CloudflareÀÖ³É×èµ²11.5 Tbps´´¼Í¼DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-09-04

1. CloudflareÀÖ³É×èµ²11.5 Tbps´´¼Í¼DDoS¹¥»÷


9ÔÂ2ÈÕ£¬£¬ £¬Cloudflare¿ËÈÕÐû²¼ÀÖ³É×èµ²ÁËÒ»³¡·åÖµ´ï11.5 TbpsµÄÊ·ÉÏ×î´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬ £¬´Ë´Î¹¥»÷ÒÔUDPºéË®¹¥»÷ΪÖ÷£¬£¬ £¬Ö÷ÒªÔ´×ԹȸèÔÆÆ½Ì¨£¬£¬ £¬²¢³ÉΪһÁ¬ÊýÖܵĹ¥»÷À˳±ÖеÄ×îÈȳ±¡£¡£¡£ ¡£¡£¾ÝCloudflareÅû¶£¬£¬ £¬Æä·ÀÓùϵͳÔÚÒÑÍùÊýÖÜÄÚÒÑ×Ô¶¯×èµ²Êý°Ù´Î³¬´ó¹æÄ£DDoS¹¥»÷£¬£¬ £¬ÆäÖÐ×îÐÂÆÆ¼Í¼µÄ¹¥»÷Ò»Á¬Ô¼35Ã룬£¬ £¬·åÖµÊý¾Ý°üËÙÂʸߴïÿÃë51ÒÚ¸ö£¬£¬ £¬Ô¶³¬½ñÄê6Ô¸ù«Ë¾±¨¸æµÄ7.3 Tbps¹¥»÷£¬£¬ £¬¹æÄ£ÔöÌí12%£¬£¬ £¬ÉõÖÁ±ÈÍøÂçÇå¾²¼ÇÕß²¼À³¶÷¡¤¿ËÀײ¼Ë¹¼Í¼µÄ´Ëǰ×îá¯ÁëÖµºá¿ç1 Tbps¡£¡£¡£ ¡£¡£´Ë´Î11.5 TbpsµÄUDPºéË®¹¥»÷Õë¶Ô¼òµ¥IPµØµã£¬£¬ £¬Æ½¾ùÿÃë¹¥»÷21,925¸ö¶Ë¿Ú£¬£¬ £¬·åֵʱ¶Ë¿ÚÂþÑÜÀ©Õ¹ÖÁ34,517¸ö£¬£¬ £¬¹¥»÷ÏòÁ¿ÒÔUDPºéˮΪÖ÷£¨Õ¼±È99.996%£©£¬£¬ £¬¸¨ÒÔQOTD¡¢Echo¡¢NTP¡¢Mirai¡¢Portmap¼°RIPv1µÈ»ìÏý¹¥»÷ÊֶΡ£¡£¡£ ¡£¡£Ö»¹Ü¹¥»÷Á÷Á¿Öش󣬣¬ £¬CloudflareµÄ×Ô¶¯»¯·ÀÓùϵͳÈÔÓÐÓÃʶ±ð²¢¹ýÂËÁ˶ñÒâÁ÷Á¿£¬£¬ £¬Î´¶Ô¿Í»§ÍøÂçÔì³ÉʵÖÊÓ°Ïì¡£¡£¡£ ¡£¡£


https://securityaffairs.com/181829/cyber-crime/cloudflare-blocked-a-record-11-5-tbps-ddos-attack.html


