ÈðµäOutpost24¹«Ë¾¸ß¹ÜÔâKratos´¹ÂÚ¹¥»÷
Ðû²¼Ê±¼ä 2026-03-181. ÈðµäOutpost24¹«Ë¾¸ß¹ÜÔâKratos´¹ÂÚ¹¥»÷
3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Èðµä̻¶ÖÎÀíÓëÉí·ÝÇå¾²¹«Ë¾Outpost24µÄ×Ó¹«Ë¾Specops Software¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ò»ÃûC¼¶¸ß¹Ü³ÉÎªÖØ´ó´¹ÂÚ¹¥»÷µÄÄ¿µÄ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¿ÉÄÜʹÓÃÁËÃûΪKratosµÄ´¹ÂÚ¼´Ð§À͹¤¾ß°ü£¬£¬£¬£¬£¬£¬½ÓÄÉÆß²½¹¥»÷Á´£¬£¬£¬£¬£¬£¬Ê¹Ó÷ֲã»ù´¡ÉèÊ©ºÍÕýµ±Ð§À͹æ±Ü¼ì²â¡£¡£¡£¡£¡£¹¥»÷Õßð³ä½ðÈÚЧÀÍÌṩÉÌJP Morgan£¬£¬£¬£¬£¬£¬½«´¹ÂÚÓʼþαװ³ÉÏÖÓÐÓʼþÏ̵߳ÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬Ô¼ÇëÊÕ¼þÈËÉó²é²¢Ç©ÊðÎļþ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ½¸öDomainKeys Identified Mail(DKIM) ÊðÃûÈ·±£Óʼþͨ¹ýDMARCÑéÖ¤£¬£¬£¬£¬£¬£¬ÔöÌí¿ÉÐŶȡ£¡£¡£¡£¡£ÓʼþÖаüÀ¨Ö¸ÏòCiscoÕýµ±ÓòÃûsecure-web.cisco.comµÄ"Éó²éÎļþ"Á´½Ó£¬£¬£¬£¬£¬£¬¸ÃÓòÃûͨ³£ÓÃÓÚCiscoÑéÖ¤ºóÖØÐ´ÓʼþURL¡£¡£¡£¡£¡£¹¥»÷Á´ÏÂÒ»²½Éæ¼°ÖØ¶¨ÏòÖÁÕýµ±ÓʼþAPIƽ̨Nylas£¬£¬£¬£¬£¬£¬È·±£´¹ÂÚÁ´½Óͨ¹ýCisco Secure Web»ù´¡ÉèÊ©ÖØ¶¨Ïò¡£¡£¡£¡£¡£ËæºóÄ¿µÄ±»Öض¨ÏòÖÁÒ»¼ÒÓ¡¶È¿ª·¢¹«Ë¾ÍøÕ¾µÄ×ÓÓòÃû£¬£¬£¬£¬£¬£¬ÔÙÌø×ªÖÁÒ»¸ö×î³õÓÉÖйúʵÌåÓÚ2017Äê×¢²áµÄÓòÃû¡£¡£¡£¡£¡£Óû§×îÖÕ±»Öض¨ÏòÖÁ°²ÅÅÔÚCloudflareºó·½µÄ´¹ÂÚ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬Òþ²ØÔ´Ð§ÀÍÆ÷¡£¡£¡£¡£¡£×îºóÊܺ¦Õß±»·ºÆðÒ»¸ö±ÆÕæµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬£¬ÓÃÓÚÇÔÈ¡Microsoft 365ƾ֤¡£¡£¡£¡£¡£
https://www.securityweek.com/security-firm-executive-targeted-in-sophisticated-phishing-attack/
2. ¶íÂÞ˹±Ë¶ûÄ·ÊÐÍ£³µÖ§¸¶ÏµÍ³ÔâDDoS¹¥»÷̱»¾
