ChatGPTÓëSora AIÈ«Çò̱»¾£¬OpenAI½ô¼±ÐÞ¸´ÖÐ

Ðû²¼Ê±¼ä 2024-12-13

1. ChatGPTÓëSora AIÈ«Çò̱»¾£¬OpenAI½ô¼±ÐÞ¸´ÖÐ


12ÔÂ12ÈÕ£¬ChatGPTºÍSora AIÊÇÁ½¿îÓÉOpenAIÍƳöµÄÈÈÃÅAI²úÎĿǰÔÚÈ«Çò·¶Î§ÄÚÔâÓö·þÎñÖжÏ¡£OpenAIÒÑÈ·Èϲ¢ÕýÔÚ»ý¼«ÐÞ¸´´ËÎÊÌâ¡£ÖжÏʼÓÚ2024Äê12ÔÂ11ÈÕ̫ƽÑó³ß¶Èʱ¼äÏÂÎç3:17×óÓÒ£¬Éæ¼°ChatGPTÍøÕ¾¼°ÆäAPI£¬ÒÔ¼°×î½üÍƳöµÄÊÓƵÉú³ÉÄ£ÐÍSora¡£Óû§·ÃÎÊChatGPTÍøվʱ»áÊÕµ½¹ØÓÚ·þÎñ²»ÐÐÓõÄ֪ͨ£¬OpenAIÒÑʶ±ð³öÎÊÌâ²¢ÕýŬÁ¦ÍƳöÐÞ¸´·¨Ê½¡£ÓÉÓÚChatGPTÓµÓÐÁè¼Ý2ÒÚµÄÅÓ´óÖÜ»îÔ¾Óû§Èº£¬ËüÒѳÉΪÍøÂç¹¥»÷µÄÖ÷ҪĿ±ê¡£´ËÇ°£¬Ò»¸öÃûΪAnonymous SudanµÄ×éÖ¯ÔøÉù³Æ¶ÔÒ»´ÎÓëChatGPT·þÎñÖжÏͬʱ·¢ÉúµÄDDoS¹¥»÷ÂôÁ¦¡£È»¶ø£¬OpenAIÉÐδȷÈϵ±Ç°ÖжÏÊÇ·ñÓÉÀàËƹ¥»÷Ôì³É£¬ÖжÏÔ­ÒòÉв»Çå³þ¡£È«ÇòÓû§ÕýÃÜÇйØ×¢OpenAIµÄÐÞ¸´½øÕ¹£¬ÆÚ´ý·þÎñÄܹ»¾¡¿ì»Ö¸´Õý³£¡£


https://hackread.com/sora-chatgpt-down-worldwide-openai-working-on-fix/


2. ÐÂÐÍÒþÃØ Pumakit Linux rootkit ¶ñÒâÈí¼þ±»·¢ÏÖ


12ÔÂ12ÈÕ£¬Pumakit ÊÇÒ»ÖÖÐÂÐÍ Linux rootkit ¶ñÒâÈí¼þ£¬ËüÀûÓÃÒþÉíºÍ¸ß¼¶È¨ÏÞÌáÉý¼¼ÊõÀ´ÒþÄäÓÚϵͳÖС£¸Ã¶ñÒâÈí¼þÓɶà¸ö×é¼þ×é³É£¬°üÂÞͶ·ÅÆ÷¡¢ÄÚ´æפÁô¿ÉÖ´ÐÐÎļþ¡¢ÄÚºËÄ£¿é rootkit ºÍÓû§¿Õ¼ä rootkit£¨Kitsune SO£©¡£Elastic Security ÔÚ 2024 Äê 9 Ô 4 ÈÕÓÚ VirusTotal ÉÏ´«µÄ¿ÉÒɶþ½øÖÆÎļþ¡°cron¡±Öз¢ÏÖÁËËü£¬µ«ÎÞ·¨È·¶¨ÆäʹÓÃÕß»òÄ¿±ê¡£Pumakit ½ÓÄɶà½×¶ÎѬȾ¹ý³Ì£¬Ê×ÏÈͨ¹ý¡°cron¡±Í¶·ÅÆ÷Ö´ÐÐǶÈëʽÓÐЧ¸ºÔØ£¬×îÖÕ½« LKM rootkit Ä£¿é²¿Êðµ½ÏµÍ³ÄÚºËÖУ¬²¢ÀûÓà Kitsune SO ÔÚÓû§¿Õ¼äÖÐ×¢Èë½ø³Ì£¬À¹½Øϵͳµ÷Ó᣸à rootkit Õë¶Ô 5.7 °æ֮ǰµÄ Linux ÄÚºËÉè¼Æ£¬ÀûÓá°kallsyms_lookup_name()¡±º¯ÊýÀûÓÃϵͳÐÐΪ£¬²¢Í¨¹ý ftrace ¹³×¡ÏµÍ³µ÷ÓÃÀ´ÌáÉýȨÏÞ¡¢Ö´ÐÐÃüÁîºÍÒþ²Ø½ø³Ì¡£´ËÍ⣬Ëü»¹ÄÜÒþ²ØÌض¨ÎļþºÍ¹¤¾ß£¬È·±£¶ñÒâ¸ü¸Ä²»±»»Ö¸´£¬²¢Óë Kitsune SO ЭͬÔËÐУ¬À¹½ØÓû§¼¶ÏµÍ³µ÷Óã¬Òþ²Ø rootkit Ïà¹ØÎļþ¡¢½ø³ÌºÍÍøÂçÁ¬½Ó¡£


