ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷
Ðû²¼Ê±¼ä 2024-11-131. ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷
11ÔÂ10ÈÕ£¬ÒÔÉ«Áи÷µØµÄÐÅÓÿ¨Ë¢¿¨É豸ͻ·¢¹ÊÕÏ£¬µ¼Ö³¬ÊкͼÓÓÍÕ¾µÄÖ÷¹ËÎÞ·¨½øÐÐÖ§¸¶£¬Á¬ÐøԼһСʱ¡£¾Ý¡¶Ò®Â·ÈöÀäÓʱ¨¡·±¨µÀ£¬¹ÊÕÏÔÒòÊǵ±µØÖ§¸¶Íø¹Ø¹«Ë¾HypÆìϵÄCreditGuard²úÎïÔâÓöÁËÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷£¬¸Ã¹¥»÷ÈÅÂÒÁËÐÅÓÿ¨ÖÕ¶ËÓëÖ§¸¶ÏµÍ³¼äµÄͨÐÅ£¬µ«²¢Î´µ¼ÖÂÊý¾Ýй¶¡£Hyp¹«Ë¾·¢ÑÔÈËÌåÏÖ£¬¹¥»÷Ö÷ÒªÕë¶Ô²¿ÃÅ·þÎñ¼°Í¨ÐÅÌṩÉÌ£¬²¢Òѱ»Ñ¸ËÙÍ£Ö¹£¬·þÎñËæºó»Ö¸´¡£¾¡¹ÜÉв»Çå³þ¹¥»÷ÕßÉí·Ý£¬µ«ÒÔÉ«ÁÐýÌåÖ¸³ö£¬Ò»¸öÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Éù³ÆÂôÁ¦¡£´Ë´ÎʼþÓë10Ô·ÝÖ§¸¶¹«Ë¾ShebaÔâÓöµÄÀàËÆDDoS¹¥»÷ÏàËÆ£¬Æäʱ¹¥»÷µ¼ÖÂÖ§¸¶ÖжÏÈýСʱ¡£×Ô10ÔÂ7ÈÕ¿Ö²ÀÏ®»÷ÒÔÀ´£¬ÒÔÉ«ÁÐÃñÓûù´¡ÉèÊ©ÒòµØÓò³åÍ»ÔâÓöÁ˸ü¶àÍøÂç¹¥»÷£¬Ö÷ÒªÓÉÓëÒÁÀʺÍÕæÖ÷µ³Ïà¹ØµÄºÚ¿ÍÍÅÌå¼°ÆäËûÕþÖζ¯»úºÚ¿ÍÌᳫ£¬²»½öÓ°ÏìÒÔÉ«Áб¾ÍÁ£¬»¹²¨¼°µØÓòÍâµÄ»ù´¡ÉèÊ©¡£
https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction
2. °¢»ôµÂµÂ¶ûº£×ÈÃÀ¹úÍøÂçÔâ¹¥»÷£¬¶à¼ÒÖªÃû³¬ÊÐÔËÓªÊÜÓ°Ïì
11ÔÂ13ÈÕ£¬ºÉÀ¼¹«Ë¾°¢»ôµÂµÂ¶ûº£×È£¬×÷ΪStop & Shop¡¢Hannaford¡¢Food LionºÍGiant FoodµÈÃÀ¹úÖªÃû³¬ÊÐÆ·ÅƵÄĸ¹«Ë¾£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬µ¼ÖÂÆä±é²¼ÃÀ¹úµÄ2000¶à¼ÒÃŵ귺ÆðÎÊÌâ¡£¾Ý¸÷µØÐÂÎÅýÌ屨µÀ£¬¾ÓÃñÎÞ·¨ÔÚÏßϳ¬ÊÐÍê³ÉʳƷÔÓ»õÅäËͶ©µ¥£¬²¿Ãų¬ÊÐÆ·ÅÆÍøÕ¾Ò²ÒÑÏÂÏߣ¬¾¡¹ÜÉ̵êÈԿɽÓÊÜÐÅÓÿ¨¸¶