Aisuru½©Ê¬ÍøÂç·¢¶¯ÁË29.7 Tbps DDoS¹¥»÷

Ðû²¼Ê±¼ä 2025-12-05

1. Aisuru½©Ê¬ÍøÂç·¢¶¯ÁË29.7 Tbps DDoS¹¥»÷


12ÔÂ3ÈÕ£¬2025ÄêµÚÈý¼¾¶È£¬¹æÄ£ÖØ´óµÄAisuru½©Ê¬ÍøÂçÔÚÈý¸öÔÂÄÚÌᳫ1304´ÎÂþÑÜʽ¾Ü¾ø·þÎñ¹¥»÷£¬ÆäÖÐÒ»´Î´´¼Í¼µØµÖ´ï29.7Tbps·åÖµÁ÷Á¿£¬Ò»Á¬69Ã룬ͨ¹ýUDPµØÌºÊ½ºäÕ¨Ïòƽ¾ùÿÃë1.5Íò¸öÄ¿µÄ¶Ë¿ÚÇã×¢¡°À¬»ø¡±Á÷Á¿¡£¸Ã½©Ê¬ÍøÂçÓÉCloudflare¹ÀËãµÄ100ÍòÖÁ400Íǫ̀ÊÜѬȾװ±¸×é³É£¬°üÀ¨Â·ÓÉÆ÷ºÍÎïÁªÍø×°±¸£¬·¸·¨·Ö×Ó¿É̫ͨ¹ýÏúÉÌ×âÓÃÆä×é¼þÌᳫ¹¥»÷¡£CloudflareÊý¾ÝÏÔʾ£¬½ñÄêÒÑ»º½â2867´ÎAisuru¹¥»÷£¬½ü45%Ϊ³¬´óÁ÷Á¿¹¥»÷£¨Áè¼Ý1Tbps»ò10ÒÚ°ü/Ã룩¡£´Ëǰ×î¸ß22.2Tbps¹¥»÷¼°Î¢ÈíÅû¶µÄ15Tbps Azure¹¥»÷¾ù±»¹éÒòÓÚ´ËÍøÂç¡£±¾´Î29.7Tbps¹¥»÷Ëäδ¹ûÕæÄ¿µÄ£¬µ«ÆäÆÆËðÁ¦ÒÑÔ¶³¬Í¨Àý£¬CloudflareÖÒÑÔ£¬´ËÀ๥»÷¿É¼ä½Ó̱»¾Î´Êܹ¥»÷µÄ»¥ÁªÍø·þÎñÌṩÉÌ£¬ÈôÖ±½ÓÕë¶ÔÒªº¦»ù´¡ÉèÊ©¡¢Ò½ÁÆÇÀ¾È»ò¾üÊÂϵͳ£¬Ð§¹û²»¿°ÉèÏë¡£


https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/


2. ShopifyÈ«Çòå´»ú£¬É̼ÒÓû§µÇ¼ÉúÒâÊÜ×è


12ÔÂ2ÈÕ£¬2025ÄêÍøÂçÐÇÆÚÒ»¹ºÎïá¯Áëʱ´ú£¬È«ÇòµçÉ̾ÞÍ·ShopifyÍ»·¢´ó¹æÄ£å´»úÊÂÎñ£¬µ¼ÖÂÊýÍòÍòÔÚÏß¹ºÎïÕß¼°É̼ÒÃæÁٵǼÒì³£¡¢ÍøÕ¾µ¼º½ÊÜ×è¼°ÉúÒâϵͳ¹ÊÕÏ¡£¾Ý»¥ÁªÍø¼à¿ØÆ½Ì¨DowndetectorÊý¾Ý£¬ÃÀ¹ú¶«²¿Ê±¼äÉÏÎç9µãÆð£¬Óû§Í¶ËßÁ¿¼¤Ôö£¬11µã´ï·åÖµ4000ÓàÆð£»Ó¢¹úͬÆÚÒ౨¸æ2800ÓàÆð¹ÊÕÏ£¬È«Çò³¬56%Óû§ÔâÓöµÇ¼ÎÊÌ⣬25%·´Ó¦ÍøÕ¾»á¼ûÒì³££¬19%±£´æ·þÎñÆ÷ÅþÁ¬Ê§°Ü¡£ShopifyÔÚÉÏÎç10µãͨ¹ý¹Ù·½ÇþµÀÈϿɡ°²¿·ÖµêËÁÖÎÀíԱȨÏÞ¹ÊÕÏ¡±£¬²¢½¨ÒéÓû§¡°¼á³Ö×°±¸µÇ¼״̬¡±¡£È»¶ø£¬´ó×ÚÉ̼ҷ´Ïì³Æ¡°ËùÓÐÃŵê¾ùÎÞ·¨µÇ¼¡±£¬ÇÒPOSϵͳÒàÊܲ¨¼°£¬Ó°ÏìÉúÒâ´¦Öóͷ£¡¢¿â´æÖÎÀí¼°¿Í»§Êý¾Ýͬ²½¡£¹«Ë¾ºóÐøÔÚÏÂÖç2:31¸üÐÂÉùÃ÷£¬È·ÈϹÊÕÏÔ´ÓÚ¡°µÇ¼Éí·ÝÑéÖ¤Á÷³ÌȱÏÝ¡±£¬²¢Ðû²¼ÎÊÌâÒÑÐÞ¸´£¬ÏµÍ³ÕýÖð²½»Ö¸´¡£´Ë´Îå´»úÊÂÎñ²¨¼°¹æÄ£ÆÕ±é£¬´ÓÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢Òâ´óÀûµ½Ä«Î÷¸çµÈÈ«Çò¶àµØÓû§¾ù±¨¸æÊÜÓ°Ïì¡£