https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/


3. ¹ú¼ÊÁªºÏÐж¯²é·âRydoxÍøÂç·¸×ïÊг¡£¬´þ²¶ÈýÃû¹ÜÀíÈËÔ±


12ÔÂ12ÈÕ£¬°¢¶û°ÍÄáÑÇÖ´·¨²¿ÃÅÓë¹ú¼ÊºÏ×÷»ï°éÁªÊÖ£¬Àֳɲé·âÁËÃûΪRydoxµÄÍøÂç·¸×ïÊг¡£¬²¢´þ²¶ÁËÈýÃû¿ÆË÷ÎÖ¹úÃñ¡ª¡ªArdit Kutleshi¡¢Jetmir KutleshiºÍShpend Sokoli£¬ÆäÖÐÇ°Á½ÈËÒѱ»ÃÀ¹ú˾·¨²¿ÆðËß²¢ÆÚ´ýÒý¶É¡£×Ô2016ÄêÒÔÀ´£¬RydoxÊг¡Âô¼Ò¼ÓÈëÁËÁè¼Ý7600ÆðÐÅÓÿ¨ÐÅÏ¢¡¢µÇ¼ƾ֤ºÍ¸öÈËÐÅÏ¢µÄÏúÊÛ£¬ÕâЩÐÅÏ¢ÊÇ´ÓÊýǧÃûÃÀ¹ú¹«ÃñºÍÖÖÖÖÍøÂç·¸×﹤¾ßÖÐÇÔÈ¡µÄ¡£Rydox»¹ÏòÁè¼Ý18000ÃûÓû§³öÊÛÁË321000ÖÖÆäËûÍøÂç·¸×ï²úÎï¡£×¢²áÓû§ÐèÏÈ´æÈëÒ»¶¨ÊýÁ¿µÄ¼ÓÃÜ»õ±Ò²ÅÆø¹ºÖ÷Ƿ¨²úÎ¶øRydoxÊÚȨÂô¼Ò¿É»ñµÃÏúÊÛÊÕÒæµÄ60%¡£ÃÀ¹ú»ñµÃ˾·¨ÊÚȨ£¬²é·âÁËRydoxµÄÓòÃûºÍ·þÎñÆ÷£¬²¢´Ó±»¸æÕË»§ÖпÛѺÁËÔ¼225000ÃÀÔªµÄ¼ÓÃÜ»õ±Ò¡£´Ë´ÎÐж¯µÃµ½Á˶à¹úÖ´·¨²¿ÃŵÄЭÖú¡£ÃÀ¹ú¼ì²ì¹ÙÌåÏÖ£¬RydoxÊг¡ÊÇÒ»¸öһվʽÉ̵꣬ËäÈ»ÍøÂç·¸×ïͨ³£Éæ¼°º£ÍâÐÐΪ£¬µ«ÆäΣº¦¿ÉÄÜÊÇ»ÙÃðÐԵġ£


https://www.bleepingcomputer.com/news/security/police-shuts-down-rydox-cybercrime-market-arrests-3-admins/


