±±Ô¼·å»áʱ´ú¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢¶¯DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-06-26

1. ±±Ô¼·å»áʱ´ú¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢¶¯DDoS¹¥»÷


6ÔÂ24ÈÕ£¬ÔÚ±±Ô¼·å»áÓÚºÉÀ¼º£ÑÀ¾ÙÐÐÖ®¼Ê£¬¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)Éù³Æ¶ÔΪÊÐÕþÕþ¸®ºÍÆäËûÕþÖλú¹¹ÌṩIT½â¾ö¼Æ»®µÄNotuBiz¹«Ë¾·¢¶¯ÁËDDoS¹¥»÷£¬µ¼Ö°üÀ¨Ö÷ÒªÎļþµÄÒ³ÃæÔÝʱÎÞ·¨»á¼û¡£ÔÚ·å»áʱ´ú£¬±±Ô¼ÓÑ°î¸æ¿¢Á˽«¹ú·À¿ªÖ§Ä¿µÄÉ趨Ϊº£ÄÚÉú²ú×ÜÖµ£¨GDP£©5%µÄЭÒ飬ÕâÊÇÃÀ¹ú×ÜÍ³ÌÆÄɵ¡¤ÌØÀÊÆÕ×î³õÌá³öµÄÒªÇ󡣯äÖÐ3.5%½«Ö±½Ó²¦¸ø¹ú·À²¿£¬ÆäÓà1.5%Ôò·ÖÅɸøÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©µÈÏà¹ØÁìÓòµÄ¸üÆÕ±éͶ×Ê¡£È»¶ø£¬ÕâÒ»Ö÷ÒªµÄ¹ú¼Ê¾Û»áÒ²³ÉΪÁ˺ڿͷ¢¶¯ÍøÂç¹¥»÷µÄ¾ø¼Ñʱ»ú¡£NoName057(16)×éÖ¯ÓÉһȺ¾ÝÐÅÊܶíÂÞ˹×ÊÖúµÄºÚ¿ÍÐж¯Ö÷ÒåÍøÂçÇ徲ר¼Ò×é³É£¬Ôø¹¥»÷¹ý³Ö·´¶í̬¶ÈµÄ¹ú¼ÒºÍ×éÖ¯£¬°üÀ¨±ÈÀûʱ¡¢Òâ´óÀû¡¢ºÉÀ¼ºÍÎÚ¿ËÀ¼¡£´Ë´Î£¬¸Ã×éÖ¯ÔÚTelegramÉÏÉù³Æ£¬ÆäÄ¿µÄÊǺÉÀ¼µÄ±±Ô¼µØÇø´ú±í´¦ÒÔ¼°°üÀ¨Ë¹º£¶ûÍк಩˹¡¢´ú¶û·òÌØºÍº£ÑÀÔÚÄڵöÊÐÕòºÍÊ¡·Ý¡£º£ÑÀÊÐÕþ¸®ÖÜÒ»±¨¸æ³Æ£¬¶à¼Ò¹©Ó¦ÉÌ×¢ÖØµ½ÆäϵͳÔâÓö´ó×ÚÍøÂçÁ÷Á¿¡£Ò»Î»½²»°ÈË֤ʵ£¬ÓÉÓÚÍøÂç¹¥»÷£¬º£ÑÀÊÐÕþ¸®Ê¹ÓõĶà¸öÓòÃûÓÐʱÊܵ½ÏÞÖÆ»òÎÞ·¨»á¼û¡£Í¬Ê±£¬IT·þÎñÌṩÉÌNotuBizÒ²ÈÏ¿ÉÆäÏµÍ³ÍøÂçÁ÷Á¿Öش󣬵«¹«Ë¾µÄ·À»ðǽÓÐÓõظôÀëÁËÈßÓàÁ÷Á¿£¬Ö»¹ÜÔÆÔÆ£¬»á¼ûÕß¼ÓÔØ°üÀ¨¹Ù·½ÎļþµÄÒ³ÃæÈÔÐèÒªºÜ³¤Ê±¼ä¡£