https://cybernews.com/news/shopify-down-for-thousands-during-cyber-monday-mania/


3. PredatorÌØ¹¤Èí¼þʹÓÃÐÂÐÍѬȾ;¾¶¾ÙÐÐÁãµã»÷¹¥»÷


12ÔÂ4ÈÕ£¬¿ËÈÕ£¬ÓÉInside Story¡¢HaaretzºÍWAV Research CollectiveÍŽáÊÓ²ì½ÒÆÆ£¬PredatorÌØ¹¤Èí¼þͨ¹ýÃûΪ¡°°¢À­¶¡¡±µÄÁãµã»÷ѬȾ»úÖÆ£¬½öÐèÉó²é¶ñÒâ¹ã¸æ¼´¿ÉÈëÇÖÌØ¶¨Ä¿µÄ¡£¸Ã»úÖÆ±»Òþ²ØÔÚ¶à¹ú¿Õ¿Ç¹«Ë¾±³ºó£¬»ùÓÚ¡°IntellexaйÃÜÊÂÎñ¡±µÄÄÚ²¿Îļþ¼°ÓªÏúÖÊÁÏ£¬²¢¾­¹ú¼ÊÌØÉâ×éÖ¯¡¢¹È¸èºÍRecorded FutureµÄÊÖÒÕÑо¿Ö¤Êµ¡£AladdinÓÚ2024ÄêÊ״ΰ²ÅÅ£¬Ê¹ÓÃÉÌÒµÒÆ¶¯¹ã¸æÏ½µµÍ÷´«¶ñÒâÈí¼þ£¬Í¨¹ýÐèÇ󷽯½Ì¨£¨DSP£©Ç¿Öƽ«ÎäÆ÷»¯¹ã¸æÍ¶·Åµ½Í¨¹ý¹«¹²IPµØµãµÈ±êʶ·ûʶ±ðµÄÌØ¶¨Ä¿µÄ£¬¹ã¸æ¿É·ºÆðÔÚÈκÎÏÔʾ¹ã¸æµÄÍøÕ¾»òÓ¦ÓÃÖУ¬Íâ¹ÛÓëͨË×¹ã¸æÎÞÒì¡£½öä¯ÀÀ¹ã¸æ¼´¿É´¥·¢Ñ¬È¾£¬ÎÞÐèµã»÷£¬¹ã¸æ»áÖØ¶¨ÏòÖÁIntellexaµÄÎó²îʹÓ÷þÎñÆ÷¡£¸Ã¹ã¸æÍøÂçÉæ¼°°®¶ûÀ¼¡¢µÂ¹ú¡¢ÈðÊ¿¡¢Ï£À°¡¢ÈûÆÖ·˹¡¢°¢ÁªÇõºÍÐÙÑÀÀûµÈ¶à¹ú¹ã¸æ¹«Ë¾¡£·ÀÓù²½·¥°üÀ¨ÆÁÕÏä¯ÀÀÆ÷¹ã¸æ¡¢Òþ²Ø¹«¹²IPµØµã£¬µ«Ð¹Â¶ÎļþÏÔʾIntellexaÈÔ¿É´Ó¿Í»§ËùÔÚ¹úµÄÒÆ¶¯ÔËÓªÉÌ»ñÊØÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/


