wex
2025-04-17T11:27:57+00:00
根据中国国家计算机病毒应急处理中心发布的报告,2025年哈尔滨第九届亚冬会期间,赛事信息系统及黑龙江省关键网络基础设施遭受境外网络攻击超27万次
这个我信,但互联网上这东西漫山遍野都是
最起码的,我路由器随时抓一分钟syn,最起码有一成是境外的,其中很大一部分都是flood攻击
K2P:/home/root # tcpdump -i ppp0 -n 'tcp[tcpflags] & (tcp-syn) != 0 and tcp[tcpflags] & (tcp-ack) == 0'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ppp0, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
19:23:59.196440 IP 60.27.13.12.60644 > 142.250.196.206.443: Flags [S], seq 1817048862, win 65535, options [mss 1452,sackOK,TS val 1398587336 ecr 0,nop,wscale 9], length 0
19:23:59.767659 IP 60.27.13.12.42442 > 110.75.170.67.443: Flags [S], seq 1071493570, win 65535, options [mss 1452,sackOK,TS val 1286935888 ecr 0,nop,wscale 9], length 0
19:24:00.114318 IP 60.27.13.12.42444 > 110.75.170.67.443: Flags [S], seq 3543381612, win 65535, options [mss 1452,sackOK,TS val 1286936235 ecr 0,nop,wscale 9], length 0
19:24:01.414481 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390058728 ecr 0,nop,wscale 9], length 0
19:24:01.766920 IP 60.27.13.12.52418 > 124.160.155.42.443: Flags [S], seq 666175381, win 65535, options [mss 1452,sackOK,TS val 3631910234 ecr 0,nop,wscale 9], length 0
19:24:02.435560 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390059749 ecr 0,nop,wscale 9], length 0
19:24:02.560920 IP 60.27.13.12.50706 > 124.95.225.146.443: Flags [S], seq 905616357, win 65535, options [mss 1452,sackOK,TS val 39229248 ecr 0,nop,wscale 8], length 0
19:24:04.500477 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390061761 ecr 0,nop,wscale 9], length 0
19:24:05.968654 IP 60.27.13.12.45350 > 125.37.205.197.80: Flags [S], seq 3416095504, win 65535, options [mss 1452,sackOK,TS val 6056106 ecr 0,nop,wscale 7], length 0
19:24:05.970825 IP 60.27.13.12.52540 > 125.37.205.203.80: Flags [S], seq 3622275086, win 65535, options [mss 1452,sackOK,TS val 6056108 ecr 0,nop,wscale 7], length 0
19:24:06.807208 IP 60.27.13.12.45354 > 125.37.205.197.80: Flags [S], seq 2961792418, win 65535, options [mss 1452,sackOK,TS val 6056944 ecr 0,nop,wscale 7], length 0
19:24:06.809276 IP 60.27.13.12.52544 > 125.37.205.203.80: Flags [S], seq 2804713402, win 65535, options [mss 1452,sackOK,TS val 6056946 ecr 0,nop,wscale 7], length 0
19:24:06.818923 IP 60.27.13.12.45358 > 125.37.205.197.80: Flags [S], seq 3707790027, win 65535, options [mss 1452,sackOK,TS val 6056951 ecr 0,nop,wscale 7], length 0
19:24:06.830893 IP 60.27.13.12.52548 > 125.37.205.203.80: Flags [S], seq 3776429329, win 65535, options [mss 1452,sackOK,TS val 6056957 ecr 0,nop,wscale 7], length 0
19:24:06.830979 IP 60.27.13.12.45362 > 125.37.205.197.80: Flags [S], seq 1541714428, win 65535, options [mss 1452,sackOK,TS val 6056967 ecr 0,nop,wscale 7], length 0
19:24:06.862957 IP 60.27.13.12.52552 > 125.37.205.203.80: Flags [S], seq 4157337677, win 65535, options [mss 1452,sackOK,TS val 6056974 ecr 0,nop,wscale 7], length 0
19:24:06.863043 IP 60.27.13.12.45366 > 125.37.205.197.80: Flags [S], seq 4282248397, win 65535, options [mss 1452,sackOK,TS val 6056977 ecr 0,nop,wscale 7], length 0
19:24:06.873411 IP 60.27.13.12.52556 > 125.37.205.203.80: Flags [S], seq 2719899740, win 65535, options [mss 1452,sackOK,TS val 6057008 ecr 0,nop,wscale 7], length 0
