ChatGPTÓëSora AIÈ«Çò̱»¾£¬OpenAI½ôÆÈÐÞ¸´ÖÐ
Ðû²¼Ê±¼ä 2024-12-131. ChatGPTÓëSora AIÈ«Çò̱»¾£¬OpenAI½ôÆÈÐÞ¸´ÖÐ
12ÔÂ12ÈÕ£¬ChatGPTºÍSora AIÊÇÁ½¿îÓÉOpenAIÍƳöµÄÈÈÃÅAI²úÆ·£¬ÏÖÔÚÔÚÈ«Çò¹æÄ£ÄÚÔâÓö·þÎñÖÐÖ¹¡£OpenAIÒÑÈ·Èϲ¢ÕýÔÚÆð¾¢ÐÞ¸´´ËÎÊÌâ¡£ÖÐֹʼÓÚ2024Äê12ÔÂ11ÈÕ̫ƽÑó±ê׼ʱ¼äÏÂÖç3:17×óÓÒ£¬Éæ¼°ChatGPTÍøÕ¾¼°ÆäAPI£¬ÒÔ¼°×î½üÍƳöµÄÊÓƵÌìÉúÄ£×ÓSora¡£Óû§»á¼ûChatGPTÍøվʱ»áÊÕµ½¹ØÓÚ·þÎñ²»¿ÉÓõÄ֪ͨ£¬OpenAIÒÑʶ±ð³öÎÊÌâ²¢ÕýÆð¾¢ÍƳöÐÞ¸´³ÌÐò¡£ÓÉÓÚChatGPTÓµÓÐÁè¼Ý2ÒÚµÄÖØ´óÖÜ»îÔ¾Óû§Èº£¬ËüÒѳÉΪÍøÂç¹¥»÷µÄÖ÷ҪĿµÄ¡£´ËÇ°£¬Ò»¸öÃûΪAnonymous SudanµÄ×éÖ¯ÔøÉù³Æ¶ÔÒ»´ÎÓëChatGPT·þÎñÖÐֹͬʱ±¬·¢µÄDDoS¹¥»÷ÈÏÕ档Ȼ¶ø£¬OpenAIÉÐδȷÈÏÄ¿½ñÖÐÖ¹ÊÇ·ñÓÉÀàËƹ¥»÷Ôì³É£¬ÖÐÖ¹Ôµ¹ÊÔÓÉÉв»ÇåÎú¡£È«ÇòÓû§ÕýÇ×½ü¹Ø×¢OpenAIµÄÐÞ¸´Ï£Íû£¬ÆÚ´ý·þÎñÄܹ»¾¡¿ì»Ö¸´Õý³£¡£
https://hackread.com/sora-chatgpt-down-worldwide-openai-working-on-fix/
2. ÐÂÐÍÒþÃØ Pumakit Linux rootkit ¶ñÒâÈí¼þ±»·¢Ã÷
12ÔÂ12ÈÕ£¬Pumakit ÊÇÒ»ÖÖÐÂÐÍ Linux rootkit ¶ñÒâÈí¼þ£¬ËüʹÓÃÒþÉíºÍ¸ß¼¶È¨ÏÞÌáÉýÊÖÒÕÀ´ÒþÄäÓÚϵͳÖС£¸Ã¶ñÒâÈí¼þÓɶà¸ö×é¼þ×é³É£¬°üÀ¨Í¶·ÅÆ÷¡¢ÄÚ´æפÁô¿ÉÖ´ÐÐÎļþ¡¢ÄÚºËÄ£¿é rootkit ºÍÓû§¿Õ¼ä rootkit£¨Kitsune SO£©¡£Elastic Security ÔÚ 2024 Äê 9 Ô 4 ÈÕÓÚ VirusTotal ÉÏ´«µÄ¿ÉÒɶþ½øÖÆÎļþ¡°cron¡±Öз¢Ã÷ÁËËü£¬µ«ÎÞ·¨È·¶¨ÆäʹÓÃÕß»òÄ¿µÄ¡£Pumakit ½ÓÄɶà½×¶ÎѬȾÀú³Ì£¬Ê×ÏÈͨ¹ý¡°cron¡±Í¶·ÅÆ÷Ö´ÐÐǶÈëʽÓÐÓøºÔØ£¬×îÖÕ½« LKM rootkit Ä£¿é°²Åŵ½ÏµÍ³ÄÚºËÖУ¬²¢Ê¹Óà Kitsune SO