±±Ô¼·å»áʱ´ú¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢¶¯DDoS¹¥»÷
Ðû²¼Ê±¼ä 2025-06-261. ±±Ô¼·å»áʱ´ú¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢¶¯DDoS¹¥»÷
6ÔÂ24ÈÕ£¬£¬£¬£¬£¬ÔÚ±±Ô¼·å»áÓÚºÉÀ¼º£ÑÀ¾ÙÐÐÖ®¼Ê£¬£¬£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)Éù³Æ¶ÔΪÊÐÕþÕþ¸®ºÍÆäËûÕþÖλú¹¹ÌṩIT½â¾ö¼Æ»®µÄNotuBiz¹«Ë¾·¢¶¯ÁËDDoS¹¥»÷£¬£¬£¬£¬£¬µ¼Ö°üÀ¨Ö÷ÒªÎļþµÄÒ³ÃæÔÝʱÎÞ·¨»á¼û¡£¡£¡£¡£ÔÚ·å»áʱ´ú£¬£¬£¬£¬£¬±±Ô¼ÓÑ°î¸æ¿¢Á˽«¹ú·À¿ªÖ§Ä¿µÄÉ趨Ϊº£ÄÚÉú²ú×ÜÖµ£¨GDP£©5%µÄÐÒ飬£¬£¬£¬£¬ÕâÊÇÃÀ¹ú×ÜÍ³ÌÆÄɵ¡¤ÌØÀÊÆÕ×î³õÌá³öµÄÒªÇ󡣡£¡£¡£ÆäÖÐ3.5%½«Ö±½Ó²¦¸ø¹ú·À²¿£¬£¬£¬£¬£¬ÆäÓà1.5%Ôò·ÖÅɸøÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©µÈÏà¹ØÁìÓòµÄ¸üÆÕ±éͶ×Ê¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÕâÒ»Ö÷ÒªµÄ¹ú¼Ê¾Û»áÒ²³ÉΪÁ˺ڿͷ¢¶¯ÍøÂç¹¥»÷µÄ¾ø¼Ñʱ»ú¡£¡£¡£¡£NoName057(16)×éÖ¯ÓÉһȺ¾ÝÐÅÊܶíÂÞ˹×ÊÖúµÄºÚ¿ÍÐж¯Ö÷ÒåÍøÂçÇ徲ר¼Ò×é³É£¬£¬£¬£¬£¬Ôø¹¥»÷¹ý³Ö·´¶í̬¶ÈµÄ¹ú¼ÒºÍ×éÖ¯£¬£¬£¬£¬£¬°üÀ¨±ÈÀûʱ¡¢Òâ´óÀû¡¢ºÉÀ¼ºÍÎÚ¿ËÀ¼¡£¡£¡£¡£´Ë´Î£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚTelegramÉÏÉù³Æ£¬£¬£¬£¬£¬ÆäÄ¿µÄÊǺÉÀ¼µÄ±±Ô¼µØÇø´ú±í´¦ÒÔ¼°°üÀ¨Ë¹º£¶ûÍк಩˹¡¢´ú¶û·òÌØºÍº£ÑÀÔÚÄڵöÊÐÕòºÍÊ¡·Ý¡£¡£¡£¡£º£ÑÀÊÐÕþ¸®ÖÜÒ»±¨¸æ³Æ£¬£¬£¬£¬£¬¶à¼Ò¹©Ó¦ÉÌ×¢ÖØµ½ÆäϵͳÔâÓö´ó×ÚÍøÂçÁ÷Á¿¡£¡£¡£¡£Ò»Î»½²»°ÈË֤ʵ£¬£¬£¬£¬£¬ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬£¬£¬º£ÑÀÊÐÕþ¸®Ê¹ÓõĶà¸öÓòÃûÓÐʱÊܵ½ÏÞÖÆ»òÎÞ·¨»á¼û¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ITЧÀÍÌṩÉÌNotuBizÒ²ÈÏ¿ÉÆäÏµÍ³ÍøÂçÁ÷Á¿Öش󣬣¬£¬£¬£¬µ«¹«Ë¾µÄ·À»ðǽÓÐÓõظôÀëÁËÈßÓàÁ÷Á¿£¬£¬£¬£¬£¬Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬£¬»á¼ûÕß¼ÓÔØ°üÀ¨¹Ù·½ÎļþµÄÒ³ÃæÈÔÐèÒªºÜ³¤Ê±¼ä¡£¡£¡£¡£
