µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬ £¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË

Ðû²¼Ê±¼ä 2024-11-05
1. µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬ £¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË


11ÔÂ4ÈÕ£¬£¬£¬ £¬µÂ¹ú¾¯·½½üÆÚ½ÓÄÉÁËÒ»ÏîÖØ´óÐж¯£¬£¬£¬ £¬ÀֳɹرÕÁËDDoS×âÁÞÆ½Ì¨Dstat.cc£¬£¬£¬ £¬²¢¾Ð²¶ÁËÁ½ÃûÉæÏÓÔËÓª¸Ãƽ̨²¢·¢¶¯DDoS¹¥»÷µÄÄÐ×Ó¡£¡£¡£ÕâÁ½ÃûÄÐ×Ó»®·ÖÀ´×Ô´ïÄ·Ê©ËþÌØºÍÀ³ÒðÀ¼ÊУ¬£¬£¬ £¬ÄêËê»®·ÖΪ19ËêºÍ28Ëê¡£¡£¡£³ýÁËDDoS¹¥»÷Í⣬£¬£¬ £¬ËûÃÇ»¹ÉæÏÓÔËÓªÁíÒ»¸öÃûΪ¡°Flight RCS¡±µÄÔÚÏ߯½Ì¨£¬£¬£¬ £¬¸Ãƽ̨³öÊÛÉè¼ÆÒ©ÎïºÍºÏ³É´óÂéËØ¡£¡£¡£Á½ÈËÒò´ËÃæÁÙÔËÓª·¸·¨ÉúÒâÆ½Ì¨¾ÙÐÐÉÌÒµºÍ°ïÅɻµÄÖ¸¿Ø£¬£¬£¬ £¬²¢Òѱ»²¶³öÍ¥ÊÜÉ󡣡£¡£´Ë´ÎÐж¯ÓÉ·¨À¼¿Ë¸£×ÜÉó²é³¤°ì¹«ÊÒÖÐÑë¹¥»÷ÍøÂç·¸·¨¾Ö¡¢ºÚÉ­ÖÝÐÌʾ¯Ô±¾ÖºÍÁª°îÐÌʾ¯Ô±¾ÖЭµ÷£¬£¬£¬ £¬²¢»ñµÃÁË·¨¹ú¡¢Ï£À°¡¢±ùµººÍÃÀ¹úÕþ¸®µÄÖ§³Ö¡£¡£¡£¾¯·½ÔÚÐж¯Öв»µ«¹Ø±ÕÁËDstat.ccºÍFlight RCSƽ̨£¬£¬£¬ £¬»¹ËѲéÁ˵¹úµÄÆß´¦·¿²ú¡£¡£¡£BKAÖ¸³ö£¬£¬£¬ £¬Dstat.ccƽ̨ʹÆÕ±éµÄÓû§Äܹ»ÌᳫDDoS¹¥»÷£¬£¬£¬ £¬°üÀ¨ÄÇЩûÓÐÉîÈëÊÖÒÕÊÖÒÕµÄÓû§¡£¡£¡£´ËÀàѹÁ¦Ð§ÀÍÔÚÍþвÁìÓòÔ½À´Ô½ÊܽӴý£¬£¬£¬ £¬²¢±»ÖîÈç¡°Killnet¡±Ö®ÀàµÄºÚ¿Í×éÖ¯´ó×ÚʹÓᣡ£¡£´Ë´ÎÐж¯Êǹú¼ÊÐж¯PowerOffµÄÒ»²¿·Ö£¬£¬£¬ £¬Ö¼ÔÚ¹¥»÷´ó×Ú¡°DDos-as-a-service¡±Æ½Ì¨¡£¡£¡£´Ë´ÎÐж¯ÕÃÏÔÁ˹ú¼ÊÖ´·¨²¿·Ö¹¥»÷Êý×Ö·¸·¨µÄʵÁ¦¡£¡£¡£


https://securityaffairs.com/170540/cyber-crime/german-police-shut-down-ddos-for-hire-platform-dstat-cc.html


2. ´ó¹æÄ£OpenAIÄ£Äâ´¹ÂÚ¹¥»÷£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸ChatGPTÓû§Æ¾Ö¤


