CloudflareÀÖ³É×èµ²11.5 Tbps´´¼Í¼DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-09-04

1. CloudflareÀÖ³É×èµ²11.5 Tbps´´¼Í¼DDoS¹¥»÷


9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬Cloudflare¿ËÈÕÐû²¼ÀÖ³É×èµ²ÁËÒ»³¡·åÖµ´ï11.5 TbpsµÄÊ·ÉÏ×î´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÒÔUDPºéË®¹¥»÷ΪÖ÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÔ´×ԹȸèÔÆÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬²¢³ÉΪһÁ¬ÊýÖܵĹ¥»÷À˳±ÖеÄ×îÈȳ±¡£¡£¡£¡£¡£¡£ ¡£¾ÝCloudflareÅû¶£¬£¬£¬£¬£¬£¬£¬Æä·ÀÓùϵͳÔÚÒÑÍùÊýÖÜÄÚÒÑ×Ô¶¯×èµ²Êý°Ù´Î³¬´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ×îÐÂÆÆ¼Í¼µÄ¹¥»÷Ò»Á¬Ô¼35Ã룬£¬£¬£¬£¬£¬£¬·åÖµÊý¾Ý°üËÙÂʸߴïÿÃë51ÒÚ¸ö£¬£¬£¬£¬£¬£¬£¬Ô¶³¬½ñÄê6Ô¸ù«Ë¾±¨¸æµÄ7.3 Tbps¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹æÄ£ÔöÌí12%£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ±ÈÍøÂçÇå¾²¼ÇÕß²¼À³¶÷¡¤¿ËÀײ¼Ë¹¼Í¼µÄ´Ëǰ×îá¯ÁëÖµºá¿ç1 Tbps¡£¡£¡£¡£¡£¡£ ¡£´Ë´Î11.5 TbpsµÄUDPºéË®¹¥»÷Õë¶Ô¼òµ¥IPµØµã£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÿÃë¹¥»÷21,925¸ö¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬·åֵʱ¶Ë¿ÚÂþÑÜÀ©Õ¹ÖÁ34,517¸ö£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÏòÁ¿ÒÔUDPºéˮΪÖ÷£¨Õ¼±È99.996%£©£¬£¬£¬£¬£¬£¬£¬¸¨ÒÔQOTD¡¢Echo¡¢NTP¡¢Mirai¡¢Portmap¼°RIPv1µÈ»ìÏý¹¥»÷ÊֶΡ£¡£¡£¡£¡£¡£ ¡£Ö»¹Ü¹¥»÷Á÷Á¿Öش󣬣¬£¬£¬£¬£¬£¬CloudflareµÄ×Ô¶¯»¯·ÀÓùϵͳÈÔÓÐÓÃʶ±ð²¢¹ýÂËÁ˶ñÒâÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬Î´¶Ô¿Í»§ÍøÂçÔì³ÉʵÖÊÓ°Ïì¡£¡£¡£¡£¡£¡£ ¡£


https://securityaffairs.com/181829/cyber-crime/cloudflare-blocked-a-record-11-5-tbps-ddos-attack.html


