CloudflareÀÖ³É×èµ²11.5 Tbps´´¼Í¼DDoS¹¥»÷
Ðû²¼Ê±¼ä 2025-09-041. CloudflareÀÖ³É×èµ²11.5 Tbps´´¼Í¼DDoS¹¥»÷
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬Cloudflare¿ËÈÕÐû²¼ÀÖ³É×èµ²ÁËÒ»³¡·åÖµ´ï11.5 TbpsµÄÊ·ÉÏ×î´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÒÔUDPºéË®¹¥»÷ΪÖ÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÔ´×ԹȸèÔÆÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬²¢³ÉΪһÁ¬ÊýÖܵĹ¥»÷À˳±ÖеÄ×îÈȳ±¡£¡£¡£¡£¡£¡£¡£¾ÝCloudflareÅû¶£¬£¬£¬£¬£¬£¬£¬Æä·ÀÓùϵͳÔÚÒÑÍùÊýÖÜÄÚÒÑ×Ô¶¯×èµ²Êý°Ù´Î³¬´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ×îÐÂÆÆ¼Í¼µÄ¹¥»÷Ò»Á¬Ô¼35Ã룬£¬£¬£¬£¬£¬£¬·åÖµÊý¾Ý°üËÙÂʸߴïÿÃë51ÒÚ¸ö£¬£¬£¬£¬£¬£¬£¬Ô¶³¬½ñÄê6Ô¸ù«Ë¾±¨¸æµÄ7.3 Tbps¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹æÄ£ÔöÌí12%£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ±ÈÍøÂçÇå¾²¼ÇÕß²¼À³¶÷¡¤¿ËÀײ¼Ë¹¼Í¼µÄ´Ëǰ×îá¯ÁëÖµºá¿ç1 Tbps¡£¡£¡£¡£¡£¡£¡£´Ë´Î11.5 TbpsµÄUDPºéË®¹¥»÷Õë¶Ô¼òµ¥IPµØµã£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÿÃë¹¥»÷21,925¸ö¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬·åֵʱ¶Ë¿ÚÂþÑÜÀ©Õ¹ÖÁ34,517¸ö£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÏòÁ¿ÒÔUDPºéˮΪÖ÷£¨Õ¼±È99.996%£©£¬£¬£¬£¬£¬£¬£¬¸¨ÒÔQOTD¡¢Echo¡¢NTP¡¢Mirai¡¢Portmap¼°RIPv1µÈ»ìÏý¹¥»÷ÊֶΡ£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷Á÷Á¿Öش󣬣¬£¬£¬£¬£¬£¬CloudflareµÄ×Ô¶¯»¯·ÀÓùϵͳÈÔÓÐÓÃʶ±ð²¢¹ýÂËÁ˶ñÒâÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬Î´¶Ô¿Í»§ÍøÂçÔì³ÉʵÖÊÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/181829/cyber-crime/cloudflare-blocked-a-record-11-5-tbps-ddos-attack.html
2. Ê¥´ï·ÆÏØÕþ¸®ÍøÕ¾Ô´´úÂëÔâÇÔÊÂÎñ±»Ö¤ÊµÎª¾ÉÊý¾Ýй¶
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÔòÉù³ÆÇÔÈ¡ÃÀ¹úÐÂÄ«Î÷¸çÖÝÊ¥´ï·ÆÏØÕþ¸®ÍøÕ¾Ô´´úÂëµÄÌû×ÓÔÚºÚ¿ÍÂÛ̳Òý·¢¹Ø×¢£¬£¬£¬£¬£¬£¬£¬µ«¾CybernewsÑо¿ÍŶÓÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÏÖʵΪ¹¥»÷ÕßʹÓùýʱÐÅÏ¢¾ÙÐÐ"¿´·¨ÑéÖ¤"µÄ³´×÷ÐÐΪ¡£¡£¡£¡£¡£¡£¡£Ê¥´ï·ÆÏØ×÷ΪÉú³Ý³¬15ÍòµÄÐÐÕþÇøÓò£¬£¬£¬£¬£¬£¬£¬Æä¹Ù·½ÍøÕ¾ÊÇÕþ¸®ÓëÃñÖÚ½»»¥µÄÖ÷Ҫƽ̨£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñËäδÔì³ÉÏÖʵΣº¦£¬£¬£¬£¬£¬£¬£¬È´Ì»Â¶ÁËÍøÂç¹¥»÷Õßͨ¹ýÐû²¼¾ÉÊý¾Ý²©È¡¹Ø×¢µÄÐÂÐÍÊÖ·¨¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÂÛ̳ÖÐÐû³ÆÒÑ»ñȡʥ´ï·ÆÏØÍøÕ¾µÄÔ´´úÂ룬£¬£¬£¬£¬£¬£¬²¢¸½ÉÏÁËÖÎÀíÔ±Óû§Ãû¡¢¹þÏ£ÃÜÂë¡¢Êý¾Ý¿âÄ£×Ó¼°PHP°æ±¾µÈÊý¾Ý¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬CybernewsÍŶӯÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÌṩµÄÊý¾Ý¿âÄ£×Ó½ö¸üÐÂÖÁ2017Ä꣬£¬£¬£¬£¬£¬£¬PHP°æ±¾¸üÊÇ2010ÄêÐû²¼ÇÒÒÑÓÚ2011Äê×èÖ¹Ö§³ÖµÄ³Â¸¯°æ±¾¡£¡£¡£¡£¡£¡£¡£¸üÒªº¦µÄÊÇ£¬£¬£¬£¬£¬£¬£¬±ÈÕÕÄ¿½ñÍøÕ¾ÊµÊ±Á÷Á¿¼Ü¹¹£¬£¬£¬£¬£¬£¬£¬ÆäÊÖÒÕÕ»Óëй¶Êý¾ÝÖеÄÉèÖñ£´æÏÔÖø²î±ð£¬£¬£¬£¬£¬£¬£¬Ö¤Êµ¹¥»÷ÕßÉÏ´«µÄÊµÎªÍøÕ¾2010ÄêÔ¾ɰ汾´úÂ룬£¬£¬£¬£¬£¬£¬¶ÔÏÖÓÐϵͳÎÞʵÖÊÐÔÍþв¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/santa-fe-county-hack-likely-outdated/
3. ¶íÂÞ˹APT28ʹÓá°NotDoor¡±¶ñÒâÈí¼þ¹¥»÷Microsoft Outlook
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬Î÷°àÑÀÍøÂçÇå¾²¹©Ó¦ÉÌS2 GrupoµÄÍþвÇ鱨ʵÑéÊÒLAB52ÓÚ2025Äê9ÔÂ3ÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬Åû¶ÓɶíÂÞ˹֧³ÖµÄÍøÂçÍþв×éÖ¯APT28¿ª·¢µÄÐÂÐÍOutlookºóÃÅ¡°NotDoor¡±¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚVisual Basic for Applications£¨VBA£©¹¹½¨£¬£¬£¬£¬£¬£¬£¬Í¨¹ýOutlookÊÂÎñÇý¶¯´¥·¢Æ÷£¨ÈçÆô¶¯Ê±Application_MAPILogonCompleteºÍÎüÊÕÐÂÓʼþʱApplication_NewMailEx£©¼¤»î£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡¢ÎļþÉÏ´«¼°í§ÒâÏÂÁîÖ´Ðй¦Ð§¡£¡£¡£¡£¡£¡£¡£NotDoor½ÓÄÉ´úÂë»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ëæ»ú»¯±äÁ¿ÃûºÍ×Ô½ç˵Base64±àÂ루¸½¼ÓÀ¬»ø×Ö·ûÄ£Äâ¼ÓÃÜ£©£¬£¬£¬£¬£¬£¬£¬²¢Î±×°³ÉÕýµ±ºê¹æ±Ü¼ì²â¡£¡£¡£¡£¡£¡£¡£Æäͨ¹ýÊðÃûµÄ΢Èí¶þ½øÖÆÎļþOneDrive.exe¾ÙÐÐDLL²à¼ÓÔØ£¬£¬£¬£¬£¬£¬£¬¼ÓÔØ¶ñÒâSSPICLI.dll°²ÅźóÃÅ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÐÞ¸ÄOutlook×¢²á±íÉèÖýûÓÃÇå¾²ÖÒÑÔ¡¢ÆôÓú겢ÒÖÖÆ¶Ô»°¿òÌáÐÑ£¬£¬£¬£¬£¬£¬£¬È·¼á³¤ÆÚ»¯¾²Ä¬ÔËÐС£¡£¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ý½«Êܺ¦ÕßÊý¾ÝÍâйÖÁ¹¥»÷Õß¿ØÖƵÄÓÊÏ䣬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃwebhook.site¾ÙÐÐDNSºÍHTTP»Øµ÷ÑéÖ¤£¬£¬£¬£¬£¬£¬£¬½¨ÉèÒþ²ØÍ¨Ñ¶¡£¡£¡£¡£¡£¡£¡£ÆäÄ£¿£¿£¿é»¯Éè¼ÆÖ§³Ö¶¯Ì¬¸üд¥·¢Æ÷ºÍÏÂÁ£¬£¬£¬£¬£¬£¬ÔöÇ¿¼ì²âÄѶȡ£¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/russia-apt28-notdoor-outlook/
4. È«Çò×î´ó²»·¨ÌåÓýÖ±²¥Æ½Ì¨StreameastÔâ¶à¹úÁªºÏ¹¥»÷
