²¼À­¸ñÓÎÏ·¼¯ÍÅÔâÓöÍøÂç¹¥»÷£¬£¬£¬ÄÚ²¿ÏµÍ³ÊÜÓ°Ïì

Ðû²¼Ê±¼ä 2025-08-21
1. ²¼À­¸ñÓÎÏ·¼¯ÍÅÔâÓöÍøÂç¹¥»÷£¬£¬£¬ÄÚ²¿ÏµÍ³ÊÜÓ°Ïì


8ÔÂ19ÈÕ£¬£¬£¬×ÅÃûiGamingÄÚÈÝÓëÊÖÒÕ½â¾ö¼Æ»®ÌṩÉ̲¼À­¸ñÓÎÏ·¼¯ÍÅ£¨Bragg£©ÉÏÖÜÄ©ÔâÓöÍøÂç¹¥»÷£¬£¬£¬ÆäÄÚ²¿ÏµÍ³Êܵ½Ò»¶¨Ó°Ïì¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÓÚÖÜÈÕÆÆÏþ£¬£¬£¬µ«¹«Ë¾ÖÜÒ»¹ûÕæÉùÃ÷³Æ£¬£¬£¬´Ë´Î¹¥»÷²¢Î´¶ÔÔËÓªÔì³ÉʵÖÊÐÔ×ÌÈÅ¡£¡£¡£¡£Æ¾Ö¤²¼À­¸ñ³õ³ÌÐò²éЧ¹û£¬£¬£¬Êý¾Ýй¶¹æÄ£½öÏÞÓÚÆóÒµÄÚ²¿ÅÌËã»úÇéÐΣ¬£¬£¬Î´²¨¼°Íⲿ¿Í»§»òÏàÖúͬ°éµÄϵͳ¡£¡£¡£¡£²¼À­¸ñÔÚÉùÃ÷ÖÐÇ¿µ÷£¬£¬£¬Ö»¹Ü¹¥»÷ÕßÀֳɻá¼ûÁËÊÜѬȾϵͳÄڵIJ¿·ÖÊý¾Ý£¬£¬£¬µ«ÏÖÔÚÉÐδ·¢Ã÷ÈκÎСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶µÄ¼£Ï󡣡£¡£¡£¹«Ë¾Í¬Ê±ÌåÏÖ£¬£¬£¬´Ë´ÎÊÂÎñδ¶ÔÆäÒ»Á¬ÔËÓªÄÜÁ¦±¬·¢¸ºÃæÓ°Ï죬£¬£¬ËùÓÐÒªº¦ÓªÒµ¹¦Ð§ÈÔ¼á³ÖÕý³£ÔËת£¬£¬£¬ÄÚ²¿Ö°Ô±¶ÔÏà¹ØÊý¾ÝµÄ»á¼ûȨÏÞҲδÊÜÏÞ¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»£»£»£»ú£¬£¬£¬²¼À­¸ñÒÑѸËÙÆô¶¯Ó¦¼±Ô¤°¸£¬£¬£¬°üÀ¨½ÓÄÉÊÖÒÕ²½·¥×èÖ¹¹¥»÷À©É¢¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ìÓëµ÷½âÊÂÇ飬£¬£¬²¢Ò»Á¬¼à¿ØÏµÍ³×´Ì¬ÒÔ±ÜÃâ¶þ´ÎΣº¦¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬²¼À­¸ñÉÐδÅû¶¹¥»÷µÄÏêϸϸ½Ú£¬£¬£¬°üÀ¨¹¥»÷ÀàÐÍ¡¢ÈëÇÖ·¾¶¼°ÔðÈη½Éí·Ý¡£¡£¡£¡£


