AIR-FIÊÖÒÕ¿ÉʹÓÃRAMÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý£»£»£»£»£»SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M
Ðû²¼Ê±¼ä 2020-12-171.еÄAIR-FIÊÖÒÕ¿ÉʹÓÃRAMÀ´ÇÔÈ¡ÆøÏ¶ÏµÍ³ÖÐÊý¾Ý

ÒÔÉ«ÁÐѧÕß·¢Ã÷еÄAIR-FIÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬¿É½«RAM¿¨×ª»»ÎªÎÞÏß·¢ÉäÆ÷£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚûÓÐWi-Fi¿¨µÄ·ÇÁªÍøÆøÏ¶ÏµÍ³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£AIR-FIÊÖÒյĽ¹µãÊÇ£¬£¬£¬£¬£¬£¬£¬£¬µ±µçÁ÷ͨ¹ýʱ£¬£¬£¬£¬£¬£¬£¬£¬Èκεç×ÓÔª¼þ¶¼»á±¬·¢µç´Å²¨¡£¡£¡£¡£¡£Wi-FiÐźÅÊÇÎÞÏߵ粨£¬£¬£¬£¬£¬£¬£¬£¬¶øÎÞÏßµç»ù±¾ÉÏÊǵç´Å²¨£¬£¬£¬£¬£¬£¬£¬£¬Òò´Ë¹¥»÷Õß¿ÉÒÔͨ¹ýÏòÆøÏ¶ÏµÍ³ÖÐÖ²Èë¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬£¬À´¿ÉÒÔʹÓÃRAM¿¨ÄÚ²¿µÄµçÁ÷±¬·¢ÇкÏÕý³£µÄwifiÐÅºÅÆµÆ×µÄµç´Å²¨¡£¡£¡£¡£¡£È»ºóʹÓÃÆøÏ¶ÏµÍ³´øÓÐWi-FiÌìÏßµÄ×°±¸À´»ñÈ¡¸ÃÐźţ¬£¬£¬£¬£¬£¬£¬£¬ÒԸߴï100 b/sµÄËÙÂÊÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/
2.ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª

ºÚ¿ÍʹÓÃÄ£ÄâÆ÷´Ó¶à¼ÒÎ÷Å·ÒøÐÐÇÔÈ¡Êý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃÁè¼Ý20¸öÄ£ÄâÆ÷ÓÕÆÁè¼Ý16000̨ÊÜѬȾµÄ×°±¸£¬£¬£¬£¬£¬£¬£¬£¬Öظ´»á¼ûÊýǧ¸ö¿Í»§ÕÊ»§£¬£¬£¬£¬£¬£¬£¬£¬½öÓö̶̼¸ÌìµÄʱ¼ä¾ÍÇÔÈ¡ÁËÊý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£¸ÃڲƻÀֳɵØÊµÏÖÁË×Ô¶¯»á¼ûÕÊ»§¡¢Æô¶¯ÉúÒâ¡¢ÎüÊÕºÍÇÔÈ¡2FAµÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÇÔÈ¡µ½µÄ´úÂëÀ´Íê³É²»·¨ÉúÒâ¡£¡£¡£¡£¡£ÕâЩģÄâÆ÷ÉõÖÁÄܹ»Ê¹ÓÃÐéÄâרÓÃÍøÂ磨VPN£©Ð§ÀÍÀ´ÓÕÆÊÜѬȾװ±¸µÄGPSλÖ㬣¬£¬£¬£¬£¬£¬£¬ÒÔÒþ²ØÆä¶ñÒâ»î¶¯¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/emulated-mobile-devices-used-to-steal-millions-from-us-eu-banks/
3.½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýGitHubºÍPastebinÈö²¥

½©Ê¬ÍøÂçGitpaste-12»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýGitHubºÍPastebinÈö²¥¡£¡£¡£¡£¡£Æä×î³õÊÇͨ¹ýX10-unix¾ÙÐÐÈö²¥µÄ£¬£¬£¬£¬£¬£¬£¬£¬È»ºó´ÓGitHubÏÂÔØÏÂÒ»½×¶ÎµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£Juniper³Æ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÈ䳿Õë¶ÔWebÓ¦ÓóÌÐò¡¢IPÉãÏñ»úºÍ·ÓÉÆ÷µÈ¾ÙÐÐÁËһϵÁеĹ¥»÷£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÖÁÉÙ31¸öÒÑÖªÎó²î£¬£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼ¹¥»÷¿ª·ÅµÄAndroid Debug BridgeÅþÁ¬ºÍÏÖÓеĶñÒâÈí¼þºóÃųÌÐò¡£¡£¡£¡£¡£Æ¾Ö¤JuniperµÄÔ¤¼Æ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʹÓÃÁËÖÁÉÙ100¸ö²î±ðµÄËÞÖ÷À´¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/12/wormable-gitpaste-12-botnet-returns-to.html
4.ÐÂÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý

Ñо¿Ö°Ô±·¢Ã÷ÁËеÄÌØ¹¤Èí¼þGoontactÕë¶ÔÑÇÖÞµØÇøÓû§ÍøÂçÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸ÃÈí¼þ¿ÉÔÚAndroidºÍiOS°æ±¾ÖÐʹÓ㬣¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÐÎĵĹú¼Ò¡¢º«¹úºÍÈÕ±¾£¬£¬£¬£¬£¬£¬£¬£¬Äܹ»´ÓÊÜѬȾµÄÊܺ¦ÕßÄÇÀïÍøÂçÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçµç»°±êʶ·û¡¢ÁªÏµÈË¡¢SMSÐÂÎÅ¡¢ÕÕÆ¬ºÍλÖÃÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÉÐδÔÚAppleºÍGoogle¹Ù·½Ó¦ÓÃÊÐËÁÉϼܡ£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓóÌÐòµÄÊý¾Ý¿ÉÄܻᱻÓÃÓÚÀÕË÷Êܺ¦ÕßÒÔÖ§¸¶Ð¡¶îÊê½ð¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-goontact-spyware-discovered-targeting-android-and-ios-users/
5.SophosºÍReversingLabsÐû²¼¶ñÒâÈí¼þÊý¾Ý¼¯SoReL-20M

SophosºÍReversingLabsÁªºÏÐû²¼Á˰üÀ¨1000Íò¸ö¶ñÒâÈí¼þÑù±¾µÄSoReL-20MÊý¾Ý¿â¡£¡£¡£¡£¡£SoReL-20MΪһ×é¾ÓÉÕûÀíºÍ±ê¼ÇµÄÑù±¾ºÍÇå¾²Ïà¹ØÔªÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ·´¶ñÒâÈí¼þ½â¾ö¼Æ»®ÖÐʹÓõĻúеѧϰÒýÇæµÄѵÁ·Êý¾Ý¼¯¡£¡£¡£¡£¡£°üÀ¨ÁË2000Íò¸öWindows Portable¿ÉÖ´ÐÐÎļþµÄÔªÊý¾Ý¡¢±êÇ©ºÍ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨1000Íò¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¡£ReversinglabsÌåÏÖÕâЩÊý¾Ý¿ÉΪ¿Í»§ÌṩÃ÷È·µÄÍþвÇ鱨Êý¾Ý¼¯£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚËûÃǵķÀÓùÖÐʩչ×÷Óᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112302/malware/sorel-20m-free-malware-dataset.html
6.CybelAngelÔÚÍøÉÏ·¢Ã÷Áè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ

CybelAngelÔÚÍøÉÏ·¢Ã÷ÁËÁè¼Ý4500ÍòÕÅ̻¶µÄҽѧͼÏñ£¨°üÀ¨XÉäÏߺÍCTɨÃ裩¡£¡£¡£¡£¡£ÕâЩҽѧͼÏñµÄÿÌõ¼Í¼Óжà´ï200ÐеÄÔªÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¸öÐÕÃû¡¢³öÉúÈÕÆÚºÍµØµãµÈPII(СÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©ºÍPHIÉí¸ß£¬£¬£¬£¬£¬£¬£¬£¬ÌåÖØºÍÕï¶ÏµÈPHI£¨Ð¡ÎÒ˽¼ÒÒ½ÁÆÐÅÏ¢£©£¬£¬£¬£¬£¬£¬£¬£¬ÇÒÎÞÐèÓû§Ãû»òÃÜÂë¼´¿É»á¼û¡£¡£¡£¡£¡£CybelAngel³ÆÕâЩÊý¾Ý¿É±»ÓÃÓÚڲƻ£¬£¬£¬£¬£¬£¬£¬£¬»òÔÚ°µÍøÉϾÙÐгöÊÛ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cybelangel.com/blog/medical-data-leaks/


¾©¹«Íø°²±¸11010802024551ºÅ