https://cybernews.com/news/russian-hackers-ddos-attack-netherlands/
2. Unit 42½ÒÆÆÕë¶Ô·ÇÖÞ½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâ»î¶¯
6ÔÂ25ÈÕ£¬£¬£¬£¬£¬Palo Alto NetworksÆìϵÄUnit 42Ñо¿ÍŶӿËÈÕ·¢Ã÷ÁËÒ»ÏîÕë¶Ô·ÇÖÞ¶à¼Ò½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâ»î¶¯£¬£¬£¬£¬£¬¸Ã»î¶¯±»×·×ÙΪCL-CRI-1014¡£¡£¡£¡£¾ÝUnit 42Ñо¿Ö°Ô±ÆÀ¹À£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Õß×Ô2023ÄêÒÔÀ´±ãÒ»Ö±»îÔ¾ÓÚ·ÇÖÞ½ðÈÚÐÐÒµ£¬£¬£¬£¬£¬ÊÎÑÝ×ųõʼ»á¼û¾¼ÍÈË£¨IABs£©µÄ½ÇÉ«£¬£¬£¬£¬£¬¼´ÏÈ»ñȡĿµÄµÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ÔÙÔÚ°µÍøÉϽ«Æä³öÊÛ¸øÆäËû¹¥»÷Õߣ¬£¬£¬£¬£¬´Ó¶øÄ²È¡²»·¨ÀûÒæ¡£¡£¡£¡£ÎªÁËʵÑé¹¥»÷£¬£¬£¬£¬£¬CL-CRI-1014¹¥»÷ÕßʹÓÃÁËһϵÁпªÔ´¹¤¾ßºÍ¹ûÕæ¿ÉÓõÄÈí¼þ¡£¡£¡£¡£¹¥»÷ÕßÊ×ÏÈʹÓÃPsExecÔ¶³ÌÅþÁ¬µ½Áíһ̨»úе×÷ΪÊðÀí£¬£¬£¬£¬£¬È»ºóÔÚÊðÀí»úеÉÏʹÓÃChiselÅþÁ¬µ½¶ą̀»úе¡£¡£¡£¡£ÔÚ²¿·Ö»úеÉÏ£¬£¬£¬£¬£¬¹¥»÷ÕßͶµÝPoshC2²¢¾ÙÐÐÕì̽»î¶¯£¬£¬£¬£¬£¬ÍøÂçÁ÷Á¿Í¨¹ýChiselËíµÀ´«Êä¡£¡£¡£¡£ÔÚÆäËû»úеÉÏ£¬£¬£¬£¬£¬¹¥»÷ÕßÔòÔËÐÐPowerShell²¢×°ÖÃClassroom Spy£¬£¬£¬£¬£¬ÒÔʵÏÖ¸üÖÜÈ«µÄ¼à¿ØºÍ¿ØÖÆ¡£¡£¡£¡£ÏÖÔÚ²¢Ã»ÓÐÖ¤¾ÝÅú×¢CL-CRI-1014»î¶¯Ê¹ÓÃÁËÄ¿µÄ×éÖ¯²úÆ·»òЧÀÍÖеÄÈκÎÎó²î¡£¡£¡£¡£ÕâÒâζ׏¥»÷Õß¿ÉÄܸü¶àµØÒÀÀµÓÚÉç»á¹¤³ÌѧÊֶΡ¢ÈõÃÜÂë»òÆäËû·ÇÊÖÒÕÐÔÎó²îÀ´»ñÈ¡³õʼ»á¼ûȨÏÞ¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/
3. ³¯ÏÊÐÂÒ»ÂÖ¡°Ñ¬È¾ÐÔÃæÊÔ¡±¹¥»÷ʹÓöñÒânpm°üʵÑéÇÔÃÜ
6ÔÂ25ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬³¯ÏÊÌᳫµÄÐÂÒ»ÂÖ¡°Ñ¬È¾ÐÔÃæÊÔ¡±»î¶¯ÒýÆðÁËÇå¾²½çµÄÆÕ±é¹Ø×¢¡£¡£¡£¡£´Ë´Î¹¥»÷Ö÷ÒªÃé×¼ÇóÖ°Õߣ¬£¬£¬£¬£¬ÌØÊâÊÇÈí¼þ¹¤³ÌʦºÍ¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬Í¨¹ý¶ñÒânpm°üѬȾËûÃǵÄ×°±¸£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢²¢Ö²ÈëºóÃÅ¡£¡£¡£¡£¾ÝSocket Threat