eXotic VisitÕë¶ÔÓ¡¶ÈºÍ°Í»ù˹̹µÄ Android Óû§
Ðû²¼Ê±¼ä 2024-04-161. eXotic VisitÕë¶ÔÓ¡¶ÈºÍ°Í»ù˹̹µÄ Android Óû§
4ÔÂ10ÈÕ£¬Ò»¸öÃûΪ eXotic Visit µÄ»îÔ¾ Android ¶ñÒâÈí¼þ»î¶¯Ö÷ÒªÕë¶ÔÄÏÑÇÓû§£¬ÌرðÊÇÓ¡¶ÈºÍ°Í»ù˹̹µÄÓû§£¬¶ñÒâÈí¼þͨ¹ýרÃÅÍøÕ¾ºÍ Google Play É̵ê·Ö·¢¡£Ä³ÍøÂçÄþ¾²¹«Ë¾ÌåÏÖ£¬ÕâÏî»î¶¯×Ô 2021 Äê 11 ÔÂÒÔÀ´Ò»Ö±ÔÚ½øÐУ¬ÓëÈκÎÒÑÖªµÄÍþвÐÐΪÕß»ò×éÖ¯Î޹ء£ËüÕýÔÚ×·×ÙÃûΪVirtual InvadersµÄÐж¯±³ºóµÄ×éÖ¯¡£¾Ý³Æ£¬¸Ã»î¶¯¾ßÓкÜÇ¿µÄÕë¶ÔÐÔ£¬Google Play ÉÏÌṩµÄÓ¦Ó÷¨Ê½µÄ°²×°ÊýÁ¿Î¢ºõÆä΢£¬´Ó 0 µ½ 45 ²»µÈ¡£ÕâЩӦÓ÷¨Ê½Òѱ»Ï¼ܡ£ÕâЩÐé¼Ùµ«ÊµÓõÄÓ¦Ó÷¨Ê½Ö÷Ҫαװ³ÉÏûÏ¢·þÎñ£¬ÀýÈç Alpha Chat¡¢ChitChat¡¢Defcom¡¢Dink Messenger¡¢Signal Lite¡¢TalkU¡¢WeTalk¡¢Wicker Messenger ºÍ Zaangi Chat¡£¾Ý³Æ£¬Ô¼Äª 380 ÃûÊܺ¦ÕßÏÂÔØÁËÕâЩӦÓ÷¨Ê½²¢´´½¨ÁËÕÊ»§£¬ÒÔʹÓÃËüÃÇ·¢ËÍÏûÏ¢¡£
https://thehackernews.com/2024/04/exotic-visit-spyware-campaign-targets.html?&web_view=true
2. GSMA Ðû²¼Òƶ¯ÍþвÇ鱨¿ò¼Ü
4ÔÂ10ÈÕ£¬GSM лáµÄÆÛÕ©ºÍÄþ¾²Ð¡×é (FASG) Ðû²¼Á˵ÚÒ»°æ¿ò¼Ü£¬ÓÃÓÚÒԽṹ»¯·½Ê½ÃèÊö¶ÔÊÖÈçºÎƾ¾ÝËûÃÇʹÓõļÆı¡¢¼¼ÊõºÍ·¨Ê½ (TTP) ¹¥»÷ºÍʹÓÃÒƶ¯ÍøÂç¡£Òƶ¯ÍþвÇ鱨¿ò¼Ü (MoTIF) רעÓÚÓëÒƶ¯ÍøÂçÏà¹ØµÄ¹¥»÷£¬ÕâЩ¹¥»÷ÉÐδ±»MITRE ATT&CK£¨ÊÊÓÃÓÚÆóÒµºÍÒƶ¯£©ºÍMITRE FiGHTµÈÏÖÓй«¹²¿ò¼Üº¸Ç¡£·¶Î§°üÂÞ 2G¡¢3G¡¢4G¡¢5G£¬°üÂÞËùÓÐÀàÐ͵ĵçÐÅ·þÎñÍƶ¯Õߣ¨ÀýÈçÂþÓΡ¢SMS¡¢VoIP£©ºÍδÀ´Òƶ¯¼¼ÊõµÄÑݽø¡£»¹°üÂÞÕë¶ÔÒƶ¯ÍøÂç¼°Æä¿Í»§µÄÆÛÕ©¹¥»÷¡£MoTIF ÔÔòÌṩÁË MoTIF µÄ¸ÅÊö£¬²¢½ç˵ÁË¿ò¼ÜÖÐÖ¸¶¨µÄ¼¼ÊõºÍ×Ó¼¼Êõ¡£
https://www.helpnetsecurity.com/2024/04/10/gsma-mobile-threat-intelligence-framework/?web_view=true
3. µØÔµÕþÖνôÕžÖÊƼӾç OT ÍøÂç¹¥»÷
