Yandex°üÀ¨Ô´´úÂëÔÚÄÚµÄ44.7GBÊý¾Ý±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳
Ðû²¼Ê±¼ä 2023-01-30
¾ÝýÌå1ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚBrached ForumsÉÏÐû²¼ÁËYandexµÄ44.7 GBÊý¾Ý£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô´´úÂë´æ´¢¿â¡£¡£¡£¡£¡£YandexÒ²³ÆÎª¶íÂÞ˹¹È¸è£¬£¬£¬£¬£¬£¬´Ë´Îй¶²»Éæ¼°Óû§ºÍÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬£¬£¬¿ÉÊǰüÀ¨1900¶à¸öÓÃÓÚ¶ÔËÑË÷Ч¹û¾ÙÐÐÅÅÃûµÄÒòËØ¡£¡£¡£¡£¡£YandexÌåÏÖËüÖªµÀ´Ëй¶£¬£¬£¬£¬£¬£¬²¢ÇÒÒѾ×îÏÈÊÓ²ìÆäÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£µ«Æä·ñ¶¨Ôâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬£¬²¢Í¸Â¶¸ÃÊÂÎñ¿ÉÄÜÓ빫˾µÄǰ¹ÍÔ±Óйء£¡£¡£¡£¡£Yandex¾³£Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬2016ÄêÆä630Íò¸öÓû§µÄÊý¾Ý±»³öÊÛ£¬£¬£¬£¬£¬£¬2021Äê9ÔÂÓÖÔâµ½ÁËÉæ¼°200000¸ö±»Ñ¬È¾ÎïÁªÍø×°±¸µÄDDoS¹¥»÷¡£¡£¡£¡£¡£
https://www.hackread.com/yandex-source-code-hacked-leaked/
2¡¢Killnet DDoS¹¥»÷µÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍÒøÐеÄÍøÕ¾
ýÌå1ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯KillnetÊÇÕë¶ÔµÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍ½ðÈÚ×éÖ¯ÍøÕ¾µÄDDoS¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£¡£¡£¡£½²»°È˳ƣ¬£¬£¬£¬£¬£¬Áª°îÍøÂçÇå¾²¾Ö£¨BSI£©ÕýÔÚÊÓ²ìÕë¶ÔµÂ¹ú×éÖ¯µÄDDoS¹¥»÷£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô»ú³¡ÍøÕ¾£¬£¬£¬£¬£¬£¬½ðÈÚÐÐÒµÒÔ¼°Áª°îºÍÖÝÕþ¸®µÄÍøÕ¾¡£¡£¡£¡£¡£KillnetÔÚÆäTelegramƵµÀÉÏÐû²¼ÁËÕâЩ¹¥»÷£¬£¬£¬£¬£¬£¬ÕâÊǸÃ×éÖ¯µÄϰÓÃ×ö·¨¡£¡£¡£¡£¡£BSIÌåÏÖ£¬£¬£¬£¬£¬£¬¶ÔÐÐÕþ²¿·ÖµÄ¹¥»÷ÔںܺéÁ÷ƽÉÏÒѱ»×èÖ¹£¬£¬£¬£¬£¬£¬Ã»ÓÐÔì³ÉÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£¡£
https://securityaffairs.com/141513/hacktivism/killnet-targets-germany.html
3¡¢ÀÍÑάÑǹú·À²¿Ôâµ½ºÚ¿ÍÍÅ»ïGamaredonµÄ´¹ÂÚ¹¥»÷
ýÌå1ÔÂ28Èճƣ¬£¬£¬£¬£¬£¬ÀÍÑάÑǹú·À²¿Ôâµ½ÁËGamaredonµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¹ú·À²¿Í¸Â¶ºÚ¿Íð³äÎÚ¿ËÀ¼Õþ¸®¹ÙÔ±ÏòÆä¼¸ÃûÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬µ«²¢Î´Àֳɡ£¡£¡£¡£¡£¹¥»÷»î¶¯µÄѬȾÁ´ÎªHTMLSmuggling -> ZIP -> LNK -> HTA£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËÓòÃûadmou[.]orgÀ´·¢ËÍÓʼþ£¬£¬£¬£¬£¬£¬¸ÃÓò±»ÒÔΪÓëGamaredonÓÐÏà¹ØÁª¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£GamaredonÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼£¬£¬£¬£¬£¬£¬CERT-UA³Æ2022ÄêÎÚ¿ËÀ¼¼Í¼ÁË70¶àÆðÓë¸ÃÍÅ»ïÏà¹ØµÄ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£
