¹È¸èChrome½ôÆÈ¸üÐÂÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-2033

Ðû²¼Ê±¼ä 2023-04-17

1¡¢¹È¸èChrome½ôÆÈ¸üÐÂÐÞ¸´±»Ê¹ÓÃÎó²îCVE-2023-2033


4ÔÂ14ÈÕ£¬£¬£¬ £¬ £¬£¬¹È¸èÐû²¼ÁËChromeµÄ½ôÆÈÇå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ¸´×Ô½ñÄêÄêÍ·ÒÔÀ´ÔڵĵÚÒ»¸öÒѱ»Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâÊÇV8 JavaScriptÒýÇæÖеÄÀàÐÍ»ìÏýÎó²î£¨CVE-2023-2033£©£¬£¬£¬ £¬ £¬£¬¹¥»÷Õß¿Éͨ¹ý¶ñÒâHTMLÒ³ÃæÊ¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£¡£ä¯ÀÀÆ÷½«×Ô¶¯¼ì²éиüв¢ÔÚÖØÆôºó×°ÖÃËüÃÇ¡£¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬ £¬ £¬£¬Îó²îCVE-2023-2033Òѱ»ÔÚҰʹÓ㬣¬£¬ £¬ £¬£¬µ«Ã»ÓзÖÏíÆäÊÖÒÕϸ½Ú»òIoC£¬£¬£¬ £¬ £¬£¬ÒÔ±ÜÃâ¹¥»÷ÕߵĽøÒ»²½Ê¹Óᣡ£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/04/google-releases-urgent-chrome-update-to.html


2¡¢Goldosonͨ¹ýGoogle PlayÖеÄ60¸öÓ¦ÓþÙÐзַ¢


McAfeeÔÚ4ÔÂ12Èճƣ¬£¬£¬ £¬ £¬£¬Ò»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þGoldosonͨ¹ýGoogle PlayÊÐËÁÖеÄ60¸öÕýµ±Ó¦ÓþÙÐзַ¢£¬£¬£¬ £¬ £¬£¬×ÜÏÂÔØÁ¿Áè¼Ý1ÒڴΡ£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔÍøÂçÓйØÒÑ×°ÖÃÓ¦Óá¢WiFiºÍÀ¶ÑÀÅþÁ¬×°±¸ÒÔ¼°Óû§GPSλÖõÄÐÅÏ¢£¬£¬£¬ £¬ £¬£¬Ëü»¹¿ÉÒÔÔÚδ¾­Óû§Ô޳ɵÄÇéÐÎÏÂͨ¹ýÔÚºǫ́µã»÷¹ã¸æÀ´×¬Ç®¡£¡£¡£¡£¡£¡£¡£Ðí¶àÊÜÓ°ÏìµÄÓ¦ÓÃÒѱ»Æä¿ª·¢Ö°Ô±ÐÞ¸´£¬£¬£¬ £¬ £¬£¬¶øÄÇЩûÓÐʵʱÏìÓ¦µÄÓ¦ÓÃÔòÒò²»ÇкÏGoogle PlayÕþ²ß±»É¾³ý¡£¡£¡£¡£¡£¡£¡£


https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/


3¡¢Èí¼þÊÖÒÕ×Éѯ¹«Ë¾NCRÔâµ½BlackCatÍÅ»ïµÄÀÕË÷¹¥»÷


4ÔÂ15ÈÕ±¨µÀ£¬£¬£¬ £¬ £¬£¬ÃÀ¹úÈí¼þºÍÊÖÒÕ×Éѯ¹«Ë¾NCRÔâµ½BlackCatµÄ¹¥»÷£¬£¬£¬ £¬ £¬£¬µ¼ÖÂÆäAloha PoSƽ̨·ºÆð¹ÊÕÏ¡£¡£¡£¡£¡£¡£¡£×ÔÉÏÖÜÈý·ºÆðÎÊÌâÒÔÀ´£¬£¬£¬ £¬ £¬£¬¿Í»§Ò»Ö±ÎÞ·¨Ê¹ÓøÃϵͳ¡£¡£¡£¡£¡£¡£¡£¾­Óɼ¸ÌìµÄĬȻ£¬£¬£¬ £¬ £¬£¬NCRÓÚ4ÔÂ15ÈÕ͸¶£¬£¬£¬ £¬ £¬£¬Õâ´Î¹ÊÕÏÊÇÓÉÓÚΪAloha POSƽ̨Ìṩ¶¯Á¦µÄÊý¾ÝÖÐÐÄÔâµ½ÀÕË÷¹¥»÷µ¼ÖµÄ¡£¡£¡£¡£¡£¡£¡£BlackCatÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬ £¬ £¬£¬²¢¹ûÕæÁËÓëÒ»ÃûNCR´ú±íÖ®¼ä̸ÅÐ̸ÌìµÄ¶Ô»°Æ¬¶Ï¡£¡£¡£¡£¡£¡£¡£Ì¸Ìì¼Í¼ÏÔʾ£¬£¬£¬ £¬ £¬£¬¹¥»÷ʱ´úûÓÐÇÔÈ¡´æ´¢ÔÚЧÀÍÆ÷ÉϵÄÈκÎÊý¾Ý¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬ £¬£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡ÁËNCR¿Í»§µÄƾ֤£¬£¬£¬ £¬ £¬£¬²¢ÍþвҪ¹ûÕæ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack/


