¹È¸èChrome´¹Î£¸üн¨¸´±»ÀûÓ÷ì϶CVE-2023-2033
°ä²¼¹¦·ò 2023-04-171¡¢¹È¸èChrome´¹Î£¸üн¨¸´±»ÀûÓ÷ì϶CVE-2023-2033
4ÔÂ14ÈÕ£¬¹È¸è°ä²¼ÁËChromeµÄ´¹Î£°²È«¸üУ¬½¨¸´×Ô½ñÄêËêÊ×ÒÔÀ´ÔڵĵÚÒ»¸öÒѱ»ÀûÓõķì϶¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìºÏ·ì϶£¨CVE-2023-2033£©£¬¹¥»÷Õß¿Éͨ¹ý¶ñÒâHTMLÒ³ÃæÀûÓô˷ì϶¡£ä¯ÀÀÆ÷½«×Ô¶¯²é³Ð¸üв¢ÔÚ³ÁÆôºó×°ÖÃËüÃÇ¡£¹È¸è°µÊ¾£¬·ì϶CVE-2023-2033Òѱ»ÔÚÒ°ÀûÓ㬵«Ã»ÓзÖÏíÆä¼¼Êõϸ½Ú»òIoC£¬ÒÔÔ¤·À¹¥»÷ÕߵĽøÒ»²½ÀûÓá£
https://thehackernews.com/2023/04/google-releases-urgent-chrome-update-to.html
2¡¢Goldosonͨ¹ýGoogle PlayÖеÄ60¸öÀûÓýøÐзַ¢
McAfeeÔÚ4ÔÂ12Èճƣ¬Ò»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þGoldosonͨ¹ýGoogle PlayÉ̵êÖеÄ60¸öºÏ·¨ÀûÓýøÐзַ¢£¬×ÜÏÂÔØÁ¿³¬¹ý1ÒڴΡ£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçÓйØÒÑ×°ÖÃÀûÓá¢WiFiºÍÀ¶ÑÀÏνÓÉ豸ÒÔ¼°Óû§GPSµØÎ»µÄÐÅÏ¢£¬Ëü»¹Äܹ»ÔÚδ¾Óû§Ô޳ɵÄÇé¿öÏÂͨ¹ýÔÚºó¶Üµã»÷¸æ°×À´»ñÀû¡£ºÜ¶àÊÜÓ°ÏìµÄÀûÓÃÒѱ»Æä¿ª·¢ÈËÔ±½¨¸´£¬¶øÄÇЩûÓÐʵʱÏìÓ¦µÄÀûÓÃÔòÒò²»ÇкÏGoogle PlayÕþ²ß±»É¾³ý¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/
3¡¢Èí¼þ¼¼ÊõÕ÷ѯ¹«Ë¾NCRÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷
4ÔÂ15ÈÕ±¨Â·£¬ÃÀ¹úÈí¼þºÍ¼¼ÊõÕ÷ѯ¹«Ë¾NCRÔâµ½BlackCatµÄ¹¥»÷£¬µ¼ÖÂÆäAloha PoSƽ̨³öÏÖ¹ÊÕÏ¡£×ÔÉÏÖÜÈý³öÏÖÎÊÌâÒÔÀ´£¬¿Í»§Ò»ÏòÎÞ·¨Ê¹ÓøÃϵͳ¡£¾¹ý¼¸ÌìµÄ¹ÑÑÔ£¬NCRÓÚ4ÔÂ15ÈÕй©£¬Õâ´Î¹ÊÕÏÊÇÓÉÓÚΪAloha POSƽ̨Ìṩ¶¯Á¦µÄÊý¾ÝÖÐÐÄÔâµ½ÀÕË÷¹¥»÷µ¼Öµġ£BlackCatÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢¹«¿ªÁËÓëÒ»ÃûNCR´ú±íÖ®¼ä½»ÉæÌ¸ÌìµÄ¶Ô»°Æ¬¶Î¡£Ì¸Ìì¼Í¼ÏÔʾ£¬¹¥»÷ÆÚ¼äûÓÐÇÔÈ¡´æ´¢ÔÚ·þÎñÆ÷ÉϵÄÈκÎÊý¾Ý¡£È»¶ø£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁËNCR¿Í»§µÄÍ´´¦£¬²¢ÍþвҪ¹«¿ª¡£
https://www.bleepingcomputer.com/news/security/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack/
