当前位置:网站首页>Tens of millions of Android infected with malicious virus and Microsoft disabled a function of Excel | global network security hotspot on October 9
Tens of millions of Android infected with malicious virus and Microsoft disabled a function of Excel | global network security hotspot on October 9
2022-06-24 03:20:00 【Tencent security】
1.GriftHorse Android Malware exists in 200 Fraud applications , influence 1000 Wan Tai equipment
exceed 1000 Ten thousand units Android Device infected by Google Play And third-party app stores Android Malware .
Mobile security company Zimperium Express , This activity is aimed at 70 A country / Device users in the region , Let victims subscribe to high-quality services through seemingly harmless fraud applications SMS service . be known as GriftHorse The Trojan horse exists in about 200 A malicious Android In the application , Most of them have gone from GooglePlay Delete from the store .
meanwhile ,Android Fraud apps steal hundreds of millions of dollars from victims .
according to Zimperium That's what I'm saying , Scam applications can entice users to click on malicious links to steal funds from their accounts . After installation , Fraud applications actively send various pop-up windows and notifications , Promise to provide all kinds of gifts and discounts . Victims can receive up to five notifications per hour , This increases the likelihood of their taking action .
After clicking , A malicious application redirects users to an online site that requires them to submit a phone number for verification to claim a prize . However , The threat agent secretly subscribes to the advanced SMS service , These services began to charge phone calls without their knowledge .
News source :
https://www.cpomagazine.com/cyber-security/grifthorse-android-malware-present-in-200-scam-apps-affects-10-million-devices-stealing-hundreds-of-millions/
2. Microsoft will protect... By disabling a traditional feature Excel
Microsoft Will soon be disabled by default Excel 4.0 XLM Macro to protect people's PC. Threat actors can use these types of macros to implant malware into people's PC. An attacker can send XLM Macros are placed in malicious documents , Download malware to unsuspecting victims' computers . By default , The switch will Microsoft 365 Disable these types of macros in the tenant .
Microsoft It is recommended that people use VBA macro , instead of Excel4.0XLM macro . these years , The company has been pushing people to use these more secure macros , But now it will be disabled by default Excel 4.0 XLM Macro to further promote .VBA Macro supports anti malware scanning interface (AMSI), It can scan documents for malware and other dangerous content .
Windows Administrators can use the Excel Trust Center disabled XLM macro , But Microsoft will soon default to disabling Excel 4.0 macro . The preview will be in 10 Month is disabled by default XLM macro , Will change in 11 Month launch .
News source :
https://www.windowscentral.com/microsoft-protect-excel-users-malware-disabling-ancient-feature
3. Extortion software criminals are still using old vulnerabilities to carry out network attacks
Network security researchers have examined the most common vulnerabilities and exposures in recent years (CVE). They discovered that some of these vulnerabilities have been around for nearly a decade , And there are vendor patches available . However, many organizations have not yet applied the available security updates , Therefore, it is still vulnerable to blackmail software attacks .
The oldest of the first five vulnerabilities detailed in the analysis is CVE-2012-1723, This is a Oracle Java SE7 in Java Runtime environment (JRE) A vulnerability in the component . This ransomware, though basic , But some organizations are still vulnerable , Because they didn't apply the relevant security patches .
Two other common vulnerabilities detailed by the researchers come from 2013 year .CVE-2013-0431 yes Reveton Extortion software uses JRE Loophole , and CVE-2013-1493 yes Exxroute Ransomware is aimed at Oracle Java Loophole . In both cases , Patches to fix bugs have been available for more than eight years .CVE-2018-12808 yes Adobe Acrobat One of them has a loophole for three years , Used for phishing emails and malicious PDF File transfer ransomware .
The latest vulnerability in the list is Adobe CVE-2019-1458, This is a Windows Right raising loophole in , On 2019 year 12 Month appears , And has been NetWalker Ransomware organizations often use .
about IT And the information security team , Maintaining network security has always been a tough battle .
News source :
https://www.zdnet.com/article/ransomware-cyber-criminals-are-still-exploiting-years-old-vulnerabilities-to-launch-attacks/
边栏推荐
- Supply chain system platform: two management areas
- Storage crash MySQL database recovery case
- What is cloud desktop and how to connect to the server? What does the mainstream architecture of cloud desktop include?
- What is the role of the distributed configuration center? What are the advantages of a distributed configuration center?
- If the cloud knows that security is important
- New Google brain research: how does reinforcement learning learn to observe with sound?
- 2022-2028 global high tibial osteotomy plate industry research and trend analysis report
- [new double 11] the latest interpretation of Tencent cloud double 11! Get 11000 yuan voucher now!!
- How to solve the problem of easycvr playing the total recording time in the specified time period?
- How does the fortress machine connect to the server? Which is easy to use, fortress machine or firewall?
猜你喜欢

UI automation based on Selenium

Ar 3D map technology
![[51nod] 3395 n-bit gray code](/img/b5/2c072a11601de82cb92ade94672ecd.jpg)
[51nod] 3395 n-bit gray code
![[51nod] 2653 section XOR](/img/2d/cb4bf4e14939ce432cac6d35b6a41b.jpg)
[51nod] 2653 section XOR

Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)

2022-2028 global cell-based seafood industry research and trend analysis report

Community pycharm installation visual database
![[51nod] 3216 Awards](/img/94/fdb32434d1343040d711c76568b281.jpg)
[51nod] 3216 Awards
![[summary of interview questions] zj5](/img/d8/ece82f8b2479adb948ba706f6f5039.jpg)
[summary of interview questions] zj5

QT creator tips
随机推荐
Under what circumstances do you need a fortress machine? What are the functions of a fortress machine
[51nod] 2653 section XOR
LeetCode 1047. Delete all adjacent duplicates in the string
What are the advantages of EIP? What is the relationship between EIP and fixed IP?
How to install the cloud desktop security server certificate? What can cloud desktops do?
What is the role of the distributed configuration center? What are the advantages of a distributed configuration center?
Ligature in font design
What is the price of the elastic public network IP bandwidth
Industry experts talk about "extortion virus": how does e-government build a moat?
The server size of the cloud desktop. The cloud desktop faces the server configuration requirements
How to build a shopping website? What problems should be paid attention to in the construction of shopping websites?
How to select a cloud game server? Which cloud game server recommends?
Elk7.15.1 installation, deployment and construction
What are the security guarantees for cloud desktop servers? What are the cloud desktop server platforms?
Is the cloud desktop server highly required for installation and configuration? Is cloud desktop easy to use?
Process kill problem
Tke accesses the cluster through kubectl in pod
What is fortress resource authorization? What is barrier machine?
Introduce the comparison of various distributed configuration centers? Which distributed configuration center is better?
What is distributed configuration center Nacos? What are the functions of distributed configuration center Nacos?