Akamai͸¶ÆäÑÇÌ«µØÓòij¿Í»§Ôâµ½´ó¹æÄ£DDoS¹¥»÷
Ðû²¼Ê±¼ä 2023-03-131¡¢Akamai͸¶ÆäÑÇÌ«µØÓòij¿Í»§Ôâµ½´ó¹æÄ£DDoS¹¥»÷
¾Ý3ÔÂ9ÈÕ±¨µÀ£¬Akamai͸¶ÆäÑÇÌ«µØÓòij¿Í»§Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷¡£¹¥»÷·¢ÉúÔÚ2023Äê2ÔÂ23ÈÕ10:22 UTC£¬·åÖµ¸ß´ï900.1 Gbps£¬Ã¿Ãë1.582ÒÚ¸öÊý¾Ý°ü¡£AkamaiÌåÏִ˴ι¥»÷Ó뵱ǰDDoS¹¥»÷Ç÷ÊÆÒ»Ö£¬¹¥»÷Ç¿¶È´óÇÒÁ¬Ðøʱ¼ä¶Ì¡£´ó¶àÊý¹¥»÷Á÷Á¿ÔÚ¹¥»÷á¯ÁëÆÚ·¢×÷£¬½ö¼¸·ÖÖÓºó£¬Á÷Á¿Ä£Ê½¾Í»Ö¸´Õý³£¡£Akamai´¦ÖõÄ×î´ó¹æÄ£µÄÊÇ2022Äê9ÔÂ12ÈÕÕë¶Ô¶«Å·¿Í»§µÄDDoS¹¥»÷£¬·åֵΪÿÃë7.04ÒÚ¸öÊý¾Ý°ü¡£
https://www.bleepingcomputer.com/news/security/akamai-mitigates-record-breaking-900gbps-ddos-attack-in-asia/
2¡¢ÍøÂçÄþ¾²¹«Ë¾AcronisÔâµ½¹¥»÷Áè¼Ý21GBÊý¾Ýй¶
ýÌå3ÔÂ10Èճƣ¬ÈðÊ¿µÄÍøÂçÄþ¾²¹«Ë¾AcronisÁè¼Ý21GBÊý¾Ýй¶¡£ÕâЩÊý¾ÝÓÚ2023Äê3ÔÂ9ÈÕ±»ºÚ¿ÍKernelwareÐû²¼ÔÚBreachºÚ¿ÍÂÛ̳ÉÏ£¬Éæ¼°Ö¤ÊéÎļþ¡¢ÃüÁîÈÕÖ¾¡¢ÏµÍ³ÅäÖúÍÎļþϵͳ´æµµµÈ¡£Ñо¿ÈËÔ±¶Ôй¶Êý¾Ý½øÐзÖÎö£¬·¢ÏÖÀ´×ÔÍøÂçÍйܹ«Ë¾Liquid WebµÄÄÚ²¿Í¼ÏñºÍÈÕÖ¾¡£Liquid WebÊÓ²ì³Æ£¬ÆäÔÚ3ÔÂ9ÈÕ·¢ÏÖÁËÒ»¸ö©¶´£¬AcronisÖ§³Ö·þÎñÆ÷Ôâµ½¹¥»÷µ¼ÖÂÊý¾Ýй¶¡£¾ÝϤ£¬´Ë´Î¹¥»÷µÄºÚ¿ÍÓë½üÆÚÓ¡¶ÈHDFCÒøÐкͺ곞Êý¾Ýй¶Ê¼þµÄÄ»ºóºÚÊÖÊÇͬһ¸öÈË¡£
https://www.hackread.com/cybersecurity-firm-acronis-data-breach/
3¡¢ÐÄÀí½¡¿µ¹«Ë¾CerebralÔ¼310Íò»¼ÕßµÄPHIÐÅϢй¶
¾ÝýÌå3ÔÂ10Èճƣ¬ÐÄÀí½¡¿µ¹«Ë¾Cerebral֪ͨ3179835¸ö»¼Õߣ¬ËûÃǵÄPHIÐÅÏ¢¿ÉÄÜÒÑͨ¹ýÆäƽ̨ÉϵĵÚÈý·½¸ú×Ù¼¼Êõй¶¡£CerebralÈÏ¿ÉËüÔÚÆäÒƶ¯Ó¦ÓúÍÍøÕ¾ÉÏʹÓÃpixelºÍÆäËüÀàËƸú×Ù¼¼Êõ£¬À´¹²Ïí¸öÈËÓû§Êý¾Ý¡¢Êܱ£»¤µÄ½¡¿µÊý¾ÝºÍ²ÆÕþÊý¾Ý¡£Æ¾¾Ý»¼ÕßÓëCerebralµÄ½Ó´¥ÒÔ¼°ËûÃǵĻ¥ÁªÍøä¯ÀÀÆ÷»òÒƶ¯É豸µÄÅäÖ÷½Ê½£¬ÕâЩ¸öÈËÐÅÏ¢¿ÉÄÜÒѱ»Åû¶¸øÉ罻ýÌåÍøÕ¾ºÍÆäËûʹÓùȸ衢Meta£¨Facebook£©¡¢TikTokºÍµÈ¹ã¸æ¸ú×ÙÆ÷µÄÍøÕ¾¡£
