Aisuru½©Ê¬ÍøÂç·¢ÆðÁË29.7 Tbps DDoS¹¥»÷

°ä²¼¹¦·ò 2025-12-05

1. Aisuru½©Ê¬ÍøÂç·¢ÆðÁË29.7 Tbps DDoS¹¥»÷


12ÔÂ3ÈÕ £¬2025ÄêµÚÈý¼¾¶È £¬¹æÄ£ÖØ´óµÄAisuru½©Ê¬ÍøÂçÔÚÈý¸öÔÂÄÚÌáÒé1304´ÎÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷ £¬ÆäÖÐÒ»´Î´´¼Í¼µØ´ïµ½29.7Tbps·åÖµÁ÷Á¿ £¬³ÖÐø69Ãë £¬Í¨¹ýUDPµØÌºÊ½ºäÕ¨Ïò¾ùÔÈÿÃë1.5Íò¸öÖ¸±ê¶Ë¿ÚÇãк¡°À¬»ø¡±Á÷Á¿¡£¸Ã½©Ê¬ÍøÂçÓÉCloudflare¹ÀËãµÄ100ÍòÖÁ400Íǫ̀ÊÜϰȾÉ豸×é³É £¬Ô̺¬Â·ÓÉÆ÷ºÍÎïÁªÍøÉ豸 £¬·¸×ï·Ö×Ó¿Éͨ¹ý¶ÈÏúÉÌ×âÓÃÆä×é¼þÌáÒé¹¥»÷¡£CloudflareÊý¾ÝÏÔʾ £¬½ñÄêÒÑ»º½â2867´ÎAisuru¹¥»÷ £¬½ü45%Ϊ³¬´óÁ÷Á¿¹¥»÷£¨³¬¹ý1Tbps»ò10ÒÚ°ü/Ã룩¡£´Ëǰ×î¸ß22.2Tbps¹¥»÷¼°Î¢ÈíÅû¶µÄ15Tbps Azure¹¥»÷¾ù±»¹éÒòÓÚ´ËÍøÂç¡£±¾´Î29.7Tbps¹¥»÷Ëäδ¹«¿ªÖ¸±ê £¬µ«Æä·ÛËéÁ¦ÒÑÔ¶³¬Í¨Àý £¬CloudflareÖÒ¸æ £¬´ËÀ๥»÷¿É¼ä½Ó̱»¾Î´Êܹ¥»÷µÄ»¥ÁªÍø·þÎñÌṩÉÌ £¬ÈôÖ±½ÓÕë¶Ô¹Ø¼ü»ù´¡ÉèÊ©¡¢Ò½ÁƼ±¾È»ò¾üÊÂϵͳ £¬ºó¹û²»Ê¤ÉèÏë¡£


https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/


2. ShopifyÈ«Çòå´»ú £¬É̼ÒÓû§µÇ¼ÂòÂôÅö±Ú


12ÔÂ2ÈÕ £¬2025ÄêÍøÂçÐÇÆÚÒ»¹ºÎï¶¥·åÆÚ¼ä £¬È«ÇòµçÉ̾ÞÍ·ShopifyÍ»·¢´ó¹æÄ£å´»úÊÂÎñ £¬µ¼ÖÂÊýǧÍòÔÚÏß¹ºÎïÕß¼°É̼ÒÃæ¶ÔµÇ¼Òì³£¡¢ÍøÕ¾µ¼º½Åö±Ú¼°ÂòÂôϵͳ¹ÊÕÏ¡£¾Ý»¥ÁªÍø¼à¿ØÆ½Ì¨DowndetectorÊý¾Ý £¬ÃÀ¹ú¶«²¿¹¦·òÉÏÎç9µãÆð £¬Óû§Í¶ËßÁ¿¼¤Ôö £¬11µã´ï·åÖµ4000ÓàÆð £»Ó¢¹úͬÆÚÒà»ã±¨2800ÓàÆð¹ÊÕÏ £¬È«Çò³¬56%Óû§Ôâ·êµÇ¼ÎÊÌâ £¬25%·´Ó³ÍøÕ¾½Ó¼ûÒì³£ £¬19%´æÔÚ·þÎñÆ÷ÏνÓʧ°Ü¡£ShopifyÔÚÉÏÎç10µãͨ¹ý¹Ù·½Çþ·ÈϿɡ°²¿ÃŵêÆÌÖÎÀíԱȨÏÞ¹ÊÕÏ¡± £¬²¢½¨ÒéÓû§¡°Î¬³ÖÉ豸µÇ¼״̬¡±¡£È»¶ø £¬´óÁ¿É̼ҷ´À¡³Æ¡°ËùÓÐÃŵê¾ùÎÞ·¨µÇ¼¡± £¬ÇÒPOSϵͳÒàÊܲ¨¼° £¬Ó°ÏìÂòÂô´¦Öá¢¿â´æÖÎÀí¼°¿Í»§Êý¾Ýͬ²½¡£¹«Ë¾ºóÐø±ÉÈËÎç2:31¸üÐÂÉêÃ÷ £¬È·ÈϹÊÕÏÔ´ÓÚ¡°µÇ¼Éí·ÝÑéÖ¤Á÷³Ìȱµã¡± £¬²¢°ä·¢ÎÊÌâÒѽ¨¸´ £¬ÏµÍ³ÕýÖ𲽸´Ô­¡£Õâ´Îå´»úÊÂÎñ²¨¼°ÁìÓò¿í·º £¬´ÓÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢Òâ´óÀûµ½Ä«Î÷¸çµÈÈ«Çò¶àµØÓû§¾ù»ã±¨ÊÜÓ°Ïì¡£


