ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷

Ðû²¼Ê±¼ä 2024-11-13

1. ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷


11ÔÂ10ÈÕ£¬£¬£¬ £¬ £¬£¬ÒÔÉ«Áи÷µØµÄÐÅÓÿ¨Ë¢¿¨×°±¸Í»·¢¹ÊÕÏ£¬£¬£¬ £¬ £¬£¬µ¼Ö³¬ÊкͼÓÓÍÕ¾µÄÖ÷¹ËÎÞ·¨¾ÙÐÐÖ§¸¶£¬£¬£¬ £¬ £¬£¬Ò»Á¬Ô¼Ò»Ð¡Ê±¡£¡£¡£¡£¡£¡£¾Ý¡¶Ò®Â·ÈöÀäÓʱ¨¡·±¨µÀ£¬£¬£¬ £¬ £¬£¬¹ÊÕÏÔµ¹ÊÔ­ÓÉÊÇÍâµØÖ§¸¶Íø¹Ø¹«Ë¾HypÆìϵÄCreditGuard²úÆ·ÔâÓöÁËÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬ £¬ £¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÐÅÓÿ¨ÖÕ¶ËÓëÖ§¸¶ÏµÍ³¼äµÄͨѶ£¬£¬£¬ £¬ £¬£¬µ«²¢Î´µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Hyp¹«Ë¾½²»°ÈËÌåÏÖ£¬£¬£¬ £¬ £¬£¬¹¥»÷Ö÷ÒªÕë¶Ô²¿·ÖЧÀͼ°Í¨Ñ¶ÌṩÉÌ£¬£¬£¬ £¬ £¬£¬²¢Òѱ»Ñ¸ËÙ×èÖ¹£¬£¬£¬ £¬ £¬£¬Ð§ÀÍËæºó»Ö¸´¡£¡£¡£¡£¡£¡£Ö»¹ÜÉв»ÇåÎú¹¥»÷ÕßÉí·Ý£¬£¬£¬ £¬ £¬£¬µ«ÒÔÉ«ÁÐýÌåÖ¸³ö£¬£¬£¬ £¬ £¬£¬Ò»¸öÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Éù³ÆÈÏÕæ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓë10Ô·ÝÖ§¸¶¹«Ë¾ShebaÔâÓöµÄÀàËÆDDoS¹¥»÷ÏàËÆ£¬£¬£¬ £¬ £¬£¬Æäʱ¹¥»÷µ¼ÖÂÖ§¸¶ÖÐÖ¹ÈýСʱ¡£¡£¡£¡£¡£¡£×Ô10ÔÂ7ÈÕ¿Ö²ÀÏ®»÷ÒÔÀ´£¬£¬£¬ £¬ £¬£¬ÒÔÉ«ÁÐÃñÓûù´¡ÉèÊ©ÒòµØÇø³åÍ»ÔâÓöÁ˸ü¶àÍøÂç¹¥»÷£¬£¬£¬ £¬ £¬£¬Ö÷ÒªÓÉÓëÒÁÀʺÍÕæÖ÷µ³Ïà¹ØµÄºÚ¿ÍÕûÌå¼°ÆäËûÕþÖÎÄîÍ·ºÚ¿ÍÌᳫ£¬£¬£¬ £¬ £¬£¬²»µ«Ó°ÏìÒÔÉ«Áб¾ÍÁ£¬£¬£¬ £¬ £¬£¬»¹²¨¼°µØÇøÍâµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£


