ChromeÐû²¼½ôÆÈ¸üÐÂÐÞ¸´Îó²îCVE-2023-6345

Ðû²¼Ê±¼ä 2023-11-29
1¡¢ChromeÐû²¼½ôÆÈ¸üÐÂÐÞ¸´Îó²îCVE-2023-6345


GoogleÔÚ11ÔÂ28ÈÕÐû²¼½ôÆÈÇå¾²¸üУ¬ÐÞ¸´Á˽ñÄêµÄµÚ6¸öChromeÁãÈÕÎó²î£¨CVE-2023-6345£©¡£¸ÃÎó²îÔ´ÓÚSkia¿ªÔ´2DͼÐοâÖеÄÒ»¸öÕûÊýÒç³öÎó²î£¬¿ÉÄܵ¼ÖÂå´»úºÍÖ´ÐÐí§Òâ´úÂëµÈ¡£ÕâÖÖÎó²î¾­³£±»Óë¹ú¼ÒÏà¹ØµÄºÚ¿ÍʹÓã¬Ö´ÐÐÖÖÖÖÌØ¹¤Ô˶¯¡£ä¯ÀÀÆ÷½«×Ô¶¯¼ì²é¸üУ¬²¢ÔÚÏÂ´ÎÆô¶¯Ê±Îª²»ÏëÊÖ¶¯¸üеÄÓû§¾ÙÐÐ×°Öá£GoogleÌåÏÖ£¬ÔÚ´ó´ó¶¼Óû§¸üÐÂä¯ÀÀÆ÷֮ǰ£¬»áÏÞÖÆ¶ÔÎó²îÏêϸÐÅÏ¢µÄ»á¼û¡£


https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2023/


2¡¢ÈÕ±¾Í¨Ñ¶Ó¦ÓÃLineй¶ÊýÊ®ÍòÌõÔ±¹¤ºÍÓû§µÄÊý¾Ý


¾Ý11ÔÂ27ÈÕ±¨µÀ£¬¿Æ¼¼¹«Ë¾LY Corp.±¨¸æÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬³Æ44ÍòÌõСÎÒ˽¼ÒÊý¾Ýй¶£¬ÆäÖаüÀ¨30¶àÍòÌõÓëͨѶӦÓÃLineÏà¹ØµÄÊý¾Ý¡£¹¥»÷±¬·¢ÔÚ10ÔÂ9ÈÕ£¬Æäº«¹ú×Ó¹«Ë¾Naver Cloud Corp.µÄÒ»ÃûÔ±¹¤µÄµçÄÔѬȾÁ˶ñÒâÈí¼þ£¬µ¼ÖÂδ¾­ÊÚȨµÄ»á¼û¡£¸Ã¹«Ë¾ÓÚ10ÔÂ29ÈÕÈ·ÈÏÁËÊý¾Ýй¶£¬²¢»¨ÁËԼĪһ¸öÔµÄʱ¼äÀ´È·ÈÏй¶¹æÄ£¡£´Ë´ÎÊÂÎñй¶ÁËÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ºÍһЩ·þÎñʹÓÃÀúÊ·£¬ÒÔ¼°Óй«Ë¾ÏàÖúͬ°éºÍÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡£


https://japantoday.com/category/national/line-operator-says-400-000-personal-data-items-possibly-leaked


3¡¢ArdentÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÃÀ¹ú¶à¼ÒÒ½Ôº±»ÆÈ×ªÒÆ»¼Õß


¾ÝýÌå11ÔÂ27ÈÕ±¨µÀ£¬Ardent Health ServicesÔâµ½ÀÕË÷¹¥»÷£¬Ó°ÏìÁ˶à¼ÒÒ½ÔºµÄÔËÓª¡£¸Ã¹«Ë¾ÔÚÃÀ¹úµÄ6¸öÖÝÔËÓªÁË30¶à¼ÒÒ½Ôº¡£×Ըж÷½ÚÒÔÀ´£¬ÍâµØµÄ¶à¼ÒýÌ屨µÀ£¬ËûÃÇËùÔÚµØÇøµÄÒ½ÔºÕýÔÚÓ¦¶ÔÀÕË÷¹¥»÷£¬²¢²»µÃ²»×ªÒƼ±ÕﻼÕߣ¬Ñо¿Ö°Ô±ÍƲâÕâЩ¹¥»÷ÊÇÏ໥¹ØÁªµÄ¡£ArdentÔÚ±¾ÖÜһ͸¶£¬ËûÓÚ11ÔÂ23ÈÕÉÏÎçÒâʶµ½Ôâµ½ÁËÀÕË÷¹¥»÷¡£Îª´Ë£¬ËûÃÇÔÝʱÖÐÖ¹ÁËËùÓÐÓû§¶ÔÆäÓ¦ÓõĻá¼û£¬°üÀ¨¹«Ë¾·þÎñÆ÷¡¢EpicÈí¼þ¡¢»¥ÁªÍøºÍÁÙ´²³ÌÐò¡£


https://therecord.media/ardent-health-services-ransomware-hospitals-divert-ambulances


