ÐÂÔóÎ÷ÅÁÈûÒÁ¿ËÏØÔâÍøÂç¹¥»÷Ö¹«¹²Ð§ÀÍ̱»¾
Ðû²¼Ê±¼ä 2026-03-101. ÐÂÔóÎ÷ÅÁÈûÒÁ¿ËÏØÔâÍøÂç¹¥»÷Ö¹«¹²Ð§ÀÍ̱»¾
3ÔÂ6ÈÕ£¬£¬£¬£¬ÃÀ¹úÐÂÔóÎ÷Öݱ±²¿ÅÁÈûÒÁ¿ËÏØÓÚ2026Äê3ÔÂ4ÈÕÍí¼äÐû²¼½ôÆÈͨ¸æ£¬£¬£¬£¬È·ÈÏÔâÓö¶ñÒâÈí¼þ¹¥»÷µ¼ÖÂÈ«ÏØÕþ¸®²¿·ÖITϵͳÓëµç»°Ïß·ÖÜÈ«ÖÐÖ¹¡£¡£¡£¸ÃÏØÕýÁªºÏÁª°î¼°ÖÝÕþ¸®¹ÙÔ±Õö¿ªÊӲ죬£¬£¬£¬ÊÔͼ¿ØÖÆÊÂ̬²¢»Ö¸´Ð§ÀÍ¡£¡£¡£´Ë´Î¹¥»÷ÊÂÎñʼÓÚ3ÔÂ4ÈÕÉÏÎçÊ״α¨¸æµÄµç»°Ïß·¹ÊÕÏ£¬£¬£¬£¬¾ÊÓ²ìºóÓÚµ±ÈÕÏÂÖçÈ·ÒÔÎªÍøÂç¹¥»÷ËùÖ¡£¡£¡£ÅÁÈûÒÁ¿ËÏØ¹ÙԱǿµ÷£¬£¬£¬£¬ÐÂÔóÎ÷ÖÝÄÚ¶à¸öµØ·½Õþ¸®½üÆÚ¾ùÔâÓöÀàËÆÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬¿ÉÄÜÉæ¼°´ËǰÔâÀÕË÷Èí¼þ¹¥»÷µÄÈøÄ¬ÈûÌØÏØ¡¢¿¨Ä·µÇÏØ¡¢²®¸ùÏØ¡¢ÃÉÌØ¿ËÀ³¶ûÕò¼°»ô²©¿ÏÊС£¡£¡£ÅÁÈûÒÁ¿ËÏØÊÂÎñÔÙ´Î͹ÏԵط½Õþ¸®ÔÚÍøÂçÇå¾²·À»¤·½ÃæµÄųÈõÐÔ¡£¡£¡£ÆÊÎöÖ¸³ö£¬£¬£¬£¬ÖÐСÐ͵ط½Õþ¸®Òò×ÊÔ´ÓÐÏÞ£¬£¬£¬£¬ÍùÍù³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¡°ÈíÄ¿µÄ¡±¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÅÁÈûÒÁ¿ËÏØÉÐδÅû¶¹¥»÷Ïêϸϸ½Ú¼°ÀÕË÷ÒªÇ󣬣¬£¬£¬µ«Ç¿µ÷½«ÓÅÏȻָ´¹«¹²Ð§ÀͲ¢ÅäºÏÖ´·¨²¿·Ö×·²é¹¥»÷ȪԴ¡£¡£¡£
https://therecord.media/new-jersey-county-says-malware-attack-took-down-phones
2. Nginx UI¸ßΣÎó²îÖ±¸·ÝÊý¾Ýй¶Σº¦
3ÔÂ8ÈÕ£¬£¬£¬£¬Nginx UIÖÎÀí½çÃæÆØ³ö±àºÅΪCVE-2026-27944µÄÑÏÖØÎó²î£¨CVSSÆÀ·Ö9.8£©£¬£¬£¬£¬¹¥»÷Õß¿Éδ¾Éí·ÝÑéÖ¤ÏÂÔØ²¢½âÃÜЧÀÍÆ÷ÍêÕû±¸·Ý£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÉèÖá¢Æ¾Ö¤¼°¼ÓÃÜÃÜԿй¶¡£¡£¡£¸ÃÎó²îÔ´ÓÚ/api/backup¶ËµãδʵÑé»á¼û¿ØÖÆ£¬£¬£¬£¬