¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸
Ðû²¼Ê±¼ä 2022-02-10¶ñÒâÈí¼þDark HerringÒÑѬȾÉÏÒŲ́Android×°±¸
¾ÝýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬ZimperiumÔÚGoogle PlayÉϼì²âµ½470¿î¶ñÒâÓ¦Óᣡ£¡£¡£¡£ÕâЩӦÓÃÒÑÔÚÈ«ÇòÁè¼Ý1.05ÒŲ́Android×°±¸ÉÏ×°ÖÃÁ˶ñÒâÈí¼þDark Herring£¬£¬£¬£¬£¬Ëü¿ÉÒÔͨ¹ýÄ¿µÄµÄ»°·ÑÕ˵¥ÇÔÈ¡×ʽ𡣡£¡£¡£¡£¸Ã»î¶¯Ã¿ÔÂÏòÄ¿µÄµÄ»°·ÑÕ˵¥ÖÐÔöÌí15ÃÀÔªµÄÓöȣ¬£¬£¬£¬£¬ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬²¢Ò»Ö±Ò»Á¬µ½È¥Äê11Ô£¬£¬£¬£¬£¬¾ÝÔ¤¼ÆÇÔÈ¡µÄ½ð¶î×ÜÊýÒÑ´ïÊýÒÚ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬GoogleÒÑÔÚPlayÊÐËÁÖÐɾ³ýÁËÉÏÊöµÄ¶ñÒâÓ¦Óᣡ£¡£¡£¡£
https://threatpost.com/dark-herring-billing-malware-android/178032/
µÂ¹úBfV³ÆAPT27ÍÅ»ïʹÓÃHyperBro¹¥»÷ÆäÉÌÒµ×éÖ¯
1ÔÂ26ÈÕ£¬£¬£¬£¬£¬µÂ¹úÁª°îÏÜ·¨±£»£»£»£»£»£»£»¤°ì¹«ÊÒ(BfV)Ðû²¼Í¨¸æ£¬£¬£¬£¬£¬³ÆAPT27ÍÅ»ïÕýÔÚ¹¥»÷ÆäÉÌÒµ×éÖ¯¡£¡£¡£¡£¡£APT27ÓÖÃûEmissary Panda£¬£¬£¬£¬£¬×Ô2010ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£¡£¡£BfV³Æ£¬£¬£¬£¬£¬×Ô2021Äê3ÔÂÒÔÀ´£¬£¬£¬£¬£¬APT27Ò»Ö±ÔÚʹÓÃMicrosoft ExchangeºÍZoho AdSelf Service Plus1Èí¼þÖеÄÎó²î¹¥»÷µÂ¹úµÄ¹«Ë¾¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËHyperBro RAT£¬£¬£¬£¬£¬Ö¼ÔÚÇÔȡĿµÄµÄÊý¾Ý£¬£¬£¬£¬£¬²¢ÊÔͼÕë¶ÔÆä¿Í»§Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£
https://securityaffairs.co/wordpress/127230/apt/german-intel-warns-apt27-attacks.html
¹¥»÷ÕßʹÓÃ800¶à¸öÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes
ýÌå1ÔÂ26ÈÕ±¨µÀ£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃ800¶à¸öÒѱ»ÈëÇÖµÄWordPressÍøÕ¾·Ö·¢Õë¶Ô°ÍÎ÷µÄÒøÐÐľÂíChaes¡£¡£¡£¡£¡£µ±Ä¿µÄ»á¼û±»Ñ¬È¾ÍøÕ¾Ê±£¬£¬£¬£¬£¬»á±»ÒªÇó×°ÖÃÒ»¸ö¼ÙµÄJava RuntimeÓ¦Óᣡ£¡£¡£¡£¸ÃMSI×°ÖóÌÐò°üÀ¨Èý¸ö¶ñÒâJavaScriptÎļþ£ºinstall.js¡¢sched.js¡¢sucesso.js£¬£¬£¬£¬£¬ËüÃÇΪÏÂÒ»½×¶ÎµÄ¼ÓÔØ³ÌÐò×¼±¸PythonÇéÐΡ£¡£¡£¡£¡£AvastÌåÏÖ£¬£¬£¬£¬£¬ÒѼì²âµ½ÁË5ÖÖ²î±ðµÄ¶ñÒâChromeÀ©Õ¹³ÌÐò¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÇå¾²¹«Ë¾ÒÑ֪ͨ°ÍÎ÷CERT£¬£¬£¬£¬£¬µ«¹¥»÷»î¶¯ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/chaes-banking-trojan-hijacks-chrome-with-malicious-extensions/
