È«Çò³¬1200Íò.envÎļþ¹ûÕæÌ»Â¶
Ðû²¼Ê±¼ä 2026-03-021. È«Çò³¬1200Íò.envÎļþ¹ûÕæÌ»Â¶
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬Mysterium VPNÑо¿Ö°Ô±·¢Ã÷È«Çò12,088,677¸öIPµØµã±£´æ¿É¹ûÕæ»á¼ûµÄ.envÃûÌÃÎļþ£¬£¬£¬£¬£¬Ð¹Â¶°üÀ¨JWTÊðÃûÃÜÔ¿¡¢APIÃÜÔ¿¡¢Êý¾Ý¿âÃÜÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£´ËÀàÎļþÒò´æ´¢Ó¦ÓóÌÐòÇéÐαäÁ¿£¨ÈçÊý¾Ý¿âURL¡¢ÔÆ»á¼ûÃÜÔ¿£©¶øÆÕ±éʹÓ㬣¬£¬£¬£¬µ«Æä¾«Á·ÐÔÒ²´øÀ´Î£º¦£¬£¬£¬£¬£¬ÈôЧÀÍÆ÷δÆÁÕÏÒþ²ØÎļþ»á¼û£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÖ±½ÓÇëÇó"/.env"ÏÂÔØÊµÊ±Æ¾Ö¤£¬£¬£¬£¬£¬ÎÞÐèʹÓÃÎó²î¼´¿ÉÈÆ¹ýÈëÇֽ׶Σ¬£¬£¬£¬£¬Ö±½ÓʹÓÃÓÐÓÃÆ¾Ö¤µÇ¼ϵͳ¡¢ÅÌÎÊÊý¾Ý¿â¡¢Î±ÔìÁîÅÆ»òÀÄÓÃAPI¡£¡£¡£¡£´Ë´Îй¶³ÊÈ«ÇòÐÔÂþÑÜ£ºÃÀ¹úÊÜÓ°ÏìIP½ü280Íò£¨Õ¼23%£©£¬£¬£¬£¬£¬ÈÕ±¾¡¢µÂ¹ú¡¢Ó¡¶È¡¢·¨¹ú¡¢Ó¢¹úµÈ¹úÒ೬°ÙÍò£¬£¬£¬£¬£¬Åú×¢ÎÊÌâÔ´ÓÚ¿çÐÐÒµµÄÆÕ±éÔËά¹ýʧ£¬£¬£¬£¬£¬¶ø·Ç¼òµ¥Æ½Ì¨È±ÏÝ¡£¡£¡£¡£Ð¹Â¶Ð§¹ûÑÏÖØ£¬£¬£¬£¬£¬Êý¾Ý¿âƾ֤¿ÉÖÂÊý¾ÝÇÔÈ¡£¬£¬£¬£¬£¬APIÃÜÔ¿¿ÉÄÜÒý·¢½ðÈÚÕ©Æ£¬£¬£¬£¬£¬JWTÃÜÔ¿±»ÓÃÓÚÕË»§Ð®ÖÆ£¬£¬£¬£¬£¬SMTPƾ֤ÔòÖú³¤ÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬ÔÆ´æ´¢ÃÜÔ¿¸ü¿ÉÄÜ̻¶±¸·ÝÎļþÓëÄÚ²¿Îĵµ¡£¡£¡£¡£»ù´¡Ôµ¹ÊÔÓɶàÔ´ÓÚ¿ÉÔ¤·ÀµÄÉèÖÃʧÎó£ºÈ±Ê§Òþ²ØÎļþ¾Ü¾ø¹æÔò¡¢·´ÏòÊðÀíת·¢Ãô¸Ð·¾¶¡¢¾²Ì¬¸ùĿ¼ָÏòÏîĿȫĿ¼¡¢ÈÝÆ÷¾µÏñǶÈëÃÜÔ¿£¬£¬£¬£¬£¬»ò±¸·ÝÎļþ£¨Èç.env.bak£©Î´ÕûÀí¡£¡£¡£¡£
https://securityaffairs.com/188590/hacking/12-million-exposed-env-files-reveal-widespread-security-failures.html
2. OpenClaw¸ßΣÎó²î¡°ClawJacked¡±±»Åû¶¼°ÐÞ¸´
