ChatGPTÓëSora AIÈ«Çò̱»¾£¬£¬£¬ £¬£¬£¬ £¬OpenAI½ôÆÈÐÞ¸´ÖÐ

Ðû²¼Ê±¼ä 2024-12-13

1. ChatGPTÓëSora AIÈ«Çò̱»¾£¬£¬£¬ £¬£¬£¬ £¬OpenAI½ôÆÈÐÞ¸´ÖÐ


12ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬ £¬ChatGPTºÍSora AIÊÇÁ½¿îÓÉOpenAIÍÆ³öµÄÈÈÃÅAI²úÆ·£¬£¬£¬ £¬£¬£¬ £¬ÏÖÔÚÔÚÈ«Çò¹æÄ£ÄÚÔâÓöЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£OpenAIÒÑÈ·Èϲ¢ÕýÔÚÆð¾¢ÐÞ¸´´ËÎÊÌâ¡£¡£¡£¡£¡£ÖÐֹʼÓÚ2024Äê12ÔÂ11ÈÕ̫ƽÑó±ê׼ʱ¼äÏÂÖç3:17×óÓÒ£¬£¬£¬ £¬£¬£¬ £¬Éæ¼°ChatGPTÍøÕ¾¼°ÆäAPI£¬£¬£¬ £¬£¬£¬ £¬ÒÔ¼°×î½üÍÆ³öµÄÊÓÆµÌìÉúÄ£×ÓSora¡£¡£¡£¡£¡£Óû§»á¼ûChatGPTÍøÕ¾Ê±»áÊÕµ½¹ØÓÚЧÀͲ»¿ÉÓõÄ֪ͨ£¬£¬£¬ £¬£¬£¬ £¬OpenAIÒÑʶ±ð³öÎÊÌâ²¢ÕýÆð¾¢ÍƳöÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£ÓÉÓÚChatGPTÓµÓÐÁè¼Ý2ÒÚµÄÖØ´óÖÜ»îÔ¾Óû§Èº£¬£¬£¬ £¬£¬£¬ £¬ËüÒѳÉÎªÍøÂç¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬ £¬£¬£¬ £¬Ò»¸öÃûΪAnonymous SudanµÄ×éÖ¯ÔøÉù³Æ¶ÔÒ»´ÎÓëChatGPTЧÀÍÖÐֹͬʱ±¬·¢µÄDDoS¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬ £¬OpenAIÉÐδȷÈÏÄ¿½ñÖÐÖ¹ÊÇ·ñÓÉÀàËÆ¹¥»÷Ôì³É£¬£¬£¬ £¬£¬£¬ £¬ÖÐÖ¹Ôµ¹ÊÔ­ÓÉÉв»ÇåÎú¡£¡£¡£¡£¡£È«ÇòÓû§ÕýÇ×½ü¹Ø×¢OpenAIµÄÐÞ¸´Ï£Íû£¬£¬£¬ £¬£¬£¬ £¬ÆÚ´ýЧÀÍÄܹ»¾¡¿ì»Ö¸´Õý³£¡£¡£¡£¡£¡£


