Aisuru½©Ê¬ÍøÂç·¢¶¯ÁË29.7 Tbps DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-12-05

1. Aisuru½©Ê¬ÍøÂç·¢¶¯ÁË29.7 Tbps DDoS¹¥»÷


12ÔÂ3ÈÕ£¬ £¬ £¬£¬£¬2025ÄêµÚÈý¼¾¶È£¬ £¬ £¬£¬£¬¹æÄ£ÖØ´óµÄAisuru½©Ê¬ÍøÂçÔÚÈý¸öÔÂÄÚÌᳫ1304´ÎÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷£¬ £¬ £¬£¬£¬ÆäÖÐÒ»´Î´´¼Í¼µØµÖ´ï29.7Tbps·åÖµÁ÷Á¿£¬ £¬ £¬£¬£¬Ò»Á¬69Ã룬 £¬ £¬£¬£¬Í¨¹ýUDPµØÌºÊ½ºäÕ¨Ïòƽ¾ùÿÃë1.5Íò¸öÄ¿µÄ¶Ë¿ÚÇã×¢¡°À¬»ø¡±Á÷Á¿¡£ ¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓÉCloudflare¹ÀËãµÄ100ÍòÖÁ400Íǫ̀ÊÜѬȾװ±¸×é³É£¬ £¬ £¬£¬£¬°üÀ¨Â·ÓÉÆ÷ºÍÎïÁªÍø×°±¸£¬ £¬ £¬£¬£¬·¸·¨·Ö×Ó¿É̫ͨ¹ýÏúÉÌ×âÓÃÆä×é¼þÌᳫ¹¥»÷¡£ ¡£¡£¡£¡£¡£¡£CloudflareÊý¾ÝÏÔʾ£¬ £¬ £¬£¬£¬½ñÄêÒÑ»º½â2867´ÎAisuru¹¥»÷£¬ £¬ £¬£¬£¬½ü45%Ϊ³¬´óÁ÷Á¿¹¥»÷£¨Áè¼Ý1Tbps»ò10ÒÚ°ü/Ã룩¡£ ¡£¡£¡£¡£¡£¡£´Ëǰ×î¸ß22.2Tbps¹¥»÷¼°Î¢ÈíÅû¶µÄ15Tbps Azure¹¥»÷¾ù±»¹éÒòÓÚ´ËÍøÂç¡£ ¡£¡£¡£¡£¡£¡£±¾´Î29.7Tbps¹¥»÷Ëäδ¹ûÕæÄ¿µÄ£¬ £¬ £¬£¬£¬µ«ÆäÆÆËðÁ¦ÒÑÔ¶³¬Í¨Àý£¬ £¬ £¬£¬£¬CloudflareÖÒÑÔ£¬ £¬ £¬£¬£¬´ËÀ๥»÷¿É¼ä½Ó̱»¾Î´Êܹ¥»÷µÄ»¥ÁªÍøÐ§ÀÍÌṩÉÌ£¬ £¬ £¬£¬£¬ÈôÖ±½ÓÕë¶ÔÒªº¦»ù´¡ÉèÊ©¡¢Ò½ÁÆÇÀ¾È»ò¾üÊÂϵͳ£¬ £¬ £¬£¬£¬Ð§¹û²»¿°ÉèÏë¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/


