÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾

Ðû²¼Ê±¼ä 2025-11-18

1. ÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾


11ÔÂ15ÈÕ£¬£¬£¬£¬ £¬ÃÀ¹ú¿Æ¼¼ÕÐÆ¸¾ÞÍ·Cornerstone Staffing Solutions¿ËÈÕÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬ £¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡ÁËÁè¼Ý12Íò·ÝÇóÖ°Õß¼òÀú¼°³¬100Íò·Ý¹«Ë¾Îļþ ¡£¡£¡£¡£÷è÷ëÍÅ»ïÔÚ°µÍøÐ¹Â¶²©¿Í¹ûÕæ300GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬ £¬°üÀ¨ÒÔ¡°ÐÕÃû+Resume.pdf¡±ÃûÌô洢µÄ12Íò·Ý¼òÀú£¬£¬£¬£¬ £¬²¢Éù³ÆÕâЩÎļþÊôÓÚÔ¼100Íò·Ý°üÀ¨2400ÍòÌõСÎÒ˽¼ÒÐÅÏ¢µÄÎĵµµÄÒ»²¿·Ö ¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸ÇÉç»á°ü¹ÜºÅÂë¡¢µØµã¡¢ÓÊÏä¡¢µç»°¡¢Ð½×ÊÐÅÏ¢¼°±£ÃÜЭÒéµÈ£¬£¬£¬£¬ £¬Éæ¼°ÇóÖ°Õß¼°Ô±¹¤Éí·ÝÐÅÏ¢ ¡£¡£¡£¡£Cornerstone½¨ÉèÓÚ2003Ä꣬£¬£¬£¬ £¬×ܲ¿Î»ÓھɽðɽÍåÇø£¬£¬£¬£¬ £¬ÔÚÃÀ¹ú¶àÖÝÉèÓÐЧÀÍ´¦£¬£¬£¬£¬ £¬×¨×¢ÊÖÒÕ¡¢¹¤³Ì¡¢ÎïÁ÷¡¢ÖÆÔìµÈÁìÓòÕÐÆ¸£¬£¬£¬£¬ £¬Ã¿ÄêЭÖú³¬1ÍòÃûÇóÖ°Õß¾ÍÒµ ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ £¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Ã½ÌåÎÊѯ ¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯½¨ÉèÓÚ2021Ä꣬£¬£¬£¬ £¬2022Äê½øÈ빫ÖÚÊÓÒ°£¬£¬£¬£¬ £¬2025Äê³ÉΪȫÇò×î»îÔ¾ÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬£¬ £¬°ëÄêÄÚ·¢¶¯³¬500Æð¹¥»÷ ¡£¡£¡£¡£


https://cybernews.com/security/cornerstone-staffing-ransomware-attack-qilin-group-exposes-resumes/