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ÓÉ´´ÒâÓëÓéÀÖͬÃË£¨ACE£©Óë°£¼°Õþ¸®ÁªºÏ¿ªÕ¹µÄרÏîÐж¯Àֳɵ·»ÙÈ«Çò×î´ó²»·¨ÌåÓýÖ±²¥Á÷ýÌåÍøÂçStreameast£¬£¬£¬£¬£¬£¬£¬²¢¾Ð²¶Á½Ãû¹ØÁªÖ°Ô±¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨×Ô2018ÄêÆðÔËÓª£¬£¬£¬£¬£¬£¬£¬ÒÀÍÐ¹ã¸æÖ§³ÖµÄÃâ·Ñģʽ£¬£¬£¬£¬£¬£¬£¬Ìṩ¸ßÇåµÁ²¥ÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬ÁýÕÖÈ«Çò80¸öÓòÃû£¬£¬£¬£¬£¬£¬£¬Ô»á¼ûÁ¿·åÖµ´ï1.36ÒڴΣ¬£¬£¬£¬£¬£¬£¬ÒÑÍùÒ»Äê×Ü»á¼ûÁ¿Í»ÆÆ16ÒڴΣ¬£¬£¬£¬£¬£¬£¬Óû§Ö÷Òª¼¯ÖÐÓÚÃÀ¹ú¡¢¼ÓÄôó¡¢Ó¢¹ú¡¢·ÆÂɱö¼°µÂ¹ú¡£¡£¡£¡£¡£¡£¡£StreameastµÄ½¹µãÇÖȨÐÐΪ°üÀ¨Î´¾ÊÚȨֱ²¥Å·ÖÞÎå´ó×ãÇòÁªÈü£¨Ó¢³¬¡¢Î÷¼×¡¢µÂ¼×µÈ£©¡¢¹ú¼Ê×ãÁªÌìϱ¡¢Å·ÖÞ±µÈ¹ú¼Ò¶ÓÈüÊ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°NFL¡¢NBA¡¢F1µÈÃÀ¹úÖ÷Á÷ÌåÓýÈüÊ¡£¡£¡£¡£¡£¡£¡£ÆäÊÖÒռܹ¹Í¨¹ý¶àÓòÃûÌø×ª¹æ±Ü·â±Õ£¬£¬£¬£¬£¬£¬£¬ÁùÌìǰÊ״ηºÆðÔËÓªÖÐÖ¹¼£Ï󣬣¬£¬£¬£¬£¬£¬Óû§·´ÏìÍøÕ¾ÎÞ·¨»á¼û»òÁ÷ýÌå¼ÓÔØÒì³£¡£¡£¡£¡£¡£¡£¡£°£¼°¼ªÈøÊ¡Ð»ºÕÔúÒÁµÂÊо¯·½ÔÚÐж¯Öвé»ñÌõ¼Ç±¾µçÄÔ¡¢ÖÇÄÜÊÖ»ú¡¢Ïֽ𼰶àÕÅÐÅÓÿ¨¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸Ãƽ̨Óë°¢ÁªÇõÒ»¼Ò¿Õ¿Ç¹«Ë¾±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬£¬ÉæÏÓ×Ô2010ÄêÆðͨ¹ý¹ã¸æÊÕÈëÏ´Ç®620ÍòÃÀÔª¼°20ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÔÊôÓÚStreameastµÄ80¸öÓòÃûÒѴ󲿷ÖÖØ¶¨ÏòÖÁACEµÄ¡°Õýµ±Ô¢Ä¿¡±ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬µ«²¿·ÖÓòÃûÈÔ¿É»á¼û£¬£¬£¬£¬£¬£¬£¬ÌåÏÖ¿ÉÄܱ£´æÎ´²é·âÓòÃû»òÐÂÓòÃû×¢²á¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/streameast-the-largest-pirated-sports-platform-disrupted-by-police/
5. SaaS¾ÞÍ·WorkivaÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬Workiva×÷ΪÁìÏȵÄÔÆSaaSЧÀÍÉÌ£¬£¬£¬£¬£¬£¬£¬×¨×¢²ÆÎñ±¨¸æ¡¢ºÏ¹æ¼°Éó¼ÆÊý¾ÝÖÎÀí£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍ6305¼Ò¿Í»§£¬£¬£¬£¬£¬£¬£¬2024ÄêÔ¤¼ÆÓªÊÕ7.39ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾×ª´ï¿Í»§³Æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½CRMϵͳSalesforce²»·¨»ñÈ¡²¿·Ö¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ÓÊÏä¡¢µç»°¼°Ö§³ÖƱ֤ÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬µ«Workivaƽ̨½¹µãÊý¾ÝδÊܲ¨¼°¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓëShinyHuntersÀÕË÷¼¯ÍŽüÆÚÕë¶ÔSalesforceÉú̬µÄ¹¥»÷¸ß¶È¹ØÁª¡£¡£¡£¡£¡£¡£¡£¸Ã¼¯ÍÅ×ÔÄêÍ·Æðͨ¹ýÓïÒô´¹ÂÚ£¨vishing£©¼°OAuthÁîÅÆÀÄÓ㬣¬£¬£¬£¬£¬£¬ÉøÍ¸¶à¼ÒÆóÒµSalesforceʵÀý£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬±¾´Î¹¥»÷·¾¶Óë½üÆÚ¶àÆð´óÐÍ»ú¹¹Êý¾Ýй¶ģʽÏàËÆ¡£¡£¡£¡£¡£¡£¡£WorkivaÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ÆäCRM¹©Ó¦ÉÌͨ¹ý¹ØÁªµÚÈý·½Ó¦ÓÃ̻¶»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÌáÐÑÊÜÓ°Ïì¿Í»§Ð¡ÐÄÓã²æÊ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÖØÉê¹Ù·½ÏàͬÇþµÀµÄΨһÐÔ£¬£¬£¬£¬£¬£¬£¬¾øÇ·ºà¹ý¶ÌÐÅ»òµç»°Ë÷ÒªÇå¾²ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/
6. ºÚ¿ÍʹÓÃеÄHexStrike-AI¹¤¾ß¿ìËÙʹÓÃn-dayÎó²î
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕý´ó¹æÄ£Ê¹ÓÃÃûΪHexStrike-AIµÄÐÂÐÍÈ˹¤ÖÇÄܹ¥»÷¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬¼ÓËÙÐÂÅû¶n-dayÎó²îµÄÎäÆ÷»¯Àú³Ì¡£¡£¡£¡£¡£¡£¡£CheckPoint Research±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬¸Ã¿ò¼ÜÓë°µÍøÖÐÕë¶ÔCitrixÎó²î£¨ÈçCVE-2025-7775¡¢CVE-2025-7776£©µÄ¿ìËÙʹÓûÇ×½üÏà¹Ø¡£¡£¡£¡£¡£¡£¡£×èÖ¹2025Äê9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈÔÓнü8000¸ö¶ËµãÒ×ÊÜCVE-2025-7775¹¥»÷£¬£¬£¬£¬£¬£¬£¬½ÏǰһÖÜïÔÌ2Íò¸ö£¬£¬£¬£¬£¬£¬£¬µ«Îó²îÅû¶Óë´ó¹æÄ£Ê¹ÓõÄʱ¼ä´°¿ÚÒѼ±¾çËõ¶ÌÖÁÊýСʱ¡£¡£¡£¡£¡£¡£¡£HexStrike-AIÓÉÍøÂçÇå¾²Ñо¿Ô±Muhammad Osama¿ª·¢£¬£¬£¬£¬£¬£¬£¬ÔΪÕýµ±ºì¶Ó¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¼¯³ÉAIÊðÀí¿É×ÔÖ÷ÔËÐÐ150ÓàÖÖÍøÂçÇå¾²¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÉøÍ¸²âÊÔÓëÎó²î·¢Ã÷µÄ×Ô¶¯»¯¡£¡£¡£¡£¡£¡£¡£Æä¿Í»§¶Ë¾ß±¸ÖØÊÔÂß¼Óë»Ö¸´´¦Öóͷ£ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬¿É×Ô¶¯µ÷½âÉèÖÃÖ±ÖÁ²Ù×÷Àֳɡ£¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ß¿ªÔ´ºóѸËÙ×ߺ죬£¬£¬£¬£¬£¬£¬GitHub»ñ1800ÐDZêÓ볬400´Îfork£¬£¬£¬£¬£¬£¬£¬È´Ò²Òý·¢ºÚ¿Í¹Ø×¢¡£¡£¡£¡£¡£¡£¡£¾ÝCheckPointÅû¶£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÂÛ̳ÒÑ·ºÆð¸Ã¹¤¾ßµÄ°²ÅÅÌÖÂÛ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÆäÕë¶ÔCitrix NetScaler ADC¼°GatewayÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬ÊµÏÖδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊÜѬȾװ±¸Ö²ÈëWebshell£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ¹ûÕæ³öÊÛÊÜ¿ØÊµÀý¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/


¾©¹«Íø°²±¸11010802024551ºÅ