StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
Ðû²¼Ê±¼ä 2026-03-121. StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
3ÔÂ11ÈÕ£¬£¬£¬£¬²Æ²ú500ǿҽÁƿƼ¼ÆóÒµStrykerÔâÓöÓëÒÁÀÊÇ鱨²¿·ÖÏà¹ØµÄÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯HandalaÌᳫµÄɱ¾øÐÔÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þÇÔÈ¡50TBÒªº¦Êý¾Ý²¢É¨³ýÈ«Çò20ÓàÍǫ̀ϵͳ¡¢Ð§ÀÍÆ÷¼°Òƶ¯×°±¸Êý¾Ý£¬£¬£¬£¬µ¼ÖÂStrykerÔÚ79¸ö¹ú¼ÒµÄ·ÖÖ§»ú¹¹±»ÆÈ¹Ø±Õ£¬£¬£¬£¬Òý·¢¹«Ë¾½¨ÉèÒÔÀ´×îÑÏÖØÎ£»£»£»£»£»ú¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ôì³ÉStrykerÈ«Çò΢ÈíÇéÐÎÖÜÈ«ÖÐÖ¹£¬£¬£¬£¬Ô±¹¤Windows×°±¸¼°Òƶ¯ÖÕ¶ËÔÚÈý¸üÔâÔ¶³ÌÊý¾Ý²Á³ý¡£¡£¡£¡£¡£¡£¡£¾ÝÔ±¹¤Í¸Â¶£¬£¬£¬£¬²¿·ÖʹÓÃСÎÒ˽¼ÒÊÖ»ú×¢²áÊÂÇéȨÏÞµÄ×°±¸Í¬ÑùɥʧÊý¾Ý£¬£¬£¬£¬¹«Ë¾±»ÆÈÒªÇóÔ±¹¤Ð¶ÔØIntune¡¢TeamsµÈÖÎÀíÓ¦Óü°VPN¿Í»§¶Ë¡£¡£¡£¡£¡£¡£¡£¶àµØ°ì¹«ÊÒÒòϵͳ̱»¾»Ö¸´¡°Ö½±Ê¡±²Ù×÷ģʽ£¬£¬£¬£¬ÄÚ²¿Ð§ÀÍ»á¼ûÖÐÖ¹Ó°ÏìÒ»Ñùƽ³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£Handala×éÖ¯½¨ÉèÓÚ2023Äê12Ô£¬£¬£¬£¬ÓëÒÁÀÊÇ鱨Çå¾²²¿£¨MOIS£©±£´æ¹ØÁª£¬£¬£¬£¬´ËǰÒÔÕë¶ÔÒÔÉ«ÁÐ×éÖ¯¼°Ê¹ÓÃÆÆËðÐÔ¶ñÒâÈí¼þ²Á³ý×°±¸ÖøÃû¡£¡£¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ý¸Ä¶¯StrykerµÄEntraµÇÂ¼Ò³ÃæÕ¹Ê¾Æä±ê¼Ç£¬£¬£¬£¬²¢ÔÚÊý¾Ýй¶ÃÅ»§Ðû²¼Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/
2. WordPress²å¼þAllyÎó²îÖ³¬25ÍòÍøÕ¾ÃæÁÙΣº¦
3ÔÂ11ÈÕ£¬£¬£¬£¬AllyÊÇElementor¿ª·¢µÄWordPress¿É»á¼ûÐÔ²å¼þ£¬£¬£¬£¬×°ÖÃÁ¿³¬40Íò´Î£¬£¬£¬£¬Òò±£´æ±àºÅΪCVE-2026-2313µÄ¸ßΣSQL×¢ÈëÎó²îÒý·¢Çå¾²¾¯Ê¾¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉAcquia¹¥»÷ÐÔÇå¾²¹¤³ÌʦDrew Webber£¨mcdruid£©·¢Ã÷£¬£¬£¬£¬ÆäÑÏÖØÐÔÆÀ·Ö¼«¸ß£¬£¬£¬£¬Ô´ÓÚ²å¼þ4.0.3¼°¸üÔç°æ±¾ÖÐget_global_remediations()ÒªÁì¶ÔÓû§ÌṩµÄURL²ÎÊý´¦Öóͷ£²»µ±£¬£¬£¬£¬Î´¶ÔSQLÉÏÏÂÎľÙÐгä·ÖÕûÀí£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿Éͨ¹ýURL·¾¶×¢ÈëSQLÅÌÎÊ¡£¡£¡£¡£¡£¡£¡£WordFenceÊÖÒÕÆÊÎöÖ¸³ö£¬£¬£¬£¬Ö»¹Üesc_url_raw()º¯ÊýÓÃÓÚURLÇå¾²´¦Öóͷ££¬£¬£¬£¬µ«ÎÞ·¨×èÖ¹SQLÔª×Ö·û£¨Èçµ¥ÒýºÅ¡¢À¨ºÅ£©µÄ×¢È룬£¬£¬£¬Ê¹Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»¸½¼ÓÌØÊâSQLÅÌÎÊ£¬£¬£¬£¬Ê¹ÓûùÓÚʱ¼äµÄäעÊÖÒÕ´ÓÊý¾Ý¿âÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬Îó²îʹÓÃÐèÖª×ã²å¼þÅþÁ¬ElementorÕË»§ÇÒÐÞ¸´Ä£¿£¿£¿é´¦Óڻ״̬µÄÌõ¼þ¡£¡£¡£¡£¡£¡£¡£ElementorÓÚ2ÔÂ23ÈÕÐû²¼4.1.0°æ±¾ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬²¢ÏòÑо¿Ö°Ô±½ÒÏþ800ÃÀÔªÎó²îÉͽ𡣡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬WordPress.orgÊý¾ÝÏÔʾ£¬£¬£¬£¬½öÔ¼36%µÄAllyÓû§Íê³ÉÉý¼¶£¬£¬£¬£¬ÈÔÓг¬25ÍòÍøÕ¾Ì»Â¶ÔÚCVE-2026-2313Σº¦ÖС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/
3. CISA½ôÆÈÒªÇóÕþ¸®»ú¹¹ÐÞ²¹n8n¸ßΣÎó²î
3ÔÂ11ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ç¿ÖÆÒªÇóÁª°î»ú¹¹ÔÚ3ÔÂ25ÈÕǰÐÞ²¹n8nƽ̨±£´æµÄCVE-2025-68613Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬¸ÃÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£n8n×÷Ϊ¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨£¬£¬£¬£¬ÔÚAI¿ª·¢ÖÐÆÕ±éÓÃÓÚÊý¾ÝÉãÈ¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬£¬Docker HubÀÈ¡Á¿³¬1ÒڴΣ¬£¬£¬£¬³£´æ´¢APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬³ÉΪ¹¥»÷ÕßÖØµãÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£CVE-2025-68613Ô´ÓÚn8nÊÂÇéÁ÷±í´ïʽÆÀ¹Àϵͳ¶Ô¶¯Ì¬´úÂë×ÊÔ´¿ØÖƲ»µ±£¬£¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷ÕßÒÔn8nÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£n8nÍŶÓ12ÔÂÐû²¼µÄv1.122.0°æ±¾ÒÑÐÞ¸´´ËÎó²î£¬£¬£¬£¬²¢½¨ÒéÖÎÀíÔ±Á¬Ã¦Éý¼¶¡£¡£¡£¡£¡£¡£¡£ÔÝʱ»º½â²½·¥°üÀ¨ÏÞÖÆÊÂÇéÁ÷±à¼È¨ÏÞÖÁÍêÈ«ÐÅÈÎÓû§¡¢½µµÍ²Ù×÷ϵͳȨÏÞ¼°ÍøÂç»á¼ûÏÞÖÆ¡£¡£¡£¡£¡£¡£¡£Shadowserver¼à²â·¢Ã÷£¬£¬£¬£¬È«Çò³¬4Íò¸öδ´ò²¹¶¡µÄn8nʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬ÆäÖб±ÃÀÕ¼18,000Óà¸ö£¬£¬£¬£¬Å·ÖÞ³¬14,000¸ö¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/