ÔÚÓû§¿Õ¼äÖÐ×¢ÈëÀú³Ì£¬×赲ϵͳŲÓ᣸à rootkit Õë¶Ô 5.7 °æ֮ǰµÄ Linux ÄÚºËÉè¼Æ£¬Ê¹Óá°kallsyms_lookup_name()¡±º¯ÊýʹÓÃϵͳÐÐΪ£¬²¢Í¨¹ý ftrace ¹³×¡ÏµÍ³Å²ÓÃÀ´ÌáÉýȨÏÞ¡¢Ö´ÐÐÏÂÁîºÍÒþ²ØÀú³Ì¡£±ðµÄ£¬Ëü»¹ÄÜÒþ²ØÌض¨ÎļþºÍ¹¤¾ß£¬È·±£¶ñÒâ¸ü¸Ä²»±»»Ö¸´£¬²¢Óë Kitsune SO ÐͬÔËÐУ¬×èµ²Óû§¼¶ÏµÍ³Å²Óã¬Òþ²Ø rootkit Ïà¹ØÎļþ¡¢Àú³ÌºÍÍøÂçÅþÁ¬¡£
https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/
3. ¹ú¼ÊÍŽáÐж¯²é·âRydoxÍøÂç·¸·¨Êг¡£¬¾Ð²¶ÈýÃûÖÎÀíÖ°Ô±
12ÔÂ12ÈÕ£¬°¢¶û°ÍÄáÑÇÖ´·¨²¿·ÖÓë¹ú¼ÊÏàÖúͬ°éÁªÊÖ£¬Àֳɲé·âÁËÃûΪRydoxµÄÍøÂç·¸·¨Êг¡£¬²¢¾Ð²¶ÁËÈýÃû¿ÆË÷ÎÖ¹úÃñ¡ª¡ªArdit Kutleshi¡¢Jetmir KutleshiºÍShpend Sokoli£¬ÆäÖÐÇ°Á½ÈËÒѱ»ÃÀ¹ú˾·¨²¿ÆðËß²¢ÆÚ´ýÒý¶É¡£×Ô2016ÄêÒÔÀ´£¬RydoxÊг¡Âô¼Ò¼ÓÈëÁËÁè¼Ý7600ÆðÐÅÓÿ¨ÐÅÏ¢¡¢µÇ¼ƾ֤ºÍСÎÒ˽¼ÒÐÅÏ¢µÄÏúÊÛ£¬ÕâЩÐÅÏ¢ÊÇ´ÓÊýǧÃûÃÀ¹ú¹«ÃñºÍÖÖÖÖÍøÂç·¸·¨¹¤¾ßÖÐÇÔÈ¡µÄ¡£Rydox»¹ÏòÁè¼Ý18000ÃûÓû§³öÊÛÁË321000ÖÖÆäËûÍøÂç·¸·¨²úÆ·¡£×¢²áÓû§ÐèÏÈ´æÈëÒ»¶¨ÃüÄ¿µÄ¼ÓÃÜÇ®±Ò²Å»ª¹ºÖò»·¨²úÆ·£¬¶øRydoxÊÚȨÂô¼Ò¿É»ñµÃÏúÊÛÊÕÒæµÄ60%¡£ÃÀ¹ú»ñµÃ˾·¨ÊÚȨ£¬²é·âÁËRydoxµÄÓòÃûºÍ·þÎñÆ÷£¬²¢´Ó±»¸æÕË»§ÖпÛѺÁËÔ¼225000ÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£´Ë´ÎÐж¯»ñµÃÁ˶à¹úÖ´·¨²¿·ÖµÄÐÖú¡£ÃÀ¹úÉó²é¹ÙÌåÏÖ£¬RydoxÊг¡ÊÇÒ»¸öһվʽÊÐËÁ£¬ËäÈ»ÍøÂç·¸·¨Í¨³£Éæ¼°ÍâÑóÐÐΪ£¬µ«ÆäΣº¦¿ÉÄÜÊÇɱ¾øÐԵġ£
https://www.bleepingcomputer.com/news/security/police-shuts-down-rydox-cybercrime-market-arrests-3-admins/
4. ÒÁÀÊʹÓÃIOCONTROL¶ñÒâÈí¼þ¹¥»÷ÃÀÒÔÒªº¦»ù´¡ÉèÊ©
