We isolated the Atlanta router and shut down our backbone, routing traffic across transit providers instead. There was some congestion that caused slow performance on some links as the logging caught up. Everything is restored now and we're looking into the root cause. 2/2
Details on how we caused an 23 min outage for~50% of @Cloudflare's network today. The root cause was a typo in a router configuration on our private backbone. We've applied safeguards to ensure a mistake like this will not cause problems in the future. https://t.co/iHQTiJ8O5J
A bunch of high profile cryptocurrency Twitter accounts have been hijacked to tweet bitcoin scams. Likely a 3rd party App compromise rather that Twitter itself. Wallet has received ~$6000. pic.twitter.com/D8MiXrz9ml
So far I've seen tweets from the accounts of Elon Musk, Jeff Bezos, Bill Gates, and Kanye West. Hackers are putting back tweets as soon as account owners delete them. They've already made $103,000 in two hours.
北韓 Lazarus Group 又名 Hidden Cobra,為了使側錄攻擊業務獲利,開展了全球滲透網路,劫持並利用了合法的網站進行成犯罪活動。網路罪犯使用網路惡意腳本,從結帳頁面複製敏感的信用卡數據。在調查信用卡盜竊案時,Sansec 的研究人員發現竊取者進行了網路魚叉式釣魚攻擊,而將他們共享的基礎架構以及程式碼中各種特徵關聯起來,最後將這個對信用卡的側錄攻擊歸咎於北韓的 Lazarus Group。
受害者包括飾品巨頭 Claire’s, 黃氏珠寶商(Wongs Jewellers), Focus Camera, Paper Source, Jit Truck, CBD Armour, Microbattery and Realchems 等數十家商店。
Lazarus Group 以已滲透的網路用來匯集被盜資產,以便在暗網上出售。為了掩蓋自己的踪跡,他們破壞了合法企業的網站,並轉存被盜的信用卡資料。根據 Sansec 的調查結果,Lazarus Group 劫持了位於意大利模特經紀公司(Lux Model Agency)的網站,位於新澤西州的一家書店,以及位於德黑蘭的一家老式音樂商店。
註冊與受害者商店相似的域名這個策略似乎為 Lazarus Group 帶來成果。已經確定最近的側錄活動與先前記錄的北韓駭客活動之間存在多個獨立的聯繫。下圖顯示綠色為受害者的存儲區,紅色表示受 Lazarus Group 控制的滲透節點。黃色表示其操作方式(或TTP)。
研究人員將滲透網域與北韓的網路攻擊聯繫在一起, 並稱 Lazarus Group 在網路釣魚事件發生後分發惡意軟體進行攻擊: