Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷

Ðû²¼Ê±¼ä 2022-06-16

1¡¢Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷»î¶¯


CloudflareÔÚ6ÔÂ14ÈÕ͸¶£¬£¬ £¬ £¬£¬£¬Æä¿Í»§Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬ £¬ £¬£¬£¬ËüÒѽÓÄÉÐж¯µÖÓùÁËÿÃë2600Íò´ÎÇëÇó(RPS)µÄDDoS¹¥»÷£¬£¬ £¬ £¬£¬£¬ÕâÊÇÆù½ñΪֹ¼ì²âµ½µÄ×î´óµÄHTTPS DDoS¹¥»÷¡£¡£¡£¡£¡£¹¥»÷À´×ÔÓÉ5067̨װ±¸×é³ÉµÄ½©Ê¬ÍøÂ磬£¬ £¬ £¬£¬£¬Ã¿¸ö½ÚµãÔÚ·åֵʱ±¬·¢Ô¼5200 RPS¡£¡£¡£¡£¡£¾ÝϤ£¬£¬ £¬ £¬£¬£¬¸Ã½©Ê¬ÍøÂçÔÚ²»µ½30ÃëµÄʱ¼äÄÚ´ÓÓ¡¶ÈÄáÎ÷ÑÇ¡¢ÃÀ¹ú¡¢°ÍÎ÷¡¢¶íÂÞ˹ºÍÓ¡¶ÈµÈ121¸ö¹ú¼ÒµÄ1500¶à¸öÍøÂçÖн¨ÉèÁËÁè¼Ý2.12ÒÚ¸öHTTPSÇëÇ󣬣¬ £¬ £¬£¬£¬Ô¼3%µÄ¹¥»÷À´×ÔTor½Úµã¡£¡£¡£¡£¡£


https://thehackernews.com/2022/06/cloudflare-saw-record-breaking-ddos.html 


2¡¢¹ú¼ÊÐ̾¯First Light 2022Ö´·¨Ðж¯¾Ð²¶Ô¼2000¸öÏÓÒÉÈË


ýÌå6ÔÂ15ÈÕ±¨µÀ£¬£¬ £¬ £¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ76¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½Ð­ÖúÏÂÌᳫÁË´úºÅΪFirst Light 2022µÄ¹ú¼ÊÖ´·¨Ðж¯¡£¡£¡£¡£¡£ÔÚ2022Äê3ÔÂÖÁ5ÔÂʱ´ú£¬£¬ £¬ £¬£¬£¬Ö´·¨Ö°Ô±Í»Ï®ÁËÈ«ÇòµÄ1770¸öËùÔÚ£¬£¬ £¬ £¬£¬£¬ÊÓ²ìÁËÔ¼3000ÃûÏÓÒÉÈË£¬£¬ £¬ £¬£¬£¬¾Ð²¶ÁËÔ¼2000Ãû¼ÓÈëÉç»á¹¤³Ì¹¥»÷µÄÏÓÒÉÈË£¬£¬ £¬ £¬£¬£¬¶³½áÁË4000¸öÒøÐÐÕË»§²¢²é·âÁ˼ÛÖµÔ¼5000ÍòÃÀÔªµÄ²»·¨×ʽ𡣡£¡£¡£¡£´Ë´ÎÐж¯Öص㹥»÷Éæ¼°µç»°Õ©Æ­¡¢ÀËÂþÕ©Æ­¡¢BEC¹¥»÷ºÍ¹ØÓÚÏ´Ç®µÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interpol-seizes-50-million-arrests-2000-social-engineers/


3¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔIntelºÍAMD CPUµÄ²àÐŵÀ¹¥»÷Hertzbleed


¾Ý6ÔÂ14ÈÕ±¨µÀ£¬£¬ £¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖ³ÆÎªHertzbleedµÄвàÐŵÀ¹¥»÷£¬£¬ £¬ £¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´Í¨¹ýÊӲ춯̬µçѹºÍƵÂÊËõ·Å(DVFS)ÆôÓõÄCPUƵÂÊת±äÇÔÈ¡¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£DVFSÊÇÏÖ´úCPUʹÓõÄÒ»ÖÖµçÔ´ÖÎÀí½ÚÔ¼¹¦Ð§£¬£¬ £¬ £¬£¬£¬¿ÉÈ·±£ÏµÍ³Ôڸ߸ºÔØÊ±´ú²»»áÁè¼ÝÈȺ͹¦ÂÊÏÞÖÆ£¬£¬ £¬ £¬£¬£¬²¢ÔÚµÍCPU¸ºÔØÊ±´ú½µµÍÕûÌ幦ºÄ¡£¡£¡£¡£¡£¹¥»÷ÊÇ¿ÉÐе쬣¬ £¬ £¬£¬£¬ÓÉÓÚÔÚIntel(CVE-2022-24436)ºÍAMD(CVE-2022-23823)x86´¦Öóͷ£Æ÷ÉÏ£¬£¬ £¬ £¬£¬£¬¶¯Ì¬ÆµÂÊËõ·ÅÈ¡¾öÓÚ¹¦ºÄºÍÕýÔÚ´¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£IntelºÍAMD͸¶£¬£¬ £¬ £¬£¬£¬²»ÍýÏëÐû²¼²¹¶¡£¡£¡£¡£¡£¬£¬ £¬ £¬£¬£¬µ«Ðû²¼ÁËÔõÑù»º½â´ËÀ๥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/