2. Ê¥´ï·ÆÏØÕþ¸®ÍøÕ¾Ô´´úÂëÔâÇÔÊÂÎñ±»Ö¤ÊµÎª¾ÉÊý¾Ýй¶


9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÔòÉù³ÆÇÔÈ¡ÃÀ¹úÐÂÄ«Î÷¸çÖÝÊ¥´ï·ÆÏØÕþ¸®ÍøÕ¾Ô´´úÂëµÄÌû×ÓÔÚºÚ¿ÍÂÛ̳Òý·¢¹Ø×¢£¬£¬£¬£¬£¬£¬£¬µ«¾­CybernewsÑо¿ÍŶÓÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÏÖʵΪ¹¥»÷ÕßʹÓùýʱÐÅÏ¢¾ÙÐÐ"¿´·¨ÑéÖ¤"µÄ³´×÷ÐÐΪ¡£¡£¡£¡£¡£¡£ ¡£Ê¥´ï·ÆÏØ×÷ΪÉú³Ý³¬15ÍòµÄÐÐÕþÇøÓò£¬£¬£¬£¬£¬£¬£¬Æä¹Ù·½ÍøÕ¾ÊÇÕþ¸®ÓëÃñÖÚ½»»¥µÄÖ÷Ҫƽ̨£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñËäδÔì³ÉÏÖʵΣº¦£¬£¬£¬£¬£¬£¬£¬È´Ì»Â¶ÁËÍøÂç¹¥»÷Õßͨ¹ýÐû²¼¾ÉÊý¾Ý²©È¡¹Ø×¢µÄÐÂÐÍÊÖ·¨¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÔÚÂÛ̳ÖÐÐû³ÆÒÑ»ñȡʥ´ï·ÆÏØÍøÕ¾µÄÔ´´úÂ룬£¬£¬£¬£¬£¬£¬²¢¸½ÉÏÁËÖÎÀíÔ±Óû§Ãû¡¢¹þÏ£ÃÜÂë¡¢Êý¾Ý¿âÄ£×Ó¼°PHP°æ±¾µÈÊý¾Ý¡£¡£¡£¡£¡£¡£ ¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬CybernewsÍŶӯÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÌṩµÄÊý¾Ý¿âÄ£×Ó½ö¸üÐÂÖÁ2017Ä꣬£¬£¬£¬£¬£¬£¬PHP°æ±¾¸üÊÇ2010ÄêÐû²¼ÇÒÒÑÓÚ2011Äê×èÖ¹Ö§³ÖµÄ³Â¸¯°æ±¾¡£¡£¡£¡£¡£¡£ ¡£¸üÒªº¦µÄÊÇ£¬£¬£¬£¬£¬£¬£¬±ÈÕÕÄ¿½ñÍøÕ¾ÊµÊ±Á÷Á¿¼Ü¹¹£¬£¬£¬£¬£¬£¬£¬ÆäÊÖÒÕÕ»Óëй¶Êý¾ÝÖеÄÉèÖñ£´æÏÔÖø²î±ð£¬£¬£¬£¬£¬£¬£¬Ö¤Êµ¹¥»÷ÕßÉÏ´«µÄÊµÎªÍøÕ¾2010ÄêÔ¾ɰ汾´úÂ룬£¬£¬£¬£¬£¬£¬¶ÔÏÖÓÐϵͳÎÞʵÖÊÐÔÍþв¡£¡£¡£¡£¡£¡£ ¡£


