µÂ¹úÁª°î½ðÈÚ¼à¹Ü¾ÖµÄÍøÕ¾Ôâµ½DDoS¹¥»÷ÔÝʱÖжÏ
Ðû²¼Ê±¼ä 2023-09-061¡¢µÂ¹úÁª°î½ðÈÚ¼à¹Ü¾ÖµÄÍøÕ¾Ôâµ½DDoS¹¥»÷ÔÝʱÖжÏ
¾ÝýÌå9ÔÂ5ÈÕ±¨µÀ£¬µÂ¹úÁª°î½ðÈÚ¼à¹Ü¾Ö(BaFin)µÄÍøÕ¾Ôâµ½DDoS¹¥»÷£¬·þÎñÖжÏÊýÌì¡£BaFinÊÇÁ¥ÊôÓڵ¹ú²ÆÕþ²¿µÄ½ðÈÚ¼à¹Ü»ú¹¹£¬ÂôÁ¦¼à¹Ü2700¼ÒÒøÐС¢800¼Ò½ðÈÚºÍ700¼Ò±£ÏÕ·þÎñÌṩÉÌ¡£¹¥»÷¿ªÊ¼ÓÚ9ÔÂ1ÈÕ£¬BaFin³ÆÒѽÓÄɳäʵµÄÄþ¾²Ô¤·À´ëÊ©ºÍÓÐЧµÄ·ÀÓù´ëÊ©¡£BaFinµÄÍøÕ¾bafin.deÖжϣ¬µ«¸Ã»ú¹¹³ÆÆäËüϵͳ¾ùδÊܵ½Ó°Ïì¡£Éв»Çå³þ´Ë´Î¹¥»÷µÄÄ»ºóºÚÊÖ£¬µ«KillnetÔøÓÚ1Ô·ݽ«BaFinÍøÕ¾Ìí¼Óµ½ÆäÔÚTelegramÉÏÐû²¼µÄÄ¿±êÁбíÖС£½ØÖÁĿǰ£¬ÍøÕ¾ËƺõÒÑÍêÈ«»Ö¸´¡£
https://securityaffairs.com/150359/hacking/ddos-attack-on-bafin.html
2¡¢LockBit¹¥»÷Zaun¹«Ë¾²¢¹ûÈ»´óÁ¿Ó¢¹ú¾üÊÂÏà¹ØÐÅÏ¢
¾Ý9ÔÂ4ÈÕ±¨µÀ£¬LockBit¹ûÈ»ÁË´óÁ¿ÓëÓ¢¹ú¾üʺÍÇ鱨վµãÏà¹ØµÄÐÅÏ¢¡£Î§À¸ÏµÍ³ÖÆÔìÉÌZaun³Æ£¬ÆäÓÚ8ÔÂ5ÈÕÖÁ6ÈÕÔâµ½ÁËLockBitµÄ¹¥»÷£¬²¢Í¸Â¶¹¥»÷ÊÇͨ¹ýһ̨Windows 7 PC½øÐеģ¬¿ÉÄÜÒÑй¶10 GBµÄÊý¾Ý¡£LockBitÓÚ8ÔÂ13ÈÕ¹ûÈ»Á˴˴ι¥»÷£¬²¢ÒªÇóZaunÔÚ8ÔÂ29ÈÕ½»Êê½ð¡£ZaunÈÏΪϵͳÉÏûÓд洢»òй¶ÈκλúÃÜÎļþ£¬µ«Daily Mirror³Æ£¬LockBit Ðû²¼µÄÊýǧҳÎļþ£¬Éæ¼°ÁËÓ¢¹ú¿ËÀ³µÂº£¾ü»ùµØ£¨HMNB Clyde£©ºËDZͧ»ùµØ¡¢²¨¶ÙÌÆ»¯Ñ§ÎäÆ÷ʵÑéÊÒºÍλÓÚ¿µÎÖ¶û²¼µÂµÄGCHQͨÐÅÖÐÐÄ¡£
https://www.infosecurity-magazine.com/news/sensitive-data-uk-army-potentially/
3¡¢Freecycle͸¶ӰÏìÁè¼Ý700ÍòÓû§µÄÊý¾Ýй¶Ê¼þ
ýÌå9ÔÂ4Èճƣ¬ÔÚÏßÂÛ̳FreecycleÅû¶ÁËÓ°ÏìÁè¼Ý700ÍòÓû§µÄ´ó¹æÄ£Êý¾Ýй¶Ê¼þ¡£5ÔÂ30ÈÕ£¬ºÚ¿ÍÔÚÒ»¸öÂÛ̳ÉϳöÊÛ±»µÁÊý¾Ý¡£FreecycleÔÚ8ÔÂ30ÈÕÒâʶµ½´Ë´Îй¶Ê¼þ£¬²¢ÌáÐÑÊÜÓ°ÏìµÄÓû§Á¢¼´¸ü»»ÃÜÂë¡£¾ÝϤ£¬Ð¹Â¶ÐÅÏ¢°üÂÞÓû§Ãû¡¢Óû§ID¡¢ÓʼþµØÖ·ºÍMD5¹þÏ£ÃÜÂë¡£´Ó¹¥»÷ÕßÐû²¼µÄ½ØÍ¼À´¿´£¬FreecycleÊ×´´È˼æÖ´ÐжÊÂµÄÆ¾¾Ý±»µÁ£¬µ¼Ö¹¥»÷ÕßÄܹ»ÍêÈ«·ÃÎÊ»áÔ±ÐÅÏ¢ºÍÂÛ̳Ìû×Ó¡£
https://www.bleepingcomputer.com/news/security/freecycle-confirms-massive-data-breach-impacting-7-million-users/
