¶íÂÞ˹ÔËÓªÉÌMiranda MediaÔâµ½´ó¹æÄ£DDoS¹¥»÷
Ðû²¼Ê±¼ä 2023-10-311¡¢¶íÂÞ˹ÔËÓªÉÌMiranda MediaÔâµ½´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå10ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬Miranda Media ISPÔÚÉÏÖÜÎåÐû²¼ÕýÃæÁÙ´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£IT Army of Ukraine×éÖ¯²¢²ß»®ÁËÕë¶Ô¶íÂÞ˹Èý´ó»¥ÁªÍøÌṩÉÌÖ´ÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£Miranda Media³Æ£¬£¬£¬£¬×Ô10ÔÂ27ÈÕÉÏÎç9:05ÒÔÀ´£¬£¬£¬£¬ÔËÓªÉÌMiranda-Media¼Í¼ÁËÀ´×ÔÎÚ¿ËÀ¼ÍÅ»ïµÄ´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬Miranda-Media¡¢KrymtelecomºÍMirTelecomµÄЧÀÍÔÝʱ²»¿ÉÓᣡ£¡£¡£¡£¸ÃÊÂÎñ²»µ«Ó°Ïìµ½¿ËÀïÃ×ÑÇ£¬£¬£¬£¬»¹Ó°Ïìµ½ºÕ¶ûËÉ¡¢Ôú²¨ÂÞÈÈ¡¢¶ÙÄù´Ä¿ËºÍ¬¸Ê˹¿ËµØÇøµÄ²¿·ÖµØÇø¡£¡£¡£¡£¡£
https://securityaffairs.com/153192/hacktivism/it-army-of-ukraine-hit-russia-isp.html
2¡¢ÀÕË÷ÍÅ»ïRansomedVCÐû²¼ÇýÖð²¢³öÊÛÆä¹¤¾ß´úÂë
¾Ý10ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬ÀÕË÷ÍÅ»ïRansomedVCÐû²¼Òò¡°Ð¡ÎÒ˽¼ÒÔµ¹ÊÔÓÉ¡±ÇýÖ𣬣¬£¬£¬²¢½«³öÊÛÆäÕû¸öÍøÂç»ù´¡ÉèÊ©¡£¡£¡£¡£¡£RansomedVCÓÚ½ñÄê8ÔÂÊ״ηºÆð£¬£¬£¬£¬Õë¶Ô¹«Ë¾¡¢Õþ¸®»ú¹¹ºÍ½ÌÓý»ú¹¹µÈ¡£¡£¡£¡£¡£´Ë´Î³öÊÛµÄ×ʲúÊýÄ¿¾ªÈË£¬£¬£¬£¬°üÀ¨ÖÖÖÖÓòÃûºÍÂÛ̳¡¢ÀÕË÷Èí¼þÌìÉúÆ÷¡¢Á¥ÊôÍÅ»ïµÄ»á¼ûȨÏÞ¡¢É罻ýÌåÕË»§¡¢TelegramƵµÀ¡¢¶à¼Ò¹«Ë¾µÄVPN»á¼ûȨÏ޺ͼÛÖµÁè¼Ý1000ÍòÃÀÔªµÄÊý¾Ý¿âµÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲâÇýÖðµÄÔµ¹ÊÔÓÉ£¬£¬£¬£¬¿ÉÄÜÊÇÀ´×ÔÖ´·¨»ú¹¹µÄѹÁ¦£¬£¬£¬£¬Ò²¿ÉÄÜÊÇÒ»¸öеĸüÖØ´óµÄÐж¯ÕýÔÚÔÍÄðÖ®ÖС£¡£¡£¡£¡£
https://www.hackread.com/ransomedvc-ransomware-quit-sell-infrastructure/
3¡¢Elastic·¢Ã÷ͨ¹ýαÔìMSIXÓ¦Ó÷ַ¢GHOSTPULSEµÄ»î¶¯
10ÔÂ27ÈÕ£¬£¬£¬£¬Elastic¼ì²âµ½Ò»ÖÖÐµĹ¥»÷»î¶¯£¬£¬£¬£¬Ê¹ÓÃαÔìµÄMSIX WindowsÓ¦ÓóÌÐò°ü£¬£¬£¬£¬À´·Ö·¢ÐÂÐͶñÒâÈí¼þ¼ÓÔØ³ÌÐòGHOSTPULSE¡£¡£¡£¡£¡£¸Ã»î¶¯Ê×ÏÈÓÕʹÓû§ÏÂÔØMSIXÈí¼þ°ü£¬£¬£¬£¬µ±Óû§Æô¶¯MSIXÎļþ»áµ¯³öÒ»¸ö´°¿ÚÌáÐѵã»÷¡°×°Öá±°´Å¥¡£¡£¡£¡£¡£µã»÷ºó£¬£¬£¬£¬Ò»¸öPowerShell¾ç±¾»áÉñÃØµØÔÚϵͳÉÏÏÂÔØ¡¢½âÃܺÍÖ´ÐÐGHOSTPULSE¡£¡£¡£¡£¡£GHOSTPULSE×÷Ϊ¼ÓÔØ³ÌÐò£¬£¬£¬£¬½ÓÄÉProcess Doppelg?nging¹¥»÷·½·¨Æô¶¯×îÖÕpayload¡£¡£¡£¡£¡£×îÖÕpayloadÒòÑù±¾¶øÒ죬£¬£¬£¬°üÀ¨SectopRAT¡¢Rhadamanthys¡¢Vidar¡¢LummaºÍNetSupport RAT¡£¡£¡£¡£¡£
