±±Ô¼·å»áÆÚ¼ä¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢ÆðDDoS¹¥»÷

°ä²¼¹¦·ò 2025-06-26

1. ±±Ô¼·å»áÆÚ¼ä¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢ÆðDDoS¹¥»÷


6ÔÂ24ÈÕ£¬ÔÚ±±Ô¼·å»áÓÚºÉÀ¼º£ÑÀ½øÐÐÖ®¼Ê£¬¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)Ðû³Æ¶ÔΪÊÐÕþµ±¾ÖºÍÆäËûÕþÖλú¹¹ÌṩIT½â¾ö¹æ»®µÄNotuBiz¹«Ë¾·¢ÆðÁËDDoS¹¥»÷£¬µ¼ÖÂÔ̺¬³ÁÒªÎļþµÄÒ³ÃæÁÙʱÎÞ·¨½Ó¼û¡£ÔÚ·å»áÆÚ¼ä£¬±±Ô¼Ã˹ú´ï³ÉÁ˽«¹ú·À¿ªÖ§Ö¸±êÉ趨Ϊ¹úÄÚ³ö²ú×ÜÖµ£¨GDP£©5%µÄºÍ̸£¬ÕâÊÇÃÀ¹ú×ÜÍ³ÌÆÄɵ¡¤ÌØÀÊÆÕ×î³õÌá³öµÄÒªÇ󡣯äÖÐ3.5%½«Ö±½Ó²¦¸ø¹ú·À²¿£¬ÆäÓà1.5%Ôò·ÖÅä¸øÍøÂ簲ȫºÍ»ù´¡ÉèÊ©µÈÓйØÁìÓòµÄ¸ü¿í·ºÍ¶×Ê¡£È»¶ø£¬ÕâÒ»³ÁÒªµÄ¹ú¼Ê»áÒéÒ²³ÉΪÁ˺ڿͷ¢ÆðÍøÂç¹¥»÷µÄ¾ø¼Ñ»úÓö¡£NoName057(16)×éÖ¯ÓÉһȺ¾ÝÐÅÊܶíÂÞ˹ÔÞÖúµÄºÚ¿ÍÐж¯Ö÷ÒåÍøÂ簲ȫר¼Ò×é³É£¬Ôø¹¥»÷¹ý³Ö·´¶í̬¶ÈµÄ¹ú¶ÈºÍ×éÖ¯£¬Ô̺¬±ÈÀûʱ¡¢Òâ´óÀû¡¢ºÉÀ¼ºÍÎÚ¿ËÀ¼¡£Õâ´Î£¬¸Ã×éÖ¯ÔÚTelegramÉÏÐû³Æ£¬ÆäÖ¸±êÊǺÉÀ¼µÄ±±Ô¼µØÓò´ú±í´¦ÒÔ¼°Ô̺¬Ë¹º£¶ûÍк಩˹¡¢´ú¶û·òÌØºÍº£ÑÀÔÚÄڵöÊÐÕòºÍÊ¡·Ý¡£º£ÑÀÊе±¾ÖÖÜÒ»»ã±¨³Æ£¬¶à¼Ò¹©¸øḚ́ÑÎȵ½ÆäϵͳÔâ·ê´óÁ¿ÍøÂçÁ÷Á¿¡£Ò»Î»½²»°ÈË֤ʵ£¬ÓÉÓÚÍøÂç¹¥»÷£¬º£ÑÀÊеÐÔÖʹÓõĶà¸öÓòÃûÓÐʱÊܵ½ÏÞ¶È»òÎÞ·¨½Ó¼û¡£Í¬Ê±£¬IT·þÎñÌṩÉÌNotuBizÒ²ÈÏ¿ÉÆäÏµÍ³ÍøÂçÁ÷Á¿¾Þ´ó£¬µ«¹«Ë¾µÄ·À»ðǽÓÐЧµØ¸ôÀëÁËÈßÓàÁ÷Á¿£¬Ö»¹ÜÈç´Ë£¬½Ó¼ûÕß¼ÓÔØÔ̺¬¹Ù·½ÎļþµÄÒ³ÃæÈÔ±ØÒªºÜ³¤¹¦·ò¡£


https://cybernews.com/news/russian-hackers-ddos-attack-netherlands/


2. Unit 42¸æ·¢Õë¶Ô·ÇÖÞ½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâ»î¶¯


6ÔÂ25ÈÕ£¬Palo Alto NetworksÆìϵÄUnit 42×êÑÐÍŶӽüÈÕ·¢ÏÖÁËÒ»ÏîÕë¶Ô·ÇÖÞ¶à¼Ò½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâ»î¶¯£¬¸Ã»î¶¯±»×·×ÙΪCL-CRI-1014¡£¾ÝUnit 42×êÑÐÈËÔ±ÆÀ¹À£¬ÕâЩ¹¥»÷Õß×Ô2023ÄêÒÔÀ´±ãÒ»Ïò»îÔ¾ÓÚ·ÇÖÞ½ðÈÚÐÐÒµ£¬±íÑÝ×ųõʼ½Ó¼û¾­¼ÍÈË£¨IABs£©µÄ½ÇÉ«£¬¼´ÏÈ»ñȡָ±êµÄ³õʼ½Ó¼ûȨÏÞ£¬ÔÙÔÚ°µÍø´ó½«ÆäÏúÊÛ¸øÆäËû¹¥»÷Õߣ¬´Ó¶øÄ²È¡·¸·¨ÀûÒæ¡£ÎªÁËÖ´Ðй¥»÷£¬CL-CRI-1014¹¥»÷ÕßÀûÓÃÁËһϵÁпªÔ´¹¤¾ßºÍ¹«¿ª¿ÉÓõÄÈí¼þ¡£¹¥»÷ÕßÊ×ÏÈʹÓÃPsExecÔ¶³ÌÏνӵ½Áíһ̨»úе×÷Ϊ´úÀí£¬¶øºóÔÚ´úÀí»úеÉÏʹÓÃChiselÏνӵ½¶ą̀»úе¡£ÔÚ²¿ÃÅ»úеÉÏ£¬¹¥»÷ÕßͶµÝPoshC2²¢½øÐпúËŻ£¬ÍøÂçÁ÷Á¿Í¨¹ýChiselËí·´«Êä¡£ÔÚÆäËû»úеÉÏ£¬¹¥»÷ÕßÔòÔËÐÐPowerShell²¢×°ÖÃClassroom Spy£¬ÒÔʵÏÖ¸üÈ«ÃæµÄ¼à¿ØºÍ½ÚÔ졣Ŀǰ²¢Ã»ÓÐÖ¤¾ÝÅú×¢CL-CRI-1014»î¶¯ÀûÓÃÁËÖ¸±ê×éÖ¯²úÆ·»ò·þÎñÖеÄÈκηì϶¡£ÕâÒâζ׏¥»÷Õß¿ÉÄܸü¶àµØÒÀÀµÓÚÉç»á¹¤³Ìѧ¼¿Á©¡¢ÈõÃÜÂë»òÆäËû·Ç¼¼ÊõÐÔ·ì϶À´»ñÈ¡³õʼ½Ó¼ûȨÏÞ¡£


