µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË

Ðû²¼Ê±¼ä 2024-11-05
1. µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬µÂ¹ú¾¯·½½üÆÚ½ÓÄÉÁËÒ»ÏîÖØ´óÐж¯£¬£¬£¬£¬£¬ÀֳɹرÕÁËDDoS×âÁÞÆ½Ì¨Dstat.cc£¬£¬£¬£¬£¬²¢¾Ð²¶ÁËÁ½ÃûÉæÏÓÔËÓª¸Ãƽ̨²¢·¢¶¯DDoS¹¥»÷µÄÄÐ×Ó¡£¡£¡£ÕâÁ½ÃûÄÐ×Ó»®·ÖÀ´×Ô´ïÄ·Ê©ËþÌØºÍÀ³ÒðÀ¼ÊУ¬£¬£¬£¬£¬ÄêËê»®·ÖΪ19ËêºÍ28Ëê¡£¡£¡£³ýÁËDDoS¹¥»÷Í⣬£¬£¬£¬£¬ËûÃÇ»¹ÉæÏÓÔËÓªÁíÒ»¸öÃûΪ¡°Flight RCS¡±µÄÔÚÏ߯½Ì¨£¬£¬£¬£¬£¬¸Ãƽ̨³öÊÛÉè¼ÆÒ©ÎïºÍºÏ³É´óÂéËØ¡£¡£¡£Á½ÈËÒò´ËÃæÁÙÔËÓª·¸·¨ÉúÒâÆ½Ì¨¾ÙÐÐÉÌÒµºÍ°ïÅɻµÄÖ¸¿Ø£¬£¬£¬£¬£¬²¢Òѱ»²¶³öÍ¥ÊÜÉ󡣡£¡£´Ë´ÎÐж¯ÓÉ·¨À¼¿Ë¸£×ÜÉó²é³¤°ì¹«ÊÒÖÐÑë¹¥»÷ÍøÂç·¸·¨¾Ö¡¢ºÚÉ­ÖÝÐÌʾ¯Ô±¾ÖºÍÁª°îÐÌʾ¯Ô±¾ÖЭµ÷£¬£¬£¬£¬£¬²¢»ñµÃÁË·¨¹ú¡¢Ï£À°¡¢±ùµººÍÃÀ¹úÕþ¸®µÄÖ§³Ö¡£¡£¡£¾¯·½ÔÚÐж¯Öв»µ«¹Ø±ÕÁËDstat.ccºÍFlight RCSƽ̨£¬£¬£¬£¬£¬»¹ËѲéÁ˵¹úµÄÆß´¦·¿²ú¡£¡£¡£BKAÖ¸³ö£¬£¬£¬£¬£¬Dstat.ccƽ̨ʹÆÕ±éµÄÓû§Äܹ»ÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬°üÀ¨ÄÇЩûÓÐÉîÈëÊÖÒÕÊÖÒÕµÄÓû§¡£¡£¡£´ËÀàѹÁ¦Ð§ÀÍÔÚÍþвÁìÓòÔ½À´Ô½ÊܽӴý£¬£¬£¬£¬£¬²¢±»ÖîÈç¡°Killnet¡±Ö®ÀàµÄºÚ¿Í×éÖ¯´ó×ÚʹÓᣡ£¡£´Ë´ÎÐж¯Êǹú¼ÊÐж¯PowerOffµÄÒ»²¿·Ö£¬£¬£¬£¬£¬Ö¼ÔÚ¹¥»÷´ó×Ú¡°DDos-as-a-service¡±Æ½Ì¨¡£¡£¡£´Ë´ÎÐж¯ÕÃÏÔÁ˹ú¼ÊÖ´·¨²¿·Ö¹¥»÷Êý×Ö·¸·¨µÄʵÁ¦¡£¡£¡£


https://securityaffairs.com/170540/cyber-crime/german-police-shut-down-ddos-for-hire-platform-dstat-cc.html


2. ´ó¹æÄ£OpenAIÄ£Äâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸ChatGPTÓû§Æ¾Ö¤


