»¥ÁªÍøµµ°¸¹Ý£¨Archive.org£©Òò¶Ïµçµ¼Ö·þÎñÈ«ÃæÖжÏ
°ä²¼¹¦·ò 2025-03-271. »¥ÁªÍøµµ°¸¹Ý£¨Archive.org£©Òò¶Ïµçµ¼Ö·þÎñÈ«ÃæÖжÏ
3ÔÂ26ÈÕ£¬»¥ÁªÍøµµ°¸¹Ý£¨Internet Archive£©×÷Ϊ³ÐÔØWayback MachineµÄÊý×Öº¹Ç౦¿â£¬½üÈÕÒòÍ»·¢¶Ïµçµ¼Ö·þÎñÈ«ÃæÖжϣ¬Òý·¢È«ÇòÓû§¹Ø×¢¡£¸Ã»ú¹¹Í¨¹ýÉ罻ýÌå֤ʵ£¬¹¤³ÌʦÍŶÓÔÚ´¹Î£ÇÀ½¨µçÁ¦¹ÊÕÏÒÔ¸´Ô½Ó¼û£¬µ«Õâ´ÎÊÂÎñµÄ¹¦·ò½ÚµãÇ¡·êÆä°²È«Î£»úÁé¸ÐÆÚ£¬Òý°ä·¢½ç¶ÔÊÂÎñ¹ØÁªÐÔµÄÒܲ⡣×÷Ϊ±£Áô»¥ÁªÍøÓ°ÏóµÄÖ÷Ìâ»ù´¡ÉèÊ©£¬»¥ÁªÍøµµ°¸¹Ý²»½ö´æ´¢×ź£Á¿º¹ÇàÍøÒ³¡¢Êé¼®¡¢ÒôÊÓÆµ×ÊÁÏ£¬¸ü³Ðµ£×ÅÊý×ÖÎÄ»¯ÒŲú±£»¤µÄ³ÁҪʹÃü¡£Õâ´Îå´»úÊÂÎñÖ±½ÓÓ°Ïì×êÑÐÈËÔ±¡¢º¹ÇàѧÕß¼°ÒÀÀµÆäÊý¾Ý½øÐÐÎÄ»¯×êÑеÄÈ«ÇòÓû§ÈºÌå¡£¹Ù·½°ä²¼µÄ"ÁÙʱÀëÏß"ÉêÃ÷Ë佫ÔÒòÃ÷È·¹éÒòÓÚµçÁ¦¹©¸øÎÊÌ⣬µ«²úÉúÔڸûú¹¹¸Õ¾Àú´ó¹æÄ£DDoS¹¥»÷£¨2024Äê10Ô£©¼°3100ÍòÓû§ÕË»§Êý¾Ýй¶ÊÂÎñÖ®ºó£¬ÈÔδÃâÒý·¢¶Ô»ù´¡ÉèÊ©°²È«ÈÍÐÔµÄÉî¶È»áÉÌ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Õâ´ÎµçÁ¦¹ÊÕÏÓëǰÆÚÍøÂç¹¥»÷ÊÇ·ñ×é³ÉÒò¹ûÁ´ÉÐδµÃµ½¹Ù·½Ö¤Êµ¡£Ä¿Ç°£¬Ô̺¬Wayback MachineÔÚÄÚµÄÖ÷Ìâ·þÎñÒѸ´ÔÔËÐУ¬µ«Õâ´ÎÊÂÎñÔÙ´ÎÇÃÏìÊý×Ö´æµµ»ú¹¹°²È«·À»¤µÄ¾¯ÖÓ¡£
https://hackread.com/internet-archive-archive-org-down-power-outage/
2. StreamElementsÒòº¹ÇàºÏ×÷·½·ì϶ÖÂÓû§Êý¾Ýй¶
