AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽÇå¾²¾¯±¨
Ðû²¼Ê±¼ä 2026-03-031. AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽÇå¾²¾¯±¨
3ÔÂ2ÈÕ£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕÖÒÑÔ£¬£¬£¬Ò»³¡Õë¶ÔÈ«ÇòÊý°Ų̀Fortinet FortiGate·À»ðǽµÄ´ó¹æÄ£¹¥»÷ÊÂÎñÖУ¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁËÃûΪCyberStrikeAIµÄÐÂÐÍ¿ªÔ´AIÇå¾²²âÊÔÆ½Ì¨¡£¡£¡£¸Ãƽ̨ÓɼÙÃû"Ed1s0nZ"µÄ¿ª·¢Õß½¨É裬£¬£¬ÆäGitHub´úÂë¿âÏÔʾÆäΪ"ÓÃGoÓïÑÔ¹¹½¨µÄAIÔÉúÇå¾²²âÊÔÆ½Ì¨"£¬£¬£¬¼¯³É100ÓàÖÖÇå¾²¹¤¾ß£¬£¬£¬°üÀ¨ÖÇÄܱàÅÅÒýÇæ¡¢Ô¤½ç˵Çå¾²½ÇÉ«¼°ÊÖÒÕϵͳ£¬£¬£¬Ö§³ÖGPT¡¢ClaudeµÈÄ£×ÓÇý¶¯µÄ¾öÒéÒýÇæ£¬£¬£¬²¢Å䱸ÃÜÂë±£»£»£»¤µÄWeb½çÃæÓëÉó¼ÆÈÕÖ¾¹¦Ð§¡£¡£¡£¾ÝTeam Cymru¸ß¼¶ÍþвÇ鱨ÕÕÁÏWill ThomasÆÊÎö£¬£¬£¬¹¥»÷ÕßʹÓõÄ212.11.64[.]250ЧÀÍÆ÷ÔÚ8080¶Ë¿ÚÔËÐÐCyberStrikeAIЧÀÍ£¬£¬£¬¸ÃIPÓë±»¹¥ÆÆµÄFortiGate×°±¸±£´æÍøÂçͨѶ¼Í¼£¬£¬£¬×îºóÒ»´Î»î¶¯¼Í¼Ϊ2026Äê1ÔÂ30ÈÕ¡£¡£¡£¸Ã¹¤¾ßͨ¹ýÔÉúMCPÐÒéʵÏÖ´Ó¶Ô»°Ê½ÏÂÁîµ½Îó²î·¢Ã÷¡¢¹¥»÷Á´ÆÊÎö¡¢Ð§¹û¿ÉÊÓ»¯µÄÈ«Á÷³Ì×Ô¶¯»¯£¬£¬£¬Ö§³ÖÍøÂçɨÃ裨nmap£©¡¢Îó²îʹÓã¨metasploit£©¡¢ÃÜÂëÆÆ½â£¨hashcat£©µÈÍêÕû¹¥»÷Á´²Ù×÷£¬£¬£¬Ê¹µÍÊÖÒÕ¹¥»÷ÕßÒ²ÄÜÖ´ÐÐÖØ´ó¹¥»÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/
2. Ö¥¼Ó¸çInsightÒ½Ôº360GBÃô¸ÐÐÅÏ¢Ôâй¶