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹±Ë¶ûÄ·ÊÐ(Perm)Í£³µÖ§¸¶ÏµÍ³¿ËÈÕÔâÊÜ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷ºó»Ö¸´ÔËÓª¡£¡£¡£¡£¡£¸ÃÊÐÕþ¸®ÖÜһȷÈÏ£¬£¬£¬£¬£¬£¬ÏµÍ³ÏÖÒÑÍêÈ«»Ö¸´Õý³£ÔËÐУ¬£¬£¬£¬£¬£¬ËùÓÐÖ§¸¶·½·¨¾ù¿ÉÕý³£Ê¹Óᣡ£¡£¡£¡£ÍâµØ¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉ´ó¹æÄ£DDoS¹¥»÷ÒýÆð£¬£¬£¬£¬£¬£¬¹¥»÷ѹ¿åÁ˸ÃÊÐ×Ô¶¯Í£³µÖ§¸¶»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂÈ«ÊÐÍ£³µÖ§¸¶ÔÝÍ££¬£¬£¬£¬£¬£¬¼ÝʻԱÎÞ·¨Í¨¹ý¹Ù·½Ó¦ÓóÌÐòºÍÍøÕ¾Ö§¸¶Í£³µ·Ñ¡£¡£¡£¡£¡£3ÔÂ10ÈÕÖÁ3ÔÂ13ÈÕϵͳ̱»¾Ê±´ú£¬£¬£¬£¬£¬£¬¹ÙÔ±ÌåÏÖ¼ÝʻԱ²»»áÒòδ֧¸¶Í£³µ·Ñ¶øÃæÁÙ´¦·Ö¡£¡£¡£¡£¡£±Ë¶ûÄ·Êеĸ¶·ÑÍ£³µÇøÍ¨³£ÔÚÖÜÄ©Ãâ·Ñ¡£¡£¡£¡£¡£ÕâÊǽüÄêÀ´¶íÂÞ˹¶¼»áÍ£³µÏµÍ³ÖÁÉÙµÚÈý´ÎÔâÊÜ´ËÀ๥»÷¡£¡£¡£¡£¡£È¥Äê1Ô£¬£¬£¬£¬£¬£¬¿ËÀ˹ŵ´ï¶û(Krasnodar)ÊмÝʻԱÒòµçÐÅÔËÓªÉÌÔâÊÜDDoS¹¥»÷¶øÎÞ·¨Ö§¸¶Í£³µ·Ñ£¬£¬£¬£¬£¬£¬Ïà¹ØÐ§ÀÍÊܵ½×ÌÈÅ¡£¡£¡£¡£¡£2024Äê10Ô£¬£¬£¬£¬£¬£¬ÌØÎ¬¶ûÊÐ(Tver)Í£³µÖ§¸¶Ò²ÒòÆÆËðÐÔÍøÂç¹¥»÷ÍâµØÕþ¸®ÍøÂç¶øÖÐÖ¹¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú±Ë¶ûÄ·ÊÂÎñÊÇ·ñÓëÏÈǰ¹¥»÷ÓйØÁª£¬£¬£¬£¬£¬£¬ÔÝÎÞºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£
https://therecord.media/cyberattack-russia-parking-system
3. Ó¢¹ú¹«Ë¾×¢²á¾ÖWebFilingЧÀÍÆØÒªº¦Îó²î
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹ú¹«Ë¾×¢²á¾Ö£¨CompaniesHouse£©¿ËÈÕÈ·ÈÏÆäWebFilingÍøÂçfilingЧÀͱ£´æÒªº¦Çå¾²Îó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜʹ¹¥»÷Õß»á¼û500Íò¼Ò×¢²á¹«Ë¾µÄ·Ç¹ûÕæÐÅÏ¢¡£¡£¡£¡£¡£Îó²îÓÚ2025Äê10ÔÂÒýÈëϵͳ£¬£¬£¬£¬£¬£¬2026Äê3ÔÂ12ÈÕÓÉGhostMailÑо¿Ö°Ô±JohnHewitt·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬£¬ËæºóÓÚµ±ÖÜÖÜÄ©Íê³ÉÐÞ¸´¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÈκÎÒѵÇÈÎÃü»§»á¼ûÆäËû¹«Ë¾ÔÚCompaniesHouseƽ̨ÉϵÄÕË»§¡£¡£¡£¡£¡£¹¥»÷ÕßÎÞÐèÌØÊâÊÖÒÕÊÖÒÕ£¬£¬£¬£¬£¬£¬Ö»ÐèÑ¡Ôñ"ΪÁíÒ»¼Ò¹«Ë¾filing"Ñ¡Ï£¬£¬£¬£¬£¬ÊäÈëÄ¿µÄ¹«Ë¾µÄΨһ±àºÅ£¬£¬£¬£¬£¬£¬ÔÚÌáÐÑÊäÈëÑéÖ¤Âëʱ°´Ò»ÔÙ·µ»Ø¼ü£¬£¬£¬£¬£¬£¬¼´¿É×Ô¶¯µÇ¼ĿµÄ¹«