¶íÂÞ˹ÎÀÐÇͨѶÉÌDozor-Teleport±»ºÚÔÝʱÎÞ·¨»á¼û

Ðû²¼Ê±¼ä 2023-07-04

1¡¢¶íÂÞ˹ÎÀÐÇͨѶÉÌDozor-Teleport±»ºÚÔÝʱÎÞ·¨»á¼û


¾ÝýÌå6ÔÂ30ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬Ä³ºÚ¿ÍÍÅ»ïÉù³Æ¶Ô¶íÂÞ˹ÎÀÐÇͨѶÌṩÉÌDozor-TeleportÔâµ½µÄ¹¥»÷ÈÏÕæ¡£¡£¡£¡£¸ÃÌṩÉÌΪÄÜÔ´¹«Ë¾ÒÔ¼°¸Ã¹úµÄ¹ú·ÀºÍÇå¾²»ú¹¹ËùÓᣡ£¡£¡£×ÔÃÀ¹ú¶«²¿Ê±¼äÉÏÖÜÈýÍíÉÏ10µãÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾µÄÍøÂçÒ»Ö±´¦ÓÚÖÐֹ״̬£¬£¬£¬£¬£¬ £¬£¬ÍøÕ¾Ò²Òѹرա£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬DozorµÄĸ¹«Ë¾Amtel SvyazÒ²ÔÚÉÏÖÜÈýÍí¼ä±¬·¢ÁËÑÏÖØµÄÖÐÖ¹¡£¡£¡£¡£´Ë´Î¹¥»÷±³ºóµÄ×éÖ¯Éù³ÆÓëWagner GroupÓйØ£¬£¬£¬£¬£¬ £¬£¬µ«ºóÕߵĹٷ½TelegramÖÐûÓÐÌá¼°´Ë´Î¹¥»÷»î¶¯¡£¡£¡£¡£ºÚ¿Í³ÆÈëÇÖÁ˲¿·ÖÎÀÐÇÖÕ¶Ë£¬£¬£¬£¬£¬ £¬£¬ÇÔÈ¡ÁËЧÀÍÆ÷ÉϵÄÉñÃØÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬²¢¹ûÕæÁË700¸öÎļþ£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÎĵµºÍͼÏñ¡£¡£¡£¡£


https://therecord.media/hackers-take-down-russian-satellite-provider


2¡¢ÃÀ¹úרÀûÉ̱ê¾ÖÉèÖùýʧй¶Լ6Íò¸öÉêÇëÈ˵ÄÐÅÏ¢


¾Ý6ÔÂ28ÈÕ±¨µÀ£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹úרÀûÉ̱ê¾Ö (USPTO) й¶ÁËÔ¼61000¸öÉêÇëÈ˵ÄÐÅÏ¢¡£¡£¡£¡£¸ÃÎÊÌâÊÇÔÚÒ»¸öAPIÖз¢Ã÷µÄ£¬£¬£¬£¬£¬ £¬£¬µ¼Ö´ÓÉêÇëÈËÄÇÀïÍøÂçµÄµØµãÐÅϢй¶¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬ £¬£¬´Ë´Îй¶ÊÂÎñÓ°ÏìÁË2020Äê2ÔÂÖÁ2023Äê3ÔÂÌá½»µÄÔ¼3%µÄÉêÇëÈË¡£¡£¡£¡£USPTO³Æ£¬£¬£¬£¬£¬ £¬£¬ËûÃÇ·¢Ã÷Õâ¸öÎÊÌâºó£¬£¬£¬£¬£¬ £¬£¬Á¬Ã¦×èÖ¹Á˶ÔËùÓÐUSPTO·ÇÒªº¦APIµÄ»á¼û£¬£¬£¬£¬£¬ £¬£¬²¢Ï¼ÜÁËÊÜÓ°ÏìµÄÅúÁ¿Êý¾Ý²úÆ·£¬£¬£¬£¬£¬ £¬£¬Ö±µ½¿ÉÒÔÓÀÊÀÐÞ¸´¡£¡£¡£¡£


