AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽÇå¾²¾¯±¨
Ðû²¼Ê±¼ä 2026-03-031. AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽÇå¾²¾¯±¨
3ÔÂ2ÈÕ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¿ËÈÕÖÒÑÔ£¬£¬£¬£¬£¬Ò»³¡Õë¶ÔÈ«ÇòÊý°Ų̀Fortinet FortiGate·À»ðǽµÄ´ó¹æÄ£¹¥»÷ÊÂÎñÖУ¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁËÃûΪCyberStrikeAIµÄÐÂÐÍ¿ªÔ´AIÇå¾²²âÊÔÆ½Ì¨¡£¡£¡£¡£¡£¸Ãƽ̨ÓɼÙÃû"Ed1s0nZ"µÄ¿ª·¢Õß½¨É裬£¬£¬£¬£¬ÆäGitHub´úÂë¿âÏÔʾÆäΪ"ÓÃGoÓïÑÔ¹¹½¨µÄAIÔÉúÇå¾²²âÊÔÆ½Ì¨"£¬£¬£¬£¬£¬¼¯³É100ÓàÖÖÇå¾²¹¤¾ß£¬£¬£¬£¬£¬°üÀ¨ÖÇÄܱàÅÅÒýÇæ¡¢Ô¤½ç˵Çå¾²½ÇÉ«¼°ÊÖÒÕϵͳ£¬£¬£¬£¬£¬Ö§³ÖGPT¡¢ClaudeµÈÄ£×ÓÇý¶¯µÄ¾öÒéÒýÇæ£¬£¬£¬£¬£¬²¢Å䱸ÃÜÂë±£»£»£»£»¤µÄWeb½çÃæÓëÉó¼ÆÈÕÖ¾¹¦Ð§¡£¡£¡£¡£¡£¾ÝTeam Cymru¸ß¼¶ÍþвÇ鱨ÕÕÁÏWill ThomasÆÊÎö£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓõÄ212.11.64[.]250ЧÀÍÆ÷ÔÚ8080¶Ë¿ÚÔËÐÐCyberStrikeAIЧÀÍ£¬£¬£¬£¬£¬¸ÃIPÓë±»¹¥ÆÆµÄFortiGate×°±¸±£´æÍøÂçͨѶ¼Í¼£¬£¬£¬£¬£¬×îºóÒ»´Î»î¶¯¼Í¼Ϊ2026Äê1ÔÂ30ÈÕ¡£¡£¡£¡£¡£¸Ã¹¤¾ßͨ¹ýÔÉúMCPÐÒéʵÏÖ´Ó¶Ô»°Ê½ÏÂÁîµ½Îó²î·¢Ã÷¡¢¹¥»÷Á´ÆÊÎö¡¢Ð§¹û¿ÉÊÓ»¯µÄÈ«Á÷³Ì×Ô¶¯»¯£¬£¬£¬£¬£¬Ö§³ÖÍøÂçɨÃ裨nmap£©¡¢Îó²îʹÓã¨metasploit£©¡¢ÃÜÂëÆÆ½â£¨hashcat£©µÈÍêÕû¹¥»÷Á´²Ù×÷£¬£¬£¬£¬£¬Ê¹µÍÊÖÒÕ¹¥»÷ÕßÒ²ÄÜÖ´ÐÐÖØ´ó¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/
2. Ö¥¼Ó¸çInsightÒ½Ôº360GBÃô¸ÐÐÅÏ¢Ôâй¶