ÇÒÏìӦͷֱ½Ó̻¶½âÃÜËùÐèµÄAES-256¼ÓÃÜÃÜÔ¿ºÍ³õʼ»¯ÏòÁ¿£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄÜÖ±½Ó»ñÈ¡°üÀ¨Óû§Æ¾Ö¤¡¢»á»°ÁîÅÆ¡¢SSL˽Կ¡¢NginxÉèÖÃÎļþ¡¢Êý¾Ý¿âÅþÁ¬ÐÅÏ¢µÈ½¹µãÊý¾ÝµÄ±¸·Ý°ü¡£¡£¡£Nginx UI×÷Ϊ¼ò»¯Ð§ÀÍÆ÷ÖÎÀíµÄWeb¿ØÖÆÃæ°å£¬£¬£¬£¬±¾Ó¦Í¨¹ýͼÐλ¯½çÃæ½µµÍÉèÖÃÃż÷£¬£¬£¬£¬µ«´Ë´ÎÎó²î̻¶ÆäÉè¼ÆÈ±ÏÝ£¬£¬£¬£¬ÖÎÀí½Ó¿Ú̻¶ÓÚ¹«¹²»¥ÁªÍøÊ±£¬£¬£¬£¬È±·¦»ù±¾µÄÇå¾²·À»¤¡£¡£¡£Ò»µ©±¸·Ý±»½âÃÜ£¬£¬£¬£¬¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÖÎÀí½çÃæ£¬£¬£¬£¬¸Ä¶¯·´ÏòÊðÀí¹æÔò¡¢Öض¨ÏòÁ÷Á¿»òÖ²Èë¶ñÒâ¾ç±¾£»£»£»£»£»£»£»SSL˽Կй¶½«µ¼ÖÂÍøÕ¾Ã°³ä»òÖÐÐÄÈ˹¥»÷£»£»£»£»£»£»£»Êý¾Ý¿âƾ֤ºÍÉèÖÃÎļþ¿ÉÄÜй¶Óû§Êý¾Ý¼°Ó¦ÓóÌÐòÉñÃØ£»£»£»£»£»£»£»NginxÉèÖÃϸ½Ú¸ü»á̻¶ÄÚ²¿ÍøÂç¼Ü¹¹£¬£¬£¬£¬ÎªºóÐø¹¥»÷Ìṩ·¾¶¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Nginx¹Ù·½ÒÑÐû²¼ÐÞ¸´°æ±¾£¬£¬£¬£¬Óû§Ó¦Á¬Ã¦Éý¼¶²¢Éó²é±¸·Ý´æ´¢Õ½ÂÔ£¬£¬£¬£¬È·±£¼ÓÃÜÃÜÔ¿Ó뱸·ÝÊèÉ¢´æ´¢¡£¡£¡£
https://securityaffairs.com/189123/security/critical-nginx-ui-flaw-cve-2026-27944-exposes-server-backups.html
3. ΢Èí¹¤¾ß³ÉºÚ¿ÍкóÃŹ¥»÷½ðÈÚÒ½ÁÆÔØÌå
3ÔÂ9ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾BlueVoyant×îÐÂÅû¶£¬£¬£¬£¬Õë¶Ô¼ÓÄôó½ðÈÚ»ú¹¹¼°È«ÇòÒ½ÁƱ£½¡×éÖ¯µÄ¶¨Ïò¹¥»÷ÖУ¬£¬£¬£¬ºÚ¿Íͨ¹ýÉç»á¹¤³ÌѧÊÖ¶ÎÁ¬ÏµÎ¢ÈíÉú̬¹¤¾ßʵÑéÐÂÐͶñÒâÈí¼þ°²ÅÅ¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÏòÄ¿µÄÔ±¹¤·¢ËÍ´ó×ÚÀ¬»øÓʼþ½¨ÉèÐÅÈΣ¬£¬£¬£¬Ëæºóαװ³ÉÆóÒµITְԱͨ¹ýMicrosoft