3ÔÂ1ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±Oasis SecurityÅû¶ÁËÊ¢ÐÐ×ÔÍйÜAIƽ̨OpenClawÖÐÃûΪ¡°ClawJacked¡±µÄ¸ßΣÎó²î¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚOpenClawÍø¹ØÐ§ÀÍĬÈϰó¶¨localhost²¢Ì»Â¶WebSocket½Ó¿Ú£¬£¬£¬£¬£¬Òòä¯ÀÀÆ÷¿çÓòÕ½ÂÔ²»×èÖ¹WebSocketÅþÁ¬localhost£¬£¬£¬£¬£¬¶ñÒâÍøÕ¾¿ÉʹÓÃJavaScript¾²Ä¬½¨ÉèÅþÁ¬£¬£¬£¬£¬£¬ÊµÑ鱩Á¦ÆÆ½âÍâµØÊµÀýµÄ»á¼ûȨÏÞ¡£¡£¡£¡£Ö»¹ÜOpenClawÉèÓÐËÙÂÊÏÞÖÆ£¬£¬£¬£¬£¬µ«Ä¬È϶Իػ·µØµã£¨127.0.0.1£©²»ÆôÓÃÏÞÖÆ£¬£¬£¬£¬£¬µ¼ÖÂÍâµØCLI»á»°²»»á´¥·¢Ëø¶¨»úÖÆ¡£¡£¡£¡£¹¥»÷Õß¿ÉÿÃëÌᳫÊý°Ù´ÎÃÜÂëÍÆ²â£¬£¬£¬£¬£¬³£ÓÃÃÜÂëÁбí¿ÉÔÚ1ÃëÄÚ±»ÆÆ½â£¬£¬£¬£¬£¬´óÐÍ×ÖµäÒ²½öÐèÊý·ÖÖÓ¡£¡£¡£¡£Ò»µ©»ñÈ¡ÖÎÀíÔ±ÃÜÂ룬£¬£¬£¬£¬¹¥»÷ÕßÄܾ²Ä¬×¢²áΪÊÜÐÅÈÎ×°±¸£¬£¬£¬£¬£¬Íø¹Ø»á×Ô¶¯Åú×¼À´×ÔlocalhostµÄ×°±¸Åä¶Ô£¬£¬£¬£¬£¬ÎÞÐèÓû§È·ÈÏ¡£¡£¡£¡£ÒԺ󣬣¬£¬£¬£¬¹¥»÷Õß¿ÉÖ±½Ó²Ù¿ØAIƽ̨£¬£¬£¬£¬£¬Ö´ÐÐת´¢Æ¾Ö¤¡¢ÇÔÈ¡Îļþ¡¢¶ÁÈ¡ÈÕÖ¾¡¢ËÑË÷ÐÂÎÅÀúÊ·ÖеÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ÉõÖÁÔÚÅä¶Ô½ÚµãÉÏÖ´ÐÐí§ÒâshellÏÂÁ£¬£¬£¬£¬×îÖÕµ¼ÖÂÓû§ÊÂÇéÕ¾±»ÍêÈ«¹¥ÆÆ¡£¡£¡£¡£OpenClawÓÚ2ÔÂ26ÈÕ½ôÆÈÐû²¼2026.2.26°æ±¾ÐÞ¸´Îó²î¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/
3. QuickLens ChromeÀ©Õ¹±»ºÚÖÈÎÃüÜÇ®±Ò͵ÇÔ
2ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÃûΪ¡°QuickLens - Search Screen with Google Lens¡±µÄChromeÀ©Õ¹³ÌÐòÒò±»¶ñÒâÈëÇÖ£¬£¬£¬£¬£¬µ¼ÖÂÔ¼7000ÃûÓû§ÃæÁÙ¼ÓÃÜÇ®±Ò±»µÁΣº¦£¬£¬£¬£¬£¬×îÖÕ±»¹È¸è´ÓChromeÍøÉÏÓ¦ÓÃÊÐËÁϼܡ£¡£¡£¡£¸ÃÀ©Õ¹×î³õÔÊÐíÓû§Ö±½ÓÔÚä¯ÀÀÆ÷ÖÐÔËÐÐGoogle LensËÑË÷£¬£¬£¬£¬£¬Ôø»ñGoogleÍÆ¼ö»ÕÕ£¬£¬£¬£¬£¬Óû§Á¿Ñ¸ËÙÔöÌíÖÁ7000ÈË¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬2ÔÂ17ÈÕÐû²¼µÄ5.8°æ±¾±»Ö²Èë¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬ÒýÈëClickFix¹¥»÷ºÍÐÅÏ¢ÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬³ÉΪÇå¾²ÊÂÎñµ¼»ðË÷¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬À©Õ¹³ÌÐòÔÚExtensionHubÊг¡¹ÒÅÆ³öÊÛ²¢±ä»»ËùÓÐȨºó£¬£¬£¬£¬£¬ÐÂËùÓÐÕßÓÚ2ÔÂ1ÈÕ½ÓÊÜ£¬£¬£¬£¬£¬²¢ÆôÓñ£´æÎÊÌâµÄÒþ˽Õþ²ß¡£¡£¡£¡£Á½Öܺ󣬣¬£¬£¬£¬¶ñÒâ¸üÐÂÍÆËÍ£¬£¬£¬£¬£¬ÇëÇódeclarativeNetRequestWithHostAccessºÍwebRequestµÈÐÂȨÏÞ£¬£¬£¬£¬£¬ÒƳýËùÓÐÒ³ÃæºÍ¿ò¼ÜµÄÇå¾²±êÍ·£¬£¬£¬£¬£¬Ê¹¶ñÒâ¾ç±¾¸üÒ×Ö´ÐС£¡£¡£¡£¸Ã°æ±¾»¹ÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬ÌìÉú³¤ÆÚÐÔUUID£¬£¬£¬£¬£¬Ê¶±ðÓû§ä¯ÀÀÆ÷¡¢²Ù×÷ϵͳ¼°¹ú¼Ò/µØÇø£¬£¬£¬£¬£¬Ã¿Îå·ÖÖÓÂÖѯָÁî¡£¡£¡£¡£Óû§±¨¸æ³Æ»á¼ûÍøÒ³Ê±ÆµÈÔ·ºÆðÐéαGoogle¸üÐÂÌáÐÑ£¬£¬£¬£¬£¬µã»÷ºó´¥·¢ClickFix¹¥»÷£¬£¬£¬£¬£¬ÏÂÔØÐÅÏ¢ÇÔÈ¡¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/
4. ¼ÓÄôóÂÖÌ¥¹«Ë¾³¬3800ÍòÕË»§Êý¾Ýй¶
2ÔÂ28ÈÕ£¬£¬£¬£¬£¬¼ÓÄôóÁãÊÛ¾ÞÍ·¼ÓÄôóÂÖÌ¥¹«Ë¾£¨CTC£©2025Äê10ÔÂÔâÓöÆäÀúÊ·ÉÏ×îÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý3800Íò¸öÕË»§£¬£¬£¬£¬£¬³ÉΪ¼ÓÄôóÁãÊÛÒµ¹æÄ£×î´óµÄÊý¾ÝÇå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý·¢¹«ÖÚ¶Ô¿Í»§Òþ˽¼°Ãô¸ÐÐÅÏ¢Çå¾²µÄÆÕ±éµ£ÐÄ¡£¡£¡£¡£¾Ý¹«Ë¾Åû¶£¬£¬£¬£¬£¬2025Äê10ÔÂ2ÈÕ£¬£¬£¬£¬£¬CTC·¢Ã÷Æäµç×ÓÉÌÎñÊý¾Ý¿âÔâ²»·¨»á¼û£¬£¬£¬£¬£¬µ¼Ö¿ͻ§ÐÅϢй¶¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº¸Ç»ù´¡Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþµØµã¡¢³öÉúÄê·Ý¡¢¼ÓÃÜÃÜÂ루½ÓÄÉPBKDF2¹þÏ£Öµ´æ´¢£©£¬£¬£¬£¬£¬²¿·ÖÕË»§Ì»Â¶½Ø¶ÏµÄÐÅÓÿ¨ºÅÂë¼°²»µ½15ÍòÕË»§µÄÍêÕû³öÉúÈÕÆÚ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¹«Ë¾Ç¿µ÷й¶µÄ²ÆÎñÊý¾ÝÎÞ·¨Ö±½ÓÓÃÓÚÕË»§»á¼û¡¢ÉúÒâ»ò¹ºÖòÙ×÷£¬£¬£¬£¬£¬ÇÒʵÌåµêÉúÒâϵͳ¡¢¼ÓÄôóÂÖÌ¥ÒøÐм°Triangle