Steam¡¢Riot GamesÒÉÔâ´ó¹æÄ£DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-10-11

1. Steam¡¢Riot GamesÒÉÔâ´ó¹æÄ£DDoS¹¥»÷


10ÔÂ7ÈÕ£¬ £¬£¬£¬£¬SteamÓëRiot GamesÔâÓö´ó¹æÄ£¹ÊÕÏ£¬ £¬£¬£¬£¬Íæ¼ÒÎÞ·¨ÔËÐС¶·´¿Ö¾«Ó¢¡·¡¶DOTA2¡·¡¶ÎÞη×óȯ¡·¡¶Ó¢ÐÛͬÃË¡·µÈÈÈÃÅÓÎÏ·£¬ £¬£¬£¬£¬Downdetectorƽ̨ӿÈëÊýǧÌõЧÀÍÆ÷¶ÏÁ¬±¨¸æ£¬ £¬£¬£¬£¬¹ÊÕϳÊÖØ¸´ÖÐÖ¹ÌØÕ÷¡£¡£¡£¡£Riot Games¹Ù·½×´Ì¬Ò³ÃæÈ·ÈÏÎÊÌ⣬ £¬£¬£¬£¬¹Ø±ÕÅÅλÈüÐÐÁв¢È«Á¦ÊӲ죬 £¬£¬£¬£¬¹ÊÕÏÓ°ÏìÁýÕÖWindows¡¢macOS¡¢iOS¡¢Androidȫƽ̨¡£¡£¡£¡£´Ë´Î¹ÊÕϲ¨¼°¹æÄ£Ô¶³¬ÓÎÏ·ÁìÓò£¬ £¬£¬£¬£¬PlayStationÍøÂç¡¢Epic Games¡¢Hulu¡¢AWS¡¢Xfinity¡¢CoxµÈ·ÇÓÎϷЧÀÍÉÌÒàÊÜÇ£Á¬£¬ £¬£¬£¬£¬Óû§ÐÎÈÝ¡°ÍøÂç³¹µ×ÔÓÂÒ¡±¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒÍÆ²â£¬ £¬£¬£¬£¬¹ÊÕÏ»òÓÉ´ó¹æÄ£DDoS¹¥»÷Òý·¢£¬ £¬£¬£¬£¬ÌᳫÕßÒÉËÆ¡°Aisuru¡±½©Ê¬ÍøÂ磬 £¬£¬£¬£¬¸ÃÍøÂçÔøÒÔ29.69Ì«±ÈÌØ/ÃëµÄ´ø¿í·åÖµ´´ÏÂÀúÊ·¼Í¼£¬ £¬£¬£¬£¬Ô¶³¬´ËǰCloudflare×èµ²µÄ22.2Tbps¹¥»÷¡£¡£¡£¡£¡°Aisuru¡±½©Ê¬ÍøÂçÓÉXLabÓÚ2024Äê8ÔÂÊ״η¢Ã÷£¬ £¬£¬£¬£¬¹æÄ£Ò»Á¬À©ÕÅ£¬ £¬£¬£¬£¬ÒÑ¿ØÖÆÔ¼30Íò¸ö½Úµã£¬ £¬£¬£¬£¬°üÀ¨A-MTKÉãÏñÍ·¡¢D-Link/Linksys·ÓÉÆ÷¡¢Íø¹Ø×°±¸¡¢Êý×Ö¼Ïñ»úµÈ±£´æÎó²îµÄÁªÍø×°±¸¡£¡£¡£¡£Æä¹¥»÷ÌØÕ÷ÎªÖØ´óTCP¡°µØÌºÊ½ºäÕ¨¡±£¬ £¬£¬£¬£¬Ä£ÄâÕýµ±Á÷Á¿¹æ±Ü¼ì²â£¬ £¬£¬£¬£¬ÊÖÒÕÏȽøÐÔ»ñÒµ½çÈϿɣ¬ £¬£¬£¬£¬Ïà¹Ø²¹¶¡ÒÑÈ«ÇòÍÆËÍ¡£¡£¡£¡£


https://cybernews.com/security/steam-riot-gaming-services-hit-by-disruptions-ddos-suspected/


