ChromeÐû²¼½ô¼±¸üÐÂÐÞ¸´Â©¶´CVE-2023-6345

Ðû²¼Ê±¼ä 2023-11-29
1¡¢ChromeÐû²¼½ô¼±¸üÐÂÐÞ¸´Â©¶´CVE-2023-6345


GoogleÔÚ11ÔÂ28ÈÕÐû²¼½ô¼±Äþ¾²¸üР£¬ÐÞ¸´Á˽ñÄêµÄµÚ6¸öChromeÁãÈÕ©¶´£¨CVE-2023-6345£©¡£¸Ã©¶´Ô´ÓÚSkia¿ªÔ´2DͼÐοâÖеÄÒ»¸öÕûÊýÒç³ö©¶´ £¬¿ÉÄܵ¼ÖÂå´»úºÍÖ´ÐÐÈÎÒâ´úÂëµÈ¡£ÕâÖÖ©¶´¾­³£±»Óë¹ú¼ÒÏà¹ØµÄºÚ¿ÍÀûÓà £¬Ö´ÐÐÖÖÖÖ¼äµý»î¶¯¡£ä¯ÀÀÆ÷½«×Ô¶¯¼ì²é¸üР£¬²¢ÔÚÏÂ´ÎÆô¶¯Ê±Îª²»ÏëÊÖ¶¯¸üеÄÓû§½øÐа²×°¡£GoogleÌåÏÖ £¬ÔÚ´ó¶àÊýÓû§¸üÐÂä¯ÀÀÆ÷֮ǰ £¬»áÏÞÖÆ¶Ô©¶´ÏêϸÐÅÏ¢µÄ·ÃÎÊ¡£


https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2023/


2¡¢ÈÕ±¾Í¨Ñ¶Ó¦ÓÃLineй¶ÊýÊ®ÍòÌõÔ±¹¤ºÍÓû§µÄÊý¾Ý


¾Ý11ÔÂ27ÈÕ±¨µÀ £¬¿Æ¼¼¹«Ë¾LY Corp.³ÂËßÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶Ê¼þ £¬³Æ44ÍòÌõ¸öÈËÊý¾Ýй¶ £¬ÆäÖаüÂÞ30¶àÍòÌõÓëͨѶӦÓÃLineÏà¹ØµÄÊý¾Ý¡£¹¥»÷·¢ÉúÔÚ10ÔÂ9ÈÕ £¬Æäº«¹ú×Ó¹«Ë¾Naver Cloud Corp.µÄÒ»ÃûÔ±¹¤µÄµçÄÔѬȾÁ˶ñÒâÈí¼þ £¬µ¼ÖÂδ¾­ÊÚȨµÄ·ÃÎÊ¡£¸Ã¹«Ë¾ÓÚ10ÔÂ29ÈÕÈ·ÈÏÁËÊý¾Ýй¶ £¬²¢»¨ÁËԼĪһ¸öÔµÄʱ¼äÀ´È·ÈÏй¶¹æÄ£¡£´Ë´Îʼþй¶ÁËÓû§µÄ¸öÈËÐÅÏ¢ºÍһЩ·þÎñʹÓÃÀúÊ· £¬ÒÔ¼°Óй«Ë¾ºÏ×÷»ï°éºÍÔ±¹¤µÄ¸öÈËÐÅÏ¢¡£


https://japantoday.com/category/national/line-operator-says-400-000-personal-data-items-possibly-leaked


3¡¢ArdentÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÃÀ¹ú¶à¼ÒÒ½Ôº±»ÆÈ×ªÒÆ»¼Õß


¾ÝýÌå11ÔÂ27ÈÕ±¨µÀ £¬Ardent Health ServicesÔâµ½ÀÕË÷¹¥»÷ £¬Ó°ÏìÁ˶à¼ÒÒ½ÔºµÄÔËÓª¡£¸Ã¹«Ë¾ÔÚÃÀ¹úµÄ6¸öÖÝÔËÓªÁË30¶à¼ÒÒ½Ôº¡£×Ըж÷½ÚÒÔÀ´ £¬µ±µØµÄ¶à¼ÒýÌ屨µÀ £¬ËûÃÇËùÔÚµØÓòµÄÒ½ÔºÕýÔÚÓ¦¶ÔÀÕË÷¹¥»÷ £¬²¢²»µÃ²»×ªÒƼ±ÕﻼÕß £¬Ñо¿ÈËÔ±ÍÆ²âÕâЩ¹¥»÷ÊÇÏ໥¹ØÁªµÄ¡£ArdentÔÚ±¾ÖÜһ͸¶ £¬ËûÓÚ11ÔÂ23ÈÕÉÏÎçÒâʶµ½Ôâµ½ÁËÀÕË÷¹¥»÷¡£Îª´Ë £¬ËûÃÇÔÝʱÖжÏÁËËùÓÐÓû§¶ÔÆäÓ¦ÓõķÃÎÊ £¬°üÂÞ¹«Ë¾·þÎñÆ÷¡¢EpicÈí¼þ¡¢»¥ÁªÍøºÍÁÙ´²·¨Ê½¡£


https://therecord.media/ardent-health-services-ransomware-hospitals-divert-ambulances


