²¼À¸ñÓÎÏ·¼¯ÍÅÔâ·êÍøÂç¹¥»÷£¬£¬ÄÚ²¿ÏµÍ³ÊÜÓ°Ïì
°ä²¼¹¦·ò 2025-08-218ÔÂ19ÈÕ£¬£¬³ÛÃûiGamingÄÚÈÝÓë¼¼Êõ½â¾ö¹æ»®ÌṩÉ̲¼À¸ñÓÎÏ·¼¯ÍÅ£¨Bragg£©ÉÏÖÜÄ©Ôâ·êÍøÂç¹¥»÷£¬£¬ÆäÄÚ²¿ÏµÍ³Êܵ½¿Ï¶¨Ó°Ïì¡£¸ÃÊÂÎñ²úÉúÓÚÖÜÈÕÁ賿£¬£¬µ«¹«Ë¾ÖÜÒ»¹«¿ªÉêÃ÷³Æ£¬£¬Õâ´Î¹¥»÷²¢Î´¶ÔÔËÓªÔì³ÉÄÚÈÝÐÔ×ÌÈÅ¡£Æ¾¾Ý²¼À¸ñ³õ´ëÊ©²éÁ˾֣¬£¬Êý¾Ýй¶ÁìÓò½öÏÞÓÚÆóÒµÄÚ²¿ÍÆËã»ú»·¾³£¬£¬Î´²¨¼°Íⲿ¿Í»§»òºÏ×÷ͬ°éµÄϵͳ¡£²¼À¸ñÔÚÉêÃ÷ÖÐÇ¿µ÷£¬£¬Ö»¹Ü¹¥»÷Õ߳ɹ¦½Ó¼ûÁËÊÜϰȾϵͳÄڵIJ¿ÃÅÊý¾Ý£¬£¬µ«Ä¿Ç°ÉÐδ·¢ÏÖÈκÎСÎÒÐÅÏ¢±»Ð¹Â¶µÄ¼£Ïó¡£¹«Ë¾Í¬Ê±°µÊ¾£¬£¬Õâ´ÎÊÂÎñδ¶ÔÆä³ÖÐøÔËÓªÄÜÁ¦²úÉú¸ºÃæÓ°Ï죬£¬ËùÓйؼüÒµÎñÖ°ÄÜÈÔά³ÖÕý³£ÔËÐУ¬£¬ÄÚ²¿ÈËÔ±¶ÔÓйØÊý¾ÝµÄ½Ó¼ûȨÏÞҲδÊÜÏÞ¡£ÎªÓ¦¶ÔÕâ´ÎΣ»ú£¬£¬²¼À¸ñÒÑѸËÙÆô¶¯Ó¦¼±Ô¤°¸£¬£¬Ô̺¬²ÉÈ¡¼¼Êõ´ëÊ©¶ôÖÆ¹¥»÷À©É¢¡¢¡¢ÀñƸÍâ²¿ÍøÂ簲ȫר¼ÒÐÖúµ÷²éÓë²¹¾È¹¤×÷£¬£¬²¢³ÖÐø¼à¿ØÏµÍ³×´Ì¬ÒÔÔ¤·À¶þ´Î·çÏÕ¡£½ØÖÁĿǰ£¬£¬²¼À¸ñÉÐδÅû¶¹¥»÷µÄ¾ßÌåϸ½Ú£¬£¬Ô̺¬¹¥»÷ÀàÐÍ¡¢¡¢ÈëÇÖõè¾¶¼°ÔðÈη½Éí·Ý¡£
https://www.securityweek.com/gambling-tech-firm-bragg-discloses-cyberattack/
2. °Ä´óÀûÑÇTPGµçÐÅÕýÔÚµ÷²éiiNetºÚ¿Í¹¥»÷ÊÂÎñ
8ÔÂ19ÈÕ£¬£¬°Ä´óÀûÑÇÒÆ¶¯Í¨Ñ¶¾ÞÍ·TPG Telecom½üÈÕÅû¶ÁËһ·Õë¶ÔÆäÆìÏÂiiNetÆ·ÅÆµÄÍøÂ簲ȫÊÂÎñ¡£¸Ã¹«Ë¾Öܶþ°µÊ¾£¬£¬ÆäÓÃÓÚÖÎÀíiiNet¿í´øµÈ·þÎñ¶©µ¥µÄÄÚ²¿ÏµÍ³Ôâ·êδ¾ÊÚȨ½Ó¼û£¬£¬Ä¿Ç°ÕýÔÚ¾ÍÊÂÎñÓ°Ïì·¢Õ¹È«Ãæµ÷²é¡£Õâ´ÎÊÂÎñËäÎ´Éæ¼°Ö§¸¶¿¨ÐÅÏ¢¡¢¡¢ÒøÐÐÕË»§»òÉí·ÝÖ¤¼þµÈÃô¸ÐÊý¾Ý£¬£¬µ«ÒÑÈ·Èϲ¿Ãſͻ§»ù´¡ÐÅÏ¢±»ÇÔÈ¡£¬£¬³ÉΪ°Ä´óÀûÑǽüÆÚÓÖһ·Òý·¢¹Ø×¢µÄÍøÂ簲ȫÊÂÎñ¡£Æ¾¾ÝTPG