°¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ®£¬£¬£¬£¬¿Í»§ÐÅÏ¢Ôâй¶
Ðû²¼Ê±¼ä 2025-05-221. °¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ®£¬£¬£¬£¬¿Í»§ÐÅÏ¢Ôâй¶
5ÔÂ20ÈÕ£¬£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾È·ÈÏÆäϵͳÔâδ¾ÊÚȨ»á¼û£¬£¬£¬£¬µ¼Ö¿ͻ§ÐÅϢй¶¡£¡£¡£¡£¡£¾Ý¡¶×ÔÓɱ¨¡·±¨µÀ£¬£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÒÑÁªÏµ¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬ÆäÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢ÒÉËÆÔںڿ͹¥»÷ÖÐй¶¡£¡£¡£¡£¡£5ÔÂ16ÈÕ°¢µÏ´ï˹º«¹ú¹«Ë¾Ò²Ïò¿Í»§Ðû²¼ÁËÀàËÆÐÅÏ¢£¬£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁËÏÕЩÏàͬµÄÒ»×麫¹ú¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬ÔÚÕâÁ½ÆðÊÂÎñÖУ¬£¬£¬£¬°¢µÏ´ï˹¾ùδÃ÷È·¹¥»÷ÀàÐͼ°ÊÜÓ°ÏìÈËÊý¡£¡£¡£¡£¡£±¨µÀÖ¸³ö£¬£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÔâÊܵĹ¥»÷̻¶ÁËÁªÏµ¹ý¿Í·þµÄ¿Í»§£¬£¬£¬£¬¶øÕë¶Ôº«¹ú¹«Ë¾µÄ¹¥»÷ÊÂÎñÖУ¬£¬£¬£¬Î¥¹æÍ¨ÖªÍ¬ÑùÖ¸Ïò¿Í·þ²¿·Ö£¬£¬£¬£¬ÕâÅú×¢¸ÃÆ·ÅÆ¿Í»§¿ÉÄÜÃæÁÙÈ«ÇòÐÔΣº¦¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬°¢µÏ´ï˹ǿµ÷£¬£¬£¬£¬ÔÚÕâÁ½ÆðÊÂÎñÖУ¬£¬£¬£¬ÏµÍ³ÔâÈëÇÖʱ´ú²ÆÎñÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£µ«É¥Ê§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÎÞÒÉ»áÔöÌí¿Í»§ÔâÊÜÍøÂç¹¥»÷µÄΣº¦£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉí·Ý͵ÇÔºÍÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬Èçð³ä×ÅÃûÆ·ÅÆÒªÇóÌá¹©ÌØÊâСÎÒ˽¼ÒÐÅÏ¢»ò¸¶¿î£¬£¬£¬£¬»òÓÕÆÓû§Í¸Â¶¸ü¶àÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£
https://cybernews.com/privacy/adidas-second-data-breach-customers-exposed/
2. Ó¢ÎïÁ÷¹«Ë¾Peter Green ChilledÔâÀÕË÷¹¥»÷
