{"id":55127,"date":"2018-03-22T14:32:16","date_gmt":"2018-03-22T06:32:16","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=55127"},"modified":"2018-09-25T15:36:12","modified_gmt":"2018-09-25T07:36:12","slug":"%e5%81%bd%e8%a3%9d%e6%88%90%e7%84%a1%e7%b7%9a%e7%b6%b2%e8%b7%af%e5%ae%89%e5%85%a8%e6%87%89%e7%94%a8%e7%a8%8b%e5%bc%8frottensys%e5%b0%87-android-%e8%a1%8c%e5%8b%95%e8%a3%9d%e7%bd%ae%e8%ae%8a%e6%88%90","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=55127","title":{"rendered":"\u507d\u88dd\u6210\u7121\u7dda\u7db2\u8def\u5b89\u5168\u61c9\u7528\u7a0b\u5f0f,RottenSys\u5c07 Android \u884c\u52d5\u88dd\u7f6e\u8b8a\u6210\u6bad\u5c4d\u7db2\u8def"},"content":{"rendered":"<blockquote><p><a href=\"https:\/\/tw.appledaily.com\/new\/realtime\/20180320\/1318374\/\">\u5831\u5c0e\u6307\u51fa<\/a>\u4e00\u6b3e\u540d\u70ba\u300cRottenSys\u300d\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c\u900f\u904e\u690d\u5165\u5ee3\u544a\u8a98\u9a19\u7528\u6236\u9ede\u64ca\u3001\u725f\u53d6\u66b4\u5229\uff0c\u4f30\u8a08\u8fd1 500\u842c\u53f0\u624b\u6a5f\u5728\u4e0a\u5e02\u524d\u5c31\u88ab\u6697\u85cf\u60e1\u610f\u8edf\u9ad4\uff0c\u5305\u62ec\u83ef\u70ba\u3001\u5c0f\u7c73\u3001OPPO \u7b49\u4e2d\u570b\u5ee0\u724c\u624b\u6a5f\u90fd\u906d\u6b83\u3002\u672c\u6587\u6df1\u5165\u89e3\u6790RottenSys\u00a0\u3002<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<h3>2016\u5e74\u4ee5\u4f86\u5f71\u97ff\u8fd1 500 \u842c\u53f0\u7684Android\u8a2d\u5099<\/h3>\n<p>\u5b89\u5168\u7814\u7a76\u4eba\u54e1\u767c\u73fe\u4e00\u6b3e\u88ab\u7a31\u70ba RottenSys \u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/adware\">\u5ee3\u544a\u8edf\u9ad4<\/a>\uff08\u8da8\u52e2\u79d1\u6280\u5c07\u5176\u5075\u6e2c\u70baANDROIDOS_ROTTENSYS\uff09\uff0c\u64da\u5831\u81ea2016\u5e74\u4ee5\u4f86\u5f71\u97ff\u4e86\u8fd1500\u842c\u53f0\u7684Android\u8a2d\u5099\u3002RottenSys\u662f\u6839\u64da\u6240\u5206\u6790\u7684\u6a23\u672c\u547d\u540d\uff0c\u76ee\u524d\u6709316\u7a2e\u8b8a\u7a2e\uff0c\u6bcf\u7a2e\u90fd\u6839\u64da\u653b\u64ca\u6d3b\u52d5\uff0c\u6240\u91dd\u5c0d\u5ee3\u544a\u5e73\u53f0\u53ca\u6563\u64ad\u7ba1\u9053\u4f86\u5ba2\u88fd\u5316\u3002\u9032\u4e00\u6b65\u5c0dRottenSys\u9032\u884c\u7814\u7a76\u5f8c\u767c\u73fe\u5e55\u5f8c\u64cd\u4f5c\u8005\u6b63\u5728\u5617\u8a66\u65b0\u4e00\u6ce2\u7684\u653b\u64ca\uff0c\u6703\u5c07\u53d7\u5f71\u97ff\u8a2d\u5099\u8b8a\u6210<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/botnet\">\u6bad\u5c4d\u7db2\u8def<\/a>\u3002<\/p>\n<p><strong>[TrendLabs<\/strong><strong>\u7814\u7a76\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/2017-mobile-threat-landscape\">2017\u5e74\u7684\u884c\u52d5\u5a01\u8105\u74b0\u5883<\/a>]<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16328\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security.png\" alt=\"\" width=\"1145\" height=\"555\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security.png 1145w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security-300x145.png 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security-768x372.png 