°¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ® £¬£¬£¬ £¬£¬£¬£¬¿Í»§ÐÅÏ¢Ôâй¶

Ðû²¼Ê±¼ä 2025-05-22

1. °¢µÏ´ï˹ÍÁ¶úÆäº«¹ú¹«Ë¾½ÓÁ¬ÓöÏ® £¬£¬£¬ £¬£¬£¬£¬¿Í»§ÐÅÏ¢Ôâй¶


5ÔÂ20ÈÕ £¬£¬£¬ £¬£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾È·ÈÏÆäϵͳÔâδ¾­ÊÚȨ»á¼û £¬£¬£¬ £¬£¬£¬£¬µ¼Ö¿ͻ§ÐÅϢй¶¡£ ¡£¡£¾Ý¡¶×ÔÓɱ¨¡·±¨µÀ £¬£¬£¬ £¬£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÒÑÁªÏµ¿ÉÄÜÊÜÓ°ÏìµÄ¿Í»§ £¬£¬£¬ £¬£¬£¬£¬ÆäÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚµÈСÎÒ˽¼ÒÐÅÏ¢ÒÉËÆÔںڿ͹¥»÷ÖÐй¶¡£ ¡£¡£5ÔÂ16ÈÕ°¢µÏ´ï˹º«¹ú¹«Ë¾Ò²Ïò¿Í»§Ðû²¼ÁËÀàËÆÐÅÏ¢ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß»ñÈ¡ÁËÏÕЩÏàͬµÄÒ»×麫¹ú¿Í»§ÐÅÏ¢¡£ ¡£¡£²»¹ý £¬£¬£¬ £¬£¬£¬£¬ÔÚÕâÁ½ÆðÊÂÎñÖÐ £¬£¬£¬ £¬£¬£¬£¬°¢µÏ´ï˹¾ùδÃ÷È·¹¥»÷ÀàÐͼ°ÊÜÓ°ÏìÈËÊý¡£ ¡£¡£±¨µÀÖ¸³ö £¬£¬£¬ £¬£¬£¬£¬°¢µÏ´ï˹ÍÁ¶úÆä¹«Ë¾ÔâÊܵĹ¥»÷̻¶ÁËÁªÏµ¹ý¿Í·þµÄ¿Í»§ £¬£¬£¬ £¬£¬£¬£¬¶øÕë¶Ôº«¹ú¹«Ë¾µÄ¹¥»÷ÊÂÎñÖÐ £¬£¬£¬ £¬£¬£¬£¬Î¥¹æÍ¨ÖªÍ¬ÑùÖ¸Ïò¿Í·þ²¿·Ö £¬£¬£¬ £¬£¬£¬£¬ÕâÅú×¢¸ÃÆ·ÅÆ¿Í»§¿ÉÄÜÃæÁÙÈ«ÇòÐÔΣº¦¡£ ¡£¡£±ðµÄ £¬£¬£¬ £¬£¬£¬£¬°¢µÏ´ï˹ǿµ÷ £¬£¬£¬ £¬£¬£¬£¬ÔÚÕâÁ½ÆðÊÂÎñÖÐ £¬£¬£¬ £¬£¬£¬£¬ÏµÍ³ÔâÈëÇÖʱ´ú²ÆÎñÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ý²¢Î´Êܵ½Ó°Ïì¡£ ¡£¡£µ«É¥Ê§Ð¡ÎÒ˽¼ÒÐÅÏ¢ÎÞÒÉ»áÔöÌí¿Í»§ÔâÊÜÍøÂç¹¥»÷µÄΣº¦ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉí·Ý͵ÇÔºÍÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬Èçð³ä×ÅÃûÆ·ÅÆÒªÇóÌá¹©ÌØÊâСÎÒ˽¼ÒÐÅÏ¢»ò¸¶¿î £¬£¬£¬ £¬£¬£¬£¬»òÓÕÆ­Óû§Í¸Â¶¸ü¶àÃô¸ÐÐÅÏ¢¡£ ¡£¡£


