AIR-FIÊÖÒÕ¿ÉʹÓÃRAMÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý£»£»£» £»£»SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M

Ðû²¼Ê±¼ä 2020-12-17

1.еÄAIR-FIÊÖÒÕ¿ÉʹÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý


1.jpg


ÒÔÉ«ÁÐѧÕß·¢Ã÷еÄAIR-FIÊÖÒÕ£¬£¬£¬£¬£¬£¬ £¬£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£AIR-FIÊÖÒյĽ¹µãÊÇ£¬£¬£¬£¬£¬£¬ £¬£¬µ±µçÁ÷ͨ¹ýʱ£¬£¬£¬£¬£¬£¬ £¬£¬Èκεç×ÓÔª¼þ¶¼»á±¬·¢µç´Å²¨¡£¡£¡£¡£¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬£¬£¬£¬£¬£¬ £¬£¬¶øÎÞÏßµç»ù±¾ÉÏÊǵç´Å²¨£¬£¬£¬£¬£¬£¬ £¬£¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬ £¬£¬À´¿ÉÒÔʹÓÃRAM¿¨ÄÚ²¿µÄµçÁ÷±¬·¢ÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨¡£¡£¡£¡£¡£È»ºóʹÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄ×°±¸À´»ñÈ¡¸ÃÐźÅ£¬£¬£¬£¬£¬£¬ £¬£¬ÒԸߴï100 b/sµÄËÙÂÊÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/


2.ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª


2.jpg


ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃÁè¼Ý20¸öÄ£ÄâÆ÷ÓÕÆ­Áè¼Ý16000̨ÊÜѬȾµÄ×°±¸£¬£¬£¬£¬£¬£¬ £¬£¬Öظ´»á¼ûÊýǧ¸ö¿Í»§ÕÊ»§£¬£¬£¬£¬£¬£¬ £¬£¬½öÓö̶̼¸ÌìµÄʱ¼ä¾ÍÇÔÈ¡ÁËÊý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£¸Ãڲƭ»î¶¯ÀֳɵØÊµÏÖÁË×Ô¶¯»á¼ûÕÊ»§¡¢Æô¶¯ÉúÒâ¡¢ÎüÊÕºÍÇÔÈ¡2FAµÄÀú³Ì£¬£¬£¬£¬£¬£¬ £¬£¬²¢Ê¹ÓÃÇÔÈ¡µ½µÄ´úÂëÀ´Íê³É²»·¨ÉúÒâ¡£¡£¡£¡£¡£ÕâЩģÄâÆ÷ÉõÖÁÄܹ»Ê¹ÓÃÐéÄâרÓÃÍøÂ磨VPN£©Ð§ÀÍÀ´ÓÕÆ­ÊÜѬȾװ±¸µÄGPSλÖ㬣¬£¬£¬£¬£¬ £¬£¬ÒÔÒþ²ØÆä¶ñÒâ»î¶¯¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/emulated-mobile-devices-used-to-steal-millions-from-us-eu-banks/


3.½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬£¬£¬£¬£¬£¬ £¬£¬Í¨¹ýGitHubºÍPastebinÈö²¥


3.jpg


½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬£¬£¬£¬£¬£¬ £¬£¬Í¨¹ýGitHubºÍPastebinÈö²¥¡£¡£¡£¡£¡£Æä×î³õÊÇͨ¹ýX10-unix¾ÙÐÐÈö²¥µÄ£¬£¬£¬£¬£¬£¬ £¬£¬È»ºó´ÓGitHubÏÂÔØÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£Juniper³Æ£¬£¬£¬£¬£¬£¬ £¬£¬¸ÃÈ䳿Õë¶ÔWebÓ¦ÓóÌÐò¡¢IPÉãÏñ»úºÍ·ÓÉÆ÷µÈ¾ÙÐÐÁËһϵÁеĹ¥»÷£¬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÖÁÉÙ31¸öÒÑÖªÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÊÔͼ¹¥»÷¿ª·ÅµÄAndroid Debug BridgeÅþÁ¬ºÍÏÖÓеĶñÒâÈí¼þºóÃųÌÐò¡£¡£¡£¡£¡£Æ¾Ö¤JuniperµÄÔ¤¼Æ£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÁËÖÁÉÙ100¸ö²î±ðµÄËÞÖ÷À´¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/12/wormable-gitpaste-12-botnet-returns-to.html


