AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽÇå¾²¾¯±¨

Ðû²¼Ê±¼ä 2026-03-03

1. AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽÇå¾²¾¯±¨


3ÔÂ2ÈÕ£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕÖÒÑÔ£¬£¬£¬Ò»³¡Õë¶ÔÈ«ÇòÊý°Ų̀Fortinet FortiGate·À»ðǽµÄ´ó¹æÄ£¹¥»÷ÊÂÎñÖУ¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁËÃûΪCyberStrikeAIµÄÐÂÐÍ¿ªÔ´AIÇå¾²²âÊÔÆ½Ì¨¡£¡£ ¡£¸Ãƽ̨ÓɼÙÃû"Ed1s0nZ"µÄ¿ª·¢Õß½¨É裬£¬£¬ÆäGitHub´úÂë¿âÏÔʾÆäΪ"ÓÃGoÓïÑÔ¹¹½¨µÄAIÔ­ÉúÇå¾²²âÊÔÆ½Ì¨"£¬£¬£¬¼¯³É100ÓàÖÖÇå¾²¹¤¾ß£¬£¬£¬°üÀ¨ÖÇÄܱàÅÅÒýÇæ¡¢Ô¤½ç˵Çå¾²½ÇÉ«¼°ÊÖÒÕϵͳ£¬£¬£¬Ö§³ÖGPT¡¢ClaudeµÈÄ£×ÓÇý¶¯µÄ¾öÒéÒýÇæ£¬£¬£¬²¢Å䱸ÃÜÂë±£»£» £»¤µÄWeb½çÃæÓëÉó¼ÆÈÕÖ¾¹¦Ð§¡£¡£ ¡£¾ÝTeam Cymru¸ß¼¶ÍþвÇ鱨ÕÕÁÏWill ThomasÆÊÎö£¬£¬£¬¹¥»÷ÕßʹÓõÄ212.11.64[.]250ЧÀÍÆ÷ÔÚ8080¶Ë¿ÚÔËÐÐCyberStrikeAIЧÀÍ£¬£¬£¬¸ÃIPÓë±»¹¥ÆÆµÄFortiGate×°±¸±£´æÍøÂçͨѶ¼Í¼£¬£¬£¬×îºóÒ»´Î»î¶¯¼Í¼Ϊ2026Äê1ÔÂ30ÈÕ¡£¡£ ¡£¸Ã¹¤¾ßͨ¹ýÔ­ÉúMCPЭÒéʵÏÖ´Ó¶Ô»°Ê½ÏÂÁîµ½Îó²î·¢Ã÷¡¢¹¥»÷Á´ÆÊÎö¡¢Ð§¹û¿ÉÊÓ»¯µÄÈ«Á÷³Ì×Ô¶¯»¯£¬£¬£¬Ö§³ÖÍøÂçɨÃ裨nmap£©¡¢Îó²îʹÓã¨metasploit£©¡¢ÃÜÂëÆÆ½â£¨hashcat£©µÈÍêÕû¹¥»÷Á´²Ù×÷£¬£¬£¬Ê¹µÍÊÖÒÕ¹¥»÷ÕßÒ²ÄÜÖ´ÐÐÖØ´ó¹¥»÷¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/


