Aisuru½©Ê¬ÍøÂç·¢¶¯ÁË29.7 Tbps DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-12-05

1. Aisuru½©Ê¬ÍøÂç·¢¶¯ÁË29.7 Tbps DDoS¹¥»÷


12ÔÂ3ÈÕ£¬£¬£¬2025ÄêµÚÈý¼¾¶È£¬£¬£¬¹æÄ£ÖØ´óµÄAisuru½©Ê¬ÍøÂçÔÚÈý¸öÔÂÄÚÌᳫ1304´ÎÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬ÆäÖÐÒ»´Î´´¼Í¼µØµÖ´ï29.7Tbps·åÖµÁ÷Á¿£¬£¬£¬Ò»Á¬69Ã룬£¬£¬Í¨¹ýUDPµØÌºÊ½ºäÕ¨Ïòƽ¾ùÿÃë1.5Íò¸öÄ¿µÄ¶Ë¿ÚÇã×¢¡°À¬»ø¡±Á÷Á¿¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓÉCloudflare¹ÀËãµÄ100ÍòÖÁ400Íǫ̀ÊÜѬȾװ±¸×é³É£¬£¬£¬°üÀ¨Â·ÓÉÆ÷ºÍÎïÁªÍø×°±¸£¬£¬£¬·¸·¨·Ö×Ó¿É̫ͨ¹ýÏúÉÌ×âÓÃÆä×é¼þÌᳫ¹¥»÷¡£¡£¡£¡£¡£CloudflareÊý¾ÝÏÔʾ£¬£¬£¬½ñÄêÒÑ»º½â2867´ÎAisuru¹¥»÷£¬£¬£¬½ü45%Ϊ³¬´óÁ÷Á¿¹¥»÷£¨Áè¼Ý1Tbps»ò10ÒÚ°ü/Ã룩¡£¡£¡£¡£¡£´Ëǰ×î¸ß22.2Tbps¹¥»÷¼°Î¢ÈíÅû¶µÄ15Tbps Azure¹¥»÷¾ù±»¹éÒòÓÚ´ËÍøÂç¡£¡£¡£¡£¡£±¾´Î29.7Tbps¹¥»÷Ëäδ¹ûÕæÄ¿µÄ£¬£¬£¬µ«ÆäÆÆËðÁ¦ÒÑÔ¶³¬Í¨Àý£¬£¬£¬CloudflareÖÒÑÔ£¬£¬£¬´ËÀ๥»÷¿É¼ä½Ó̱»¾Î´Êܹ¥»÷µÄ»¥ÁªÍøÐ§ÀÍÌṩÉÌ£¬£¬£¬ÈôÖ±½ÓÕë¶ÔÒªº¦»ù´¡ÉèÊ©¡¢Ò½ÁÆÇÀ¾È»ò¾üÊÂϵͳ£¬£¬£¬Ð§¹û²»¿°ÉèÏë¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/