https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/


2. °Ä´óÀûÑÇTPGµçÐÅÕýÔÚÊÓ²ìiiNetºÚ¿Í¹¥»÷ÊÂÎñ


8ÔÂ19ÈÕ£¬£¬£¬°Ä´óÀûÑÇÒÆ¶¯Í¨Ñ¶¾ÞÍ·TPG Telecom¿ËÈÕÅû¶ÁËÒ»ÆðÕë¶ÔÆäÆìÏÂiiNetÆ·ÅÆµÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾ÖܶþÌåÏÖ£¬£¬£¬ÆäÓÃÓÚÖÎÀíiiNet¿í´øµÈЧÀͶ©µ¥µÄÄÚ²¿ÏµÍ³ÔâÓöδ¾­ÊÚȨ»á¼û£¬£¬£¬ÏÖÔÚÕýÔÚ¾ÍÊÂÎñÓ°ÏìÕö¿ªÖÜÈ«ÊӲ졣¡£¡£¡£´Ë´ÎÊÂÎñËäÎ´Éæ¼°Ö§¸¶¿¨ÐÅÏ¢¡¢ÒøÐÐÕË»§»òÉí·ÝÖ¤¼þµÈÃô¸ÐÊý¾Ý£¬£¬£¬µ«ÒÑÈ·Èϲ¿·Ö¿Í»§»ù´¡ÐÅÏ¢±»ÇÔÈ¡£¡£¡£¡£¬£¬£¬³ÉΪ°Ä´óÀûÑǽüÆÚÓÖÒ»ÆðÒý·¢¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñ¡£¡£¡£¡£Æ¾Ö¤TPG TelecomÐû²¼µÄÉùÃ÷£¬£¬£¬ÈëÇÖÐÐΪͨ¹ýÇÔȡһÃûÔ±¹¤µÄÕË»§Æ¾Ö¤ÊµÑ飬£¬£¬¹¥»÷¹æÄ£±»ÆðÔ´¿ØÖÆÔÚiiNet¶©µ¥ÖÎÀíϵͳÖС£¡£¡£¡£¸Ã¹«Ë¾Ç¿µ÷£¬£¬£¬ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢¸üÆÕ±éµÄϵͳ»òÆäËû¿Í»§ÈºÌåÊܵ½Ó°Ïì¡£¡£¡£¡£È»¶ø£¬£¬£¬³õ³ÌÐò²éÒÑÈ·ÈϺڿÍÀֳɻñÈ¡ÁËÈýÀàÊý¾Ý£ºÔ¼28Íò¸ö»îÔ¾iiNetµç×ÓÓʼþµØµã¡¢2Íò¸ö»îÔ¾Àο¿µç»°ºÅÂ룬£¬£¬ÒÔ¼°1000×é°üÀ¨Óû§Ãû¡¢ÏÖʵµØµãºÍµç»°ºÅÂëµÄ¿Í»§ÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ô¼1700¸öµ÷ÖÆ½âµ÷Æ÷ÉèÖÃÃÜÂëÒ²±»Ð¹Â¶£¬£¬£¬¿ÉÄܶÔÓû§¼ÒÍ¥ÍøÂç×°±¸µÄÇå¾²ÐÔ×é³ÉDZÔÚÍþв¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬TPG TelecomÔÚͨ¸æÖÐÌØÊâ˵Ã÷£¬£¬£¬±»ÈëÇÖϵͳδ´æ´¢¿Í»§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢ÒøÐÐÕË»§ÏêÇé»òÉí·ÝÖ¤¼þ¸´Ó¡¼þµÈ¸ßÃô¸ÐÊý¾Ý£¬£¬£¬ÕâÔÚÒ»¶¨Ë®Æ½ÉϽµµÍÁË´ó¹æÄ£½ðÈÚÕ©Æ­»òÉí·ÝµÁÓõÄΣº¦¡£¡£¡£¡£