2. ShopifyÈ«Çòå´»ú£¬ £¬ £¬£¬£¬É̼ÒÓû§µÇ¼ÉúÒâÊÜ×è


12ÔÂ2ÈÕ£¬ £¬ £¬£¬£¬2025ÄêÍøÂçÐÇÆÚÒ»¹ºÎïá¯Áëʱ´ú£¬ £¬ £¬£¬£¬È«ÇòµçÉ̾ÞÍ·ShopifyÍ»·¢´ó¹æÄ£å´»úÊÂÎñ£¬ £¬ £¬£¬£¬µ¼ÖÂÊýÍòÍòÔÚÏß¹ºÎïÕß¼°É̼ÒÃæÁٵǼÒì³£¡¢ÍøÕ¾µ¼º½ÊÜ×è¼°ÉúÒâϵͳ¹ÊÕÏ¡£ ¡£¡£¡£¡£¡£¡£¾Ý»¥ÁªÍø¼à¿ØÆ½Ì¨DowndetectorÊý¾Ý£¬ £¬ £¬£¬£¬ÃÀ¹ú¶«²¿Ê±¼äÉÏÎç9µãÆð£¬ £¬ £¬£¬£¬Óû§Í¶ËßÁ¿¼¤Ôö£¬ £¬ £¬£¬£¬11µã´ï·åÖµ4000ÓàÆð£»£»£»£»£» £» £»Ó¢¹úͬÆÚÒ౨¸æ2800ÓàÆð¹ÊÕÏ£¬ £¬ £¬£¬£¬È«Çò³¬56%Óû§ÔâÓöµÇ¼ÎÊÌ⣬ £¬ £¬£¬£¬25%·´Ó¦ÍøÕ¾»á¼ûÒì³££¬ £¬ £¬£¬£¬19%±£´æÐ§ÀÍÆ÷ÅþÁ¬Ê§°Ü¡£ ¡£¡£¡£¡£¡£¡£ShopifyÔÚÉÏÎç10µãͨ¹ý¹Ù·½ÇþµÀÈϿɡ°²¿·ÖµêËÁÖÎÀíԱȨÏÞ¹ÊÕÏ¡±£¬ £¬ £¬£¬£¬²¢½¨ÒéÓû§¡°¼á³Ö×°±¸µÇ¼״̬¡±¡£ ¡£¡£¡£¡£¡£¡£È»¶ø£¬ £¬ £¬£¬£¬´ó×ÚÉ̼ҷ´Ïì³Æ¡°ËùÓÐÃŵê¾ùÎÞ·¨µÇ¼¡±£¬ £¬ £¬£¬£¬ÇÒPOSϵͳÒàÊܲ¨¼°£¬ £¬ £¬£¬£¬Ó°ÏìÉúÒâ´¦Öóͷ£¡¢¿â´æÖÎÀí¼°¿Í»§Êý¾Ýͬ²½¡£ ¡£¡£¡£¡£¡£¡£¹«Ë¾ºóÐøÔÚÏÂÖç2:31¸üÐÂÉùÃ÷£¬ £¬ £¬£¬£¬È·ÈϹÊÕÏÔ´ÓÚ¡°µÇ¼Éí·ÝÑéÖ¤Á÷³ÌȱÏÝ¡±£¬ £¬ £¬£¬£¬²¢Ðû²¼ÎÊÌâÒÑÐÞ¸´£¬ £¬ £¬£¬£¬ÏµÍ³ÕýÖð²½»Ö¸´¡£ ¡£¡£¡£¡£¡£¡£´Ë´Îå´»úÊÂÎñ²¨¼°¹æÄ£ÆÕ±é£¬ £¬ £¬£¬£¬´ÓÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢Òâ´óÀûµ½Ä«Î÷¸çµÈÈ«Çò¶àµØÓû§¾ù±¨¸æÊÜÓ°Ïì¡£ ¡£¡£¡£¡£¡£¡£