https://cybernews.com/news/shopify-down-for-thousands-during-cyber-monday-mania/


3. Predator¼äµýÈí¼þÀûÓÃÐÂÐÍϰȾõè¾¶½øÐÐÁãµã»÷¹¥»÷


12ÔÂ4ÈÕ £¬½üÈÕ £¬ÓÉInside Story¡¢HaaretzºÍWAV Research Collective½áºÏµ÷²é¸æ·¢ £¬Predator¼äµýÈí¼þͨ¹ýÃûΪ¡°°¢À­¶¡¡±µÄÁãµã»÷ϰȾ»úÔì £¬½öÐè²é¿´¶ñÒâ¸æ°×¼´¿ÉÈëÇÖÌØ¶¨Ö¸±ê¡£¸Ã»úÔì±»°µ²ØÔÚ¶à¹ú¿Õ¿Ç¹«Ë¾±³ºó £¬»ùÓÚ¡°IntellexaйÃÜÊÂÎñ¡±µÄÄÚ²¿Îļþ¼°ÓªÏú×ÊÁÏ £¬²¢¾­¹ú¼ÊÌØÉâ×éÖ¯¡¢¹È¸èºÍRecorded FutureµÄ¼¼Êõ×êÑÐ֤ʵ¡£AladdinÓÚ2024Äê³õ´Î²¿Ê𠣬ÀûÓÃóÒ×ÒÆ¶¯¸æ°×ϵͳ´«²¼¶ñÒâÈí¼þ £¬Í¨¹ýÐèÒª·½Æ½Ì¨£¨DSP£©Ç¿Ô콫±øÆ÷»¯¸æ°×Ͷ·Åµ½Í¨¹ý¹«¹²IPµØÖ·µÈ±êʶ·ûʶ´ËÍâÌØ¶¨Ö¸±ê £¬¸æ°×¿É³Ê´Ë¿ÌÈκÎÏÔʾ¸æ°×µÄÍøÕ¾»òÀûÓÃÖÐ £¬±í¹ÛÓëͨ³£¸æ°×ÎÞÒì¡£½öä¯ÀÀ¸æ°×¼´¿É´¥·¢Ï°È¾ £¬ÎÞÐèµã»÷ £¬¸æ°×»á³Á¶¨ÏòÖÁIntellexaµÄ·ì϶ÀûÓ÷þÎñÆ÷¡£¸Ã¸æ°×ÍøÂçÉæ¼°°®¶ûÀ¼¡¢µÂ¹ú¡¢ÈðÊ¿¡¢Ï£À°¡¢ÈûÆÖ·˹¡¢°¢ÁªÇõºÍÐÙÑÀÀûµÈ¶à¹ú¸æ°×¹«Ë¾¡£·ÀÓù´ëÊ©Ô̺¬ÆÁ±Îä¯ÀÀÆ÷¸æ°×¡¢°µ²Ø¹«¹²IPµØÖ· £¬µ«Ð¹Â¶ÎļþÏÔʾIntellexaÈÔ¿É´Ó¿Í»§µØµã¹úµÄÒÆ¶¯ÔËÓªÉÌ»ñÊØÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/


