GPUBreach¹¥»÷ʹÓÃGPUÄÚ´æÎó²îʵÏÖϵͳ½ÓÊÜ

Ðû²¼Ê±¼ä 2026-04-07

1. GPUBreach¹¥»÷ʹÓÃGPUÄÚ´æÎó²îʵÏÖϵͳ½ÓÊÜ


4ÔÂ6ÈÕ£¬£¬£¬£¬£¬¶àÂ×¶à´óѧÑо¿ÍŶӿª·¢³öÒ»ÖÖÃûΪGPUBreachµÄÐÂÐ͹¥»÷·½·¨£¬£¬£¬£¬£¬¸Ã¹¥»÷Äܹ»ÓÕ·¢GPU GDDR6ÄÚ´æÉϵÄRowhammerλ·­×ª£¬£¬£¬£¬£¬½ø¶øÊµÏÖȨÏÞÌáÉý²¢µ¼ÖÂϵͳÍêÈ«±»¹¥ÆÆ¡£¡£¡£¡£ÕâÏîÑо¿µÄÍêÕûϸ½Ú½«ÓÚ4ÔÂ13ÈÕÔڰ¿ËÀ¼¾ÙÐеÄIEEEÇå¾²ÓëÒþ˽×êÑлáÉÏÕýʽÐû²¼¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬£¬RowhammerÒýÆðµÄGDDR6λ·­×ª»áÆÆËðGPUÒ³±í£¬£¬£¬£¬£¬ÔÊÐí·ÇÌØÈ¨CUDAÄں˶Ôí§ÒâGPUÄÚ´æ¾ÙÐжÁд»á¼û¡£¡£¡£¡£¹¥»÷ÕßËæºó¿ÉʹÓÃNVIDIAÇý¶¯³ÌÐòÖеÄÄÚ´æÇå¾²Îó²î£¬£¬£¬£¬£¬½«´Ë¹¥»÷ÓëCPU¶ËµÄȨÏÞÌáÉýÏàÅþÁ¬£¬£¬£¬£¬£¬´Ó¶øÔÚÎÞÐè½ûÓÃÊäÈëÊä³öÄÚ´æÖÎÀíµ¥Î»±£»£»£»£»¤µÄÇéÐÎÏÂʵÏÖϵͳÍêÈ«±»¹¥ÆÆ¡£¡£¡£¡£IOMMUÊÇÒ»ÖÖÓÃÓÚ±ÜÃâÖ±½ÓÄÚ´æ¹¥»÷µÄÓ²¼þµ¥Î»£¬£¬£¬£¬£¬Ëüͨ¹ýÖÎÀíÿ¸ö×°±¸¿É»á¼ûµÄÄÚ´æÇøÓòÀ´¿ØÖƺÍÏÞ֯װ±¸¶ÔÄÚ´æµÄ»á¼û·½·¨¡£¡£¡£¡£Ö»¹ÜIOMMUÊǵÖÓù´ó´ó¶¼Ö±½ÓÄÚ´æ»á¼û¹¥»÷µÄÓÐÓò½·¥£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±Ã÷È·Ö¸³öËüÎÞ·¨×èÖ¹GPUBreach¹¥»÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬GPUBreachÅú×¢GPU Rowhammer¹¥»÷²»µ«¿ÉÔì³ÉÊý¾ÝË𻵣¬£¬£¬£¬£¬»¹ÄÜʵÏÖÕæÕýµÄȨÏÞÌáÉý£¬£¬£¬£¬£¬ÕâÊÇÏÖÔÚÆäËû¹¥»÷·½·¨Ëù²»¾ß±¸µÄÄÜÁ¦£¬£¬£¬£¬£¬Ê¹µÃGPUBreach³ÉΪһÖÖ¸üǿʢµÄÍþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/