https://cybernews.com/privacy/adidas-second-data-breach-customers-exposed/


2. Ó¢ÎïÁ÷¹«Ë¾Peter Green ChilledÔâÀÕË÷¹¥»÷


5ÔÂ20ÈÕ £¬£¬£¬ £¬£¬£¬£¬Peter Green Chilled×÷Ϊһ¼Ò×ܲ¿Î»ÓÚÓ¢¹úµÄÎïÁ÷¹«Ë¾ £¬£¬£¬ £¬£¬£¬£¬ÓëTesco¡¢AldiºÍSainsbury'sµÈ´óÐÍÁãÊÛÉÌÏàÖú £¬£¬£¬ £¬£¬£¬£¬Æä²¿·ÖϵͳÔÚÂêɯ°Ù»õÔâÊÜÍøÂç¹¥»÷ºó²»µ½Ò»¸öÔÂÒ²Ôâµ½Á˼ÓÃÜ¡£ ¡£¡£¾ÝÓ¢¹ú¹ã²¥¹«Ë¾±¨µÀ £¬£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßÓÚÖÜÈý¼ÓÃÜÁ˸ù«Ë¾Êý¾Ý £¬£¬£¬ £¬£¬£¬£¬ÈÅÂÒÁËÆäÔËÓª £¬£¬£¬ £¬£¬£¬£¬ÆÆËðÁËÎïÁ÷ϵͳ¡£ ¡£¡£¸Ã¹«Ë¾ÕýÔÚÓ¦¶ÔÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ïÈëÇÖϵͳ¡¢¼ÓÃÜÊý¾Ý²¢Ë÷ÒªÊê½ð¡£ ¡£¡£ÔËÓªÖÐÖ¹¶ÔÎïÁ÷¹«Ë¾Ó°ÏìÃô¸Ð £¬£¬£¬ £¬£¬£¬£¬¿ÉÄܵ¼Ö½»¸¶ÑÓ³Ù £¬£¬£¬ £¬£¬£¬£¬½ø¶øÓ°ÏìÕû¸ö¹©Ó¦Á´¡£ ¡£¡£ÐÅÏ¢Çå¾²Ñо¿Ô±Aras NazarovasÖ¸³ö £¬£¬£¬ £¬£¬£¬£¬´ËÀ๥»÷¿ÉÄÜʹ¹«Ë¾ÏÝÈë̱»¾ £¬£¬£¬ £¬£¬£¬£¬ÉõÖÁÔÝʱÎÞ·¨Îª×ÅÃûÆ·ÅÆÌṩЧÀÍ £¬£¬£¬ £¬£¬£¬£¬µ¼Ö³¬ÊÐÌØ¶¨²úÆ·ÔÝʱǷȱ¡£ ¡£¡£ÐÅÏ¢Ç徲רҵЭ»áISACAµÄÊ×ϯȫÇòÕ½ÂÔ¹ÙChris DimitriadisÒÔΪ £¬£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷±ê¼Ç×ÅÒ»¸öÁîÈ˵£ÐĵÄÇ÷ÊÆ £¬£¬£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó²»µ«Ãé×¼ÖÁ¹«Ë¾»òÒªº¦»ù´¡ÉèÊ© £¬£¬£¬ £¬£¬£¬£¬»¹¹¥»÷¹©Ó¦Á´ £¬£¬£¬ £¬£¬£¬£¬´øÀ´½»¸¶ÖÐÖ¹¡¢¿â´æÆÌÕźͲÆÎñËðʧµÈÏÖʵЧ¹û¡£ ¡£¡£