4. ÒÁÀÊÀûÓÃIOCONTROL¶ñÒâÈí¼þ¹¥»÷ÃÀÒÔÒªº¦»ù´¡ÉèÊ©


12ÔÂ12ÈÕ£¬ÒÁÀÊÍþвÐÐΪÕßÕýÀûÓÃÐÂÐͶñÒâÈí¼þIOCONTROL¹¥»÷ÒÔÉ«ÁкÍÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©£¬ÌرðÊÇÎïÁªÍø(IoT)É豸ºÍOT/SCADAϵͳ£¬°üÂÞ·ÓÉÆ÷¡¢PLC¡¢HMI¡¢IPÉãÏñ»ú¡¢·À»ðǽºÍȼÁϹÜÀíϵͳµÈ£¬Éæ¼°ÖÆÔìÉÌÈçD-Link¡¢HikvisionµÈ¡£¸Ã¶ñÒâÈí¼þ¾ßÓÐÄ£¿é»¯ÌØÐÔ£¬¿ÉѬȾ²îÒìÉ豸£¬²¢±»ÊÓΪ¿ÉÄܶÔÒªº¦»ù´¡ÉèÊ©Ôì³ÉÑÏÖØÆÆ»µµÄÃñ×å¹ú¼ÒÍøÂçÎäÆ÷¡£¾Ý±¨µÀ£¬IOCONTROLÓëÒÁÀʺڿÍ×éÖ¯CyberAv3ngersÓйØ£¬¸Ã×éÖ¯ÔøÌåÏÖ³ö¶Ô¹¥»÷¹¤ÒµÏµÍ³µÄÐËȤ¡£¹¥»÷ÕßÉù³ÆÈëÇÖÁËÒÔÉ«ÁкÍÃÀ¹úµÄ200¸ö¼ÓÓÍÕ¾£¬²¢ÔÚ2023ÄêÄ©ÖÁ2024ÄêÖÐÆÚ½øÐÐÁËÐµĹ¥»÷»î¶¯¡£IOCONTROL´æ´¢ÔÚ¡°/usr/bin/¡±Ä¿Â¼ÖУ¬Ê¹ÓÃÄ£¿é»¯ÅäÖÃÊÊÓ¦²îÒìÉ豸£¬Í¨¹ýMQTTЭÒéÓëC2·þÎñÆ÷ͨÐÅ£¬²¢Ê¹ÓÃAES-256-CBC¼ÓÃÜÅäÖá£Ëü¿ÉÖ´ÐжàÖÖÃüÁÈç³ÂËßϵͳÐÅÏ¢¡¢È·È϶ñÒâÈí¼þ°²×°¡¢ÔËÐÐÈÎÒâÃüÁî¡¢×ÔÎÒɾ³ýºÍ¶Ë¿ÚɨÃèµÈ¡£


https://www.bleepingcomputer.com/news/security/new-iocontrol-malware-used-in-critical-infrastructure-attacks/


5. Byte Federal±ÈÌرÒATMÔËÓªÉÌÔâºÚ¿Í¹¥»÷


12ÔÂ12ÈÕ£¬ÃÀ¹ú±ÈÌرÒATMÔËÓªÉÌByte FederalÔâÓöÁËÒ»´ÎÊý¾Ýй¶Ê¼þ£¬ºÚ¿ÍÀûÓÃÆäϵͳÉϵÄGitLab©¶´£¬Î´¾­ÊÚȨ·ÃÎÊÁËÆä·þÎñÆ÷£¬µ¼ÖÂ58,000Ãû¿Í»§µÄÊý¾Ý±»Ð¹Â¶¡£¸Ã¹«Ë¾ÔÚ·¢ÏÖʼþºóÁ¢¼´¹Ø±ÕÁËƽ̨£¬¸ôÀëÁ˲»Á¼ÐÐΪÕߣ¬²¢±£»¤ÁËÊÜѬȾµÄ·þÎñÆ÷¡£ÊÜÓ°ÏìµÄÃô¸ÐÐÅÏ¢°üÂÞÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢Õþ¸®Ç©·¢µÄÉí·ÝÖ¤¡¢Éç»áÄþ¾²ºÅÂë¡¢½»Ò׻¡¢Óû§ÕÕƬµÈ¡£Byte Federal¶ÔËùÓпͻ§ÕË»§½øÐÐÁË¡°Ó²ÖØÖá±£¬¸üÐÂÁËÄÚ²¿ÃÜÂëºÍÕË»§¹ÜÀíϵͳ£¬²¢È¡ÏûÁËÄÚ²¿ÍøÂç·ÃÎʵÄÁîÅƺÍÃÜÔ¿¡£ËäÈ»Óû§×ʽðºÍÊý×Ö×ʲúδÊÜË𣬵«Ãô¸ÐÐÅÏ¢µÄй¶¿ÉÄÜʹ¼ÓÃÜ»õ±Ò³ÖÓÐÕßÃæÁÙSIM¿¨½»»»¹¥»÷¡¢ÕË»§½Ó¹Ü»òÆäËûÍøÂçµöÓã¹¥»÷µÄ·çÏÕ¡£Byte Federal½¨ÒéÊÜÓ°ÏìµÄÈ˶Ôδ¾­ÇëÇóµÄͨÐű£³Ö¾¯Ì裬²¢¶¨ÆÚ¼ì²éÕË»§±¨±íºÍÐÅÓóÂËßÒÔ·À·¶ÆÛÕ©ºÍÉí·Ý͵ÇÔ¡£¸Ã¹«Ë¾ÉèÁ¢ÁËרÃŵÄ×ÊÖúÈÈÏß¹©ÈËÃǽâ¾öÒÉÂÇ¡£