11ÔÂ4ÈÕ£¬£¬£¬ £¬Barracuda Networks ¿ËÈÕ¼à²âµ½Ò»³¡Õë¶Ô ChatGPT Óû§Æ¾Ö¤µÄ´ó¹æÄ£ OpenAI Ä£Äâ»î¶¯¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬ £¬Éù³ÆÊÕ¼þÈË¡°¶Ô ChatGPT µÄ×îж©Ôĸ¶¿îδÀֳɡ±£¬£¬£¬ £¬²¢ÓÕµ¼ËûÃǵã»÷Á´½Ó¸üи¶¿îÐÅÏ¢¡£¡£¡£ÕâЩÓʼþ¿´ËÆÀ´×Ô OpenAI Payments£¬£¬£¬ £¬µ«ÏÖʵÉÏÔ´×ÔÃûΪ topmarinelogistics.com µÄÓòÃû£¬£¬£¬ £¬ÇÒÒÑͨ¹ý DKIM ºÍ SPF ¼ì²é£¬£¬£¬ £¬ÔöÌíÁËÓÕÆ­ÐÔ¡£¡£¡£¾Ý Barracuda ͳ¼Æ£¬£¬£¬ £¬ÓÐÁè¼Ý 1,000 ·â´ËÀàÓʼþ´Óµ¥¸öÓòÃû·¢³ö£¬£¬£¬ £¬Ä¿µÄΪȫÇòÆóÒµ¡£¡£¡£ÓʼþÖ¸ÏòµÄÓòÃû fnjrolpa.com ÏÖÔÚÒÑÀëÏߣ¬£¬£¬ £¬µ«ÆÊÎöÏÔʾ£¬£¬£¬ £¬¸ÃÍøÕ¾ÔøÍйÜÒ»¸öÓë OpenAI ÏàËÆµÄÐéαµÇÂ¼Ò³Ãæ£¬£¬£¬ £¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£¡£Barracuda ²úÆ·ÖÎÀíÍÅ¶ÓµÄ Prebh Singh ÌåÏÖ£¬£¬£¬ £¬ÕâÊǹ¥»÷Õß»ñÈ¡ÐÂÕË»§È¨Ï޵ıã½ÝÊֶΣ¬£¬£¬ £¬½ø¶øÊ¹ÓÃÕâЩÕË»§ÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬ÍÐ¹Ü ChatGPT ÍøÂç´¹ÂÚÒ³ÃæµÄÓòÃûÓÚ 2023 Äê 12 ÔÂ×¢²á£¬£¬£¬ £¬×¢²áµØµãÀ´×ÔÄá²´¶û£¬£¬£¬ £¬¶ø·¢¼þÈ˵ÄÓòÃûÔÚ·¨¹ú×¢²á£¨ÏÖÒÑÎÞ·¨»á¼û£©£¬£¬£¬ £¬IP µØµãÔòÊôÓڵ¹ú£¬£¬£¬ £¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷»î¶¯µÄÖØ´óÐԺͿç¹úÐÔ¡£¡£¡£


https://www.securityweek.com/businesses-worldwide-targeted-in-large-scale-chatgpt-phishing-campaign/


3. ŵ»ùÑÇÊÓ²ìµÚÈý·½¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬Ô´´úÂëÒɱ»µÁ


11ÔÂ4ÈÕ£¬£¬£¬ £¬Åµ»ùÑÇÕýÔÚÊÓ²ìÒ»ÆðÉæÏÓÔ´´úÂë±»µÁµÄÊÂÎñ£¬£¬£¬ £¬¸ÃÊÂÎñÉæ¼°µÚÈý·½¹©Ó¦ÉÌÊÇ·ñÔâµ½ÈëÇÖ¡£¡£¡£´Ëǰ£¬£¬£¬ £¬Ò»¸öÃûΪIntelBrokerµÄÍþвÐÐΪÕßÉù³ÆÒѾ­ÈëÇÖÁËÓëŵ»ùÑÇÏàÖúµÄµÚÈý·½¹©Ó¦É̵ÄЧÀÍÆ÷£¬£¬£¬ £¬²¢ÇÔÈ¡ÁË´ó×Úŵ»ùÑÇÔ´´úÂë¡£¡£¡£¾Ý³Æ£¬£¬£¬ £¬±»µÁÊý¾Ý°üÀ¨SSHÃÜÔ¿¡¢Ô´´úÂë¡¢RSAÃÜÔ¿¡¢BitBucketµÇ¼ÐÅÏ¢¡¢SMTPÕÊ»§¡¢webhookºÍÓ²±àÂëÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£IntelBrokerÉù³ÆÊ¹ÓÃĬÈÏÆ¾Ö¤»á¼ûÁ˵ÚÈý·½¹©Ó¦É̵ÄSonarQubeЧÀÍÆ÷£¬£¬£¬ £¬ÏÂÔØÁ˰üÀ¨Åµ»ùÑÇÔÚÄڵĿͻ§µÄPythonÏîÄ¿¡£¡£¡£BleepingComputerÓëŵ»ùÑÇ·ÖÏíÁ˾ݳƱ»µÁÊý¾ÝµÄÎļþÊ÷£¬£¬£¬ £¬µ«ÉÐδÊÕµ½»Ø¸´¡£¡£¡£IntelBrokerÔøÒòÈëÇÖ¶à¸ö×éÖ¯¶øÉùÃûÉ¢ÂÒ£¬£¬£¬ £¬°üÀ¨ÈÏÕæÖÎÀíÃÀ¹úÖÚÒéÔºÒéÔ±Ò½ÁƱ£½¡ÍýÏëµÄDC Health Link£¬£¬£¬ £¬ÒÔ¼°»ÝÆÕÆóÒµºÍWeee!ÔÓ»õЧÀ͵È¡£¡£¡£×î½ü£¬£¬£¬ £¬¸ÃÍþвÐÐΪÕß»¹Ð¹Â¶Á˰üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý£¬£¬£¬ £¬ÕâЩÊý¾ÝÊÇ´ÓµÚÈý·½SaaS¹©Ó¦ÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/


4. ¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬½ü30ÍòÓû§Êý¾Ýй¶


11ÔÂ4ÈÕ£¬£¬£¬ £¬½üÆÚÃûΪ¡°Intel Broker¡±µÄºÚ¿ÍÉù³ÆÍ¨¹ýµÚÈý·½³Ð°üÉÌÈëÇÖÁË¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔÓÖ¾£¬£¬£¬ £¬²¢ÔÚBreach ForumsÉϹûÕæÁ˽ü30ÍòÌõÓû§¼Í¼¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÔ´×Ô¸ÃÍøÕ¾µÄÐÂÎÅͨѶ¶©ÔÄÕßÃûµ¥£¬£¬£¬ £¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢»î¶¯ÈÕÆÚ¼°½ÌÓýϸ½ÚµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ £¬Ö»¹ÜÎ´Éæ¼°ÃÜÂë¡¢Éç»á°ü¹ÜºÅ»ò²ÆÎñÊý¾ÝµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬ £¬µ«ÈÔÃæÁÙÍøÂç´¹ÂÚºÍÕë¶ÔÐÔÕ©Æ­µÄΣº¦¡£¡£¡£¡¶ÂéÊ¡Àí¹¤ÊÖÒÕ̸ÂÛ¡·×÷ΪÂéÊ¡Àí¹¤Ñ§ÔºµÄÒ»·ÝÖøÃû¿¯Î£¬£¬ £¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÎÞÒɽ«Ëðº¦ÆäÉùÓþ£¬£¬£¬ £¬²¢Òý·¢Óû§¶ÔÆäÒþ˽±£»£»£»£»£»£»¤µÄµ£ÐÄ¡£¡£¡£Intel BrokerÒò½üÆÚ¶Ô¶à¼Ò×ÅÃû×éÖ¯Ìᳫ¹¥»÷¶øÉùÃûÉ¢ÂÒ¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÉÐδ¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬£¬£¬ £¬¹«ÖÚÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£


