Yandex°üÀ¨Ô´´úÂëÔÚÄÚµÄ44.7GBÊý¾Ý±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳

Ðû²¼Ê±¼ä 2023-01-30
1¡¢Yandex°üÀ¨Ô´´úÂëÔÚÄÚµÄ44.7GBÊý¾Ý±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳

      

¾ÝýÌå1ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬ºÚ¿ÍÔÚBrached ForumsÉÏÐû²¼ÁËYandexµÄ44.7 GBÊý¾Ý£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨Ô´´úÂë´æ´¢¿â¡£¡£¡£¡£¡£YandexÒ²³ÆÎª¶íÂÞ˹¹È¸è£¬£¬£¬£¬£¬ £¬´Ë´Îй¶²»Éæ¼°Óû§ºÍÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬£¬ £¬¿ÉÊǰüÀ¨1900¶à¸öÓÃÓÚ¶ÔËÑË÷Ч¹û¾ÙÐÐÅÅÃûµÄÒòËØ¡£¡£¡£¡£¡£YandexÌåÏÖËüÖªµÀ´Ëй¶£¬£¬£¬£¬£¬ £¬²¢ÇÒÒѾ­×îÏÈÊÓ²ìÆäÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£¡£µ«Æä·ñ¶¨Ôâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬ £¬²¢Í¸Â¶¸ÃÊÂÎñ¿ÉÄÜÓ빫˾µÄǰ¹ÍÔ±ÓйØ¡£¡£¡£¡£¡£Yandex¾­³£Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬2016ÄêÆä630Íò¸öÓû§µÄÊý¾Ý±»³öÊÛ£¬£¬£¬£¬£¬ £¬2021Äê9ÔÂÓÖÔâµ½ÁËÉæ¼°200000¸ö±»Ñ¬È¾ÎïÁªÍø×°±¸µÄDDoS¹¥»÷¡£¡£¡£¡£¡£


https://www.hackread.com/yandex-source-code-hacked-leaked/


2¡¢Killnet DDoS¹¥»÷µÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍÒøÐеÄÍøÕ¾

      

ýÌå1ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ £¬ºÚ¿Í×éÖ¯KillnetÊÇÕë¶ÔµÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍ½ðÈÚ×éÖ¯ÍøÕ¾µÄDDoS¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£¡£¡£¡£½²»°È˳Æ£¬£¬£¬£¬£¬ £¬Áª°îÍøÂçÇå¾²¾Ö£¨BSI£©ÕýÔÚÊÓ²ìÕë¶ÔµÂ¹ú×éÖ¯µÄDDoS¹¥»÷£¬£¬£¬£¬£¬ £¬ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô»ú³¡ÍøÕ¾£¬£¬£¬£¬£¬ £¬½ðÈÚÐÐÒµÒÔ¼°Áª°îºÍÖÝÕþ¸®µÄÍøÕ¾¡£¡£¡£¡£¡£KillnetÔÚÆäTelegramƵµÀÉÏÐû²¼ÁËÕâЩ¹¥»÷£¬£¬£¬£¬£¬ £¬ÕâÊǸÃ×éÖ¯µÄϰÓÃ×ö·¨¡£¡£¡£¡£¡£BSIÌåÏÖ£¬£¬£¬£¬£¬ £¬¶ÔÐÐÕþ²¿·ÖµÄ¹¥»÷ÔںܺéÁ÷ƽÉÏÒѱ»×èÖ¹£¬£¬£¬£¬£¬ £¬Ã»ÓÐÔì³ÉÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£¡£


https://securityaffairs.com/141513/hacktivism/killnet-targets-germany.html


3¡¢À­ÍÑάÑǹú·À²¿Ôâµ½ºÚ¿ÍÍÅ»ïGamaredonµÄ´¹ÂÚ¹¥»÷

      

ýÌå1ÔÂ28Èճƣ¬£¬£¬£¬£¬ £¬À­ÍÑάÑǹú·À²¿Ôâµ½ÁËGamaredonµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¹ú·À²¿Í¸Â¶ºÚ¿Íð³äÎÚ¿ËÀ¼Õþ¸®¹ÙÔ±ÏòÆä¼¸ÃûÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ £¬µ«²¢Î´Àֳɡ£¡£¡£¡£¡£¹¥»÷»î¶¯µÄѬȾÁ´ÎªHTMLSmuggling -> ZIP -> LNK -> HTA£¬£¬£¬£¬£¬ £¬»¹Ê¹ÓÃÁËÓòÃûadmou[.]orgÀ´·¢ËÍÓʼþ£¬£¬£¬£¬£¬ £¬¸ÃÓò±»ÒÔΪÓëGamaredonÓÐÏà¹ØÁª¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ £¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£GamaredonÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼£¬£¬£¬£¬£¬ £¬CERT-UA³Æ2022ÄêÎÚ¿ËÀ¼¼Í¼ÁË70¶àÆðÓë¸ÃÍÅ»ïÏà¹ØµÄ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£


https://therecord.media/latvia-confirms-phishing-attack-on-ministry-of-defense-linking-it-to-russian-hacking-group/


4¡¢Î¢Èí³ÆÂ·ÓÉÆ÷IP¸ü¸Äµ¼ÖÂMicrosoft 365ÖÐÖ¹³¤´ïÎåСʱ

      