2. ºÚ¿ÍÉù³ÆDiscordÊý¾Ýй¶£¬ £¬£¬£¬£¬550ÍòÓû§ÐÅÏ¢ÔâÆØ¹â


10ÔÂ8ÈÕ£¬ £¬£¬£¬£¬Discord¾ÍÆäµÚÈý·½Ö§³ÖϵͳZendeskʵÀýÊý¾Ýй¶ÊÂÎñÐû²¼ÉùÃ÷£¬ £¬£¬£¬£¬Ã÷È·¾Ü¾øÏòÍþвÐÐΪÕßÖ§¸¶ÈκÎÐÎʽµÄÊê½ð¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÍ¨¹ýÍâ°üBPOÌṩÉÌÖ§³ÖÊðÀíÕË»§ÈëÇÖϵͳ£¬ £¬£¬£¬£¬ÔÚ58СʱÄÚÇÔÈ¡ÁË1.6TBÊý¾Ý£¬ £¬£¬£¬£¬Éæ¼°550Íò×ÔÁ¦Óû§£¬ £¬£¬£¬£¬°üÀ¨Õþ¸®Éí·ÝÖ¤¡¢²¿·ÖÖ§¸¶ÐÅÏ¢¼°¶àÒòËØÉí·ÝÑéÖ¤Êý¾Ý¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬DiscordÅú²µ³ÆÏÖʵй¶µÄÕþ¸®Éí·ÝÖ¤ÕÕÆ¬Ô¼7ÍòÕÅ£¬ £¬£¬£¬£¬Ô¶µÍÓÚ¹¥»÷ÕßÐû³ÆµÄ210ÍòÕÅ£¬ £¬£¬£¬£¬²¢Ç¿µ÷¸ÃÊÂÎñ²¢·ÇÖ±½ÓÕë¶ÔDiscordµÄÎ¥¹æÐÐΪ£¬ £¬£¬£¬£¬¶øÊÇÉæ¼°¿Í»§Ö§³ÖµÄµÚÈý·½Ð§ÀÍÎó²î¡£¡£¡£¡£¾ÝÍþвÐÐΪÕß͸¶£¬ £¬£¬£¬£¬ÈëÇÖÔ´ÓÚDiscordÍâ°üÓªÒµÁ÷³ÌÍâ°ü£¨BPO£©ÌṩÉÌÕÐÆ¸µÄÖ§³ÖÊðÀíÕË»§±»µÁÓ㬠£¬£¬£¬£¬Í¨¹ýZendeskÖ§³ÖʵÀý»á¼ûÄÚ²¿ÏµÍ³£¬ £¬£¬£¬£¬Ö´ÐнûÓöàÒòËØÉí·ÝÑéÖ¤¡¢ÅÌÎÊÓû§µç»°ºÅÂë¼°µç×ÓÓʼþµØµãµÈ²Ù×÷¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÇÔÈ¡ÁË1.5TBƱ֤¸½¼þºÍÁè¼Ý100GBƱ֤¼Í¼£¬ £¬£¬£¬£¬Éæ¼°840ÍòÕÅÆ±Ö¤£¬ £¬£¬£¬£¬ÆäÖÐÔ¼58ÍòÓû§°üÀ¨Ö§¸¶ÐÅÏ¢¡£¡£¡£¡£ËûÃÇͨ¹ýZendeskÓëDiscordÄÚ²¿ÏµÍ³µÄ¼¯³É£¬ £¬£¬£¬£¬Ö´ÐÐÁËÊý°ÙÍò´ÎAPIÅÌÎÊÒÔ¼ìË÷¸ü´ó¶¼¾Ý¡£¡£¡£¡£ºÚ¿ÍÔøÒªÇóÖ§¸¶500ÍòÃÀÔªÊê½ð£¬ £¬£¬£¬£¬ºó½µÖÁ350ÍòÃÀÔª£¬ £¬£¬£¬£¬ÓÚ9ÔÂ25ÈÕÖÁ10ÔÂ2ÈÕʱ´úÓëDiscord¾ÙÐÐ˽ÏÂ̸ÅС£¡£¡£¡£Ì¸ÅÐÆÆËéºó£¬ £¬£¬£¬£¬¹¥»÷ÕßÍþв½«¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-claim-discord-breach-exposed-data-of-55-million-users/


3. CISA½«CVE-2025-27915Îó²îÁÐÈëKEVĿ¼


10ÔÂ7ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Synacor Zimbra Collaboration Suite£¨ZCS£©µÄCVE-2025-27915Îó²îÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¸ÃÎó²îΪ´æ´¢ÐÍXSSÎó²î£¬ £¬£¬£¬£¬Ô´ÓÚZCS 9.0-10.1°æ±¾ÖÐICSÎļþHTML¹ýÂËȱÏÝ£¬ £¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý¶ñÒâiCalendarÎļþ´¥·¢£¬ £¬£¬£¬£¬ÔÚÊܺ¦Õß·­¿ª°üÀ¨¶ñÒâÌõÄ¿µÄÓʼþʱִÐÐJavaScript£¬ £¬£¬£¬£¬ÊµÏÖ»á»°Ð®ÖÆ¡¢ÓʼþÖØ¶¨Ïò¼°Êý¾ÝÇÔÈ¡¡£¡£¡£¡£StrikeReadyÑо¿Ö°Ô±Åû¶£¬ £¬£¬£¬£¬2025ÄêÍ·¸ÃÎó²î±»ÓÃÓÚÁãÈÕ¹¥»÷£¬ £¬£¬£¬£¬¹¥»÷ÕßαÔìÀ´×ÔÀû±ÈÑÇˮʦÀñ±ö°ì¹«ÊҵĶñÒâICSÎļþ£¬ £¬£¬£¬£¬Ãé×¼°ÍÎ÷¾ü·½¡£¡£¡£¡£¶ñÒâ¾ç±¾Õë¶ÔZimbra Webmail£¬ £¬£¬£¬£¬ÇÔȡƾ֤¡¢Óʼþ¡¢ÁªÏµÈ˼°¹²ÏíÎļþ¼ÐÄÚÈÝ£¬ £¬£¬£¬£¬Êý¾Ýй¶ÖÁffrk.net¡£¡£¡£¡£Ö»¹ÜStrikeReadyÎÞ·¨¹éÒòÏêϸ×éÖ¯£¬ £¬£¬£¬£¬µ«Ö¸³ö¸Ã¹¥»÷Ðè×ÊÔ´¸»×ãµÄ¸ß¼¶ÍþвÐÐΪÕßʵÑ飬 £¬£¬£¬£¬ÆäTTPÓë°×¶íÂÞ˹APT×éÖ¯UNC1151ÏàËÆ¡£¡£¡£¡£Æ¾Ö¤CISAÔ¼ÊøÐÔÔËÓªÖ¸ÁBOD£©22-01£¬ £¬£¬£¬£¬Áª°î»ú¹¹ÐëÔÚ2025Äê10ÔÂ28ÈÕǰÐÞ¸´´ËÎó²î£¬ £¬£¬£¬£¬Í¬Ê±½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢ÐÞ¸´»ù´¡ÉèÊ©Îó²î¡£¡£¡£¡£


https://securityaffairs.com/183085/hacking/u-s-cisa-adds-synacor-zimbra-collaboration-suite-zcs-flaw-to-its-known-exploited-vulnerabilities-catalog.html