https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/


3. ŦԼÉÌҵίԱ»áÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬Ó°Ïì47,000ÈË


8ÔÂ19ÈÕ£¬£¬£¬Å¦Ô¼ÖÝÉÌҵίԱ»á£¨BCNYS£©¿ËÈÕÅû¶һÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Áè¼Ý4.7ÍòÃûСÎÒ˽¼ÒµÄÃô¸ÐÐÅÏ¢ÔâÇÔ£¬£¬£¬³ÉΪÃÀ¹ú½üÆÚÓ°Ïì¹æÄ£½Ï¹ãµÄÍøÂçÇå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£×÷ΪŦԼÖÝ×î´óµÄ¹ÍÖ÷Э»á£¬£¬£¬BCNYS´ú±í3000Óà¸ö»áÔ±×éÖ¯£¬£¬£¬Éæ¼°³¬120ÍòŦԼÖݾÍÒµÉú³Ý£¬£¬£¬´Ë´ÎÊÂÎñ¶ÔÆä»áÔ±¼°Ô±¹¤Òþ˽Çå¾²×é³ÉÖØ´óÍþв¡£¡£¡£¡£Æ¾Ö¤Îļþ£¬£¬£¬¹¥»÷ÕßÓÚ2ÔÂ24ÈÕÖÁ25ÈÕÈëÇÖBCNYSÄÚ²¿ÏµÍ³£¬£¬£¬µ«Ö±ÖÁ8ÔÂ4Èղű»¼ì²â·¢Ã÷£¬£¬£¬¾àÀë½üÁù¸öÔ¡£¡£¡£¡£¾­ÊӲ죬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼Ò¡¢²ÆÎñ¼°Ò½ÁÆÐÅÏ¢µÄÎļþ£¬£¬£¬Éæ¼°47,329ÃûÊÜÓ°Ïì¸öÌå¡£¡£¡£¡£Ïêϸй¶Êý¾Ýº­¸ÇÈ«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÖÝʶÓÖÃûµÈÉí·ÝÐÅÏ¢£»£»£»£»£»£»£»½ðÈÚ»ú¹¹Ãû³Æ¡¢ÕË»§Óë·ÓɺÅÂë¡¢Ö§¸¶¿¨ºÅ¡¢PINÂë¡¢µ½ÆÚÈÕ¡¢ÄÉ˰ÈËʶÓÖÃû¼°µç×ÓÊðÃûµÈ²ÆÎñÐÅÏ¢£»£»£»£»£»£»£»ÒÔ¼°Ò½ÁÆÐ§ÀÍÌṩÕßÐÕÃû¡¢Õï¶Ï²¡Çé¡¢´¦·½ÐÅÏ¢¡¢ÖÎÁƳÌÐò¡¢¿µ½¡°ü¹ÜµÈÒ½ÁÆ¿µ½¡Êý¾Ý£¬£¬£¬ÐÅÏ¢ÀàÐÍÖ®ÖÜÈ«¡¢Ãô¸Ð¶ÈÖ®¸ßÒý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£BCNYSÔÚÎ¥¹æÍ¨Öªº¯ÖÐÌåÏÖ£¬£¬£¬ÊÂÎñ·¢Ã÷ºóÒÑÁ¬Ã¦Æô¶¯Ó¦¼±ÏìÓ¦£¬£¬£¬°üÀ¨¿ØÖÆÏµÍ³¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÊӲ첢ȷ±£»£»£»£»£»£»£ÇéÐÎÇå¾²¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/business-council-of-new-york-state-discloses-data-breach-affecting-47-000-people/


4. ¶íÂÞ˹ºÚ¿ÍÔÙ¶ÈÏ®»÷²¨À¼Ë®µçÕ¾


8ÔÂ19ÈÕ£¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯½üÆÚ¶Ô²¨À¼ÌØÇзòµÄÒ»×ùË®µçÕ¾Ìᳫ¶þ´Î¹¥»÷£¬£¬£¬ÀֳɯÆËðÆä¿ØÖÆÏµÍ³ÓëÎÐÂÖ»ú×°±¸£¬£¬£¬Ôì³É¸üÑÏÖØµÄÔËÓªÖÐÖ¹¡£¡£¡£¡£´Ë´ÎÊÂÎñÊǸÃÉèÊ©5ÔÂÊ×´ÎÔâÏ®ºóµÄÓÖÒ»´ÎÕë¶ÔÐÔ¹¥»÷£¬£¬£¬ºÚ¿Í×éÖ¯Ðû²¼µÄÊÓÆµ¾­ÆÊÎöÈ·ÒÔΪͳһÅúÍþвÐÐΪÕßËùΪ¡£¡£¡£¡£²¨À¼Ç徲ר¼ÒÖ¸³ö£¬£¬£¬±¾´Î¹¥»÷ͨ¹ýʹÓÃÎÐÂÖ»úÊý¾ÝÈÅÂҵ糧ÔËÐУ¬£¬£¬ÆäÆÆËðÐÔÁè¼ÝÉϴε¼ÖÂÉèÊ©ÀëÏßµÄÊÂÎñ£¬£¬£¬Í¹ÏÔ¹¥»÷Õß¶ÔÒªº¦»ù´¡ÉèÊ©µÄÉøÍ¸ÄÜÁ¦Éý¼¶¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬²¨À¼¹¤Òµ¿ØÖÆÏµÍ³£¨ICS/OT£©½üÆÚÒѳÉÎªÍøÂç¹¥»÷µÄ¸ßƵĿµÄ¡£¡£¡£¡£¾Ý²¨À¼Ã½Ìåͳ¼Æ£¬£¬£¬ÒÑÍùËĸöÔÂÄÚ£¬£¬£¬ÌìÏÂ¶àµØË®´¦Öóͷ£³§¡¢ÎÛË®´¦Öóͷ£³§¼°Ð¡ÐÍË®µçÕ¾Ïà¼ÌÔâÓöÀàËÆ¹¥»÷¡£¡£¡£¡£²¨À¼Õþ¸®ÒѶÔÒ»Á¬Éý¼¶µÄÍøÂçÍþв×÷³ö»ØÓ¦¡£¡£¡£¡£2024Äê5Ô£¬£¬£¬²¨À¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT Polska£©Ðû²¼¡¶ÔËÓªÊÖÒÕ£¨OT£©Ç徲ǿ»¯Ö¸ÄÏ¡·£¬£¬£¬±Þ²ß¹¤ÒµÏµÍ³ÔËÓª·½Á¬Ã¦ÊµÑé·À»¤²½·¥£¬£¬£¬°üÀ¨ÍøÂç·Ö¶Î¡¢»á¼û¿ØÖƼ°Òì³£ÐÐΪ¼à²â¡£¡£¡£¡£Í¬Ä꣬£¬£¬Êý×ÖÊÂÎñ²¿³¤¹ûÕæÖÒÑÔ¹¤Òµ¿ØÖÆÏµÍ³ÃæÁٵġ°ÑÏÖØÍþв¡±£¬£¬£¬Ç¿µ÷ÔöÇ¿»ù´¡ÉèÊ©ÍøÂçÇå¾²¿Ì½ûÖ¹»º¡£¡£¡£¡£


