÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾
°ä²¼¹¦·ò 2025-11-181. ÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾
11ÔÂ15ÈÕ£¬ÃÀ¹ú¿Æ¼¼ÕÐÆ¸¾ÞÍ·Cornerstone Staffing Solutions½üÈÕÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡Á˳¬¹ý12Íò·ÝÇóÖ°Õß¼òÀú¼°³¬100Íò·Ý¹«Ë¾Îļþ¡£÷è÷ëÍÅ»ïÔÚ°µÍøÐ¹Â¶²©¿Í¹«¿ª300GBÃô¸ÐÊý¾Ý£¬Ô̺¬ÒÔ¡°ÐÕÃû+Resume.pdf¡±Ìåʽ´æ´¢µÄ12Íò·Ý¼òÀú£¬²¢Ðû³ÆÕâЩÎļþÊôÓÚÔ¼100Íò·ÝÔ̺¬2400ÍòÌõÓ×ÎÒÐÅÏ¢µÄÎĵµµÄÒ»²¿ÃÅ¡£Ð¹Â¶Êý¾Ýº¸ÇÉç»á±£ÏÕºÅÂë¡¢µØÖ·¡¢ÓÊÏä¡¢µç»°¡¢Ð½×ÊÐÅÏ¢¼°±£ÃܺÍ̸µÈ£¬Éæ¼°ÇóÖ°Õß¼°Ô±¹¤Éí·ÝÐÅÏ¢¡£Cornerstone³ÉÁ¢ÓÚ2003Ä꣬×ܲ¿Î»ÓھɽðɽÍåÇø£¬ÔÚÃÀ¹ú¶àÖÝÉèÓд¦Ê´¦£¬×¨Ò»¼¼Êõ¡¢¹¤³Ì¡¢ÎïÁ÷¡¢Ôì×÷µÈÁìÓòÕÐÆ¸£¬Ã¿ÄêÐÖú³¬1ÍòÃûÇóÖ°Õß¾ÍÒµ¡£½ØÖÁĿǰ£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Ã½ÌåÎÊѯ¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯³ÉÁ¢ÓÚ2021Ä꣬2022Äê½øÈ빫¼ÒÊÓÒ°£¬2025Äê³ÉΪȫÇò×î»îÔ¾ÀÕË÷Èí¼þ×éÖ¯£¬°ëÄêÄÚ·¢Æð³¬500Æð¹¥»÷¡£
https://cybernews.com/security/cornerstone-staffing-ransomware-attack-qilin-group-exposes-resumes/
2. AIPACÊý¾Ýй¶£ºµÚÈý·½ÈëÇÖÖÂ810ÈËÐÅϢй¶
11ÔÂ17ÈÕ£¬ÃÀ¹úÒÔÉ«Áй«¹²ÊÂÎñίԱ»á£¨AIPAC£©Åû¶£¬ÒòµÚÈý·½¹«Ë¾ÏµÍ³Ôâ±í²¿ÈëÇÖ£¬Æä´æ´¢µÄ810ÈËÓ×ÎÒÐÅÏ¢ÓÚ2024Äê10ÔÂ20ÈÕÖÁ2025Äê2ÔÂ6ÈÕÆÚ¼ä±»·¸·¨½Ó¼û¡£Õâ´ÎÊÂÎñÉæ¼°Ò»ÃûÃåÒòÖݾÓÃñ£¬Ð¹Â¶Êý¾Ý¿ÉÄÜÔ̺¬ÐÕÃû¡¢Éç»á±£ÏÕºÅÂë¡¢»¤ÕÕºÅÂë¡¢¼Òͥסַ¡¢ÁªÏµ·½Ê½¡¢Ö§¸¶¿¨ÐÅÏ¢¼°ÒøÐÐÕË»§µÈÃô¸ÐÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