KyberÀÕË÷Èí¼þ˫ƽ̨¹¥»÷£¬£¬£¬ºÅ³ÆºóÁ¿×Ó¼ÓÃÜ
Ðû²¼Ê±¼ä 2026-04-231. KyberÀÕË÷Èí¼þ˫ƽ̨¹¥»÷£¬£¬£¬ºÅ³ÆºóÁ¿×Ó¼ÓÃÜ
4ÔÂ22ÈÕ£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Rapid7ÔÚ2026Äê3ÔµÄÒ»´ÎÇå¾²ÊÂÎñÏìÓ¦ÖУ¬£¬£¬·¢Ã÷²¢ÆÊÎöÁËÒ»ÖÖÃûΪKyberµÄÐÂÐÍÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þͬʱ¾ß±¸Õë¶ÔWindowsϵͳºÍVMware ESXiÐéÄ⻯ƽ̨µÄÁ½¸ö²î±ð±äÖÖ£¬£¬£¬ÇÒÓÉͳһ¸öÀÕË÷Èí¼þ¹ØÁª×éÖ¯°²ÅÅÔÚÍ³Ò»ÍøÂçÖУ¬£¬£¬Òâͼͨ¹ýͬ²½¼ÓÃÜËùÓÐЧÀÍÆ÷ÒÔ×î´ó»¯ÆÆËðЧ¹û¡£¡£¡£¡£¡£¡£Á½¸ö±äÖÖ¹²ÏíÏàͬµÄ»î¶¯IDºÍ»ùÓÚTorµÄÀÕË÷»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬ESXi±äÖÖרÃÅÕë¶ÔVMwareÇéÐι¹½¨£¬£¬£¬Äܹ»Ã¶¾ÙËùÓÐÐéÄâ»ú¡¢¼ÓÃÜÊý¾Ý´æ´¢Îļþ£¬£¬£¬²¢ÓÃÀÕË÷ÐŸĶ¯ESXiÖÎÀí½çÃæ£¬£¬£¬Ö¸µ¼Êܺ¦ÕßÍê³ÉÊê½ðÖ§¸¶Á÷³Ì¡£¡£¡£¡£¡£¡£¸Ã±äÖÖÉù³Æ½ÓÄÉÁËKyber1024ºóÁ¿×Ó¼ÓÃÜÊÖÒÕ£¬£¬£¬µ«Rapid7ÆÊÎö·¢Ã÷Õâһ˵·¨²¢²»Êôʵ£¬£¬£¬ESXi±äÖÖÏÖʵʹÓÃChaCha8¾ÙÐÐÎļþ¼ÓÃÜ£¬£¬£¬²¢Ê¹ÓÃRSA-4096¾ÙÐÐÃÜÔ¿·â×°¡£¡£¡£¡£¡£¡£Ïà±È֮ϣ¬£¬£¬Windows±äÖÖÓÃRust±àд£¬£¬£¬ÊÖÒÕʵÏÖ¸üΪ³ÉÊì¡£¡£¡£¡£¡£¡£ËüȷʵʵÏÖÁËKyber1024ºÍX25519ÃÜÔ¿±£»£»£»£»£»£»¤»úÖÆ£¬£¬£¬ÓëÀÕË÷ÐÅÖеÄÉùÃ÷Ò»Ö¡£¡£¡£¡£¡£¡£Ïêϸ¶øÑÔ£¬£¬£¬Kyber1024ÓÃÓÚ±£»£»£»£»£»£»¤¶Ô³ÆÃÜÔ¿ÖÊÁÏ£¬£¬£¬¶øAES-CTRÔòÈÏÕæÅúÁ¿Êý¾Ý¼ÓÃÜ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows/
2. HarvesterÓÃGoGraºóÃÅÀÄÓÃ΢ÈíÔÆAPIʵÑé¹¥»÷
4ÔÂ22ÈÕ£¬£¬£¬ÍþвÐÐΪÕßHarvester±»Ö¸Ê¹ÓÃÁËаæLinux°æ±¾µÄGoGraºóÃÅ£¬£¬£¬Ñо¿Ö°Ô±ÔÚVirusTotalƽ̨ÉÏ·¢Ã÷ÁËÀ´×ÔÓ¡¶ÈºÍ°¢¸»º¹µÄ¶ñÒâÈí¼þÑù±¾£¬£¬£¬Åú×¢ÕâÁ½¸ö¹ú¼Ò¿ÉÄÜÊÇÌØ¹¤»î¶¯µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£×îз¢Ã÷Åú×¢£¬£¬£¬HarvesterÕýÔÚ¼ÌÐøÀ©Õ¹Æä¹¤¾ß¼¯£¬£¬£¬Ê¹Æä²»ÔÙ¾ÖÏÞÓÚWindowsϵͳ£¬£¬£¬¶øÊÇʹÓÃͳһºóÃųÌÐòµÄбäÖÖѬȾLinuxϵͳ¡£¡£¡£¡£¡£¡£¹¥»÷ʹÓÃÉç»á¹¤³ÌѧÊÖ¶ÎÓÕÆÊܺ¦Õß·¿ªÎ±×°³ÉPDFÎĵµµÄELF¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßËæºó»áÏÔʾÓÕ¶üÎĵµ£¬£¬£¬Í¬Ê±ÇÄÇÄÔËÐкóÃųÌÐò¡£¡£¡£¡£¡£¡£ÓëWindows°æ±¾ÀàËÆ£¬£¬£¬Linux°æGoGraÒ²ÀÄÓÃ΢ÈíµÄÔÆ»ù´¡ÉèÊ©£¬£¬£¬Ê¹Óÿª·ÅÊý¾ÝÐÒéÅÌÎÊ£¬£¬£¬Ã¿Á½ÃëÖÓÏòÒ»¸öÃûΪ¡°Zomato Pizza¡±µÄÌØ¶¨OutlookÓÊÏäÎļþ¼Ð·¢ËÍÒ»´ÎÇëÇ󡣡£¡£¡£¡£¡£¸ÃºóÃųÌÐò»áɨÃèÊÕ¼þÏ䣬£¬£¬²éÕÒÖ÷ÌâÐÐÒÔ¡°Input¡±¿ªÍ·µÄµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£Ò»µ©ÊÕµ½ÇкÏÌõ¼þµÄÓʼþ£¬£¬£¬³ÌÐò»á½âÃÜBase64±àÂëµÄÓʼþÕýÎÄ£¬£¬£¬²¢Ê¹Óá°/bin/bash¡±½«Æä×÷ΪshellÏÂÁîÖ´ÐС£¡£¡£¡£¡£¡£Ö´ÐÐЧ¹û»áÒÔÖ÷ÌâΪ¡°Output¡±µÄµç×ÓÓʼþÐÎʽ·¢Ë͸ø²Ù×÷Ô±¡£¡£¡£¡£¡£¡£Êý¾ÝÇÔÈ¡Íê³Éºó£¬£¬£¬Ö²Èë³ÌÐò»áɨ³ýÔʼʹÃüÓʼþÒÔÑÚÊκۼ£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html
3. RitualsÔâºÚ¿Í¹¥»÷£¬£¬£¬³¬4100Íò»áÔ±Êý¾Ýй¶
4ÔÂ22ÈÕ£¬£¬£¬×ܲ¿Î»ÓÚºÉÀ¼µÄ»¯×±Æ·¾ÞÍ·Rituals¿ËÈÕ֤ʵ£¬£¬£¬ºÚ¿Í´ÓÆä»áÔ±Êý¾Ý¿âÖÐÇÔÈ¡ÁË´ó×ÚÊý¾Ý£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£RitualsÌåÏÖ£¬£¬£¬ËûÃÇÔÚ4Ô·ݷ¢Ã÷ÁËÒ»Æð¡°Î´¾ÊÚȨÏÂÔØ¡±»áÔ±Êý¾ÝµÄÊÂÎñ£¬£¬£¬±»ÇÔÐÅÏ¢°üÀ¨¿Í»§µÄÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢ÓÊÕþµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ룬£¬£¬ÒÔ¼°ËûÃÇÆ«ºÃµÄRitualsÊÐËÁºÍÕË»§ÀàÐÍ¡£¡£¡£¡£¡£¡£Rituals½²»°ÈËEline van MalssenÈ·ÈÏ£¬£¬£¬ºÚ¿ÍÇÔÈ¡µÄÊÇÅ·ÖÞºÍÓ¢¹ú¿Í»§µÄ»áÔ±Êý¾Ý£¬£¬£¬Í¬Ê±²¿·ÖÃÀ¹ú¿Í»§Ò²Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬RitualsÉÐδÐÎò´Ë´ÎÍøÂç¹¥»÷µÄÏêϸÐÔ×Ó£¬£¬£¬Ò²Î´ËµÃ÷Êý¾Ýй¶±¬·¢µÄÏêϸ·½·¨£¬£¬£¬Í¬Ê±¾Ü¾ø¾Í¹«Ë¾ÊÇ·ñÊÕµ½ºÚ¿ÍµÄÈκÎÐÅÏ¢¡¢¸ü׼ȷµÄÊÂÎñʱ¼äÏß»òÊÜÓ°Ïì»áÔ±¼òÖ±ÇÐÈËÊý½ÒÏþ̸ÂÛ£¬£¬£¬ÀíÓÉΪ¡°Çå¾²Ôµ¹ÊÔÓÉ¡±¡£¡£¡£¡£¡£¡£¾ÝÆä¹ÙÍøÏÔʾ£¬£¬£¬RitualsµÄ»áÔ±Êý¾Ý¿âÓµÓÐÁè¼Ý4100Íò¿Í»§£¬£¬£¬Õâ¼ÒÁãÊÛ¾ÞÍ·ÔÚ2025ÄêµÄÊÕÈëµÖ´ï24ÒÚÅ·Ôª£¨Ô¼28ÒÚÃÀÔª£©¡£¡£¡£¡£¡£¡£
https://techcrunch.com/2026/04/22/cosmetics-giant-rituals-confirms-data-breach-of-customer-membership-records/
4. Î÷°àÑÀµ·»Ù×î´óÎ÷ÓïÂþ»µÁ°æÆ½Ì¨Tu Manga Online
4ÔÂ22ÈÕ£¬£¬£¬Î÷°àÑÀ¾¯·½¿ËÈÕµ·»ÙÁËËûÃÇËù³ÆµÄ¹æÄ£×î´óµÄÎ÷°àÑÀÓïÂþ»µÁ°æÆ½Ì¨¡£¡£¡£¡£¡£¡£¸Ãƽ̨×Ô2014Äê×îÏÈÔËÓª£¬£¬£¬Ã¿ÔÂΪȫÇòÊý°ÙÍòÓû§ÌṩЧÀÍ£¬£¬£¬Í¨¹ýÃâ·ÑÌṩÊܰæÈ¨±£»£»£»£»£»£»¤µÄ×÷Æ·£¬£¬£¬²¢Ê¹Óñ¬·¢µÄÍøÂçÁ÷Á¿»ñÈ¡¹ã¸æÊÕÈë¡£¡£¡£¡£¡£¡£¾¯·½Í¨¸æÖÐδÃ÷È·Ìἰƽ̨Ãû³Æ£¬£¬£¬µ«¾ÝTorrentFreak±¨µÀ£¬£¬£¬¸Ãƽ̨ÕýÊÇ×ÅÃûµÄÎ÷°àÑÀÓïÂþ»ÍøÕ¾Tu Manga Online£¨TMO£©¡£¡£¡£¡£¡£¡£ÔÚ°üÀ¨º«¹ú֪ʶ²úȨ³ÖÓÐÕßÔÚÄÚµÄÖ´·¨Ñ¹Á¦Ï£¬£¬£¬¸Ãƽ̨Òѱ»ÆÈÏÂÏß¡£¡£¡£¡£¡£¡£¾¯·½ÓÚ2025Äê6ÔÂÕö¿ªÊӲ죬£¬£¬·¢Ã÷¸Ãƽ̨ͨ¹ýÆÌÌì¸ÇµØµÄµ¯´°¹ã¸æÄ²ÀûÁè¼Ý470ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ÆäÖÐ´ó²¿·Ö¹ã¸æÎªÉ«ÇéÄÚÈÝ£¬£¬£¬¼øÓÚ¸ÃÍøÕ¾Ðí¶à»á¼ûÕßΪδ³ÉÄêÈË£¬£¬£¬ÕâÒ»ÇéÐÎÁîÈ˵£ÐÄ¡£¡£¡£¡£¡£¡£Óû§ÔÚÍøÕ¾ÉϾÙÐеÄÿ¸ö²Ù×÷°üÀ¨Ñ¡ÔñÄÚÈÝ¡¢ÔĶÁÐÎò»òä¯ÀÀĿ¼¶¼»á´¥·¢µ¯´°£¬£¬