https://cybernews.com/security/santa-fe-county-hack-likely-outdated/


3. ¶íÂÞ˹APT28ʹÓá°NotDoor¡±¶ñÒâÈí¼þ¹¥»÷Microsoft Outlook


9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬Î÷°àÑÀÍøÂçÇå¾²¹©Ó¦ÉÌS2 GrupoµÄÍþвÇ鱨ʵÑéÊÒLAB52ÓÚ2025Äê9ÔÂ3ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬Åû¶ÓɶíÂÞ˹֧³ÖµÄÍøÂçÍþв×éÖ¯APT28¿ª·¢µÄÐÂÐÍOutlookºóÃÅ¡°NotDoor¡±¡£¡£¡£¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þ»ùÓÚVisual Basic for Applications£¨VBA£©¹¹½¨£¬£¬£¬£¬£¬£¬£¬Í¨¹ýOutlookÊÂÎñÇý¶¯´¥·¢Æ÷£¨ÈçÆô¶¯Ê±Application_MAPILogonCompleteºÍÎüÊÕÐÂÓʼþʱApplication_NewMailEx£©¼¤»î£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡¢ÎļþÉÏ´«¼°í§ÒâÏÂÁîÖ´Ðй¦Ð§¡£¡£¡£¡£¡£¡£ ¡£NotDoor½ÓÄÉ´úÂë»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ëæ»ú»¯±äÁ¿ÃûºÍ×Ô½ç˵Base64±àÂ루¸½¼ÓÀ¬»ø×Ö·ûÄ£Äâ¼ÓÃÜ£©£¬£¬£¬£¬£¬£¬£¬²¢Î±×°³ÉÕýµ±ºê¹æ±Ü¼ì²â¡£¡£¡£¡£¡£¡£ ¡£Æäͨ¹ýÊðÃûµÄ΢Èí¶þ½øÖÆÎļþOneDrive.exe¾ÙÐÐDLL²à¼ÓÔØ£¬£¬£¬£¬£¬£¬£¬¼ÓÔØ¶ñÒâSSPICLI.dll°²ÅźóÃÅ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÐÞ¸ÄOutlook×¢²á±íÉèÖýûÓÃÇå¾²ÖÒÑÔ¡¢ÆôÓú겢ÒÖÖÆ¶Ô»°¿òÌáÐÑ£¬£¬£¬£¬£¬£¬£¬È·¼á³¤ÆÚ»¯¾²Ä¬ÔËÐС£¡£¡£¡£¡£¡£ ¡£¸ÃºóÃÅͨ¹ý½«Êܺ¦ÕßÊý¾ÝÍâйÖÁ¹¥»÷Õß¿ØÖƵÄÓÊÏ䣬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃwebhook.site¾ÙÐÐDNSºÍHTTP»Øµ÷ÑéÖ¤£¬£¬£¬£¬£¬£¬£¬½¨ÉèÒþ²ØÍ¨Ñ¶¡£¡£¡£¡£¡£¡£ ¡£ÆäÄ£¿£¿£¿é»¯Éè¼ÆÖ§³Ö¶¯Ì¬¸üд¥·¢Æ÷ºÍÏÂÁ£¬£¬£¬£¬£¬£¬ÔöÇ¿¼ì²âÄѶÈ¡£¡£¡£¡£¡£¡£ ¡£


