ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷

Ðû²¼Ê±¼ä 2024-11-13

1. ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷


11ÔÂ10ÈÕ £¬ÒÔÉ«Áи÷µØµÄÐÅÓÿ¨Ë¢¿¨É豸ͻ·¢¹ÊÕÏ £¬µ¼Ö³¬ÊкͼÓÓÍÕ¾µÄÖ÷¹ËÎÞ·¨½øÐÐÖ§¸¶ £¬Á¬ÐøԼһСʱ ¡£¾Ý¡¶Ò®Â·ÈöÀäÓʱ¨¡·±¨µÀ £¬¹ÊÕÏÔ­ÒòÊǵ±µØÖ§¸¶Íø¹Ø¹«Ë¾HypÆìϵÄCreditGuard²úÎïÔâÓöÁËÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷ £¬¸Ã¹¥»÷ÈÅÂÒÁËÐÅÓÿ¨ÖÕ¶ËÓëÖ§¸¶ÏµÍ³¼äµÄͨÐÅ £¬µ«²¢Î´µ¼ÖÂÊý¾Ýй¶ ¡£Hyp¹«Ë¾·¢ÑÔÈËÌåÏÖ £¬¹¥»÷Ö÷ÒªÕë¶Ô²¿ÃÅ·þÎñ¼°Í¨ÐÅÌṩÉÌ £¬²¢Òѱ»Ñ¸ËÙÍ£Ö¹ £¬·þÎñËæºó»Ö¸´ ¡£¾¡¹ÜÉв»Çå³þ¹¥»÷ÕßÉí·Ý £¬µ«ÒÔÉ«ÁÐýÌåÖ¸³ö £¬Ò»¸öÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Éù³ÆÂôÁ¦ ¡£´Ë´ÎʼþÓë10Ô·ÝÖ§¸¶¹«Ë¾ShebaÔâÓöµÄÀàËÆDDoS¹¥»÷ÏàËÆ £¬Æäʱ¹¥»÷µ¼ÖÂÖ§¸¶ÖжÏÈýСʱ ¡£×Ô10ÔÂ7ÈÕ¿Ö²ÀÏ®»÷ÒÔÀ´ £¬ÒÔÉ«ÁÐÃñÓûù´¡ÉèÊ©ÒòµØÓò³åÍ»ÔâÓöÁ˸ü¶àÍøÂç¹¥»÷ £¬Ö÷ÒªÓÉÓëÒÁÀʺÍÕæÖ÷µ³Ïà¹ØµÄºÚ¿ÍÍÅÌå¼°ÆäËûÕþÖζ¯»úºÚ¿ÍÌᳫ £¬²»½öÓ°ÏìÒÔÉ«Áб¾ÍÁ £¬»¹²¨¼°µØÓòÍâµÄ»ù´¡ÉèÊ© ¡£


