µÂ¾¯·½¹Ø±ÕDDoS³ö×âÆ½Ì¨Dstat.cc£¬£¬£¬£¬£¬£¬¾Ð²¶Á½Ãû·¸·¨ÏÓÒÉÈË
Ðû²¼Ê±¼ä 2024-11-0511ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬µÂ¹ú¾¯·½½üÆÚ½ÓÄÉÁËÒ»ÏîÖØ´óÐж¯£¬£¬£¬£¬£¬£¬ÀֳɹرÕÁËDDoS×âÁÞÆ½Ì¨Dstat.cc£¬£¬£¬£¬£¬£¬²¢¾Ð²¶ÁËÁ½ÃûÉæÏÓÔËÓª¸Ãƽ̨²¢·¢¶¯DDoS¹¥»÷µÄÄÐ×Ó¡£¡£¡£¡£ÕâÁ½ÃûÄÐ×Ó»®·ÖÀ´×Ô´ïÄ·Ê©ËþÌØºÍÀ³ÒðÀ¼ÊУ¬£¬£¬£¬£¬£¬ÄêËê»®·ÖΪ19ËêºÍ28Ëê¡£¡£¡£¡£³ýÁËDDoS¹¥»÷Í⣬£¬£¬£¬£¬£¬ËûÃÇ»¹ÉæÏÓÔËÓªÁíÒ»¸öÃûΪ¡°Flight RCS¡±µÄÔÚÏ߯½Ì¨£¬£¬£¬£¬£¬£¬¸Ãƽ̨³öÊÛÉè¼ÆÒ©ÎïºÍºÏ³É´óÂéËØ¡£¡£¡£¡£Á½ÈËÒò´ËÃæÁÙÔËÓª·¸·¨ÉúÒâÆ½Ì¨¾ÙÐÐÉÌÒµºÍ°ïÅɻµÄÖ¸¿Ø£¬£¬£¬£¬£¬£¬²¢Òѱ»²¶³öÍ¥ÊÜÉ󡣡£¡£¡£´Ë´ÎÐж¯ÓÉ·¨À¼¿Ë¸£×ÜÉó²é³¤°ì¹«ÊÒÖÐÑë¹¥»÷ÍøÂç·¸·¨¾Ö¡¢ºÚÉÖÝÐÌʾ¯Ô±¾ÖºÍÁª°îÐÌʾ¯Ô±¾Öе÷£¬£¬£¬£¬£¬£¬²¢»ñµÃÁË·¨¹ú¡¢Ï£À°¡¢±ùµººÍÃÀ¹úÕþ¸®µÄÖ§³Ö¡£¡£¡£¡£¾¯·½ÔÚÐж¯Öв»µ«¹Ø±ÕÁËDstat.ccºÍFlight RCSƽ̨£¬£¬£¬£¬£¬£¬»¹ËѲéÁ˵¹úµÄÆß´¦·¿²ú¡£¡£¡£¡£BKAÖ¸³ö£¬£¬£¬£¬£¬£¬Dstat.ccƽ̨ʹÆÕ±éµÄÓû§Äܹ»ÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬£¬°üÀ¨ÄÇЩûÓÐÉîÈëÊÖÒÕÊÖÒÕµÄÓû§¡£¡£¡£¡£´ËÀàѹÁ¦Ð§ÀÍÔÚÍþвÁìÓòÔ½À´Ô½ÊܽӴý£¬£¬£¬£¬£¬£¬²¢±»ÖîÈç¡°Killnet¡±Ö®ÀàµÄºÚ¿Í×éÖ¯´ó×ÚʹÓᣡ£¡£¡£´Ë´ÎÐж¯Êǹú¼ÊÐж¯PowerOffµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬Ö¼ÔÚ¹¥»÷´ó×Ú¡°DDos-as-a-service¡±Æ½Ì¨¡£¡£¡£¡£´Ë´ÎÐж¯ÕÃÏÔÁ˹ú¼ÊÖ´·¨²¿·Ö¹¥»÷Êý×Ö·¸·¨µÄʵÁ¦¡£¡£¡£¡£
https://securityaffairs.com/170540/cyber-crime/german-police-shut-down-ddos-for-hire-platform-dstat-cc.html
2. ´ó¹æÄ£OpenAIÄ£Äâ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸ChatGPTÓû§Æ¾Ö¤
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Barracuda Networks ¿ËÈÕ¼à²âµ½Ò»³¡Õë¶Ô ChatGPT Óû§Æ¾Ö¤µÄ´ó¹æÄ£ OpenAI Ä£Äâ»î¶¯¡£¡£¡£¡£¹¥»÷Õßͨ¹ý·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬Éù³ÆÊÕ¼þÈË¡°¶Ô ChatGPT µÄ×îж©Ôĸ¶¿îδÀֳɡ±£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼ËûÃǵã»÷Á´½Ó¸üи¶¿îÐÅÏ¢¡£¡£¡£¡£ÕâЩÓʼþ¿´ËÆÀ´×Ô OpenAI Payments£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÔ´×ÔÃûΪ topmarinelogistics.com µÄÓòÃû£¬£¬£¬£¬£¬£¬ÇÒÒÑͨ¹ý DKIM ºÍ SPF ¼ì²é£¬£¬£¬£¬£¬£¬ÔöÌíÁËÓÕÆÐÔ¡£¡£¡£¡£¾Ý