2. ¶íÂÞ˹´ó¹æÄ£ÒøÐÐϵͳ̱»¾£¬£¬£¬£¬£¬·â±ÕVPNÒÉΪµ¼»ðË÷


4ÔÂ6ÈÕ£¬£¬£¬£¬£¬ÉÏÖÜÎ壬£¬£¬£¬£¬¶íÂÞ˹±¬·¢Ò»ÆðÖØ´óÍøÂç¹ÊÕÏ£¬£¬£¬£¬£¬µ¼ÖÂĪ˹¿ÆµÈ¶à¸öµØÇøµÄÒøÐÐÓ¦ÓóÌÐòºÍÖ§¸¶ÏµÍ³Ì±»¾ÊýСʱ£¬£¬£¬£¬£¬Óû§ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶¡¢È¡¿î»ò»á¼ûÊÖ»úÒøÐÐЧÀÍ¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°üÀ¨¶íÂÞ˹Áª°î´¢±¸ÒøÐС¢¶íÂÞ˹ÍâÃ³ÒøÐС¢°¢¶û·¨ÒøÐС¢TÒøÐкͶíÂÞ˹×ÔÈ»Æø¹¤ÒµÒøÐеȸùú×î´óÒøÐС£¡£¡£¡£¹ÊÕÏ»¹²¨¼°×Ô¶¯È¡¿î»úºÍ¹«¹²½»Í¨ÏµÍ³£¬£¬£¬£¬£¬ÄªË¹¿ÆµØÌúºÍ³Ç½¼ÁгµÕ¢»ú×èÖ¹½ÓÊÜÒøÐп¨Ö§¸¶£¬£¬£¬£¬£¬ÊÂÇéÖ°Ô±±»ÆÈÔÊÐíÂÿÍÃâ·ÑͨÐÐÒÔ±ÜÃâÓµ¼·¡£¡£¡£¡£´Ë´ÎÖÐÖ¹¼òÖ±ÇÐÔµ¹ÊÔ­ÓÉÉв»Ã÷È·¡£¡£¡£¡£×î³õÓÐýÌåÍÆ²âÓëÕþ¸®ÊÔͼ·â±ÕÒøÐлù´¡ÉèʩʹÓõÄIPµØµãÓйØ£¬£¬£¬£¬£¬µ«µ½ÖÜÒ»£¬£¬£¬£¬£¬Ïà¹Ø±¨µÀ´ó¶à±»É¾³ý¡£¡£¡£¡£¶íÂÞ˹×ÔÁ¦Ã½Ì屨µÀ³Æ£¬£¬£¬£¬£¬»¥ÁªÍøî¿Ïµ»ú¹¹RoskomnadzorÒªÇóýÌåɾ³ý½«ÒøÐÐÖÐÖ¹Óë·â±ÕÐж¯ÁªÏµÆðÀ´µÄÄÚÈÝ¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùʵÑéÊÒÁªºÏÊ×´´ÈËÄÈËþÀòÑÇ¡¤¿¨Ë¹çê˹¿¨æ«ÔÚTelegramÉÏÌåÏÖ£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚRoskomnadzorÊÔͼ·â±ÕVPNЧÀÍ¡£¡£¡£¡£