Rewards½±ÀøÍýÏëδÊÜÓ°Ï죬£¬£¬£¬£¬µç×ÓÉÌÎñϵͳÈÔÕý³£ÔËÐС£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬CTCѸËÙ½ÓÄÉÓ¦¶Ô²½·¥£ºÒѶ¨Î»²¢ÐÞ¸´ÏµÍ³Îó²î£¬£¬£¬£¬£¬Í¬²½Ïòî¿Ïµ»ú¹¹×ª´ïÇéÐΣ¬£¬£¬£¬£¬²¢ÍýÏë×Ô¶¯ÁªÏµÊÜÓ°ÏìÓû§ÌṩÐÅÓÃ¼à¿ØÐ§ÀÍÒÔ½µµÍÉí·Ý͵ÇÔΣº¦¡£¡£¡£¡£
https://securityaffairs.com/188659/data-breach/canadian-tire-2025-data-breach-impacts-38-million-users.html
5. ÈýÐÇÓëµÂ¿ËÈøË¹ÖݾÍÖÇÄܵçÊÓÊý¾Ý°¸Ï¢Õù
3ÔÂ1ÈÕ£¬£¬£¬£¬£¬ÈýÐÇÓëÃÀ¹úµÂ¿ËÈøË¹ÖÝ¾ÍÆäÖÇÄܵçÊÓÉæÏÓ²»·¨ÍøÂçÓû§Ô¢Ä¿ÄÚÈÝÐÅϢһʸ濢ϢÕùÐÒé¡£¡£¡£¡£´Ë´Î¾À·×Ô´Óڵ¿ËÈøË¹ÖÝ×ÜÉó²é³¤¿Ï¡¤ÅÁ¿Ë˹¶ÙÓÚÈ¥Äê12Ô¶ÔÈýÐǵȵçÊÓÖÆÔìÉÌÌáÆðµÄËßËÏ£¬£¬£¬£¬£¬Ö¸¿ØÆäʹÓÃ×Ô¶¯ÄÚÈÝʶ±ð£¨ACR£©ÊÖÒÕÍøÂçÓû§Ô¢Ä¿Êý¾Ýʱ£¬£¬£¬£¬£¬Î´ÊÂÏÈ»ñµÃÏûºÄÕßµÄÃ÷È·ÖªÇéÔ޳ɣ¬£¬£¬£¬£¬Î¥·´ÁË¡¶µÂ¿ËÈøË¹ÖÝÓÕÆÐÔÉÌÒµÐÐΪ·¨¡·£¨DTPA£©¡£¡£¡£¡£½ñÄê1Ô£¬£¬£¬£¬£¬·¨ÔºÔøÕë¶ÔÈýÐÇÐû²¼¶ÌÆÚÔÝʱÏÞÖÆÁTRO£©£¬£¬£¬£¬£¬ÒªÇóÆä×èÖ¹ÔÚ¸ÃÖݲ»·¨ÍøÂçÏûºÄÕßÊý¾Ý£¬£¬£¬£¬£¬Ö»¹Ü¸ÃÏÂÁîÔ½ÈÕ±»×÷·Ï£¬£¬£¬£¬£¬µ«ËßËÏÒ»Á¬Íƽø¡£¡£¡£¡£Æ¾Ö¤Ï¢ÕùÐÒ飬£¬£¬£¬£¬ÈýÐÇÐèÐÞ¸ÄÆäÒþ˽Åû¶ÉùÃ÷£¬£¬£¬£¬£¬ÒÔÇåÎúÒ×¶®µÄ·½·¨ÏòÏûºÄÕßÚ¹ÊÍÊý¾ÝÍøÂçºÍ´¦Öóͷ£µÄÏêϸ×ö·¨¡£¡£¡£¡£ÐÒéÃ÷È·ÒªÇ󣬣¬£¬£¬£¬ÈýÐÇÔÚδ»ñµÃµÂ¿ËÈøË¹ÖÝÏûºÄÕßÃ÷È·Ô޳ɵÄÇéÐÎÏ£¬£¬£¬£¬£¬±ØÐè×èÖ¹ÍøÂç»ò´¦Öóͷ£ÈκÎACRԢĿÊý¾Ý¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ÈýÐÇÐèÁ¬Ã¦¸üÐÂÖÇÄܵçÊÓϵͳ£¬£¬£¬£¬£¬ÊµÑéÐÑÄ¿µÄÅû¶ºÍÔ޳ɽçÃæ£¬£¬£¬£¬£¬È·±£Óû§Äܹ»³ä·ÖÖªÇé²¢×ÔÖ÷¾öÒéÊý¾ÝʹÓ÷½·¨¡£¡£¡£¡£×ÜÉó²é³¤ÅÁ¿Ë˹¶Ù¶Ô´ËÌåÏÖÈϿɣ¬£¬£¬£¬£¬Í¬Ê±Ö¸³öÆäËûÖÇÄܵçÊÓÖÆÔìÉÌÈçË÷Äá¡¢LG¡¢º£ÐźÍTCL¿Æ¼¼ÉÐδ¶Ô´ËÀàËßËϽÓÄÉÀàËÆË¢Ð²½·¥¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/samsung-tvs-to-stop-collecting-texans-data-without-express-consent/