4. ÷è÷ëÀÕË÷Èí¼þÐû³Æ¹¥»÷ɽ´ï»ù½Ì»á £¬Ð¹Â¶ÄÚ²¿Ãô¸ÐÊý¾Ý


12ÔÂ4ÈÕ £¬÷è÷ëÀÕË÷Èí¼þ½«É½´ï»ù½Ì»áÁÐÈëÆä°µÍøÐ¹Â¼ûûµ¥ £¬Ðû³Æ¶ÔÊý¾Ýй¶ÊÂÎñÕÆ¹Ü £¬²¢°ä²¼22ÕŽØÍ¼×÷ΪÈëÇÖÖ¤¾Ý¡£½ØÍ¼ÏÔʾ £¬¹¥»÷Éæ¼°Ó¢¹úʥɽ¸ß¼¶×éÖ¯£¨AOSH UK£©µÄÄÚ²¿È¨ÏÞ £¬Ô̺¬×ڽ̹¤×÷ÈËԱǩ֤´¦Öüͼ¡¢ÒÆÃñÓöȲ¦¿îÃ÷ϸ£¨ÈçÿÈË2600ÖÁ4500Ó¢°÷µÄǩ֤Óöȣ©¡¢ÔËÓªÖ§³ö¼°»î¶¯ºóÇÚÊý¾Ý¡£ÀýÈç £¬Ò»·ÝÔ¤ËãÎļþÏÔʾ £¬Ä³²¦¿îÖÜÆÚÄÚ³¬11500Ó¢°÷ÓÃÓÚǩ֤ÉêÇë £¬ÁíÒ»ÎļþÔòÁгö3ÍòÓ¢°÷ÓÃÓÚÓʼþÐû´«¼°½ÚÈպؿ¨·Ö·¢ £¬»¹ÓÐ6351Ó¢°÷ÓÃÓÚ¹ú¼ÊÓÊ×Ê¡¢6000Ó¢°÷ÓÃÓÚÊÓÌýÉ豸²É¹º¡£Ð¹Â¶Êý¾Ý»¹Éæ¼°°²±£¹æ»® £¬Ô̺¬2024-2025Äê×ܶî½ü10ÍòÓ¢°÷µÄ°²±£Ô¤Ëã £¬º­¸ÇËѱ¬È®·þÎñ¡¢ÒªÔ±± £»¤¡¢Î§À¸½¨ÉèµÈ £¬¾ßÌåÈç74,326Ó¢°÷ÓÃÓÚÒªÔ±± £»¤ÍÅ¶Ó £¬29,217Ó¢°÷ÓÃÓÚ±¾µØÖܱ߰²±£¡£´Ë±í £¬²ÆÕþ·¢Æ±¡¢ÒøÐÐÕË»§ÐÅÏ¢¼°»áÔ±Ó×ÎÒÊý¾Ý£¨ÈçÈ«Ãû¡¢µç»°¡¢¹Û¹â¼Í¼£©Ò²±»ÆØ¹â £¬ÀýÈç¡°À­¶¡ÒáÈËÊ¿¶Ï¸ùÀÖ¶Ó2025Äê11Ô¡±±í¸ñÔ̺¬°¢¸ùÍ¢¡¢°ÍÎ÷µÈ¶à¹úÈËÔ±µÄ¾ßÌåÐÅÏ¢¡£


