²¼À­¸ñÓÎÏ·¼¯ÍÅÔâÓöÍøÂç¹¥»÷£¬ÄÚ²¿ÏµÍ³ÊÜÓ°Ïì

Ðû²¼Ê±¼ä 2025-08-21
1. ²¼À­¸ñÓÎÏ·¼¯ÍÅÔâÓöÍøÂç¹¥»÷£¬ÄÚ²¿ÏµÍ³ÊÜÓ°Ïì


8ÔÂ19ÈÕ£¬×ÅÃûiGamingÄÚÈÝÓëÊÖÒÕ½â¾ö¼Æ»®ÌṩÉ̲¼À­¸ñÓÎÏ·¼¯ÍÅ£¨Bragg£©ÉÏÖÜÄ©ÔâÓöÍøÂç¹¥»÷£¬ÆäÄÚ²¿ÏµÍ³Êܵ½Ò»¶¨Ó°Ïì¡£¸ÃÊÂÎñ±¬·¢ÓÚÖÜÈÕÆÆÏþ£¬µ«¹«Ë¾ÖÜÒ»¹ûÕæÉùÃ÷³Æ£¬´Ë´Î¹¥»÷²¢Î´¶ÔÔËÓªÔì³ÉʵÖÊÐÔ×ÌÈÅ¡£Æ¾Ö¤²¼À­¸ñ³õ³ÌÐò²éЧ¹û£¬Êý¾Ýй¶¹æÄ£½öÏÞÓÚÆóÒµÄÚ²¿ÅÌËã»úÇéÐΣ¬Î´²¨¼°Íⲿ¿Í»§»òÏàÖúͬ°éµÄϵͳ¡£²¼À­¸ñÔÚÉùÃ÷ÖÐÇ¿µ÷£¬Ö»¹Ü¹¥»÷ÕßÀֳɻá¼ûÁËÊÜѬȾϵͳÄڵIJ¿·ÖÊý¾Ý£¬µ«ÏÖÔÚÉÐδ·¢Ã÷ÈκÎСÎÒ˽¼ÒÐÅÏ¢±»Ð¹Â¶µÄ¼£Ïó¡£¹«Ë¾Í¬Ê±ÌåÏÖ£¬´Ë´ÎÊÂÎñδ¶ÔÆäÒ»Á¬ÔËÓªÄÜÁ¦±¬·¢¸ºÃæÓ°Ï죬ËùÓÐÒªº¦ÓªÒµ¹¦Ð§ÈÔ¼á³ÖÕý³£ÔËת£¬ÄÚ²¿Ö°Ô±¶ÔÏà¹ØÊý¾ÝµÄ»á¼ûȨÏÞҲδÊÜÏÞ¡£ÎªÓ¦¶Ô´Ë´ÎΣ»ú£¬²¼À­¸ñÒÑѸËÙÆô¶¯Ó¦¼±Ô¤°¸£¬°üÀ¨½ÓÄÉÊÖÒÕ²½·¥×èÖ¹¹¥»÷À©É¢¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ìÓëµ÷½âÊÂÇ飬²¢Ò»Á¬¼à¿ØÏµÍ³×´Ì¬ÒÔ±ÜÃâ¶þ´ÎΣº¦¡£×èÖ¹ÏÖÔÚ£¬²¼À­¸ñÉÐδÅû¶¹¥»÷µÄÏêϸϸ½Ú£¬°üÀ¨¹¥»÷ÀàÐÍ¡¢ÈëÇÖ·¾¶¼°ÔðÈη½Éí·Ý¡£


