ÐǰͿËÅû¶Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÊý°ÙÃûÔ±¹¤

°ä²¼¹¦·ò 2026-03-16

1. ÐǰͿËÅû¶Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÊý°ÙÃûÔ±¹¤


3ÔÂ13ÈÕ£¬È«Çò×î´ó¿§·ÈÁ¬ËøÆ·ÅÆÐǰͿ˽üÈÕÅûÂ¶Ò»Â·ÖØ´óÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°Êý°ÙÃûÔ±¹¤ÕË»§±»µÁ¡£¡£¡£¸Ã¹«Ë¾Õ¼Óг¬38ÍòÃûÔ±¹¤¼°½ü4.1Íò¼ÒÃŵ꣬±é²¼È«Çò88¸ö¹ú¶È¡£¡£¡£¾ÝÆäÏòÃåÒòÖÝ×ܼì²ì³¤Ìá½»µÄ֪ͨÎļþÏÔʾ£¬2026Äê2ÔÂ6ÈÕ£¬ÐǰͿ˷¢ÏÖ²¿ÃźÏ×÷ͬ°éÖÐÐÄÕË»§Ôâδ¾­ÊÚȨ½Ó¼û£¬¾­ÓëÍâ²¿ÍøÂ簲ȫר¼Ò½áºÏµ÷²éÈ·ÈÏ£¬¹¥»÷Õßͨ¹ýαÔìµÇÂ¼Ò³Ãæ»ñȡƾ֤£¬ÔÚ1ÔÂ19ÈÕÖÁ2ÔÂ11ÈÕÆÚ¼äÈëÇÖÁË889¸öÔ±¹¤ÕË»§¡£¡£¡£ÕâЩÕË»§´æ´¢×ÅÔ±¹¤Ð¡ÎÒÐÅÏ¢¡¢¡¢¸£Àû¼°ÈËÁ¦×ÊÔ´Êý¾Ý£¬Ð¹Â¶ÄÚÈÝÔ̺¬ÐÕÃû¡¢¡¢Éç»á±£ÏÕºÅÂë¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢½ðÈÚÕË»§¼°Â·ÓɺÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£ÐǰͿËÔÚÊÂÎñ·¢ÏÖºóÁ¢¼´Æô¶¯Ó¦¼±ÏìÓ¦£º£ºÍ¨Öª·¨ÂÉ»ú¹¹¡¢¡¢½¨ÒéÔ±¹¤¼à¿ØÒøÐÐÕË»§Òì³£»£»î¶¯£¬²¢Í¨¹ýExperian IdentityWorksΪÊÜÓ°ÏìÔ±¹¤ÌṩÁ½ÄêÃâ·ÑÉí·Ý͵ÇÔ±£»£»¤¼°ÐÅÓþ¼à¿Ø·þÎñ¡£¡£¡£Í¬Ê±£¬¹«Ë¾°µÊ¾ÒѼÓÇ¿ÕË»§½Ó¼ûÓйصݲȫ½ÚÖÆ´ëÊ©£¬µ«Î´Ú¹ÊÍΪºÎÔÚ·¢ÏÖ¹¥»÷ºóÎåÌì²ÅÒÆ³ýÊÜÓ°ÏìÕË»§¡£¡£¡£


https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/


2. ¹È¸è´¹Î£°ä²¼Chrome 146¸üÐÂÐÞ¸´¸ßΣÁãÈÕ·ì϶


3ÔÂ13ÈÕ£¬¹È¸è°ä·¢´¹Î£°ä²¼Chrome 146°æ±¾¸üУ¬ÖصãÐÞ¸´Á½¸öÒѱ»ÏÖʵÀûÓõÄÁãÈÕ·ì϶£¬CVE-2026-3909ÓëCVE-2026-3910£¬Á½ÕßCVSSÆÀ·Ö¾ù´ï8.8£¬Êô¸ßΣ¼¶±ð¡£¡£¡£¾Ý¹È¸è²¼¸æ£¬¹¥»÷ÕßÒÑͨ¹ýαÔìµÇÂ¼Ò³ÃæµÈ¼¿Á©ÔÚÕæÊµ»·¾³ÖÐÀûÓÃÕâЩ·ì϶¡£¡£¡£CVE-2026-3909ΪSkiaͼÐοâÖеÄÔ½½çдÈëȱµã£¬¶ñÒâHTMLÒ³Ãæ¿É´¥·¢ÄÚ´æ°Ü»µ£¬µ¼ÖÂËÁÒâ´úÂëÖ´Ðлò·¨Ê½±ÀÀ££»£»CVE-2026-3910ÔòÊÇV8 JavaScriptÒýÇæµÄ²»Êʵ±ÊµÏÖ·ì϶£¬¹¥»÷Õ߿ɻú¹Ø¶ñÒâÒ³ÃæÖ´ÐÐËÁÒâ´úÂ룬ÇÒV8·ì϶³£±»ÓÃÓÚɳÏäÌÓÒݹ¥»÷¡£¡£¡£Õâ´ÎÐÞ¸´¸²¸ÇWindows¡¢¡¢macOS£¨°æ±¾146.0.7680.75/76£©¡¢¡¢Linux£¨146.0.7680.75£©¼°Android£¨146.0.76380.115£©Æ½Ì¨¡£¡£¡£³ýÁãÈÕ·ì϶Í⣬Chrome 146²»±ä°æÉý¼¶Á½Ììºó£¬¹Ù·½»¹´¹Î£ÐÞ¸´ÁË29¸ö·ì϶£¬Éæ¼°WebML¡¢¡¢Web Speech¡¢¡¢Agents¡¢¡¢WebMCP¡¢¡¢Extensions¡¢¡¢TextEncoding¡¢¡¢MediaStream¡¢¡¢WebMIDI¡¢¡¢WindowDialogµÈ¶à¸öÄ£¿£¿£¿é£¬Ô̺¬¸ßΣ¼°ÖеÍΣÎÊÌâ¡£¡£¡£


