ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖFBI¾Ö³¤Ð¡ÎÒÓÊÏä

°ä²¼¹¦·ò 2026-03-30

1. ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖFBI¾Ö³¤Ð¡ÎÒÓÊÏä


3ÔÂ29ÈÕ£¬£¬£¬ÓëÒÁÀÊÓйصÄHandalaºÚ¿Í×éÖ¯½üÈÕÈëÇÖÁËFBI¾Ö³¤Kash PatelµÄСÎÒµç×ÓÓʼþÕË»§£¬£¬£¬²¢°ä²¼ÁËÕÕÆ¬ºÍÎļþ¡£¡£¡£¡£FBIÒÑÈ·ÈÏÕâ´ÎÈëÇÖ£¬£¬£¬°µÊ¾±»µÁÊý¾Ý²»ÊǽüÆÚµÄ£¬£¬£¬²»Ô̺¬ÈκεÐÔÖÊý¾Ý¡£¡£¡£¡£ÖÜÎ壬£¬£¬HandalaÍþвÐÐΪÕßÔÚÆäÒ»¸öÍøÕ¾Éϰ䷢½«Patel²ÎÓëÊܺ¦ÕßÃûµ¥£¬£¬£¬Ðû³ÆËûÃÇÔÚ¼¸Ð¡Ê±ÄÚ¹¥ÏÂÁË"Ëùν'¼á²»³É´Ý'µÄFBIϵͳ"¡£¡£¡£¡£ºÚ¿Í°µÊ¾£¬£¬£¬ËûÃǵÄÐж¯ÊǶÔFBI¿ÛѺHandalaÓòÃûÒÔ¼°ÃÀ¹úµ±¾ÖΪ¸ÃÍþв×éÖ¯³ÉÔ±ÐÅÏ¢Ìṩ¸ß´ï1000ÍòÃÀÔªÐüÉ͵ĻØÓ¦¡£¡£¡£¡£ºÚ¿ÍÈëÇÖÁËFBI¾Ö³¤µÄСÎÒGmailÊÕ¼þÏä¡£¡£¡£¡£HandalaºÚ¿ÍÔÚ°ä²¼ÈëÇÖÖ¤¾Ýǰ°µÊ¾£º"Kash PatelµÄËùÓÐСÎҺͻúÃÜÐÅÏ¢£¬£¬£¬Ô̺¬µç×ÓÓʼþ¡¢¶Ô»°¡¢ÎļþÉõÖÁ»úÃÜÎļþ£¬£¬£¬´Ë¿Ì¶¼¿É¹«¿ªÏÂÔØ¡£¡£¡£¡£"²¼¸æ°ä²¼ºó²»¾Ã£¬£¬£¬ÍþвÐÐΪÕß°ä²¼ÁËÒ»×é´ÓPatelÊÕ¼þÏäÖÐÌáÈ¡µÄ´øË®Ó¡Ð¡ÎÒÕÕÆ¬ºÍÎļþ£¬£¬£¬ÒÔ¼°³ÉΪFBI¾Ö³¤Ö®Ç°µÄµç×ÓÓʼþͨѶ¡£¡£¡£¡£FBI°µÊ¾£º"FBIÒâʶµ½¶ñÒâÐÐΪÕßÕë¶ÔPatel¾Ö³¤µÄСÎÒµç×ÓÓʼþÐÅÏ¢£¬£¬£¬ÎÒÃÇÒѲÉÈ¡ËùÓбØÒª´ëÊ©¼õÇáÓë´Ë»î¶¯ÓйصÄDZÔÚ·çÏÕ¡£¡£¡£¡£ÓйØÐÅÏ¢ÊǺ¹ÇàÐԵ쬣¬£¬²»Éæ¼°Èκε±¾ÖÐÅÏ¢¡£¡£¡£¡£"


https://www.bleepingcomputer.com/news/security/fbi-confirms-hack-of-director-patels-personal-email-inbox/


