±±Ô¼·å»áʱ´ú¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢¶¯DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-06-26

1. ±±Ô¼·å»áʱ´ú¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)·¢¶¯DDoS¹¥»÷


6ÔÂ24ÈÕ£¬£¬ £¬£¬£¬ÔÚ±±Ô¼·å»áÓÚºÉÀ¼º£ÑÀ¾ÙÐÐÖ®¼Ê£¬£¬ £¬£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯NoName057(16)Éù³Æ¶ÔΪÊÐÕþÕþ¸®ºÍÆäËûÕþÖλú¹¹ÌṩIT½â¾ö¼Æ»®µÄNotuBiz¹«Ë¾·¢¶¯ÁËDDoS¹¥»÷£¬£¬ £¬£¬£¬µ¼Ö°üÀ¨Ö÷ÒªÎļþµÄÒ³ÃæÔÝʱÎÞ·¨»á¼û¡£¡£¡£ÔÚ·å»áʱ´ú£¬£¬ £¬£¬£¬±±Ô¼ÓÑ°î¸æ¿¢Á˽«¹ú·À¿ªÖ§Ä¿µÄÉ趨Ϊº£ÄÚÉú²ú×ÜÖµ£¨GDP£©5%µÄЭÒ飬£¬ £¬£¬£¬ÕâÊÇÃÀ¹ú×ÜÍ³ÌÆÄɵ¡¤ÌØÀÊÆÕ×î³õÌá³öµÄÒªÇ󡣡£¡£ÆäÖÐ3.5%½«Ö±½Ó²¦¸ø¹ú·À²¿£¬£¬ £¬£¬£¬ÆäÓà1.5%Ôò·ÖÅɸøÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©µÈÏà¹ØÁìÓòµÄ¸üÆÕ±éͶ×Ê¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬ÕâÒ»Ö÷ÒªµÄ¹ú¼Ê¾Û»áÒ²³ÉΪÁ˺ڿͷ¢¶¯ÍøÂç¹¥»÷µÄ¾ø¼Ñʱ»ú¡£¡£¡£NoName057(16)×éÖ¯ÓÉһȺ¾ÝÐÅÊܶíÂÞ˹×ÊÖúµÄºÚ¿ÍÐж¯Ö÷ÒåÍøÂçÇ徲ר¼Ò×é³É£¬£¬ £¬£¬£¬Ôø¹¥»÷¹ý³Ö·´¶í̬¶ÈµÄ¹ú¼ÒºÍ×éÖ¯£¬£¬ £¬£¬£¬°üÀ¨±ÈÀûʱ¡¢Òâ´óÀû¡¢ºÉÀ¼ºÍÎÚ¿ËÀ¼¡£¡£¡£´Ë´Î£¬£¬ £¬£¬£¬¸Ã×éÖ¯ÔÚTelegramÉÏÉù³Æ£¬£¬ £¬£¬£¬ÆäÄ¿µÄÊǺÉÀ¼µÄ±±Ô¼µØÇø´ú±í´¦ÒÔ¼°°üÀ¨Ë¹º£¶ûÍк಩˹¡¢´ú¶û·òÌØºÍº£ÑÀÔÚÄڵöÊÐÕòºÍÊ¡·Ý¡£¡£¡£º£ÑÀÊÐÕþ¸®ÖÜÒ»±¨¸æ³Æ£¬£¬ £¬£¬£¬¶à¼Ò¹©Ó¦ÉÌ×¢ÖØµ½ÆäϵͳÔâÓö´ó×ÚÍøÂçÁ÷Á¿¡£¡£¡£Ò»Î»½²»°ÈË֤ʵ£¬£¬ £¬£¬£¬ÓÉÓÚÍøÂç¹¥»÷£¬£¬ £¬£¬£¬º£ÑÀÊÐÕþ¸®Ê¹ÓõĶà¸öÓòÃûÓÐʱÊܵ½ÏÞÖÆ»òÎÞ·¨»á¼û¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬ITЧÀÍÌṩÉÌNotuBizÒ²ÈÏ¿ÉÆäÏµÍ³ÍøÂçÁ÷Á¿Öش󣬣¬ £¬£¬£¬µ«¹«Ë¾µÄ·À»ðǽÓÐÓõظôÀëÁËÈßÓàÁ÷Á¿£¬£¬ £¬£¬£¬Ö»¹ÜÔÆÔÆ£¬£¬ £¬£¬£¬»á¼ûÕß¼ÓÔØ°üÀ¨¹Ù·½ÎļþµÄÒ³ÃæÈÔÐèÒªºÜ³¤Ê±¼ä¡£¡£¡£


