Yandex°üÀ¨Ô´´úÂëÔÚÄÚµÄ44.7GBÊý¾Ý±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳

Ðû²¼Ê±¼ä 2023-01-30
1¡¢Yandex°üÀ¨Ô´´úÂëÔÚÄÚµÄ44.7GBÊý¾Ý±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳

      

¾ÝýÌå1ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚBrached ForumsÉÏÐû²¼ÁËYandexµÄ44.7 GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô´´úÂë´æ´¢¿â¡£¡£¡£YandexÒ²³ÆÎª¶íÂÞ˹¹È¸è£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶²»Éæ¼°Óû§ºÍÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¿ÉÊǰüÀ¨1900¶à¸öÓÃÓÚ¶ÔËÑË÷Ч¹û¾ÙÐÐÅÅÃûµÄÒòËØ¡£¡£¡£YandexÌåÏÖËüÖªµÀ´Ëй¶£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÒѾ­×îÏÈÊÓ²ìÆäÔµ¹ÊÔ­ÓÉ¡£¡£¡£µ«Æä·ñ¶¨Ôâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Í¸Â¶¸ÃÊÂÎñ¿ÉÄÜÓ빫˾µÄǰ¹ÍÔ±Óйء£¡£¡£Yandex¾­³£Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬2016ÄêÆä630Íò¸öÓû§µÄÊý¾Ý±»³öÊÛ£¬£¬£¬£¬£¬£¬£¬2021Äê9ÔÂÓÖÔâµ½ÁËÉæ¼°200000¸ö±»Ñ¬È¾ÎïÁªÍø×°±¸µÄDDoS¹¥»÷¡£¡£¡£


https://www.hackread.com/yandex-source-code-hacked-leaked/


2¡¢Killnet DDoS¹¥»÷µÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍÒøÐеÄÍøÕ¾

      

ýÌå1ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯KillnetÊÇÕë¶ÔµÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍ½ðÈÚ×éÖ¯ÍøÕ¾µÄDDoS¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£¡£½²»°È˳ƣ¬£¬£¬£¬£¬£¬£¬Áª°îÍøÂçÇå¾²¾Ö£¨BSI£©ÕýÔÚÊÓ²ìÕë¶ÔµÂ¹ú×éÖ¯µÄDDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô»ú³¡ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬½ðÈÚÐÐÒµÒÔ¼°Áª°îºÍÖÝÕþ¸®µÄÍøÕ¾¡£¡£¡£KillnetÔÚÆäTelegramƵµÀÉÏÐû²¼ÁËÕâЩ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÕâÊǸÃ×éÖ¯µÄϰÓÃ×ö·¨¡£¡£¡£BSIÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¶ÔÐÐÕþ²¿·ÖµÄ¹¥»÷ÔںܺéÁ÷ƽÉÏÒѱ»×èÖ¹£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÔì³ÉÑÏÖØµÄÓ°Ïì¡£¡£¡£


https://securityaffairs.com/141513/hacktivism/killnet-targets-germany.html


3¡¢À­ÍÑάÑǹú·À²¿Ôâµ½ºÚ¿ÍÍÅ»ïGamaredonµÄ´¹ÂÚ¹¥»÷

      

ýÌå1ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬£¬À­ÍÑάÑǹú·À²¿Ôâµ½ÁËGamaredonµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¹ú·À²¿Í¸Â¶ºÚ¿Íð³äÎÚ¿ËÀ¼Õþ¸®¹ÙÔ±ÏòÆä¼¸ÃûÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´Àֳɡ£¡£¡£¹¥»÷»î¶¯µÄѬȾÁ´ÎªHTMLSmuggling -> ZIP -> LNK -> HTA£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËÓòÃûadmou[.]orgÀ´·¢ËÍÓʼþ£¬£¬£¬£¬£¬£¬£¬¸ÃÓò±»ÒÔΪÓëGamaredonÓÐÏà¹ØÁª¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£GamaredonÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼£¬£¬£¬£¬£¬£¬£¬CERT-UA³Æ2022ÄêÎÚ¿ËÀ¼¼Í¼ÁË70¶àÆðÓë¸ÃÍÅ»ïÏà¹ØµÄ¹¥»÷ÊÂÎñ¡£¡£¡£


https://therecord.media/latvia-confirms-phishing-attack-on-ministry-of-defense-linking-it-to-russian-hacking-group/


4¡¢Î¢Èí³ÆÂ·ÓÉÆ÷IP¸ü¸Äµ¼ÖÂMicrosoft 365ÖÐÖ¹³¤´ïÎåСʱ

      