4¡¢»ªË¶Â·ÓÉÆ÷ÖеÄ3¸ö´úÂëÖ´ÐЩ¶´¿ÉÄܵ¼ÖÂÉ豸½Ù³Ö
9ÔÂ5ÈÕ±¨µÀ³Æ£¬3¸öÓ°ÏìÁË»ªË¶RT-AX55¡¢RT-AX56U_V2ºÍRT-AC86U·ÓÉÆ÷µÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¬¿ÉÄܻᵼÖÂÉ豸½Ù³Ö¡£ÕâЩ©¶´·Ö±ðΪȱ·¦¶ÔiperfÏà¹ØAPIÄ£¿éser_iperf3_svr.cgiÉϵÄÊäÈë¸ñʽ×Ö·û´®ÕýÈ·ÑéÖ¤µÄ©¶´£¨CVE-2023-39238£©¡¢Í¨ÓÃÉèÖú¯ÊýµÄAPIÖÐȱ·¦¶ÔÊäÈë¸ñʽ×Ö·û´®ÕýÈ·ÑéÖ¤µÄ©¶´£¨CVE-2023-39239£©ºÍȱ·¦¶ÔiperfÏà¹ØAPIÄ£¿éser_iperf3_cli.cgiÉϵÄÊäÈë¸ñʽ×Ö·û´®ÕýÈ·ÑéÖ¤µÄ©¶´£¨CVE-2023-39240£©¡£Ä¿Ç°£¬ÕâЩ©¶´Òѱ»ÐÞ¸´¡£
https://www.bleepingcomputer.com/news/security/asus-routers-vulnerable-to-critical-remote-code-execution-flaws/
5¡¢Ó¡¶È¼Ö¿²µÂ°îAYUSH²¿32Íò¶à»¼ÕßµÄÐÅÏ¢±»Ðû²¼ÔÚ°µÍø
ýÌå9ÔÂ4ÈÕ±¨µÀ£¬ºÚ¿ÍTanakaÔÚ°µÍøÐû²¼ÁËÒ»¸öÃûΪbitsphere[.]inµÄÊý¾Ý¿â¡£¸ÃÊý¾Ý¿â¾ÞϸΪ7.3MB£¬°üÂÞÁè¼Ý32ÍòÌõ»¼ÕßµÄPIIºÍÒ½ÁÆÕï¶ÏÐÅÏ¢£¬500¸öµÇ¼ƾ¾ÝºÍÃ÷ÎÄÃÜÂ룬ÒÔ¼°472ÌõÒ½ÉúPIIÐÅÏ¢µÈ¼Ç¼¡£ÊӲ췢ÏÖ£¬ÕâЩÊý¾ÝÈ¡×Ôbitsphere.in¿ª·¢µÄayush.jharkhand.gov.in·þÎñÆ÷¡£Ayush.jharkhand.gov.inÊÇÓ¡¶È¼Ö¿²µÂ°îµÄÕþ¸®²¿ÃÅAYUSHµÄ¹Ù·½ÍøÕ¾¡£
https://www.cloudsek.com/threatintelligence/3-20-000-patient-records-from-ayush-jharkhand-gov-in-shared-on-dark-web-hacking-forums
6¡¢Ñо¿ÈËÔ±Åû¶ÀûÓÃÁ½¸öMinIO©¶´µÄ¹¥»÷»î¶¯µÄϸ½Ú
¾Ý9ÔÂ4ÈÕ±¨µÀ£¬Security JoesÑо¿ÈËÔ±¼ì²âµ½¹¥»÷ÕßÕýÔÚÀûÓýüÆÚµÄÁ½¸öMinIO©¶´À´¹¥»÷¹¤¾ß´æ´¢ÏµÍ³¡¢·ÃÎÊÐÅÏ¢²¢Ö´ÐÐÈÎÒâ´úÂë¡£±»ÀûÓõÄ©¶´·Ö±ðΪÐÅϢй¶©¶´£¨CVE-2023-28432£©ºÍÌáȨ©¶´£¨CVE-2023-28434£©£¬ÒÑÓÚ3ÔÂ3ÈÕÅû¶²¢ÐÞ¸´¡£¹¥»÷ÕßÊÔͼ°²×°MinIOµÄÐ޸İ汾Evil MinIO£¬Æä¿ÉÔÚGitHubÉÏ»ñÈ¡¡£Evil MinIO½áºÏÀûÓÃÁËÁ½¸ö©¶´£¬ÓÃÐ޸ĺóµÄ´úÂëÌæ»»MinIOÈí¼þ£¬Ìí¼ÓÁËÔ¶³Ì·ÃÎʺóÃÅ¡£¹¥»÷Õß»¹»á½øÐÐһЩÉ繤¹¥»÷£¬ÒÔ˵·þÄ¿±ê½«MinIO½µ¼¶µ½Êܵ½Â©¶´Ó°ÏìµÄÔçÆÚ°æ±¾¡£
https://securityaffairs.com/150308/breaking-news/minio-storage-system-exploit.html