Agent TeslaʵÑé¸Ä¶¯Î¢ÈíAMSIÀ´Èƹýɱ¶¾Èí¼þ¼ì²â£» £»£»£»GoogleÐû²¼AndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´40¶à¸öÎó²î

Ðû²¼Ê±¼ä 2021-02-04

1.Agent TeslaʵÑé¸Ä¶¯Î¢ÈíAMSIÀ´Èƹýɱ¶¾Èí¼þ¼ì²â


1.jpg


SophosÑо¿Ö°Ô±·¢Ã÷ÌØ¹¤Èí¼þAgent TeslaʵÑé¸Ä¶¯Î¢Èí·À¶ñÒâÈí¼þÈí¼þ½Ó¿Ú£¨AMSI£©£¬£¬£¬£¬£¬£¬£¬À´Èƹýɱ¶¾Èí¼þµÄɨÃèºÍÆÊÎö¡£¡£¡£ ¡£¡£¡£Agent TeslaÓÚ2014ÄêÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»ÖÖÓÃ.NET±àдµÄÉÌÒµRAT¡£¡£¡£ ¡£¡£¡£SophosÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÕýÔÚÒ»Ö±¿ª·¢ÖУ¬£¬£¬£¬£¬£¬£¬Æä.NETÏÂÔØ³ÌÐò¿ÉŲÓò¢ÏÂÔØÍйÜÔÚÕýµ±ÍøÕ¾ÉϵĶñÒâ´úÂë¡£¡£¡£ ¡£¡£¡£ÔÚÀֳɸ͝AMSIºó¸Ã¶ñÒâÈí¼þ¿ÉÔÚûÓÐÈκÎ×ÌÈŵÄÇéÐÎÏÂÍêÕû°²ÅÅ£¬£¬£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔOpera¡¢Chromium¡¢Chrome¡¢Firefox¡¢OpenVPNºÍOutlookµÈÓ¦Óᣡ£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/agent-tesla-ramps-up-its-game-in-bypassing-security-walls-attacks-endpoint-protection/


2.GoogleÐû²¼AndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´40¶à¸öÎó²î


2.png


GoogleÐû²¼ÁË2Ô·ÝAndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´40¶à¸öÎó²î¡£¡£¡£ ¡£¡£¡£ÕâЩÎó²îÖнÏΪÖ÷ÒªµÄÎó²îÊÇMedia Framework×é¼þÖеĴúÂëÖ´ÐÐÎó²î£¨CVE-2021-0325)¡¢ÌáȨÎó²î£¨CVE-2021-0332£©ºÍÐÅϢй¶Îó²î£¨CVE-2021-0335£©¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸üл¹ÐÞ¸´ÁËÄÚºËÖеĴúÂëÖ´ÐÐÎó²î£¨CVE-2017-18509£©ÒÔ¼°Qualcomm×é¼þÖеĶà¸öÎó²î£¨CVE-2020-11272¡¢CVE-2020-11163ºÍCVE-2020-11170µÈ£©¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/google-patches-16-high-severity-privilege-escalation-vulnerabilities-android


3.ºÚ¿Í³öÊÛAirtelIndiaµÄ250ÍòÓû§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬±»¸Ã¹«Ë¾·ñ¶¨


3.png


ºÚ¿Í×éÖ¯Red RabbitÔÚ°µÍøÒÔ3500ÃÀÔªµÄ¼ÛÇ®³öÊÛAirtelIndiaµÄ250ÍòÓû§ÐÅÏ¢¡£¡£¡£ ¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨ÊС¢ÐÔ±ð¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Ð§ÀÍ״̬¡¢µç»°ºÅÂë¡¢ÃÅÅÆºÅÂë¡¢AadhaarºÅÂë¡¢»¤ÕÕºÅÂ롢ѡÃñ±àºÅ¡¢¸¸Ç×»òÕÉ·òµÄÃû×ÖºÍIMSI£¨¹ú¼ÊÒÆ¶¯Óû§Éí·Ý£©ºÅÂë¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í»¹Ðû²¼ÁËÆäÔÚAirtelµÄһ̨ЧÀÍÆ÷ÉÏ´«ShellµÄÆÁÄ»½ØÍ¼¡£¡£¡£ ¡£¡£¡£µ«Airtel·ñ¶¨Æä±¬·¢ÁËÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö´ó´ó¶¼µÄÊý¾Ý²»ÊôÓÚAirtelµÄ¿Í»§¡£¡£¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Red RabbitÔËÓªµÄÍøÕ¾Ò²Òѹرա£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/hackers-leak-airtel-india-user-data-aadhaar-numbers/