https://www.securityweek.com/cerebral-informing-3-1-million-individuals-of-inadvertent-data-exposure/
4¡¢Ñо¿ÈËÔ±Åû¶¿É´ÓÆø϶ϵͳÇÔÈ¡Êý¾ÝµÄCASPER¹¥»÷
3ÔÂ12ÈÕ±¨µÀ³Æ£¬Ê׶û¸ßÀö´óѧµÄÑо¿ÈËÔ±Ìá³öÁËÒ»ÖÖÃûΪCASPERµÄÐÂÐÍÒþ±ÎͨµÀ¹¥»÷£¬Ëü¿ÉÒÔÒÔ20 bits/ÃëµÄËٶȽ«Êý¾Ý´ÓÆø϶ϵͳ鶵½ËÄÖܵÄÖÇÄÜÊÖ»ú¡£CASPER¹¥»÷·½Ê½ÀûÓÃÄ¿±ê¼ÆËã»úÄÚ²¿µÄÑïÉùÆ÷×÷ΪÊý¾Ý´«ÊäͨµÀ£¬´«ÊäÈ˶úÎÞ·¨Ìýµ½µÄ¸ßƵÒôƵ£¬²¢½«¶þ½øÖÆ»òĦ¶û˹µçÂë´«Ë͵½×îÔ¶1.5Ã×Ö®ÍâµÄÂó¿Ë·ç¡£ÆäËüÀàËƵĹ¥»÷»¹ÓÐETHERLED£¬ËüÒÀ¿¿Ä¿±êÍø¿¨µÄLEDµÆÀ´´«ÊäĦ¶û˹µçÂëÐźš£
https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/
5¡¢Unit 42Åû¶Ð½©Ê¬ÍøÂçGoBruteforcer¹¥»÷»î¶¯ÏêÇé
3ÔÂ10ÈÕ£¬Unit 42³ÆÆä½üÆÚ·¢ÏÖÁËÒ»¸öеĻùÓÚGolangµÄ¶ñÒâÈí¼þÑù±¾¡£Ñо¿ÈËÔ±½«ÆäÃüÃûΪGoBruteforcer£¬Ëü»áɨÃ貢ѬȾÔËÐÐphpMyAdmin¡¢MySQL¡¢FTPºÍPostgres·þÎñµÄWeb·þÎñÆ÷¡£GoBruteforcer½«±©Á¦Æƽâ¾ßÓÐÈõÃÜÂë»òĬÈÏÃÜÂëµÄÕÊ»§ÒÔÇÖÈëÒ×±»¹¥»÷µÄ*nixϵͳ¡£½øÒ»·¨Ê½²éÏÔʾ£¬¹¥»÷ÕßÍйÜÁËx86¡¢x64ºÍARM´¦ÖÃÆ÷¼Ü¹¹µÄ¶þ½øÖÆÎļþ¡£¶ñÒâÈí¼þ»¹ÔÚÄ¿±ê·þÎñÆ÷ÉÏ°²×°ÁËÒ»¸ö»¥ÁªÍøÖмÌÁÄÌì(IRC)»úÆ÷ÈË£¬ËüÓë¹¥»÷ÕߵķþÎñÆ÷½øÐÐͨÐÅ¡£
https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
6¡¢eSentireÐû²¼¹ØÓÚ¶ñÒâÈí¼þBATLOADER¹¥»÷»î¶¯µÄ³ÂËß
3ÔÂ9ÈÕ£¬eSentireÐû²¼³ÂËßÅû¶ÁËBATLOADERÀûÓùȸèËÑË÷¹ã¸æÀ´·Ö·¢Vidar StealerºÍUrsnifµÄ»î¶¯¡£2023Äê2ÔÂÖÐÑ®£¬eSentire·¢ÏÖÁËͨ¹ý´úÂë×¢ÈëÔÚÒ»¸öÖÆÔìÒµ¿Í»§µÄ¶ËµãÉÏÖ´ÐÐUrsnifµÄʵÑé¡£ËæºóµÄÊӲ췢ÏÖ£¬¸ÃѬȾÊÇÄ¿±êÓû§ÔڹȸèÉÏËÑË÷Adobe ReaderµÄ½á¹û¡£´ËÍ⣬³ýÁËUrsnif»òVidarµÈ³ß¶ÈpayloadÍ⣬BatLoader»¹Ö´ÐÐCobalt Strike£¬Ñо¿ÈËÔ±ÈÏΪÕâÑù×öÊÇΪÁ˶Ôϵͳ½øÐÐÔ¤´¦ÖÃÒÔ±ã½øÒ»²½ÈëÇÖ¡£
https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif