µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬ £¬£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË

Ðû²¼Ê±¼ä 2024-11-05
1. µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬ £¬£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË


11ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬µÂ¹ú¾¯·½½üÆÚ½ÓÄÉÁËÒ»ÏîÖØ´óÐж¯£¬£¬ £¬£¬£¬£¬£¬ÀֳɹرÕÁËDDoS×âÁÞÆ½Ì¨Dstat.cc£¬£¬ £¬£¬£¬£¬£¬²¢¾Ð²¶ÁËÁ½ÃûÉæÏÓÔËÓª¸Ãƽ̨²¢·¢¶¯DDoS¹¥»÷µÄÄÐ×Ó¡£¡£¡£¡£¡£¡£ÕâÁ½ÃûÄÐ×Ó»®·ÖÀ´×Ô´ïÄ·Ê©ËþÌØºÍÀ³ÒðÀ¼ÊУ¬£¬ £¬£¬£¬£¬£¬ÄêËê»®·ÖΪ19ËêºÍ28Ëê¡£¡£¡£¡£¡£¡£³ýÁËDDoS¹¥»÷Í⣬£¬ £¬£¬£¬£¬£¬ËûÃÇ»¹ÉæÏÓÔËÓªÁíÒ»¸öÃûΪ¡°Flight RCS¡±µÄÔÚÏ߯½Ì¨£¬£¬ £¬£¬£¬£¬£¬¸Ãƽ̨³öÊÛÉè¼ÆÒ©ÎïºÍºÏ³É´óÂéËØ¡£¡£¡£¡£¡£¡£Á½ÈËÒò´ËÃæÁÙÔËÓª·¸·¨ÉúÒâÆ½Ì¨¾ÙÐÐÉÌÒµºÍ°ïÅɻµÄÖ¸¿Ø£¬£¬ £¬£¬£¬£¬£¬²¢Òѱ»²¶³öÍ¥ÊÜÉ󡣡£¡£¡£¡£¡£´Ë´ÎÐж¯ÓÉ·¨À¼¿Ë¸£×ÜÉó²é³¤°ì¹«ÊÒÖÐÑë¹¥»÷ÍøÂç·¸·¨¾Ö¡¢ºÚÉ­ÖÝÐÌʾ¯Ô±¾ÖºÍÁª°îÐÌʾ¯Ô±¾ÖЭµ÷£¬£¬ £¬£¬£¬£¬£¬²¢»ñµÃÁË·¨¹ú¡¢Ï£À°¡¢±ùµººÍÃÀ¹úÕþ¸®µÄÖ§³Ö¡£¡£¡£¡£¡£¡£¾¯·½ÔÚÐж¯Öв»µ«¹Ø±ÕÁËDstat.ccºÍFlight RCSƽ̨£¬£¬ £¬£¬£¬£¬£¬»¹ËѲéÁ˵¹úµÄÆß´¦·¿²ú¡£¡£¡£¡£¡£¡£BKAÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬Dstat.ccƽ̨ʹÆÕ±éµÄÓû§Äܹ»ÌᳫDDoS¹¥»÷£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÄÇЩûÓÐÉîÈëÊÖÒÕÊÖÒÕµÄÓû§¡£¡£¡£¡£¡£¡£´ËÀàѹÁ¦Ð§ÀÍÔÚÍþвÁìÓòÔ½À´Ô½ÊܽӴý£¬£¬ £¬£¬£¬£¬£¬²¢±»ÖîÈç¡°Killnet¡±Ö®ÀàµÄºÚ¿Í×éÖ¯´ó×ÚʹÓᣡ£¡£¡£¡£¡£´Ë´ÎÐж¯Êǹú¼ÊÐж¯PowerOffµÄÒ»²¿·Ö£¬£¬ £¬£¬£¬£¬£¬Ö¼ÔÚ¹¥»÷´ó×Ú¡°DDos-as-a-service¡±Æ½Ì¨¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÕÃÏÔÁ˹ú¼ÊÖ´·¨²¿·Ö¹¥»÷Êý×Ö·¸·¨µÄʵÁ¦¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/170540/cyber-crime/german-police-shut-down-ddos-for-hire-platform-dstat-cc.html


2. ´ó¹æÄ£OpenAIÄ£Äâ´¹ÂÚ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸ChatGPTÓû§Æ¾Ö¤


11ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬Barracuda Networks ¿ËÈÕ¼à²âµ½Ò»³¡Õë¶Ô ChatGPT Óû§Æ¾Ö¤µÄ´ó¹æÄ£ OpenAI Ä£Äâ»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬ £¬£¬£¬£¬£¬Éù³ÆÊÕ¼þÈË¡°¶Ô ChatGPT µÄ×îж©Ôĸ¶¿îδÀֳɡ±£¬£¬ £¬£¬£¬£¬£¬²¢ÓÕµ¼ËûÃǵã»÷Á´½Ó¸üи¶¿îÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩÓʼþ¿´ËÆÀ´×Ô OpenAI Payments£¬£¬ £¬£¬£¬£¬£¬µ«ÏÖʵÉÏÔ´×ÔÃûΪ topmarinelogistics.com µÄÓòÃû£¬£¬ £¬£¬£¬£¬£¬ÇÒÒÑͨ¹ý DKIM ºÍ SPF ¼ì²é£¬£¬ £¬£¬£¬£¬£¬ÔöÌíÁËÓÕÆ­ÐÔ¡£¡£¡£¡£¡£¡£¾Ý Barracuda ͳ¼Æ£¬£¬ £¬£¬£¬£¬£¬ÓÐÁè¼Ý 1,000 ·â´ËÀàÓʼþ´Óµ¥¸öÓòÃû·¢³ö£¬£¬ £¬£¬£¬£¬£¬Ä¿µÄΪȫÇòÆóÒµ¡£¡£¡£¡£¡£¡£ÓʼþÖ¸ÏòµÄÓòÃû fnjrolpa.com ÏÖÔÚÒÑÀëÏߣ¬£¬ £¬£¬£¬£¬£¬µ«ÆÊÎöÏÔʾ£¬£¬ £¬£¬£¬£¬£¬¸ÃÍøÕ¾ÔøÍйÜÒ»¸öÓë OpenAI ÏàËÆµÄÐéαµÇÂ¼Ò³Ãæ£¬£¬ £¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£¡£¡£¡£¡£Barracuda ²úÆ·ÖÎÀíÍÅ¶ÓµÄ Prebh Singh ÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬ÕâÊǹ¥»÷Õß»ñÈ¡ÐÂÕË»§È¨Ï޵ıã½ÝÊֶΣ¬£¬ £¬£¬£¬£¬£¬½ø¶øÊ¹ÓÃÕâЩÕË»§ÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬£¬£¬£¬£¬ÍÐ¹Ü ChatGPT ÍøÂç´¹ÂÚÒ³ÃæµÄÓòÃûÓÚ 2023 Äê 12 ÔÂ×¢²á£¬£¬ £¬£¬£¬£¬£¬×¢²áµØµãÀ´×ÔÄá²´¶û£¬£¬ £¬£¬£¬£¬£¬¶ø·¢¼þÈ˵ÄÓòÃûÔÚ·¨¹ú×¢²á£¨ÏÖÒÑÎÞ·¨»á¼û£©£¬£¬ £¬£¬£¬£¬£¬IP µØµãÔòÊôÓڵ¹ú£¬£¬ £¬£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷»î¶¯µÄÖØ´óÐԺͿç¹úÐÔ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/businesses-worldwide-targeted-in-large-scale-chatgpt-phishing-campaign/


3. ŵ»ùÑÇÊÓ²ìµÚÈý·½¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬Ô´´úÂëÒɱ»µÁ


11ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬Åµ»ùÑÇÕýÔÚÊÓ²ìÒ»ÆðÉæÏÓÔ´´úÂë±»µÁµÄÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°µÚÈý·½¹©Ó¦ÉÌÊÇ·ñÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬£¬£¬Ò»¸öÃûΪIntelBrokerµÄÍþвÐÐΪÕßÉù³ÆÒѾ­ÈëÇÖÁËÓëŵ»ùÑÇÏàÖúµÄµÚÈý·½¹©Ó¦É̵ÄЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×Úŵ»ùÑÇÔ´´úÂë¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬ £¬£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨SSHÃÜÔ¿¡¢Ô´´úÂë¡¢RSAÃÜÔ¿¡¢BitBucketµÇ¼ÐÅÏ¢¡¢SMTPÕÊ»§¡¢webhookºÍÓ²±àÂëÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£IntelBrokerÉù³ÆÊ¹ÓÃĬÈÏÆ¾Ö¤»á¼ûÁ˵ÚÈý·½¹©Ó¦É̵ÄSonarQubeЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬ÏÂÔØÁ˰üÀ¨Åµ»ùÑÇÔÚÄڵĿͻ§µÄPythonÏîÄ¿¡£¡£¡£¡£¡£¡£BleepingComputerÓëŵ»ùÑÇ·ÖÏíÁ˾ݳƱ»µÁÊý¾ÝµÄÎļþÊ÷£¬£¬ £¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´¡£¡£¡£¡£¡£¡£IntelBrokerÔøÒòÈëÇÖ¶à¸ö×éÖ¯¶øÉùÃûÉ¢ÂÒ£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÈÏÕæÖÎÀíÃÀ¹úÖÚÒéÔºÒéÔ±Ò½ÁƱ£½¡ÍýÏëµÄDC Health Link£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°»ÝÆÕÆóÒµºÍWeee!ÔÓ»õЧÀ͵ȡ£¡£¡£¡£¡£¡£×î½ü£¬£¬ £¬£¬£¬£¬£¬¸ÃÍþвÐÐΪÕß»¹Ð¹Â¶Á˰üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ´ÓµÚÈý·½SaaS¹©Ó¦ÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/


4. ¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬½ü30ÍòÓû§Êý¾Ýй¶


11ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬½üÆÚÃûΪ¡°Intel Broker¡±µÄºÚ¿ÍÉù³ÆÍ¨¹ýµÚÈý·½³Ð°üÉÌÈëÇÖÁË¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔÓÖ¾£¬£¬ £¬£¬£¬£¬£¬²¢ÔÚBreach ForumsÉϹûÕæÁ˽ü30ÍòÌõÓû§¼Í¼¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÔ´×Ô¸ÃÍøÕ¾µÄÐÂÎÅͨѶ¶©ÔÄÕßÃûµ¥£¬£¬ £¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢»î¶¯ÈÕÆÚ¼°½ÌÓýϸ½ÚµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬Ö»¹ÜÎ´Éæ¼°ÃÜÂë¡¢Éç»á°ü¹ÜºÅ»ò²ÆÎñÊý¾ÝµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬ £¬£¬£¬£¬£¬µ«ÈÔÃæÁÙÍøÂç´¹ÂÚºÍÕë¶ÔÐÔÕ©Æ­µÄΣº¦¡£¡£¡£¡£¡£¡£¡¶ÂéÊ¡Àí¹¤ÊÖÒÕ̸ÂÛ¡·×÷ΪÂéÊ¡Àí¹¤Ñ§ÔºµÄÒ»·ÝÖøÃû¿¯Î£¬ £¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÎÞÒɽ«Ëðº¦ÆäÉùÓþ£¬£¬ £¬£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÆäÒþ˽±£»£»£»¤µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£Intel BrokerÒò½üÆÚ¶Ô¶à¼Ò×ÅÃû×éÖ¯Ìᳫ¹¥»÷¶øÉùÃûÉ¢ÂÒ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÉÐδ¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬£¬ £¬£¬£¬£¬£¬¹«ÖÚÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£


