StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
Ðû²¼Ê±¼ä 2026-03-121. StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬²Æ²ú500ǿҽÁƿƼ¼ÆóÒµStrykerÔâÓöÓëÒÁÀÊÇ鱨²¿·ÖÏà¹ØµÄÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯HandalaÌᳫµÄɱ¾øÐÔÍøÂç¹¥»÷¡£¡£¡£¸Ã×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þÇÔÈ¡50TBÒªº¦Êý¾Ý²¢É¨³ýÈ«Çò20ÓàÍǫ̀ϵͳ¡¢Ð§ÀÍÆ÷¼°Òƶ¯×°±¸Êý¾Ý£¬£¬£¬£¬£¬£¬µ¼ÖÂStrykerÔÚ79¸ö¹ú¼ÒµÄ·ÖÖ§»ú¹¹±»ÆÈ¹Ø±Õ£¬£¬£¬£¬£¬£¬Òý·¢¹«Ë¾½¨ÉèÒÔÀ´×îÑÏÖØÎ£»£»£»£»£»ú¡£¡£¡£´Ë´Î¹¥»÷Ôì³ÉStrykerÈ«Çò΢ÈíÇéÐÎÖÜÈ«ÖÐÖ¹£¬£¬£¬£¬£¬£¬Ô±¹¤Windows×°±¸¼°Òƶ¯ÖÕ¶ËÔÚÈý¸üÔâÔ¶³ÌÊý¾Ý²Á³ý¡£¡£¡£¾ÝÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬£¬²¿·ÖʹÓÃСÎÒ˽¼ÒÊÖ»ú×¢²áÊÂÇéȨÏÞµÄ×°±¸Í¬ÑùɥʧÊý¾Ý£¬£¬£¬£¬£¬£¬¹«Ë¾±»ÆÈÒªÇóÔ±¹¤Ð¶ÔØIntune¡¢TeamsµÈÖÎÀíÓ¦Óü°VPN¿Í»§¶Ë¡£¡£¡£¶àµØ°ì¹«ÊÒÒòϵͳ̱»¾»Ö¸´¡°Ö½±Ê¡±²Ù×÷ģʽ£¬£¬£¬£¬£¬£¬ÄÚ²¿Ð§ÀÍ»á¼ûÖÐÖ¹Ó°ÏìÒ»Ñùƽ³£ÔËÓª¡£¡£¡£Handala×éÖ¯½¨ÉèÓÚ2023Äê12Ô£¬£¬£¬£¬£¬£¬ÓëÒÁÀÊÇ鱨Çå¾²²¿£¨MOIS£©±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬´ËǰÒÔÕë¶ÔÒÔÉ«ÁÐ×éÖ¯¼°Ê¹ÓÃÆÆËðÐÔ¶ñÒâÈí¼þ²Á³ý×°±¸ÖøÃû¡£¡£¡£¸Ã×é֯ͨ¹ý¸Ä¶¯StrykerµÄEntraµÇÂ¼Ò³ÃæÕ¹Ê¾Æä±ê¼Ç£¬£¬£¬£¬£¬£¬²¢ÔÚÊý¾Ýй¶ÃÅ»§Ðû²¼Ãô¸ÐÐÅÏ¢¡£¡£¡£
https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/
2. WordPress²å¼þAllyÎó²îÖ³¬25ÍòÍøÕ¾ÃæÁÙΣº¦
3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬AllyÊÇElementor¿ª·¢µÄWordPress¿É»á¼ûÐÔ²å¼þ£¬£¬£¬£¬£¬£¬×°ÖÃÁ¿³¬40Íò´Î£¬£¬£¬£¬£¬£¬Òò±£´æ±àºÅΪCVE-2026-2313µÄ¸ßΣSQL×¢ÈëÎó²îÒý·¢Çå¾²¾¯Ê¾¡£¡£¡£¸ÃÎó²îÓÉAcquia¹¥»÷ÐÔÇå¾²¹¤³ÌʦDrew Webber£¨mcdruid£©·¢Ã÷£¬£¬£¬£¬£¬£¬ÆäÑÏÖØÐÔÆÀ·Ö¼«¸ß£¬£¬£¬£¬£¬£¬Ô´ÓÚ²å¼þ4.0.3¼°¸üÔç°æ±¾ÖÐget_global_remediations()ÒªÁì¶ÔÓû§ÌṩµÄURL²ÎÊý´¦Öóͷ£²»µ±£¬£¬£¬£¬£¬£¬Î´¶ÔSQLÉÏÏÂÎľÙÐгä·ÖÕûÀí£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿Éͨ¹ýURL·¾¶×¢ÈëSQLÅÌÎÊ¡£¡£¡£WordFenceÊÖÒÕÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬Ö»¹Üesc_url_raw()º¯ÊýÓÃÓÚURLÇå¾