ChromeÐû²¼½ôÆÈ¸üÐÂÐÞ¸´Îó²îCVE-2023-6345
Ðû²¼Ê±¼ä 2023-11-29GoogleÔÚ11ÔÂ28ÈÕÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Á˽ñÄêµÄµÚ6¸öChromeÁãÈÕÎó²î£¨CVE-2023-6345£©¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚSkia¿ªÔ´2DͼÐοâÖеÄÒ»¸öÕûÊýÒç³öÎó²î£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂå´»úºÍÖ´ÐÐí§Òâ´úÂëµÈ¡£¡£¡£¡£¡£ÕâÖÖÎó²î¾³£±»Óë¹ú¼ÒÏà¹ØµÄºÚ¿ÍʹÓ㬣¬£¬£¬£¬£¬Ö´ÐÐÖÖÖÖÌØ¹¤»î¶¯¡£¡£¡£¡£¡£ä¯ÀÀÆ÷½«×Ô¶¯¼ì²é¸üУ¬£¬£¬£¬£¬£¬²¢ÔÚÏÂ´ÎÆô¶¯Ê±Îª²»ÏëÊÖ¶¯¸üеÄÓû§¾ÙÐÐ×°Öᣡ£¡£¡£¡£GoogleÌåÏÖ£¬£¬£¬£¬£¬£¬ÔÚ´ó´ó¶¼Óû§¸üÐÂä¯ÀÀÆ÷֮ǰ£¬£¬£¬£¬£¬£¬»áÏÞÖÆ¶ÔÎó²îÏêϸÐÅÏ¢µÄ»á¼û¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2023/
2¡¢ÈÕ±¾Í¨Ñ¶Ó¦ÓÃLineй¶ÊýÊ®ÍòÌõÔ±¹¤ºÍÓû§µÄÊý¾Ý
¾Ý11ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¿Æ¼¼¹«Ë¾LY Corp.±¨¸æÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬³Æ44ÍòÌõСÎÒ˽¼ÒÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨30¶àÍòÌõÓëͨѶӦÓÃLineÏà¹ØµÄÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ10ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Æäº«¹ú×Ó¹«Ë¾Naver Cloud Corp.µÄÒ»ÃûÔ±¹¤µÄµçÄÔѬȾÁ˶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬µ¼ÖÂδ¾ÊÚȨµÄ»á¼û¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ10ÔÂ29ÈÕÈ·ÈÏÁËÊý¾Ýй¶£¬£¬£¬£¬£¬£¬²¢»¨ÁËԼĪһ¸öÔµÄʱ¼äÀ´È·ÈÏй¶¹æÄ£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñй¶ÁËÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ºÍһЩЧÀÍʹÓÃÀúÊ·£¬£¬£¬£¬£¬£¬ÒÔ¼°Óй«Ë¾ÏàÖúͬ°éºÍÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£
https://japantoday.com/category/national/line-operator-says-400-000-personal-data-items-possibly-leaked
3¡¢ArdentÔâµ½ÀÕË÷¹¥»÷µ¼ÖÂÃÀ¹ú¶à¼ÒÒ½Ôº±»ÆÈ×ªÒÆ»¼Õß
¾ÝýÌå11ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ardent Health ServicesÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˶à¼ÒÒ½ÔºµÄÔËÓª¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÃÀ¹úµÄ6¸öÖÝÔËÓªÁË30¶à¼ÒÒ½Ôº¡£¡£¡£¡£¡£×Ըж÷½ÚÒÔÀ´£¬£¬£¬£¬£¬£¬ÍâµØµÄ¶à¼ÒýÌ屨µÀ£¬£¬£¬£¬£¬£¬ËûÃÇËùÔÚµØÇøµÄÒ½ÔºÕýÔÚÓ¦¶ÔÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬²¢²»µÃ²»×ªÒƼ±ÕﻼÕߣ¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÍƲâÕâЩ¹¥»÷ÊÇÏ໥¹ØÁªµÄ¡£¡£¡£¡£¡£ArdentÔÚ±¾ÖÜһ͸¶£¬£¬£¬£¬£¬£¬ËûÓÚ11ÔÂ23ÈÕÉÏÎçÒâʶµ½Ôâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬ËûÃÇÔÝʱÖÐÖ¹ÁËËùÓÐÓû§¶ÔÆäÓ¦ÓõĻá¼û£¬£¬£¬£¬£¬£¬°üÀ¨¹«Ë¾Ð§ÀÍÆ÷¡¢EpicÈí¼þ¡¢»¥ÁªÍøºÍÁÙ´²³ÌÐò¡£¡£¡£¡£¡£
https://therecord.media/ardent-health-services-ransomware-hospitals-divert-ambulances
4¡¢Ë¹ÂåÎÄÄáÑÇ×î´óµçÁ¦¹«Ë¾HSEÔâµ½ÒÉËÆRhysidaµÄ¹¥»÷
