eXotic VisitÕë¶ÔÓ¡¶ÈºÍ°Í»ù˹̹µÄ Android Óû§
Ðû²¼Ê±¼ä 2024-04-161. eXotic VisitÕë¶ÔÓ¡¶ÈºÍ°Í»ù˹̹µÄ Android Óû§
4ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ eXotic Visit µÄ»îÔ¾ Android ¶ñÒâÈí¼þ»î¶¯Ö÷ÒªÕë¶ÔÄÏÑÇÓû§£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÓ¡¶ÈºÍ°Í»ù˹̹µÄÓû§£¬£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þͨ¹ýרÃÅÍøÕ¾ºÍ Google Play ÊÐËÁ·Ö·¢¡£¡£¡£¡£¡£¡£¡£Ä³ÍøÂçÇå¾²¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕâÏî»î¶¯×Ô 2021 Äê 11 ÔÂÒÔÀ´Ò»Ö±ÔÚ¾ÙÐУ¬£¬£¬£¬£¬£¬£¬ÓëÈκÎÒÑÖªµÄÍþвÐÐΪÕß»ò×éÖ¯Î޹ء£¡£¡£¡£¡£¡£¡£ËüÕýÔÚ×·×ÙÃûΪVirtual InvadersµÄÐж¯±³ºóµÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯¾ßÓкÜÇ¿µÄÕë¶ÔÐÔ£¬£¬£¬£¬£¬£¬£¬Google Play ÉÏÌṩµÄÓ¦ÓóÌÐòµÄ×°ÖÃÊýĿ΢ºõÆä΢£¬£¬£¬£¬£¬£¬£¬´Ó 0 µ½ 45 ²»µÈ¡£¡£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòÒѱ»Ï¼ܡ£¡£¡£¡£¡£¡£¡£ÕâЩÐéᵫÊÊÓõÄÓ¦ÓóÌÐòÖ÷Ҫαװ³ÉÐÂÎÅЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÀýÈç Alpha Chat¡¢ChitChat¡¢Defcom¡¢Dink Messenger¡¢Signal Lite¡¢TalkU¡¢WeTalk¡¢Wicker Messenger ºÍ Zaangi Chat¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬£¬Ô¼Äª 380 ÃûÊܺ¦ÕßÏÂÔØÁËÕâЩӦÓóÌÐò²¢½¨ÉèÁËÕÊ»§£¬£¬£¬£¬£¬£¬£¬ÒÔʹÓÃËüÃÇ·¢ËÍÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/04/exotic-visit-spyware-campaign-targets.html?&web_view=true
2. GSMA Ðû²¼Òƶ¯ÍþвÇ鱨¿ò¼Ü
4ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬GSM лáµÄڲƺÍÇ徲С×é (FASG) Ðû²¼Á˵ÚÒ»°æ¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÒԽṹ»¯·½·¨ÐÎòµÐÊÖÔõÑùƾ֤ËûÃÇʹÓõÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐò (TTP) ¹¥»÷ºÍʹÓÃÒÆ¶¯ÍøÂç¡£¡£¡£¡£¡£¡£¡£Òƶ¯ÍþвÇ鱨¿ò¼Ü (MoTIF) רעÓÚÓëÒÆ¶¯ÍøÂçÏà¹ØµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ÉÐδ±»MITRE ATT&CK£¨ÊÊÓÃÓÚÆóÒµºÍÒÆ¶¯£©ºÍMITRE FiGHTµÈÏÖÓй«¹²¿ò¼Üº¸Ç¡£¡£¡£¡£¡£¡£¡£¹æÄ£°üÀ¨ 2G¡¢3G¡¢4G¡¢5G£¬£¬£¬£¬£¬£¬£¬°üÀ¨ËùÓÐÀàÐ͵ĵçÐÅЧÀÍÍÆ¶¯Õߣ¨ÀýÈçÖÜÓΡ¢SMS¡¢VoIP£©ºÍδÀ´ÒÆÏÂÊÖÒÕµÄÑݽø¡£¡£¡£¡£¡£¡£¡£»£»£»¹°üÀ¨Õë¶ÔÒÆ¶¯ÍøÂç¼°Æä¿Í»§µÄڲƹ¥»÷¡£¡£¡£¡£¡£¡£¡£MoTIF ÔÔòÌṩÁË MoTIF µÄ¸ÅÊö£¬£¬£¬£¬£¬£¬£¬²¢½ç˵ÁË¿ò¼ÜÖÐÖ¸¶¨µÄÊÖÒÕºÍ×ÓÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£
https://www.helpnetsecurity.com/2024/04/10/gsma-mobile-threat-intelligence-framework/?web_view=true
3. µØÔµÕþÖÎÖ÷ÒªÊ±ÊÆ¼Ó¾ç OT ÍøÂç¹¥»÷