²´¦Öóͷ££¬£¬£¬£¬£¬£¬µ«ÎÞ·¨×èÖ¹SQLÔª×Ö·û£¨Èçµ¥ÒýºÅ¡¢À¨ºÅ£©µÄ×¢È룬£¬£¬£¬£¬£¬Ê¹Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»¸½¼ÓÌØÊâSQLÅÌÎÊ£¬£¬£¬£¬£¬£¬Ê¹ÓûùÓÚʱ¼äµÄäעÊÖÒÕ´ÓÊý¾Ý¿âÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Îó²îʹÓÃÐèÖª×ã²å¼þÅþÁ¬ElementorÕË»§ÇÒÐÞ¸´Ä£¿£¿£¿é´¦Óڻ״̬µÄÌõ¼þ¡£¡£¡£ElementorÓÚ2ÔÂ23ÈÕÐû²¼4.1.0°æ±¾ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬²¢ÏòÑо¿Ö°Ô±½ÒÏþ800ÃÀÔªÎó²îÉͽ𡣡£¡£È»¶ø£¬£¬£¬£¬£¬£¬WordPress.orgÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬½öÔ¼36%µÄAllyÓû§Íê³ÉÉý¼¶£¬£¬£¬£¬£¬£¬ÈÔÓг¬25ÍòÍøÕ¾Ì»Â¶ÔÚCVE-2026-2313Σº¦ÖС£¡£¡£
https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/
3. CISA½ôÆÈÒªÇóÕþ¸®»ú¹¹ÐÞ²¹n8n¸ßΣÎó²î
3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ç¿ÖÆÒªÇóÁª°î»ú¹¹ÔÚ3ÔÂ25ÈÕǰÐÞ²¹n8nƽ̨±£´æµÄCVE-2025-68613Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£n8n×÷Ϊ¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨£¬£¬£¬£¬£¬£¬ÔÚAI¿ª·¢ÖÐÆÕ±éÓÃÓÚÊý¾ÝÉãÈ¡£¬£¬£¬£¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬£¬£¬£¬Docker HubÀÈ¡Á¿³¬1ÒڴΣ¬£¬£¬£¬£¬£¬³£´æ´¢APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬³ÉΪ¹¥»÷ÕßÖØµãÄ¿µÄ¡£¡£¡£CVE-2025-68613Ô´ÓÚn8nÊÂÇéÁ÷±í´ïʽÆÀ¹Àϵͳ¶Ô¶¯Ì¬´úÂë×ÊÔ´¿ØÖƲ»µ±£¬£¬£¬£¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷ÕßÒÔn8nÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£n8nÍŶÓ12ÔÂÐû²¼µÄv1.122.0°æ±¾ÒÑÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬²¢½¨ÒéÖÎÀíÔ±Á¬Ã¦Éý¼¶¡£¡£¡£ÔÝʱ»º½â²½·¥°üÀ¨ÏÞÖÆÊÂÇéÁ÷±à¼È¨ÏÞÖÁÍêÈ«ÐÅÈÎÓû§¡¢½µµÍ²Ù×÷ϵͳȨÏÞ¼°ÍøÂç»á¼ûÏÞÖÆ¡£¡£¡£Shadowserver¼à²â·¢Ã÷£¬£¬£¬£¬£¬£¬È«Çò³¬4Íò¸öδ´ò²¹¶¡µÄn8nʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬ÆäÖб±ÃÀÕ¼18,000Óà¸ö£¬£¬£¬£¬£¬£¬Å·ÖÞ³¬14,000¸ö¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/
4. ±´¶û¾È»¤³µ¹«Ë¾23.8ÍòÈËÊý¾Ýй¶
