»¥ÁªÍøµµ°¸¹Ý£¨Archive.org£©Òò¶Ïµçµ¼Ö·þÎñÖÜÈ«ÖÐÖ¹
Ðû²¼Ê±¼ä 2025-03-271. »¥ÁªÍøµµ°¸¹Ý£¨Archive.org£©Òò¶Ïµçµ¼Ö·þÎñÖÜÈ«ÖÐÖ¹
3ÔÂ26ÈÕ£¬»¥ÁªÍøµµ°¸¹Ý£¨Internet Archive£©×÷Ϊ³ÐÔØWayback MachineµÄÊý×ÖÀúÊ·±¦¿â£¬¿ËÈÕÒòÍ»·¢¶Ïµçµ¼Ö·þÎñÖÜÈ«ÖÐÖ¹£¬Òý·¢È«ÇòÓû§¹Ø×¢¡£¸Ã»ú¹¹Í¨¹ýÉ罻ýÌå֤ʵ£¬¹¤³ÌʦÍŶÓÕýÔÚ½ôÆÈÇÀÐÞµçÁ¦¹ÊÕÏÒÔ»Ö¸´»á¼û£¬µ«´Ë´ÎÊÂÎñµÄʱ¼ä½ÚµãÇ¡·êÆäÇ徲Σ»úÃô¸ÐÆÚ£¬Òý·¢Íâ½ç¶ÔÊÂÎñ¹ØÁªÐÔµÄÒܲ⡣×÷ΪÉúÑÄ»¥ÁªÍøÓ°ÏóµÄ½¹µã»ù´¡ÉèÊ©£¬»¥ÁªÍøµµ°¸¹Ý²»µ«´æ´¢×ź£Á¿ÀúÊ·ÍøÒ³¡¢Êé¼®¡¢ÒôÊÓÆµ×ÊÁÏ£¬¸ü¼ç¸º×ÅÊý×ÖÎÄ»¯ÒŲú±£»¤µÄÖ÷ҪʹÃü¡£´Ë´Îå´»úÊÂÎñÖ±½ÓÓ°ÏìÑо¿Ö°Ô±¡¢ÀúʷѧÕß¼°ÒÀÀµÆäÊý¾Ý¾ÙÐÐÎÄ»¯Ñо¿µÄÈ«ÇòÓû§ÈºÌå¡£¹Ù·½Ðû²¼µÄ"ÔÝʱÀëÏß"ÉùÃ÷Ë佫Ե¹ÊÔÓÉÃ÷È·¹éÒòÓÚµçÁ¦¹©Ó¦ÎÊÌ⣬µ«±¬·¢Ôڸûú¹¹¸ÕÂÄÀú´ó¹æÄ£DDoS¹¥»÷£¨2024Äê10Ô£©¼°3100ÍòÓû§ÕË»§Êý¾Ýй¶ÊÂÎñÖ®ºó£¬ÈÔÄÑÃâÒý·¢¶Ô»ù´¡ÉèÊ©Çå¾²ÈÍÐÔµÄÉî¶ÈÌÖÂÛ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬´Ë´ÎµçÁ¦¹ÊÕÏÓëǰÆÚÍøÂç¹¥»÷ÊÇ·ñ×é³ÉÒò¹ûÁ´ÉÐδ»ñµÃ¹Ù·½Ö¤Êµ¡£ÏÖÔÚ£¬°üÀ¨Wayback MachineÔÚÄڵĽ¹µã·þÎñÒѻָ´ÔËÐУ¬µ«´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÊý×Ö´æµµ»ú¹¹Çå¾²·À»¤µÄ¾¯ÖÓ¡£
https://hackread.com/internet-archive-archive-org-down-power-outage/
2. StreamElementsÒòÀúÊ·ÏàÖú·½Îó²îÖÂÓû§Êý¾Ýй¶