Bitdefender·¢Ã÷´ó¹æÄ£·Ö·¢FluBotºÍTeaBotµÄ»î¶¯
1ÔÂ26ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ÐµÄFluBotºÍTeaBot¶ñÒâÈí¼þ·Ö·¢»î¶¯ÕýÔÚÕë¶Ô°Ä´óÀûÑÇ¡¢µÂ¹ú¡¢²¨À¼¡¢Î÷°àÑÀºÍÂÞÂíÄáÑǵÄAndroidÓû§¡£¡£¡£¡£¡£Bitdefender Labs×Ô2021Äê12ÔÂÒÔÀ´£¬£¬£¬£¬£¬½Ø»ñÁËÁè¼Ý10ÍòÌõ¶ñÒâ¶ÌÐÅ£¬£¬£¬£¬£¬Ö¼ÔÚÈö²¥FluBot¡£¡£¡£¡£¡£¸Ã¹«Ë¾»¹³Æ£¬£¬£¬£¬£¬TeaBotÒѶà´Î·ºÆðÔÚGoogle PlayÊÐËÁÖУ¬£¬£¬£¬£¬2021Äê12ÔÂ6ÈÕµ½2022Äê1ÔÂ17ÈÕ£¬£¬£¬£¬£¬ËûÃǼì²âµ½17¸ö²î±ð°æ±¾µÄTeaBotͨ¹ý¶à¸ö¶ñÒâÓ¦ÓÃѬȾװ±¸¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-flubot-and-teabot-campaigns-target-android-devices-worldwide/
DiscordÒòAPIºÍÊý¾Ý¿â·ºÆðÎÊÌâµ¼Ö´ó¹æÄ£Ð§ÀÍÖÐÖ¹
1ÔÂ26ÈÕ£¬£¬£¬£¬£¬Discord±¬·¢ÁË´ó¹æÄ£ÖÐÖ¹µÄÇéÐΣ¬£¬£¬£¬£¬µ¼ÖÂÓû§ÎÞ·¨µÇ¼ЧÀÍ»òʹÓÃÓïÒô̸Ìì¡£¡£¡£¡£¡£ÖÐÖ¹×îÏÈÓÚÃÀ¹ú¶«²¿±ê׼ʱ¼äÏÂÖç2:49£¬£¬£¬£¬£¬×î³õÊÇÓÉAPIÖÐÖ¹ÒýÆðµÄ£¬£¬£¬£¬£¬µ¼Ö¶à¸öЧÀÍÎÞ·¨Ï໥ͨѶ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÔÚ½â¾öAPIÎÊÌâºó£¬£¬£¬£¬£¬Discord·¢Ã÷Êý¾Ý¿â¼¯Èº·ºÆðÎÊÌ⣬£¬£¬£¬£¬Õâµ¼ÖÂÁ˸ü¶àÎÊÌâ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÐÞ¸´ÓÐÎÊÌâµÄÊý¾Ý¿â¼¯ÈºÊ±×îÏÈÏÞÖÆµÇ¼ËÙÂÊ£¬£¬£¬£¬£¬ÒÔ±ÜÃâЧÀÍÆ÷¹ýÔØ£¬£¬£¬£¬£¬Ö±µ½ÏÂÖç5:12×óÓÒ£¬£¬£¬£¬£¬ÏÞËÙ±»×÷·Ï¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/major-discord-outage-caused-by-api-and-database-issues/
΢ÈíAzureÔÆÆ½Ì¨ÀֳɵÖÓù¸ß´ï3.47 TbpsµÄDDoS¹¥»÷
΢ÈíÔÚ1ÔÂ25ÈÕÐû²¼µÄ±¨¸æ³Æ£¬£¬£¬£¬£¬ÆäAzureÒѵÖÓùÁ˸ߴï3.47 TbpsµÄDDoS¹¥»÷¡£¡£¡£¡£¡£11Ô£¬£¬£¬£¬£¬Î¢ÈíÑÇÖÞµÄÒ»¸ö¿Í»§Ôâµ½ÁË3.47 TbpsºÍÿÃë3.4ÒÚÊý¾Ý°ü(pps)µÄDDoS¹¥»÷£¬£¬£¬£¬£¬Õâ±»ÒÔΪÕâÊÇÀúÊ·ÉÏ×î´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£¡£¡£´Ë´Î¹¥»÷À´×ÔԼĪ10000¸öÔ´£¬£¬£¬£¬£¬Éæ¼°Öйú¡¢º«¹ú¡¢¶íÂÞ˹¡¢Ì©¹ú¡¢Ó¡¶È¡¢Ô½ÄÏ¡¢ÒÁÀÊ¡¢Ó¡¶ÈÄáÎ÷Ñǵȶà¸ö¹ú¼Ò¡£¡£¡£¡£¡£¹¥»÷ÏòÁ¿ÊÇʹÓÃSSDP¡¢CLDAP¡¢DNSºÍNTPÔÚ80¶Ë¿ÚÉϵÄUDP·´É䣬£¬£¬£¬£¬×ÜÌå¹¥»÷Ò»Á¬ÁËԼĪ15·ÖÖÓ¡£¡£¡£¡£¡£