https://hackread.com/sora-chatgpt-down-worldwide-openai-working-on-fix/


2. ÐÂÐÍÒþÃØ Pumakit Linux rootkit ¶ñÒâÈí¼þ±»·¢Ã÷


12ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬ £¬Pumakit ÊÇÒ»ÖÖÐÂÐÍ Linux rootkit ¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬ £¬ËüʹÓÃÒþÉíºÍ¸ß¼¶È¨ÏÞÌáÉýÊÖÒÕÀ´ÒþÄäÓÚϵͳÖС£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÓɶà¸ö×é¼þ×é³É£¬£¬£¬ £¬£¬£¬ £¬°üÀ¨Í¶·ÅÆ÷¡¢ÄÚ´æ×¤Áô¿ÉÖ´ÐÐÎļþ¡¢ÄÚºËÄ£¿£¿£¿£¿£¿é rootkit ºÍÓû§¿Õ¼ä rootkit£¨Kitsune SO£©¡£¡£¡£¡£¡£Elastic Security ÔÚ 2024 Äê 9 Ô 4 ÈÕÓÚ VirusTotal ÉÏ´«µÄ¿ÉÒɶþ½øÖÆÎļþ¡°cron¡±Öз¢Ã÷ÁËËü£¬£¬£¬ £¬£¬£¬ £¬µ«ÎÞ·¨È·¶¨ÆäʹÓÃÕß»òÄ¿µÄ¡£¡£¡£¡£¡£Pumakit ½ÓÄɶà½×¶ÎѬȾÀú³Ì£¬£¬£¬ £¬£¬£¬ £¬Ê×ÏÈͨ¹ý¡°cron¡±Í¶·ÅÆ÷Ö´ÐÐǶÈëʽÓÐÓøºÔØ£¬£¬£¬ £¬£¬£¬ £¬×îÖÕ½« LKM rootkit Ä£¿£¿£¿£¿£¿é°²Åŵ½ÏµÍ³ÄÚºËÖУ¬£¬£¬ £¬£¬£¬ £¬²¢Ê¹Óà Kitsune SO ÔÚÓû§¿Õ¼äÖÐ×¢ÈëÀú³Ì£¬£¬£¬ £¬£¬£¬ £¬×赲ϵͳŲÓᣡ£¡£¡£¡£¸Ã rootkit Õë¶Ô 5.7 °æÖ®Ç°µÄ Linux ÄÚºËÉè¼Æ£¬£¬£¬ £¬£¬£¬ £¬Ê¹Óá°kallsyms_lookup_name()¡±º¯ÊýʹÓÃϵͳÐÐΪ£¬£¬£¬ £¬£¬£¬ £¬²¢Í¨¹ý ftrace ¹³×¡ÏµÍ³Å²ÓÃÀ´ÌáÉýȨÏÞ¡¢Ö´ÐÐÏÂÁîºÍÒþ²ØÀú³Ì¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬ £¬Ëü»¹ÄÜÒþ²ØÌض¨ÎļþºÍ¹¤¾ß£¬£¬£¬ £¬£¬£¬ £¬È·±£¶ñÒâ¸ü¸Ä²»±»»Ö¸´£¬£¬£¬ £¬£¬£¬ £¬²¢Óë Kitsune SO ЭͬÔËÐУ¬£¬£¬ £¬£¬£¬ £¬×èµ²Óû§¼¶ÏµÍ³Å²Ó㬣¬£¬ £¬£¬£¬ £¬Òþ²Ø rootkit Ïà¹ØÎļþ¡¢Àú³ÌºÍÍøÂçÅþÁ¬¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/