https://www.infosecurity-magazine.com/news/russia-apt28-notdoor-outlook/


4. È«Çò×î´ó²»·¨ÌåÓýÖ±²¥Æ½Ì¨StreameastÔâ¶à¹úÁªºÏ¹¥»÷


9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ÓÉ´´ÒâÓëÓéÀÖͬÃË£¨ACE£©Óë°£¼°Õþ¸®ÁªºÏ¿ªÕ¹µÄרÏîÐж¯Àֳɵ·»ÙÈ«Çò×î´ó²»·¨ÌåÓýÖ±²¥Á÷ýÌåÍøÂçStreameast£¬£¬£¬£¬£¬£¬£¬²¢¾Ð²¶Á½Ãû¹ØÁªÖ°Ô±¡£¡£¡£¡£¡£¡£ ¡£¸Ãƽ̨×Ô2018ÄêÆðÔËÓª£¬£¬£¬£¬£¬£¬£¬ÒÀÍÐ¹ã¸æÖ§³ÖµÄÃâ·Ñģʽ£¬£¬£¬£¬£¬£¬£¬Ìṩ¸ßÇåµÁ²¥ÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÈ«Çò80¸öÓòÃû£¬£¬£¬£¬£¬£¬£¬Ô»á¼ûÁ¿·åÖµ´ï1.36ÒڴΣ¬£¬£¬£¬£¬£¬£¬ÒÑÍùÒ»Äê×Ü»á¼ûÁ¿Í»ÆÆ16ÒڴΣ¬£¬£¬£¬£¬£¬£¬Óû§Ö÷Òª¼¯ÖÐÓÚÃÀ¹ú¡¢¼ÓÄôó¡¢Ó¢¹ú¡¢·ÆÂɱö¼°µÂ¹ú¡£¡£¡£¡£¡£¡£ ¡£StreameastµÄ½¹µãÇÖȨÐÐΪ°üÀ¨Î´¾­ÊÚȨֱ²¥Å·ÖÞÎå´ó×ãÇòÁªÈü£¨Ó¢³¬¡¢Î÷¼×¡¢µÂ¼×µÈ£©¡¢¹ú¼Ê×ãÁªÌìϱ­¡¢Å·ÖÞ±­µÈ¹ú¼Ò¶ÓÈüÊ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°NFL¡¢NBA¡¢F1µÈÃÀ¹úÖ÷Á÷ÌåÓýÈüÊ¡£¡£¡£¡£¡£¡£ ¡£ÆäÊÖÒռܹ¹Í¨¹ý¶àÓòÃûÌø×ª¹æ±Ü·â±Õ£¬£¬£¬£¬£¬£¬£¬ÁùÌìǰÊ״ηºÆðÔËÓªÖÐÖ¹¼£Ï󣬣¬£¬£¬£¬£¬£¬Óû§·´ÏìÍøÕ¾ÎÞ·¨»á¼û»òÁ÷ýÌå¼ÓÔØÒì³£¡£¡£¡£¡£¡£¡£ ¡£°£¼°¼ªÈøÊ¡Ð»ºÕÔúÒÁµÂÊо¯·½ÔÚÐж¯Öвé»ñÌõ¼Ç±¾µçÄÔ¡¢ÖÇÄÜÊÖ»ú¡¢Ïֽ𼰶àÕÅÐÅÓÿ¨¡£¡£¡£¡£¡£¡£ ¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸Ãƽ̨Óë°¢ÁªÇõÒ»¼Ò¿Õ¿Ç¹«Ë¾±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬£¬ÉæÏÓ×Ô2010ÄêÆðͨ¹ý¹ã¸æÊÕÈëÏ´Ç®620ÍòÃÀÔª¼°20ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Ô­ÊôÓÚStreameastµÄ80¸öÓòÃûÒѴ󲿷ÖÖØ¶¨ÏòÖÁACEµÄ¡°Õýµ±Ô¢Ä¿¡±ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬µ«²¿·ÖÓòÃûÈÔ¿É»á¼û£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¿ÉÄܱ£´æÎ´²é·âÓòÃû»òÐÂÓòÃû×¢²á¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/streameast-the-largest-pirated-sports-platform-disrupted-by-police/


5. SaaS¾ÞÍ·WorkivaÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶


9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬Workiva×÷ΪÁìÏȵÄÔÆSaaSЧÀÍÉÌ£¬£¬£¬£¬£¬£¬£¬×¨×¢²ÆÎñ±¨¸æ¡¢ºÏ¹æ¼°Éó¼ÆÊý¾ÝÖÎÀí£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍ6305¼Ò¿Í»§£¬£¬£¬£¬£¬£¬£¬2024ÄêÔ¤¼ÆÓªÊÕ7.39ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ ¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾×ª´ï¿Í»§³Æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½CRMϵͳSalesforce²»·¨»ñÈ¡²¿·Ö¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ÓÊÏä¡¢µç»°¼°Ö§³ÖƱ֤ÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬µ«Workivaƽ̨½¹µãÊý¾ÝδÊܲ¨¼°¡£¡£¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñÓëShinyHuntersÀÕË÷¼¯ÍŽüÆÚÕë¶ÔSalesforceÉú̬µÄ¹¥»÷¸ß¶È¹ØÁª¡£¡£¡£¡£¡£¡£ ¡£¸Ã¼¯ÍÅ×ÔÄêÍ·Æðͨ¹ýÓïÒô´¹ÂÚ£¨vishing£©¼°OAuthÁîÅÆÀÄÓ㬣¬£¬£¬£¬£¬£¬ÉøÍ¸¶à¼ÒÆóÒµSalesforceʵÀý£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬±¾´Î¹¥»÷·¾¶Óë½üÆÚ¶àÆð´óÐÍ»ú¹¹Êý¾Ýй¶ģʽÏàËÆ¡£¡£¡£¡£¡£¡£ ¡£WorkivaÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ÆäCRM¹©Ó¦ÉÌͨ¹ý¹ØÁªµÚÈý·½Ó¦ÓÃ̻¶»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£¡£¡£ ¡£¹«Ë¾ÒÑÌáÐÑÊÜÓ°Ïì¿Í»§Ð¡ÐÄÓã²æÊ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÖØÉê¹Ù·½ÏàͬÇþµÀµÄΨһÐÔ£¬£¬£¬£¬£¬£¬£¬¾øÇ·ºà¹ý¶ÌÐÅ»òµç»°Ë÷ÒªÇå¾²ÐÅÏ¢¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/


