ÎÚ¿ËÀ¼¹úÓк˵繫˾Energoatom³ÆÔâµ½´ó¹æÄ£µÄ¹¥»÷

Ðû²¼Ê±¼ä 2022-08-19
1¡¢ÎÚ¿ËÀ¼¹úÓк˵繫˾Energoatom³ÆÔâµ½´ó¹æÄ£µÄ¹¥»÷

      

¾ÝýÌå8ÔÂ17ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¹úÓк˵çÔËÓªÉÌEnergoatomÔâµ½ÁË´ó¹æÄ£ÍøÂç¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÓÉ8200¶àÃû³ÉÔ±×é³ÉµÄ¶íÂÞ˹ºÚ¿ÍÍÅ»ïPeople¡¯s Cyber ArmyʹÓÃÁË725Íò¸öbotÕÊ»§Ïò EnergoatomµÄÍøÕ¾·¢ËÍÀ¬»øÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÎÞ·¨»á¼û¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷Ò»Á¬ÁËÈý¸öСʱ£¬£¬£¬£¬£¬£¬£¬µ«¶Ô¹«Ë¾µÄÔËӪûÓÐÌ«´óµÄÓ°Ïì¡£¡£¡£ ¡£¡£¡£¡£EnergoatomÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÆäÕýÔÚÏë·¨¾¡¿ìµØÖØÐ¿ØÖƸÃÍøÕ¾²¢ÏÞÖÆ¹¥»÷¡£¡£¡£ ¡£¡£¡£¡£


https://therecord.media/ukraines-state-owned-nuclear-power-operator-said-russian-hackers-attacked-website/


2¡¢Google³ÆÆäÒÑ×èֹÿÃë4600ÍòRPSµÄDDoS¹¥»÷

      

¾Ý8ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Google Cloud ArmorµÄ¿Í»§Ôâµ½ÁË»ùÓÚHTTPSЭÒéµÄDDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸ß´ïÿÃë4600Íò´ÎÇëÇó(RPS)¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷´Ó6ÔÂ1ÈÕÉÏÎç09:45×îÏÈ£¬£¬£¬£¬£¬£¬£¬ÔÚ69·ÖÖÓÖ®ºó¿¢Ê£¬£¬£¬£¬£¬£¬£¬×î³õÒÔ10000 RPSµÄËÙÂʹ¥»÷Ä¿µÄµÄHTTP/S¸ºÔØÆ½ºâÆ÷¡£¡£¡£ ¡£¡£¡£¡£ÔÚ8·ÖÖÓÄÚ£¬£¬£¬£¬£¬£¬£¬¹¥»÷¼Ó¾çµ½100000 RPS£¬£¬£¬£¬£¬£¬£¬Á½·ÖÖÓºóµÖ´ïÿÃë4600Íò´ÎÇëÇóµÄ·åÖµ¡£¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Á÷Á¿À´×Ô132¸ö¹ú¼ÒµÄ5256¸öIPµØµã£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÁ˼ÓÃÜÇëÇó(HTTPS)£¬£¬£¬£¬£¬£¬£¬ÕâÅú×¢·¢ËÍÇëÇóµÄ×°±¸¾ßÓÐÏ൱ǿʢµÄÅÌËã×ÊÔ´¡£¡£¡£ ¡£¡£¡£¡£¸Ã¹¥»÷µÄÁíÒ»¸öÌØµãÊÇʹÓÃTor³ö¿Ú½ÚµãÀ´×ª´ïÁ÷Á¿¡£¡£¡£ ¡£¡£¡£¡£


https://securityaffairs.co/wordpress/134542/hacking/google-blocked-largest-ever-https-ddos.html


3¡¢Google PlayÖеÄ35¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿ÒÑÁè¼Ý200Íò

      

ýÌå8ÔÂ18Èճƣ¬£¬£¬£¬£¬£¬£¬BitdefenderÔÚGoogle PlayÊÐËÁÖÐз¢Ã÷ÁË35¸ö¶ñÒâ¹ã¸æÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬Òѱ»×°ÖÃÁËÁè¼Ý200Íò´Î¡£¡£¡£ ¡£¡£¡£¡£Æ¾Ö¤±ê×¼Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÓ¦Óûáͨ¹ýð³äÌá¹©Ò»Ð©ÌØÊâµÄ¹¦Ð§À´ÓÕʹÓû§¾ÙÐÐ×°Ö㬣¬£¬£¬£¬£¬£¬µ«ÔÚ×°ÖúóËü»áÁ¬Ã¦¸ü¸ÄÆäÃû³ÆºÍͼ±ê£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÄÑÒÔ±»·¢Ã÷ºÍÐ¶ÔØ¡£¡£¡£ ¡£¡£¡£¡£¶ñÒâÓ¦ÓÃÉÐÓдó×ڵĴúÂë»ìÏýºÍ¼ÓÃܹ¦Ð§£¬£¬£¬£¬£¬£¬£¬ÒÔµÖÓùÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬£¬²¢½«Ö÷ÒªµÄJava payloadÒþ²ØÔÚÁ½¸ö¼ÓÃܵÄDEXÎļþÖС£¡£¡£ ¡£¡£¡£¡£


https://www.hackread.com/35-malicious-apps-google-play-store-millions-installs/


4¡¢Ñо¿ÍŶÓÅû¶¹ØÓÚRedAlphaµÄ´ó¹æÄ£Æ¾Ö¤ÇÔÈ¡»î¶¯

      

8ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬Recorded FutureÐû²¼Á˹ØÓÚRedAlphaµÄ´ó¹æÄ£Æ¾Ö¤ÇÔÈ¡»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£ ¡£¡£¡£¡£RedAlphaÓÚ2018Äê1ÔÂÊ״α»¼Í¼£¬£¬£¬£¬£¬£¬£¬Ö÷Òª¾ÙÐÐÌØ¹¤»î¶¯ºÍ¼àÊÓÐж¯£¬£¬£¬£¬£¬£¬£¬Í¨¹ýNjRATºóÃÅÀ´ÍøÂçÇ鱨¡£¡£¡£ ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù3ÄêÖÐRedAlphaÒ»Ö±ÔÚÕë¶ÔÖÇ¿âºÍÕþ¸®»ú¹¹µÈ×éÖ¯£¬£¬£¬£¬£¬£¬£¬Éæ¼°¶à´ï350¸öÎäÆ÷»¯µÄÓòÃû¡£¡£¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÓòÃûÓÕÆ­Ö÷ÒªµÄµç×ÓÓʼþºÍ´æ´¢Ð§ÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬£¬ÈçÑÅ»¢(135¸ötyposquatÓòÃû)£¬£¬£¬£¬£¬£¬£¬¹È¸è(91¸ötyposquatÓòÃû)ºÍ΢Èí(70¸ötyposquatÓòÃû)¡£¡£¡£ ¡£¡£¡£¡£


https://www.recordedfuture.com/redalpha-credential-theft-campaign-targeting-humanitarian-thinktank


5¡¢BlackByte 2.0»ØºÏ²¢Ê¹ÓÃеÄÀÕË÷Õ½ÂÔºÍÊý¾Ý¹ûÕæÍøÕ¾

      

¾ÝýÌå8ÔÂ17Èճƣ¬£¬£¬£¬£¬£¬£¬ÔÚ¾­ÓɶÌÔݵÄÐÝÕûºóBlackByteÀÕË÷Èí¼þ¾íÍÁÖØÀ´¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷Õß½«Ðµü´ú³ÆÎªBlackByte 2.0£¬£¬£¬£¬£¬£¬£¬ËäÈ»Éв»ÇåÎúÀÕË÷Èí¼þµÄ¼ÓÃÜÆ÷ÊÇ·ñ±¬·¢ÁËת±ä£¬£¬£¬£¬£¬£¬£¬µ«¸ÃÍÅ»ïÒѾ­Æô¶¯ÁËÒ»¸öȫеÄTorÊý¾Ý¹ûÕæÍøÕ¾¡£¡£¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÏÖÔÚʹÓÃÁËеÄÀÕË÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÄ¿µÄ¸¶·Ñ½«ÆäÊý¾ÝµÄÐû²¼Ê±¼äÑÓÉìµ½24Сʱ£¨5000ÃÀÔª£©¡¢ÏÂÔØÊý¾Ý£¨200000ÃÀÔª£©»òÏú»ÙËùÓÐÊý¾Ý£¨300000ÃÀÔª£©£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þLockBitÔÚ3.0°æ±¾ÖÐҲʹÓÃÁËÏàͬµÄÕ½ÂÔ¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-gang-is-back-with-new-extortion-tactics/


6¡¢ÐµÄdropper BugDrop¿ÉÈÆ¹ýAndroid 13µÄÇå¾²¹¦Ð§

      

8ÔÂ17ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Android¶ñÒâÈí¼þ¿ª·¢Ö°Ô±ÒѾ­ÔÚµ÷½âÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬À´Èƹý¹È¸èÐÂÐû²¼µÄAndroid 13ÖеÄÊÜÏÞÉèÖÃÇå¾²¹¦Ð§¡£¡£¡£ ¡£¡£¡£¡£Android 13ÓÚ±¾ÖÜÐû²¼£¬£¬£¬£¬£¬£¬£¬ÐµIJÙ×÷ϵͳÕýÔÚGoogle Pixel×°±¸ÉÏÍÆ³ö£¬£¬£¬£¬£¬£¬£¬Ô´´úÂëÐû²¼ÔÚAOSPÉÏ¡£¡£¡£ ¡£¡£¡£¡£Threat Fabric·¢Ã÷ÁËÒ»¸öÕýÔÚ¿ª·¢ÖеÄÐÂdropper BugDrop£¬£¬£¬£¬£¬£¬£¬ÓëºÚ¿ÍÍÅ»ïHadokenÓйØÁª¡£¡£¡£ ¡£¡£¡£¡£ËüµÄ´úÂëÀàËÆÓÚBrox£¬£¬£¬£¬£¬£¬£¬µ±BugDrop×¼±¸ºÃ¾ÙÐдó¹æÄ£°²ÅÅʱ£¬£¬£¬£¬£¬£¬£¬ËüÓÐÍû±»ÓÃÓÚXenomorph·Ö·¢»î¶¯¡£¡£¡£ ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malware-devs-already-bypassed-android-13s-new-security-feature/