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security-1024x496.png 1024w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security-600x291.png 600w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security-30x15.png 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/cloud-app-security-800x388.png 800w\" sizes=\"(max-width: 1145px) 100vw, 1145px\" \/><\/a><\/p>\n<h3><strong>\u507d\u88dd\u6210\u7121\u7dda\u7db2\u8def\u5b89\u5168\u61c9\u7528\u7a0b\u5f0f\u8981\u6c42Android<\/strong><strong>\u6b0a\u9650<\/strong><\/h3>\n<p>RottenSys\u6703\u507d\u88dd\u6210\u7121\u7dda\u7db2\u8def\u5b89\u5168\u61c9\u7528\u7a0b\u5f0f\/\u670d\u52d9\u4e26\u8981\u6c42<a href=\"https:\/\/developer.android.com\/guide\/topics\/permissions\/index.html\">Android\u4e0a\u7684\u6b0a\u9650<\/a>\u3002\u5728\u5b89\u88dd\u4e4b\u5f8c\uff0c\u5b83\u6703\u7d93\u904e\u4e00\u6bb5\u6642\u9593\u518d\u53bb\u9023\u63a5<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/command-and-control-server\">\u547d\u4ee4\u8207\u63a7\u5236\uff08C&amp;C\uff09\u4f3a\u670d\u5668<\/a> \u2013 \u9019\u662fRottenSys\u8eb2\u907f\u5075\u6e2c\u7684\u624b\u6cd5\u4e4b\u4e00\u3002\u53e6\u4e00\u500b\u4f5c\u6cd5\u662f\u5ee3\u544a\u8edf\u9ad4\u53ea\u5305\u542b\u4e00\u500b\u4e0d\u6703\u57f7\u884c\u60e1\u610f\u884c\u70ba\u7684\u690d\u5165\u7a0b\u5f0f\uff08dropper\uff09\u7d44\u4ef6\u3002\u4ee5\u4e0b\u662fRottenSys\u7684\u904b\u4f5c\u65b9\u5f0f\uff1a<\/p>\n<ul>\n<li>\u5b89\u88dd\u4e4b\u5f8c\uff0c\u690d\u5165\u7a0b\u5f0f\u5c07\u8207C&amp;C\u4f3a\u670d\u5668\u9023\u7dda\u3002<\/li>\n<li>C&amp;C\u4f3a\u670d\u5668\u6703\u767c\u9001\u57f7\u884c\u6d3b\u52d5\u6240\u9700\u7684\u5176\u4ed6\u7d44\u4ef6\u5217\u8868\u3002\u5b83\u5011\u662f\u7528DOWNLOAD_WITHOUT_NOTIFICATION\u6b0a\u9650\u53d6\u56de\uff0c\u9019\u4ee3\u8868\u8457\u7121\u8f9c\u7684\u4f7f\u7528\u8005\u4e0d\u6703\u6536\u5230\u8b66\u544a\u3002<\/li>\n<li>RottenSys\u4f7f\u7528\u958b\u653e\u539f\u59cb\u78bc\u7684Android\u6846\u67b6\uff0c\u9019\u6846\u67b6\u53ef\u4ee5\u8b93\u6240\u6709\u7d44\u4ef6\u540c\u6642\u57f7\u884c\uff08\u5373\u5728\u8a2d\u5099\u4e3b\u756b\u9762\u986f\u793a\u5ee3\u544a\uff09\u3002<\/li>\n<li>RottenSys\u6703\u5229\u7528\u4e00\u500b\u7a31\u70baMarsDaemon\u7684\u6846\u67b6\u4f86\u4fdd\u6301\u7a0b\u5e8f\u6d3b\u8457\u3002\u78ba\u4fdd\u5373\u4f7fRottenSys\u7a0b\u5e8f\u88ab\u5f37\u5236\u7d42\u6b62\u4e5f\u80fd\u56de\u5fa9RottenSys\u7684\u904b\u4f5c\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>[<\/strong><strong>\u4f86\u81eaTrendLabs<\/strong><strong>\u5b89\u5168\u60c5\u5831\uff1a<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=54157\">GhostTeam\u5ee3\u544a\u8edf\u9ad4\u7aca\u53d6Facebook\u5e33\u5bc6<\/a>]<\/strong><\/p>\n<h3><strong>\u5e55\u5f8c\u64cd\u4f5c\u8005\u53ef\u4ee5\u63a7\u5236\u624b\u6a5f\u4e26\u79d8\u5bc6\u5730\u5b89\u88dd\u66f4\u591a\u61c9\u7528\u7a0b\u5f0f<\/strong><strong>\u00a0<\/strong><\/h3>\n<p>MarsDaemon\u6703\u5f71\u97ff\u624b\u6a5f\u6548\u80fd\u4e26\u4e14\u6703\u986f\u8457\u5730\u6d88\u8017\u96fb\u529b\u3002\u4f46\u9664\u4e86\u9020\u6210\u5c0d\u624b\u6a5f\u7684\u8017\u640d\u4e4b\u5916\uff0c\u7814\u7a76\u4eba\u54e1\u767c\u73feRottenSys\u7684\u5e55\u5f8c\u64cd\u4f5c\u8005\u572810\u5929\u5167\u5c31\u53ef\u4ee5\u5df2\u7d93\u8cfa\u5f97\u4e86\u8d85\u904e115,000\u7f8e\u5143\u3002<!