https://cybernews.com/news/russian-hackers-ddos-attack-netherlands/


2. Unit 42½ÒÆÆÕë¶Ô·ÇÖÞ½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÔ˶¯


6ÔÂ25ÈÕ£¬Palo Alto NetworksÆìϵÄUnit 42Ñо¿ÍŶӿËÈÕ·¢Ã÷ÁËÒ»ÏîÕë¶Ô·ÇÖÞ¶à¼Ò½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâÔ˶¯£¬¸ÃÔ˶¯±»×·×ÙΪCL-CRI-1014¡£¾ÝUnit 42Ñо¿Ö°Ô±ÆÀ¹À£¬ÕâЩ¹¥»÷Õß×Ô2023ÄêÒÔÀ´±ãÒ»Ö±»îÔ¾ÓÚ·ÇÖÞ½ðÈÚÐÐÒµ£¬ÊÎÑÝ×ųõʼ»á¼û¾­¼ÍÈË£¨IABs£©µÄ½ÇÉ«£¬¼´ÏÈ»ñȡĿµÄµÄ³õʼ»á¼ûȨÏÞ£¬ÔÙÔÚ°µÍøÉϽ«Æä³öÊÛ¸øÆäËû¹¥»÷Õߣ¬´Ó¶øÄ²È¡²»·¨ÀûÒæ¡£ÎªÁËʵÑé¹¥»÷£¬CL-CRI-1014¹¥»÷ÕßʹÓÃÁËһϵÁпªÔ´¹¤¾ßºÍ¹ûÕæ¿ÉÓõÄÈí¼þ¡£¹¥»÷ÕßÊ×ÏÈʹÓÃPsExecÔ¶³ÌÅþÁ¬µ½Áíһ̨»úе×÷ΪÊðÀí£¬È»ºóÔÚÊðÀí»úеÉÏʹÓÃChiselÅþÁ¬µ½¶ą̀»úе¡£ÔÚ²¿·Ö»úеÉÏ£¬¹¥»÷ÕßͶµÝPoshC2²¢¾ÙÐÐÕì̽Ô˶¯£¬ÍøÂçÁ÷Á¿Í¨¹ýChiselËíµÀ´«Êä¡£ÔÚÆäËû»úеÉÏ£¬¹¥»÷ÕßÔòÔËÐÐPowerShell²¢×°ÖÃClassroom Spy£¬ÒÔʵÏÖ¸üÖÜÈ«µÄ¼à¿ØºÍ¿ØÖÆ¡£ÏÖÔÚ²¢Ã»ÓÐÖ¤¾ÝÅú×¢CL-CRI-1014Ô˶¯Ê¹ÓÃÁËÄ¿µÄ×éÖ¯²úÆ·»ò·þÎñÖеÄÈκÎÎó²î¡£ÕâÒâζ׏¥»÷Õß¿ÉÄܸü¶àµØÒÀÀµÓÚÉç»á¹¤³ÌѧÊֶΡ¢ÈõÃÜÂë»òÆäËû·ÇÊÖÒÕÐÔÎó²îÀ´»ñÈ¡³õʼ»á¼ûȨÏÞ¡£