12ÔÂ12ÈÕ£¬ÒÁÀÊÍþвÐÐΪÕßÕýʹÓÃÐÂÐͶñÒâÈí¼þIOCONTROL¹¥»÷ÒÔÉ«ÁкÍÃÀ¹úµÄÒªº¦»ù´¡ÉèÊ©£¬ÌØÊâÊÇÎïÁªÍø(IoT)×°±¸ºÍOT/SCADAϵͳ£¬°üÀ¨Â·ÓÉÆ÷¡¢PLC¡¢HMI¡¢IPÉãÏñ»ú¡¢·À»ðǽºÍȼÁÏÖÎÀíϵͳµÈ£¬Éæ¼°ÖÆÔìÉÌÈçD-Link¡¢HikvisionµÈ¡£¸Ã¶ñÒâÈí¼þ¾ßÓÐÄ£¿é»¯ÌØÕ÷£¬¿ÉѬȾ²î±ð×°±¸£¬²¢±»ÊÓΪ¿ÉÄܶÔÒªº¦»ù´¡ÉèÊ©Ôì³ÉÑÏÖØÆÆËðµÄÃñ×å¹ú¼ÒÍøÂçÎäÆ÷¡£¾Ý±¨µÀ£¬IOCONTROLÓëÒÁÀʺڿÍ×éÖ¯CyberAv3ngersÓйأ¬¸Ã×éÖ¯ÔøÌåÏÖ³ö¶Ô¹¥»÷¹¤ÒµÏµÍ³µÄÐËȤ¡£¹¥»÷ÕßÉù³ÆÈëÇÖÁËÒÔÉ«ÁкÍÃÀ¹úµÄ200¸ö¼ÓÓÍÕ¾£¬²¢ÔÚ2023ÄêβÖÁ2024ÄêÖÐÆÚ¾ÙÐÐÁËÐµĹ¥»÷Ô˶¯¡£IOCONTROL´æ´¢ÔÚ¡°/usr/bin/¡±Ä¿Â¼ÖУ¬Ê¹ÓÃÄ£¿é»¯ÉèÖÃ˳Ӧ²î±ð×°±¸£¬Í¨¹ýMQTTÐÒéÓëC2·þÎñÆ÷ͨѶ£¬²¢Ê¹ÓÃAES-256-CBC¼ÓÃÜÉèÖá£Ëü¿ÉÖ´ÐжàÖÖÏÂÁÈ籨¸æϵͳÐÅÏ¢¡¢È·È϶ñÒâÈí¼þ×°Öá¢ÔËÐÐí§ÒâÏÂÁî¡¢×ÔÎÒɾ³ýºÍ¶Ë¿ÚɨÃèµÈ¡£
https://www.bleepingcomputer.com/news/security/new-iocontrol-malware-used-in-critical-infrastructure-attacks/
5. Byte Federal±ÈÌرÒATMÔËÓªÉÌÔâºÚ¿Í¹¥»÷
12ÔÂ12ÈÕ£¬ÃÀ¹ú±ÈÌرÒATMÔËÓªÉÌByte FederalÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿ÍʹÓÃÆäϵͳÉϵÄGitLabÎó²î£¬Î´¾ÊÚȨ»á¼ûÁËÆä·þÎñÆ÷£¬µ¼ÖÂ58,000Ãû¿Í»§µÄÊý¾Ý±»Ð¹Â¶¡£¸Ã¹«Ë¾ÔÚ·¢Ã÷ÊÂÎñºóÁ¬Ã¦¹Ø±ÕÁËƽ̨£¬¸ôÀëÁ˲»Á¼ÐÐΪÕߣ¬²¢±£»¤ÁËÊÜѬȾµÄ·þÎñÆ÷¡£ÊÜÓ°ÏìµÄÃô¸ÐÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢Õþ¸®Ç©·¢µÄÉí·ÝÖ¤¡¢Éç»áÇå¾²ºÅÂë¡¢ÉúÒâÔ˶¯¡¢Óû§ÕÕƬµÈ¡£Byte