4. Storm-2657ÍÅ»ïÕë¶ÔÃÀ¹ú´óѧÈËΪϵͳµÄ¶¨Ïò¹¥»÷


10ÔÂ9ÈÕ£¬ £¬£¬£¬£¬ÍøÂç·¸·¨ÍÅ»ïStorm-2657×Ô2025Äê3ÔÂÆðÕë¶ÔÃÀ¹ú´óѧԱ¹¤Ìᳫ"º£µÁÈËΪµ¥"¹¥»÷£¬ £¬£¬£¬£¬Í¨¹ýÐ®ÖÆÈËΪ֧¸¶ÊµÑéÉÌÒµµç×ÓÓʼþй¶£¨BEC£©Õ©Æ­¡£¡£¡£¡£Î¢ÈíÍþвÇ鱨ÖÐÐÄ×îб¨¸æÏÔʾ£¬ £¬£¬£¬£¬¸ÃÍÅ»ïÖ÷ÒªÃé×¼WorkdayÈËÁ¦×ÊԴƽ̨ÕË»§£¬ £¬£¬£¬£¬µ«ÆäËûµÚÈý·½HR SaaSƽ̨ͬÑù±£´æÎ£º¦¡£¡£¡£¡£ÏÖÔÚÒÑÈ·ÈÏÈýËù´óѧµÄ11¸öÕË»§±»ÈëÇÖ£¬ £¬£¬£¬£¬²¢Ê¹ÓÃÕâЩÕË»§Ïò25Ëù´óѧµÄ½ü6000¸öÓÊÏä·¢ËÍ´¹ÂÚÓʼþ¡£¡£¡£¡£¹¥»÷Õß½ÓÄɸ߶¨ÖÆ»¯Éç»á¹¤³ÌÕ½ÂÔ£¬ £¬£¬£¬£¬ÓʼþÖ÷Ì⺭¸ÇУ԰ÒßÇ龯±¨¡¢Î÷ϯ²»µ±ÐÐΪ¾Ù±¨¡¢Ã°³äУ³¤Ö¸Áн³ê¸£Àû¸üÐÂ֪ͨµÈ³¡¾°£¬ £¬£¬£¬£¬ÓÕµ¼ÊÕ¼þÈ˵ã»÷º¬ÖÐÐÄÈË£¨AITM£©ÊÖÒյĴ¹ÂÚÁ´½Ó¡£¡£¡£¡£Í¨¹ýÇÔÈ¡¶àÒòËØÈÏÖ¤£¨MFA£©´úÂ룬 £¬£¬£¬£¬¹¥»÷ÕßÀÖ³ÉÇÖÈëExchange OnlineÕË»§£¬ £¬£¬£¬£¬ËæºóÉèÖÃÊÕ¼þÏ乿ÔòÆÁÕÏWorkdayÔ¤¾¯Óʼþ£¬ £¬£¬£¬£¬ÔÚµ¥µãµÇ¼£¨SSO£©»á¼ûÊܺ¦ÕßWorkdayÕË»§ºó£¬ £¬£¬£¬£¬¸Ä¶¯ÈËΪ֧¸¶ÉèÖò¢½«¿î×ÓÖØ¶¨ÏòÖÁ¹¥»÷Õß¿ØÖÆÕË»§¡£¡£¡£¡£¸üÒþ²ØµÄÊÇ£¬ £¬£¬£¬£¬ÍÅ»ïͨ¹ý×¢²á×ÔÉíµç»°ºÅÂëÖÁDuo MFA×°±¸½¨É賤ÆÚ»á¼û£¬ £¬£¬£¬£¬ÊµÏÖ¶ñÒâ²Ù×÷µÄÒþ²ØÉóÅú¡£¡£¡£¡£Î¢ÈíÇ¿µ÷£¬ £¬£¬£¬£¬´ËÀ๥»÷²¢·ÇÔ´ÓÚWorkdayƽ̨Îó²î£¬ £¬£¬£¬£¬¶øÊÇʹÓÃȱ·¦·À´¹ÂÚMFAµÄÕË»§Ç徲ȱÏÝ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-target-university-hr-employees-in-payroll-pirate-attacks/


5. RondoDox½©Ê¬ÍøÂçʹÓÃÈ«Çò56¸ön-dayÎó²îÌᳫ¹¥»÷


10ÔÂ9ÈÕ£¬ £¬£¬£¬£¬Ò»¸öÃûΪRondoDoxµÄÐÂÐÍ´óÐͽ©Ê¬ÍøÂçÒ»Á¬»îÔ¾£¬ £¬£¬£¬£¬×Ô6ÔÂÆðÕë¶Ô30ÓàÀà×°±¸Ìᳫ´ó¹æÄ£¹¥»÷£¬ £¬£¬£¬£¬Ê¹ÓÃ56¸öÒÑÖª¼°Î´·ÖÅÉCVEµÄÎó²îʵÑéÉøÍ¸¡£¡£¡£¡£¸ÃÍøÂç½ÓÄÉ¡°Îó²îÉ¢µ¯Ç¹¡±Õ½ÂÔ£¬ £¬£¬£¬£¬Í¨¹ýͬʱ´¥·¢¶à¸öÎó²î×î´ó»¯Ñ¬È¾¹æÄ££¬ £¬£¬£¬£¬¼´±ã¹¥»÷ÐÐΪÒ×±»¼ì²â¡£¡£¡£¡£Æä¹¥»÷Ä¿µÄ¾Û½¹Ì»Â¶ÓÚ»¥ÁªÍøµÄDVR¡¢NVR¡¢CCTVϵͳ¡¢ÍøÂçЧÀÍÆ÷¼°ÒÑÍ£²ú£¨EoL£©×°±¸£¬ £¬£¬£¬£¬ÕâЩװ±¸Òò¹Ì¼þ¸üÐÂÖͺó»òĬÈÏÆ¾Ö¤Î´Ð޸Ķø³ÉΪÖ÷ÒªÍ»ÆÆ¿Ú¡£¡£¡£¡£RondoDoxµÄÎäÆ÷¿â°üÀ¨´ó×Ún-dayÎó²î£¬ £¬£¬£¬£¬ÈçTP-Link Archer AX21·ÓÉÆ÷µÄCVE-2023-1389¡¢CVE-2024-3721¡¢CVE-2024-12856µÈ£¬ £¬£¬£¬£¬Éæ¼°Digiever¡¢QNAP¡¢D-Link¡¢TOTOLINKµÈÆ·ÅÆ×°±¸¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬¸Ã½©Ê¬ÍøÂ翪·¢ÕßÇ×½ü×·×ÙPwn2Own¾ºÈüÖÐչʾµÄÎó²î²¢¿ìËÙÎäÆ÷»¯£¬ £¬£¬£¬£¬ÀýÈçCVE-2023-1389Ôø±»Mirai½©Ê¬ÍøÂçÔÚ2023ÄêʹÓᣡ£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼·¢Ã÷RondoDox»¹°üÀ¨18¸öδ·ÖÅÉCVEµÄÏÂÁî×¢ÈëÎó²î£¬ £¬£¬£¬£¬Ó°ÏìD-Link NAS¡¢TVT/LILIN DVR¡¢Linksys·ÓÉÆ÷µÈ×°±¸£¬ £¬£¬£¬£¬Í¹ÏÔ¹©Ó¦Á´Ç徲Σº¦¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/rondodox-botnet-targets-56-n-day-flaws-in-worldwide-attacks/


