¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷£¬£¬³¬ÆßÍòÓû§ÔâÖÒ¸æ

°ä²¼¹¦·ò 2026-04-17

1. ¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷£¬£¬³¬ÆßÍòÓû§ÔâÖÒ¸æ


4ÔÂ16ÈÕ£¬£¬ÔÚ¹ú¼Ê·¨ÂÉÐж¯¡°¶ÏµçÐж¯¡±µÄ×îн׶ÎÖУ¬£¬È«Çò21¸ö¹ú¶ÈЭͬ·¢Á¦£¬£¬¶ÔÉ¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷²úÒµÁ´½øÐÐÁËÉî¶È½ø¹¥¡£¡£Õâ´ÎÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯Ö§³Ö£¬£¬ÒÑÏò³¬¹ý75,000ÃûʹÓÃÓÐ¹ØÆ½Ì¨ÌáÒé·¸·¨¹¥»÷µÄСÎÒ·¢ËÍÁËÖÒ¸æÓʼþ»òº¯¼þ¡£¡£Ðж¯ÆÚ¼ä£¬£¬·¨Âɲ¿ÃÅ¿ÛÁôÁËËÄÃûÏÓÒÉÈË£¬£¬²é·âÁË53¸öÉæÊÂÓòÃû£¬£¬²¢Ö´ÐÐÁË25·ÝËѲéÁî¡£¡£²Î¼Ó¹ú¶Èº­¸Ç¶à¸öÅ·Ã˳ÉÔ±¹ú£¬£¬ÒÔ¼°°Ä´óÀûÑÇ¡¢¡¢Ì©¹ú¡¢¡¢ÃÀ¹ú¡¢¡¢Ó¢¹ú¡¢¡¢ÈÕ±¾ºÍ°ÍÎ÷£¬£¬Õ¹Ê¾ÁËÈ«Çò½áºÏ½ø¹¥ÍøÂç·¸×ïµÄ¿ÌÒâ¡£¡£¡£¡£¡°¶ÏµçÐж¯¡±´ËǰÒѲð³ýÁË´óÁ¿¹Ø¼ü»ù´¡ÉèÊ©£¬£¬²¢²é»ñÁËÔ̺¬Óâ300Íò¸ö·¸×ïÕË»§µÄÊý¾Ý¿â¡£¡£ÔÚ×îн׶Σ¬£¬Ðж¯ÖصãתÏòÔ¤·ÀÓëÕðÉå¡£¡£Áйúר¼ÒÔÚ¡°Ðж¯ÖÜ¡±Ç°·¢Õ¹ÁËϵÁгå´ÌÐж¯£¬£¬¾Û½¹ÓÚDDoS¹¥»÷ƽ̨µÄ¸ß¼ÛÖµÖ¸±êÓû§£¬£¬Í¬Ê±ÌáÉý¹«¼Ò¶ÔÕâÀà»î¶¯·¸·¨ÐÔµÄÈÏÖª¡£¡£·¨ÂÉ»ú¹¹²»½öµ·»ÙÁË·¸·¨¹¥»÷·þÎñµÄ¼¼ÊõÉèÊ©£¬£¬»¹¶Ô¡°Booter·þÎñ¡±½øÐÐÁËϵͳÐÔËãÕÊ¡£¡£Ö»¹Ü²¿ÃÅÔËÓªÕßÒÔ¡°ºÏ·¨Ñ¹Á¦²âÊÔ¡±Îª»Ï×Ó·ÛÊÎÆäÕæÊµÖ÷ÕÅ£¬£¬µ«ÓÉÓÚÆ½Ì¨²»×ã¶Ô¹¥»÷Ö¸±êËùÓÐȨµÄÑéÖ¤£¬£¬ÕâЩ·þÎñÏÖʵÉϳ־ñ»ÓÃÓÚ·¸·¨¹¥»÷¡£¡£


https://www.bleepingcomputer.com/news/security/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains/