2. Ê¥´ï·ÆÏØÕþ¸®ÍøÕ¾Ô´´úÂëÔâÇÔÊÂÎñ±»Ö¤ÊµÎª¾ÉÊý¾Ýй¶


9ÔÂ2ÈÕ£¬£¬ £¬Ò»ÔòÉù³ÆÇÔÈ¡ÃÀ¹úÐÂÄ«Î÷¸çÖÝÊ¥´ï·ÆÏØÕþ¸®ÍøÕ¾Ô´´úÂëµÄÌû×ÓÔÚºÚ¿ÍÂÛ̳Òý·¢¹Ø×¢£¬£¬ £¬µ«¾­CybernewsÑо¿ÍŶÓÉîÈëÊӲ죬£¬ £¬¸ÃÊÂÎñÏÖʵΪ¹¥»÷ÕßʹÓùýʱÐÅÏ¢¾ÙÐÐ"¿´·¨ÑéÖ¤"µÄ³´×÷ÐÐΪ¡£¡£¡£ ¡£¡£Ê¥´ï·ÆÏØ×÷ΪÉú³Ý³¬15ÍòµÄÐÐÕþÇøÓò£¬£¬ £¬Æä¹Ù·½ÍøÕ¾ÊÇÕþ¸®ÓëÃñÖÚ½»»¥µÄÖ÷Ҫƽ̨£¬£¬ £¬´Ë´ÎÊÂÎñËäδÔì³ÉÏÖʵΣº¦£¬£¬ £¬È´Ì»Â¶ÁËÍøÂç¹¥»÷Õßͨ¹ýÐû²¼¾ÉÊý¾Ý²©È¡¹Ø×¢µÄÐÂÐÍÊÖ·¨¡£¡£¡£ ¡£¡£¹¥»÷ÕßÔÚÂÛ̳ÖÐÐû³ÆÒÑ»ñȡʥ´ï·ÆÏØÍøÕ¾µÄÔ´´úÂ룬£¬ £¬²¢¸½ÉÏÁËÖÎÀíÔ±Óû§Ãû¡¢¹þÏ£ÃÜÂë¡¢Êý¾Ý¿âÄ£×Ó¼°PHP°æ±¾µÈÊý¾Ý¡£¡£¡£ ¡£¡£È»¶ø£¬£¬ £¬CybernewsÍŶӯÊÎö·¢Ã÷£¬£¬ £¬¹¥»÷ÕßÌṩµÄÊý¾Ý¿âÄ£×Ó½ö¸üÐÂÖÁ2017Ä꣬£¬ £¬PHP°æ±¾¸üÊÇ2010ÄêÐû²¼ÇÒÒÑÓÚ2011Äê×èÖ¹Ö§³ÖµÄ³Â¸¯°æ±¾¡£¡£¡£ ¡£¡£¸üÒªº¦µÄÊÇ£¬£¬ £¬±ÈÕÕÄ¿½ñÍøÕ¾ÊµÊ±Á÷Á¿¼Ü¹¹£¬£¬ £¬ÆäÊÖÒÕÕ»Óëй¶Êý¾ÝÖеÄÉèÖñ£´æÏÔÖø²î±ð£¬£¬ £¬Ö¤Êµ¹¥»÷ÕßÉÏ´«µÄÊµÎªÍøÕ¾2010ÄêÔ¾ɰ汾´úÂ룬£¬ £¬¶ÔÏÖÓÐϵͳÎÞʵÖÊÐÔÍþв¡£¡£¡£ ¡£¡£