https://techcrunch.com/2023/06/28/uspto-trademark-data-api-leak/


3¡¢Akamai¼ì²âµ½Ê¹ÓÃSSHЧÀÍÆ÷µÄÐÂÊðÀíÐ®ÖÆ¹¥»÷»î¶¯


AkamaiÔÚ6ÔÂ29ÈÕ³ÆÆä¼ì²âµ½Ò»¸öÊðÀíÐ®ÖÆ»î¶¯£¬£¬£¬£¬£¬ £¬£¬Ö÷ÒªÕë¶ÔÒ×Êܹ¥»÷µÄSSHЧÀÍÆ÷¡£¡£¡£¡£AkamaiÓÚ6ÔÂ8ÈÕÊ״η¢Ã÷ÕâЩ¹¥»÷¡£¡£¡£¡£Ò»µ©ÅþÁ¬µ½SSHЧÀÍÆ÷£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õ߾ͻá×°ÖÃÒ»¸öBase64±àÂëµÄBash¾ç±¾£¬£¬£¬£¬£¬ £¬£¬½«±»¹¥»÷µÄϵͳÌí¼Óµ½HoneygainºÍPeer2ProfitµÈP2PÊðÀíÍøÂçÖС£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬Ëü»¹»áËÑË÷²¢ÖÕÖ¹ÔËÐдø¿í¹²Ïí³ÌÐòµÄ¾ºÕùʵÀý£¬£¬£¬£¬£¬ £¬£¬È»ºóÆô¶¯DockerЧÀÍ£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓÃÄ¿µÄµÄ´ø¿í»ñÈ¡ÀûÈ󡣡£¡£¡£¶ÔÍøÂçЧÀÍÆ÷µÄ½øÒ»²½ÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬ £¬£¬Ëü»¹±»ÓÃÀ´ÍйܼÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¬£¬£¬£¬£¬ £¬£¬ÕâÅú×¢¹¥»÷ÕßÕýÔÚÉæ×ã¼ÓÃÜÐ®ÖÆºÍÊðÀíÐ®ÖÆ¹¥»÷¡£¡£¡£¡£


https://www.akamai.com/blog/security-research/proxyjacking-new-campaign-cybercriminal-side-hustle


4¡¢Ñо¿Ö°Ô±³Æ½öÐè6´ÎʵÑé¾Í¿ÉÈÆ¹ýÓïÒôÉí·ÝÑéÖ¤


ýÌå6ÔÂ30Èճƣ¬£¬£¬£¬£¬ £¬£¬»¬Ìú¬´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖ¿ÉÒÔÈÆ¹ýÓïÒôÉí·ÝÑéÖ¤µÄÊÖÒÕ£¬£¬£¬£¬£¬ £¬£¬²¢ÌåÏÖÖ»ÐèÁù´ÎʵÑéÀÖ³ÉÂʾ͸ߴï99%¡£¡£¡£¡£Ñо¿Ö°Ô±È·¶¨ÁËdeepfakeÒôƵÖÐÅú×¢ËüÊÇÓÉÅÌËã»úÌìÉúµÄ±ê¼Ç£¬£¬£¬£¬£¬ £¬£¬²¢¿ª·¢ÁËÒ»¸ö³ÌÐòÀ´É¾³ýÕâЩ±ê¼Ç£¬£¬£¬£¬£¬ £¬£¬Ê¹ÆäÓëÕæÊµÒôƵÎÞ·¨Çø·Ö¡£¡£¡£¡£ÔÚÕë¶ÔAmazon ConnectÓïÒôÉí·ÝÑé֤ϵͳµÄ²âÊÔÖУ¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ÔÚ4ÃëµÄ¹¥»÷ÖÐÈ¡µÃÁË10%µÄÀÖ³ÉÂÊ£¬£¬£¬£¬£¬ £¬£¬ÔÚʵÑé6´ÎºóÀÖ³ÉÂʸߴï99%¡£¡£¡£¡£


https://www.malwarebytes.com/blog/news/2023/06/new-technique-can-defeat-voice-authentication-in-just-6-attempts