https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction


2. °¢»ôµÂµÂ¶ûº£×ÈÃÀ¹úÍøÂçÔâ¹¥»÷£¬£¬£¬ £¬ £¬£¬¶à¼Ò×ÅÃû³¬ÊÐÔËÓªÊÜÓ°Ïì


11ÔÂ13ÈÕ£¬£¬£¬ £¬ £¬£¬ºÉÀ¼¹«Ë¾°¢»ôµÂµÂ¶ûº£×È£¬£¬£¬ £¬ £¬£¬×÷ΪStop & Shop¡¢Hannaford¡¢Food LionºÍGiant FoodµÈÃÀ¹ú×ÅÃû³¬ÊÐÆ·ÅƵÄĸ¹«Ë¾£¬£¬£¬ £¬ £¬£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬ £¬ £¬£¬µ¼ÖÂÆä±é²¼ÃÀ¹úµÄ2000¶à¼ÒÃŵ귺ÆðÎÊÌâ¡£¡£¡£¡£¡£¡£¾Ý¸÷µØÐÂÎÅýÌ屨µÀ£¬£¬£¬ £¬ £¬£¬×¡ÃñÎÞ·¨ÔÚÏßϳ¬ÊÐÍê³ÉʳÎïÔÓ»õÅäËͶ©µ¥£¬£¬£¬ £¬ £¬£¬²¿·Ö³¬ÊÐÆ·ÅÆÍøÕ¾Ò²ÒÑÏÂÏߣ¬£¬£¬ £¬ £¬£¬Ö»¹ÜÊÐËÁÈԿɽÓÊÜÐÅÓÿ¨¸¶¿î²¢´¦Öóͷ£²¿·ÖÒ©Æ·¶©µ¥¡£¡£¡£¡£¡£¡£°¢»ôµÂµÂ¶ûº£×ȹ«Ë¾ÒÑִ֪ͨ·¨²¿·Ö£¬£¬£¬ £¬ £¬£¬²¢ÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÕö¿ªÊӲ죬£¬£¬ £¬ £¬£¬Í¬Ê±½ÓÄɲ½·¥ÆÀ¹À»ººÍ½âÎÊÌ⣬£¬£¬ £¬ £¬£¬°üÀ¨ÈÃһЩϵͳÀëÏßÒÔ±£» £»£» £»£»¤ËüÃÇ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ó°ÏìÁ˹«Ë¾µÄÄ³Ð©Æ·ÅÆºÍЧÀÍ£¬£¬£¬ £¬ £¬£¬°üÀ¨Ò»Ð©Ò©µêºÍµç×ÓÉÌÎñÓªÒµ¡£¡£¡£¡£¡£¡£×èÖ¹12ÈÕÏÂÖ磬£¬£¬ £¬ £¬£¬²¿·Ö³¬ÊÐÆ·ÅÆÍøÕ¾Òѻָ´£¬£¬£¬ £¬ £¬£¬µ«HannafordµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬£¬£¬£¬ £¬ £¬£¬²¢Ðû²¼ÐÂÎųƻָ´ÊÂÇéÕýÔÚ¾ÙÐÐÖУ¬£¬£¬ £¬ £¬£¬Í¬Ê±ÌáÐѿͻ§Ò©·¿ºÍTo Go¶©µ¥Êܵ½µÄÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞºÚ¿Í×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬ £¬ £¬£¬µ«ÁãÊÛµêºÍ³¬Êо­³£³ÉΪÀÕË÷Èí¼þÍÅ»ïºÍÍøÂç·¸·¨ÍÅ»ïµÄ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£