2. Ö¥¼Ó¸çInsightÒ½Ôº360GBÃô¸ÐÐÅÏ¢Ôâй¶


3ÔÂ2ÈÕ£¬£¬£¬Ö¥¼Ó¸çInsightÒ½ÔººÍÒ½ÁÆÖÐÐÄ2026Äê1ÔÂ26ÈÕÐû²¼Ì滻֪ͨ£¬£¬£¬Åû¶ÆäÓÚ2025Äê9Ô¼ì²âµ½ÍøÂçÒì³£»£» £»î¶¯£¬£¬£¬¾­ÊÓ²ìÈ·ÈÏ£¬£¬£¬2025Äê8ÔÂ22ÈÕÖÁ9ÔÂ11ÈÕʱ´ú£¬£¬£¬Ò»Ãûδ¾­ÊÚȨְԱ»á¼ûÁ˸ûú¹¹ÍøÂç¡£¡£ ¡£Í¨ÖªÖ¸³ö£¬£¬£¬¿ÉÄÜй¶µÄÐÅÏ¢ÀàÐͺ­¸ÇÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕ/»¤ÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¼°ÖÎÁÆÏà¹ØÊý¾Ý£¨º¬¿µ½¡°ü¹ÜÐÅÏ¢£©£¬£¬£¬µ«×èֹ֪ͨÐû²¼Ê±£¬£¬£¬InsightÉÐδÆô¶¯¶ÔÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨ³ÌÐò£¬£¬£¬ÒàδÌá¼°ÌṩÃâ·ÑÉí·ÝµÁÓûº½âЧÀÍ¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬2026Äê2ÔÂ24ÈÕ£¬£¬£¬×Գơ°°×ÒÏ¡±£¨Termite£©µÄÍþв×éÖ¯½«InsightÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾£¬£¬£¬Éù³ÆÒÑ»ñȡԼ360GB£¨Ô¼90Íò¸öÎļþ£©µÄ¡°ÉñÃØÊý¾Ý¡±£¬£¬£¬²¢·Ö¶àÅú´Îй¶£¬£¬£¬ÆäÖаüÀ¨´ó×Ú.jpegºÍ.dcmÃûÌÃÎļþ¡£¡£ ¡£ÏÖÔÚÉв»ÇåÎúInsightÊÇ·ñÓë¸Ã×éÖ¯¾ÙÐйý½Ó´¥»ò̸ÅС£¡£ ¡£


https://databreaches.net/2026/03/02/data-from-insight-hospital-and-medical-center-leaked-on-dark-web/


3. α¹È¸èÇå¾²Ò³´¹ÂÚ£ºPWAÇÔÈ¡OTP¼°¼ÓÃÜÇ®±Ò


3ÔÂ2ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶һÖÖʹÓÃαÔì¹È¸èÇå¾²Ò³ÃæµÄÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬¸Ã¹¥»÷ͨ¹ý½¥½øÊ½WebÓ¦Óã¨PWA£©ÊÖÒÕÇÔÈ¡Óû§Ò»´ÎÐÔÃÜÂ루OTP£©¡¢¼ÓÃÜÇ®±ÒÇ®°üµØµã£¬£¬£¬²¢½«Êܺ¦Õßä¯ÀÀÆ÷ת»¯Îª¹¥»÷ÕßÁ÷Á¿ÊðÀí¡£¡£ ¡£¹¥»÷Õßͨ¹ýÓòÃûgoogle-prism[.]comαװ³É¹È¸èÕýµ±Ç徲ЧÀÍ£¬£¬£¬ÓÕµ¼Óû§Íê³ÉËIJ½ÉèÖÃÁ÷³Ì£¬£¬£¬°üÀ¨ÊÚÓè¸ßΣº¦È¨ÏÞºÍ×°ÖöñÒâPWAÓ¦Óᣡ£ ¡£¸ÃPWAÔÚä¯ÀÀÆ÷ÖÐÒÔ×ÔÁ¦Ó¦ÓÃÐÎʽÔËÐУ¬£¬£¬Î޿ɼûä¯ÀÀÆ÷¿Ø¼þ£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌÊÖ¶ÎÓÕÆ­Óû§ÏàÐÅÆäÕýÔÚ¾ÙÐÐÇå¾²¼ì²é»ò×°±¸±£»£» £»¤²Ù×÷¡£¡£ ¡£¶ñÒâPWA¾ß±¸¶àÏî¸ßΣ¹¦Ð§£º¿ÉÇÔÈ¡ÁªÏµÈË¡¢ÊµÊ±GPSÊý¾Ý¡¢¼ôÌù°åÄÚÈÝ£¬£¬£¬²¢Í¨¹ýWebOTP API×èµ²¶ÌÐÅÑéÖ¤Â룻£» £»ÆäЧÀÍÊÂÇéÏß³ÌÖ§³ÖÍÆËÍ֪ͨ¡¢Ö´Ðкǫ́ʹÃü¼°ÍâйÊý¾Ý£»£» £»WebSocketÖм̹¦Ð§¸üÔÊÐí¹¥»÷Õßͨ¹ýÊܺ¦Õßä¯ÀÀÆ÷·ÓÉHTTPÇëÇ󣬣¬£¬Ä£ÄâÆäÍøÂç»î¶¯¡£¡£ ¡£±ðµÄ£¬£¬£¬¹¥»÷Õßÿ30Ãëͨ¹ý/api/heartbeat¼ì²éÐÂÏÂÁ£¬£¬²¢Í¨¹ýÐéαÇå¾²¾¯±¨ÓÕµ¼Óû§ÖØÐ·­¿ªPWAÒÔÒ»Á¬ÇÔÈ¡Êý¾Ý¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/


