Aisuru½©Ê¬ÍøÂç·¢ÆðÁË29.7 Tbps DDoS¹¥»÷

°ä²¼¹¦·ò 2025-12-05

1. Aisuru½©Ê¬ÍøÂç·¢ÆðÁË29.7 Tbps DDoS¹¥»÷


12ÔÂ3ÈÕ£¬ £¬£¬2025ÄêµÚÈý¼¾¶È£¬ £¬£¬¹æÄ£ÖØ´óµÄAisuru½©Ê¬ÍøÂçÔÚÈý¸öÔÂÄÚÌáÒé1304´ÎÉ¢²¼Ê½»Ø¾ø·þÎñ¹¥»÷£¬ £¬£¬ÆäÖÐÒ»´Î´´¼Í¼µØ´ïµ½29.7Tbps·åÖµÁ÷Á¿£¬ £¬£¬³ÖÐø69Ã룬 £¬£¬Í¨¹ýUDPµØÌºÊ½ºäÕ¨Ïò¾ùÔÈÿÃë1.5Íò¸öÖ¸±ê¶Ë¿ÚÇãк¡°À¬»ø¡±Á÷Á¿¡£¸Ã½©Ê¬ÍøÂçÓÉCloudflare¹ÀËãµÄ100ÍòÖÁ400Íǫ̀ÊÜϰȾÉ豸×é³É£¬ £¬£¬Ô̺¬Â·ÓÉÆ÷ºÍÎïÁªÍøÉ豸£¬ £¬£¬·¸×ï·Ö×Ó¿Éͨ¹ý¶ÈÏúÉÌ×âÓÃÆä×é¼þÌáÒé¹¥»÷¡£CloudflareÊý¾ÝÏÔʾ£¬ £¬£¬½ñÄêÒÑ»º½â2867´ÎAisuru¹¥»÷£¬ £¬£¬½ü45%Ϊ³¬´óÁ÷Á¿¹¥»÷£¨³¬¹ý1Tbps»ò10ÒÚ°ü/Ã룩¡£´Ëǰ×î¸ß22.2Tbps¹¥»÷¼°Î¢ÈíÅû¶µÄ15Tbps Azure¹¥»÷¾ù±»¹éÒòÓÚ´ËÍøÂç¡£±¾´Î29.7Tbps¹¥»÷Ëäδ¹«¿ªÖ¸±ê£¬ £¬£¬µ«Æä·ÛËéÁ¦ÒÑÔ¶³¬Í¨Àý£¬ £¬£¬CloudflareÖҸ棬 £¬£¬´ËÀ๥»÷¿É¼ä½Ó̱»¾Î´Êܹ¥»÷µÄ»¥ÁªÍø·þÎñÌṩÉÌ£¬ £¬£¬ÈôÖ±½ÓÕë¶Ô¹Ø¼ü»ù´¡ÉèÊ©¡¢Ò½ÁƼ±¾È»ò¾üÊÂϵͳ£¬ £¬£¬ºó¹û²»Ê¤ÉèÏë¡£


