eXotic VisitÕë¶ÔÓ¡¶ÈºÍ°Í»ù˹̹µÄ Android Óû§
Ðû²¼Ê±¼ä 2024-04-161. eXotic VisitÕë¶ÔÓ¡¶ÈºÍ°Í»ù˹̹µÄ Android Óû§
4ÔÂ10ÈÕ£¬Ò»¸öÃûΪ eXotic Visit µÄ»îÔ¾ Android ¶ñÒâÈí¼þÔ˶¯Ö÷ÒªÕë¶ÔÄÏÑÇÓû§£¬ÌØÊâÊÇÓ¡¶ÈºÍ°Í»ù˹̹µÄÓû§£¬¶ñÒâÈí¼þͨ¹ýרÃÅÍøÕ¾ºÍ Google Play ÊÐËÁ·Ö·¢¡£Ä³ÍøÂçÇå¾²¹«Ë¾ÌåÏÖ£¬ÕâÏîÔ˶¯×Ô 2021 Äê 11 ÔÂÒÔÀ´Ò»Ö±ÔÚ¾ÙÐУ¬ÓëÈκÎÒÑÖªµÄÍþвÐÐΪÕß»ò×éÖ¯Î޹ء£ËüÕýÔÚ×·×ÙÃûΪVirtual InvadersµÄÐж¯±³ºóµÄ×éÖ¯¡£¾Ý³Æ£¬¸ÃÔ˶¯¾ßÓкÜÇ¿µÄÕë¶ÔÐÔ£¬Google Play ÉÏÌṩµÄÓ¦ÓóÌÐòµÄ×°ÖÃÊýĿ΢ºõÆä΢£¬´Ó 0 µ½ 45 ²»µÈ¡£ÕâЩӦÓóÌÐòÒѱ»Ï¼ܡ£ÕâЩÐéᵫÊÊÓõÄÓ¦ÓóÌÐòÖ÷Ҫαװ³ÉÐÂÎÅ·þÎñ£¬ÀýÈç Alpha Chat¡¢ChitChat¡¢Defcom¡¢Dink Messenger¡¢Signal Lite¡¢TalkU¡¢WeTalk¡¢Wicker Messenger ºÍ Zaangi Chat¡£¾Ý³Æ£¬Ô¼Äª 380 ÃûÊܺ¦ÕßÏÂÔØÁËÕâЩӦÓóÌÐò²¢½¨ÉèÁËÕÊ»§£¬ÒÔʹÓÃËüÃÇ·¢ËÍÐÂÎÅ¡£
https://thehackernews.com/2024/04/exotic-visit-spyware-campaign-targets.html?&web_view=true
2. GSMA Ðû²¼Òƶ¯ÍþвÇ鱨¿ò¼Ü
4ÔÂ10ÈÕ£¬GSM лáµÄڲƺÍÇ徲С×é (FASG) Ðû²¼Á˵ÚÒ»°æ¿ò¼Ü£¬ÓÃÓÚÒԽṹ»¯·½·¨ÐÎòµÐÊÖÔõÑùƾ֤ËûÃÇʹÓõÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐò (TTP) ¹¥»÷ºÍʹÓÃÒƶ¯ÍøÂç¡£Òƶ¯ÍþвÇ鱨¿ò¼Ü (MoTIF) רעÓÚÓëÒƶ¯ÍøÂçÏà¹ØµÄ¹¥»÷£¬ÕâЩ¹¥»÷ÉÐδ±»MITRE ATT&CK£¨ÊÊÓÃÓÚÆóÒµºÍÒƶ¯£©ºÍMITRE FiGHTµÈÏÖÓй«¹²¿ò¼Üº¸Ç¡£¹æÄ£°üÀ¨ 2G¡¢3G¡¢4G¡¢5G£¬°üÀ¨ËùÓÐÀàÐ͵ĵçÐÅ·þÎñÍƶ¯Õߣ¨ÀýÈçÖÜÓΡ¢SMS¡¢VoIP£©ºÍδÀ´ÒÆÏÂÊÖÒÕµÄÑݽø¡£»¹°üÀ¨Õë¶ÔÒƶ¯ÍøÂç¼°Æä¿Í»§µÄڲƹ¥»÷¡£MoTIF ÔÔòÌṩÁË MoTIF µÄ¸ÅÊö£¬²¢½ç˵ÁË¿ò¼ÜÖÐÖ¸¶¨µÄÊÖÒÕºÍ×ÓÊÖÒÕ¡£
https://www.helpnetsecurity.com/2024/04/10/gsma-mobile-threat-intelligence-framework/?web_view=true
3. µØÔµÕþÖÎÖ÷ҪʱÊƼӾç OT ÍøÂç¹¥»÷