--more--><\/p>\n<p>\u4f5c\u70ba\u4e00\u7a2e\u6bad\u5c4d\u7db2\u8def\u75c5\u6bd2\uff0c\u5b83\u8b93\u5e55\u5f8c\u64cd\u4f5c\u8005\u53ef\u4ee5\u63a7\u5236\u624b\u6a5f\u4e26\u79d8\u5bc6\u5730\u5b89\u88dd\u66f4\u591a\u61c9\u7528\u7a0b\u5f0f\u3002\u9019\u8b93\u53d7\u5f71\u97ff\u624b\u6a5f\u6210\u70ba\u9032\u4e00\u6b65\u6563\u64ad\u60e1\u610f\u8edf\u9ad4\u7684\u5a92\u9ad4\u3002<\/p>\n<p><strong>[<\/strong><strong>\u5ef6\u4f38\u95b1\u8b80\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/toast-overlay-weaponized-install-android-malware-single-attack-chain\/\">\u5229\u7528Toast Overlay\u4f86\u5b89\u88dd\u591a\u7a2eAndroid\u60e1\u610f\u8edf\u9ad4<\/a>]<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>RottenSys<\/strong><strong>\u6709\u80fd\u529b\u53bb\u7aca\u53d6\u66f4\u591a\u4f7f\u7528\u8005\u700f\u89bd\u7fd2\u6163\u6216\u6d88\u8017\u66f4\u591a\u8cc7\u6e90<\/strong><\/h3>\n<p>\u4f7f\u7528\u8005\u53ef\u4ee5\u9032\u5165\u7cfb\u7d71\u8a2d\u5b9a\u4f86\u79fb\u9664RottenSys\u3002\u5728\u61c9\u7528\u7a0b\u5f0f\u7ba1\u7406\u54e1\u4ecb\u9762\u627e\u5230\u4ee5\u4e0b\u5957\u4ef6\u4e26\u5c07\u5176\u79fb\u9664\uff1a<\/p>\n<ul>\n<li>android.yellowcalendarz<\/li>\n<li>changmi.launcher<\/li>\n<li>android.services.securewifi<\/li>\n<li>system.service.zdsgt<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>[DevOps<\/strong><strong>\u5b89\u5168\uff1a\u958b\u767c\u4eba\u54e1\u8a72\u6ce8\u91cd\u7684\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u5b89\u5168]<\/strong><\/h3>\n<p>RottenSys\u53ea\u662f<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/potentially-unwanted-app\">\u6f5b\u5728\u4e0d\u53d7\u6b61\u8fce\u61c9\u7528\u7a0b\u5f0f<\/a>\uff08\u7279\u5225\u662f\u5ee3\u544a\u8edf\u9ad4\uff09\u5217\u8868\u7684\u6700\u65b0\u4e00\u54e1\u3002\u5118\u7ba1\u5728\u904e\u53bb\u4f86\u8aaa\u5ee3\u544a\u8edf\u9ad4\u53ea\u662f\u7169\u4eba\u800c\u5df2\uff0c\u4f46\u5b83\u5011\u7684\u591a\u6a23\u6027\u548c\u6210\u719f\u5ea6\u610f\u5473\u8457\u6709\u80fd\u529b\u53bb\u7aca\u53d6\u66f4\u591a\u4f7f\u7528\u8005\u700f\u89bd\u7fd2\u6163\u6216\u6d88\u8017\u66f4\u591a\u8cc7\u6e90\u3002\u4f7f\u7528\u8005\u9700\u8981<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/best-practices-securing-your-mobile-device\">\u66f4\u52a0\u4e86\u89e3<\/a>\u81ea\u5df1\u4e0b\u8f09\u7684\u61c9\u7528\u7a0b\u5f0f\u4e26\u4e14\u6709\u826f\u597d\u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/a-practical-guide-to-mobile-safety\">\u5b89\u5168\u7fd2\u6163<\/a>\u3002\u5728\u5be6\u65bd<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/-infosec-guide-bring-your-own-device-byod\">\u81ea\u5e36\u8a2d\u5099\uff08BYOD\uff09\u653f\u7b56<\/a>\u7684\u7d44\u7e54\u4e2d\uff0c\u500b\u4eba\u8cc7\u6599\u548c\u516c\u53f8\u8cc7\u6599\u53ef\u80fd\u90fd\u80fd\u5f9e\u540c\u4e00\u53f0\u8a2d\u5099\u5b58\u53d6\uff0c\u6240\u4ee5\u5fc5\u9808\u5728\u9748\u6d3b\u5ea6\/\u751f\u7522\u529b\u8207\u5b89\u5168\/\u96b1\u79c1\u9593\u53d6\u5f97\u5e73\u8861\u3002<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>\u8da8\u52e2\u79d1\u6280\u89e3\u6c7a\u65b9\u6848<\/strong><\/h3>\n<p>\u4e00\u822c\u4f7f\u7528\u8005\u548c\u4f01\u696d\u90fd\u53ef\u4ee5\u5229\u7528<a