https://cybernews.com/security/retail-logistics-ransomware-tesco-aldi/


3. Lumma¶ñÒâÈí¼þÐж¯±»×è¶Ï £¬£¬£¬ £¬£¬£¬£¬2300¸öÓòÃû±»²é·â


5ÔÂ21ÈÕ £¬£¬£¬ £¬£¬£¬£¬È«ÇòÕë¶ÔLumma¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©ÐÅÏ¢ÇÔÈ¡Ðж¯Õö¿ªÐ­Í¬ÆÆË𠣬£¬£¬ £¬£¬£¬£¬Àֳɲé»ñÊýǧ¸öÓòÃûÒÔ¼°²¿·Ö»ù´¡ÉèÊ©Ö÷¸É¡£ ¡£¡£´Ë´ÎÐж¯¹æÄ£½Ï´ó £¬£¬£¬ £¬£¬£¬£¬Éæ¼°¶à¼Ò¿Æ¼¼¹«Ë¾ÓëÖ´·¨»ú¹¹¡£ ¡£¡£Î¢ÈíÓÚ2025Äê5ÔÂ13ÈÕ½ÓÄÉÖ´·¨Ðж¯ £¬£¬£¬ £¬£¬£¬£¬²é·âÁËÔ¼2300¸öÓòÃû¡£ ¡£¡£ÃÀ¹ú˾·¨²¿Ò²Æð¾¢Ðж¯ £¬£¬£¬ £¬£¬£¬£¬²é·âÁËLummaµÄ¿ØÖÆÃæ°å £¬£¬£¬ £¬£¬£¬£¬²¢µ·»ÙÁËÏòÍøÂç·¸·¨·Ö×Ó³ö×â¶ñÒâÈí¼þµÄÊг¡¡£ ¡£¡£Óë´Ëͬʱ £¬£¬£¬ £¬£¬£¬£¬Å·ÖÞÐ̾¯×é֯ŷÖÞÍøÂç·¸·¨ÖÐÐĺÍÈÕ±¾ÍøÂç·¸·¨¿ØÖÆÖÐÐÄЭÖú²é·âÁËλÓÚÅ·ÖÞºÍÈÕ±¾µÄ»ù´¡ÉèÊ©¡£ ¡£¡£Î¢ÈíÊý×Ö·¸·¨²¿·ÖÖúÀí×ÜÖ´·¨ÕÕÁÏÌåÏÖ £¬£¬£¬ £¬£¬£¬£¬ÔÚ2025Äê3ÔÂ16ÈÕÖÁ5ÔÂ16ÈÕʱ´ú £¬£¬£¬ £¬£¬£¬£¬È«ÇòÓÐÁè¼Ý39.4Íǫ̀WindowsÅÌËã»úѬȾÁ˸öñÒâÈí¼þ £¬£¬£¬ £¬£¬£¬£¬Î¢ÈíÓë¶à²¿·ÖϸÃÜÏàÖú £¬£¬£¬ £¬£¬£¬£¬ÀÖ³ÉÇжÏÁ˸öñÒâÈí¼þÓëÊܺ¦ÕßÖ®¼äµÄͨѶ¡£ ¡£¡£Cloudflare·½Ãæ³Æ £¬£¬£¬ £¬£¬£¬£¬´Ë´ÎÐж¯Ê¹LummaÔËÓªÉÌÎÞ·¨»á¼û¿ØÖÆÃæ°åµÈÒªº¦ÉèÊ© £¬£¬£¬ £¬£¬£¬£¬¸øÆä´øÀ´ÁËÔËÓªºÍ²ÆÎñ±¾Ç®¡£ ¡£¡£¼ÓÈë´Ë´ÎÁªºÏÐж¯µÄ¹«Ë¾³ýÁË΢ÈíÍâ £¬£¬£¬ £¬£¬£¬£¬ÉÐÓÐESET¡¢CleanDNSµÈ¡£ ¡£¡£Lumma×÷ΪһÖÖ¶ñÒâÈí¼þ¼´Ð§ÀÍÐÅÏ¢ÇÔÈ¡³ÌÐò £¬£¬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔWindowsºÍmacOSϵͳ £¬£¬£¬ £¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÖ»ÐèÆÆ·Ñ250ÃÀÔªµ½1000ÃÀÔª¼´¿É¶©ÔÄ×âÓᣠ¡£¡£Ëü¾ß±¸ÏȽøµÄÌӱܺÍÊý¾ÝÇÔÈ¡¹¦Ð§ £¬£¬£¬ £¬£¬£¬£¬Í¨¹ý¶àÖÖÇþµÀÈö²¥²¢Ñ¬È¾Êܺ¦Õß £¬£¬£¬ £¬£¬£¬£¬ÈëÇÖϵͳºó¿ÉÇÔÈ¡¶àÖÖÊý¾Ý £¬£¬£¬ £¬£¬£¬£¬ÍøÂçºó·¢Ëͻع¥»÷ÕßЧÀÍÆ÷¾ÙÐгöÊÛ»òÓÃÓÚÆäËû¹¥»÷¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/lumma-infostealer-malware-operation-disrupted-2-300-domains-seized/