Telecom°ä²¼µÄÉêÃ÷£¬£¬ÈëÇÖÐÐΪͨ¹ýÇÔȡһÃûÔ±¹¤µÄÕË»§Æ¾Ö¤Ö´ÐУ¬£¬¹¥»÷ÁìÓò±»³õ²½½ÚÖÆÔÚiiNet¶©µ¥ÖÎÀíϵͳÖС£¸Ã¹«Ë¾Ç¿µ÷£¬£¬Ä¿Ç°ÉÐÎÞÖ¤¾ÝÅú×¢¸ü¿í·ºµÄϵͳ»òÆäËû¿Í»§ÈºÌåÊܵ½Ó°Ï졣Ȼ¶ø£¬£¬³õ´ëÊ©²éÒÑÈ·ÈϺڿͳɹ¦»ñÈ¡ÁËÈýÀàÊý¾Ý£º£ºÔ¼28Íò¸ö»îÔ¾iiNetµç×ÓÓʼþµØÖ·¡¢¡¢2Íò¸ö»îÔ¾¹Ì¶¨µç»°ºÅÂ룬£¬ÒÔ¼°1000×éÔ̺¬Óû§Ãû¡¢¡¢ÏÖʵµØÖ·ºÍµç»°ºÅÂëµÄ¿Í»§ÐÅÏ¢¡£´ËÍ⣬£¬Ô¼1700¸öµ÷ÖÆ½âµ÷Æ÷ÉèÖÃÃÜÂëÒ²±»Ð¹Â¶£¬£¬¿ÉÄܶÔÓû§¼ÒÍ¥ÍøÂçÉ豸µÄ°²È«ÐÔ×é³ÉDZÔÚÍþв¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬TPG TelecomÔÚ²¼¸æÖгö¸ñ×¢Ã÷£¬£¬±»ÈëÇÖϵͳδ´æ´¢¿Í»§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢¡¢ÒøÐÐÕË»§ÏêÇé»òÉí·ÝÖ¤¼þ¸´Ó¡¼þµÈ¸ßÃô¸ÐÊý¾Ý£¬£¬ÕâÔڿ϶¨Ë®Æ½ÉϽµµÍÁË´ó¹æÄ£½ðÈÚÚ¿Æ»òÉí·ÝµÁÓõķçÏÕ¡£
https://www.securityweek.com/australias-tpg-telecom-investigating-iinet-hack/
3. ŦԼóÒ×ίԱ»áÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬Ó°Ïì47,000ÈË
8ÔÂ19ÈÕ£¬£¬Å¦Ô¼ÖÝóÒ×ίԱ»á£¨BCNYS£©½üÈÕÅû¶һ·ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬³¬¹ý4.7ÍòÃûСÎÒµÄÃô¸ÐÐÅÏ¢ÔâÇÔ£¬£¬³ÉΪÃÀ¹ú½üÆÚÓ°ÏìÁìÓò½Ï¹ãµÄÍøÂ簲ȫÊÂÎñÖ®Ò»¡£×÷ΪŦԼÖÝ×î´óµÄ¹ÍÖ÷лᣬ£¬BCNYS´ú±í3000Óà¸ö»áÔ±×éÖ¯£¬£¬Éæ¼°³¬120ÍòŦԼÖݾÍÒµÈ˶¡£¬£¬Õâ´ÎÊÂÎñ¶ÔÆä»áÔ±¼°Ô±¹¤ÒþÖÔ°²È«×é³ÉÖØ´óÍþв¡£Æ¾¾ÝÎļþ£¬£¬¹¥»÷ÕßÓÚ2ÔÂ24ÈÕÖÁ25ÈÕÈëÇÖBCNYSÄÚ²¿ÏµÍ³£¬£¬µ«Ö±