https://therecord.media/latvia-confirms-phishing-attack-on-ministry-of-defense-linking-it-to-russian-hacking-group/
4¡¢Î¢Èí³ÆÂ·ÓÉÆ÷IP¸ü¸Äµ¼ÖÂMicrosoft 365ÖÐÖ¹³¤´ïÎåСʱ
¾Ý1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Î¢Èí͸¶ÉÏÖÜMicrosoft 365ÔÚÈ«Çò¹æÄ£ÄÚÖÐÖ¹³¤´ïÎåСʱÊÇÓÉ·ÓÉÆ÷IPµØµã¸ü¸ÄÒýÆðµÄ£¬£¬£¬£¬£¬£¬¸Ã¸ü¸Äµ¼ÖÂÆä¹ãÓòÍø(WAN)ÖÐËùÓÐÆäËü·ÓÉÆ÷Ö®¼äµÄÊý¾Ý°üת·¢·ºÆðÎÊÌâ¡£¡£¡£¡£¡£Redmond»¨ÁËÎå¸ö¶àСʱ²Å½â¾öÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬´Ó2023Äê1ÔÂ25ÈÕ07:05µ½12:43¡£¡£¡£¡£¡£Î¢Èí»¹Í¸Â¶£¬£¬£¬£¬£¬£¬µ±Ê¹ÓÃδ¾³¹µ×Éó²éÇÒÔÚ²î±ðÍøÂç×°±¸ÉϾßÓвî±ðÐÐΪµÄÏÂÁî¸ü¸ÄWAN·ÓÉÆ÷µÄIPµØµãʱ£¬£¬£¬£¬£¬£¬»á´¥·¢¸ÃÎÊÌâ¡£¡£¡£¡£¡£ÔÚ´ËÊÂÎñÖ®ºó£¬£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖËüÏÖÔÚÕýÔÚ×èÖ¹Ö´ÐÐÓ°ÏìºÜ´óµÄÏÂÁ£¬£¬£¬£¬£¬²¢ÇÒ»¹½«ÒªÇóËùÓÐÏÂÁîµÄÖ´Ðж¼×ñÕÕÇå¾²ÉèÖøü¸ÄµÄ×¼Ôò¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-wan-router-ip-change/
5¡¢SOLAR INDUSTRIES INDIAÔ¼2TBµÄ¾üÊÂÉñÃØÊý¾Ýй¶
ýÌå1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlackCat³ÆÒÑÈëÇÖSOLAR INDUSTRIES INDIA²¢ÇÔÈ¡ÁË2TBµÄ¾üÊÂÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÊÇÈ«Çò¹«ÈϵĹ¤ÒµÕ¨Ò©ÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬ÌṩÍêÕûµÄ±¬ÆÆ½â¾ö¼Æ»®¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ô±¹¤ºÍ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢ÖÖÖÖȪԴµÄ¾ü±¸¹©Ó¦Á´¡¢ÎäÆ÷µÄÀ¶Í¼ºÍ¹¤³ÌÎļþÒÔ¼°Õþ¸®Îļþϸ½ÚµÈ¡£¡£¡£¡£¡£BlackCatÐû²¼Á˱»µÁÎļþµÄ½ØÍ¼ºÍ´Ó¹«Ë¾ÉãÏñÍ·ÅÄÉãµÄÕÕÆ¬×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÓµÓÐÔÚÆäËû¹ú¼Ò¾ÙÐÐÌØ¹¤»î¶¯µÄÖ¤¾Ý¡£¡£¡£¡£¡£
https://securityaffairs.com/141409/data-breach/blackcat-ransomware-solar-industries-india.html
6¡¢¹ú¼ÊÁªºÏÖ´·¨Ðж¯Àֳɲé»ñÀÕË÷Èí¼þHiveµÄ»ù´¡ÉèÊ©
¾ÝýÌå1ÔÂ26Èճƣ¬£¬£¬£¬£¬£¬¹ú¼ÊÁªºÏÖ´·¨Ðж¯ÀÖ³ÉÒѲé»ñÓëHiveÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)»î¶¯Ïà¹ØµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£ÃÀ¹úDoJÌåÏÖ£¬£¬£¬£¬£¬£¬FBIÓÚ2022Äê7ÔÂÉøÍ¸ÁËHiveÊý¾Ý¿âЧÀÍÆ÷£¬£¬£¬£¬£¬£¬»ñµÃÁË336¸ö½âÃÜÃÜÔ¿²¢ÌṩӦȫÇò¹æÄ£ÄÚ±»¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬½ÚÔ¼ÁË1.3ÒÚÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬FBI»ñµÃÁ˼ÓÀû¸£ÄáÑÇÒ»¼ÒÍйÜЧÀÍÌṩÉ̵ÄÁ½Ì¨×¨ÓÃЧÀÍÆ÷ºÍһ̨ÐéÄâרÓÃЧÀÍÆ÷µÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬ËûÃÇÓÉHive³ÉÔ±×âÓᣡ£¡£¡£¡£ÔÚе÷Ðж¯ÖУ¬£¬£¬£¬£¬£¬ºÉÀ¼¾¯·½»¹»ñµÃÁ˶ÔÔÚºÉÀ¼ÍйܵÄÁ½¸ö±¸·ÝרÓÃЧÀÍÆ÷µÄ»á¼ûȨ¡£¡£¡£¡£¡£
https://thehackernews.com/2023/01/hive-ransomware-infrastructure-seized.html


¾©¹«Íø°²±¸11010802024551ºÅ