¹È¸èChrome½ô¼±¸üÐÂÐÞ¸´±»ÀûÓé¶´CVE-2023-2033

Ðû²¼Ê±¼ä 2023-04-17

1¡¢¹È¸èChrome½ô¼±¸üÐÂÐÞ¸´±»ÀûÓé¶´CVE-2023-2033


4ÔÂ14ÈÕ£¬¹È¸èÐû²¼ÁËChromeµÄ½ô¼±Äþ¾²¸üУ¬ÐÞ¸´×Ô½ñÄêÄê³õÒÔÀ´ÔڵĵÚÒ»¸öÒѱ»ÀûÓõÄ©¶´¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìÏý©¶´£¨CVE-2023-2033£©£¬¹¥»÷Õß¿Éͨ¹ý¶ñÒâHTMLÒ³ÃæÀûÓôË©¶´¡£ä¯ÀÀÆ÷½«×Ô¶¯¼ì²éиüв¢ÔÚÖØÆôºó°²×°ËüÃÇ¡£¹È¸èÌåÏÖ£¬Â©¶´CVE-2023-2033Òѱ»ÔÚÒ°ÀûÓ㬵«Ã»ÓзÖÏíÆä¼¼Êõϸ½Ú»òIoC£¬ÒÔ·ÀÖ¹¹¥»÷ÕߵĽøÒ»²½ÀûÓá£


https://thehackernews.com/2023/04/google-releases-urgent-chrome-update-to.html


2¡¢Goldosonͨ¹ýGoogle PlayÖеÄ60¸öÓ¦ÓýøÐзַ¢


McAfeeÔÚ4ÔÂ12Èճƣ¬Ò»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þGoldosonͨ¹ýGoogle PlayÉ̵êÖеÄ60¸öºÏ·¨Ó¦ÓýøÐзַ¢£¬×ÜÏÂÔØÁ¿Áè¼Ý1ÒڴΡ£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÊÕ¼¯ÓйØÒѰ²×°Ó¦Óá¢WiFiºÍÀ¶ÑÀÁ¬½ÓÉ豸ÒÔ¼°Óû§GPSλÖõÄÐÅÏ¢£¬Ëü»¹¿ÉÒÔÔÚδ¾­Óû§Í¬ÒâµÄÇé¿öÏÂͨ¹ýÔÚºǫ́µã»÷¹ã¸æÀ´»ñÀû¡£Ðí¶àÊÜÓ°ÏìµÄÓ¦ÓÃÒѱ»Æä¿ª·¢ÈËÔ±ÐÞ¸´£¬¶øÄÇЩûÓм°Ê±ÏìÓ¦µÄÓ¦ÓÃÔòÒò²»ÇкÏGoogle PlayÕþ²ß±»É¾³ý¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/


3¡¢Èí¼þ¼¼Êõ×Éѯ¹«Ë¾NCRÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷


4ÔÂ15ÈÕ±¨µÀ£¬ÃÀ¹úÈí¼þºÍ¼¼Êõ×Éѯ¹«Ë¾NCRÔâµ½BlackCatµÄ¹¥»÷£¬µ¼ÖÂÆäAloha PoSƽ̨·ºÆð¹ÊÕÏ¡£×ÔÉÏÖÜÈý·ºÆðÎÊÌâÒÔÀ´£¬¿Í»§Ò»Ö±ÎÞ·¨Ê¹ÓøÃϵͳ¡£¾­¹ý¼¸ÌìµÄ³ÁĬ£¬NCRÓÚ4ÔÂ15ÈÕ͸¶£¬Õâ´Î¹ÊÕÏÊÇÓÉÓÚΪAloha POSƽ̨Ìṩ¶¯Á¦µÄÊý¾ÝÖÐÐÄÔâµ½ÀÕË÷¹¥»÷µ¼ÖµÄ¡£BlackCatÉù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬²¢¹ûÈ»ÁËÓëÒ»ÃûNCR´ú±íÖ®¼ä̸ÅÐÁÄÌìµÄ¶Ô»°Æ¬¶Î¡£ÁÄÌì¼Ç¼ÏÔʾ£¬¹¥»÷ÆÚ¼äûÓÐÇÔÈ¡´æ´¢ÔÚ·þÎñÆ÷ÉϵÄÈκÎÊý¾Ý¡£È»¶ø£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡ÁËNCR¿Í»§µÄƾ¾Ý£¬²¢ÍþвҪ¹ûÈ»¡£


https://www.bleepingcomputer.com/news/security/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack/