2. ÐÂÐͶñÒâÈí¼þZionSiphon¶Ô×¼ÒÔÉ«ÁÐË®ÉèÊ©


4ÔÂ16ÈÕ£¬£¬Ò»¿îÃûΪZionSiphonµÄÐÂÐͶñÒâÈí¼þרÃÅÕë¶ÔÔËÓª¼¼ÊõÁìÓò£¬£¬ÓÈÆäÒÔË®´¦Öúͺ£Ë®µ­»¯»·¾³Îª¹¥»÷Ö¸±ê£¬£¬ÊÔͼͨ¹ýµ÷½ÚҺѹºÍ½«ÂȺ¬Á¿ÌáÉýÖÁΣÏÕˮƽÀ´·ÛË鹨¼ü»ù´¡ÉèÊ©¡£¡£¸ÃÈí¼þÓÉÈËΪÖÇÄÜÍøÂ簲ȫ¹«Ë¾Darktrace·¢ÏÖ£¬£¬ÆäIP¶¨Î»¼°Ç¶Èë×Ö·û´®ÖеÄÕþÖÎÐÅÏ¢ÏÔʾ£¬£¬ËüËÆºõרһÓÚ¹¥»÷λÓÚÒÔÉ«ÁеÄÖ¸±ê¡£¡£²¿Êðºó£¬£¬ZionSiphon»á²é³­Ö÷»úIPÊÇ·ñÔÚÒÔÉ«ÁÐÁìÓòÄÚ£¬£¬²¢È·ÈÏϵͳÊÇ·ñÔ̺¬ÓëË®»òÔËÓª¼¼ÊõÓйصÄÈí¼þ¼°Îļþ£¬£¬ÒÔÈ·±£ÆäÔËÐÐÓÚË®´¦Öûòº£Ë®µ­»¯ÏµÍ³ÖС£¡£ÈôǰÌáÂú×㣬£¬Ëü»áͨ¹ýÃûΪ¡°IncreaseChlorineLevel()¡±µÄº¯Êý£¬£¬ÔÚÏÖÓÐÅäÖÃÎļþÖÐÔö³¤Îı¾¿é£¬£¬ÔÚ¹¤³§»úеϵͳÎïÀíÖ§³ÖÁìÓòÄÚ×î´óÏÞ¶ÈÌá¸ßÂȵļÁÁ¿ºÍÁ÷Á¿£¬£¬Í¬Ê±¿ªÆôÂȱᢡ¢·§ÃŲ¢½«·´ÉøÈëѹÁ¦µ÷ÖÁ80¡£¡£´ËÍ⣬£¬¸Ã¶ñÒâÈí¼þ»¹»áɨÃè±¾µØ×ÓÍøÖеÄModbus¡¢¡¢DNP3ºÍS7commµÈ¹¤Òµ½ÚÖÆÍ¨Ñ¶ºÍ̸£¬£¬ÒâͼÓ빤ҵ½ÚÖÆÏµÍ³Ö±½Ó½»»¥¡£¡£ZionSiphon»¹¾ß±¸USB´«²¼»úÖÆ£¬£¬¿É½«×ÔÉí¸´ÖÆµ½¿ÉÒÆ¶¯Çý¶¯Æ÷²¢ÒÔ°µ²ØµÄ¡°svchost.exe¡±¹ý³ÌÔËÐУ¬£¬Í¬Ê±´´½¨¶ñÒâ¿ì½Ý·½Ê½Îļþ¡£¡£ÓÉÓÚÖÎÀí¹Ø¼üÖ°ÄܵÄÍÆËã»úͨ³£´¦ÓÚÎïÀí¸ôÀë״̬£¬£¬²»Ö±½ÓÏνӻ¥ÁªÍø£¬£¬USB³ÉΪ´ËÀ๥»÷µÄÖØÒª´«²¼õè¾¶¡£¡£


https://www.bleepingcomputer.com/news/security/zionsiphon-malware-designed-to-sabotage-water-treatment-systems/