Research±¨¸æ£¬£¬£¬£¬£¬ÕâЩ¶ñÒânpm°üÔÚÊܺ¦ÕߵĻúеÉϼÓÔØÁËÓ볯ÏÊÐÐΪÕßÓйصÄBeaverTailÐÅÏ¢ÇÔÈ¡³ÌÐòºÍInvisibleFerretºóÃÅ¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËͨ¹ý24¸öÕË»§Ìá½»µ½npmµÄ35¸ö¶ñÒâÈí¼þ°ü£¬£¬£¬£¬£¬ÕâЩÈí¼þ°ü×ܹ²±»ÏÂÔØÁËÁè¼Ý4000´Î£¬£¬£¬£¬£¬ÆäÖÐ6¸öÔÚ׫д±¨¸æÊ±ÈÔÈ»¿ÉÓᣡ£¡£¡£ÕâЩ¶ñÒânpm°üÌØÊâΣÏÕ£¬£¬£¬£¬£¬ÓÉÓÚËüÃÇÖÐÓм¸¸öÊÇÓòÃûÇÀ×¢»òÄ£Äâ×ÅÃûÇÒÊÜÐÅÈεĿ⣬£¬£¬£¬£¬Èçreact-plaid-sdk¡¢vite-plugin-next-refreshµÈ¡£¡£¡£¡£³¯ÏÊÌØ¹¤Ã°³äÕÐÆ¸Ö°Ô±£¬£¬£¬£¬£¬Í¨¹ýLinkedInºÍGoogle DocsÏò¿ª·¢Ö°Ô±ºÍÇóÖ°Õß·¢ËͱàÂ롰ʹÃü¡±£¬£¬£¬£¬£¬Ö¸µ¼ËûÃÇÏÂÔØÕâЩÈí¼þ°ü£¬£¬£¬£¬£¬²¢ÒªÇóÇóÖ°Õß¼ÓÈë²âÊÔÏîÄ¿¡£¡£¡£¡£ÕâЩ×÷Òµ±»Î±×°³ÉÕýµ±²âÊÔ£¬£¬£¬£¬£¬µ«ÏÖʵÉϻᴥ·¢Ñ¬È¾Á´£¬£¬£¬£¬£¬ÔÚÄ¿µÄÅÌËã»úÉÏͶ·Å¶à¸öÓÐÓÃÔØºÉ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-wave-of-fake-interviews-use-35-npm-packages-to-spread-malware/
4. ¸çÂ×±ÈÑÇ´óѧÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬Ð£Ô°ÏµÍ³·ºÆð´óÃæ»ý¹ÊÕÏ
6ÔÂ26ÈÕ£¬£¬£¬£¬£¬¸çÂ×±ÈÑÇ´óѧ¹ÙÔ±ÕýÔÚÊÓ²ìÒ»ÆðDZÔÚµÄÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬´ËǰÓÐѧÉú±¨¸æ³ÆÐ£Ô°ÄÚ·ºÆðÁË´óÃæ»ýµÄÊÖÒÕ¹ÊÕÏ£¬£¬£¬£¬£¬ÉõÖÁÔÚÆÁÄ»ÉÏ·ºÆðÁËÏ£ÆæµÄͼÏñ¡£¡£¡£¡£×ÔÖܶþÔçÉÏÒÔÀ´£¬£¬£¬£¬£¬¸ÃУµÄÍøÕ¾ºÍÆäËûϵͳһֱ´¦ÓÚ¼äЪÐÔÀëÏß״̬£¬£¬£¬£¬£¬¸øÊ¦ÉúµÄÒ»Ñùƽ³£Ñ§Ï°ºÍÊÂÇé´øÀ´Á˼«´óµÄδ±ã¡£¡£¡£¡£¾Ý¸çÂ×±ÈÑÇ´óѧµÄһλ½²»°ÈËÏòRecorded Future News͸¶£¬£¬£¬£¬£¬×òÌìÔçÉÏ£¬£¬£¬£¬£¬¸çÂ×±ÈÑÇ´óѧµÄITϵͳ±¬·¢¹ÊÕÏ£¬£¬£¬£¬£¬Ó°ÏìÁ˳¿±ßÐ£ÇøµÄϵͳÔËÐС£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Ñ§Ð£µÄITÍŶÓÕýÔÚÈ«Á¦ÒÔ¸°µØÆð¾¢»Ö¸´Ð§ÀÍ£¬£¬£¬£¬£¬²¢ÒÑ֪ͨÁËÖ´·¨²¿·Ö¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬£¬ÏÖÔÚ¸çÂ×±ÈÑÇ´óѧŷÎÄҽѧÖÐÐĵÄÁÙ´²ÔËÓªÉÐδÊܵ½Ó°Ïì¡£¡£¡£¡£Ò»Î»²»¿Ï͸¶ÐÕÃûµÄÖªÇéÈËÊ¿ÌåÏÖ£¬£¬£¬£¬£¬ÏÖÔÚ²¢Ã»ÓÐÊý¾Ýй¶»òÀÕË÷Èí¼þ¹¥»÷µÄ¼£Ï󣬣¬£¬£¬£¬¸çÂ×±ÈÑÇ´óѧµÄÏµÍ³ËÆºõûÓÐÊܵ½¡°Éî¶ÈÈëÇÖ¡±¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Ñ§ÉúÃÇÔÚÉ罻ýÌåÉÏ·ÖÏíµÄÕÕÆ¬È´ÏÔʾ£¬£¬£¬£¬£¬Ð£Ô°ÄÚµÄÊý×Ö±êÅÆ±»½ÓÊÜ£¬£¬£¬£¬£¬²¢Ì滻ΪÁËÌÆÄɵ¡¤ÌØÀÊÆÕ×ÜͳµÄͼÏñ¡£¡£¡£¡£¾ÝУ±¨¡¶¸çÂ×±ÈÑÇÊÓ²ì¼Ò±¨¡·±¨µÀ£¬£¬£¬£¬£¬Ñ§ÉúÃÇÎÞ·¨µÇÈÎÃüÓÚ»á¼ûµç×ÓÓʼþÕË»§ºÍ×÷ҵƽ̨µÄÉí·ÝÑé֤ЧÀÍ¡£¡£¡£¡£Ñ§Ð£ÔÚÖܶþÒ»Á¬·¢³öÁ˶àÌõÐÂÎÅ£¬£¬£¬£¬£¬ÖÒÑÔЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬²¢±Þ²ß½ÌÊÚÃÇÁíÐа²Åſγ̡£¡£¡£¡£
https://therecord.media/columbia-university-technology-outages
5. CitrixÖÒÑÔNetScaler×°±¸Îó²îCVE-2025-6543ÔâÆÕ±éʹÓÃ
6ÔÂ25ÈÕ£¬£¬£¬£¬£¬Citrix¹«Ë¾·¢³ö½ôÆÈÖÒÑÔ£¬£¬£¬£¬£¬Ö¸³öÆäNetScaler×°±¸ÖÐÒ»¸ö±»×·×ÙΪCVE-2025-6543µÄÎó²îÕýÔÚ±»ÆÕ±éʹÓ㬣¬£¬£¬£¬µ¼ÖÂ×°±¸½øÈë¾Ü¾øÐ§ÀÍ״̬£¬£¬£¬£¬£¬½ø¶øÀëÏß¡£¡£¡£¡£ÕâÒ»Îó²îÄÚ²¿¸ú×Ù±àºÅΪCTX694788£¬£¬£¬£¬£¬ÊÇÒ»¸öÑÏÖØµÄÇå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÓÉδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÇëÇó´¥·¢£¬£¬£¬£¬£¬¶ÔNetScaler ADCºÍNetScaler Gateway×°±¸×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¾ÝCitrix¹«Ë¾Í¸Â¶£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìNetScaler ADCºÍNetScaler GatewayµÄ¶à¸ö°æ±¾£¬£¬£¬£¬£¬½öÓ°ÏìÉèÖÃÎªÍø¹Ø£¨ÈçVPNÐéÄâЧÀÍÆ÷¡¢ICAÊðÀí¡¢ÎÞ¿Í»§¶ËVPN (CVPN)¡¢RDPÊðÀí£©»òAAAÐéÄâЧÀÍÆ÷µÄNetScaler×°±¸¡£¡£¡£¡£Citrix¹«Ë¾ÒѾÕë¶Ô´ËÎó²îÐû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÔÚÖÎÀíÔ±´¦Öóͷ£´ËÎó²îµÄͬʱ£¬£¬£¬£¬£¬Citrix¹«Ë¾»¹·¢³öÁ˹ØÓÚÁíÒ»¸ö±»³ÆÎªCitrixBleed 