3ÔÂ2ÈÕ£¬£¬£¬£¬£¬Ö¥¼Ó¸çInsightÒ½ÔººÍÒ½ÁÆÖÐÐÄ2026Äê1ÔÂ26ÈÕÐû²¼Ì滻֪ͨ£¬£¬£¬£¬£¬Åû¶ÆäÓÚ2025Äê9Ô¼ì²âµ½ÍøÂçÒì³£»£»£»£»î¶¯£¬£¬£¬£¬£¬¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬2025Äê8ÔÂ22ÈÕÖÁ9ÔÂ11ÈÕʱ´ú£¬£¬£¬£¬£¬Ò»Ãûδ¾ÊÚȨְԱ»á¼ûÁ˸ûú¹¹ÍøÂç¡£¡£¡£¡£¡£Í¨ÖªÖ¸³ö£¬£¬£¬£¬£¬¿ÉÄÜй¶µÄÐÅÏ¢ÀàÐͺ¸ÇÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕ/»¤ÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¼°ÖÎÁÆÏà¹ØÊý¾Ý£¨º¬¿µ½¡°ü¹ÜÐÅÏ¢£©£¬£¬£¬£¬£¬µ«×èֹ֪ͨÐû²¼Ê±£¬£¬£¬£¬£¬InsightÉÐδÆô¶¯¶ÔÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨ³ÌÐò£¬£¬£¬£¬£¬ÒàδÌá¼°ÌṩÃâ·ÑÉí·ÝµÁÓûº½âЧÀÍ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬2026Äê2ÔÂ24ÈÕ£¬£¬£¬£¬£¬×Գơ°°×ÒÏ¡±£¨Termite£©µÄÍþв×éÖ¯½«InsightÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬Éù³ÆÒÑ»ñȡԼ360GB£¨Ô¼90Íò¸öÎļþ£©µÄ¡°ÉñÃØÊý¾Ý¡±£¬£¬£¬£¬£¬²¢·Ö¶àÅú´Îй¶£¬£¬£¬£¬£¬ÆäÖаüÀ¨´ó×Ú.jpegºÍ.dcmÃûÌÃÎļþ¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúInsightÊÇ·ñÓë¸Ã×éÖ¯¾ÙÐйý½Ó´¥»ò̸ÅС£¡£¡£¡£¡£
https://databreaches.net/2026/03/02/data-from-insight-hospital-and-medical-center-leaked-on-dark-web/
3. α¹È¸èÇå¾²Ò³´¹ÂÚ£ºPWAÇÔÈ¡OTP¼°¼ÓÃÜÇ®±Ò
3ÔÂ2ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶һÖÖʹÓÃαÔì¹È¸èÇå¾²Ò³ÃæµÄÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬¸Ã¹¥»÷ͨ¹ý½¥½øÊ½WebÓ¦Óã¨PWA£©ÊÖÒÕÇÔÈ¡Óû§Ò»´ÎÐÔÃÜÂ루OTP£©¡¢¼ÓÃÜÇ®±ÒÇ®°üµØµã£¬£¬£¬£¬£¬²¢½«Êܺ¦Õßä¯ÀÀÆ÷ת»¯Îª¹¥»÷ÕßÁ÷Á¿ÊðÀí¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÓòÃûgoogle-prism[.]comαװ³É¹È¸èÕýµ±Ç徲ЧÀÍ£¬£¬£¬£¬£¬ÓÕµ¼Óû§Íê³ÉËIJ½ÉèÖÃÁ÷³Ì£¬£¬£¬£¬£¬°üÀ¨ÊÚÓè¸ßΣº¦È¨ÏÞºÍ×°ÖöñÒâPWAÓ¦Óᣡ£¡£¡£¡£¸ÃPWAÔÚä¯ÀÀÆ÷ÖÐÒÔ×ÔÁ¦Ó¦ÓÃÐÎʽÔËÐУ¬£¬£¬£¬£¬Î޿ɼûä¯ÀÀÆ÷¿Ø¼þ£¬£¬£¬£¬£¬Ê¹ÓÃÉç»á¹¤³ÌÊÖ¶ÎÓÕÆÓû§ÏàÐÅÆäÕýÔÚ¾ÙÐÐÇå¾²¼ì²é»ò×°±¸±£»£»£»£»¤²Ù×÷¡£¡£¡£¡£¡£¶ñÒâPWA¾ß±¸¶àÏî¸ßΣ¹¦Ð§£º¿ÉÇÔÈ¡ÁªÏµÈË¡¢ÊµÊ±GPSÊý¾Ý¡¢¼ôÌù°åÄÚÈÝ£¬£¬£¬£¬£¬²¢Í¨¹ýWebOTP API×èµ²¶ÌÐÅÑéÖ¤Â룻£»£»£»ÆäЧÀÍÊÂÇéÏß³ÌÖ§³ÖÍÆËÍ֪ͨ¡¢Ö´Ðкǫ́ʹÃü¼°ÍâйÊý¾Ý£»£»£»£»WebSocketÖм̹¦Ð§¸üÔÊÐí¹¥»÷Õßͨ¹ýÊܺ¦Õßä¯ÀÀÆ÷·ÓÉHTTPÇëÇ󣬣¬£¬£¬£¬Ä£ÄâÆäÍøÂç»î¶¯¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷Õßÿ30Ãëͨ¹ý/api/heartbeat¼ì²éÐÂÏÂÁ£¬£¬£¬£¬²¢Í¨¹ýÐéαÇå¾²¾¯±¨ÓÕµ¼Óû§ÖØÐ·¿ªPWAÒÔÒ»Á¬ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/
4. °Í»ù˹̹Ö÷Á÷ÐÂÎÅÆµµÀÔâºÚ¿Í¹¥»÷
3ÔÂ2ÈÕ£¬£¬£¬£¬£¬°Í»ù˹̹Èý´óÖ÷Á÷ÐÂÎÅÆµµÀGeo News¡¢ARY NewsºÍSamaa TV 3ÔÂ1ÈÕÍí¼äÔâÓöÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬Õý³£½ÚÄ¿ÔÚ¿ªÕ«·¹ºóµÄ»Æ½ðʱ¶Î£¨Íí9µãǰºó£©±»Î´¾ÊÚȨÐÅÏ¢ÖÐÖ¹¡£¡£¡£¡£¡£Geo NewsÐû²¼ÉùÃ÷֤ʵ£¬£¬£¬£¬£¬Æäͨ¹ýPakSatÎÀÐÇ´«ÊäµÄÐźÅÔâ²»Ã÷Éí·ÝºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬½ÚĿһÁ¬ÖÐÖ¹²¢·ºÆðÕë¶Ô°Í»ù˹̹Îä×°²½¶ÓµÄÉ¿»óÐÔÄÚÈÝ£¬£¬£¬£¬£¬°üÀ¨ºôÓõÃñÖÚ¶Ô¿¹¾ü·½¡¢Ö¸¿Ø¾ü¶Ó¡°´Ý»Ù¹ú¼Ò¡±µÈÖ±½ÓÑ°ÐÆÑÔÂÛ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ͨ¹ý¿ØÖÆÎÀÐÇÐźźÍÖ±²¥Á÷ʵÏÖ£¬£¬£¬£¬£¬ºÚ¿ÍÔÚÆÁÄ»ÉÏÕ¹ÊÕ¬ëÆµµÀÄÚÈÝÎ޹صÄÎÄ×Ö£¬£¬£¬£¬£¬Æä¹æÄ£ºÍÕë¶ÔÐÔÅú×¢ÕâÊÇÒ»´Îе÷Ðж¯¡£¡£¡£¡£¡£Ö»¹Ü²¿·Ö±¨µÀÍÆ²â¹¥»÷¿ÉÄÜÉæ¼°°¢¸»º¹ºÚ¿Í£¬£¬£¬£¬£¬µ«ÉÐδÓÐÈ·ÔäÖ¤¾Ý¡£¡£¡£¡£¡£×÷Ϊ»ØÓ¦£¬£¬£¬£¬£¬°Í»ù˹̹±»Ö¸Ìá³«ÍøÂ绹»÷£¬£¬£¬£¬£¬°üÀ¨¶ÔÓ¡¶ÈABPÐÂÎÅÆµµÀºÍFood OdishaÍøÕ¾µÄDDoS¹¥»÷¼°ÈëÇÖÐж¯£¬£¬£¬£¬£¬ºÚ¿ÍÉõÖÁʹÓÃÖ±²¥ÐźŲ¥·Å°Í»ù˹̹½¾üÕÕÁϳ¤µÄ½²»°¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ»¹²¨¼°19¸ö¹ú¼ÒµÄÍøÕ¾£¬£¬£¬£¬£¬ºÚ¿Í±»ÆØÔÚÕâÐ©ÍøÕ¾Í¶·Åδ¾ÊÚȨµÄ¹È¸è¹ã¸æ¡£¡£¡£¡£¡£Geo NewsÌåÏÖ£¬£¬£¬£¬£¬¸ÃƵµÀÓëºÚ¿Í¶Ô¿¹½ü24Сʱºó²Å»Ö¸´¿ØÖÆ£¬£¬£¬£¬£¬Ç¿µ÷Óк¦ÐÅÏ¢ÍêÈ«ÓÉÍâ²¿ÊÆÁ¦Ö²Èë¡£¡£¡£¡£¡£
https://hackread.com/pakistan-news-channels-hacked-anti-military-messages/
5. ÃÀÕþ¸®ÓëAnthropic AIʹÓÃÕùÒéÉý¼¶
2ÔÂ28ÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú¹ú·À²¿³¤ºÕ¸ñÈû˼½«AnthropicÁÐΪ¡°¹©Ó¦Á´Î£º¦¡±ºó£¬£¬£¬£¬£¬Ë«·½Î§ÈÆAIÄ£×ÓClaudeµÄ¾üÊÂÓ¦Óñ¬·¢Ç¿ÁÒ³åÍ»¡£¡£¡£¡£¡£AnthropicǿӲ»ØÓ¦³Æ£¬£¬£¬£¬£¬´Ë¾ÙÔ´ÓÚÊýÔÂ̸Åн©¾Ö£¬£¬£¬£¬£¬Æä¼á³ÖΪClaudeµÄÕýµ±Ê¹ÓÃÔöÉèÁ½ÏîÆÆÀý£¬£¬£¬£¬£¬Õ¥È¡ÓÃÓÚÃÀ¹úÃñÖÚ´ó¹æÄ£º£ÄÚ¼à¿ØÓëÍêÈ«×ÔÖ÷ÎäÆ÷£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°ÎÞÂÛÎå½Ç´ó¥ʩ¼ÓºÎÖÖÏÅ»££¬£¬£¬£¬£¬¶¼²»»á¸Ä±ä̬¶È¡±¡£¡£¡£¡£¡£ÌØÀÊÆÕÕþ¸®Ñ¸ËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹Áù¸öÔÂÄÚÍ£ÓÃAnthropicÊÖÒÕ£¬£¬£¬£¬£¬ºÕ¸ñÈû˼½øÒ»²½Ö¸ÁîÃÀ¾ü³Ð°üÉÌ¡¢¹©Ó¦É̼°ÏàÖúͬ°éÁ¬Ã¦ÖÕÖ¹ÓëAnthropicµÄÉÌÒµÏàÖú¡£¡£¡£¡£¡£Îå½Ç´óÂ¥Éù³Æ£¬£¬£¬£¬£¬´Ë¾ÙÖ¼ÔÚ´òÔì¡°AIÓÅÏÈ¡±×÷Õ½²½¶Ó£¬£¬£¬£¬£¬ÒªÇóAIÄ£×ÓÎÞʹÓÃÕþ²ßÏÞÖÆ¡¢²»×è°Õýµ±¾üÊÂÓ¦Ó㬣¬£¬£¬£¬²¢Ö¸ÔðAnthropicµÄ̬¶È¡°Î£¼°Òªº¦¾üÊÂÐж¯¡±¡£¡£¡£¡£¡£AnthropicÅú²µ³Æ£¬£¬£¬£¬£¬Îå½Ç´óÂ¥µÄÒªÇóȱ·¦Ö´·¨ÒÀ¾Ý£¬£¬£¬£¬£¬½«¿ª´´Î£ÏÕÏÈÀý¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷£¬£¬£¬£¬£¬ÆäÖ§³ÖAIÓÃÓÚÕýµ±¶ÔÍâÇ鱨ʹÃü£¬£¬£¬£¬£¬µ«´ó¹æÄ£º£ÄÚ¼à¿ØÓëÃñÖ÷¼ÛÖµ¹ÛÏà㣣¬£¬£¬£¬£¬ÇÒAIÇý¶¯µÄ´ó¹æÄ£¼à¿Ø¶Ô»ù±¾×ÔÓÉ×é³ÉÐÂÐÍΣº¦¡£¡£¡£¡£¡£¹«Ë¾Ô®Òý¡¶ÃÀÍõ·¨µä¡·µÚ10±àµÚ3252Ìõ£¬£¬£¬£¬£¬Ö¸³ö¹©Ó¦Á´Î£º¦È϶¨½öÓ°ÏìÕ½Õù²¿ÌõÔ¼ÖеÄClaudeʹÓ㬣¬£¬£¬£¬²»Ó°ÏìÆäËû¿Í»§¡£¡£¡£¡£¡£
https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html
6. Íþ˹¿µÐǵ¤ÂóÑ§ÇøÔâÍøÂçÊÂÎñÖÂÎåÈÕ¶ÏÍø
3ÔÂ2ÈÕ£¬£¬£¬£¬£¬Íþ˹¿µÐÇÖݵ¤Âó´åµ¤ÂóÑ§ÇøÒò"ÍøÂçÊÂÎñ"Ò»Á¬Îå¸öÉÏ¿ÎÈÕÎÞ·¨ÁªÍø£¬£¬£¬£¬£¬Ô¼1500ÃûK-12ѧÉú¼°½ÌÖ°Ô±¹¤±»ÆÈʹÓÃÖ½ÖÊÖÊÁϽÌѧ£¬£¬£¬£¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ1ÔÂ30ÈÕÖÁ2ÔÂ5ÈÕ¡£¡£¡£¡£¡£µ¤ÂóÐÂÎÅÍø2ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉ"ÍøÂçÊÂÎñ"Òý·¢£¬£¬£¬£¬£¬µ«Î´Ã÷È·¹¥»÷ÀàÐÍ£»£»£»£»Ñ§ÇøÍøÂçÌṩÉÌWiscNetµÄ״̬ÊÂÎñÏÔʾ£¬£¬£¬£¬£¬Ñ§Çø"½»½Ó¶Ë¿Ú"å´»ú7Ì죬£¬£¬£¬£¬»ù´¡Ôµ¹ÊÔÓɱêעΪ"ÄÚ²¿Ôµ¹ÊÔÓÉ"¡£¡£¡£¡£¡£×èÖ¹3ÔÂ3ÈÕ£¬£¬£¬£¬£¬Ñ§Çø¹ÙÔ±ÉÐδ¹ûÕæÏêϸÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÊÜÓ°Ïìϵͳ¹æÄ£¡¢Êý¾ÝÊÇ·ñ±»»á¼û¡¢ÊÇ·ñÉæ¼°Ö´·¨²¿·Ö»òÍⲿÏìÓ¦¹«Ë¾½éÈëµÈϸ½Ú¡£¡£¡£¡£¡£ÀÕË÷Èí¼þ×·×ÙÍøÕ¾ransomware.live½«Ñ§ÇøÓòÃûdenmark.k12.wi.usÁÐΪÍþв×éÖ¯"Incransom"µÄÊܺ¦Õߣ¬£¬£¬£¬£¬¸Ã×éÖ¯Éù³Æ3ÔÂ1ÈÕ·¢Ã÷¹¥»÷£¬£¬£¬£¬£¬µ«Õâһ˵·¨×Ô¼ºÎÞ·¨Ö¤ÊµÀÕË÷Èí¼þ»òÊý¾Ý͵ÇÔÏÖʵ±¬·¢¡£¡£¡£¡£¡£Ñ§Çø¶ÔýÌåÖÃÆÀÇëÇóδÓè»ØÓ¦¡£¡£¡£¡£¡£µ¤ÂóÑ§ÇøÁýÕÖ²¼ÀÊÏØ¡¢ÂíÄáÍÐÎÖ¿ËÏØºÍ»ùÎÖÄáÏØ²¿·ÖÇøÓò£¬£¬£¬£¬£¬´Ë´Î¶ÏÍø²»µ«Ó°ÏìÒ»Ñùƽ³£½Ìѧ£¬£¬£¬£¬£¬¸ü̻¶³ö½ÌÓý»ú¹¹ÔÚÍøÂçÇå¾²·À»¤·½ÃæµÄųÈõÐÔ¡£¡£¡£¡£¡£
https://dysruptionhub.com/denmark-schools-outage-wisconsin/


¾©¹«Íø°²±¸11010802024551ºÅ