https://www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/


3. ³¯ÏÊÐÂÒ»ÂÖ¡°Ñ¬È¾ÐÔÃæÊÔ¡±¹¥»÷ʹÓöñÒânpm°üʵÑéÇÔÃÜ


6ÔÂ25ÈÕ£¬¿ËÈÕ£¬³¯ÏÊÌᳫµÄÐÂÒ»ÂÖ¡°Ñ¬È¾ÐÔÃæÊÔ¡±Ô˶¯ÒýÆðÁËÇå¾²½çµÄÆÕ±é¹Ø×¢¡£´Ë´Î¹¥»÷Ö÷ÒªÃé×¼ÇóÖ°Õߣ¬ÌØÊâÊÇÈí¼þ¹¤³ÌʦºÍ¿ª·¢Ö°Ô±£¬Í¨¹ý¶ñÒânpm°üѬȾËûÃǵÄ×°±¸£¬ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢²¢Ö²ÈëºóÃÅ¡£¾ÝSocket Threat Research±¨¸æ£¬ÕâЩ¶ñÒânpm°üÔÚÊܺ¦ÕߵĻúеÉϼÓÔØÁËÓ볯ÏÊÐÐΪÕßÓйصÄBeaverTailÐÅÏ¢ÇÔÈ¡³ÌÐòºÍInvisibleFerretºóÃÅ¡£´Ë´Î¹¥»÷ʹÓÃÁËͨ¹ý24¸öÕË»§Ìá½»µ½npmµÄ35¸ö¶ñÒâÈí¼þ°ü£¬ÕâЩÈí¼þ°ü×ܹ²±»ÏÂÔØÁËÁè¼Ý4000´Î£¬ÆäÖÐ6¸öÔÚ׫д±¨¸æÊ±ÈÔÈ»¿ÉÓá£ÕâЩ¶ñÒânpm°üÌØÊâΣÏÕ£¬ÓÉÓÚËüÃÇÖÐÓм¸¸öÊÇÓòÃûÇÀ×¢»òÄ£Äâ×ÅÃûÇÒÊÜÐÅÍеĿ⣬Èçreact-plaid-sdk¡¢vite-plugin-next-refreshµÈ¡£³¯ÏÊÌØ¹¤Ã°³äÕÐÆ¸Ö°Ô±£¬Í¨¹ýLinkedInºÍGoogle DocsÏò¿ª·¢Ö°Ô±ºÍÇóÖ°Õß·¢ËͱàÂ롰ʹÃü¡±£¬Ö¸µ¼ËûÃÇÏÂÔØÕâЩÈí¼þ°ü£¬²¢ÒªÇóÇóÖ°Õß¼ÓÈë²âÊÔÏîÄ¿¡£ÕâЩ×÷Òµ±»Î±×°³ÉÕýµ±²âÊÔ£¬µ«ÏÖʵÉϻᴥ·¢Ñ¬È¾Á´£¬ÔÚÄ¿µÄÅÌËã»úÉÏͶ·Å¶à¸öÓÐÓÃÔØºÉ¡£


https://www.bleepingcomputer.com/news/security/new-wave-of-fake-interviews-use-35-npm-packages-to-spread-malware/


