ChatGPTÓëSora AIÈ«Çò̱»¾£¬OpenAI´¹Î£½¨¸´ÖÐ
°ä²¼¹¦·ò 2024-12-131. ChatGPTÓëSora AIÈ«Çò̱»¾£¬OpenAI´¹Î£½¨¸´ÖÐ
12ÔÂ12ÈÕ£¬ChatGPTºÍSora AIÊÇÁ½¿îÓÉOpenAIÍÆ³öµÄÈȵãAI²úÆ·£¬Ä¿Ç°ÔÚÈ«ÇòÁìÓòÄÚÔâ·ê·þÎñÖжϡ£OpenAIÒÑÈ·Èϲ¢ÔÚ»ý¼«½¨¸´´ËÎÊÌâ¡£ÖжÏʼÓÚ2024Äê12ÔÂ11ÈÕÉýƽÑó±ê¶¨¹¦·òÏÂÎç3:17×óÓÒ£¬Éæ¼°ChatGPTÍøÕ¾¼°ÆäAPI£¬ÒÔ¼°×î½üÍÆ³öµÄÊÓÆµÌìÉúÄ£ÐÍSora¡£Óû§½Ó¼ûChatGPTÍøÕ¾Ê±»áÊÕµ½¹ØÓÚ·þÎñ²»³ÉÓõÄ֪ͨ£¬OpenAIÒѼø±ð³öÎÊÌâ²¢ÕýÖÂÁ¦ÍƳö½¨¸´·¨Ê½¡£ÓÉÓÚChatGPTÕ¼Óг¬¹ý2ÒÚµÄÖØ´óÖÜ»îÔ¾Óû§Èº£¬ËüÒѳÉÎªÍøÂç¹¥»÷µÄÖØÒªÖ¸±ê¡£´Ëǰ£¬Ò»¸öÃûΪAnonymous SudanµÄ×éÖ¯ÔøÐû³Æ¶ÔÒ»´ÎÓëChatGPT·þÎñÖжÏͬʱ²úÉúµÄDDoS¹¥»÷ÕÆ¹Ü¡£È»¶ø£¬OpenAIÉÐδȷÈϵ±Ç°ÖжÏÊÇ·ñÓÉÀàËÆ¹¥»÷Ôì³É£¬ÖжÏÔÒòÉв»Ã÷ÏÔ¡£È«ÇòÓû§ÕýÇ×êǹØ×¢OpenAIµÄ½¨¸´½øÕ¹£¬µÈ´ý·þÎñ¿ÉÄܾ¡¿ì¸´ÔÕý³£¡£
https://hackread.com/sora-chatgpt-down-worldwide-openai-working-on-fix/
2. ÐÂÐÍÒþÃØ Pumakit Linux rootkit ¶ñÒâÈí¼þ±»·¢ÏÖ
12ÔÂ12ÈÕ£¬Pumakit ÊÇÒ»ÖÖÐÂÐÍ Linux rootkit ¶ñÒâÈí¼þ£¬ËüÀûÓÃÒþÉíºÍ¸ß¼¶È¨ÏÞÌáÉý¼¼ÊõÀ´ÒþÄäÓÚϵͳÖС£¸Ã¶ñÒâÈí¼þÓɶà¸ö×é¼þ×é³É£¬Ô̺¬Í¶·ÅÆ÷¡¢ÄÚ´æ×¤Áô¿ÉÖ´ÐÐÎļþ¡¢ÄÚºËÄ£¿é rootkit ºÍÓû§¿Õ¼ä rootkit£¨Kitsune SO£©¡£Elastic Security ÔÚ 2024 Äê 9 Ô 4 ÈÕÓÚ VirusTotal ÉÏ´«µÄ¿ÉÒɶþ½øÔìÎļþ¡°cron¡±Öз¢ÏÖÁËËü£¬µ«ÎÞ·¨È·¶¨ÆäʹÓÃÕß»òÖ¸±ê¡£Pumakit ѡȡ¶à½×¶ÎϰȾ¹ý³Ì£¬Ê×ÏÈͨ¹ý¡°cron¡±Í¶·ÅÆ÷Ö´ÐÐǶÈëʽÓÐЧ¸ºÔØ£¬×îÖÕ½« LKM rootkit Ä£¿é²¿Êðµ½ÏµÍ³ÄÚºËÖУ¬²¢ÀûÓà Kitsune SO ÔÚÓû§¿Õ¼äÖÐ×¢Èë¹ý³Ì£¬À¹½ØÏµÍ³Å²Ó᣸à