Chrome°ä²¼´¹Î£¸üн¨¸´·ì϶CVE-2023-6345

°ä²¼¹¦·ò 2023-11-29
1¡¢Chrome°ä²¼´¹Î£¸üн¨¸´·ì϶CVE-2023-6345


GoogleÔÚ11ÔÂ28ÈÕ°ä²¼´¹Î£°²È«¸üР £¬½¨¸´Á˽ñÄêµÄµÚ6¸öChromeÁãÈÕ·ì϶£¨CVE-2023-6345£© ¡£¸Ã·ì϶ԴÓÚSkia¿ªÔ´2DͼÐοâÖеÄÒ»¸öÕûÊýÒç¶Âí½Å  £¬¿ÉÄܵ¼ÖÂå´»úºÍÖ´ÐÐËÁÒâ´úÂëµÈ ¡£ÕâÖÖ·ì϶ʱʱ±»Óë¹ú¶ÈÓйصĺڿÍÀûÓà  £¬Ö´Ðи÷Àà¼äµý»î¶¯ ¡£ä¯ÀÀÆ÷½«×Ô¶¯²é³­¸üР £¬²¢±ÉÈË´ÎÆô¶¯Ê±Îª²»ÏëÊÖ¶¯¸üеÄÓû§½øÐÐ×°Öà ¡£Google°µÊ¾  £¬ÔÚ´óÎÞÊýÓû§¸üÐÂä¯ÀÀÆ÷֮ǰ  £¬»áÏ޶ȶԷì϶¾ßÌåÐÅÏ¢µÄ½Ó¼û ¡£


https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2023/


2¡¢ÈÕ±¾Í¨Ñ¶ÀûÓÃLineй¶ÊýÊ®ÍòÌõÔ±¹¤ºÍÓû§µÄÊý¾Ý


¾Ý11ÔÂ27ÈÕ±¨Â·  £¬¿Æ¼¼¹«Ë¾LY Corp.»ã±¨ÁËһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ  £¬³Æ44ÍòÌõÓ×ÎÒÊý¾Ýй¶  £¬ÆäÖÐÔ̺¬30¶àÍòÌõÓëͨѶÀûÓÃLineÓйصÄÊý¾Ý ¡£¹¥»÷²úÉúÔÚ10ÔÂ9ÈÕ  £¬Æäº«¹ú×Ó¹«Ë¾Naver Cloud Corp.µÄÒ»ÃûÔ±¹¤µÄµçÄÔϰȾÁ˶ñÒâÈí¼þ  £¬µ¼ÖÂδ¾­ÊÚȨµÄ½Ó¼û ¡£¸Ã¹«Ë¾ÓÚ10ÔÂ29ÈÕÈ·ÈÏÁËÊý¾Ýй¶  £¬²¢»¨ÁËԼĪһ¸öԵŦ·òÀ´È·ÈÏй¶¹æÄ£ ¡£Õâ´ÎÊÂÎñй¶ÁËÓû§µÄÓ×ÎÒÐÅÏ¢ºÍһЩ·þÎñʹÓú¹Çà  £¬ÒÔ¼°Óй«Ë¾ºÏ×÷ͬ°éºÍÔ±¹¤µÄÓ×ÎÒÐÅÏ¢ ¡£


https://japantoday.com/category/national/line-operator-says-400-000-personal-data-items-possibly-leaked


3¡¢ArdentÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÃÀ¹ú¶à¼ÒÒ½Ôº±»ÆÈ×ªÒÆ»¼Õß


¾ÝýÌå11ÔÂ27ÈÕ±¨Â·  £¬Ardent Health ServicesÔâµ½ÀÕË÷¹¥»÷  £¬Ó°ÏìÁ˶à¼ÒÒ½ÔºµÄÔËÓª ¡£¸Ã¹«Ë¾ÔÚÃÀ¹úµÄ6¸öÖÝÔËÓªÁË30¶à¼ÒÒ½Ôº ¡£×Ըж÷½ÚÒÔÀ´  £¬±¾µØµÄ¶à¼ÒýÌ屨·  £¬ËûÃÇµØµãµØÓòµÄÒ½ÔºÔÚÓ¦¶ÔÀÕË÷¹¥»÷  £¬²¢²»µÃ²»×ªÒƼ¹Øï»¼Õß  £¬×êÑÐÈËÔ±´§Ä¦ÕâЩ¹¥»÷ÊÇ»¥ÓйØÁªµÄ ¡£ArdentÔÚ±¾ÖÜһй©  £¬ËûÓÚ11ÔÂ23ÈÕÉÏÎçÒâʶµ½Ôâµ½ÁËÀÕË÷¹¥»÷ ¡£Îª´Ë  £¬ËûÃÇÁÙʱÖжÏÁËËùÓÐЧ»§¶ÔÆäÀûÓõĽӼû  £¬Ô̺¬¹«Ë¾·þÎñÆ÷¡¢EpicÈí¼þ¡¢»¥ÁªÍøºÍÁÙ´²·¨Ê½ ¡£


https://therecord.media/ardent-health-services-ransomware-hospitals-divert-ambulances