https://hackread.com/hackers-leak-mit-technology-review-user-records/


5. Ê©ÄÍµÂµçÆøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬40GBÊý¾Ý±»µÁ


11ÔÂ4ÈÕ£¬£¬£¬ £¬Ê©ÄÍµÂµçÆøÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬ £¬Ò»ÃûÃûΪ¡°Grep¡±µÄÍþвÐÐΪÕßÉù³Æ´Ó¸Ã¹«Ë¾µÄJIRAЧÀÍÆ÷ÇÔÈ¡ÁË40GBµÄÊý¾Ý¡£¡£¡£¾ÝÊ©ÄÍµÂµçÆøÍ¸Â¶£¬£¬£¬ £¬´Ë´ÎÊÂÎñÉæ¼°Î´¾­ÊÚȨ»á¼ûÆäλÓÚ¸ôÀëÇéÐÎÖеÄÄÚ²¿ÏîĿִÐиú×ÙÆ½Ì¨Ö®Ò»£¬£¬£¬ £¬µ«¹«Ë¾µÄ²úÆ·ºÍЧÀͲ¢Î´Êܵ½Ó°Ïì¡£¡£¡£GrepÉù³ÆÊ¹ÓÃ̻¶µÄƾ֤ÈëÇÖÁËÊ©ÄÍµÂµçÆøµÄJiraЧÀÍÆ÷£¬£¬£¬ £¬²¢×¥È¡ÁË40ÍòÐÐÓû§Êý¾Ý£¬£¬£¬ £¬ÆäÖаüÀ¨75,000¸öΨһµç×ÓÓʼþµØµãºÍÈ«Ãû¡£¡£¡£ÔÚ°µÍøÌû×ÓÖУ¬£¬£¬ £¬Grep¿ªÍçЦµØË÷Òª¼ÛÖµ125,000ÃÀÔªµÄ¡°Baguettes¡±ÒÔ°ü¹Ü²»Ð¹Â¶Êý¾Ý£¬£¬£¬ £¬²¢·ÖÏíÁ˸ü¶àÓйر»µÁÊý¾ÝµÄϸ½Ú¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Grep»¹ÌåÏÖËûÃÇ×î½ü½¨ÉèÁËÒ»¸öеĺڿÍ×éÖ¯£¬£¬£¬ £¬¹ú¼ÊÌõÔ¼»ú¹¹(ICA)£¬£¬£¬ £¬²¢Éù³ÆÈôÊǹ«Ë¾ÔÚ48СʱÄÚ²»ÈÏ¿ÉÊܵ½¹¥»÷£¬£¬£¬ £¬ËûÃǾͻáй¶Èκα»µÁÊý¾Ý¡£¡£¡£Ê©ÄÍµÂµçÆøÒѾ­È·ÈÏÁË´Ë´ÎйÃÜÊÂÎñ£¬£¬£¬ £¬µ«Éв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñ»á¼ÌÐøÐ¹Â¶»ò³öÊÛ±»µÁÊý¾Ý¡£¡£¡£


https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/


6. ¶íº¥¶íÖݸçÂײ¼ÊÐ50ÍòסÃñÐÅÏ¢ÔâÀÕË÷ÍÅ»ïÇÔÈ¡²¢Ð¹Â¶


11ÔÂ4ÈÕ£¬£¬£¬ £¬¶íº¥¶íÖݸçÂײ¼ÊУ¨Éú³ÝÁè¼Ý905,000£©ÔÚ½ñÄê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷£¬£¬£¬ £¬µ¼Ö¹«¹²Ð§ÀͺÍITÅþÁ¬ÖÐÖ¹¡£¡£¡£¸ÃÍÅ»ïÉù³ÆÇÔÈ¡ÁË6.5TBÊý¾Ý£¬£¬£¬ £¬°üÀ¨Ô±¹¤Æ¾Ö¤¡¢¶¼»áÉãÏñ»úÔ´µÈÃô¸ÐÐÅÏ¢¡£¡£¡£Ö»¹ÜÊÐÕþ¸®¹ÙÔ±×î³õÌåÏÖϵͳδ±»¼ÓÃÜ£¬£¬£¬ £¬µ«RhysidaÔÚÀÕË÷ʧ°Üºóй¶ÁË45%µÄ±»µÁÊý¾Ý¡£¡£¡£¸çÂײ¼ÊÐÊг¤°²µÂ³¡¤½ðɪÉù³ÆÐ¹Â¶µÄÊý¾ÝÒѼÓÃÜ»òË𻵣¬£¬£¬ £¬µ«Çå¾²Ñо¿Ô±David Leroy Ross£¨Connor Goodwolf£©Ìá³öÒìÒ飬£¬£¬ £¬²¢·ÖÏíÁËδ¼ÓÃܵÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾¡£¡£¡£ÊÐÕþ¸®¶ÔGoodwolfÌáÆðËßËÏ£¬£¬£¬ £¬Ö¸¿ØÆäÈö²¥±»µÁÊý¾Ý£¬£¬£¬ £¬²¢Ðû²¼ÁËÔÝʱÏÞÖÆÁî¡£¡£¡£È»¶ø£¬£¬£¬ £¬Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎ¥¹æÍ¨ÖªÐÅ£¬£¬£¬ £¬ÊÐÕþ¸®ÔÚ10Ô³õ֪ͨÁË50ÍòÈË£¬£¬£¬ £¬³Æ¹¥»÷ÕßÇÔÈ¡²¢Ðû²¼ÁËËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢¡£¡£¡£Ö»¹ÜÉÐδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬£¬ £¬ÊÐÕþ¸®ÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼à¿ØÐÅÓñ¨¸æºÍ½ðÈÚÕË»§£¬£¬£¬ £¬²¢Ìṩ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/