StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
°ä²¼¹¦·ò 2026-03-121. StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
3ÔÂ11ÈÕ£¬£¬£¬²Æ¸»500ǿҽÁƿƼ¼ÆóÒµStrykerÔâ·êÓëÒÁÀʵý±¨²¿ÃÅÓйصÄÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯HandalaÌáÒéµÄ¸²ÃðÐÔÍøÂç¹¥»÷¡£¡£¡£¸Ã×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þÇÔÈ¡50TB¹Ø¼üÊý¾Ý²¢¶Ï¸ùÈ«Çò20ÓàÍǫ̀ϵͳ¡¢¡¢·þÎñÆ÷¼°Òƶ¯É豸Êý¾Ý£¬£¬£¬µ¼ÖÂStrykerÔÚ79¸ö¹ú¶ÈµÄ·ÖÖ§»ú¹¹±»ÆÈ¹Ø±Õ£¬£¬£¬Òý·¢¹«Ë¾³ÉÁ¢ÒÔÀ´×îÑÏÖØÎ£»ú¡£¡£¡£Õâ´Î¹¥»÷Ôì³ÉStrykerÈ«Çò΢Èí»·¾³È«ÃæÖжϣ¬£¬£¬Ô±¹¤WindowsÉ豸¼°Òƶ¯ÖÕ¶ËÔÚ°ëÒ¹ÔâÔ¶³ÌÊý¾Ý²Á³ý¡£¡£¡£¾ÝÔ±¹¤Ð¹Â©£¬£¬£¬²¿ÃÅʹÓÃСÎÒÊÖ»ú×¢²á¹¤×÷ȨÏÞµÄÉ豸ͬÑùÃÔʧÊý¾Ý£¬£¬£¬¹«Ë¾±»ÆÈÒªÇóÔ±¹¤Ð¶ÔØIntune¡¢¡¢TeamsµÈÖÎÀíµ±Óü°VPN¿Í»§¶Ë¡£¡£¡£¶àµØ°ì¹«ÊÒÒòϵͳ̱»¾¸´Ô¡°Ö½±Ê¡±²Ù×÷ģʽ£¬£¬£¬ÄÚ²¿·þÎñ½Ó¼ûÖжÏÓ°ÏìÈÕ³£ÔËÓª¡£¡£¡£Handala×éÖ¯³ÉÁ¢ÓÚ2023Äê12Ô£¬£¬£¬ÓëÒÁÀʵý±¨°²È«Êý£¨MOIS£©´æÔÚ¹ØÁª£¬£¬£¬´ËǰÒÔÕë¶ÔÒÔÉ«ÁÐ×éÖ¯¼°Ê¹Ó÷ÛËéÐÔ¶ñÒâÈí¼þ²Á³ýÉ豸ÎÅÃû¡£¡£¡£¸Ã×é֯ͨ¹ý´Û¸ÄStrykerµÄEntraµÇÂ¼Ò³ÃæÕ¹Ê¾Æä±êÖ¾£¬£¬£¬²¢ÔÚÊý¾Ýй¶ÃÅ»§°ä²¼Ãô¸ÐÐÅÏ¢¡£¡£¡£
https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/
2. WordPress²å¼þAlly©¶Â±Ã§¬25ÍòÍøÕ¾Ãæ¶Ô·çÏÕ
3ÔÂ11ÈÕ£¬£¬£¬AllyÊÇElementor¿ª·¢µÄWordPress¿É½Ó¼ûÐÔ²å¼þ£¬£¬£¬×°ÖÃÁ¿³¬40Íò´Î£¬£¬£¬Òò´æÔÚ±àºÅΪCVE-2026-2313µÄ¸ßΣSQL×¢Èë·ì϶Òý·¢°²È«¾¯Ê¾¡£¡£¡£¸Ã·ì϶ÓÉAcquia¹¥»÷ÐÔ°²È«¹¤³ÌʦDrew Webber£¨mcdruid£©·¢ÏÖ£¬£¬£¬ÆäÑÏÖØÐÔÆÀ·Ö¼«¸ß£¬£¬£¬Ô´ÓÚ²å¼þ4.0.3¼°¸üÔç°æ±¾ÖÐget_global_remediations()²½Öè¶ÔÓû§ÌṩµÄURL²ÎÊý´¦Öò»µ±£¬£¬£¬Î´¶ÔSQL¸ßµÍÎĽøÐгä·ÖËãÕÊ£¬£¬£¬µ¼Ö¹¥»÷Õß¿Éͨ¹ýURLõè¾¶×¢ÈëSQL²éÎÊ¡£¡£¡£WordFence¼¼Êõ·ÖÎöÖ¸³ö£¬£¬£¬Ö»¹Üesc_url_raw()º¯ÊýÓÃÓÚURL°²È«´