4. 3AMÀÕË÷Èí¼þʹÓõç×ÓÓʼþºäÕ¨ÓëαÔìµç»°¾ÙÐй¥»÷


5ÔÂ21ÈÕ £¬£¬£¬ £¬£¬£¬£¬3AMÀÕË÷Èí¼þÁ¥Êô»ú¹¹Õý½ÓÄɸ߶ÈÕë¶ÔÐԵĹ¥»÷ÊÖ¶Î £¬£¬£¬ £¬£¬£¬£¬Í¨¹ýµç×ÓÓʼþºäÕ¨ºÍαÔìµÄITÖ§³Öµç»° £¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌѧÓÕÆ­Ô±¹¤ÌṩԶ³Ì»á¼û¹«Ë¾ÏµÍ³µÄƾ֤¡£ ¡£¡£Sophos±¨¸æÏÔʾ £¬£¬£¬ £¬£¬£¬£¬ÔÚ2024Äê11ÔÂÖÁ2025Äê1ÔÂʱ´ú £¬£¬£¬ £¬£¬£¬£¬ÖÁÉÙÓÐ55Æð¹¥»÷ʹÓÃÁ˸ÃÊÖÒÕ £¬£¬£¬ £¬£¬£¬£¬Éæ¼°Á½¸ö²î±ðµÄÍþв¼¯Èº¡£ ¡£¡£ÕâЩ¹¥»÷ÑØÏ®ÁËBlackBastaµÄϰÓÃÊÖ·¨ £¬£¬£¬ £¬£¬£¬£¬°üÀ¨µç×ÓÓʼþºäÕ¨¡¢Í¨¹ýMicrosoft Teams¾ÙÐÐÓïÒô´¹ÂÚ¼°ÀÄÓÃQuick Assist¡£ ¡£¡£Black BastaÄÚ²¿¶Ô»°µÄй¶ΪÆäËûÍþвÐÐΪÕßÌṩÁË¿ÉʹÓõÄÄ£°å £¬£¬£¬ £¬£¬£¬£¬ÖúÆä¿ìËÙÕÆÎÕÇéÐΡ£ ¡£¡£2025ÄêµÚÒ»¼¾¶È £¬£¬£¬ £¬£¬£¬£¬3AMÀÕË÷Èí¼þÕë¶ÔSophos¿Í»§¶ËÌᳫ¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬½ÓÄÉÀàËÆÒªÁ쵫¸ÄÓÃÕæÊµµç»°ÍøÂç´¹ÂÚ¡£ ¡£¡£¹¥»÷ÕßαÔìÄ¿µÄÕæÊµIT²¿·Öµç»°ºÅÂë £¬£¬£¬ £¬£¬£¬£¬ÔÚÈý·ÖÖÓÄÚ·¢ËÍ24·âδÇëÇóÓʼþ¾ÙÐкäÕ¨ £¬£¬£¬ £¬£¬£¬£¬²¢Ëµ·þÔ±¹¤·­¿ªMicrosoft Quick AssistÊÚÓèÔ¶³Ì»á¼ûȨÏÞ¡£ ¡£¡£Ëæºó £¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß´ÓÓÕÆ­ÓòÏÂÔØ²¢ÌáÈ¡¶ñÒâµµ°¸ £¬£¬£¬ £¬£¬£¬£¬°üÀ¨VBS¾ç±¾¡¢QEMUÄ£ÄâÆ÷ºÍԤװQDoorºóÃŵÄWindows 7Ó³Ïñ £¬£¬£¬ £¬£¬£¬£¬Ê¹ÓÃQEMUÌӱܼì²â £¬£¬£¬ £¬£¬£¬£¬ÊµÏÖÒ»Á¬ÇÒδ±»·¢Ã÷µÄÍøÂç»á¼û¡£ ¡£¡£¹¥»÷Õßͨ¹ýWMICºÍPowerShell¾ÙÐÐÕì̽ £¬£¬£¬ £¬£¬£¬£¬½¨ÉèÍâµØÖÎÀíÔ±ÕÊ»§¡¢×°ÖÃÉÌÒµRMM¹¤¾ßXEOXRemote²¢ÆÆËðÓòÖÎÀíÔ±ÕÊ»§¡£ ¡£¡£Ö»¹ÜSophos²úÆ·×èÖ¹Á˺áÏòÒÆ¶¯ºÍ·ÀÓùÍ£ÓÃʵÑé £¬£¬£¬ £¬£¬£¬£¬µ«¹¥»÷ÕßÈÔʹÓÃGoodSync¹¤¾ß½«868GBÊý¾Ýй¶µ½BackblazeÔÆ´æ´¢ÖС£ ¡£¡£


https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/


5. Coinbase³Æ½üÆÚÊý¾Ýй¶ӰÏìÁË69461Ãû¿Í»§


5ÔÂ21ÈÕ £¬£¬£¬ £¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbase¿ËÈÕÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ £¬£¬£¬ £¬£¬£¬£¬Ó°Ïì69461Ãû¿Í»§¡£ ¡£¡£CoinbaseÔÚÌá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄ֪ͨÖÐÌåÏÖ £¬£¬£¬ £¬£¬£¬£¬ÆäÍâÑóÁãÊÛÖ§³ÖËùÔÚµÄÉÙÊýÖ°Ô±²»µ±»á¼ûÁ˿ͻ§ÐÅÏ¢¡£ ¡£¡£Ð¹Â¶µÄÊý¾ÝËä²»°üÀ¨ÃÜÂ롢˽ԿµÈ¿ÉÖ±½Ó»á¼û×ʽð»òÕË»§µÄÐÅÏ¢ £¬£¬£¬ £¬£¬£¬£¬µ«°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëºóËÄλ¡¢ÒøÐÐÕ˺ŵÈСÎÒ˽¼Ò±êʶ·û £¬£¬£¬ £¬£¬£¬£¬ÒÔ¼°¿ÉÄܵÄÕþ¸®Éí·ÝÐÅÏ¢ºÍÕË»§ÐÅϢͼÏñ¡£ ¡£¡£CoinbaseÖÒÑÔ³Æ £¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÐÅÏ¢¾ÙÐÐÉç»á¹¤³Ì¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬ÓÕʹÊܺ¦Õß×ªÒÆ×ʽð¡£ ¡£¡£´Ëǰ £¬£¬£¬ £¬£¬£¬£¬ÓÐÈ˵£ÐÄÍøÂç·¸·¨·Ö×Ó»ñÈ¡ÕË»§Óà¶îºÍµØµãºó¿ÉÄÜÒý·¢ÑÏÖØÐ§¹û¡£ ¡£¡£CoinbaseÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþÖÐ͸¶ £¬£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕßÔÚÍâÑóÖ§³ÖÖ°Ô±»ò³Ð°üÉ̵Ä×ÊÖúÏ»ñÈ¡Á˸ߴï1% Coinbase¿Í»§ÈºµÄÊý¾Ý £¬£¬£¬ £¬£¬£¬£¬²¢ÓÚ5ÔÂ11ÈÕ·¢ËÍÀÕË÷Óʼþ £¬£¬£¬ £¬£¬£¬£¬ÒªÇóÖ§¸¶2000ÍòÃÀÔªÊê½ðÒÔ×èÖ¹ÐÅÏ¢±»¹ûÕæ¡£ ¡£¡£È»¶ø £¬£¬£¬ £¬£¬£¬£¬Coinbase¾Ü¾øÖ§¸¶Êê½ð £¬£¬£¬ £¬£¬£¬£¬¶øÊÇÉèÁ¢ÁË2000ÍòÃÀÔªµÄ½±Àø»ù½ð £¬£¬£¬ £¬£¬£¬£¬ÃãÀøÌṩÓÐÖúÓÚÕÒµ½²¢ÉþÖ®ÒÔ·¨¹¥»÷ÕßµÄÏßË÷¡£ ¡£¡£ÏÖÔÚ £¬£¬£¬ £¬£¬£¬£¬CoinbaseÈÔÔÚÆÀ¹À´Ë´Î¹¥»÷µÄ²ÆÎñÓ°Ïì £¬£¬£¬ £¬£¬£¬£¬°üÀ¨µ÷½âºÍ¿Í»§ÍË¿îÓÃ¶È £¬£¬£¬ £¬£¬£¬£¬Ô¤¼Æ¿ÉÄÜÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£ ¡£¡£¸Ã¹«Ë¾ÌåÏÖ½«Åâ³¥Òò¸ÃÊÂÎñ¶øÎó½«×ʽð»ã¸øÕ©Æ­ÕßµÄÁãÊÛ¿Í»§ £¬£¬£¬ £¬£¬£¬£¬²¢¾ÙÐÐÉó²éÒÔÈ·ÈÏÊÂʵ¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/