4ÔÂ15ÈÕ£¬¹ýÈ¥¼¸Ä꣬³öÓÚÕþÖζ¯»ú¡¢Ôì³ÉÈËÉíºó¹ûµÄºÚ¿Í¹¥»÷ÓÐËùÔö¼Ó¡£¼¸ºõËùÓÐÕâЩϮ»÷¶¼Óë¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼»òÕýÔÚ½øÐеÄÒÁÀÊ/ÒÔÉ«ÁгåÍ»Óйء£´ÓÀúÊ·ÉÏ¿´£¬ÕâЩ¹¥»÷²¢²»ÊǷdz£ÅӴ󣬵«Ã¿¸öÈ˶¼ÔÚ¹Ø×¢´óÐÍÓïÑÔÄ£ÐÍÈ˹¤ÖÇÄܵķºÆ𣬿´¿´ÕâЩÈ˹¤ÖÇÄÜÊÇ·ñ»áÈúڿÍÐж¯Ö÷ÒåÕß±äµÃÔ½·¢Ç¿´ó¡£ÀÕË÷Èí¼þÊÇ×ï¿ý»öÊס£È»¶ø£¬ÀÕË÷Èí¼þÀúÀ´Íƶ¯Á˾ßÓÐ OT ºó¹ûµÄ¹¥»÷µÄ¸´ºÏÄêÔö³¤Âʸü¸ß¡£19% µÍÓÚÎÒÃǽñÄêµÄÔ¤ÆÚ£¬ÎÒÃǽ«ÕâÒ»²îÒì¹éÒòÓÚ¼ÆıµÄת±ä¡£ÀÕË÷Èí¼þ¶Ô OT µÄÓ°ÏìºÜ´óÒ»²¿ÃÅÊÇÓÉÓÚÒÀÀµÐÔ¡£ÀÕË÷Èí¼þ¹¥»÷ IT ÍøÂ磬¼ÓÃÜ´óÁ¿ÄÚÈÝ£¬´Ó¶øµ¼Ö´óÁ¿ IT ·þÎñÆ÷ºÍ·þÎṉ̃»¾¡£OT ¹Ø±Õ¡£ÎªÊ²Ã´£¿ÊÂʵ֤Ã÷£¬ÎÒÃÇµÄ OT ×Ô¶¯»¯ÏµÍ³ÐèҪһЩÒṈ̃»¾µÄ IT ·þÎñ¡£
https://www.helpnetsecurity.com/2024/04/15/andrew-ginter-waterfall-security-ot-cyber-attacks/
4. WikiLoader ͨ¹ýÎı¾±à¼Æ÷ Notepad++ ½øÐÐÁ÷´«
4ÔÂ14ÈÕ£¬AhnLab Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐĵÄÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÕë¶Ô¹ã·ºÊ¹ÓÃµÄ Notepad++ Îı¾±à¼Æ÷µÄÅÓ´ó¶ñÒâÈí¼þ»î¶¯¡£ÕâÖÖ¹¥»÷µÄºËÐÄÊÇÒ»ÖÖ³ÆΪ DLL ½Ù³ÖµÄ¼¼Êõ¡£¹¥»÷ÕßÃØÃÜÐÞ¸ÄÁËĬÈϵÄNotepad++²å¼þ¡°mimeTools.dll¡±£¬ÒÔ±ãÔÚÎı¾±à¼Æ÷Æô¶¯Ê±Ö´ÐжñÒâ´úÂë¡£ÓÉÓڸòå¼þËæÿ¸ö Notepad++ °²×°Ò»ÆðÌṩ£¬Òò´ËÓû§ÔÚʹÓøÃÈí¼þʱ»áÎÞÒâÖд¥·¢Ñ¬È¾¡£ÔÚË𻵵IJå¼þÖУ¬¹¥»÷ÕßСÐĵØÒþ²ØÁËËûÃǵÄÓÐЧ¸ºÔØ¡£Î±×°³ÉÎÞº¦Ö¤ÊéµÄÎļþ¡°certificate.pem¡±ÑÚ¸ÇÁ˼ÓÃÜµÄ shellcode¡ª¡ª¹¥»÷µÄ³õʼ½×¶Î¡£Ëæ×ŶñÒâÈí¼þÁýÕÖÁíÒ»¸ö²å¼þ¡°BingMaps.dll¡±ÖеĴúÂë²¢½«Ïß³Ì×¢ÈëºËÐÄ¡°explorer.exe¡±Windows ½ø³Ì£¬ÅÓ´óÐÔÒ²»áÔö¼Ó¡£ÕâÈ·±£Á˳־ÃÐÔ²¢Ê¹¹¥»÷¸üÄÑÒÔ¼ì²â¡£
https://securityonline.info/popular-text-editor-notepad-compromised-in-wikiloader-malware-attack/
