ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷

Ðû²¼Ê±¼ä 2024-11-13

1. ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷


11ÔÂ10ÈÕ  £¬ÒÔÉ«Áи÷µØµÄÐÅÓÿ¨Ë¢¿¨×°±¸Í»·¢¹ÊÕÏ  £¬µ¼Ö³¬ÊкͼÓÓÍÕ¾µÄÖ÷¹ËÎÞ·¨¾ÙÐÐÖ§¸¶  £¬Ò»Á¬Ô¼Ò»Ð¡Ê±¡£¾Ý¡¶Ò®Â·ÈöÀäÓʱ¨¡·±¨µÀ  £¬¹ÊÕÏÔµ¹ÊÔ­ÓÉÊÇÍâµØÖ§¸¶Íø¹Ø¹«Ë¾HypÆìϵÄCreditGuard²úÆ·ÔâÓöÁËÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷  £¬¸Ã¹¥»÷ÈÅÂÒÁËÐÅÓÿ¨ÖÕ¶ËÓëÖ§¸¶ÏµÍ³¼äµÄͨѶ  £¬µ«²¢Î´µ¼ÖÂÊý¾Ýй¶¡£Hyp¹«Ë¾½²»°ÈËÌåÏÖ  £¬¹¥»÷Ö÷ÒªÕë¶Ô²¿·Ö·þÎñ¼°Í¨Ñ¶ÌṩÉÌ  £¬²¢Òѱ»Ñ¸ËÙ×èÖ¹  £¬·þÎñËæºó»Ö¸´¡£Ö»¹ÜÉв»ÇåÎú¹¥»÷ÕßÉí·Ý  £¬µ«ÒÔÉ«ÁÐýÌåÖ¸³ö  £¬Ò»¸öÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Éù³ÆÈÏÕæ¡£´Ë´ÎÊÂÎñÓë10Ô·ÝÖ§¸¶¹«Ë¾ShebaÔâÓöµÄÀàËÆDDoS¹¥»÷ÏàËÆ  £¬Æäʱ¹¥»÷µ¼ÖÂÖ§¸¶ÖÐÖ¹ÈýСʱ¡£×Ô10ÔÂ7ÈÕ¿Ö²ÀÏ®»÷ÒÔÀ´  £¬ÒÔÉ«ÁÐÃñÓûù´¡ÉèÊ©ÒòµØÇø³åÍ»ÔâÓöÁ˸ü¶àÍøÂç¹¥»÷  £¬Ö÷ÒªÓÉÓëÒÁÀʺÍÕæÖ÷µ³Ïà¹ØµÄºÚ¿ÍÕûÌå¼°ÆäËûÕþÖÎÄîÍ·ºÚ¿ÍÌᳫ  £¬²»µ«Ó°ÏìÒÔÉ«Áб¾ÍÁ  £¬»¹²¨¼°µØÇøÍâµÄ»ù´¡ÉèÊ©¡£


https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction


2. °¢»ôµÂµÂ¶ûº£×ÈÃÀ¹úÍøÂçÔâ¹¥»÷  £¬¶à¼Ò×ÅÃû³¬ÊÐÔËÓªÊÜÓ°Ïì


11ÔÂ13ÈÕ  £¬ºÉÀ¼¹«Ë¾°¢»ôµÂµÂ¶ûº£×È  £¬×÷ΪStop & Shop¡¢Hannaford¡¢Food LionºÍGiant FoodµÈÃÀ¹ú×ÅÃû³¬ÊÐÆ·ÅƵÄĸ¹«Ë¾  £¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷  £¬µ¼ÖÂÆä±é²¼ÃÀ¹úµÄ2000¶à¼ÒÃŵ귺ÆðÎÊÌâ¡£¾Ý¸÷µØÐÂÎÅýÌ屨µÀ  £¬×¡ÃñÎÞ·¨ÔÚÏßϳ¬ÊÐÍê³ÉʳÎïÔÓ»õÅäËͶ©µ¥  £¬²¿·Ö³¬ÊÐÆ·ÅÆÍøÕ¾Ò²ÒÑÏÂÏß  £¬Ö»¹ÜÊÐËÁÈԿɽÓÊÜÐÅÓÿ¨¸¶¿î²¢´¦Öóͷ£²¿·ÖÒ©Æ·¶©µ¥¡£°¢»ôµÂµÂ¶ûº£×ȹ«Ë¾ÒÑִ֪ͨ·¨²¿·Ö  £¬²¢ÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÕö¿ªÊÓ²ì  £¬Í¬Ê±½ÓÄɲ½·¥ÆÀ¹À»ººÍ½âÎÊÌâ  £¬°üÀ¨ÈÃһЩϵͳÀëÏßÒÔ± £»¤ËüÃÇ¡£´Ë´Î¹¥»÷Ó°ÏìÁ˹«Ë¾µÄÄ³Ð©Æ·ÅÆºÍ·þÎñ  £¬°üÀ¨Ò»Ð©Ò©µêºÍµç×ÓÉÌÎñÓªÒµ¡£×èÖ¹12ÈÕÏÂÖç  £¬²¿·Ö³¬ÊÐÆ·ÅÆÍøÕ¾Òѻָ´  £¬µ«HannafordµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬  £¬²¢Ðû²¼ÐÂÎųƻָ´ÊÂÇéÕýÔÚ¾ÙÐÐÖÐ  £¬Í¬Ê±ÌáÐѿͻ§Ò©·¿ºÍTo Go¶©µ¥Êܵ½µÄÓ°Ïì¡£ÏÖÔÚÉÐÎÞºÚ¿Í×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ  £¬µ«ÁãÊÛµêºÍ³¬Êо­³£³ÉΪÀÕË÷Èí¼þÍÅ»ïºÍÍøÂç·¸·¨ÍÅ»ïµÄ¹¥»÷Ä¿µÄ¡£


https://therecord.media/dutch-company-stop-shop-hannaford-cyber


3. ³¯ÏʺڿÍʹÓÃÕýµ±ÊðÃûÓ¦Óù¥»÷macOSϵͳ


11ÔÂ12ÈÕ  £¬³¯ÏÊÍþвÐÐΪÕßʹÓôøÓÐľÂíµÄ¼Çʱ¾Ó¦ÓóÌÐòºÍ»ùÓÚFlutter¿ò¼ÜµÄɨÀ×ÓÎÏ·¹¥»÷Apple macOSϵͳ  £¬ÕâЩӦÓúÍÓÎÏ·¾ùÓÉÕýµ±µÄApple¿ª·¢ÕßIDÊðÃûºÍ¹«Ö¤  £¬Òò´ËÄܹ»ÔÝʱͨ¹ýAppleµÄÇå¾²¼ì²é  £¬ÔÚmacOSϵͳÉϲ»ÊÜÏÞÖÆµØÖ´ÐС£ÕâЩӦÓóÌÐòµÄÃû³ÆÒÔ¼ÓÃÜÇ®±ÒΪÖ÷Ìâ  £¬Ó볯ÏʺڿͶԽðÈÚ͵ÇÔµÄÐËȤÏà·û¡£¾ÝJamf Threat Labs·¢Ã÷  £¬ÕâЩÔ˶¯¿´ËÆÊÇÈÆ¹ýmacOSÇå¾²»úÖÆµÄʵÑé  £¬¶ø·Ç³ÉÊìÐж¯¡£´Ó2024Äê11ÔÂ×îÏÈ  £¬JamfÔÚVirusTotalÉÏ·¢Ã÷¶à¸ö¿´ËÆÎÞº¦È´ÅþÁ¬µ½³¯ÏÊ·þÎñÆ÷µÄÓ¦ÓóÌÐò¡£ÕâЩӦÓóÌÐòʹÓÃFlutter¿ò¼Ü¹¹½¨  £¬Îª¶ñÒâÈí¼þ×÷ÕßÌṩÁ˶๦ЧÐÔÇÒ¸üÄѼì²â¡£Jamf»¹·¢Ã÷Áù¸ö¶ñÒâÓ¦ÓóÌÐòÖÐÓÐÎå¸öÒÑÊðÃû²¢¹«Ö¤  £¬ÇÒ±£´æ»ùÓÚGolangºÍPythonµÄ±äÌ塣ƻ¹û¹«Ë¾ÒÑ×÷·ÏÕâЩӦÓóÌÐòµÄÊðÃû  £¬µ«Éв»ÇåÎúËüÃÇÊÇ·ñÔøÔÚÏÖʵ²Ù×÷ÖÐʹÓùý  £¬ÕվɽöÓÃÓÚ²âÊÔÆÀ¹ÀÈÆ¹ýÇå¾²Èí¼þµÄÊÖÒÕ¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/