rootkit Õë¶Ô 5.7 °æÖ®Ç°µÄ Linux ÄÚºËÉè¼Æ£¬ÀûÓá°kallsyms_lookup_name()¡±º¯Êý°Ñ³ÖϵͳÐÐΪ£¬²¢Í¨¹ý ftrace ¹³×¡ÏµÍ³Å²ÓÃÀ´ÌáÉýȨÏÞ¡¢Ö´ÐкÅÁîºÍ°µ²Ø¹ý³Ì¡£´Ë±í£¬Ëü»¹Äܰµ²ØÌض¨ÎļþºÍ¶ÔÏó£¬È·±£¶ñÒâ¸ü¸Ä²»±»¸´Ô£¬²¢Óë Kitsune SO ÐͬÔËÐУ¬À¹½ØÓû§¼¶ÏµÍ³Å²Ó㬰µ²Ø rootkit ÓйØÎļþ¡¢¹ý³ÌºÍÍøÂçÏνӡ£
https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/
3. ¹ú¼Ê½áºÏÐж¯²é·âRydoxÍøÂç·¸×ïÊг¡£¬¿ÛÁôÈýÃûÖÎÀíÈËÔ±
12ÔÂ12ÈÕ£¬°¢¶û°ÍÄáÑÇ·¨Âɲ¿ÃÅÓë¹ú¼ÊºÏ×÷ͬ°éÁªÊÖ£¬³É¹¦²é·âÁËÃûΪRydoxµÄÍøÂç·¸×ïÊг¡£¬²¢¿ÛÁôÁËÈýÃû¿ÆË÷ÎÖ¹úÃñ¡ª¡ªArdit Kutleshi¡¢Jetmir KutleshiºÍShpend Sokoli£¬ÆäÖÐǰÁ½ÈËÒѱ»ÃÀ¹ú˾·¨²¿¸æ×´²¢ÆÚ´ýÒý¶É¡£×Ô2016ÄêÒÔÀ´£¬RydoxÊг¡Âô¼Ò²Î¼ÓÁ˳¬¹ý7600ÆðÐÅÓþ¿¨ÐÅÏ¢¡¢µÇ¼ƾ֤ºÍÓ×ÎÒÐÅÏ¢µÄÏúÊÛ£¬ÕâЩÐÅÏ¢ÊÇ´ÓÊýǧÃûÃÀ¹ú¹«ÃñºÍ¸÷ÀàÍøÂç·¸×﹤¾ßÖÐÇÔÈ¡µÄ¡£Rydox»¹Ïò³¬¹ý18000ÃûÓû§ÏúÊÛÁË321000ÖÔìäËûÍøÂç·¸×ï²úÆ·¡£×¢²áÓû§ÐèÏÈ´æÈë¿Ï¶¨ÊýÁ¿µÄ¼ÓÃÜÇ®±ÒÄÜÁ¦²É°ì·¸·¨²úÆ·£¬¶øRydoxÊÚȨÂô¼Ò¿É»ñµÃÏúÊÛÊÕÒæµÄ60%¡£ÃÀ¹ú»ñµÃ˾·¨ÊÚȨ£¬²é·âÁËRydoxµÄÓòÃûºÍ·þÎñÆ÷£¬²¢´Ó±»¸æÕË»§ÖпÛѺÁËÔ¼225000ÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£Õâ´ÎÐж¯µÃµ½Á˶à¹ú·¨Âɲ¿ÃŵÄÐÖú¡£ÃÀ¹ú¼ì²ì¹Ù°µÊ¾£¬RydoxÊг¡ÊÇÒ»¸öһվʽÉ̵꣬¹ÌÈ»ÍøÂç·¸×ïͨ³£Éæ¼°º£±íÐÐΪ£¬µ«Æä·çÏÕ¿ÉÄÜÊǸ²ÃðÐԵġ£
https://www.bleepingcomputer.com/news/security/police-shuts-down-rydox-cybercrime-market-arrests-3-admins/
4. ÒÁÀÊÀûÓÃIOCONTROL¶ñÒâÈí¼þ¹¥»÷ÃÀÒԹؼü»ù´¡ÉèÊ©
