Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦

Ðû²¼Ê±¼ä 2026-02-28

1. Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦


2ÔÂ26ÈÕ£¬ £¬£¬£¬£¬£¬½üÆÚ£¬ £¬£¬£¬£¬£¬TruffleSecurityÑо¿Ö°Ô±ÔÚɨÃèÈ«ÇòÍøÕ¾Ê±·¢Ã÷£¬ £¬£¬£¬£¬£¬½ü3000¸öǶÈëÔÚ¹«¹²JavaScript´úÂëÖеÄGoogle APIÃÜÔ¿±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£ÕâЩÃÜÔ¿Ô­±¾ÓÃÓÚµØÍ¼¡¢YouTubeǶÈë¡¢FirebaseµÈЧÀÍ£¬ £¬£¬£¬£¬£¬ÔÚGoogleÍÆ³öGemini AIÖúÊÖºó£¬ £¬£¬£¬£¬£¬ÆäȨÏÞ±»ÒâÍâÀ©Õ¹ÖÁGeminiÉí·ÝÑéÖ¤£¬ £¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɸ´ÖÆÃÜÔ¿»á¼û˽ÓÐÊý¾Ý²¢ÀÄÓÃAPIŲÓÃ׬Ǯ¡£¡£¡£Ñо¿ÏÔʾ£¬ £¬£¬£¬£¬£¬ÕâЩ̻¶ÃÜÔ¿¶à°²ÅÅÓÚ½ðÈÚ»ú¹¹¡¢°²±£¹«Ë¾¡¢ÕÐÆ¸ÆóÒµµÈ×éÖ¯µÄÍøÕ¾Ô´´úÂëÖУ¬ £¬£¬£¬£¬£¬²¿·ÖÃÜÔ¿×Ô2023Äê2ÔÂÆð±ãÒ»Á¬Ì»Â¶¡£¡£¡£TruffleSecurityͨ¹ý²âÊÔGemini APIµÄ/models¶ËµãÑéÖ¤ÁËÃÜÔ¿µÄÓÐÓÃÐÔ£¬ £¬£¬£¬£¬£¬·¢Ã÷µ¥ÈÕ×î¸ß¿É±¬·¢ÊýǧÃÀÔªÓöÈ¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ£¬ £¬£¬£¬£¬£¬¿ª·¢Õß´Ëǰ½«GoogleÔÆAPIÃÜÔ¿ÊÓΪ·ÇÃô¸ÐÊý¾Ý¹ûÕæ£¬ £¬£¬£¬£¬£¬¶øGeminiÍÆ³öºó£¬ £¬£¬£¬£¬£¬ÕâЩÃÜԿͻȻ»ñµÃ¸ü¸ßȨÏÞȴδ±»ÊµÊ±²ì¾õ¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2025Äê11ÔÂ21ÈÕÏò¹È¸è±¨¸æÎó²î£¬ £¬£¬£¬£¬£¬¹È¸èÀúʱÊýÔÂÓÚ2026Äê1ÔÂ13ÈÕ½«Æä¹éÀàΪ¡°µ¥Ð§ÀÍȨÏÞÌáÉý¡±¡£¡£¡£¹È¸èÒѽÓÄÉÆð¾¢²½·¥¡£¡£¡£