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬Barracuda Networks ¿ËÈÕ¼à²âµ½Ò»³¡Õë¶Ô ChatGPT Óû§Æ¾Ö¤µÄ´ó¹æÄ£ OpenAI Ä£Äâ»î¶¯¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬Éù³ÆÊÕ¼þÈË¡°¶Ô ChatGPT µÄ×îж©Ôĸ¶¿îδÀֳɡ±£¬£¬£¬£¬£¬²¢ÓÕµ¼ËûÃǵã»÷Á´½Ó¸üи¶¿îÐÅÏ¢¡£¡£¡£ÕâЩÓʼþ¿´ËÆÀ´×Ô OpenAI Payments£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÔ´×ÔÃûΪ topmarinelogistics.com µÄÓòÃû£¬£¬£¬£¬£¬ÇÒÒÑͨ¹ý DKIM ºÍ SPF ¼ì²é£¬£¬£¬£¬£¬ÔöÌíÁËÓÕÆ­ÐÔ¡£¡£¡£¾Ý Barracuda ͳ¼Æ£¬£¬£¬£¬£¬ÓÐÁè¼Ý 1,000 ·â´ËÀàÓʼþ´Óµ¥¸öÓòÃû·¢³ö£¬£¬£¬£¬£¬Ä¿µÄΪȫÇòÆóÒµ¡£¡£¡£ÓʼþÖ¸ÏòµÄÓòÃû fnjrolpa.com ÏÖÔÚÒÑÀëÏߣ¬£¬£¬£¬£¬µ«ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬¸ÃÍøÕ¾ÔøÍйÜÒ»¸öÓë OpenAI ÏàËÆµÄÐéαµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£¡£Barracuda ²úÆ·ÖÎÀíÍÅ¶ÓµÄ Prebh Singh ÌåÏÖ£¬£¬£¬£¬£¬ÕâÊǹ¥»÷Õß»ñÈ¡ÐÂÕË»§È¨Ï޵ıã½ÝÊֶΣ¬£¬£¬£¬£¬½ø¶øÊ¹ÓÃÕâЩÕË»§ÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ÍÐ¹Ü ChatGPT ÍøÂç´¹ÂÚÒ³ÃæµÄÓòÃûÓÚ 2023 Äê 12 ÔÂ×¢²á£¬£¬£¬£¬£¬×¢²áµØµãÀ´×ÔÄá²´¶û£¬£¬£¬£¬£¬¶ø·¢¼þÈ˵ÄÓòÃûÔÚ·¨¹ú×¢²á£¨ÏÖÒÑÎÞ·¨»á¼û£©£¬£¬£¬£¬£¬IP µØµãÔòÊôÓڵ¹ú£¬£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷»î¶¯µÄÖØ´óÐԺͿç¹úÐÔ¡£¡£¡£


https://www.securityweek.com/businesses-worldwide-targeted-in-large-scale-chatgpt-phishing-campaign/


3. ŵ»ùÑÇÊÓ²ìµÚÈý·½¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Ô´´úÂëÒɱ»µÁ


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬Åµ»ùÑÇÕýÔÚÊÓ²ìÒ»ÆðÉæÏÓÔ´´úÂë±»µÁµÄÊÂÎñ£¬£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°µÚÈý·½¹©Ó¦ÉÌÊÇ·ñÔâµ½ÈëÇÖ¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬Ò»¸öÃûΪIntelBrokerµÄÍþвÐÐΪÕßÉù³ÆÒѾ­ÈëÇÖÁËÓëŵ»ùÑÇÏàÖúµÄµÚÈý·½¹©Ó¦É̵ÄЧÀÍÆ÷£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×Úŵ»ùÑÇÔ´´úÂë¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨SSHÃÜÔ¿¡¢Ô´´úÂë¡¢RSAÃÜÔ¿¡¢BitBucketµÇ¼ÐÅÏ¢¡¢SMTPÕÊ»§¡¢webhookºÍÓ²±àÂëÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£IntelBrokerÉù³ÆÊ¹ÓÃĬÈÏÆ¾Ö¤»á¼ûÁ˵ÚÈý·½¹©Ó¦É̵ÄSonarQubeЧÀÍÆ÷£¬£¬£¬£¬£¬ÏÂÔØÁ˰üÀ¨Åµ»ùÑÇÔÚÄڵĿͻ§µÄPythonÏîÄ¿¡£¡£¡£BleepingComputerÓëŵ»ùÑÇ·ÖÏíÁ˾ݳƱ»µÁÊý¾ÝµÄÎļþÊ÷£¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´¡£¡£¡£IntelBrokerÔøÒòÈëÇÖ¶à¸ö×éÖ¯¶øÉùÃûÉ¢ÂÒ£¬£¬£¬£¬£¬°üÀ¨ÈÏÕæÖÎÀíÃÀ¹úÖÚÒéÔºÒéÔ±Ò½ÁƱ£½¡ÍýÏëµÄDC Health Link£¬£¬£¬£¬£¬ÒÔ¼°»ÝÆÕÆóÒµºÍWeee!ÔÓ»õЧÀ͵È¡£¡£¡£×î½ü£¬£¬£¬£¬£¬¸ÃÍþвÐÐΪÕß»¹Ð¹Â¶Á˰üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ´ÓµÚÈý·½SaaS¹©Ó¦ÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/


4. ¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬½ü30ÍòÓû§Êý¾Ýй¶


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬½üÆÚÃûΪ¡°Intel Broker¡±µÄºÚ¿ÍÉù³ÆÍ¨¹ýµÚÈý·½³Ð°üÉÌÈëÇÖÁË¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔÓÖ¾£¬£¬£¬£¬£¬²¢ÔÚBreach ForumsÉϹûÕæÁ˽ü30ÍòÌõÓû§¼Í¼¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÔ´×Ô¸ÃÍøÕ¾µÄÐÂÎÅͨѶ¶©ÔÄÕßÃûµ¥£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢»î¶¯ÈÕÆÚ¼°½ÌÓýϸ½ÚµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬Ö»¹ÜÎ´Éæ¼°ÃÜÂë¡¢Éç»á°ü¹ÜºÅ»ò²ÆÎñÊý¾ÝµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬µ«ÈÔÃæÁÙÍøÂç´¹ÂÚºÍÕë¶ÔÐÔÕ©Æ­µÄΣº¦¡£¡£¡£¡¶ÂéÊ¡Àí¹¤ÊÖÒÕ̸ÂÛ¡·×÷ΪÂéÊ¡Àí¹¤Ñ§ÔºµÄÒ»·ÝÖøÃû¿¯Î£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÎÞÒɽ«Ëðº¦ÆäÉùÓþ£¬£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÆäÒþ˽±£»£»£»¤µÄµ£ÐÄ¡£¡£¡£Intel BrokerÒò½üÆÚ¶Ô¶à¼Ò×ÅÃû×éÖ¯Ìᳫ¹¥»÷¶øÉùÃûÉ¢ÂÒ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÉÐδ¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬£¬£¬£¬£¬¹«ÖÚÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£