5¡¢AhnLab³ÆÀÕË÷ÍÅ»ïCrysisͨ¹ýRDP×°ÖÃVenusÀÕË÷Èí¼þ


7ÔÂ3ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ £¬£¬AhnLab½üÆÚ·¢Ã÷ÀÕË÷ÍÅ»ïCrysisÔÚ¹¥»÷ÖÐҲʹÓÃÁËVenusÀÕË÷Èí¼þ¡£¡£¡£¡£CrysisºÍVenus¶¼ÊÇÕë¶Ô̻¶µÄÔ¶³Ì×ÀÃæÐ§À͵ÄÖ÷ÒªÀÕË÷Èí¼þ¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃRDP×÷Ϊ¹¥»÷ǰÑÔ£¬£¬£¬£¬£¬ £¬£¬ÏÈʵÑéʹÓÃCrysis¼ÓÃÜϵͳ£¬£¬£¬£¬£¬ £¬£¬ÔÚʧ°Üºó£¬£¬£¬£¬£¬ £¬£¬ÔÙ´ÎʵÑéʹÓÃVenus¾ÙÐмÓÃÜ¡£¡£¡£¡£³ýÁËÁ½¸öÀÕË÷Èí¼þÖ®Í⣬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹×°ÖÃÁËÖÖÖÖÆäËü¹¤¾ß£¬£¬£¬£¬£¬ £¬£¬ÀýÈç¶Ë¿ÚɨÃèÆ÷ºÍMimikatz¡£¡£¡£¡£ÓÉÓÚ¹¥»÷ÕßÔÚ³õʼÈëÇֺͺáÏòÒÆ¶¯ÖÐһֱʹÓÃRDP£¬£¬£¬£¬£¬ £¬£¬½¨ÒéÓû§ÔÚ²»Ê¹ÓÃʱͣÓÃRDP£¬£¬£¬£¬£¬ £¬£¬»òʹÓÃÖØ´óµÄÕË»§ÃÜÂë²¢°´ÆÚ¸ü¸Ä£¬£¬£¬£¬£¬ £¬£¬À´·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£


https://asec.ahnlab.com/en/54937/


6¡¢SekoiaÐû²¼¹ØÓÚDDoS¹¥»÷¹¤¾ß°üDDoSiaµÄÆÊÎö±¨¸æ


6ÔÂ29ÈÕ£¬£¬£¬£¬£¬ £¬£¬SekoiaÐû²¼¹ØÓÚDDoSiaÏîÄ¿µÄÆÊÎö±¨¸æ¡£¡£¡£¡£DDoSiaÊÇÒ»¸öDDoS¹¥»÷¹¤¾ß°ü£¬£¬£¬£¬£¬ £¬£¬ÓÉÓë¶íÂÞ˹Ïà¹ØµÄ×éÖ¯NoName057(16)¿ª·¢ºÍʹÓᣡ£¡£¡£DDoSiaÏîÄ¿ÓÚ2022ÄêÍ·ÔÚTelegramÉÏÆô¶¯£¬£¬£¬£¬£¬ £¬£¬×èÖ¹½ñÄê6Ô£¬£¬£¬£¬£¬ £¬£¬Æä³ÉÔ±Áè¼Ý10000ÈË¡£¡£¡£¡£SekoiaÍøÂçÁËDDoSiaµÄC2ÔÚ5ÔÂ8ÈÕÖÁ6ÔÂ26ÈÕ·¢Ë͵ÄһЩµÄÊý¾Ý£¬£¬£¬£¬£¬ £¬£¬·¢Ã÷Ö÷ÒªÕë¶ÔÁ¢ÌÕÍð¡¢ÎÚ¿ËÀ¼ºÍ²¨À¼£¬£¬£¬£¬£¬ £¬£¬Õ¼×ܻµÄ39%¡£¡£¡£¡£ÔÚ´Ëʱ´ú£¬£¬£¬£¬£¬ £¬£¬DDoSia×ܹ²¹¥»÷ÁË486¸öÍøÕ¾¡£¡£¡£¡£


https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/