3ÔÂ2ÈÕ£¬£¬£¬Ö¥¼Ó¸çInsightÒ½ÔººÍÒ½ÁÆÖÐÐÄ2026Äê1ÔÂ26ÈÕÐû²¼Ì滻֪ͨ£¬£¬£¬Åû¶ÆäÓÚ2025Äê9Ô¼ì²âµ½ÍøÂçÒì³£»£»£»î¶¯£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬2025Äê8ÔÂ22ÈÕÖÁ9ÔÂ11ÈÕʱ´ú£¬£¬£¬Ò»Ãûδ¾ÊÚȨְԱ»á¼ûÁ˸ûú¹¹ÍøÂç¡£¡£¡£Í¨ÖªÖ¸³ö£¬£¬£¬¿ÉÄÜй¶µÄÐÅÏ¢ÀàÐͺ¸ÇÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕ/»¤ÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¼°ÖÎÁÆÏà¹ØÊý¾Ý£¨º¬¿µ½¡°ü¹ÜÐÅÏ¢£©£¬£¬£¬µ«×èֹ֪ͨÐû²¼Ê±£¬£¬£¬InsightÉÐδÆô¶¯¶ÔÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨ³ÌÐò£¬£¬£¬ÒàδÌá¼°ÌṩÃâ·ÑÉí·ÝµÁÓûº½âЧÀÍ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬2026Äê2ÔÂ24ÈÕ£¬£¬£¬×Գơ°°×ÒÏ¡±£¨Termite£©µÄÍþв×éÖ¯½«InsightÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾£¬£¬£¬Éù³ÆÒÑ»ñȡԼ360GB£¨Ô¼90Íò¸öÎļþ£©µÄ¡°ÉñÃØÊý¾Ý¡±£¬£¬£¬²¢·Ö¶àÅú´Îй¶£¬£¬£¬ÆäÖаüÀ¨´ó×Ú.jpegºÍ.dcmÃûÌÃÎļþ¡£¡£¡£ÏÖÔÚÉв»ÇåÎúInsightÊÇ·ñÓë¸Ã×éÖ¯¾ÙÐйý½Ó´¥»ò̸ÅС£¡£¡£
https://databreaches.net/2026/03/02/data-from-insight-hospital-and-medical-center-leaked-on-dark-web/
3. α¹È¸èÇå¾²Ò³´¹ÂÚ£ºPWAÇÔÈ¡OTP¼°¼ÓÃÜÇ®±Ò
3ÔÂ2ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶һÖÖʹÓÃαÔì¹È¸èÇå¾²Ò³ÃæµÄÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬¸Ã¹¥»÷ͨ¹ý½¥½øÊ½WebÓ¦Óã¨PWA£©ÊÖÒÕÇÔÈ¡Óû§Ò»´ÎÐÔÃÜÂ루OTP£©¡¢¼ÓÃÜÇ®±ÒÇ®°üµØµã£¬£¬£¬²¢½«Êܺ¦Õßä¯ÀÀÆ÷ת»¯Îª¹¥»÷ÕßÁ÷Á¿ÊðÀí¡£¡£¡£¹¥»÷Õßͨ¹ýÓòÃûgoogle-prism[.]comαװ³É¹È¸èÕýµ±Ç徲ЧÀÍ£¬£¬£¬ÓÕµ¼Óû§Íê³ÉËIJ½ÉèÖÃÁ÷³Ì£¬£¬£¬°üÀ¨ÊÚÓè¸ßΣº¦È¨ÏÞºÍ×°ÖöñÒâPWAÓ¦Óᣡ£¡£¸ÃPWAÔÚä¯ÀÀÆ÷ÖÐÒÔ×ÔÁ¦Ó¦ÓÃÐÎʽÔËÐУ¬£¬£¬Î޿ɼûä¯ÀÀÆ÷¿Ø¼þ£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌÊÖ¶ÎÓÕÆÓû§ÏàÐÅÆäÕýÔÚ¾ÙÐÐÇå¾²¼ì²é»ò×°±¸±£»£»£»¤²Ù×÷¡£¡£¡£¶ñÒâPWA¾ß±¸¶àÏî¸ßΣ¹¦Ð§£º¿ÉÇÔÈ¡ÁªÏµÈË¡¢ÊµÊ±GPSÊý¾Ý¡¢¼ôÌù°åÄÚÈÝ£¬£¬£¬²¢Í¨¹ýWebOTP API×èµ²¶ÌÐÅÑéÖ¤Â룻£»£»ÆäЧÀÍÊÂÇéÏß³ÌÖ§³ÖÍÆËÍ֪ͨ¡¢Ö´Ðкǫ́ʹÃü¼°ÍâйÊý¾Ý£»£»£»WebSocketÖм̹¦Ð§¸üÔÊÐí¹¥»÷Õßͨ¹ýÊܺ¦Õßä¯ÀÀÆ÷·ÓÉHTTPÇëÇ󣬣¬£¬Ä£ÄâÆäÍøÂç»î¶¯¡£¡£¡£±ðµÄ£¬£¬£¬¹¥»÷Õßÿ30Ãëͨ¹ý/api/heartbeat¼ì²éÐÂÏÂÁ£¬£¬²¢Í¨¹ýÐéαÇå¾²¾¯±¨ÓÕµ¼Óû§ÖØÐ·¿ªPWAÒÔÒ»Á¬ÇÔÈ¡Êý¾Ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/
4. °Í»ù˹̹Ö÷Á÷ÐÂÎÅÆµµÀÔâºÚ¿Í¹¥»÷
3ÔÂ2ÈÕ£¬£¬£¬°Í»ù˹̹Èý´óÖ÷Á÷ÐÂÎÅÆµµÀGeo News¡¢ARY NewsºÍSamaa TV 3ÔÂ1ÈÕÍí¼äÔâÓöÑÏÖØÇå¾²Îó²î£¬£¬£¬Õý³£½ÚÄ¿ÔÚ¿ªÕ«·¹ºóµÄ»Æ½ðʱ¶Î£¨Íí9µãǰºó£©±»Î´¾ÊÚȨÐÅÏ¢ÖÐÖ¹¡£¡£¡£Geo NewsÐû²¼ÉùÃ÷֤ʵ£¬£¬£¬Æäͨ¹ýPakSatÎÀÐÇ´«ÊäµÄÐźÅÔâ²»Ã÷Éí·ÝºÚ¿Í¹¥»÷£¬£¬£¬½ÚĿһÁ¬ÖÐÖ¹²¢·ºÆðÕë¶Ô°Í»ù˹̹Îä×°²½¶ÓµÄÉ¿»óÐÔÄÚÈÝ£¬£¬£¬°üÀ¨ºôÓõÃñÖÚ¶Ô¿¹¾ü·½¡¢Ö¸¿Ø¾ü¶Ó¡°´Ý»Ù¹ú¼Ò¡±µÈÖ±½ÓÑ°ÐÆÑÔÂÛ¡£¡£¡£´Ë´Î¹¥»÷ͨ¹ý¿ØÖÆÎÀÐÇÐźźÍÖ±²¥Á÷ʵÏÖ£¬£¬£¬ºÚ¿ÍÔÚÆÁÄ»ÉÏÕ¹ÊÕ¬ëÆµµÀÄÚÈÝÎ޹صÄÎÄ×Ö£¬£¬£¬Æä¹æÄ£ºÍÕë¶ÔÐÔÅú×¢ÕâÊÇÒ»´Îе÷Ðж¯¡£¡£¡£Ö»¹Ü²¿·Ö±¨µÀÍÆ²â¹¥»÷¿ÉÄÜÉæ¼°°¢¸»º¹ºÚ¿Í£¬£¬£¬µ«ÉÐδÓÐÈ·ÔäÖ¤¾Ý¡£¡£¡£×÷Ϊ»ØÓ¦£¬£¬£¬°Í»ù˹̹±»Ö¸Ìá³«ÍøÂ绹»÷£¬£¬£¬°üÀ¨¶ÔÓ¡¶ÈABPÐÂÎÅÆµµÀºÍFood