£AIPACÓÚ11ÔÂ13ÈÕͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÕߣ¬²¢Ç¿µ÷δ·¢ÏÖÊý¾ÝÀÄÓü£Ïó£¬Ä¿Ç°ÎÞ×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£ÎªÓ¦¶Ô·çÏÕ£¬AIPACΪÊÜÓ°ÏìÕßÌṩΪÆÚ12¸öÔµÄIDXÉí·Ý±£»¤·þÎñ£¬º¸ÇÐÅÓþ¼à¿Ø¡¢ÍøÂçɨÃè¡¢±£ÏÕÅâ³¥¼°Éí·Ý¸´ÔÖ§³Ö¡£ÊÂÎñºó£¬¸Ã×éÖ¯ÒÑÖ´ÐжàÏȫÉý¼¶´ëÊ©£¬Ô̺¬×ËÊÆ½ÚÔì¡¢·ÇÈËÀàÉí·ÝÑéÖ¤¡¢µç×ÓÓʼþÊý¾Ý·Àй©¡¢Microsoft 365½Ó¼ûȨÏ޹ܿء¢ÌØÈ¨¾¯±¨¡¢µØÀíµØÎ»ÏÞ¶È¡¢Éó¼ÆÖ°ÄÜÒÔ¼°¼ÓÇ¿¼à¿ØÁ¦¶È¡£
https://hackread.com/aipac-data-breach-hundreds-affected/
3. ¶íÂÞ˹¸Û¿ÚÔËÓªÉÌPort AllianceÔâÍøÂç¹¥»÷
11ÔÂ15ÈÕ£¬½üÈÕ£¬¶íÂÞ˹¸Û¿ÚÔËÓªÉÌ¡°¸Û¿ÚͬÃË¡±£¨Port Alliance£©Ôâ·ê¾³±íÍøÂç¹¥»÷£¬ÔËÓªÖжϽøÈëµÚÈýÌ죬³ÉΪ¶íÎÚì¶Ü²¼¾°Ï¹ؼüÉèÊ©ÍøÂ簲ȫÊÂÎñµÄ×îа¸Àý¡£¾Ý¸Ã¹«Ë¾ÖÜËÄÉêÃ÷£¬¹¥»÷ÕßÌáÒéÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷²¢ÊÔͼÈëÇÔìäÍøÂ磬ָ±êֱָͨ¹ý²¨Â޵ĺ£¡¢ÑÇ¿ì-ºÚº£¡¢Ô¶¶«¼°±±¼«µØÓòº£¸Û·¢Õ¹µÄú̿ºÍ¿óÎï·ÊÁϳö¿ÚÒµÎñ£¬ÒâͼÇÖÈÅÔËÓªÖÈÐò¡£Ö»¹Ü¹¥»÷¹æÄ£´ó¡¢Ç¿¶È¸ß£¬¸Û¿ÚͬÃËÇ¿µ÷ÆìÏÂ6¸öº£ÔË´¬²º¼°¹Ø¼üϵͳÈÔÕý³£ÔËÐУ¬ÃºÌ¿ºÍ¿óÎï·ÊÁÏÄê»õÔËÁ¿³¬5000Íò¶ÖµÄÒµÎñδÊÜÓ°Ïì¡£Õâ´Î¹¥»÷ÌØµãÏÔÖø£ººÚ¿Í¶¯ÓÃÁËÔ̺¬1.5Íò¸öÈ«ÇòΨһIPµØÖ·µÄ½©Ê¬ÍøÂ磬²¿ÃÅIPÔ´×Ô¶íÂÞ˹¾³ÄÚ£¬ÇÒ²»Ðݱ任¹¥»÷Õ½ÊõÒÔ¶ã±Ü°²È«·ÀÓù¡£¹«Ë¾Î´Ö¸Ã÷¹¥»÷ÆðÔ´£¬µ«½áºÏ²¼¾°¿ÉÖª£¬×Ô2022Äê¶íÎÚì¶ÜÉý¼¶ÒÔÀ´£¬Õë¶Ô½»Í¨ÎïÁ÷ÍøÂçµÄÍøÂç¹¥»÷³ÊƵ·¢Ì¬ÊÆ£¬¶íÎÚË«·½ºÚ¿ÍƵÈÔʹÓÃDDoS¹¥»÷×ÌÈŶԷ½»ù´¡ÉèÊ©¡£