3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ¾È»¤³µÐ§ÀÍÌṩÉ̱´¶û¾È»¤³µ¹«Ë¾¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Æä2025Äê2Ô±¬·¢µÄÍøÂçÈëÇÖÊÂÎñµ¼Ö½ü23.8ÍòÈËСÎÒ˽¼Ò¡¢²ÆÎñ¼°Ò½ÁÆ¿µ½¡ÐÅϢй¶¡£¡£¡£Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎļþ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÓÚ2025Äê2ÔÂ7ÈÕÖÁ14ÈÕʱ´úÈëÇָù«Ë¾ÍøÂ磬£¬£¬£¬£¬£¬±´¶û¹«Ë¾ÓÚ2ÔÂ13ÈÕÊ״μì²âµ½Òì³££¬£¬£¬£¬£¬£¬µ«Ö±ÖÁ4ÔÂ14ÈղŶÔÍâÐû²¼ÊÂÎñ£¬£¬£¬£¬£¬£¬Ô¼Ò»¸öÔº󣬣¬£¬£¬£¬£¬MedusaÀÕË÷Èí¼þÍÅ»ïÉù³Æ´Ó±´¶û¹«Ë¾ÇÔÈ¡219.50GBÊý¾Ý£¬£¬£¬£¬£¬£¬²¢¹ûÕæ²¿·Ö±»µÁÄÚÈÝ¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂ룬£¬£¬£¬£¬£¬ÒÔ¼°²ÆÎñÕË»§¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¡£¡£±´¶û¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬ÊÂÎñÊÓ²ìÒÑÓÚ2026Äê2ÔÂ20ÈÕÍê³É£¬£¬£¬£¬£¬£¬È·ÈÏÊý¾Ýй¶¹æÄ£Ô¶³¬×î³õÅû¶µÄ11.4ÍòÈË£¬£¬£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý´ï237,830ÈË¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»£»ú£¬£¬£¬£¬£¬£¬±´¶û¹«Ë¾½ÓÄÉÁ˶àÏîµ÷½â²½·¥£ºÖÜÈ«ÔöÇ¿ÍøÂçÇå¾²·À»¤¡¢Ç¿ÖÆÖØÖÃËùÓÐÕË»§ÃÜÂ룬£¬£¬£¬£¬£¬²¢ÎªÊÜÓ°Ïì¸öÌåÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬Í¬Ê±ÌáÐÑÓû§Ð¡ÐÄDZÔÚڲƼ°Éí·Ý͵ÇÔΣº¦¡£¡£¡£
https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/
5. ¶íAPT28°²ÅŶ¨ÖƶñÒâÈí¼þºã¾Ã¼àÊÓÎÚ¾ü·½
3ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬¾ÝESET×îб¨¸æ£¬£¬£¬£¬£¬£¬Á¥ÊôÓÚ¶íÂÞ˹Áª°î¾üÊÂÇ鱨×ܾ֣¨GRU£©µÚ26165²½¶ÓµÄ¹ú¼Ò¼¶ºÚ¿Í×éÖ¯APT28£¨ÓÖÃû°üÀ¨Fancy Bear¡¢SednitµÈ£©×Ô2024Äê4ÔÂÆð£¬£¬£¬£¬£¬£¬Ê¹ÓÃÈý¿î¶¨ÖƶñÒâÈí¼þBEARDSHELL¡¢COVENANT¼°SLIMAGENT£¬£¬£¬£¬£¬£¬¶ÔÎÚ¿ËÀ¼¾ü·½Ö°Ô±¿ªÕ¹ºã¾Ã¼àÊӻ¡£¡£¡£SLIMAGENT×÷Ϊ½¹µãÌØ¹¤¹¤¾ß£¬£¬£¬£¬£¬£¬¿É¼Í¼¼üÅÌÊäÈë¡¢²¶»ñÆÁÄ»½ØÍ¼²¢ÍøÂç¼ôÌù°åÊý¾Ý£¬£¬£¬£¬£¬£¬ÆäÆðÔ´¿É×·ËÝÖÁAPT28ÔÚ2010ÄêÔÂʹÓõÄXAgentÖ²Èë³ÌÐò¡£¡£¡£BEARDSHELLºóÃųÌÐòͨ¹ýÕýµ±Ôƴ洢ЧÀÍIcedrive½¨ÉèÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨µÀ£¬£¬£¬£¬£¬£¬Ö´ÐÐPowerShellÏÂÁî¡£¡£¡£Æä½ÓÄÉÆæÒìµÄ¡°²»Í¸Ã÷ν´Ê¡±