2. Smart Slider 3²å¼þ·ì϶ӰÏì80ÍòWordPressÍøÕ¾


3ÔÂ29ÈÕ£¬£¬£¬WordPress²å¼þSmartSlider3½üÈÕ±»Åû¶´æÔÚÒ»¸ö°²È«·ì϶£¬£¬£¬¿É±»¶©ÔÄÕß¼¶±ðÓû§ÀûÓýӼû·þÎñÆ÷ÉÏËÁÒâÎļþ¡£¡£¡£¡£¸Ã·ì϶׷×ÙΪCVE-2026-3098£¬£¬£¬ÓÉ×êÑÐÈËÔ±DmitriiIgnatyev·¢ÏÖ²¢»ã±¨£¬£¬£¬Ó°ÏìSmartSlider3²å¼þ3.5.1.33¼°ÒÔÏÂËùÓа汾¡£¡£¡£¡£SmartSlider3ÊÇ×îÊ¢ÐеÄWordPress²å¼þÖ®Ò»£¬£¬£¬ÓÃÓÚ´´½¨ºÍÖÎÀíͼÏñ»¬¿éºÍÄÚÈÝÂÖ²¥£¬£¬£¬Õ¼Óг¬¹ý80Íò¸ö»îÔ¾ÍøÕ¾×°Öᣡ£¡£¡£¸Ã²å¼þÌṩÒ×ÓÚʹÓõÄÍϷűà×ëÆ÷ºÍ·á˶µÄÄ£°åÑ¡Ôñ¡£¡£¡£¡£¸Ã·ì϶ԴÓÚ²å¼þAJAXµ¼³ö²Ù×÷ÖÐȱʧµÄÖ°Äܲ鳭£¬£¬£¬ÔÊÐíÈκξ­¹ýÉí·ÝÑéÖ¤µÄÓû§£¨Ô̺¬¶©ÔÄÕߣ©Å²ÓÃËüÃÇ¡£¡£¡£¡£Æ¾¾ÝWordPress°²È«¹«Ë¾DefiantµÄ×êÑÐÈËÔ±³Æ£¬£¬£¬actionExportAllº¯Êý²»×ãÎļþÀàÐͺÍÔ´ÑéÖ¤£¬£¬£¬Òò¶øÔÊÐí¶ÁÈ¡ËÁÒâ·þÎñÆ÷Îļþ²¢Ôö³¤µ½µ¼³ö´æµµÖС£¡£¡£¡£IgnatyevÓÚ2ÔÂ23ÈÕÏòWordfence»ã±¨ÁËËûµÄ·¢ÏÖ£¬£¬£¬×êÑÐÈËÔ±ÑéÖ¤ÁËÌṩµÄ¸ÅÄîÑéÖ¤ÀûÓ÷¨Ê½£¬£¬£¬²¢Í¨ÖªÁËSmartSlider3µÄ¿ª·¢ÉÌNextendweb¡£¡£¡£¡£NextendwebÓÚ3ÔÂ2ÈÕÈ·ÈÏÁ˸û㱨£¬£¬£¬²¢ÓÚ3ÔÂ24ÈÕ°ä²¼SmartSlider3.5.1.34°æ±¾½øÐÐÐÞ¸´¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/