OdishaÍøÕ¾µÄDDoS¹¥»÷¼°ÈëÇÖÐж¯£¬£¬£¬ºÚ¿ÍÉõÖÁʹÓÃÖ±²¥ÐźŲ¥·Å°Í»ù˹̹½¾üÕÕÁϳ¤µÄ½²»°¡£¡£¡£´Ë´ÎÊÂÎñ»¹²¨¼°19¸ö¹ú¼ÒµÄÍøÕ¾£¬£¬£¬ºÚ¿Í±»ÆØÔÚÕâÐ©ÍøÕ¾Í¶·Åδ¾ÊÚȨµÄ¹È¸è¹ã¸æ¡£¡£¡£Geo NewsÌåÏÖ£¬£¬£¬¸ÃƵµÀÓëºÚ¿Í¶Ô¿¹½ü24Сʱºó²Å»Ö¸´¿ØÖÆ£¬£¬£¬Ç¿µ÷Óк¦ÐÅÏ¢ÍêÈ«ÓÉÍâ²¿ÊÆÁ¦Ö²Èë¡£¡£¡£
https://hackread.com/pakistan-news-channels-hacked-anti-military-messages/
5. ÃÀÕþ¸®ÓëAnthropic AIʹÓÃÕùÒéÉý¼¶
2ÔÂ28ÈÕ£¬£¬£¬ÃÀ¹ú¹ú·À²¿³¤ºÕ¸ñÈû˼½«AnthropicÁÐΪ¡°¹©Ó¦Á´Î£º¦¡±ºó£¬£¬£¬Ë«·½Î§ÈÆAIÄ£×ÓClaudeµÄ¾üÊÂÓ¦Óñ¬·¢Ç¿ÁÒ³åÍ»¡£¡£¡£AnthropicǿӲ»ØÓ¦³Æ£¬£¬£¬´Ë¾ÙÔ´ÓÚÊýÔÂ̸Åн©¾Ö£¬£¬£¬Æä¼á³ÖΪClaudeµÄÕýµ±Ê¹ÓÃÔöÉèÁ½ÏîÆÆÀý£¬£¬£¬Õ¥È¡ÓÃÓÚÃÀ¹úÃñÖÚ´ó¹æÄ£º£ÄÚ¼à¿ØÓëÍêÈ«×ÔÖ÷ÎäÆ÷£¬£¬£¬²¢Ç¿µ÷¡°ÎÞÂÛÎå½Ç´ó¥ʩ¼ÓºÎÖÖÏÅ»££¬£¬£¬¶¼²»»á¸Ä±ä̬¶È¡±¡£¡£¡£ÌØÀÊÆÕÕþ¸®Ñ¸ËÙ½ÓÄÉÐж¯£¬£¬£¬ÒªÇóÁª°î»ú¹¹Áù¸öÔÂÄÚÍ£ÓÃAnthropicÊÖÒÕ£¬£¬£¬ºÕ¸ñÈû˼½øÒ»²½Ö¸ÁîÃÀ¾ü³Ð°üÉÌ¡¢¹©Ó¦É̼°ÏàÖúͬ°éÁ¬Ã¦ÖÕÖ¹ÓëAnthropicµÄÉÌÒµÏàÖú¡£¡£¡£Îå½Ç´óÂ¥Éù³Æ£¬£¬£¬´Ë¾ÙÖ¼ÔÚ´òÔì¡°AIÓÅÏÈ¡±×÷Õ½²½¶Ó£¬£¬£¬ÒªÇóAIÄ£×ÓÎÞʹÓÃÕþ²ßÏÞÖÆ¡¢²»×è°Õýµ±¾üÊÂÓ¦Ó㬣¬£¬²¢Ö¸ÔðAnthropicµÄ̬¶È¡°Î£¼°Òªº¦¾üÊÂÐж¯¡±¡£¡£¡£AnthropicÅú²µ³Æ£¬£¬£¬Îå½Ç´óÂ¥µÄÒªÇóȱ·¦Ö´·¨ÒÀ¾Ý£¬£¬£¬½«¿ª´´Î£ÏÕÏÈÀý¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬ÆäÖ§³ÖAIÓÃÓÚÕýµ±¶ÔÍâÇ鱨ʹÃü£¬£¬£¬µ«´ó¹æÄ£º£ÄÚ¼à¿ØÓëÃñÖ÷¼ÛÖµ¹ÛÏà㣣¬£¬£¬ÇÒAIÇý¶¯µÄ´ó¹æÄ£¼à¿Ø¶Ô»ù±¾×ÔÓÉ×é³ÉÐÂÐÍΣº¦¡£¡£¡£¹«Ë¾Ô®Òý¡¶ÃÀÍõ·¨µä¡·µÚ10±àµÚ3252Ìõ£¬£¬£¬Ö¸³ö¹©Ó¦Á´Î£º¦È϶¨½öÓ°ÏìÕ½Õù²¿ÌõÔ¼ÖеÄClaudeʹÓ㬣¬£¬²»Ó°ÏìÆäËû¿Í»§¡£¡£¡£
