¶íÂÞ˹ÎÀÐÇͨѶÉÌDozor-Teleport±»ºÚÔÝʱÎÞ·¨»á¼û

Ðû²¼Ê±¼ä 2023-07-04

1¡¢¶íÂÞ˹ÎÀÐÇͨѶÉÌDozor-Teleport±»ºÚÔÝʱÎÞ·¨»á¼û


¾ÝýÌå6ÔÂ30ÈÕ±¨µÀ£¬£¬ £¬£¬£¬Ä³ºÚ¿ÍÍÅ»ïÉù³Æ¶Ô¶íÂÞ˹ÎÀÐÇͨѶÌṩÉÌDozor-TeleportÔâµ½µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£¸ÃÌṩÉÌΪÄÜÔ´¹«Ë¾ÒÔ¼°¸Ã¹úµÄ¹ú·ÀºÍÇå¾²»ú¹¹ËùÓᣡ£¡£¡£¡£¡£¡£×ÔÃÀ¹ú¶«²¿Ê±¼äÉÏÖÜÈýÍíÉÏ10µãÒÔÀ´£¬£¬ £¬£¬£¬¸Ã¹«Ë¾µÄÍøÂçÒ»Ö±´¦ÓÚÖÐֹ״̬£¬£¬ £¬£¬£¬ÍøÕ¾Ò²ÒѹرÕ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬DozorµÄĸ¹«Ë¾Amtel SvyazÒ²ÔÚÉÏÖÜÈýÍí¼ä±¬·¢ÁËÑÏÖØµÄÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄ×éÖ¯Éù³ÆÓëWagner GroupÓйØ£¬£¬ £¬£¬£¬µ«ºóÕߵĹٷ½TelegramÖÐûÓÐÌá¼°´Ë´Î¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í³ÆÈëÇÖÁ˲¿·ÖÎÀÐÇÖÕ¶Ë£¬£¬ £¬£¬£¬ÇÔÈ¡ÁËЧÀÍÆ÷ÉϵÄÉñÃØÐÅÏ¢£¬£¬ £¬£¬£¬²¢¹ûÕæÁË700¸öÎļþ£¬£¬ £¬£¬£¬°üÀ¨ÎĵµºÍͼÏñ¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/hackers-take-down-russian-satellite-provider


2¡¢ÃÀ¹úרÀûÉ̱ê¾ÖÉèÖùýʧй¶Լ6Íò¸öÉêÇëÈ˵ÄÐÅÏ¢


¾Ý6ÔÂ28ÈÕ±¨µÀ£¬£¬ £¬£¬£¬ÃÀ¹úרÀûÉ̱ê¾Ö (USPTO) й¶ÁËÔ¼61000¸öÉêÇëÈ˵ÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâÊÇÔÚÒ»¸öAPIÖз¢Ã÷µÄ£¬£¬ £¬£¬£¬µ¼Ö´ÓÉêÇëÈËÄÇÀïÍøÂçµÄµØµãÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬£¬´Ë´Îй¶ÊÂÎñÓ°ÏìÁË2020Äê2ÔÂÖÁ2023Äê3ÔÂÌá½»µÄÔ¼3%µÄÉêÇëÈË¡£¡£¡£¡£¡£¡£¡£USPTO³Æ£¬£¬ £¬£¬£¬ËûÃÇ·¢Ã÷Õâ¸öÎÊÌâºó£¬£¬ £¬£¬£¬Á¬Ã¦×èÖ¹Á˶ÔËùÓÐUSPTO·ÇÒªº¦APIµÄ»á¼û£¬£¬ £¬£¬£¬²¢Ï¼ÜÁËÊÜÓ°ÏìµÄÅúÁ¿Êý¾Ý²úÆ·£¬£¬ £¬£¬£¬Ö±µ½¿ÉÒÔÓÀÊÀÐÞ¸´¡£¡£¡£¡£¡£¡£¡£