¾Ý1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬Î¢Èí͸¶ÉÏÖÜMicrosoft 365ÔÚÈ«Çò¹æÄ£ÄÚÖÐÖ¹³¤´ïÎåСʱÊÇÓÉ·ÓÉÆ÷IPµØµã¸ü¸ÄÒýÆðµÄ£¬£¬£¬£¬£¬ £¬¸Ã¸ü¸Äµ¼ÖÂÆä¹ãÓòÍø(WAN)ÖÐËùÓÐÆäËü·ÓÉÆ÷Ö®¼äµÄÊý¾Ý°üת·¢·ºÆðÎÊÌâ¡£¡£¡£¡£¡£Redmond»¨ÁËÎå¸ö¶àСʱ²Å½â¾öÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬ £¬´Ó2023Äê1ÔÂ25ÈÕ07:05µ½12:43¡£¡£¡£¡£¡£Î¢Èí»¹Í¸Â¶£¬£¬£¬£¬£¬ £¬µ±Ê¹ÓÃδ¾­³¹µ×Éó²éÇÒÔÚ²î±ðÍøÂç×°±¸ÉϾßÓвî±ðÐÐΪµÄÏÂÁî¸ü¸ÄWAN·ÓÉÆ÷µÄIPµØµãʱ£¬£¬£¬£¬£¬ £¬»á´¥·¢¸ÃÎÊÌâ¡£¡£¡£¡£¡£ÔÚ´ËÊÂÎñÖ®ºó£¬£¬£¬£¬£¬ £¬Î¢ÈíÌåÏÖËüÏÖÔÚÕýÔÚ×èÖ¹Ö´ÐÐÓ°ÏìºÜ´óµÄÏÂÁ£¬£¬£¬£¬ £¬²¢ÇÒ»¹½«ÒªÇóËùÓÐÏÂÁîµÄÖ´Ðж¼×ñÕÕÇå¾²ÉèÖøü¸ÄµÄ×¼Ôò¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-wan-router-ip-change/


5¡¢SOLAR INDUSTRIES INDIAÔ¼2TBµÄ¾üÊÂÉñÃØÊý¾Ýй¶

      

ýÌå1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬ÀÕË÷ÍÅ»ïBlackCat³ÆÒÑÈëÇÖSOLAR INDUSTRIES INDIA²¢ÇÔÈ¡ÁË2TBµÄ¾üÊÂÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÊÇÈ«Çò¹«ÈϵĹ¤ÒµÕ¨Ò©ÖÆÔìÉÌ£¬£¬£¬£¬£¬ £¬ÌṩÍêÕûµÄ±¬ÆÆ½â¾ö¼Æ»®¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ô±¹¤ºÍ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢ÖÖÖÖȪԴµÄ¾ü±¸¹©Ó¦Á´¡¢ÎäÆ÷µÄÀ¶Í¼ºÍ¹¤³ÌÎļþÒÔ¼°Õþ¸®Îļþϸ½ÚµÈ¡£¡£¡£¡£¡£BlackCatÐû²¼Á˱»µÁÎļþµÄ½ØÍ¼ºÍ´Ó¹«Ë¾ÉãÏñÍ·ÅÄÉãµÄÕÕÆ¬×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬¸ÃÍÅ»ïÉù³ÆÓµÓÐÔÚÆäËû¹ú¼Ò¾ÙÐÐÌØ¹¤»î¶¯µÄÖ¤¾Ý¡£¡£¡£¡£¡£


https://securityaffairs.com/141409/data-breach/blackcat-ransomware-solar-industries-india.html


6¡¢¹ú¼ÊÁªºÏÖ´·¨Ðж¯Àֳɲé»ñÀÕË÷Èí¼þHiveµÄ»ù´¡ÉèÊ©

      

¾ÝýÌå1ÔÂ26Èճƣ¬£¬£¬£¬£¬ £¬¹ú¼ÊÁªºÏÖ´·¨Ðж¯ÀÖ³ÉÒѲé»ñÓëHiveÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)»î¶¯Ïà¹ØµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£ÃÀ¹úDoJÌåÏÖ£¬£¬£¬£¬£¬ £¬FBIÓÚ2022Äê7ÔÂÉøÍ¸ÁËHiveÊý¾Ý¿âЧÀÍÆ÷£¬£¬£¬£¬£¬ £¬»ñµÃÁË336¸ö½âÃÜÃÜÔ¿²¢ÌṩӦȫÇò¹æÄ£ÄÚ±»¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬ £¬½ÚÔ¼ÁË1.3ÒÚÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬FBI»ñµÃÁ˼ÓÀû¸£ÄáÑÇÒ»¼ÒÍйÜЧÀÍÌṩÉ̵ÄÁ½Ì¨×¨ÓÃЧÀÍÆ÷ºÍһ̨ÐéÄâרÓÃЧÀÍÆ÷µÄ»á¼ûȨ£¬£¬£¬£¬£¬ £¬ËûÃÇÓÉHive³ÉÔ±×âÓᣡ£¡£¡£¡£ÔÚЭµ÷Ðж¯ÖУ¬£¬£¬£¬£¬ £¬ºÉÀ¼¾¯·½»¹»ñµÃÁ˶ÔÔÚºÉÀ¼ÍйܵÄÁ½¸ö±¸·ÝרÓÃЧÀÍÆ÷µÄ»á¼ûȨ¡£¡£¡£¡£¡£


https://thehackernews.com/2023/01/hive-ransomware-infrastructure-seized.html