我确实不咋懂网络安全,但是央视这几个新闻有点太抽象了

wex-avatar

wex

2025-04-17T11:27:57+00:00

根据中国国家计算机病毒应急处理中心发布的报告,2025年哈尔滨第九届亚冬会期间,赛事信息系统及黑龙江省关键网络基础设施遭受境外网络攻击超27万次
这个我信,但互联网上这东西漫山遍野都是
最起码的,我路由器随时抓一分钟syn,最起码有一成是境外的,其中很大一部分都是flood攻击
K2P:/home/root # tcpdump -i ppp0 -n 'tcp[tcpflags] & (tcp-syn) != 0 and tcp[tcpflags] & (tcp-ack) == 0'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ppp0, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
19:23:59.196440 IP 60.27.13.12.60644 > 142.250.196.206.443: Flags [S], seq 1817048862, win 65535, options [mss 1452,sackOK,TS val 1398587336 ecr 0,nop,wscale 9], length 0
19:23:59.767659 IP 60.27.13.12.42442 > 110.75.170.67.443: Flags [S], seq 1071493570, win 65535, options [mss 1452,sackOK,TS val 1286935888 ecr 0,nop,wscale 9], length 0
19:24:00.114318 IP 60.27.13.12.42444 > 110.75.170.67.443: Flags [S], seq 3543381612, win 65535, options [mss 1452,sackOK,TS val 1286936235 ecr 0,nop,wscale 9], length 0
19:24:01.414481 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390058728 ecr 0,nop,wscale 9], length 0
19:24:01.766920 IP 60.27.13.12.52418 > 124.160.155.42.443: Flags [S], seq 666175381, win 65535, options [mss 1452,sackOK,TS val 3631910234 ecr 0,nop,wscale 9], length 0
19:24:02.435560 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390059749 ecr 0,nop,wscale 9], length 0
19:24:02.560920 IP 60.27.13.12.50706 > 124.95.225.146.443: Flags [S], seq 905616357, win 65535, options [mss 1452,sackOK,TS val 39229248 ecr 0,nop,wscale 8], length 0
19:24:04.500477 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390061761 ecr 0,nop,wscale 9], length 0
19:24:05.968654 IP 60.27.13.12.45350 > 125.37.205.197.80: Flags [S], seq 3416095504, win 65535, options [mss 1452,sackOK,TS val 6056106 ecr 0,nop,wscale 7], length 0
19:24:05.970825 IP 60.27.13.12.52540 > 125.37.205.203.80: Flags [S], seq 3622275086, win 65535, options [mss 1452,sackOK,TS val 6056108 ecr 0,nop,wscale 7], length 0
19:24:06.807208 IP 60.27.13.12.45354 > 125.37.205.197.80: Flags [S], seq 2961792418, win 65535, options [mss 1452,sackOK,TS val 6056944 ecr 0,nop,wscale 7], length 0
19:24:06.809276 IP 60.27.13.12.52544 > 125.37.205.203.80: Flags [S], seq 2804713402, win 65535, options [mss 1452,sackOK,TS val 6056946 ecr 0,nop,wscale 7], length 0
19:24:06.818923 IP 60.27.13.12.45358 > 125.37.205.197.80: Flags [S], seq 3707790027, win 65535, options [mss 1452,sackOK,TS val 6056951 ecr 0,nop,wscale 7], length 0
19:24:06.830893 IP 60.27.13.12.52548 > 125.37.205.203.80: Flags [S], seq 3776429329, win 65535, options [mss 1452,sackOK,TS val 6056957 ecr 0,nop,wscale 7], length 0
19:24:06.830979 IP 60.27.13.12.45362 > 125.37.205.197.80: Flags [S], seq 1541714428, win 65535, options [mss 1452,sackOK,TS val 6056967 ecr 0,nop,wscale 7], length 0
19:24:06.862957 IP 60.27.13.12.52552 > 125.37.205.203.80: Flags [S], seq 4157337677, win 65535, options [mss 1452,sackOK,TS val 6056974 ecr 0,nop,wscale 7], length 0
19:24:06.863043 IP 60.27.13.12.45366 > 125.37.205.197.80: Flags [S], seq 4282248397, win 65535, options [mss 1452,sackOK,TS val 6056977 ecr 0,nop,wscale 7], length 0
19:24:06.873411 IP 60.27.13.12.52556 > 125.37.205.203.80: Flags [S], seq 2719899740, win 65535, options [mss 1452,sackOK,TS val 6057008 ecr 0,nop,wscale 7], length 0
19:24:07.185742 IP 60.27.13.12.1926 > 99.84.141.34.443: Flags [S], seq 1842971942, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:07.514882 IP 60.27.13.12.1927 > 143.204.126.63.443: Flags [S], seq 992905570, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:08.603314 IP 60.27.13.12.1929 > 182.50.12.167.80: Flags [S], seq 4174257186, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:08.671473 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390065985 ecr 0,nop,wscale 9], length 0
19:24:11.421361 IP 60.27.13.12.47840 > 142.250.204.42.443: Flags [S], seq 740457618, win 65535, options [mss 1452,sackOK,TS val 1970294926 ecr 0,nop,wscale 9], length 0
19:24:12.375117 IP 60.27.13.12.51678 > 120.92.215.64.80: Flags [S], seq 4006682828, win 65535, options [mss 1452,sackOK,TS val 39230229 ecr 0,nop,wscale 8], length 0
19:24:12.447862 IP 60.27.13.12.47840 > 142.250.204.42.443: Flags [S], seq 740457618, win 65535, options [mss 1452,sackOK,TS val 1970295950 ecr 0,nop,wscale 9], length 0
19:24:13.390043 IP 60.27.13.12.51678 > 120.92.215.64.80: Flags [S], seq 4006682828, win 65535, options [mss 1452,sackOK,TS val 39230329 ecr 0,nop,wscale 8], length 0
19:24:13.918043 IP 89.248.160.135.40083 > 60.27.13.12.4007: Flags [S], seq 2652038083, win 1025, options [mss 1460], length 0