19:24:07.185742 IP 60.27.13.12.1926 > 99.84.141.34.443: Flags [S], seq 1842971942, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:07.514882 IP 60.27.13.12.1927 > 143.204.126.63.443: Flags [S], seq 992905570, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:08.603314 IP 60.27.13.12.1929 > 182.50.12.167.80: Flags [S], seq 4174257186, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:08.671473 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390065985 ecr 0,nop,wscale 9], length 0
19:24:11.421361 IP 60.27.13.12.47840 > 142.250.204.42.443: Flags [S], seq 740457618, win 65535, options [mss 1452,sackOK,TS val 1970294926 ecr 0,nop,wscale 9], length 0
19:24:12.375117 IP 60.27.13.12.51678 > 120.92.215.64.80: Flags [S], seq 4006682828, win 65535, options [mss 1452,sackOK,TS val 39230229 ecr 0,nop,wscale 8], length 0
19:24:12.447862 IP 60.27.13.12.47840 > 142.250.204.42.443: Flags [S], seq 740457618, win 65535, options [mss 1452,sackOK,TS val 1970295950 ecr 0,nop,wscale 9], length 0
19:24:13.390043 IP 60.27.13.12.51678 > 120.92.215.64.80: Flags [S], seq 4006682828, win 65535, options [mss 1452,sackOK,TS val 39230329 ecr 0,nop,wscale 8], length 0
19:24:13.918043 IP 89.248.160.135.40083 > 60.27.13.12.4007: Flags [S], seq 2652038083, win 1025, options [mss 1460], length 0
这数字很正常。
技术团队还发现,亚冬会期间美国国家安全局向黑龙江省内多个基于微软Windows操作系统的特定设备发送未知加密字节,疑为唤醒、激活微软Windows操作系统提前预留的特定后门。
这个有点扯吧,只要是未知字符,就是核武器?这咋推论出来的
别的不说,一个破亚冬会,都不如美洲杯值钱,值得下这么重手么。
有案例显示,某国公司故意向该国间谍情报机关提供后门,用于在该公司智能手机上植入间谍软件,且已发现数千部感染了恶意软件的智能手机,相关手机使用者包括多国政府工作人员。攻击者可以利用某智能手机操作系统内置的即时通讯服务漏洞,无须用户交互即可直接控制手
这件事我完全相信,美国要求苹果,要求三星搞这个,企业绝对没法拒绝
但是如果中国要求小米,vivo,传音,估计也没法拒绝吧
但是你得拿出证据不是?
斯诺登拿出证据了,你这个新闻实在有点.....
这个我信,但互联网上这东西漫山遍野都是
最起码的,我路由器随时抓一分钟syn,最起码有一成是境外的,其中很大一部分都是flood攻击
K2P:/home/root # tcpdump -i ppp0 -n 'tcp[tcpflags] & (tcp-syn) != 0 and tcp[tcpflags] & (tcp-ack) == 0'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ppp0, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
19:23:59.196440 IP 60.27.13.12.60644 > 142.250.196.206.443: Flags [S], seq 1817048862, win 65535, options [mss 1452,sackOK,TS val 1398587336 ecr 0,nop,wscale 9], length 0
19:23:59.767659 IP 60.27.13.12.42442 > 110.75.170.67.443: Flags [S], seq 1071493570, win 65535, options [mss 1452,sackOK,TS val 1286935888 ecr 0,nop,wscale 9], length 0
19:24:00.114318 IP 60.27.13.12.42444 > 110.75.170.67.443: Flags [S], seq 3543381612, win 65535, options [mss 1452,sackOK,TS val 1286936235 ecr 0,nop,wscale 9], length 0
19:24:01.414481 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390058728 ecr 0,nop,wscale 9], length 0
19:24:01.766920 IP 60.27.13.12.52418 > 124.160.155.42.443: Flags [S], seq 666175381, win 65535, options [mss 1452,sackOK,TS val 3631910234 ecr 0,nop,wscale 9], length 0
19:24:02.435560 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390059749 ecr 0,nop,wscale 9], length 0
19:24:02.560920 IP 60.27.13.12.50706 > 124.95.225.146.443: Flags [S], seq 905616357, win 65535, options [mss 1452,sackOK,TS val 39229248 ecr 0,nop,wscale 8], length 0
19:24:04.500477 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390061761 ecr 0,nop,wscale 9], length 0
19:24:05.968654 IP 60.27.13.12.45350 > 125.37.205.197.80: Flags [S], seq 3416095504, win 65535, options [mss 1452,sackOK,TS val 6056106 ecr 0,nop,wscale 7], length 0