https://cybernews.com/news/russian-hackers-ddos-attack-netherlands/


2. Unit 42½ÒÆÆÕë¶Ô·ÇÖÞ½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâ»î¶¯


6ÔÂ25ÈÕ£¬£¬ £¬£¬£¬Palo Alto NetworksÆìϵÄUnit 42Ñо¿ÍŶӿËÈÕ·¢Ã÷ÁËÒ»ÏîÕë¶Ô·ÇÖÞ¶à¼Ò½ðÈÚ»ú¹¹µÄÐÂÐͶñÒâ»î¶¯£¬£¬ £¬£¬£¬¸Ã»î¶¯±»×·×ÙΪCL-CRI-1014¡£¡£¡£¾ÝUnit 42Ñо¿Ö°Ô±ÆÀ¹À£¬£¬ £¬£¬£¬ÕâЩ¹¥»÷Õß×Ô2023ÄêÒÔÀ´±ãÒ»Ö±»îÔ¾ÓÚ·ÇÖÞ½ðÈÚÐÐÒµ£¬£¬ £¬£¬£¬ÊÎÑÝ×ųõʼ»á¼û¾­¼ÍÈË£¨IABs£©µÄ½ÇÉ«£¬£¬ £¬£¬£¬¼´ÏÈ»ñȡĿµÄµÄ³õʼ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬ÔÙÔÚ°µÍøÉϽ«Æä³öÊÛ¸øÆäËû¹¥»÷Õߣ¬£¬ £¬£¬£¬´Ó¶øÄ²È¡²»·¨ÀûÒæ¡£¡£¡£ÎªÁËʵÑé¹¥»÷£¬£¬ £¬£¬£¬CL-CRI-1014¹¥»÷ÕßʹÓÃÁËһϵÁпªÔ´¹¤¾ßºÍ¹ûÕæ¿ÉÓõÄÈí¼þ¡£¡£¡£¹¥»÷ÕßÊ×ÏÈʹÓÃPsExecÔ¶³ÌÅþÁ¬µ½Áíһ̨»úе×÷ΪÊðÀí£¬£¬ £¬£¬£¬È»ºóÔÚÊðÀí»úеÉÏʹÓÃChiselÅþÁ¬µ½¶ą̀»úе¡£¡£¡£ÔÚ²¿·Ö»úеÉÏ£¬£¬ £¬£¬£¬¹¥»÷ÕßͶµÝPoshC2²¢¾ÙÐÐÕì̽»î¶¯£¬£¬ £¬£¬£¬ÍøÂçÁ÷Á¿Í¨¹ýChiselËíµÀ´«Êä¡£¡£¡£ÔÚÆäËû»úеÉÏ£¬£¬ £¬£¬£¬¹¥»÷ÕßÔòÔËÐÐPowerShell²¢×°ÖÃClassroom Spy£¬£¬ £¬£¬£¬ÒÔʵÏÖ¸üÖÜÈ«µÄ¼à¿ØºÍ¿ØÖÆ¡£¡£¡£ÏÖÔÚ²¢Ã»ÓÐÖ¤¾ÝÅú×¢CL-CRI-1014»î¶¯Ê¹ÓÃÁËÄ¿µÄ×éÖ¯²úÆ·»òЧÀÍÖеÄÈκÎÎó²î¡£¡£¡£ÕâÒâζ׏¥»÷Õß¿ÉÄܸü¶àµØÒÀÀµÓÚÉç»á¹¤³ÌѧÊֶΡ¢ÈõÃÜÂë»òÆäËû·ÇÊÖÒÕÐÔÎó²îÀ´»ñÈ¡³õʼ»á¼ûȨÏÞ¡£¡£¡£