4¡¢Ë¹ÂåÎÄÄáÑÇ×î´óµçÁ¦¹«Ë¾HSEÔâµ½ÒÉËÆRhysidaµÄ¹¥»÷


ýÌå11ÔÂ27ÈÕ³Æ  £¬Ë¹ÂåÎÄÄáÑǵçÁ¦¹©¸øÉÌHolding Slovenske Elektrarne(HSE)Ôâµ½ÀÕË÷¹¥»÷ ¡£HSEÊÇ˹ÂåÎÄÄáÑÇ×î´óµÄ·¢µç¹«Ë¾  £¬Ô¼Õ¼¹úÄÚ²úÁ¿µÄ60%  £¬ÊǸùúµÄ¹Ø¼ü»ù´¡ÉèÊ© ¡£HSEÔÚÉÏÖÜÈýÔâµ½¹¥»÷  £¬²¢ÓÚÖÜÎå½ÚÔìסÁ˹¥»÷ ¡£¸Ã¹«Ë¾µÄ·¢µçÒµÎñ²¢Î´Êܵ½Ó°Ïì  £¬µ«ÊÇITϵͳºÍÎļþ±»¼ÓÃÜÁË ¡£Ä¿Ç°  £¬¸Ã¹«Ë¾ÉÐδÊÕµ½Êê½ðÒªÇó  £¬²¢ÉêÃ÷³Æ¸ÃÊÂÎñ²»»áµ¼ÖÂÔËÓªÖжϺ;­¼ÃËðʧ  £¬½öÓ°ÏìÁË?o?tanjÈȵ糧ºÍVelenjeú¿óµÄÍøÕ¾ ¡£±¾µØÃ½Ìå»ñµÃµÄ·Ç¹Ù·½ÐÅÏ¢ÏÔʾ  £¬¹¥»÷¹éÒòÓÚÀÕË÷ÍÅ»ïRhysida ¡£


https://www.bleepingcomputer.com/news/security/slovenias-largest-power-provider-hse-hit-by-ransomware-attack/


5¡¢SentinelOne°ä²¼RustBucketºÍKandyKor»î¶¯µÄ·ÖÎö


11ÔÂ27ÈÕ  £¬SentinelOne°ä²¼»ã±¨³Æ  £¬³¯Ïʹ¥»÷ÍŻ»ìºÏ¡±ÁËRustBucketºÍKandyKorn»î¶¯µÄ·ÖÆç×é¼þ  £¬²¢Ê¹ÓÃSwiftLoader  droppersÀ´´«²¼KandyKorn payloads ¡£RustBucket»î¶¯Ê¹ÓüÙÒâPDFÔĶÁÆ÷µÄSwiftLoader  £¬ÔÚÖ¸±ê²é¿´µö¶üÎĵµÊ±¼ÓÔØRust¿ª·¢µÄÏÂÒ»½×¶Î¶ñÒâÈí¼þ ¡£KandyKorn»î¶¯ÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÂòÂôÆ½Ì¨Çø¿éÁ´¹¤³ÌʦµÄ¸´ÔÓ¶à½×¶Î¹¥»÷ ¡£´Ë±í  £¬×êÑÐÈËÔ±»¹½«ÃûΪObjCShellzµÄmacOS¶ñÒâÈí¼þÓëRustBucket»î¶¯ÁªÏµÆðÀ´ ¡£


https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/


6¡¢McAfee°ä²¼¹ØÓÚNetSupportбäÌåµÄ·ÖÎö»ã±¨


11ÔÂ27ÈÕ  £¬McAfee°ä²¼Á˹ØÓÚNetSupportбäÌåµÄ·ÖÎö»ã±¨ ¡£¸Ã¶ñÒâÈí¼þÖØÒªÕë¶ÔÃÀ¹úºÍ¼ÓÄôó  £¬½üÆÚµÄбäÌåÆðͷͨ¹ýJavaScript½øÐзַ¢ ¡£Ï°È¾Ê¼ÓÚ»ìºÏµÄJavaScriptÎļþ  £¬Ö´Ðкó»áŲÓÃWindows Script Host(wscript.exe) ¡£Ëæºó  £¬wscript.exe¹ý³ÌÆô¶¯PowerShell  £¬Ê¹ÓÃÌØ¶¨ÊýÁîÀ´½øÐÐϰȾ ¡£¶øºó  £¬PowerShell³ÖÐøÏÂÔØNetSupport payload  £¬ÕâÊÇÒ»ÖÖ¶ñÒâÔ¶³ÌÖÎÀí¹¤¾ß ¡£ÏÂÔØºó  £¬¶ñÒâÈí¼þ»áÖ´Ðжþ½øÔìÎļþclient32.exe  £¬ÕâÊÇNetSupport¿Í»§¶Ë  £¬ÕƹܳÉÁ¢¶ÔÖ¸±êϵͳµÄ½ÚÔì ¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/beneath-the-surface-how-hackers-turn-netsupport-against-users/