4¡¢ZimbraÐÞ¸´¿ÉÇÔÈ¡Óû§µÇ¼ƾ֤µÄÎó²îCVE-2022-27924


ýÌå6ÔÂ14Èճƣ¬£¬ £¬ £¬£¬£¬µç×ÓÓʼþÌ×¼þZimbraÖб£´æÒ»¸öÑÏÖØµÄÎó²î£¨CVE-2022-27924£©£¬£¬ £¬ £¬£¬£¬Ó°ÏìÁË¿ªÔ´ºÍÉÌÒµ°æ±¾8.8.xºÍ9.x¡£¡£¡£¡£¡£SonarSource½«¸ÃÎó²î×ܽáΪδ¾­Éí·ÝÑéÖ¤ÇëÇóµÄMemcachedÖж¾£¬£¬ £¬ £¬£¬£¬Í¨¹ý½«CRLF×¢Èëµ½Memcached²éÕÒµÄÓû§ÃûÖпÉÒÔʹÓôËÎó²î¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬ £¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ²»ÓëÓû§¾ÙÐÐÈκν»»¥µÄÇéÐÎÏÂÇÔÈ¡Ã÷ÎĵÄÃÜÂë¡£¡£¡£¡£¡£SonarSourceÓÚ½ñÄê3ÔÂ11ÈÕÅû¶Îó²î £»£»£»£»ZimbraÔÚ3ÔÂ31ÈÕÐû²¼Á˵ÚÒ»¸ö²¹¶¡£¡£¡£¡£¡£¬£¬ £¬ £¬£¬£¬µ«²»¿ÉÍêÈ«½â¾öÎÊÌâ £»£»£»£»Ö®ºó£¬£¬ £¬ £¬£¬£¬¹©Ó¦ÉÌÓÖÔÚ5ÔÂ10ÈÕÐû²¼²¹¶¡£¡£¡£¡£¡£¬£¬ £¬ £¬£¬£¬ÍêÈ«ÐÞ¸´ÁËÎó²î¡£¡£¡£¡£¡£


https://thehackernews.com/2022/06/new-zimbra-email-vulnerability-could.html


5¡¢ÄÏ·ÇÁ¬Ëø³¬ÊÐShopriteÔâµ½RansomHouseµÄÀÕË÷¹¥»÷

      

¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬ £¬ £¬£¬£¬Shoprite Group³ÆÆäÔÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÕâÊÇ·ÇÖÞ×î´óµÄÁ¬Ëø³¬ÊУ¬£¬ £¬ £¬£¬£¬ÊÕÈë58ÒÚÃÀÔª£¬£¬ £¬ £¬£¬£¬ÔÚ·ÇÖÞµÄ12¸ö¹ú¼Òı»®×Žü3000¼ÒÃŵ꣬£¬ £¬ £¬£¬£¬ÓµÓÐ149000¸öÔ±¹¤¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬ £¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÆäλÓÚ˹ÍþÊ¿À¼¡¢ÄÉÃ×±ÈÑǺÍÔÞ±ÈÑǵĿͻ§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬ £¬£¬£¬Éæ¼°ÐÕÃûºÍÉí·ÝÖ¤ºÅÂëµÈ¡£¡£¡£¡£¡£6ÔÂ14ÈÕ£¬£¬ £¬ £¬£¬£¬RansomHouseÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬ £¬£¬£¬²¢¹ûÕæÁËÒ»·ÝÉù³Æ´ÓShopriteÇÔÈ¡µÄ600GBÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£


https://therecord.media/large-supermarket-chain-in-southern-africa-hit-with-ransomware/


6¡¢Check Point·¢Ã÷Õë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷

      

6ÔÂ14ÈÕ£¬£¬ £¬ £¬£¬£¬Check PointÐû²¼ÁËÒÁÀÊPhosphorusÕë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£´Ë´Î»î¶¯¿ÉÒÔ×·Ëݵ½2021Äê12Ô£¬£¬ £¬ £¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÒÔÉ«Áи߼¶¹ÙÔ±µÄµç×ÓÓʼþ£¬£¬ £¬ £¬£¬£¬È»ºóÓÃËüÀ´¹¥»÷ÆäËûÄ¿µÄ¡£¡£¡£¡£¡£´Ë´Î»î¶¯µÄÄ¿µÄ°üÀ¨£¬£¬ £¬ £¬£¬£¬ÒÔÉ«ÁÐǰÍâ½»²¿³¤Tzipi Livni¡¢ÃÀ¹úǰפÒÔÉ«ÁдóʹºÍÒÔÉ«Áйú·À¾üǰÉÙ½«µÈÈË¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã»î¶¯µÄ×îÖÕÄ¿µÄÊÇÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢¡¢»¤ÕÕɨÃè¼þºÍ»á¼ûµç×ÓÓʼþ£¬£¬ £¬ £¬£¬£¬²¢½«Æä¹éÒòÓÚÒÁÀʵÄAPTÍÅ»ïPhosphorus¡£¡£¡£¡£¡£


https://blog.checkpoint.com/2022/06/14/iranian-spear-phishing-operation-targets-former-israeli-foreign-minister-former-us-ambassador-to-israel-former-israeli-army-general-and-three-other-high-profile-executives/