4¡¢Dimas VolvoÊý¾Ý¿âÉèÖùýʧй¶¿Í»§Êý¾ÝºÍÔ´´úÂë


¾Ý4ÔÂ15ÈÕ±¨µÀ£¬£¬£¬ £¬ £¬£¬ÎÖ¶ûÎÖÔÚ°ÍÎ÷µÄÁãÊÛÉÌDimas Volvoй¶ÁËÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£2ÔÂ17ÈÕ£¬£¬£¬ £¬ £¬£¬Ñо¿ÍŶӷ¢Ã÷¿É¹ûÕæ»á¼ûdimasvolvo.com.brÍøÕ¾ÉÏÍйܵÄÃô¸ÐÎļþ¡£¡£¡£¡£¡£¡£¡£Ëü¹ûÕæÁËÆäÊý¾Ý¿âµÄÉí·ÝÑéÖ¤ÐÅÏ¢£¬£¬£¬ £¬ £¬£¬°üÀ¨MySQLºÍRedisÊý¾Ý¿âÖ÷»ú¡¢¿ª·Å¶Ë¿ÚºÍƾ֤£¬£¬£¬ £¬ £¬£¬¿ÉÓÃÀ´»á¼û´æ´¢Óû§Êý¾ÝµÄÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý»¹°üÀ¨¸ÃÍøÕ¾µÄLaravelÓ¦ÓÃÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁË´æ´¢ÍøÕ¾Ô´´úÂëµÄGit´æ´¢¿âµÄURL£¬£¬£¬ £¬ £¬£¬¹¥»÷Õß¿Éͨ¹ý±©Á¦¹¥»÷»á¼û´æ´¢¿â¡£¡£¡£¡£¡£¡£¡£ÒÔ¼°Ò»¸ö.DS_StoreÎļþ£¬£¬£¬ £¬ £¬£¬ÉúÑÄÁËÀ´×Ô¿ª·¢Ö°Ô±ÅÌËã»úµÄÔªÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬ £¬£¬ÎÊÌâÒÑ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/144816/breaking-news/volvo-retailer-data-leak.html


5¡¢Ðµĺڿ͹¤¾ßLegion¿ÉÓÃÀ´ÍøÂçÆ¾Ö¤ºÍÐ®ÖÆSMTP


4ÔÂ13ÈÕ£¬£¬£¬ £¬ £¬£¬Cado LabsÅû¶ÁË»ùÓÚPythonµÄкڿ͹¤¾ßLegionµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßͨ¹ýTelegram Messenger³öÊÛ£¬£¬£¬ £¬ £¬£¬ÊÇÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ£¬£¬£¬ £¬ £¬£¬Ëü¿ÉÄÜ»ùÓÚ¶ñÒâÈí¼þAndroxGhOst£¬£¬£¬ £¬ £¬£¬²¢¾ßÓÐÖ´ÐÐSMTPЧÀÍÆ÷ö¾Ù¡¢Ô¶³Ì´úÂëÖ´ÐС¢Ê¹ÓÃδÐÞ¸´µÄApache°æ±¾¡¢±©Á¦ÆÆ½âcPanelºÍWebHost ManagerÕË»§¡¢ÓëShodanµÄAPI»¥¶¯ÒÔ¼°ÀÄÓÃAWSЧÀ͵ÈÄ£¿£¿£¿£¿£¿éµÄ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£³ýÁËÍøÂçÆ¾Ö¤ºÍ¹¥»÷ÍøÂçЧÀÍ£¬£¬£¬ £¬ £¬£¬Legion»¹¿ÉÒÔ½¨ÉèÖÎÀíÔ±Óû§¡¢Ö²Èëwebshell²¢ÏòÃÀ¹úÔËÓªÉ̵Ŀͻ§·¢ËÍÀ¬»ø¶ÌÐÅ¡£¡£¡£¡£¡£¡£¡£


https://www.cadosecurity.com/legion-an-aws-credential-harvester-and-smtp-hijacker/


6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷ÍÅ»ïVice SocietyµÄÆÊÎö±¨¸æ


4ÔÂ13ÈÕ£¬£¬£¬ £¬ £¬£¬Unit 42Ðû²¼±¨¸æ³Æ£¬£¬£¬ £¬ £¬£¬ÀÕË÷ÍÅ»ïVice SocietyʹÓÃ×Ô½ç˵¹¹½¨µÄMicrosoft PowerShell(PS)¾ç±¾´ÓÄ¿µÄÍøÂçÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£Vice SocietyµÄÐÂÊý¾Ýй¶¹¤¾ßÊÇÍêÈ«×Ô¶¯»¯µÄ£¬£¬£¬ £¬ £¬£¬Ê¹ÓýûÖ¹Ò×´¥·¢¾¯±¨µÄ¡°living off the land¡±¶þ½øÖÆÎļþºÍ¾ç±¾£¬£¬£¬ £¬ £¬£¬ÔÚÀÕË÷Èí¼þ¹¥»÷µÄ×îºóÒ»²½£¬£¬£¬ £¬ £¬£¬¼´¼ÓÃÜÊý¾Ý֮ǰ£¬£¬£¬ £¬ £¬£¬¼á³ÖÆä»î¶¯µÄÒþ²ØÐÔ¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ýй¶¹¤¾ß»¹»áÏÞÖÆËÙÂÊ£¬£¬£¬ £¬ £¬£¬ËüÉèÖÃÁË×î¶à5¸öĿ¼×éµÄ10¸ö×÷ҵͬʱÔËÐУ¬£¬£¬ £¬ £¬£¬ÒÔ×èֹʹÓùý¶àµÄÖ÷»ú¿ÉÓÃ×ÊÔ´¡£¡£¡£¡£¡£¡£¡£


https://unit42.paloaltonetworks.com/vice-society-ransomware-powershell/