2µÄÑÏÖØNetScalerÎó²îµÄÖÒÑÔ¡£¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2025-5777£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ý´Ó×°±¸ÄÚ´æÖÐÌáÈ¡»á»°ÁîÅÆÀ´Ð®ÖÆÓû§»á»°£¬£¬£¬£¬£¬ÆäÑÏÖØÐÔ½ûÖ¹ºöÊÓ¡£¡£¡£¡£¼øÓÚÕâÁ½¸öÎó²îµÄÑÏÖØÐÔ£¬£¬£¬£¬£¬Citrix¹«Ë¾Ç¿ÁÒ½¨ÒéÖÎÀíÔ±¾¡¿ìÓ¦ÓÃ×îеIJ¹¶¡£¡£¡£¡£¬£¬£¬£¬£¬ÒÔÐÞ¸´ÕâЩÇå¾²Îó²î£¬£¬£¬£¬£¬±ÜÃâ×°±¸Êܵ½¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/
6. Mainline Health SystemsÊý¾Ýй¶ӰÏìÁè¼Ý10ÍòÈË
6ÔÂ25ÈÕ£¬£¬£¬£¬£¬Mainline Health Systems£¬£¬£¬£¬£¬Ò»¼Ò×Ô1978ÄêÆð±ãÔÚ°¢¿ÏÉ«Öݲ¨ÌØÀ¼ÔËÓªµÄÁª°îÈÏÖ¤·ÇÓªÀûÐÔÒ½ÁÆÖÐÐÄ£¬£¬£¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý10ÍòÈË¡£¡£¡£¡£¾ÝÊý¾Ýй¶֪ͨº¯ËùÊö£¬£¬£¬£¬£¬¸ÃÇå¾²ÊÂÎñ±¬·¢ÔÚ2024Äê4ÔÂ10ÈÕ×óÓÒ£¬£¬£¬£¬£¬Ó°ÏìÁ˹«Ë¾ÍøÂç¡£¡£¡£¡£Mainline Health SystemsÔÚ»ñϤ´ËÎÊÌâºó£¬£¬£¬£¬£¬Á¬Ã¦Õö¿ªÁËÖÜÈ«ÊӲ죬£¬£¬£¬£¬²¢½ÓÄÉÁ˶àÏî²½·¥ÒÔÓ¦¶Ô´Ë´ÎÊÂÎñ¡£¡£¡£¡£ËûÃDz»µ«½«´Ëʼû¸æÁËÁª°îÖ´·¨²¿·Ö£¬£¬£¬£¬£¬»¹Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬£¬²¢¶ÔÊÜÓ°ÏìµÄÎļþ¾ÙÐÐÁËÈ˹¤Éó²é¡£¡£¡£¡£¾ÓÉÉîÈëÊӲ죬£¬£¬£¬£¬¸Ã×éÖ¯ÓÚ2025Äê5ÔÂ21ÈÕÈ·ÈÏ£¬£¬£¬£¬£¬ÓÉÓÚ´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬Ä³Ð©°üÀ¨»¼ÕßÊܱ£»£»£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄÎļþÔâµ½ÁËδ¾ÊÚȨµÄ»á¼û»ò»ñÈ¡¡£¡£¡£¡£Inc Ransom×éÖ¯Éù³Æ¶Ô´Ë´ÎÏ®»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢½«Mainline Health SystemsÌí¼Óµ½ÁËÆäTor×ßÂ©ÍøÕ¾ÉÏ¡£¡£¡£¡£¹ØÓÚ´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Mainline Health SystemsÌåÏÖ½«È«Á¦ÅäºÏÁª°îÖ´·¨²¿·ÖµÄÊӲ죬£¬£¬£¬£¬²¢ÔöÇ¿×ÔÉíµÄÍøÂçÇå¾²·À»¤²½·¥£¬£¬£¬£¬£¬ÒÔ±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£¡£¡£
https://securityaffairs.com/179322/data-breach/mainline-health-systems-disclosed-a-data-breach.html


¾©¹«Íø°²±¸11010802024551ºÅ