VECT 2.0ÀÕË÷Èí¼þȱµã£º£º£º´óÎļþ±»ÓÀÔ¶Ïú»Ù
°ä²¼¹¦·ò 2026-04-291. VECT 2.0ÀÕË÷Èí¼þȱµã£º£º£º´óÎļþ±»ÓÀÔ¶Ïú»Ù
4ÔÂ28ÈÕ£¬£¬×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬£¬VECT 2.0ÀÕË÷Èí¼þÔÚ´¦ÖüÓÃÜËæ»úÊýµÄ·½Ê½ÉÏ´æÔÚÑÏÖØÈ±µã£¬£¬µ¼Ö½ϴóµÄÎļþÔÚ¼ÓÃܹý³ÌÖб»ÓÀÔ¶Ïú»Ù£¬£¬¶ø·ÇÕæÕý±»¼ÓÃÜ¡£¡£VECTÔÚ×îÐÂÒ»ÆÚBreachForumsÂÛ̳ÉϽøÐÐÐû´«£¬£¬Ô¼Çë×¢²áÓû§³ÉΪÆäºÏ×÷ͬ°é£¬£¬²¢Í¨¹ý˽ÐÅ·Ö·¢½Ó¼ûÃÜÔ¿¡£¡£VECTÔËÓªÉÌÔø°ä·¢ÓëTeamPCP³ÉÁ¢ºÏ×÷¹ØÏµ£¬£¬Íþв×éÖ¯Ó¦¶Ô½üÆÚÓ°ÏìTrivy¡¢¡¢¡¢LiteLLMºÍTelnyxµÄ¹©¸øÁ´¹¥»÷ÒÔ¼°Õë¶ÔÅ·ÃËίԱ»áµÄ¹¥»÷ÕÆ¹Ü¡£¡£ÔÚ²¼¸æÖУ¬£¬VECTÔËÓªḚ́µÊ¾ÆäÖ¸±êÊÇÀûÓÃÕâЩ¹©¸øÁ´·ì϶µÄÊܺ¦Õߣ¬£¬ÔÚÆä»·¾³Öв¿ÊðÀÕË÷Èí¼þÔØºÉ£¬£¬²¢¶ÔÆäËû×éÖ¯·¢Æð¸ü´ó¹æÄ£µÄ¹©¸øÁ´¹¥»÷¡£¡£¸ÃÀÕË÷Èí¼þµÄÖÂÃüȱµãÔÚÓÚÆä¼ÓÃÜ»úÖÆµÄÉè¼Æ¡£¡£ÎªÁËÌáºêΰÎļþµÄ¼ÓÃÜËÙ¶È£¬£¬VECT½«ËùÓÐÎļþ¾Þϸ³¬¹ý128KBµÄÊÓΪ´óÎļþ£¬£¬²¢½«Æä·Ö³ÉËĸöÊý¾Ý¿é½øÐмÓÃÜ¡£¡£ÎÊÌâÔÚÓÚ£¬£¬Ã¿¸öÊý¾Ý¿é¼ÓÃÜʱÌìÉúµÄËæ»úÊý¶¼Êä³öµ½Í³Ò»¸öÄڴ滺³åÇøÖУ¬£¬µ¼ÖÂÿ¸öеÄËæ»úÊý³ÇÊи²¸Çǰһ¸ö¡£¡£µ±Ëùº±¼û¾Ý¿é´¦ÖýáÊøºó£¬£¬ÄÚ´æÖÐÖ»ÁôÏÂ×îºóÒ»¸öÌìÉúµÄËæ»úÊý£¬£¬ÇÒÖ»»á½«¸ÃËæ»úÊýдÈë´ÅÅÌ¡£¡£Òò¶ø£¬£¬±»Ô׸î³ÉËÄ¿éµÄ´óÎļþÖУ¬£¬½öÓÐ×îºó25%µÄ²¿ÃÅÄܹ»¸´Ô£¬£¬Ç°Èý²¿ÃÅÒòËæ»úÊýÃÔʧ¶øÎÞ·¨½âÃÜ¡£¡£
https://www.bleepingcomputer.com/news/security/broken-vect-20-ransomware-acts-as-a-data-wiper-for-large-files/
2. LiteLLM·ì϶£º£º£ºÎ´ÊÚȨSQL×¢Èë¿ÉÇÔÈ¡APIÃÜÔ¿
4ÔÂ28ÈÕ£¬£¬ºÚ¿ÍÕýÀûÓñàºÅΪCVE-2026-42208µÄÑÏÖØ·ì϶£¬£¬¹¥»÷´æ´¢ÔÚLiteLLM¿ªÔ´´óÐÍ˵»°Ä£ÐÍÍø¹ØÖеÄÃô¸ÐÐÅÏ¢¡£¡£¸Ã·ì϶ÊÇLiteLLM´úÀíAPIÃÜÔ¿ÑéÖ¤²½ÖèÖгöÏÖµÄSQL×¢ÈëÎÊÌ⣬£¬¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÀûÓ㬣¬Ö»ÐèÏòÈκÎLLM API·ÓÉ·¢ËÍÌØÖÆµÄAuthorization±êÍ·£¬£¬±ãÄܶÁÈ¡´úÀíÊý¾Ý¿âÖеÄÊý¾Ý²¢½øÐÐÅú¸Ä¡£¡£Æ¾¾ÝÊØ»¤Õߵݲȫ²¼¸æ£¬£¬¹¥»÷Õß¿ÉÀûÓôËÖ°ÄÜ»ñµÃ¶Ô´úÀí¼°ÆäÖÎÀíÍ´´¦µÄδÊÚȨ½Ó¼û¡£¡£LiteLLM´æ´¢APIÃÜÔ¿¡¢¡¢¡¢Ðé¹¹ÃÜÔ¿¡¢¡¢¡¢Ö÷ÃÜÔ¿ÒÔ¼°»·¾³/ÅäÖÃÃÜÔ¿£¬£¬Òò¶øÊý¾Ý¿â±»½Ó¼ûÒâζןڿͿɶÁÈ¡´óÁ¿Ãô¸ÐÊý¾Ý£¬£¬½ø¶ø·¢Æð½øÒ»²½¹¥»÷¡£¡£¸Ã·ì϶ÔÚLiteLLM 1.83.7°æ±¾ÖÐͨ¹ý²ÎÊý»¯²éÎÊÈ¡´úÁ˲»°²È«µÄ×Ö·û´®Æ´½ÓµÃÒÔÐÞ¸´¡£¡£LiteLLM½üÆÚ»¹³ÉΪ¹©¸øÁ´¹¥»÷µÄÖ¸±ê£¬£¬TeamPCPºÚ¿ÍÔø°ä²¼¶ñÒâPyPI°ü²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½£¬£¬´ÓÊÜϰȾϵͳÖÐÇÔȡƾ֤¡¢¡¢¡¢ÁîÅÆºÍÃÜÔ¿¡£¡£Ôư²È«¹«Ë¾SysdigµÄ×êÑл㱨ָ³ö£¬£¬CVE-2026-42208·ì϶µÄÀûÓÃÔÚ4ÔÂ24ÈÕ¹«¿ªÅû¶ºóÔ¼36Сʱ±ãÒÑÆðÍ·£¬£¬×êÑÐÈËÔ±¹Û²ìµ½ÐîÒâÇÒÓÐÕë¶ÔÐԵĹ¥»÷³¢ÊÔ¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw/