2. AIPACÊý¾Ýй¶£ºµÚÈý·½ÈëÇÖÖÂ810ÈËÐÅϢй¶


11ÔÂ17ÈÕ£¬£¬£¬£¬ £¬ÃÀ¹úÒÔÉ«Áй«¹²ÊÂÎñίԱ»á£¨AIPAC£©Åû¶£¬£¬£¬£¬ £¬ÒòµÚÈý·½¹«Ë¾ÏµÍ³ÔâÍⲿÈëÇÖ£¬£¬£¬£¬ £¬Æä´æ´¢µÄ810ÈËСÎÒ˽¼ÒÐÅÏ¢ÓÚ2024Äê10ÔÂ20ÈÕÖÁ2025Äê2ÔÂ6ÈÕʱ´ú±»²»·¨»á¼û ¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Ò»ÃûÃåÒòÖÝסÃñ£¬£¬£¬£¬ £¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕºÅÂë¡¢¼Òͥסַ¡¢ÁªÏµ·½·¨¡¢Ö§¸¶¿¨ÐÅÏ¢¼°ÒøÐÐÕË»§µÈÃô¸ÐСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£© ¡£¡£¡£¡£AIPACÓÚ11ÔÂ13ÈÕͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÕߣ¬£¬£¬£¬ £¬²¢Ç¿µ÷δ·¢Ã÷Êý¾ÝÀÄÓü£Ï󣬣¬£¬£¬ £¬ÏÖÔÚÎÞ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ ¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬£¬ £¬AIPACΪÊÜÓ°ÏìÕßÌṩΪÆÚ12¸öÔµÄIDXÉí·Ý±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬ £¬º­¸ÇÐÅÓÃ¼à¿Ø¡¢ÍøÂçɨÃè¡¢°ü¹ÜÅâ³¥¼°Éí·Ý»Ö¸´Ö§³Ö ¡£¡£¡£¡£ÊÂÎñºó£¬£¬£¬£¬ £¬¸Ã×éÖ¯ÒÑʵÑé¶àÏîÇå¾²Éý¼¶²½·¥£¬£¬£¬£¬ £¬°üÀ¨×ËÊÆ¿ØÖÆ¡¢·ÇÈËÀàÉí·ÝÑéÖ¤¡¢µç×ÓÓʼþÊý¾Ý·À×ß©¡¢Microsoft 365»á¼ûȨÏ޹ܿء¢ÌØÈ¨¾¯±¨¡¢µØÀíλÖÃÏÞÖÆ¡¢É󼯹¦Ð§ÒÔ¼°ÔöÇ¿¼à¿ØÁ¦¶È ¡£¡£¡£¡£


https://hackread.com/aipac-data-breach-hundreds-affected/


3. ¶íÂÞ˹¿Ú°¶ÔËÓªÉÌPort AllianceÔâÍøÂç¹¥»÷


11ÔÂ15ÈÕ£¬£¬£¬£¬ £¬¿ËÈÕ£¬£¬£¬£¬ £¬¶íÂÞ˹¿Ú°¶ÔËÓªÉÌ¡°¿Ú°¶Í¬ÃË¡±£¨Port Alliance£©ÔâÓö¾³ÍâÍøÂç¹¥»÷£¬£¬£¬£¬ £¬ÔËÓªÖÐÖ¹½øÈëµÚÈýÌ죬£¬£¬£¬ £¬³ÉΪ¶íÎÚ³åÍ»Åä¾°ÏÂÒªº¦ÉèÊ©ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý ¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾ÖÜËÄÉùÃ÷£¬£¬£¬£¬ £¬¹¥»÷ÕßÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷²¢ÊÔͼÈëÇÖÆäÍøÂ磬£¬£¬£¬ £¬Ä¿µÄֱָͨ¹ý²¨Â޵ĺ£¡¢ÑÇËÙ-ºÚº£¡¢Ô¶¶«¼°±±¼«µØÇøº£¸Û¿ªÕ¹µÄú̿ºÍ¿óÎï·ÊÁϳö¿ÚÓªÒµ£¬£¬£¬£¬ £¬ÒâͼÈÅÂÒÔËÓªÖÈÐò ¡£¡£¡£¡£Ö»¹Ü¹¥»÷¹æÄ£´ó¡¢Ç¿¶È¸ß£¬£¬£¬£¬ £¬¿Ú°¶Í¬ÃËÇ¿µ÷ÆìÏÂ6¸öº£ÔËÂëÍ·¼°Òªº¦ÏµÍ³ÈÔÕý³£ÔËת£¬£¬£¬£¬ £¬ÃºÌ¿ºÍ¿óÎï·ÊÁÏÄê»õÔËÁ¿³¬5000Íò¶ÖµÄӪҵδÊÜÓ°Ïì ¡£¡£¡£¡£´Ë´Î¹¥»÷ÌØÕ÷ÏÔÖø£ººÚ¿Í¶¯ÓÃÁ˰üÀ¨1.5Íò¸öÈ«ÇòΨһIPµØµãµÄ½©Ê¬ÍøÂ磬£¬£¬£¬ £¬²¿·ÖIPÔ´×Ô¶íÂÞ˹¾³ÄÚ£¬£¬£¬£¬ £¬ÇÒÒ»Ö±±ä»»¹¥»÷Õ½ÂÔÒÔ¹æ±ÜÇå¾²·ÀÓù ¡£¡£¡£¡£¹«Ë¾Î´Ö¸Ã÷¹¥»÷ȪԴ£¬£¬£¬£¬ £¬µ«Á¬ÏµÅä¾°¿ÉÖª£¬£¬£¬£¬ £¬×Ô2022Äê¶íÎÚ³åÍ»Éý¼¶ÒÔÀ´£¬£¬£¬£¬ £¬Õë¶Ô½»Í¨ÎïÁ÷ÍøÂçµÄÍøÂç¹¥»÷³ÊƵ·¢Ì¬ÊÆ£¬£¬£¬£¬ £¬¶íÎÚË«·½ºÚ¿ÍƵÈÔʹÓÃDDoS¹¥»÷×ÌÈŶԷ½»ù´¡ÉèÊ© ¡£¡£¡£¡£