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒÑÍù¼¸Ä꣬£¬£¬£¬£¬£¬£¬³öÓÚÕþÖÎÄîÍ·¡¢Ôì³ÉÈËÉíЧ¹ûµÄºÚ¿Í¹¥»÷ÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£¡£ÏÕЩËùÓÐÕâЩϮ»÷¶¼Óë¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼»òÕýÔÚ¾ÙÐеÄÒÁÀÊ/ÒÔÉ«ÁгåÍ»Óйء£¡£¡£¡£¡£¡£¡£´ÓÀúÊ·ÉÏ¿´£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷²¢²»ÊǺÜÊÇÖØ´ó£¬£¬£¬£¬£¬£¬£¬µ«Ã¿Ð¡ÎÒ˽¼Ò¶¼ÔÚ¹Ø×¢´óÐÍÓïÑÔÄ£×ÓÈ˹¤ÖÇÄܵķºÆð£¬£¬£¬£¬£¬£¬£¬¿´¿´ÕâЩÈ˹¤ÖÇÄÜÊÇ·ñ»áÈúڿÍÐж¯Ö÷ÒåÕß±äµÃÔ½·¢Ç¿Ê¢¡£¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÊÇ×ï¿ý×ï¿ý¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÏòÀ´Íƶ¯Á˾ßÓÐ OT Ч¹ûµÄ¹¥»÷µÄ¸´ºÏÄêÔöÌíÂʸü¸ß¡£¡£¡£¡£¡£¡£¡£19% µÍÓÚÎÒÃǽñÄêµÄÔ¤ÆÚ£¬£¬£¬£¬£¬£¬£¬ÎÒÃǽ«ÕâÒ»²î±ð¹éÒòÓÚÕ½ÂÔµÄת±ä¡£¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þ¶Ô OT µÄÓ°ÏìºÜ´óÒ»²¿·ÖÊÇÓÉÓÚÒÀÀµÐÔ¡£¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þ¹¥»÷ IT ÍøÂ磬£¬£¬£¬£¬£¬£¬¼ÓÃÜ´ó×ÚÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼Ö´ó×Ú IT ЧÀÍÆ÷ºÍЧÀÍ̱»¾¡£¡£¡£¡£¡£¡£¡£OT ¹Ø±Õ¡£¡£¡£¡£¡£¡£¡£ÎªÊ²Ã´£¿£¿£¿£¿ÊÂʵ֤ʵ£¬£¬£¬£¬£¬£¬£¬Z6×ðÁú¿Ê± OT ×Ô¶¯»¯ÏµÍ³ÐèҪһЩÒṈ̃»¾µÄ IT ЧÀÍ¡£¡£¡£¡£¡£¡£¡£
https://www.helpnetsecurity.com/2024/04/15/andrew-ginter-waterfall-security-ot-cyber-attacks/
4. WikiLoader ͨ¹ýÎı¾±à¼Æ÷ Notepad++ ¾ÙÐÐÈö²¥
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬AhnLab Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐĵÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÕë¶ÔÆÕ±éʹÓÃµÄ Notepad++ Îı¾±à¼Æ÷µÄÖØ´ó¶ñÒâÈí¼þ»î¶¯¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷µÄ½¹µãÊÇÒ»ÖÖ³ÆÎª DLL Ð®ÖÆµÄÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉñÃØÐÞ¸ÄÁËĬÈϵÄNotepad++²å¼þ¡°mimeTools.dll¡±£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚÎı¾±à¼Æ÷Æô¶¯Ê±Ö´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ÓÉÓڸòå¼þËæÃ¿¸ö Notepad++ ×°ÖÃÒ»ÆðÌṩ£¬£¬£¬£¬£¬£¬£¬Òò´ËÓû§ÔÚʹÓøÃÈí¼þʱ»áÎÞÒâÖд¥·¢Ñ¬È¾¡£¡£¡£¡£¡£¡£¡£ÔÚË𻵵IJå¼þÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßСÐĵØÒþ²ØÁËËûÃǵÄÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£¡£Î±×°³ÉÎÞº¦Ö¤ÊéµÄÎļþ¡°certificate.pem¡±ÑÚÊÎÁ˼ÓÃÜµÄ shellcode¡ª¡ª¹¥»÷µÄ³õʼ½×¶Î¡£¡£¡£¡£¡£¡£¡£Ëæ×ŶñÒâÈí¼þÁýÕÖÁíÒ»¸ö²å¼þ¡°BingMaps.dll¡±ÖеĴúÂë²¢½«Ïß³Ì×¢Èë½¹µã¡°explorer.exe¡±Windows Àú³Ì£¬£¬£¬£¬£¬£¬£¬ÖØ´óÐÔÒ²»áÔöÌí¡£¡£¡£¡£¡£¡£¡£ÕâÈ·±£Á˳¤ÆÚÐÔ²¢Ê¹¹¥»÷¸üÄÑÒÔ¼ì²â¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/popular-text-editor-notepad-compromised-in-wikiloader-malware-attack/
