Guacamaya¹ûÕæÖÇÀûµÈ¶à¸ö¹ú¼ÒµÄ¾üÊ»ú¹¹Ô¼10 GBÊý¾Ý

Ðû²¼Ê±¼ä 2022-09-21

1¡¢Guacamaya¹ûÕæÖÇÀûµÈ¶à¸ö¹ú¼ÒµÄ¾üÊ»ú¹¹Ô¼10 GBÊý¾Ý

      

¾Ý9ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬×Ô³ÆGuacamayaµÄºÚ¿ÍÍÅ»ïÐû²¼ÁËÀ´×ÔÖÇÀûºÍÄ«Î÷¸çµÈ¶à¸ö¹ú¼ÒµÄ¾üʺ;¯Ô±»ú¹¹Ô¼10 GBµÄµç×ÓÓʼþµÈÖÊÁÏ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÕë¶ÔÖÐÃÀÖÞµØÇøµÄ×éÖ¯£¬£¬£¬£¬£¬£¬ÕâÊÇÆä×Ô2022Äê3ÔÂÒÔÀ´µÚËĴιûÕæÊý¾Ý£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¶¼±»Ðû²¼µ½ÁËEnlace Hacktivista¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÖ÷񻃾¼°ÁËÖÇÀûÎä×°²½¶ÓÕÕÁϳ¤ÁªÏ¯¾Û»á¡¢Ä«Î÷¸ç¹ú·À²¿¡¢Èø¶ûÍß¶à¹ú¼ÒÃñ¾¯ºÍÈø¶ûÍß¶àÎä×°²½¶Ó¡¢¸çÂ×±ÈÑÇÎä×°²½¶Ó×Ü˾Á¡¢ÃØÂ³Îä×°²½¶ÓÁªºÏ˾ÁºÍÃØÂ³¾ü¶Ó¡£¡£¡£¡£¡£¡£¡£


https://www.cyberscoop.com/central-american-hacking-group-releases-emails/


2¡¢Imperva³ÆÒÑ×èÖ¹·¢ËÍÁè¼Ý253ÒÚ´ÎÇëÇóµÄDDoS¹¥»÷

      

9ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾ImpervaÐû²¼ÒÑÀֳɵÖÓùÏòÆä¿Í»§·¢ËÍÁËÁè¼Ý253ÒÚ´ÎÇëÇóµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷µÄÄ¿µÄÊÇÒ»¼ÒµçÐÅЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬ÓÚ2022Äê6ÔÂ27ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬·åֵΪÿÃë390Íò´ÎÇëÇó(RPS)£¬£¬£¬£¬£¬£¬Æ½¾ùΪ180Íò´ÎRPS¡£¡£¡£¡£¡£¡£¡£·åÖµÁè¼Ý100ÍòRPSµÄ¹¥»÷ͨ³£Ö»Ò»Á¬¼¸Ãëµ½¼¸·ÖÖÓ£¬£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷Ò»Á¬ÁËËĸö¶àСʱ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÊÇÓɱ鲼180¸ö¹ú¼ÒºÍµØÇøµÄ½©Ê¬ÍøÂçÌᳫµÄ£¬£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼IPµØµãλÓÚÃÀ¹ú¡¢°ÍÎ÷ºÍÓ¡¶ÈÄáÎ÷ÑÇ¡£¡£¡£¡£¡£¡£¡£½©Ê¬ÍøÂçʹÓÃÁË170000¸ö±»Ñ¬È¾×°±¸£¬£¬£¬£¬£¬£¬°üÀ¨µ÷ÖÆ½âµ÷Æ÷ºÍÖÇÄÜÉãÏñÍ·µÈ¡£¡£¡£¡£¡£¡£¡£


https://www.imperva.com/blog/record-25-3-billion-request-multiplexing-attack-mitigated-by-imperva/


3¡¢VMwareºÍ΢ÈíÌáÐÑChromeloader½üÆÚµÄ¶ñÒâ¹¥»÷»î¶¯

      

¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬VMwareºÍMicrosoft·¢Ã÷Chromeloader½üÆÚµÄ¹¥»÷»î¶¯»áÈö²¥¶à¸ö¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚÉÏÖÜÎåÅû¶ÁËÒ»Æðµã»÷ڲƭ»î¶¯£¬£¬£¬£¬£¬£¬Ê¹ÓÃChromeloader·Ö·¢ÖÖÖÖ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¹éÒòÓÚDEV-0796ÍŻ¡£¡£¡£¡£¡£¡£VMwareÐû²¼Ò»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬ÏêÊöÁË×Ô8ÔÂÒÔÀ´·¢Ã÷µÄ¶à¸öChromeloader±äÌåµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ÷ÒªÒÔISOÎļþµÄÐÎʽ·Ö·¢¶ñÒâä¯ÀÀÆ÷À©Õ¹¡¢node-WebKit¶ñÒâÈí¼þºÍÀÕË÷Èí¼þµÈ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/135949/malware/chromeloader-malware-campaigns.html