https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/


2. ShopifyÈ«Çòå´»ú£¬ £¬£¬É̼ÒÓû§µÇ¼ÂòÂôÅö±Ú


12ÔÂ2ÈÕ£¬ £¬£¬2025ÄêÍøÂçÐÇÆÚÒ»¹ºÎï¶¥·åÆÚ¼ä£¬ £¬£¬È«ÇòµçÉ̾ÞÍ·ShopifyÍ»·¢´ó¹æÄ£å´»úÊÂÎñ£¬ £¬£¬µ¼ÖÂÊýǧÍòÔÚÏß¹ºÎïÕß¼°É̼ÒÃæ¶ÔµÇ¼Òì³£¡£¡¢ÍøÕ¾µ¼º½Åö±Ú¼°ÂòÂôϵͳ¹ÊÕÏ¡£¾Ý»¥ÁªÍø¼à¿ØÆ½Ì¨DowndetectorÊý¾Ý£¬ £¬£¬ÃÀ¹ú¶«²¿¹¦·òÉÏÎç9µãÆð£¬ £¬£¬Óû§Í¶ËßÁ¿¼¤Ôö£¬ £¬£¬11µã´ï·åÖµ4000ÓàÆð£»Ó¢¹úͬÆÚÒà»ã±¨2800ÓàÆð¹ÊÕÏ£¬ £¬£¬È«Çò³¬56%Óû§Ôâ·êµÇ¼ÎÊÌ⣬ £¬£¬25%·´Ó³ÍøÕ¾½Ó¼ûÒì³££¬ £¬£¬19%´æÔÚ·þÎñÆ÷ÏνÓʧ°Ü¡£ShopifyÔÚÉÏÎç10µãͨ¹ý¹Ù·½ÇþµÀÈϿɡ°²¿ÃŵêÆÌÖÎÀíԱȨÏÞ¹ÊÕÏ¡±£¬ £¬£¬²¢½¨ÒéÓû§¡°Î¬³ÖÉ豸µÇ¼״̬¡±¡£È»¶ø£¬ £¬£¬´óÁ¿É̼ҷ´À¡³Æ¡°ËùÓÐÃŵê¾ùÎÞ·¨µÇ¼¡±£¬ £¬£¬ÇÒPOSϵͳÒàÊܲ¨¼°£¬ £¬£¬Ó°ÏìÂòÂô´¦Öá¢¿â´æÖÎÀí¼°¿Í»§Êý¾Ýͬ²½¡£¹«Ë¾ºóÐø±ÉÈËÎç2:31¸üÐÂÉêÃ÷£¬ £¬£¬È·ÈϹÊÕÏÔ´ÓÚ¡°µÇ¼Éí·ÝÑéÖ¤Á÷³Ìȱµã¡±£¬ £¬£¬²¢°ä·¢ÎÊÌâÒÑÐÞ¸´£¬ £¬£¬ÏµÍ³ÕýÖ𲽸´Ô­¡£Õâ´Îå´»úÊÂÎñ²¨¼°ÁìÓò¿í·º£¬ £¬£¬´ÓÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢Òâ´óÀûµ½Ä«Î÷¸çµÈÈ«Çò¶àµØÓû§¾ù»ã±¨ÊÜÓ°Ïì¡£


https://cybernews.com/news/shopify-down-for-thousands-during-cyber-monday-mania/


3. Predator¼äµýÈí¼þÀûÓÃÐÂÐÍϰȾõè¾¶½øÐÐÁãµã»÷¹¥»÷


12ÔÂ4ÈÕ£¬ £¬£¬½üÈÕ£¬ £¬£¬ÓÉInside Story¡¢HaaretzºÍWAV Research Collective½áºÏµ÷²é¸æ·¢£¬ £¬£¬Predator¼äµýÈí¼þͨ¹ýÃûΪ¡°°¢À­¶¡¡±µÄÁãµã»÷ϰȾ»úÖÆ£¬ £¬£¬½öÐè²é¿´¶ñÒâ¸æ°×¼´¿ÉÈëÇÖÌØ¶¨Ö¸±ê¡£¸Ã»úÖÆ±»°µ²ØÔÚ¶à¹ú¿Õ¿Ç¹«Ë¾±³ºó£¬ £¬£¬»ùÓÚ¡°IntellexaйÃÜÊÂÎñ¡±µÄÄÚ²¿Îļþ¼°ÓªÏú×ÊÁÏ£¬ £¬£¬²¢¾­¹ú¼ÊÌØÉâ×éÖ¯¡¢¹È¸èºÍRecorded FutureµÄ¼¼Êõ×êÑÐ֤ʵ¡£AladdinÓÚ2024Äê³õ´Î²¿Ê𣬠£¬£¬ÀûÓÃóÒ×ÒÆ¶¯¸æ°×ϵͳ´«²¼¶ñÒâÈí¼þ£¬ £¬£¬Í¨¹ýÐèÒª·½Æ½Ì¨£¨DSP£©Ç¿Öƽ«±øÆ÷»¯¸æ°×Ͷ·Åµ½Í¨¹ý¹«¹²IPµØÖ·µÈ±êʶ·ûʶ´ËÍâÌØ¶¨Ö¸±ê£¬ £¬£¬¸æ°×¿É³Ê´Ë¿ÌÈκÎÏÔʾ¸æ°×µÄÍøÕ¾»òÀûÓÃÖУ¬ £¬£¬Íâ¹ÛÓëͨ³£¸æ°×ÎÞÒì¡£½öä¯ÀÀ¸æ°×¼´¿É´¥·¢Ï°È¾£¬ £¬£¬ÎÞÐèµã»÷£¬ £¬£¬¸æ°×»áÖØ¶¨ÏòÖÁIntellexaµÄ·ì϶ÀûÓ÷þÎñÆ÷¡£¸Ã¸æ°×ÍøÂçÉæ¼°°®¶ûÀ¼¡¢µÂ¹ú¡¢ÈðÊ¿¡¢Ï£À°¡¢ÈûÆÖ·˹¡¢°¢ÁªÇõºÍÐÙÑÀÀûµÈ¶à¹ú¸æ°×¹«Ë¾¡£·ÀÓù´ëÊ©Ô̺¬ÆÁ±Îä¯ÀÀÆ÷¸æ°×¡¢°µ²Ø¹«¹²IPµØÖ·£¬ £¬£¬µ«Ð¹Â¶ÎļþÏÔʾIntellexaÈÔ¿É´Ó¿Í»§µØµã¹úµÄÒÆ¶¯ÔËÓªÉÌ»ñÊØÐÅÏ¢¡£


https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/


4. ÷è÷ëÀÕË÷Èí¼þÐû³Æ¹¥»÷ɽ´ï»ù½Ì»á£¬ £¬£¬Ð¹Â¶ÄÚ²¿Ãô¸ÐÊý¾Ý


12ÔÂ4ÈÕ£¬ £¬£¬÷è÷ëÀÕË÷Èí¼þ½«É½´ï»ù½Ì»áÁÐÈëÆä°µÍøÐ¹Â¶Ãûµ¥£¬ £¬£¬Ðû³Æ¶ÔÊý¾Ýй¶ÊÂÎñÕÆ¹Ü£¬ £¬£¬²¢°ä²¼22ÕŽØÍ¼×÷ΪÈëÇÖÖ¤¾Ý¡£½ØÍ¼ÏÔʾ£¬ £¬£¬¹¥»÷Éæ¼°Ó¢¹úʥɽ¸ß¼¶×éÖ¯£¨AOSH UK£©µÄÄÚ²¿È¨ÏÞ£¬ £¬£¬Ô̺¬×ڽ̹¤×÷ÈËԱǩ֤´¦Öüͼ¡¢ÒÆÃñÓöȲ¦¿îÃ÷ϸ£¨ÈçÿÈË2600ÖÁ4500Ó¢°÷µÄǩ֤Óöȣ©¡¢ÔËÓªÖ§³ö¼°»î¶¯ºóÇÚÊý¾Ý¡£ÀýÈ磬 £¬£¬Ò»·ÝÔ¤ËãÎļþÏÔʾ£¬ £¬£¬Ä³²¦¿îÖÜÆÚÄÚ³¬11500Ó¢°÷ÓÃÓÚǩ֤ÉêÇ룬 £¬£¬ÁíÒ»ÎļþÔòÁгö3ÍòÓ¢°÷ÓÃÓÚÓʼþÐû´«¼°½ÚÈպؿ¨·Ö·¢£¬ £¬£¬»¹ÓÐ6351Ó¢°÷ÓÃÓÚ¹ú¼ÊÓÊ×Ê¡¢6000Ó¢°÷ÓÃÓÚÊÓÌýÉ豸²É¹º¡£Ð¹Â¶Êý¾Ý»¹Éæ¼°°²±£¹æ»®£¬ £¬£¬Ô̺¬2024-2025Äê×ܶî½ü10ÍòÓ¢°÷µÄ°²±£Ô¤Ë㣬 £¬£¬º­¸ÇËѱ¬È®·þÎñ¡¢ÒªÔ±±£»¤¡¢Î§À¸½¨ÉèµÈ£¬ £¬£¬¾ßÌåÈç74,326Ó¢°÷ÓÃÓÚÒªÔ±±£»¤ÍŶÓ£¬ £¬£¬29,217Ó¢°÷ÓÃÓÚ±¾µØÖܱ߰²±£¡£´ËÍ⣬ £¬£¬²ÆÕþ·¢Æ±¡¢ÒøÐÐÕË»§ÐÅÏ¢¼°»áԱСÎÒÊý¾Ý£¨ÈçÈ«Ãû¡¢µç»°¡¢¹Û¹â¼Í¼£©Ò²±»ÆØ¹â£¬ £¬£¬ÀýÈç¡°À­¶¡ÒáÈËÊ¿¶Ï¸ùÀÖ¶Ó2025Äê11Ô¡±±í¸ñÔ̺¬°¢¸ùÍ¢¡¢°ÍÎ÷µÈ¶à¹úÈËÔ±µÄ¾ßÌåÐÅÏ¢¡£