4.Èí¼þ¹«Ë¾Wind River³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ô±¹¤ÐÅϢй¶


4.png


¼ÓÀû¸£ÄáÑǵÄÈí¼þ¹«Ë¾Wind River³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾³ÆÊÂÎñ±¬·¢ÔÚ2020Äê9ÔÂ29ÈÕ×óÓÒ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜÒѾ­ÇÔÈ¡ÁËÒ»¸ö»ò¶à¸öÎļþ¡£¡£¡£ ¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¡¢¹«ÃñÉí·ÝÖ¤ºÅÂë¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕ»òǩ֤ºÅÂë¡¢¿µ½¡ÏêϸÐÅÏ¢ºÍ²ÆÎñÕÊ»§ÐÅÏ¢µÈ¡£¡£¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Wind RiverÉÐδÌṩÓйØÊÜÓ°ÏìÔ±¹¤µÄÊýÄ¿»ò¹¥»÷ÕßÔõÑùÆÆËðÆäϵͳµÄÏêϸÐÅÏ¢¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/114151/data-breach/wind-river-data-breach.html


5.»õÔ˹«Ë¾Forward AirѬȾHades£¬£¬£¬£¬£¬£¬£¬Ëðʧ´ï750ÍòÃÀÔª


5.png


»õÔ˹«Ë¾Forward AirÔâµ½ÁËHadesÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ôì³ÉµÄËðʧ´ï750ÍòÃÀÔª¡£¡£¡£ ¡£¡£¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚÈ¥Äê12ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒòѬȾHadesµ¼Ö¸ù«Ë¾½«ËùÓÐITϵͳÍÑ»úÒÔÓ¦¶ÔÈëÇÖ¡£¡£¡£ ¡£¡£¡£µ¼Ö¼ÝʻԱºÍÔ±¹¤ÎÞ·¨»ñÈ¡ÐëÒªµÄÎļþÒÔͨ¹ýº£¹ØÇ幨ÔËÊ䣬£¬£¬£¬£¬£¬£¬ÆäÔËÓªÊܵ½ÑÏÖØÆÆË𡣡£¡£ ¡£¡£¡£Ö»¹ÜForward AirÌåÏÖÆäÒÑÀֳɵشӹ¥»÷Öлָ´£¬£¬£¬£¬£¬£¬£¬µ«ÕÕ¾ÉÖ§¸¶Á˼«ÖؼÛÇ®£¬£¬£¬£¬£¬£¬£¬ÆäÔÚµÚËÄÐò¶ÈµÄ²ÆÎñÒµ¼¨ÖеÄËðʧ¸ß´ï750ÍòÃÀÔª¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/trucking-company-forward-air-said-its-ransomware-incident-cost-it-7-5-million/


6.ChainalysisÐû²¼2020ÄêÀÕË÷Èí¼þ¹¥»÷µÄ»ØÊ×±¨¸æ


6.png


ChainalysisÐû²¼ÁË2020ÄêÀÕË÷Èí¼þ¹¥»÷µÄ»ØÊ×±¨¸æ¡£¡£¡£ ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þµÄÊܺ¦ÕßÔÚ2020ÄêÖÁÉÙ×ܹ²Ö§¸¶ÁË3.5ÒÚÃÀÔªÊê½ð£¬£¬£¬£¬£¬£¬£¬±È2019Äêͬ±ÈÔöÌíÁË311£¥¡£¡£¡£ ¡£¡£¡£È¥ÄêÓ¯Àû×î¶àµÄÍÅ»ïΪRyuk¡¢Maze¡¢Doppelpaymer¡¢Netwalker¡¢ContiºÍREvil£¬£¬£¬£¬£¬£¬£¬Æä´ÎΪSnatch¡¢Defray777£¨RansomExx£©ºÍDharmaµÈ¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷½öÕ¼ËùÓлùÓÚ¼ÓÃÜÇ®±ÒµÄ·¸·¨»î¶¯µÄ7£¥£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÕâ¸öÊý×ֺܵͣ¬£¬£¬£¬£¬£¬£¬µ«´ËÀ๥»÷ÊýÄ¿×ÅʵÕýÔÚÔöÌí¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.chainalysis.com/reports/ransomware-ecosystem-crypto-crime-2021