https://therecord.media/dutch-company-stop-shop-hannaford-cyber


3. ³¯ÏʺڿÍʹÓÃÕýµ±ÊðÃûÓ¦Óù¥»÷macOSϵͳ


11ÔÂ12ÈÕ£¬£¬£¬ £¬ £¬£¬³¯ÏÊÍþвÐÐΪÕßʹÓôøÓÐľÂíµÄ¼Çʱ¾Ó¦ÓóÌÐòºÍ»ùÓÚFlutter¿ò¼ÜµÄɨÀ×ÓÎÏ·¹¥»÷Apple macOSϵͳ£¬£¬£¬ £¬ £¬£¬ÕâЩӦÓúÍÓÎÏ·¾ùÓÉÕýµ±µÄApple¿ª·¢ÕßIDÊðÃûºÍ¹«Ö¤£¬£¬£¬ £¬ £¬£¬Òò´ËÄܹ»ÔÝʱͨ¹ýAppleµÄÇå¾²¼ì²é£¬£¬£¬ £¬ £¬£¬ÔÚmacOSϵͳÉϲ»ÊÜÏÞÖÆµØÖ´ÐС£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòµÄÃû³ÆÒÔ¼ÓÃÜÇ®±ÒΪÖ÷Ì⣬£¬£¬ £¬ £¬£¬Ó볯ÏʺڿͶԽðÈÚ͵ÇÔµÄÐËȤÏà·û¡£¡£¡£¡£¡£¡£¾ÝJamf Threat Labs·¢Ã÷£¬£¬£¬ £¬ £¬£¬ÕâЩ»î¶¯¿´ËÆÊÇÈÆ¹ýmacOSÇå¾²»úÖÆµÄʵÑ飬£¬£¬ £¬ £¬£¬¶ø·Ç³ÉÊìÐж¯¡£¡£¡£¡£¡£¡£´Ó2024Äê11ÔÂ×îÏÈ£¬£¬£¬ £¬ £¬£¬JamfÔÚVirusTotalÉÏ·¢Ã÷¶à¸ö¿´ËÆÎÞº¦È´ÅþÁ¬µ½³¯ÏÊЧÀÍÆ÷µÄÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòʹÓÃFlutter¿ò¼Ü¹¹½¨£¬£¬£¬ £¬ £¬£¬Îª¶ñÒâÈí¼þ×÷ÕßÌṩÁ˶๦ЧÐÔÇÒ¸üÄѼì²â¡£¡£¡£¡£¡£¡£Jamf»¹·¢Ã÷Áù¸ö¶ñÒâÓ¦ÓóÌÐòÖÐÓÐÎå¸öÒÑÊðÃû²¢¹«Ö¤£¬£¬£¬ £¬ £¬£¬ÇÒ±£´æ»ùÓÚGolangºÍPythonµÄ±äÌå¡£¡£¡£¡£¡£¡£Æ»¹û¹«Ë¾ÒÑ×÷·ÏÕâЩӦÓóÌÐòµÄÊðÃû£¬£¬£¬ £¬ £¬£¬µ«Éв»ÇåÎúËüÃÇÊÇ·ñÔøÔÚÏÖʵ²Ù×÷ÖÐʹÓùý£¬£¬£¬ £¬ £¬£¬ÕվɽöÓÃÓÚ²âÊÔÆÀ¹ÀÈÆ¹ýÇå¾²Èí¼þµÄÊÖÒÕ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/