3. ¹ú¼ÊÁªºÏÐж¯²é·âRydoxÍøÂç·¸·¨Êг¡£¬£¬£¬ £¬£¬£¬ £¬¾Ð²¶ÈýÃûÖÎÀíÖ°Ô±


12ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬ £¬°¢¶û°ÍÄáÑÇÖ´·¨²¿·ÖÓë¹ú¼ÊÏàÖúͬ°éÁªÊÖ£¬£¬£¬ £¬£¬£¬ £¬Àֳɲé·âÁËÃûΪRydoxµÄÍøÂç·¸·¨Êг¡£¬£¬£¬ £¬£¬£¬ £¬²¢¾Ð²¶ÁËÈýÃû¿ÆË÷ÎÖ¹úÃñ¡ª¡ªArdit Kutleshi¡¢Jetmir KutleshiºÍShpend Sokoli£¬£¬£¬ £¬£¬£¬ £¬ÆäÖÐǰÁ½ÈËÒѱ»ÃÀ¹ú˾·¨²¿ÆðËß²¢ÆÚ´ýÒý¶É¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬£¬£¬ £¬£¬£¬ £¬RydoxÊг¡Âô¼Ò¼ÓÈëÁËÁè¼Ý7600ÆðÐÅÓÿ¨ÐÅÏ¢¡¢µÇ¼ƾ֤ºÍСÎÒ˽¼ÒÐÅÏ¢µÄÏúÊÛ£¬£¬£¬ £¬£¬£¬ £¬ÕâЩÐÅÏ¢ÊÇ´ÓÊýǧÃûÃÀ¹ú¹«ÃñºÍÖÖÖÖÍøÂç·¸·¨¹¤¾ßÖÐÇÔÈ¡µÄ¡£¡£¡£¡£¡£Rydox»¹ÏòÁè¼Ý18000ÃûÓû§³öÊÛÁË321000ÖÖÆäËûÍøÂç·¸·¨²úÆ·¡£¡£¡£¡£¡£×¢²áÓû§ÐèÏÈ´æÈëÒ»¶¨ÃüÄ¿µÄ¼ÓÃÜÇ®±Ò²Å»ª¹ºÖò»·¨²úÆ·£¬£¬£¬ £¬£¬£¬ £¬¶øRydoxÊÚȨÂô¼Ò¿É»ñµÃÏúÊÛÊÕÒæµÄ60%¡£¡£¡£¡£¡£ÃÀ¹ú»ñµÃ˾·¨ÊÚȨ£¬£¬£¬ £¬£¬£¬ £¬²é·âÁËRydoxµÄÓòÃûºÍЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬ £¬²¢´Ó±»¸æÕË»§ÖпÛѺÁËÔ¼225000ÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£´Ë´ÎÐж¯»ñµÃÁ˶à¹úÖ´·¨²¿·ÖµÄЭÖú¡£¡£¡£¡£¡£ÃÀ¹úÉó²é¹ÙÌåÏÖ£¬£¬£¬ £¬£¬£¬ £¬RydoxÊг¡ÊÇÒ»¸öһվʽÊÐËÁ£¬£¬£¬ £¬£¬£¬ £¬ËäÈ»ÍøÂç·¸·¨Í¨³£Éæ¼°ÍâÑóÐÐΪ£¬£¬£¬ £¬£¬£¬ £¬µ«ÆäΣº¦¿ÉÄÜÊÇɱ¾øÐԵġ£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/police-shuts-down-rydox-cybercrime-market-arrests-3-admins/