¿î²¢´¦Öò¿ÃÅÒ©Æ·¶©µ¥¡£°¢»ôµÂµÂ¶ûº£×ȹ«Ë¾ÒÑִ֪ͨ·¨²¿ÃÅ£¬²¢ÓëÍⲿÍøÂçÄþ¾²×¨¼ÒºÏ×÷Õ¹¿ªÊӲ죬ͬʱ½ÓÄÉ´ëÊ©ÆÀ¹ÀºÍ»º½âÎÊÌ⣬°üÂÞÈÃһЩϵͳÀëÏßÒÔ±£»¤ËüÃÇ¡£´Ë´Î¹¥»÷Ó°ÏìÁ˹«Ë¾µÄijЩƷÅƺͷþÎñ£¬°üÂÞһЩҩµêºÍµç×ÓÉÌÎñÒµÎñ¡£½ØÖÁ12ÈÕÏÂÎ磬²¿Ãų¬ÊÐÆ·ÅÆÍøÕ¾Òѻָ´£¬µ«HannafordµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬£¬²¢Ðû²¼ÏûÏ¢³Æ»Ö¸´ÊÂÇéÕýÔÚ½øÐÐÖУ¬Í¬Ê±ÌáÐÑ¿Í»§Ò©·¿ºÍTo Go¶©µ¥Êܵ½µÄÓ°Ï졣ĿǰÉÐÎÞºÚ¿Í×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÂôÁ¦£¬µ«ÁãÊÛµêºÍ³¬Êо³£³ÉΪÀÕË÷Èí¼þÍÅ»ïºÍÍøÂç·¸×ïÍÅ»ïµÄ¹¥»÷Ä¿±ê¡£
https://therecord.media/dutch-company-stop-shop-hannaford-cyber
3. ³¯ÏʺڿÍÀûÓúϷ¨Ç©ÃûÓ¦Óù¥»÷macOSϵͳ
11ÔÂ12ÈÕ£¬³¯ÏÊÍþвÐÐΪÕßÀûÓôøÓÐľÂíµÄ¼Çʱ¾Ó¦Ó÷¨Ê½ºÍ»ùÓÚFlutter¿ò¼ÜµÄɨÀ×ÓÎÏ·¹¥»÷Apple macOSϵͳ£¬ÕâЩӦÓúÍÓÎÏ·¾ùÓɺϷ¨µÄApple¿ª·¢ÕßIDÇ©ÃûºÍ¹«Ö¤£¬Òò´ËÄܹ»ÔÝʱͨ¹ýAppleµÄÄþ¾²¼ì²é£¬ÔÚmacOSϵͳÉϲ»ÊÜÏÞÖƵØÖ´ÐС£ÕâЩӦÓ÷¨Ê½µÄÃû³ÆÒÔ¼ÓÃÜ»õ±ÒΪÖ÷Ì⣬Ó볯ÏʺڿͶԽðÈÚ͵ÇÔµÄÐËȤÏà·û¡£¾ÝJamf Threat Labs·¢ÏÖ£¬ÕâЩ»î¶¯¿´ËÆÊÇÈƹýmacOSÄþ¾²»úÖƵÄʵÑ飬¶ø·Ç³ÉÊìÐж¯¡£´Ó2024Äê11Ô¿ªÊ¼£¬JamfÔÚVirusTotalÉÏ·¢ÏÖ¶à¸ö¿´ËÆÎÞº¦È´Á¬½Óµ½³¯ÏÊ·þÎñÆ÷µÄÓ¦Ó÷¨Ê½¡£ÕâЩӦÓ÷¨Ê½Ê¹ÓÃFlutter¿ò¼Ü¹¹½¨£¬Îª¶ñÒâÈí¼þ×÷ÕßÌṩÁ˶๦ЧÐÔÇÒ¸üÄѼì²â¡£Jamf»¹·¢ÏÖÁù¸ö¶ñÒâÓ¦Ó÷¨Ê½ÖÐÓÐÎå¸öÒÑÇ©Ãû²¢¹«Ö¤£¬ÇÒ´æÔÚ»ùÓÚGolangºÍPythonµÄ±äÌ塣ƻ¹û¹«Ë¾ÒÑÈ¡ÏûÕâЩӦÓ÷¨Ê½µÄÇ©Ãû£¬µ«Éв»Çå³þËüÃÇÊÇ·ñÔøÔÚʵ¼Ê²Ù×÷ÖÐʹÓùý£¬»¹ÊǽöÓÃÓÚ²âÊÔÆÀ¹ÀÈƹýÄþ¾²Èí¼þµÄ¼¼Êõ¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/