3. Å·ÃËίԱ»áÔâShinyHunters¹¥»÷350GBÊý¾Ý±»µÁ


3ÔÂ28ÈÕ£¬£¬£¬Å·ÃËίԱ»á½üÈÕÔâShinyHuntersÍøÂç·¸×ï×éÖ¯¹¥»÷£¬£¬£¬¾Ý±¨µÀÊý¾Ýй¶Ô̺¬Óʼþ·þÎñÆ÷ÄÚÈݺÍÄÚ²¿Í¨Ñ¶ÏµÍ³Êý¾Ý¡£¡£¡£¡£¸ÃÍøÂç·¸×ï×éÖ¯½«Å·ÃËίԱ»áÔö³¤µ½ÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬Ðû³ÆÇÔÈ¡Á˳¬¹ý350GBÊý¾Ý¡£¡£¡£¡£±»µÁÊý¾Ý¿ÉÄÜÔ̺¬Óʼþ·þÎñÆ÷Êý¾Ýת´¢¡¢Êý¾Ý¿â¡¢»úÃÜÎļþ¡¢ºÏͬºÍ¸ü¶àÃô¸Ð×ÊÁÏ¡£¡£¡£¡£3ÔÂ24ÈÕ£¬£¬£¬Å·ÃËίԱ»á¼ì²âµ½Ò»Â·Ó°ÏìÆäEuropa.euÍøÕ¾ÍйÜÔÆ»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷¡£¡£¡£¡£ÊÂÎñѸËٵõ½½ÚÖÆ£¬£¬£¬ÒѲÉÈ¡»º½â´ëÊ©£¬£¬£¬ÍøÕ¾¿ÉÓÃÐÔδÊÜÖжÏ¡£¡£¡£¡£ÔçÆÚµ÷²éÁ˾ÖÅú×¢²¿ÃÅÊý¾Ý¿ÉÄܱ»½Ó¼û£¬£¬£¬ÕýÔÚ֪ͨ¿ÉÄÜÊÜÓ°ÏìµÄÅ·ÃËʵÌå¡£¡£¡£¡£Å·ÃËίԱ»áÔÚÐÂΟåÖаµÊ¾£º"ÎÒÃdzÖÐøµ÷²éµÄÔçÆÚÁ˾ÖÅú×¢Êý¾ÝÒÑ´ÓÕâÐ©ÍøÕ¾±»»ñÈ¡¡£¡£¡£¡£Î¯Ô±»áÕýÔÚÕýʽ֪ͨ¿ÉÄÜÊÜÊÂÎñÓ°ÏìµÄÁªÃËʵÌå¡£¡£¡£¡£"ίԱ»á·þÎñ²¿ÃÅÈÔÔÚµ÷²éÊÂÎñµÄÈ«ÊýÓ°Ïì¡£¡£¡£¡£Î¯Ô±»á°µÊ¾ÆäÄÚ²¿ÏµÍ³Î´ÊÜÓ°Ï죬£¬£¬½«³ÖÐø¼à¿Ø´óÊÆÍ¬Ê±¼ÓÇ¿±£»¤´ëÊ©¡£¡£¡£¡£Î¯Ô±»á½«·ÖÎöÊÂÎñÒÔ¸ÄÉÆÍøÂ簲ȫ£¬£¬£¬ÓÉÓÚÅ·ÃËÃæ¶ÔÕë¶Ô¹Ø¼ü·þÎñºÍ»ú¹¹µÄ³ÖÐøÍøÂçºÍ»ìºÏÍþв¡£¡£¡£¡£


https://securityaffairs.com/190095/data-breach/shinyhunters-claims-the-hack-of-the-european-commission.html


4. TeamPCPÈëÇÖTelnyx Python°üÇÔȡʹ´¦


3ÔÂ27ÈÕ£¬£¬£¬TeamPCPºÚ¿Í×éÖ¯½üÈÕÈëÇÖÁËPython°üË÷Òý£¨PyPI£©ÉϵÄTelnyxÈí¼þ°ü£¬£¬£¬ÉÏ´«Á˶ñÒâ°æ±¾£¬£¬£¬ÕâЩ°æ±¾»á½«ÇÔȡʹ´¦µÄ¶ñÒâÈí¼þ°µ²ØÔÚWAVÎļþÖС£¡£¡£¡£ÀûÓð²È«¹«Ë¾Aikido¡¢SocketºÍEndorLabs¹Û²ìµ½ÁËÕâ´Î¹©¸øÁ´¹¥»÷£¬£¬£¬²¢Æ¾¾ÝÓë֮ǰͳһ¹¥»÷ÕßÔì³ÉµÄÊÂÎñÖÐÒ»ÑùµÄÊý¾Ýй¶ģʽºÍRSAÃÜÔ¿£¬£¬£¬½«Õâ´Î¹¥»÷¹é×ïÓÚTeamPCP¡£¡£¡£¡£½ñÌìÔçЩʱ³½£¬£¬£¬¸ÃÍþвÐÐΪÕß°ä²¼ÁË´øÓкóÃŵÄTelnyxÈí¼þ°ü4.87.1ºÍ4.87.2°æ±¾¡£¡£¡£¡£ÔÚLinuxºÍmacOSϵͳÉÏ£¬£¬£¬¶ñÒâ°æ±¾»á¿ªÊͶñÒâÈí¼þ£¬£¬£¬ÇÔÈ¡SSHÃÜÔ¿¡¢Æ¾Ö¤¡¢ÔÆÁîÅÆ¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢»·¾³±äÁ¿ºÍÆäËûÀàÐ͵İÂÃØÐÅÏ¢¡£¡£¡£¡£ÔÚWindowsϵͳÖУ¬£¬£¬¶ñÒâÈí¼þ»á±»¸éÖÃÔÚÆô¶¯Îļþ¼ÐÖÐÒÔʵÏÖÓÆ¾ÃÐÔ£¬£¬£¬Ã¿´ÎµÇ¼ʱ³ÇÊÐÔËÐС£¡£¡£¡£°²È«×êÑÐÈËÔ±ÒÔΪ£¬£¬£¬ºÚ¿ÍÀûÓÃÇÔÈ¡µÄPyPI×¢²á±í°ä²¼ÕË»§Í´´¦ÈëÇÖÁ˸ÃÏîÄ¿¡£¡£¡£¡£×î³õ£¬£¬£¬TeamPCPÓÚUTC¹¦·ò03:51°ä²¼ÁËTelnyx4.87.1°æ±¾£¬£¬£¬µ«¸ÃÈí¼þ°üÔ̺¬¶ñÒ⵫ÎÞ·¨Õý³£ÔËÐеÄÓÐÐ§ÔØºÉ¡£¡£¡£¡£Ô¼ÄªÒ»Ð¡Ê±ºó£¬£¬£¬¹¥»÷ÕßÓÚUTC¹¦·ò04:07°ä²¼ÁËTelnyx4.87.2°æ±¾£¬£¬£¬ÐÞ¸ÄÁ˸ÃÃýÎ󡣡£¡£¡£Ç¿ÁÒ½¨Ò鿪·¢ÈËÔ±ÈôÊÇ·¢ÏÖÆä»·¾³ÖдæÔÚTelnyx4.87.1»ò4.87.2°æ±¾£¬£¬£¬ÔòÓ¦»Ø¹öµ½4.87.0°æ±¾¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/