4¡¢Dimas VolvoÊý¾Ý¿âÅäÖÃÃýÎóй¶¿Í»§Êý¾ÝºÍÔ´´úÂë
¾Ý4ÔÂ15ÈÕ±¨Â·£¬ÎÖ¶ûÎÖÔÚ°ÍÎ÷µÄÁãÊÛÉÌDimas Volvoй¶ÁËÃô¸ÐÐÅÏ¢¡£2ÔÂ17ÈÕ£¬×êÑÐÍŶӷ¢Ïֿɹ«¿ª½Ó¼ûdimasvolvo.com.brÍøÕ¾ÉÏÍйܵÄÃô¸ÐÎļþ¡£Ëü¹«¿ªÁËÆäÊý¾Ý¿âµÄÉí·ÝÑéÖ¤ÐÅÏ¢£¬Ô̺¬MySQLºÍRedisÊý¾Ý¿âÖ÷»ú¡¢Ê¢ÅüÍ·¿ÚºÍÍ´´¦£¬¿ÉÓÃÀ´½Ó¼û´æ´¢Óû§Êý¾ÝµÄÊý¾Ý¿â¡£Ð¹Â¶Êý¾Ý»¹Ô̺¬¸ÃÍøÕ¾µÄLaravelÀûÓÃÃÜÔ¿¡£×êÑÐÈËÔ±»¹·¢ÏÖÁË´æ´¢ÍøÕ¾Ô´´úÂëµÄGit´æ´¢¿âµÄURL£¬¹¥»÷Õß¿Éͨ¹ý±©Á¦¹¥»÷½Ó¼û´æ´¢¿â¡£ÒÔ¼°Ò»¸ö.DS_StoreÎļþ£¬±£ÁôÁËÀ´×Ô¿ª·¢ÈËÔ±ÍÆËã»úµÄÔªÊý¾Ý¡£Ä¿Ç°£¬ÎÊÌâÒѵõ½½â¾ö¡£
https://securityaffairs.com/144816/breaking-news/volvo-retailer-data-leak.html
5¡¢Ðµĺڿ͹¤¾ßLegion¿ÉÓÃÀ´ÍøÂçÍ´´¦ºÍ½Ù³ÖSMTP
4ÔÂ13ÈÕ£¬Cado LabsÅû¶ÁË»ùÓÚPythonµÄкڿ͹¤¾ßLegionµÄ¼¼Êõϸ½Ú¡£¸Ã¹¤¾ßͨ¹ýTelegram MessengerÏúÊÛ£¬ÊÇÄ£¿é»¯¶ñÒâÈí¼þ£¬Ëü¿ÉÄÜ»ùÓÚ¶ñÒâÈí¼þAndroxGhOst£¬²¢ÓµÓÐÖ´ÐÐSMTP·þÎñÆ÷ö¾Ù¡¢Ô¶³Ì´úÂëÖ´ÐÓ×¢ÀûÓÃ佨¸´µÄApache°æ±¾¡¢±©Á¦ÆÆ½âcPanelºÍWebHost ManagerÕË»§¡¢ÓëShodanµÄAPI»¥¶¯ÒÔ¼°ÀÄÓÃAWS·þÎñµÈÄ£¿éµÄÖ°ÄÜ¡£³ýÁËÍøÂçÍ´´¦ºÍ¹¥»÷ÍøÂç·þÎñ£¬Legion»¹Äܹ»´´½¨ÖÎÀíÔ±Óû§¡¢Ö²Èëwebshell²¢ÏòÃÀ¹úÔËÓªÉ̵Ŀͻ§·¢ËÍÀ¬»ø¶ÌÐÅ¡£
https://www.cadosecurity.com/legion-an-aws-credential-harvester-and-smtp-hijacker/
6¡¢Unit 42°ä²¼¹ØÓÚÀÕË÷ÍÅ»ïVice SocietyµÄ·ÖÎö»ã±¨
4ÔÂ13ÈÕ£¬Unit 42°ä²¼»ã±¨³Æ£¬ÀÕË÷ÍÅ»ïVice SocietyʹÓÃ×Ô½ç˵¹¹½¨µÄMicrosoft PowerShell(PS)¾ç±¾´ÓÖ¸±êÍøÂçÖÐÇÔÈ¡Êý¾Ý¡£Vice SocietyµÄÐÂÊý¾Ýй¶¹¤¾ßÊÇÆëÈ«×Ô¶¯»¯µÄ£¬Ê¹Óò»ÈÝÒ×´¥·¢¾¯±¨µÄ¡°living off the land¡±¶þ½øÔìÎļþºÍ¾ç±¾£¬ÔÚÀÕË÷Èí¼þ¹¥»÷µÄ×îºóÒ»²½£¬¼´¼ÓÃÜÊý¾Ý֮ǰ£¬Î¬³Ôìä»î¶¯µÄÒñ±ÎÐÔ¡£¸ÃÊý¾Ýй¶¹¤¾ß»¹»áÏÞ¶È¿ìÂÊ£¬ËüÉèÖÃÁË×î¶à5¸öĿ¼×éµÄ10¸ö×÷ҵͬʱÔËÐУ¬ÒÔÔ¤·ÀʹÓùý¶àµÄÖ÷»ú¿ÉÓÃ×ÊÔ´¡£
https://unit42.paloaltonetworks.com/vice-society-ransomware-powershell/


¾©¹«Íø°²±¸11010802024551ºÅ