https://www.elastic.co/security-labs/ghostpulse-haunts-victims-using-defense-evasion-bag-o-tricks
4¡¢¼ÓÖÝijÊÐÔâµ½NoEscapeµÄÀÕË÷¹¥»÷Ô¼200GBÊý¾Ý±»µÁ
ýÌå10ÔÂ27Èճƣ¬£¬£¬£¬ÃÀ¹ú¼ÓÀû¸£ÄáÑÇÖÝά¿Ë¶àά¶û͸¶ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¸ÃÊÐÐû²¼Í¨Öª³Æ£¬£¬£¬£¬ºÚ¿ÍÔÚ8ÔÂ12ÈÕÖÁ9ÔÂ26ÈÕÈëÇÖÁËËûÃǵÄϵͳ£¬£¬£¬£¬×¡ÃñÉç»áÇå¾²ºÅÂëºÍÒ½ÁÆÐÅÏ¢µÈй¶¡£¡£¡£¡£¡£ÊÐÕþÔ±¹¤ÓÚ9ÔÂ25ÈÕÔÚFacebookÉϳƣ¬£¬£¬£¬ÕýÔÚ´¦Öóͷ£Ó°Ïìµç»°ºÍÍøÕ¾ÏµÍ³µÄÖÐÖ¹ÎÊÌ⣬£¬£¬£¬Ö®ºóÌåÏÖÒÑÓÚ10ÔÂ3ÈÕ»Ö¸´µç»°ºÍÍøÕ¾Ð§ÀÍ£¬£¬£¬£¬µ«»ùÓÚÍøÂçµÄϵͳÈÔÎÞ·¨ÔËÐС£¡£¡£¡£¡£ÉÏÖܶþ£¬£¬£¬£¬NoEscape½«¸ÃÊÐÌí¼Óµ½ÆäÁбíÖУ¬£¬£¬£¬Éù³ÆÒÑ´ÓÊÐÕþϵͳÖÐÇÔÈ¡ÁË200GBµÄÊý¾Ý¡£¡£¡£¡£¡£
https://therecord.media/california-victorville-warns-of-data-breach-after-noescape-ransomware-claims
5¡¢Harmony EmailÐû²¼¹ØÓÚQuishing¹¥»÷µÄÆÊÎö±¨¸æ
10ÔÂ26ÈÕ£¬£¬£¬£¬Check PointµÄHarmony EmailÍŶÓÐû²¼Á˹ØÓÚQuishing£¨¼´¶þάÂë´¹ÂÚ£©¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£½ñÄê8Ôµ½9Ô£¬£¬£¬£¬¶þάÂë¹¥»÷ÔöÌíÁË587%¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹¸ÅÊöÁËÒ»Æð¹¥»÷»î¶¯£¬£¬£¬£¬À´ÌÖÂÛºÚ¿ÍÔõÑùʹÓöþάÂëÇÔȡƾ֤¡£¡£¡£¡£¡£¹¥»÷Õß½¨ÉèÁËÒ»¸ö½«Óû§Öض¨Ïòµ½Æ¾Ö¤ÍøÂçÒ³ÃæµÄ¶þάÂ룬£¬£¬£¬È»ºó·¢ËÍÒÔ¡°Microsoft MFA¼´½«ÓâÆÚ¡±ÎªÓÕ¶üµÄÓʼþ£¬£¬£¬£¬ÒªÇóÊÕ¼þÈËÖØÐ¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬Óû§É¨Ãè¶þάÂëºó½«±»Öض¨Ïòµ½Ò»¸ö¿´ÆðÀ´Ïñ΢ÈíÍøÕ¾µÄÆ¾Ö¤ÍøÂçÍøÕ¾¡£¡£¡£¡£¡£
https://www.avanan.com/blog/the-rise-in-qr-code-attacks
6¡¢CloudflareÐû²¼2023ÄêQ3 DDoS¹¥»÷Ì¬ÊÆµÄ±¨¸æ
10ÔÂ26ÈÕ£¬£¬£¬£¬CloudflareÐû²¼ÁË2023ÄêµÚÈý¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄ±¨¸æ¡£¡£¡£¡£¡£µÚÈý¼¾¶È£¬£¬£¬£¬Cloudflare½â¾öÁËÊýǧÆð´ó¹æÄ£HTTP DDoS¹¥»÷¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬89ÆðÁè¼ÝÿÃë1ÒÚÇëÇó (rps)£¬£¬£¬£¬×î´ó·åֵΪ2.01ÒÚrps£¬£¬£¬£¬ÕâÊÇ֮ǰ×î´ó¹æÄ£¹¥»÷(7100Íòrps)µÄÈý±¶£¬£¬£¬£¬ÕâЩ¹¥»÷ÊÇͨ¹ýHTTP/2 Rapid ResetʵÏֵġ£¡£¡£¡£¡£ÕâÒ»¼¾¶ÈµÄHTTP DDoS¹¥»÷Á÷Á¿½ÏÉÏÒ»¼¾¶È×ÜÌåÔöÌí65%£¬£¬£¬£¬L3/4 DDoS¹¥»÷Ò²ÔöÌíÁË14%¡£¡£¡£¡£¡£Cloudflare»¹ÊӲ쵽еÄÇ÷ÊÆ£¬£¬£¬£¬mDNS¹¥»÷ÔöÌíÁË456%£¬£¬£¬£¬CoAP DDoS¹¥»÷ÔöÌíÁË387%£¬£¬£¬£¬ESP DDoS¹¥»÷ÔöÌíÁË303%£¬£¬£¬£¬ÀÕË÷DDoS¹¥»÷³ÊÏÂÔØÇ÷ÊÆ¡£¡£¡£¡£¡£
https://blog.cloudflare.com/ddos-threat-report-2023-q3/