https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/


3. »ùÓÚRustµÄVENON¶ñÒâÈí¼þ¹¥»÷33¼Ò°ÍÎ÷ÒøÐÐ


3ÔÂ12ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶ÁËÒ»¿îÕë¶Ô°ÍÎ÷Óû§µÄRust˵»°±àÐ´ÒøÐжñÒâÈí¼þVENON£¬ÆäÓÚ2026Äê2Ô³õ´Î±»·¢ÏÖ£¬ÓÉZenoX¹«Ë¾¶¨Ãû¡£¡£¡£ÓëÀ­¶¡ÃÀÖÞ´«Í³»ùÓÚDelphiµÄÒøÐÐľÂí£¨ÈçGrandoreiro¡¢¡¢Mekotio£©·ÖÆç£¬VENONѡȡRustÖØÐ´²¢À©´óÁ˳ÉÊìľÂíÖ°ÄÜ£¬Ð迪·¢Õ߾߱¸Éîºñ¼¼Êõ¾­Ñ飬ÇÒ´úÂë½á¹¹ÏÔʾÆäÀûÓÃÌìÉúʽAI½øÐпª·¢¡£¡£¡£¸ÃľÂíͨ¹ýDLL²à¼ÓÔØ¼¼Êõ´«²¼£¬½áºÏClickFixÉç»á¹¤³ÌÕ½ÊõÓÕÆ­Óû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔØº¬ÔغɵÄZIP°ü¡£¡£¡£VENONµÄ¹¥»÷Á´Ô̺¬¾Å²ã¶ã±Ü¼¼Êõ£º£º·´É³Ïä²é³­¡¢¡¢¼ä½ÓϵͳŲÓᢡ¢ETW/AMSIÈÆ¹ýµÈ£¬Ö´Ðкó»á½Ó¼ûGoogle Cloud Storage»ñÈ¡ÅäÖã¬×°ÖôòË㹤×÷£¬²¢Í¨¹ýWebSocket³ÉÁ¢C2Ïνӡ£¡£¡£ÆäÖ÷ÌâÖ°ÄÜÔ̺¬Õë¶Ô33¼Ò½ðÈÚ»ú¹¹µÄ´°¿Ú±êÌâºÍÓòÃû¼à¿Ø£¬½öµ±Ö¸±êÀûÓÃÆô¶¯Ê±¼¤»î£¬Í¨¹ýÐéα¸²¸Ç²ãÇÔȡʹ´¦¡£¡£¡£VENONÔçÆÚÑù±¾Â¶³öÁË¿ª·¢Õßõè¾¶"C:\Users\byst4"£¬µ«ÉÐδ¹ØÁªÒÑÖª×éÖ¯¡£¡£¡£