¦Ö㬣¬£¬µ«ÎÞ·¨×èÖ¹SQLÔª×Ö·û£¨Èçµ¥ÒýºÅ¡¢¡¢À¨ºÅ£©µÄ×¢È룬£¬£¬Ê¹Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÄܸ½¼Ó¶îÍâSQL²éÎÊ£¬£¬£¬ÀûÓûùÓÚ¹¦·òµÄäע¼¼Êõ´ÓÊý¾Ý¿âÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬·ì϶ÀûÓÃÐèÂú×ã²å¼þÏνÓElementorÕË»§ÇÒÐÞ¸´Ä£¿£¿£¿é´¦Óڻ״̬µÄǰÌá¡£¡£¡£ElementorÓÚ2ÔÂ23ÈÕ°ä²¼4.1.0°æ±¾ÐÞ¸´¸Ã·ì϶£¬£¬£¬²¢Ïò×êÑÐÈËÔ±Ðû¸æ800ÃÀÔª·ì϶Éͽ𡣡£¡£È»¶ø£¬£¬£¬WordPress.orgÊý¾ÝÏÔʾ£¬£¬£¬½öÔ¼36%µÄAllyÓû§ÊµÏÖÉý¼¶£¬£¬£¬ÈÔÓг¬25ÍòÍøÕ¾Â¶³öÔÚCVE-2026-2313·çÏÕÖС£¡£¡£
https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/
3. CISA´¹Î£ÒªÇóµ±¾Ö»ú¹¹ÐÞ²¹n8n¸ßΣ·ì϶
3ÔÂ11ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Ç¿ÖÆÒªÇóÁª°î»ú¹¹ÔÚ3ÔÂ25ÈÕǰÐÞ²¹n8nƽ̨´æÔÚµÄCVE-2025-68613Ô¶³Ì´úÂëÖ´Ðзì϶£¬£¬£¬¸Ã·ì϶Õý±»»ý¼«ÀûÓᣡ£¡£n8n×÷Ϊ¿ªÔ´¹¤×÷Á÷×Ô¶¯»¯Æ½Ì¨£¬£¬£¬ÔÚAI¿ª·¢ÖÐ¿í·ºÓÃÓÚÊý¾ÝÉãÈ¡£¡£¡£¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬Docker HubÀÈ¡Á¿³¬1ÒڴΣ¬£¬£¬³£´æ´¢APIÃÜÔ¿¡¢¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÊý¾Ý£¬£¬£¬³ÉΪ¹¥»÷ÕßÖØµãÖ¸±ê¡£¡£¡£CVE-2025-68613Ô´ÓÚn8n¹¤×÷Á÷±í°×ʽÆÀ¹Àϵͳ¶Ô¶¯Ì¬´úÂë×ÊÔ´½ÚÖÆ²»µ±£¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷ÕßÒÔn8n¹ý³ÌȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£n8nÍŶÓ12Ô°䲼µÄv1.122.0°æ±¾ÒÑÐÞ¸´´Ë·ì϶£¬£¬£¬²¢½¨ÒéÖÎÀíÔ±Á¢¼´Éý¼¶¡£¡£¡£Ò»Ê±»º½â´ëÊ©Ô̺¬Ï޶ȹ¤×÷Á÷±à×ëȨÏÞÖÁÆëÈ«ÐÅÀµÃü»§¡¢¡¢½µµÍ²Ù×÷ϵͳȨÏÞ¼°ÍøÂç½Ó¼ûÏÞ¶È¡£¡£¡£Shadowserver¼à²â·¢ÏÖ£¬£¬£¬È«Çò³¬4Íò¸öδ´ò²¹¶¡µÄn8nʵÀý¶³öÓÚ»¥ÁªÍø£¬£¬£¬ÆäÖб±ÃÀÕ¼18,000Óà¸ö£¬£¬£¬Å·ÖÞ³¬14,000¸ö¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/
4. ±´¶û¾È»¤³µ¹«Ë¾23.8ÍòÈËÊý¾Ýй¶