https://techcrunch.com/2023/06/28/uspto-trademark-data-api-leak/


3¡¢Akamai¼ì²âµ½Ê¹ÓÃSSHЧÀÍÆ÷µÄÐÂÊðÀíÐ®ÖÆ¹¥»÷»î¶¯


AkamaiÔÚ6ÔÂ29ÈÕ³ÆÆä¼ì²âµ½Ò»¸öÊðÀíÐ®ÖÆ»î¶¯£¬£¬ £¬£¬£¬Ö÷ÒªÕë¶ÔÒ×Êܹ¥»÷µÄSSHЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£AkamaiÓÚ6ÔÂ8ÈÕÊ״η¢Ã÷ÕâЩ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ò»µ©ÅþÁ¬µ½SSHЧÀÍÆ÷£¬£¬ £¬£¬£¬¹¥»÷Õ߾ͻá×°ÖÃÒ»¸öBase64±àÂëµÄBash¾ç±¾£¬£¬ £¬£¬£¬½«±»¹¥»÷µÄϵͳÌí¼Óµ½HoneygainºÍPeer2ProfitµÈP2PÊðÀíÍøÂçÖС£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬Ëü»¹»áËÑË÷²¢ÖÕÖ¹ÔËÐдø¿í¹²Ïí³ÌÐòµÄ¾ºÕùʵÀý£¬£¬ £¬£¬£¬È»ºóÆô¶¯DockerЧÀÍ£¬£¬ £¬£¬£¬Ê¹ÓÃÄ¿µÄµÄ´ø¿í»ñÈ¡ÀûÈ󡣡£¡£¡£¡£¡£¡£¶ÔÍøÂçЧÀÍÆ÷µÄ½øÒ»²½ÆÊÎö·¢Ã÷£¬£¬ £¬£¬£¬Ëü»¹±»ÓÃÀ´ÍйܼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬£¬ £¬£¬£¬ÕâÅú×¢¹¥»÷ÕßÕýÔÚÉæ×ã¼ÓÃÜÐ®ÖÆºÍÊðÀíÐ®ÖÆ¹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://www.akamai.com/blog/security-research/proxyjacking-new-campaign-cybercriminal-side-hustle


4¡¢Ñо¿Ö°Ô±³Æ½öÐè6´ÎʵÑé¾Í¿ÉÈÆ¹ýÓïÒôÉí·ÝÑéÖ¤


ýÌå6ÔÂ30Èճƣ¬£¬ £¬£¬£¬»¬Ìú¬´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖ¿ÉÒÔÈÆ¹ýÓïÒôÉí·ÝÑéÖ¤µÄÊÖÒÕ£¬£¬ £¬£¬£¬²¢ÌåÏÖÖ»ÐèÁù´ÎʵÑéÀÖ³ÉÂʾ͸ߴï99%¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±È·¶¨ÁËdeepfakeÒôƵÖÐÅú×¢ËüÊÇÓÉÅÌËã»úÌìÉúµÄ±ê¼Ç£¬£¬ £¬£¬£¬²¢¿ª·¢ÁËÒ»¸ö³ÌÐòÀ´É¾³ýÕâЩ±ê¼Ç£¬£¬ £¬£¬£¬Ê¹ÆäÓëÕæÊµÒôƵÎÞ·¨Çø·Ö¡£¡£¡£¡£¡£¡£¡£ÔÚÕë¶ÔAmazon ConnectÓïÒôÉí·ÝÑé֤ϵͳµÄ²âÊÔÖУ¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÔÚ4ÃëµÄ¹¥»÷ÖÐÈ¡µÃÁË10%µÄÀÖ³ÉÂÊ£¬£¬ £¬£¬£¬ÔÚʵÑé6´ÎºóÀÖ³ÉÂʸߴï99%¡£¡£¡£¡£¡£¡£¡£


https://www.malwarebytes.com/blog/news/2023/06/new-technique-can-defeat-voice-authentication-in-just-6-attempts