https://therecord.media/cyberattack-on-russian-port-operator


4. ÈýÐÇÒòµÚÈý·½Îó²î£¬£¬£¬£¬ £¬Ãô¸ÐÊý¾Ý±»ºÚ¿Í¹ÒÅÆ³öÊÛ


11ÔÂ14ÈÕ£¬£¬£¬£¬ £¬¿ËÈÕ£¬£¬£¬£¬ £¬ÍøÂç·¸·¨ÂÛ̳¾ªÏÖºÚ¿Í·¢Ìû³ÆÒÑÀÖ³ÉÈëÇÖÈýÐÇ£¬£¬£¬£¬ £¬²¢¹ûÕæ³öÊ۾ݳÆÀ´×Ըù«Ë¾µÄÄÚ²¿Êý¾Ý ¡£¡£¡£¡£¾­²é£¬£¬£¬£¬ £¬´Ë´ÎÊÂÎñÔ´ÓںڿͶÔÒ»¼ÒΪ¶à¼Ò´óÐÍÆóÒµÌṩЧÀ͵ĵÚÈý·½³Ð°üÉ̵ÄÈëÇÖ£¬£¬£¬£¬ £¬Í¨¹ý¸Ã³Ð°üÉ̵Ļá¼ûȨÏÞ£¬£¬£¬£¬ £¬¹¥»÷ÕßÉøÍ¸ÖÁÈýÐDz¿·Ö»ù´¡ÉèÊ©£¬£¬£¬£¬ £¬°üÀ¨MSSQLÊý¾Ý¿â¼°AWS S3´æ´¢Í°£¬£¬£¬£¬ £¬ÇÔÈ¡Á˰üÀ¨Ô´´úÂ롢˽Կ¡¢SMTPƾ֤¡¢ÉèÖÃÎļþ¡¢Ó²±àÂëÆ¾Ö¤¡¢Óû§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý ¡£¡£¡£¡£CybernewsÑо¿ÍŶÓÑéÖ¤Á˺ڿÍÐû²¼µÄÊý¾ÝÑù±¾£¬£¬£¬£¬ £¬È·ÈÏÆäÖаüÀ¨ÈýÐÇÂóµÏÑ·£¨ÈýÐǵç×ÓÆìÏÂÒ½ÁÆ×°±¸×Ó¹«Ë¾£©µÄÄÚ²¿JavaÏîÄ¿½á¹¹ÎļþÊ÷£¬£¬£¬£¬ £¬ÌåÏÖÔ´´úÂë¼°Ó²±àÂëÆ¾Ö¤¿ÉÄÜй¶ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬±»ÇÔÊý¾Ý¿â½ØÍ¼ÏÔʾԱ¹¤ÁªÏµÐÅÏ¢£¨Èçµç×ÓÓʼþ¡¢Óû§Ãû£©£¬£¬£¬£¬ £¬±íÃûÌáÐÑ¿ÉÄܱ£´æÖÎÀíԱƾ֤£¬£¬£¬£¬ £¬Õ⽫ÔöÌíÔ±¹¤ÔâÊÜ´¹ÂÚ¹¥»÷»òƾ֤Ìî³ä¹¥»÷µÄΣº¦ ¡£¡£¡£¡£ºÚ¿ÍÒÔ¡°Ò»´ÎÐÔÂò¶Ï¡±ÎªÓÕ¶ü£¬£¬£¬£¬ £¬ÒªÇóʹÓÃÃÅÂÞ±ÒÖ§¸¶£¬£¬£¬£¬ £¬µ«ÊÛ¼ÛÉÐδÐû²¼ ¡£¡£¡£¡£