https://www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/


3. ³¯ÏÊÐÂÒ»ÂÖ¡°Ñ¬È¾ÐÔÃæÊÔ¡±¹¥»÷ʹÓöñÒânpm°üʵÑéÇÔÃÜ


6ÔÂ25ÈÕ£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬³¯ÏÊÌᳫµÄÐÂÒ»ÂÖ¡°Ñ¬È¾ÐÔÃæÊÔ¡±»î¶¯ÒýÆðÁËÇå¾²½çµÄÆÕ±é¹Ø×¢¡£¡£¡£´Ë´Î¹¥»÷Ö÷ÒªÃé×¼ÇóÖ°Õߣ¬£¬ £¬£¬£¬ÌØÊâÊÇÈí¼þ¹¤³ÌʦºÍ¿ª·¢Ö°Ô±£¬£¬ £¬£¬£¬Í¨¹ý¶ñÒânpm°üѬȾËûÃǵÄ×°±¸£¬£¬ £¬£¬£¬ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢²¢Ö²ÈëºóÃÅ¡£¡£¡£¾ÝSocket Threat Research±¨¸æ£¬£¬ £¬£¬£¬ÕâЩ¶ñÒânpm°üÔÚÊܺ¦ÕߵĻúеÉϼÓÔØÁËÓ볯ÏÊÐÐΪÕßÓйصÄBeaverTailÐÅÏ¢ÇÔÈ¡³ÌÐòºÍInvisibleFerretºóÃÅ¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËͨ¹ý24¸öÕË»§Ìá½»µ½npmµÄ35¸ö¶ñÒâÈí¼þ°ü£¬£¬ £¬£¬£¬ÕâЩÈí¼þ°ü×ܹ²±»ÏÂÔØÁËÁè¼Ý4000´Î£¬£¬ £¬£¬£¬ÆäÖÐ6¸öÔÚ׫д±¨¸æÊ±ÈÔÈ»¿ÉÓᣡ£¡£ÕâЩ¶ñÒânpm°üÌØÊâΣÏÕ£¬£¬ £¬£¬£¬ÓÉÓÚËüÃÇÖÐÓм¸¸öÊÇÓòÃûÇÀ×¢»òÄ£Äâ×ÅÃûÇÒÊÜÐÅÈεĿ⣬£¬ £¬£¬£¬Èçreact-plaid-sdk¡¢vite-plugin-next-refreshµÈ¡£¡£¡£³¯ÏÊÌØ¹¤Ã°³äÕÐÆ¸Ö°Ô±£¬£¬ £¬£¬£¬Í¨¹ýLinkedInºÍGoogle DocsÏò¿ª·¢Ö°Ô±ºÍÇóÖ°Õß·¢ËͱàÂ롰ʹÃü¡±£¬£¬ £¬£¬£¬Ö¸µ¼ËûÃÇÏÂÔØÕâЩÈí¼þ°ü£¬£¬ £¬£¬£¬²¢ÒªÇóÇóÖ°Õß¼ÓÈë²âÊÔÏîÄ¿¡£¡£¡£ÕâЩ×÷Òµ±»Î±×°³ÉÕýµ±²âÊÔ£¬£¬ £¬£¬£¬µ«ÏÖʵÉϻᴥ·¢Ñ¬È¾Á´£¬£¬ £¬£¬£¬ÔÚÄ¿µÄÅÌËã»úÉÏͶ·Å¶à¸öÓÐÓÃÔØºÉ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-wave-of-fake-interviews-use-35-npm-packages-to-spread-malware/