4. ¸çÂ×±ÈÑÇ´óѧÔâÍøÂç¹¥»÷£¬Ð£Ô°ÏµÍ³·ºÆð´óÃæ»ý¹ÊÕÏ


6ÔÂ26ÈÕ£¬¸çÂ×±ÈÑÇ´óѧ¹ÙÔ±ÕýÔÚÊÓ²ìÒ»ÆðDZÔÚµÄÍøÂçÇå¾²ÊÂÎñ£¬´ËǰÓÐѧÉú±¨¸æ³ÆÐ£Ô°ÄÚ·ºÆðÁË´óÃæ»ýµÄÊÖÒÕ¹ÊÕÏ£¬ÉõÖÁÔÚÆÁÄ»ÉÏ·ºÆðÁËÏ£ÆæµÄͼÏñ¡£×ÔÖܶþÔçÉÏÒÔÀ´£¬¸ÃУµÄÍøÕ¾ºÍÆäËûϵͳһֱ´¦ÓÚ¼äЪÐÔÀëÏß״̬£¬¸øÊ¦ÉúµÄÒ»Ñùƽ³£Ñ§Ï°ºÍÊÂÇé´øÀ´Á˼«´óµÄδ±ã¡£¾Ý¸çÂ×±ÈÑÇ´óѧµÄһλ½²»°ÈËÏòRecorded Future News͸¶£¬×òÌìÔçÉÏ£¬¸çÂ×±ÈÑÇ´óѧµÄITϵͳ±¬·¢¹ÊÕÏ£¬Ó°ÏìÁ˳¿±ßÐ£ÇøµÄϵͳÔËÐС£ÏÖÔÚ£¬Ñ§Ð£µÄITÍŶÓÕýÔÚÈ«Á¦ÒÔ¸°µØÆð¾¢»Ö¸´·þÎñ£¬²¢ÒÑ֪ͨÁËÖ´·¨²¿·Ö¡£ÖµµÃÇìÐÒµÄÊÇ£¬ÏÖÔÚ¸çÂ×±ÈÑÇ´óѧŷÎÄҽѧÖÐÐĵÄÁÙ´²ÔËÓªÉÐδÊܵ½Ó°Ï졣һλ²»¿Ï͸¶ÐÕÃûµÄÖªÇéÈËÊ¿ÌåÏÖ£¬ÏÖÔÚ²¢Ã»ÓÐÊý¾Ýй¶»òÀÕË÷Èí¼þ¹¥»÷µÄ¼£Ï󣬸çÂ×±ÈÑÇ´óѧµÄÏµÍ³ËÆºõûÓÐÊܵ½¡°Éî¶ÈÈëÇÖ¡±¡£È»¶ø£¬Ñ§ÉúÃÇÔÚÉ罻ýÌåÉÏ·ÖÏíµÄÕÕÆ¬È´ÏÔʾ£¬Ð£Ô°ÄÚµÄÊý×Ö±êÅÆ±»½ÓÊÜ£¬²¢Ì滻ΪÁËÌÆÄɵ¡¤ÌØÀÊÆÕ×ÜͳµÄͼÏñ¡£¾ÝУ±¨¡¶¸çÂ×±ÈÑÇÊÓ²ì¼Ò±¨¡·±¨µÀ£¬Ñ§ÉúÃÇÎÞ·¨µÇÈÎÃüÓÚ»á¼ûµç×ÓÓʼþÕË»§ºÍ×÷ҵƽ̨µÄÉí·ÝÑéÖ¤·þÎñ¡£Ñ§Ð£ÔÚÖܶþÒ»Á¬·¢³öÁ˶àÌõÐÂÎÅ£¬ÖÒÑÔ·þÎñÖÐÖ¹£¬²¢±Þ²ß½ÌÊÚÃÇÁíÐа²ÅſγÌ¡£


https://therecord.media/columbia-university-technology-outages


5. CitrixÖÒÑÔNetScaler×°±¸Îó²îCVE-2025-6543ÔâÆÕ±éʹÓÃ


6ÔÂ25ÈÕ£¬Citrix¹«Ë¾·¢³ö½ôÆÈÖÒÑÔ£¬Ö¸³öÆäNetScaler×°±¸ÖÐÒ»¸ö±»×·×ÙΪCVE-2025-6543µÄÎó²îÕýÔÚ±»ÆÕ±éʹÓ㬵¼ÖÂ×°±¸½øÈë¾Ü¾ø·þÎñ״̬£¬½ø¶øÀëÏß¡£ÕâÒ»Îó²îÄÚ²¿¸ú×Ù±àºÅΪCTX694788£¬ÊÇÒ»¸öÑÏÖØµÄÇå¾²Îó²î£¬¿ÉÓÉδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÇëÇó´¥·¢£¬¶ÔNetScaler ADCºÍNetScaler Gateway×°±¸×é³ÉÑÏÖØÍþв¡£¾ÝCitrix¹«Ë¾Í¸Â¶£¬¸ÃÎó²îÓ°ÏìNetScaler ADCºÍNetScaler GatewayµÄ¶à¸ö°æ±¾£¬½öÓ°ÏìÉèÖÃÎªÍø¹Ø£¨ÈçVPNÐéÄâ·þÎñÆ÷¡¢ICAÊðÀí¡¢ÎÞ¿Í»§¶ËVPN (CVPN)¡¢RDPÊðÀí£©»òAAAÐéÄâ·þÎñÆ÷µÄNetScaler×°±¸¡£Citrix¹«Ë¾ÒѾ­Õë¶Ô´ËÎó²îÐû²¼ÁËÐÞ¸´²¹¶¡¡£È»¶ø£¬ÔÚÖÎÀíÔ±´¦Öóͷ£´ËÎó²îµÄͬʱ£¬Citrix¹«Ë¾»¹·¢³öÁ˹ØÓÚÁíÒ»¸ö±»³ÆÎªCitrixBleed 2µÄÑÏÖØNetScalerÎó²îµÄÖÒÑÔ¡£¸ÃÎó²î±àºÅΪCVE-2025-5777£¬ÔÊÐí¹¥»÷Õßͨ¹ý´Ó×°±¸ÄÚ´æÖÐÌáÈ¡»á»°ÁîÅÆÀ´Ð®ÖÆÓû§»á»°£¬ÆäÑÏÖØÐÔ½ûÖ¹ºöÊÓ¡£¼øÓÚÕâÁ½¸öÎó²îµÄÑÏÖØÐÔ£¬Citrix¹«Ë¾Ç¿ÁÒ½¨ÒéÖÎÀíÔ±¾¡¿ìÓ¦ÓÃ×îеIJ¹¶¡£¬ÒÔÐÞ¸´ÕâЩÇå¾²Îó²î£¬±ÜÃâ×°±¸Êܵ½¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/


