APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾

Ðû²¼Ê±¼ä 2021-12-30

APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾


APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ìع¤APT×éÖ¯BlackTechʹÓÃFlagpro¹¥»÷ÈÕ±¾µÄ¹«Ë¾¡£¡£¡£´Ë´Î¹¥»÷µÄ³õʼѬȾǰÑÔÊÇαװ³ÉÀ´×ÔÄ¿µÄÏàÖúͬ°éµÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬Ö®ºó¹¥»÷Õß»áʹÓÃFlagpro¾ÙÐÐÍøÂçÕì̽¡¢ÆÀ¹ÀÄ¿µÄÇéÐÎÒÔ¼°ÏÂÔØ²¢Ö´Ðеڶþ½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¾ÝNTT Security³Æ£¬£¬£¬£¬£¬´Ë´Î»î¶¯ÖÁÉÙʼÓÚ2020Äê10Ô£¬£¬£¬£¬£¬ÒÑÕë¶ÔÈÕ±¾¹«Ë¾Ò»Äê¶à£¬£¬£¬£¬£¬Éæ¼°¹ú·ÀÊÖÒÕ¡¢Ã½ÌåºÍͨѶÐÐÒµÔÚÄڵĶà¸öÁìÓò¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-flagpro-malware-linked-to-chinese-state-backed-hackers/


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯


Morphus Labs·¢Ã÷¶à¸öʹÓÃMSBuildµÄ¹¥»÷»î¶¯.png


12ÔÂ27ÈÕ£¬£¬£¬£¬£¬Morphus LabsºÍSANS ISCÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬ÔÚÒÑÍùÒ»ÖÜÖмì²âµ½2¸öʹÓÃMicrosoft Build Engine(MSBuild)µÄ¹¥»÷»î¶¯¡£¡£¡£ÔÚÕâЩ»î¶¯ÖУ¬£¬£¬£¬£¬¹¥»÷Õßͨ³£ÏÈʹÓÃÔ¶³Ì×ÀÃæÐ­Òé(RDP)ÕÊ»§»á¼ûÄ¿µÄÇéÐΣ¬£¬£¬£¬£¬È»ºóʹÓÃÔ¶³ÌWindowsЧÀÍ(SCM)¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬£¬×îºóʹÓÃMSBuildÖ´ÐÐCobalt Strike Beacon¡£¡£¡£¹¥»÷ÖÐʹÓõĶñÒâMSBuildÏîÄ¿¿ÉÒÔ±àÒëºÍÖ´ÐÐÌØ¶¨µÄC#´úÂ룬£¬£¬£¬£¬½ø¶ø½âÂëºÍÖ´ÐÐCobalt Strike¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actors-abuse-msbuild-cobalt-strike-beacon-execution


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶


T-MobileÒòÔâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬Óû§ÐÅÏ¢ÔÙ´Îй¶.png


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬T-Mobile½²»°ÈË֤ʵÆä²¿·ÖÓû§Ôâµ½SIM½»Á÷¹¥»÷£¬£¬£¬£¬£¬ÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£T-Mobile³ÆÆäÍŶÓÔÚ·¢Ã÷ÎÊÌâºóÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£¬£¬£¬£¬£¬²¢ÒÑ×Ô¶¯½ÓÄÉÌØÁíÍâ±£»£»£»£»£» £»¤²½·¥¡£¡£¡£µ±±»ÒªÇóÌṩÓйØÊÜÓ°ÏìÓû§ÊýÄ¿ÒÔ¼°¹¥»÷ÕߵĹ¥»÷·½·¨Ê±£¬£¬£¬£¬£¬T-Mobile¾Ü¾øÌṩ¸ü¶àÏêϸÐÅÏ¢¡£¡£¡£T-MobileÒѱ¬·¢¶à´ÎÐÅϢй¶£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓë½ñÄê2Ô·ݵÄй¶ÊÂÎñºÜÊÇÏàËÆ£¬£¬£¬£¬£¬ÆäʱÒòSIM½»Á÷¹¥»÷й¶400¸öÓû§µÄÐÅÏ¢¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-says-new-data-breach-caused-by-sim-swap-attacks/


