µÂ¹úÁª¹ú½ðÈÚ¼à¹Ü¾ÖµÄÍøÕ¾Ôâµ½DDoS¹¥»÷ÁÙʱÖжÏ
°ä²¼¹¦·ò 2023-09-061¡¢µÂ¹úÁª¹ú½ðÈÚ¼à¹Ü¾ÖµÄÍøÕ¾Ôâµ½DDoS¹¥»÷ÁÙʱÖжÏ
¾ÝýÌå9ÔÂ5ÈÕ±¨Â·£¬µÂ¹úÁª¹ú½ðÈÚ¼à¹Ü¾Ö(BaFin)µÄÍøÕ¾Ôâµ½DDoS¹¥»÷£¬·þÎñÖжÏÊýÌì¡£BaFinÊÇ´ÓÊôÓڵ¹ú²ÆÕþ²¿µÄ½ðÈÚ¼à¹Ü»ú¹¹£¬Õƹܼà¹Ü2700¼ÒÒøÐÓ×¢800¼Ò½ðÈÚºÍ700¼Ò±£ÏÕ·þÎñÌṩÉÌ¡£¹¥»÷ÆðÍ·ÓÚ9ÔÂ1ÈÕ£¬BaFin³ÆÒѲÉÈ¡³ä·ÖµÄ°²È«Ô¤·À´ëÊ©ºÍÓÐЧµÄ·ÀÓù´ëÊ©¡£BaFinµÄÍøÕ¾bafin.deÖжϣ¬µ«¸Ã»ú¹¹³ÆÆäËüϵͳ¾ùδÊܵ½Ó°Ïì¡£Éв»Ã÷ÏÔÕâ´Î¹¥»÷µÄÄ»ºóºÚÊÖ£¬µ«KillnetÔøÓÚ1Ô·ݽ«BaFinÍøÕ¾Ôö³¤µ½ÆäÔÚTelegramÉϰ䲼µÄÖ¸±êÁбíÖС£½ØÖÁĿǰ£¬ÍøÕ¾ËƺõÒÑÆëÈ«¸´Ô¡£
https://securityaffairs.com/150359/hacking/ddos-attack-on-bafin.html
2¡¢LockBit¹¥»÷Zaun¹«Ë¾²¢¹«¿ª´óÁ¿Ó¢¹ú¾üÊÂÓйØÐÅÏ¢
¾Ý9ÔÂ4ÈÕ±¨Â·£¬LockBit¹«¿ªÁË´óÁ¿ÓëÓ¢¹ú¾üʺ͵ý±¨Õ¾µãÓйصÄÐÅÏ¢¡£Î§À¸ÏµÍ³Ôì×÷ÉÌZaun³Æ£¬ÆäÓÚ8ÔÂ5ÈÕÖÁ6ÈÕÔâµ½ÁËLockBitµÄ¹¥»÷£¬²¢Ð¹Â©¹¥»÷ÊÇͨ¹ýһ̨Windows 7 PC½øÐеģ¬¿ÉÄÜÒÑй¶10 GBµÄÊý¾Ý¡£LockBitÓÚ8ÔÂ13ÈÕ¹«¿ªÁËÕâ´Î¹¥»÷£¬²¢ÒªÇóZaunÔÚ8ÔÂ29ÈÕ½»Êê½ð¡£ZaunÒÔΪϵͳÉÏûÓд洢»òй¶ÈκλúÃÜÎļþ£¬µ«Daily Mirror³Æ£¬LockBit °ä²¼µÄÊýǧҳÎļþ£¬Éæ¼°ÁËÓ¢¹ú¿ËÀ³µÂˮʦ»ùµØ£¨HMNB Clyde£©ºËDZͧ»ùµØ¡¢²¨¶ÙÌÆ»¯Ñ§±øÆ÷³¢ÊÔÊÒºÍλÓÚ¿µÎÖ¶û²¼µÂµÄGCHQͨѶÖÐÐÄ¡£
https://www.infosecurity-magazine.com/news/sensitive-data-uk-army-potentially/
3¡¢Freecycleй©ӰÏ쳬¹ý700ÍòÓû§µÄÊý¾Ýй¶ÊÂÎñ
ýÌå9ÔÂ4Èճƣ¬ÔÚÏßÂÛ̳FreecycleÅû¶ÁËÓ°Ï쳬¹ý700ÍòÓû§µÄ´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£5ÔÂ30ÈÕ£¬ºÚ¿ÍÔÚÒ»¸öÂÛ̳ÉÏÏúÊÛ±»µÁÊý¾Ý¡£FreecycleÔÚ8ÔÂ30ÈÕÒâʶµ½Õâ´Îй¶ÊÂÎñ£¬²¢ÌáÐÑÊÜÓ°ÏìµÄÓû§µ±¼´¸ü»»ÃÜÂë¡£¾ÝϤ£¬Ð¹Â¶ÐÅÏ¢Ô̺¬Óû§Ãû¡¢Óû§ID¡¢ÓʼþµØÖ·ºÍMD5¹þÏ£ÃÜÂë¡£´Ó¹¥»÷Õß°ä²¼µÄ½ØÍ¼À´¿´£¬FreecycleÊ×´´È˼æÖ´ÐжʵÄÍ´´¦±»µÁ£¬µ¼Ö¹¥»÷Õß¿ÉÄÜÆëÈ«½Ó¼û»áÔ±ÐÅÏ¢ºÍÂÛ̳Ìû×Ó¡£
https://www.bleepingcomputer.com/news/security/freecycle-confirms-massive-data-breach-impacting-7-million-users/