Barracuda ͳ¼Æ£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý 1,000 ·â´ËÀàÓʼþ´Óµ¥¸öÓòÃû·¢³ö£¬£¬£¬£¬£¬£¬Ä¿µÄΪȫÇòÆóÒµ¡£¡£¡£¡£ÓʼþÖ¸ÏòµÄÓòÃû fnjrolpa.com ÏÖÔÚÒÑÀëÏߣ¬£¬£¬£¬£¬£¬µ«ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾ÔøÍйÜÒ»¸öÓë OpenAI ÏàËÆµÄÐéαµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£¡£¡£Barracuda ²úÆ·ÖÎÀíÍÅ¶ÓµÄ Prebh Singh ÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâÊǹ¥»÷Õß»ñÈ¡ÐÂÕË»§È¨Ï޵ıã½ÝÊֶΣ¬£¬£¬£¬£¬£¬½ø¶øÊ¹ÓÃÕâЩÕË»§ÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬ÍÐ¹Ü ChatGPT ÍøÂç´¹ÂÚÒ³ÃæµÄÓòÃûÓÚ 2023 Äê 12 ÔÂ×¢²á£¬£¬£¬£¬£¬£¬×¢²áµØµãÀ´×ÔÄá²´¶û£¬£¬£¬£¬£¬£¬¶ø·¢¼þÈ˵ÄÓòÃûÔÚ·¨¹ú×¢²á£¨ÏÖÒÑÎÞ·¨»á¼û£©£¬£¬£¬£¬£¬£¬IP µØµãÔòÊôÓڵ¹ú£¬£¬£¬£¬£¬£¬ÏÔʾ³ö´Ë´ÎÍøÂç¹¥»÷»î¶¯µÄÖØ´óÐԺͿç¹úÐÔ¡£¡£¡£¡£
https://www.securityweek.com/businesses-worldwide-targeted-in-large-scale-chatgpt-phishing-campaign/
3. ŵ»ùÑÇÊÓ²ìµÚÈý·½¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬Ô´´úÂëÒɱ»µÁ
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Åµ»ùÑÇÕýÔÚÊÓ²ìÒ»ÆðÉæÏÓÔ´´úÂë±»µÁµÄÊÂÎñ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÉæ¼°µÚÈý·½¹©Ó¦ÉÌÊÇ·ñÔâµ½ÈëÇÖ¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪIntelBrokerµÄÍþвÐÐΪÕßÉù³ÆÒѾÈëÇÖÁËÓëŵ»ùÑÇÏàÖúµÄµÚÈý·½¹©Ó¦É̵ÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË´ó×Úŵ»ùÑÇÔ´´úÂë¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬±»µÁÊý¾Ý°üÀ¨SSHÃÜÔ¿¡¢Ô´´úÂë¡¢RSAÃÜÔ¿¡¢BitBucketµÇ¼ÐÅÏ¢¡¢SMTPÕÊ»§¡¢webhookºÍÓ²±àÂëÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£IntelBrokerÉù³ÆÊ¹ÓÃĬÈÏÆ¾Ö¤»á¼ûÁ˵ÚÈý·½¹©Ó¦É̵ÄSonarQubeЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÏÂÔØÁ˰üÀ¨Åµ»ùÑÇÔÚÄڵĿͻ§µÄPythonÏîÄ¿¡£¡£¡£¡£BleepingComputerÓëŵ»ùÑÇ·ÖÏíÁ˾ݳƱ»µÁÊý¾ÝµÄÎļþÊ÷£¬£¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´¡£¡£¡£¡£IntelBrokerÔøÒòÈëÇÖ¶à¸ö×éÖ¯¶øÉùÃûÉ¢ÂÒ£¬£¬£¬£¬£¬£¬°üÀ¨ÈÏÕæÖÎÀíÃÀ¹úÖÚÒéÔºÒéÔ±Ò½ÁƱ£½¡ÍýÏëµÄDC Health Link£¬£¬£¬£¬£¬£¬ÒÔ¼°»ÝÆÕÆóÒµºÍWeee!ÔÓ»õЧÀ͵ȡ£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬¸ÃÍþвÐÐΪÕß»¹Ð¹Â¶Á˰üÀ¨T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ´ÓµÚÈý·½SaaS¹©Ó¦ÉÌ´¦ÇÔÈ¡µÄ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/
4. ¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬½ü30ÍòÓû§Êý¾Ýй¶
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚÃûΪ¡°Intel Broker¡±µÄºÚ¿ÍÉù³ÆÍ¨¹ýµÚÈý·½³Ð°üÉÌÈëÇÖÁË¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÔÓÖ¾£¬£¬£¬£¬£¬£¬²¢ÔÚBreach ForumsÉϹûÕæÁ˽ü30ÍòÌõÓû§¼Í¼¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄÜÔ´×Ô¸ÃÍøÕ¾µÄÐÂÎÅͨѶ¶©ÔÄÕßÃûµ¥£¬£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µç×ÓÓʼþµØµã¡¢»î¶¯ÈÕÆÚ¼°½ÌÓýϸ½ÚµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬Ö»¹ÜÎ´Éæ¼°ÃÜÂë¡¢Éç»á°ü¹ÜºÅ»ò²ÆÎñÊý¾ÝµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬£¬µ«ÈÔÃæÁÙÍøÂç´¹ÂÚºÍÕë¶ÔÐÔթƵÄΣº¦¡£¡£¡£¡£¡¶ÂéÊ¡Àí¹¤ÊÖÒÕ̸ÂÛ¡·×÷ΪÂéÊ¡Àí¹¤Ñ§ÔºµÄÒ»·ÝÖøÃû¿¯Î£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÎÞÒɽ«Ëðº¦ÆäÉùÓþ£¬£¬£¬£¬£¬£¬²¢Òý·¢Óû§¶ÔÆäÒþ˽±£»£»£»¤µÄµ£ÐÄ¡£¡£¡£¡£Intel BrokerÒò½üÆÚ¶Ô¶à¼Ò×ÅÃû×éÖ¯Ìᳫ¹¥»÷¶øÉùÃûÉ¢ÂÒ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¡¶ÂéÊ¡Àí¹¤Ñ§ÔºÊÖÒÕ̸ÂÛ¡·ÉÐδ¶Ô´Ë´ÎÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦£¬£¬£¬£¬£¬£¬¹«ÖÚÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£
https://hackread.com/hackers-leak-mit-technology-review-user-records/
5. Ê©ÄÍµÂµçÆøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬40GBÊý¾Ý±»µÁ
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬Ê©ÄÍµÂµçÆøÔâÓöÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬Ò»ÃûÃûΪ¡°Grep¡±µÄÍþвÐÐΪÕßÉù³Æ´Ó¸Ã¹«Ë¾µÄJIRAЧÀÍÆ÷ÇÔÈ¡ÁË40GBµÄÊý¾Ý¡£¡£¡£¡£¾ÝÊ©ÄÍµÂµçÆøÍ¸Â¶£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÉæ¼°Î´¾ÊÚȨ»á¼ûÆäλÓÚ¸ôÀëÇéÐÎÖеÄÄÚ²¿ÏîĿִÐиú×ÙÆ½Ì¨Ö®Ò»£¬£¬£¬£¬£¬£¬µ«¹«Ë¾µÄ²úÆ·ºÍЧÀͲ¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