<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>말랑카우 농장</title>
    <link>https://malangkaw.tistory.com/</link>
    <description></description>
    <language>ko</language>
    <pubDate>Thu, 21 May 2026 05:25:42 +0900</pubDate>
    <generator>TISTORY</generator>
    <ttl>100</ttl>
    <managingEditor>malangkaw</managingEditor>
    <image>
      <title>말랑카우 농장</title>
      <url>https://tistory1.daumcdn.net/tistory/3084845/attach/fb4a43857bec4a37ab2f58720cdf1103</url>
      <link>https://malangkaw.tistory.com</link>
    </image>
    <item>
      <title>Threatpost: &amp;lt;퀄컴 버그에 노출된 안드로이드 스마트 폰&amp;gt;</title>
      <link>https://malangkaw.tistory.com/17</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;한 보안 연구자는 &lt;b&gt;안드로이드 스마트 폰 및 태블릿&lt;/b&gt; 유저들에게 &lt;b&gt;사용자 개입 없이도 악성 패킷 무선 전송을 통해 원격으로 안드로이드 기기를 공격하는 퀄컴(Qualcomm) 칩셋의 버그 &lt;i&gt;QualPwn&amp;nbsp;&lt;/i&gt;&lt;/b&gt;에 대한 경고를 내림&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;해당 취약점은 공격자가 &lt;b&gt;무선으로 WLAN과 모뎀을 손상시키는 것은 물론, WLAN 칩에서 안드로이드 커널을 공격할 수 있는 것&lt;/b&gt;이며, 공격을 위한 전제 조건은 &lt;b&gt;공격자와 피해자의 안드로이드 기기가 같은 와이파이 네트워크에서 활성화되어있어야 한다&lt;/b&gt;는 점임&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;WLAN의 입력 크기를 확인하지 않은 버퍼 복사, 버퍼 오버플로우, 그리고 리눅스 커널 문제라고 칭한 세 가지 취약점을 가진 &lt;b&gt;퀄컴 Snapdragon 835와 Snapdragon 845 칩을 가진 패치되지 않은 스마트 폰은 취약&lt;/b&gt;하다고 연구자는 말함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/android-phones-qualpwn/146989/&quot;&gt;https://threatpost.com/android-phones-qualpwn/146989/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1565148058000&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/android-phones-qualpwn/146989/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/android-phones-qualpwn/146989/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/dgUmal/hyCj0n7gxh/hk8BGRU6u0ht6ydeIUqqhk/img.jpg?width=800&amp;amp;height=506&amp;amp;face=0_0_800_506');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Millions of Android Smartphones Vulnerable to Trio of Qualcomm Bugs&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Flaws in Qualcomm chipset expose millions of Android devices to a hacking threat.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>QualPwn</category>
      <category>Threatpost</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>안드로이드 취약점</category>
      <category>안드로이드 해킹</category>
      <category>퀄컴</category>
      <category>퀄컴 취약점</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/17</guid>
      <comments>https://malangkaw.tistory.com/17#entry17comment</comments>
      <pubDate>Wed, 7 Aug 2019 12:27:49 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;iMessage 해킹에 노출된 90%의 아이폰 유저들&amp;gt;</title>
      <link>https://malangkaw.tistory.com/16</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;b&gt;사용자의 개입 없이도 iMessage를 통해서 아이폰에 저장된 사진, 영상, 메모, PDF 등의 파일을 유출시킬 수 있는 버그&lt;/b&gt;가 아이폰에서 발견됨&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;해당 버그는 MacOS와 피해자의 휴대폰 전화번호 혹은 iMessage 계정만 알고 있다면 손쉽게 실행할 수 있는 것으로, &lt;b&gt;파일 저장 공간을 노출시킨다는 점에서 아이폰 탈옥과 비슷&lt;/b&gt;하며 iOS의 가장 중요한 기본 요소 중의 하나인 샌드박스의 무결성에 의심을 품게 함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;애플은 7월 22일 해당 취약점에 대한 패치를 내놓았지만, &lt;b&gt;8월 1일 기준 전체 아이폰 사용자의 9.6%에 해당하는 사람만 업데이트를 한 상태&lt;/b&gt;임&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;span style=&quot;color: #333333;&quot;&gt;관련 기사&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;span style=&quot;color: #333333;&quot;&gt;Threatpost: &amp;lt;공격자가 원격으로 메세지를 읽을 수 있는 아이폰 취약점&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;span style=&quot;color: #333333;&quot;&gt;링크: &lt;a href=&quot;https://threatpost.com/apple-imessage-remote-attackersread-iphone-messages/146789/&quot;&gt;https://threatpost.com/apple-imessage-remote-attackersread-iphone-messages/146789/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1565100708704&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/apple-imessage-remote-attackersread-iphone-messages/146789/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/apple-imessage-remote-attackersread-iphone-messages/146789/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/rYia8/hyCjMJNVPq/kk8GuzUH5DukKmA8sFky60/img.jpg?width=700&amp;amp;height=467&amp;amp;face=0_0_700_467');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Apple iMessage Allows Remote Attackers to Read iPhone Messages, Images&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Remote exploitation can be achieved with no user interaction.