https://cybernews.com/security/santa-fe-county-hack-likely-outdated/


3. ¶íÂÞ˹APT28ʹÓá°NotDoor¡±¶ñÒâÈí¼þ¹¥»÷Microsoft Outlook


9ÔÂ3ÈÕ£¬£¬ £¬Î÷°àÑÀÍøÂçÇå¾²¹©Ó¦ÉÌS2 GrupoµÄÍþвÇ鱨ʵÑéÊÒLAB52ÓÚ2025Äê9ÔÂ3ÈÕÐû²¼±¨¸æ£¬£¬ £¬Åû¶ÓɶíÂÞ˹֧³ÖµÄÍøÂçÍþв×éÖ¯APT28¿ª·¢µÄÐÂÐÍOutlookºóÃÅ¡°NotDoor¡±¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚVisual Basic for Applications£¨VBA£©¹¹½¨£¬£¬ £¬Í¨¹ýOutlookÊÂÎñÇý¶¯´¥·¢Æ÷£¨ÈçÆô¶¯Ê±Application_MAPILogonCompleteºÍÎüÊÕÐÂÓʼþʱApplication_NewMailEx£©¼¤»î£¬£¬ £¬ÊµÏÖÊý¾ÝÇÔÈ¡¡¢ÎļþÉÏ´«¼°í§ÒâÏÂÁîÖ´Ðй¦Ð§¡£¡£¡£ ¡£¡£NotDoor½ÓÄÉ´úÂë»ìÏýÊÖÒÕ£¬£¬ £¬°üÀ¨Ëæ»ú»¯±äÁ¿ÃûºÍ×Ô½ç˵Base64±àÂ루¸½¼ÓÀ¬»ø×Ö·ûÄ£Äâ¼ÓÃÜ£©£¬£¬ £¬²¢Î±×°³ÉÕýµ±ºê¹æ±Ü¼ì²â¡£¡£¡£ ¡£¡£Æäͨ¹ýÊðÃûµÄ΢Èí¶þ½øÖÆÎļþOneDrive.exe¾ÙÐÐDLL²à¼ÓÔØ£¬£¬ £¬¼ÓÔØ¶ñÒâSSPICLI.dll°²ÅźóÃÅ£¬£¬ £¬Í¬Ê±ÐÞ¸ÄOutlook×¢²á±íÉèÖýûÓÃÇå¾²ÖÒÑÔ¡¢ÆôÓú겢ÒÖÖÆ¶Ô»°¿òÌáÐÑ£¬£¬ £¬È·¼á³¤ÆÚ»¯¾²Ä¬ÔËÐС£¡£¡£ ¡£¡£¸ÃºóÃÅͨ¹ý½«Êܺ¦ÕßÊý¾ÝÍâйÖÁ¹¥»÷Õß¿ØÖƵÄÓÊÏ䣬£¬ £¬²¢Ê¹ÓÃwebhook.site¾ÙÐÐDNSºÍHTTP»Øµ÷ÑéÖ¤£¬£¬ £¬½¨ÉèÒþ²ØÍ¨Ñ¶¡£¡£¡£ ¡£¡£ÆäÄ£¿£¿£¿£¿£¿£¿é»¯Éè¼ÆÖ§³Ö¶¯Ì¬¸üд¥·¢Æ÷ºÍÏÂÁ£¬ £¬ÔöÇ¿¼ì²âÄѶȡ£¡£¡£ ¡£¡£


https://www.infosecurity-magazine.com/news/russia-apt28-notdoor-outlook/


4. È«Çò×î´ó²»·¨ÌåÓýÖ±²¥Æ½Ì¨StreameastÔâ¶à¹úÁªºÏ¹¥»÷


9ÔÂ3ÈÕ£¬£¬ £¬ÓÉ´´ÒâÓëÓéÀÖͬÃË£¨ACE£©Óë°£¼°Õþ¸®ÁªºÏ¿ªÕ¹µÄרÏîÐж¯Àֳɵ·»ÙÈ«Çò×î´ó²»·¨ÌåÓýÖ±²¥Á÷ýÌåÍøÂçStreameast£¬£¬ £¬²¢¾Ð²¶Á½Ãû¹ØÁªÖ°Ô±¡£¡£¡£ ¡£¡£¸Ãƽ̨×Ô2018ÄêÆðÔËÓª£¬£¬ £¬ÒÀÍÐ¹ã¸æÖ§³ÖµÄÃâ·Ñģʽ£¬£¬ £¬Ìṩ¸ßÇåµÁ²¥ÄÚÈÝ£¬£¬ £¬ÁýÕÖÈ«Çò80¸öÓòÃû£¬£¬ £¬Ô»á¼ûÁ¿·åÖµ´ï1.36ÒڴΣ¬£¬ £¬ÒÑÍùÒ»Äê×Ü»á¼ûÁ¿Í»ÆÆ16ÒڴΣ¬£¬ £¬Óû§Ö÷Òª¼¯ÖÐÓÚÃÀ¹ú¡¢¼ÓÄôó¡¢Ó¢¹ú¡¢·ÆÂɱö¼°µÂ¹ú¡£¡£¡£ ¡£¡£StreameastµÄ½¹µãÇÖȨÐÐΪ°üÀ¨Î´¾­ÊÚȨֱ²¥Å·ÖÞÎå´ó×ãÇòÁªÈü£¨Ó¢³¬¡¢Î÷¼×¡¢µÂ¼×µÈ£©¡¢¹ú¼Ê×ãÁªÌìϱ­¡¢Å·ÖÞ±­µÈ¹ú¼Ò¶ÓÈüÊ£¬£¬ £¬ÒÔ¼°NFL¡¢NBA¡¢F1µÈÃÀ¹úÖ÷Á÷ÌåÓýÈüÊ¡£¡£¡£ ¡£¡£ÆäÊÖÒռܹ¹Í¨¹ý¶àÓòÃûÌø×ª¹æ±Ü·â±Õ£¬£¬ £¬ÁùÌìǰÊ״ηºÆðÔËÓªÖÐÖ¹¼£Ï󣬣¬ £¬Óû§·´ÏìÍøÕ¾ÎÞ·¨»á¼û»òÁ÷ýÌå¼ÓÔØÒì³£¡£¡£¡£ ¡£¡£°£¼°¼ªÈøÊ¡Ð»ºÕÔúÒÁµÂÊо¯·½ÔÚÐж¯Öвé»ñÌõ¼Ç±¾µçÄÔ¡¢ÖÇÄÜÊÖ»ú¡¢Ïֽ𼰶àÕÅÐÅÓÿ¨¡£¡£¡£ ¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬¸Ãƽ̨Óë°¢ÁªÇõÒ»¼Ò¿Õ¿Ç¹«Ë¾±£´æ¹ØÁª£¬£¬ £¬ÉæÏÓ×Ô2010ÄêÆðͨ¹ý¹ã¸æÊÕÈëÏ´Ç®620ÍòÃÀÔª¼°20ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬ £¬Ô­ÊôÓÚStreameastµÄ80¸öÓòÃûÒѴ󲿷ÖÖØ¶¨ÏòÖÁACEµÄ¡°Õýµ±Ô¢Ä¿¡±ÍøÕ¾£¬£¬ £¬µ«²¿·ÖÓòÃûÈÔ¿É»á¼û£¬£¬ £¬ÌåÏÖ¿ÉÄܱ£´æÎ´²é·âÓòÃû»òÐÂÓòÃû×¢²á¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/streameast-the-largest-pirated-sports-platform-disrupted-by-police/