3ÔÂ26ÈÕ£¬ÔÆÁ÷ýÌå·þÎñƽ̨StreamElementsÈ·ÈÏÔâ·êÊý¾Ýй¶ÊÂÎñ£¬Ð¹Â¶Ô´Í·ÎªÒÑÖÕÖ¹ºÏ×÷µÄµÚÈý·½·þÎñÌṩÉÌ¡£¹«Ë¾´¹Î£ÉêÃ÷Ç¿µ÷×ÔÉí·þÎñÆ÷δ±»ÈëÇÖ£¬µ«ÈÏ¿É2020-2024Äê¼äͨ¹ý¾ÉºÏ×÷ͬ°é´æ´¢µÄÓû§Êý¾ÝÔ⵽й¶£¬ÊÜÓ°ÏìÐÅÏ¢Ô̺¬Óû§È«Ãû¡¢µØÖ·¡¢µç»°¼°µç×ÓÓÊÏäµÈÃô¸Ð×ÊÁÏ¡£ºÚ¿Í×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þϰȾԱ¹¤É豸£¬½ø¶øÊÕÊÜÄÚ²¿ÕË»§²¢½Ó¼û¶©µ¥ÖÎÀíϵͳִÐÐÊý¾ÝÇÔÈ¡¡£Ö»¹Ü¾ßÌåй¶¹æÄ£ÉÐδ¾¹Ù·½È·ÈÏ£¬µ«Æ½Ì¨ÒÑÏòÓû§·¢³öÍøÂç´¹µö¹¥»÷Ô¤¾¯£¬³ö¸ñÖ¸³ö·¸·¨·Ö×Ó¿ÉÄÜÀûÓÃÕâ´ÎÊÂÎñαÔì"Êý¾Ýй¶֪ͨ"ÓʼþÖ´ÐÐÚ¿Æ¡£Õâ´ÎÊÂÎñÒý¿¯ÐÐÒµ¶Ô¹©¸øÁ´°²È«µÄ¸ß¶È¹Ø×¢¡£¹«Ë¾°µÊ¾ÔÚ½áºÏµÚÈý·½·¢Õ¹µ÷²é£¬µ«ÉÐδÆô¶¯ÕýʽµÄÓû§Í¨ÖªÁ÷³Ì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ºÚ¿ÍÔÚBreachForums°ä²¼µÄй¶ÉêÃ÷Òѱ»É¾³ý£¬ÊÂÎñºóÐø·¢Õ¹ÈÔÐè³ÖÐø×·×Ù¡£°²È«×¨¼Ò½¨ÒéÓйØÊ±¶Î×¢²áÓû§µ±¼´ÌáÉýÕË»§°²È«µÈ¼¶£¬ÆôÓöà³É·ÖÈÏÖ¤²¢¼à¿ØÒì³£µÇ¼ÐÐΪ¡£
https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/
3. ÍøÂç·¸×ïÆ½Ì¨Atlantis AIO×Ô¶¯»¯¹¥»÷Íþв140¶à¸öÔÚÏß·þÎñ
3ÔÂ26ÈÕ£¬ÐÂÐÍÍøÂç·¸×ïÆ½Ì¨"Atlantis AIO"µÄ¸¡ÏÖ½ÒÊ¾ÍøÂçºÚ²úÕý¼Ó¿ìÏò·þÎñ»¯×ªÐÍ¡£¸Ã·¸×ï¼´·þÎñ(CSaaS)¹¤¾ßÕë¶ÔÈ«Çò140Óà¸ö¸ß¼ÛÖµÔÚÏß·þÎñÌṩ×Ô¶¯»¯¹¥»÷½â¾ö¹æ»®£¬º¸Çµç×ÓÓʼþ¡¢µçÉÌ¡¢½ðÈÚ¼°VPNµÈÃô¸ÐÁìÓò¡£ÆäÖ÷ÌâÖ°ÄÜÔ̺¬Èý´ó¹¥»÷Ä£¿é£ºÍ¨¹ý±©Á¦ÆÆ½âºÍÕË»§¸´ÔÁ÷³Ì×Ô¶¯»¯Ö´ÐÐÆ¾Ö¤Ìî³ä¹¥»÷£¬½áºÏCAPTCHAÈÆ¹ý¼¼ÊõÌáÉý¹¥»÷ЧÄÜ£¬×îÖÕ½«±»µÁÕË»§ÅúÁ¿×ªÊÛÓÚµØÏÂÊг¡Ä²Àû¡£Æ¾Ö¤Ìî³ä¹¥»÷×÷Ϊ×îÆÕ±éµÄÍøÂç·¸×_Á©£¬³Ö¾ÃÀ§ÈÅOkta¡¢PayPalµÈ´óÐÍÆóÒµ¡£Atlantis