Akamaiй©ÆäÑÇÌ«µØÓòij¿Í»§Ôâµ½´ó¹æÄ£DDoS¹¥»÷
°ä²¼¹¦·ò 2023-03-131¡¢Akamaiй©ÆäÑÇÌ«µØÓòij¿Í»§Ôâµ½´ó¹æÄ£DDoS¹¥»÷
¾Ý3ÔÂ9ÈÕ±¨Â·£¬Akamaiй©ÆäÑÇÌ«µØÓòij¿Í»§Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷¡£¹¥»÷²úÉúÔÚ2023Äê2ÔÂ23ÈÕ10:22 UTC£¬·åÖµ¸ß´ï900.1 Gbps£¬Ã¿Ãë1.582ÒÚ¸öÊý¾Ý°ü¡£Akamai°µÊ¾Õâ´Î¹¥»÷Ó뵱ǰDDoS¹¥»÷Ç÷ÏòÒ»Ö£¬¹¥»÷Ç¿¶È´óÇÒ³ÖÐø¹¦·ò¶Ì¡£´óÎÞÊý¹¥»÷Á÷Á¿ÔÚ¹¥»÷¶¥·åÆÚ·¢×÷£¬½ö¼¸·ÖÖÓºó£¬Á÷Á¿Ä£Ê½¾Í¸´ÔÕý³£¡£Akamai´¦ÖõÄ×î´ó¹æÄ£µÄÊÇ2022Äê9ÔÂ12ÈÕÕë¶Ô¶«Å·¿Í»§µÄDDoS¹¥»÷£¬·åֵΪÿÃë7.04ÒÚ¸öÊý¾Ý°ü¡£
https://www.bleepingcomputer.com/news/security/akamai-mitigates-record-breaking-900gbps-ddos-attack-in-asia/
2¡¢ÍøÂ簲ȫ¹«Ë¾AcronisÔâµ½¹¥»÷³¬¹ý21GBÊý¾Ýй¶
ýÌå3ÔÂ10Èճƣ¬ÈðÊ¿µÄÍøÂ簲ȫ¹«Ë¾Acronis³¬¹ý21GBÊý¾Ýй¶¡£ÕâЩÊý¾ÝÓÚ2023Äê3ÔÂ9ÈÕ±»ºÚ¿ÍKernelware°ä²¼ÔÚBreachºÚ¿ÍÂÛ̳ÉÏ£¬Éæ¼°Ö¤ÊéÎļþ¡¢ºÅÁîÈÕÖ¾¡¢ÏµÍ³ÅäÖúÍÎļþϵͳ´æµµµÈ¡£×êÑÐÈËÔ±¶Ôй¶Êý¾Ý½øÐзÖÎö£¬·¢ÏÖÀ´×ÔÍøÂçÍйܹ«Ë¾Liquid WebµÄÄÚ²¿Í¼ÏñºÍÈÕÖ¾¡£Liquid Webµ÷²é³Æ£¬ÆäÔÚ3ÔÂ9ÈÕ·¢ÏÖÁËÒ»¸ö·ì϶£¬AcronisÖ§³Ö·þÎñÆ÷Ôâµ½¹¥»÷µ¼ÖÂÊý¾Ýй¶¡£¾ÝϤ£¬Õâ´Î¹¥»÷µÄºÚ¿ÍÓë½üÆÚÓ¡¶ÈHDFCÒøÐкͺ곞Êý¾Ýй¶ÊÂÎñµÄÄ»ºóºÚÊÖÊÇͳһÓ×ÎÒ¡£
https://www.hackread.com/cybersecurity-firm-acronis-data-breach/
3¡¢ÉúÀí½¡È«¹«Ë¾CerebralÔ¼310Íò»¼ÕßµÄPHIÐÅϢй¶
¾ÝýÌå3ÔÂ10Èճƣ¬ÉúÀí½¡È«¹«Ë¾Cerebral֪ͨ3179835¸ö»¼Õߣ¬ËûÃǵÄPHIÐÅÏ¢¿ÉÄÜÒÑͨ¹ýÆäƽ̨ÉϵĵÚÈý·½¸ú×Ù¼¼Êõй¶¡£CerebralÈÏ¿ÉËüÔÚÆäÒÆ¶¯ÀûÓúÍÍøÕ¾ÉÏʹÓÃpixelºÍÆäËüÀàËÆ¸ú×Ù¼¼Êõ£¬À´¹²ÏíÓ×ÎÒÓû§Êý¾Ý¡¢Êܱ£»¤µÄ½¡È«Êý¾ÝºÍ²ÆÕþÊý¾Ý¡£Æ¾¾Ý»¼ÕßÓëCerebralµÄ½Ó´¥ÒÔ¼°ËûÃǵĻ¥ÁªÍøä¯ÀÀÆ÷»òÒÆ¶¯É豸µÄÅäÖ÷½Ê½£¬ÕâЩÓ×ÎÒÐÅÏ¢¿ÉÄÜÒѱ»Åû¶¸øÉ罻ýÌåÍøÕ¾ºÍÆäËûʹÓùȸ衢Meta£¨Facebook£©¡¢TikTokºÍµÈ¸æ°×¸ú×ÙÆ÷µÄÍøÕ¾¡£
