Aisuru½©Ê¬ÍøÂç·¢ÆðÁË29.7 Tbps DDoS¹¥»÷
°ä²¼¹¦·ò 2025-12-051. Aisuru½©Ê¬ÍøÂç·¢ÆðÁË29.7 Tbps DDoS¹¥»÷
12ÔÂ3ÈÕ£¬2025ÄêµÚÈý¼¾¶È£¬¹æÄ£ÖØ´óµÄAisuru½©Ê¬ÍøÂçÔÚÈý¸öÔÂÄÚÌáÒé1304´ÎÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷£¬ÆäÖÐÒ»´Î´´¼Í¼µØ´ïµ½29.7Tbps·åÖµÁ÷Á¿£¬³ÖÐø69Ã룬ͨ¹ýUDPµØÌºÊ½ºäÕ¨Ïò¾ùÔÈÿÃë1.5Íò¸öÖ¸±ê¶Ë¿ÚÇãк¡°À¬»ø¡±Á÷Á¿¡£¸Ã½©Ê¬ÍøÂçÓÉCloudflare¹ÀËãµÄ100ÍòÖÁ400Íǫ̀ÊÜϰȾÉ豸×é³É£¬Ô̺¬Â·ÓÉÆ÷ºÍÎïÁªÍøÉ豸£¬·¸×ï·Ö×Ó¿Éͨ¹ý¶ÈÏúÉÌ×âÓÃÆä×é¼þÌáÒé¹¥»÷¡£CloudflareÊý¾ÝÏÔʾ£¬½ñÄêÒÑ»º½â2867´ÎAisuru¹¥»÷£¬½ü45%Ϊ³¬´óÁ÷Á¿¹¥»÷£¨³¬¹ý1Tbps»ò10ÒÚ°ü/Ã룩¡£´Ëǰ×î¸ß22.2Tbps¹¥»÷¼°Î¢ÈíÅû¶µÄ15Tbps Azure¹¥»÷¾ù±»¹éÒòÓÚ´ËÍøÂç¡£±¾´Î29.7Tbps¹¥»÷Ëäδ¹«¿ªÖ¸±ê£¬µ«Æä·ÛËéÁ¦ÒÑÔ¶³¬Í¨Àý£¬CloudflareÖҸ棬´ËÀ๥»÷¿É¼ä½Ó̱»¾Î´Êܹ¥»÷µÄ»¥ÁªÍø·þÎñÌṩÉÌ£¬ÈôÖ±½ÓÕë¶Ô¹Ø¼ü»ù´¡ÉèÊ©¡¢Ò½ÁƼ±¾È»ò¾üÊÂϵͳ£¬ºó¹û²»Ê¤ÉèÏë¡£
https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/
2. ShopifyÈ«Çòå´»ú£¬É̼ÒÓû§µÇ¼ÂòÂôÅö±Ú
12ÔÂ2ÈÕ£¬2025ÄêÍøÂçÐÇÆÚÒ»¹ºÎï¶¥·åÆÚ¼ä£¬È«ÇòµçÉ̾ÞÍ·ShopifyÍ»·¢´ó¹æÄ£å´»úÊÂÎñ£¬µ¼ÖÂÊýǧÍòÔÚÏß¹ºÎïÕß¼°É̼ÒÃæ¶ÔµÇ¼Òì³£¡¢ÍøÕ¾µ¼º½Åö±Ú¼°ÂòÂôϵͳ¹ÊÕÏ¡£¾Ý»¥ÁªÍø¼à¿ØÆ½Ì¨DowndetectorÊý¾Ý£¬ÃÀ¹ú¶«²¿¹¦·òÉÏÎç9µãÆð£¬Óû§Í¶ËßÁ¿¼¤Ôö£¬11µã´ï·åÖµ4000ÓàÆð£»Ó¢¹úͬÆÚÒà»ã±¨2800ÓàÆð¹ÊÕÏ£¬È«Çò³¬56%Óû§Ôâ·êµÇ¼ÎÊÌ⣬25%·´Ó³ÍøÕ¾½Ó¼ûÒì³££¬19%´æÔÚ·þÎñÆ÷ÏνÓʧ°Ü¡£ShopifyÔÚÉÏÎç10µãͨ¹ý¹Ù·½Çþ·ÈϿɡ°²¿ÃŵêÆÌÖÎÀíԱȨÏÞ¹ÊÕÏ¡±£¬²¢½¨ÒéÓû§¡°Î¬³ÖÉ豸µÇ¼״̬¡±¡£È»¶ø£¬´óÁ¿