µÂ¾¯·½¹Ø¹ØDDoS³ö×âÆ½Ì¨Dstat.cc £¬¿ÛÁôÁ½Ãû·¸×ïÏÓÒÉÈË

°ä²¼¹¦·ò 2024-11-05
1. µÂ¾¯·½¹Ø¹ØDDoS³ö×âÆ½Ì¨Dstat.cc £¬¿ÛÁôÁ½Ãû·¸×ïÏÓÒÉÈË


11ÔÂ4ÈÕ £¬µÂ¹ú¾¯·½½üÆÚ²ÉÈ¡ÁËÒ»Ïî³Á´óÐж¯ £¬³É¹¦¹Ø¹ØÁËDDoS×âÁÞÆ½Ì¨Dstat.cc £¬²¢¿ÛÁôÁËÁ½ÃûÉæÏÓÔËÓª¸Ãƽ̨²¢·¢ÆðDDoS¹¥»÷µÄÄÐ×Ó  ¡£ÕâÁ½ÃûÄÐ×Ó±ðÀëÀ´×Ô´ïÄ·Ê©ËþÌØºÍÀ³ÒðÀ¼ÊÐ £¬´ºÇï±ðÀëΪ19ËêºÍ28Ëê  ¡£³ýÁËDDoS¹¥»÷±í £¬ËûÃÇ»¹ÉæÏÓÔËÓªÁíÒ»¸öÃûΪ¡°Flight RCS¡±µÄÔÚÏ߯½Ì¨ £¬¸Ãƽ̨ÏúÊÛÉè¼ÆÒ©ÎïºÍºÏ³É´óÂéËØ  ¡£Á½ÈËÒò¶øÃæ¶ÔÔËÓª·¸×ïÂòÂôƽ̨½øÐÐóÒ׺ÍÖúÅɻµÄÖ¸¿Ø £¬²¢Òѱ»²¶³öÍ¥ÊÜÉó  ¡£Õâ´ÎÐж¯ÓÉ·¨À¼¿Ë¸£×ܼì²ì³¤°ì¹«ÊÒÖÐÑë½ø¹¥ÍøÂç·¸×ï¾Ö¡¢ºÚÉ­ÖÝÐÌʾ¯Ô±¾ÖºÍÁª¹úÐÌʾ¯Ô±¾ÖЭµ÷ £¬²¢µÃµ½ÁË·¨¹ú¡¢Ï£À°¡¢±ùµººÍÃÀ¹úµ±¾ÖµÄÖ§³Ö  ¡£¾¯·½ÔÚÐж¯Öв»½ö¹Ø¹ØÁËDstat.ccºÍFlight RCSƽ̨ £¬»¹ËѲéÁ˵¹úµÄÆß´¦·¿²ú  ¡£BKAÖ¸³ö £¬Dstat.ccƽ̨ʹ¿í·ºµÄÓû§¿ÉÄÜÌáÒéDDoS¹¥»÷ £¬Ô̺¬ÄÇЩûÓÐÉî¿Ì¼¼Êõ¼¼ÊõµÄÓû§  ¡£´ËÀàѹÁ¦·þÎñÔÚÍþвÁìÓòÔ½À´Ô½ÊÜÓ­½Ó £¬²¢±»ÖîÈç¡°Killnet¡±Ö®ÀàµÄºÚ¿Í×éÖ¯´óÁ¿Ê¹Óà  ¡£Õâ´ÎÐж¯Êǹú¼ÊÐж¯PowerOffµÄÒ»²¿ÃÅ £¬Ö¼ÔÚ½ø¹¥´óÁ¿¡°DDos-as-a-service¡±Æ½Ì¨  ¡£Õâ´ÎÐж¯ÕÃÏÔÁ˹ú¼Ê·¨Âɲ¿ÃŽø¹¥Êý×Ö·¸×ïµÄʵÁ¦  ¡£


https://securityaffairs.com/170540/cyber-crime/german-police-shut-down-ddos-for-hire-platform-dstat-cc.html