12ÔÂ12ÈÕ£¬ÒÁÀÊÍþвÐÐΪÕßÕýÀûÓÃÐÂÐͶñÒâÈí¼þIOCONTROL¹¥»÷ÒÔÉ«ÁкÍÃÀ¹úµÄ¹Ø¼ü»ù´¡ÉèÊ©£¬³ö¸ñÊÇÎïÁªÍø(IoT)É豸ºÍOT/SCADAϵͳ£¬Ô̺¬Â·ÓÉÆ÷¡¢PLC¡¢HMI¡¢IPÉãÏñ»ú¡¢·À»ðǽºÍȼÁÏÖÎÀíϵͳµÈ£¬Éæ¼°Ôì×÷ÉÌÈçD-Link¡¢HikvisionµÈ¡£¸Ã¶ñÒâÈí¼þÓµÓÐÄ£¿é»¯¸öÐÔ£¬¿ÉϰȾ·ÖÆçÉ豸£¬²¢±»ÊÓΪ¿ÉÄܶԹؼü»ù´¡ÉèÊ©Ôì³ÉÑϳÁ·ÛËéµÄÃñ×å¹ú¶ÈÍøÂç±øÆ÷¡£¾Ý±¨Â·£¬IOCONTROLÓëÒÁÀʺڿÍ×éÖ¯CyberAv3ngersÓйأ¬¸Ã×éÖ¯Ôø²û·¢³ö¶Ô¹¥»÷¹¤ÒµÏµÍ³µÄÐËÖ¡£¹¥»÷ÕßÐû³ÆÈëÇÖÁËÒÔÉ«ÁкÍÃÀ¹úµÄ200¸ö¼ÓÓÍÕ¾£¬²¢ÔÚ2023ËêĺÖÁ2024ÄêÖÐÆÚ½øÐÐÁËÐµĹ¥»÷»î¶¯¡£IOCONTROL´æ´¢ÔÚ¡°/usr/bin/¡±Ä¿Â¼ÖУ¬Ê¹ÓÃÄ£¿é»¯ÅäÖÃÊÊÓ¦·ÖÆçÉ豸£¬Í¨¹ýMQTTºÍ̸ÓëC2·þÎñÆ÷ͨѶ£¬²¢Ê¹ÓÃAES-256-CBC¼ÓÃÜÅäÖá£Ëü¿ÉÖ´ÐжàÖÖºÅÁÈç»ã±¨ÏµÍ³ÐÅÏ¢¡¢È·È϶ñÒâÈí¼þ×°Öá¢ÔËÐÐËÁÒâºÅÁî¡¢×ÔÎÒɾ³ýºÍ¶Ë¿ÚɨÃèµÈ¡£
https://www.bleepingcomputer.com/news/security/new-iocontrol-malware-used-in-critical-infrastructure-attacks/
5. Byte Federal±ÈÌØ±ÒATMÔËÓªÉÌÔâºÚ¿Í¹¥»÷
12ÔÂ12ÈÕ£¬ÃÀ¹ú±ÈÌØ±ÒATMÔËÓªÉÌByte FederalÔâ·êÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿ÍÀûÓÃÆäϵͳÉϵÄGitLab·ì϶£¬Î´¾ÊÚȨ½Ó¼ûÁËÆä·þÎñÆ÷£¬µ¼ÖÂ58,000Ãû¿Í»§µÄÊý¾Ý±»Ð¹Â¶¡£¸Ã¹«Ë¾ÔÚ·¢ÏÖÊÂÎñºóµ±¼´¹Ø¹ØÁËÆ½Ì¨£¬¸ôÀëÁ˲»Á¼ÐÐΪÕߣ¬²¢±£»¤ÁËÊÜϰȾµÄ·þÎñÆ÷¡£ÊÜÓ°ÏìµÄÃô¸ÐÐÅÏ¢Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢µ±¾ÖÇ©·¢µÄÉí·ÝÖ¤¡¢Éç»á°²È«ºÅÂë¡¢ÂòÂô»î¶¯¡¢Óû§ÕÕÆ¬µÈ¡£Byte