4¡¢SandwormÍÅ»ïαװ³ÉµçÐÅÌṩÉ̹¥»÷ÎÚ¿ËÀ¼µÄ×éÖ¯

     

Recorded FutureÔÚ9ÔÂ19ÈÕÅû¶Á˺ڿÍÍÅ»ïSandwormαװ³ÉµçÐÅÌṩÉ̹¥»÷ÎÚ¿ËÀ¼×éÖ¯µÄ»î¶¯¡£¡£¡£¡£¡£¡£¡£Sandworm±»ÃÀ¹úÕþ¸®¹éΪ¶íÂÞ˹GRUÍâ¹ú¾üÊÂÇ鱨²¿·ÖµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬ÔÚ½ñÄêÌᳫÁ˶à´Î¹¥»÷£¬£¬£¬£¬£¬£¬°üÀ¨¶ÔÎÚ¿ËÀ¼ÄÜÔ´»ù´¡ÉèÊ©µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£´Ó½ñÄê8ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ʹÓÃαװ³ÉÎÚ¿ËÀ¼µçÐÅЧÀÍÌṩÉ̵Ķ¯Ì¬DNSÓòµÄSandworm C2»ù´¡ÉèÊ©ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬×î½üµÄ»î¶¯Ö¼ÔÚ½«Colibri LoaderºÍWarzone RATµÈÉÌÆ·¶ñÒâÈí¼þ×°Öõ½Ä¿µÄµÄϵͳÉÏ¡£¡£¡£¡£¡£¡£¡£


https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunication-providers-in-ukraine


5¡¢½ðÈڿƼ¼¹«Ë¾Revolut 5Íò¶à¿Í»§µÄСÎÒ˽¼ÒÐÅϢй¶

      

ýÌå9ÔÂ19ÈÕ³ÆRevolutÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁË5Íò¶à¸ö¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Revolut½¨ÉèÓÚ2015Ä꣬£¬£¬£¬£¬£¬ÊÇÒ»¼Ò½ðÈڿƼ¼¹«Ë¾£¬£¬£¬£¬£¬£¬ÏÖÔÚΪȫÇò¿Í»§Ìá¹©ÒøÐС¢×ʽðÖÎÀíºÍͶ×ÊЧÀÍ¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚÒ»ÖÜǰ£¬£¬£¬£¬£¬£¬Æ¾Ö¤³õ³ÌÐò²éЧ¹û£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÉç»á¹¤³ÌÊÖÒÕ»á¼ûÁËRevolutµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˸ù«Ë¾0.16%µÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñй¶Á˿ͻ§µÄÐÕÃû¡¢µØµã¡¢Óʼþ¡¢µç»°ºÅÂë¡¢²¿·ÖÖ§¸¶¿¨Êý¾ÝºÍÕË»§Êý¾ÝµÈ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/revolut-hack-exposes-data-of-50-000-users-fuels-new-phishing-wave/


6¡¢KasperskyÐû²¼¹ØÓÚÑÇÌ«µØÇøÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ

      

9ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬KasperskyÐû²¼¹ØÓÚÑÇÌ«µØÇøÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖصãÆÊÎöÁËÓ°ÏìÑÇÌ«µØÇø15¸ö¹ú¼ÒºÍµØÇøµÄ4700¶à¸ö×éÖ¯µÄÍⲿÍþвºÍÍøÂç·¸·¨»î¶¯µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Áè¼ÝÊ®·ÖÖ®Ò»µÄÎó²îÊÇProxyLogon£¬£¬£¬£¬£¬£¬ÔÚÈÕ±¾43%δ´ò²¹¶¡µÄЧÀÍÖж¼·¢Ã÷ÁËÕâ¸öÎó²î£»£»£»£» £»16003¸öÔ¶³Ì»á¼ûºÍÖÎÀíЧÀͿɹ©¹¥»÷ÕßʹÓ㬣¬£¬£¬£¬£¬Õþ¸®»ú¹¹ÊÜÓ°Ïì×î´ó£»£»£»£» £»ÔÚ°µÍø£¬£¬£¬£¬£¬£¬ºÚ¿Í¸üϲ»¶¹ºÖúͳöÊÛÀ´×Ô°Ä´óÀûÑÇ¡¢Öйú¡¢Ó¡¶ÈºÍÈÕ±¾µÄ×éÖ¯µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£


https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/09/16113048/Kaspersky-DFI_V7_opt.pdf