StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾

Ðû²¼Ê±¼ä 2026-03-12

1. StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬ £¬²Æ²ú500ǿҽÁƿƼ¼ÆóÒµStrykerÔâÓöÓëÒÁÀÊÇ鱨²¿·ÖÏà¹ØµÄÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯HandalaÌᳫµÄɱ¾øÐÔÍøÂç¹¥»÷¡£ ¡£¡£¸Ã×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þÇÔÈ¡50TBÒªº¦Êý¾Ý²¢É¨³ýÈ«Çò20ÓàÍǫ̀ϵͳ¡¢Ð§ÀÍÆ÷¼°Òƶ¯×°±¸Êý¾Ý£¬£¬£¬£¬£¬ £¬µ¼ÖÂStrykerÔÚ79¸ö¹ú¼ÒµÄ·ÖÖ§»ú¹¹±»ÆÈ¹Ø±Õ£¬£¬£¬£¬£¬ £¬Òý·¢¹«Ë¾½¨ÉèÒÔÀ´×îÑÏÖØÎ£»£»£»£»£»ú¡£ ¡£¡£´Ë´Î¹¥»÷Ôì³ÉStrykerÈ«Çò΢ÈíÇéÐÎÖÜÈ«ÖÐÖ¹£¬£¬£¬£¬£¬ £¬Ô±¹¤Windows×°±¸¼°Òƶ¯ÖÕ¶ËÔÚÈý¸üÔâÔ¶³ÌÊý¾Ý²Á³ý¡£ ¡£¡£¾ÝÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬ £¬²¿·ÖʹÓÃСÎÒ˽¼ÒÊÖ»ú×¢²áÊÂÇéȨÏÞµÄ×°±¸Í¬ÑùɥʧÊý¾Ý£¬£¬£¬£¬£¬ £¬¹«Ë¾±»ÆÈÒªÇóÔ±¹¤Ð¶ÔØIntune¡¢TeamsµÈÖÎÀíÓ¦Óü°VPN¿Í»§¶Ë¡£ ¡£¡£¶àµØ°ì¹«ÊÒÒòϵͳ̱»¾»Ö¸´¡°Ö½±Ê¡±²Ù×÷ģʽ£¬£¬£¬£¬£¬ £¬ÄÚ²¿Ð§ÀÍ»á¼ûÖÐÖ¹Ó°ÏìÒ»Ñùƽ³£ÔËÓª¡£ ¡£¡£Handala×éÖ¯½¨ÉèÓÚ2023Äê12Ô£¬£¬£¬£¬£¬ £¬ÓëÒÁÀÊÇ鱨Çå¾²²¿£¨MOIS£©±£´æ¹ØÁª£¬£¬£¬£¬£¬ £¬´ËǰÒÔÕë¶ÔÒÔÉ«ÁÐ×éÖ¯¼°Ê¹ÓÃÆÆËðÐÔ¶ñÒâÈí¼þ²Á³ý×°±¸ÖøÃû¡£ ¡£¡£¸Ã×é֯ͨ¹ý¸Ä¶¯StrykerµÄEntraµÇÂ¼Ò³ÃæÕ¹Ê¾Æä±ê¼Ç£¬£¬£¬£¬£¬ £¬²¢ÔÚÊý¾Ýй¶ÃÅ»§Ðû²¼Ãô¸ÐÐÅÏ¢¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/


