Chrome°ä²¼´¹Î£¸üн¨¸´·ì϶CVE-2023-6345
°ä²¼¹¦·ò 2023-11-29GoogleÔÚ11ÔÂ28ÈÕ°ä²¼´¹Î£°²È«¸üУ¬½¨¸´Á˽ñÄêµÄµÚ6¸öChromeÁãÈÕ·ì϶£¨CVE-2023-6345£©¡£¸Ã·ì϶ԴÓÚSkia¿ªÔ´2DͼÐοâÖеÄÒ»¸öÕûÊýÒç¶Âí½Å£¬¿ÉÄܵ¼ÖÂå´»úºÍÖ´ÐÐËÁÒâ´úÂëµÈ¡£ÕâÖÖ·ì϶ʱʱ±»Óë¹ú¶ÈÓйصĺڿÍÀûÓã¬Ö´Ðи÷Àà¼äµý»î¶¯¡£ä¯ÀÀÆ÷½«×Ô¶¯²é³¸üУ¬²¢±ÉÈË´ÎÆô¶¯Ê±Îª²»ÏëÊÖ¶¯¸üеÄÓû§½øÐÐ×°Öá£Google°µÊ¾£¬ÔÚ´óÎÞÊýÓû§¸üÐÂä¯ÀÀÆ÷֮ǰ£¬»áÏ޶ȶԷì϶¾ßÌåÐÅÏ¢µÄ½Ó¼û¡£
https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2023/
2¡¢ÈÕ±¾Í¨Ñ¶ÀûÓÃLineй¶ÊýÊ®ÍòÌõÔ±¹¤ºÍÓû§µÄÊý¾Ý
¾Ý11ÔÂ27ÈÕ±¨Â·£¬¿Æ¼¼¹«Ë¾LY Corp.»ã±¨ÁËһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬³Æ44ÍòÌõÓ×ÎÒÊý¾Ýй¶£¬ÆäÖÐÔ̺¬30¶àÍòÌõÓëͨѶÀûÓÃLineÓйصÄÊý¾Ý¡£¹¥»÷²úÉúÔÚ10ÔÂ9ÈÕ£¬Æäº«¹ú×Ó¹«Ë¾Naver Cloud Corp.µÄÒ»ÃûÔ±¹¤µÄµçÄÔϰȾÁ˶ñÒâÈí¼þ£¬µ¼ÖÂδ¾ÊÚȨµÄ½Ó¼û¡£¸Ã¹«Ë¾ÓÚ10ÔÂ29ÈÕÈ·ÈÏÁËÊý¾Ýй¶£¬²¢»¨ÁËԼĪһ¸öԵŦ·òÀ´È·ÈÏй¶¹æÄ£¡£Õâ´ÎÊÂÎñй¶ÁËÓû§µÄÓ×ÎÒÐÅÏ¢ºÍһЩ·þÎñʹÓú¹Ç࣬ÒÔ¼°Óй«Ë¾ºÏ×÷ͬ°éºÍÔ±¹¤µÄÓ×ÎÒÐÅÏ¢¡£
https://japantoday.com/category/national/line-operator-says-400-000-personal-data-items-possibly-leaked
3¡¢ArdentÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÃÀ¹ú¶à¼ÒÒ½Ôº±»ÆÈ×ªÒÆ»¼Õß
¾ÝýÌå11ÔÂ27ÈÕ±¨Â·£¬Ardent Health ServicesÔâµ½ÀÕË÷¹¥»÷£¬Ó°ÏìÁ˶à¼ÒÒ½ÔºµÄÔËÓª¡£¸Ã¹«Ë¾ÔÚÃÀ¹úµÄ6¸öÖÝÔËÓªÁË30¶à¼ÒÒ½Ôº¡£×Ըж÷½ÚÒÔÀ´£¬±¾µØµÄ¶à¼ÒýÌ屨·£¬ËûÃÇµØµãµØÓòµÄÒ½ÔºÔÚÓ¦¶ÔÀÕË÷¹¥»÷£¬²¢²»µÃ²»×ªÒƼ¹Øï»¼Õߣ¬×êÑÐÈËÔ±´§Ä¦ÕâЩ¹¥»÷ÊÇ»¥ÓйØÁªµÄ¡£ArdentÔÚ±¾ÖÜһй©£¬ËûÓÚ11ÔÂ23ÈÕÉÏÎçÒâʶµ½Ôâµ½ÁËÀÕË÷¹¥»÷¡£Îª´Ë£¬ËûÃÇÁÙʱÖжÏÁËËùÓÐЧ»§¶ÔÆäÀûÓõĽӼû£¬Ô̺¬¹«Ë¾·þÎñÆ÷¡¢EpicÈí¼þ¡¢»¥ÁªÍøºÍÁÙ´²·¨Ê½¡£
https://therecord.media/ardent-health-services-ransomware-hospitals-divert-ambulances
4¡¢Ë¹ÂåÎÄÄáÑÇ×î´óµçÁ¦¹«Ë¾HSEÔâµ½ÒÉËÆRhysidaµÄ¹¥»÷