2. ´ó¹æÄ£OpenAI·ÂÕÕ´¹µö¹¥»÷ £¬Ö¸±êÖ±Ö¸ChatGPTÓû§Æ¾Ö¤


11ÔÂ4ÈÕ £¬Barracuda Networks ½üÈÕ¼à²âµ½Ò»³¡Õë¶Ô ChatGPT Óû§Æ¾Ö¤µÄ´ó¹æÄ£ OpenAI ·ÂÕջ  ¡£¹¥»÷Õßͨ¹ý·¢ËÍÍøÂç´¹µöµç×ÓÓʼþ £¬Ðû³ÆÊÕ¼þÈË¡°¶Ô ChatGPT µÄ×îж©Ôĸ¶¿îδ³É¹¦¡± £¬²¢ÓÕµ¼ËûÃǵã»÷Á´½Ó¸üи¶¿îÐÅÏ¢  ¡£ÕâЩÓʼþ¿´ËÆÀ´×Ô OpenAI Payments £¬µ«ÏÖʵÉÏÔ´×ÔÃûΪ topmarinelogistics.com µÄÓòÃû £¬ÇÒÒÑͨ¹ý DKIM ºÍ SPF ²é³­ £¬Ôö³¤Á˺ýŪÐÔ  ¡£¾Ý Barracuda ͳ¼Æ £¬Óг¬¹ý 1,000 ·â´ËÀàÓʼþ´Óµ¥¸öÓòÃû·¢³ö £¬Ö¸±êΪȫÇòÆóÒµ  ¡£ÓʼþÖ¸ÏòµÄÓòÃû fnjrolpa.com ĿǰÒÑÀëÏß £¬µ«·ÖÎöÏÔʾ £¬¸ÃÍøÕ¾ÔøÍйÜÒ»¸öÓë OpenAI ÀàËÆµÄÐéαµÇÂ¼Ò³Ãæ £¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤  ¡£Barracuda ²úÆ·ÖÎÀíÍÅ¶ÓµÄ Prebh Singh °µÊ¾ £¬ÕâÊǹ¥»÷Õß»ñÈ¡ÐÂÕË»§È¨Ï޵ıã½Ý¼¿Á© £¬½ø¶øÀûÓÃÕâЩÕË»§ÌáÒéеÄÍøÂç´¹µö»î¶¯  ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬ÍÐ¹Ü ChatGPT ÍøÂç´¹µöÒ³ÃæµÄÓòÃûÓÚ 2023 Äê 12 ÔÂ×¢²á £¬×¢²áµØÖ·À´×ÔÄá²´¶û £¬¶ø·¢¼þÈ˵ÄÓòÃûÔÚ·¨¹ú×¢²á£¨ÏÖÒÑÎÞ·¨½Ó¼û£© £¬IP µØÖ·ÔòÊôÓڵ¹ú £¬ÏÔʾ³öÕâ´ÎÍøÂç¹¥»÷»î¶¯µÄ¸´ÔÓÐԺͿç¹úÐÔ  ¡£


https://www.securityweek.com/businesses-worldwide-targeted-in-large-scale-chatgpt-phishing-campaign/


3. ŵ»ùÑǵ÷²éµÚÈý·½¹©¸øÉÌÔâºÚ¿ÍÈëÇÖ £¬Ô´´úÂëÒɱ»µÁ


11ÔÂ4ÈÕ £¬Åµ»ùÑÇÔÚµ÷²éÒ»Â·ÉæÏÓÔ´´úÂë±»µÁµÄÊÂÎñ £¬¸ÃÊÂÎñÉæ¼°µÚÈý·½¹©¸øÉÌÊÇ·ñÔâµ½ÈëÇÖ  ¡£´Ëǰ £¬Ò»¸öÃûΪIntelBrokerµÄÍþвÐÐΪÕßÐû³ÆÒѾ­ÈëÇÖÁËÓëŵ»ùÑǺÏ×÷µÄµÚÈý·½¹©¸øÉ̵ķþÎñÆ÷ £¬²¢ÇÔÈ¡ÁË´óÁ¿Åµ»ùÑÇÔ´´úÂë  ¡£¾Ý³Æ £¬±»µÁÊý¾ÝÔ̺¬SSHÃÜÔ¿¡¢Ô´´úÂë¡¢RSAÃÜÔ¿¡¢BitBucketµÇ¼ÐÅÏ¢¡¢SMTPÕÊ»§¡¢webhookºÍÓ²±àÂëÍ´´¦µÈÃô¸ÐÐÅÏ¢  ¡£IntelBrokerÐû³ÆÊ¹ÓÃĬÈÏÍ´´¦½Ó¼ûÁ˵ÚÈý·½¹©¸øÉ̵ÄSonarQube·þÎñÆ÷ £¬ÏÂÔØÁËÔ̺¬Åµ»ùÑÇÔÚÄڵĿͻ§µÄPythonÏîÄ¿  ¡£BleepingComputerÓëŵ»ùÑÇ·ÖÏíÁ˾ݳƱ»µÁÊý¾ÝµÄÎļþÊ÷ £¬µ«ÉÐδÊÕµ½»Ø¸´  ¡£IntelBrokerÔøÒòÈëÇÖ¶à¸ö×éÖ¯¶øÉùÃûÀǽå £¬Ô̺¬ÕƹÜÖÎÀíÃÀ¹ú¶àÒéÔºÒéÔ±Ò½ÁƱ£½¡´òËãµÄDC Health Link £¬ÒÔ¼°»ÝÆÕÆóÒµºÍWeee!ÔÓ»õ·þÎñµÈ  ¡£×î½ü £¬¸ÃÍþвÐÐΪÕß»¹Ð¹Â¶ÁËÔ̺¬T-Mobile¡¢AMDºÍAppleÔÚÄڵĶà¼Ò¹«Ë¾µÄÊý¾Ý £¬ÕâЩÊý¾ÝÊÇ´ÓµÚÈý·½SaaS¹©¸øÉÌ´¦ÇÔÈ¡µÄ  ¡£