https://www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/


3. ³¯ÏÊÐÂÒ»ÂÖ¡°´«È¾ÐÔ¿ÚÊÔ¡±¹¥»÷ÀûÓöñÒânpm°üÖ´ÐÐÇÔÃÜ


6ÔÂ25ÈÕ£¬½üÈÕ£¬³¯ÏÊÌáÒéµÄÐÂÒ»ÂÖ¡°´«È¾ÐÔ¿ÚÊÔ¡±»î¶¯ÒýÆðÁ˰²È«½çµÄ¿í·º¹Ø×¢¡£Õâ´Î¹¥»÷ÖØÒª¶Ô×¼ÇóÖ°Õߣ¬³ö¸ñÊÇÈí¼þ¹¤³ÌʦºÍ¿ª·¢ÈËÔ±£¬Í¨¹ý¶ñÒânpm°üϰȾËûÃǵÄÉ豸£¬ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢²¢Ö²ÈëºóÃÅ¡£¾ÝSocket Threat Research»ã±¨£¬ÕâЩ¶ñÒânpm°üÔÚÊܺ¦ÕߵĻúеÉϼÓÔØÁËÓ볯ÏÊÐÐΪÕßÓйصÄBeaverTailÐÅÏ¢ÇÔÈ¡·¨Ê½ºÍInvisibleFerretºóÃÅ¡£Õâ´Î¹¥»÷ʹÓÃÁËͨ¹ý24¸öÕË»§Ìá½»µ½npmµÄ35¸ö¶ñÒâÈí¼þ°ü£¬ÕâЩÈí¼þ°ü×ܹ²±»ÏÂÔØÁ˳¬¹ý4000´Î£¬ÆäÖÐ6¸öÔÚ׫д»ã±¨Ê±ÒÀÈ»¿ÉÓá£ÕâЩ¶ñÒânpm°ü³ö¸ñΣÏÕ£¬ÓÉÓÚËüÃÇÖÐÓм¸¸öÊÇÓòÃûÇÀ×¢»ò·ÂÕÕ³ÛÃûÇÒÊÜÐÅÀµµÄ¿â£¬Èçreact-plaid-sdk¡¢vite-plugin-next-refreshµÈ¡£³¯Ïʼéϸ¼ÙÒâÕÐÆ¸ÈËÔ±£¬Í¨¹ýLinkedInºÍGoogle DocsÏò¿ª·¢ÈËÔ±ºÍÇóÖ°Õß·¢ËͱàÂë¡°¹¤×÷¡±£¬Êèµ¼ËûÃÇÏÂÔØÕâЩÈí¼þ°ü£¬²¢ÒªÇóÇóÖ°Õ߲μӲâÊÔÏîÄ¿¡£ÕâЩ×÷Òµ±»¼Ù×°³ÉºÏ·¨²âÊÔ£¬µ«ÏÖʵÉϻᴥ·¢Ï°È¾Á´£¬ÔÚÖ¸±êÍÆËã»úÉÏͶ·Å¶à¸öÓÐÐ§ÔØºÉ¡£


https://www.bleepingcomputer.com/news/security/new-wave-of-fake-interviews-use-35-npm-packages-to-spread-malware/