4. GoIssue£ºÐÂÐÍGitHubÍøÂçµöÓ㹤¾ßÒý·¢Äþ¾²¾¯±¨
11ÔÂ12ÈÕ£¬SlashNextÍøÂçÄþ¾²Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪGoIssueµÄÐÂÐÍÅÓ´óÍøÂçµöÓ㹤¾ß£¬¸Ã¹¤¾ß¿ÉÄÜÓëGitLokerÀÕË÷»î¶¯Óйأ¬×¨ÃÅÕë¶ÔGitHubÓû§¡£GoIssueÄÜ´Ó¹«¹²GitHub¸öÈË×ÊÁÏÖÐϵͳÊÕ¼¯µç×ÓÓʼþµØÖ·£¬²¢ÀûÓÃÕâЩÐÅÏ¢Ìᳫ´ó¹æÄ£¡¢ÓÐÕë¶ÔÐÔµÄÍøÂçµöÓã¹¥»÷¡£¶¨ÖÆ°æ±¾ºÍÍêÕûÔ´´úÂëµÄ·ÃÎÊ·Ö±ðÊÛ¼Û700ÃÀÔªºÍ3000ÃÀÔª¡£ÀֳɵĹ¥»÷¿ÉÄܵ¼ÖÂÔ´´úÂë±»µÁ¡¢¹©Ó¦Á´±»¹¥»÷ÒÔ¼°ÆóÒµÍøÂç±»ÈëÇÖ¡£¾ÝSlashNext±¨µÀ£¬GitLokerÍŶӳÉÔ±CyberluffyÓëGoIssueÓйأ¬Õâ±íÃ÷Á½ÖÖ¹¤¾ß¿ÉÄÜ´æÔÚ¹ØÁª¡£GitHubÓû§Ó¦½ÓÄÉ×î¼ÑÔÚÏßÄþ¾²Êµ¼ù£¬ÈçÇ¿ÃÜÂ롢˫ÒòËØÉí·ÝÑéÖ¤¡¢¾¯ÌèÍøÂçµöÓãÓʼþºÍ¶¨ÆÚ¼ì²éOAuthÓ¦ÓÃȨÏÞ£¬ÒÔ±£»¤×Ô¼ººÍ×éÖ¯ÃâÊÜDZÔÚË𺦡£Sectigo¸ß¼¶Ñо¿Ô±Jason SorokoÖ¸³ö£¬GoIssue²»½ö¶ÔGitHub×é³ÉÖØ´óÍþв£¬Ò²¶ÔÆäËû¿ª·¢Õßƽ̨×é³É·çÏÕ£¬¿ª·¢Õßƽ̨ÒѳÉΪ¸ß·çÏÕµÄÕ½³¡£¬ÐèÒª¿ìËÙÉú³¤Äþ¾²·ÀÓùÀ´Ó¦¶ÔÕâÖÖÆÕ±é´æÔÚµÄÍþв¡£
https://hackread.com/gitloker-goissue-tool-targets-github-phishing-users/
5. Form I-9 ComplianceÊý¾Ýй¶ӰÏìÈËÊýÔ¶³¬Ô¤ÆÚ
11ÔÂ12ÈÕ£¬Ô±ÈËΪ¸ñÑéÖ¤½â¾ö·½°¸ÌṩÉÌForm I-9 ComplianceÔâÓöÁËÊý¾Ýй¶Ê¼þ£¬ÆäÓ°ÏìÖð½¥À©´ó£¬Ô¶³¬×î³õÔ¤ÆÚ¡£¸Ã¹«Ë¾ÐÖú¿Í»§ÌîдÕþ¸®ÒªÇóµÄI-9±í¸ñÎļþ£¬ÓÃÓÚÑéÖ¤ÔÚÃÀ¹úÊܹ͸öÈ˵ÄÉí·ÝºÍÊÂÇéÐí¿É¡£½ñÄê2Ô³õ£¬ÓÐÈËδ¾ÊÚȨ·ÃÎÊÁËÆäÍøÂ磬4ÔÂ12ÈÕÕâÒ»ÈëÇÖÐÐΪ±»·¢ÏÖ£¬Ëæºó¹«Ë¾¹Ø±ÕÁËһЩϵͳ×÷ΪÏìÓ¦´ëÊ©¡£×î³õ£¬¹«Ë¾Í¨ÖªÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒ³ÆÊÜÓ°ÏìµÄÈËÊýԼΪ27,000ÈË£¬µ«ËæºóÔÚ10Ô·Ý͸¶ÊÜÓ°ÏìÈËÊýÒÑÔö¼ÓÖÁ½ü97,000ÈË¡£¶ø×î½ü¼¸Ìì¸üеÄÊý¾ÝÏÔʾ£¬Êµ¼ÊÊÜÓ°ÏìµÄÈËÊýÒÑÁè¼Ý193,000ÈË¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞÐÕÃûºÍÉç»á±£Ïպţ¬ÊÜÓ°ÏìµÄ¸öÈ˽«»ñµÃÃâ·ÑµÄÉí·Ý͵ÇÔ±£»¤ºÍÐÅÓüà¿Ø·þÎñ¡£Ä¿Ç°Éв»Çå³þ´Ë´ÎÊý¾Ýй¶ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬Ò²Ã»ÓÐÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴ÎÈëÇÖÂôÁ¦¡£
https://www.securityweek.com/form-i-9-compliance-data-breach-impacts-over-190000-people/
6. Microsoft Exchange Õë¶ÔÀÄÓÃÆÛÆ©¶´µÄµç×ÓÓʼþÌí¼Ó¾¯¸æ
11ÔÂ12ÈÕ£¬Î¢ÈíÅû¶ÁËÒ»¸ö¸ßÑÏÖØÐÔµÄExchange Server©¶´£¨CVE-2024-49040£©£¬¸Ã©¶´ÓÉSolidlabÄþ¾²Ñо¿Ô±Vsevolod Kokorin·¢ÏÖ£¬Ó°ÏìExchange Server 2016ºÍ2019°æ±¾¡£¸Ã©¶´ÔÊÐí¹¥»÷ÕßαÔì´«Èëµç×ÓÓʼþµÄºÏ·¨·¢¼þÈË£¬Ìá¸ß¶ñÒâÏûÏ¢µÄÓÐЧÐÔ¡£ÎÊÌâÔ´ÓÚSMTP·þÎñÆ÷¶ÔÊÕ¼þÈ˵ØÖ·µÄ½âÎö²îÒìÒÔ¼°µç×ÓÓʼþÌṩÉÌÔÊÐíʹÓò»ÇкÏRFC³ß¶ÈµÄ·ûºÅ¡£Î¢ÈíÔÚ±¾Ô²¹¶¡ÐÇÆÚ¶þÐû²¼Á˸üУ¬Ìí¼Ó©¶´¼ì²âºÍ¾¯¸æºá·ù£¬ËäÈ»ÉÐδÐÞ²¹¸Ã©¶´£¬µ«Exchange·þÎñÆ÷ÏÖÔÚ½«¼ì²â¶ñÒâµç×ÓÓʼþ²¢Ìí¼Ó¾¯¸æ¡£¹ÜÀíÔ±ÆôÓÃĬÈÏÄþ¾²ÉèÖúó£¬ÏµÍ³½«Ä¬ÈÏÆôÓ鶴¼ì²âºÍµç×ÓÓʼþ¾¯¸æ£¬²¢ÔÚ¼ì²âµ½µÄ¿ÉÒɵç×ÓÓʼþÖÐÌí¼Ó¾¯¸æ£¬ÌáʾÓû§²»ÒªÏàÐÅδ¾ÑéÖ¤µÄÐÅÏ¢¡¢Á´½Ó»ò¸½¼þ¡£Î¢Èí½¨ÒéÓû§±£³Ö¸Ã¹¦Ð§ÆôÓã¬ÒÔ·ÀÖ¹ÍøÂçµöÓã¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/unpatched-microsoft-exchange-server-flaw-enables-spoofing-attacks/