Google½ôÆÈ¸üÐÂÐÞ¸´½ñÄêµÚ¶þ¸öÒѱ»Ê¹ÓõÄChromeÎó²î
Ðû²¼Ê±¼ä 2023-04-201¡¢Google½ôÆÈ¸üÐÂÐÞ¸´½ñÄêµÚ¶þ¸öÒѱ»Ê¹ÓõÄChromeÎó²î
4ÔÂ18ÈÕ£¬£¬£¬£¬£¬GoogleÐû²¼Chrome½ôÆÈ¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁË2023ÄêµÚ¶þ¸öÒѱ»Ê¹ÓÃÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâÊÇ¿ªÔ´2DͼÐοâSkiaÖеÄÕûÊýÒç³öÎó²î£¨CVE-2023-2136£©£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâµÄHTMLÒ³ÃæÖ´ÐÐɳÏäÌÓÒÝ¡£¡£¡£¡£¡£¡£¡£GoogleÉÐδÐû²¼¹ØÓÚ¸ÃÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£´Ë´Î¸üл¹ÐÞ¸´ÁËService Worker APIÖеÄÄÚ´æÔ½½ç»á¼ûÎó²î£¨CVE-2023-2133ºÍCVE-2023-2134£©ÒÔ¼°DevToolsÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2023-2135£©µÈ¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬GoogleÐÞ¸´ÁË2023ÄêµÚÒ»¸ö±»Ê¹ÓõÄChromeÎó²î£¨CVE-2023-2033£©¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/145019/security/google-second-chrome-zero-day-2023.html
2¡¢APT28ʹÓÃCisco·ÓÉÆ÷ÖеÄÎó²î×°ÖÃJaguar Tooth
¾ÝýÌå4ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ó¢ÃÀÕþ¸®Ðû²¼ÁªºÏ×Éѯ£¬£¬£¬£¬£¬ÏêϸÏÈÈÝÁËAPT28ÔõÑùʹÓÃCisco IOS·ÓÉÆ÷ÉϵÄÎó²î×°ÖÃ×Ô½ç˵¶ñÒâÈí¼þJaguar Tooth¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÔËÐй̼þC5350-ISM°æ±¾12.3(6)µÄCisco IOS·ÓÉÆ÷¡£¡£¡£¡£¡£¡£¡£Ëü¿ÉÍøÂç×°±¸ÐÅÏ¢£¬£¬£¬£¬£¬È»ºóͨ¹ýTFTP´«ÊäÕâЩÐÅÏ¢£¬£¬£¬£¬£¬²¢ÆôÓÃδ¾Éí·ÝÑéÖ¤µÄºóÃÅ»á¼û¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬ËüÊÇʹÓÃÒÑÐÞ¸´µÄSNMPÎó²î£¨CVE-2017-6742£©¾ÙÐÐ×°ÖúÍÖ´Ðеġ£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½¨ÒéÖÎÀíÔ±½«Â·ÓÉÆ÷Éý¼¶µ½×îеĹ̼þ°æ±¾ÒÔµÍÓÚ´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-uk-warn-of-govt-hackers-using-custom-malware-on-cisco-routers/
3¡¢Î¢Èí·¢Ã÷Mint Sandstorm¹¥»÷ÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©
4ÔÂ18ÈÕ£¬£¬£¬£¬£¬Î¢Èí³ÆÆä·¢Ã÷ÁËMint SandstormµÄÒ»¸ö×Ó×éÕë¶ÔÃÀ¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£´Ó2021Äêβµ½2022ÄêÖУ¬£¬£¬£¬£¬¸ÃÍÅ»ï´ÓÕì̽תÏòÖ±½Ó¹¥»÷ÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬°üÀ¨º£¸Û¡¢ÄÜÔ´¹«Ë¾¡¢ÔËÊäϵͳ¡¢¹«ÓÃÊÂÒµºÍ×ÔÈ»Æø×éÖ¯µÈ¡£¡£¡£¡£¡£¡£¡£Ëüͨ³£Ê¹ÓùûÕæÅû¶µÄPoC£¬£¬£¬£¬£¬Ò²»áʹÓþÉÎó²î£¨ÀýÈçLog4Shell£©À´¹¥»÷δ´ò²¹¶¡µÄ×°±¸¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬Í¨¹ýImpacket¿ò¼ÜºáÏòÈö²¥£¬£¬£¬£¬£¬²¢Ö´ÐÐÁ½Ìõ¹¥»÷Á´Ö®Ò»¡£¡£¡£¡£¡£¡£¡£µÚÒ»Ìõ»áÇÔÈ¡Windows Active DirectoryÊý¾Ý¿â£¬£¬£¬£¬£¬µÚ¶þÌõ×°ÖÃÃûΪDrokbkºÍSoldierµÄ×Ô½ç˵ºóÃÅ¡£¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/
