µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË

Ðû²¼Ê±¼ä 2024-11-05
1. µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË


11ÔÂ4ÈÕ£¬£¬£¬£¬µÂ¹ú¾¯·½½üÆÚ½ÓÄÉÁËÒ»ÏîÖØ´óÐж¯£¬£¬£¬£¬ÀֳɹرÕÁËDDoS×âÁÞÆ½Ì¨Dstat.cc£¬£¬£¬£¬²¢¾Ð²¶ÁËÁ½ÃûÉæÏÓÔËÓª¸Ãƽ̨²¢·¢¶¯DDoS¹¥»÷µÄÄÐ×Ó¡£¡£¡£¡£ÕâÁ½ÃûÄÐ×Ó»®·ÖÀ´×Ô´ïÄ·Ê©ËþÌØºÍÀ³ÒðÀ¼ÊУ¬£¬£¬£¬ÄêËê»®·ÖΪ19ËêºÍ28Ëê¡£¡£¡£¡£³ýÁËDDoS¹¥»÷Í⣬£¬£¬£¬ËûÃÇ»¹ÉæÏÓÔËÓªÁíÒ»¸öÃûΪ¡°Flight RCS¡±µÄÔÚÏ߯½Ì¨£¬£¬£¬£¬¸Ãƽ̨³öÊÛÉè¼ÆÒ©ÎïºÍºÏ³É´óÂéËØ¡£¡£¡£¡£Á½ÈËÒò´ËÃæÁÙÔËÓª·¸·¨ÉúÒâÆ½Ì¨¾ÙÐÐÉÌÒµºÍ°ïÅɻµÄÖ¸¿Ø£¬£¬£¬£¬²¢Òѱ»²¶³öÍ¥ÊÜÉ󡣡£¡£¡£´Ë´ÎÐж¯ÓÉ·¨À¼¿Ë¸£×ÜÉó²é³¤°ì¹«ÊÒÖÐÑë¹¥»÷ÍøÂç·¸·¨¾Ö¡¢ºÚÉ­ÖÝÐÌʾ¯Ô±¾ÖºÍÁª°îÐÌʾ¯Ô±¾ÖЭµ÷£¬£¬£¬£¬²¢»ñµÃÁË·¨¹ú¡¢Ï£À°¡¢±ùµººÍÃÀ¹úÕþ¸®µÄÖ§³Ö¡£¡£¡£¡£¾¯·½ÔÚÐж¯Öв»µ«¹Ø±ÕÁËDstat.ccºÍFlight RCSƽ̨£¬£¬£¬£¬»¹ËѲéÁ˵¹úµÄÆß´¦·¿²ú¡£¡£¡£¡£BKAÖ¸³ö£¬£¬£¬£¬Dstat.ccƽ̨ʹÆÕ±éµÄÓû§Äܹ»ÌᳫDDoS¹¥»÷£¬£¬£¬£¬°üÀ¨ÄÇЩûÓÐÉîÈëÊÖÒÕÊÖÒÕµÄÓû§¡£¡£¡£¡£´ËÀàѹÁ¦Ð§ÀÍÔÚÍþвÁìÓòÔ½À´Ô½ÊܽӴý£¬£¬£¬£¬²¢±»ÖîÈç¡°Killnet¡±Ö®ÀàµÄºÚ¿Í×éÖ¯´ó×ÚʹÓᣡ£¡£¡£´Ë´ÎÐж¯Êǹú¼ÊÐж¯PowerOffµÄÒ»²¿·Ö£¬£¬£¬£¬Ö¼ÔÚ¹¥»÷´ó×Ú¡°DDos-as-a-service¡±Æ½Ì¨¡£¡£¡£¡£´Ë´ÎÐж¯ÕÃÏÔÁ˹ú¼ÊÖ´·¨²¿·Ö¹¥»÷Êý×Ö·¸·¨µÄʵÁ¦¡£¡£¡£¡£


https://securityaffairs.com/170540/cyber-crime/german-police-shut-down-ddos-for-hire-platform-dstat-cc.html


2. ´ó¹æÄ£OpenAIÄ£Äâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬Ä¿µÄÖ±Ö¸ChatGPTÓû§Æ¾Ö¤