6. ΢Èí½ÒÆÆÓÎÏ·¹¤¾ßÈö²¥Ô¶³Ì»á¼ûľÂí¹¥»÷Á´
3ÔÂ1ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÍþвÇ鱨ÖÐÐÄ¿ËÈÕÅû¶£¬£¬£¬£¬£¬¹¥»÷ÕßÕýͨ¹ýαÔìÓÎÏ·¹¤¾ßÈö²¥Ô¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬£¬£¬Ðγɶà½×¶ÎѬȾÁ´¡£¡£¡£¡£¹¥»÷ÕßʹÓÃä¯ÀÀÆ÷¡¢Ì¸ÌìÆ½Ì¨·Ö·¢Ä¾Âí»¯¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬ÈçXeno.exe¡¢RobloxPlayerBeta.exeµÈ£¬£¬£¬£¬£¬ÕâЩÎļþÍâòαװ³ÉÕýµ±ÓÎÏ·¹¤¾ß£¬£¬£¬£¬£¬ÊµÔò×÷ΪÏÂÔØÆ÷Æô¶¯¹¥»÷¡£¡£¡£¡£³õʼѬȾ½×¶Î£¬£¬£¬£¬£¬ÏÂÔØÆ÷»á×°ÖñãЯʽJavaÔËÐÐʱÇéÐΣ¬£¬£¬£¬£¬²¢Ö´ÐжñÒâJava¹éµµÎļþ£¨Èçjd-gui.jar£©¡£¡£¡£¡£¹¥»÷ÕßÇÉÃîʹÓÃWindowsÄÚÖù¤¾ß£¨LOLBins£©Èçcmstp.exe£¬£¬£¬£¬£¬Í¨¹ýPowerShellÖ´ÐÐÏÂÁ£¬£¬£¬£¬½«¶ñÒâ²Ù×÷αװ³ÉÕý³£ÏµÍ³Àú³Ì£¬£¬£¬£¬£¬½µµÍ±»Çå¾²Èí¼þ¼ì²âµÄΣº¦¡£¡£¡£¡£PowerShell¾ç±¾ËæºóʵÑéÅþÁ¬¶à¸öÔ¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬½«update.exeÏÂÔØÖÁÓû§ÍâµØÓ¦ÓÃÊý¾ÝĿ¼²¢×Ô¶¯ÔËÐС£¡£¡£¡£¶ñÒâÈí¼þÔËÐк󣬣¬£¬£¬£¬Á¬Ã¦É¨³ýÔʼÏÂÔØÆ÷ºÛ¼££¬£¬£¬£¬£¬²¢¸Ä¶¯Microsoft DefenderÉèÖ㬣¬£¬£¬£¬½«×ÔÉíÌí¼ÓÖÁɨ³ýÁÐ±í£¬£¬£¬£¬£¬¹æ±ÜÇå¾²ÒýÇæ¼à¿Ø¡£¡£¡£¡£ÎªÊµÏÖ³¤ÆÚ»¯¿ØÖÆ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÍýÏëʹÃüºÍworld.vbsÆô¶¯¾ç±¾½¨ÉèϵͳºóÃÅ£¬£¬£¬£¬£¬È·ÕäÖØÆôºóÈÔÄÜÒ»Á¬ÔËÐС£¡£¡£¡£¸ÃRAT¼¯¼ÓÔØÆ÷¡¢ÏÂÔØÆ÷¡¢Ô¶³Ì»á¼û¹¦Ð§ÓÚÒ»Ì壬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õߺã¾Ã²Ù¿ØÊÜѬȾװ±¸£¬£¬£¬£¬£¬Ö´ÐÐÇÔÈ¡Êý¾Ý¡¢ÍÆËÍÆäËû¶ñÒâÔØºÉµÈ²Ù×÷¡£¡£¡£¡£
https://hackread.com/microsoft-fake-xeno-roblox-utilities-windows-rat/


¾©¹«Íø°²±¸11010802024551ºÅ