4¡¢Group-IBÅû¶MuddyWaterʹÓÃSimpleHelpµÄ»î¶¯
Group-IBÔÚ4ÔÂ18ÈÕÅû¶ÁËMuddyWaterʹÓÃÕýµ±µÄÔ¶³Ì×°±¸¿ØÖƺÍÖÎÀí¹¤¾ßSimpleHelp¼á³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£SimpleHelp²¢Ã»Óб»¹¥»÷£¬£¬£¬£¬£¬Ïà·´£¬£¬£¬£¬£¬¹¥»÷ÕßÕÒµ½ÁË´Ó¹ÙÍøÏÂÔØ¸Ã¹¤¾ß²¢ÔÚ¹¥»÷ÖÐʹÓÃËüµÄÒªÁì¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓÚ2022Äê6ÔÂ30ÈÕÊ×´ÎʹÓÃSimpleHelp£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã×éÖ¯ÖÁÉÙÓаĘ̈ЧÀÍÆ÷×°ÖÃÁËSimpleHelp¡£¡£¡£¡£¡£¡£¡£×°ÖÃÔÚÄ¿µÄÉè±¹ØÁ¬ÄSimpleHelp¿Í»§¶Ë¿ÉÒÔ×÷ΪϵͳЧÀÍÒ»Á¬ÔËÐУ¬£¬£¬£¬£¬Òò´Ë¹¥»÷ÕßÄܹ»ËæÊ±»á¼ûÓû§µÄ×°±¸£¬£¬£¬£¬£¬°üÀ¨ÔÚÖØÆôºó¡£¡£¡£¡£¡£¡£¡£³õÊ¼Ñ¬È¾ÔØÌåÏÖÔÚδ֪£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÏÓÒÉÊÇ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.group-ib.com/blog/muddywater-infrastructure/
5¡¢·¿²úÖнéOrangeTee&TieÒòй¶25ÍòÈËÊý¾Ý±»·£¿£¿£¿£¿î
¾Ý4ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee & TieÒòй¶Áè¼Ý25Íò¿Í»§ºÍÔ±¹¤µÄÐÅÏ¢£¬£¬£¬£¬£¬±»Òþ˽î¿Ïµ»ú¹¹·£¿£¿£¿£¿î37000ÐÂÔª¡£¡£¡£¡£¡£¡£¡£2021Äê8ÔÂ3ÈÕ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÊÕµ½ÁËALTDOSµÄÀÕË÷Óʼþ£¬£¬£¬£¬£¬ÒªÇó10¸ö±ÈÌØ±Ò×÷ΪÊê½ð¡£¡£¡£¡£¡£¡£¡£ÀÕË÷ÍÅ»ïûÓÐÊÕµ½Êê½ð£¬£¬£¬£¬£¬Òò¶øÖ´ÐÐDDoS¹¥»÷µ¼ÖÂOrangeTee & TieµÄÍøÂç̱»¾¡£¡£¡£¡£¡£¡£¡£¸Ã·¿²ú¹«Ë¾È¡Ö¤·¢Ã÷ALTDOS»á¼ûÁË11¸öÊý¾Ý¿â£¬£¬£¬£¬£¬Éæ¼°256583¸ö¿Í»§ºÍÔ±¹¤µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÔÚ4ÔÂ17ÈÕÐû²¼µÄÊéÃæÑ¶¶ÏÖУ¬£¬£¬£¬£¬PDPC³ÆÒòOrangeTee & TieµÄ¼¸¸öʧÎóµ¼ÖÂÁËÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£
https://www.channelnewsasia.com/singapore/orangetee-real-estate-personal-data-breach-pdpa-customers-employees-3425291
6¡¢CheckPointÐû²¼¹ØÓÚRaspberry RobinµÄÆÊÎö±¨¸æ
4ÔÂ18ÈÕ£¬£¬£¬£¬£¬Check PointÐû²¼Á˹ØÓÚRaspberry RobinµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£Raspberry RobinʹÓÃÁËÐí¶àÈÆ¹ý¼ì²âµÄÒªÁ죬£¬£¬£¬£¬°üÀ¨¼ì²éPEB£¨Àú³ÌÇéÐο飩¡¢Óû§ÃûºÍÅÌËã»úÃû¡¢MacµØµã¡¢CPUID¡¢»î¶¯CPUÊýÄ¿¡¢ÄÚ´æÒ³¡¢MulDivºÍ¹Ì¼þ±íµÈ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ËüʹÓÃÐí¶àÒªÁìÀ´×èÖ¹±»Çå¾²½â¾ö¼Æ»®¼ì²âµ½£¬£¬£¬£¬£¬ÀýÈçÈ¥³ýIFEOºÍWindows Defenderɨ³ýÁбíµÈ¡£¡£¡£¡£¡£¡£¡£Raspberry Robin»¹Ê¹ÓÃÁËÁ½¸öEoPÎó²î£¨CVE-2020-1054ºÍCVE-2021-1732£©¾ÙÐÐÌáȨ¡£¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/


¾©¹«Íø°²±¸11010802024551ºÅ