ýÌå11ÔÂ27Èճƣ¬Ë¹ÂåÎÄÄáÑǵçÁ¦¹©¸øÉÌHolding Slovenske Elektrarne(HSE)Ôâµ½ÀÕË÷¹¥»÷¡£HSEÊÇ˹ÂåÎÄÄáÑÇ×î´óµÄ·¢µç¹«Ë¾£¬Ô¼Õ¼¹úÄÚ²úÁ¿µÄ60%£¬ÊǸùúµÄ¹Ø¼ü»ù´¡ÉèÊ©¡£HSEÔÚÉÏÖÜÈýÔâµ½¹¥»÷£¬²¢ÓÚÖÜÎå½ÚÔìסÁ˹¥»÷¡£¸Ã¹«Ë¾µÄ·¢µçÒµÎñ²¢Î´Êܵ½Ó°Ï죬µ«ÊÇITϵͳºÍÎļþ±»¼ÓÃÜÁË¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÉÐδÊÕµ½Êê½ðÒªÇ󣬲¢ÉêÃ÷³Æ¸ÃÊÂÎñ²»»áµ¼ÖÂÔËÓªÖжϺ;¼ÃËðʧ£¬½öÓ°ÏìÁË?o?tanjÈȵ糧ºÍVelenjeú¿óµÄÍøÕ¾¡£±¾µØÃ½Ìå»ñµÃµÄ·Ç¹Ù·½ÐÅÏ¢ÏÔʾ£¬¹¥»÷¹éÒòÓÚÀÕË÷ÍÅ»ïRhysida¡£
https://www.bleepingcomputer.com/news/security/slovenias-largest-power-provider-hse-hit-by-ransomware-attack/
5¡¢SentinelOne°ä²¼RustBucketºÍKandyKor»î¶¯µÄ·ÖÎö
11ÔÂ27ÈÕ£¬SentinelOne°ä²¼»ã±¨³Æ£¬³¯Ïʹ¥»÷ÍŻ»ìºÏ¡±ÁËRustBucketºÍKandyKorn»î¶¯µÄ·ÖÆç×é¼þ£¬²¢Ê¹ÓÃSwiftLoader droppersÀ´´«²¼KandyKorn payloads¡£RustBucket»î¶¯Ê¹ÓüÙÒâPDFÔĶÁÆ÷µÄSwiftLoader£¬ÔÚÖ¸±ê²é¿´µö¶üÎĵµÊ±¼ÓÔØRust¿ª·¢µÄÏÂÒ»½×¶Î¶ñÒâÈí¼þ¡£KandyKorn»î¶¯ÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÂòÂôÆ½Ì¨Çø¿éÁ´¹¤³ÌʦµÄ¸´ÔÓ¶à½×¶Î¹¥»÷¡£´Ë±í£¬×êÑÐÈËÔ±»¹½«ÃûΪObjCShellzµÄmacOS¶ñÒâÈí¼þÓëRustBucket»î¶¯ÁªÏµÆðÀ´¡£
https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
6¡¢McAfee°ä²¼¹ØÓÚNetSupportбäÌåµÄ·ÖÎö»ã±¨
11ÔÂ27ÈÕ£¬McAfee°ä²¼Á˹ØÓÚNetSupportбäÌåµÄ·ÖÎö»ã±¨¡£¸Ã¶ñÒâÈí¼þÖØÒªÕë¶ÔÃÀ¹úºÍ¼ÓÄô󣬽üÆÚµÄбäÌåÆðͷͨ¹ýJavaScript½øÐзַ¢¡£Ï°È¾Ê¼ÓÚ»ìºÏµÄJavaScriptÎļþ£¬Ö´Ðкó»áŲÓÃWindows Script Host(wscript.exe)¡£Ëæºó£¬wscript.exe¹ý³ÌÆô¶¯PowerShell£¬Ê¹ÓÃÌØ¶¨ÊýÁîÀ´½øÐÐϰȾ¡£¶øºó£¬PowerShell³ÖÐøÏÂÔØNetSupport payload£¬ÕâÊÇÒ»ÖÖ¶ñÒâÔ¶³ÌÖÎÀí¹¤¾ß¡£ÏÂÔØºó£¬¶ñÒâÈí¼þ»áÖ´Ðжþ½øÔìÎļþclient32.exe£¬ÕâÊÇNetSupport¿Í»§¶Ë£¬ÕƹܳÉÁ¢¶ÔÖ¸±êϵͳµÄ½ÚÔì¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/beneath-the-surface-how-hackers-turn-netsupport-against-users/


¾©¹«Íø°²±¸11010802024551ºÅ