4. ¸çÂ×±ÈÑÇ´óѧÔâÍøÂç¹¥»÷£¬Ð£Ô°ÏµÍ³³öÏÖ´óÃæ»ý¹ÊÕÏ


6ÔÂ26ÈÕ£¬¸çÂ×±ÈÑÇ´óѧ¹ÙÔ¹ØýÔÚµ÷²éһ·DZÔÚµÄÍøÂ簲ȫÊÂÎñ£¬´ËǰÓÐѧÉú»ã±¨³ÆÐ£Ô°ÄÚ³öÏÖÁË´óÃæ»ýµÄ¼¼Êõ¹ÊÕÏ£¬ÉõÖÁÔÚÆÁÄ»ÉϳöÏÖÁËÆæ¹ÖµÄͼÏñ¡£×ÔÖܶþÔçÉÏÒÔÀ´£¬¸ÃУµÄÍøÕ¾ºÍÆäËûϵͳһÏò´¦ÓÚ¼äЪÐÔÀëÏß״̬£¬¸øÊ¦ÉúµÄÈÕ³£½ø½¨ºÍ¹¤×÷´øÀ´Á˼«´óµÄ²»±ã¡£¾Ý¸çÂ×±ÈÑÇ´óѧµÄһλ½²»°ÈËÏòRecorded Future Newsй©£¬×òÌìÔçÉÏ£¬¸çÂ×±ÈÑÇ´óѧµÄITϵͳ²úÉú¹ÊÕÏ£¬Ó°ÏìÁ˳¿±ßÐ£ÇøµÄϵͳÔËÐС£Ä¿Ç°£¬Ñ§ÌõÄITÍŶÓÔÚÈ«Á¦ÒÔ¸°µØÖÂÁ¦¸´Ô­·þÎñ£¬²¢ÒÑ֪ͨÁË·¨Âɲ¿ÃÅ¡£ÖµµÃÇìÐÒµÄÊÇ£¬Ä¿Ç°¸çÂ×±ÈÑÇ´óѧŷÎÄҽѧÖÐÐĵÄÁÙ´²ÔËÓªÉÐδÊܵ½Ó°Ï졣һλ²»Ô¸Ð¹Â©ÐÕÃûµÄÖªÁµÈËÊ¿°µÊ¾£¬Ä¿Ç°²¢Ã»º±¼û¾Ýй¶»òÀÕË÷Èí¼þ¹¥»÷µÄ¼£Ï󣬸çÂ×±ÈÑÇ´óѧµÄÏµÍ³ËÆºõûÓÐÊܵ½¡°Éî¶ÈÈëÇÖ¡±¡£È»¶ø£¬Ñ§ÉúÃÇÔÚÉ罻ýÌåÉÏ·ÖÏíµÄÕÕÆ¬È´ÏÔʾ£¬Ð£Ô°ÄÚµÄÊý×Ö±êÅÆ±»ÊÕÊÜ£¬²¢´úÌæÎªÁËÌÆÄɵ¡¤ÌØÀÊÆÕ×ÜͳµÄͼÏñ¡£¾ÝУ±¨¡¶¸çÂ×±ÈÑǹ۲ì¼Ò±¨¡·±¨Â·£¬Ñ§ÉúÃÇÎÞ·¨µÇ¼ÓÃÓÚ½Ó¼ûµç×ÓÓʼþÕË»§ºÍ×÷ҵƽ̨µÄÉí·ÝÑéÖ¤·þÎñ¡£Ñ§ÌÃÔÚÖܶþÂ½Ðø·¢³öÁ˶àÌõÐÂÎÅ£¬ÖÒ¸æ·þÎñÖжÏ£¬²¢¶½´Ù½ÌÊÚÃÇÁíÐÐÆÌÅſγÌ¡£


https://therecord.media/columbia-university-technology-outages


5. CitrixÖÒ¸æNetScalerÉ豸·ì϶CVE-2025-6543Ôâ¿í·ºÀûÓÃ


6ÔÂ25ÈÕ£¬Citrix¹«Ë¾·¢³ö´¹Î£ÖҸ棬ָ³öÆäNetScalerÉ豸ÖÐÒ»¸ö±»×·×ÙΪCVE-2025-6543µÄ·ì϶ÔÚ±»¿í·ºÀûÓ㬵¼ÖÂÉ豸½øÈë»Ø¾ø·þÎñ״̬£¬½ø¶øÀëÏß¡£ÕâÒ»·ì϶ÄÚ²¿¸ú×Ù±àºÅΪCTX694788£¬ÊÇÒ»¸öÑϳÁµÄ°²È«·ì϶£¬¿ÉÓÉδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÒªÇó´¥·¢£¬¶ÔNetScaler ADCºÍNetScaler GatewayÉ豸×é³ÉÑϳÁÍþв¡£¾ÝCitrix¹«Ë¾Ð¹Â©£¬¸Ã·ì϶ӰÏìNetScaler ADCºÍNetScaler GatewayµÄ¶à¸ö°æ±¾£¬½öÓ°ÏìÅäÖÃÎªÍø¹Ø£¨ÈçVPNÐé¹¹·þÎñÆ÷¡¢ICA´úÀí¡¢ÎÞ¿Í»§¶ËVPN (CVPN)¡¢RDP´úÀí£©»òAAAÐé¹¹·þÎñÆ÷µÄNetScalerÉ豸¡£Citrix¹«Ë¾ÒѾ­Õë¶Ô´Ë·ì϶°ä²¼Á˽¨¸´²¹¶¡¡£È»¶ø£¬ÔÚÖÎÀíÔ±´¦Öô˷ì϶µÄͬʱ£¬Citrix¹«Ë¾»¹·¢³öÁ˹ØÓÚÁíÒ»¸ö±»³ÆÎªCitrixBleed 2µÄÑϳÁNetScaler·ì϶µÄÖҸ档¸Ã·ì϶±àºÅΪCVE-2025-5777£¬ÔÊÐí¹¥»÷Õßͨ¹ý´ÓÉ豸ÄÚ´æÖÐÌáÈ¡»á»°ÁîÅÆÀ´½Ù³ÖÓû§»á»°£¬ÆäÑϳÁÐÔ²»ÈݺöÊÓ¡£¼øÓÚÕâÁ½¸ö·ì϶µÄÑϳÁÐÔ£¬Citrix¹«Ë¾Ç¿ÁÒ½¨ÒéÖÎÀíÔ±¾¡¿ìÀûÓÃ×îеIJ¹¶¡£¬ÒÔ½¨¸´ÕâЩ°²È«·ì϶£¬Ô¤·ÀÉ豸Êܵ½¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/