4. °Í»ù˹̹Ö÷Á÷ÐÂÎÅÆµµÀÔâºÚ¿Í¹¥»÷


3ÔÂ2ÈÕ£¬£¬£¬°Í»ù˹̹Èý´óÖ÷Á÷ÐÂÎÅÆµµÀGeo News¡¢ARY NewsºÍSamaa TV 3ÔÂ1ÈÕÍí¼äÔâÓöÑÏÖØÇå¾²Îó²î£¬£¬£¬Õý³£½ÚÄ¿ÔÚ¿ªÕ«·¹ºóµÄ»Æ½ðʱ¶Î£¨Íí9µãǰºó£©±»Î´¾­ÊÚȨÐÅÏ¢ÖÐÖ¹¡£¡£ ¡£Geo NewsÐû²¼ÉùÃ÷֤ʵ£¬£¬£¬Æäͨ¹ýPakSatÎÀÐÇ´«ÊäµÄÐźÅÔâ²»Ã÷Éí·ÝºÚ¿Í¹¥»÷£¬£¬£¬½ÚĿһÁ¬ÖÐÖ¹²¢·ºÆðÕë¶Ô°Í»ù˹̹Îä×°²½¶ÓµÄÉ¿»óÐÔÄÚÈÝ£¬£¬£¬°üÀ¨ºôÓõÃñÖÚ¶Ô¿¹¾ü·½¡¢Ö¸¿Ø¾ü¶Ó¡°´Ý»Ù¹ú¼Ò¡±µÈÖ±½ÓÑ°ÐÆÑÔÂÛ¡£¡£ ¡£´Ë´Î¹¥»÷ͨ¹ý¿ØÖÆÎÀÐÇÐźźÍÖ±²¥Á÷ʵÏÖ£¬£¬£¬ºÚ¿ÍÔÚÆÁÄ»ÉÏÕ¹ÊÕ¬ëÆµµÀÄÚÈÝÎ޹صÄÎÄ×Ö£¬£¬£¬Æä¹æÄ£ºÍÕë¶ÔÐÔÅú×¢ÕâÊÇÒ»´ÎЭµ÷Ðж¯¡£¡£ ¡£Ö»¹Ü²¿·Ö±¨µÀÍÆ²â¹¥»÷¿ÉÄÜÉæ¼°°¢¸»º¹ºÚ¿Í£¬£¬£¬µ«ÉÐδÓÐÈ·ÔäÖ¤¾Ý¡£¡£ ¡£×÷Ϊ»ØÓ¦£¬£¬£¬°Í»ù˹̹±»Ö¸Ìá³«ÍøÂ绹»÷£¬£¬£¬°üÀ¨¶ÔÓ¡¶ÈABPÐÂÎÅÆµµÀºÍFood OdishaÍøÕ¾µÄDDoS¹¥»÷¼°ÈëÇÖÐж¯£¬£¬£¬ºÚ¿ÍÉõÖÁʹÓÃÖ±²¥ÐźŲ¥·Å°Í»ù˹̹½¾üÕÕÁϳ¤µÄ½²»°¡£¡£ ¡£´Ë´ÎÊÂÎñ»¹²¨¼°19¸ö¹ú¼ÒµÄÍøÕ¾£¬£¬£¬ºÚ¿Í±»ÆØÔÚÕâÐ©ÍøÕ¾Í¶·Åδ¾­ÊÚȨµÄ¹È¸è¹ã¸æ¡£¡£ ¡£Geo NewsÌåÏÖ£¬£¬£¬¸ÃƵµÀÓëºÚ¿Í¶Ô¿¹½ü24Сʱºó²Å»Ö¸´¿ØÖÆ£¬£¬£¬Ç¿µ÷Óк¦ÐÅÏ¢ÍêÈ«ÓÉÍâ²¿ÊÆÁ¦Ö²Èë¡£¡£ ¡£