https://hackread.com/qilin-ransomware-church-of-scientology-data-theft/


5. Array AG VPNÉ豸ºÅÁî×¢Èë·ì϶ÔâºÚ¿ÍÀûÓÃ


12ÔÂ4ÈÕ £¬½üÈÕ £¬ÍþвÐÐΪÕßÕýÀûÓÃArray AGϵÁÐVPNÉ豸ÖеĺÅÁî×¢Èë·ì϶ֲÈëwebshell²¢´´½¨¶ñÒâÓû§¡£Array NetworksÓÚ½ñÄê5ÔÂͨ¹ý°²È«¸üн¨¸´Á˸÷ì϶ £¬µ«Î´·ÖÅäCVE±êʶ·û £¬µ¼Ö·ì϶¸ú×ÙÓë²¹¶¡ÖÎÀí¸´ÔÓ»¯¡£ÈÕ±¾ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××飨JPCERT£©°ä²¼²¼¸æÖÒ¸æ £¬ºÚ¿Í×Ô8ÔÂÆðÒÑÀûÓø÷ì϶¹¥»÷ÈÕ±¾¾³ÄÚ×éÖ¯ £¬¹¥»÷ÕßÊÔͼÔÚõè¾¶/ca/aproxy/webapp/¸éÖÃPHP webshellÎļþ¡£¸Ã·ì϶ӰÏìArrayOS AG 9.4.5.8¼°¸üÔç°æ±¾ £¬ÓÈÆäÊÇÆôÓÃÁË¡°DesktopDirect¡±Ô¶³Ì½Ó¼ûÖ°ÄܵÄAGϵÁÐÓ²¼þºÍÐé¹¹É豸¡£Array Networks AGϵÁÐ×÷Ϊ°²È«½Ó¼ûÍø¹Ø £¬ÒÀÀµSSL VPN´´½¨¼ÓÃÜËí· £¬¿í·ºÓÃÓÚÆóÒµÔ¶³Ì½Ó¼ûÍøÂç¡¢ÀûÓá¢×ÀÃæ¼°ÔÆ×ÊÔ´ £¬Í¨³£±»´óÐÍ×éÖ¯ÓÃÓÚÖ§³ÖÔ¶³Ì»òÒÆ¶¯°ì¹«¡£JPCERTÖ¸³ö £¬Array OS 9.4.5.9Òѽ¨¸´¸ÃÎÊÌâ¡£ÈôÎÞ·¨Éý¼¶ £¬½¨Òé½ûÓÃËùÓÐδʹÓõÄDesktopDirect·þÎñ £¬»òͨ¹ýURL¹ýÂË×èÖ¹Ô̺¬·ÖºÅµÄURL½Ó¼û¡£¾Ý°²È«×êÑÐÔ±Yutaka SejiyamaɨÃè £¬È«Çò¹²ÓÐ1831¸öArrayAGÊ·ý £¬ÖØÒªÉ¢²¼ÔÚÖйú¡¢ÈÕ±¾ºÍÃÀ¹ú £¬ÆäÖÐÖÁÉÙ11̨Ö÷»úÆôÓÃÁËDesktopDirectÖ°ÄÜ £¬µ«ÏÖʵÊýÁ¿¿ÉÄܸü¸ß¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/


6. Companjon±£ÏտƼ¼¹«Ë¾Â¶³öÊýǧÍò¹Û¹âÐÅÏ¢¼°PII


12ÔÂ3ÈÕ £¬½üÈÕ £¬±£ÏտƼ¼¹«Ë¾CompanjonÒòδÊܱ £»¤µÄApache KafkaÁ÷й¶Êý°ÙÍòÌõÈÕÖ¾ £¬Éæ¼°¹Û¹âÐг̡¢È«Ãû¡¢µç×ÓÓʼþµÈÃô¸ÐÓ×ÎÒÐÅÏ¢¡£CybernewsÍŶÓÓÚ2025Äê8ÔÂÏÂÑ®·¢Ïָ÷ì϶ £¬ÔÚÆßÌìÄڼͼ³¬1500ÍòÌõÊý¾Ý £¬¹ÀËã×Üй¶Á¿¿ÉÄÜ´ï9.6ÒÚÌõ £¬ÆäÖÐÔ¼0.1%£¨Ô¼96ÍòÌõ£©Ô̺¬Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£Ð¹Â¶´°¿ÚÆÚΪ8ÔÂ20ÈÕÖÁ28ÈÕ £¬Éæ¼°Trainline¡¢Omio¡¢TripXµÈ¹Û¹âƽ̨µÄAPI½»»¥Êý¾Ý £¬Ô̺¬½«À´ÖÁ2026ÄêµÄ¹Û¹â·Ïß¡¢º½¿Õ¹«Ë¾¡¢ÈÕÆÚ¼°²ÆÕþÐÅÏ¢¡£Companjon×÷ΪB2B2C·þÎñÉÌ £¬Îª¹Û¹âÉçµÈÆóÒµÌṩ±£ÏÕ·þÎñ £¬Í¨¹ýÍøÂçÖÕ¶ËÓû§Êý¾ÝÖ§³ÖºÏ×÷·½Íƹã¡£Õâ´Îй¶µÄÈÕÖ¾ÖÐ £¬²¿ÃżÍ¼Ô̺¬ÊÚȨÁîÅÆ £¬¹¥»÷ÕßÀíÂÛÉÏ¿ÉÀûÓÃÕâЩÐÅÏ¢ÌáÒé½øÒ»²½¹¥»÷ £¬ÈçÚ¿Æ­»òϵͳÈëÇÖ¡£×êÑÐÈËÔ±Ö¸³ö £¬½áºÏÂÃÐÓ×¢²ÆÕþ¼°µØÎ»Êý¾Ý £¬¿Í»§Ãæ¶Ô¸ß¶ÈÕë¶ÔÐÔÚ¿Æ­·çÏÕ £¬ÀýÈç¼ÙÒâ¾ÆµêÔ±¹¤ÍþвȡµÞÔ¤Ô¼ÒÔÆ­È¡¸¶¿î¡£


https://cybernews.com/security/companjon-kafka-leak-travel-data/