¾Ý1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î¢Èí͸¶ÉÏÖÜMicrosoft 365ÔÚÈ«Çò¹æÄ£ÄÚÖÐÖ¹³¤´ïÎåСʱÊÇÓÉ·ÓÉÆ÷IPµØµã¸ü¸ÄÒýÆðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¸ü¸Äµ¼ÖÂÆä¹ãÓòÍø(WAN)ÖÐËùÓÐÆäËü·ÓÉÆ÷Ö®¼äµÄÊý¾Ý°üת·¢·ºÆðÎÊÌâ¡£¡£¡£Redmond»¨ÁËÎå¸ö¶àСʱ²Å½â¾öÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬£¬´Ó2023Äê1ÔÂ25ÈÕ07:05µ½12:43¡£¡£¡£Î¢Èí»¹Í¸Â¶£¬£¬£¬£¬£¬£¬£¬µ±Ê¹ÓÃδ¾­³¹µ×Éó²éÇÒÔÚ²î±ðÍøÂç×°±¸ÉϾßÓвî±ðÐÐΪµÄÏÂÁî¸ü¸ÄWAN·ÓÉÆ÷µÄIPµØµãʱ£¬£¬£¬£¬£¬£¬£¬»á´¥·¢¸ÃÎÊÌâ¡£¡£¡£ÔÚ´ËÊÂÎñÖ®ºó£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖËüÏÖÔÚÕýÔÚ×èÖ¹Ö´ÐÐÓ°ÏìºÜ´óµÄÏÂÁ£¬£¬£¬£¬£¬£¬²¢ÇÒ»¹½«ÒªÇóËùÓÐÏÂÁîµÄÖ´Ðж¼×ñÕÕÇå¾²ÉèÖøü¸ÄµÄ×¼Ôò¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-wan-router-ip-change/


5¡¢SOLAR INDUSTRIES INDIAÔ¼2TBµÄ¾üÊÂÉñÃØÊý¾Ýй¶

      

ýÌå1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlackCat³ÆÒÑÈëÇÖSOLAR INDUSTRIES INDIA²¢ÇÔÈ¡ÁË2TBµÄ¾üÊÂÉñÃØÊý¾Ý¡£¡£¡£¸Ã¹«Ë¾ÊÇÈ«Çò¹«ÈϵĹ¤ÒµÕ¨Ò©ÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬£¬ÌṩÍêÕûµÄ±¬ÆÆ½â¾ö¼Æ»®¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ô±¹¤ºÍ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢ÖÖÖÖȪԴµÄ¾ü±¸¹©Ó¦Á´¡¢ÎäÆ÷µÄÀ¶Í¼ºÍ¹¤³ÌÎļþÒÔ¼°Õþ¸®Îļþϸ½ÚµÈ¡£¡£¡£BlackCatÐû²¼Á˱»µÁÎļþµÄ½ØÍ¼ºÍ´Ó¹«Ë¾ÉãÏñÍ·ÅÄÉãµÄÕÕÆ¬×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÓµÓÐÔÚÆäËû¹ú¼Ò¾ÙÐÐÌØ¹¤»î¶¯µÄÖ¤¾Ý¡£¡£¡£


https://securityaffairs.com/141409/data-breach/blackcat-ransomware-solar-industries-india.html


6¡¢¹ú¼ÊÁªºÏÖ´·¨Ðж¯Àֳɲé»ñÀÕË÷Èí¼þHiveµÄ»ù´¡ÉèÊ©

      

¾ÝýÌå1ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬£¬¹ú¼ÊÁªºÏÖ´·¨Ðж¯ÀÖ³ÉÒѲé»ñÓëHiveÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)»î¶¯Ïà¹ØµÄ»ù´¡ÉèÊ©¡£¡£¡£ÃÀ¹úDoJÌåÏÖ£¬£¬£¬£¬£¬£¬£¬FBIÓÚ2022Äê7ÔÂÉøÍ¸ÁËHiveÊý¾Ý¿âЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬»ñµÃÁË336¸ö½âÃÜÃÜÔ¿²¢ÌṩӦȫÇò¹æÄ£ÄÚ±»¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬½ÚÔ¼ÁË1.3ÒÚÃÀÔªµÄÊê½ð¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬FBI»ñµÃÁ˼ÓÀû¸£ÄáÑÇÒ»¼ÒÍйÜЧÀÍÌṩÉ̵ÄÁ½Ì¨×¨ÓÃЧÀÍÆ÷ºÍһ̨ÐéÄâרÓÃЧÀÍÆ÷µÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÓÉHive³ÉÔ±×âÓᣡ£¡£ÔÚЭµ÷Ðж¯ÖУ¬£¬£¬£¬£¬£¬£¬ºÉÀ¼¾¯·½»¹»ñµÃÁ˶ÔÔÚºÉÀ¼ÍйܵÄÁ½¸ö±¸·ÝרÓÃЧÀÍÆ÷µÄ»á¼ûȨ¡£¡£¡£


https://thehackernews.com/2023/01/hive-ransomware-infrastructure-seized.html