href=\"https:\/\/www.av-test.org\/en\/antivirus\/mobile-devices\/android\/november-2017\/trend-micro-mobile-security--antivirus-9.1-174421\/\">\u591a\u5c64\u6b21\u884c\u52d5\u5b89\u5168\u89e3\u6c7a\u65b9\u6848<\/a>\u4f86\u4fdd\u8b77\u81ea\u5df1\uff0c\u5982<a href=\"https:\/\/www.pccillin.com.tw\/product-tmms.html\">\u8da8\u52e2\u79d1\u6280\u884c\u52d5\u5b89\u5168\u9632\u8b77<\/a>\u3002<a href=\"https:\/\/www.trendmicro.com\/us\/enterprise\/product-security\/mobile-security\/\">\u8da8\u52e2\u79d1\u6280\u7684\u884c\u52d5\u5b89\u5168\u9632\u8b77\u4f01\u696d\u7248<\/a>\u63d0\u4f9b\u8a2d\u5099\u3001\u6cd5\u898f\u9075\u5faa\u548c\u61c9\u7528\u7a0b\u5f0f\u7684\u7ba1\u7406\u80fd\u529b\uff0c\u8cc7\u6599\u4fdd\u8b77\u4ee5\u53ca\u8a2d\u5b9a\u4f48\u5efa\u3002\u9084\u53ef\u4ee5\u4fdd\u8b77\u624b\u6a5f\u4f86\u5c0d\u6297\u6f0f\u6d1e\u653b\u64ca\uff0c\u9632\u6b62\u5c0d\u61c9\u7528\u7a0b\u5f0f\u672a\u7d93\u6388\u6b0a\u5b58\u53d6\u53ca\u5075\u6e2c\u548c\u5c01\u9396\u60e1\u610f\u8edf\u9ad4\u548c\u6b3a\u8a50\u6027\u7db2\u7ad9\u3002<\/p>\n<p>\u8da8\u52e2\u79d1\u6280\u7684<a href=\"https:\/\/mars.trendmicro.com\/\">\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u4fe1\u8b7d\u8a55\u6bd4\u670d\u52d9<\/a>\uff08MARS\uff09\u4f7f\u7528\u696d\u754c\u9818\u5148\u7684\u6c99\u7bb1\u548c\u6a5f\u5668\u5b78\u7fd2\u6280\u8853\u4f86\u6db5\u84cbAndroid\u548ciOS\u4e0a\u7684\u5a01\u8105\u3002\u5b83\u53ef\u4ee5\u4fdd\u8b77\u4f7f\u7528\u8005\u5c0d\u6297\u60e1\u610f\u8edf\u9ad4\u3001\u96f6\u6642\u5dee\u548c\u5df2\u77e5\u6f0f\u6d1e\u653b\u64ca\u3001\u96b1\u79c1\u5916\u6d29\u548c\u61c9\u7528\u7a0b\u5f0f\u6f0f\u6d1e\u554f\u984c\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/mobile-adware-rottensys-can-infect-android-devices-to-become-part-of-a-botnet\">Mobile Adware RottenSys Can Infect Android Devices to Become Part of a Botnet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5831\u5c0e\u6307\u51fa\u4e00\u6b3e\u540d\u70ba\u300cRottenSys\u300d\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c\u900f\u904e\u690d\u5165\u5ee3\u544a\u8a98\u9a19\u7528\u6236\u9ede\u64ca\u3001\u725f\u53d6\u66b4\u5229\uff0c\u4f30\u8a08\u8fd1 500\u842c\u53f0\u624b\u6a5f\u5728 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[2057,97,15],"tags":[2274,694,90,153],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/55127"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=55127"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/55127\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=55127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=55127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=55127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}