2. ShopifyÈ«Çòå´»ú£¬£¬£¬É̼ÒÓû§µÇ¼ÉúÒâÊÜ×è


12ÔÂ2ÈÕ£¬£¬£¬2025ÄêÍøÂçÐÇÆÚÒ»¹ºÎïá¯Áëʱ´ú£¬£¬£¬È«ÇòµçÉ̾ÞÍ·ShopifyÍ»·¢´ó¹æÄ£å´»úÊÂÎñ£¬£¬£¬µ¼ÖÂÊýÍòÍòÔÚÏß¹ºÎïÕß¼°É̼ÒÃæÁٵǼÒì³£¡¢ÍøÕ¾µ¼º½ÊÜ×è¼°ÉúÒâϵͳ¹ÊÕÏ¡£¡£¡£¡£¡£¾Ý»¥ÁªÍø¼à¿ØÆ½Ì¨DowndetectorÊý¾Ý£¬£¬£¬ÃÀ¹ú¶«²¿Ê±¼äÉÏÎç9µãÆð£¬£¬£¬Óû§Í¶ËßÁ¿¼¤Ôö£¬£¬£¬11µã´ï·åÖµ4000ÓàÆð£»£»£»Ó¢¹úͬÆÚÒ౨¸æ2800ÓàÆð¹ÊÕÏ£¬£¬£¬È«Çò³¬56%Óû§ÔâÓöµÇ¼ÎÊÌ⣬£¬£¬25%·´Ó¦ÍøÕ¾»á¼ûÒì³££¬£¬£¬19%±£´æÐ§ÀÍÆ÷ÅþÁ¬Ê§°Ü¡£¡£¡£¡£¡£ShopifyÔÚÉÏÎç10µãͨ¹ý¹Ù·½ÇþµÀÈϿɡ°²¿·ÖµêËÁÖÎÀíԱȨÏÞ¹ÊÕÏ¡±£¬£¬£¬²¢½¨ÒéÓû§¡°¼á³Ö×°±¸µÇ¼״̬¡±¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬´ó×ÚÉ̼ҷ´Ïì³Æ¡°ËùÓÐÃŵê¾ùÎÞ·¨µÇ¼¡±£¬£¬£¬ÇÒPOSϵͳÒàÊܲ¨¼°£¬£¬£¬Ó°ÏìÉúÒâ´¦Öóͷ£¡¢¿â´æÖÎÀí¼°¿Í»§Êý¾Ýͬ²½¡£¡£¡£¡£¡£¹«Ë¾ºóÐøÔÚÏÂÖç2:31¸üÐÂÉùÃ÷£¬£¬£¬È·ÈϹÊÕÏÔ´ÓÚ¡°µÇ¼Éí·ÝÑéÖ¤Á÷³ÌȱÏÝ¡±£¬£¬£¬²¢Ðû²¼ÎÊÌâÒÑÐÞ¸´£¬£¬£¬ÏµÍ³ÕýÖð²½»Ö¸´¡£¡£¡£¡£¡£´Ë´Îå´»úÊÂÎñ²¨¼°¹æÄ£ÆÕ±é£¬£¬£¬´ÓÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢Òâ´óÀûµ½Ä«Î÷¸çµÈÈ«Çò¶àµØÓû§¾ù±¨¸æÊÜÓ°Ïì¡£¡£¡£¡£¡£


