CHRISTIE ÔÚ RANSOMHUB ¹¥»÷ºóÅû¶Êý¾Ýй¶ÊÂÎñ
Ðû²¼Ê±¼ä 2024-05-305ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ×éÖ¯ RansomHub Íþвй¶±»µÁÊý¾Ýºó£¬£¬£¬£¬£¬£¬ÅÄÂôÐмÑÊ¿µÃÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£´Ë´ÎÇå¾²Îó²î±¬·¢ÓÚ±¾Ô³õ¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬¸ÃÅÄÂôÐеÄÍøÕ¾ÎÞ·¨»á¼û¡£¡£¡£¡£¡£¡£¾Ý BBC ±¨µÀ£¬£¬£¬£¬£¬£¬¼ÑÊ¿µÃÒòÍøÂç¹¥»÷ÎÞ·¨³öÊÛ¼ÛÖµÔ¼ 8.4 ÒÚÃÀÔªµÄÒÕÊõÆ·ºÍÆäËû¸ß¼ÛÖµÎïÆ·¡£¡£¡£¡£¡£¡£´º¼¾ÅÄÂô»áÉϰüÀ¨Ò»·ù¼ÛÖµ 3500 ÍòÃÀÔªµÄèó¸ß»×÷ºÍÕäÏ¡ÆÏÌѾƵÈÅÄÆ·¡£¡£¡£¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ò»Ð©ÏúÊÛ±»ÍƳ١£¡£¡£¡£¡£¡£RansomHub Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬²¢½«¸Ã¹«Ë¾Ìí¼Óµ½Æä Tor ×ßÂ©ÍøÕ¾¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷×éÖ¯³Æ£¬£¬£¬£¬£¬£¬ËûÃÇÇÔÈ¡ÁË 2GB µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÖÁÉÙ 50 ÍòÃû¼ÑÊ¿µÃ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÌåÏÖ£ºÍ¨¹ý»á¼û¼ÑÊ¿µÃµÄÍøÂ磬£¬£¬£¬£¬£¬ÎÒÃÇÄܹ»»ñÈ¡Æä¿Í»§µÄÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ [³öÉúµØ¡¢MRZ¡¢ÍêÕûÎļþºÅ¡¢³öÉúÈÕÆÚ¡¢µ½ÆÚÈÕÆÚ¡¢Ãû×Ö¡¢ÐÕÊÏ¡¢¿¯ÐÐÈÕÆÚ¡¢¿¯Ðлú¹¹¡¢ÐÔ±ð¡¢ÎļþÖÖ±ð¡¢ÎļþÀàÐÍ¡¢¹ú¼®Ãû³Æ]£¬£¬£¬£¬£¬£¬ÒÔ¼°À´×ÔÌìϸ÷µØµÄÖÁÉÙ 50 ÍòÃû˽È˿ͻ§µÄµØµã¡¢Éí¸ß¡¢ÖÖ×åµÈ¸ü¶àÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/163808/cyber-crime/christie-data-breach.html
2. Google Play³¬90¸ö¶ñÒâÓ¦Ó㬣¬£¬£¬£¬£¬×°ÖÃÁ¿´ï550Íò´Î
5ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý 90 ¸ö¶ñÒâ Android Ó¦ÓóÌÐòͨ¹ý Google Play ±»×°ÖÃÁè¼Ý 550 Íò´Î£¬£¬£¬£¬£¬£¬ÓÃÓÚÈö²¥¶ñÒâÈí¼þºÍ¹ã¸æÈí¼þ£¬£¬£¬£¬£¬£¬¶ø Anatsa ÒøÐÐľÂí×î½üµÄ»î¶¯Á¿¼¤Ôö¡£¡£¡£¡£¡£¡£Anatsa£¨ÓÖÃû¡°Teabot¡±£©ÊÇÒ»ÖÖÒøÐÐľÂí£¬£¬£¬£¬£¬£¬Õë¶ÔÅ·ÖÞ¡¢ÃÀ¹ú¡¢Ó¢¹úºÍÑÇÖÞµÄ 650 ¶à¸ö½ðÈÚ»ú¹¹µÄÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£ËüÊÔͼÇÔÈ¡ÈËÃǵĵç×ÓÒøÐÐÆ¾Ö¤ÒÔ¾ÙÐÐÚ²ÆÉúÒâ¡£¡£¡£¡£¡£¡£2024 Äê 2 Ô£¬£¬£¬£¬£¬£¬Threat Fabric ±¨¸æ³Æ£¬£¬£¬£¬£¬£¬×ÔÈ¥ÄêÄêµ×ÒÔÀ´£¬£¬£¬£¬£¬£¬Anatsa ʹÓÃÉú²úÁ¦Èí¼þÖÖ±ðÖеÄÖÖÖÖÓÕ¶üÓ¦ÓóÌÐòͨ¹ý Google Play ʵÏÖÁËÖÁÉÙ 150,000 ´ÎѬȾ¡£¡£¡£¡£¡£¡£Zscaler ±¨¸æ³Æ£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù¼¸¸öÔÂÖУ¬£¬£¬£¬£¬£¬Ëü»¹ÔÚ Google Play ÉÏ·¢Ã÷ÁËÁè¼Ý 90 ¸ö¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬ÕâЩӦÓóÌÐò×ܹ²±»×°ÖÃÁË 550 Íò´Î¡£¡£¡£¡£¡£¡£´ó´ó¶¼¶ñÒâÓ¦ÓóÌÐòÄ£Ä⹤¾ß¡¢¸öÐÔ»¯Ó¦ÓóÌÐò¡¢ÉãÓ°ÊÊÓóÌÐò¡¢Éú²úÁ¦ÒÔ¼°¿µ½¡ºÍ½¡ÉíÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£Õ¼ÓÐÖ÷µ¼Ö°Î»µÄÎå¸ö¶ñÒâÈí¼þ¼Ò×åÊÇ Joker¡¢Facestealer¡¢Anatsa¡¢Coper ºÍÖÖÖÖ¹ã¸æÈí¼þ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-90-malicious-android-apps-with-55m-installs-found-on-google-play/
3. ½©Ê¬ÍøÂçCatDDOS ´ó·ùÔöÌí DDoS ¹¥»÷»î¶¯
5ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬Mirai ÂþÑÜʽ¾Ü¾øÐ§ÀÍ (DDoS) ½©Ê¬ÍøÂç±äÖÖ CatDDoS µÄ»î¶¯½üÆÚ¼¤Ôö¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Õë¶ÔµÄÊǶà¸öÐÐÒµµÄ×éÖ¯£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹ú¡¢·¨¹ú¡¢µÂ¹ú¡¢°ÍÎ÷ºÍÖйúµÄÔÆ¹©Ó¦ÉÌ¡¢Í¨Ñ¶ÌṩÉÌ¡¢ÐÞ½¨¹«Ë¾¡¢¿ÆÑÐʵÌåºÍ½ÌÓý»ú¹¹¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚÈ¥Äê 8 ÔÂÊ״ηºÆð£¬£¬£¬£¬£¬£¬²¢ÔÚ 2023 Äê 9 Ô³ÉΪһÖÖÏà¶ÔÆÕ±éµÄÍþв¡£¡£¡£¡£¡£¡£CatDDoS ÔÚ 12 Ô»ù±¾ÏûÊÅ£¬£¬£¬£¬£¬£¬´ÙʹÖйúÆæ°²ÐÅ XLab ¸ú×ÙÍþвµÄÑо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þµÄÔËÓªÕß¿ÉÄÜÒѾ×èÖ¹Á˹¥»÷¡£¡£¡£¡£¡£¡£CatDDoS ±£»£»£»¤Ï±»Ê¹ÓõÄÎó²îÓ°ÏìÁËÊýÊ®ÖÖ²úÆ·ºÍÊÖÒÕ£¬£¬£¬£¬£¬£¬°üÀ¨Apache ActiveMQ ЧÀÍÆ÷¡¢Apache Log4j¡¢Cisco Linksys¡¢JenkinsЧÀÍÆ÷ºÍ NetGear ·ÓÉÆ÷¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/cyberattacks-data-breaches/catddos-threat-groups-sharply-ramp-up-ddos-attacks