https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/


2. °Ä´óÀûÑÇTPGµçÐÅÕýÔÚÊÓ²ìiiNetºÚ¿Í¹¥»÷ÊÂÎñ


8ÔÂ19ÈÕ£¬°Ä´óÀûÑÇÒÆ¶¯Í¨Ñ¶¾ÞÍ·TPG Telecom¿ËÈÕÅû¶ÁËÒ»ÆðÕë¶ÔÆäÆìÏÂiiNetÆ·ÅÆµÄÍøÂçÇå¾²ÊÂÎñ¡£¸Ã¹«Ë¾ÖܶþÌåÏÖ£¬ÆäÓÃÓÚÖÎÀíiiNet¿í´øµÈ·þÎñ¶©µ¥µÄÄÚ²¿ÏµÍ³ÔâÓöδ¾­ÊÚȨ»á¼û£¬ÏÖÔÚÕýÔÚ¾ÍÊÂÎñÓ°ÏìÕö¿ªÖÜÈ«ÊӲ졣´Ë´ÎÊÂÎñËäÎ´Éæ¼°Ö§¸¶¿¨ÐÅÏ¢¡¢ÒøÐÐÕË»§»òÉí·ÝÖ¤¼þµÈÃô¸ÐÊý¾Ý£¬µ«ÒÑÈ·Èϲ¿·Ö¿Í»§»ù´¡ÐÅÏ¢±»ÇÔÈ¡£¬³ÉΪ°Ä´óÀûÑǽüÆÚÓÖÒ»ÆðÒý·¢¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñ¡£Æ¾Ö¤TPG TelecomÐû²¼µÄÉùÃ÷£¬ÈëÇÖÐÐΪͨ¹ýÇÔȡһÃûÔ±¹¤µÄÕË»§Æ¾Ö¤ÊµÑ飬¹¥»÷¹æÄ£±»ÆðÔ´¿ØÖÆÔÚiiNet¶©µ¥ÖÎÀíϵͳÖС£¸Ã¹«Ë¾Ç¿µ÷£¬ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢¸üÆÕ±éµÄϵͳ»òÆäËû¿Í»§ÈºÌåÊܵ½Ó°Ï졣Ȼ¶ø£¬³õ³ÌÐò²éÒÑÈ·ÈϺڿÍÀֳɻñÈ¡ÁËÈýÀàÊý¾Ý£ºÔ¼28Íò¸ö»îÔ¾iiNetµç×ÓÓʼþµØµã¡¢2Íò¸ö»îÔ¾Àο¿µç»°ºÅÂ룬ÒÔ¼°1000×é°üÀ¨Óû§Ãû¡¢ÏÖʵµØµãºÍµç»°ºÅÂëµÄ¿Í»§ÐÅÏ¢¡£±ðµÄ£¬Ô¼1700¸öµ÷ÖÆ½âµ÷Æ÷ÉèÖÃÃÜÂëÒ²±»Ð¹Â¶£¬¿ÉÄܶÔÓû§¼ÒÍ¥ÍøÂç×°±¸µÄÇå¾²ÐÔ×é³ÉDZÔÚÍþв¡£ÖµµÃ×¢ÖØµÄÊÇ£¬TPG TelecomÔÚͨ¸æÖÐÌØÊâ˵Ã÷£¬±»ÈëÇÖϵͳδ´æ´¢¿Í»§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢ÒøÐÐÕË»§ÏêÇé»òÉí·ÝÖ¤¼þ¸´Ó¡¼þµÈ¸ßÃô¸ÐÊý¾Ý£¬ÕâÔÚÒ»¶¨Ë®Æ½ÉϽµµÍÁË´ó¹æÄ£½ðÈÚÕ©Æ­»òÉí·ÝµÁÓõÄΣº¦¡£