https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/


2. ManoManoÔâµÚÈý·½Ð§ÀÍÉ̺ڿÍÈëÇÖÖÂÊý¾Ýй¶


2ÔÂ26ÈÕ£¬ £¬£¬£¬£¬£¬·¨¹úDIYµçÉ̾ÞÍ·ManoMano¿ËÈÕÅû¶£¬ £¬£¬£¬£¬£¬ÆäÒ»¼ÒµÚÈý·½¿Í»§Ð§ÀÍÌṩÉÌÓÚ2026Äê1ÔÂÔâÓöºÚ¿Í¹¥»÷£¬ £¬£¬£¬£¬£¬µ¼ÖÂÔ¼3800ÍòÓû§Êý¾Ýй¶¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬ £¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýδ¾­ÊÚȨ»á¼û¸ÃÍ»Äá˹·Ö°üÉÌϵͳ£¬ £¬£¬£¬£¬£¬ÇÔÈ¡ÁËÓëÓû§ÕË»§¼°¿Í·þ»¥¶¯Ïà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°¿Í»§Ð§ÀÍÏàͬ¼Í¼£¬ £¬£¬£¬£¬£¬µ«Î´Éæ¼°ÕË»§ÃÜÂë»ò¹«Ë¾ÏµÍ³Êý¾ÝÐ޸ġ£¡£¡£×÷ΪŷÖÞÁìÏȵļҾÓ×°ÐÞ¡¢Ô°ÒÕ²úÆ·ÔÚÏßÊг¡£¡£¡£¬ £¬£¬£¬£¬£¬ManoManoÔÚ·¨¡¢±È¡¢Î÷¡¢Òâ¡¢µÂ¡¢Ó¢Áù¹úÔËÓª£¬ £¬£¬£¬£¬£¬Ô¾ù×ÔÁ¦·Ã¿Í´ï5000Íò¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚºÚ¿ÍÂÛ̳ÉϼÙÃû¡°Indra¡±µÄ¹¥»÷ÕßÐû³Æ¶ÔÈëÇÖÈÏÕæ£¬ £¬£¬£¬£¬£¬²¢Éù³Æ»ñÈ¡ÁË3780ÍòÓû§ÕË»§¼°Êýǧ·ÝÖ§³Ö¹¤µ¥Ó븽¼þ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾HackmanacÖ¸³ö£¬ £¬£¬£¬£¬£¬Ð¹Â¶ÈªÔ´»òÓëZendeskÊý¾Ýй¶Ïà¹Ø£¬ £¬£¬£¬£¬£¬µ«ManoManoδֱ½ÓÈ·ÈÏÊÖÒÕϸ½Ú¡£¡£¡£ÊÂÎñÆØ¹âºó£¬ £¬£¬£¬£¬£¬ManoManoÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£º½ûÓÃÏà¹Ø»á¼ûȨÏÞ¡¢×÷·Ï·Ö°üÉÌÊý¾Ý»á¼ûȨ¡¢Ç¿»¯»á¼û¿ØÖÆÓë¼à¿Ø£¬ £¬£¬£¬£¬£¬²¢Í¬²½×ª´ï·¨¹ú¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©¼°¹ú¼Ò¿ÆÑ§Ó빤ҵÖÎÀí¾Ö£¨ANSSI£©¡£¡£¡£


https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/


3. ÂíÈü×ãÇò¾ãÀÖ²¿ÔâÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬40ÍòÓû§ÐÅÏ¢ÃæÁÙΣº¦