6. Mainline Health SystemsÊý¾Ýй¶ӰÏ쳬¹ý10ÍòÈË


6ÔÂ25ÈÕ£¬Mainline Health Systems£¬Ò»¼Ò×Ô1978ÄêÆð±ãÔÚ°¢¿ÏÉ«Öݲ¨ÌØÀ¼ÔËÓªµÄÁª¹úÈÏÖ¤·ÇͶ»úÐÔÒ½ÁÆÖÐÐÄ£¬½üÈÕÅû¶ÁËһ·³Á´óµÄÊý¾Ýй¶ÊÂÎñ£¬¸ÃÊÂÎñÓ°ÏìÁ˳¬¹ý10ÍòÈË¡£¾ÝÊý¾Ýй¶֪ͨº¯ËùÊö£¬¸Ã°²È«ÊÂÎñ²úÉúÔÚ2024Äê4ÔÂ10ÈÕ×óÓÒ£¬Ó°ÏìÁ˹«Ë¾ÍøÂç¡£Mainline Health SystemsÔÚ»ñϤ´ËÎÊÌâºó£¬µ±¼´·¢Õ¹ÁËÈ«Ãæµ÷²é£¬²¢²ÉÈ¡Á˶àÏî´ëÊ©ÒÔÓ¦¶ÔÕâ´ÎÊÂÎñ¡£ËûÃDz»½ö½«´ËÊÂ·î¸æÁËÁª¹ú·¨Âɲ¿ÃÅ£¬»¹ÀñƸÁË±í²¿ÍøÂ簲ȫר¼Ò£¬²¢¶ÔÊÜÓ°ÏìµÄÎļþ½øÐÐÁËÈËΪÉó²é¡£¾­¹ýÉî¿Ìµ÷²é£¬¸Ã×éÖ¯ÓÚ2025Äê5ÔÂ21ÈÕÈ·ÈÏ£¬ÓÉÓÚÕâ´ÎÊÂÎñ£¬Ä³Ð©Ô̺¬»¼ÕßÊܱ£»¤Ó×ÎÒÐÅÏ¢µÄÎļþÔâµ½ÁËδ¾­ÊÚȨµÄ½Ó¼û»ò»ñÈ¡¡£Inc Ransom×éÖ¯Ðû³Æ¶ÔÕâ´ÎÏ®»÷ÕÆ¹Ü£¬²¢½«Mainline Health SystemsÔö³¤µ½ÁËÆäTorÐ¹Â©ÍøÕ¾ÉÏ¡£¶ÔÓÚÕâ´ÎÊý¾Ýй¶ÊÂÎñ£¬Mainline Health Systems°µÊ¾½«È«Á¦¹²Í¬Áª¹ú·¨Âɲ¿Ãŵĵ÷²é£¬²¢¼ÓÇ¿×ÔÉíµÄÍøÂ簲ȫ·À»¤´ëÊ©£¬ÒÔÔ¤·ÀÀàËÆÊÂÎñÔٴβúÉú¡£


https://securityaffairs.com/179322/data-breach/mainline-health-systems-disclosed-a-data-breach.html