5. GitHub¿ª·¢ÕßÔâ´ó¹æÄ£¶ñÒâ´¹µö¹¥»÷


3ÔÂ27ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Ò»³¡Õë¶ÔGitHub¿ª·¢ÕߵĴó¹æÄ£¶ñÒâ¹¥»÷»î¶¯ÕýÔÚÊæÕ¹¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÔÚGitHubÏîÄ¿»áÉÌÇø°ä²¼¼Ù×°³ÉVisual Studio Code£¨VS Code£©°²È«¾¯±¨µÄÐéαÌû×Ó£¬£¬£¬ÓÕµ¼¿ª·¢ÕßÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£ÕâЩÌû×ÓʹÓá°ÑÏÖØ·ì϶-±ØÒªÁ¢¼´¸üС±µÈÕæÌù±êÌ⣬£¬£¬Ðé¹¹CVE ID²¢ÅäÒÔ´¹Î£´ë´Ç£¬£¬£¬ÉõÖÁ¼ÙÒâÕæÊµ´úÂëÊØ»¤Õß»ò×êÑÐÈËÔ±ÒÔ¼ÓÇ¿¿ÉÐŶÈ¡£¡£¡£¡£¸Ã¹¥»÷³öÏÖÏÔÖøµÄ×éÖ¯»¯Ìصã¡£¡£¡£¡£Æ¾¾ÝÀûÓð²È«¹«Ë¾SocketµÄ»ã±¨£¬£¬£¬Êýǧ¸öÏÕЩһÑùµÄÌû×ÓÔڶ̹¦·òÄÚ×Ô¶¯°ä²¼µ½GitHubµÄÊýǧ¸ö´æ´¢¿âÖУ¬£¬£¬É漰н¨»ò²»»îÔ¾ÕË»§¡£¡£¡£¡£ÕâЩÌû×ӻᴥ·¢GitHubµÄµç×ÓÓʼþ֪ͨϵͳ£¬£¬£¬Ö±½Ó·¢ËÍÖÁ±»ÏóÕ÷Óû§ºÍ¹Ø×¢ÕßµÄÊÕ¼þÏ䣬£¬£¬À©´ó´«²¼ÁìÓò¡£¡£¡£¡£Ìû×ÓÖеÄÁ´½ÓÖ¸ÏòGoogle DriveµÈÍⲿ·þÎñ£¬£¬£¬Ðû³ÆÌṩÒÑÐÞ¸´µÄVS CodeÀ©´ó°æ±¾¡£¡£¡£¡£Ö»¹ÜGoogle Drive²¢·Ç¹Ù·½·Ö·¢ÇþµÀ£¬£¬£¬µ«Óû§¿ÉÄÜÒòÐÅÀµ¸Ã·þÎñ¶øºöÂÔ·çÏÕ¡£¡£¡£¡£µã»÷Á´½Óºó£¬£¬£¬Êܺ¦Õß»á±»ÖØ¶¨ÏòÖÁ¶ñÒâÓòÃû£¬£¬£¬¸ÃÍøÕ¾ÔËÐÐJavaScript¾ç±¾ÍøÂçÓû§Ê±Çø¡¢²Ù×÷ϵͳ¡¢ä¯ÀÀÆ÷Ö¸ÎÆµÈ¾ßÌåÐÅÏ¢£¬£¬£¬²¢Í¨¹ýPOSTÒªÇó·¢ËÍÖÁºÅÁî½ÚÀñ·þÎñÆ÷¡£¡£¡£¡£¸Ã²½Öè×÷ΪÁ÷Á¿¹ýÂ˲㣬£¬£¬ÓÃÓÚ·Ö±æÕæÊµÓû§Óë×êÑÐÈËÔ±£¬£¬£¬½öÏòÑéÖ¤ºóµÄÊܺ¦ÕßͶ·ÅµÚ¶þ½×¶Î¶ñÒâÔØºÉ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-vs-code-alerts-on-github-spread-malware-to-developers/