https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html
6. Íþ˹¿µÐǵ¤ÂóÑ§ÇøÔâÍøÂçÊÂÎñÖÂÎåÈÕ¶ÏÍø
3ÔÂ2ÈÕ£¬£¬£¬Íþ˹¿µÐÇÖݵ¤Âó´åµ¤ÂóÑ§ÇøÒò"ÍøÂçÊÂÎñ"Ò»Á¬Îå¸öÉÏ¿ÎÈÕÎÞ·¨ÁªÍø£¬£¬£¬Ô¼1500ÃûK-12ѧÉú¼°½ÌÖ°Ô±¹¤±»ÆÈʹÓÃÖ½ÖÊÖÊÁϽÌѧ£¬£¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ1ÔÂ30ÈÕÖÁ2ÔÂ5ÈÕ¡£¡£¡£µ¤ÂóÐÂÎÅÍø2ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉ"ÍøÂçÊÂÎñ"Òý·¢£¬£¬£¬µ«Î´Ã÷È·¹¥»÷ÀàÐÍ£»£»£»Ñ§ÇøÍøÂçÌṩÉÌWiscNetµÄ״̬ÊÂÎñÏÔʾ£¬£¬£¬Ñ§Çø"½»½Ó¶Ë¿Ú"å´»ú7Ì죬£¬£¬»ù´¡Ôµ¹ÊÔÓɱêעΪ"ÄÚ²¿Ôµ¹ÊÔÓÉ"¡£¡£¡£×èÖ¹3ÔÂ3ÈÕ£¬£¬£¬Ñ§Çø¹ÙÔ±ÉÐδ¹ûÕæÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨ÊÜÓ°Ïìϵͳ¹æÄ£¡¢Êý¾ÝÊÇ·ñ±»»á¼û¡¢ÊÇ·ñÉæ¼°Ö´·¨²¿·Ö»òÍⲿÏìÓ¦¹«Ë¾½éÈëµÈϸ½Ú¡£¡£¡£ÀÕË÷Èí¼þ×·×ÙÍøÕ¾ransomware.live½«Ñ§ÇøÓòÃûdenmark.k12.wi.usÁÐΪÍþв×éÖ¯"Incransom"µÄÊܺ¦Õߣ¬£¬£¬¸Ã×éÖ¯Éù³Æ3ÔÂ1ÈÕ·¢Ã÷¹¥»÷£¬£¬£¬µ«Õâһ˵·¨×Ô¼ºÎÞ·¨Ö¤ÊµÀÕË÷Èí¼þ»òÊý¾Ý͵ÇÔÏÖʵ±¬·¢¡£¡£¡£Ñ§Çø¶ÔýÌåÖÃÆÀÇëÇóδÓè»ØÓ¦¡£¡£¡£µ¤ÂóÑ§ÇøÁýÕÖ²¼ÀÊÏØ¡¢ÂíÄáÍÐÎÖ¿ËÏØºÍ»ùÎÖÄáÏØ²¿·ÖÇøÓò£¬£¬£¬´Ë´Î¶ÏÍø²»µ«Ó°ÏìÒ»Ñùƽ³£½Ìѧ£¬£¬£¬¸ü̻¶³ö½ÌÓý»ú¹¹ÔÚÍøÂçÇå¾²·À»¤·½ÃæµÄųÈõÐÔ¡£¡£¡£
https://dysruptionhub.com/denmark-schools-outage-wisconsin/


¾©¹«Íø°²±¸11010802024551ºÅ