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ


Galaxy Store±£´æ¶à¸öαÔì³ÉShowBoxµÄ¶ñÒâÓ¦ÓÃ.png


ýÌå12ÔÂ28Èճƣ¬£¬£¬£¬£¬ÈýÐǵĹٷ½AndroidÓ¦ÓóÌÐòÊÐËÁGalaxy Store±£´æ¶à¸ö¶ñÒâÓ¦Óᣡ£¡£ÕâЩӦÓÃαװ³ÉÒÑÓÚ2018ÄêÐÝÒµµÄµÁ°æÓ¦ÓÃShowBox£¬£¬£¬£¬£¬ÒÑÔÚ¶à¸öÓû§µÄ×°±¸ÉÏ´¥·¢Google Play Protect¾¯±¨¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ÕâЩӦÓÃÖ®ÒÔÊǻᴥ·¢¾¯±¨£¬£¬£¬£¬£¬ÊÇÓÉÓÚËüÃÇÇëÇó¾ßÓÐ×°ÖöñÒâÈí¼þΣº¦µÄȨÏÞ£¬£¬£¬£¬£¬µ±Óû§ÔÊÐíºóËüÃǾͿÉÒÔ»á¼ûÁªÏµÈËÁбíºÍͨ»°¼Í¼¡¢Ö´ÐдúÂë¡¢»ñÈ¡¶ñÒâÈí¼þpayloadµÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/riskware-android-streaming-apps-found-on-samsungs-galaxy-store/


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷


ÃÀ¹úSLGAÕýÔÚ×ÅÊÖÊÓ²ìÆäÊ¥µ®½Úʱ´úÔâµ½µÄÍøÂç¹¥»÷.png


¾ÝýÌå12ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÈøË¹¿¦³¹ÎÂÊ¡¾ÆÀàºÍ²©²ÊÖÎÀí¾Ö£¨SLGA£©ÕýÔÚ×ÅÊÖÊÓ²ìÆäÔâµ½µÄÍøÂç¹¥»÷¡£¡£¡£SLGAÊÇÃÀ¹ú²ÆÎñ²¿»Ê¹Ú¹«Ë¾ÈÏÕæ·ÖÏú¡¢¿ØÖƺÍî¿Ïµ¾Æ¾«ÒûÁÏ¡¢´óÂéºÍ´ó´ó¶¼¶Ä²©µÄ»ú¹¹£¬£¬£¬£¬£¬Î»ÓÚ¼ÓÄôóµÄÈøË¹¿¦³¹ÎÂÊ¡¡£¡£¡£¹¥»÷±¬·¢ÔÚ12ÔÂ25ÈÕ£¬£¬£¬£¬£¬SLGAÌåÏÖ£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾÏÖÔÚûÓÐÈκοͻ§¡¢Ô±¹¤»òÆäËüÊý¾Ý±»ÀÄÓ㬣¬£¬£¬£¬ÔÚÍê³É¶Ô¸ÃÊÂÎñµÄÆÀ¹Àºó£¬£¬£¬£¬£¬½«Á¢×ÝÈ»ÊÜÓ°ÏìµÄÏµÍ³ÖØÐÂÉÏÏß¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://globalnews.ca/news/8477174/slga-investigating-christmas-day-cybersecurity-incident/


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö


Ñо¿ÍŶÓÅû¶EquationʹÓõÄDanderSpritzµÄÊÖÒÕÆÊÎö.png


12ÔÂ27ÈÕ£¬£¬£¬£¬£¬Check PointÅû¶Equation GroupʹÓõÄÈ«¹¦Ð§¶ñÒâÈí¼þ¿ò¼ÜDanderSpritzµÄÊÖÒÕÆÊÎö¡£¡£¡£DanderSpritzÓÚ2017Äê4ÔÂ14ÈÕ±»Shadow Brokers¹ûÕæ£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚ³¤ÆÚÐÔ¡¢Õì̽¡¢ºáÏòÒÆ¶¯¡¢Èƹýɱ¶¾ÒýÇæµÈ»î¶¯µÄ¶àÖÖ¹¤¾ß¡£¡£¡£¸ÃÑо¿ÖصãÆÊÎöÆäÖеÄÒ»¸ö×é¼þDoubleFeature£¬£¬£¬£¬£¬ËüÓÃÀ´ÌìÉú¿É×°ÖÃÔÚÄ¿µÄ×°±¸ÖеŤ¾ßÀàÐ͵ÄÈÕÖ¾ºÍ±¨¸æ£¬£¬£¬£¬£¬²¢»áÍøÂç´ó×ÚÖÖÖÖÀàÐ͵ÄÊý¾Ý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/a-deep-dive-into-doublefeature-equation-groups-post-exploitation-dashboard/