11ÔÂ4ÈÕ£¬£¬£¬£¬Barracuda Networks ¿ËÈÕ¼à²âµ½Ò»³¡Õë¶Ô ChatGPT Óû§Æ¾Ö¤µÄ´ó¹æÄ£ OpenAI Ä£Äâ»î¶¯¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬Éù³ÆÊÕ¼þÈË¡°¶Ô ChatGPT µÄ×îж©Ôĸ¶¿îδÀֳɡ±£¬£¬£¬£¬²¢ÓÕµ¼ËûÃǵã»÷Á´½Ó¸üи¶¿îÐÅÏ¢¡£¡£¡£¡£ÕâЩÓʼþ¿´ËÆÀ´×Ô OpenAI Payments£¬£¬£¬£¬µ«ÏÖʵÉÏÔ´×ÔÃûΪ topmarinelogistics.com µÄÓòÃû£¬£¬£¬£¬ÇÒÒÑͨ¹ý DKIM ºÍ SPF ¼ì²é£¬£¬£¬£¬ÔöÌíÁËÓÕÆ­ÐÔ¡£¡£¡£¡£¾Ý Barracuda ͳ¼Æ£¬£¬£¬£¬ÓÐÁè¼Ý 1,000 ·â´ËÀàÓʼþ´Óµ¥¸öÓòÃû·¢³ö£¬£¬£¬£¬Ä¿µÄΪȫÇòÆóÒµ¡£¡£¡£¡£ÓʼþÖ¸ÏòµÄÓòÃû fnjrolpa.com ÏÖÔÚÒÑÀëÏߣ¬£¬£¬£¬µ«ÆÊÎöÏÔʾ£¬£¬£¬£¬¸ÃÍøÕ¾ÔøÍйÜÒ»¸öÓë OpenAI ÏàËÆµÄÐéαµÇÂ¼Ò³Ãæ£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£¡£¡£Barracuda ²úÆ·ÖÎÀíÍÅ¶ÓµÄ Prebh Singh ÌåÏÖ£¬£¬£¬£¬ÕâÊǹ¥»÷Õß»ñÈ¡ÐÂÕË»§È¨Ï޵ıã½ÝÊֶΣ¬£¬£¬£¬½ø¶øÊ¹ÓÃÕâЩÕË»§ÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ÍÐ¹Ü ChatGPT ÍøÂç´¹ÂÚÒ³ÃæµÄÓòÃûÓÚ 2023 Äê 12 ÔÂ×¢²á£¬£¬£¬£¬×¢²áµØµãÀ´×ÔÄá²´¶û£¬£¬£¬£¬¶ø·¢¼þÈ˵ÄÓòÃûÔÚ·¨¹ú×¢²á£¨ÏÖÒÑÎÞ·¨»á¼û£©£¬£¬£¬£¬IP µØµãÔòÊôÓڵ¹ú£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷»î¶¯µÄÖØ´óÐԺͿç¹úÐÔ¡£¡£¡£¡£


https://www.securityweek.com/businesses-worldwide-targeted-in-large-scale-chatgpt-phishing-campaign/


3. ŵ»ùÑÇÊÓ²ìµÚÈý·½¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Ô´´úÂëÒɱ»µÁ