https://www.bleepingcomputer.com/news/security/nokia-investigates-breach-after-hacker-claims-to-steal-source-code/


4. ¡¶ÂéÊ¡Àí¹¤Ñ§Ôº¼¼ÊõÆÀÂÛ¡·ÔâºÚ¿ÍÈëÇÖ £¬½ü30ÍòÓû§Êý¾Ýй¶


11ÔÂ4ÈÕ £¬½üÆÚÃûΪ¡°Intel Broker¡±µÄºÚ¿ÍÐû³ÆÍ¨¹ýµÚÈý·½³Ð°üÉÌÈëÇÖÁË¡¶ÂéÊ¡Àí¹¤Ñ§Ôº¼¼ÊõÆÀÂÛ¡·ÔÓÖ¾ £¬²¢ÔÚBreach ForumsÉϹ«¿ªÁ˽ü30ÍòÌõÓû§¼Í¼  ¡£ÕâЩÊý¾Ý¿ÉÄÜÔ´×Ô¸ÃÍøÕ¾µÄÐÂÎÅͨѶ¶©ÔÄÕßÃûµ¥ £¬Ô̺¬È«Ãû¡¢µç×ÓÓʼþµØÖ·¡¢»î¶¯ÈÕÆÚ¼°½ÌÓýϸ½ÚµÈÓ×ÎÒÐÅÏ¢ £¬Ö»¹ÜÎ´Éæ¼°ÃÜÂë¡¢Éç»á±£ÏպŻò²ÆÕþÊý¾ÝµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ £¬µ«ÈÔÃæ¶ÔÍøÂç´¹µöºÍÕë¶ÔÐÔÚ¿Æ­µÄ·çÏÕ  ¡£¡¶ÂéÊ¡Àí¹¤¼¼ÊõÆÀÂÛ¡·×÷ΪÂéÊ¡Àí¹¤Ñ§ÔºµÄÒ»·Ý³ÛÃû¿¯Îï £¬Õâ´ÎÊý¾Ýй¶ÊÂÎñÎÞÒɽ«ÇÖº¦ÆäÃûÓþ £¬²¢Òý·¢Óû§¶ÔÆäÒþÖÔ±£»¤µÄÓÇÓô  ¡£Intel BrokerÒò½üÆÚ¶Ô¶à¼Ò³ÛÃû×éÖ¯ÌáÒé¹¥»÷¶øÉùÃûÀǽå  ¡£Ä¿Ç° £¬¡¶ÂéÊ¡Àí¹¤Ñ§Ôº¼¼ÊõÆÀÂÛ¡·ÉÐδ¶ÔÕâ´ÎÊý¾Ýй¶ÊÂÎñ×÷³ö»ØÓ¦ £¬¹«¼ÒÕýÇ×êǹØ×¢ÊÂ̬·¢Õ¹  ¡£