AIO½«´ËÀ๥»÷±øÆ÷»¯£¬Ìṩģ¿é»¯¶¨Ôì·þÎñ£¬Ê¹µÍ¼¼ÊõÃż÷·¸×ïÕßÒà¿ÉÖ´Ðо«×¼½ø¹¥¡£Æä¹¥»÷Á´ÏÔʾ£¬¹¥»÷ÕßÊ×ÏÈÀûÓÃй¶Êý¾Ý¿âÖÐµÄÆ¾Ö¤Ö´ÐÐÅúÁ¿µÇ¼³¢ÊÔ£¬½áºÏÈõÃÜÂë×ֵ䱩Á¦ÆÆ½â£¬¼Ì¶øÀÄÓÃÕË»§¸´Ô»úÔìÊÕÊÜδÆôÓöà³É·ÖÈÏÖ¤µÄÕË»§¡£µÃÊֺ󣬱»µÁÕË»§ÒÔÿ¸ö0.5ÃÀÔªÆð¼ÛÔÚ°µÍø×ªÊÛ£¬ÐÎ³ÉÆëÈ«µÄÐþÉ«²úÒµÁ´¡£°²È«×¨¼Ò½¨ÒéΪÓ×ÎÒÕË»§ÉèÖÃÇ¿ÃÜÂë+¶à³É·ÖÈÏ֤˫³Á±£ÏÕ£¬ÊµÊ±ÏìÓ¦Òì³£µÇ¼Ԥ¾¯£»ÆóÒµÔòÐ貿Êð¿ìÂÊÏÞ¶È¡¢ÐÐΪ·ÖÎöµÈ¼¼Êõ¼¿Á©£¬Éý¼¶CAPTCHA·À»¤ÏµÍ³£¬¹¹½¨×Ô¶¯·ÀÓù»úÔì¡£
https://www.bleepingcomputer.com/news/security/new-atlantis-aio-automates-credential-stuffing-on-140-services/
4. ArkanaÀÕË÷×éÖ¯ÈëÇÖÃÀ¹úµçÐÅÌṩÉÌWideOpenWest
3ÔÂ26ÈÕ£¬ÐÂÐÍÀÕË÷Èí¼þ×éÖ¯"Arkana Security"ÌáÒé¸ß·çÏÕÐÔÍøÂç¹¥»÷£¬Ö¸±êÖ±Ö¸ÃÀ¹úµÚÁù´óµçÐÅÔËÓªÉÌWideOpenWest£¨WOW!£©¡£¹¥»÷ÕßÐû³ÆÒÑÉøÈëÆóÒµÖ÷Ìâϵͳ£¬²»½öÇÔÈ¡Ô̺¬403,000¼°220ÍòÌõÓû§ÕË»§µÄÃô¸ÐÊý¾Ý¿â£¬¸üʵÏֶԹؼüÔËӪϵͳ£¨AppianCloudÓëSymphonica£©µÄÆëÈ«½ÚÔì¡£±»µÁÊý¾Ýº¸ÇÓû§Æ¾Ö¤¡¢°²È«ÐÅÏ¢¡¢È¨ÏÞÅäÖõÈÖ÷Ìâ×ʲú£¬ÆäչʾµÄ¹¥»÷ÄÜÁ¦ÏÔʾ¿ÉÖ´ÐжñÒâÈí¼þ²¿Êð¡¢½ðÈÚÂòÂô´Û¸ÄµÈÉî¶È·ÛËé¡£¸Ã×é֯ѡȡ˫³ÁÀÕË÷Õ½Êõ£ºÒ»·½ÃæÔÚTor°µÍø¹«¿ª²¿ÃÅÊý¾ÝÑù±¾Ê©Ñ¹£¬ÍþвÈô²»Âú×ãÊê½ðÒªÇó½«È«Á¿ÏúÊÛÊý¾Ý£»ÁíÒ»·½ÃæÖ´ÐÐ"ÈËÈâËÑË÷"£¬Ð¹Â¶ÆóÒµ¸ß¹ÜÓ×ÎÒÐÅÏ¢½øÐÐÐßÈè¹¥»÷¡£°²È«·ÖÎöÖ¸³ö£¬´ËÀ๥»÷¶ÔµçÕÛ·þÎñÉ̵ķÛËéÓµÓÐÁ¬ËøÐ§Ó¦¡ª¡ª¿Í»§ÐÅÀµ±ÀËú½«Ö±½Ó³å»÷·þÎñÐø¶©ÂÊ£¬¶øË¾·¨ºÏ¹æ³É±¾¿ÉÄÜÍ»ÆÆÇ§ÍòÃÀÔªÁ¿¼¶¡£