5ÔÂ20ÈÕ£¬£¬£¬£¬Peter Green Chilled×÷Ϊһ¼Ò×ܲ¿Î»ÓÚÓ¢¹úµÄÎïÁ÷¹«Ë¾£¬£¬£¬£¬ÓëTesco¡¢AldiºÍSainsbury'sµÈ´óÐÍÁãÊÛÉÌÏàÖú£¬£¬£¬£¬Æä²¿·ÖϵͳÔÚÂêɯ°Ù»õÔâÊÜÍøÂç¹¥»÷ºó²»µ½Ò»¸öÔÂÒ²Ôâµ½Á˼ÓÃÜ¡£¡£¡£¡£¡£¾ÝÓ¢¹ú¹ã²¥¹«Ë¾±¨µÀ£¬£¬£¬£¬ÍþвÐÐΪÕßÓÚÖÜÈý¼ÓÃÜÁ˸ù«Ë¾Êý¾Ý£¬£¬£¬£¬ÈÅÂÒÁËÆäÔËÓª£¬£¬£¬£¬ÆÆËðÁËÎïÁ÷ϵͳ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÈëÇÖϵͳ¡¢¼ÓÃÜÊý¾Ý²¢Ë÷ÒªÊê½ð¡£¡£¡£¡£¡£ÔËÓªÖÐÖ¹¶ÔÎïÁ÷¹«Ë¾Ó°ÏìÃô¸Ð£¬£¬£¬£¬¿ÉÄܵ¼Ö½»¸¶ÑÓ³Ù£¬£¬£¬£¬½ø¶øÓ°ÏìÕû¸ö¹©Ó¦Á´¡£¡£¡£¡£¡£ÐÅÏ¢Çå¾²Ñо¿Ô±Aras NazarovasÖ¸³ö£¬£¬£¬£¬´ËÀ๥»÷¿ÉÄÜʹ¹«Ë¾ÏÝÈë̱»¾£¬£¬£¬£¬ÉõÖÁÔÝʱÎÞ·¨Îª×ÅÃûÆ·ÅÆÌṩЧÀÍ£¬£¬£¬£¬µ¼Ö³¬ÊÐÌØ¶¨²úÆ·ÔÝʱǷȱ¡£¡£¡£¡£¡£ÐÅÏ¢Ç徲רҵлáISACAµÄÊ×ϯȫÇòÕ½ÂÔ¹ÙChris DimitriadisÒÔΪ£¬£¬£¬£¬´Ë´Î¹¥»÷±ê¼Ç×ÅÒ»¸öÁîÈ˵£ÐĵÄÇ÷ÊÆ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó²»µ«Ãé×¼ÖÁ¹«Ë¾»òÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬»¹¹¥»÷¹©Ó¦Á´£¬£¬£¬£¬´øÀ´½»¸¶ÖÐÖ¹¡¢¿â´æÆÌÕźͲÆÎñËðʧµÈÏÖʵЧ¹û¡£¡£¡£¡£¡£
https://cybernews.com/security/retail-logistics-ransomware-tesco-aldi/
3. Lumma¶ñÒâÈí¼þÐж¯±»×è¶Ï£¬£¬£¬£¬2300¸öÓòÃû±»²é·â
5ÔÂ21ÈÕ£¬£¬£¬£¬È«ÇòÕë¶ÔLumma¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©ÐÅÏ¢ÇÔÈ¡Ðж¯Õö¿ªÐÍ¬ÆÆË𣬣¬£¬£¬Àֳɲé»ñÊýǧ¸öÓòÃûÒÔ¼°²¿·Ö»ù´¡ÉèÊ©Ö÷¸É¡£¡£¡£¡£¡£´Ë´ÎÐж¯¹æÄ£½Ï´ó£¬£¬£¬£¬Éæ¼°¶à¼Ò¿Æ¼¼¹«Ë¾ÓëÖ´·¨»ú¹¹¡£¡£¡£¡£¡£Î¢ÈíÓÚ2025Äê5ÔÂ13ÈÕ½ÓÄÉÖ´·¨Ðж¯£¬£¬£¬£¬²é·âÁËÔ¼2300¸öÓòÃû¡£¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿Ò²Æð¾¢Ðж¯£¬£¬£¬£¬²é·âÁËLummaµÄ¿ØÖÆÃæ°å£¬£¬£¬£¬²¢µ·»ÙÁËÏòÍøÂç·¸·¨·Ö×Ó³ö×â¶ñÒâÈí¼þµÄÊг¡¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬Å·ÖÞÐ̾¯×é֯ŷÖÞÍøÂç·¸·¨ÖÐÐĺÍÈÕ±¾ÍøÂç·¸·¨¿ØÖÆÖÐÐÄÐÖú²é·âÁËλÓÚÅ·ÖÞºÍÈÕ±¾µÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£Î¢ÈíÊý×Ö·¸·