https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/


3. ŦԼÉÌҵίԱ»áÅû¶Êý¾Ýй¶ÊÂÎñ£¬Ó°Ïì47,000ÈË


8ÔÂ19ÈÕ£¬Å¦Ô¼ÖÝÉÌҵίԱ»á£¨BCNYS£©¿ËÈÕÅû¶һÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬Áè¼Ý4.7ÍòÃûСÎÒ˽¼ÒµÄÃô¸ÐÐÅÏ¢ÔâÇÔ£¬³ÉΪÃÀ¹ú½üÆÚÓ°Ïì¹æÄ£½Ï¹ãµÄÍøÂçÇå¾²ÊÂÎñÖ®Ò»¡£×÷ΪŦԼÖÝ×î´óµÄ¹ÍÖ÷Э»á£¬BCNYS´ú±í3000Óà¸ö»áÔ±×éÖ¯£¬Éæ¼°³¬120ÍòŦԼÖݾÍÒµÉú³Ý£¬´Ë´ÎÊÂÎñ¶ÔÆä»áÔ±¼°Ô±¹¤Òþ˽Çå¾²×é³ÉÖØ´óÍþв¡£Æ¾Ö¤Îļþ£¬¹¥»÷ÕßÓÚ2ÔÂ24ÈÕÖÁ25ÈÕÈëÇÖBCNYSÄÚ²¿ÏµÍ³£¬µ«Ö±ÖÁ8ÔÂ4Èղű»¼ì²â·¢Ã÷£¬¾àÀë½üÁù¸öÔ¡£¾­ÊӲ죬ÍþвÐÐΪÕßÇÔÈ¡Á˰üÀ¨Ð¡ÎÒ˽¼Ò¡¢²ÆÎñ¼°Ò½ÁÆÐÅÏ¢µÄÎļþ£¬Éæ¼°47,329ÃûÊÜÓ°Ïì¸öÌå¡£Ïêϸй¶Êý¾Ýº­¸ÇÈ«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢ÖÝʶÓÖÃûµÈÉí·ÝÐÅÏ¢£»½ðÈÚ»ú¹¹Ãû³Æ¡¢ÕË»§Óë·ÓɺÅÂë¡¢Ö§¸¶¿¨ºÅ¡¢PINÂë¡¢µ½ÆÚÈÕ¡¢ÄÉ˰ÈËʶÓÖÃû¼°µç×ÓÊðÃûµÈ²ÆÎñÐÅÏ¢£»ÒÔ¼°Ò½ÁÆ·þÎñÌṩÕßÐÕÃû¡¢Õï¶Ï²¡Çé¡¢´¦·½ÐÅÏ¢¡¢ÖÎÁƳÌÐò¡¢¿µ½¡°ü¹ÜµÈÒ½ÁÆ¿µ½¡Êý¾Ý£¬ÐÅÏ¢ÀàÐÍÖ®ÖÜÈ«¡¢Ãô¸Ð¶ÈÖ®¸ßÒý·¢ÆÕ±é¹Ø×¢¡£BCNYSÔÚÎ¥¹æÍ¨Öªº¯ÖÐÌåÏÖ£¬ÊÂÎñ·¢Ã÷ºóÒÑÁ¬Ã¦Æô¶¯Ó¦¼±ÏìÓ¦£¬°üÀ¨¿ØÖÆÏµÍ³¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÊӲ첢ȷ±£ÇéÐÎÇå¾²¡£


https://www.bleepingcomputer.com/news/security/business-council-of-new-york-state-discloses-data-breach-affecting-47-000-people/


4. ¶íÂÞ˹ºÚ¿ÍÔÙ¶ÈÏ®»÷²¨À¼Ë®µçÕ¾


8ÔÂ19ÈÕ£¬¶íÂÞ˹ºÚ¿Í×éÖ¯½üÆÚ¶Ô²¨À¼ÌØÇзòµÄÒ»×ùË®µçÕ¾Ìᳫ¶þ´Î¹¥»÷£¬ÀֳɯÆËðÆä¿ØÖÆÏµÍ³ÓëÎÐÂÖ»ú×°±¸£¬Ôì³É¸üÑÏÖØµÄÔËÓªÖÐÖ¹¡£´Ë´ÎÊÂÎñÊǸÃÉèÊ©5ÔÂÊ×´ÎÔâÏ®ºóµÄÓÖÒ»´ÎÕë¶ÔÐÔ¹¥»÷£¬ºÚ¿Í×éÖ¯Ðû²¼µÄÊÓÆµ¾­ÆÊÎöÈ·ÒÔΪͳһÅúÍþвÐÐΪÕßËùΪ¡£²¨À¼Ç徲ר¼ÒÖ¸³ö£¬±¾´Î¹¥»÷ͨ¹ýʹÓÃÎÐÂÖ»úÊý¾ÝÈÅÂҵ糧ÔËÐУ¬ÆäÆÆËðÐÔÁè¼ÝÉϴε¼ÖÂÉèÊ©ÀëÏßµÄÊÂÎñ£¬Í¹ÏÔ¹¥»÷Õß¶ÔÒªº¦»ù´¡ÉèÊ©µÄÉøÍ¸ÄÜÁ¦Éý¼¶¡£ÖµµÃ×¢ÖØµÄÊÇ£¬²¨À¼¹¤Òµ¿ØÖÆÏµÍ³£¨ICS/OT£©½üÆÚÒѳÉÎªÍøÂç¹¥»÷µÄ¸ßƵĿµÄ¡£¾Ý²¨À¼Ã½Ìåͳ¼Æ£¬ÒÑÍùËĸöÔÂÄÚ£¬ÌìÏÂ¶àµØË®´¦Öóͷ£³§¡¢ÎÛË®´¦Öóͷ£³§¼°Ð¡ÐÍË®µçÕ¾Ïà¼ÌÔâÓöÀàËÆ¹¥»÷¡£²¨À¼Õþ¸®ÒѶÔÒ»Á¬Éý¼¶µÄÍøÂçÍþв×÷³ö»ØÓ¦¡£2024Äê5Ô£¬²¨À¼ÅÌËã»úÓ¦¼±ÏìӦС×飨CERT Polska£©Ðû²¼¡¶ÔËÓªÊÖÒÕ£¨OT£©Ç徲ǿ»¯Ö¸ÄÏ¡·£¬±Þ²ß¹¤ÒµÏµÍ³ÔËÓª·½Á¬Ã¦ÊµÑé·À»¤²½·¥£¬°üÀ¨ÍøÂç·Ö¶Î¡¢»á¼û¿ØÖƼ°Òì³£ÐÐΪ¼à²â¡£Í¬Ä꣬Êý×ÖÊÂÎñ²¿³¤¹ûÕæÖÒÑÔ¹¤Òµ¿ØÖÆÏµÍ³ÃæÁٵġ°ÑÏÖØÍþв¡±£¬Ç¿µ÷ÔöÇ¿»ù´¡ÉèÊ©ÍøÂçÇå¾²¿Ì½ûÖ¹»º¡£