É̼ҷ´À¡³Æ¡°ËùÓÐÃŵê¾ùÎÞ·¨µÇ¼¡±£¬ÇÒPOSϵͳÒàÊܲ¨¼°£¬Ó°ÏìÂòÂô´¦Öá¢¿â´æÖÎÀí¼°¿Í»§Êý¾Ýͬ²½¡£¹«Ë¾ºóÐø±ÉÈËÎç2:31¸üÐÂÉêÃ÷£¬È·ÈϹÊÕÏÔ´ÓÚ¡°µÇ¼Éí·ÝÑéÖ¤Á÷³Ìȱµã¡±£¬²¢°ä·¢ÎÊÌâÒѽ¨¸´£¬ÏµÍ³ÕýÖ𲽸´Ô¡£Õâ´Îå´»úÊÂÎñ²¨¼°ÁìÓò¿í·º£¬´ÓÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢Òâ´óÀûµ½Ä«Î÷¸çµÈÈ«Çò¶àµØÓû§¾ù»ã±¨ÊÜÓ°Ïì¡£
https://cybernews.com/news/shopify-down-for-thousands-during-cyber-monday-mania/
3. Predator¼äµýÈí¼þÀûÓÃÐÂÐÍϰȾõè¾¶½øÐÐÁãµã»÷¹¥»÷
12ÔÂ4ÈÕ£¬½üÈÕ£¬ÓÉInside Story¡¢HaaretzºÍWAV Research Collective½áºÏµ÷²é¸æ·¢£¬Predator¼äµýÈí¼þͨ¹ýÃûΪ¡°°¢À¶¡¡±µÄÁãµã»÷ϰȾ»úÔ죬½öÐè²é¿´¶ñÒâ¸æ°×¼´¿ÉÈëÇÖÌØ¶¨Ö¸±ê¡£¸Ã»úÔì±»°µ²ØÔÚ¶à¹ú¿Õ¿Ç¹«Ë¾±³ºó£¬»ùÓÚ¡°IntellexaйÃÜÊÂÎñ¡±µÄÄÚ²¿Îļþ¼°ÓªÏú×ÊÁÏ£¬²¢¾¹ú¼ÊÌØÉâ×éÖ¯¡¢¹È¸èºÍRecorded FutureµÄ¼¼Êõ×êÑÐ֤ʵ¡£AladdinÓÚ2024Äê³õ´Î²¿Êð£¬ÀûÓÃóÒ×ÒÆ¶¯¸æ°×ϵͳ´«²¼¶ñÒâÈí¼þ£¬Í¨¹ýÐèÒª·½Æ½Ì¨£¨DSP£©Ç¿Ô콫±øÆ÷»¯¸æ°×Ͷ·Åµ½Í¨¹ý¹«¹²IPµØÖ·µÈ±êʶ·ûʶ´ËÍâÌØ¶¨Ö¸±ê£¬¸æ°×¿É³Ê´Ë¿ÌÈκÎÏÔʾ¸æ°×µÄÍøÕ¾»òÀûÓÃÖУ¬±í¹ÛÓëͨ³£¸æ°×ÎÞÒì¡£½öä¯ÀÀ¸æ°×¼´¿É´¥·¢Ï°È¾£¬ÎÞÐèµã»÷£¬¸æ°×»á³Á¶¨ÏòÖÁIntellexaµÄ·ì϶ÀûÓ÷þÎñÆ÷¡£¸Ã¸æ°×ÍøÂçÉæ¼°°®¶ûÀ¼¡¢µÂ¹ú¡¢ÈðÊ¿¡¢Ï£À°¡¢ÈûÆÖ·˹¡¢°¢ÁªÇõºÍÐÙÑÀÀûµÈ¶à¹ú¸æ°×¹«Ë¾¡£·ÀÓù´ëÊ©Ô̺¬ÆÁ±Îä¯ÀÀÆ÷¸æ°×¡¢°µ²Ø¹«¹²IPµØÖ·£¬µ«Ð¹Â¶ÎļþÏÔʾIntellexaÈÔ¿É´Ó¿Í»§µØµã¹úµÄÒÆ¶¯ÔËÓªÉÌ»ñÊØÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/
4. ÷è÷ëÀÕË÷Èí¼þÐû³Æ¹¥»÷ɽ´ï»ù½Ì»á£¬Ð¹Â¶ÄÚ²¿Ãô¸ÐÊý¾Ý
12ÔÂ4ÈÕ£¬÷è÷ëÀÕË÷Èí¼þ½«É½´ï»ù½Ì»áÁÐÈëÆä°µÍøÐ¹Â¼ûûµ¥£¬Ðû³Æ¶ÔÊý¾Ýй¶ÊÂÎñÕÆ¹Ü£¬²¢°ä²¼22ÕŽØÍ¼×÷ΪÈëÇÖÖ¤¾Ý¡£½ØÍ¼ÏÔʾ£¬¹¥»÷Éæ¼°Ó¢¹úʥɽ¸ß¼¶×éÖ¯£¨AOSH UK£©µÄÄÚ²¿È¨ÏÞ£¬Ô̺¬×ڽ̹¤×÷ÈËԱǩ֤´¦Öüͼ¡¢ÒÆÃñÓöȲ¦¿îÃ÷ϸ£¨ÈçÿÈË2600ÖÁ4500Ó¢°÷µÄǩ֤Óöȣ©¡¢ÔËÓªÖ§³ö¼°»î¶¯ºóÇÚÊý¾Ý¡£ÀýÈ磬һ·ÝÔ¤ËãÎļþÏÔʾ£¬Ä³²¦¿îÖÜÆÚÄÚ³¬11500Ó¢°÷ÓÃÓÚǩ֤ÉêÇ룬ÁíÒ»ÎļþÔòÁгö3ÍòÓ¢°÷ÓÃÓÚÓʼþÐû´«¼°½ÚÈպؿ¨·Ö·¢£¬»¹ÓÐ6351Ó¢°÷ÓÃÓÚ¹ú¼ÊÓÊ×Ê¡¢6000Ó¢°÷ÓÃÓÚÊÓÌýÉ豸²É¹º¡£Ð¹Â¶Êý¾Ý»¹Éæ¼°°²±£¹æ»®£¬Ô̺¬2024-2025Äê×ܶî½ü10ÍòÓ¢°÷µÄ°²±£Ô¤Ë㣬º¸ÇËѱ¬È®·þÎñ¡¢ÒªÔ±±£»¤¡¢Î§À¸½¨ÉèµÈ£¬¾ßÌåÈç74,326Ó¢°÷ÓÃÓÚÒªÔ±±£»¤ÍŶӣ¬29,217Ó¢°÷ÓÃÓÚ±¾µØÖܱ߰²±£¡£´Ë±í£¬²ÆÕþ·¢Æ±¡¢ÒøÐÐÕË»§ÐÅÏ¢¼°»áÔ±Ó×ÎÒÊý¾Ý£¨ÈçÈ«Ãû¡¢µç»°¡¢¹Û¹â¼Í¼£©Ò²±»ÆØ¹â£¬ÀýÈç¡°À¶¡ÒáÈËÊ¿¶Ï¸ùÀÖ¶Ó2025Äê11Ô¡±±í¸ñÔ̺¬°¢¸ùÍ¢¡¢°ÍÎ÷µÈ¶à¹úÈËÔ±µÄ¾ßÌåÐÅÏ¢¡£
https://hackread.com/qilin-ransomware-church-of-scientology-data-theft/
5. Array AG VPNÉ豸ºÅÁî×¢Èë·ì϶ÔâºÚ¿ÍÀûÓÃ
12ÔÂ4ÈÕ£¬½üÈÕ£¬ÍþвÐÐΪÕßÕýÀûÓÃArray AGϵÁÐVPNÉ豸ÖеĺÅÁî×¢Èë·ì϶ֲÈëwebshell²¢´´½¨¶ñÒâÓû§¡£Array NetworksÓÚ½ñÄê5ÔÂͨ¹ý°²È«¸üн¨¸´Á˸÷ì϶£¬µ«Î´·ÖÅäCVE±êʶ·û£¬µ¼Ö·ì϶¸ú×ÙÓë²¹¶¡ÖÎÀí¸´ÔÓ»¯¡£ÈÕ±¾ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××飨JPCERT£©°ä²¼²¼¸æÖҸ棬ºÚ¿Í×Ô8ÔÂÆðÒÑÀûÓø÷ì϶¹¥»÷ÈÕ±¾¾³ÄÚ×éÖ¯£¬¹¥»÷ÕßÊÔͼÔÚõè¾¶/ca/aproxy/webapp/¸éÖÃPHP webshellÎļþ¡£¸Ã·ì϶ӰÏìArrayOS AG 9.4.5.8¼°¸üÔç°æ±¾£¬ÓÈÆäÊÇÆôÓÃÁË¡°DesktopDirect¡±Ô¶³Ì½Ó¼ûÖ°ÄܵÄAGϵÁÐÓ²¼þºÍÐé¹¹É豸¡£Array Networks