3. н©Ê¬ÍøÂçPowMixÒԽݿËÀͶ¯Á¦ÎªÖ¸±ê


4ÔÂ16ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖ£¬£¬Ò»³¡Õë¶Ô½Ý¿Ë¹²ºÍ¹úÀͶ¯Á¦µÄ¶ñÒâ¹¥»÷»î¶¯ÕýÔÚ³ÖÐø½øÐУ¬£¬ÆäʹÓÃÒ»¸öÃûΪPowMixµÄ´Ëǰδ±»¼Í¼µÄ½©Ê¬ÍøÂ磬£¬ÖÁÉÙ´Ó2025Äê12ÔÂÆðÍ·»îÔ¾¡£¡£¾ÝCisco Talos×êÑÐÔ±Chetan Raghuprasad»ã±¨£¬£¬PowMixÑ¡È¡Ëæ»úµÄºÅÁîÓë½ÚÖÆ£¨C2£©Ðűê¾àÀ룬£¬¶ø·ÇÓëC2·þÎñÆ÷ά³Ö³ÖÐøÏνÓ£¬£¬ÒԴ˶ã±ÜÍøÂçÊðÃû¼ì²â¡£¡£¸Ã¶ñÒâÈí¼þ½«¼ÓÃܵÄÐÄÌøÊý¾Ý¼°Êܺ¦Õß»úеµÄΨһ±êʶ·ûǶÈëC2 URLõè¾¶ÖУ¬£¬·ÂÕպϷ¨µÄREST API URL£¬£¬²¢¿ÉÄÜÔ¶³Ì¶¯Ì¬µØ½«ÐµÄC2ÓòÃû¸üе½½©Ê¬ÍøÂçÅäÖÃÎļþÖС£¡£¹¥»÷Á´Ê¼ÓÚÒ»¸ö¶ñÒâZIPÎļþ£¬£¬¸ÃÎļþ¼¤»î¶à½×¶ÎϰȾÁ´£¬£¬×îÖÕ¿ªÊÍPowMix¡£¡£Ï°È¾Á´Éæ¼°Ò»¸öWindows¿ì½Ý·½Ê½£¨LNK£©£¬£¬ÓÃÓÚÆô¶¯PowerShell¼ÓÔØÆ÷£¬£¬ºóÕßÌáȡǶÈëÔÚѹËõ°üÖеĶñÒâÈí¼þ£¬£¬½âÃܺóÔÚÄÚ´æÖÐÔËÐС£¡£ÕâÖÖÐÂÐͽ©Ê¬ÍøÂçÖ¼ÔÚʵÏÖÔ¶³Ì½Ó¼û¡¢¡¢¿úËźÍÔ¶³Ì´úÂëÖ´ÐУ¬£¬Í¨¹ý°´Ê±¹¤×÷³ÉÁ¢ÓƾÃÐÔ£¬£¬²¢ÑéÖ¤¹ý³ÌÊ÷ÒÔÔ¤·ÀͳһÖ÷»úÉÏÔËÐжà¸ö¶ñÒâÈí¼þʵÀý¡£¡£Óë´Ëͬʱ£¬£¬¹¥»÷Õß»¹»á´ò¿ªÒԺϹæÎªÖ÷ÌâµÄµö¶üÎļþ£¬£¬Ìá¼°EdekaµÈºÏ·¨Æ·ÅƲ¢Ô̺¬Ð½³êÊý¾Ý¼°Ë¾·¨Âɹæ²Î¿¼£¬£¬ÒÔ·ÖÉ¢°ÑÎÈÁ¦²¢¼ÓÇ¿ºýŪÐÔ¡£¡£