3ÔÂ11ÈÕ£¬£¬£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ¾È»¤³µ·þÎñÌṩÉ̱´¶û¾È»¤³µ¹«Ë¾½üÈÕÅû¶£¬£¬£¬Æä2025Äê2Ô²úÉúµÄÍøÂçÈëÇÖÊÂÎñµ¼Ö½ü23.8ÍòÈËСÎÒ¡¢¡¢²ÆÕþ¼°Ò½Áƽ¡¿µÐÅϢй¶¡£¡£¡£Æ¾¾ÝÌá½»¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄÎļþ£¬£¬£¬ºÚ¿ÍÓÚ2025Äê2ÔÂ7ÈÕÖÁ14ÈÕÆÚ¼äÈëÇָù«Ë¾ÍøÂ磬£¬£¬±´¶û¹«Ë¾ÓÚ2ÔÂ13ÈÕ³õ´Î¼ì²âµ½Òì³££¬£¬£¬µ«Ö±ÖÁ4ÔÂ14ÈղŶÔÍâ°ä²¼ÊÂÎñ£¬£¬£¬Ô¼Ò»¸öÔº󣬣¬£¬MedusaÀÕË÷Èí¼þÍÅ»ïÐû³Æ´Ó±´¶û¹«Ë¾ÇÔÈ¡219.50GBÊý¾Ý£¬£¬£¬²¢¹«¿ª²¿Ãű»µÁÄÚÈÝ¡£¡£¡£Õâ´Îй¶µÄÐÅÏ¢ÁìÓò¿í·º£¬£¬£¬Ô̺¬ÐÕÃû¡¢¡¢Éç»á±£ÏÕºÅÂë¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢¼ÝÊ»ÅÆÕÕºÅÂ룬£¬£¬ÒÔ¼°²ÆÕþÕË»§¡¢¡¢Ò½ÁƼͼºÍ½¡¿µ±£ÏÕÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£¡£¡£±´¶û¹«Ë¾°µÊ¾£¬£¬£¬ÊÂÎñµ÷²éÒÑÓÚ2026Äê2ÔÂ20ÈÕʵÏÖ£¬£¬£¬È·ÈÏÊý¾Ýй¶¹æÄ£Ô¶³¬×î³õÅû¶µÄ11.4ÍòÈË£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý´ï237,830ÈË¡£¡£¡£ÎªÓ¦¶ÔÕâ´ÎΣ»ú£¬£¬£¬±´¶û¹«Ë¾²ÉÈ¡Á˶àÏî²¹¾È´ëÊ©£º£º£ºÈ«Ãæ¼ÓÇ¿ÍøÂ簲ȫ·À»¤¡¢¡¢Ç¿ÖÆÖØÖÃËùÓÐÕË»§ÃÜÂ룬£¬£¬²¢ÎªÊÜÓ°Ïì¸ö±ðÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ£¬£¬£¬Í¬Ê±ÌáÐÑÓû§¾¯ÌèDZÔÚڲƼ°Éí·Ý͵ÇÔ·çÏÕ¡£¡£¡£
https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/
5. ¶íAPT28²¿Êð¶¨ÖƶñÒâÈí¼þ³Ö¾Ã¼à¶½ÎÚ¾ü·½
3ÔÂ10ÈÕ£¬£¬£¬¾ÝESET×îл㱨£¬£¬£¬´ÓÊôÓÚ¶íÂÞ˹Áª°î¾üʵý±¨×ܾ֣¨GRU£©µÚ26165¶ÓÁеĹú¶È¼¶ºÚ¿Í×éÖ¯APT28£¨±ðºÅÔ̺¬Fancy Bear¡¢¡¢SednitµÈ£©×Ô2024Äê4ÔÂÆð£¬£¬£¬Ê¹ÓÃÈý¿î¶¨ÖƶñÒâÈí¼þBEARDSHELL¡¢¡¢COVENANT¼°SLIMAGENT£¬£¬£¬¶ÔÎÚ¿ËÀ¼¾ü·½ÈËÔ±·¢Õ¹³Ö¾Ã¼à¶½»î¶¯¡£¡£¡£SLIMAGENT×÷ΪÖ÷Ìâ¼äµý¹¤¾ß£¬£¬£¬¿É¼Í¼¼üÅÌÊäÈë¡¢¡¢²¶»ñÆÁÄ»½ØÍ¼²¢ÍøÂç¼ôÌù°åÊý¾Ý£¬£¬£¬Æä·¢Ô´¿É×·ÒäÖÁAPT28ÔÚ2010Äê´úʹÓõÄXAgentÖ²È뷨ʽ¡£¡£¡£BEARDSHELLºóÃÅ·¨