3ÔÂ26ÈÕ£¬ÔÆÁ÷ýÌå·þÎñƽ̨StreamElementsÈ·ÈÏÔâÓöÊý¾Ýй¶ÊÂÎñ£¬Ð¹Â¶Ô´Í·ÎªÒÑÖÕÖ¹ÏàÖúµÄµÚÈý·½·þÎñÌṩÉÌ¡£¹«Ë¾½ôÆÈÉùÃ÷Ç¿µ÷×ÔÉí·þÎñÆ÷δ±»ÈëÇÖ£¬µ«ÈÏ¿É2020-2024Äê¼äͨ¹ý¾ÉÏàÖúͬ°é´æ´¢µÄÓû§Êý¾ÝÔ⵽й¶£¬ÊÜÓ°ÏìÐÅÏ¢°üÀ¨Óû§È«Ãû¡¢µØµã¡¢µç»°¼°µç×ÓÓÊÏäµÈÃô¸Ð×ÊÁÏ¡£ºÚ¿Í×éÖ¯Éù³ÆÍ¨¹ý¶ñÒâÈí¼þѬȾԱ¹¤×°±¸£¬½ø¶ø½ÓÊÜÄÚ²¿ÕË»§²¢»á¼û¶©µ¥ÖÎÀíϵͳʵÑéÊý¾ÝÇÔÈ¡¡£Ö»¹ÜÏêϸй¶¹æÄ£ÉÐδ¾¹Ù·½È·ÈÏ£¬µ«Æ½Ì¨ÒÑÏòÓû§·¢³öÍøÂç´¹ÂÚ¹¥»÷Ô¤¾¯£¬ÌØÊâÖ¸³ö²»·¨·Ö×Ó¿ÉÄÜʹÓô˴ÎÊÂÎñαÔì"Êý¾Ýй¶֪ͨ"ÓʼþʵÑéÕ©Æ¡£´Ë´ÎÊÂÎñÒý¿¯ÐÐÒµ¶Ô¹©Ó¦Á´Çå¾²µÄ¸ß¶È¹Ø×¢¡£¹«Ë¾ÌåÏÖÕýÔÚÍŽáµÚÈý·½Õö¿ªÊӲ죬µ«ÉÐδÆô¶¯ÕýʽµÄÓû§Í¨ÖªÁ÷³Ì¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ºÚ¿ÍÔÚBreachForumsÐû²¼µÄй¶ÉùÃ÷Òѱ»É¾³ý£¬ÊÂÎñºóÐøÉú³¤ÈÔÐèÒ»Á¬×·×Ù¡£Ç徲ר¼Ò½¨ÒéÏà¹ØÊ±¶Î×¢²áÓû§Á¬Ã¦ÌáÉýÕË»§Ç徲Ʒ¼¶£¬ÆôÓöàÒòËØÈÏÖ¤²¢¼à¿ØÒì³£µÇ¼ÐÐΪ¡£
https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/
3. ÍøÂç·¸·¨Æ½Ì¨Atlantis AIO×Ô¶¯»¯¹¥»÷Íþв140¶à¸öÔÚÏß·þÎñ
3ÔÂ26ÈÕ£¬ÐÂÐÍÍøÂç·¸·¨Æ½Ì¨"Atlantis AIO"µÄ¸¡ÏÖÕ¹ÏÖÍøÂçºÚ²úÕý¼ÓËÙÏò·þÎñ»¯×ªÐÍ¡£¸Ã·¸·¨¼´·þÎñ(CSaaS)¹¤¾ßÕë¶ÔÈ«Çò140Óà¸ö¸ß¼ÛÖµÔÚÏß·þÎñÌṩ×Ô¶¯»¯¹¥»÷½â¾ö¼Æ»®£¬º¸Çµç×ÓÓʼþ¡¢µçÉÌ¡¢½ðÈÚ¼°VPNµÈÃô¸ÐÁìÓò¡£Æä½¹µã¹¦Ð§°üÀ¨Èý´ó¹¥»÷Ä£¿é£ºÍ¨¹ý±©Á¦ÆÆ½âºÍÕË»§»Ö¸´Á÷³Ì×Ô¶¯»¯ÊµÑ鯾֤Ìî³ä¹¥»÷£¬ÍŽáCAPTCHAÈÆ¹ýÊÖÒÕÌáÉý¹¥»÷ЧÂÊ£¬×îÖÕ½«±»µÁÕË»§ÅúÁ¿×ªÊÛÓÚµØÏÂÊг¡Ä²Àû¡£Æ¾Ö¤Ìî³ä¹¥»÷×÷Ϊ×îÆÕ±éµÄÍøÂç·¸·¨ÊֶΣ¬ºã¾ÃÀ§ÈÅOkta¡¢PayPalµÈ´óÐÍÆóÒµ¡£Atlantis