4. »¥ÁªÍøµµ°¸¹ÝºÍ Wayback Machine ÔâÊÜ DDoS ÍøÂç¹¥»÷
5ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬»¥ÁªÍøµµ°¸¹ÝÊÇÒ»¼Ò·ÇÓªÀûÐÔÑо¿Í¼Êé¹Ý£¬£¬£¬£¬£¬£¬¹Ý²ØÓÐÊý°ÙÍò·ÝÀúÊ·Îļþ¡¢ÉúÑĵÄÍøÕ¾ºÍýÌåÄÚÈÝ£¬£¬£¬£¬£¬£¬ÏÖÔÚÕý´¦ÓÚµÖÓù¼äЪÐÔ DDoS£¨ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£©ÍøÂç¹¥»÷µÄµÚÈýÌì¡£¡£¡£¡£¡£¡£¾ÝͼÊé¹ÝÊÂÇéÖ°Ô±³Æ£¬£¬£¬£¬£¬£¬²ØÆ·ÊÇÇå¾²µÄ£¬£¬£¬£¬£¬£¬Ö»¹ÜЧÀÍÈÔÈ»²»Îȹ̡£¡£¡£¡£¡£¡£»£»£»¥ÁªÍøµµ°¸¹Ý Wayback Machine£¨ÉúÑÄÁËÁè¼Ý 8660 ÒÚ¸öÍøÒ³µÄÀúÊ·¼Í¼£©µÄ»á¼ûÒ²Êܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¡£×ÔÖÜÈÕ¹¥»÷×îÏÈÒÔÀ´£¬£¬£¬£¬£¬£¬DDoS ÈëÇÖÿÃëÌᳫÊýÍò¸öÐéαÐÅÏ¢ÇëÇ󡣡£¡£¡£¡£¡£¹¥»÷ȪԴÉв»ÇåÎú¡£¡£¡£¡£¡£¡£³ýÁË×î½üÔâÊܵÄÒ»²¨ÍøÂç¹¥»÷Ö®Í⣬£¬£¬£¬£¬£¬»¥ÁªÍøµµ°¸¹Ý»¹Ôâµ½ÃÀ¹úͼÊé³öÊéÒµºÍÃÀ¹ú³ªÆ¬ÒµÐ»áµÄÆðËߣ¬£¬£¬£¬£¬£¬ËûÃÇÉù³Æ»¥ÁªÍøµµ°¸¹ÝÇÖÕ¼ÁËÆä°æÈ¨£¬£¬£¬£¬£¬£¬²¢ÒªÇóÅâ³¥ÊýÒÚÃÀÔª²¢ïÔÌËùÓÐͼÊé¹ÝµÄЧÀÍ¡£¡£¡£¡£¡£¡£
https://blog.archive.org/2024/05/28/internet-archive-and-the-wayback-machine-under-ddos-cyber-attack/
5. Î÷ÑÅͼ¹«¹²Í¼Êé¹ÝÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÔÚÏßϵͳ̱»¾
5ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬Î÷ÑÅͼ¹«¹²Í¼Êé¹ÝÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀÍÏÝÈë̱»¾¡ª¡ªÎÞÏßÍøÂç¡¢Ô±¹¤ºÍÖ÷¹ËʹÓõÄÅÌËã»úÒÔ¼°Õû¸öÔÚÏßĿ¼¶¼Ì±»¾ÁË¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÖÜÒ»ÏÂÖçµÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ÔÚÖÜÁù¡£¡£¡£¡£¡£¡£¸ÃͼÊé¹ÝÓÐ 27 ¸ö²î±ðµÄ·Ö¹Ý£¬£¬£¬£¬£¬£¬Îª½ü 80 ÍòסÃñÌṩЧÀÍ¡£¡£¡£¡£¡£¡£¸ÃͼÊé¹ÝÔ±¾ÍýÏëÔÚÕóÍö½«Ê¿¼ÍÄîÈÕÖÜĩʱ´úÈÃϵͳÏÂÏßÒÔ¶ÔЧÀÍÆ÷¾ÙÐÐά»¤£¬£¬£¬£¬£¬£¬µ«µ±ÌìÔçÉÏÈ´·¢Ã÷ÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£ÔÚÊÓ²ìÊÂÎñµÄͬʱ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒѹرÕËùÓÐϵͳ²¢ÁªÏµÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú»Ö¸´Ê±¼ä¡£¡£¡£¡£¡£¡£Í¼Êé¹ÝÈÔ½«¿ª·Å£¬£¬£¬£¬£¬£¬²¢½«ÊÖ¶¯½è³öÊé¼®ºÍ CD¡£¡£¡£¡£¡£¡£Î÷ÑÅͼ¹«¹²Í¼Êé¹ÝÓëÈ«Çò¶à¸ö¶¼»áºÍÏØÍ¼Êé¹ÝϵͳһÑù£¬£¬£¬£¬£¬£¬³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄÄ¿µÄ¡ª¡ªÕâЩÍÅ»ïʹÓöԵç×ÓÊéºÍÒªº¦Ð§À͵ÄÐèÇó×÷ΪÄó´Ê£¬£¬£¬£¬£¬£¬ÈÃÄ¿µÄÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£
https://therecord.media/ransomware-attack-seattle-knocks-out
6. ÃÀ¹úÕþ¸®¶Ô911 S5½©Ê¬ÍøÂç±³ºóµÄ·¸·¨ÍÅ»ïʵÑéÖÆ²Ã
5ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÄôóÉ᲼³¿Ë´óѧµÄÑо¿Ö°Ô±ÔÚԼĪÁ½Äêǰ£¨2022 Äê 6 Ô£©Í¸Â¶£¬£¬£¬£¬£¬£¬ÕâÖÖ²»·¨×¡Õ¬ÊðÀíЧÀÍͨ¹ýÌṩÃâ·Ñ VPN ЧÀÍÀ´ÒýÓÕDZÔÚÊܺ¦Õß×°ÖöñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ö¼ÔÚ½«ËûÃÇµÄ IP µØµãÌí¼Óµ½ 911 S5 ½©Ê¬ÍøÂçÖС£¡£¡£¡£¡£¡£Æäʱ£¬£¬£¬£¬£¬£¬½©Ê¬ÍøÂç¿ØÖÆ×ÅÀ´×ÔÌìϸ÷µØµÄԼĪ 120,000 ¸öסլÊðÀí½Úµã£¬£¬£¬£¬£¬£¬ËùÓнڵ㶼ÓëλÓÚÍâÑó»òÍйÜÔÚÔÆÐ§ÀÍÆ÷ÄڵĶà¸öÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¾ÙÐÐͨѶ¡£¡£¡£¡£¡£¡£911 S5 ÒòÇå¾²Îó²î¶ø¡°Í߽⡱£¬£¬£¬£¬£¬£¬ÆäÓªÒµÔËÓªµÄÒªº¦×é¼þ±»´Ý»Ù¡£¡£¡£¡£¡£¡£Ò»µ©ÍøÂç·¸·¨·Ö×Óͨ¹ý 911 S5 ½©Ê¬ÍøÂçÑÚÊÎÁËËûÃǵÄÊý×Ö×Ù¼££¬£¬£¬£¬£¬£¬ËûÃǵÄÍøÂç·¸·¨Ëƺõ¾Í»á×·Ëݵ½Êܺ¦ÕßµÄÅÌËã»ú¶ø²»ÊÇËûÃÇ×Ô¼ºµÄÅÌËã»ú¡£¡£¡£¡£¡£¡£OFAC Ôö²¹Ëµ£¬£¬£¬£¬£¬£¬×¡Õ¬ÊðÀí½©Ê¬ÍøÂçÈëÇÖÁËԼĪ 1900 Íò¸ö IP µØµã¡£¡£¡£¡£¡£¡£ÕâЩÊÜѬȾµÄ×°±¸ÔÊÐíÍøÂç·¸·¨·Ö×ÓÌá½»ÊýÍò·ÝÓë¹Ú×´²¡¶¾Ô®Öú¡¢¾ÈÔ®ºÍ¾¼ÃÇå¾²·¨°¸Ïà¹ØµÄÍýÏëµÄÚ²ÆÐÔÉêÇ룬£¬£¬£¬£¬£¬Ôì³ÉÊýÊ®ÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-govt-sanctions-cybercrime-gang-behind-massive-911-s5-proxy-botnet-linked-to-illegitimate-residential-proxy-service/