5. SaaS¾ÞÍ·WorkivaÔÚSalesforce¹¥»÷ºóÅû¶Êý¾Ýй¶


9ÔÂ3ÈÕ£¬£¬ £¬Workiva×÷ΪÁìÏȵÄÔÆSaaSЧÀÍÉÌ£¬£¬ £¬×¨×¢²ÆÎñ±¨¸æ¡¢ºÏ¹æ¼°Éó¼ÆÊý¾ÝÖÎÀí£¬£¬ £¬Ð§ÀÍ6305¼Ò¿Í»§£¬£¬ £¬2024ÄêÔ¤¼ÆÓªÊÕ7.39ÒÚÃÀÔª¡£¡£¡£ ¡£¡£¿ËÈÕ£¬£¬ £¬¸Ã¹«Ë¾×ª´ï¿Í»§³Æ£¬£¬ £¬¹¥»÷Õßͨ¹ýµÚÈý·½CRMϵͳSalesforce²»·¨»ñÈ¡²¿·Ö¿Í»§Êý¾Ý£¬£¬ £¬°üÀ¨ÐÕÃû¡¢ÓÊÏä¡¢µç»°¼°Ö§³ÖƱ֤ÄÚÈÝ£¬£¬ £¬µ«Workivaƽ̨½¹µãÊý¾ÝδÊܲ¨¼°¡£¡£¡£ ¡£¡£´Ë´ÎÊÂÎñÓëShinyHuntersÀÕË÷¼¯ÍŽüÆÚÕë¶ÔSalesforceÉú̬µÄ¹¥»÷¸ß¶È¹ØÁª¡£¡£¡£ ¡£¡£¸Ã¼¯ÍÅ×ÔÄêÍ·Æðͨ¹ýÓïÒô´¹ÂÚ£¨vishing£©¼°OAuthÁîÅÆÀÄÓ㬣¬ £¬ÉøÍ¸¶à¼ÒÆóÒµSalesforceʵÀý£¬£¬ £¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬±¾´Î¹¥»÷·¾¶Óë½üÆÚ¶àÆð´óÐÍ»ú¹¹Êý¾Ýй¶ģʽÏàËÆ¡£¡£¡£ ¡£¡£WorkivaÇ¿µ÷£¬£¬ £¬ÆäCRM¹©Ó¦ÉÌͨ¹ý¹ØÁªµÚÈý·½Ó¦ÓÃ̻¶»á¼ûȨÏÞ£¬£¬ £¬Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£ ¡£¡£¹«Ë¾ÒÑÌáÐÑÊÜÓ°Ïì¿Í»§Ð¡ÐÄÓã²æÊ½´¹ÂÚ¹¥»÷£¬£¬ £¬²¢ÖØÉê¹Ù·½ÏàͬÇþµÀµÄΨһÐÔ£¬£¬ £¬¾øÇ·ºà¹ý¶ÌÐÅ»òµç»°Ë÷ÒªÇå¾²ÐÅÏ¢¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/saas-giant-workiva-discloses-data-breach-after-salesforce-attack/