6. Mainline Health SystemsÊý¾Ýй¶ӰÏìÁè¼Ý10ÍòÈË


6ÔÂ25ÈÕ£¬Mainline Health Systems£¬Ò»¼Ò×Ô1978ÄêÆð±ãÔÚ°¢¿ÏÉ«Öݲ¨ÌØÀ¼ÔËÓªµÄÁª°îÈÏÖ¤·ÇÓªÀûÐÔÒ½ÁÆÖÐÐÄ£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý10ÍòÈË¡£¾ÝÊý¾Ýй¶֪ͨº¯ËùÊö£¬¸ÃÇå¾²ÊÂÎñ±¬·¢ÔÚ2024Äê4ÔÂ10ÈÕ×óÓÒ£¬Ó°ÏìÁ˹«Ë¾ÍøÂç¡£Mainline Health SystemsÔÚ»ñϤ´ËÎÊÌâºó£¬Á¬Ã¦Õö¿ªÁËÖÜÈ«ÊӲ죬²¢½ÓÄÉÁ˶àÏî²½·¥ÒÔÓ¦¶Ô´Ë´ÎÊÂÎñ¡£ËûÃDz»µ«½«´Ëʼû¸æÁËÁª°îÖ´·¨²¿·Ö£¬»¹Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò£¬²¢¶ÔÊÜÓ°ÏìµÄÎļþ¾ÙÐÐÁËÈ˹¤Éó²é¡£¾­ÓÉÉîÈëÊӲ죬¸Ã×éÖ¯ÓÚ2025Äê5ÔÂ21ÈÕÈ·ÈÏ£¬ÓÉÓÚ´Ë´ÎÊÂÎñ£¬Ä³Ð©°üÀ¨»¼ÕßÊܱ£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄÎļþÔâµ½ÁËδ¾­ÊÚȨµÄ»á¼û»ò»ñÈ¡¡£Inc Ransom×éÖ¯Éù³Æ¶Ô´Ë´ÎÏ®»÷ÈÏÕæ£¬²¢½«Mainline Health SystemsÌí¼Óµ½ÁËÆäTor×ßÂ©ÍøÕ¾ÉÏ¡£¹ØÓÚ´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬Mainline Health SystemsÌåÏÖ½«È«Á¦ÅäºÏÁª°îÖ´·¨²¿·ÖµÄÊӲ죬²¢ÔöÇ¿×ÔÉíµÄÍøÂçÇå¾²·À»¤²½·¥£¬ÒÔ±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£


https://securityaffairs.com/179322/data-breach/mainline-health-systems-disclosed-a-data-breach.html