https://therecord.media/outage-hits-russian-banking-apps


3. ¶íÓïÀÕË÷ÍÅ»ï÷è÷ë¹¥»÷µÂ¹ú×óÒíµ³Ë÷ÒªÊê½ð


4ÔÂ6ÈÕ£¬£¬£¬£¬£¬ÉÏÖÜ£¬£¬£¬£¬£¬Ò»¸ö½²¶íÓïµÄÀÕË÷Èí¼þ×éÖ¯÷è÷ëÉù³Æ¶ÔµÂ¹úÃñÖ÷Éç»áÖ÷ÒåÕþµ³×óÒíµ³µÄÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢½«¸Ãµ³ÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬£¬ÍþвÈô²»Ö§¸¶Êê½ð½«Ðû²¼±»µÁÊý¾Ý¡£¡£¡£¡£÷è÷ë×Ô2022ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬´ËÇ°ÔøÒÔÅ·ÖÞ¡¢ÑÇÖÞºÍÃÀ¹úµÄÒ½Ôº¡¢Õþ¸®»ú¹¹ºÍ˽Ӫ¹«Ë¾Îª¹¥»÷Ä¿µÄ¡£¡£¡£¡£3ÔÂÏÂÑ®£¬£¬£¬£¬£¬×óÒíµ³Ö¤ÊµÆäIT»ù´¡ÉèÊ©ÔâÊÜÁËÒ»´Î¡°ÑÏÖØµÄÍøÂç¹¥»÷¡±£¬£¬£¬£¬£¬²¢ÌåÏÖÊÕµ½µÄÐÅÏ¢Åú×¢÷è÷ëºÚ¿Í×éÖ¯¿ÉÄÜÊÇÄ»ºóºÚÊÖ¡£¡£¡£¡£¸Ãµ³ÔÚÒ»·ÝÉùÃ÷ÖÐÖ¸³ö£º¡°´ËÀàÊý×Ö¹¥»÷£¬£¬£¬£¬£¬ÌØÊâÊÇÀÕË÷Èí¼þµÄʹÓ㬣¬£¬£¬£¬Í¨³£ÊÇ»ìÏýÕ½ÕùµÄÒ»²¿·Ö£¬£¬£¬£¬£¬Ò²ÊǶÔÒªº¦»ù´¡ÉèÊ©µÄ¹¥»÷¡£¡£¡£¡£¡±ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬×óÒíµ³ÔÝʱ¹Ø±ÕÁ˲¿·ÖITϵͳÒÔïÔÌ­Ëðʧ£¬£¬£¬£¬£¬²¢ÏòµÂ¹úÕþ¸®ÌáÆðÐÌÊÂËßËÏ¡£¡£¡£¡£¸Ãµ³ÖÒÑԳƣ¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜÊÔͼй¶Æä×ܲ¿ÄÚ²¿×éÖ¯Êý¾ÝºÍÔ±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬µ«ÌåÏÖÎÞ·¨ÆÀ¹À´ËÊÂÊÇ·ñ»áÔÚ¶àºéÁ÷ƽÉÏÀֳɻòÒѾ­±¬·¢£¬£¬£¬£¬£¬Í¬Ê±Ôö²¹Æä³ÉÔ±Êý¾Ý¿âδÊÜÓ°Ïì¡£¡£¡£¡£×óÒíµ³³Æ´Ë´ÎÏ®»÷ÊÇÖ¼ÔÚÆÆËðÃñÖ÷ÖÆ¶ÈµÄ¸üÆÕ±éÐж¯µÄÒ»²¿·Ö£¬£¬£¬£¬£¬ÉùÃ÷ÌåÏÖ¡°´ËÀ๥»÷Ö¼ÔÚÏ÷ÈõÃñÖ÷ÌåÖÆ¼°Æä¼ÓÈëÕß¡£¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬£¬ÒÔÃñÖ÷µ³ÎªÄ¿µÄËÆºõ²¢·ÇÇɺÏ¡£¡£¡£¡£¡±¸Ãµ³Ã»ÓÐ˵Ã÷ÊÇ·ñÕýÔÚÓëÏ®»÷Õß̸ÅУ¬£¬£¬£¬£¬Ò²Î´Ë¼Á¿Ö§¸¶Êê½ð¡£¡£¡£¡£