https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction


2. °¢»ôµÂµÂ¶ûº£×ÈÃÀ¹úÍøÂçÔâ¹¥»÷ £¬¶à¼ÒÖªÃû³¬ÊÐÔËÓªÊÜÓ°Ïì


11ÔÂ13ÈÕ £¬ºÉÀ¼¹«Ë¾°¢»ôµÂµÂ¶ûº£×È £¬×÷ΪStop & Shop¡¢Hannaford¡¢Food LionºÍGiant FoodµÈÃÀ¹úÖªÃû³¬ÊÐÆ·ÅƵÄĸ¹«Ë¾ £¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷ £¬µ¼ÖÂÆä±é²¼ÃÀ¹úµÄ2000¶à¼ÒÃŵ귺ÆðÎÊÌâ ¡£¾Ý¸÷µØÐÂÎÅýÌ屨µÀ £¬¾ÓÃñÎÞ·¨ÔÚÏßϳ¬ÊÐÍê³ÉʳƷÔÓ»õÅäËͶ©µ¥ £¬²¿Ãų¬ÊÐÆ·ÅÆÍøÕ¾Ò²ÒÑÏÂÏß £¬¾¡¹ÜÉ̵êÈԿɽÓÊÜÐÅÓÿ¨¸¶¿î²¢´¦Öò¿ÃÅÒ©Æ·¶©µ¥ ¡£°¢»ôµÂµÂ¶ûº£×ȹ«Ë¾ÒÑִ֪ͨ·¨²¿ÃÅ £¬²¢ÓëÍⲿÍøÂçÄþ¾²×¨¼ÒºÏ×÷Õ¹¿ªÊÓ²ì £¬Í¬Ê±½ÓÄÉ´ëÊ©ÆÀ¹ÀºÍ»º½âÎÊÌâ £¬°üÂÞÈÃһЩϵͳÀëÏßÒÔ±£»¤ËüÃÇ ¡£´Ë´Î¹¥»÷Ó°ÏìÁ˹«Ë¾µÄijЩƷÅƺͷþÎñ £¬°üÂÞһЩҩµêºÍµç×ÓÉÌÎñÒµÎñ ¡£½ØÖÁ12ÈÕÏÂÎç £¬²¿Ãų¬ÊÐÆ·ÅÆÍøÕ¾Òѻָ´ £¬µ«HannafordµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬ £¬²¢Ðû²¼ÏûÏ¢³Æ»Ö¸´ÊÂÇéÕýÔÚ½øÐÐÖÐ £¬Í¬Ê±ÌáÐÑ¿Í»§Ò©·¿ºÍTo Go¶©µ¥Êܵ½µÄÓ°Ïì ¡£Ä¿Ç°ÉÐÎÞºÚ¿Í×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦ £¬µ«ÁãÊÛµêºÍ³¬Êо­³£³ÉΪÀÕË÷Èí¼þÍÅ»ïºÍÍøÂç·¸×ïÍÅ»ïµÄ¹¥»÷Ä¿±ê ¡£


https://therecord.media/dutch-company-stop-shop-hannaford-cyber


3. ³¯ÏʺڿÍÀûÓúϷ¨Ç©ÃûÓ¦Óù¥»÷macOSϵͳ


11ÔÂ12ÈÕ £¬³¯ÏÊÍþвÐÐΪÕßÀûÓôøÓÐľÂíµÄ¼Çʱ¾Ó¦Ó÷¨Ê½ºÍ»ùÓÚFlutter¿ò¼ÜµÄɨÀ×ÓÎÏ·¹¥»÷Apple macOSϵͳ £¬ÕâЩӦÓúÍÓÎÏ·¾ùÓɺϷ¨µÄApple¿ª·¢ÕßIDÇ©ÃûºÍ¹«Ö¤ £¬Òò´ËÄܹ»ÔÝʱͨ¹ýAppleµÄÄþ¾²¼ì²é £¬ÔÚmacOSϵͳÉϲ»ÊÜÏÞÖƵØÖ´ÐÐ ¡£ÕâЩӦÓ÷¨Ê½µÄÃû³ÆÒÔ¼ÓÃÜ»õ±ÒΪÖ÷Ìâ £¬Ó볯ÏʺڿͶԽðÈÚ͵ÇÔµÄÐËȤÏà·û ¡£¾ÝJamf Threat Labs·¢ÏÖ £¬ÕâЩ»î¶¯¿´ËÆÊÇÈƹýmacOSÄþ¾²»úÖƵÄʵÑé £¬¶ø·Ç³ÉÊìÐж¯ ¡£´Ó2024Äê11Ô¿ªÊ¼ £¬JamfÔÚVirusTotalÉÏ·¢ÏÖ¶à¸ö¿´ËÆÎÞº¦È´Á¬½Óµ½³¯ÏÊ·þÎñÆ÷µÄÓ¦Ó÷¨Ê½ ¡£ÕâЩӦÓ÷¨Ê½Ê¹ÓÃFlutter¿ò¼Ü¹¹½¨ £¬Îª¶ñÒâÈí¼þ×÷ÕßÌṩÁ˶๦ЧÐÔÇÒ¸üÄѼì²â ¡£Jamf»¹·¢ÏÖÁù¸ö¶ñÒâÓ¦Ó÷¨Ê½ÖÐÓÐÎå¸öÒÑÇ©Ãû²¢¹«Ö¤ £¬ÇÒ´æÔÚ»ùÓÚGolangºÍPythonµÄ±äÌå ¡£Æ»¹û¹«Ë¾ÒÑÈ¡ÏûÕâЩӦÓ÷¨Ê½µÄÇ©Ãû £¬µ«Éв»Çå³þËüÃÇÊÇ·ñÔøÔÚʵ¼Ê²Ù×÷ÖÐʹÓùý £¬»¹ÊǽöÓÃÓÚ²âÊÔÆÀ¹ÀÈƹýÄþ¾²Èí¼þµÄ¼¼Êõ ¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/