4¡¢Ë¹ÂåÎÄÄáÑÇ×î´óµçÁ¦¹«Ë¾HSEÔâµ½ÒÉËÆRhysidaµÄ¹¥»÷


ýÌå11ÔÂ27ÈÕ³Æ £¬Ë¹ÂåÎÄÄáÑǵçÁ¦¹©Ó¦ÉÌHolding Slovenske Elektrarne(HSE)Ôâµ½ÀÕË÷¹¥»÷¡£HSEÊÇ˹ÂåÎÄÄáÑÇ×î´óµÄ·¢µç¹«Ë¾ £¬Ô¼Õ¼¹úÄÚ²úÁ¿µÄ60% £¬ÊǸùúµÄÒªº¦»ù´¡ÉèÊ©¡£HSEÔÚÉÏÖÜÈýÔâµ½¹¥»÷ £¬²¢ÓÚÖÜÎå¿ØÖÆ×¡Á˹¥»÷¡£¸Ã¹«Ë¾µÄ·¢µçÒµÎñ²¢Î´Êܵ½Ó°Ïì £¬µ«ÊÇITϵͳºÍÎļþ±»¼ÓÃÜÁË¡£Ä¿Ç° £¬¸Ã¹«Ë¾ÉÐδÊÕµ½Êê½ðÒªÇó £¬²¢ÉùÃ÷³Æ¸Ãʼþ²»»áµ¼ÖÂÔËÓªÖжϺ;­¼ÃËðʧ £¬½öÓ°ÏìÁË?o?tanjÈȵ糧ºÍVelenjeú¿óµÄÍøÕ¾¡£µ±µØÃ½Ìå»ñµÃµÄ·Ç¹Ù·½ÐÅÏ¢ÏÔʾ £¬¹¥»÷¹éÒòÓÚÀÕË÷ÍÅ»ïRhysida¡£


https://www.bleepingcomputer.com/news/security/slovenias-largest-power-provider-hse-hit-by-ransomware-attack/


5¡¢SentinelOneÐû²¼RustBucketºÍKandyKor»î¶¯µÄ·ÖÎö


11ÔÂ27ÈÕ £¬SentinelOneÐû²¼³ÂËß³Æ £¬³¯Ïʹ¥»÷ÍŻ»ìºÏ¡±ÁËRustBucketºÍKandyKorn»î¶¯µÄ²îÒì×é¼þ £¬²¢Ê¹ÓÃSwiftLoader  droppersÀ´Á÷´«KandyKorn payloads¡£RustBucket»î¶¯Ê¹ÓÃð³äPDFÔĶÁÆ÷µÄSwiftLoader £¬ÔÚÄ¿±ê¼ì²ìÓÕ¶üÎĵµÊ±¼ÓÔØRust¿ª·¢µÄÏÂÒ»½×¶Î¶ñÒâÈí¼þ¡£KandyKorn»î¶¯ÊÇÕë¶Ô¼ÓÃÜ»õ±Ò½»Òׯ½Ì¨Çø¿éÁ´¹¤³ÌʦµÄÅÓ´ó¶à½×¶Î¹¥»÷¡£´ËÍâ £¬Ñо¿ÈËÔ±»¹½«ÃûΪObjCShellzµÄmacOS¶ñÒâÈí¼þÓëRustBucket»î¶¯ÁªÏµÆðÀ´¡£


https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/


6¡¢McAfeeÐû²¼¹ØÓÚNetSupportбäÌåµÄ·ÖÎö³ÂËß


11ÔÂ27ÈÕ £¬McAfeeÐû²¼Á˹ØÓÚNetSupportбäÌåµÄ·ÖÎö³ÂËß¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍ¼ÓÄÃ´ó £¬½üÆÚµÄбäÌ忪ʼͨ¹ýJavaScript½øÐзַ¢¡£Ñ¬È¾Ê¼ÓÚ»ìÏýµÄJavaScriptÎļþ £¬Ö´Ðкó»áµ÷ÓÃWindows Script Host(wscript.exe)¡£Ëæºó £¬wscript.exe½ø³ÌÆô¶¯PowerShell £¬Ê¹ÓÃÌØ¶¨ÊýÁîÀ´½øÐÐѬȾ¡£È»ºó £¬PowerShell¼ÌÐøÏÂÔØNetSupport payload £¬ÕâÊÇÒ»ÖÖ¶ñÒâÔ¶³Ì¹ÜÀí¹¤¾ß¡£ÏÂÔØºó £¬¶ñÒâÈí¼þ»áÖ´Ðжþ½øÖÆÎļþclient32.exe £¬ÕâÊÇNetSupport¿Í»§¶Ë £¬ÂôÁ¦½¨Á¢¶ÔÄ¿±êϵͳµÄ¿ØÖÆ¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/beneath-the-surface-how-hackers-turn-netsupport-against-users/