19:24:05.970825 IP 60.27.13.12.52540 > 125.37.205.203.80: Flags [S], seq 3622275086, win 65535, options [mss 1452,sackOK,TS val 6056108 ecr 0,nop,wscale 7], length 0
19:24:06.807208 IP 60.27.13.12.45354 > 125.37.205.197.80: Flags [S], seq 2961792418, win 65535, options [mss 1452,sackOK,TS val 6056944 ecr 0,nop,wscale 7], length 0
19:24:06.809276 IP 60.27.13.12.52544 > 125.37.205.203.80: Flags [S], seq 2804713402, win 65535, options [mss 1452,sackOK,TS val 6056946 ecr 0,nop,wscale 7], length 0
19:24:06.818923 IP 60.27.13.12.45358 > 125.37.205.197.80: Flags [S], seq 3707790027, win 65535, options [mss 1452,sackOK,TS val 6056951 ecr 0,nop,wscale 7], length 0
19:24:06.830893 IP 60.27.13.12.52548 > 125.37.205.203.80: Flags [S], seq 3776429329, win 65535, options [mss 1452,sackOK,TS val 6056957 ecr 0,nop,wscale 7], length 0
19:24:06.830979 IP 60.27.13.12.45362 > 125.37.205.197.80: Flags [S], seq 1541714428, win 65535, options [mss 1452,sackOK,TS val 6056967 ecr 0,nop,wscale 7], length 0
19:24:06.862957 IP 60.27.13.12.52552 > 125.37.205.203.80: Flags [S], seq 4157337677, win 65535, options [mss 1452,sackOK,TS val 6056974 ecr 0,nop,wscale 7], length 0
19:24:06.863043 IP 60.27.13.12.45366 > 125.37.205.197.80: Flags [S], seq 4282248397, win 65535, options [mss 1452,sackOK,TS val 6056977 ecr 0,nop,wscale 7], length 0
19:24:06.873411 IP 60.27.13.12.52556 > 125.37.205.203.80: Flags [S], seq 2719899740, win 65535, options [mss 1452,sackOK,TS val 6057008 ecr 0,nop,wscale 7], length 0
19:24:07.185742 IP 60.27.13.12.1926 > 99.84.141.34.443: Flags [S], seq 1842971942, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:07.514882 IP 60.27.13.12.1927 > 143.204.126.63.443: Flags [S], seq 992905570, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:08.603314 IP 60.27.13.12.1929 > 182.50.12.167.80: Flags [S], seq 4174257186, win 64240, options [mss 1452,nop,wscale 8,nop,nop,sackOK], length 0
19:24:08.671473 IP 60.27.13.12.51980 > 142.250.196.202.443: Flags [S], seq 1742528970, win 65535, options [mss 1452,sackOK,TS val 1390065985 ecr 0,nop,wscale 9], length 0
19:24:11.421361 IP 60.27.13.12.47840 > 142.250.204.42.443: Flags [S], seq 740457618, win 65535, options [mss 1452,sackOK,TS val 1970294926 ecr 0,nop,wscale 9], length 0
19:24:12.375117 IP 60.27.13.12.51678 > 120.92.215.64.80: Flags [S], seq 4006682828, win 65535, options [mss 1452,sackOK,TS val 39230229 ecr 0,nop,wscale 8], length 0
19:24:12.447862 IP 60.27.13.12.47840 > 142.250.204.42.443: Flags [S], seq 740457618, win 65535, options [mss 1452,sackOK,TS val 1970295950 ecr 0,nop,wscale 9], length 0
19:24:13.390043 IP 60.27.13.12.51678 > 120.92.215.64.80: Flags [S], seq 4006682828, win 65535, options [mss 1452,sackOK,TS val 39230329 ecr 0,nop,wscale 8], length 0
19:24:13.918043 IP 89.248.160.135.40083 > 60.27.13.12.4007: Flags [S], seq 2652038083, win 1025, options [mss 1460], length 0
这数字很正常。
技术团队还发现,亚冬会期间美国国家安全局向黑龙江省内多个基于微软Windows操作系统的特定设备发送未知加密字节,疑为唤醒、激活微软Windows操作系统提前预留的特定后门。
这个有点扯吧,只要是未知字符,就是核武器?这咋推论出来的
别的不说,一个破亚冬会,都不如美洲杯值钱,值得下这么重手么。
有案例显示,某国公司故意向该国间谍情报机关提供后门,用于在该公司智能手机上植入间谍软件,且已发现数千部感染了恶意软件的智能手机,相关手机使用者包括多国政府工作人员。攻击者可以利用某智能手机操作系统内置的即时通讯服务漏洞,无须用户交互即可直接控制手
这件事我完全相信,美国要求苹果,要求三星搞这个,企业绝对没法拒绝
但是如果中国要求小米,vivo,传音,估计也没法拒绝吧
但是你得拿出证据不是?
斯诺登拿出证据了,你这个新闻实在有点.....