4. GoIssue£ºÐÂÐÍGitHubÍøÂçµöÓ㹤¾ßÒý·¢Äþ¾²¾¯±¨


11ÔÂ12ÈÕ £¬SlashNextÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪGoIssueµÄÐÂÐÍÅÓ´óÍøÂçµöÓ㹤¾ß £¬¸Ã¹¤¾ß¿ÉÄÜÓëGitLokerÀÕË÷»î¶¯ÓÐ¹Ø £¬×¨ÃÅÕë¶ÔGitHubÓû§ ¡£GoIssueÄÜ´Ó¹«¹²GitHub¸öÈË×ÊÁÏÖÐϵͳÊÕ¼¯µç×ÓÓʼþµØÖ· £¬²¢ÀûÓÃÕâЩÐÅÏ¢Ìᳫ´ó¹æÄ£¡¢ÓÐÕë¶ÔÐÔµÄÍøÂçµöÓã¹¥»÷ ¡£¶¨ÖÆ°æ±¾ºÍÍêÕûÔ´´úÂëµÄ·ÃÎÊ·Ö±ðÊÛ¼Û700ÃÀÔªºÍ3000ÃÀÔª ¡£ÀֳɵĹ¥»÷¿ÉÄܵ¼ÖÂÔ´´úÂë±»µÁ¡¢¹©Ó¦Á´±»¹¥»÷ÒÔ¼°ÆóÒµÍøÂç±»ÈëÇÖ ¡£¾ÝSlashNext±¨µÀ £¬GitLokerÍŶӳÉÔ±CyberluffyÓëGoIssueÓÐ¹Ø £¬Õâ±íÃ÷Á½ÖÖ¹¤¾ß¿ÉÄÜ´æÔÚ¹ØÁª ¡£GitHubÓû§Ó¦½ÓÄÉ×î¼ÑÔÚÏßÄþ¾²Êµ¼ù £¬ÈçÇ¿ÃÜÂ롢˫ÒòËØÉí·ÝÑéÖ¤¡¢¾¯ÌèÍøÂçµöÓãÓʼþºÍ¶¨ÆÚ¼ì²éOAuthÓ¦ÓÃȨÏÞ £¬ÒÔ±£»¤×Ô¼ººÍ×éÖ¯ÃâÊÜDZÔÚË𺦠¡£Sectigo¸ß¼¶Ñо¿Ô±Jason SorokoÖ¸³ö £¬GoIssue²»½ö¶ÔGitHub×é³ÉÖØ´óÍþв £¬Ò²¶ÔÆäËû¿ª·¢Õßƽ̨×é³É·çÏÕ £¬¿ª·¢Õßƽ̨ÒѳÉΪ¸ß·çÏÕµÄÕ½³¡ £¬ÐèÒª¿ìËÙÉú³¤Äþ¾²·ÀÓùÀ´Ó¦¶ÔÕâÖÖÆÕ±é´æÔÚµÄÍþв ¡£