https://azure.microsoft.com/en-us/blog/azure-ddos-protection-2021-q3-and-q4-ddos-attack-trends/
Çå¾²¹¤¾ß
jfrog-npm-tools
JFrogÐû²¼Èý¿î¿ªÔ´¹¤¾ß£¬£¬£¬£¬£¬¿É´Ó npm °ü¹ÜÀíÆ÷ÏÂÔØºÍ×°ÖöñÒâ JavaScript °ü֮ǰ¶ÔÆä¾ÙÐбê¼Ç¡£¡£¡£¡£¡£
https://github.com/jfrog/jfrog-npm-tools
EtherNet/IP & CIP Stack Detector
Çå¾²¹«Ë¾ ClarotyÐû²¼ÐµĿªÔ´¹¤¾ßÓÐÖúÓÚʶ±ðÓÃÓÚ ICS Ñо¿ºÍÆÊÎöµÄ EtherNet/IP ¿ÍÕ»¡£¡£¡£¡£¡£
https://www.securityweek.com/new-open-source-tool-helps-identify-ethernetip-stacks-ics-research-analysis
Wireshark Forensics Toolkit
¿çƽ̨µÄ Wireshark ²å¼þ£¬£¬£¬£¬£¬¿É½«ÍøÂçÁ÷Á¿Êý¾ÝÓëÍþвÇ鱨¡¢×ʲú·ÖÀàºÍÎó²îÊý¾Ý¹ØÁªÆðÀ´£¬£¬£¬£¬£¬ÒÔ¼ÓËÙÍøÂçȡ֤ÆÊÎö¡£¡£¡£¡£¡£
https://github.com/rjbhide/wireshark-forensics-plugin
T-Reqs
ÊÇÒ»ÖÖ»ùÓÚÓï·¨µÄ HTTP Fuzzer¡£¡£¡£¡£¡£
https://github.com/bahruzjabiyev/T-Reqs-HTTP-Fuzzer
DotGit
¼ì²é .git ÊÇ·ñÔÚ»á¼ûµÄÍøÕ¾ÖÐ̻¶µÄÀ©Õ¹¡£¡£¡£¡£¡£
Çå¾²ÆÊÎö
°×¹¬Ï£ÍûÃÀ¹úÕþ¸®Ê¹ÓÃÁãÐÅÈÎÇ徲ģ×Ó
https://www.bleepingcomputer.com/news/security/white-house-wants-us-govt-to-use-a-zero-trust-security-model/
΢ÈíÖÒÑÔ´¹ÂÚ OAuth Ó¦ÓóÌÐò
https://blog.malwarebytes.com/privacy-2/2022/01/microsoft-warns-of-phishy-oauth-apps/
¹È¸è·ÅÆú FLoC ²¢ÒýÈëÖ÷Ìâ API À´Ìæ»»¹ã¸æµÄ¸ú×Ù Cookie
https://thehackernews.com/2022/01/google-drops-floc-and-introduces-topics.html
ÀÕË÷Èí¼þ¹¥»÷ÕßʹÓõÄÎó²î¼¤Ôö 29%
https://www.infosecurity-magazine.com/news/29-surge-bugs-used-ransomware/
Let's Encrypt ÔÚÁ½ÌìÄÚ×÷·Ï´ó×Ú SSL Ö¤Êé
https://www.bleepingcomputer.com/news/security/lets-encrypt-is-revoking-lots-of-ssl-certificates-in-two-days/
MalwarebytesÐû²¼¹ØÓÚKONNI RATµÄÊÖÒÕÆÊÎö±¨¸æ
https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/


¾©¹«Íø°²±¸11010802024551ºÅ