4. ±´¶û¾È»¤³µ¹«Ë¾23.8ÍòÈËÊý¾Ýй¶
3ÔÂ11ÈÕ£¬£¬£¬£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ¾È»¤³µÐ§ÀÍÌṩÉ̱´¶û¾È»¤³µ¹«Ë¾¿ËÈÕÅû¶£¬£¬£¬£¬Æä2025Äê2Ô±¬·¢µÄÍøÂçÈëÇÖÊÂÎñµ¼Ö½ü23.8ÍòÈËСÎÒ˽¼Ò¡¢²ÆÎñ¼°Ò½ÁÆ¿µ½¡ÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎļþ£¬£¬£¬£¬ºÚ¿ÍÓÚ2025Äê2ÔÂ7ÈÕÖÁ14ÈÕʱ´úÈëÇָù«Ë¾ÍøÂ磬£¬£¬£¬±´¶û¹«Ë¾ÓÚ2ÔÂ13ÈÕÊ״μì²âµ½Òì³££¬£¬£¬£¬µ«Ö±ÖÁ4ÔÂ14ÈղŶÔÍâÐû²¼ÊÂÎñ£¬£¬£¬£¬Ô¼Ò»¸öÔº󣬣¬£¬£¬MedusaÀÕË÷Èí¼þÍÅ»ïÉù³Æ´Ó±´¶û¹«Ë¾ÇÔÈ¡219.50GBÊý¾Ý£¬£¬£¬£¬²¢¹ûÕæ²¿·Ö±»µÁÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢¹æÄ£ÆÕ±é£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂ룬£¬£¬£¬ÒÔ¼°²ÆÎñÕË»§¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£±´¶û¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ÊÂÎñÊÓ²ìÒÑÓÚ2026Äê2ÔÂ20ÈÕÍê³É£¬£¬£¬£¬È·ÈÏÊý¾Ýй¶¹æÄ£Ô¶³¬×î³õÅû¶µÄ11.4ÍòÈË£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý´ï237,830ÈË¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»£»ú£¬£¬£¬£¬±´¶û¹«Ë¾½ÓÄÉÁ˶àÏîµ÷½â²½·¥£ºÖÜÈ«ÔöÇ¿ÍøÂçÇå¾²·À»¤¡¢Ç¿ÖÆÖØÖÃËùÓÐÕË»§ÃÜÂ룬£¬£¬£¬²¢ÎªÊÜÓ°Ïì¸öÌåÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬Í¬Ê±ÌáÐÑÓû§Ð¡ÐÄDZÔÚڲƼ°Éí·Ý͵ÇÔΣº¦¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/
5. ¶íAPT28°²ÅŶ¨ÖƶñÒâÈí¼þºã¾Ã¼àÊÓÎÚ¾ü·½
3ÔÂ10ÈÕ£¬£¬£¬£¬¾ÝESET×îб¨¸æ£¬£¬£¬£¬Á¥ÊôÓÚ¶íÂÞ˹Áª°î¾üÊÂÇ鱨×ܾ֣¨GRU£©µÚ26165²½¶ÓµÄ¹ú¼Ò¼¶ºÚ¿Í×éÖ¯APT28£¨ÓÖÃû°üÀ¨Fancy Bear¡¢SednitµÈ£©×Ô2024Äê4ÔÂÆð£¬£¬£¬£¬Ê¹ÓÃÈý¿î¶¨ÖƶñÒâÈí¼þBEARDSHELL¡¢COVENANT¼°SLIMAGENT£¬£¬£¬£¬¶ÔÎÚ¿ËÀ¼¾ü·½Ö°Ô±¿ªÕ¹ºã¾Ã¼àÊӻ¡£¡£¡£¡£¡£¡£¡£SLIMAGENT×÷Ϊ½¹µãÌØ¹¤¹¤¾ß£¬£¬£¬£¬¿É¼Í¼¼üÅÌÊäÈë¡¢²¶»ñÆÁÄ»½ØÍ¼²¢ÍøÂç¼ôÌù°åÊý¾Ý£¬£¬£¬£¬ÆäÆðÔ´¿É×·ËÝÖÁAPT28ÔÚ2010ÄêÔÂʹÓõÄXAgentÖ²Èë³ÌÐò¡£¡£¡£¡£¡£¡£¡£BEARDSHELLºóÃųÌÐòͨ¹ýÕýµ±Ôƴ洢ЧÀÍIcedrive½¨ÉèÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨µÀ£¬£¬£¬£¬Ö´ÐÐPowerShellÏÂÁî¡£¡£¡£¡£¡£¡£¡£Æä½ÓÄÉÆæÒìµÄ¡°²»Í¸Ã÷ν´Ê¡±»ìÏýÊÖÒÕ£¬£¬£¬£¬¸ÃÊÖÒÕͬÑù·ºÆðÔÚAPT28ÓÚ2016Äê¹¥»÷ÃÀ¹úÃñÖ÷µ³ÌìÏÂίԱ»á£¨DNC£©Ê±Ê¹ÓõÄXTunnelËíµÀ¹¤¾ßÖС£¡£¡£¡£¡£¡£¡£COVENANT×÷Ϊ¿ªÔ´.NETºóÉøÍ¸¿ò¼Ü£¬£¬£¬£¬¾Éî¶ÈÐ޸ĺó×Ô2025Äê7ÔÂÆð½ÓÄÉ»ùÓÚÔÆµÄÐÂÍøÂçÐÒ飬£¬£¬£¬ÀÄÓÃFilenÔÆ´æ´¢Ð§À;ÙÐÐC2ͨѶ¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬¸Ã¿ò¼Ü±äÌåÔøÊ¹ÓÃpCloud£¨2023Ä꣩¡¢Koofr£¨2024-2025Ä꣩¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
6. UNC6426ʹÓù©Ó¦Á´¹¥»÷72СʱÍêÈ«ÈëÇÖÔÆÇéÐÎ
3ÔÂ11ÈÕ£¬£¬£¬£¬nx npm°ü¹©Ó¦Á´2025Äê8ÔÂÔâÆÆËðºó£¬£¬£¬£¬ÍþвÐÐΪÕßUNC6426ʹÓÃÇÔÈ¡µÄGitHubÁîÅÆ£¬£¬£¬£¬ÔÚ72СʱÄÚÍê³É¶ÔÊܺ¦ÕßÔÆÇéÐεÄÍêÈ«ÈëÇÖ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹©Ó¦Á´¹¥»÷Ô´ÓÚnx npm°üÒ×Êܹ¥»÷µÄpull_request_targetÊÂÇéÁ÷±»Ê¹Ó㬣¬£¬£¬¹¥»÷Õßͨ¹ý¡°Pwn Request¡±¹¥»÷»ñÈ¡ÌáÉýȨÏÞ²¢»á¼ûGITHUB_TOKEN£¬£¬£¬£¬½«Ä¾Âí»¯°üÍÆË͵½npm×¢²á±í¡£¡£¡£¡£¡£¡£¡£Ä¾Âí°ü°üÀ¨QUIETVAULTƾ֤ÇÔÈ¡³ÌÐò£¬£¬£¬£¬Í¨¹ýLLM¹¤¾ßɨÃèϵͳÃô¸ÐÐÅÏ¢£¬£¬£¬£¬Êý¾Ý±»ÉÏ´«ÖÁ¹«¹²GitHub´æ´¢¿â¡£¡£¡£¡£¡£¡£¡£Êܺ¦ÕßÔ±¹¤ÔËÐÐNx Console²å¼þʱ´¥·¢¸üУ¬£¬£¬£¬µ¼ÖÂQUIETVAULTÖ´ÐС£¡£¡£¡£¡£¡£¡£UNC6426ʹÓñ»µÁPAT£¬£¬£¬£¬Í¨¹ýNord Stream¹¤¾ß´ÓCI/CDÇéÐÎÌáÈ¡ÉñÃØ£¬£¬£¬£¬Ð¹Â¶GitHubЧÀÍÕË»§Æ¾Ö¤ºó£¬£¬£¬£¬Ê¹Óá°--aws-role¡±²ÎÊýÌìÉúÔÝʱAWS STSÁîÅÆ£¬£¬£¬£¬ÔÚAWSÇéÐÎפ×ã¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚGitHub Actions CloudFormation½ÇɫȨÏÞ¹ý¸ß£¬£¬£¬£¬¹¥»÷Õß°²ÅÅÐÂAWS Stack£¬£¬£¬£¬¸½¼ÓAdministratorAccessÕ½ÂÔ£¬£¬£¬£¬72СʱÄÚ½«È¨ÏÞÌáÉýÖÁÍêÕûÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬¹¥»÷Õßö¾ÙS3´æ´¢Í°¹¤¾ß¡¢ÖÕÖ¹Éú²úÇéÐÎEC2ºÍRDSʵÀý¡¢½âÃÜÓ¦ÓÃÃÜÔ¿£¬£¬£¬£¬²¢½«ËùÓÐÄÚ²¿GitHub´úÂë¿âÖØÃüÃûΪ¡°/s1ngularity-repository-[Ëæ»ú×Ö·û]¡±²¢¹ûÕæ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html


¾©¹«Íø°²±¸11010802024551ºÅ