https://cybernews.com/news/shopify-down-for-thousands-during-cyber-monday-mania/


3. PredatorÌØ¹¤Èí¼þʹÓÃÐÂÐÍѬȾ;¾¶¾ÙÐÐÁãµã»÷¹¥»÷


12ÔÂ4ÈÕ£¬ £¬ £¬£¬£¬¿ËÈÕ£¬ £¬ £¬£¬£¬ÓÉInside Story¡¢HaaretzºÍWAV Research CollectiveÁªºÏÊÓ²ì½ÒÆÆ£¬ £¬ £¬£¬£¬PredatorÌØ¹¤Èí¼þͨ¹ýÃûΪ¡°°¢À­¶¡¡±µÄÁãµã»÷ѬȾ»úÖÆ£¬ £¬ £¬£¬£¬½öÐèÉó²é¶ñÒâ¹ã¸æ¼´¿ÉÈëÇÖÌØ¶¨Ä¿µÄ¡£ ¡£¡£¡£¡£¡£¡£¸Ã»úÖÆ±»Òþ²ØÔÚ¶à¹ú¿Õ¿Ç¹«Ë¾±³ºó£¬ £¬ £¬£¬£¬»ùÓÚ¡°IntellexaйÃÜÊÂÎñ¡±µÄÄÚ²¿Îļþ¼°ÓªÏúÖÊÁÏ£¬ £¬ £¬£¬£¬²¢¾­¹ú¼ÊÌØÉâ×éÖ¯¡¢¹È¸èºÍRecorded FutureµÄÊÖÒÕÑо¿Ö¤Êµ¡£ ¡£¡£¡£¡£¡£¡£AladdinÓÚ2024ÄêÊ״ΰ²ÅÅ£¬ £¬ £¬£¬£¬Ê¹ÓÃÉÌÒµÒÆ¶¯¹ã¸æÏ½µµÍ÷´«¶ñÒâÈí¼þ£¬ £¬ £¬£¬£¬Í¨¹ýÐèÇ󷽯½Ì¨£¨DSP£©Ç¿Öƽ«ÎäÆ÷»¯¹ã¸æÍ¶·Åµ½Í¨¹ý¹«¹²IPµØµãµÈ±êʶ·ûʶ±ðµÄÌØ¶¨Ä¿µÄ£¬ £¬ £¬£¬£¬¹ã¸æ¿É·ºÆðÔÚÈκÎÏÔʾ¹ã¸æµÄÍøÕ¾»òÓ¦ÓÃÖУ¬ £¬ £¬£¬£¬Íâ¹ÛÓëͨË×¹ã¸æÎÞÒì¡£ ¡£¡£¡£¡£¡£¡£½öä¯ÀÀ¹ã¸æ¼´¿É´¥·¢Ñ¬È¾£¬ £¬ £¬£¬£¬ÎÞÐèµã»÷£¬ £¬ £¬£¬£¬¹ã¸æ»áÖØ¶¨ÏòÖÁIntellexaµÄÎó²îʹÓÃЧÀÍÆ÷¡£ ¡£¡£¡£¡£¡£¡£¸Ã¹ã¸æÍøÂçÉæ¼°°®¶ûÀ¼¡¢µÂ¹ú¡¢ÈðÊ¿¡¢Ï£À°¡¢ÈûÆÖ·˹¡¢°¢ÁªÇõºÍÐÙÑÀÀûµÈ¶à¹ú¹ã¸æ¹«Ë¾¡£ ¡£¡£¡£¡£¡£¡£·ÀÓù²½·¥°üÀ¨ÆÁÕÏä¯ÀÀÆ÷¹ã¸æ¡¢Òþ²Ø¹«¹²IPµØµã£¬ £¬ £¬£¬£¬µ«Ð¹Â¶ÎļþÏÔʾIntellexaÈÔ¿É´Ó¿Í»§ËùÔÚ¹úµÄÒÆ¶¯ÔËÓªÉÌ»ñÊØÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/


4. ÷è÷ëÀÕË÷Èí¼þÉù³Æ¹¥»÷ɽ´ï»ù½Ì»á£¬ £¬ £¬£¬£¬Ð¹Â¶ÄÚ²¿Ãô¸ÐÊý¾Ý


12ÔÂ4ÈÕ£¬ £¬ £¬£¬£¬÷è÷ëÀÕË÷Èí¼þ½«É½´ï»ù½Ì»áÁÐÈëÆä°µÍøÐ¹Â¶Ãûµ¥£¬ £¬ £¬£¬£¬Éù³Æ¶ÔÊý¾Ýй¶ÊÂÎñÈÏÕæ£¬ £¬ £¬£¬£¬²¢Ðû²¼22ÕŽØÍ¼×÷ΪÈëÇÖÖ¤¾Ý¡£ ¡£¡£¡£¡£¡£¡£½ØÍ¼ÏÔʾ£¬ £¬ £¬£¬£¬¹¥»÷Éæ¼°Ó¢¹úʥɽ¸ß¼¶×éÖ¯£¨AOSH UK£©µÄÄÚ²¿È¨ÏÞ£¬ £¬ £¬£¬£¬°üÀ¨×Ú½ÌÊÂÇéְԱǩ֤´¦Öóͷ£¼Í¼¡¢ÒÆÃñÓöȲ¦¿îÃ÷ϸ£¨ÈçÿÈË2600ÖÁ4500Ó¢°÷µÄǩ֤Óöȣ©¡¢ÔËÓªÖ§³ö¼°»î¶¯ºóÇÚÊý¾Ý¡£ ¡£¡£¡£¡£¡£¡£ÀýÈ磬 £¬ £¬£¬£¬Ò»·ÝÔ¤ËãÎļþÏÔʾ£¬ £¬ £¬£¬£¬Ä³²¦¿îÖÜÆÚÄÚ³¬11500Ó¢°÷ÓÃÓÚǩ֤ÉêÇ룬 £¬ £¬£¬£¬ÁíÒ»ÎļþÔòÁгö3ÍòÓ¢°÷ÓÃÓÚÓʼþÐû´«¼°½ÚÈպؿ¨·Ö·¢£¬ £¬ £¬£¬£¬ÉÐÓÐ6351Ó¢°÷ÓÃÓÚ¹ú¼ÊÓÊ×Ê¡¢6000Ó¢°÷ÓÃÓÚÊÓÌý×°±¸²É¹º¡£ ¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý»¹Éæ¼°°²±£ÍýÏ룬 £¬ £¬£¬£¬°üÀ¨2024-2025Äê×ܶî½ü10ÍòÓ¢°÷µÄ°²±£Ô¤Ë㣬 £¬ £¬£¬£¬º­¸ÇËѱ¬È®Ð§ÀÍ¡¢ÒªÔ±±£»£»£»£»£» £» £»¤¡¢Î§À¸½¨ÉèµÈ£¬ £¬ £¬£¬£¬ÏêϸÈç74,326Ó¢°÷ÓÃÓÚÒªÔ±±£»£»£»£»£» £» £»¤ÍŶӣ¬ £¬ £¬£¬£¬29,217Ó¢°÷ÓÃÓÚÍâµØÖܱ߰²±£¡£ ¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬ £¬£¬£¬²ÆÎñ·¢Æ±¡¢ÒøÐÐÕË»§ÐÅÏ¢¼°»áԱСÎÒ˽¼ÒÊý¾Ý£¨ÈçÈ«Ãû¡¢µç»°¡¢ÂÃÐмͼ£©Ò²±»ÆØ¹â£¬ £¬ £¬£¬£¬ÀýÈç¡°À­¶¡ÒáÈËʿɨ³ýÀÖ¶Ó2025Äê11Ô¡±±í¸ñ°üÀ¨°¢¸ùÍ¢¡¢°ÍÎ÷µÈ¶à¹úÖ°Ô±µÄÏêϸÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£