ýÌå11ÔÂ27Èճƣ¬£¬£¬£¬£¬£¬Ë¹ÂåÎÄÄáÑǵçÁ¦¹©Ó¦ÉÌHolding Slovenske Elektrarne(HSE)Ôâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£HSEÊÇ˹ÂåÎÄÄáÑÇ×î´óµÄ·¢µç¹«Ë¾£¬£¬£¬£¬£¬£¬Ô¼Õ¼º£ÄÚ²úÁ¿µÄ60%£¬£¬£¬£¬£¬£¬ÊǸùúµÄÒªº¦»ù´¡ÉèÊ©¡£¡£¡£¡£¡£HSEÔÚÉÏÖÜÈýÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬²¢ÓÚÖÜÎå¿ØÖÆ×¡Á˹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄ·¢µçÓªÒµ²¢Î´Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬¿ÉÊÇITϵͳºÍÎļþ±»¼ÓÃÜÁË¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδÊÕµ½Êê½ðÒªÇ󣬣¬£¬£¬£¬£¬²¢ÉùÃ÷³Æ¸ÃÊÂÎñ²»»áµ¼ÖÂÔËÓªÖÐÖ¹ºÍ¾¼ÃËðʧ£¬£¬£¬£¬£¬£¬½öÓ°ÏìÁË?o?tanjÈȵ糧ºÍVelenjeú¿óµÄÍøÕ¾¡£¡£¡£¡£¡£ÍâµØÃ½Ìå»ñµÃµÄ·Ç¹Ù·½ÐÅÏ¢ÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷¹éÒòÓÚÀÕË÷ÍÅ»ïRhysida¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/slovenias-largest-power-provider-hse-hit-by-ransomware-attack/
5¡¢SentinelOneÐû²¼RustBucketºÍKandyKor»î¶¯µÄÆÊÎö
11ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬SentinelOneÐû²¼±¨¸æ³Æ£¬£¬£¬£¬£¬£¬³¯Ïʹ¥»÷ÍŻ»ìÏý¡±ÁËRustBucketºÍKandyKorn»î¶¯µÄ²î±ð×é¼þ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃSwiftLoader droppersÀ´Èö²¥KandyKorn payloads¡£¡£¡£¡£¡£RustBucket»î¶¯Ê¹ÓÃð³äPDFÔĶÁÆ÷µÄSwiftLoader£¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄÉó²éÓÕ¶üÎĵµÊ±¼ÓÔØRust¿ª·¢µÄÏÂÒ»½×¶Î¶ñÒâÈí¼þ¡£¡£¡£¡£¡£KandyKorn»î¶¯ÊÇÕë¶Ô¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨Çø¿éÁ´¹¤³ÌʦµÄÖØ´ó¶à½×¶Î¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹½«ÃûΪObjCShellzµÄmacOS¶ñÒâÈí¼þÓëRustBucket»î¶¯ÁªÏµÆðÀ´¡£¡£¡£¡£¡£
https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
6¡¢McAfeeÐû²¼¹ØÓÚNetSupportбäÌåµÄÆÊÎö±¨¸æ
11ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬McAfeeÐû²¼Á˹ØÓÚNetSupportбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍ¼ÓÄô󣬣¬£¬£¬£¬£¬½üÆÚµÄбäÌå×îÏÈͨ¹ýJavaScript¾ÙÐзַ¢¡£¡£¡£¡£¡£Ñ¬È¾Ê¼ÓÚ»ìÏýµÄJavaScriptÎļþ£¬£¬£¬£¬£¬£¬Ö´Ðкó»áŲÓÃWindows Script Host(wscript.exe)¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬wscript.exeÀú³ÌÆô¶¯PowerShell£¬£¬£¬£¬£¬£¬Ê¹ÓÃÌØ¶¨ÃüÁîÀ´¾ÙÐÐѬȾ¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬PowerShell¼ÌÐøÏÂÔØNetSupport payload£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»ÖÖ¶ñÒâÔ¶³ÌÖÎÀí¹¤¾ß¡£¡£¡£¡£¡£ÏÂÔØºó£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÖ´Ðжþ½øÖÆÎļþclient32.exe£¬£¬£¬£¬£¬£¬ÕâÊÇNetSupport¿Í»§¶Ë£¬£¬£¬£¬£¬£¬ÈÏÕæ½¨Éè¶ÔÄ¿µÄϵͳµÄ¿ØÖÆ¡£¡£¡£¡£¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/beneath-the-surface-how-hackers-turn-netsupport-against-users/


¾©¹«Íø°²±¸11010802024551ºÅ