4¡¢Dimas VolvoÊý¾Ý¿âÅäÖôíÎóй¶¿Í»§Êý¾ÝºÍÔ´´úÂë


¾Ý4ÔÂ15ÈÕ±¨µÀ£¬ÎÖ¶ûÎÖÔÚ°ÍÎ÷µÄÁãÊÛÉÌDimas Volvoй¶ÁËÃô¸ÐÐÅÏ¢¡£2ÔÂ17ÈÕ£¬Ñо¿ÍŶӷ¢ÏֿɹûÈ»·ÃÎÊdimasvolvo.com.brÍøÕ¾ÉÏÍйܵÄÃô¸ÐÎļþ¡£Ëü¹ûÈ»ÁËÆäÊý¾Ý¿âµÄÉí·ÝÑéÖ¤ÐÅÏ¢£¬°üÂÞMySQLºÍRedisÊý¾Ý¿âÖ÷»ú¡¢¿ª·Å¶Ë¿ÚºÍƾ¾Ý£¬¿ÉÓÃÀ´·ÃÎÊ´æ´¢Óû§Êý¾ÝµÄÊý¾Ý¿â¡£Ð¹Â¶Êý¾Ý»¹°üÂÞ¸ÃÍøÕ¾µÄLaravelÓ¦ÓÃÃÜÔ¿¡£Ñо¿ÈËÔ±»¹·¢ÏÖÁË´æ´¢ÍøÕ¾Ô´´úÂëµÄGit´æ´¢¿âµÄURL£¬¹¥»÷Õß¿Éͨ¹ý±©Á¦¹¥»÷·ÃÎÊ´æ´¢¿â¡£ÒÔ¼°Ò»¸ö.DS_StoreÎļþ£¬Éú´æÁËÀ´×Ô¿ª·¢ÈËÔ±¼ÆËã»úµÄÔªÊý¾Ý¡£Ä¿Ç°£¬ÎÊÌâÒѵõ½½â¾ö¡£


https://securityaffairs.com/144816/breaking-news/volvo-retailer-data-leak.html


5¡¢Ðµĺڿ͹¤¾ßLegion¿ÉÓÃÀ´ÊÕ¼¯Æ¾¾ÝºÍ½Ù³ÖSMTP


4ÔÂ13ÈÕ£¬Cado LabsÅû¶ÁË»ùÓÚPythonµÄкڿ͹¤¾ßLegionµÄ¼¼Êõϸ½Ú¡£¸Ã¹¤¾ßͨ¹ýTelegram Messenger³öÊÛ£¬ÊÇÄ £¿é»¯¶ñÒâÈí¼þ£¬Ëü¿ÉÄÜ»ùÓÚ¶ñÒâÈí¼þAndroxGhOst£¬²¢¾ßÓÐÖ´ÐÐSMTP·þÎñÆ÷ö¾Ù¡¢Ô¶³Ì´úÂëÖ´ÐС¢ÀûÓÃδÐÞ¸´µÄApache°æ±¾¡¢±©Á¦ÆÆ½âcPanelºÍWebHost ManagerÕË»§¡¢ÓëShodanµÄAPI»¥¶¯ÒÔ¼°ÀÄÓÃAWS·þÎñµÈÄ £¿éµÄ¹¦Ð§¡£³ýÁËÊÕ¼¯Æ¾¾ÝºÍ¹¥»÷ÍøÂç·þÎñ£¬Legion»¹¿ÉÒÔ´´½¨¹ÜÀíÔ±Óû§¡¢Ö²Èëwebshell²¢ÏòÃÀ¹úÔËÓªÉ̵Ŀͻ§·¢ËÍÀ¬»ø¶ÌÐÅ¡£


https://www.cadosecurity.com/legion-an-aws-credential-harvester-and-smtp-hijacker/


6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷ÍÅ»ïVice SocietyµÄ·ÖÎö³ÂËß


4ÔÂ13ÈÕ£¬Unit 42Ðû²¼³ÂË߳ƣ¬ÀÕË÷ÍÅ»ïVice SocietyʹÓÃ×Ô½ç˵¹¹½¨µÄMicrosoft PowerShell(PS)½Å±¾´ÓÄ¿±êÍøÂçÖÐÇÔÈ¡Êý¾Ý¡£Vice SocietyµÄÐÂÊý¾Ýй¶¹¤¾ßÊÇÍêÈ«×Ô¶¯»¯µÄ£¬Ê¹Óò»ÈÝÒ×´¥·¢¾¯±¨µÄ¡°living off the land¡±¶þ½øÖÆÎļþºÍ½Å±¾£¬ÔÚÀÕË÷Èí¼þ¹¥»÷µÄ×îºóÒ»²½£¬¼´¼ÓÃÜÊý¾Ý֮ǰ£¬±£³ÖÆä»î¶¯µÄÒþ±ÎÐÔ¡£¸ÃÊý¾Ýй¶¹¤¾ß»¹»áÏÞÖÆËÙÂÊ£¬ËüÉèÖÃÁË×î¶à5¸öĿ¼×éµÄ10¸ö×÷ҵͬʱÔËÐУ¬ÒÔÖÆÖ¹Ê¹Óùý¶àµÄÖ÷»ú¿ÉÓÃ×ÊÔ´¡£


https://unit42.paloaltonetworks.com/vice-society-ransomware-powershell/