3. VimeoÊÜAnodotй¶ÖêÁ¬£¬£¬ShinyHuntersÍþв¹«¿ªÊý¾Ý
4ÔÂ28ÈÕ£¬£¬ÊÓÆµÆ½Ì¨Vimeo½üÈÕÅû¶£¬£¬ÓÉÓÚµÚÈý·½Êý¾ÝÒì³£¼ì²â¹«Ë¾Anodot²úÉúÊý¾Ýй¶ÊÂÎñ£¬£¬Æä²¿Ãſͻ§ºÍÓû§µÄÊý¾ÝÔ⵽δ¾ÊÚȨµÄ½Ó¼û¡£¡£Vimeo°µÊ¾£¬£¬¹¥»÷Õß»ñÈ¡Á˲¿Ãſͻ§µÄµç×ÓÓʼþµØÖ·£¬£¬µ«Ð¹Â¶µÄ´ó²¿ÃÅÐÅÏ¢Ô̺¬¼¼·¨Êõ¾Ý¡¢¡¢¡¢ÊÓÆµ±êÌâºÍÔªÊý¾Ý¡£¡£³õ´ëÊ©²éÁ˾ÖÅú×¢£¬£¬±»½Ó¼ûµÄÊý¾Ý¿âÖØÒªÔ̺¬¼¼·¨Êõ¾Ý¡¢¡¢¡¢ÊÓÆµ±êÌâºÍÔªÊý¾Ý£¬£¬ÔÚijЩÇé¿öÏ»¹Ô̺¬¿Í»§µÄµç×ÓÓʼþµØÖ·¡£¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñÒѱ»³ôÃûÔ¶ÑïµÄÀÕË÷×éÖ¯ShinyHuntersÐû³ÆÕƹܣ¬£¬¸Ã×éÖ¯ÍþвÐû³Æ°ÑÎÕÁ˸ù«Ë¾SnowflakeºÍBigQueryʵÀýÖеÄÊý¾Ý£¬£¬³ý·ÇVimeoÖ§¸¶Êê½ð£¬£¬²»È»½«ÔÚ4ÔÂ30ÈÕ֮ǰ°ä²¼±»µÁÊý¾Ý¡£¡£ÔÚAnodotÊÂÎñÖУ¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬²¢ÀûÓÃÕâЩÁîÅÆ½Ó¼û¿Í»§»·¾³£¨ÖØÒªÊÇSnowflake£©£¬£¬´Ó¶à¸ö×éÖ¯ÖÐÇÔÈ¡Êý¾Ý¡£¡£¾ÍVimeo¶øÑÔ£¬£¬ÓÉÓÚÉæÊ·½Î´×¢Ã÷±»µÁÊý¾ÝµÄÊýÁ¿£¬£¬Ó°ÏìÒÀÈ»²»Ë¬ÀÊ¡£¡£VimeoÒÑÃ÷È·°µÊ¾£¬£¬Ð¹Â¶µÄÊý¾Ý²»Ô̺¬Óû§ÉÏ´«µ½Æ½Ì¨µÄÊÓÆµÄÚÈÝ¡¢¡¢¡¢ÕË»§Æ¾Ö¤»òÖ§¸¶¿¨ÐÅÏ¢£¬£¬Æ½Ì¨ÔËӪδÊÜÓ°Ïì¡£¡£¸Ã¹«Ë¾ÏÖÒѽûÓÃËùÓÐAnodotƾ֤£¬£¬²¢È¡µÞÁ˸÷þÎñÓëÆäϵͳµÄ¼¯³É¡£¡£
https://www.bleepingcomputer.com/news/security/video-service-vimeo-confirms-anodot-breach-exposed-user-data/
4. Checkmarx֤ʵLAPSUS$й¶ÆäGitHubÊý¾Ý