5¡¢AhnLab³ÆÀÕË÷ÍÅ»ïCrysisͨ¹ýRDP×°ÖÃVenusÀÕË÷Èí¼þ


7ÔÂ3ÈÕ±¨µÀ³Æ£¬£¬ £¬£¬£¬AhnLab½üÆÚ·¢Ã÷ÀÕË÷ÍÅ»ïCrysisÔÚ¹¥»÷ÖÐҲʹÓÃÁËVenusÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£CrysisºÍVenus¶¼ÊÇÕë¶Ô̻¶µÄÔ¶³Ì×ÀÃæÐ§À͵ÄÖ÷ÒªÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃRDP×÷Ϊ¹¥»÷ǰÑÔ£¬£¬ £¬£¬£¬ÏÈʵÑéʹÓÃCrysis¼ÓÃÜϵͳ£¬£¬ £¬£¬£¬ÔÚʧ°Üºó£¬£¬ £¬£¬£¬ÔÙ´ÎʵÑéʹÓÃVenus¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£³ýÁËÁ½¸öÀÕË÷Èí¼þÖ®Í⣬£¬ £¬£¬£¬¹¥»÷Õß»¹×°ÖÃÁËÖÖÖÖÆäËü¹¤¾ß£¬£¬ £¬£¬£¬ÀýÈç¶Ë¿ÚɨÃèÆ÷ºÍMimikatz¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚ¹¥»÷ÕßÔÚ³õʼÈëÇֺͺáÏòÒÆ¶¯ÖÐһֱʹÓÃRDP£¬£¬ £¬£¬£¬½¨ÒéÓû§ÔÚ²»Ê¹ÓÃʱͣÓÃRDP£¬£¬ £¬£¬£¬»òʹÓÃÖØ´óµÄÕË»§ÃÜÂë²¢°´ÆÚ¸ü¸Ä£¬£¬ £¬£¬£¬À´·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£


https://asec.ahnlab.com/en/54937/


6¡¢SekoiaÐû²¼¹ØÓÚDDoS¹¥»÷¹¤¾ß°üDDoSiaµÄÆÊÎö±¨¸æ


6ÔÂ29ÈÕ£¬£¬ £¬£¬£¬SekoiaÐû²¼¹ØÓÚDDoSiaÏîÄ¿µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£DDoSiaÊÇÒ»¸öDDoS¹¥»÷¹¤¾ß°ü£¬£¬ £¬£¬£¬ÓÉÓë¶íÂÞ˹Ïà¹ØµÄ×éÖ¯NoName057(16)¿ª·¢ºÍʹÓᣡ£¡£¡£¡£¡£¡£DDoSiaÏîÄ¿ÓÚ2022ÄêÍ·ÔÚTelegramÉÏÆô¶¯£¬£¬ £¬£¬£¬×èÖ¹½ñÄê6Ô£¬£¬ £¬£¬£¬Æä³ÉÔ±Áè¼Ý10000ÈË¡£¡£¡£¡£¡£¡£¡£SekoiaÍøÂçÁËDDoSiaµÄC2ÔÚ5ÔÂ8ÈÕÖÁ6ÔÂ26ÈÕ·¢Ë͵ÄһЩµÄÊý¾Ý£¬£¬ £¬£¬£¬·¢Ã÷Ö÷ÒªÕë¶ÔÁ¢ÌÕÍð¡¢ÎÚ¿ËÀ¼ºÍ²¨À¼£¬£¬ £¬£¬£¬Õ¼×ܻµÄ39%¡£¡£¡£¡£¡£¡£¡£ÔÚ´Ëʱ´ú£¬£¬ £¬£¬£¬DDoSia×ܹ²¹¥»÷ÁË486¸öÍøÕ¾¡£¡£¡£¡£¡£¡£¡£


https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/