¨²¿·ÖÖúÀí×ÜÖ´·¨ÕÕÁÏÌåÏÖ£¬£¬£¬£¬ÔÚ2025Äê3ÔÂ16ÈÕÖÁ5ÔÂ16ÈÕʱ´ú£¬£¬£¬£¬È«ÇòÓÐÁè¼Ý39.4Íǫ̀WindowsÅÌËã»úѬȾÁ˸öñÒâÈí¼þ£¬£¬£¬£¬Î¢ÈíÓë¶à²¿·ÖϸÃÜÏàÖú£¬£¬£¬£¬ÀÖ³ÉÇжÏÁ˸öñÒâÈí¼þÓëÊܺ¦ÕßÖ®¼äµÄͨѶ¡£¡£¡£¡£¡£Cloudflare·½Ãæ³Æ£¬£¬£¬£¬´Ë´ÎÐж¯Ê¹LummaÔËÓªÉÌÎÞ·¨»á¼û¿ØÖÆÃæ°åµÈÒªº¦ÉèÊ©£¬£¬£¬£¬¸øÆä´øÀ´ÁËÔËÓªºÍ²ÆÎñ±¾Ç®¡£¡£¡£¡£¡£¼ÓÈë´Ë´ÎÁªºÏÐж¯µÄ¹«Ë¾³ýÁË΢ÈíÍ⣬£¬£¬£¬ÉÐÓÐESET¡¢CleanDNSµÈ¡£¡£¡£¡£¡£Lumma×÷ΪһÖÖ¶ñÒâÈí¼þ¼´Ð§ÀÍÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬Ö÷ÒªÕë¶ÔWindowsºÍmacOSϵͳ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÖ»ÐèÆÆ·Ñ250ÃÀÔªµ½1000ÃÀÔª¼´¿É¶©ÔÄ×âÓᣡ£¡£¡£¡£Ëü¾ß±¸ÏȽøµÄÌӱܺÍÊý¾ÝÇÔÈ¡¹¦Ð§£¬£¬£¬£¬Í¨¹ý¶àÖÖÇþµÀÈö²¥²¢Ñ¬È¾Êܺ¦Õߣ¬£¬£¬£¬ÈëÇÖϵͳºó¿ÉÇÔÈ¡¶àÖÖÊý¾Ý£¬£¬£¬£¬ÍøÂçºó·¢Ëͻع¥»÷ÕßЧÀÍÆ÷¾ÙÐгöÊÛ»òÓÃÓÚÆäËû¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-operation-disrupted-2-300-domains-seized/
4. 3AMÀÕË÷Èí¼þʹÓõç×ÓÓʼþºäÕ¨ÓëαÔìµç»°¾ÙÐй¥»÷
5ÔÂ21ÈÕ£¬£¬£¬£¬3AMÀÕË÷Èí¼þÁ¥Êô»ú¹¹Õý½ÓÄɸ߶ÈÕë¶ÔÐԵĹ¥»÷ÊֶΣ¬£¬£¬£¬Í¨¹ýµç×ÓÓʼþºäÕ¨ºÍαÔìµÄITÖ§³Öµç»°£¬£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌѧÓÕÆÔ±¹¤ÌṩԶ³Ì»á¼û¹«Ë¾ÏµÍ³µÄƾ֤¡£¡£¡£¡£¡£Sophos±¨¸æÏÔʾ£¬£¬£¬£¬ÔÚ2024Äê11ÔÂÖÁ2025Äê1ÔÂʱ´ú£¬£¬£¬£¬ÖÁÉÙÓÐ55Æð¹¥»÷ʹÓÃÁ˸ÃÊÖÒÕ£¬£¬£¬£¬Éæ¼°Á½¸ö²î±ðµÄÍþв¼¯Èº¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ÑØÏ®ÁËBlackBastaµÄϰÓÃÊÖ·¨£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþºäÕ¨¡¢Í¨¹ýMicrosoft Teams¾ÙÐÐÓïÒô´¹ÂÚ¼°ÀÄÓÃQuick Assist¡£¡£¡£¡£¡£Black BastaÄÚ²¿¶Ô»°µÄй¶ΪÆäËûÍþвÐÐΪÕßÌṩÁË¿ÉʹÓõÄÄ£°å£¬£¬£¬£¬ÖúÆä¿ìËÙÕÆÎÕÇéÐΡ£¡£¡£¡£¡£2025ÄêµÚÒ»¼¾¶È£¬£¬£¬£¬3AMÀÕË÷Èí¼þÕë¶ÔSophos¿Í»§¶ËÌᳫ¹¥»÷£¬£¬£¬£¬½ÓÄÉÀàËÆÒªÁ쵫¸ÄÓÃÕæÊµµç»°ÍøÂç´¹ÂÚ¡£¡£¡£¡£¡£¹¥»÷ÕßαÔìÄ¿µÄÕæÊµIT²¿·Öµç»°ºÅÂ룬£¬£¬£¬ÔÚÈý·ÖÖÓÄÚ·¢ËÍ24·âδÇëÇóÓʼþ¾ÙÐкäÕ¨£¬£¬£¬£¬²¢Ëµ·þÔ±¹¤·¿ªMicrosoft