腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Android 手机禁用了 WiFi 还会发送 WiFi 扫描探测数据包吗? https://hal.inria.fr/hal-01575519/document
-
[ Browser ] turbofan 编译器优化不当导致 Chrome 远程代码执行: https://blogs.securiteam.com/index.php/archives/3379
-
[ Conference ] sha2017camp 上 12 个值得一看的演讲: http://blog.ptsecurity.com/2017/08/12-great-technical-talks-at-sha2017.html
-
[ Conference ] BlackHat 官方陆续在 Youtube 上公开 BlackHat USA 2017 会议的视频: https://www.youtube.com/channel/UCJ6q9Ie29ajGqKApbLqfBOg
-
[ Data Breach ] Instagram 遭受数据泄露,黑客获得大量用户信息,包括私人手机号、邮箱地址等: https://www.techposts.net/instagram-suffered-data-breach-hacker-gained-contact-information/
-
[ Hardware ] HackSysExtremeVulnerableDriver 驱动一个任意地址写漏洞的分析和利用: https://blahcat.github.io/2017/08/31/arbitrary-write-primitive-in-windows-kernel-hevd/
-
[ Industry News ] 澳大利亚的维多利亚洲去年被盗汽车 1.6 万辆,损失 1.7 亿美金。有位研究员打算写一个车载车牌扫描器,车辆被盗时会自动报警通知: https://medium.freecodecamp.org/how-i-replicated-an-86-million-project-in-57-lines-of-code-277031330ee9
-
[ Malware ] Locky ransomware 恶意软件增加了沙箱环境对抗特征: https://blog.malwarebytes.com/threat-analysis/2017/08/locky-ransomware-adds-anti-sandbox-feature/
-
[ MalwareAnalysis ] nccgroup 对最近的 Poison Ivy 样本的分析: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/analysing-a-recent-poison-ivy-sample/
-
[ MalwareAnalysis ] 剖析 Facebook 恶意软件通过 Chrome 扩展传播的流程: https://labs.detectify.com/2017/08/31/dissecting-the-chrome-extension-facebook-malware/
-
[ Others ] android-keyboard-gadget - 将 Android 设备模拟为 USB 键盘、鼠标来操作电脑,目前支持 Nexus、Sony、小米等一些手机型号: https://github.com/pelya/android-keyboard-gadget
-
[ Others ] 解琐我的 Lenovo 笔记本 Part 1: http://zmatt.net/unlocking-my-lenovo-laptop-part-1/ Part 2: http://zmatt.net/unlocking-my-lenovo-laptop-part-2/
-
[ Popular Software ] WooCommerce WordPress 插件修复了反射型 XSS 漏洞: https://threatpost.com/reflected-xss-bug-patched-in-popular-woocommerce-wordpress-plugin/127744/
-
[ ReverseEngineering ] 集成 Google Voice 功能的 OBi200 VOIP 网关设备固件的逆向: https://randywestergren.com/reverse-engineering-obi200-google-voice-appliance-part-1/
-
[ Tools ] CertReq 工具可以被用于将 Windows 系统存储的证书信息发送至远程服务器: https://www.doyler.net/security-not-included/certreq-exfiltration
-
[ Tools ] WikiLeaks 新公开了一个 CIA Windows 入侵工程 - Angelfire,Angelfire 由 Solartime、Wolfcreek、Keystone 等几个组件构成,主要的功能是篡改启动扇区,在 Windows 系统启动早期劫持 Loader,加载恶意第三方驱动: https://wikileaks.org/vault7/document/Angelfire-2_0-UserGuide/Angelfire-2_0-UserGuide.pdf
-
[ Tools ] ReconScan - 一款网络侦察和漏洞评估工具: https://github.com/RoliSoft/ReconScan
-
[ Vulnerability ] AT&T 给客户的 Arris 家用 Modem/路由器被发现了多个漏洞,其中一个是 Modem 中 ROOT 权限运行的 cshell 服务允许 SSH 连接,而且是通过硬编码的密钥。分析报告来自 Nomotion 公司,Nomotion 表示不清楚这些固件漏洞是来自 Arris 官方还是来自 ATT 的定制: https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ https://www.nomotion.net/blog/sharknatto/
-
-
-
-
[ Industry News ] DFRLab 用户在 Twitter 上遭到大量机器人(Bots)的骚扰,DFRLab 对该事件的调查:https://medium.com/dfrlab/botspot-the-intimidators-135244bfe46b
-
[ Industry News ] 托管了数十个文件转换站点的服务器被黑,大量用户上传的原始文件恐遭窃取: http://www.zdnet.com/article/dozens-of-online-file-converter-sites-are-unsafe-to-use-warns-researcher/
-
-
-
[ Others ] When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-mcgregor.pdf
-
[ Vulnerability ] Flash 高级漏洞之 Youtube Flash Api 用户信息泄露漏洞的分析: https://opnsec.com/2017/08/advanced-flash-vulnerabilities-in-youtube/
-