https://cybernews.com/news/shopify-down-for-thousands-during-cyber-monday-mania/


3. PredatorÌØ¹¤Èí¼þʹÓÃÐÂÐÍѬȾ;¾¶¾ÙÐÐÁãµã»÷¹¥»÷


12ÔÂ4ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÓÉInside Story¡¢HaaretzºÍWAV Research CollectiveÁªºÏÊÓ²ì½ÒÆÆ£¬£¬£¬PredatorÌØ¹¤Èí¼þͨ¹ýÃûΪ¡°°¢À­¶¡¡±µÄÁãµã»÷ѬȾ»úÖÆ£¬£¬£¬½öÐèÉó²é¶ñÒâ¹ã¸æ¼´¿ÉÈëÇÖÌØ¶¨Ä¿µÄ¡£¡£¡£¡£¡£¸Ã»úÖÆ±»Òþ²ØÔÚ¶à¹ú¿Õ¿Ç¹«Ë¾±³ºó£¬£¬£¬»ùÓÚ¡°IntellexaйÃÜÊÂÎñ¡±µÄÄÚ²¿Îļþ¼°ÓªÏúÖÊÁÏ£¬£¬£¬²¢¾­¹ú¼ÊÌØÉâ×éÖ¯¡¢¹È¸èºÍRecorded FutureµÄÊÖÒÕÑо¿Ö¤Êµ¡£¡£¡£¡£¡£AladdinÓÚ2024ÄêÊ״ΰ²ÅÅ£¬£¬£¬Ê¹ÓÃÉÌÒµÒÆ¶¯¹ã¸æÏ½µµÍ÷´«¶ñÒâÈí¼þ£¬£¬£¬Í¨¹ýÐèÇ󷽯½Ì¨£¨DSP£©Ç¿Öƽ«ÎäÆ÷»¯¹ã¸æÍ¶·Åµ½Í¨¹ý¹«¹²IPµØµãµÈ±êʶ·ûʶ±ðµÄÌØ¶¨Ä¿µÄ£¬£¬£¬¹ã¸æ¿É·ºÆðÔÚÈκÎÏÔʾ¹ã¸æµÄÍøÕ¾»òÓ¦ÓÃÖУ¬£¬£¬Íâ¹ÛÓëͨË×¹ã¸æÎÞÒì¡£¡£¡£¡£¡£½öä¯ÀÀ¹ã¸æ¼´¿É´¥·¢Ñ¬È¾£¬£¬£¬ÎÞÐèµã»÷£¬£¬£¬¹ã¸æ»áÖØ¶¨ÏòÖÁIntellexaµÄÎó²îʹÓÃЧÀÍÆ÷¡£¡£¡£¡£¡£¸Ã¹ã¸æÍøÂçÉæ¼°°®¶ûÀ¼¡¢µÂ¹ú¡¢ÈðÊ¿¡¢Ï£À°¡¢ÈûÆÖ·˹¡¢°¢ÁªÇõºÍÐÙÑÀÀûµÈ¶à¹ú¹ã¸æ¹«Ë¾¡£¡£¡£¡£¡£·ÀÓù²½·¥°üÀ¨ÆÁÕÏä¯ÀÀÆ÷¹ã¸æ¡¢Òþ²Ø¹«¹²IPµØµã£¬£¬£¬µ«Ð¹Â¶ÎļþÏÔʾIntellexaÈÔ¿É´Ó¿Í»§ËùÔÚ¹úµÄÒÆ¶¯ÔËÓªÉÌ»ñÊØÐÅÏ¢¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/


4. ÷è÷ëÀÕË÷Èí¼þÉù³Æ¹¥»÷ɽ´ï»ù½Ì»á£¬£¬£¬Ð¹Â¶ÄÚ²¿Ãô¸ÐÊý¾Ý


12ÔÂ4ÈÕ£¬£¬£¬÷è÷ëÀÕË÷Èí¼þ½«É½´ï»ù½Ì»áÁÐÈëÆä°µÍøÐ¹Â¶Ãûµ¥£¬£¬£¬Éù³Æ¶ÔÊý¾Ýй¶ÊÂÎñÈÏÕæ£¬£¬£¬²¢Ðû²¼22ÕŽØÍ¼×÷ΪÈëÇÖÖ¤¾Ý¡£¡£¡£¡£¡£½ØÍ¼ÏÔʾ£¬£¬£¬¹¥»÷Éæ¼°Ó¢¹úʥɽ¸ß¼¶×éÖ¯£¨AOSH UK£©µÄÄÚ²¿È¨ÏÞ£¬£¬£¬°üÀ¨×Ú½ÌÊÂÇéְԱǩ֤´¦Öóͷ£¼Í¼¡¢ÒÆÃñÓöȲ¦¿îÃ÷ϸ£¨ÈçÿÈË2600ÖÁ4500Ó¢°÷µÄǩ֤Óöȣ©¡¢ÔËÓªÖ§³ö¼°»î¶¯ºóÇÚÊý¾Ý¡£¡£¡£¡£¡£ÀýÈ磬£¬£¬Ò»·ÝÔ¤ËãÎļþÏÔʾ£¬£¬£¬Ä³²¦¿îÖÜÆÚÄÚ³¬11500Ó¢°÷ÓÃÓÚǩ֤ÉêÇ룬£¬£¬ÁíÒ»ÎļþÔòÁгö3ÍòÓ¢°÷ÓÃÓÚÓʼþÐû´«¼°½ÚÈպؿ¨·Ö·¢£¬£¬£¬ÉÐÓÐ6351Ó¢°÷ÓÃÓÚ¹ú¼ÊÓÊ×Ê¡¢6000Ó¢°÷ÓÃÓÚÊÓÌý×°±¸²É¹º¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý»¹Éæ¼°°²±£ÍýÏ룬£¬£¬°üÀ¨2024-2025Äê×ܶî½ü10ÍòÓ¢°÷µÄ°²±£Ô¤Ë㣬£¬£¬º­¸ÇËѱ¬È®Ð§ÀÍ¡¢ÒªÔ±±£»£»£»¤¡¢Î§À¸½¨ÉèµÈ£¬£¬£¬ÏêϸÈç74,326Ó¢°÷ÓÃÓÚÒªÔ±±£»£»£»¤ÍŶÓ£¬£¬£¬29,217Ó¢°÷ÓÃÓÚÍâµØÖܱ߰²±£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬²ÆÎñ·¢Æ±¡¢ÒøÐÐÕË»§ÐÅÏ¢¼°»áԱСÎÒ˽¼ÒÊý¾Ý£¨ÈçÈ«Ãû¡¢µç»°¡¢ÂÃÐмͼ£©Ò²±»ÆØ¹â£¬£¬£¬ÀýÈç¡°À­¶¡ÒáÈËʿɨ³ýÀÖ¶Ó2025Äê11Ô¡±±í¸ñ°üÀ¨°¢¸ùÍ¢¡¢°ÍÎ÷µÈ¶à¹úÖ°Ô±µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£


https://hackread.com/qilin-ransomware-church-of-scientology-data-theft/


5. Array AG VPN×°±¸ÏÂÁî×¢ÈëÎó²îÔâºÚ¿ÍʹÓÃ


12ÔÂ4ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃArray AGϵÁÐVPN×°±¸ÖеÄÏÂÁî×¢ÈëÎó²îÖ²Èëwebshell²¢½¨Éè¶ñÒâÓû§¡£¡£¡£¡£¡£Array NetworksÓÚ½ñÄê5ÔÂͨ¹ýÇå¾²¸üÐÂÐÞ¸´Á˸ÃÎó²î£¬£¬£¬µ«Î´·ÖÅÉCVE±êʶ·û£¬£¬£¬µ¼ÖÂÎó²î¸ú×ÙÓë²¹¶¡ÖÎÀíÖØ´ó»¯¡£¡£¡£¡£¡£ÈÕ±¾ÅÌËã»úÓ¦¼±ÏìӦС×飨JPCERT£©Ðû²¼Í¨¸æÖÒÑÔ£¬£¬£¬ºÚ¿Í×Ô8ÔÂÆðÒÑʹÓøÃÎó²î¹¥»÷ÈÕ±¾¾³ÄÚ×éÖ¯£¬£¬£¬¹¥»÷ÕßÊÔͼÔÚ·¾¶/ca/aproxy/webapp/°²ÅÅPHP webshellÎļþ¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìArrayOS AG 9.4.5.8¼°¸üÔç°æ±¾£¬£¬£¬ÓÈÆäÊÇÆôÓÃÁË¡°DesktopDirect¡±Ô¶³Ì»á¼û¹¦Ð§µÄAGϵÁÐÓ²¼þºÍÐéÄâ×°±¸¡£¡£¡£¡£¡£Array Networks AGϵÁÐ×÷ΪÇå¾²»á¼ûÍø¹Ø£¬£¬£¬ÒÀÀµSSL VPN½¨Éè¼ÓÃÜËíµÀ£¬£¬£¬ÆÕ±éÓÃÓÚÆóÒµÔ¶³Ì»á¼ûÍøÂç¡¢Ó¦Óá¢×ÀÃæ¼°ÔÆ×ÊÔ´£¬£¬£¬Í¨³£±»´óÐÍ×éÖ¯ÓÃÓÚÖ§³ÖÔ¶³Ì»òÒÆ¶¯°ì¹«¡£¡£¡£¡£¡£JPCERTÖ¸³ö£¬£¬£¬Array OS 9.4.5.9ÒÑÐÞ¸´¸ÃÎÊÌâ¡£¡£¡£¡£¡£ÈôÎÞ·¨Éý¼¶£¬£¬£¬½¨Òé½ûÓÃËùÓÐδʹÓõÄDesktopDirectЧÀÍ£¬£¬£¬»òͨ¹ýURL¹ýÂË×èÖ¹°üÀ¨·ÖºÅµÄURL»á¼û¡£¡£¡£¡£¡£¾ÝÇå¾²Ñо¿Ô±Yutaka SejiyamaɨÃ裬£¬£¬È«Çò¹²ÓÐ1831¸öArrayAGʵÀý£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÖйú¡¢ÈÕ±¾ºÍÃÀ¹ú£¬£¬£¬ÆäÖÐÖÁÉÙ11̨Ö÷»úÆôÓÃÁËDesktopDirect¹¦Ð§£¬£¬£¬µ«ÏÖʵÊýÄ¿¿ÉÄܸü¸ß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/