https://www.darkreading.com/cyberattacks-data-breaches/russian-hacktivists-polish-power-plant-attack


5. ÃÀ¹ú˾·¨²¿µ·»Ù¡°Ê·ÉÏ×îÇ¿¡±Rapper Bot½©Ê¬ÍøÂç


8ÔÂ19ÈÕ£¬£¬£¬ÃÀ¹ú˾·¨²¿¿ËÈÕÐû²¼ÀֳɿØÖƲ¢Íß½âÁ˱»³ÆÎª¡°ÓÐÊ·ÒÔÀ´×îǿʢDDoS½©Ê¬ÍøÂçÖ®Ò»¡±µÄRapper Bot£¨ÓÖ³ÆEleven Eleven Botnet¡¢CowBot£©£¬£¬£¬¸ÃÍøÂç×Ô2021ÄêÆðÓÉ22ËêµÄ¶íÀÕ¸ÔÖÝÓȽðÊÐסÃñÒÁÉ£¡¤¸£¶û´Ä£¨Ethan Foltz£©¿ª·¢²¢ÔËÓª¡£¡£¡£¡£8ÔÂ6ÈÕ£¬£¬£¬Ö´·¨²¿·ÖÔÚ¸£¶û´ÄסËùÖ´ÐÐËѲéÁîºó£¬£¬£¬ÆäÒѽ«½©Ê¬ÍøÂçµÄÖÎÀí¿ØÖÆÈ¨ÒÆ½»¹Ù·½£¬£¬£¬²¢ÖÕÖ¹Á˳öÕ¾¹¥»÷¹¦Ð§¡£¡£¡£¡£¸£¶û´ÄÖܶþÔÚÃÀ¹ú°¢À­Ë¹¼ÓµØÒªÁìÔº±»¿ØÐ­Öú¼°Ìô²¦ÅÌËã»úÈëÇÖ×£¬£¬×î¸ß¿ÉÃæÁÙ10Äêî¿Ïµ£¬£¬£¬ÏÖÔÚÉÐδ±»²¶µ«ÒÑ»ñ·¢¾Ð²¶Áî¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬Rapper Bot½©Ê¬ÍøÂçÔÚ2024Äê4ÔÂÖÁ8Ô³õʱ´ú·¢¶¯Á˳¬37Íò´ÎDDoS¹¥»÷£¬£¬£¬²¨¼°È«Çò80¸ö¹ú¼Ò£¬£¬£¬Öйú¡¢ÈÕ±¾¡¢ÃÀ¹ú¡¢°®¶ûÀ¼¼°Ïã¸ÛµØÇø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£¡£¸ÃÍøÂçͨ¹ýѬȾÊý×ÖÊÓÆµÂ¼Ïñ»ú£¨DVR£©ºÍWi-Fi·ÓÉÆ÷µÈÎïÁªÍø×°±¸¹¹½¨£¬£¬£¬ÊÜ¿Ø×°±¸ÊýÄ¿´ï6.5ÍòÖÁ9.5Íǫ̀£¬£¬£¬¹¥»÷Á÷Á¿·åÖµ´ïÿÃë2-3Õ×Õ×±ÈÌØ£¨TB£©£¬£¬£¬×î´ó¹æÄ£¹¥»÷ÉõÖÁÍ»ÆÆ6TB/Ã룬£¬£¬Ô¶³¬Í¨ÀýDDoS¹¥»÷¹æÄ£¡£¡£¡£¡£ÃÀ¹ú¹ÙÔ±Ö¸³ö£¬£¬£¬ÓÉÓڸý©Ê¬ÍøÂçÔËӪʱ¼ä³¤´ïÈýÄ꣬£¬£¬ÏÖʵÊܺ¦Õß¿ÉÄÜ´ïÊý°ÙÍò¼¶±ð£¬£¬£¬Éæ¼°×°±¸ÊýÄ¿¼°¹¥»÷´ÎÊý¾ù¼«Îª¾ªÈË¡£¡£¡£¡£