ÖÁ8ÔÂ4Èղű»¼ì²â·¢ÏÖ£¬£¬¾àÀë½üÁù¸öÔ¡£¾µ÷²é£¬£¬ÍþвÐÐΪÕßÇÔÈ¡ÁËÔ̺¬Ð¡ÎÒ¡¢¡¢²ÆÕþ¼°Ò½ÁÆÐÅÏ¢µÄÎļþ£¬£¬Éæ¼°47,329ÃûÊÜÓ°Ïì¸ö±ð¡£¾ßÌåй¶Êý¾Ýº¸ÇÈ«Ãû¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢Öݼø±ðºÅµÈÉí·ÝÐÅÏ¢£»½ðÈÚ»ú¹¹Ãû³Æ¡¢¡¢ÕË»§Óë·ÓɺÅÂë¡¢¡¢Ö§¸¶¿¨ºÅ¡¢¡¢PINÂë¡¢¡¢µ½ÆÚÈÕ¡¢¡¢ÄÉ˰È˼ø±ðºÅ¼°µç×ÓÊðÃûµÈ²ÆÕþÐÅÏ¢£»ÒÔ¼°Ò½ÁÆ·þÎñÌṩÕßÐÕÃû¡¢¡¢Õï¶Ï²¡Çé¡¢¡¢´¦·½ÐÅÏ¢¡¢¡¢Ò½Öη¨Ê½¡¢¡¢½¡¿µ±£ÏÕµÈÒ½Áƽ¡¿µÊý¾Ý£¬£¬ÐÅÏ¢ÀàÐÍÖ®È«Ãæ¡¢¡¢Ãô¸Ð¶ÈÖ®¸ßÒý·¢¿í·º¹Ø×¢¡£BCNYSÔÚÎ¥¹æÍ¨Öªº¯ÖаµÊ¾£¬£¬ÊÂÎñ·¢ÏÖºóÒÑÁ¢¼´Æô¶¯Ó¦¼±ÏìÓ¦£¬£¬Ô̺¬½ÚÖÆÏµÍ³¡¢¡¢ÀñƸÍâ²¿ÍøÂ簲ȫר¼Òµ÷²é²¢È·±£»·¾³°²È«¡£
https://www.bleepingcomputer.com/news/security/business-council-of-new-york-state-discloses-data-breach-affecting-47-000-people/
4. ¶íÂÞ˹ºÚ¿ÍÔÙ¶ÈÏ®»÷²¨À¼Ë®µçÕ¾
8ÔÂ19ÈÕ£¬£¬¶íÂÞ˹ºÚ¿Í×éÖ¯½üÆÚ¶Ô²¨À¼ÌØÇзòµÄÒ»×ùË®µçÕ¾ÌáÒé¶þ´Î¹¥»÷£¬£¬³É¹¦·ÛËéÆä½ÚÖÆÏµÍ³ÓëÎÐÂÖ»úÉ豸£¬£¬Ôì³É¸üÑÏÖØµÄÔËÓªÖжϡ£Õâ´ÎÊÂÎñÊǸÃÉèÊ©5Ô³õ´ÎÔâÏ®ºóµÄÓÖÒ»´ÎÕë¶ÔÐÔ¹¥»÷£¬£¬ºÚ¿Í×éÖ¯°ä²¼µÄÊÓÆµ¾·ÖÎöÈ·ÒÔΪͳһÅúÍþвÐÐΪÕßËùΪ¡£²¨À¼°²È«×¨¼ÒÖ¸³ö£¬£¬±¾´Î¹¥»÷ͨ¹ý°Ñ³ÖÎÐÂÖ»úÊý¾ÝÇÖÈŵ糧ÔËÐУ¬£¬Æä·ÛËéÐÔ³¬¹ýÉϴε¼ÖÂÉèÊ©ÀëÏßµÄÊÂÎñ£¬£¬Í¹ÏÔ¹¥»÷Õ߶Թؼü»ù´¡ÉèÊ©µÄÉøÈëÄÜÁ¦Éý¼¶¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬²¨À¼¹¤Òµ½ÚÖÆÏµÍ³£¨ICS/OT£©½üÆÚÒѳÉÎªÍøÂç¹¥»÷µÄ¸ßƵָ±ê¡£¾Ý²¨À¼Ã½Ìåͳ¼Æ£¬£¬´ÓǰËĸöÔÂÄÚ£¬£¬È«¹ú¶àµØË®´¦Öó§¡¢¡¢ÎÛË®´¦Ö󧼰СÐÍË®µçÕ¾Ïà¼ÌÔâ·êÀàËÆ¹¥»÷¡£²¨À¼µ±¾ÖÒѶԳÖÐøÉý¼¶µÄÍøÂçÍþв×÷³ö»ØÓ¦¡£2024Äê5Ô£¬£¬²¨À¼ÍÆËã»úÓ¦¼±ÏìӦС×飨CERT