TeamsÁªÏµÊܺ¦Õߣ¬£¬£¬£¬ÒÔÐÖú´¦Öóͷ£À¬»øÓʼþΪÓÉÓÕµ¼ÆäÆô¶¯Quick AssistÔ¶³Ì»á»°¡£¡£¡£ÔÚ»ñȡԶ³Ì»á¼ûȨÏ޺󣬣¬£¬£¬¹¥»÷Õß°²ÅŰüÀ¨Êý×ÖÊðÃûMSI×°ÖóÌÐòµÄ¶ñÒ⹤¾ß¼¯¡£¡£¡£ÕâЩMSIÎļþαװ³ÉMicrosoft Teams×é¼þ¼°Õýµ±Windows¹¤¾ßCrossDeviceService£¬£¬£¬£¬Í¨¹ýDLL²àÔØÊÖÒÕ½«¶ñÒâ¿âhostfxr.dll×¢ÈëÕýµ±¶þ½øÖÆÎļþ¡£¡£¡£¸Ã¿â¼ÓÔØºó½âÃÜÄÚ´æÖеÄshellcode£¬£¬£¬£¬Ê¹ÓÃCreateThreadº¯Êý½¨Éè´ó×ÚÏß³Ì×ÌÈŵ÷ÊÔÆ÷ÆÊÎö£¬£¬£¬£¬Í¬Ê±Ö´ÐÐɳÏä¼ì²âÒÔ¹æ±ÜÐéÄâÇéÐΡ£¡£¡£¶ñÒâÈí¼þͨ¹ýSHA-256ÅÉÉúÃÜÔ¿½âÃܳöA0Backdoor£¬£¬£¬£¬¸ÃºóÃŽÓÄÉAES¼ÓÃܱ£»£»£»£»£»£»£»¤½¹µã´úÂ룬£¬£¬£¬²¢Ç¨áãÖÁÐÂÄÚ´æÇøÓòÖ´ÐС£¡£¡£Æäͨ¹ýDeviceIoControl¡¢GetUserNameExWµÈWindows APIÍøÂçÖ÷»úÐÅÏ¢£¬£¬£¬£¬Íê³ÉÖ÷»úÖ¸ÎÆÊ¶±ð¡£¡£¡£ÓëÏÂÁî¿ØÖÆÐ§ÀÍÆ÷£¨C2£©µÄͨѶÒþ²ØÔÚDNSÁ÷Á¿ÖС£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
4. ¶íºÚ¿ÍʹÓÃSignal/WhatsApp´¹ÂÚ¹¥»÷Õþ¸®¾ü·½¼ÇÕß
3ÔÂ9ÈÕ£¬£¬£¬£¬¶íÂÞ˹¹ú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Õýͨ¹ýÕë¶ÔSignalºÍWhatsAppµÄÍøÂç´¹Âڻ£¬£¬£¬£¬¶ÔÕþ¸®¹ÙÔ±¡¢¾ü·½Ö°Ô±¼°¼ÇÕßÌᳫ¶¨Ïò¹¥»÷£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£ºÉÀ¼¹ú·ÀÇ鱨ÓëÇå¾²¾Ö£¨MIVD£©Óë×ÜÇ鱨ÓëÇå¾²¾Ö£¨AIVD£©ÁªºÏ±¨¸æÖ¤Êµ£¬£¬£¬£¬ºÉÀ¼Õþ¸®¹ÍÔ±ÒѳÉΪϮ»÷Ä¿µÄ£¬£¬£¬£¬¹¥»÷½ÓÄÉÍøÂç´¹ÂÚÓëÉç»á¹¤³ÌÊÖÒÕ£¬£¬£¬£¬ÀÄÓÃÕýµ±Éí·ÝÑéÖ¤¹¦Ð§½ÓÊÜÕË»§²¢¼à¿ØÐÂÎÅ¡£¡£¡£Signal¹Ù·½Ðû²¼ÖÒÑÔÖ¸³ö£¬£¬£¬£¬¹¥»÷ͨ¹ýÈ«ÐÄÉè¼ÆµÄ´¹ÂڻÓÕÆÓû§Ð¹Â¶¶ÌÐÅÑéÖ¤Âë»òPINÂ룬£¬£¬£¬µ¼ÖÂÕË»§±»µÁ¡£¡£¡£Ö»¹ÜSignalµÄ¼ÓÃÜϵͳδ±»ÆÆË𣬣¬£¬£