https://therecord.media/hackers-threaten-to-leak-german-political-party-data


4. СÐÄÐÂÐÍ·¨ÔºÕ©Æ­¶ÌÐÅ£¬£¬£¬£¬£¬¶þάÂëÇÔȡСÎÒ˽¼ÒÐÅÏ¢


4ÔÂ5ÈÕ£¬£¬£¬£¬£¬Õ©Æ­·Ö×Ó½üÆÚð³äÃÀ¹ú¸÷µØÖÝ·¨Ôº£¬£¬£¬£¬£¬·¢ËÍÐéαµÄ¡°Î¥Ô¼Í¨Öª¡±½»Í¨Î¥Õ¶ÌÐÅ£¬£¬£¬£¬£¬Ð²ÆÈÊÕ¼þÈËɨÃè¶þάÂë½øÈë´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬ÒªÇóÖ§¸¶6.99ÃÀÔª£¬£¬£¬£¬£¬Í¬Ê±ÇÔȡСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢¡£¡£¡£¡£ÕâÏîлʼÓÚ¼¸ÖÜǰ£¬£¬£¬£¬£¬ÓÐÈË·ÖÏíÁËÕë¶ÔŦԼסÃñµÄ¶ÌÐÅ£¬£¬£¬£¬£¬ËæºóÐí¶àÈËÔÚÍøÉϱ¨¸æÁËÕë¶Ô¼ÓÀû¸£ÄáÑÇÖÝ¡¢±±¿¨ÂÞÀ´ÄÉÖÝ¡¢ÒÁÀûŵÒÁÖÝ¡¢¸¥¼ªÄáÑÇÖÝ¡¢µÃ¿ËÈøË¹ÖÝ¡¢¿µÄùµÒ¸ñÖݺÍÐÂÔóÎ÷ÖݵÈÖݵÄÀàËÆ¶ÌÐÅ¡£¡£¡£¡£ÓëÒÔÍù°üÀ¨¶ÌÐźʹ¹ÂÚÍøÕ¾Á´½ÓµÄÕ©Æ­²î±ð£¬£¬£¬£¬£¬Ð°汾°üÀ¨Ò»ÕžݳÆÊÇ·¨ÔºÍ¨ÖªµÄͼƬ£¬£¬£¬£¬£¬ÆäÖÐǶÈëÁ˶þάÂë¡£¡£¡£¡£¶ÌÐÅÉù³ÆÀ´×Ô¡°Å¦Ô¼ÊÐÐÌÊ·¨Í¥¡±£¬£¬£¬£¬£¬ÄÚÈÝÉæ¼°Ç·½ÉÍ£³µ·Ñ»òͨÐзÑ£¬£¬£¬£¬£¬ÒªÇóÁ¬Ã¦½ÉÄɲ»È»±ØÐè³öÍ¥£¬£¬£¬£¬£¬²¢¸½ÓÐɨÃè¶þάÂëÖ§¸¶Ç·¿îµÄ˵Ã÷¡£¡£¡£¡£É¨Ãè¶þάÂëºó£¬£¬£¬£¬£¬Óû§»á±»Ö¸µ¼ÖÁÒ»ÆäÖÐÐÄÍøÕ¾£¬£¬£¬£¬£¬¸ÃÍøÕ¾Ê×ÏÈÒªÇóÍê³ÉÑéÖ¤ÂëÒÔ֤ʵÊÇÕæÈË£¬£¬£¬£¬£¬Óû§±»Öض¨Ïòµ½ÁíÒ»¸ö´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬¸ÃÍøÕ¾Ã°³äÖݳµÁ¾ÖÎÀí¾Ö»òÆäËû»ú¹¹£¬£¬£¬£¬£¬Éù³ÆÓÐδ½ÉµÄͨÐзѻòÍ£³µ·£µ¥¡£¡£¡£¡£µã»÷¡°¼ÌÐø¡±°´Å¥ºó£¬£¬£¬£¬£¬Óû§½øÈëÒ»¸öÒ³Ãæ£¬£¬£¬£¬£¬ÐèÒªÊäÈëСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨ÐÅÏ¢ÒÔÖ§¸¶ËùνÓöÈ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/


5. FortiClient EMSÐÂÎó²îÒѱ»¹¥»÷ÕßʹÓÃ


4ÔÂ5ÈÕ£¬£¬£¬£¬£¬FortinetÓÚÖÜÄ©Ðû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬ÒÔÐÞ¸´FortiClientÆóÒµÖÎÀíЧÀÍÆ÷ÖÐÒ»¸öÕýÔÚ±»¹¥»÷Õ߯ð¾¢Ê¹ÓõÄÑÏÖØÎó²î¡£¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2026-35616£¬£¬£¬£¬£¬ÊôÓÚ»á¼û¿ØÖƲ»µ±Îó²î£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýÈ«ÐĽṹµÄÇëÇóÖ´ÐдúÂë»òÏÂÁî¡£¡£¡£¡£FortinetÒÑÈ·ÈϸÃÎó²îÔÚÏÖʵӦÓÃÖб»Ê¹Ó㬣¬£¬£¬£¬²¢±Þ²ßÒ×Êܹ¥»÷µÄ¿Í»§×°ÖÃÈÈÐÞ¸´³ÌÐò¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìFortiClient EMS 7.4.5ºÍ7.4.6°æ±¾£¬£¬£¬£¬£¬¿Éͨ¹ý×°ÖöÔÓ¦µÄÈÈÐÞ¸´³ÌÐò¾ÙÐлº½â£¬£¬£¬£¬£¬Í¬Ê±½«ÔÚ¼´½«Ðû²¼µÄ7.4.7°æ±¾ÖÐÕýʽÐÞ¸´£¬£¬£¬£¬£¬¶ø7.2°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£¡£¸ÃÎó²îÓÉÍøÂçÇå¾²¹«Ë¾Defused·¢Ã÷£¬£¬£¬£¬£¬¸Ã¹«Ë¾½«ÆäÐÎòΪԤÉí·ÝÑéÖ¤API»á¼ûÈÆ¹ýÎó²î£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÍêÈ«ÈÆ¹ýÉí·ÝÑéÖ¤ºÍÊÚȨ¿ØÖÆ¡£¡£¡£¡£DefusedÔÚXƽ̨ÉÏ͸¶£¬£¬£¬£¬£¬ËûÃÇÓÚ±¾ÖÜÔçЩʱ¼ä·¢Ã÷¸ÃÎó²î±»ÓÃ×÷ÁãÈÕÎó²îʹÓ㬣¬£¬£¬£¬²¢Æ¾Ö¤ÈÏÕæÈεÄÅû¶ԭÔòÏòFortinet¾ÙÐÐÁ˱¨¸æ¡£¡£¡£¡£»£»£»£»¥ÁªÍøÇå¾²î¿Ïµ»ú¹¹ShadowserverÔÚÍøÉÏ·¢Ã÷ÁËÁè¼Ý2000¸ö̻¶µÄFortiClient EMSʵÀý£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚÃÀ¹úºÍµÂ¹ú£¬£¬£¬£¬£¬ÕâÒâζ×Å´ó×Ú»ú¹¹¿ÉÄÜÃæÁÙDZÔÚÍþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/