https://hackread.com/qilin-ransomware-church-of-scientology-data-theft/


5. Array AG VPNÉ豸ºÅÁî×¢Èë·ì϶ÔâºÚ¿ÍÀûÓÃ


12ÔÂ4ÈÕ£¬ £¬£¬½üÈÕ£¬ £¬£¬ÍþвÐÐΪÕßÕýÀûÓÃArray AGϵÁÐVPNÉ豸ÖеĺÅÁî×¢Èë·ì϶ֲÈëwebshell²¢´´½¨¶ñÒâÓû§¡£Array NetworksÓÚ½ñÄê5ÔÂͨ¹ý°²È«¸üÐÂÐÞ¸´Á˸÷ì϶£¬ £¬£¬µ«Î´·ÖÅäCVE±êʶ·û£¬ £¬£¬µ¼Ö·ì϶¸ú×ÙÓë²¹¶¡ÖÎÀí¸´ÔÓ»¯¡£ÈÕ±¾ÍÆËã»úÓ¦¼±ÏìӦС×飨JPCERT£©°ä²¼²¼¸æÖҸ棬 £¬£¬ºÚ¿Í×Ô8ÔÂÆðÒÑÀûÓø÷ì϶¹¥»÷ÈÕ±¾¾³ÄÚ×éÖ¯£¬ £¬£¬¹¥»÷ÕßÊÔͼÔÚõè¾¶/ca/aproxy/webapp/¸éÖÃPHP webshellÎļþ¡£¸Ã·ì϶ӰÏìArrayOS AG 9.4.5.8¼°¸üÔç°æ±¾£¬ £¬£¬ÓÈÆäÊÇÆôÓÃÁË¡°DesktopDirect¡±Ô¶³Ì½Ó¼ûÖ°ÄܵÄAGϵÁÐÓ²¼þºÍÐé¹¹É豸¡£Array Networks AGϵÁÐ×÷Ϊ°²È«½Ó¼ûÍø¹Ø£¬ £¬£¬ÒÀÀµSSL VPN´´½¨¼ÓÃÜËíµÀ£¬ £¬£¬¿í·ºÓÃÓÚÆóÒµÔ¶³Ì½Ó¼ûÍøÂç¡¢ÀûÓá¢×ÀÃæ¼°ÔÆ×ÊÔ´£¬ £¬£¬Í¨³£±»´óÐÍ×éÖ¯ÓÃÓÚÖ§³ÖÔ¶³Ì»òÒÆ¶¯°ì¹«¡£JPCERTÖ¸³ö£¬ £¬£¬Array OS 9.4.5.9ÒÑÐÞ¸´¸ÃÎÊÌâ¡£ÈôÎÞ·¨Éý¼¶£¬ £¬£¬½¨Òé½ûÓÃËùÓÐδʹÓõÄDesktopDirect·þÎñ£¬ £¬£¬»òͨ¹ýURL¹ýÂË×èÖ¹Ô̺¬·ÖºÅµÄURL½Ó¼û¡£¾Ý°²È«×êÑÐÔ±Yutaka SejiyamaɨÃ裬 £¬£¬È«Çò¹²ÓÐ1831¸öArrayAGʵÀý£¬ £¬£¬ÖØÒªÉ¢²¼ÔÚÖйú¡¢ÈÕ±¾ºÍÃÀ¹ú£¬ £¬£¬ÆäÖÐÖÁÉÙ11̨Ö÷»úÆôÓÃÁËDesktopDirectÖ°ÄÜ£¬ £¬£¬µ«ÏÖʵÊýÁ¿¿ÉÄܸü¸ß¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/