¬µ«¹¥»÷Õß¿ÉʹÓÃÑéÖ¤ÂëÔÚ×ÔÉí×°±¸×¢²áÕË»§£¬£¬£¬£¬ÍêÈ«¿ØÖÆÓû§Õ˺ţ¬£¬£¬£¬ÉõÖÁ½«¹ØÁªµç»°ºÅÂë¸ü¸ÄΪ¼º·½¿ØÖÆ£¬£¬£¬£¬´Ó¶ø»á¼ûÁªÏµÈËÁÐ±í¡¢ÈºÁÄÐÂÎÅ£¬£¬£¬£¬²¢Ã°³äÊܺ¦Õß·¢ËÍÐÂÎÅ¡£¡£¡£Ò»Öֵ䷶ÊÖ·¨ÊÇð³ä¡°SignalÇå¾²Ö§³Ö̸Ìì»úеÈË¡±£¬£¬£¬£¬»Ñ³Æ¼ì²âµ½ÕË»§¿ÉÒɻ£¬£¬£¬£¬ÓÕµ¼Óû§ÊäÈëÊÖ»úÑéÖ¤ÂëÍê³É¡°ÑéÖ¤³ÌÐò¡±£»£»£»£»£»£»£»ÁíÒ»ÖÖÔòÊÇ·¢ËͶñÒâ¶þάÂë»òÁ´½Ó£¬£¬£¬£¬Î±×°³ÉȺ×éÔ¼Çë»ò×°±¸ÅþÁ¬ÇëÇ󣬣¬£¬£¬Êܺ¦ÕßɨÃè»òµã»÷ºó£¬£¬£¬£¬¹¥»÷Õß×°±¸½«ÓëÕË»§¹ØÁª£¬£¬£¬£¬ÊµÊ±»á¼û²¢Í¬²½ÐÂÎÅ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dutch-govt-warns-of-signal-whatsapp-account-hijacking-attacks/
5. °®Á¢ÐÅÃÀ¹ú×Ó¹«Ë¾³¬4000ÃûµÂÖÝÓû§ÐÅÏ¢±»ÇÔ
3ÔÂ9ÈÕ£¬£¬£¬£¬ÈðµäͨѶ¾ÞÍ·°®Á¢ÐŵÄÃÀ¹ú×Ó¹«Ë¾¿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¾ÝÆäÏò¼ÓÖݼ°µÂ¿ËÈøË¹ÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþÏÔʾ£¬£¬£¬£¬2025Äê4ÔÂ28ÈÕ£¬£¬£¬£¬Ò»¼ÒΪ°®Á¢ÐÅ´æ´¢Ô±¹¤ºÍ¿Í»§Êý¾ÝµÄµÚÈý·½Ð§ÀÍÌṩÉ̼ì²âµ½Òì³£»á¼û£¬£¬£¬£¬ËæºóÆô¶¯ÊӲ첢֪ͨÁª°îÊÓ²ì¾Ö£¨FBI£©¡£¡£¡£ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬2025Äê4ÔÂ17ÈÕÖÁ22ÈÕʱ´ú£¬£¬£¬£¬¹¥»÷Õßδ¾ÊÚȨ»á¼û»ò»ñÈ¡Á˲¿·ÖÎļþ£¬£¬£¬£¬Éæ¼°ÐÕÃû¡¢µØµã¡¢Éç»á°ü¹ÜºÅÂë¡¢¼ÝÕպ𢻤ÕÕµÈÕþ¸®ID¡¢ÒøÐÐÕ˺š¢ÐÅÓÿ¨ÐÅÏ¢¡¢Ò½ÁƼͼ¼°³öÉúÈÕÆÚµÈÃô¸ÐÐÅÏ¢¡£¡£¡£´Ë´ÎÊÂÎñÔڵ¿ËÈøË¹ÖÝÒÑÈ·ÈÏÓ°Ïì4,377ÈË£¬£¬£¬£¬µ«È«ÇòÊÜÓ°Ïì×ÜÈËÊýÉÐδ¹ûÕæ¡£¡£¡£°®Á¢ÐÅÇ¿µ÷£¬£¬£¬£¬Ö»¹ÜÊý¾Ý±»ÇÔÈ¡£¬£¬£¬£¬ÏÖÔÚÉÐδ·¢Ã÷ÐÅÏ¢±»ÀÄÓõÄÖ¤¾Ý¡£¡£¡£Îª±£»£»£»£»£»£»£»¤ÊÜÓ°ÏìÓû§£¬£¬£¬£¬¸Ã¹«Ë¾ÌṩΪÆÚÒ»ÄêµÄÃâ·ÑIDXÉí·Ý±£»£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬°üÀ¨ÐÅÓÃ¼à¿Ø¡¢°µÍø¼à¿Ø¡¢Éí·Ý͵ÇÔ»Ö¸´Ö§³Ö¼°×î¸ß100ÍòÃÀÔªµÄÚ²ÆËðʧÅâ³¥£¬£¬£¬£¬Óû§ÐèÔÚ2026Äê6ÔÂ9ÈÕǰע²á¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÎÞÈκÎÍøÂç·¸·¨×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/
6. FBI¾¯Ê¾¹ÙԱð³ä´¹ÂÚ¹¥»÷£¬£¬£¬£¬ÍÁµØÔÊÐíÉêÇëÕß³ÉÄ¿µÄ
3ÔÂ9ÈÕ£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾Ö£¨FBI£©¿ËÈÕÐû²¼¹«¹²Ð§ÀÍͨ¸æ£¬£¬£¬£¬½ÒÆÆ·¸·¨·Ö×ÓÕýͨ¹ýð³äÊÐÏØÍýÏëºÍ·ÖÇøÎ¯Ô±»á¹ÙԱʵÑéÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬Ä¿µÄËø¶¨ÉêÇëÍÁµØÊ¹ÓÃÔÊÐíÖ¤µÄÆóÒµ¼°Ð¡ÎÒ˽¼Ò¡£¡£¡£¹¥»÷ÕßʹÓùûÕæÇþµÀ»ñÈ¡µÄÊܺ¦ÕßÔÊÐíÖ¤ÐÅÏ¢¡¢·ÖÇøÉêÇë±àºÅ»ò·¿²úµØµãµÈϸ½Ú£¬£¬£¬£¬Î±ÔìÕýµ±ÓʼþÓÕµ¼Êܺ¦ÕßÖ§¸¶¡°ÔÊÐíÖ¤Ïà¹ØÓöȡ±£¬£¬£¬£¬²¢ÒªÇóͨ¹ýµç»ã¡¢µã¶ÔµãÖ§¸¶»ò¼ÓÃÜÇ®±ÒÍê³ÉÉúÒ⣬£¬£¬£¬ÒÔ´ËʵÑéڲơ£¡£¡£FBIÖ¸³ö£¬£¬£¬£¬´ËÀàȦÌ×±£´æ¶àÖØ¿Éʶ±ðÌØÕ÷£ºÓʼþͨ³£À´×Ô·ÇÕþ¸®ÓòÃû£¬£¬£¬£¬¸½¼þÒªÇóÊÕ¼þÈËͨ¹ýÓʼþË÷È¡¸ü¶àϸ½Ú£¬£¬£¬£¬ÇÒ³£Åãͬ¡°¼ÓËÙ¸¶¿îÒÔ×èÖ¹ÔÊÐíÖ¤ÑÓÎ󡱵ȱ޲ßÕ½ÂÔ¡£¡£¡£Õ©Æ·Ö×Ó»¹»á¿ÌÒâÑ¡ÔñÓë¹Ù·½Ðû²¼·ÖÇøÔÊÐíÏêÇé֪ͨµÄʱ¼äͬ²½·¢ËÍ´¹ÂÚÐÅÏ¢£¬£¬£¬£¬ÔöÇ¿ÓÕÆÐÔ¡£¡£¡£ÎªÌá·À´ËÀ๥»÷£¬£¬£¬£¬Ö´·¨»ú¹¹½¨ÒéÆóÒµºÍСÎÒ˽¼ÒÑÏ¿áºË²é¡°¹Ù·½¡±ÐÅÏ¢µÄÕýµ±ÐÔ£¬£¬£¬£¬Í¨¹ýÑéÖ¤ÓòÃû¡¢µç×ÓÓʼþµØµã£¬£¬£¬£¬²¢Ö±½ÓÖµçÊÐÏØÕþ¸®È·ÈÏδ½ÉÓöȡ£¡£¡£
https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/


¾©¹«Íø°²±¸11010802024551ºÅ