6. Companjon°ü¹Ü¿Æ¼¼¹«Ë¾Ì»Â¶ÊýÍòÍòÂÃÐÐÐÅÏ¢¼°PII


12ÔÂ3ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬°ü¹Ü¿Æ¼¼¹«Ë¾CompanjonÒòδÊܱ£»£»£»¤µÄApache KafkaÁ÷й¶Êý°ÙÍòÌõÈÕÖ¾£¬£¬£¬Éæ¼°ÂÃÐÐÐг̡¢È«Ãû¡¢µç×ÓÓʼþµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£CybernewsÍŶÓÓÚ2025Äê8ÔÂÏÂÑ®·¢Ã÷¸ÃÎó²î£¬£¬£¬ÔÚÆßÌìÄڼͼ³¬1500ÍòÌõÊý¾Ý£¬£¬£¬¹ÀËã×Üй¶Á¿¿ÉÄÜ´ï9.6ÒÚÌõ£¬£¬£¬ÆäÖÐÔ¼0.1%£¨Ô¼96ÍòÌõ£©°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£¡£Ð¹Â¶´°¿ÚÆÚΪ8ÔÂ20ÈÕÖÁ28ÈÕ£¬£¬£¬Éæ¼°Trainline¡¢Omio¡¢TripXµÈÂÃÐÐÆ½Ì¨µÄAPI½»»¥Êý¾Ý£¬£¬£¬°üÀ¨Î´À´ÖÁ2026ÄêµÄÂÃÐÐõè¾¶¡¢º½¿Õ¹«Ë¾¡¢ÈÕÆÚ¼°²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£Companjon×÷ΪB2B2CЧÀÍÉÌ£¬£¬£¬ÎªÂÃÐÐÉçµÈÆóÒµÌṩ°ü¹ÜЧÀÍ£¬£¬£¬Í¨¹ýÍøÂçÖÕ¶ËÓû§Êý¾ÝÖ§³ÖÏàÖú·½Íƹã¡£¡£¡£¡£¡£´Ë´Îй¶µÄÈÕÖ¾ÖУ¬£¬£¬²¿·Ö¼Í¼°üÀ¨ÊÚȨÁîÅÆ£¬£¬£¬¹¥»÷ÕßÀíÂÛÉÏ¿ÉʹÓÃÕâЩÐÅÏ¢Ìᳫ½øÒ»²½¹¥»÷£¬£¬£¬ÈçÕ©Æ­»òϵͳÈëÇÖ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬Á¬ÏµÂÃÐС¢²ÆÎñ¼°Î»ÖÃÊý¾Ý£¬£¬£¬¿Í»§ÃæÁٸ߶ÈÕë¶ÔÐÔթƭΣº¦£¬£¬£¬ÀýÈçð³ä¾Æ»ï¼Æ¹¤Íþв×÷·ÏÔ¤¶©ÒÔÆ­È¡¸¶¿î¡£¡£¡£¡£¡£


https://cybernews.com/security/companjon-kafka-leak-travel-data/