Yandex°üÀ¨Ô´´úÂëÔÚÄÚµÄ44.7GBÊý¾Ý±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳
Ðû²¼Ê±¼ä 2023-01-30
¾ÝýÌå1ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬ºÚ¿ÍÔÚBrached ForumsÉÏÐû²¼ÁËYandexµÄ44.7 GBÊý¾Ý£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô´´úÂë´æ´¢¿â¡£¡£¡£¡£¡£¡£¡£YandexÒ²³ÆÎª¶íÂÞ˹¹È¸è£¬£¬£¬£¬£¬´Ë´Îй¶²»Éæ¼°Óû§ºÍÔ±¹¤µÄÊý¾Ý£¬£¬£¬£¬£¬¿ÉÊǰüÀ¨1900¶à¸öÓÃÓÚ¶ÔËÑË÷Ч¹û¾ÙÐÐÅÅÃûµÄÒòËØ¡£¡£¡£¡£¡£¡£¡£YandexÌåÏÖËüÖªµÀ´Ëй¶£¬£¬£¬£¬£¬²¢ÇÒÒѾ×îÏÈÊÓ²ìÆäÔµ¹ÊÔÓÉ¡£¡£¡£¡£¡£¡£¡£µ«Æä·ñ¶¨Ôâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬²¢Í¸Â¶¸ÃÊÂÎñ¿ÉÄÜÓ빫˾µÄǰ¹ÍÔ±Óйء£¡£¡£¡£¡£¡£¡£Yandex¾³£Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬2016ÄêÆä630Íò¸öÓû§µÄÊý¾Ý±»³öÊÛ£¬£¬£¬£¬£¬2021Äê9ÔÂÓÖÔâµ½ÁËÉæ¼°200000¸ö±»Ñ¬È¾ÎïÁªÍø×°±¸µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.hackread.com/yandex-source-code-hacked-leaked/
2¡¢Killnet DDoS¹¥»÷µÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍÒøÐеÄÍøÕ¾
ýÌå1ÔÂ29ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯KillnetÊÇÕë¶ÔµÂ¹ú»ú³¡¡¢ÐÐÕþ»ú¹¹ºÍ½ðÈÚ×éÖ¯ÍøÕ¾µÄDDoS¹¥»÷µÄÄ»ºóºÚÊÖ¡£¡£¡£¡£¡£¡£¡£½²»°È˳ƣ¬£¬£¬£¬£¬Áª°îÍøÂçÇå¾²¾Ö£¨BSI£©ÕýÔÚÊÓ²ìÕë¶ÔµÂ¹ú×éÖ¯µÄDDoS¹¥»÷£¬£¬£¬£¬£¬ÕâЩ¹¥»÷Ö÷ÒªÕë¶Ô»ú³¡ÍøÕ¾£¬£¬£¬£¬£¬½ðÈÚÐÐÒµÒÔ¼°Áª°îºÍÖÝÕþ¸®µÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£KillnetÔÚÆäTelegramƵµÀÉÏÐû²¼ÁËÕâЩ¹¥»÷£¬£¬£¬£¬£¬ÕâÊǸÃ×éÖ¯µÄϰÓÃ×ö·¨¡£¡£¡£¡£¡£¡£¡£BSIÌåÏÖ£¬£¬£¬£¬£¬¶ÔÐÐÕþ²¿·ÖµÄ¹¥»÷ÔںܺéÁ÷ƽÉÏÒѱ»×èÖ¹£¬£¬£¬£¬£¬Ã»ÓÐÔì³ÉÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/141513/hacktivism/killnet-targets-germany.html
3¡¢ÀÍÑάÑǹú·À²¿Ôâµ½ºÚ¿ÍÍÅ»ïGamaredonµÄ´¹ÂÚ¹¥»÷
ýÌå1ÔÂ28Èճƣ¬£¬£¬£¬£¬ÀÍÑάÑǹú·À²¿Ôâµ½ÁËGamaredonµÄ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹ú·À²¿Í¸Â¶ºÚ¿Íð³äÎÚ¿ËÀ¼Õþ¸®¹ÙÔ±ÏòÆä¼¸ÃûÔ±¹¤·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬µ«²¢Î´Àֳɡ£¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯µÄѬȾÁ´ÎªHTMLSmuggling -> ZIP -> LNK -> HTA£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËÓòÃûadmou[.]orgÀ´·¢ËÍÓʼþ£¬£¬£¬£¬£¬¸ÃÓò±»ÒÔΪÓëGamaredonÓÐÏà¹ØÁª¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£¡£GamaredonÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼£¬£¬£¬£¬£¬CERT-UA³Æ2022ÄêÎÚ¿ËÀ¼¼Í¼ÁË70¶àÆðÓë¸ÃÍÅ»ïÏà¹ØµÄ¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/latvia-confirms-phishing-attack-on-ministry-of-defense-linking-it-to-russian-hacking-group/