https://www.darkreading.com/cyberattacks-data-breaches/russian-hacktivists-polish-power-plant-attack


5. ÃÀ¹ú˾·¨²¿µ·»Ù¡°Ê·ÉÏ×îÇ¿¡±Rapper Bot½©Ê¬ÍøÂç


8ÔÂ19ÈÕ£¬ÃÀ¹ú˾·¨²¿¿ËÈÕÐû²¼ÀֳɿØÖƲ¢Íß½âÁ˱»³ÆÎª¡°ÓÐÊ·ÒÔÀ´×îǿʢDDoS½©Ê¬ÍøÂçÖ®Ò»¡±µÄRapper Bot£¨ÓÖ³ÆEleven Eleven Botnet¡¢CowBot£©£¬¸ÃÍøÂç×Ô2021ÄêÆðÓÉ22ËêµÄ¶íÀÕ¸ÔÖÝÓȽðÊÐסÃñÒÁÉ£¡¤¸£¶û´Ä£¨Ethan Foltz£©¿ª·¢²¢ÔËÓª¡£8ÔÂ6ÈÕ£¬Ö´·¨²¿·ÖÔÚ¸£¶û´ÄסËùÖ´ÐÐËѲéÁîºó£¬ÆäÒѽ«½©Ê¬ÍøÂçµÄÖÎÀí¿ØÖÆÈ¨ÒÆ½»¹Ù·½£¬²¢ÖÕÖ¹Á˳öÕ¾¹¥»÷¹¦Ð§¡£¸£¶û´ÄÖܶþÔÚÃÀ¹ú°¢À­Ë¹¼ÓµØÒªÁìÔº±»¿ØÐ­Öú¼°Ìô²¦ÅÌËã»úÈëÇÖ××î¸ß¿ÉÃæÁÙ10Äêî¿Ïµ£¬ÏÖÔÚÉÐδ±»²¶µ«ÒÑ»ñ·¢¾Ð²¶Áî¡£¾ÝÊӲ죬Rapper Bot½©Ê¬ÍøÂçÔÚ2024Äê4ÔÂÖÁ8Ô³õʱ´ú·¢¶¯Á˳¬37Íò´ÎDDoS¹¥»÷£¬²¨¼°È«Çò80¸ö¹ú¼Ò£¬Öйú¡¢ÈÕ±¾¡¢ÃÀ¹ú¡¢°®¶ûÀ¼¼°Ïã¸ÛµØÇø³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¸ÃÍøÂçͨ¹ýѬȾÊý×ÖÊÓÆµÂ¼Ïñ»ú£¨DVR£©ºÍWi-Fi·ÓÉÆ÷µÈÎïÁªÍø×°±¸¹¹½¨£¬ÊÜ¿Ø×°±¸ÊýÄ¿´ï6.5ÍòÖÁ9.5Íǫ̀£¬¹¥»÷Á÷Á¿·åÖµ´ïÿÃë2-3Õ×Õ×±ÈÌØ£¨TB£©£¬×î´ó¹æÄ£¹¥»÷ÉõÖÁÍ»ÆÆ6TB/Ã룬Զ³¬Í¨ÀýDDoS¹¥»÷¹æÄ£¡£ÃÀ¹ú¹ÙÔ±Ö¸³ö£¬ÓÉÓڸý©Ê¬ÍøÂçÔËӪʱ¼ä³¤´ïÈýÄ꣬ÏÖʵÊܺ¦Õß¿ÉÄÜ´ïÊý°ÙÍò¼¶±ð£¬Éæ¼°×°±¸ÊýÄ¿¼°¹¥»÷´ÎÊý¾ù¼«Îª¾ªÈË¡£