2. WordPress²å¼þAllyÎó²îÖ³¬25ÍòÍøÕ¾ÃæÁÙΣº¦


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬ £¬AllyÊÇElementor¿ª·¢µÄWordPress¿É»á¼ûÐÔ²å¼þ£¬£¬£¬£¬£¬ £¬×°ÖÃÁ¿³¬40Íò´Î£¬£¬£¬£¬£¬ £¬Òò±£´æ±àºÅΪCVE-2026-2313µÄ¸ßΣSQL×¢ÈëÎó²îÒý·¢Çå¾²¾¯Ê¾¡£ ¡£¡£¸ÃÎó²îÓÉAcquia¹¥»÷ÐÔÇå¾²¹¤³ÌʦDrew Webber£¨mcdruid£©·¢Ã÷£¬£¬£¬£¬£¬ £¬ÆäÑÏÖØÐÔÆÀ·Ö¼«¸ß£¬£¬£¬£¬£¬ £¬Ô´ÓÚ²å¼þ4.0.3¼°¸üÔç°æ±¾ÖÐget_global_remediations()ÒªÁì¶ÔÓû§ÌṩµÄURL²ÎÊý´¦Öóͷ£²»µ±£¬£¬£¬£¬£¬ £¬Î´¶ÔSQLÉÏÏÂÎľÙÐгä·ÖÕûÀí£¬£¬£¬£¬£¬ £¬µ¼Ö¹¥»÷Õß¿Éͨ¹ýURL·¾¶×¢ÈëSQLÅÌÎÊ¡£ ¡£¡£WordFenceÊÖÒÕÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬ £¬Ö»¹Üesc_url_raw()º¯ÊýÓÃÓÚURLÇå¾²´¦Öóͷ££¬£¬£¬£¬£¬ £¬µ«ÎÞ·¨×èÖ¹SQLÔª×Ö·û£¨Èçµ¥ÒýºÅ¡¢À¨ºÅ£©µÄ×¢È룬£¬£¬£¬£¬ £¬Ê¹Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»¸½¼ÓÌØÊâSQLÅÌÎÊ£¬£¬£¬£¬£¬ £¬Ê¹ÓûùÓÚʱ¼äµÄäעÊÖÒÕ´ÓÊý¾Ý¿âÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ £¬Îó²îʹÓÃÐèÖª×ã²å¼þÅþÁ¬ElementorÕË»§ÇÒÐÞ¸´Ä£¿£¿£¿é´¦Óڻ״̬µÄÌõ¼þ¡£ ¡£¡£ElementorÓÚ2ÔÂ23ÈÕÐû²¼4.1.0°æ±¾ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬ £¬²¢ÏòÑо¿Ö°Ô±½ÒÏþ800ÃÀÔªÎó²îÉͽ𡣠¡£¡£È»¶ø£¬£¬£¬£¬£¬ £¬WordPress.orgÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬ £¬½öÔ¼36%µÄAllyÓû§Íê³ÉÉý¼¶£¬£¬£¬£¬£¬ £¬ÈÔÓг¬25ÍòÍøÕ¾Ì»Â¶ÔÚCVE-2026-2313Σº¦ÖС£ ¡£¡£


https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/


3. CISA½ôÆÈÒªÇóÕþ¸®»ú¹¹ÐÞ²¹n8n¸ßΣÎó²î


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ç¿ÖÆÒªÇóÁª°î»ú¹¹ÔÚ3ÔÂ25ÈÕǰÐÞ²¹n8nƽ̨±£´æµÄCVE-2025-68613Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬ £¬¸ÃÎó²îÕý±»Æð¾¢Ê¹Óᣠ¡£¡£n8n×÷Ϊ¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨£¬£¬£¬£¬£¬ £¬ÔÚAI¿ª·¢ÖÐÆÕ±éÓÃÓÚÊý¾ÝÉãÈ¡£¬£¬£¬£¬£¬ £¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬£¬£¬ £¬Docker HubÀ­È¡Á¿³¬1ÒڴΣ¬£¬£¬£¬£¬ £¬³£´æ´¢APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ £¬³ÉΪ¹¥»÷ÕßÖØµãÄ¿µÄ¡£ ¡£¡£CVE-2025-68613Ô´ÓÚn8nÊÂÇéÁ÷±í´ïʽÆÀ¹Àϵͳ¶Ô¶¯Ì¬´úÂë×ÊÔ´¿ØÖƲ»µ±£¬£¬£¬£¬£¬ £¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷ÕßÒÔn8nÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£n8nÍŶÓ12ÔÂÐû²¼µÄv1.122.0°æ±¾ÒÑÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬ £¬²¢½¨ÒéÖÎÀíÔ±Á¬Ã¦Éý¼¶¡£ ¡£¡£ÔÝʱ»º½â²½·¥°üÀ¨ÏÞÖÆÊÂÇéÁ÷±à¼­È¨ÏÞÖÁÍêÈ«ÐÅÈÎÓû§¡¢½µµÍ²Ù×÷ϵͳȨÏÞ¼°ÍøÂç»á¼ûÏÞÖÆ¡£ ¡£¡£Shadowserver¼à²â·¢Ã÷£¬£¬£¬£¬£¬ £¬È«Çò³¬4Íò¸öδ´ò²¹¶¡µÄn8nʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬ £¬ÆäÖб±ÃÀÕ¼18,000Óà¸ö£¬£¬£¬£¬£¬ £¬Å·ÖÞ³¬14,000¸ö¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/