https://hackread.com/hackers-leak-mit-technology-review-user-records/


5. Ê©ÄÍµÂµçÆøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬40GBÊý¾Ý±»µÁ


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬Ê©ÄÍµÂµçÆøÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬Ò»ÃûÃûΪ¡°Grep¡±µÄÍþвÐÐΪÕßÉù³Æ´Ó¸Ã¹«Ë¾µÄJIRAЧÀÍÆ÷ÇÔÈ¡ÁË40GBµÄÊý¾Ý¡£¡£¡£¾ÝÊ©ÄÍµÂµçÆøÍ¸Â¶£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÉæ¼°Î´¾­ÊÚȨ»á¼ûÆäλÓÚ¸ôÀëÇéÐÎÖеÄÄÚ²¿ÏîĿִÐиú×ÙÆ½Ì¨Ö®Ò»£¬£¬£¬£¬£¬µ«¹«Ë¾µÄ²úÆ·ºÍЧÀͲ¢Î´Êܵ½Ó°Ïì¡£¡£¡£GrepÉù³ÆÊ¹ÓÃ̻¶µÄƾ֤ÈëÇÖÁËÊ©ÄÍµÂµçÆøµÄJiraЧÀÍÆ÷£¬£¬£¬£¬£¬²¢×¥È¡ÁË40ÍòÐÐÓû§Êý¾Ý£¬£¬£¬£¬£¬ÆäÖаüÀ¨75,000¸öΨһµç×ÓÓʼþµØµãºÍÈ«Ãû¡£¡£¡£ÔÚ°µÍøÌû×ÓÖУ¬£¬£¬£¬£¬Grep¿ªÍçЦµØË÷Òª¼ÛÖµ125,000ÃÀÔªµÄ¡°Baguettes¡±ÒÔ°ü¹Ü²»Ð¹Â¶Êý¾Ý£¬£¬£¬£¬£¬²¢·ÖÏíÁ˸ü¶àÓйر»µÁÊý¾ÝµÄϸ½Ú¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Grep»¹ÌåÏÖËûÃÇ×î½ü½¨ÉèÁËÒ»¸öеĺڿÍ×éÖ¯£¬£¬£¬£¬£¬¹ú¼ÊÌõÔ¼»ú¹¹(ICA)£¬£¬£¬£¬£¬²¢Éù³ÆÈôÊǹ«Ë¾ÔÚ48СʱÄÚ²»ÈÏ¿ÉÊܵ½¹¥»÷£¬£¬£¬£¬£¬ËûÃǾͻáй¶Èκα»µÁÊý¾Ý¡£¡£¡£Ê©ÄÍµÂµçÆøÒѾ­È·ÈÏÁË´Ë´ÎйÃÜÊÂÎñ£¬£¬£¬£¬£¬µ«Éв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñ»á¼ÌÐøÐ¹Â¶»ò³öÊÛ±»µÁÊý¾Ý¡£¡£¡£


https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/


6. ¶íº¥¶íÖݸçÂײ¼ÊÐ50ÍòסÃñÐÅÏ¢ÔâÀÕË÷ÍÅ»ïÇÔÈ¡²¢Ð¹Â¶


11ÔÂ4ÈÕ£¬£¬£¬£¬£¬¶íº¥¶íÖݸçÂײ¼ÊУ¨Éú³ÝÁè¼Ý905,000£©ÔÚ½ñÄê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷£¬£¬£¬£¬£¬µ¼Ö¹«¹²Ð§ÀͺÍITÅþÁ¬ÖÐÖ¹¡£¡£¡£¸ÃÍÅ»ïÉù³ÆÇÔÈ¡ÁË6.5TBÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨Ô±¹¤Æ¾Ö¤¡¢¶¼»áÉãÏñ»úÔ´µÈÃô¸ÐÐÅÏ¢¡£¡£¡£Ö»¹ÜÊÐÕþ¸®¹ÙÔ±×î³õÌåÏÖϵͳδ±»¼ÓÃÜ£¬£¬£¬£¬£¬µ«RhysidaÔÚÀÕË÷ʧ°Üºóй¶ÁË45%µÄ±»µÁÊý¾Ý¡£¡£¡£¸çÂײ¼ÊÐÊг¤°²µÂ³¡¤½ðɪÉù³ÆÐ¹Â¶µÄÊý¾ÝÒѼÓÃÜ»òË𻵣¬£¬£¬£¬£¬µ«Çå¾²Ñо¿Ô±David Leroy Ross£¨Connor Goodwolf£©Ìá³öÒìÒ飬£¬£¬£¬£¬²¢·ÖÏíÁËδ¼ÓÃܵÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾¡£¡£¡£ÊÐÕþ¸®¶ÔGoodwolfÌáÆðËßËÏ£¬£¬£¬£¬£¬Ö¸¿ØÆäÈö²¥±»µÁÊý¾Ý£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÔÝʱÏÞÖÆÁî¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎ¥¹æÍ¨ÖªÐÅ£¬£¬£¬£¬£¬ÊÐÕþ¸®ÔÚ10Ô³õ֪ͨÁË50ÍòÈË£¬£¬£¬£¬£¬³Æ¹¥»÷ÕßÇÔÈ¡²¢Ðû²¼ÁËËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢¡£¡£¡£Ö»¹ÜÉÐδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬£¬£¬£¬ÊÐÕþ¸®ÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼à¿ØÐÅÓñ¨¸æºÍ½ðÈÚÕË»§£¬£¬£¬£¬£¬²¢Ìṩ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/