https://hackread.com/pakistan-news-channels-hacked-anti-military-messages/


5. ÃÀÕþ¸®ÓëAnthropic AIʹÓÃÕùÒéÉý¼¶


2ÔÂ28ÈÕ£¬£¬£¬ÃÀ¹ú¹ú·À²¿³¤ºÕ¸ñÈû˼½«AnthropicÁÐΪ¡°¹©Ó¦Á´Î£º¦¡±ºó£¬£¬£¬Ë«·½Î§ÈÆAIÄ£×ÓClaudeµÄ¾üÊÂÓ¦Óñ¬·¢Ç¿ÁÒ³åÍ»¡£¡£ ¡£AnthropicǿӲ»ØÓ¦³Æ£¬£¬£¬´Ë¾ÙÔ´ÓÚÊýÔÂ̸Åн©¾Ö£¬£¬£¬Æä¼á³ÖΪClaudeµÄÕýµ±Ê¹ÓÃÔöÉèÁ½ÏîÆÆÀý£¬£¬£¬Õ¥È¡ÓÃÓÚÃÀ¹úÃñÖÚ´ó¹æÄ£º£ÄÚ¼à¿ØÓëÍêÈ«×ÔÖ÷ÎäÆ÷£¬£¬£¬²¢Ç¿µ÷¡°ÎÞÂÛÎå½Ç´ó¥ʩ¼ÓºÎÖÖÏÅ»££¬£¬£¬¶¼²»»á¸Ä±ä̬¶È¡±¡£¡£ ¡£ÌØÀÊÆÕÕþ¸®Ñ¸ËÙ½ÓÄÉÐж¯£¬£¬£¬ÒªÇóÁª°î»ú¹¹Áù¸öÔÂÄÚÍ£ÓÃAnthropicÊÖÒÕ£¬£¬£¬ºÕ¸ñÈû˼½øÒ»²½Ö¸ÁîÃÀ¾ü³Ð°üÉÌ¡¢¹©Ó¦É̼°ÏàÖúͬ°éÁ¬Ã¦ÖÕÖ¹ÓëAnthropicµÄÉÌÒµÏàÖú¡£¡£ ¡£Îå½Ç´óÂ¥Éù³Æ£¬£¬£¬´Ë¾ÙÖ¼ÔÚ´òÔì¡°AIÓÅÏÈ¡±×÷Õ½²½¶Ó£¬£¬£¬ÒªÇóAIÄ£×ÓÎÞʹÓÃÕþ²ßÏÞÖÆ¡¢²»×è°­Õýµ±¾üÊÂÓ¦Ó㬣¬£¬²¢Ö¸ÔðAnthropicµÄ̬¶È¡°Î£¼°Òªº¦¾üÊÂÐж¯¡±¡£¡£ ¡£AnthropicÅú²µ³Æ£¬£¬£¬Îå½Ç´óÂ¥µÄÒªÇóȱ·¦Ö´·¨ÒÀ¾Ý£¬£¬£¬½«¿ª´´Î£ÏÕÏÈÀý¡£¡£ ¡£¹«Ë¾Ç¿µ÷£¬£¬£¬ÆäÖ§³ÖAIÓÃÓÚÕýµ±¶ÔÍâÇ鱨ʹÃü£¬£¬£¬µ«´ó¹æÄ£º£ÄÚ¼à¿ØÓëÃñÖ÷¼ÛÖµ¹ÛÏà㣣¬£¬£¬ÇÒAIÇý¶¯µÄ´ó¹æÄ£¼à¿Ø¶Ô»ù±¾×ÔÓÉ×é³ÉÐÂÐÍΣº¦¡£¡£ ¡£¹«Ë¾Ô®Òý¡¶ÃÀÍõ·¨µä¡·µÚ10±àµÚ3252Ìõ£¬£¬£¬Ö¸³ö¹©Ó¦Á´Î£º¦È϶¨½öÓ°ÏìÕ½Õù²¿ÌõÔ¼ÖеÄClaudeʹÓ㬣¬£¬²»Ó°ÏìÆäËû¿Í»§¡£¡£ ¡£