https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html


4. Rhysida¹¥»÷ÖÂÃÀÒ½ÁÆÖÐÐÄ33.7ÍòÈËÊý¾Ýй¶


4ÔÂ16ÈÕ£¬£¬ÌïÄÉÎ÷ÖÝ¿â¿Ëά¶ûµØÓòÒ½ÁÆÖÐÐÄ£¨CRMC£©ÓÚ2025Äê7ÔÂÔâ·êRhysidaÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬µ¼ÖÂÔ¼33.7ÍòÈ˵ÄСÎÒ¼°Ò½ÁÆÐÅϢй¶¡£¡£¸ÃÖÐÐÄÓÚ7ÔÂ14ÈÕ¼ì²âµ½¿ÉÒɻºó£¬£¬Ñ¸ËÙ½áºÏ·¨Âɲ¿Ãż°·¨Ö¤¹«Ë¾·¢Õ¹µ÷²é£¬£¬È·ÈÏÔÚ7ÔÂ11ÈÕÖÁ14ÈÕÆÚ¼ä£¬£¬ÓÐδ¾­ÊÚȨµÄµÚÈý·½½Ó¼ûÁËÒ½ÔºÍøÂ磬£¬¿ÉÄܲ鿴»òÇÔÈ¡ÁË´óÁ¿Ãô¸ÐÎļþ¡£¡£¾­È«ÃæÉó²éÊÜÓ°ÏìÎļþºó£¬£¬CRMCÈ·ÈÏй¶ÐÅÏ¢ÒòСÎÒÇé¿ö¶øÒ죬£¬¿ÉÄÜÔ̺¬ÐÕÃû¡¢¡¢µØÖ·¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢¼ÝÊ»ÅÆÕÕºÅÂë¡¢¡¢ÒøÐÐÕ˺š¢¡¢Ò½ÁÆÐÅÏ¢¡¢¡¢²¡ÀúºÅ¼°½¡¿µ±£ÏÕµ¥ÐÅÏ¢¡£¡£Ò½ÔºÕýÔÚͨ¹ýÓʼþÏòÕ¼ÓÐÓÐЧµØÖ·µÄÊÜÓ°ÏìСÎÒ¼ÄËÍ֪ͨÐÅ£¬£¬½¨ÒéÊÕÐÅÈË×ñÑ­ÐÅÖÐÖ¸Òý±£»£»£»¤×ÔÉíȨÀû¡£¡£Ö»¹ÜĿǰÉÐδ֤ʵÒѲúÉúÊý¾ÝÀÄÓ㬣¬CRMCÈÔΪÊÜÓ°ÏìÕßÌṩÃâ·ÑµÄÉí·Ý͵ÇÔ±£»£»£»¤·þÎñ£¬£¬²¢¶½´Ù¹«¼ÒÇ×êǹØ×¢ÕË»§ºÍÐÅÓþ»ã±¨£¬£¬ÊµÊ±¾Ù±¨¿ÉÒɻ£¬£¬±ØÒªÊ±ÁªÏµÓйز¿ÃÅ¡£¡£Ò½Ôº»¹ÒýÓÃÁËÁª°îÒµÎñίԱ»áµÄ×ÊÔ´£¬£¬Îª¹«¼ÒÌṩڲƭ¾¯±¨¼°ÐÅÓþ±£»£»£»¤µÄÓйØÌáÐÑ¡£¡£2025Äê8Ô£¬£¬RhysidaÀÕË÷Èí¼þ×éÖ¯½«¸ÃÒ½ÁÆÖÐÐÄÔö³¤ÖÁÆäTorÊý¾Ýй¶վµã£¬£¬Ðû³ÆÇÔÈ¡ÁË538GBÊý¾Ý¡£¡£ÓÉÓÚÎÞÈ˲ɰìÕâЩ±»µÁÊý¾Ý£¬£¬¸Ã×éÖ¯×îÖÕ½«ÆäÃâ·Ñ¹«¿ªÐ¹Â¶¡£¡£


https://securityaffairs.com/190898/cyber-crime/cookeville-regional-medical-center-hospital-data-breach-impacts-337917-people.html


5. ATHRƽ̨4000ÃÀÔªÏúÊÛ£¬£¬È«×Ô¶¯ÓïÒô´¹µöÇÔȡƾ֤


4ÔÂ16ÈÕ£¬£¬Ò»ÖÖÃûΪATHRµÄÐÂÐÍÍøÂç·¸×ïÆ½Ì¨ÕýÒÔ4000ÃÀÔªµÄ¼ÛÖµÔÚµØÏÂÂÛ̳ÏúÊÛ£¬£¬²¢ÊÕÈ¡10%µÄÀûÈóÓ¶½ð¡£¡£¸Ãƽ̨¿ÉÄÜͨ¹ýÈ«×Ô¶¯ÓïÒôÍøÂç´¹µö¹¥»÷ÇÔÈ¡Ô̺¬Google¡¢¡¢Microsoft¡¢¡¢CoinbaseÔÚÄڵĶàÏî·þÎñµÇ¼ƾ֤£¬£¬ÆäÉç»á¹¤³Ì½×¶ÎͬʱʹÓÃÈËÀà²Ù×÷Ô±ºÍÈËΪÖÇÄÜ´úÀí¡£¡£¾ÝÔÆµç×ÓÓʼþ°²È«¹«Ë¾AbnormalµÄ×êÑÐÈËÔ±·ÖÎö£¬£¬ATHRÊÇÒ»¸öÆëÈ«µÄÍøÂç´¹µöÓëÓïÒô´¹µö¹¥»÷ÌìÉúÆ÷£¬£¬Ìá¹©Æ·ÅÆÌØ¶¨µÄµç×ÓÓʼþÄ£°å¡¢¡¢Õë¶Ôÿ¸öÖ¸±êµÄ¶¨ÖÆÖ°ÄÜÒÔ¼°ºýŪ»úÖÆ£¬£¬Ê¹Óʼþ¿´ËÆÀ´×Ô¿ÉÐÅ·¢¼þÈË¡£¡£Ä¿Ç°¸Ãƽ̨֧³Ö°ËÏîÔÚÏß·þÎñ£º£ºGoogle¡¢¡¢Microsoft¡¢¡¢Coinbase¡¢¡¢Binance¡¢¡¢Gemini¡¢¡¢Crypto.com¡¢¡¢YahooºÍAOL¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦ÕßÊÕµ½Ò»·â¾«ÐÄÉè¼ÆµÄµç×ÓÓʼþ£¬£¬ÄÚÈÝͨ³£ÎªÐéαµÄ°²È«¾¯±¨»òÕÊ»§Í¨Öª£¬£¬´¹Î£Ë®Æ½×ãÒÔ´ÙʹÓû§²¦´òµç»°£¬£¬µ«ÓÖ×ã¹»³éÏóÒԱܿª»ùÓÚÄÚÈݵĹýÂËÆ÷¡£¡£²¦´òÓʼþÖеĵ绰ºÅÂëºó£¬£¬Êܺ¦Õß»áͨ¹ýAsteriskºÍWebRTCÏνӵ½AIÓïÒô´úÀí£¬£¬ÕâЩ´úÀíÒÀÕնಽÖè¾ç±¾·ÂÕÕ°²È«ÊÂÎñ¡£¡£Æ½Ì¨ÒDZíÅÌʹ²Ù×÷Ô±¿ÉÄܽÚÖÆÕû¸öÁ÷³Ì£¬£¬Ô̺¬µç×ÓÓʼþ·Ö·¢¡¢¡¢µç»°ÖÎÀíºÍʵʱ¼à¿Ø£¬£¬²¢½Ó¹ÜÔ̺¬±»µÁÊý¾ÝµÄÈÕÖ¾¡£¡£