4ÔÂ28ÈÕ£¬£¬ÀûÓð²È«¹«Ë¾CheckmarxÒÑ֤ʵ£¬£¬LAPSUS$Íþв×é֯й¶ÁË´ÓÆä˽ÓÐGitHub´æ´¢¿âÖÐÇÔÈ¡µÄÊý¾Ý¡£¡£¹ÌÈ»µ÷²éÈÔÔÚ½øÐÐÖУ¬£¬µ«CheckmarxÒÔΪ¹¥»÷Èë¿ÚÊÇ´Ëǰ¹é×ïÓÚºÚ¿Í×éÖ¯TeamPCPµÄTrivy¹©¸øÁ´¹¥»÷£¬£¬¸Ã¹¥»÷»ñÈ¡ÁËÏÂÓÎÓû§µÄƾ֤¡£¡£ÀûÓôÓTrivyÊÂÎñÖÐÇÔÈ¡µÄƾ֤£¬£¬¹¥»÷ÕßµÃÒÔ½Ó¼ûCheckmarxµÄGitHub´æ´¢¿â£¬£¬²¢ÓÚ3ÔÂ23ÈÕ°ä²¼Á˶ñÒâ´úÂë¡£¡£CheckmarxÚ¹Êͳƣ¬£¬ÓÉÓÚ»ñµÃÁËÕâÖÖ½Ó¼ûȨÏÞ£¬£¬¹¥»÷Õß¿ÉÄÜÓëÆäGitHub»·¾³½øÐн»»¥£¬£¬Ëæºó½«¶ñÒâ´úÂë°ä²¼µ½Ä³Ð©¹¤¼þÖС£¡£4ÔÂ22ÈÕ£¬£¬¹¥»÷ÕßÀûÓÃÖØÐ»ñµÃµÄ½Ó¼ûȨÏÞ»ò³ÖÐø¹¥»÷Ò»¸öÔ£¬£¬°ä²¼ÁËÕë¶ÔCheckmarxÆìÏÂKICS°²È«É¨ÃèÆ÷µÄ¶ñÒâDocker¾µÏñ¡¢¡¢¡¢VSCodeºÍOpen VSXÀ©´ó£¬£¬´ÓÖÐÇÔÈ¡ÁËÍ´´¦¡¢¡¢¡¢ÃÜÔ¿¡¢¡¢¡¢ÁîÅÆºÍÅäÖÃÎļþ¡£¡£×òÈÕ£¬£¬Checkmarx°ä²¼×îÐÂÐÂÎųƣ¬£¬LAPSUS$×éÖ¯ÔÚÆäÀÕË÷ÃÅ»§ÍøÕ¾Éϰ䲼µÄÊý¾ÝÊôÓÚCheckmarx£¬£¬ÇÒÔ´×Ô3ÔÂ23ÈÕµÄÈëÇÖÊÂÎñ¡£¡£¹«Ë¾ÓëÒ»¼Òµ±ÏȵÚÈý·½È¡Ö¤¹«Ë¾ºÏ×÷½øÐеĵ÷²éÅú×¢£¬£¬Ò»¸öÍøÂç·¸×ïÍÅ»ïÒѽ«ÓйØÊý¾Ý°ä²¼µ½°µÍø¡£¡£
https://www.bleepingcomputer.com/news/security/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data/
5. Å·ÖÞÕþÒªÔâSignal´¹µö¹¥»÷£¬£¬µÂ·½Ö¸¶íÂÞ˹ÊÇÄ»ºóºÚÊÖ