AGϵÁÐ×÷Ϊ°²È«½Ó¼ûÍø¹Ø£¬ÒÀÀµSSL VPN´´½¨¼ÓÃÜËí·£¬¿í·ºÓÃÓÚÆóÒµÔ¶³Ì½Ó¼ûÍøÂç¡¢ÀûÓá¢×ÀÃæ¼°ÔÆ×ÊÔ´£¬Í¨³£±»´óÐÍ×éÖ¯ÓÃÓÚÖ§³ÖÔ¶³Ì»òÒÆ¶¯°ì¹«¡£JPCERTÖ¸³ö£¬Array OS 9.4.5.9Òѽ¨¸´¸ÃÎÊÌâ¡£ÈôÎÞ·¨Éý¼¶£¬½¨Òé½ûÓÃËùÓÐδʹÓõÄDesktopDirect·þÎñ£¬»òͨ¹ýURL¹ýÂË×èÖ¹Ô̺¬·ÖºÅµÄURL½Ó¼û¡£¾Ý°²È«×êÑÐÔ±Yutaka SejiyamaɨÃ裬ȫÇò¹²ÓÐ1831¸öArrayAGÊ·ý£¬ÖØÒªÉ¢²¼ÔÚÖйú¡¢ÈÕ±¾ºÍÃÀ¹ú£¬ÆäÖÐÖÁÉÙ11̨Ö÷»úÆôÓÃÁËDesktopDirectÖ°ÄÜ£¬µ«ÏÖʵÊýÁ¿¿ÉÄܸü¸ß¡£
https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/
6. Companjon±£ÏտƼ¼¹«Ë¾Â¶³öÊýǧÍò¹Û¹âÐÅÏ¢¼°PII
12ÔÂ3ÈÕ£¬½üÈÕ£¬±£ÏտƼ¼¹«Ë¾CompanjonÒòδÊܱ£»¤µÄApache KafkaÁ÷й¶Êý°ÙÍòÌõÈÕÖ¾£¬Éæ¼°¹Û¹âÐг̡¢È«Ãû¡¢µç×ÓÓʼþµÈÃô¸ÐÓ×ÎÒÐÅÏ¢¡£CybernewsÍŶÓÓÚ2025Äê8ÔÂÏÂÑ®·¢Ïָ÷ì϶£¬ÔÚÆßÌìÄڼͼ³¬1500ÍòÌõÊý¾Ý£¬¹ÀËã×Üй¶Á¿¿ÉÄÜ´ï9.6ÒÚÌõ£¬ÆäÖÐÔ¼0.1%£¨Ô¼96ÍòÌõ£©Ô̺¬Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£Ð¹Â¶´°¿ÚÆÚΪ8ÔÂ20ÈÕÖÁ28ÈÕ£¬Éæ¼°Trainline¡¢Omio¡¢TripXµÈ¹Û¹âƽ̨µÄAPI½»»¥Êý¾Ý£¬Ô̺¬½«À´ÖÁ2026ÄêµÄ¹Û¹â·Ïß¡¢º½¿Õ¹«Ë¾¡¢ÈÕÆÚ¼°²ÆÕþÐÅÏ¢¡£Companjon×÷ΪB2B2C·þÎñÉÌ£¬Îª¹Û¹âÉçµÈÆóÒµÌṩ±£ÏÕ·þÎñ£¬Í¨¹ýÍøÂçÖÕ¶ËÓû§Êý¾ÝÖ§³ÖºÏ×÷·½Íƹ㡣Õâ´Îй¶µÄÈÕÖ¾ÖУ¬²¿ÃżÍ¼Ô̺¬ÊÚȨÁîÅÆ£¬¹¥»÷ÕßÀíÂÛÉÏ¿ÉÀûÓÃÕâЩÐÅÏ¢ÌáÒé½øÒ»²½¹¥»÷£¬ÈçÚ¿Æ»òϵͳÈëÇÖ¡£×êÑÐÈËÔ±Ö¸³ö£¬½áºÏÂÃÐÓ×¢²ÆÕþ¼°µØÎ»Êý¾Ý£¬¿Í»§Ãæ¶Ô¸ß¶ÈÕë¶ÔÐÔÚ¿Æ·çÏÕ£¬ÀýÈç¼ÙÒâ¾ÆµêÔ±¹¤ÍþвȡµÞÔ¤Ô¼ÒÔÆÈ¡¸¶¿î¡£
https://cybernews.com/security/companjon-kafka-leak-travel-data/


¾©¹«Íø°²±¸11010802024551ºÅ