AIO½«´ËÀ๥»÷ÎäÆ÷»¯£¬Ìṩģ¿é»¯¶¨ÖÆ·þÎñ£¬Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÒà¿ÉʵÑ龫׼¹¥»÷¡£Æä¹¥»÷Á´ÏÔʾ£¬¹¥»÷ÕßÊ×ÏÈʹÓÃй¶Êý¾Ý¿âÖÐµÄÆ¾Ö¤ÊµÑéÅúÁ¿µÇ¼ʵÑ飬ÍŽáÈõÃÜÂë×ֵ䱩Á¦ÆÆ½â£¬¼Ì¶øÀÄÓÃÕË»§»Ö¸´»úÖÆ½ÓÊÜδÆôÓöàÒòËØÈÏÖ¤µÄÕË»§¡£µ½Êֺ󣬱»µÁÕË»§ÒÔÿ¸ö0.5ÃÀÔªÆð¼ÛÔÚ°µÍø×ªÊÛ£¬ÐγÉÍêÕûµÄÐþÉ«¹¤ÒµÁ´¡£Ç徲ר¼Ò½¨ÒéΪСÎÒ˽¼ÒÕË»§ÉèÖÃÇ¿ÃÜÂë+¶àÒòËØÈÏÖ¤Ë«ÖØ°ü¹Ü£¬ÊµÊ±ÏìÓ¦Òì³£µÇ¼Ԥ¾¯£»ÆóÒµÔòÐè°²ÅÅËÙÂÊÏÞÖÆ¡¢ÐÐΪÆÊÎöµÈÊÖÒÕÊֶΣ¬Éý¼¶CAPTCHA·À»¤ÏµÍ³£¬¹¹½¨×Ô¶¯·ÀÓù»úÖÆ¡£
https://www.bleepingcomputer.com/news/security/new-atlantis-aio-automates-credential-stuffing-on-140-services/
4. ArkanaÀÕË÷×éÖ¯ÈëÇÖÃÀ¹úµçÐÅÌṩÉÌWideOpenWest
3ÔÂ26ÈÕ£¬ÐÂÐÍÀÕË÷Èí¼þ×éÖ¯"Arkana Security"Ìᳫ¸ßΣº¦ÐÔÍøÂç¹¥»÷£¬Ä¿µÄÖ±Ö¸ÃÀ¹úµÚÁù´óµçÐÅÔËÓªÉÌWideOpenWest£¨WOW!£©¡£¹¥»÷ÕßÉù³ÆÒÑÉøÍ¸ÆóÒµ½¹µãϵͳ£¬²»µ«ÇÔÈ¡°üÀ¨403,000¼°220ÍòÌõÓû§ÕË»§µÄÃô¸ÐÊý¾Ý¿â£¬¸üʵÏÖ¶ÔÒªº¦ÔËӪϵͳ£¨AppianCloudÓëSymphonica£©µÄÍêÈ«¿ØÖÆ¡£±»µÁÊý¾Ýº¸ÇÓû§Æ¾Ö¤¡¢Çå¾²ÐÅÏ¢¡¢È¨ÏÞÉèÖõȽ¹µã×ʲú£¬ÆäչʾµÄ¹¥»÷ÄÜÁ¦ÏÔʾ¿ÉʵÑé¶ñÒâÈí¼þ°²ÅÅ¡¢½ðÈÚÉúÒâ¸Ä¶¯µÈÉî¶ÈÆÆË𡣸Ã×éÖ¯½ÓÄÉË«ÖØÀÕË÷Õ½ÂÔ£ºÒ»·½ÃæÔÚTor°µÍø¹ûÕæ²¿·ÖÊý¾ÝÑù±¾Ê©Ñ¹£¬ÍþвÈô²»Öª×ãÊê½ðÒªÇó½«È«Á¿³öÊÛÊý¾Ý£»ÁíÒ»·½ÃæÊµÑé"ÈËÈâËÑË÷"£¬Ð¹Â¶ÆóÒµ¸ß¹ÜСÎÒ˽¼ÒÐÅÏ¢¾ÙÐÐÐßÈè¹¥»÷¡£Çå¾²ÆÊÎöÖ¸³ö£¬´ËÀ๥»÷¶ÔµçÐÅ·þÎñÉÌµÄÆÆËð¾ßÓÐÁ¬ËøÐ§Ó¦¡ª¡ª¿Í»§ÐÅÍбÀËú½«Ö±½Ó¹¥»÷·þÎñÐø¶©ÂÊ£¬¶øÖ´·¨ºÏ¹æ±¾Ç®¿ÉÄÜÍ»ÆÆÍòÍòÃÀÔªÁ¿¼¶¡£