4¡¢Ë¹ÂåÎÄÄáÑÇ×î´óµçÁ¦¹«Ë¾HSEÔâµ½ÒÉËÆRhysidaµÄ¹¥»÷


ýÌå11ÔÂ27Èճƣ¬Ë¹ÂåÎÄÄáÑǵçÁ¦¹©Ó¦ÉÌHolding Slovenske Elektrarne(HSE)Ôâµ½ÀÕË÷¹¥»÷¡£HSEÊÇ˹ÂåÎÄÄáÑÇ×î´óµÄ·¢µç¹«Ë¾£¬Ô¼Õ¼º£ÄÚ²úÁ¿µÄ60%£¬ÊǸùúµÄÒªº¦»ù´¡ÉèÊ©¡£HSEÔÚÉÏÖÜÈýÔâµ½¹¥»÷£¬²¢ÓÚÖÜÎå¿ØÖÆ×¡Á˹¥»÷¡£¸Ã¹«Ë¾µÄ·¢µçÓªÒµ²¢Î´Êܵ½Ó°Ï죬¿ÉÊÇITϵͳºÍÎļþ±»¼ÓÃÜÁË¡£ÏÖÔÚ£¬¸Ã¹«Ë¾ÉÐδÊÕµ½Êê½ðÒªÇ󣬲¢ÉùÃ÷³Æ¸ÃÊÂÎñ²»»áµ¼ÖÂÔËÓªÖÐÖ¹ºÍ¾­¼ÃËðʧ£¬½öÓ°ÏìÁË?o?tanjÈȵ糧ºÍVelenjeú¿óµÄÍøÕ¾¡£ÍâµØÃ½Ìå»ñµÃµÄ·Ç¹Ù·½ÐÅÏ¢ÏÔʾ£¬¹¥»÷¹éÒòÓÚÀÕË÷ÍÅ»ïRhysida¡£


https://www.bleepingcomputer.com/news/security/slovenias-largest-power-provider-hse-hit-by-ransomware-attack/


5¡¢SentinelOneÐû²¼RustBucketºÍKandyKorÔ˶¯µÄÆÊÎö


11ÔÂ27ÈÕ£¬SentinelOneÐû²¼±¨¸æ³Æ£¬³¯Ïʹ¥»÷ÍŻ»ìÏý¡±ÁËRustBucketºÍKandyKornÔ˶¯µÄ²î±ð×é¼þ£¬²¢Ê¹ÓÃSwiftLoader  droppersÀ´Èö²¥KandyKorn payloads¡£RustBucketÔ˶¯Ê¹ÓÃð³äPDFÔĶÁÆ÷µÄSwiftLoader£¬ÔÚÄ¿µÄÉó²éÓÕ¶üÎĵµÊ±¼ÓÔØRust¿ª·¢µÄÏÂÒ»½×¶Î¶ñÒâÈí¼þ¡£KandyKornÔ˶¯ÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨Çø¿éÁ´¹¤³ÌʦµÄÖØ´ó¶à½×¶Î¹¥»÷¡£±ðµÄ£¬Ñо¿Ö°Ô±»¹½«ÃûΪObjCShellzµÄmacOS¶ñÒâÈí¼þÓëRustBucketÔ˶¯ÁªÏµÆðÀ´¡£


https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/


6¡¢McAfeeÐû²¼¹ØÓÚNetSupportбäÌåµÄÆÊÎö±¨¸æ


11ÔÂ27ÈÕ£¬McAfeeÐû²¼Á˹ØÓÚNetSupportбäÌåµÄÆÊÎö±¨¸æ¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍ¼ÓÄô󣬽üÆÚµÄбäÌå×îÏÈͨ¹ýJavaScript¾ÙÐзַ¢¡£Ñ¬È¾Ê¼ÓÚ»ìÏýµÄJavaScriptÎļþ£¬Ö´Ðкó»áŲÓÃWindows Script Host(wscript.exe)¡£Ëæºó£¬wscript.exeÀú³ÌÆô¶¯PowerShell£¬Ê¹ÓÃÌØ¶¨ÃüÁîÀ´¾ÙÐÐѬȾ¡£È»ºó£¬PowerShell¼ÌÐøÏÂÔØNetSupport payload£¬ÕâÊÇÒ»ÖÖ¶ñÒâÔ¶³ÌÖÎÀí¹¤¾ß¡£ÏÂÔØºó£¬¶ñÒâÈí¼þ»áÖ´Ðжþ½øÖÆÎļþclient32.exe£¬ÕâÊÇNetSupport¿Í»§¶Ë£¬ÈÏÕæ½¨Éè¶ÔÄ¿µÄϵͳµÄ¿ØÖÆ¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/beneath-the-surface-how-hackers-turn-netsupport-against-users/