4. ÒÁÀÊʹÓÃIOCONTROL¶ñÒâÈí¼þ¹¥»÷ÃÀÒÔÒªº¦»ù´¡ÉèÊ©


12ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬ £¬ÒÁÀÊÍþвÐÐΪÕßÕýʹÓÃÐÂÐͶñÒâÈí¼þIOCONTROL¹¥»÷ÒÔÉ«ÁкÍÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©£¬£¬£¬ £¬£¬£¬ £¬ÌØÊâÊÇÎïÁªÍø(IoT)×°±¸ºÍOT/SCADAϵͳ£¬£¬£¬ £¬£¬£¬ £¬°üÀ¨Â·ÓÉÆ÷¡¢PLC¡¢HMI¡¢IPÉãÏñ»ú¡¢·À»ðǽºÍȼÁÏÖÎÀíϵͳµÈ£¬£¬£¬ £¬£¬£¬ £¬Éæ¼°ÖÆÔìÉÌÈçD-Link¡¢HikvisionµÈ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ßÓÐÄ£¿£¿£¿£¿£¿é»¯ÌØÕ÷£¬£¬£¬ £¬£¬£¬ £¬¿ÉѬȾ²î±ð×°±¸£¬£¬£¬ £¬£¬£¬ £¬²¢±»ÊÓΪ¿ÉÄܶÔÒªº¦»ù´¡ÉèÊ©Ôì³ÉÑÏÖØÆÆËðµÄÃñ×å¹ú¼ÒÍøÂçÎäÆ÷¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬ £¬£¬£¬ £¬IOCONTROLÓëÒÁÀʺڿÍ×éÖ¯CyberAv3ngersÓйØ£¬£¬£¬ £¬£¬£¬ £¬¸Ã×éÖ¯ÔøÌåÏÖ³ö¶Ô¹¥»÷¹¤ÒµÏµÍ³µÄÐËȤ¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÈëÇÖÁËÒÔÉ«ÁкÍÃÀ¹úµÄ200¸ö¼ÓÓÍÕ¾£¬£¬£¬ £¬£¬£¬ £¬²¢ÔÚ2023ÄêβÖÁ2024ÄêÖÐÆÚ¾ÙÐÐÁËÐµĹ¥»÷»î¶¯¡£¡£¡£¡£¡£IOCONTROL´æ´¢ÔÚ¡°/usr/bin/¡±Ä¿Â¼ÖУ¬£¬£¬ £¬£¬£¬ £¬Ê¹ÓÃÄ£¿£¿£¿£¿£¿é»¯ÉèÖÃ˳Ӧ²î±ð×°±¸£¬£¬£¬ £¬£¬£¬ £¬Í¨¹ýMQTTЭÒéÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬ £¬£¬£¬ £¬²¢Ê¹ÓÃAES-256-CBC¼ÓÃÜÉèÖᣡ£¡£¡£¡£Ëü¿ÉÖ´ÐжàÖÖÏÂÁ£¬£¬ £¬£¬£¬ £¬È籨¸æÏµÍ³ÐÅÏ¢¡¢È·È϶ñÒâÈí¼þ×°Öá¢ÔËÐÐí§ÒâÏÂÁî¡¢×ÔÎÒɾ³ýºÍ¶Ë¿ÚɨÃèµÈ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-iocontrol-malware-used-in-critical-infrastructure-attacks/


5. Byte Federal±ÈÌØ±ÒATMÔËÓªÉÌÔâºÚ¿Í¹¥»÷


12ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬ £¬ÃÀ¹ú±ÈÌØ±ÒATMÔËÓªÉÌByte FederalÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬ £¬ºÚ¿ÍʹÓÃÆäϵͳÉϵÄGitLabÎó²î£¬£¬£¬ £¬£¬£¬ £¬Î´¾­ÊÚȨ»á¼ûÁËÆäЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬ £¬µ¼ÖÂ58,000Ãû¿Í»§µÄÊý¾Ý±»Ð¹Â¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦¹Ø±ÕÁËÆ½Ì¨£¬£¬£¬ £¬£¬£¬ £¬¸ôÀëÁ˲»Á¼ÐÐΪÕߣ¬£¬£¬ £¬£¬£¬ £¬²¢±£»£» £»£»£» £»¤ÁËÊÜѬȾµÄЧÀÍÆ÷¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÃô¸ÐÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢Õþ¸®Ç©·¢µÄÉí·ÝÖ¤¡¢Éç»áÇå¾²ºÅÂë¡¢ÉúÒâ»î¶¯¡¢Óû§ÕÕÆ¬µÈ¡£¡£¡£¡£¡£Byte Federal¶ÔËùÓпͻ§ÕË»§¾ÙÐÐÁË¡°Ó²ÖØÖá±£¬£¬£¬ £¬£¬£¬ £¬¸üÐÂÁËÄÚ²¿ÃÜÂëºÍÕË»§ÖÎÀíϵͳ£¬£¬£¬ £¬£¬£¬ £¬²¢×÷·ÏÁËÄÚ²¿ÍøÂç»á¼ûµÄÁîÅÆºÍÃÜÔ¿¡£¡£¡£¡£¡£ËäÈ»Óû§×ʽðºÍÊý×Ö×ʲúδÊÜË𣬣¬£¬ £¬£¬£¬ £¬µ«Ãô¸ÐÐÅÏ¢µÄй¶¿ÉÄÜʹ¼ÓÃÜÇ®±Ò³ÖÓÐÕßÃæÁÙSIM¿¨½»Á÷¹¥»÷¡¢ÕË»§½ÓÊÜ»òÆäËûÍøÂç´¹ÂÚ¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£Byte Federal½¨ÒéÊÜÓ°ÏìµÄÈ˶Ôδ¾­ÇëÇóµÄͨѶ¼á³ÖСÐÄ£¬£¬£¬ £¬£¬£¬ £¬²¢°´ÆÚ¼ì²éÕË»§±¨±íºÍÐÅÓñ¨¸æÒÔÌá·ÀڲƭºÍÉí·Ý͵ÇÔ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉèÁ¢ÁËרÃŵÄ×ÊÖúÈÈÏß¹©ÈËÃǽâ¾öÒÉÂÇ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bitcoin-atm-firm-byte-federal-hacked-via-gitlab-flaw-58k-users-exposed/