6. ºÚ¿ÍʹÓÃеÄHexStrike-AI¹¤¾ß¿ìËÙʹÓÃn-dayÎó²î


9ÔÂ3ÈÕ£¬£¬ £¬ºÚ¿ÍÕý´ó¹æÄ£Ê¹ÓÃÃûΪHexStrike-AIµÄÐÂÐÍÈ˹¤ÖÇÄܹ¥»÷¿ò¼Ü£¬£¬ £¬¼ÓËÙÐÂÅû¶n-dayÎó²îµÄÎäÆ÷»¯Àú³Ì¡£¡£¡£ ¡£¡£CheckPoint Research±¨¸æÏÔʾ£¬£¬ £¬¸Ã¿ò¼ÜÓë°µÍøÖÐÕë¶ÔCitrixÎó²î£¨ÈçCVE-2025-7775¡¢CVE-2025-7776£©µÄ¿ìËÙʹÓûÇ×½üÏà¹Ø¡£¡£¡£ ¡£¡£×èÖ¹2025Äê9ÔÂ2ÈÕ£¬£¬ £¬ÈÔÓнü8000¸ö¶ËµãÒ×ÊÜCVE-2025-7775¹¥»÷£¬£¬ £¬½ÏǰһÖÜïÔÌ­2Íò¸ö£¬£¬ £¬µ«Îó²îÅû¶Óë´ó¹æÄ£Ê¹ÓõÄʱ¼ä´°¿ÚÒѼ±¾çËõ¶ÌÖÁÊýСʱ¡£¡£¡£ ¡£¡£HexStrike-AIÓÉÍøÂçÇå¾²Ñо¿Ô±Muhammad Osama¿ª·¢£¬£¬ £¬Ô­ÎªÕýµ±ºì¶Ó¹¤¾ß£¬£¬ £¬Í¨¹ý¼¯³ÉAIÊðÀí¿É×ÔÖ÷ÔËÐÐ150ÓàÖÖÍøÂçÇå¾²¹¤¾ß£¬£¬ £¬ÊµÏÖÉøÍ¸²âÊÔÓëÎó²î·¢Ã÷µÄ×Ô¶¯»¯¡£¡£¡£ ¡£¡£Æä¿Í»§¶Ë¾ß±¸ÖØÊÔÂß¼­Óë»Ö¸´´¦Öóͷ£ÄÜÁ¦£¬£¬ £¬¿É×Ô¶¯µ÷½âÉèÖÃÖ±ÖÁ²Ù×÷Àֳɡ£¡£¡£ ¡£¡£¸Ã¹¤¾ß¿ªÔ´ºóѸËÙ×ߺ죬£¬ £¬GitHub»ñ1800ÐDZêÓ볬400´Îfork£¬£¬ £¬È´Ò²Òý·¢ºÚ¿Í¹Ø×¢¡£¡£¡£ ¡£¡£¾ÝCheckPointÅû¶£¬£¬ £¬ºÚ¿ÍÂÛ̳ÒÑ·ºÆð¸Ã¹¤¾ßµÄ°²ÅÅÌÖÂÛ£¬£¬ £¬¹¥»÷ÕßʹÓÃÆäÕë¶ÔCitrix NetScaler ADC¼°GatewayÁãÈÕÎó²î£¬£¬ £¬ÊµÏÖδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬ £¬²¢ÔÚÊÜѬȾװ±¸Ö²ÈëWebshell£¬£¬ £¬ÉõÖÁ¹ûÕæ³öÊÛÊÜ¿ØÊµÀý¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-use-new-hexstrike-ai-tool-to-rapidly-exploit-n-day-flaws/