6. ºÚ¿ÍʹÓÃеÄHexStrike-AI¹¤¾ß¿ìËÙʹÓÃn-dayÎó²î


9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕý´ó¹æÄ£Ê¹ÓÃÃûΪHexStrike-AIµÄÐÂÐÍÈ˹¤ÖÇÄܹ¥»÷¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬¼ÓËÙÐÂÅû¶n-dayÎó²îµÄÎäÆ÷»¯Àú³Ì¡£¡£¡£¡£¡£¡£ ¡£CheckPoint Research±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸Ã¿ò¼ÜÓë°µÍøÖÐÕë¶ÔCitrixÎó²î£¨ÈçCVE-2025-7775¡¢CVE-2025-7776£©µÄ¿ìËÙʹÓûÇ×½üÏà¹Ø¡£¡£¡£¡£¡£¡£ ¡£×èÖ¹2025Äê9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈÔÓнü8000¸ö¶ËµãÒ×ÊÜCVE-2025-7775¹¥»÷£¬£¬£¬£¬£¬£¬£¬½ÏǰһÖÜïÔÌ­2Íò¸ö£¬£¬£¬£¬£¬£¬£¬µ«Îó²îÅû¶Óë´ó¹æÄ£Ê¹ÓõÄʱ¼ä´°¿ÚÒѼ±¾çËõ¶ÌÖÁÊýСʱ¡£¡£¡£¡£¡£¡£ ¡£HexStrike-AIÓÉÍøÂçÇå¾²Ñо¿Ô±Muhammad Osama¿ª·¢£¬£¬£¬£¬£¬£¬£¬Ô­ÎªÕýµ±ºì¶Ó¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¼¯³ÉAIÊðÀí¿É×ÔÖ÷ÔËÐÐ150ÓàÖÖÍøÂçÇå¾²¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÉøÍ¸²âÊÔÓëÎó²î·¢Ã÷µÄ×Ô¶¯»¯¡£¡£¡£¡£¡£¡£ ¡£Æä¿Í»§¶Ë¾ß±¸ÖØÊÔÂß¼­Óë»Ö¸´´¦Öóͷ£ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬¿É×Ô¶¯µ÷½âÉèÖÃÖ±ÖÁ²Ù×÷Àֳɡ£¡£¡£¡£¡£¡£ ¡£¸Ã¹¤¾ß¿ªÔ´ºóѸËÙ×ߺ죬£¬£¬£¬£¬£¬£¬GitHub»ñ1800ÐDZêÓ볬400´Îfork£¬£¬£¬£¬£¬£¬£¬È´Ò²Òý·¢ºÚ¿Í¹Ø×¢¡£¡£¡£¡£¡£¡£ ¡£¾ÝCheckPointÅû¶£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÂÛ̳ÒÑ·ºÆð¸Ã¹¤¾ßµÄ°²ÅÅÌÖÂÛ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÆäÕë¶ÔCitrix NetScaler ADC¼°GatewayÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬ÊµÏÖδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾװ±¸Ö²ÈëWebshell£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ¹ûÕæ³öÊÛÊÜ¿ØÊµÀý¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/