https://www.securityweek.com/new-ransomware-group-claims-attack-on-us-telecom-firm-wideopenwest/
5. Sydney ToolsÊý¾Ý¿âй¶¿Í»§¶©µ¥ÓëÔ±¹¤Ãô¸ÐÐÅÏ¢
3ÔÂ25ÈÕ£¬°Ä´óÀûÑÇרҵ¹¤¾ßÁãÊÛÉÌSydney ToolsÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Ì»Â¶µÄδ¼ÓÃÜÊý¾Ý¿âÒ»Á¬Ð¹Â¶Ô±¹¤¼°¿Í»§Ãô¸ÐÐÅÏ¢¡£Ð¹Â¶Êý¾Ý°üÀ¨5000ÓàÃûÏÖÖ°¼°È¥Ö°Ô±¹¤µÄÐÕÃû¡¢²¿·Ö¡¢Ð½×ʼ°ÏúÊÛÄ¿µÄµÈ½¹µãÈËÁ¦×ÊÔ´ÐÅÏ¢£¬Í¬Ê±Éæ¼°³¬3400ÍòÌõ¿Í»§ÔÚÏß¶©µ¥¼Í¼£¬º¸ÇÐÕÃû¡¢×¡Ö·¡¢µç»°¡¢ÓÊÏä¼°¹ºÖÃÃ÷ϸµÈСÎÒ˽¼ÒÒþ˽¡£Çå¾²Ñо¿Ö°Ô±ÖÒÑÔ£¬´Ë´Îй¶ÐγÉË«ÖØ¹¥»÷Ãæ£ºÔ±¹¤Êý¾Ý¿É±»ÓÃÓڲ߻®¸ß¹ÜÓã²æÊ½´¹ÂÚ¹¥»÷£¬¶ø¿Í»§¹ºÖüͼÖеĸ߼ÛÉÌÆ·ÐÅÏ¢ÔòÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ˾«×¼Õ©ÆÄ¿µÄ¡£¹¥»÷Õß¿Éͨ¹ýαÔì¶©µ¥È·ÈÏÓʼþ»òÎïÁ÷֪ͨ£¬ÓÕµ¼Êܺ¦Õß½øÒ»²½Ð¹Â¶Ãô¸ÐÊý¾Ý¡£¸üÑÏËàµÄÊÇ£¬Ö»¹ÜÒÑ·¢Ã÷Îó²î£¬Ì»Â¶Êý¾Ý¿âÈÔδ¹Ø±Õ£¬Êý¾ÝÒ»Á¬Íâй״̬¼Ó¾çÁËΣº¦¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬ÆóÒµ¹Ù·½×ª´ïµÄǧÃûÔ±¹¤¹æÄ£Óëй¶Êý¾ÝÖеÄ5000È˼ͼ±£´æÏÔÖøÃ¬¶Ü£¬ÌåÏÖÈ¥Ö°Ô±¹¤ÐÅÏ¢ÒàÔâ̻¶¡£´ËÀà°üÀ¨Ð½×ÊˮƽµÄÃô¸ÐÊý¾Ý£¬ÍŽá¼ÒͥסַµÈµØÀíÐÅÏ¢£¬½«¼«´óÌáÉýÉí·Ý͵ÇÔ·¸·¨µÄÀÖ³ÉÂÊ¡£×¨¼Ò½¨ÒéÊÜÓ°ÏìÓû§Á¬Ã¦¼ì²éÕË»§Òì³££¬ÆôÓöàÒòËØÈÏÖ¤£¬²¢¼à¿ØÐ¡ÎÒ˽¼ÒÕ÷Ðű¨¸æ×ª±ä¡£ÆóÒµÔòÐèÖÜÈ«Éó²éÊý¾ÝȨÏÞÖÎÀí£¬ÊµÑéÊý¾Ý¿â¼ÓÃܺͻá¼ûÉ󼯣¬½¨Éè×Ô¶¯»¯Îó²îɨÃè»úÖÆ¡£