https://hackread.com/gitloker-goissue-tool-targets-github-phishing-users/


5. Form I-9 ComplianceÊý¾Ýй¶ӰÏìÈËÊýÔ¶³¬Ô¤ÆÚ


11ÔÂ12ÈÕ £¬Ô±ÈËΪ¸ñÑéÖ¤½â¾ö·½°¸ÌṩÉÌForm I-9 ComplianceÔâÓöÁËÊý¾Ýй¶Ê¼þ £¬ÆäÓ°ÏìÖð½¥À©´ó £¬Ô¶³¬×î³õÔ¤ÆÚ ¡£¸Ã¹«Ë¾Ð­Öú¿Í»§ÌîдÕþ¸®ÒªÇóµÄI-9±í¸ñÎļþ £¬ÓÃÓÚÑéÖ¤ÔÚÃÀ¹úÊܹ͸öÈ˵ÄÉí·ÝºÍÊÂÇéÐí¿É ¡£½ñÄê2Ô³õ £¬ÓÐÈËδ¾­ÊÚȨ·ÃÎÊÁËÆäÍøÂç £¬4ÔÂ12ÈÕÕâÒ»ÈëÇÖÐÐΪ±»·¢ÏÖ £¬Ëæºó¹«Ë¾¹Ø±ÕÁËһЩϵͳ×÷ΪÏìÓ¦´ëÊ© ¡£×î³õ £¬¹«Ë¾Í¨ÖªÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ³ÆÊÜÓ°ÏìµÄÈËÊýԼΪ27,000ÈË £¬µ«ËæºóÔÚ10Ô·Ý͸¶ÊÜÓ°ÏìÈËÊýÒÑÔö¼ÓÖÁ½ü97,000ÈË ¡£¶ø×î½ü¼¸Ìì¸üеÄÊý¾ÝÏÔʾ £¬Êµ¼ÊÊÜÓ°ÏìµÄÈËÊýÒÑÁè¼Ý193,000ÈË ¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞÐÕÃûºÍÉç»á±£ÏպŠ£¬ÊÜÓ°ÏìµÄ¸öÈ˽«»ñµÃÃâ·ÑµÄÉí·Ý͵ÇÔ±£»¤ºÍÐÅÓüà¿Ø·þÎñ ¡£Ä¿Ç°Éв»Çå³þ´Ë´ÎÊý¾Ýй¶ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷ £¬Ò²Ã»ÓÐÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴ÎÈëÇÖÂôÁ¦ ¡£


https://www.securityweek.com/form-i-9-compliance-data-breach-impacts-over-190000-people/


6. Microsoft Exchange Õë¶ÔÀÄÓÃÆÛƭ©¶´µÄµç×ÓÓʼþÌí¼Ó¾¯¸æ


11ÔÂ12ÈÕ £¬Î¢ÈíÅû¶ÁËÒ»¸ö¸ßÑÏÖØÐÔµÄExchange Server©¶´£¨CVE-2024-49040£© £¬¸Ã©¶´ÓÉSolidlabÄþ¾²Ñо¿Ô±Vsevolod Kokorin·¢ÏÖ £¬Ó°ÏìExchange Server 2016ºÍ2019°æ±¾ ¡£¸Ã©¶´ÔÊÐí¹¥»÷ÕßαÔì´«Èëµç×ÓÓʼþµÄºÏ·¨·¢¼þÈË £¬Ìá¸ß¶ñÒâÏûÏ¢µÄÓÐЧÐÔ ¡£ÎÊÌâÔ´ÓÚSMTP·þÎñÆ÷¶ÔÊÕ¼þÈ˵ØÖ·µÄ½âÎö²îÒìÒÔ¼°µç×ÓÓʼþÌṩÉÌÔÊÐíʹÓò»ÇкÏRFC³ß¶ÈµÄ·ûºÅ ¡£Î¢ÈíÔÚ±¾Ô²¹¶¡ÐÇÆÚ¶þÐû²¼Á˸üР£¬Ìí¼Ó©¶´¼ì²âºÍ¾¯¸æºá·ù £¬ËäÈ»ÉÐδÐÞ²¹¸Ã©¶´ £¬µ«Exchange·þÎñÆ÷ÏÖÔÚ½«¼ì²â¶ñÒâµç×ÓÓʼþ²¢Ìí¼Ó¾¯¸æ ¡£¹ÜÀíÔ±ÆôÓÃĬÈÏÄþ¾²ÉèÖúó £¬ÏµÍ³½«Ä¬ÈÏÆôÓ鶴¼ì²âºÍµç×ÓÓʼþ¾¯¸æ £¬²¢ÔÚ¼ì²âµ½µÄ¿ÉÒɵç×ÓÓʼþÖÐÌí¼Ó¾¯¸æ £¬ÌáʾÓû§²»ÒªÏàÐÅδ¾­ÑéÖ¤µÄÐÅÏ¢¡¢Á´½Ó»ò¸½¼þ ¡£Î¢Èí½¨ÒéÓû§±£³Ö¸Ã¹¦Ð§ÆôÓà £¬ÒÔ·ÀÖ¹ÍøÂçµöÓã¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/unpatched-microsoft-exchange-server-flaw-enables-spoofing-attacks/