https://therecord.media/cyberattack-on-russian-port-operator
4. ÈýÐÇÒòµÚÈý·½·ì϶£¬Ãô¸ÐÊý¾Ý±»ºÚ¿Í¹ÒÅÆÏúÊÛ
11ÔÂ14ÈÕ£¬½üÈÕ£¬ÍøÂç·¸×ïÂÛ̳¾ªÏÖºÚ¿Í·¢Ìû³ÆÒѳɹ¦ÈëÇÖÈýÐÇ£¬²¢¹«¿ªÏúÊ۾ݳÆÀ´×Ըù«Ë¾µÄÄÚ²¿Êý¾Ý¡£¾²é£¬Õâ´ÎÊÂÎñÔ´ÓںڿͶÔÒ»¼ÒΪ¶à¼Ò´óÐÍÆóÒµÌṩ·þÎñµÄµÚÈý·½³Ð°üÉ̵ÄÈëÇÖ£¬Í¨¹ý¸Ã³Ð°üÉ̵ĽӼûȨÏÞ£¬¹¥»÷ÕßÉøÈëÖÁÈýÐDz¿ÃÅ»ù´¡ÉèÊ©£¬Ô̺¬MSSQLÊý¾Ý¿â¼°AWS S3´æ´¢Í°£¬ÇÔÈ¡ÁËÔ̺¬Ô´´úÂ롢˽Կ¡¢SMTPƾ֤¡¢ÅäÖÃÎļþ¡¢Ó²±àÂëÆ¾Ö¤¡¢Óû§Ó×ÎÒÉí·ÝÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£Cybernews×êÑÐÍŶÓÑéÖ¤Á˺ڿͰ䲼µÄÊý¾ÝÑù±¾£¬È·ÈÏÆäÖÐÔ̺¬ÈýÐÇÂóµÏÑ·£¨ÈýÐǵç×ÓÆìÏÂÒ½ÁÆÉ豸×Ó¹«Ë¾£©µÄÄÚ²¿JavaÏîÄ¿½á¹¹ÎļþÊ÷£¬°µÊ¾Ô´´úÂë¼°Ó²±àÂëÆ¾Ö¤¿ÉÄÜй¶¡£´Ë±í£¬±»ÇÔÊý¾Ý¿â½ØÍ¼ÏÔʾԱ¹¤ÁªÏµÐÅÏ¢£¨Èçµç×ÓÓʼþ¡¢Óû§Ãû£©£¬±íÃûÌáÐÑ¿ÉÄÜ´æÔÚÖÎÀíԱƾ֤£¬Õ⽫Ôö³¤Ô±¹¤Ôâ·ê´¹µö¹¥»÷»òƾ֤Ìî³ä¹¥»÷µÄ·çÏÕ¡£ºÚ¿ÍÒÔ¡°Ò»´ÎÐÔÂò¶Ï¡±Îªµö¶ü£¬ÒªÇóʹÓÃÃÅÂÞ±ÒÖ§¸¶£¬µ«ÊÛ¼ÛÉÐδ°ä²¼¡£
https://cybernews.com/security/samsung-data-third-party-breach/
5. Aisuru½©Ê¬ÍøÂçÏÆÆð³¬´ó¹æÄ£DDoS¹¥»÷·ç±©
11ÔÂ17ÈÕ£¬Î¢ÈíÅû¶£¬Aisuru½©Ê¬ÍøÂç½üÆÚ¶ÔAzureÍøÂçÌáÒé·åÖµ´ï15.72TbpsµÄDDoS¹¥»÷£¬Ñ¡È¡UDPºéË®¹¥»÷ģʽ£¬Ö¸±êÖ±Ö¸°Ä´óÀûÑÇij¹«¹²IP£¬Êý¾Ý°ü¿ìÂʸߴï36.4ÒÚbps¡£¸ÃÍøÂçÓÉTurbo Mirai¼¶ÎïÁªÍø½©Ê¬ÍøÂçÇý¶¯£¬ÖØÒªÀûÓñ»ÈëÇֵļÒͥ·ÓÉÆ÷¡¢ÉãÏñÓŵÈÉ豸£¬³Ö¾ÃÕë¶ÔÃÀ¹ú¼°ÆäËû¹ú¶ÈסլISPÌáÒ鯯¼Í¼¹¥»÷¡£Azure°²È«×¨¼ÒÖ¸³ö£¬¹¥»÷Á÷Á¿ÌصãÏÔÖø£¬ÎÞÔ´µØÖ·ºýŪÇÒʹÓÃËæ»úÔ´¶Ë¿Ú£¬±ãÓÚ×·×ÙÓë·þÎñÌṩÉÌÀ¹½Ø¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬Cloudflare±¾Ô´ӹ«¿ª¡°ÈȵãÓòÃû¡±ÅÅÃûÖÐÒÆ³ý¶à¸öÓëAisuru½©Ê¬ÍøÂçÓйصÄÓòÃû£¬ÕâЩÓòÃûÔøÒòAisuruÏòDNS·þÎñ1.1.1.1·¢ËͶñÒâ²éÎÊÁ÷Á¿£¬µ¼Ö½ӼûÁ¿Òì³£ìÉý£¬ÉõÖÁ³¬¹ýÑÇÂíÑ·¡¢Î¢Èí¡¢¹È¸èµÈºÏ·¨ÍøÕ¾¡£Cloudflare CEO֤ʵ£¬´Ë¾ÙÖ¼ÔÚÊØ»¤ÅÅÃûϵͳ¿ÉÐŶȣ¬½«À´½«³ÖÐø¶ÔÒÉËÆ¶ñÒâÓòÃû½øÐбà×ë»ò°µ²Ø¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/
6. ÆÕÁÖ˹¶Ù´óѧÊý¾Ýй¶£¬Ó°Ïì¾èÔùÕߺÍУÓÑ
11ÔÂ17ÈÕ£¬ÆÕÁÖ˹¶Ù´óѧ11ÔÂ10ÈÕÔâ·êÍøÂç´¹µö¹¥»÷£¬µ¼ÖÂУÓÑ¡¢¾èÔùÕß¡¢½ÌÈËÔ±¹¤¼°Ñ§ÉúÓ×ÎÒÐÅϢй¶¡£¾ÝУ·½°ä²¼µÄ³£¼ûÎÊÌâ½â´ðÏÔʾ£¬¹¥»÷Õßͨ¹ý´¹µöÓʼþÈëÇÖÒ»ÃûÔ±¹¤ÕË»§£¬½ø¶ø½Ó¼ûÁË´æ´¢³ï¿îÓëУÓѲμӻÊý¾ÝµÄÊý¾Ý¿â£¬Ð¹Â¶ÐÅÏ¢Ô̺¬ÐÕÃû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¼°¼ÒÍ¥/°ì¹«µØÖ·¡£¸ÃУǿµ÷£¬±»Ð¹Â¶Êý¾Ý¿âδ´æ´¢²ÆÕþÐÅÏ¢¡¢ÕË»§Æ¾Ö¤»òÊÜÁª¹úÒþÖÔ·¨±£»¤µÄѧÉú/½ÌÖ°¹¤¾ßÌå¼Í¼£¬½öÉæ¼°Ð£ÓÑ¡¢¾èÔùÕß¼°¹ØÁªÈºÌ壨ÈçУÓÑÅäż¡¢Ñ§Éú¼Ò³¤µÈ£©µÄ»ù´¡ÁªÏµÐÅÏ¢¡£±öϦ·¨ÄáÑÇ´óѧÔÚ10ÔÂÒà²úÉúÀàËÆÊÂÎñ¡£¹¥»÷ÕßÀûÓÃÇÔÈ¡µÄÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§£¬ÈëÇÖ¸ÃУSalesforce¾èÔùÕßÊý¾Ý¿â¡¢SAPóÒ×ÖÇÄÜϵͳ¼°SharePointÎļþƽ̨£¬ÇÔÈ¡ÁË1.71GBÄÚ²¿Îĵµ£¬Éæ¼°120Íò±Ê¼Í¼¡£Á½ÆðÊÂÎñ¾ùÖ¸ÏòУÓѹØÏµÖÎÀíϵͳ·ì϶£¬ÆÕÁÖ˹¶ÙµÄй¶ԴÓÚÔ±¹¤ÕË»§±»ÈëÇÖ£¬±ö´óÔòÒòÔ±¹¤ÕË»§È¨ÏÞ¹ý´óµ¼ÖÂϵͳ±»ºáÏòÉøÈë¡£Ö»¹ÜÁ½ÆðÊÂÎñÊÖ·¨ÀàËÆ£¬ÆÕÁÖ˹¶Ù´óѧÉêÃ÷ÔÝÎÞÖ¤¾ÝÅú×¢¶þÕß´æÔÚ¹ØÁª¡£
https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/


¾©¹«Íø°²±¸11010802024551ºÅ