11ÔÂ4ÈÕ£¬£¬£¬£¬Åµ»ùÑÇÕýÔÚÊÓ²ìÒ»ÆðÉæÏÓÔ´´úÂë±»µÁµÄÊÂÎñ£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°µÚÈý·½¹©Ó¦ÉÌÊÇ·ñÔâµ½ÈëÇÖ¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬Ò»¸öÃûΪIntelBrokerµÄÍþвÐÐΪÕßÉù³ÆÒѾ­ÈëÇÖÁËÓëŵ»ùÑÇÏàÖúµÄµÚÈý·½¹©Ó¦É̵ÄЧÀÍÆ÷£¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×Úŵ»ùÑÇÔ´´úÂë¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨SSHÃÜÔ¿¡¢Ô´´úÂë¡¢RSAÃÜÔ¿¡¢BitBucketµÇ¼ÐÅÏ¢¡¢SMTPÕÊ»§¡¢webhookºÍÓ²±àÂëÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£IntelBrokerÉù³ÆÊ¹ÓÃĬÈÏÆ¾Ö¤»á¼ûÁ˵ÚÈý·½¹©Ó¦É̵ÄSonarQubeЧÀÍÆ÷£¬£¬£¬£¬ÏÂÔØÁ˰üÀ¨Åµ»ùÑÇÔÚÄڵĿͻ§µÄPythonÏîÄ¿¡£¡£¡£¡£BleepingComputerÓëŵ»ùÑÇ·ÖÏíÁ˾ݳƱ»µÁÊý¾ÝµÄÎļþÊ÷£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´¡£¡£¡£¡£IntelBrokerÔøÒòÈëÇÖ¶à¸ö×éÖ¯¶øÉùÃûÉ¢ÂÒ£¬£¬£¬£¬°üÀ¨ÈÏÕæÖÎÀíÃÀ¹úÖÚÒéÔºÒéÔ±Ò½ÁƱ£½¡ÍýÏëµÄDC Health Link£¬£¬£¬£¬ÒÔ¼°»ÝÆÕÆóÒµºÍWeee!ÔÓ»õЧÀ͵ȡ£¡£¡£¡£×î½ü£¬£¬£¬£¬¸ÃÍþвÐÐΪÕß»¹Ð¹Â¶Á˰üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ´ÓµÚÈý·½SaaS¹©Ó¦ÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/


4. ¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬½ü30ÍòÓû§Êý¾Ýй¶


11ÔÂ4ÈÕ£¬£¬£¬£¬½üÆÚÃûΪ¡°Intel Broker¡±µÄºÚ¿ÍÉù³ÆÍ¨¹ýµÚÈý·½³Ð°üÉÌÈëÇÖÁË¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔÓÖ¾£¬£¬£¬£¬²¢ÔÚBreach ForumsÉϹûÕæÁ˽ü30ÍòÌõÓû§¼Í¼¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÔ´×Ô¸ÃÍøÕ¾µÄÐÂÎÅͨѶ¶©ÔÄÕßÃûµ¥£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢»î¶¯ÈÕÆÚ¼°½ÌÓýϸ½ÚµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬Ö»¹ÜÎ´Éæ¼°ÃÜÂë¡¢Éç»á°ü¹ÜºÅ»ò²ÆÎñÊý¾ÝµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬µ«ÈÔÃæÁÙÍøÂç´¹ÂÚºÍÕë¶ÔÐÔÕ©Æ­µÄΣº¦¡£¡£¡£¡£¡¶ÂéÊ¡Àí¹¤ÊÖÒÕ̸ÂÛ¡·×÷ΪÂéÊ¡Àí¹¤Ñ§ÔºµÄÒ»·ÝÖøÃû¿¯Î£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÎÞÒɽ«Ëðº¦ÆäÉùÓþ£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÆäÒþ˽±£»£»¤µÄµ£ÐÄ¡£¡£¡£¡£Intel BrokerÒò½üÆÚ¶Ô¶à¼Ò×ÅÃû×éÖ¯Ìᳫ¹¥»÷¶øÉùÃûÉ¢ÂÒ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÉÐδ¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬£¬£¬£¬¹«ÖÚÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£