https://thehackernews.com/2026/03/rust-based-venon-malware-targets-33.html


4. PayloadÀÕË÷Èí¼þÍŻ﹥»÷°ÍÁֻʼÒÒ½Ôº


3ÔÂ15ÈÕ£¬½üÈÕ£¬PayloadÀÕË÷Èí¼þÍÅ»ïÐû³ÆÒÑÈëÇÖ°ÍÁֻʼÒÒ½Ôº£¨RBH£©£¬ÇÔÈ¡110GBÃô¸ÐÊý¾Ý£¬²¢½«¸ÃÒ½ÁÆ»ú¹¹ÁÐÈëÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬Í¬²½°ä²¼±»ÈëÇÖϵͳ¾µÏñ×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£¸ÃÍÅ»ïÍþв³Æ£¬ÈôÊܺ¦ÕßδÔÚ3ÔÂ23ÈÕǰ֧¸¶Êê½ð£¬½«¹«¿ªÐ¹Â¶È«Êý±»µÁÊý¾Ý£¬Òý·¢¹ú¼ÊÍøÂ簲ȫÁìÓò¸ß¶È¹Ø×¢¡£¡£¡£°ÍÁֻʼÒÒ½Ôº³ÉÁ¢ÓÚ2011Ä꣬×÷ΪռÓÐ70ÕÅ´²Î»µÄ×ÛºÏÒ½ÁÆ»ú¹¹£¬Æä·þÎñÁìÓòº­µ²×¡Ôº¡¢¡¢ÃÅÕï¡¢¡¢Íâ¿ÆÊÖÊõ¡¢¡¢²ú¿Æ»¤Àí¼°Õï¶ÏµÈÖ÷ÌâÒ½ÁÆÒµÎñ£¬·þÎñ¶ÔÏó²»½öÔ̺¬°ÍÁÖ±¾ÍÁ»¼Õߣ¬»¹·øÉä°¢Âü¡¢¡¢¿¨Ëþ¶û¡¢¡¢É³Ìذ¢À­²®¡¢¡¢°¢ÁªÇõµÈÁÚ¹ú£¬ÓµÓÐÇøÓòÐÔÒ½ÁÆÊàŦµÄÖØÒªÖ°Î»¡£¡£¡£Õâ´ÎÊý¾Ýй¶¿ÉÄÜÉæ¼°»¼ÕßÒþÖÔ¡¢¡¢Ò½ÁƼͼµÈ¸ß¶ÈÃô¸ÐÐÅÏ¢£¬¶ÔÒ½ÔºÔËÓª¼°»¼ÕßȨÀû×é³ÉÑÏÖØÍþв¡£¡£¡£PayloadÀÕË÷Èí¼þ×÷ΪÐÂÐËÍøÂç·¸×﹤¾ß£¬Ñ¡È¡"Ë«ÖØÀÕË÷"ģʽ£¬Í¨¹ýÊý¾ÝÇÔÈ¡ÓëÎļþ¼ÓÃÜË«ÖØ¼¿Á©ÏòÊܺ¦Õßʩѹ¡£¡£¡£¸ÃÍÅ»ïÖØÒª¶Ô×¼ÐÂÐËÊг¡ÖдóÐÍÆóÒµ£¬¹¥»÷Ö¸±êÉæ¼°·¿µØ²ú¡¢¡¢ÎïÁ÷µÈ¶à¸öÐÐÒµ£¬Õ¹Ê¾³ö¿çÐÐ񵃿ÈëÄÜÁ¦¡£¡£¡£


https://securityaffairs.com/189467/cyber-crime/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital.html


5. FBIµ÷²éSteamƽ̨¶ñÒâÓÎÏ·ÊÂÎñ


3ÔÂ13ÈÕ£¬ÃÀ¹úÁª°îµ÷²é¾ÖÎ÷ÑÅͼ·Ö¾ÖÕý¶ÔSteamƽ̨ÉÏ´«µÄ°Ë¿î¶ñÒâÓÎÏ··¢Õ¹µ÷²é£¬ÕâЩÓÎÏ·ÔÚ2024Äê5ÔÂÖÁ2026Äê1ÔÂÆÚ¼äͨ¹ýǶÈë¶ñÒâÈí¼þÇÔÈ¡Íæ¼ÒÐÅÏ¢¡£¡£¡£FBIºôÓõÊÜÓ°ÏìÓû§Ìîд¹Ù·½±í¸ñ£¬Öصãµ÷²é¼ÓÃÜÇ®±Ò͵ÇÔ¡¢¡¢ÕË»§½Ù³Ö¼°Í¨Ñ¶¼Í¼£¬ÒÔ×·×Ù·¸×ïÁ´Ìõ²¢±£»£»¤Êܺ¦ÕßȨÀû¡£¡£¡£ÉæÊÂÓÎÏ·Ô̺¬BlockBlasters¡¢¡¢Chemia¡¢¡¢Dashverse/DashFPS¡¢¡¢Lampy¡¢¡¢Lunara¡¢¡¢PirateFiºÍTokenova¡£¡£¡£ÆäÖУ¬BlockBlasters×÷ΪÃâ·Ñ2Dºá°æÓÎÏ·£¬×î³õÉÏ´«Ê±Îª¡°¸É¾»·¨Ê½¡±£¬µ«ºóÐø±»Ö²Èëcryptodrainer¶ñÒâÈí¼þ£¬µ¼ÖÂÓÎÏ·Ö÷²¥Raivo PlavnieksÔÚÖ±²¥³ï¿îÆÚ¼äËðʧ³¬3.2ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡£¡£¡£Çø¿éÁ´µ÷²éÔ±ZachXBT¹À¼Æ£¬¹¥»÷Õß´Ó261¸öSteamÕË»§ÇÔȡԼ15ÍòÃÀÔª£¬¶øÍøÂ簲ȫ×êÑÐÔ±VX-UndergroundÔòÖ¸³öÊܺ¦ÕßÈËÊý¸ß´ï478ÈË¡£¡£¡£ÔÚ¶ñÒâÉú¼Æ½¨ÔìÓÎÏ·¡¶Chemia¡·ÖУ¬Íþв×éÖ¯EncryptHubÖ²ÈëÁËHijackLoader¶ñÒâÈí¼þ£¬¸ÃÈí¼þ»áÏÂÔØVidarÐÅÏ¢ÇÔÈ¡·¨Ê½£¬²¢×°Öö¨ÖưæFickle Stealer£¬ÓÃÓÚÇÔȡƾ֤¡¢¡¢ä¯ÀÀÆ÷Êý¾Ý¡¢¡¢CookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£PirateFiÓÎÏ·ÔòÓÚ2025Äê2ÔÂÔÚSteamÉϼÜÔ¼Ò»ÖÜ£¬´«²¼VidarÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¿ÉÄÜÓ°Ïì¶à´ï1500ÃûÓû§¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-seeks-victims-of-steam-games-used-to-spread-malware/