4ÔÂ15ÈÕ£¬ÒÑÍù¼¸Ä꣬³öÓÚÕþÖÎÄîÍ·¡¢Ôì³ÉÈËÉíЧ¹ûµÄºÚ¿Í¹¥»÷ÓÐËùÔöÌí¡£ÏÕЩËùÓÐÕâЩϮ»÷¶¼Óë¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼»òÕýÔÚ¾ÙÐеÄÒÁÀÊ/ÒÔÉ«ÁгåÍ»Óйء£´ÓÀúÊ·ÉÏ¿´£¬ÕâЩ¹¥»÷²¢²»ÊǺÜÊÇÖش󣬵«Ã¿Ð¡ÎÒ˽¼Ò¶¼ÔÚ¹Ø×¢´óÐÍÓïÑÔÄ£×ÓÈ˹¤ÖÇÄܵķºÆ𣬿´¿´ÕâЩÈ˹¤ÖÇÄÜÊÇ·ñ»áÈúڿÍÐж¯Ö÷ÒåÕß±äµÃÔ½·¢Ç¿Ê¢¡£ÀÕË÷Èí¼þÊÇ×ï¿ý×ï¿ý¡£È»¶ø£¬ÀÕË÷Èí¼þÏòÀ´Íƶ¯Á˾ßÓÐ OT Ч¹ûµÄ¹¥»÷µÄ¸´ºÏÄêÔöÌíÂʸü¸ß¡£19% µÍÓÚÎÒÃǽñÄêµÄÔ¤ÆÚ£¬ÎÒÃǽ«ÕâÒ»²î±ð¹éÒòÓÚÕ½ÂÔµÄת±ä¡£ÀÕË÷Èí¼þ¶Ô OT µÄÓ°ÏìºÜ´óÒ»²¿·ÖÊÇÓÉÓÚÒÀÀµÐÔ¡£ÀÕË÷Èí¼þ¹¥»÷ IT ÍøÂ磬¼ÓÃÜ´ó×ÚÄÚÈÝ£¬´Ó¶øµ¼Ö´ó×Ú IT ·þÎñÆ÷ºÍ·þÎṉ̃»¾¡£OT ¹Ø±Õ¡£ÎªÊ²Ã´£¿ÊÂʵ֤ʵ£¬ÎÒÃÇµÄ OT ×Ô¶¯»¯ÏµÍ³ÐèҪһЩÒṈ̃»¾µÄ IT ·þÎñ¡£
https://www.helpnetsecurity.com/2024/04/15/andrew-ginter-waterfall-security-ot-cyber-attacks/
4. WikiLoader ͨ¹ýÎı¾±à¼Æ÷ Notepad++ ¾ÙÐÐÈö²¥
4ÔÂ14ÈÕ£¬AhnLab Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐĵÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶ÔÆÕ±éʹÓÃµÄ Notepad++ Îı¾±à¼Æ÷µÄÖØ´ó¶ñÒâÈí¼þÔ˶¯¡£ÕâÖÖ¹¥»÷µÄ½¹µãÊÇÒ»ÖÖ³ÆΪ DLL ЮÖƵÄÊÖÒÕ¡£¹¥»÷ÕßÉñÃØÐÞ¸ÄÁËĬÈϵÄNotepad++²å¼þ¡°mimeTools.dll¡±£¬ÒÔ±ãÔÚÎı¾±à¼Æ÷Æô¶¯Ê±Ö´ÐжñÒâ´úÂë¡£ÓÉÓڸòå¼þËæÿ¸ö Notepad++ ×°ÖÃÒ»ÆðÌṩ£¬Òò´ËÓû§ÔÚʹÓøÃÈí¼þʱ»áÎÞÒâÖд¥·¢Ñ¬È¾¡£ÔÚË𻵵IJå¼þÖУ¬¹¥»÷ÕßСÐĵØÒþ²ØÁËËûÃǵÄÓÐÓøºÔØ¡£Î±×°³ÉÎÞº¦Ö¤ÊéµÄÎļþ¡°certificate.pem¡±ÑÚÊÎÁ˼ÓÃÜµÄ shellcode¡ª¡ª¹¥»÷µÄ³õʼ½×¶Î¡£Ëæ×ŶñÒâÈí¼þÁýÕÖÁíÒ»¸ö²å¼þ¡°BingMaps.dll¡±ÖеĴúÂë²¢½«Ïß³Ì×¢Èë½¹µã¡°explorer.exe¡±Windows Àú³Ì£¬ÖØ´óÐÔÒ²»áÔöÌí¡£ÕâÈ·±£Á˳¤ÆÚÐÔ²¢Ê¹¹¥»÷¸üÄÑÒÔ¼ì²â¡£
https://securityonline.info/popular-text-editor-notepad-compromised-in-wikiloader-malware-attack/