https://cyberscoop.com/rapper-bot-ddos-botnet-disrupted/


6. Ó¢ÌØ¶ûÄÚ²¿ÍøÕ¾Îó²îÆØ¹â£¬£¬£¬È«Çò27ÍòÔ±¹¤ÐÅÏ¢ÃæÁÙΣº¦


8ÔÂ20ÈÕ£¬£¬£¬Çå¾²Ñо¿Ô±Eaton ZveareÓÚ2024ÄêµÚËÄÐò¶È·¢Ã÷Ó¢ÌØ¶û¶à¸öÄÚ²¿ÍøÕ¾±£´æÑÏÖØÇå¾²Îó²î£¬£¬£¬ÕâЩÎó²îÔÊÐíÆäÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬»ñȡȫÇòÔ¼27ÍòÃûÓ¢ÌØ¶ûÔ±¹¤¼°¹¤È˵ÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜÎó²îÒÑÓÉÓ¢ÌØ¶ûʵʱÐÞ¸´£¬£¬£¬µ«ÊÂÎñÈÔ̻¶ÁËÆóÒµÄÚ²¿ÏµÍ³µÄÇå¾²±¡Èõ»·½Ú¡£¡£¡£¡£¾ÝZveareÅû¶£¬£¬£¬Ê׸öÎó²î·ºÆðÔÚÓ¢ÌØ¶ûÓ¡¶ÈÄÚ²¿ÍøÕ¾£¬£¬£¬¸Ãƽ̨±¾ÓÃÓÚÔ±¹¤¶©¹ºÊÖ´Ì£¬£¬£¬Ðèͨ¹ýÐÕÃû¼ìË÷ÌìÉúÊý¾Ý¡£¡£¡£¡£È»¶ø£¬£¬£¬ÆäÊý¾Ý¿âÏÖʵ´æ´¢ÁËÈ«ÇòÓ¢ÌØ¶ûÔ±¹¤ÐÅÏ¢£¬£¬£¬¹¥»÷Õ߿ɽè´ËÏÂÔØÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂ뼰ְλµÈÊý¾Ý£¬£¬£¬ËùÐÒÉç±£ºÅÂ롢н×ʵÈÃô¸ÐÐÅϢδ±»Ð¹Â¶¡£¡£¡£¡£½øÒ»³ÌÐò²éÖУ¬£¬£¬ZveareÓÖ·¢Ã÷Á½¸öÄÚ²¿²úÆ·ÖÎÀíÍøÕ¾ÒòÓ²±àÂëÆ¾Ö¤±£´æÖÎÀíԱȨÏÞÎó²î£¬£¬£¬µ¼ÖÂËùÓÐÔ±¹¤ÏêϸÐÅϢ̻¶£»£»£»£»£»£»£»¶øµÚËĸö¹©Ó¦ÉÌÊý¾ÝÖÎÀíÍøÕ¾ÔòÒòÉí·ÝÑéÖ¤ÈÆ¹ýÎÊÌ⣬£¬£¬²»µ«Ð¹Â¶Ô±¹¤Êý¾Ý£¬£¬£¬»¹Ì»Â¶ÁË´ó×ÚÓ¢ÌØ¶û¹©Ó¦É̵ÄÉñÃØÐÅÏ¢¡£¡£¡£¡£Ó¢ÌضûÔÚ2024Äê10ÔÂÊÕµ½Îó²îת´ïºó£¬£¬£¬ÒÑÁ¬Ã¦ÊµÑéÐÞ¸´²½·¥²¢ÍêÓñ³ÉÃæÕû¸Ä£¬£¬£¬Ç¿µ÷¡°Î´±¬·¢ÏÖʵÊý¾Ýй¶»òδ¾­ÊÚȨ»á¼û¡±¡£¡£¡£¡£


https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/