https://www.bleepingcomputer.com/news/security/bitcoin-atm-firm-byte-federal-hacked-via-gitlab-flaw-58k-users-exposed/


6. ¶íÂÞ˹×éÖ¯TurlaÒþ²ØÔÚÆäËûºÚ¿Í±³ºó¹¥»÷ÎÚ¿ËÀ¼


12ÔÂ11ÈÕ£¬¶íÂÞ˹ÍøÂç¼äµý×éÖ¯Turla£¨Óֳơ°ÃØÃܱ©Ñ©¡±£©±»ÆØÕýÔÚÀûÓÃÆäËûºÚ¿Í×éÖ¯µÄ»ù´¡ÉèÊ©¹¥»÷ÎÚ¿ËÀ¼Í¨¹ýStarlinkÁ¬½ÓµÄ¾üÊÂÉ豸¡£Î¢ÈíºÍLumen½ÒʾÁËTurlaÈçºÎ½Ù³Ö»òʹÓðͻù˹̹ºÚ¿Í×éÖ¯Storm-0156µÄ¶ñÒâÈí¼þºÍ·þÎñÆ÷£¬ÒÔ¼°ÈçºÎÀûÓÃAmadey½©Ê¬ÍøÂçºÍ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-1837µÄ»ù´¡ÉèÊ©£¬ÔÚÎÚ¿ËÀ¼ÏµÍ³Éϲ¿ÊðÆä×Ô½ç˵¶ñÒâÈí¼þ£¬ÈçTavdigºÍKazuarV2¡£ÕâЩ¹¥»÷ʼÓÚÍøÂçµöÓãµç×ÓÓʼþ£¬ÀûÓöñÒ⸽¼þ¡¢Storm-1837ºóÃÅ»òAmadey½©Ê¬ÍøÂ粿ÊðÓÐЧÔغÉ¡£Î¢ÈíÖ¸³ö£¬TurlaÀûÓñ»Í¶·ÅµÄÅú´¦ÖÃÎļþÌṩµÄÕì²ìÐÅÏ¢£¬Ê¶±ðÁ¬½Óµ½Starlink»¥ÁªÍøϵͳµÄ¾üÊÂÉ豸µÈ¸ßÓÅÏȼ¶Ä¿±ê¡£TurlaµÄ¶¨ÖƶñÒâÈí¼þ¼Ò×åTavdigºÍKazuarV2ÔÚÆä¼äµý»î¶¯Öз¢»Ó×ÅÆæÌØ×÷Óã¬Ç°ÕßÓÃÓÚ½¨Á¢³õʼÁ¢×ãµãºÍ¼àÊÓ£¬ºóÕßÔòרעÓÚºã¾ÃÇ鱨ÊÕ¼¯¡¢ÃüÁîÖ´ÐкÍÊý¾Ýй¶¡£Î¢Èí½¨Òé·ÀÓùÕß¼ì²éÆäÌá³öµÄ»º½â´ëÊ©ºÍËÑË÷²éѯ£¬ÒÔÓ¦¶ÔTurlaµÄ»î¶¯¡£


https://www.bleepingcomputer.com/news/security/russian-cyber-spies-hide-behind-other-hackers-to-target-ukraine/