https://hackread.com/qilin-ransomware-church-of-scientology-data-theft/


5. Array AG VPN×°±¸ÏÂÁî×¢ÈëÎó²îÔâºÚ¿ÍʹÓÃ


12ÔÂ4ÈÕ£¬ £¬ £¬£¬£¬¿ËÈÕ£¬ £¬ £¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃArray AGϵÁÐVPN×°±¸ÖеÄÏÂÁî×¢ÈëÎó²îÖ²Èëwebshell²¢½¨Éè¶ñÒâÓû§¡£ ¡£¡£¡£¡£¡£¡£Array NetworksÓÚ½ñÄê5ÔÂͨ¹ýÇå¾²¸üÐÂÐÞ¸´Á˸ÃÎó²î£¬ £¬ £¬£¬£¬µ«Î´·ÖÅÉCVE±êʶ·û£¬ £¬ £¬£¬£¬µ¼ÖÂÎó²î¸ú×ÙÓë²¹¶¡ÖÎÀíÖØ´ó»¯¡£ ¡£¡£¡£¡£¡£¡£ÈÕ±¾ÅÌËã»úÓ¦¼±ÏìӦС×飨JPCERT£©Ðû²¼Í¨¸æÖÒÑÔ£¬ £¬ £¬£¬£¬ºÚ¿Í×Ô8ÔÂÆðÒÑʹÓøÃÎó²î¹¥»÷ÈÕ±¾¾³ÄÚ×éÖ¯£¬ £¬ £¬£¬£¬¹¥»÷ÕßÊÔͼÔÚ·¾¶/ca/aproxy/webapp/°²ÅÅPHP webshellÎļþ¡£ ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìArrayOS AG 9.4.5.8¼°¸üÔç°æ±¾£¬ £¬ £¬£¬£¬ÓÈÆäÊÇÆôÓÃÁË¡°DesktopDirect¡±Ô¶³Ì»á¼û¹¦Ð§µÄAGϵÁÐÓ²¼þºÍÐéÄâ×°±¸¡£ ¡£¡£¡£¡£¡£¡£Array Networks AGϵÁÐ×÷ΪÇå¾²»á¼ûÍø¹Ø£¬ £¬ £¬£¬£¬ÒÀÀµSSL VPN½¨Éè¼ÓÃÜËíµÀ£¬ £¬ £¬£¬£¬ÆÕ±éÓÃÓÚÆóÒµÔ¶³Ì»á¼ûÍøÂç¡¢Ó¦Óá¢×ÀÃæ¼°ÔÆ×ÊÔ´£¬ £¬ £¬£¬£¬Í¨³£±»´óÐÍ×éÖ¯ÓÃÓÚÖ§³ÖÔ¶³Ì»òÒÆ¶¯°ì¹«¡£ ¡£¡£¡£¡£¡£¡£JPCERTÖ¸³ö£¬ £¬ £¬£¬£¬Array OS 9.4.5.9ÒÑÐÞ¸´¸ÃÎÊÌâ¡£ ¡£¡£¡£¡£¡£¡£ÈôÎÞ·¨Éý¼¶£¬ £¬ £¬£¬£¬½¨Òé½ûÓÃËùÓÐδʹÓõÄDesktopDirectЧÀÍ£¬ £¬ £¬£¬£¬»òͨ¹ýURL¹ýÂË×èÖ¹°üÀ¨·ÖºÅµÄURL»á¼û¡£ ¡£¡£¡£¡£¡£¡£¾ÝÇå¾²Ñо¿Ô±Yutaka SejiyamaɨÃ裬 £¬ £¬£¬£¬È«Çò¹²ÓÐ1831¸öArrayAGʵÀý£¬ £¬ £¬£¬£¬Ö÷ÒªÂþÑÜÔÚÖйú¡¢ÈÕ±¾ºÍÃÀ¹ú£¬ £¬ £¬£¬£¬ÆäÖÐÖÁÉÙ11̨Ö÷»úÆôÓÃÁËDesktopDirect¹¦Ð§£¬ £¬ £¬£¬£¬µ«ÏÖʵÊýÄ¿¿ÉÄܸü¸ß¡£ ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/


6. Companjon°ü¹Ü¿Æ¼¼¹«Ë¾Ì»Â¶ÊýÍòÍòÂÃÐÐÐÅÏ¢¼°PII


12ÔÂ3ÈÕ£¬ £¬ £¬£¬£¬¿ËÈÕ£¬ £¬ £¬£¬£¬°ü¹Ü¿Æ¼¼¹«Ë¾CompanjonÒòδÊܱ£»£»£»£»£» £» £»¤µÄApache KafkaÁ÷й¶Êý°ÙÍòÌõÈÕÖ¾£¬ £¬ £¬£¬£¬Éæ¼°ÂÃÐÐÐг̡¢È«Ãû¡¢µç×ÓÓʼþµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£CybernewsÍŶÓÓÚ2025Äê8ÔÂÏÂÑ®·¢Ã÷¸ÃÎó²î£¬ £¬ £¬£¬£¬ÔÚÆßÌìÄڼͼ³¬1500ÍòÌõÊý¾Ý£¬ £¬ £¬£¬£¬¹ÀËã×Üй¶Á¿¿ÉÄÜ´ï9.6ÒÚÌõ£¬ £¬ £¬£¬£¬ÆäÖÐÔ¼0.1%£¨Ô¼96ÍòÌõ£©°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£ ¡£¡£¡£¡£¡£¡£Ð¹Â¶´°¿ÚÆÚΪ8ÔÂ20ÈÕÖÁ28ÈÕ£¬ £¬ £¬£¬£¬Éæ¼°Trainline¡¢Omio¡¢TripXµÈÂÃÐÐÆ½Ì¨µÄAPI½»»¥Êý¾Ý£¬ £¬ £¬£¬£¬°üÀ¨Î´À´ÖÁ2026ÄêµÄÂÃÐÐõè¾¶¡¢º½¿Õ¹«Ë¾¡¢ÈÕÆÚ¼°²ÆÎñÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£Companjon×÷ΪB2B2CЧÀÍÉÌ£¬ £¬ £¬£¬£¬ÎªÂÃÐÐÉçµÈÆóÒµÌṩ°ü¹ÜЧÀÍ£¬ £¬ £¬£¬£¬Í¨¹ýÍøÂçÖÕ¶ËÓû§Êý¾ÝÖ§³ÖÏàÖú·½Íƹ㡣 ¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÈÕÖ¾ÖУ¬ £¬ £¬£¬£¬²¿·Ö¼Í¼°üÀ¨ÊÚȨÁîÅÆ£¬ £¬ £¬£¬£¬¹¥»÷ÕßÀíÂÛÉÏ¿ÉʹÓÃÕâЩÐÅÏ¢Ìᳫ½øÒ»²½¹¥»÷£¬ £¬ £¬£¬£¬ÈçÕ©Æ­»òϵͳÈëÇÖ¡£ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬ £¬ £¬£¬£¬Á¬ÏµÂÃÐС¢²ÆÎñ¼°Î»ÖÃÊý¾Ý£¬ £¬ £¬£¬£¬¿Í»§ÃæÁٸ߶ÈÕë¶ÔÐÔթƭΣº¦£¬ £¬ £¬£¬£¬ÀýÈçð³ä¾Æ»ï¼Æ¹¤Íþв×÷·ÏÔ¤¶©ÒÔÆ­È¡¸¶¿î¡£ ¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/companjon-kafka-leak-travel-data/