https://hackread.com/hackers-leak-mit-technology-review-user-records/


5. Ê©ÄÍµÂµçÆøÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬40GBÊý¾Ý±»µÁ


11ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬Ê©ÄÍµÂµçÆøÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬Ò»ÃûÃûΪ¡°Grep¡±µÄÍþвÐÐΪÕßÉù³Æ´Ó¸Ã¹«Ë¾µÄJIRAЧÀÍÆ÷ÇÔÈ¡ÁË40GBµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¾ÝÊ©ÄÍµÂµçÆøÍ¸Â¶£¬£¬ £¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÉæ¼°Î´¾­ÊÚȨ»á¼ûÆäλÓÚ¸ôÀëÇéÐÎÖеÄÄÚ²¿ÏîĿִÐиú×ÙÆ½Ì¨Ö®Ò»£¬£¬ £¬£¬£¬£¬£¬µ«¹«Ë¾µÄ²úÆ·ºÍЧÀͲ¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£GrepÉù³ÆÊ¹ÓÃ̻¶µÄƾ֤ÈëÇÖÁËÊ©ÄÍµÂµçÆøµÄJiraЧÀÍÆ÷£¬£¬ £¬£¬£¬£¬£¬²¢×¥È¡ÁË40ÍòÐÐÓû§Êý¾Ý£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨75,000¸öΨһµç×ÓÓʼþµØµãºÍÈ«Ãû¡£¡£¡£¡£¡£¡£ÔÚ°µÍøÌû×ÓÖУ¬£¬ £¬£¬£¬£¬£¬Grep¿ªÍçЦµØË÷Òª¼ÛÖµ125,000ÃÀÔªµÄ¡°Baguettes¡±ÒÔ°ü¹Ü²»Ð¹Â¶Êý¾Ý£¬£¬ £¬£¬£¬£¬£¬²¢·ÖÏíÁ˸ü¶àÓйر»µÁÊý¾ÝµÄϸ½Ú¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬Grep»¹ÌåÏÖËûÃÇ×î½ü½¨ÉèÁËÒ»¸öеĺڿÍ×éÖ¯£¬£¬ £¬£¬£¬£¬£¬¹ú¼ÊÌõÔ¼»ú¹¹(ICA)£¬£¬ £¬£¬£¬£¬£¬²¢Éù³ÆÈôÊǹ«Ë¾ÔÚ48СʱÄÚ²»ÈÏ¿ÉÊܵ½¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ËûÃǾͻáй¶Èκα»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£Ê©ÄÍµÂµçÆøÒѾ­È·ÈÏÁË´Ë´ÎйÃÜÊÂÎñ£¬£¬ £¬£¬£¬£¬£¬µ«Éв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñ»á¼ÌÐøÐ¹Â¶»ò³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/


6. ¶íº¥¶íÖݸçÂײ¼ÊÐ50ÍòסÃñÐÅÏ¢ÔâÀÕË÷ÍÅ»ïÇÔÈ¡²¢Ð¹Â¶


11ÔÂ4ÈÕ£¬£¬ £¬£¬£¬£¬£¬¶íº¥¶íÖݸçÂײ¼ÊУ¨Éú³ÝÁè¼Ý905,000£©ÔÚ½ñÄê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷£¬£¬ £¬£¬£¬£¬£¬µ¼Ö¹«¹²Ð§ÀͺÍITÅþÁ¬ÖÐÖ¹¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÉù³ÆÇÔÈ¡ÁË6.5TBÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Ô±¹¤Æ¾Ö¤¡¢¶¼»áÉãÏñ»úÔ´µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÊÐÕþ¸®¹ÙÔ±×î³õÌåÏÖϵͳδ±»¼ÓÃÜ£¬£¬ £¬£¬£¬£¬£¬µ«RhysidaÔÚÀÕË÷ʧ°Üºóй¶ÁË45%µÄ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¸çÂײ¼ÊÐÊг¤°²µÂ³¡¤½ðɪÉù³ÆÐ¹Â¶µÄÊý¾ÝÒѼÓÃÜ»òË𻵣¬£¬ £¬£¬£¬£¬£¬µ«Çå¾²Ñо¿Ô±David Leroy Ross£¨Connor Goodwolf£©Ìá³öÒìÒ飬£¬ £¬£¬£¬£¬£¬²¢·ÖÏíÁËδ¼ÓÃܵÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾¡£¡£¡£¡£¡£¡£ÊÐÕþ¸®¶ÔGoodwolfÌáÆðËßËÏ£¬£¬ £¬£¬£¬£¬£¬Ö¸¿ØÆäÈö²¥±»µÁÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬²¢Ðû²¼ÁËÔÝʱÏÞÖÆÁî¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬£¬Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎ¥¹æÍ¨ÖªÐÅ£¬£¬ £¬£¬£¬£¬£¬ÊÐÕþ¸®ÔÚ10Ô³õ֪ͨÁË50ÍòÈË£¬£¬ £¬£¬£¬£¬£¬³Æ¹¥»÷ÕßÇÔÈ¡²¢Ðû²¼ÁËËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÉÐδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬ £¬£¬£¬£¬£¬ÊÐÕþ¸®ÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼à¿ØÐÅÓñ¨¸æºÍ½ðÈÚÕË»§£¬£¬ £¬£¬£¬£¬£¬²¢Ìṩ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/