4. ±´¶û¾È»¤³µ¹«Ë¾23.8ÍòÈËÊý¾Ýй¶


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬ £¬ÃÀ¹úÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ¾È»¤³µÐ§ÀÍÌṩÉ̱´¶û¾È»¤³µ¹«Ë¾¿ËÈÕÅû¶£¬£¬£¬£¬£¬ £¬Æä2025Äê2Ô±¬·¢µÄÍøÂçÈëÇÖÊÂÎñµ¼Ö½ü23.8ÍòÈËСÎÒ˽¼Ò¡¢²ÆÎñ¼°Ò½ÁÆ¿µ½¡ÐÅϢй¶¡£ ¡£¡£Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎļþ£¬£¬£¬£¬£¬ £¬ºÚ¿ÍÓÚ2025Äê2ÔÂ7ÈÕÖÁ14ÈÕʱ´úÈëÇָù«Ë¾ÍøÂ磬£¬£¬£¬£¬ £¬±´¶û¹«Ë¾ÓÚ2ÔÂ13ÈÕÊ״μì²âµ½Òì³££¬£¬£¬£¬£¬ £¬µ«Ö±ÖÁ4ÔÂ14ÈղŶÔÍâÐû²¼ÊÂÎñ£¬£¬£¬£¬£¬ £¬Ô¼Ò»¸öԺ󣬣¬£¬£¬£¬ £¬MedusaÀÕË÷Èí¼þÍÅ»ïÉù³Æ´Ó±´¶û¹«Ë¾ÇÔÈ¡219.50GBÊý¾Ý£¬£¬£¬£¬£¬ £¬²¢¹ûÕæ²¿·Ö±»µÁÄÚÈÝ¡£ ¡£¡£´Ë´Îй¶µÄÐÅÏ¢¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬ £¬°üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂ룬£¬£¬£¬£¬ £¬ÒÔ¼°²ÆÎñÕË»§¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£ ¡£¡£±´¶û¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬ £¬ÊÂÎñÊÓ²ìÒÑÓÚ2026Äê2ÔÂ20ÈÕÍê³É£¬£¬£¬£¬£¬ £¬È·ÈÏÊý¾Ýй¶¹æÄ£Ô¶³¬×î³õÅû¶µÄ11.4ÍòÈË£¬£¬£¬£¬£¬ £¬ÏÖʵÊÜÓ°ÏìÈËÊý´ï237,830ÈË¡£ ¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»£»ú£¬£¬£¬£¬£¬ £¬±´¶û¹«Ë¾½ÓÄÉÁ˶àÏîµ÷½â²½·¥£ºÖÜÈ«ÔöÇ¿ÍøÂçÇå¾²·À»¤¡¢Ç¿ÖÆÖØÖÃËùÓÐÕË»§ÃÜÂ룬£¬£¬£¬£¬ £¬²¢ÎªÊÜÓ°Ïì¸öÌåÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý±£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬ £¬Í¬Ê±ÌáÐÑÓû§Ð¡ÐÄDZÔÚڲƭ¼°Éí·Ý͵ÇÔΣº¦¡£ ¡£¡£


https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/


5. ¶íAPT28°²ÅŶ¨ÖƶñÒâÈí¼þºã¾Ã¼àÊÓÎÚ¾ü·½


3ÔÂ10ÈÕ£¬£¬£¬£¬£¬ £¬¾ÝESET×îб¨¸æ£¬£¬£¬£¬£¬ £¬Á¥ÊôÓÚ¶íÂÞ˹Áª°î¾üÊÂÇ鱨×ܾ֣¨GRU£©µÚ26165²½¶ÓµÄ¹ú¼Ò¼¶ºÚ¿Í×éÖ¯APT28£¨ÓÖÃû°üÀ¨Fancy Bear¡¢SednitµÈ£©×Ô2024Äê4ÔÂÆð£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÈý¿î¶¨ÖƶñÒâÈí¼þBEARDSHELL¡¢COVENANT¼°SLIMAGENT£¬£¬£¬£¬£¬ £¬¶ÔÎÚ¿ËÀ¼¾ü·½Ö°Ô±¿ªÕ¹ºã¾Ã¼àÊӻ¡£ ¡£¡£SLIMAGENT×÷Ϊ½¹µãÌØ¹¤¹¤¾ß£¬£¬£¬£¬£¬ £¬¿É¼Í¼¼üÅÌÊäÈë¡¢²¶»ñÆÁÄ»½ØÍ¼²¢ÍøÂç¼ôÌù°åÊý¾Ý£¬£¬£¬£¬£¬ £¬ÆäÆðÔ´¿É×·ËÝÖÁAPT28ÔÚ2010ÄêÔÂʹÓõÄXAgentÖ²Èë³ÌÐò¡£ ¡£¡£BEARDSHELLºóÃųÌÐòͨ¹ýÕýµ±Ôƴ洢ЧÀÍIcedrive½¨ÉèÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨µÀ£¬£¬£¬£¬£¬ £¬Ö´ÐÐPowerShellÏÂÁî¡£ ¡£¡£Æä½ÓÄÉÆæÒìµÄ¡°²»Í¸Ã÷ν´Ê¡±»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬ £¬¸ÃÊÖÒÕͬÑù·ºÆðÔÚAPT28ÓÚ2016Äê¹¥»÷ÃÀ¹úÃñÖ÷µ³ÌìÏÂίԱ»á£¨DNC£©Ê±Ê¹ÓõÄXTunnelËíµÀ¹¤¾ßÖС£ ¡£¡£COVENANT×÷Ϊ¿ªÔ´.NETºóÉøÍ¸¿ò¼Ü£¬£¬£¬£¬£¬ £¬¾­Éî¶ÈÐ޸ĺó×Ô2025Äê7ÔÂÆð½ÓÄÉ»ùÓÚÔÆµÄÐÂÍøÂçЭÒ飬£¬£¬£¬£¬ £¬ÀÄÓÃFilenÔÆ´æ´¢Ð§À;ÙÐÐC2ͨѶ¡£ ¡£¡£´Ëǰ£¬£¬£¬£¬£¬ £¬¸Ã¿ò¼Ü±äÌåÔøÊ¹ÓÃpCloud£¨2023Ä꣩¡¢Koofr£¨2024-2025Ä꣩¡£ ¡£¡£