5. ¼äµý»î¶¯¾íÍÁÖØÀ´£¬LightSpy Ãé×¼ÄÏÑÇ
4ÔÂ14ÈÕ£¬LightSpy ×î³õÓÚ 2020 ÄêÔÚÏã¸Û½ôÕžÖÊƼӾçÆڼ䱻·¢ÏÖ£¬ÒÔÆäÀàËƼ¤¹âµÄ¾Û½¹ÄÜÁ¦ºÍÇ¿´óµÄÊý¾ÝÊÕ¼¯ÄÜÁ¦¶øÎÅÃû¡£×îеİ汾±»³ÆΪ¡°F_Warehouse¡±£¬·ºÆð³öÊÊÓ¦ÐÔ¸üÇ¿µÄÍþв¡£Ëü½ÓÄɼ´²å¼´ÓÃÄ£¿éÉè¼Æ£¬ÔÊÐí¹¥»÷Õß×Ô½ç˵¼àÊÓÒÔÂú×ãÌض¨Ä¿±ê£º¿´²»¼ûµÄ¼àÊÓ¡¢Éî¶ÈÊý¾ÝÉø͸ºÍÔ¶³Ì¿ØÖƵÄÍþв¡£LightSpy ½ÓÄÉÖ¤ÊéÀι̵ÈÅÓ´ó¼¼ÊõÀ´Ìӱܼì²â¡£ËüÖ÷Ҫͨ¹ýÊÜËðµÄÐÂÎÅÍøÕ¾Á÷´«£¬ÕâЩÍøÕ¾°üÂÞÓëÃô¸ÐÕþÖÎÎÊÌâÏà¹ØµÄÄÚÈÝ£¬ÀýÈç֮ǰÔÚÏã¸Û¿¹ÒéÆÚ¼äÊӲ쵽µÄÎÊÌâ¡£Ò»µ©É豸Êܵ½Ë𺦣¬LightSpy ¾Í»á²¿Êð¶à½×¶ÎÖ²Èë¹ý³Ì£¬Öð²½ÊÍ·ÅÆäÈ«²¿¼äµý¹¦Ð§¡£
https://securityonline.info/espionage-campaign-returns-lightspy-targets-southern-asia/
6. CISA½«D-LINK¶à¸ö©¶´Ìí¼Óµ½ÒÑÖªÀûÓõÄ©¶´Ä¿Â¼
4ÔÂ11ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö (CISA) ½«ÒÔÏ D-Link ¶à NAS É豸ȱÏÝÌí¼Óµ½ÆäÒÑÖª¿ÉÀûÓ鶴 (KEV) Ŀ¼ÖУºD-Link ¶à¸ö NAS É豸ʹÓÃÓ²±àÂëƾ¾Ý©¶´£¨CVE-2024-3272£©ºÍD-Link ¶à¸ö NAS É豸ÃüÁî×¢È멶´£¨CVE-2024-3273£©¡£CVE-2024-3272 ÊÇÓ°Ïì D-Link ¶à¸ö NAS É豸µÄÓ²±àÂëƾ¾ÝʹÓ鶴¡£¸ÃȱÏÝÓ°Ïì D-Link DNS-320L¡¢DNS-325¡¢DNS-327L ºÍ DNS-340L£¬ÕâЩÉ豸°üÂÞÓ²±àÂëƾ¾Ý£¬ÔÊÐí¹¥»÷Õß½øÐо¹ýÉí·ÝÑéÖ¤µÄÃüÁî×¢È룬´Ó¶øµ¼ÖÂÔ¶³Ì¡¢Î´¾ÊÚȨµÄ´úÂëÖ´ÐС£CISA Ö¸³ö£¬¸ÃȱÏÝÓ°ÏìÒѵ½´ïÉúÃüÖÜÆÚÖÕÖ¹ (EOL) »ò·þÎñÖÕÖ¹ (EOS) ÉúÃüÖÜÆÚµÄ D-Link ²úÎÒò´Ë£¬Ó¦Æ¾¾Ý¹©Ó¦É̵ÄָʾÍËÒÛ²¢¸ü»»ÕâЩ²úÎȱÏÝ CVE-2024-3272 ÊÇÓ°Ïì D-Link ¶à¸ö NAS É豸µÄÃüÁî×¢È멶´¡£¸Ã©¶´Ó°ÏìD-Link DNS-320L¡¢DNS-325¡¢DNS-327L ºÍ DNS-340L£¬ÆäÖаüÂÞÃüÁî×¢È멶´¡£
https://securityaffairs.com/161739/security/cisa-d-link-multiple-nas-devices-bugs-known-exploited-vulnerabilities-catalog.html?web_view=true