4. ¸çÂ×±ÈÑÇ´óѧÔâÍøÂç¹¥»÷£¬£¬ £¬£¬£¬Ð£Ô°ÏµÍ³·ºÆð´óÃæ»ý¹ÊÕÏ


6ÔÂ26ÈÕ£¬£¬ £¬£¬£¬¸çÂ×±ÈÑÇ´óѧ¹ÙÔ±ÕýÔÚÊÓ²ìÒ»ÆðDZÔÚµÄÍøÂçÇå¾²ÊÂÎñ£¬£¬ £¬£¬£¬´ËǰÓÐѧÉú±¨¸æ³ÆÐ£Ô°ÄÚ·ºÆðÁË´óÃæ»ýµÄÊÖÒÕ¹ÊÕÏ£¬£¬ £¬£¬£¬ÉõÖÁÔÚÆÁÄ»ÉÏ·ºÆðÁËÏ£ÆæµÄͼÏñ¡£¡£¡£×ÔÖܶþÔçÉÏÒÔÀ´£¬£¬ £¬£¬£¬¸ÃУµÄÍøÕ¾ºÍÆäËûϵͳһֱ´¦ÓÚ¼äЪÐÔÀëÏß״̬£¬£¬ £¬£¬£¬¸øÊ¦ÉúµÄÒ»Ñùƽ³£Ñ§Ï°ºÍÊÂÇé´øÀ´Á˼«´óµÄδ±ã¡£¡£¡£¾Ý¸çÂ×±ÈÑÇ´óѧµÄһλ½²»°ÈËÏòRecorded Future News͸¶£¬£¬ £¬£¬£¬×òÌìÔçÉÏ£¬£¬ £¬£¬£¬¸çÂ×±ÈÑÇ´óѧµÄITϵͳ±¬·¢¹ÊÕÏ£¬£¬ £¬£¬£¬Ó°ÏìÁ˳¿±ßÐ£ÇøµÄϵͳÔËÐС£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬Ñ§Ð£µÄITÍŶÓÕýÔÚÈ«Á¦ÒÔ¸°µØÆð¾¢»Ö¸´Ð§ÀÍ£¬£¬ £¬£¬£¬²¢ÒÑ֪ͨÁËÖ´·¨²¿·Ö¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬ £¬£¬£¬ÏÖÔÚ¸çÂ×±ÈÑÇ´óѧŷÎÄҽѧÖÐÐĵÄÁÙ´²ÔËÓªÉÐδÊܵ½Ó°Ïì¡£¡£¡£Ò»Î»²»¿Ï͸¶ÐÕÃûµÄÖªÇéÈËÊ¿ÌåÏÖ£¬£¬ £¬£¬£¬ÏÖÔÚ²¢Ã»ÓÐÊý¾Ýй¶»òÀÕË÷Èí¼þ¹¥»÷µÄ¼£Ï󣬣¬ £¬£¬£¬¸çÂ×±ÈÑÇ´óѧµÄÏµÍ³ËÆºõûÓÐÊܵ½¡°Éî¶ÈÈëÇÖ¡±¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬Ñ§ÉúÃÇÔÚÉ罻ýÌåÉÏ·ÖÏíµÄÕÕÆ¬È´ÏÔʾ£¬£¬ £¬£¬£¬Ð£Ô°ÄÚµÄÊý×Ö±êÅÆ±»½ÓÊÜ£¬£¬ £¬£¬£¬²¢Ì滻ΪÁËÌÆÄɵ¡¤ÌØÀÊÆÕ×ÜͳµÄͼÏñ¡£¡£¡£¾ÝУ±¨¡¶¸çÂ×±ÈÑÇÊÓ²ì¼Ò±¨¡·±¨µÀ£¬£¬ £¬£¬£¬Ñ§ÉúÃÇÎÞ·¨µÇÈÎÃüÓÚ»á¼ûµç×ÓÓʼþÕË»§ºÍ×÷ҵƽ̨µÄÉí·ÝÑé֤ЧÀÍ¡£¡£¡£Ñ§Ð£ÔÚÖܶþÒ»Á¬·¢³öÁ˶àÌõÐÂÎÅ£¬£¬ £¬£¬£¬ÖÒÑÔЧÀÍÖÐÖ¹£¬£¬ £¬£¬£¬²¢±Þ²ß½ÌÊÚÃÇÁíÐа²Åſγ̡£¡£¡£


https://therecord.media/columbia-university-technology-outages


5. CitrixÖÒÑÔNetScaler×°±¸Îó²îCVE-2025-6543ÔâÆÕ±éʹÓÃ


6ÔÂ25ÈÕ£¬£¬ £¬£¬£¬Citrix¹«Ë¾·¢³ö½ôÆÈÖÒÑÔ£¬£¬ £¬£¬£¬Ö¸³öÆäNetScaler×°±¸ÖÐÒ»¸ö±»×·×ÙΪCVE-2025-6543µÄÎó²îÕýÔÚ±»ÆÕ±éʹÓ㬣¬ £¬£¬£¬µ¼ÖÂ×°±¸½øÈë¾Ü¾øÐ§ÀÍ״̬£¬£¬ £¬£¬£¬½ø¶øÀëÏß¡£¡£¡£ÕâÒ»Îó²îÄÚ²¿¸ú×Ù±àºÅΪCTX694788£¬£¬ £¬£¬£¬ÊÇÒ»¸öÑÏÖØµÄÇå¾²Îó²î£¬£¬ £¬£¬£¬¿ÉÓÉδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÇëÇó´¥·¢£¬£¬ £¬£¬£¬¶ÔNetScaler ADCºÍNetScaler Gateway×°±¸×é³ÉÑÏÖØÍþв¡£¡£¡£¾ÝCitrix¹«Ë¾Í¸Â¶£¬£¬ £¬£¬£¬¸ÃÎó²îÓ°ÏìNetScaler ADCºÍNetScaler GatewayµÄ¶à¸ö°æ±¾£¬£¬ £¬£¬£¬½öÓ°ÏìÉèÖÃÎªÍø¹Ø£¨ÈçVPNÐéÄâЧÀÍÆ÷¡¢ICAÊðÀí¡¢ÎÞ¿Í»§¶ËVPN (CVPN)¡¢RDPÊðÀí£©»òAAAÐéÄâЧÀÍÆ÷µÄNetScaler×°±¸¡£¡£¡£Citrix¹«Ë¾ÒѾ­Õë¶Ô´ËÎó²îÐû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬ÔÚÖÎÀíÔ±´¦Öóͷ£´ËÎó²îµÄͬʱ£¬£¬ £¬£¬£¬Citrix¹«Ë¾»¹·¢³öÁ˹ØÓÚÁíÒ»¸ö±»³ÆÎªCitrixBleed 2µÄÑÏÖØNetScalerÎó²îµÄÖÒÑÔ¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2025-5777£¬£¬ £¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ý´Ó×°±¸ÄÚ´æÖÐÌáÈ¡»á»°ÁîÅÆÀ´Ð®ÖÆÓû§»á»°£¬£¬ £¬£¬£¬ÆäÑÏÖØÐÔ½ûÖ¹ºöÊÓ¡£¡£¡£¼øÓÚÕâÁ½¸öÎó²îµÄÑÏÖØÐÔ£¬£¬ £¬£¬£¬Citrix¹«Ë¾Ç¿ÁÒ½¨ÒéÖÎÀíÔ±¾¡¿ìÓ¦ÓÃ×îеIJ¹¶¡£¬£¬ £¬£¬£¬ÒÔÐÞ¸´ÕâЩÇå¾²Îó²î£¬£¬ £¬£¬£¬±ÜÃâ×°±¸Êܵ½¹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/