Federal¶ÔËùÓпͻ§ÕË»§½øÐÐÁË¡°Ó²³ÁÖá±£¬¸üÐÂÁËÄÚ²¿ÃÜÂëºÍÕË»§ÖÎÀíϵͳ£¬²¢³·ÏúÁËÄÚ²¿ÍøÂç½Ó¼ûµÄÁîÅÆºÍÃÜÔ¿¡£¹ÌÈ»Óû§×ʽðºÍÊý×Ö×ʲúδÊÜË𣬵«Ãô¸ÐÐÅÏ¢µÄй¶¿ÉÄÜʹ¼ÓÃÜÇ®±Ò³ÖÓÐÕßÃæ¶ÔSIM¿¨»¥»»¹¥»÷¡¢ÕË»§ÊÕÊÜ»òÆäËûÍøÂç´¹µö¹¥»÷µÄ·çÏÕ¡£Byte Federal½¨ÒéÊÜÓ°ÏìµÄÈ˶Ôδ¾ÒªÇóµÄͨѶά³Ö¾¯Ì裬²¢¶¨ÆÚ²é³ÕË»§±¨±íºÍÐÅÓþ»ã±¨ÒÔ·À±¸Ú²ÆºÍÉí·Ý͵ÇÔ¡£¸Ã¹«Ë¾ÉèÁ¢ÁËרÃŵÄÔ®ÊÖÈÈÏß¹©ÈËÃǽâ¾öÒÉÂÇ¡£
https://www.bleepingcomputer.com/news/security/bitcoin-atm-firm-byte-federal-hacked-via-gitlab-flaw-58k-users-exposed/
6. ¶íÂÞ˹×éÖ¯Turla°µ²ØÔÚÆäËûºÚ¿Í±³ºó¹¥»÷ÎÚ¿ËÀ¼
12ÔÂ11ÈÕ£¬¶íÂÞË¹ÍøÂç¼äµý×éÖ¯Turla£¨Óֳơ°°ÂÃØ±©Ñ©¡±£©±»ÆØÔÚÀûÓÃÆäËûºÚ¿Í×éÖ¯µÄ»ù´¡ÉèÊ©¹¥»÷ÎÚ¿ËÀ¼Í¨¹ýStarlinkÏνӵľüÊÂÉ豸¡£Î¢ÈíºÍLumen½ÒʾÁËTurlaÈôºÎ½Ù³Ö»òʹÓðͻù˹̹ºÚ¿Í×éÖ¯Storm-0156µÄ¶ñÒâÈí¼þºÍ·þÎñÆ÷£¬ÒÔ¼°ÈôºÎÀûÓÃAmadey½©Ê¬ÍøÂçºÍ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-1837µÄ»ù´¡ÉèÊ©£¬ÔÚÎÚ¿ËÀ¼ÏµÍ³Éϲ¿ÊðÆä×Ô½ç˵¶ñÒâÈí¼þ£¬ÈçTavdigºÍKazuarV2¡£ÕâЩ¹¥»÷ʼÓÚÍøÂç´¹µöµç×ÓÓʼþ£¬ÀûÓöñÒ⸽¼þ¡¢Storm-1837ºóÃÅ»òAmadey½©Ê¬ÍøÂ粿ÊðÓÐÐ§ÔØºÉ¡£Î¢ÈíÖ¸³ö£¬TurlaÀûÓñ»Í¶·ÅµÄÅú´¦ÖÃÎļþÌṩµÄ¿úËÅÐÅÏ¢£¬¼ø±ðÏνӵ½Starlink»¥ÁªÍøÏµÍ³µÄ¾üÊÂÉ豸µÈ¸ßÓÅÏȼ¶Ö¸±ê¡£TurlaµÄ¶¨Ôì¶ñÒâÈí¼þ¼Ò×åTavdigºÍKazuarV2ÔÚÆä¼äµý»î¶¯ÖвûÑï׏ÖÒì×÷Óã¬Ç°ÕßÓÃÓÚ³ÉÁ¢³õʼ°²ÉíµãºÍ¼à¶½£¬ºóÕßÔòרһÓڳ־õý±¨ÍøÂç¡¢ºÅÁîÖ´ÐкÍÊý¾Ýй¶¡£Î¢Èí½¨Òé·ÀÓùÕ߲鳯äÌá³öµÄ»º½â´ëÊ©ºÍËÑË÷²éÎÊ£¬ÒÔÓ¦¶ÔTurlaµÄ»î¶¯¡£
https://www.bleepingcomputer.com/news/security/russian-cyber-spies-hide-behind-other-hackers-to-target-ukraine/


¾©¹«Íø°²±¸11010802024551ºÅ