Polska£©°ä²¼¡¶ÔËÓª¼¼Êõ£¨OT£©°²È«Ç¿»¯Ö¸ÄÏ¡·£¬£¬¶½´Ù¹¤ÒµÏµÍ³ÔËÓª·½Á¢¼´Ö´ÐзÀ»¤´ëÊ©£¬£¬Ô̺¬ÍøÂç·Ö¶Î¡¢¡¢½Ó¼û½ÚÖÆ¼°Òì³£ÐÐΪ¼à²â¡£Í¬Ä꣬£¬Êý×ÖÊÂÎñ²¿³¤¹«¿ªÖҸ湤ҵ½ÚÖÆÏµÍ³Ãæ¶ÔµÄ¡°ÑÏÖØÍþв¡±£¬£¬Ç¿µ÷¼ÓÇ¿»ù´¡ÉèÊ©ÍøÂ簲ȫÈç¼¢ËÆ¿Ê¡£
https://www.darkreading.com/cyberattacks-data-breaches/russian-hacktivists-polish-power-plant-attack
5. ÃÀ¹ú˾·¨²¿µ·»Ù¡°Ê·ÉÏ×îÇ¿¡±Rapper Bot½©Ê¬ÍøÂç
8ÔÂ19ÈÕ£¬£¬ÃÀ¹ú˾·¨²¿½üÈÕ°ä·¢³É¹¦½ÚÖÆ²¢Íß½âÁ˱»³ÆÎª¡°ÓÐÊ·ÒÔÀ´×î׳´óDDoS½©Ê¬ÍøÂçÖ®Ò»¡±µÄRapper Bot£¨ÓÖ³ÆEleven Eleven Botnet¡¢¡¢CowBot£©£¬£¬¸ÃÍøÂç×Ô2021ÄêÆðÓÉ22ËêµÄ¶íÀÕ¸ÔÖÝÓȽðÊоÓÃñÒÁÉ£¡¤¸£¶û´Ä£¨Ethan Foltz£©¿ª·¢²¢ÔËÓª¡£8ÔÂ6ÈÕ£¬£¬·¨Âɲ¿ÃÅÔÚ¸£¶û´ÄסËùÖ´ÐÐËѲéÁîºó£¬£¬ÆäÒѽ«½©Ê¬ÍøÂçµÄÖÎÀí½ÚÖÆÈ¨ÒÆ½»¹Ù·½£¬£¬²¢ÖÕÖ¹Á˳öÕ¾¹¥»÷Ö°ÄÜ¡£¸£¶û´ÄÖܶþÔÚÃÀ¹ú°¢À˹¼Ó´¦Ëù·¨Ôº±»¿ØÐÖú¼°Ö§Ê¹ÍÆËã»úÈëÇÖ×£¬×î¸ß¿ÉÃæ¶Ô10Äê½ûïÀ£¬£¬Ä¿Ç°ÉÐδ±»²¶µ«ÒÑ»ñ·¢¿ÛÁôÁî¡£¾Ýµ÷²é£¬£¬Rapper Bot½©Ê¬ÍøÂçÔÚ2024Äê4ÔÂÖÁ8Ô³õÆÚ¼ä·¢ÆðÁ˳¬37Íò´ÎDDoS¹¥»÷£¬£¬²¨¼°È«Çò80¸ö¹ú¶È£¬£¬Öйú¡¢¡¢ÈÕ±¾¡¢¡¢ÃÀ¹ú¡¢¡¢°®¶ûÀ¼¼°Ïã¸ÛµØÓò³ÉÎªÖØÒª¹¥»÷Ö¸±ê¡£¸ÃÍøÂçͨ¹ýϰȾÊý×ÖÊÓÆµÂ¼Ïñ»ú£¨DVR£©ºÍWi-Fi·ÓÉÆ÷µÈÎïÁªÍøÉ豸¹¹½¨£¬£¬ÊÜ¿ØÉ豸ÊýÁ¿´ï6.5ÍòÖÁ9.5Íǫ̀£¬£¬¹¥»÷Á÷Á¿·åÖµ´ïÿÃë2-3Õ×Õ×±ÈÌØ£¨TB£©£¬£¬×î´ó¹æÄ£¹¥»÷ÉõÖÁÍ»ÆÆ6TB/Ã룬£¬Ô¶³¬Í¨ÀýDDoS¹¥»÷¹æÄ£¡£ÃÀ¹ú¹ÙÔ±Ö¸³ö£¬£¬ÓÉÓڸý©Ê¬ÍøÂçÔËÓª¹¦·ò³¤´ïÈýÄ꣬£¬ÏÖʵÊܺ¦Õß¿ÉÄÜ´ïÊý°ÙÍò¼¶±ð£¬£¬Éæ¼°É豸ÊýÁ¿¼°¹¥»÷´ÎÊý¾ù¼«Îª¾ªÈË¡£