https://cybernews.com/security/samsung-data-third-party-breach/


5. Aisuru½©Ê¬ÍøÂçÏÆÆð³¬´ó¹æÄ£DDoS¹¥»÷·ç±©


11ÔÂ17ÈÕ£¬£¬£¬£¬ £¬Î¢ÈíÅû¶£¬£¬£¬£¬ £¬Aisuru½©Ê¬ÍøÂç½üÆÚ¶ÔAzureÍøÂçÌᳫ·åÖµ´ï15.72TbpsµÄDDoS¹¥»÷£¬£¬£¬£¬ £¬½ÓÄÉUDPºéË®¹¥»÷ģʽ£¬£¬£¬£¬ £¬Ä¿µÄÖ±Ö¸°Ä´óÀûÑÇij¹«¹²IP£¬£¬£¬£¬ £¬Êý¾Ý°üËÙÂʸߴï36.4ÒÚbps ¡£¡£¡£¡£¸ÃÍøÂçÓÉTurbo Mirai¼¶ÎïÁªÍø½©Ê¬ÍøÂçÇý¶¯£¬£¬£¬£¬ £¬Ö÷ҪʹÓñ»ÈëÇֵļÒͥ·ÓÉÆ÷¡¢ÉãÏñÍ·µÈ×°±¸£¬£¬£¬£¬ £¬ºã¾ÃÕë¶ÔÃÀ¹ú¼°ÆäËû¹ú¼ÒסլISPÌá³«ÆÆ¼Í¼¹¥»÷ ¡£¡£¡£¡£AzureÇ徲ר¼ÒÖ¸³ö£¬£¬£¬£¬ £¬¹¥»÷Á÷Á¿ÌØÕ÷ÏÔ×Å£¬£¬£¬£¬ £¬ÎÞÔ´µØµãÓÕÆ­ÇÒʹÓÃËæ»úÔ´¶Ë¿Ú£¬£¬£¬£¬ £¬±ãÓÚ×·×ÙÓëЧÀÍÌṩÉÌ×èµ² ¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬ £¬Cloudflare±¾Ô´ӹûÕæ¡°ÈÈÃÅÓòÃû¡±ÅÅÃûÖÐÒÆ³ý¶à¸öÓëAisuru½©Ê¬ÍøÂçÏà¹ØµÄÓòÃû£¬£¬£¬£¬ £¬ÕâЩÓòÃûÔøÒòAisuruÏòDNSЧÀÍ1.1.1.1·¢ËͶñÒâÅÌÎÊÁ÷Á¿£¬£¬£¬£¬ £¬µ¼Ö»á¼ûÁ¿Òì³£ì­Éý£¬£¬£¬£¬ £¬ÉõÖÁÓâÔ½ÑÇÂíÑ·¡¢Î¢Èí¡¢¹È¸èµÈÕýµ±ÍøÕ¾ ¡£¡£¡£¡£Cloudflare CEO֤ʵ£¬£¬£¬£¬ £¬´Ë¾ÙÖ¼ÔÚά»¤ÅÅÃûϵͳ¿ÉÐŶȣ¬£¬£¬£¬ £¬Î´À´½«Ò»Á¬¶ÔÒÉËÆ¶ñÒâÓòÃû¾ÙÐб༭»òÒþ²Ø ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/