Quick AssistÊÚÓèÔ¶³Ì»á¼ûȨÏÞ¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬¹¥»÷Õß´ÓÓÕÆÓòÏÂÔØ²¢ÌáÈ¡¶ñÒâµµ°¸£¬£¬£¬£¬°üÀ¨VBS¾ç±¾¡¢QEMUÄ£ÄâÆ÷ºÍԤװQDoorºóÃŵÄWindows 7Ó³Ïñ£¬£¬£¬£¬Ê¹ÓÃQEMUÌӱܼì²â£¬£¬£¬£¬ÊµÏÖÒ»Á¬ÇÒδ±»·¢Ã÷µÄÍøÂç»á¼û¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýWMICºÍPowerShell¾ÙÐÐÕì̽£¬£¬£¬£¬½¨ÉèÍâµØÖÎÀíÔ±ÕÊ»§¡¢×°ÖÃÉÌÒµRMM¹¤¾ßXEOXRemote²¢ÆÆËðÓòÖÎÀíÔ±ÕÊ»§¡£¡£¡£¡£¡£Ö»¹ÜSophos²úÆ·×èÖ¹Á˺áÏòÒÆ¶¯ºÍ·ÀÓùÍ£ÓÃʵÑ飬£¬£¬£¬µ«¹¥»÷ÕßÈÔʹÓÃGoodSync¹¤¾ß½«868GBÊý¾Ýй¶µ½BackblazeÔÆ´æ´¢ÖС£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/
5. Coinbase³Æ½üÆÚÊý¾Ýй¶ӰÏìÁË69461Ãû¿Í»§
5ÔÂ21ÈÕ£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°Ïì69461Ãû¿Í»§¡£¡£¡£¡£¡£CoinbaseÔÚÌá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÖÐÌåÏÖ£¬£¬£¬£¬ÆäÍâÑóÁãÊÛÖ§³ÖËùÔÚµÄÉÙÊýÖ°Ô±²»µ±»á¼ûÁ˿ͻ§ÐÅÏ¢¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝËä²»°üÀ¨ÃÜÂ롢˽ԿµÈ¿ÉÖ±½Ó»á¼û×ʽð»òÕË»§µÄÐÅÏ¢£¬£¬£¬£¬µ«°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºóËÄλ¡¢ÒøÐÐÕ˺ŵÈСÎÒ˽¼Ò±êʶ·û£¬£¬£¬£¬ÒÔ¼°¿ÉÄܵÄÕþ¸®Éí·ÝÐÅÏ¢ºÍÕË»§ÐÅϢͼÏñ¡£¡£¡£¡£¡£CoinbaseÖÒÑԳƣ¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬ÓÕʹÊܺ¦Õß×ªÒÆ×ʽ𡣡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬ÓÐÈ˵£ÐÄÍøÂç·¸·¨·Ö×Ó»ñÈ¡ÕË»§Óà¶îºÍµØµãºó¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û¡£¡£¡£¡£¡£CoinbaseÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþÖÐ͸¶£¬£¬£¬£¬ÍþвÐÐΪÕßÔÚÍâÑóÖ§³ÖÖ°Ô±»ò³Ð°üÉ̵Ä×ÊÖúÏ»ñÈ¡Á˸ߴï1% Coinbase¿Í»§ÈºµÄÊý¾Ý£¬£¬£¬£¬²¢ÓÚ5ÔÂ11ÈÕ·¢ËÍÀÕË÷Óʼþ£¬£¬£¬£¬ÒªÇóÖ§¸¶2000ÍòÃÀÔªÊê½ðÒÔ×èÖ¹ÐÅÏ¢±»¹ûÕæ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Coinbase¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬¶øÊÇÉèÁ¢ÁË2000ÍòÃÀÔªµÄ½±Àø»ù½ð£¬£¬£¬£¬ÃãÀøÌṩÓÐÖúÓÚÕÒµ½²¢ÉþÖ®ÒÔ·¨¹¥»÷ÕßµÄÏßË÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬CoinbaseÈÔÔÚÆÀ¹À´Ë´Î¹¥»÷µÄ²ÆÎñÓ°Ï죬£¬£¬£¬°üÀ¨µ÷½âºÍ¿Í»§ÍË¿îÓöȣ¬£¬£¬£¬Ô¤¼Æ¿ÉÄÜÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ½«Åâ³¥Òò¸ÃÊÂÎñ¶øÎó½«×ʽð»ã¸øÕ©ÆÕßµÄÁãÊÛ¿Í»§£¬£¬£¬£¬²¢¾ÙÐÐÉó²éÒÔÈ·ÈÏÊÂʵ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/
6. KrebsOnSecurityÔâ6.3Tbps DDoS¹¥»÷
5ÔÂ21ÈÕ£¬£¬£¬£¬×ÅÃûÍøÂçÇå¾²²©¿ÍKrebsOnSecurity¿ËÈÕÔâÊÜ´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬·åÖµÁ÷Á¿´ïÿÃë6.3Õ×Õ×±ÈÌØ£¬£¬£¬£¬³ÉΪÓмͼÒÔÀ´¹æÄ£×î´óµÄ¹¥»÷Ö®Ò»¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¾ÝÐÅÔ´×ÔÃûΪ¡°Aisuru¡±µÄÐÂÐÍÎïÁªÍø½©Ê¬ÍøÂ磬£¬£¬£¬¸ÃÍøÂçÓÚ2024Äê8ÔÂÊ״η¢Ã÷£¬£¬£¬£¬Ö÷ÒªÓÉÊÜѬȾµÄÎïÁªÍø×°±¸Èç·ÓÉÆ÷¡¢IPÉãÏñÍ·ºÍÊý×ÖÊÓÆµÂ¼Ïñ»ú×é³É¡£¡£¡£¡£¡£ÕâЩװ±¸±»Ð®ÖƺóÐͬ¹¥»÷£¬£¬£¬£¬ÏòKrebsOnSecurityÕ¾µã·¢ËÍ´ó×ÚÁ÷Á¿¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷½öÒ»Á¬Ô¼45Ã룬£¬£¬£¬µ«ÍþÁ¦Öش󣬣¬£¬£¬²»¹ýÍøÕ¾ÒòÊܹȸ衰¶ÜÅÆÍýÏ롱±£»£»£»£»£»£»¤¶ø¼á³ÖÔÚÏß¡£¡£¡£¡£¡£¡°Aisuru¡±½©Ê¬ÍøÂçµÄÃû×Ö½ñÄêÔçЩʱ¼äÒÑ·ºÆðÔÚµØÏÂÂÛ̳£¬£¬£¬£¬ÓëDDoS¹ÍӶЧÀÍÏà¹Ø£¬£¬£¬£¬´Ë´Î¹¥»÷¿ÉÄÜÊÇ¶ÔÆä¹¦Ð§µÄѹÁ¦²âÊÔ£¬£¬£¬£¬»òÒԸߵ÷Ä¿µÄչʾʵÁ¦¡£¡£¡£¡£¡£¹¥»÷ÕßÉí·ÝÉв»Ã÷È·£¬£¬£¬£¬µ«KrebsÔÚ²©¿ÍÖÐÖ¸³ö£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÓëÌṩDDoSЧÀͺͽ©Ê¬ÍøÂç×âÁÞµÄÍøÃñ¡°Forky¡±Óйأ¬£¬£¬£¬Ö»¹ÜForky·ñ¶¨²ß»®Á˴˴ι¥»÷£¬£¬£¬£¬µ«ÈϿɼÓÈëÁËAisuru½©Ê¬ÍøÂçµÄ¿ª·¢ºÍÍÆ¹ã¡£¡£¡£¡£¡£
https://hackread.com/krebsonsecurity-6-3-tbps-ddos-attack-aisuru-botnet/


¾©¹«Íø°²±¸11010802024551ºÅ