https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html


6. UNC6426ʹÓù©Ó¦Á´¹¥»÷72СʱÍêÈ«ÈëÇÖÔÆÇéÐÎ


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬ £¬nx npm°ü¹©Ó¦Á´2025Äê8ÔÂÔâÆÆËðºó£¬£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßUNC6426ʹÓÃÇÔÈ¡µÄGitHubÁîÅÆ£¬£¬£¬£¬£¬ £¬ÔÚ72СʱÄÚÍê³É¶ÔÊܺ¦ÕßÔÆÇéÐεÄÍêÈ«ÈëÇÖ¡£ ¡£¡£´Ë´Î¹©Ó¦Á´¹¥»÷Ô´ÓÚnx npm°üÒ×Êܹ¥»÷µÄpull_request_targetÊÂÇéÁ÷±»Ê¹Ó㬣¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý¡°Pwn Request¡±¹¥»÷»ñÈ¡ÌáÉýȨÏÞ²¢»á¼ûGITHUB_TOKEN£¬£¬£¬£¬£¬ £¬½«Ä¾Âí»¯°üÍÆË͵½npm×¢²á±í¡£ ¡£¡£Ä¾Âí°ü°üÀ¨QUIETVAULTƾ֤ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬ £¬Í¨¹ýLLM¹¤¾ßɨÃèϵͳÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ £¬Êý¾Ý±»ÉÏ´«ÖÁ¹«¹²GitHub´æ´¢¿â¡£ ¡£¡£Êܺ¦ÕßÔ±¹¤ÔËÐÐNx Console²å¼þʱ´¥·¢¸üУ¬£¬£¬£¬£¬ £¬µ¼ÖÂQUIETVAULTÖ´ÐС£ ¡£¡£UNC6426ʹÓñ»µÁPAT£¬£¬£¬£¬£¬ £¬Í¨¹ýNord Stream¹¤¾ß´ÓCI/CDÇéÐÎÌáÈ¡ÉñÃØ£¬£¬£¬£¬£¬ £¬Ð¹Â¶GitHubЧÀÍÕË»§Æ¾Ö¤ºó£¬£¬£¬£¬£¬ £¬Ê¹Óá°--aws-role¡±²ÎÊýÌìÉúÔÝʱAWS STSÁîÅÆ£¬£¬£¬£¬£¬ £¬ÔÚAWSÇéÐÎפ×ã¡£ ¡£¡£ÓÉÓÚGitHub Actions CloudFormation½ÇɫȨÏÞ¹ý¸ß£¬£¬£¬£¬£¬ £¬¹¥»÷Õß°²ÅÅÐÂAWS Stack£¬£¬£¬£¬£¬ £¬¸½¼ÓAdministratorAccessÕ½ÂÔ£¬£¬£¬£¬£¬ £¬72СʱÄÚ½«È¨ÏÞÌáÉýÖÁÍêÕûÖÎÀíԱȨÏÞ¡£ ¡£¡£Ëæºó£¬£¬£¬£¬£¬ £¬¹¥»÷Õßö¾ÙS3´æ´¢Í°¹¤¾ß¡¢ÖÕÖ¹Éú²úÇéÐÎEC2ºÍRDSʵÀý¡¢½âÃÜÓ¦ÓÃÃÜÔ¿£¬£¬£¬£¬£¬ £¬²¢½«ËùÓÐÄÚ²¿GitHub´úÂë¿âÖØÃüÃûΪ¡°/s1ngularity-repository-[Ëæ»ú×Ö·û]¡±²¢¹ûÕæ¡£ ¡£¡£


https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html