2ÔÂ26ÈÕ£¬ £¬£¬£¬£¬£¬·¨¹úÂíÈü°ÂÁÖÆ¥¿Ë×ãÇò¾ãÀÖ²¿£¨OM£©¿ËÈÕ֤ʵÔâÓöÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬³ÉΪ½üÆÚÕë¶Ô´óÐÍÌåÓý×éÖ¯ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¸Ã¾ãÀÖ²¿½¨ÉèÓÚ1899Ä꣬ £¬£¬£¬£¬£¬ÊÇ·¨¼×ÁªÈüÊ×´´³ÉÔ±Ö®Ò»£¬ £¬£¬£¬£¬£¬²¢ÓÚ1993Äê³ÉΪÊ×Ö§¶áµÃÅ·ÖÞ¹Ú¾üÁªÈü¹Ú¾üµÄ·¨¹úÇò¶Ó¡£¡£¡£¾ÝÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Åû¶£¬ £¬£¬£¬£¬£¬ÆäÓÚ±¾Ô³õÈëÇÖ¾ãÀÖ²¿²¿·ÖЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨40ÍòÃûÔ±¹¤¡¢ÇòÃÔ¼°Ö§³ÖÕßÐÅÏ¢µÄÊý¾Ý¿â£¬ £¬£¬£¬£¬£¬ÏêϸÊý¾ÝÉæ¼°ÐÕÃû¡¢µØµã¡¢¶©µ¥¼Í¼¡¢µç×ÓÓʼþ¼°ÊÖ»úºÅÂë¡£¡£¡£¹¥»÷Õß»¹Éù³Æ»ñÈ¡ÁË2050¸öDrupal CMSÕË»§ÐÅÏ¢£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨34Ãû¾ãÀÖ²¿Ô±¹¤ºÍ1770ÃûТ˳Õß¡¢°æÖ÷µÄÕË»§Æ¾Ö¤¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¹ûÕæÁ˲¿·ÖÊý¾ÝÑù±¾£¬ £¬£¬£¬£¬£¬²¢ÊÔͼÔÚÂÛ̳³öÊÛËùν¡°2026Äê2Ô½ÇÖðÊý¾Ý¡±¡£¡£¡£¾ãÀÖ²¿ÔÚÖܶþÐû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˹¥»÷ÊÂÎñ£¬ £¬£¬£¬£¬£¬µ«Ç¿µ÷¡°µÃÒæÓÚÊÖÒÕÍŶÓÓëרҵЧÀÍÉ̵ĿìËÙÏìÓ¦£¬ £¬£¬£¬£¬£¬ÊÂ̬ÒÑ»ñµÃ¿ØÖÆ¡±¡£¡£¡£ÏÖÔÚ¾ãÀÖ²¿ËùÓÐÓªÒµ¾ùÔÚÇå¾²ÇéÐÎÏÂÕý³£ÔËÐУ¬ £¬£¬£¬£¬£¬ÇÒÎÞÒøÐÐÐÅÏ¢»òÃÜÂëй¶¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬¾ãÀÖ²¿ÌåÏÖÈÔÔÚÊÓ²ìÊÂÎñÏêϸ¹æÄ££¬ £¬£¬£¬£¬£¬²¢ÒÑÏò·¨¹úÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹£¨CNIL£©Õýʽ±¨¸æ£¬ £¬£¬£¬£¬£¬Í¬Ê±ºôÓõÇòÃÔСÐÄ´¹ÂÚ¹¥»÷¼°¿ÉÒɻ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/


4. UAT-10027ʹÓÃDohdoorºóÃŹ¥»÷ÃÀ¹ú½ÌÓýºÍÒ½ÁƱ£½¡ÏµÍ³


2ÔÂ26ÈÕ£¬ £¬£¬£¬£¬£¬Cisco Talos¿ËÈÕÅû¶±àºÅΪUAT-10027µÄÍþв¼¯Èº£¬ £¬£¬£¬£¬£¬¸Ã¼¯Èº×Ô2025Äê12ÔÂÆðÒÔÃÀ¹ú½ÌÓý¼°Ò½ÁƱ£½¡»ú¹¹ÎªÄ¿µÄ£¬ £¬£¬£¬£¬£¬°²ÅÅÁËÐÂÐͺóÃųÌÐòDohdoor¡£¡£¡£¹¥»÷³õʼ½×¶Îͨ¹ý´¹ÂÚÓʼþ´¥·¢PowerShell¾ç±¾£¬ £¬£¬£¬£¬£¬ÏÂÔØ¶ñÒâ.batÎļþ²¢Ê¹ÓÃDLL²àÔØÊÖÒÕ¼ÓÔØDohdoor¶ñÒâDLL¡£¡£¡£¸ÃºóÃÅͨ¹ýDNS over HTTPS£¨DoH£©ÓëCloudflare»ù´¡ÉèÊ©Òþ²ØC2ͨѶ£¬ £¬£¬£¬£¬£¬½«Á÷Á¿Î±×°³ÉÕýµ±HTTPSÅþÁ¬£¬ £¬£¬£¬£¬£¬ÊµÏÖÈÆ¹ý¹Å°åÇå¾²¼ì²âµÄÒ»Á¬»á¼û¡£¡£¡£DohdoorΪ2025Äê11Ô±àÒëµÄ64λDLL¼ÓÔØÆ÷£¬ £¬£¬£¬£¬£¬½ÓÄÉË«ÖØ½âÃÜ»úÖÆ£ºÅúÁ¿Êý¾ÝʹÓÃSIMDÖ¸ÁîµÄXOR-SUBËã·¨´¦Öóͷ££¬ £¬£¬£¬£¬£¬Ê£ÓàÊý¾Ýͨ¹ýλÖÃÏà¹Ø¹«Ê½½âÃÜ¡£¡£¡£ÆäC2ͨѶͨ¹ýÆÊÎöCloudflareµÄJSONÏìÓ¦»ñȡЧÀÍÆ÷IP£¬ £¬£¬£¬£¬£¬²¢Ä£ÄâcurlÁ÷Á¿·¢ËÍHTTPS GETÇëÇóÏÂÔØ¼ÓÃÜÔØºÉ¡£¡£¡£Îª¹æ±ÜEDR¼ì²â£¬ £¬£¬£¬£¬£¬Dohdoor»á¶¯Ì¬¶¨Î»ntdll.dllÖеÄNtProtectVirtualMemoryº¯Êý£¬ £¬£¬£¬£¬£¬Í¨¹ýÐÞ²¹ÏµÍ³Å²Óôæ¸ù½¨ÉèÖ±½ÓϵͳŲÓÃÌø×ª£¬ £¬£¬£¬£¬£¬ÈƹýÓû§Ä£Ê½¹³×Ó¡£¡£¡£TalosÆÀ¹ÀÒÔΪ£¬ £¬£¬£¬£¬£¬Ö»¹ÜUAT-10027ÓëLazarus±£´æÊÖÒÕ¹ØÁª£¬ £¬£¬£¬£¬£¬µ«ÆäÄ¿µÄÁìÓòÌØÊâÐÔÈÔÐèÒýÆðÏà¹ØÐÐÒµ¸ß¶ÈСÐÄ¡£¡£¡£


https://securityaffairs.com/188558/apt/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor.html


5. ³¯ÏÊAPT37×éÖ¯ÌᳫRuby Jumper¶ñÒâ»î¶¯


2ÔÂ27ÈÕ£¬ £¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾Zscaler¿ËÈÕÅû¶£¬ £¬£¬£¬£¬£¬Óɳ¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯APT37ÌᳫµÄ"Ruby Jumper"¶ñÒâ»î¶¯£¬ £¬£¬£¬£¬£¬Õýͨ¹ý¿ÉÒÆ¶¯´æ´¢Çý¶¯Æ÷ÔÚÎïÀí¸ôÀëϵͳÓëÁªÍøÏµÍ³¼ä½¨ÉèÒþ²ØÊý¾Ý´«ÊäͨµÀ¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦Õß·­¿ªÎ±×°³É³¯ÏÊýÌ幨ÓÚ°ÍÒÔ³åÍ»°¢À­²®ÓïÒë±¾µÄ¶ñÒâLNKÎļþ£¬ £¬£¬£¬£¬£¬¸ÃÎļþ»á°²ÅÅPowerShell¾ç±¾ÌáÈ¡ÓÐÓÃÔØºÉ²¢Æô¶¯ÓÕ¶üÎĵµ¡£¡£¡£¾ç±¾Ê×ÏȼÓÔØRESTLEAFÖ²Èë³ÌÐò£¬ £¬£¬£¬£¬£¬Í¨¹ýZoho WorkDriveÓëC2ЧÀÍÆ÷ͨѶ£¬ £¬£¬£¬£¬£¬»ñÈ¡¼ÓÃÜshellcodeºóÏÂÔØ»ùÓÚRubyµÄSNAKEDROPPER¼ÓÔØÆ÷¡£¡£¡£¸Ã¼ÓÔØÆ÷»á×°ÖÃαװ³Éusbspeed.exeµÄRuby 3.3.0ÔËÐÐʱÇéÐΣ¬ £¬£¬£¬£¬£¬²¢Í¨¹ýÿÎå·ÖÖÓÖ´ÐеÄÍýÏëʹÃüÌæ»»RubyGemsĬÈÏÎļþ£¬ £¬£¬£¬£¬£¬ÊµÏÖ×Ô¶¯¼ÓÔØ¡£¡£¡£THUMBSBDºóÃÅÒÔascii.rbÎļþÐÎʽÏÂÔØ£¬ £¬£¬£¬£¬£¬ÈÏÕæÍøÂçϵͳÐÅÏ¢¡¢ÔÝ´æÏÂÁîÎļþ£¬ £¬£¬£¬£¬£¬²¢ÔÚUSBÇý¶¯Æ÷½¨ÉèÒþ²ØÄ¿Â¼¾ÙÐÐÊý¾ÝË«Ïò´«Ê䣬 £¬£¬£¬£¬£¬½«¿ÉÒÆ¶¯½éÖÊת»¯Îª"Òþ²ØC2ÖмÌ"¡£¡£¡£VIRUSTASKÔòͨ¹ýÌæ»»Õýµ±ÎļþΪ¶ñÒâ¿ì½Ý·½·¨£¬ £¬£¬£¬£¬£¬ÔÚÇý¶¯Æ÷ÓÐ2GBÒÔÉϿռäʱ´¥·¢Ñ¬È¾£¬ £¬£¬£¬£¬£¬ÏòÐÂÎïÀí¸ôÀë×°±¸Èö²¥¡£¡£¡£FOOTWINEÌØ¹¤Èí¼þαװ³ÉAPKÎļþ£¬ £¬£¬£¬£¬£¬Ö§³Ö¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ÒôÊÓÆµÂ¼ÖƵÈÔ¶³Ì²Ù×÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/


6. RESURGE¶ñÒâÈí¼þʵÏÖIvanti×°±¸Òþ²Ø³¤ÆÚÈëÇÖ


2ÔÂ27ÈÕ£¬ £¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Á˹ØÓÚRESURGE¶ñÒâÖ²Èë³ÌÐòµÄ×îÐÂÊÖÒÕϸ½Ú¡£¡£¡£¸Ã³ÌÐò±»ÓÃÓÚʹÓÃCVE-2025-0282ÁãÈÕÎó²îÈëÇÖIvanti Connect Secure×°±¸£¬ £¬£¬£¬£¬£¬¾ßÓÐÑÓ³ÙÆô¶¯¡¢ÖØ´óÍøÂç¼¶¹æ±ÜºÍÈÏÖ¤ÊÖÒÕµÈÌØÕ÷£¬ £¬£¬£¬£¬£¬¿ÉʵÏÖÒþ²ØÍ¨Ñ¶Ó볤ÆÚÐÔפÁô¡£¡£¡£¾ÝCISAÆÊÎö£¬ £¬£¬£¬£¬£¬RESURGEÊÇÒ»¸öÃûΪlibdsupgrade.soµÄ32λLinux¹²Ïí¹¤¾ßÎļþ£¬ £¬£¬£¬£¬£¬¾ß±¸rootkit¡¢bootkit¡¢ºóÃÅ¡¢Í¶·ÅÆ÷¡¢ÊðÀíºÍËíµÀµÈ¶àÖØ¹¦Ð§¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ²»×Ô¶¯ÏòC2ЧÀÍÆ÷·¢ËÍÐű꣬ £¬£¬£¬£¬£¬¶øÊÇÎÞÏÞÆÚÆÚ´ýÌØ¶¨ÈëÕ¾TLSÅþÁ¬£¬ £¬£¬£¬£¬£¬Í¨¹ýCRC32 TLSÖ¸ÎÆ¹þÏ£¼Æ»®Ê¶±ð¹¥»÷ÕßµÄÅþÁ¬ÊµÑé¡£¡£¡£µ±ÔÚ"web"Àú³ÌϼÓÔØÊ±£¬ £¬£¬£¬£¬£¬Ëü»á¹Ò¹³"accept()"º¯Êý£¬ £¬£¬£¬£¬£¬ÔÚÁ÷Á¿µÖ´ïЧÀÍÆ÷ǰ¼ì²éTLSÊý¾Ý°ü£¬ £¬£¬£¬£¬£¬ÈôÖ¸ÎÆÆ¥ÅäÔò½¨ÉèË«ÏòTLS»á»°£¬ £¬£¬£¬£¬£¬²»È»½«Á÷Á¿µ¼ÏòÕýµ±IvantiЧÀÍÆ÷¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃαÔìµÄIvantiÖ¤Êé¾ÙÐÐÉí·ÝÑéÖ¤£¬ £¬£¬£¬£¬£¬¸ÃÖ¤Êé½öÓÃÓÚÈÏÖ¤¶ø·Ç¼ÓÃÜ£¬ £¬£¬£¬£¬£¬ÇÒͨ¹ý»¥ÁªÍøÃ÷ÎÄ´«Ê䣬 £¬£¬£¬£¬£¬·ÀÓùÕ߿ɽ«Æä×÷ÎªÍøÂçÊðÃû¼ì²âÈëÇÖ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/