https://cybernews.com/security/sydney-tools-exposed-data-leak/
6. ChromeÐÞ¸´¸ßΣÁãÈÕÎó²î£¬×è¶ÏÕë¶Ô¶í»ú¹¹Ìع¤¹¥»÷Á´
3ÔÂ26ÈÕ£¬¹È¸è½ôÆÈÐÞ¸´Á˱àºÅΪCVE-2025-2783µÄ¸ßΣChromeÁãÈÕÎó²î£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÈÆ¹ýä¯ÀÀÆ÷ɳºÐ·À»¤£¬ÔÚÄ¿µÄϵͳִÐжñÒâ´úÂë¡£¸ÃÎó²îÓÉ¿¨°Í˹»ùÇå¾²ÍŶӷ¢Ã÷£¬ÆäʵÖÊΪWindowsϵͳMojo×é¼þÔÚ´¦Öóͷ£Î´Ã÷È·½ç˵µÄ²Ù×÷ʱ±¬·¢Î£ÏÕ¾ä±ú£¬¿É±»Ê¹ÓÃʵÏÖɳºÐÌÓÒÝ¡£¹È¸èÒÑΪ×ÀÃæÎȹ̰æÓû§ÍÆËÍ134.0.6998.178¸üУ¬Óû§Òà¿É¿ªÆô×Ô¶¯¸üй¦Ð§»ñÈ¡ÐÞ¸´¡£Çå¾²ÆÊÎöÏÔʾ£¬¸ÃÎó²îÕý±»ÓÃÓÚÕë¶Ô¶íÂÞ˹ýÌå¡¢½ÌÓý»ú¹¹µÄÍøÂçÌØ¹¤Ô˶¯£¬¹¥»÷Õßͨ¹ýαÔì"ÆÕÀïÂí¿Æ·òÔĶÁ"¿ÆÑ§ÂÛ̳ԼÇ뺯ʵÑé´¹ÂÚ¹¥»÷£¬½«Êܺ¦ÕßÖØ¶¨ÏòÖÁ¶ñÒâÓòÃûprimakovreadings[.]info¡£¿¨°Í˹»ùÖ¸³ö£¬¹¥»÷ÕßʹÓôËÎó²îÁ´°²ÅÅÖØ´ó¶ñÒâÈí¼þ£¬ÆäÄ¿µÄÒÉÊÇÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ÖµµÃ×¢ÖØµÄÊÇ£¬¹¥»÷Õß»¹ÍŽáÁ˵ڶþ¸öδ¹ûÕæÎó²îʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬ÐγÉË«ÖØ¹¥»÷Á´Â·¡£¹È¸èËäÈ·ÈÏÎó²î±£´æÇÒÒѱ»Ê¹Ó㬵«Î´Åû¶Ïêϸ¹¥»÷ϸ½Ú£¬½öÌåÏÖÔÚ´ó¶¼Óû§Íê³É¸üÐÂǰ½«ÏÞÖÆÎó²îÐÅÏ¢À©É¢¡£Ç徲ר¼ÒÇ¿µ÷£¬ÊµÊ±×°ÖÃChrome¸üпÉ×è¶ÏÄ¿½ñÒÑÖªµÄ¹¥»÷Á´£¬ÓÐÓ÷ÀÓùDZÔÚÍþв¡£
https://www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/


¾©¹«Íø°²±¸11010802024551ºÅ