£GrepÉù³ÆÊ¹ÓÃ̻¶µÄƾ֤ÈëÇÖÁËÊ©ÄÍµÂµçÆøµÄJiraЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢×¥È¡ÁË40ÍòÐÐÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨75,000¸öΨһµç×ÓÓʼþµØµãºÍÈ«Ãû¡£¡£¡£¡£ÔÚ°µÍøÌû×ÓÖУ¬£¬£¬£¬£¬£¬Grep¿ªÍçЦµØË÷Òª¼ÛÖµ125,000ÃÀÔªµÄ¡°Baguettes¡±ÒÔ°ü¹Ü²»Ð¹Â¶Êý¾Ý£¬£¬£¬£¬£¬£¬²¢·ÖÏíÁ˸ü¶àÓйر»µÁÊý¾ÝµÄϸ½Ú¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Grep»¹ÌåÏÖËûÃÇ×î½ü½¨ÉèÁËÒ»¸öеĺڿÍ×éÖ¯£¬£¬£¬£¬£¬£¬¹ú¼ÊÌõÔ¼»ú¹¹(ICA)£¬£¬£¬£¬£¬£¬²¢Éù³ÆÈôÊǹ«Ë¾ÔÚ48СʱÄÚ²»ÈÏ¿ÉÊܵ½¹¥»÷£¬£¬£¬£¬£¬£¬ËûÃǾͻáй¶Èκα»µÁÊý¾Ý¡£¡£¡£¡£Ê©ÄÍµÂµçÆøÒѾȷÈÏÁË´Ë´ÎйÃÜÊÂÎñ£¬£¬£¬£¬£¬£¬µ«Éв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñ»á¼ÌÐøÐ¹Â¶»ò³öÊÛ±»µÁÊý¾Ý¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/
6. ¶íº¥¶íÖݸçÂײ¼ÊÐ50ÍòסÃñÐÅÏ¢ÔâÀÕË÷ÍÅ»ïÇÔÈ¡²¢Ð¹Â¶
11ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬¶íº¥¶íÖݸçÂײ¼ÊУ¨Éú³ÝÁè¼Ý905,000£©ÔÚ½ñÄê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¹«¹²Ð§ÀͺÍITÅþÁ¬ÖÐÖ¹¡£¡£¡£¡£¸ÃÍÅ»ïÉù³ÆÇÔÈ¡ÁË6.5TBÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨Ô±¹¤Æ¾Ö¤¡¢¶¼»áÉãÏñ»úÔ´µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÊÐÕþ¸®¹ÙÔ±×î³õÌåÏÖϵͳδ±»¼ÓÃÜ£¬£¬£¬£¬£¬£¬µ«RhysidaÔÚÀÕË÷ʧ°Üºóй¶ÁË45%µÄ±»µÁÊý¾Ý¡£¡£¡£¡£¸çÂײ¼ÊÐÊг¤°²µÂ³¡¤½ðɪÉù³ÆÐ¹Â¶µÄÊý¾ÝÒѼÓÃÜ»òË𻵣¬£¬£¬£¬£¬£¬µ«Çå¾²Ñо¿Ô±David Leroy Ross£¨Connor Goodwolf£©Ìá³öÒìÒ飬£¬£¬£¬£¬£¬²¢·ÖÏíÁËδ¼ÓÃܵÄСÎÒ˽¼ÒÐÅÏ¢Ñù±¾¡£¡£¡£¡£ÊÐÕþ¸®¶ÔGoodwolfÌáÆðËßËÏ£¬£¬£¬£¬£¬£¬Ö¸¿ØÆäÈö²¥±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÔÝʱÏÞÖÆÁî¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎ¥¹æÍ¨ÖªÐÅ£¬£¬£¬£¬£¬£¬ÊÐÕþ¸®ÔÚ10Ô³õ֪ͨÁË50ÍòÈË£¬£¬£¬£¬£¬£¬³Æ¹¥»÷ÕßÇÔÈ¡²¢Ðû²¼ÁËËûÃǵÄСÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÉÐδ·¢Ã÷Êý¾ÝÀÄÓÃÖ¤¾Ý£¬£¬£¬£¬£¬£¬ÊÐÕþ¸®ÈÔ½¨ÒéÊÜÓ°ÏìСÎÒ˽¼Ò¼à¿ØÐÅÓñ¨¸æºÍ½ðÈÚÕË»§£¬£¬£¬£¬£¬£¬²¢Ìṩ24¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý»Ö¸´Ð§ÀÍ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/


¾©¹«Íø°²±¸11010802024551ºÅ