4¡¢Î¢Èí³ÆÂ·ÓÉÆ÷IP¸ü¸Äµ¼ÖÂMicrosoft 365ÖÐÖ¹³¤´ïÎåСʱ
¾Ý1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬Î¢Èí͸¶ÉÏÖÜMicrosoft 365ÔÚÈ«Çò¹æÄ£ÄÚÖÐÖ¹³¤´ïÎåСʱÊÇÓÉ·ÓÉÆ÷IPµØµã¸ü¸ÄÒýÆðµÄ£¬£¬£¬£¬£¬¸Ã¸ü¸Äµ¼ÖÂÆä¹ãÓòÍø(WAN)ÖÐËùÓÐÆäËü·ÓÉÆ÷Ö®¼äµÄÊý¾Ý°üת·¢·ºÆðÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Redmond»¨ÁËÎå¸ö¶àСʱ²Å½â¾öÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬´Ó2023Äê1ÔÂ25ÈÕ07:05µ½12:43¡£¡£¡£¡£¡£¡£¡£Î¢Èí»¹Í¸Â¶£¬£¬£¬£¬£¬µ±Ê¹ÓÃδ¾³¹µ×Éó²éÇÒÔÚ²î±ðÍøÂç×°±¸ÉϾßÓвî±ðÐÐΪµÄÏÂÁî¸ü¸ÄWAN·ÓÉÆ÷µÄIPµØµãʱ£¬£¬£¬£¬£¬»á´¥·¢¸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ÔÚ´ËÊÂÎñÖ®ºó£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖËüÏÖÔÚÕýÔÚ×èÖ¹Ö´ÐÐÓ°ÏìºÜ´óµÄÏÂÁ£¬£¬£¬£¬²¢ÇÒ»¹½«ÒªÇóËùÓÐÏÂÁîµÄÖ´Ðж¼×ñÕÕÇå¾²ÉèÖøü¸ÄµÄ×¼Ôò¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/massive-microsoft-365-outage-caused-by-wan-router-ip-change/
5¡¢SOLAR INDUSTRIES INDIAÔ¼2TBµÄ¾üÊÂÉñÃØÊý¾Ýй¶
ýÌå1ÔÂ27ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïBlackCat³ÆÒÑÈëÇÖSOLAR INDUSTRIES INDIA²¢ÇÔÈ¡ÁË2TBµÄ¾üÊÂÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÊÇÈ«Çò¹«ÈϵĹ¤ÒµÕ¨Ò©ÖÆÔìÉÌ£¬£¬£¬£¬£¬ÌṩÍêÕûµÄ±¬ÆÆ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ô±¹¤ºÍ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢ÖÖÖÖȪԴµÄ¾ü±¸¹©Ó¦Á´¡¢ÎäÆ÷µÄÀ¶Í¼ºÍ¹¤³ÌÎļþÒÔ¼°Õþ¸®Îļþϸ½ÚµÈ¡£¡£¡£¡£¡£¡£¡£BlackCatÐû²¼Á˱»µÁÎļþµÄ½ØÍ¼ºÍ´Ó¹«Ë¾ÉãÏñÍ·ÅÄÉãµÄÕÕÆ¬×÷Ϊ¹¥»÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÉù³ÆÓµÓÐÔÚÆäËû¹ú¼Ò¾ÙÐÐÌØ¹¤»î¶¯µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/141409/data-breach/blackcat-ransomware-solar-industries-india.html
6¡¢¹ú¼ÊÁªºÏÖ´·¨Ðж¯Àֳɲé»ñÀÕË÷Èí¼þHiveµÄ»ù´¡ÉèÊ©
¾ÝýÌå1ÔÂ26Èճƣ¬£¬£¬£¬£¬¹ú¼ÊÁªºÏÖ´·¨Ðж¯ÀÖ³ÉÒѲé»ñÓëHiveÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)»î¶¯Ïà¹ØµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úDoJÌåÏÖ£¬£¬£¬£¬£¬FBIÓÚ2022Äê7ÔÂÉøÍ¸ÁËHiveÊý¾Ý¿âЧÀÍÆ÷£¬£¬£¬£¬£¬»ñµÃÁË336¸ö½âÃÜÃÜÔ¿²¢ÌṩӦȫÇò¹æÄ£ÄÚ±»¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬½ÚÔ¼ÁË1.3ÒÚÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬FBI»ñµÃÁ˼ÓÀû¸£ÄáÑÇÒ»¼ÒÍйÜЧÀÍÌṩÉ̵ÄÁ½Ì¨×¨ÓÃЧÀÍÆ÷ºÍһ̨ÐéÄâרÓÃЧÀÍÆ÷µÄ»á¼ûȨ£¬£¬£¬£¬£¬ËûÃÇÓÉHive³ÉÔ±×âÓᣡ£¡£¡£¡£¡£¡£ÔÚе÷Ðж¯ÖУ¬£¬£¬£¬£¬ºÉÀ¼¾¯·½»¹»ñµÃÁ˶ÔÔÚºÉÀ¼ÍйܵÄÁ½¸ö±¸·ÝרÓÃЧÀÍÆ÷µÄ»á¼ûȨ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2023/01/hive-ransomware-infrastructure-seized.html


¾©¹«Íø°²±¸11010802024551ºÅ