https://hackread.com/hackers-leak-mit-technology-review-user-records/


5. Ê©ÄÍµÂµçÆøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬40GBÊý¾Ý±»µÁ


11ÔÂ4ÈÕ£¬£¬£¬£¬Ê©ÄÍµÂµçÆøÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬Ò»ÃûÃûΪ¡°Grep¡±µÄÍþвÐÐΪÕßÉù³Æ´Ó¸Ã¹«Ë¾µÄJIRAЧÀÍÆ÷ÇÔÈ¡ÁË40GBµÄÊý¾Ý¡£¡£¡£¡£¾ÝÊ©ÄÍµÂµçÆøÍ¸Â¶£¬£¬£¬£¬´Ë´ÎÊÂÎñÉæ¼°Î´¾­ÊÚȨ»á¼ûÆäλÓÚ¸ôÀëÇéÐÎÖеÄÄÚ²¿ÏîĿִÐиú×ÙÆ½Ì¨Ö®Ò»£¬£¬£¬£¬µ«¹«Ë¾µÄ²úÆ·ºÍЧÀͲ¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£GrepÉù³ÆÊ¹ÓÃ̻¶µÄƾ֤ÈëÇÖÁËÊ©ÄÍµÂµçÆøµÄJiraЧÀÍÆ÷£¬£¬£¬£¬²¢×¥È¡ÁË40ÍòÐÐÓû§Êý¾Ý£¬£¬£¬£¬ÆäÖаüÀ¨75,000¸öΨһµç×ÓÓʼþµØµãºÍÈ«Ãû¡£¡£¡£¡£ÔÚ°µÍøÌû×ÓÖУ¬£¬£¬£¬Grep¿ªÍçЦµØË÷Òª¼ÛÖµ125,000ÃÀÔªµÄ¡°Baguettes¡±ÒÔ°ü¹Ü²»Ð¹Â¶Êý¾Ý£¬£¬£¬£¬²¢·ÖÏíÁ˸ü¶àÓйر»µÁÊý¾ÝµÄϸ½Ú¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Grep»¹ÌåÏÖËûÃÇ×î½ü½¨ÉèÁËÒ»¸öеĺڿÍ×éÖ¯£¬£¬£¬£¬¹ú¼ÊÌõÔ¼»ú¹¹(ICA)£¬£¬£¬£¬²¢Éù³ÆÈôÊǹ«Ë¾ÔÚ48СʱÄÚ²»ÈÏ¿ÉÊܵ½¹¥»÷£¬£¬£¬£¬ËûÃǾͻáй¶Èκα»µÁÊý¾Ý¡£¡£¡£¡£Ê©ÄÍµÂµçÆøÒѾ­È·ÈÏÁË´Ë´ÎйÃÜÊÂÎñ£¬£¬£¬£¬µ«Éв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñ»á¼ÌÐøÐ¹Â¶»ò³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/


6. ¶íº¥¶íÖݸçÂײ¼ÊÐ50ÍòסÃñÐÅÏ¢ÔâÀÕË÷ÍÅ»ïÇÔÈ¡²¢Ð¹Â¶


11ÔÂ4ÈÕ£¬£¬£¬£¬¶íº¥¶íÖݸçÂײ¼ÊУ¨Éú³ÝÁè¼Ý905,000£©ÔÚ½ñÄê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷£¬£¬£¬£¬µ¼Ö¹«¹²Ð§ÀͺÍITÅþÁ¬ÖÐÖ¹¡£¡£¡£¡£¸ÃÍÅ»ïÉù³ÆÇÔÈ¡ÁË6.5TBÊý¾Ý£¬£¬£¬£¬°üÀ¨Ô±¹¤Æ¾Ö¤¡¢¶¼»áÉãÏñ»úÔ´µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÊÐÕþ¸®¹ÙÔ±×î³õÌåÏÖϵͳδ±»¼ÓÃÜ£¬£¬£¬£¬µ«RhysidaÔÚÀÕË÷ʧ°Üºóй¶ÁË45%µÄ±»µÁÊý¾Ý¡£¡£¡£¡£¸çÂײ¼ÊÐÊг¤°²µÂ³¡¤½ðɪÉù³ÆÐ¹Â¶µÄÊý¾ÝÒѼÓÃÜ»òË𻵣¬£¬£¬£¬µ«Çå¾²Ñо¿Ô±David Leroy Ross£¨Connor Goodwolf£©Ìá³öÒìÒ飬£¬£¬£¬²¢·ÖÏíÁËδ¼ÓÃܵÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾¡£¡£¡£¡£ÊÐÕþ¸®¶ÔGoodwolfÌáÆðËßËÏ£¬£¬£¬£¬Ö¸¿ØÆäÈö²¥±»µÁÊý¾Ý£¬£¬£¬£¬²¢Ðû²¼ÁËÔÝʱÏÞÖÆÁî¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎ¥¹æÍ¨ÖªÐÅ£¬£¬£¬£¬ÊÐÕþ¸®ÔÚ10Ô³õ֪ͨÁË50ÍòÈË£¬£¬£¬£¬³Æ¹¥»÷ÕßÇÔÈ¡²¢Ðû²¼ÁËËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÉÐδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬£¬£¬ÊÐÕþ¸®ÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼à¿ØÐÅÓñ¨¸æºÍ½ðÈÚÕË»§£¬£¬£¬£¬²¢Ìṩ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/