6. CISA½«F5 BIG-IP¸ßΣRCE·ì϶ÄÉÈëÒÑÖªÀûÓÃĿ¼


3ÔÂ28ÈÕ£¬£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«F5 BIG-IPÀûÓð²È«ÖÎÀíÆ½Ì¨£¨APM£©ÖеÄÒ»¸ö¸ßΣ·ì϶£¨CVE-2025-53521£©ÕýʽÁÐÈëÆä¡°ÒÑÖªÀûÓ÷ì϶£¨KEV£©¡±Ä¿Â¼¡£¡£¡£¡£¸Ã·ì϶CVSS 3.1ÆÀ·Ö¸ß´ï9.8£¬£¬£¬ÊôÓÚÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¬£¬£¬Ó°ÏìÁìÓòº­¸ÇÆôÓýӼûÕ½ÊõµÄBIG-IP APMÐé¹¹·þÎñÆ÷ÅäÖó¡¾°¡£¡£¡£¡£Æ¾¾ÝF5°²È«²¼¸æ£¬£¬£¬µ±¶ñÒâÁ÷Á¿´¥·¢Ðé¹¹·þÎñÆ÷ÉÏÅäÖõÄBIG-IP APM½Ó¼ûÕ½Êõʱ£¬£¬£¬¿ÉÈÆ¹ý°²È«Ï޶Ȳ¢Ö´ÐÐËÁÒâ´úÂ룬£¬£¬µ¼ÖÂϵͳ±»ÆëÈ«½ÚÖÆ¡£¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬¸Ã·ì϶×î³õ±»¹éÀàΪ»Ø¾ø·þÎñ£¨DoS£©·ì϶£¬£¬£¬µ«2026Äê3ÔµÄз¢ÏÖ֤ʵÆäÏÖʵΣº¦ÎªÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬Òò¶øCVSSÆÀ·Ö±»ÏÔÖøÌáÉý£¬£¬£¬ÑÏÖØÐԵȼ¶´ó·ùÉϵ÷¡£¡£¡£¡£Ö»¹ÜÔ­ÓÐÐÞ¸´¹æ»®ÈÔÓÐЧ£¬£¬£¬µ«F5ÒÑÈ·Èϸ÷ì϶ÔÚ²¿ÃÅ´æÔÚ·ì϶µÄBIG-IP°æ±¾ÖÐÒѱ»ÏÖʵÀûÓᣡ£¡£¡£Æ¾¾ÝCISA°ä²¼µÄÓµÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬Áª°î»ú¹¹±ØÐëÔÚ2026Äê3ÔÂ30ÈÕǰʵÏָ÷ì϶µÄÐÞ¸´¹¤×÷£¬£¬£¬ÒÔ½µµÍÒÑÖª·ì϶±»ÀûÓõÄÖØ´ó·çÏÕ¡£¡£¡£¡£


https://securityaffairs.com/190076/uncategorized/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog.html