Ê½Í¨¹ýºÏ·¨ÔÆ´æ´¢·þÎñIcedrive³ÉÁ¢ºÅÁîÓë½ÚÖÆ£¨C2£©Í¨µÀ£¬£¬£¬Ö´ÐÐPowerShellºÅÁî¡£¡£¡£Æäѡȡ¹ÖÒìµÄ¡°²»Í¨Ã÷ν´Ê¡±»ìºÏ¼¼Êõ£¬£¬£¬¸Ã¼¼ÊõͬÑù³Ê´Ë¿ÌAPT28ÓÚ2016Äê¹¥»÷ÃÀ¹úÃñÖ÷µ³È«¹úίԱ»á£¨DNC£©Ê±Ê¹ÓõÄXTunnelËíµÀ¹¤¾ßÖС£¡£¡£COVENANT×÷Ϊ¿ªÔ´.NETºóÉøÈë¿ò¼Ü£¬£¬£¬¾Éî¶ÈÅú¸Äºó×Ô2025Äê7ÔÂÆðѡȡ»ùÓÚÔÆµÄÐÂÍøÂçºÍ̸£¬£¬£¬ÀÄÓÃFilenÔÆ´æ´¢·þÎñ½øÐÐC2ͨѶ¡£¡£¡£´Ëǰ£¬£¬£¬¸Ã¿ò¼Ü±äÌåÔøÊ¹ÓÃpCloud£¨2023Ä꣩¡¢¡¢Koofr£¨2024-2025Ä꣩¡£¡£¡£
https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
6. UNC6426ÀûÓù©¸øÁ´¹¥»÷72СʱÆëÈ«ÈëÇÖÔÆ»·¾³
3ÔÂ11ÈÕ£¬£¬£¬nx npm°ü¹©¸øÁ´2025Äê8ÔÂÔâ·ÛËéºó£¬£¬£¬ÍþвÐÐΪÕßUNC6426ÀûÓÃÇÔÈ¡µÄGitHubÁîÅÆ£¬£¬£¬ÔÚ72СʱÄÚʵÏÖ¶ÔÊܺ¦ÕßÔÆ»·¾³µÄÆëÈ«ÈëÇÖ¡£¡£¡£Õâ´Î¹©¸øÁ´¹¥»÷Ô´ÓÚnx npm°üÒ×Êܹ¥»÷µÄpull_request_target¹¤×÷Á÷±»ÀûÓ㬣¬£¬¹¥»÷Õßͨ¹ý¡°Pwn Request¡±¹¥»÷»ñÈ¡ÌáÉýȨÏÞ²¢½Ó¼ûGITHUB_TOKEN£¬£¬£¬½«Ä¾Âí»¯°üÍÆË͵½npm×¢²á±í¡£¡£¡£Ä¾Âí°üÔ̺¬QUIETVAULTƾ֤ÇÔÈ¡·¨Ê½£¬£¬£¬Í¨¹ýLLM¹¤¾ßɨÃèϵͳÃô¸ÐÐÅÏ¢£¬£¬£¬Êý¾Ý±»ÉÏ´«´ó¹«¹²GitHub´æ´¢¿â¡£¡£¡£Êܺ¦ÕßÔ±¹¤ÔËÐÐNx Console²å¼þʱ´¥·¢¸üУ¬£¬£¬µ¼ÖÂQUIETVAULTÖ´ÐС£¡£¡£UNC6426ÀûÓñ»µÁPAT£¬£¬£¬Í¨¹ýNord Stream¹¤¾ß´ÓCI/CD»·¾³ÌáÈ¡»úÃÜ£¬£¬£¬Ð¹Â¶GitHub·þÎñÕË»§Í´´¦ºó£¬£¬£¬ÀûÓá°--aws-role¡±²ÎÊýÌìÉúһʱAWS STSÁîÅÆ£¬£¬£¬ÔÚAWS»·¾³°²Éí¡£¡£¡£ÓÉÓÚGitHub Actions CloudFormation½ÇɫȨÏÞ¹ý¸ß£¬£¬£¬¹¥»÷Õß²¿ÊðÐÂAWS Stack£¬£¬£¬¸½¼ÓAdministratorAccessÕ½Êõ£¬£¬£¬72СʱÄÚ½«È¨ÏÞÌáÉýÖÁÆëÈ«ÖÎÀíԱȨÏÞ¡£¡£¡£Ëæºó£¬£¬£¬¹¥»÷Õßö¾ÙS3´æ´¢Í°¶ÔÏ󡢡¢ÖÕÖ¹³ö²ú»·¾³EC2ºÍRDSʵÀý¡¢¡¢½âÃÜÀûÓÃÃÜÔ¿£¬£¬£¬²¢½«ËùÓÐÄÚ²¿GitHub´úÂë¿âÖØ¶¨ÃûΪ¡°/s1ngularity-repository-[Ëæ»ú×Ö·û]¡±²¢¹«¿ª¡£¡£¡£
https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html


¾©¹«Íø°²±¸11010802024551ºÅ