»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬¸ÃÊÖÒÕͬÑù·ºÆðÔÚAPT28ÓÚ2016Äê¹¥»÷ÃÀ¹úÃñÖ÷µ³ÌìÏÂίԱ»á£¨DNC£©Ê±Ê¹ÓõÄXTunnelËíµÀ¹¤¾ßÖС£¡£¡£COVENANT×÷Ϊ¿ªÔ´.NETºóÉøÍ¸¿ò¼Ü£¬£¬£¬£¬£¬£¬¾Éî¶ÈÐ޸ĺó×Ô2025Äê7ÔÂÆð½ÓÄÉ»ùÓÚÔÆµÄÐÂÍøÂçÐÒ飬£¬£¬£¬£¬£¬ÀÄÓÃFilenÔÆ´æ´¢Ð§À;ÙÐÐC2ͨѶ¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬¸Ã¿ò¼Ü±äÌåÔøÊ¹ÓÃpCloud£¨2023Ä꣩¡¢Koofr£¨2024-2025Ä꣩¡£¡£¡£
https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
6. UNC6426ʹÓù©Ó¦Á´¹¥»÷72СʱÍêÈ«ÈëÇÖÔÆÇéÐÎ
3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬nx npm°ü¹©Ó¦Á´2025Äê8ÔÂÔâÆÆËðºó£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßUNC6426ʹÓÃÇÔÈ¡µÄGitHubÁîÅÆ£¬£¬£¬£¬£¬£¬ÔÚ72СʱÄÚÍê³É¶ÔÊܺ¦ÕßÔÆÇéÐεÄÍêÈ«ÈëÇÖ¡£¡£¡£´Ë´Î¹©Ó¦Á´¹¥»÷Ô´ÓÚnx npm°üÒ×Êܹ¥»÷µÄpull_request_targetÊÂÇéÁ÷±»Ê¹Ó㬣¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¡°Pwn Request¡±¹¥»÷»ñÈ¡ÌáÉýȨÏÞ²¢»á¼ûGITHUB_TOKEN£¬£¬£¬£¬£¬£¬½«Ä¾Âí»¯°üÍÆË͵½npm×¢²á±í¡£¡£¡£Ä¾Âí°ü°üÀ¨QUIETVAULTƾ֤ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýLLM¹¤¾ßɨÃèϵͳÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬Êý¾Ý±»ÉÏ´«ÖÁ¹«¹²GitHub´æ´¢¿â¡£¡£¡£Êܺ¦ÕßÔ±¹¤ÔËÐÐNx Console²å¼þʱ´¥·¢¸üУ¬£¬£¬£¬£¬£¬µ¼ÖÂQUIETVAULTÖ´ÐС£¡£¡£UNC6426ʹÓñ»µÁPAT£¬£¬£¬£¬£¬£¬Í¨¹ýNord Stream¹¤¾ß´ÓCI/CDÇéÐÎÌáÈ¡ÉñÃØ£¬£¬£¬£¬£¬£¬Ð¹Â¶GitHubЧÀÍÕË»§Æ¾Ö¤ºó£¬£¬£¬£¬£¬£¬Ê¹Óá°--aws-role¡±²ÎÊýÌìÉúÔÝʱAWS STSÁîÅÆ£¬£¬£¬£¬£¬£¬ÔÚAWSÇéÐÎפ×ã¡£¡£¡£ÓÉÓÚGitHub Actions CloudFormation½ÇɫȨÏÞ¹ý¸ß£¬£¬£¬£¬£¬£¬¹¥»÷Õß°²ÅÅÐÂAWS Stack£¬£¬£¬£¬£¬£¬¸½¼ÓAdministratorAccessÕ½ÂÔ£¬£¬£¬£¬£¬£¬72СʱÄÚ½«È¨ÏÞÌáÉýÖÁÍêÕûÖÎÀíԱȨÏÞ¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬¹¥»÷Õßö¾ÙS3´æ´¢Í°¹¤¾ß¡¢ÖÕÖ¹Éú²úÇéÐÎEC2ºÍRDSʵÀý¡¢½âÃÜÓ¦ÓÃÃÜÔ¿£¬£¬£¬£¬£¬£¬²¢½«ËùÓÐÄÚ²¿GitHub´úÂë¿âÖØÃüÃûΪ¡°/s1ngularity-repository-[Ëæ»ú×Ö·û]¡±²¢¹ûÕæ¡£¡£¡£
https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html


¾©¹«Íø°²±¸11010802024551ºÅ