https://www.securityweek.com/new-ransomware-group-claims-attack-on-us-telecom-firm-wideopenwest/
5. Sydney ToolsÊý¾Ý¿âй¶¿Í»§¶©µ¥ÓëÔ±¹¤Ãô¸ÐÐÅÏ¢
3ÔÂ25ÈÕ£¬°Ä´óÀûÑÇרҵ¹¤¾ßÁãÊÛÉÌSydney ToolsÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬Â¶³öµÄδ¼ÓÃÜÊý¾Ý¿â³ÖÐøÐ¹Â¶Ô±¹¤¼°¿Í»§Ãô¸ÐÐÅÏ¢¡£Ð¹Â¶Êý¾ÝÔ̺¬5000ÓàÃûÏÖÖ°¼°È¥ÈËÔ±¹¤µÄÐÕÃû¡¢²¿ÃÅ¡¢Ð½×ʼ°ÏúÊÛÖ¸±êµÈÖ÷ÌâÈËÁ¦×ÊÔ´ÐÅÏ¢£¬Í¬Ê±Éæ¼°³¬3400ÍòÌõ¿Í»§ÔÚÏß¶©µ¥¼Í¼£¬º¸ÇÐÕÃû¡¢×¡Ö·¡¢µç»°¡¢ÓÊÏä¼°²É°ìÃ÷ϸµÈÓ×ÎÒÒþÖÔ¡£°²È«×êÑÐÈËÔ±ÖҸ棬Õâ´Îй¶ÐγÉË«³Á¹¥»÷Ãæ£ºÔ±¹¤Êý¾Ý¿É±»ÓÃÓڲ߶¯¸ß¹ÜÓã²æÊ½´¹µö¹¥»÷£¬¶ø¿Í»§²É°ì¼Í¼Öеĸ߼ÛÉÌÆ·ÐÅÏ¢ÔòÎªÍøÂç·¸×ï·Ö×ÓÌṩÁ˾«×¼Ú¿ÆÖ¸±ê¡£¹¥»÷Õß¿Éͨ¹ýαÔì¶©µ¥È·ÈÏÓʼþ»òÎïÁ÷֪ͨ£¬ÓÕµ¼Êܺ¦Õß½øÒ»²½Ð¹Â¼ûô¸ÐÊý¾Ý¡£¸üÑϸñµÄÊÇ£¬Ö»¹ÜÒÑ·¢ÏÖ·ì϶£¬Â¶³öÊý¾Ý¿âÈÔδ¹Ø¹Ø£¬Êý¾Ý³ÖÐø±íй״̬¼Ó¾çÁË·çÏÕ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬ÆóÒµ¹Ù·½´«µÝµÄǧÃûÔ±¹¤¹æÄ£Óëй¶Êý¾ÝÖеÄ5000È˼ͼ´æÔÚÏÔÖøÃ¬¶Ü£¬°µÊ¾È¥ÈËÔ±¹¤ÐÅÏ¢ÒàÔâ¶³ö¡£´ËÀàÔ̺¬Ð½×ÊˮƽµÄÃô¸ÐÊý¾Ý£¬½áºÏ¼ÒͥסַµÈµØÀíÐÅÏ¢£¬½«¼«´óÌáÉýÉí·Ý͵ÇÔ·¸×ïµÄ³É¹¦ÂÊ¡£×¨¼Ò½¨ÒéÊÜÓ°ÏìÓû§µ±¼´²é³ÕË»§Òì³££¬ÆôÓöà³É·ÖÈÏÖ¤£¬²¢¼à¿ØÓ×ÎÒÕ÷ÐŻ㱨±ä¶¯¡£ÆóÒµÔòÐèÈ«ÃæÉó²éÊý¾ÝȨÏÞÖÎÀí£¬Ö´ÐÐÊý¾Ý¿â¼ÓÃܺͽӼûÉ󼯣¬³ÉÁ¢×Ô¶¯»¯·ì϶ɨÃè»úÔì¡£