4. GoIssue£ºÐÂÐÍGitHubÍøÂç´¹ÂÚ¹¤¾ßÒý·¢Çå¾²¾¯±¨


11ÔÂ12ÈÕ  £¬SlashNextÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪGoIssueµÄÐÂÐÍÖØ´óÍøÂç´¹ÂÚ¹¤¾ß  £¬¸Ã¹¤¾ß¿ÉÄÜÓëGitLokerÀÕË÷Ô˶¯ÓÐ¹Ø  £¬×¨ÃÅÕë¶ÔGitHubÓû§¡£GoIssueÄÜ´Ó¹«¹²GitHubСÎÒ˽¼Ò×ÊÁÏÖÐÏµÍ³ÍøÂçµç×ÓÓʼþµØµã  £¬²¢Ê¹ÓÃÕâЩÐÅÏ¢Ìᳫ´ó¹æÄ£¡¢ÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ¹¥»÷¡£¶¨Öư汾ºÍÍêÕûÔ´´úÂëµÄ»á¼û»®·ÖÊÛ¼Û700ÃÀÔªºÍ3000ÃÀÔª¡£ÀֳɵĹ¥»÷¿ÉÄܵ¼ÖÂÔ´´úÂë±»µÁ¡¢¹©Ó¦Á´±»¹¥»÷ÒÔ¼°ÆóÒµÍøÂç±»ÈëÇÖ¡£¾ÝSlashNext±¨µÀ  £¬GitLokerÍŶӳÉÔ±CyberluffyÓëGoIssueÓÐ¹Ø  £¬ÕâÅú×¢Á½ÖÖ¹¤¾ß¿ÉÄܱ£´æ¹ØÁª¡£GitHubÓû§Ó¦½ÓÄÉ×î¼ÑÔÚÏßÇ徲ʵ¼ù  £¬ÈçÇ¿ÃÜÂ롢˫ÒòËØÉí·ÝÑéÖ¤¡¢Ð¡ÐÄÍøÂç´¹ÂÚÓʼþºÍ°´ÆÚ¼ì²éOAuthÓ¦ÓÃȨÏÞ  £¬ÒÔ± £»¤×Ô¼ººÍ×éÖ¯ÃâÊÜDZÔÚË𺦡£Sectigo¸ß¼¶Ñо¿Ô±Jason SorokoÖ¸³ö  £¬GoIssue²»µ«¶ÔGitHub×é³ÉÖØ´óÍþв  £¬Ò²¶ÔÆäËû¿ª·¢Õ߯½Ì¨×é³ÉΣº¦  £¬¿ª·¢Õ߯½Ì¨ÒѳÉΪ¸ßΣº¦µÄÕ½³¡  £¬ÐèÒª¿ìËÙÉú³¤Çå¾²·ÀÓùÀ´Ó¦¶ÔÕâÖ֯ձ鱣´æµÄÍþв¡£


