÎÒ˽¼Ò»ò¹«Ë¾¼ÓÈëÕâЩ¹ú¼ÒµÄÕþ¸®¾º±êÏîÄ¿£¬µ«ÏÖʵÉÏÊÇΪÁËÇÔÈ¡Óû§µÄÕË»§Æ¾Ö¤¡£Ôڸù¥»÷Ô˶¯ÖУ¬¹¥»÷ÕßʹÓÃÁù¸ö²î±ðµÄÓòÃû£¨ÆÊÎöÔÚÈý¸ö²î±ðµÄIPµØµãÉÏ£©ÍйÜÁË16¸ö²î±ðµÄ´¹ÂÚÍøÒ³¡£Æ¾Ö¤Ïà¹ØÊÖÒÕÆÊÎö£¬¹¥»÷ÕßÔÚÉèÖÃDNSÉèÖÃʱÖÁÉÙʹÓÃÁËÈý¸ö¿ÉÒɵĵç×ÓÓʼþµØµã¡£
ÔÎÄÁ´½Ó£º
https://www.anomali.com/blog/phishing-campaign-impersonates-mexico-peru-uruguay-governments-e-procurement-systems4.ICEFOG APT¶ñÒ⹤¾ßÔÚй¥»÷Ô˶¯ÖÐÔٴηºÆð
FireEyeÑо¿Ö°Ô±Chi-en (Ashley) Shen·¢Ã÷ICEFOG APTʹÓõĶñÒâÈí¼þÔÚÏûÊŶàÄêºóÔٴηºÆðÔÚÐµĹ¥»÷Ô˶¯ÖС£ICEFOG¶ñÒâÈí¼þÊ״ηºÆðÓÚ2013Äê9Ô¿¨°Í˹»ùµÄÑо¿±¨¸æ£¬²¢Ôڸñ¨¸æÐû²¼ºó×èÖ¹ÁËÔ˶¯¡£ÏÖÔÚÑо¿Ö°Ô±·¢Ã÷ICEFOGµÄÁ½¸öеıäÖÖ£¨ICEFOG-PºÍICEFOG-M£©£¬ÕâÁ½¸ö±äÖÖ»®·Ö±»ÓÃÓÚ´Ó2014ÄêºÍ2018Äê×îÏȵĹ¥»÷ÖС£ÕâÁ½¸ö±äÖÖ¶¼ÓÅÓÚÔʼµÄICEFOG£¬Òâζ׏¥»÷ÕßÒѾÙÐÐÌØÁíÍ⿪·¢ÊÂÇéÒÔÔöÇ¿Æä¹¦Ð§¡£±ðµÄ£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÒÔǰδ·ºÆð¹ýµÄMac°æICEFOG±äÖÖ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/5.¹úÌ©º½¿ÕÆØ±£´æÊ®ÄêµÄδÐÞ²¹Îó²î£¬µ¼ÖÂ2018ÄêµÄÊý¾Ýй¶
Ñо¿Ö°Ô±Kai-yi WongÐû²¼ÁËÕë¶Ô¹úÌ©º½¿Õ2018ÄêÊý¾Ýй¶ÊÂÎñµÄÊӲ챨¸æ¡£Æ¾Ö¤¸Ã±¨¸æ£¬¹¥»÷ÕßÓÚ2014Äê10ÔÂÊ״ν«Ò»¸ö¼üÅ̼ͼÆ÷Ö²Èë¹úÌ©º½¿ÕµÄϵͳ¡£¸ÃľÂíʹµÃ¹¥»÷Õß¿ÉÒÔÔÚÍøÂçÖкáÏòÒÆ¶¯²¢ÇÒÍøÂçÆ¾Ö¤ÐÅÏ¢£¨Ö±ÖÁ2018Äê3ÔÂ22ÈÕ£©¡£È»ºó¹¥»÷ÕßʹÓ÷þÎñÆ÷ÉÏÒ»¸ö±£´æ10ÄêÖ®¾ÃµÄÎó²î£¬Èƹý·þÎñÆ÷ÉϵÄÉí·ÝÑéÖ¤²¢ÇÒ»á¼ûÁËÖÎÀí¹¤¾ß¡£½øÒ»²½µÄ±¨¸æÖ¸³ö¹²ÓÐ41¸öÕË»§µÄƾ֤±»ÇÔ£¬°üÀ¨ÖÎÀíÔ±ÕË»§¡¢ÍøÂçÕË»§ºÍ·þÎñÕË»§¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cathay-pacifics-unpatched-decade-old-vulnerability-led-to-2018-breach/6.HSMÑÏÖØÎó²î£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆ·þÎñÉ̺ÍÕþ¸®»ú¹¹
LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿é£©ÖеÄÑÏÖØÎó²î£¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉ̵ȡ£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/


¾©¹«Íø°²±¸11010802024551ºÅ