Ë¾ÕË»§¡£¡£¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²îµÄ¹¥»÷Õß¿ÉÄÜ»ñÈ¡¶Ê³öÉúÈÕÆÚ¡¢¼ÒͥסַºÍµç×ÓÓÊÏäµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬»¹¿ÉÐ޸Ĺ«Ë¾ÏêϸÐÅÏ¢²¢Ìύδ¾ÊÚȨµÄfilingÎļþ¡£¡£¡£¡£¡£CompaniesHouseÔÚÖÜÒ»Ðû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˸ÃÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÌåÏÖ¸ÃÎÊÌâ½öÓ°ÏìÆäWebFilingЧÀÍ¡£¡£¡£¡£¡£»£»£»£»£»£»ú¹¹Ç¿µ÷£¬£¬£¬£¬£¬£¬Îó²îÖ»ÄÜÓɾÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓ㬣¬£¬£¬£¬£¬Í¨Ë×¹«ÖÚÎÞ·¨»á¼û¡£¡£¡£¡£¡£Îó²îδ̻¶ÃÜÂë¼°Éí·ÝÑéÖ¤Àú³ÌÖÐÍøÂçµÄÐÅÏ¢£¨È绤Õյȣ©¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÎÞ·¨¶ÔÏÖÓÐfilingÎļþ¾ÙÐÐÐ޸ġ£¡£¡£¡£¡£
https://www.securityweek.com/uk-companies-house-exposed-details-of-millions-of-firms/
4. RondoDox½©Ê¬ÍøÂçÉý¼¶¹¥»÷Õ½ÂÔ
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬RondoDox½©Ê¬ÍøÂç¿ËÈÕÉý¼¶¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Õë¶Ô174¸öÎó²îÌᳫÖðÈոߴï15,000´ÎµÄʹÓÃʵÑ飬£¬£¬£¬£¬£¬½ÓÄÉÔ½·¢¼¯ÖкÍÕ½ÂÔ»¯µÄ¹¥»÷Õ½ÂÔ¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾BitsightÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂç×Ô2025Äê5ÔÂ25ÈÕÖÁ2026Äê2ÔÂ16ÈÕʱ´úÒ»Á¬À©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç×îÔçÓÉTrendMicroÓÚ2025Äê6ÔÂ15ÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬ÆäʱÕýÔÚʹÓÃCVE-2023-1389Îó²î¹¥»÷TP-LinkArcherAX21·ÓÉÆ÷¡£¡£¡£¡£¡£ÒԺ󣬣¬£¬£¬£¬£¬RondoDoxÒ»Á¬À©Õ¹¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬º¸ÇDVR¡¢NVR¡¢±Õ·µçÊÓϵͳºÍWebЧÀÍÆ÷µÈ30¶àÖÖ×°±¸ÀàÐÍ¡£¡£¡£¡£¡£2025Äê12Ô£¬£¬£¬£¬£¬£¬CloudSEKÑо¿Ö°Ô±ÖÒÑԸý©Ê¬ÍøÂçÕýÔÚʹÓÃÒªº¦React2ShellÎó²î£¨CVE-2025-55182£©ÔÚÒ×Êܹ¥»÷µÄNext.jsЧÀÍÆ÷ÉÏͶ·Å¶ñÒâÈí¼þºÍ¼ÓÃܿ󹤡£¡£¡£¡£¡£BitsightÑо¿Ö°Ô±ÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ»Á¬ÂÖ»»Ê¹ÓõÄÎó²î£¬£¬£¬£¬£¬£¬ÔÚ174¸öÎó²îÖÐÓ³Éä³ö148¸öCVE£¬£¬£¬£¬£¬£¬ÆäÖÐ15¸öÓйûÕæ¿´·¨ÑéÖ¤µ«ÎÞCVE±àºÅ£¬£¬£¬£¬£¬£¬ÉÐÓÐ11¸öδÕÒµ½¹ûÕæ¿´·¨ÑéÖ¤¡£¡£¡£¡£¡£¹¥»÷»î¶¯·ºÆðº£ÀËÊ½ÌØÕ÷£ºÆÕ±é²âÊԽ׶κó×·ËæÑ¡¶¨Îó²îµÄºã¾ÃʹÓÃÆÚ¡£¡£¡£¡£¡£2025Äê10ÔÂÎó²îʹÓÃÊýÄ¿µÖ´ïµ¥ÈÕ49¸öµÄ·åÖµ£¬£¬£¬£¬£¬£¬ËæºóÎȹÌÔÚ40¸ö×óÓÒ£¬£¬£¬£¬£¬£¬2026ÄêÍ·¼±¾çϽµÖÁ½ö2¸öÎó²î£¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷Õ½ÂÔתÏò¸üÉÙµ«¸üÓÐÓõÄÎó²îʹÓᣡ£¡£¡£¡£
https://securityaffairs.com/189569/malware/rondodox-botnet-expands-arsenal-targeting-174-flaws-and-hits-15000-daily-exploit-attempts.html
5. LeakNetÀÕË÷Èí¼þ½ÓÄÉÐÂÐÍBYOR¹¥»÷ÊÖÒÕ
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬LeakNetÀÕË÷Èí¼þÍÅ»ï¿ËÈÕ½ÓÄÉClickFixÉç»á¹¤³Ì¹¥»÷ÊÖÒÕ»ñÈ¡ÆóÒµÇéÐγõʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢°²ÅÅ»ùÓÚ¿ªÔ´DenoÔËÐÐʱµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2024Äêµ×ÒÔÀ´»îÔ¾£¬£¬£¬£¬£¬£¬Æ½¾ùÿÔ¹¥»÷Ô¼3¸öÊܺ¦Õߣ¬£¬£¬£¬£¬£¬Ëæ×ÅÐÂÊÖÒյĽÓÄÉ£¬£¬£¬£¬£¬£¬Æä¹¥»÷¹æÄ£¿£¿£¿£¿£¿£¿£¿ÉÄܽøÒ»²½À©´ó¡£¡£¡£¡£¡£Çå¾²¹«Ë¾ReliaQuest½«ÕâÖÖÕ½Êõ³ÆÎª"×Ô´øÔËÐÐʱ"£¨BYOR£©¹¥»÷¡£¡£¡£¡£¡£DenoÊÇÕýµ±µÄJavaScript/TypeScriptÔËÐÐʱ£¬£¬£¬£¬£¬£¬ÔÊÐíÔÚϵͳÉÏÖ´ÐÐä¯ÀÀÆ÷ÍâµÄJS/TS´úÂë¡£¡£¡£¡£¡£ÓÉÓÚDeno¾ÓÉÊý×ÖÊðÃûÇÒÕýµ±£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýδ֪¶þ½øÖÆÖ´ÐеÄ×èÖ¹ÁбíºÍ¹ýÂËÆ÷¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý×°ÖÃÕýµ±µÄDeno¿ÉÖ´ÐÐÎļþÀ´ÔËÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬¶ø·Ç°²ÅŸüÈÝÒ×±»±ê¼ÇµÄ×Ô½ç˵¶ñÒâÈí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬£¬´úÂë»áÖ¸ÎÆÊ¶±ðÖ÷»ú¡¢ÌìÉúΨһÊܺ¦ÕßID£¬£¬£¬£¬£¬£¬²¢ÅþÁ¬ÏÂÁî¿ØÖÆÐ§ÀÍÆ÷»ñÈ¡µÚ¶þ½×¶ÎÔØºÉ¡£¡£¡£¡£¡£Í¬Ê±ÔËÐг¤ÆÚÂÖѯѻ·ÒÔÎüÊÕÀ´×ÔÏÂÁî¿ØÖÆÐ§ÀÍÆ÷µÄÐÂÏÂÁî¡£¡£¡£¡£¡£ÔÚºóʹÓý׶Σ¬£¬£¬£¬£¬£¬LeakNetʹÓÃDLL²à¼ÓÔØ¡¢ÏÂÁî¿ØÖÆÐűꡢͨ¹ýklistö¾Ù¾ÙÐÐÆ¾Ö¤·¢Ã÷¡¢Í¨¹ýPsExec¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýÀÄÓÃAmazonS3´æ´¢Í°¾ÙÐÐÔØºÉstagedºÍÊý¾ÝÍâй¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/
6. GlassWorm¹©Ó¦Á´¹¥»÷¾íÍÁÖØÀ´²¨¼°433¸ö×é¼þ
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬GlassWorm¹©Ó¦Á´¹¥»÷»î¶¯¿ËÈÕ¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬Õë¶ÔGitHub¡¢npmºÍVSCode/OpenVSXƽ̨ÉϵÄÊý°Ù¸öÈí¼þ°ü¡¢¿ÍÕ»ºÍÀ©Õ¹Ìᳫе÷¹¥»÷¡£¡£¡£¡£¡£Aikido¡¢Socket¡¢StepSecurityºÍOpenSourceMalwareÉçÇøµÄÑо¿Ö°Ô±±¾Ô¹²Ê¶±ð³ö433¸ö±»¹¥ÏݵÄ×é¼þ¡£¡£¡£¡£¡£×îÐÂÒ»ÂÖGlassWorm¹¥»÷¹æÄ£¸üÎªÖØ´ó£¬£¬£¬£¬£¬£¬²¨¼°200¸öGitHubPython¿ÍÕ»¡¢151¸öGitHubJS/TS¿ÍÕ»¡¢72¸öVSCode/OpenVSXÀ©Õ¹ºÍ10¸önpmÈí¼þ°ü¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×Ïȹ¥ÏÝGitHubÕË»§Ç¿ÖÆÍÆËͶñÒâÌá½»£¬£¬£¬£¬£¬£¬È»ºóÔÚnpmºÍVSCode/OpenVSXÉÏÐû²¼°üÀ¨»ìÏý´úÂëµÄ¶ñÒâÈí¼þ°üºÍÀ©Õ¹ÒÔÌӱܼì²â¡£¡£¡£¡£¡£ÔÚËùÓÐÆ½Ì¨ÉÏ£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂëÿ5ÃëÅÌÎÊÒ»´ÎSolanaÇø¿éÁ´»ñÈ¡ÐÂÖ¸Áî¡£¡£¡£¡£¡£2025Äê11ÔÂ27ÈÕÖÁ2026Äê3ÔÂ13ÈÕʱ´ú£¬£¬£¬£¬£¬£¬¹²·¢Ã÷50±ÊÐÂÉúÒ⣬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ¸üÐÂÔØºÉURL¡£¡£¡£¡£¡£Ö¸ÁîǶÈëÉúÒⱸÍü¼ÖУ¬£¬£¬£¬£¬£¬Ö¸µ¼ÏÂÔØNode.jsÔËÐÐʱ²¢Ö´ÐлùÓÚJavaScriptµÄÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÕë¶Ô¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢Æ¾Ö¤ºÍ»á¼ûÁîÅÆ¡¢SSHÃÜÔ¿ÒÔ¼°¿ª·¢ÕßÇéÐÎÊý¾Ý¡£¡£¡£¡£¡£´úÂë×¢ÊÍÆÊÎöÅú×¢GlassWormÓɶíÓïÍþвÐÐΪÕ߲߻®£¬£¬£¬£¬£¬£¬¶ñÒâÈí¼þÔÚ¼ì²âµ½ÏµÍ³Îª¶íÓïÇéÐÎʱ»áÌø¹ýÖ´ÐС£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-npm-vscode-openvsx/


¾©¹«Íø°²±¸11010802024551ºÅ