这数字很正常。
技术团队还发现,亚冬会期间美国国家安全局向黑龙江省内多个基于微软Windows操作系统的特定设备发送未知加密字节,疑为唤醒、激活微软Windows操作系统提前预留的特定后门。
这个有点扯吧,只要是未知字符,就是核武器?这咋推论出来的
别的不说,一个破亚冬会,都不如美洲杯值钱,值得下这么重手么。
有案例显示,某国公司故意向该国间谍情报机关提供后门,用于在该公司智能手机上植入间谍软件,且已发现数千部感染了恶意软件的智能手机,相关手机使用者包括多国政府工作人员。攻击者可以利用某智能手机操作系统内置的即时通讯服务漏洞,无须用户交互即可直接控制手
这件事我完全相信,美国要求苹果,要求三星搞这个,企业绝对没法拒绝
但是如果中国要求小米,vivo,传音,估计也没法拒绝吧
但是你得拿出证据不是?
斯诺登拿出证据了,你这个新闻实在有点.....
Subtleglitch-avatar

Subtleglitch

说明你不是这个新闻的受众dogedogedoge
Nominal-avatar

Nominal

看第一个观点还好,你可以说是DDoS,毕竟国内很多也这么算。

看到第二个后门的观点绷不住了,你确实不懂网络安全。
INSANATIC RABIOT-avatar

INSANATIC RABIOT

你信不信的算毛,你是国安吗?
Arqb-avatar

Arqb

大输特输晕晕晕晕
JColonPR-avatar

JColonPR

就算是赛博洗衣粉,用在你美身上也是karma啊
TerpJerk-avatar

TerpJerk

袁丽没有偷狗鬼脸
blitzz-avatar

blitzz

你觉得亚冬会没必要攻击的理由是什么
wex-avatar

wex

没通过么
LostKookie13-avatar

LostKookie13

说你又不听,听又不懂,懂又不做,做你又做错,错又不认,认又不改,改你又不服,不服你又不说,要我怎么办?
Poke-avatar

Poke

我的看法是:1、安全团队的乌龙 2、媒体为了配合现在的舆论进行的宣传
ringINFINITE-avatar

ringINFINITE

deepseek的漏洞都是国外发现的,国内新闻信个鬼
Setsuna-avatar

Setsuna

知道点皮毛就瞎叭叭的典型

网上叫嚣自己业内人员的,还真是绝大多数都是蠢货
sammohana-avatar

sammohana

+ by [单的Disco] (undefined)

说你又不听,听又不懂,懂又不做,做你又做错,错又不认,认又不改,改你又不服,不服你又不说,要我怎么办?

他可以要证据呀!
SKINNYCOKE-avatar

SKINNYCOKE

你信不信重要吗?lucky
Scifiey-avatar

Scifiey

cverc对这事出过一个报告...

那报告把digitalocean这个云服务器厂商所有的数据中心地址列了一遍...

另外, 将近一个月里只攻击了27万次, 腾讯云的cdn, 免费套餐里每个月都有300万请求的额度...

实在是太抽象了...

nsa手里那么多0day, 然后选择用烂大街的ddos和注入来打你...

真有技术背景的人看着都想笑好吗...
Yaktrain-avatar

Yaktrain

国内网安即使是行业通报大部分也只是大概提一嘴,而具体是怎么受到攻击的,结果怎样,包括复盘分析,这些也属于涉密,没必要不公开很正常吧。
albusacus-avatar

albusacus

今天点了一下苹果手机数据不安全,这下全都炸毛了
有“科普”苹果数据安全的,有说个人数据泄露给美国无所谓的,有攻击国内最近相关新闻的
你们不觉得你们的反应过于集中了嘛?
R2D2-avatar

R2D2

你是不是只知道syn flood哭笑