ÃÀ¹úVoIPÌṩÉÌÔâµ½DDoS¹¥»÷£ºvpnMentor°ä²¼ºÚ¿Í·ÖÎö»ã±¨
°ä²¼¹¦·ò 2021-09-29ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷

ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔÚ½üÆÚÔâµ½ÁËDDoS¹¥»÷£¬µ¼Ö´Óǰ¼¸ÌìÄÚÆäÔÚÈ«ÃÀµÄÓïÒô·þÎñÖжϡ£Bandwidth´ÓÃÀ¹ú¶«²¿¹¦·ò9ÔÂ25ÈÕÏÂÎç3:31ÆðÍ·»ã±¨Æäϵͳ³öÏÖ¹ÊÕÏ£¬Ó°ÏìÁËÓïÒô¡¢¼ÓÇ¿ÐÍ911(E911)·þÎñ¡¢ÐÂÎÅ·¢Ëͺ͹ÙÍø½Ó¼û¡£Bandwidthδ¹«¿ª·þÎñÖжϵÄÔÒò£¬µ«ÆäÔ±¹¤³ÆÊÇDDoS¹¥»÷µ¼Öµġ£±¾ÔÂVoIP.msÔøÔ⵽ΪÆÚÒ»ÖܵÄDDoS¹¥»÷²¢±»ÀÕË÷450ÍòÃÀÔª£¬Éв»Ã÷ÏÔBandwidthÊÇ·ñÒ²Ôâµ½ÁËÀàËÆµÄÀÕË÷¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/bandwidthcom-is-latest-victim-of-ddos-attacks-against-voip-providers/
ÃÀ¹úÐÝ˹¶Ù¸Û¿Ú³ÆÆäÔâµ½ÒÉËÆ¹ú¶ÈÖ§³ÖµÄºÚ¿Í¹¥»÷

ÃÀ¹úÐÝ˹¶Ù¸Û¿ÚµÄ¹ÙÔ±ÔÚÉÏÖÜËĻ㱨³Æ£¬ÐÝ˹¶Ù¸ÛÎñ¾ÖÓÚ8Ô·ÝÔøÔâµ½ÍøÂç¹¥»÷¡£CISA¹ÙÔ±Jen Easterlyй©£¬Õâ´Î¹¥»÷»î¶¯¼«¶È¸´ÔÓ£¬Ó¦¸Ã¹é×ïÓÚ¹ú¶ÈÖ§³ÖµÄºÚ¿Í£¬²¢ÒÔΪ¹¥»÷ÕßÀûÓÃÁËManageEngine ADSelfService PlusÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶CVE-2021-40539¡£¸Ã·ì϶ÒÑÓÚ9Ô³õ½¨¸´£¬FBI¡¢CGCYBERºÍCISA»¹ÔÚ9ÔÂÖÐÑ®½áºÏ°ä²¼ÁËÓйظ÷ì϶µÄ°²È«Õ÷ѯ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/122599/hacking/port-of-houston-cyberattack.html
OpenSUpdaterеĴúÂëÊðÃû¼¼Êõ¿ÉÈÆ¹ý°²È«¼ì²â

Google TAGÍŶӷ¢ÏÖÁËOpenSUpdaterеĴúÂëÊðÃû¼¼Êõ¿ÉÈÆ¹ý°²È«¼ì²â¡£OpenSUpdaterͨ³£Ê¹ÓôӺϷ¨Ö¤ÊéÐû¸æ»ú¹¹»ñµÃµÄ´úÂëÊðÃûÖ¤Êé½øÐÐÊðÃû£¬×Ô8ÔÂÒÔÀ´£¬ËüÆðͷʹÓÃÎÞЧÊðÃû¡£ÕâЩÐÂÑù±¾ÒÔEnd of Content(EOC)ÏóÕ÷´úÌæÁËleaf X.509Ö¤ÊéµÄSignatureAlgorithmµÄ¡°²ÎÊý¡±ÔªËصÄNULLÏóÕ÷¡£Ê¹ÓÃOpenSSLÌáÈ¡ÊðÃûÐÅÏ¢µÄ°²È«²úÆ·»áÒÔΪÕâÖÖ±àÂëÎÞЧ£¬È»¶øÒ»Ð©½âÎöÆ÷ÒÔΪÕâЩ±àÂëÓÐЧ²¢ÔÊÐíÑéÖ¤¡£ÀûÓÃÕâÖÖ·½Ê½£¬Äܹ»´ïµ½Èƹý¼ì²âµÄÖ÷ÕÅ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/122576/hacking/code-signing-avoid-detection.html
Cisco·¢ÏÖÀûÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄ»î¶¯

Cisco TalosÔÚ9ÔÂ23ÈÕÅû¶ÁËÕë¶ÔÓ¡¶Èµ±¾ÖºÍ¾üÊ»ú¹¹µÄ¹¥»÷»î¶¯¡°Operation Armor Piercer¡±¡£Õâ´Î»î¶¯ÖÐʹÓõÄһЩսÊõÓë°Í»ù˹̹ÓйØ×éÖ¯APT36ºÍSideCopyÀàËÆ£¬²¢Ê¹ÓÃÁËóÒ×RAT NetwireºÍWarzone(AveMaria)¡£¹¥»÷Õß»¹Ê¹ÓÃÁ˸÷Ààµö¶ü£¬ËüÃÇÖØÒª¼Ù×°³ÉÓëÓ¡¶Èµ±¾Ö»ù´¡ÉèÊ©ºÍ²Ù×÷ÓйصÄÖ¸ÄÏ£¬ÀýÈçKavachºÍITÓйØÖ¸ÄÏ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/threat-actor-targets-indian-government-commercial-rats
vpnMentor°ä²¼ºÚ¿ÍÔÚTelegramÉϻµÄ·ÖÎö»ã±¨

vpnMentor½üÆÚ°ä²¼ÁËÓйغڿÍÔÚTelegramÉϻµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬¹¥»÷ÕßËÆºõÆðÍ·´óÁ¿Ó¿ÏòTelegramÀ´·ÖÏíºÍ»áÉÌ´ó¹æÄ£µÄÊý¾Ýй¶¡£×êÑÐÈËÔ±²ÎÓëÁ˼¸¸öÒÔ¶ñÒâÍøÂç»î¶¯ÎªÖ÷µÄTelegramÓ××飬·¢ÏÖ¹¥»÷Õß»áÔÚÆµÂ·Öа䲼ת´¢µÄÊý¾Ý£¬²¢¶ÔÊý¾Ý½øÐмòҪעÃ÷ÒÔ¹©ÆäËûÓû§Ê¹Óã»»òÕßÊÇÊý°ÙÃû³ÉԱһ·»áÉÌÓйØÍøÂç¹¥»÷µÄ¸÷¸ö·½ÃæÒÔ¼°ÈôºÎÀûÓÃת´¢µÄÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.vpnmentor.com/blog/cybercrime-on-telegram/
RiskRecon°ä²¼2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯·ÖÎö»ã±¨

RiskReconºÍCyentia Institute½áºÏ°ä²¼ÁË2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬×Ô2008ÄêÒÔÀ´ÒÑ·¢ÏÖ897ÆðÊý¾Ýй¶µÄÁ¬ËøÊÂÎñ£¨ripple event£©£¬ÆäÖеÄ108Æð²úÉúÔÚ´ÓǰÈýÄêÖУ»´ËÀàÊÂÎñÔì³ÉµÄ¾¼ÃËðʧÊÇ´«Í³µÄÊý¾Ýй¶ÊÂÎñµÄ10±¶£¬ÆäÖÐ×îÑϳÁµÄ¿É´ï26±¶£»µäÐ͵ÄÁ¬ËøÊÂÎñ±ØÒª379ÌìºóÄÜÁ¦Ó°Ïì75%µÄÏÂÓÎÊܺ¦Õߣ¬¶øÉæ¼°µ½×éÖ¯µÄÊýÁ¿¾ùÔÈΪ4¸ö¡£
ÔÎÄÁ´½Ó£º
https://www.riskrecon.com/report-measuring-the-impact-of-multi-party-breaches


¾©¹«Íø°²±¸11010802024551ºÅ