6. Mainline Health SystemsÊý¾Ýй¶ӰÏìÁè¼Ý10ÍòÈË


6ÔÂ25ÈÕ£¬£¬ £¬£¬£¬Mainline Health Systems£¬£¬ £¬£¬£¬Ò»¼Ò×Ô1978ÄêÆð±ãÔÚ°¢¿ÏÉ«Öݲ¨ÌØÀ¼ÔËÓªµÄÁª°îÈÏÖ¤·ÇÓªÀûÐÔÒ½ÁÆÖÐÐÄ£¬£¬ £¬£¬£¬¿ËÈÕÅû¶ÁËÒ»ÆðÖØ´óµÄÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý10ÍòÈË¡£¡£¡£¾ÝÊý¾Ýй¶֪ͨº¯ËùÊö£¬£¬ £¬£¬£¬¸ÃÇå¾²ÊÂÎñ±¬·¢ÔÚ2024Äê4ÔÂ10ÈÕ×óÓÒ£¬£¬ £¬£¬£¬Ó°ÏìÁ˹«Ë¾ÍøÂç¡£¡£¡£Mainline Health SystemsÔÚ»ñϤ´ËÎÊÌâºó£¬£¬ £¬£¬£¬Á¬Ã¦Õö¿ªÁËÖÜÈ«ÊӲ죬£¬ £¬£¬£¬²¢½ÓÄÉÁ˶àÏî²½·¥ÒÔÓ¦¶Ô´Ë´ÎÊÂÎñ¡£¡£¡£ËûÃDz»µ«½«´Ëʼû¸æÁËÁª°îÖ´·¨²¿·Ö£¬£¬ £¬£¬£¬»¹Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò£¬£¬ £¬£¬£¬²¢¶ÔÊÜÓ°ÏìµÄÎļþ¾ÙÐÐÁËÈ˹¤Éó²é¡£¡£¡£¾­ÓÉÉîÈëÊӲ죬£¬ £¬£¬£¬¸Ã×éÖ¯ÓÚ2025Äê5ÔÂ21ÈÕÈ·ÈÏ£¬£¬ £¬£¬£¬ÓÉÓÚ´Ë´ÎÊÂÎñ£¬£¬ £¬£¬£¬Ä³Ð©°üÀ¨»¼ÕßÊܱ£»£»£»£»£»¤Ð¡ÎÒ˽¼ÒÐÅÏ¢µÄÎļþÔâµ½ÁËδ¾­ÊÚȨµÄ»á¼û»ò»ñÈ¡¡£¡£¡£Inc Ransom×éÖ¯Éù³Æ¶Ô´Ë´ÎÏ®»÷ÈÏÕæ£¬£¬ £¬£¬£¬²¢½«Mainline Health SystemsÌí¼Óµ½ÁËÆäTor×ßÂ©ÍøÕ¾ÉÏ¡£¡£¡£¹ØÓÚ´Ë´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬Mainline Health SystemsÌåÏÖ½«È«Á¦ÅäºÏÁª°îÖ´·¨²¿·ÖµÄÊӲ죬£¬ £¬£¬£¬²¢ÔöÇ¿×ÔÉíµÄÍøÂçÇå¾²·À»¤²½·¥£¬£¬ £¬£¬£¬ÒÔ±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢¡£¡£¡£


https://securityaffairs.com/179322/data-breach/mainline-health-systems-disclosed-a-data-breach.html