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;원문 기사&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/&quot;&gt;https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1565100789679&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/ch63T2/hyChHchds1/6PafES9qoR2pzyQTz4LFNK/img.png?width=768&amp;amp;height=495&amp;amp;face=0_0_768_495');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;90% of Enterprise iPhone Users Open to iMessage Spy Attack&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Vast majority of Apple iOS users haven't updated to iOS 12.4, leaving themselves wide open to a public exploit.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>imessage</category>
      <category>Threatpost</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>아이폰 업데이트</category>
      <category>아이폰 탈옥</category>
      <category>아이폰 패치</category>
      <category>아이폰 해킹</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/16</guid>
      <comments>https://malangkaw.tistory.com/16#entry16comment</comments>
      <pubDate>Tue, 6 Aug 2019 23:15:04 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;집을 위험에 노출시키는 IoT 스마트 데드볼트(도어락) 취약점&amp;gt;</title>
      <link>https://malangkaw.tistory.com/15</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;연구자들은 안드로이드 및 iOS 모바일 앱을 통해 원격으로 도어락 비밀번호를 입력하여 문을 열고 잠글 수 있는 &lt;b&gt;유명 스마트 도어락에서 피해자의 휴대전화에 접근만 한다면 도어락 잠금을 풀 수 있는 취약점을 발견&lt;/b&gt;함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;발견된 총 여섯 개의 취약점은 안전하지 않은 애플리케이션 저장소와 부적절한 API 접근 제어부터 평문 암호 통신까지 포함이 되어있으며, 이 중 두 개의 취약점은 도어락 잠금을 제어하는 &lt;b&gt;중요 데이터를 암호화 하지않고 데이터베이스에 저장하는 점&lt;/b&gt;에서 기인하였고, 또 다른 하나는 안드로이드 기기에 저장되는 &lt;b&gt;모든 인터넷 API 통신 및 도어락과의 직접적인 통신 관련 디버깅 로그가 안드로이드 앱에서 접근 가능&lt;/b&gt;하다는 점에서 기인하였음&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;취약점이 발견된 유명 도어락의 벤더사는 취약점에 대한 패치나 대응 방안을 내놓고 있지 않으며, 연구자는 패치가 될 때까지 위험을 방지하기 위해 휴대 전화 잠금을 철저히하고 도어락 비밀번호를 타인과 공유하지 않을 것을 권장함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;관련 기사 1.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Threatpost: &amp;lt;스마트하지 않은 스마트 도어락&amp;gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/smart-lock-turns-out-to-be-not-so-smart-or-secure/146091/&quot;&gt;https://threatpost.com/smart-lock-turns-out-to-be-not-so-smart-or-secure/146091/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564757164698&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/smart-lock-turns-out-to-be-not-so-smart-or-secure/146091/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/smart-lock-turns-out-to-be-not-so-smart-or-secure/146091/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/b515Ov/hyCfREEhQJ/oOoJ7zalPlJfeKNaSI0nZk/img.jpg?width=1500&amp;amp;height=1500&amp;amp;face=0_0_1500_1500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Smart Lock Turns Out to be Not So Smart, or Secure&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Pentesters say a keyless smart lock made by U-tec, called Ultraloq, is neither ultra or secure.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;관련 기사 2.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Threatpost: &amp;lt;&quot;깨지지 않는&quot; 스마트 도어락 Tapplock의 주요 보안 패치&amp;gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/unbreakable-smart-lock-tapplock-issues-critical-security-patch/132918/&quot;&gt;https://threatpost.com/unbreakable-smart-lock-tapplock-issues-critical-security-patch/132918/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564757573337&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/unbreakable-smart-lock-tapplock-issues-critical-security-patch/132918/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/unbreakable-smart-lock-tapplock-issues-critical-security-patch/132918/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/ejck8n/hyCf1N0FE7/BiMrIu4MHpmdjgQav4qK00/img.jpg?width=700&amp;amp;height=467&amp;amp;face=0_0_700_467');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;&amp;ldquo;Unbreakable&amp;rdquo; Smart Lock Tapplock Issues Critical Security Patch&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Researchers were able to discover a way to hack the device in less than an hour.