https://hackread.com/gitloker-goissue-tool-targets-github-phishing-users/


5. Form I-9 ComplianceÊý¾Ýй¶ӰÏìÈËÊýÔ¶³¬Ô¤ÆÚ


11ÔÂ12ÈÕ  £¬Ô±ÈËΪ¸ñÑéÖ¤½â¾ö¼Æ»®ÌṩÉÌForm I-9 ComplianceÔâÓöÁËÊý¾Ýй¶ÊÂÎñ  £¬ÆäÓ°ÏìÖð½¥À©´ó  £¬Ô¶³¬×î³õÔ¤ÆÚ¡£¸Ã¹«Ë¾Ð­Öú¿Í»§ÌîдÕþ¸®ÒªÇóµÄI-9±í¸ñÎļþ  £¬ÓÃÓÚÑéÖ¤ÔÚÃÀ¹úÊܹÍСÎÒ˽¼ÒµÄÉí·ÝºÍÊÂÇéÔÊÐí¡£½ñÄê2Ô³õ  £¬ÓÐÈËδ¾­ÊÚȨ»á¼ûÁËÆäÍøÂç  £¬4ÔÂ12ÈÕÕâÒ»ÈëÇÖÐÐΪ±»·¢Ã÷  £¬Ëæºó¹«Ë¾¹Ø±ÕÁËһЩϵͳ×÷ΪÏìÓ¦²½·¥¡£×î³õ  £¬¹«Ë¾Í¨ÖªÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ³ÆÊÜÓ°ÏìµÄÈËÊýԼΪ27,000ÈË  £¬µ«ËæºóÔÚ10Ô·Ý͸¶ÊÜÓ°ÏìÈËÊýÒÑÔöÌíÖÁ½ü97,000ÈË¡£¶ø×î½ü¼¸Ìì¸üеÄÊý¾ÝÏÔʾ  £¬ÏÖʵÊÜÓ°ÏìµÄÈËÊýÒÑÁè¼Ý193,000ÈË¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃûºÍÉç»á°ü¹ÜºÅ  £¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò½«»ñµÃÃâ·ÑµÄÉí·Ý͵ÇÔ± £»¤ºÍÐÅÓÃ¼à¿Ø·þÎñ¡£ÏÖÔÚÉв»ÇåÎú´Ë´ÎÊý¾Ýй¶ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷  £¬Ò²Ã»ÓÐÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴ÎÈëÇÖÈÏÕæ¡£


https://www.securityweek.com/form-i-9-compliance-data-breach-impacts-over-190000-people/


6. Microsoft Exchange Õë¶ÔÀÄÓÃÓÕÆ­Îó²îµÄµç×ÓÓʼþÌí¼ÓÖÒÑÔ


11ÔÂ12ÈÕ  £¬Î¢ÈíÅû¶ÁËÒ»¸ö¸ßÑÏÖØÐÔµÄExchange ServerÎó²î£¨CVE-2024-49040£©  £¬¸ÃÎó²îÓÉSolidlabÇå¾²Ñо¿Ô±Vsevolod Kokorin·¢Ã÷  £¬Ó°ÏìExchange Server 2016ºÍ2019°æ±¾¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßαÔì´«Èëµç×ÓÓʼþµÄÕýµ±·¢¼þÈË  £¬Ìá¸ß¶ñÒâÐÂÎŵÄÓÐÓÃÐÔ¡£ÎÊÌâÔ´ÓÚSMTP·þÎñÆ÷¶ÔÊÕ¼þÈ˵صãµÄÆÊÎö²î±ðÒÔ¼°µç×ÓÓʼþÌṩÉÌÔÊÐíʹÓò»ÇкÏRFC±ê×¼µÄ·ûºÅ¡£Î¢ÈíÔÚ±¾Ô²¹¶¡ÐÇÆÚ¶þÐû²¼Á˸üР £¬Ìí¼ÓÎó²î¼ì²âºÍÖÒÑÔºá·ù  £¬ËäÈ»ÉÐδÐÞ²¹¸ÃÎó²î  £¬µ«Exchange·þÎñÆ÷ÏÖÔÚ½«¼ì²â¶ñÒâµç×ÓÓʼþ²¢Ìí¼ÓÖÒÑÔ¡£ÖÎÀíÔ±ÆôÓÃĬÈÏÇå¾²ÉèÖúó  £¬ÏµÍ³½«Ä¬ÈÏÆôÓÃÎó²î¼ì²âºÍµç×ÓÓʼþÖÒÑÔ  £¬²¢ÔÚ¼ì²âµ½µÄ¿ÉÒɵç×ÓÓʼþÖÐÌí¼ÓÖÒÑÔ  £¬ÌáÐÑÓû§²»ÒªÐÅÍÐδÂÄÀúÖ¤µÄÐÅÏ¢¡¢Á´½Ó»ò¸½¼þ¡£Î¢Èí½¨ÒéÓû§¼á³Ö¸Ã¹¦Ð§ÆôÓà  £¬ÒÔ±ÜÃâÍøÂç´¹ÂÚ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/unpatched-microsoft-exchange-server-flaw-enables-spoofing-attacks/