https://cyberscoop.com/rapper-bot-ddos-botnet-disrupted/


6. Ó¢ÌØ¶ûÄÚ²¿ÍøÕ¾Îó²îÆØ¹â£¬È«Çò27ÍòÔ±¹¤ÐÅÏ¢ÃæÁÙΣº¦


8ÔÂ20ÈÕ£¬Çå¾²Ñо¿Ô±Eaton ZveareÓÚ2024ÄêµÚËÄÐò¶È·¢Ã÷Ó¢ÌØ¶û¶à¸öÄÚ²¿ÍøÕ¾±£´æÑÏÖØÇå¾²Îó²î£¬ÕâЩÎó²îÔÊÐíÆäÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬»ñȡȫÇòÔ¼27ÍòÃûÓ¢ÌØ¶ûÔ±¹¤¼°¹¤È˵ÄСÎÒ˽¼ÒÐÅÏ¢¡£Ö»¹ÜÎó²îÒÑÓÉÓ¢ÌØ¶ûʵʱÐÞ¸´£¬µ«ÊÂÎñÈÔ̻¶ÁËÆóÒµÄÚ²¿ÏµÍ³µÄÇå¾²±¡Èõ»·½Ú¡£¾ÝZveareÅû¶£¬Ê׸öÎó²î·ºÆðÔÚÓ¢ÌØ¶ûÓ¡¶ÈÄÚ²¿ÍøÕ¾£¬¸Ãƽ̨±¾ÓÃÓÚÔ±¹¤¶©¹ºÊÖ´Ì£¬Ðèͨ¹ýÐÕÃû¼ìË÷ÌìÉúÊý¾Ý¡£È»¶ø£¬ÆäÊý¾Ý¿âÏÖʵ´æ´¢ÁËÈ«ÇòÓ¢ÌØ¶ûÔ±¹¤ÐÅÏ¢£¬¹¥»÷Õ߿ɽè´ËÏÂÔØÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂ뼰ְλµÈÊý¾Ý£¬ËùÐÒÉç±£ºÅÂ롢н×ʵÈÃô¸ÐÐÅϢδ±»Ð¹Â¶¡£½øÒ»³ÌÐò²éÖУ¬ZveareÓÖ·¢Ã÷Á½¸öÄÚ²¿²úÆ·ÖÎÀíÍøÕ¾ÒòÓ²±àÂëÆ¾Ö¤±£´æÖÎÀíԱȨÏÞÎó²î£¬µ¼ÖÂËùÓÐÔ±¹¤ÏêϸÐÅϢ̻¶£»¶øµÚËĸö¹©Ó¦ÉÌÊý¾ÝÖÎÀíÍøÕ¾ÔòÒòÉí·ÝÑéÖ¤ÈÆ¹ýÎÊÌ⣬²»µ«Ð¹Â¶Ô±¹¤Êý¾Ý£¬»¹Ì»Â¶ÁË´ó×ÚÓ¢ÌØ¶û¹©Ó¦É̵ÄÉñÃØÐÅÏ¢¡£Ó¢ÌضûÔÚ2024Äê10ÔÂÊÕµ½Îó²îת´ïºó£¬ÒÑÁ¬Ã¦ÊµÑéÐÞ¸´²½·¥²¢ÍêÓñ³ÉÃæÕû¸Ä£¬Ç¿µ÷¡°Î´±¬·¢ÏÖʵÊý¾Ýй¶»òδ¾­ÊÚȨ»á¼û¡±¡£


https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/