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/unpatched-flaws-in-iot-smart-deadbolt-open-homes-to-danger/146871/&quot;&gt;https://threatpost.com/unpatched-flaws-in-iot-smart-deadbolt-open-homes-to-danger/146871/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564757586680&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/unpatched-flaws-in-iot-smart-deadbolt-open-homes-to-danger/146871/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/unpatched-flaws-in-iot-smart-deadbolt-open-homes-to-danger/146871/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/k0tYr/hyCfOgRw2B/ssKKorOHZkwrySksMv16a0/img.jpg?width=800&amp;amp;height=532&amp;amp;face=0_0_800_532');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Researchers are warning that unpatched flaws found in the Hickory Smart Bluetooth Enabled Deadbolt allow an attacker with access to a victim's phone to break into their houses.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>Threatpost</category>
      <category>도어락 해킹</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>블루투스 도어락</category>
      <category>스마트 도어락</category>
      <category>스마트 도어락 해킹</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/15</guid>
      <comments>https://malangkaw.tistory.com/15#entry15comment</comments>
      <pubDate>Fri, 2 Aug 2019 23:56:29 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;레딧과 SMS 문자의 게임 링크로 퍼지는 안드로이드 랜섬웨어&amp;gt;</title>
      <link>https://malangkaw.tistory.com/14</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;최근 레딧(Reddit)이나 안드로이드 개발자 포럼 XDA Developers에 &lt;b&gt;성인용 게임 혹은 기술 관련 토픽으로 연결되는 링크를 올려 피해자의 파일들을 암호화시키는 안드로이드 랜섬웨어 Android/Filecoder.C&lt;/b&gt; 가 퍼지고 있음&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;피해자의 연락처를 이용해 SMS 문자로 악성 링크를 더욱 퍼뜨리는 이 랜섬웨어는 아직 좁은 타겟층과 실행상 결함으로 피해가 제한적이지만, 랜섬웨어 운영자가 더 넓은 범위의 사용자를 타겟으로 삼는다면 심각한 위협이 될 것&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;b&gt;.zip 파일, .rar 파일, 50MB 이상의 파일 혹은 150KB 이하의 JPEG, JPG, PNG 파일을 제외한 DOC, PPT, JPEG 등의 파일을 암호화&lt;/b&gt;시키며 72시간 후에 모든 데이터를 삭제시키고 애플리케이션을 삭제해도 암호화되지 않는 이 랜섬웨어를 피하기 위해 &lt;b&gt;기기를 항상 최신 버전으로 업데이트하고 Google Play를 통해 애플리케이션을 다운할 것&lt;/b&gt;을 연구자들은 조언함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;관련 기사 1.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Threatpost: &amp;lt;2천 5백만 안드로이드 폰을 감염시켜 악성 광고를 유포한 악성 소프트웨어 Agent Smith&amp;gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/malware-agent-smith-android-ads/146359/&quot;&gt;https://threatpost.com/malware-agent-smith-android-ads/146359/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564661739034&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/malware-agent-smith-android-ads/146359/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/malware-agent-smith-android-ads/146359/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/c7IJVj/hyCfZhFp5u/ksNvf3phVFIietkTXnfoK0/img.jpg?width=800&amp;amp;height=450&amp;amp;face=0_0_800_450');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Agent Smith Malware Infects 25M Android Phones to Push Rogue Ads&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Researchers say malware infects phones in order to sneak ads on devices for profit.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;관련 기사 2.