https://www.securityweek.com/cerebral-informing-3-1-million-individuals-of-inadvertent-data-exposure/
4¡¢×êÑÐÈËÔ±Åû¶¿É´ÓÆøÏ¶ÏµÍ³ÇÔÈ¡Êý¾ÝµÄCASPER¹¥»÷
3ÔÂ12ÈÕ±¨Â·³Æ£¬Ê×¶û¸ßÀö´óѧµÄ×êÑÐÈËÔ±Ìá³öÁËÒ»ÖÖÃûΪCASPERµÄÐÂÐÍÒñ±Îͨ·¹¥»÷£¬ËüÄܹ»ÒÔ20 bits/ÃëµÄ¿ìÂʽ«Êý¾Ý´ÓÆøÏ¶ÏµÍ³Ð¹Â¶µ½×ó½üµÄÖÇÄÜÊÖ»ú¡£CASPER¹¥»÷·½Ê½ÀûÓÃÖ¸±êÍÆËã»úÄÚ²¿µÄÑïÉùÆ÷×÷ΪÊý¾Ý´«Êäͨ·£¬´«ÊäÈ˶úÎÞ·¨Ìýµ½µÄ¸ßƵÒôƵ£¬²¢½«¶þ½øÔì»òĦ¶û˹µçÂë´«Ë͵½×îÔ¶1.5Ã×Ö®±íµÄÂó¿Ë·ç¡£ÆäËüÀàËÆµÄ¹¥»÷»¹ÓÐETHERLED£¬ËüÒÀ¸½Ö¸±êÍø¿¨µÄLEDµÆÀ´´«ÊäĦ¶û˹µçÂëÐźš£
https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/
5¡¢Unit 42Åû¶Ð½©Ê¬ÍøÂçGoBruteforcer¹¥»÷»î¶¯ÏêÇé
3ÔÂ10ÈÕ£¬Unit 42³ÆÆä½üÆÚ·¢ÏÖÁËÒ»¸öеĻùÓÚGolangµÄ¶ñÒâÈí¼þÑù±¾¡£×êÑÐÈËÔ±½«Æä¶¨ÃûΪGoBruteforcer£¬Ëü»áɨÃ貢ϰȾÔËÐÐphpMyAdmin¡¢MySQL¡¢FTPºÍPostgres·þÎñµÄWeb·þÎñÆ÷¡£GoBruteforcer½«±©Á¦ÆÆ½âÓµÓÐÈõÃÜÂë»òĬÈÏÃÜÂëµÄÕÊ»§ÒÔÇÖÈëÒ×±»¹¥»÷µÄ*nixϵͳ¡£½øÒ»´ëÊ©²éÏÔʾ£¬¹¥»÷ÕßÍйÜÁËx86¡¢x64ºÍARM´¦ÖÃÆ÷¼Ü¹¹µÄ¶þ½øÔìÎļþ¡£¶ñÒâÈí¼þ»¹ÔÚÖ¸±ê·þÎñÆ÷ÉÏ×°ÖÃÁËÒ»¸ö»¥ÁªÍøÖмÌ̸Ìì(IRC)»úеÈË£¬ËüÓë¹¥»÷ÕߵķþÎñÆ÷½øÐÐͨѶ¡£
https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
6¡¢eSentire°ä²¼¹ØÓÚ¶ñÒâÈí¼þBATLOADER¹¥»÷»î¶¯µÄ»ã±¨
3ÔÂ9ÈÕ£¬eSentire°ä²¼»ã±¨Åû¶ÁËBATLOADERÀûÓùȸèËÑË÷¸æ°×À´·Ö·¢Vidar StealerºÍUrsnifµÄ»î¶¯¡£2023Äê2ÔÂÖÐÑ®£¬eSentire·¢ÏÖÁËͨ¹ý´úÂë×¢ÈëÔÚÒ»¸öÔì×÷Òµ¿Í»§µÄ¶ËµãÉÏÖ´ÐÐUrsnifµÄ³¢ÊÔ¡£ËæºóµÄµ÷²é·¢ÏÖ£¬¸ÃϰȾÊÇÖ¸±êÓû§ÔڹȸèÉÏËÑË÷Adobe ReaderµÄÁ˾֡£´Ë±í£¬³ýÁËUrsnif»òVidarµÈ³ß¶Èpayload±í£¬BatLoader»¹Ö´ÐÐCobalt Strike£¬×êÑÐÈËÔ±ÒÔΪÕâÑù×öÊÇΪÁ˶Ôϵͳ½øÐÐÔ¤´¦ÖÃÒÔ±ã½øÒ»²½ÈëÇÖ¡£
https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif


¾©¹«Íø°²±¸11010802024551ºÅ