6. ÆÕÁÖ˹¶Ù´óѧÊý¾Ýй¶£¬£¬£¬£¬ £¬Ó°Ïì¾èÔùÕߺÍУÓÑ


11ÔÂ17ÈÕ£¬£¬£¬£¬ £¬ÆÕÁÖ˹¶Ù´óѧ11ÔÂ10ÈÕÔâÓöÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬ £¬µ¼ÖÂУÓÑ¡¢¾èÔùÕß¡¢½ÌÖ°Ô±¹¤¼°Ñ§ÉúСÎÒ˽¼ÒÐÅϢй¶ ¡£¡£¡£¡£¾ÝУ·½Ðû²¼µÄ³£¼ûÎÊÌâ½â´ðÏÔʾ£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþÈëÇÖÒ»ÃûÔ±¹¤ÕË»§£¬£¬£¬£¬ £¬½ø¶ø»á¼ûÁË´æ´¢³ï¿îÓëУÓѼÓÈë»î¶¯Êý¾ÝµÄÊý¾Ý¿â£¬£¬£¬£¬ £¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¼°¼ÒÍ¥/°ì¹«µØµã ¡£¡£¡£¡£¸ÃУǿµ÷£¬£¬£¬£¬ £¬±»Ð¹Â¶Êý¾Ý¿âδ´æ´¢²ÆÎñÐÅÏ¢¡¢ÕË»§Æ¾Ö¤»òÊÜÁª°îÒþ˽·¨±£»£»£»£»¤µÄѧÉú/½ÌÖ°¹¤Ïêϸ¼Í¼£¬£¬£¬£¬ £¬½öÉæ¼°Ð£ÓÑ¡¢¾èÔùÕß¼°¹ØÁªÈºÌ壨ÈçУÓÑÅäż¡¢Ñ§Éú¼Ò³¤µÈ£©µÄ»ù´¡ÁªÏµÐÅÏ¢ ¡£¡£¡£¡£±öϦ·¨ÄáÑÇ´óѧÔÚ10ÔÂÒ౬·¢ÀàËÆÊÂÎñ ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§£¬£¬£¬£¬ £¬ÈëÇÖ¸ÃУSalesforce¾èÔùÕßÊý¾Ý¿â¡¢SAPÉÌÒµÖÇÄÜϵͳ¼°SharePointÎļþƽ̨£¬£¬£¬£¬ £¬ÇÔÈ¡ÁË1.71GBÄÚ²¿Îĵµ£¬£¬£¬£¬ £¬Éæ¼°120ÍòÌõ¼Í¼ ¡£¡£¡£¡£Á½ÆðÊÂÎñ¾ùÖ¸ÏòУÓѹØÏµÖÎÀíϵͳÎó²î£¬£¬£¬£¬ £¬ÆÕÁÖ˹¶ÙµÄй¶ԴÓÚÔ±¹¤ÕË»§±»ÈëÇÖ£¬£¬£¬£¬ £¬±ö´óÔòÒòÔ±¹¤ÕË»§È¨ÏÞ¹ý´óµ¼ÖÂϵͳ±»ºáÏòÉøÍ¸ ¡£¡£¡£¡£Ö»¹ÜÁ½ÆðÊÂÎñÊÖ·¨ÏàËÆ£¬£¬£¬£¬ £¬ÆÕÁÖ˹¶Ù´óѧÉùÃ÷ÔÝÎÞÖ¤¾ÝÅú×¢¶þÕß±£´æ¹ØÁª ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/