6. ¿ý±±¿ËѧУӦÓóÌÐòHopHopй¶¶ùͯÊý¾Ý


10ÔÂ8ÈÕ£¬ £¬£¬£¬£¬¼ÓÄôó¿ý±±¿ËÊ¡Êý°ÙËùѧУ¼°ÍжùËùʹÓõÄHopHopÓ¦ÓóÌÐòÒòÊý¾Ýй¶ÊÂÎñÒý·¢ÑÏÖØ¶ùͯÇ徲Σº¦¡£¡£¡£¡£¸ÃÓ¦ÓÃ×Ô2016ÄêÍÆ³ö£¬ £¬£¬£¬£¬Ö¼ÔÚͨ¹ýGPS¶¨Î»»òÊÖ¶¯ÊäÈëЭµ÷¶ùͯ½ÓËÍʱ¼ä£¬ £¬£¬£¬£¬µ«ÏÖʵÔËÐÐÖÐ̻¶ÑÏÖØÇå¾²Îó²î£¬ £¬£¬£¬£¬µ¼Ö¶ùͯ¼°¼Ò³¤Ãô¸ÐÐÅϢй¶£¬ £¬£¬£¬£¬°üÀ¨È«Ãû¡¢ÕÕÆ¬¡¢Ñ§Ð£Ãû³ÆµÈ£¬ £¬£¬£¬£¬ÉõÖÁ±£´æ¶ñÒâְԱð³ä¼Ò³¤½Óº¢×ÓµÄDZÔÚΣº¦¡£¡£¡£¡£ÊÂÎñ½¹µãÎÊÌâÔÚÓÚî¿ÏµÈ±Ê§ÓëÔðÈÎÍÆÚᣡ£¡£¡£HopHopÓ¦ÓÃδ»ñ¿ý±±¿Ë½ÌÓý²¿Åú×¼£¬ £¬£¬£¬£¬²»ÔÚÆäÈÏÖ¤µÄÈýÊ®ÖÖÊý×Ö¹¤¾ßÇåµ¥ÖУ¬ £¬£¬£¬£¬ÊôÓÚδÂÄÀúÖ¤µÄ¡°ºÚÓ¦Óᱡ£¡£¡£¡£¼ÓÄôó¹ã²¥¹«Ë¾ÊÓ²ìÏÔʾ£¬ £¬£¬£¬£¬Õþ¸®ÔçÔÚÊý¾Ýй¶±¬·¢Á½ÖÜǰÒÑÖªÇé²¢¿ªÕ¹É󼯣¬ £¬£¬£¬£¬È´½«ÔðÈÎת¼Þ¸ø½ÌÓý»ú¹¹£¬ £¬£¬£¬£¬µ¼ÖÂѧУ¼°ÍжùËùÒ»Á¬Ê¹Óò»Çå¾²Ó¦Óó¤´ïÊýÖÜ¡£¡£¡£¡£Ö±ÖÁ10ÔÂ7ÈÕ£¬ £¬£¬£¬£¬ÔÚýÌ寨¹âѹÁ¦Ï£¬ £¬£¬£¬£¬Õþ¸®²ÅÒªÇó×èֹʹÓøÃÓ¦Ó㬠£¬£¬£¬£¬µ«´ËʱÒÑÓÐÊýǧÃû¶ùͯÊý¾Ý̻¶¡£¡£¡£¡£


https://cybernews.com/security/hophop-app-quebec-data-leak/