5. ÌØ¹¤»î¶¯¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬£¬LightSpy Ãé×¼ÄÏÑÇ
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬LightSpy ×î³õÓÚ 2020 ÄêÔÚÏã¸ÛÖ÷ÒªÊ±ÊÆ¼Ó¾çʱ´ú±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÒÔÆäÀàËÆ¼¤¹âµÄ¾Û½¹ÄÜÁ¦ºÍǿʢµÄÊý¾ÝÍøÂçÄÜÁ¦¶øÖøÃû¡£¡£¡£¡£¡£¡£¡£×îеİ汾±»³ÆÎª¡°F_Warehouse¡±£¬£¬£¬£¬£¬£¬£¬·ºÆð³ö˳ӦÐÔ¸üÇ¿µÄÍþв¡£¡£¡£¡£¡£¡£¡£Ëü½ÓÄɼ´²å¼´ÓÃÄ£¿£¿£¿£¿éÉè¼Æ£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õß×Ô½ç˵¼àÊÓÒÔÖª×ãÌØ¶¨Ä¿µÄ£º¿´²»¼ûµÄ¼àÊÓ¡¢Éî¶ÈÊý¾ÝÉøÍ¸ºÍÔ¶³Ì¿ØÖƵÄÍþв¡£¡£¡£¡£¡£¡£¡£LightSpy ½ÓÄÉÖ¤ÊéÀο¿µÈÖØ´óÊÖÒÕÀ´Ìӱܼì²â¡£¡£¡£¡£¡£¡£¡£ËüÖ÷Ҫͨ¹ýÊÜËðµÄÐÂÎÅÍøÕ¾Èö²¥£¬£¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾°üÀ¨ÓëÃô¸ÐÕþÖÎÎÊÌâÏà¹ØµÄÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬ÀýÈç֮ǰÔÚÏã¸Û¿¹Òéʱ´úÊӲ쵽µÄÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Ò»µ©×°±¸Êܵ½Ë𺦣¬£¬£¬£¬£¬£¬£¬LightSpy ¾Í»á°²ÅŶà½×¶ÎÖ²ÈëÀú³Ì£¬£¬£¬£¬£¬£¬£¬Öð²½ÊÍ·ÅÆäËùÓÐÌØ¹¤¹¦Ð§¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/espionage-campaign-returns-lightspy-targets-southern-asia/
6. CISA½«D-LINK¶à¸öÎó²îÌí¼Óµ½ÒÑ֪ʹÓõÄÎó²îĿ¼
4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö (CISA) ½«ÒÔÏ D-Link ¶à NAS ×°±¸È±ÏÝÌí¼Óµ½ÆäÒÑÖª¿ÉʹÓÃÎó²î (KEV) Ŀ¼ÖУºD-Link ¶à¸ö NAS ×°±¸Ê¹ÓÃÓ²±àÂëÆ¾Ö¤Îó²î£¨CVE-2024-3272£©ºÍD-Link ¶à¸ö NAS ×°±¸ÏÂÁî×¢ÈëÎó²î£¨CVE-2024-3273£©¡£¡£¡£¡£¡£¡£¡£CVE-2024-3272 ÊÇÓ°Ïì D-Link ¶à¸ö NAS ×°±¸µÄÓ²±àÂëÆ¾Ö¤Ê¹ÓÃÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃȱÏÝÓ°Ïì D-Link DNS-320L¡¢DNS-325¡¢DNS-327L ºÍ DNS-340L£¬£¬£¬£¬£¬£¬£¬ÕâЩװ±¸°üÀ¨Ó²±àÂëÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õß¾ÙÐоÓÉÉí·ÝÑéÖ¤µÄÏÂÁî×¢È룬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÔ¶³Ì¡¢Î´¾ÊÚȨµÄ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£CISA Ö¸³ö£¬£¬£¬£¬£¬£¬£¬¸ÃȱÏÝÓ°ÏìÒѵִïÉúÃüÖÜÆÚÖÕÖ¹ (EOL) »òЧÀÍÖÕÖ¹ (EOS) ÉúÃüÖÜÆÚµÄ D-Link ²úÆ·£¬£¬£¬£¬£¬£¬£¬Òò´Ë£¬£¬£¬£¬£¬£¬£¬Ó¦Æ¾Ö¤¹©Ó¦É̵ÄָʾÍËÒÛ²¢Ìæ»»ÕâЩ²úÆ·¡£¡£¡£¡£¡£¡£¡£È±ÏÝ CVE-2024-3272 ÊÇÓ°Ïì D-Link ¶à¸ö NAS ×°±¸µÄÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìD-Link DNS-320L¡¢DNS-325¡¢DNS-327L ºÍ DNS-340L£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/161739/security/cisa-d-link-multiple-nas-devices-bugs-known-exploited-vulnerabilities-catalog.html?web_view=true


¾©¹«Íø°²±¸11010802024551ºÅ