ÎÚ¿ËÀ¼¹úÓк˵繫˾Energoatom³ÆÔâµ½´ó¹æÄ£µÄ¹¥»÷
°ä²¼¹¦·ò 2022-08-19
¾ÝýÌå8ÔÂ17ÈÕ±¨Â·£¬ÎÚ¿ËÀ¼¹úÓк˵çÔËÓªÉÌEnergoatomÔâµ½ÁË´ó¹æÄ£ÍøÂç¹¥»÷¡£¸Ã¹«Ë¾°µÊ¾£¬ÓÉ8200¶àÃû³ÉÔ±×é³ÉµÄ¶íÂÞ˹ºÚ¿ÍÍÅ»ïPeople¡¯s Cyber ArmyʹÓÃÁË725Íò¸öbotÕÊ»§Ïò EnergoatomµÄÍøÕ¾·¢ËÍÀ¬»øÁ÷Á¿£¬Ê¹ÆäÎÞ·¨½Ó¼û¡£¹¥»÷³ÖÐøÁËÈý¸öÓ×ʱ£¬µ«¶Ô¹«Ë¾µÄÔËӪûÓÐÌ«´óµÄÓ°Ïì¡£EnergoatomÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾£¬ÆäÔÚÉè·¨¾¡¿ìµØ³ÁнÚÔì¸ÃÍøÕ¾²¢Ï޶ȹ¥»÷¡£
https://therecord.media/ukraines-state-owned-nuclear-power-operator-said-russian-hackers-attacked-website/
2¡¢Google³ÆÆäÒÑ×èֹÿÃë4600ÍòRPSµÄDDoS¹¥»÷
¾Ý8ÔÂ18ÈÕ±¨Â·£¬Google Cloud ArmorµÄ¿Í»§Ôâµ½ÁË»ùÓÚHTTPSºÍ̸µÄDDoS¹¥»÷£¬¸ß´ïÿÃë4600Íò´ÎÒªÇó(RPS)¡£¹¥»÷´Ó6ÔÂ1ÈÕÉÏÎç09:45ÆðÍ·£¬ÔÚ69·ÖÖÓÖ®ºóʵÏÖ£¬×î³õÒÔ10000 RPSµÄ¿ìÂʹ¥»÷Ö¸±êµÄHTTP/S¸ºÔØÆ½ºâÆ÷¡£ÔÚ8·ÖÖÓÄÚ£¬¹¥»÷¼Ó¾çµ½100000 RPS£¬Á½·ÖÖÓºó´ïµ½Ã¿Ãë4600Íò´ÎÒªÇóµÄ·åÖµ¡£×êÑÐÈËÔ±°µÊ¾£¬¹¥»÷Á÷Á¿À´×Ô132¸ö¹ú¶ÈµÄ5256¸öIPµØÖ·£¬²¢ÀûÓÃÁ˼ÓÃÜÒªÇó(HTTPS)£¬ÕâÅú×¢·¢ËÍÒªÇóµÄÉ豸ӵÓÐÏ൱׳´óµÄÍÆËã×ÊÔ´¡£¸Ã¹¥»÷µÄÁíÒ»¸öÌØµãÊÇʹÓÃTor³ö¿Ú½ÚµãÀ´´«µÝÁ÷Á¿¡£
https://securityaffairs.co/wordpress/134542/hacking/google-blocked-largest-ever-https-ddos.html
3¡¢Google PlayÖеÄ35¸ö¶ñÒâÀûÓÃÏÂÔØÁ¿Òѳ¬¹ý200Íò
ýÌå8ÔÂ18Èճƣ¬BitdefenderÔÚGoogle PlayÉ̵êÖÐз¢ÏÖÁË35¸ö¶ñÒâ¸æ°×ÀûÓ÷¨Ê½£¬Òѱ»×°ÖÃÁ˳¬¹ý200Íò´Î¡£ÒÀÕճ߶ÈÕ½Êõ£¬ÕâЩ¶ñÒâÀûÓûáͨ¹ý¼Ù×°Ìá¹©Ò»Ð©ÌØÊâµÄÖ°ÄÜÀ´ÓÕʹÓû§½øÐÐ×°Ö㬵«ÔÚ×°ÖúóËü»áµ±¼´¸ü¸ÄÆäÃû³ÆºÍͼ±ê£¬Ê¹ÆäÄÑÒÔ±»·¢ÏÖºÍÐ¶ÔØ¡£¶ñÒâÀûÓû¹ÓдóÁ¿µÄ´úÂë»ìºÏºÍ¼ÓÃÜÖ°ÄÜ£¬ÒÔÕмÜÄæÏò¹¤³Ì£¬²¢½«ÖØÒªµÄJava payload°µ²ØÔÚÁ½¸ö¼ÓÃܵÄDEXÎļþÖС£
https://www.hackread.com/35-malicious-apps-google-play-store-millions-installs/