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Threatpost: &amp;lt;인증서에 자체 서명이 가능한 안드로이드 스파이웨어 Monokle&amp;gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/monokle-android-spyware/146655/&quot;&gt;https://threatpost.com/monokle-android-spyware/146655/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564661880031&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/monokle-android-spyware/146655/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/monokle-android-spyware/146655/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/O7Lsj/hyCd8m2ilD/KwH7PnHfw5aS0QBu4kPKCk/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Unique Monokle Android Spyware Self-Signs Certificates&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;원본 기사&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/android-ransomware-spreads-via-sex-simulation-game-links-on-reddit-sms/146774/&quot;&gt;https://threatpost.com/android-ransomware-spreads-via-sex-simulation-game-links-on-reddit-sms/146774/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564661889751&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/android-ransomware-spreads-via-sex-simulation-game-links-on-reddit-sms/146774/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/android-ransomware-spreads-via-sex-simulation-game-links-on-reddit-sms/146774/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/PYr2U/hyCd1amNBQ/SPEe3nbhojizNe2sFHIA4k/img.png?width=800&amp;amp;height=471&amp;amp;face=0_0_800_471');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Android Ransomware Spreads Via 'Sex Simulation Game' Links on Reddit, SMS&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;A new strain of ransomware is being distributed to Android users via online forums and SMS messages.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>Android/Filecoder.C</category>
      <category>Threatpost</category>
      <category>랜섬웨어</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>안드로이드</category>
      <category>안드로이드 감염</category>
      <category>안드로이드 랜섬웨어</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/14</guid>
      <comments>https://malangkaw.tistory.com/14#entry14comment</comments>
      <pubDate>Thu, 1 Aug 2019 21:21:35 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;미 국토 안보부, 경비행기 해킹 경고&amp;gt;</title>
      <link>https://malangkaw.tistory.com/13</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;미국 국토 안보부는 지난 화요일 &lt;b&gt;경비행기에 물리적 접근이 가능한 공격자로부터 비행기 원격 측정 데이터 조작 등의 계측 제어 시스템 해킹으로 비행기 제어 권한을 빼앗길 수 있는 취약점이 존재&lt;/b&gt;한다고 경고를 내림&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;b&gt;계측 제어 시스템(CAN, Controller Area Network)란, 호스트 컴퓨터가 없을 시 마이크로 컨트롤러와 기기가 서로 응용 프로그램 안에서 소통할 수 있도록 해주는 자동차나 경비행기 하드웨어의 일부분&lt;/b&gt;으로, 계측 제어 시스템 해킹은 지난 2014년 Jeep 해킹 사건의 배후이기도 함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;조사의 일부분으로 유통되고 있는 두 항공 전자 시스템에 엔진 원격 측정값, 나침반과 고도값, 대기 속도 그리고 임계각의 허위 값 주입을 시도한 결과 성공하였고, 연구자는 보안 강화를 위해 개방형인 CAN의 특성을 고려하여 &lt;b&gt;메시지 인증 프로토콜(Message Authentication Protocol) 도입&lt;/b&gt;과 CAN의 데이터 처리 양 및 속도를 좌우하는 &lt;b&gt;CAN FD(CAN 프로토콜, CAN with Flexible Date-Rates)의 속도를 8 바이트에서 64 바이트로의 증가를 권함&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;관련 기사&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Threatpost: &amp;lt;자동차 원격 공격의 시대&amp;gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/car-hacking-enters-remote-exploitation-phase/107626/&quot;&gt;https://threatpost.com/car-hacking-enters-remote-exploitation-phase/107626/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564585891829&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/car-hacking-enters-remote-exploitation-phase/107626/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/car-hacking-enters-remote-exploitation-phase/107626/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/yfdSV/hyCd02JkKP/N9lmj6rAsn5anGrk1aX5JK/img.jpg?width=680&amp;amp;height=400&amp;amp;face=181_49_501_148');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Car Hacking Enters Remote Exploitation Phase&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Researchers Charlie Miller and Chris Valasek today at Black Hat talked about their research on the remote attack surfaces present in popular automobiles.