4. GoIssue£ºÐÂÐÍGitHubÍøÂç´¹ÂÚ¹¤¾ßÒý·¢Çå¾²¾¯±¨


11ÔÂ12ÈÕ£¬£¬£¬ £¬ £¬£¬SlashNextÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪGoIssueµÄÐÂÐÍÖØ´óÍøÂç´¹ÂÚ¹¤¾ß£¬£¬£¬ £¬ £¬£¬¸Ã¹¤¾ß¿ÉÄÜÓëGitLokerÀÕË÷»î¶¯ÓйØ£¬£¬£¬ £¬ £¬£¬×¨ÃÅÕë¶ÔGitHubÓû§¡£¡£¡£¡£¡£¡£GoIssueÄÜ´Ó¹«¹²GitHubСÎÒ˽¼Ò×ÊÁÏÖÐÏµÍ³ÍøÂçµç×ÓÓʼþµØµã£¬£¬£¬ £¬ £¬£¬²¢Ê¹ÓÃÕâЩÐÅÏ¢Ìᳫ´ó¹æÄ£¡¢ÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¶¨Öư汾ºÍÍêÕûÔ´´úÂëµÄ»á¼û»®·ÖÊÛ¼Û700ÃÀÔªºÍ3000ÃÀÔª¡£¡£¡£¡£¡£¡£ÀֳɵĹ¥»÷¿ÉÄܵ¼ÖÂÔ´´úÂë±»µÁ¡¢¹©Ó¦Á´±»¹¥»÷ÒÔ¼°ÆóÒµÍøÂç±»ÈëÇÖ¡£¡£¡£¡£¡£¡£¾ÝSlashNext±¨µÀ£¬£¬£¬ £¬ £¬£¬GitLokerÍŶӳÉÔ±CyberluffyÓëGoIssueÓйØ£¬£¬£¬ £¬ £¬£¬ÕâÅú×¢Á½ÖÖ¹¤¾ß¿ÉÄܱ£´æ¹ØÁª¡£¡£¡£¡£¡£¡£GitHubÓû§Ó¦½ÓÄÉ×î¼ÑÔÚÏßÇ徲ʵ¼ù£¬£¬£¬ £¬ £¬£¬ÈçÇ¿ÃÜÂ롢˫ÒòËØÉí·ÝÑéÖ¤¡¢Ð¡ÐÄÍøÂç´¹ÂÚÓʼþºÍ°´ÆÚ¼ì²éOAuthÓ¦ÓÃȨÏÞ£¬£¬£¬ £¬ £¬£¬ÒÔ±£» £»£» £»£»¤×Ô¼ººÍ×éÖ¯ÃâÊÜDZÔÚË𺦡£¡£¡£¡£¡£¡£Sectigo¸ß¼¶Ñо¿Ô±Jason SorokoÖ¸³ö£¬£¬£¬ £¬ £¬£¬GoIssue²»µ«¶ÔGitHub×é³ÉÖØ´óÍþв£¬£¬£¬ £¬ £¬£¬Ò²¶ÔÆäËû¿ª·¢Õ߯½Ì¨×é³ÉΣº¦£¬£¬£¬ £¬ £¬£¬¿ª·¢Õ߯½Ì¨ÒѳÉΪ¸ßΣº¦µÄÕ½³¡£¬£¬£¬ £¬ £¬£¬ÐèÒª¿ìËÙÉú³¤Çå¾²·ÀÓùÀ´Ó¦¶ÔÕâÖ֯ձ鱣´æµÄÍþв¡£¡£¡£¡£¡£¡£


https://hackread.com/gitloker-goissue-tool-targets-github-phishing-users/


5. Form I-9 ComplianceÊý¾Ýй¶ӰÏìÈËÊýÔ¶³¬Ô¤ÆÚ


11ÔÂ12ÈÕ£¬£¬£¬ £¬ £¬£¬Ô±ÈËΪ¸ñÑéÖ¤½â¾ö¼Æ»®ÌṩÉÌForm I-9 ComplianceÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬ £¬£¬ÆäÓ°ÏìÖð½¥À©´ó£¬£¬£¬ £¬ £¬£¬Ô¶³¬×î³õÔ¤ÆÚ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ð­Öú¿Í»§ÌîдÕþ¸®ÒªÇóµÄI-9±í¸ñÎļþ£¬£¬£¬ £¬ £¬£¬ÓÃÓÚÑéÖ¤ÔÚÃÀ¹úÊܹÍСÎÒ˽¼ÒµÄÉí·ÝºÍÊÂÇéÔÊÐí¡£¡£¡£¡£¡£¡£½ñÄê2Ô³õ£¬£¬£¬ £¬ £¬£¬ÓÐÈËδ¾­ÊÚȨ»á¼ûÁËÆäÍøÂ磬£¬£¬ £¬ £¬£¬4ÔÂ12ÈÕÕâÒ»ÈëÇÖÐÐΪ±»·¢Ã÷£¬£¬£¬ £¬ £¬£¬Ëæºó¹«Ë¾¹Ø±ÕÁËһЩϵͳ×÷ΪÏìÓ¦²½·¥¡£¡£¡£¡£¡£¡£×î³õ£¬£¬£¬ £¬ £¬£¬¹«Ë¾Í¨ÖªÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ³ÆÊÜÓ°ÏìµÄÈËÊýԼΪ27,000ÈË£¬£¬£¬ £¬ £¬£¬µ«ËæºóÔÚ10Ô·Ý͸¶ÊÜÓ°ÏìÈËÊýÒÑÔöÌíÖÁ½ü97,000ÈË¡£¡£¡£¡£¡£¡£¶ø×î½ü¼¸Ìì¸üеÄÊý¾ÝÏÔʾ£¬£¬£¬ £¬ £¬£¬ÏÖʵÊÜÓ°ÏìµÄÈËÊýÒÑÁè¼Ý193,000ÈË¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃûºÍÉç»á°ü¹ÜºÅ£¬£¬£¬ £¬ £¬£¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò½«»ñµÃÃâ·ÑµÄÉí·Ý͵ÇÔ±£» £»£» £»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´ÎÊý¾Ýй¶ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬ £¬£¬Ò²Ã»ÓÐÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴ÎÈëÇÖÈÏÕæ¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/form-i-9-compliance-data-breach-impacts-over-190000-people/