4¡¢×êÑÐÍŶÓÅû¶¹ØÓÚRedAlphaµÄ´ó¹æÄ£Í´´¦ÇÔÈ¡»î¶¯
8ÔÂ16ÈÕ£¬Recorded Future°ä²¼Á˹ØÓÚRedAlphaµÄ´ó¹æÄ£Í´´¦ÇÔÈ¡»î¶¯µÄ·ÖÎö»ã±¨¡£RedAlphaÓÚ2018Äê1Ô³õ´Î±»¼Í¼£¬ÖØÒª½øÐмäµý»î¶¯ºÍ¼à¶½Ðж¯£¬Í¨¹ýNjRATºóÃÅÀ´ÍøÂçµý±¨¡£»ã±¨Ö¸³ö£¬ÔÚ´Óǰ3ÄêÖÐRedAlphaÒ»ÏòÔÚÕë¶ÔÖÇ¿âºÍµ±¾Ö»ú¹¹µÈ×éÖ¯£¬Éæ¼°¶à´ï350¸ö±øÆ÷»¯µÄÓòÃû¡£´Ë±í£¬¹¥»÷Õß»¹Ê¹ÓÃÓòÃûºýÅªÖØÒªµÄµç×ÓÓʼþºÍ´æ´¢·þÎñÌṩÉÌ£¬ÈçÑÅ»¢(135¸ötyposquatÓòÃû)£¬¹È¸è(91¸ötyposquatÓòÃû)ºÍ΢Èí(70¸ötyposquatÓòÃû)¡£
https://www.recordedfuture.com/redalpha-credential-theft-campaign-targeting-humanitarian-thinktank
5¡¢BlackByte 2.0»Ø¹é²¢Ê¹ÓÃеÄÀÕË÷Õ½ÊõºÍÊý¾Ý¹«¿ªÍøÕ¾
¾ÝýÌå8ÔÂ17Èճƣ¬ÔÚ¾¹ý¶ÌÔݵÄÐÝÕûºóBlackByteÀÕË÷Èí¼þ¾íÍÁ³ÁÀ´¡£¹¥»÷Õß½«Ðµü´ú³ÆÎªBlackByte 2.0£¬¹ÌÈ»Éв»Ã÷ÏÔÀÕË÷Èí¼þµÄ¼ÓÃÜÆ÷ÊÇ·ñ²úÉúÁ˱䶯£¬µ«¸ÃÍÅ»ïÒѾÆô¶¯ÁËÒ»¸öȫеÄTorÊý¾Ý¹«¿ªÍøÕ¾¡£´Ë±í£¬¸ÃÍÅ»ï´Ë¿ÌʹÓÃÁËеÄÀÕË÷Õ½Êõ£¬ÔÊÐíÖ¸±ê¸¶·Ñ½«ÆäÊý¾ÝµÄ°ä²¼¹¦·òµ¢¸éµ½24Ó×ʱ£¨5000ÃÀÔª£©¡¢ÏÂÔØÊý¾Ý£¨200000ÃÀÔª£©»òÏú»ÙËùº±¼û¾Ý£¨300000ÃÀÔª£©£¬ÀÕË÷Èí¼þLockBitÔÚ3.0°æ±¾ÖÐҲʹÓÃÁËÒ»ÑùµÄÕ½Êõ¡£
https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-gang-is-back-with-new-extortion-tactics/
6¡¢ÐµÄdropper BugDrop¿ÉÈÆ¹ýAndroid 13µÄ°²È«Ö°ÄÜ
8ÔÂ17ÈÕ±¨Â·³Æ£¬Android¶ñÒâÈí¼þ¿ª·¢ÈËÔ±ÒѾÔÚµ÷ÕûÕ½Êõ£¬À´Èƹý¹È¸èа䲼µÄAndroid 13ÖеÄÊÜÏÞÉèÖð²È«Ö°ÄÜ¡£Android 13ÓÚ±¾Öܰ䲼£¬ÐµIJÙ×÷ϵͳÔÚGoogle PixelÉ豸ÉÏÍÆ³ö£¬Ô´´úÂë°ä²¼ÔÚAOSPÉÏ¡£Threat Fabric·¢ÏÖÁËÒ»¸öÔÚ¿ª·¢ÖеÄÐÂdropper BugDrop£¬ÓëºÚ¿ÍÍÅ»ïHadokenÓйØÁª¡£ËüµÄ´úÂëÀàËÆÓÚBrox£¬µ±BugDrop³ï±¸ºÃ½øÐдó¹æÄ£²¿Êðʱ£¬ËüÓÐÍû±»ÓÃÓÚXenomorph·Ö·¢»î¶¯¡£
https://www.bleepingcomputer.com/news/security/malware-devs-already-bypassed-android-13s-new-security-feature/


¾©¹«Íø°²±¸11010802024551ºÅ