4¡¢»ªË¶Â·ÓÉÆ÷ÖеÄ3¸ö´úÂëÖ´Ðзì϶¿ÉÄܵ¼ÖÂÉ豸½Ù³Ö
9ÔÂ5ÈÕ±¨Â·³Æ£¬3¸öÓ°ÏìÁË»ªË¶RT-AX55¡¢RT-AX56U_V2ºÍRT-AC86U·ÓÉÆ÷µÄÔ¶³Ì´úÂëÖ´Ðзì϶£¬¿ÉÄܻᵼÖÂÉ豸½Ù³Ö¡£ÕâЩ·ì϶±ðÀëΪ²»×ã¶ÔiperfÓйØAPIÄ£¿éser_iperf3_svr.cgiÉϵÄÊäÈëÌåʽ×Ö·û´®ÕýÈ·ÑéÖ¤µÄ·ì϶£¨CVE-2023-39238£©¡¢Í¨ÓÃÉèÖú¯ÊýµÄAPIÖв»×ã¶ÔÊäÈëÌåʽ×Ö·û´®ÕýÈ·ÑéÖ¤µÄ·ì϶£¨CVE-2023-39239£©ºÍ²»×ã¶ÔiperfÓйØAPIÄ£¿éser_iperf3_cli.cgiÉϵÄÊäÈëÌåʽ×Ö·û´®ÕýÈ·ÑéÖ¤µÄ·ì϶£¨CVE-2023-39240£©¡£Ä¿Ç°£¬ÕâЩ·ì϶Òѱ»½¨¸´¡£
https://www.bleepingcomputer.com/news/security/asus-routers-vulnerable-to-critical-remote-code-execution-flaws/
5¡¢Ó¡¶È¼Ö¿²µÂ¹úAYUSH²¿32Íò¶à»¼ÕßµÄÐÅÏ¢±»°ä²¼ÔÚ°µÍø
ýÌå9ÔÂ4ÈÕ±¨Â·£¬ºÚ¿ÍTanakaÔÚ°µÍø°ä²¼ÁËÒ»¸öÃûΪbitsphere[.]inµÄÊý¾Ý¿â¡£¸ÃÊý¾Ý¿â´óÓ×Ϊ7.3MB£¬Ô̺¬³¬¹ý32ÍòÌõ»¼ÕßµÄPIIºÍÒ½ÁÆÕï¶ÏÐÅÏ¢£¬500¸öµÇ¼ʹ´¦ºÍÃ÷ÎÄÃÜÂ룬ÒÔ¼°472ÌõÒ½ÉúPIIÐÅÏ¢µÈ¼Í¼¡£µ÷²é·¢ÏÖ£¬ÕâЩÊý¾ÝÈ¡×Ôbitsphere.in¿ª·¢µÄayush.jharkhand.gov.in·þÎñÆ÷¡£Ayush.jharkhand.gov.inÊÇÓ¡¶È¼Ö¿²µÂ¹úÈ·µ±²¿ÃÅÃÅAYUSHµÄ¹Ù·½ÍøÕ¾¡£
https://www.cloudsek.com/threatintelligence/3-20-000-patient-records-from-ayush-jharkhand-gov-in-shared-on-dark-web-hacking-forums
6¡¢×êÑÐÈËÔ±Åû¶ÀûÓÃÁ½¸öMinIO·ì϶µÄ¹¥»÷»î¶¯µÄϸ½Ú
¾Ý9ÔÂ4ÈÕ±¨Â·£¬Security Joes×êÑÐÈËÔ±¼ì²âµ½¹¥»÷ÕßÔÚÀûÓýüÆÚµÄÁ½¸öMinIO·ì϶À´¹¥»÷¶ÔÏó´æ´¢ÏµÍ³¡¢½Ó¼ûÐÅÏ¢²¢Ö´ÐÐËÁÒâ´úÂë¡£±»ÀûÓõķì϶±ðÀëΪÐÅϢй¶·ì϶£¨CVE-2023-28432£©ºÍÌáȨ·ì϶£¨CVE-2023-28434£©£¬ÒÑÓÚ3ÔÂ3ÈÕÅû¶²¢½¨¸´¡£¹¥»÷ÕßÊÔͼװÖÃMinIOµÄÅú¸Ä°æ±¾Evil MinIO£¬Æä¿ÉÔÚGitHubÉÏ»ñÈ¡¡£Evil MinIO½áºÏÀûÓÃÁËÁ½¸ö·ì϶£¬ÓÃÅú¸ÄºóµÄ´úÂë´úÌæMinIOÈí¼þ£¬Ôö³¤ÁËÔ¶³Ì½Ó¼ûºóÃÅ¡£¹¥»÷Õß»¹»á½øÐÐһЩÉ繤¹¥»÷£¬ÒÔ˵·þÖ¸±ê½«MinIO½µ¼¶µ½Êܵ½·ì϶ӰÏìµÄÔçÆÚ°æ±¾¡£
https://securityaffairs.com/150308/breaking-news/minio-storage-system-exploit.html


¾©¹«Íø°²±¸11010802024551ºÅ