6. LinkedInÉñÃØÉ¨ÃèÓû§ä¯ÀÀÆ÷À©Õ¹


4ÔÂ3ÈÕ£¬£¬£¬£¬£¬Ò»·ÝÃûΪ¡°ä¯ÀÀÆ÷ÃÅ¡±µÄб¨¸æÖÒÑԳƣ¬£¬£¬£¬£¬Î¢ÈíÆìϵÄÁìÓ¢ÔÚÆäÍøÕ¾ÉÏʹÓÃÒþ²ØµÄJavaScript¾ç±¾É¨Ãè»á¼ûÕßµÄä¯ÀÀÆ÷£¬£¬£¬£¬£¬²éÕÒÒÑ×°ÖõÄÀ©Õ¹³ÌÐò²¢ÍøÂç×°±¸Êý¾Ý¡£¡£¡£¡£¾Ý×Ô³ÆLinkedInÉÌÒµÓû§Ð­»áµÄFairlinked eV±¨¸æÏÔʾ£¬£¬£¬£¬£¬¸Ãƽ̨½«JavaScript×¢ÈëÓû§»á»°£¬£¬£¬£¬£¬¼ì²éÊýǧ¸öä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬£¬£¬£¬£¬²¢½«Ð§¹ûÓë¿Éʶ±ðµÄÓû§Ð¡ÎÒ˽¼Ò×ÊÁϹØÁªÆðÀ´¡£¡£¡£¡£±¨¸æ×÷ÕßÉù³Æ£¬£¬£¬£¬£¬ÕâÖÖÐÐΪ±»ÓÃÀ´ÍøÂçÃô¸ÐµÄСÎÒ˽¼ÒºÍ¹«Ë¾ÐÅÏ¢£¬£¬£¬£¬£¬ÓÉÓÚLinkedInÕÊ»§ÓëÕæÊµÉí·Ý¡¢¹ÍÖ÷ºÍְλϸÃܰ󶨡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬LinkedIn»áɨÃèÁè¼Ý200ÖÖÓëÆäÏúÊÛ¹¤¾ßÖ±½Ó¾ºÕùµÄ²úÆ·£¬£¬£¬£¬£¬°üÀ¨Apollo¡¢LushaºÍZoomInfo¡£¡£¡£¡£ÓÉÓÚLinkedInÖªµÀÿ¸öÓû§µÄ¹ÍÖ÷£¬£¬£¬£¬£¬Ëü¿ÉÒÔ×·×ÙÄÄЩ¹«Ë¾Ê¹ÓÃÄÄЩ¾ºÕùµÐÊֵIJúÆ·£¬£¬£¬£¬£¬ÔÚÓû§²»ÖªÇéµÄÇéÐÎÏÂÌáÈ¡Êýǧ¼ÒÈí¼þ¹«Ë¾µÄ¿Í»§Ãûµ¥£¬£¬£¬£¬£¬²¢Ê¹Ó÷¢Ã÷µÄÐÅÏ¢ÏòµÚÈý·½¹¤¾ßÓû§·¢³öÇ¿ÖÆÖ´ÐÐÍþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/