4. ÷è÷ëÀÕË÷Èí¼þÉù³Æ¹¥»÷ɽ´ï»ù½Ì»á£¬Ð¹Â¶ÄÚ²¿Ãô¸ÐÊý¾Ý


12ÔÂ4ÈÕ£¬÷è÷ëÀÕË÷Èí¼þ½«É½´ï»ù½Ì»áÁÐÈëÆä°µÍøÐ¹Â¶Ãûµ¥£¬Éù³Æ¶ÔÊý¾Ýй¶ÊÂÎñÈÏÕæ£¬²¢Ðû²¼22ÕŽØÍ¼×÷ΪÈëÇÖÖ¤¾Ý¡£½ØÍ¼ÏÔʾ£¬¹¥»÷Éæ¼°Ó¢¹úʥɽ¸ß¼¶×éÖ¯£¨AOSH UK£©µÄÄÚ²¿È¨ÏÞ£¬°üÀ¨×Ú½ÌÊÂÇéְԱǩ֤´¦Öóͷ£¼Í¼¡¢ÒÆÃñÓöȲ¦¿îÃ÷ϸ£¨ÈçÿÈË2600ÖÁ4500Ó¢°÷µÄǩ֤Óöȣ©¡¢ÔËÓªÖ§³ö¼°Ô˶¯ºóÇÚÊý¾Ý¡£ÀýÈ磬һ·ÝÔ¤ËãÎļþÏÔʾ£¬Ä³²¦¿îÖÜÆÚÄÚ³¬11500Ó¢°÷ÓÃÓÚǩ֤ÉêÇ룬ÁíÒ»ÎļþÔòÁгö3ÍòÓ¢°÷ÓÃÓÚÓʼþÐû´«¼°½ÚÈպؿ¨·Ö·¢£¬ÉÐÓÐ6351Ó¢°÷ÓÃÓÚ¹ú¼ÊÓÊ×Ê¡¢6000Ó¢°÷ÓÃÓÚÊÓÌý×°±¸²É¹º¡£Ð¹Â¶Êý¾Ý»¹Éæ¼°°²±£ÍýÏ룬°üÀ¨2024-2025Äê×ܶî½ü10ÍòÓ¢°÷µÄ°²±£Ô¤Ë㣬º­¸ÇËѱ¬È®·þÎñ¡¢ÒªÔ±±£»¤¡¢Î§À¸½¨ÉèµÈ£¬ÏêϸÈç74,326Ó¢°÷ÓÃÓÚÒªÔ±±£»¤ÍŶÓ£¬29,217Ó¢°÷ÓÃÓÚÍâµØÖܱ߰²±£¡£±ðµÄ£¬²ÆÎñ·¢Æ±¡¢ÒøÐÐÕË»§ÐÅÏ¢¼°»áԱСÎÒ˽¼ÒÊý¾Ý£¨ÈçÈ«Ãû¡¢µç»°¡¢ÂÃÐмͼ£©Ò²±»ÆØ¹â£¬ÀýÈç¡°À­¶¡ÒáÈËʿɨ³ýÀÖ¶Ó2025Äê11Ô¡±±í¸ñ°üÀ¨°¢¸ùÍ¢¡¢°ÍÎ÷µÈ¶à¹úÖ°Ô±µÄÏêϸÐÅÏ¢¡£


https://hackread.com/qilin-ransomware-church-of-scientology-data-theft/


5. Array AG VPN×°±¸ÏÂÁî×¢ÈëÎó²îÔâºÚ¿ÍʹÓÃ


12ÔÂ4ÈÕ£¬¿ËÈÕ£¬ÍþвÐÐΪÕßÕýʹÓÃArray AGϵÁÐVPN×°±¸ÖеÄÏÂÁî×¢ÈëÎó²îÖ²Èëwebshell²¢½¨Éè¶ñÒâÓû§¡£Array NetworksÓÚ½ñÄê5ÔÂͨ¹ýÇå¾²¸üÐÂÐÞ¸´Á˸ÃÎó²î£¬µ«Î´·ÖÅÉCVE±êʶ·û£¬µ¼ÖÂÎó²î¸ú×ÙÓë²¹¶¡ÖÎÀíÖØ´ó»¯¡£ÈÕ±¾ÅÌËã»úÓ¦¼±ÏìӦС×飨JPCERT£©Ðû²¼Í¨¸æÖÒÑÔ£¬ºÚ¿Í×Ô8ÔÂÆðÒÑʹÓøÃÎó²î¹¥»÷ÈÕ±¾¾³ÄÚ×éÖ¯£¬¹¥»÷ÕßÊÔͼÔÚ·¾¶/ca/aproxy/webapp/°²ÅÅPHP webshellÎļþ¡£¸ÃÎó²îÓ°ÏìArrayOS AG 9.4.5.8¼°¸üÔç°æ±¾£¬ÓÈÆäÊÇÆôÓÃÁË¡°DesktopDirect¡±Ô¶³Ì»á¼û¹¦Ð§µÄAGϵÁÐÓ²¼þºÍÐéÄâ×°±¸¡£Array Networks AGϵÁÐ×÷ΪÇå¾²»á¼ûÍø¹Ø£¬ÒÀÀµSSL VPN½¨Éè¼ÓÃÜËíµÀ£¬ÆÕ±éÓÃÓÚÆóÒµÔ¶³Ì»á¼ûÍøÂç¡¢Ó¦Óá¢×ÀÃæ¼°ÔÆ×ÊÔ´£¬Í¨³£±»´óÐÍ×éÖ¯ÓÃÓÚÖ§³ÖÔ¶³Ì»òÒÆ¶¯°ì¹«¡£JPCERTÖ¸³ö£¬Array OS 9.4.5.9ÒÑÐÞ¸´¸ÃÎÊÌâ¡£ÈôÎÞ·¨Éý¼¶£¬½¨Òé½ûÓÃËùÓÐδʹÓõÄDesktopDirect·þÎñ£¬»òͨ¹ýURL¹ýÂË×èÖ¹°üÀ¨·ÖºÅµÄURL»á¼û¡£¾ÝÇå¾²Ñо¿Ô±Yutaka SejiyamaɨÃ裬ȫÇò¹²ÓÐ1831¸öArrayAGʵÀý£¬Ö÷ÒªÂþÑÜÔÚÖйú¡¢ÈÕ±¾ºÍÃÀ¹ú£¬ÆäÖÐÖÁÉÙ11̨Ö÷»úÆôÓÃÁËDesktopDirect¹¦Ð§£¬µ«ÏÖʵÊýÄ¿¿ÉÄܸü¸ß¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/


6. Companjon°ü¹Ü¿Æ¼¼¹«Ë¾Ì»Â¶ÊýÍòÍòÂÃÐÐÐÅÏ¢¼°PII


12ÔÂ3ÈÕ£¬¿ËÈÕ£¬°ü¹Ü¿Æ¼¼¹«Ë¾CompanjonÒòδÊܱ£»¤µÄApache KafkaÁ÷й¶Êý°ÙÍòÌõÈÕÖ¾£¬Éæ¼°ÂÃÐÐÐг̡¢È«Ãû¡¢µç×ÓÓʼþµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢¡£CybernewsÍŶÓÓÚ2025Äê8ÔÂÏÂÑ®·¢Ã÷¸ÃÎó²î£¬ÔÚÆßÌìÄڼͼ³¬1500ÍòÌõÊý¾Ý£¬¹ÀËã×Üй¶Á¿¿ÉÄÜ´ï9.6ÒÚÌõ£¬ÆäÖÐÔ¼0.1%£¨Ô¼96ÍòÌõ£©°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£Ð¹Â¶´°¿ÚÆÚΪ8ÔÂ20ÈÕÖÁ28ÈÕ£¬Éæ¼°Trainline¡¢Omio¡¢TripXµÈÂÃÐÐÆ½Ì¨µÄAPI½»»¥Êý¾Ý£¬°üÀ¨Î´À´ÖÁ2026ÄêµÄÂÃÐÐõè¾¶¡¢º½¿Õ¹«Ë¾¡¢ÈÕÆÚ¼°²ÆÎñÐÅÏ¢¡£Companjon×÷ΪB2B2C·þÎñÉÌ£¬ÎªÂÃÐÐÉçµÈÆóÒµÌṩ°ü¹Ü·þÎñ£¬Í¨¹ýÍøÂçÖÕ¶ËÓû§Êý¾ÝÖ§³ÖÏàÖú·½Íƹã¡£´Ë´Îй¶µÄÈÕÖ¾ÖУ¬²¿·Ö¼Í¼°üÀ¨ÊÚȨÁîÅÆ£¬¹¥»÷ÕßÀíÂÛÉÏ¿ÉʹÓÃÕâЩÐÅÏ¢Ìᳫ½øÒ»²½¹¥»÷£¬ÈçÕ©Æ­»òϵͳÈëÇÖ¡£Ñо¿Ö°Ô±Ö¸³ö£¬ÍŽáÂÃÐС¢²ÆÎñ¼°Î»ÖÃÊý¾Ý£¬¿Í»§ÃæÁٸ߶ÈÕë¶ÔÐÔթƭΣº¦£¬ÀýÈçð³ä¾Æ»ï¼Æ¹¤Íþв×÷·ÏÔ¤¶©ÒÔÆ­È¡¸¶¿î¡£


https://cybernews.com/security/companjon-kafka-leak-travel-data/