£¬´Ó¶ø×î´ó»¯¹ã¸æÆØ¹âÂÊ¡£¡£¡£¡£¡£¡£¾¯·½Í¨¸æ³Æ£¬£¬£¬×Ô2014ÄêÒÔÀ´£¬£¬£¬¸Ã×é֯һֱϵͳµØ¡¢Ãâ·ÑÇÒδ¾ÊÚȨµØÌṩ´ó×ÚÊÜ֪ʶ²úȨ±£»£»£»£»£»£»¤µÄ×÷Æ·µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¸ÃÃÅ»§ÍøÕ¾ÒѳÉΪÎ÷°àÑÀÓïÂþ»µÁ°æµÄÖ÷Òª²Î¿¼µã£¬£¬£¬Ã¿Ô»á¼ûÁ¿´ïÊý°ÙÍò£¬£¬£¬¾ßÓÐÏÔÖøµÄ¹ú¼ÊÓ°ÏìÁ¦£¬£¬£¬¶Ô°æÈ¨ËùÓÐÕß¡¢³öÊéÉÌ¡¢·ÒëÖ°Ô±¼°Õû¸öÎÄ»¯¹¤ÒµÔì³ÉÁËÑÏÖØË𺦡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/spain-dismantles-major-47m-manga-piracy-platform-arrests-four/
5. Mirai½©Ê¬ÍøÂçÃé×¼ÒÑÍ£²úD-Link·ÓÉÆ÷
4ÔÂ22ÈÕ£¬£¬£¬Akamai×îб¨¸æÖ¸³ö£¬£¬£¬Mirai½©Ê¬ÍøÂçÕýÔÚ¹¥»÷ÒÑÍ£²úµÄD-Link·ÓÉÆ÷£¬£¬£¬Ê¹ÓõÄÊÇÒ»ÄêǰÅû¶µÄÏÂÁî×¢ÈëÎó²îCVE-2025-29635¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚD-Link DIR-823XϵÁзÓÉÆ÷ÖУ¬£¬£¬Ó°Ïì¹Ì¼þ°æ±¾240126ºÍ24082¡£¡£¡£¡£¡£¡£Îó²î³ÉÒòÊǹ¥»÷Õ߿ɿØÖƵĺ¯ÊýÖµÔÚδÂÄÀúÖ¤µÄÇéÐÎϱ»¸´ÖÆ£¬£¬£¬²¢ÇÒ¿ÉÒÔͨ¹ýÈ«ÐĽṹµÄPOSTÇëÇó¼ÓÒÔʹÓᣡ£¡£¡£¡£¡£AkamaiÚ¹Êͳƣ¬£¬£¬Â·ÓÉÆ÷´ÓÇëÇóÕýÎÄÖÐÌáÈ¡×îÖÕ½øÈëÏÂÁ³åÇøµÄÖµ£¬£¬£¬¶ø²»¼ì²éËüÀ´×ÔÄĸö±íµ¥×ֶΡ£¡£¡£¡£¡£¡£ÊӲ쵽µÄ¹¥»÷ʵÑéÕë¶ÔµÄÊÇÏàͬµÄ´úÂ룬£¬£¬²¢´¥·¢ÁËÏàͬµÄϵͳŲÓ㬣¬£¬ÕâÓëÈ¥ÄêÔÚGitHubÉÏÐû²¼ºóÒѱ»É¾³ýµÄ¿´·¨ÑéÖ¤Îó²îʹÓóÌÐòÍêȫһÖ¡£¡£¡£¡£¡£¡£×÷ΪִÐз¾¶µÄÒ»²¿·Ö£¬£¬£¬¹¥»÷Õß¼ÓÔØÁËÒ»¸öshell½ÅÔÀ´ÏÂÔØ²¢ÔËÐÐÓÐÓÃÔØºÉ£¬£¬£¬¸ÃÔØºÉ¾ßÓÐÐí¶àMiraiÌØÕ÷£¬£¬£¬°üÀ¨XOR±àÂë¡¢Ó²±àÂëµÄ¿ØÖÆÌ¨Ö´ÐÐ×Ö·û´®ºÍÓ²±àÂëµÄÏÂÔØÆ÷IP¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄD-Link DIR-823XϵÁзÓÉÆ÷ÒÑÓÚÈ¥ÄêÍ£²ú£¬£¬£¬ÇÒ²»ÔÙ´Ó¹©Ó¦ÉÌ´¦»ñµÃÈí¼þ¸üС£¡£¡£¡£¡£¡£D-LinkÔçÔÚ9Ô·ݾÍÒÑ·¢³öÖÒÑÔ£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§Í£ÓøòúÆ·£¬£¬£¬²¢Ö¸³ö¼ÌÐøÊ¹ÓÿÉÄÜ»á¶ÔÅþÁ¬µ½¸Ã×°±¸µÄÆäËû×°±¸Ôì³ÉΣº¦¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/mirai-botnet-targets-flaw-in-discontinued-d-link-routers/
6. npmÈ䳿¹¥»÷£º16¸öNamastex°üÔâͶ¶¾ÇÔȡƾ֤
4ÔÂ22ÈÕ£¬£¬£¬Ò»ÖÖÕë¶ÔnpmÉú̬ϵͳµÄÐÂÐ͹©Ó¦Á´¹¥»÷ÕýÔÚÇÔÈ¡¿ª·¢Õ߯¾Ö¤£¬£¬£¬²¢Í¨¹ý´Ó±»µÁÕË»§Ðû²¼µÄ¶ñÒâÈí¼þ°ü¾ÙÐÐÀàËÆÈ䳿µÄÈö²¥¡£¡£¡£¡£¡£¡£¸ÃÍþвÓÉSocketºÍStepSecurityµÄÑо¿Ö°Ô±ÔÚNamastex LabsµÄ¶à¸öÈí¼þ°üÖз¢Ã÷¡£¡£¡£¡£¡£¡£×èÖ¹·¢¸åʱ£¬£¬£¬ÒÑÈ·Èϱ»¹¥ÆÆµÄNamastexÈí¼þ°ü¹²ÓÐ16¸ö¡£¡£¡£¡£¡£¡£ÕâЩÈí¼þ°üÖ÷ÒªÓÃÓÚAIÊðÀí¹¤¾ßºÍÊý¾Ý¿â²Ù×÷£¬£¬£¬Òò´Ë¹¥»÷Ä¿µÄΪ¸ß¼ÛÖµÖÕ¶Ë£¬£¬£¬¶ø·Ç´ó¹æÄ£Ñ¬È¾¡£¡£¡£¡£¡£¡£×¢ÈëµÄ¶ñÒâ´úÂë»áÍøÂçÓëÖÖÖÖÉñÃØÏà¹ØµÄÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨ÁîÅÆ¡¢APIÃÜÔ¿¡¢SSHÃÜÔ¿¡¢ÔÆÐ§ÀÍÆ¾Ö¤¡¢CI/CDϵͳƾ֤¡¢×¢²á±í¼°LLMƽ̨ƾ֤£¬£¬£¬ÒÔ¼°Kubernetes/DockerÉèÖᣡ£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ëü»¹»áʵÑéÌáÈ¡ChromeºÍFirefoxä¯ÀÀÆ÷Öд洢µÄÃô¸ÐÊý¾Ý£¬£¬£¬º¸ÇMetaMask¡¢Exodus¡¢Atomic WalletºÍPhantomµÈ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¡£¡£StepSecurityÖ¸³ö£¬£¬£¬¸Ã¶ñÒâÈí¼þʵÖÊÉÏÊÇÒ»ÖÖ¡°¹©Ó¦Á´È䳿¡±¡£¡£¡£¡£¡£¡£ËüÄܹ»Ñ°ÕÒÓÃÓÚnpmÐû²¼µÄÁîÅÆ£¬£¬£¬²¢½«×ÔÉí×¢Èëµ½¸ÃÁîÅÆÓÐȨÐû²¼µÄÿһ¸öÈí¼þ°üÖУ¬£¬£¬´Ó¶øÊµÏÖ½øÒ»²½Èö²¥¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/


¾©¹«Íø°²±¸11010802024551ºÅ