5. Ìع¤Ô˶¯¾íÍÁÖØÀ´£¬LightSpy Ãé×¼ÄÏÑÇ
4ÔÂ14ÈÕ£¬LightSpy ×î³õÓÚ 2020 ÄêÔÚÏã¸ÛÖ÷ҪʱÊƼӾçʱ´ú±»·¢Ã÷£¬ÒÔÆäÀàËƼ¤¹âµÄ¾Û½¹ÄÜÁ¦ºÍÇ¿Ê¢µÄÊý¾ÝÍøÂçÄÜÁ¦¶øÖøÃû¡£×îеİ汾±»³ÆΪ¡°F_Warehouse¡±£¬·ºÆð³ö˳ӦÐÔ¸üÇ¿µÄÍþв¡£Ëü½ÓÄɼ´²å¼´ÓÃÄ£¿éÉè¼Æ£¬ÔÊÐí¹¥»÷Õß×Ô½ç˵¼àÊÓÒÔÖª×ãÌض¨Ä¿µÄ£º¿´²»¼ûµÄ¼àÊÓ¡¢Éî¶ÈÊý¾ÝÉø͸ºÍÔ¶³Ì¿ØÖƵÄÍþв¡£LightSpy ½ÓÄÉÖ¤ÊéÀο¿µÈÖØ´óÊÖÒÕÀ´Ìӱܼì²â¡£ËüÖ÷Ҫͨ¹ýÊÜËðµÄÐÂÎÅÍøÕ¾Èö²¥£¬ÕâЩÍøÕ¾°üÀ¨ÓëÃô¸ÐÕþÖÎÎÊÌâÏà¹ØµÄÄÚÈÝ£¬ÀýÈç֮ǰÔÚÏã¸Û¿¹Òéʱ´úÊӲ쵽µÄÎÊÌâ¡£Ò»µ©×°±¸Êܵ½Ë𺦣¬LightSpy ¾Í»á°²ÅŶà½×¶ÎÖ²ÈëÀú³Ì£¬Öð²½ÊÍ·ÅÆäËùÓÐÌع¤¹¦Ð§¡£
https://securityonline.info/espionage-campaign-returns-lightspy-targets-southern-asia/
6. CISA½«D-LINK¶à¸öÎó²îÌí¼Óµ½ÒÑ֪ʹÓõÄÎó²îĿ¼
4ÔÂ11ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA) ½«ÒÔÏ D-Link ¶à NAS ×°±¸È±ÏÝÌí¼Óµ½ÆäÒÑÖª¿ÉʹÓÃÎó²î (KEV) Ŀ¼ÖУºD-Link ¶à¸ö NAS ×°±¸Ê¹ÓÃÓ²±àÂëƾ֤Îó²î£¨CVE-2024-3272£©ºÍD-Link ¶à¸ö NAS ×°±¸ÏÂÁî×¢ÈëÎó²î£¨CVE-2024-3273£©¡£CVE-2024-3272 ÊÇÓ°Ïì D-Link ¶à¸ö NAS ×°±¸µÄÓ²±àÂëƾ֤ʹÓÃÎó²î¡£¸ÃȱÏÝÓ°Ïì D-Link DNS-320L¡¢DNS-325¡¢DNS-327L ºÍ DNS-340L£¬ÕâЩװ±¸°üÀ¨Ó²±àÂëƾ֤£¬ÔÊÐí¹¥»÷Õß¾ÙÐоÓÉÉí·ÝÑéÖ¤µÄÏÂÁî×¢È룬´Ó¶øµ¼ÖÂÔ¶³Ì¡¢Î´¾ÊÚȨµÄ´úÂëÖ´ÐС£CISA Ö¸³ö£¬¸ÃȱÏÝÓ°ÏìÒѵִïÉúÃüÖÜÆÚÖÕÖ¹ (EOL) »ò·þÎñÖÕÖ¹ (EOS) ÉúÃüÖÜÆÚµÄ D-Link ²úÆ·£¬Òò´Ë£¬Ó¦Æ¾Ö¤¹©Ó¦É̵ÄָʾÍËÒÛ²¢Ìæ»»ÕâЩ²úÆ·¡£È±ÏÝ CVE-2024-3272 ÊÇÓ°Ïì D-Link ¶à¸ö NAS ×°±¸µÄÏÂÁî×¢ÈëÎó²î¡£¸ÃÎó²îÓ°ÏìD-Link DNS-320L¡¢DNS-325¡¢DNS-327L ºÍ DNS-340L£¬ÆäÖаüÀ¨ÏÂÁî×¢ÈëÎó²î¡£
https://securityaffairs.com/161739/security/cisa-d-link-multiple-nas-devices-bugs-known-exploited-vulnerabilities-catalog.html?web_view=true