https://cybernews.com/security/sydney-tools-exposed-data-leak/
6. Chrome½¨¸´¸ßΣÁãÈÕ·ì϶£¬×è¶ÏÕë¶Ô¶í»ú¹¹¼äµý¹¥»÷Á´
3ÔÂ26ÈÕ£¬¹È¸è´¹Î£½¨¸´Á˱àºÅΪCVE-2025-2783µÄ¸ßΣChromeÁãÈÕ·ì϶£¬¸Ã·ì϶ÔÊÐí¹¥»÷ÕßÈÆ¹ýä¯ÀÀÆ÷ɳºÐ·À»¤£¬ÔÚÖ¸±êϵͳִÐжñÒâ´úÂë¡£¸Ã·ì϶ÓÉ¿¨°Í˹»ù°²È«ÍŶӷ¢ÏÖ£¬ÆäÐÔÖÊΪWindowsϵͳMojo×é¼þÔÚ´¦ÖÃδÃ÷È·½ç˵µÄ²Ù×÷ʱ²úÉúΣÏÕ¾ä±ú£¬¿É±»ÀûÓÃʵÏÖɳºÐÌÓÒÝ¡£¹È¸èÒÑΪ×ÀÃæ²»±ä°æÓû§ÍÆËÍ134.0.6998.178¸üУ¬Óû§Òà¿É¿ªÆô×Ô¶¯¸üÐÂÖ°ÄÜ»ñÈ¡½¨¸´¡£°²È«·ÖÎöÏÔʾ£¬¸Ã·ì϶Õý±»ÓÃÓÚÕë¶Ô¶íÂÞ˹ýÌå¡¢½ÌÓý»ú¹¹µÄÍøÂç¼äµý»î¶¯£¬¹¥»÷Õßͨ¹ýαÔì"ÆÕÀïÂí¿Æ·òÔĶÁ"¿ÆÑ§ÂÛ̳ԼÇ뺯ִÐд¹µö¹¥»÷£¬½«Êܺ¦Õß³Á¶¨ÏòÖÁ¶ñÒâÓòÃûprimakovreadings[.]info¡£¿¨°Í˹»ùÖ¸³ö£¬¹¥»÷ÕßÀûÓô˷ì϶Á´²¿Êð¸´ÔÓ¶ñÒâÈí¼þ£¬ÆäÖ÷ÕÅÒÉÊÇÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ÖµÍ×ÌùÐĵÄÊÇ£¬¹¥»÷Õß»¹½áºÏÁ˵ڶþ¸öδ¹«¿ª·ì϶ʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÐγÉË«³Á¹¥»÷Á´Â·¡£¹È¸èËäÈ·ÈÏ·ì϶´æÔÚÇÒÒѱ»ÀûÓ㬵«Î´Åû¶¾ßÌå¹¥»÷ϸ½Ú£¬½ö°µÊ¾ÔÚÎÞÊýÓû§ÊµÏÖ¸üÐÂǰ½«ÏÞ¶È·ì϶ÐÅÏ¢À©É¢¡£°²È«×¨¼ÒÇ¿µ÷£¬ÊµÊ±×°ÖÃChrome¸üпÉ×è¶Ïµ±Ç°ÒÑÖªµÄ¹¥»÷Á´£¬ÓÐЧ·ÀÓùDZÔÚÍþв¡£
https://www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/


¾©¹«Íø°²±¸11010802024551ºÅ