6. ¶íÂÞ˹×éÖ¯TurlaÒþ²ØÔÚÆäËûºÚ¿Í±³ºó¹¥»÷ÎÚ¿ËÀ¼


12ÔÂ11ÈÕ£¬£¬£¬ £¬£¬£¬ £¬¶íÂÞË¹ÍøÂçÌØ¹¤×éÖ¯Turla£¨Óֳơ°ÉñÃØ±©Ñ©¡±£©±»ÆØÕýÔÚʹÓÃÆäËûºÚ¿Í×éÖ¯µÄ»ù´¡ÉèÊ©¹¥»÷ÎÚ¿ËÀ¼Í¨¹ýStarlinkÅþÁ¬µÄ¾üÊÂ×°±¸¡£¡£¡£¡£¡£Î¢ÈíºÍLumenÕ¹ÏÖÁËTurlaÔõÑùÐ®ÖÆ»òʹÓðͻù˹̹ºÚ¿Í×éÖ¯Storm-0156µÄ¶ñÒâÈí¼þºÍЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬ £¬ÒÔ¼°ÔõÑùʹÓÃAmadey½©Ê¬ÍøÂçºÍ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-1837µÄ»ù´¡ÉèÊ©£¬£¬£¬ £¬£¬£¬ £¬ÔÚÎÚ¿ËÀ¼ÏµÍ³Éϰ²ÅÅÆä×Ô½ç˵¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬ £¬ÈçTavdigºÍKazuarV2¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬ £¬£¬£¬ £¬Ê¹ÓöñÒ⸽¼þ¡¢Storm-1837ºóÃÅ»òAmadey½©Ê¬ÍøÂç°²ÅÅÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£Î¢ÈíÖ¸³ö£¬£¬£¬ £¬£¬£¬ £¬TurlaʹÓñ»Í¶·ÅµÄÅú´¦Öóͷ£ÎļþÌṩµÄÕì̽ÐÅÏ¢£¬£¬£¬ £¬£¬£¬ £¬Ê¶±ðÅþÁ¬µ½Starlink»¥ÁªÍøÏµÍ³µÄ¾üÊÂ×°±¸µÈ¸ßÓÅÏȼ¶Ä¿µÄ¡£¡£¡£¡£¡£TurlaµÄ¶¨ÖƶñÒâÈí¼þ¼Ò×åTavdigºÍKazuarV2ÔÚÆäÌØ¹¤»î¶¯ÖÐʩչ×ÅÆæÒì×÷Ó㬣¬£¬ £¬£¬£¬ £¬Ç°ÕßÓÃÓÚ½¨Éè³õʼפ×ãµãºÍ¼àÊÓ£¬£¬£¬ £¬£¬£¬ £¬ºóÕßÔòרעÓÚºã¾ÃÇé±¨ÍøÂç¡¢ÏÂÁîÖ´ÐкÍÊý¾Ýй¶¡£¡£¡£¡£¡£Î¢Èí½¨Òé·ÀÓùÕß¼ì²éÆäÌá³öµÄ»º½â²½·¥ºÍËÑË÷ÅÌÎÊ£¬£¬£¬ £¬£¬£¬ £¬ÒÔÓ¦¶ÔTurlaµÄ»î¶¯¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-cyber-spies-hide-behind-other-hackers-to-target-ukraine/