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/dhs-warning-small-aircraft-hacking/146795/&quot;&gt;https://threatpost.com/dhs-warning-small-aircraft-hacking/146795/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564585912735&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/dhs-warning-small-aircraft-hacking/146795/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/dhs-warning-small-aircraft-hacking/146795/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bdKd8t/hyCd0PcZLZ/cT23uVRlQpw0zCLRW9tKA1/img.jpg?width=800&amp;amp;height=531&amp;amp;face=0_0_800_531');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;DHS Warning: Small Aircraft are Ripe for Hacking&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Hackers with physical access to small aircraft can easily hack the plane's CAN bus system and take control of key navigation systems.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>can</category>
      <category>Threatpost</category>
      <category>경비행기 해킹</category>
      <category>계측 제어 시스템</category>
      <category>미국 국토 안보부</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>비행기 해킹</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/13</guid>
      <comments>https://malangkaw.tistory.com/13#entry13comment</comments>
      <pubDate>Thu, 1 Aug 2019 00:15:58 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;구글을 카드 도용 방법으로 쓰는 최근 카드 도용자&amp;gt;</title>
      <link>https://malangkaw.tistory.com/12</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;구글 사이트처럼 위장한 악성 도메인을 이용하여 방문자를 속이는 것이 최신 카드 도용 수법&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;사이버 범죄자들은 &lt;b&gt;유명한 웹 사이트의 주소를 한 글자 바꾸어 악성 웹 사이트로 사용하는 타이포 스쿼팅(Typosquatting) 방법을 사용&lt;/b&gt;해 실수로 웹 사이트에 들어온 사용자들을 속임&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;공격자는 온라인 이커머스로 들어오는 정보를 저장하고 탈취하기 위해 JavaScript를 사용하고, 2018년 기준 온라인 이커머스 플랫폼 Magento의 83%가량되는 웹 사이트가 취약하다고 함.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/google-sites-card-skimming-thieves/146694/&quot;&gt;https://threatpost.com/google-sites-card-skimming-thieves/146694/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564466064621&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/google-sites-card-skimming-thieves/146694/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/google-sites-card-skimming-thieves/146694/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bmqoBB/hyCbRk3JlH/nbw5QVgt7LeTc8tRt7Sly1/img.jpg?width=1000&amp;amp;height=667&amp;amp;face=0_0_1000_667');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;&amp;lsquo;Google&amp;rsquo; Sites Are the Latest Ploy by Card-Skimming Thieves&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;A credit-card skimmer on Magento sites was found loading JavaScript from a legitimate-seeming Google Analytics domain.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>magento</category>
      <category>Threatpost</category>
      <category>구글 사칭</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>카드 도용</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/12</guid>
      <comments>https://malangkaw.tistory.com/12#entry12comment</comments>
      <pubDate>Tue, 30 Jul 2019 14:57:53 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;개인정보 도둑의 쉬운 먹잇감이 되는 게이머들&amp;gt;</title>
      <link>https://malangkaw.tistory.com/11</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;보안이 아닌 게임에 관심이 많은 어린 게임 유저들의 게임 아이디, 특히 마인크래프트, 포트 나이트, 룬 스케이프의 계정은 개당 최대 $40(약 4만 원)에 거래됨&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;연구에 따르면 &lt;b&gt;2017년 11월 이후 게임 웹 사이트에 12억 건의 크레덴셜 스터핑 공격&lt;/b&gt;이 행해졌다고 함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;크고 작은 &lt;b&gt;게임 회사들이 사용자들의 계정이 해킹으로부터 위험하다는 것을 인지하고 있지만,&lt;/b&gt; 사용자에게 패스워드 리셋이나 카드 CVV 번호를 통한 계정 인증 등을 요구하는 등의 &lt;b&gt;단계를 추가하면 고객 이탈과 수익 감소로 이어지기 때문에 기피하고 있다&lt;/b&gt;고 함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/gamers-are-easy-prey-for-credential-thieves/146700/&quot;&gt;https://threatpost.com/gamers-are-easy-prey-for-credential-thieves/146700/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564394043643&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/gamers-are-easy-prey-for-credential-thieves/146700/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/gamers-are-easy-prey-for-credential-thieves/146700/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/pBfJE/hyB9WOdw7W/I9tJ9dRFuqLVrBXBtjX640/img.jpg?width=800&amp;amp;height=451&amp;amp;face=0_0_800_451');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Gamers Are Easy Prey for Credential Thieves&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Gamers are easy pickings for credential crooks, thanks to lax security hygiene and poor gaming company practices.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>Threatpost</category>