6. Microsoft Exchange Õë¶ÔÀÄÓÃÓÕÆ­Îó²îµÄµç×ÓÓʼþÌí¼ÓÖÒÑÔ


11ÔÂ12ÈÕ£¬£¬£¬ £¬ £¬£¬Î¢ÈíÅû¶ÁËÒ»¸ö¸ßÑÏÖØÐÔµÄExchange ServerÎó²î£¨CVE-2024-49040£©£¬£¬£¬ £¬ £¬£¬¸ÃÎó²îÓÉSolidlabÇå¾²Ñо¿Ô±Vsevolod Kokorin·¢Ã÷£¬£¬£¬ £¬ £¬£¬Ó°ÏìExchange Server 2016ºÍ2019°æ±¾¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßαÔì´«Èëµç×ÓÓʼþµÄÕýµ±·¢¼þÈË£¬£¬£¬ £¬ £¬£¬Ìá¸ß¶ñÒâÐÂÎŵÄÓÐÓÃÐÔ¡£¡£¡£¡£¡£¡£ÎÊÌâÔ´ÓÚSMTPЧÀÍÆ÷¶ÔÊÕ¼þÈ˵صãµÄÆÊÎö²î±ðÒÔ¼°µç×ÓÓʼþÌṩÉÌÔÊÐíʹÓò»ÇкÏRFC±ê×¼µÄ·ûºÅ¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ±¾Ô²¹¶¡ÐÇÆÚ¶þÐû²¼Á˸üУ¬£¬£¬ £¬ £¬£¬Ìí¼ÓÎó²î¼ì²âºÍÖÒÑÔºá·ù£¬£¬£¬ £¬ £¬£¬ËäÈ»ÉÐδÐÞ²¹¸ÃÎó²î£¬£¬£¬ £¬ £¬£¬µ«ExchangeЧÀÍÆ÷ÏÖÔÚ½«¼ì²â¶ñÒâµç×ÓÓʼþ²¢Ìí¼ÓÖÒÑÔ¡£¡£¡£¡£¡£¡£ÖÎÀíÔ±ÆôÓÃĬÈÏÇå¾²ÉèÖú󣬣¬£¬ £¬ £¬£¬ÏµÍ³½«Ä¬ÈÏÆôÓÃÎó²î¼ì²âºÍµç×ÓÓʼþÖÒÑÔ£¬£¬£¬ £¬ £¬£¬²¢ÔÚ¼ì²âµ½µÄ¿ÉÒɵç×ÓÓʼþÖÐÌí¼ÓÖÒÑÔ£¬£¬£¬ £¬ £¬£¬ÌáÐÑÓû§²»ÒªÏàÐÅδÂÄÀúÖ¤µÄÐÅÏ¢¡¢Á´½Ó»ò¸½¼þ¡£¡£¡£¡£¡£¡£Î¢Èí½¨ÒéÓû§¼á³Ö¸Ã¹¦Ð§ÆôÓ㬣¬£¬ £¬ £¬£¬ÒÔ±ÜÃâÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/unpatched-microsoft-exchange-server-flaw-enables-spoofing-attacks/