6. KrebsOnSecurityÔâ6.3Tbps DDoS¹¥»÷


5ÔÂ21ÈÕ £¬£¬£¬ £¬£¬£¬£¬×ÅÃûÍøÂçÇå¾²²©¿ÍKrebsOnSecurity¿ËÈÕÔâÊÜ´ó¹æÄ£DDoS¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬·åÖµÁ÷Á¿´ïÿÃë6.3Õ×Õ×±ÈÌØ £¬£¬£¬ £¬£¬£¬£¬³ÉΪÓмͼÒÔÀ´¹æÄ£×î´óµÄ¹¥»÷Ö®Ò»¡£ ¡£¡£´Ë´Î¹¥»÷¾ÝÐÅÔ´×ÔÃûΪ¡°Aisuru¡±µÄÐÂÐÍÎïÁªÍø½©Ê¬ÍøÂç £¬£¬£¬ £¬£¬£¬£¬¸ÃÍøÂçÓÚ2024Äê8ÔÂÊ״η¢Ã÷ £¬£¬£¬ £¬£¬£¬£¬Ö÷ÒªÓÉÊÜѬȾµÄÎïÁªÍø×°±¸Èç·ÓÉÆ÷¡¢IPÉãÏñÍ·ºÍÊý×ÖÊÓÆµÂ¼Ïñ»ú×é³É¡£ ¡£¡£ÕâЩװ±¸±»Ð®ÖƺóЭͬ¹¥»÷ £¬£¬£¬ £¬£¬£¬£¬ÏòKrebsOnSecurityÕ¾µã·¢ËÍ´ó×ÚÁ÷Á¿¡£ ¡£¡£Ö»¹Ü¹¥»÷½öÒ»Á¬Ô¼45Ãë £¬£¬£¬ £¬£¬£¬£¬µ«ÍþÁ¦ÖØ´ó £¬£¬£¬ £¬£¬£¬£¬²»¹ýÍøÕ¾ÒòÊܹȸ衰¶ÜÅÆÍýÏ롱±£»£»£»£»¤¶ø¼á³ÖÔÚÏß¡£ ¡£¡£¡°Aisuru¡±½©Ê¬ÍøÂçµÄÃû×Ö½ñÄêÔçЩʱ¼äÒÑ·ºÆðÔÚµØÏÂÂÛ̳ £¬£¬£¬ £¬£¬£¬£¬ÓëDDoS¹ÍӶЧÀÍÏà¹Ø £¬£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷¿ÉÄÜÊÇ¶ÔÆä¹¦Ð§µÄѹÁ¦²âÊÔ £¬£¬£¬ £¬£¬£¬£¬»òÒԸߵ÷Ä¿µÄչʾʵÁ¦¡£ ¡£¡£¹¥»÷ÕßÉí·ÝÉв»Ã÷È· £¬£¬£¬ £¬£¬£¬£¬µ«KrebsÔÚ²©¿ÍÖÐÖ¸³ö £¬£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÓëÌṩDDoSЧÀͺͽ©Ê¬ÍøÂç×âÁÞµÄÍøÃñ¡°Forky¡±ÓÐ¹Ø £¬£¬£¬ £¬£¬£¬£¬Ö»¹ÜForky·ñ¶¨²ß»®Á˴˴ι¥»÷ £¬£¬£¬ £¬£¬£¬£¬µ«ÈϿɼÓÈëÁËAisuru½©Ê¬ÍøÂçµÄ¿ª·¢ºÍÍÆ¹ã¡£ ¡£¡£


https://hackread.com/krebsonsecurity-6-3-tbps-ddos-attack-aisuru-botnet/