      <category>게임</category>
      <category>게임 해킹</category>
      <category>계정 해킹</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>크레덴셜 스터핑</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/11</guid>
      <comments>https://malangkaw.tistory.com/11#entry11comment</comments>
      <pubDate>Mon, 29 Jul 2019 18:56:53 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;악성 스팸 활동에 쓰이는 유명 파일 공유 서비스 WeTransfer&amp;gt;</title>
      <link>https://malangkaw.tistory.com/10</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;공격자는 파일 업로드 후 이메일 링크를 통해 해당 파일을 공유하는 유명 파일 공유 서비스 WeTransfer의 방식을 &lt;b&gt;스팸 이메일 차단 우회 기법으로 악용&lt;/b&gt;하고 있음&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;공격자는 이메일 수신, 발신 주소를 넣고 수신자가 혹할만한 내용(ex. 검토 필요한 파일 등)을 작성하여 피해자가 의심 없이 '파일 받기' 버튼을 누른 후 WeTransfer 다운로드 페이지로 리디렉트 되도록 하여 &lt;b&gt;HTM 혹은 HTML 파일 다운로드를 유도&lt;/b&gt;한 후, 피해자가 다운로드한 &lt;b&gt;.html 파일을 열면 피싱 웹 사이트로 리디렉트 시켜 Office 365 로그인 요구 등을 통해 계정 정보 탈취를 시도함&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;관계자는 이러한 공격 수단이 WeTransfer 등의 유명 웹 사이트는 잠재적 위험으로 이메일 게이트웨이에서 잘 간주되지 않는 점을 악용한 것이라고 말함&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/&quot;&gt;https://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564136405233&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bgpIJ5/hyB9VGz69x/s3slRRbI3kIvaYSkhBAokk/img.jpg?width=926&amp;amp;height=620&amp;amp;face=0_0_926_620');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Popular File-Sharing Service WeTransfer Used in Malicious Spam Campaigns&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;WeTransfer is being used by hackers to circumvent email gateways looking to zap malicious links.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>Threatpost</category>
      <category>WeTransfer</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>스팸 메일</category>
      <category>파일 공유 서비스</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/10</guid>
      <comments>https://malangkaw.tistory.com/10#entry10comment</comments>
      <pubDate>Fri, 26 Jul 2019 19:24:50 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;'Spearphone' 도청 가능한 삼성, LG 안드로이드 폰&amp;gt;</title>
      <link>https://malangkaw.tistory.com/9</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;가속도계와 스피커가 가까이 위치한 삼성과 LG의 스마트폰 몇몇 기종(LG G3, 삼성 갤럭시 노트4/S6)에서 &lt;b&gt;안드로이드 기기&lt;/b&gt;에 내장된 &lt;b&gt;동작 센서가 스마트폰 스피커에서 나오는 소리의 잔향을 감지하는 점을 이용하여 대화를 추측하는 스피어 폰&lt;/b&gt; 형태의 새로운 도청 방식이 발견됨.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;&lt;b&gt;가속도계(동작 센서)는 항상 켜져 있고 데이터 제공에 권한이 필요 없기 때문&lt;/b&gt;에 악성 애플리케이션이나 웹 사이트가 쉽게 잔향을 실시간으로 듣기, 녹음 및 생중계가 가능하고, 이렇게 얻은 자료는 분석되어 사적인 정보 또한 추론될 수 있음.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;공격자가 악성 앱 다운로드를 유도하거나 피해자가 악성 웹 사이트를 브라우징하고 있을 때 JavaScript를 통해 동작 센서 감지를 추적을 통해 정보를 추론할 수 있는 &lt;b&gt;이 취약점은 센서에 권한 제한을 둠으로써 위험도를 경감시킬 수 있지만, 이 경우 스마트폰 편의성에 영향을 주기 때문에, 잠재적 방어 방법은 하드웨어 재 설계임&lt;/b&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/samsung-lg-android-spearphone-eavesdropping/146625/&quot;&gt;https://threatpost.com/samsung-lg-android-spearphone-eavesdropping/146625/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1564056385260&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/samsung-lg-android-spearphone-eavesdropping/146625/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/samsung-lg-android-spearphone-eavesdropping/146625/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cjkWN3/hyB8Hbn8ia/lfqcKkaL1ikLd2CKwGpkp1/img.jpg?width=700&amp;amp;height=467&amp;amp;face=0_0_700_467');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;Popular Samsung, LG Android Phones Open to &amp;lsquo;Spearphone&amp;rsquo; Eavesdropping&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>LG 취약점</category>