https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html


6. Íþ˹¿µÐǵ¤ÂóÑ§ÇøÔâÍøÂçÊÂÎñÖÂÎåÈÕ¶ÏÍø


3ÔÂ2ÈÕ£¬£¬£¬Íþ˹¿µÐÇÖݵ¤Âó´åµ¤ÂóÑ§ÇøÒò"ÍøÂçÊÂÎñ"Ò»Á¬Îå¸öÉÏ¿ÎÈÕÎÞ·¨ÁªÍø£¬£¬£¬Ô¼1500ÃûK-12ѧÉú¼°½ÌÖ°Ô±¹¤±»ÆÈʹÓÃÖ½ÖÊÖÊÁϽÌѧ£¬£¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ1ÔÂ30ÈÕÖÁ2ÔÂ5ÈÕ¡£¡£ ¡£µ¤ÂóÐÂÎÅÍø2ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉ"ÍøÂçÊÂÎñ"Òý·¢£¬£¬£¬µ«Î´Ã÷È·¹¥»÷ÀàÐÍ£»£» £»Ñ§ÇøÍøÂçÌṩÉÌWiscNetµÄ״̬ÊÂÎñÏÔʾ£¬£¬£¬Ñ§Çø"½»½Ó¶Ë¿Ú"å´»ú7Ì죬£¬£¬»ù´¡Ôµ¹ÊÔ­ÓɱêעΪ"ÄÚ²¿Ôµ¹ÊÔ­ÓÉ"¡£¡£ ¡£×èÖ¹3ÔÂ3ÈÕ£¬£¬£¬Ñ§Çø¹ÙÔ±ÉÐδ¹ûÕæÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨ÊÜÓ°Ïìϵͳ¹æÄ£¡¢Êý¾ÝÊÇ·ñ±»»á¼û¡¢ÊÇ·ñÉæ¼°Ö´·¨²¿·Ö»òÍⲿÏìÓ¦¹«Ë¾½éÈëµÈϸ½Ú¡£¡£ ¡£ÀÕË÷Èí¼þ×·×ÙÍøÕ¾ransomware.live½«Ñ§ÇøÓòÃûdenmark.k12.wi.usÁÐΪÍþв×éÖ¯"Incransom"µÄÊܺ¦Õߣ¬£¬£¬¸Ã×éÖ¯Éù³Æ3ÔÂ1ÈÕ·¢Ã÷¹¥»÷£¬£¬£¬µ«Õâһ˵·¨×Ô¼ºÎÞ·¨Ö¤ÊµÀÕË÷Èí¼þ»òÊý¾Ý͵ÇÔÏÖʵ±¬·¢¡£¡£ ¡£Ñ§Çø¶ÔýÌåÖÃÆÀÇëÇóδÓè»ØÓ¦¡£¡£ ¡£µ¤ÂóÑ§ÇøÁýÕÖ²¼ÀÊÏØ¡¢ÂíÄáÍÐÎÖ¿ËÏØºÍ»ùÎÖÄáÏØ²¿·ÖÇøÓò£¬£¬£¬´Ë´Î¶ÏÍø²»µ«Ó°ÏìÒ»Ñùƽ³£½Ìѧ£¬£¬£¬¸ü̻¶³ö½ÌÓý»ú¹¹ÔÚÍøÂçÇå¾²·À»¤·½ÃæµÄųÈõÐÔ¡£¡£ ¡£


https://dysruptionhub.com/denmark-schools-outage-wisconsin/