4.ÐÂÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý


4.jpg


Ñо¿Ö°Ô±·¢Ã÷ÁËеÄÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸ÃÈí¼þ¿ÉÔÚAndroidºÍiOS°æ±¾ÖÐʹÓ㬣¬£¬£¬£¬£¬ £¬£¬Ö÷ÒªÕë¶ÔÖÐÎĵĹú¼Ò¡¢º«¹úºÍÈÕ±¾£¬£¬£¬£¬£¬£¬ £¬£¬Äܹ»´ÓÊÜѬȾµÄÊܺ¦ÕßÄÇÀïÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬ÀýÈçµç»°±êʶ·û¡¢ÁªÏµÈË¡¢SMSÐÂÎÅ¡¢ÕÕÆ¬ºÍλÖÃÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÉÐδÔÚAppleºÍGoogle¹Ù·½Ó¦ÓÃÊÐËÁÉϼÜ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬£¬£¬£¬ £¬£¬¸ÃÓ¦ÓóÌÐòµÄÊý¾Ý¿ÉÄܻᱻÓÃÓÚÀÕË÷Êܺ¦ÕßÒÔÖ§¸¶Ð¡¶îÊê½ð¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-goontact-spyware-discovered-targeting-android-and-ios-users/


5.SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M


5.jpg


SophosºÍReversingLabsÁªºÏÐû²¼Á˰üÀ¨1000Íò¸ö¶ñÒâÈí¼þÑù±¾µÄSoReL-20MÊý¾Ý¿â¡£¡£¡£¡£¡£SoReL-20MΪһ×é¾­ÓÉÕûÀíºÍ±ê¼ÇµÄÑù±¾ºÍÇå¾²Ïà¹ØÔªÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬¿ÉÓÃÓÚ·´¶ñÒâÈí¼þ½â¾ö¼Æ»®ÖÐʹÓõĻúеѧϰÒýÇæµÄѵÁ·Êý¾Ý¼¯¡£¡£¡£¡£¡£°üÀ¨ÁË2000Íò¸öWindows Portable¿ÉÖ´ÐÐÎļþµÄÔªÊý¾Ý¡¢±êÇ©ºÍ¹¦Ð§£¬£¬£¬£¬£¬£¬ £¬£¬ÆäÖаüÀ¨1000Íò¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£ReversinglabsÌåÏÖÕâЩÊý¾Ý¿ÉΪ¿Í»§ÌṩÃ÷È·µÄÍþвÇ鱨Êý¾Ý¼¯£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÔÚËûÃǵķÀÓùÖÐʩչ×÷Óᣡ£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112302/malware/sorel-20m-free-malware-dataset.html


6.CybelAngelÔÚÍøÉÏ·¢Ã÷Áè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ


6.jpg


CybelAngelÔÚÍøÉÏ·¢Ã÷ÁËÁè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ£¨°üÀ¨XÉäÏߺÍCTɨÃ裩¡£¡£¡£¡£¡£ÕâЩҽѧͼÏñµÄÿÌõ¼Í¼Óжà´ï200ÐеÄÔªÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨¸öÐÕÃû¡¢³öÉúÈÕÆÚºÍµØµãµÈPII(СÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©ºÍPHIÉí¸ß£¬£¬£¬£¬£¬£¬ £¬£¬ÌåÖØºÍÕï¶ÏµÈPHI£¨Ð¡ÎÒ˽¼ÒÒ½ÁÆÐÅÏ¢£©£¬£¬£¬£¬£¬£¬ £¬£¬ÇÒÎÞÐèÓû§Ãû»òÃÜÂë¼´¿É»á¼û¡£¡£¡£¡£¡£CybelAngel³ÆÕâЩÊý¾Ý¿É±»ÓÃÓÚڲƭ»î¶¯£¬£¬£¬£¬£¬£¬ £¬£¬»òÔÚ°µÍøÉϾÙÐгöÊÛ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cybelangel.com/blog/medical-data-leaks/