      <category>Threatpost</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <category>삼성 취약점</category>
      <category>스피어폰</category>
      <category>안드로이드</category>
      <category>안드로이드 취약점</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/9</guid>
      <comments>https://malangkaw.tistory.com/9#entry9comment</comments>
      <pubDate>Thu, 25 Jul 2019 21:11:20 +0900</pubDate>
    </item>
    <item>
      <title>Threatpost: &amp;lt;VLC 미디어 플레이어, 패치되지 않은 치명적인 원격 코드 실행 취약점(RCE) 발견&amp;gt;</title>
      <link>https://malangkaw.tistory.com/8</link>
      <description>&lt;p&gt;&lt;b&gt;세 줄 요약&lt;/b&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;오픈소스 미디어 플레이어 &lt;b&gt;VLC에서 원격 코드 실행 및 악의적 행위가 가능한 치명적인 취약점이 발견&lt;/b&gt;되었고, 이것은 심지어 &lt;b&gt;아직 패치가 존재하지 않는 상황.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;CVSS 3.0에서 10점 만점에 9.8점에 해당하는 위험도 점수를 받은 해당 취약점은 원격이자 익명의 공격자가 &lt;b&gt;임의의 코드를 실행, 서비스 거부(Denial of Service) 상태를 만들기, 정보 유출 또는 파일 변조를 할 수 있다&lt;/b&gt;고 함.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;font-size: 0.87em;&quot;&gt;&lt;span style=&quot;color: #0051a1;&quot;&gt;메모리 버퍼 범위의 문제로 밝혀진 해당 취약점에 대한 &lt;b&gt;패치는 60% 정도 완성된 상태&lt;/b&gt;이고, 지난 6월 발견된 두 가지(Out-of-bound 쓰기 취약점, 스택-버퍼 오버플로우 취약점) 심각한 취약점 패치 이후 나타난 최신 취약점임.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;관련 기사&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Threatpost: &amp;lt;VLC 플레이어, 두 개의 심각한 취약점 패치하다&amp;gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/vlc-player-gets-patched-for-two-high-severity-bugs/145518/&quot;&gt;https://threatpost.com/vlc-player-gets-patched-for-two-high-severity-bugs/145518/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1563976860255&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/vlc-player-gets-patched-for-two-high-severity-bugs/145518/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/vlc-player-gets-patched-for-two-high-severity-bugs/145518/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/degg7C/hyB6OicnCi/hze35x51L3w8vHHZkb4Ys1/img.jpg?width=680&amp;amp;height=400&amp;amp;face=0_0_680_400');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;VLC Player Gets Patched for Two High Severity Bugs&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;Popular media player receives 33 security bug fixes, two of which are rated high severity.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&lt;b&gt;기사 원문&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;링크:&amp;nbsp;&lt;a href=&quot;https://threatpost.com/vlc-media-player-plagued-by-unpatched-critical-rce-flaw/146611/&quot;&gt;https://threatpost.com/vlc-media-player-plagued-by-unpatched-critical-rce-flaw/146611/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1563976875119&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a href=&quot;https://threatpost.com/vlc-media-player-plagued-by-unpatched-critical-rce-flaw/146611/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-original-url=&quot;https://threatpost.com/vlc-media-player-plagued-by-unpatched-critical-rce-flaw/146611/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/ktwCM/hyB8MwhTrI/Hq021Ab9E1eLD78KYfDxYK/img.jpg?width=800&amp;amp;height=471&amp;amp;face=0_0_800_471');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot;&gt;VLC Player Has Critical RCE Flaw With No Patch Available&lt;/p&gt;
&lt;p class=&quot;og-desc&quot;&gt;A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.&lt;/p&gt;
&lt;p class=&quot;og-host&quot;&gt;threatpost.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>보안 기사 스크랩</category>
      <category>CVSS 3.0</category>
      <category>RCE</category>
      <category>Threatpost</category>
      <category>VLC</category>
      <category>VLC 취약점</category>
      <category>보안</category>
      <category>보안기사</category>
      <category>보안뉴스</category>
      <author>malangkaw</author>
      <guid isPermaLink="true">https://malangkaw.tistory.com/8</guid>
      <comments>https://malangkaw.tistory.com/8#entry8comment</comments>
      <pubDate>Wed, 24 Jul 2019 23:02:45 +0900</pubDate>
    </item>
  </channel>
</rss>