6. ²¨À¼ºË×êÑÐÖÐÐÄÔâÍøÂç¹¥»÷


3ÔÂ13ÈÕ£¬²¨À¼¹ú¶ÈºË×êÑÐÖÐÐÄ£¨NCBJ£©½üÈÕ°ä·¢ÆäIT»ù´¡ÉèÊ©Ôâ·êÍøÂç¹¥»÷δË죬µ«µÃÒæÓÚ°²Õûϵͳ¼±¾çÏìÓ¦¼°ÍŶӸßЧºÏ×÷£¬³É¹¦±£»£»¤Ö¸±êϵͳÆëÈ«ÐÔ£¬Î´¶ÔÔËÓªÔì³ÉÈκÎÓ°Ïì¡£¡£¡£¸ÃÖÐÐÄ×÷Ϊ²¨À¼ºË¿ÆÑ§×êÑÐÖ÷Ìâ˼¹¹£¬ÔËÐÐ×ÅÅ·ÖÞ×î׳´óµÄ×êÑз´Ó³¶ÑÖ®Ò»ÂêÀöÑÇ·´Ó³¶Ñ£¬³Ðµ£×źËÄÜ×êÑС¢¡¢Í¬Î»Ëسö²ú¼°¹ú¼Ê¿ÆÑкÏ×÷µÈ¹Ø¼ü¹¤×÷¡£¡£¡£Õâ´Î¹¥»÷²úÉúÔÚ¡°×î½ü¼¸Ì족£¬¹¥»÷¹æÄ£ÓÐÏÞµ«ÒâÍ¼Í»ÆÆ°²±£ÏµÍ³£¬×îÖÕ±»°²È«ÍŶÓÓÐЧÀ¹½Ø¡£¡£¡£¾ÝÖÐÐÄÖ÷ÈÎÑſⲼ¡¤¿âÅå´Ä»ù֤ʵ£¬³ö²ú¡¢¡¢×êÑм°·´Ó³¶ÑÔËÐоùδÖжÏ£¬ÂêÀöÑÇ·´Ó³¶Ñ³ÖÐøÒÔÂú¹¦Âʰ²È«ÔËÐС£¡£¡£²¨À¼µ±¾ÖÕýÓë¹ú¶È°²È«¾Ö-¹«¹²ÀûÒæ×êÑÐËù£¨NASK-PIB£©¡¢¡¢Êý×ÖÊÂÎñ²¿¡¢¡¢¸±×ÜÀí°ì¹«ÊÒ¼°ÄÜÔ´²¿µÈ¶à²¿ÃÅЭͬӦ¶Ô£¬È·±£¹Ø¼ü»ù´¡ÉèÊ©»ñµÃµÚÒ»Á÷±ð·À»¤¡£¡£¡£Êý×ÖÊÂÎñ²¿³¤½üÈÕʲÍзò¡¤¼Ó·ò¿Æ·ò˹»ùй©£¬³õ´ëÊ©²éÏÔʾ¹¥»÷ÆðÔ´ÓëÒÁÀÊ´æÔÚ¹ØÁª£¬µ«Ç¿µ÷Ðè´ý×îÖÕÐÅÏ¢ºËʵºó·½¿ÉÈ·ÈÏ£¬Í¬Ê±¾¯Ê¾Óйؼ£Ïó¿ÉÄÜ´æÔÚÎóµ¼ÐÔ¡£¡£¡£


https://securityaffairs.com/189399/security/hackers-targeted-polands-national-centre-for-nuclear-research.html