https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/


6. ºÚ¿ÍÀûÓÃMarimo·ì϶²¿ÊðNKAbuseбäÖÖ


4ÔÂ16ÈÕ£¬£¬ºÚ¿ÍÕýÔÚÀûÓÃMarimoÏìӦʽPython notebookÖеÄÒ»¸öÑÏÖØÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2026-39987£©£¬£¬²¿ÊðÍйÜÔÚHugging Face Spacesƽ̨ÉϵÄNKAbuse¶ñÒâÈí¼þбäÖÖ¡£¡£¾ÝÔÆ°²È«¹«Ë¾SysdigÊý¾Ý£¬£¬Óйع¥»÷ÔÚÉÏÖÜÆðÍ·£¬£¬Ö÷ÕÅÊÇÇÔȡƾ֤£¬£¬¶ø´Ëʱ¾àÀë¼¼Êõϸ½Ú¹«¿ªÅû¶Éв»µ½10Сʱ¡£¡£Sysdig×êÑÐÈËÔ±»¹·¢ÏÖÁËÆäËû¹¥»÷»î¶¯£¬£¬Ô̺¬4ÔÂ12ÈÕÆðÍ·µÄÒ»ÏîÐж¯£¬£¬¸ÃÐж¯ÀÄÓÃHugging Face Spacesƽ̨£¬£¬¸Ãƽ̨ÔÊÐíÓû§´ÓGit²Ö¿â²¿ÊðºÍ¹²Ïí½»»¥Ê½WebÀûÓ÷¨Ê½£¬£¬Í¨³£ÓÃÓÚAIÓйصÄÑÝʾÓë³¢ÊÔ¡£¡£ÔÚSysdig¹Û²ìµ½µÄ¹¥»÷ÖУ¬£¬¹¥»÷Õß´´½¨ÁËÒ»¸öÃûΪ¡°vsccode-modetx¡±µÄ¿Õ¼ä£¬£¬ÆäÖÐÍйÜÁËÒ»¸öͶ·Å¾ç±¾ºÍÒ»¸öÃûΪ¡°kagent¡±µÄ¶ñÒâÈí¼þ¶þ½øÖÆÎļþ£¬£¬ÊÔͼ·ÂÕպϷ¨µÄKubernetes AI´úÀí¹¤¾ß¡£¡£ÀûÓÃMarimo·ì϶ºó£¬£¬¹¥»÷ÕßÔËÐÐcurlºÅÁî´ÓHugging FaceÏÂÔØ²¢Ö´Ðо籾¡£¡£¸ÃͶ·Å¾ç±¾ÏÂÔØkagent¶þ½øÖÆÎļþ£¬£¬½«Æä×°Öõ½±¾µØ£¬£¬²¢Í¨¹ýsystemd¡¢¡¢cron»òmacOS LaunchAgentÉèÖÃÓÆ¾ÃÐÔ¡£¡£¸ÃÓÐÐ§ÔØºÉÊÇ´Ëǰδ±»¼Í¼µÄDDoS¹¥»÷¶ñÒâÈí¼þNKAbuseµÄ±äÖÖ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face/