https://cyberscoop.com/rapper-bot-ddos-botnet-disrupted/
6. Ó¢ÌØ¶ûÄÚ²¿ÍøÕ¾·ìÏ¶ÆØ¹â£¬£¬È«Çò27ÍòÔ±¹¤ÐÅÏ¢Ãæ¶Ô·çÏÕ
8ÔÂ20ÈÕ£¬£¬°²È«×êÑÐÔ±Eaton ZveareÓÚ2024ÄêµÚËÄʱ¶È·¢ÏÖÓ¢ÌØ¶û¶à¸öÄÚ²¿ÍøÕ¾´æÔÚÑÏÖØ°²È«·ì϶£¬£¬ÕâЩ·ì϶ÔÊÐíÆäÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬»ñȡȫÇòÔ¼27ÍòÃûÓ¢ÌØ¶ûÔ±¹¤¼°¹¤È˵ÄСÎÒÐÅÏ¢¡£Ö»¹Ü·ì϶ÒÑÓÉÓ¢ÌØ¶ûʵʱÐÞ¸´£¬£¬µ«ÊÂÎñÈÔ¶³öÁËÆóÒµÄÚ²¿ÏµÍ³µÄ°²È«ÓÄ΢»·½Ú¡£¾ÝZveareÅû¶£¬£¬Ê׸ö·ì϶³Ê´Ë¿ÌÓ¢ÌØ¶ûÓ¡¶ÈÄÚ²¿ÍøÕ¾£¬£¬¸Ãƽ̨±¾ÓÃÓÚÔ±¹¤¶©¹ºÃûƬ£¬£¬Ðèͨ¹ýÐÕÃû¼ìË÷ÌìÉúÊý¾Ý¡£È»¶ø£¬£¬ÆäÊý¾Ý¿âÏÖʵ´æ´¢ÁËÈ«ÇòÓ¢ÌØ¶ûÔ±¹¤ÐÅÏ¢£¬£¬¹¥»÷Õ߿ɽè´ËÏÂÔØÐÕÃû¡¢¡¢µç×ÓÓʼþ¡¢¡¢µç»°ºÅÂ뼰ְλµÈÊý¾Ý£¬£¬ËùÐÒÉç±£º£ºÅÂë¡¢¡¢Ð½×ʵÈÃô¸ÐÐÅϢδ±»Ð¹Â¶¡£½øÒ»´ëÊ©²éÖУ¬£¬ZveareÓÖ·¢ÏÖÁ½¸öÄÚ²¿²úÆ·ÖÎÀíÍøÕ¾ÒòÓ²±àÂëÆ¾Ö¤´æÔÚÖÎÀíԱȨÏÞ·ì϶£¬£¬µ¼ÖÂËùÓÐÔ±¹¤¾ßÌåÐÅϢ¶³ö£»¶øµÚËĸö¹©¸øÉÌÊý¾ÝÖÎÀíÍøÕ¾ÔòÒòÉí·ÝÑéÖ¤ÈÆ¹ýÎÊÌ⣬£¬²»½öй¶Ա¹¤Êý¾Ý£¬£¬»¹Â¶³öÁË´óÁ¿Ó¢Ìضû¹©¸øÉ̵ĻúÃÜÐÅÏ¢¡£Ó¢ÌضûÔÚ2024Äê10ÔÂÊÕµ½·ì϶´«µÝºó£¬£¬ÒÑÁ¢¼´Ö´ÐÐÐÞ¸´´ëÊ©²¢ÍêÓñ³ÉÃæÕû¸Ä£¬£¬Ç¿µ÷¡°Î´²úÉúÏÖʵÊý¾Ýй¶»òδ¾ÊÚȨ½Ó¼û¡±¡£
https://www.securityweek.com/intel-employee-data-exposed-by-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