Federal¶ÔËùÓпͻ§ÕË»§¾ÙÐÐÁË¡°Ó²ÖØÖá±£¬¸üÐÂÁËÄÚ²¿ÃÜÂëºÍÕË»§ÖÎÀíϵͳ£¬²¢×÷·ÏÁËÄÚ²¿ÍøÂç»á¼ûµÄÁîÅƺÍÃÜÔ¿¡£ËäÈ»Óû§×ʽðºÍÊý×Ö×ʲúδÊÜË𣬵«Ãô¸ÐÐÅÏ¢µÄй¶¿ÉÄÜʹ¼ÓÃÜÇ®±Ò³ÖÓÐÕßÃæÁÙSIM¿¨½»Á÷¹¥»÷¡¢ÕË»§½ÓÊÜ»òÆäËûÍøÂç´¹ÂÚ¹¥»÷µÄΣº¦¡£Byte Federal½¨ÒéÊÜÓ°ÏìµÄÈ˶Ôδ¾ÇëÇóµÄͨѶ¼á³ÖСÐÄ£¬²¢°´ÆÚ¼ì²éÕË»§±¨±íºÍÐÅÓñ¨¸æÒÔÌá·ÀڲƺÍÉí·Ý͵ÇÔ¡£¸Ã¹«Ë¾ÉèÁ¢ÁËרÃŵÄ×ÊÖúÈÈÏß¹©ÈËÃǽâ¾öÒÉÂÇ¡£
https://www.bleepingcomputer.com/news/security/bitcoin-atm-firm-byte-federal-hacked-via-gitlab-flaw-58k-users-exposed/
6. ¶íÂÞ˹×éÖ¯TurlaÒþ²ØÔÚÆäËûºÚ¿Í±³ºó¹¥»÷ÎÚ¿ËÀ¼
12ÔÂ11ÈÕ£¬¶íÂÞ˹ÍøÂçÌع¤×éÖ¯Turla£¨Óֳơ°ÉñÃر©Ñ©¡±£©±»ÆØÕýÔÚʹÓÃÆäËûºÚ¿Í×éÖ¯µÄ»ù´¡ÉèÊ©¹¥»÷ÎÚ¿ËÀ¼Í¨¹ýStarlinkÅþÁ¬µÄ¾üÊÂ×°±¸¡£Î¢ÈíºÍLumenÕ¹ÏÖÁËTurlaÔõÑùЮÖÆ»òʹÓðͻù˹̹ºÚ¿Í×éÖ¯Storm-0156µÄ¶ñÒâÈí¼þºÍ·þÎñÆ÷£¬ÒÔ¼°ÔõÑùʹÓÃAmadey½©Ê¬ÍøÂçºÍ¶íÂÞ˹ºÚ¿Í×éÖ¯Storm-1837µÄ»ù´¡ÉèÊ©£¬ÔÚÎÚ¿ËÀ¼ÏµÍ³ÉÏ°²ÅÅÆä×Ô½ç˵¶ñÒâÈí¼þ£¬ÈçTavdigºÍKazuarV2¡£ÕâЩ¹¥»÷ʼÓÚÍøÂç´¹ÂÚµç×ÓÓʼþ£¬Ê¹ÓöñÒ⸽¼þ¡¢Storm-1837ºóÃÅ»òAmadey½©Ê¬ÍøÂç°²ÅÅÓÐÓÃÔغɡ£Î¢ÈíÖ¸³ö£¬TurlaʹÓñ»Í¶·ÅµÄÅú´¦Öóͷ£ÎļþÌṩµÄÕì̽ÐÅÏ¢£¬Ê¶±ðÅþÁ¬µ½Starlink»¥ÁªÍøϵͳµÄ¾üÊÂ×°±¸µÈ¸ßÓÅÏȼ¶Ä¿µÄ¡£TurlaµÄ¶¨ÖƶñÒâÈí¼þ¼Ò×åTavdigºÍKazuarV2ÔÚÆäÌع¤Ô˶¯ÖÐÊ©Õ¹×ÅÆæÒì×÷Óã¬Ç°ÕßÓÃÓÚ½¨Éè³õʼפ×ãµãºÍ¼àÊÓ£¬ºóÕßÔòרעÓÚºã¾ÃÇ鱨ÍøÂç¡¢ÏÂÁîÖ´ÐкÍÊý¾Ýй¶¡£Î¢Èí½¨Òé·ÀÓùÕß¼ì²éÆäÌá³öµÄ»º½â²½·¥ºÍËÑË÷ÅÌÎÊ£¬ÒÔÓ¦¶ÔTurlaµÄÔ˶¯¡£
https://www.bleepingcomputer.com/news/security/russian-cyber-spies-hide-behind-other-hackers-to-target-ukraine/