6. Companjon±£ÏտƼ¼¹«Ë¾Â¶³öÊýǧÍò¹Û¹âÐÅÏ¢¼°PII


12ÔÂ3ÈÕ£¬ £¬£¬½üÈÕ£¬ £¬£¬±£ÏտƼ¼¹«Ë¾CompanjonÒòδÊܱ£»¤µÄApache KafkaÁ÷й¶Êý°ÙÍòÌõÈÕÖ¾£¬ £¬£¬Éæ¼°¹Û¹âÐгÌ¡¢È«Ãû¡¢µç×ÓÓʼþµÈÃô¸ÐСÎÒÐÅÏ¢¡£CybernewsÍŶÓÓÚ2025Äê8ÔÂÏÂÑ®·¢Ïָ÷ì϶£¬ £¬£¬ÔÚÆßÌìÄڼͼ³¬1500ÍòÌõÊý¾Ý£¬ £¬£¬¹ÀËã×Üй¶Á¿¿ÉÄÜ´ï9.6ÒÚÌõ£¬ £¬£¬ÆäÖÐÔ¼0.1%£¨Ô¼96ÍòÌõ£©Ô̺¬Ð¡ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£Ð¹Â¶´°¿ÚÆÚΪ8ÔÂ20ÈÕÖÁ28ÈÕ£¬ £¬£¬Éæ¼°Trainline¡¢Omio¡¢TripXµÈ¹Û¹âƽ̨µÄAPI½»»¥Êý¾Ý£¬ £¬£¬Ô̺¬½«À´ÖÁ2026ÄêµÄ¹Û¹â·Ïß¡¢º½¿Õ¹«Ë¾¡¢ÈÕÆÚ¼°²ÆÕþÐÅÏ¢¡£Companjon×÷ΪB2B2C·þÎñÉÌ£¬ £¬£¬Îª¹Û¹âÉçµÈÆóÒµÌṩ±£ÏÕ·þÎñ£¬ £¬£¬Í¨¹ýÍøÂçÖÕ¶ËÓû§Êý¾ÝÖ§³ÖºÏ×÷·½Íƹã¡£Õâ´Îй¶µÄÈÕÖ¾ÖУ¬ £¬£¬²¿ÃżÍ¼Ô̺¬ÊÚȨÁîÅÆ£¬ £¬£¬¹¥»÷ÕßÀíÂÛÉÏ¿ÉÀûÓÃÕâЩÐÅÏ¢ÌáÒé½øÒ»²½¹¥»÷£¬ £¬£¬ÈçÚ¿Æ­»òϵͳÈëÇÖ¡£×êÑÐÈËÔ±Ö¸³ö£¬ £¬£¬½áºÏ¹Û¹â¡¢²ÆÕþ¼°µØÎ»Êý¾Ý£¬ £¬£¬¿Í»§Ãæ¶Ô¸ß¶ÈÕë¶ÔÐÔÚ¿Æ­·çÏÕ£¬ £¬£¬ÀýÈç¼ÙÒâ¾ÆµêÔ±¹¤ÍþвȡµÞÔ¤Ô¼ÒÔÆ­È¡¸¶¿î¡£


https://cybernews.com/security/companjon-kafka-leak-travel-data/