https://hackread.com/hackers-leak-mit-technology-review-user-records/


5. Ê©ÄÍµÂµçÆøÔâºÚ¿ÍÈëÇÖ £¬40GBÊý¾Ý±»µÁ


11ÔÂ4ÈÕ £¬Ê©ÄÍµÂµçÆøÔâ·êÁËÒ»Â·ÍøÂ簲ȫÊÂÎñ £¬Ò»ÃûÃûΪ¡°Grep¡±µÄÍþвÐÐΪÕßÐû³Æ´Ó¸Ã¹«Ë¾µÄJIRA·þÎñÆ÷ÇÔÈ¡ÁË40GBµÄÊý¾Ý  ¡£¾ÝÊ©ÄÍµÂµçÆøÐ¹Â© £¬Õâ´ÎÊÂÎñÉæ¼°Î´¾­ÊÚȨ½Ó¼ûÆäλÓÚ¸ôÀë»·¾³ÖеÄÄÚ²¿ÏîĿִÐиú×ÙÆ½Ì¨Ö®Ò» £¬µ«¹«Ë¾µÄ²úÆ·ºÍ·þÎñ²¢Î´Êܵ½Ó°Ïì  ¡£GrepÐû³ÆÀûÓö³öµÄƾ֤ÈëÇÖÁËÊ©ÄÍµÂµçÆøµÄJira·þÎñÆ÷ £¬²¢×¥È¡ÁË40ÍòÐÐÓû§Êý¾Ý £¬ÆäÖÐÔ̺¬75,000¸öΨһµç×ÓÓʼþµØÖ·ºÍÈ«Ãû  ¡£ÔÚ°µÍøÌû×ÓÖÐ £¬Grep¶ñ×÷¾çµØË÷Òª¼ÛÖµ125,000ÃÀÔªµÄ¡°Baguettes¡±ÒÔ±£Õϲ»Ð¹Â¶Êý¾Ý £¬²¢·ÖÏíÁ˸ü¶àÓйر»µÁÊý¾ÝµÄϸ½Ú  ¡£´Ë±í £¬Grep»¹°µÊ¾ËûÃÇ×î½ü³ÉÁ¢ÁËÒ»¸öеĺڿÍ×éÖ¯ £¬¹ú¼ÊºÏͬ»ú¹¹(ICA) £¬²¢Ðû³ÆÈôÊǹ«Ë¾ÔÚ48Ó×ʱÄÚ²»ÈÏ¿ÉÊܵ½¹¥»÷ £¬ËûÃǾͻáй¶Èκα»µÁÊý¾Ý  ¡£Ê©ÄÍµÂµçÆøÒѾ­È·ÈÏÁËÕâ´ÎйÃÜÊÂÎñ £¬µ«Éв»Ã÷ÏÔÍþвÐÐΪÕßÊÇ·ñ»á³ÖÐøÐ¹Â¶»òÏúÊÛ±»µÁÊý¾Ý  ¡£


https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/


6. ¶íº¥¶íÖݸçÂײ¼ÊÐ50Íò¾ÓÃñÐÅÏ¢ÔâÀÕË÷ÍÅ»ïÇÔÈ¡²¢Ð¹Â¶


11ÔÂ4ÈÕ £¬¶íº¥¶íÖݸçÂײ¼ÊУ¨È˶¡³¬¹ý905,000£©ÔÚ½ñÄê7ÔÂÔâ·êRhysidaÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷ £¬µ¼Ö¹«¹²·þÎñºÍITÏνÓÖÐ¶Ï  ¡£¸ÃÍÅ»ïÐû³ÆÇÔÈ¡ÁË6.5TBÊý¾Ý £¬Ô̺¬Ô±¹¤Æ¾Ö¤¡¢³ÇÊÐÉãÏñ»úÔ´µÈÃô¸ÐÐÅÏ¢  ¡£Ö»¹ÜÊе±¾Ö¹ÙÔ±×î³õ°µÊ¾ÏµÍ³Î´±»¼ÓÃÜ £¬µ«RhysidaÔÚÀÕË÷ʧ°Üºóй¶ÁË45%µÄ±»µÁÊý¾Ý  ¡£¸çÂײ¼ÊÐÊг¤°²µÂ³¡¤½ðɪÐû³ÆÐ¹Â¶µÄÊý¾ÝÒѼÓÃÜ»ò°Ü»µ £¬µ«°²È«×êÑÐÔ±David Leroy Ross£¨Connor Goodwolf£©Ìá³öÒìÒé £¬²¢·ÖÏíÁËδ¼ÓÃܵÄÓ×ÎÒÐÅÏ¢Ñù±¾  ¡£Êе±¾Ö¶ÔGoodwolfÌá¸æ×´ËÏ £¬Ö¸¿ØÆä´«²¼±»µÁÊý¾Ý £¬²¢°ä²¼ÁËһʱÏÞ¶ÈÁî  ¡£È»¶ø £¬Æ¾¾ÝÌá½»¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄÎ¥¹æÍ¨ÖªÐÅ £¬Êе±¾ÖÔÚ10Ô³õ֪ͨÁË50ÍòÈË £¬³Æ¹¥»÷ÕßÇÔÈ¡²¢°ä²¼ÁËËûÃǵÄÓ×ÎÒÐÅÏ¢ºÍ²ÆÕþÐÅÏ¢  ¡£Ö»¹ÜÉÐδ·¢ÏÖÊý¾ÝÀÄÓÃÖ¤¾Ý £¬Êе±¾ÖÈÔ½¨ÒéÊÜÓ°ÏìÓ×ÎÒ¼à¿ØÐÅÓþ»ã±¨ºÍ½ðÈÚÕË»§ £¬²¢Ìṩ24¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý¸´Ô­·þÎñ  ¡£


https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/