4ÔÂ28ÈÕ£¬£¬µÂ¹úµ±¾Ö½üÆÚµÄµ÷²éÏÔʾ£¬£¬ÓÐÈËÀûÓÃSignal¼´Ê±Í¨Ñ¶Æ½Ì¨ÌáÒéÁËÒ»³¡´ó¹æÄ£µÄÍøÂç´¹µö»î¶¯£¬£¬²¢Ç¿ÁÒÒÉ»ó¶íÂÞ˹²Î¼ÓÆäÖС£¡£Õâ´ÎÐж¯µÄÖ¸±êÔ̺¬µÂ¹ú¹Ù³¡ÈËÊ¿¡¢¡¢¡¢²¿³¤¡¢¡¢¡¢¾ü·½ÈËÔ±¡¢¡¢¡¢Íâ½»¹ÙºÍ¼ÇÕßÔÚÄڵijÛÃûÈËÊ¿¡£¡£µÂ¹ú¼ì²ì¹ÙÒÑ·¢Õ¹µ÷²é£¬£¬ÒÔΪÕâ¿ÉÄÜÊÇһ·ÓÐ×éÖ¯µÄ¼äµý»î¶¯£¬£¬³õ²½Ö¤¾ÝÅúעĻºóºÚÊÖ¿ÉÄÜÊǹú¶ÈÐÐΪÌå¡£¡£¹¥»÷Õß¼ÙÒâSignal¹Ù·½¿Í·þ»ò¿ÉÐÅÁªÏµÈË£¬£¬Í¨¹ý·¢ËÍÐÅÏ¢¿¿½üÊܺ¦Õߣ¬£¬ÓÕÆËûÃÇ·ÖÏíÑéÖ¤Âë¡¢¡¢¡¢É¨Ãè¶ñÒâ¶þάÂë»òµã»÷¾«ÐÄÉè¼ÆµÄÁ´½Ó¡£¡£Ò»µ©Êܺ¦Õß±»¹¥ÆÆ£¬£¬¹¥»÷Õß±ã¿É½Ó¼û¸öÈË̸Ìì¼Í¼¡¢¡¢¡¢ÁªÏµÈËÁÐ±í£¬£¬ÉõÖÁ¿ÉÄÜÉæ¼°Ãô¸ÐµÄÕþÖλáÉÌÄÚÈÝ¡£¡£Õâ´ÎÐж¯»¹ÊÔͼ¹¥»÷µÂ¹ú×ÜÀí¸¥ÀïµÂÀïÏ£¡£¡¤Ä¬´Ä£¬£¬µ«ÉÐδ֤ʵÆäÕË»§Ò²Ôâµ½ÈëÇÖ¡£¡£µ±¾Ö¹À¼Æ¿ÉÄܺ±¼û°Ù¸öÕË»§Êܵ½Ó°Ïì¡£¡£¹ÌÈ»°ØÁÖ·½ÃæÉÐδÕýʽָÈϹ¥»÷Õߣ¬£¬µ«µý±¨ÆðÔ´Ô½À´Ô½¶àµØÖ¸Ïò¶íÂÞ˹²Î¼ÓÆäÖУ¬£¬ÕâÓëÕë¶ÔÅ·ÖÞÃñÖ÷¹ú¶ÈµÄ¸ü¿í·ºÍøÂç»î¶¯Ä£Ê½Ïà·û¡£¡£µÂ¹úµ±¾Ö½²»°È˰µÊ¾£¬£¬µÂ¹úµ±¾ÖÒÉ»ó¶íÂÞ˹ÊÇÄ»ºóºÚÊÖ¡£¡£
https://securityaffairs.com/191425/intelligence/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation.html
6. Morpheus¼äµýÈí¼þ£º£º£º¼Ù×°°²×¿¸üÐÂÇÔÈ¡Êý¾Ý
4ÔÂ28ÈÕ£¬£¬ÎÞµ³ÅÉ·ÇͶ»ú×éÖ¯Osservatorio NessunoÆØ¹âÁËÒ»ÖÖÃûΪMorpheusµÄÐÂÐͼäµýÈí¼þ£¬£¬¸ÃÈí¼þͨ¹ý¼Ù×°³Éϵͳ¸üеÄÐéα°²×¿ÀûÓýøÐд«²¼¡£¡£Ò»µ©×°Ö㬣¬Ëü¾ÍÄÜ´ÓÊÜϰȾµÄÉ豸ÉÏÇÔÈ¡´óÁ¿Êý¾Ý¡£¡£»ã±¨ÏÔʾ£¬£¬·¨Âɺ͵ý±¨»ú¹¹¶Ô´ËÀàÈí¼þÐèҪǿ¾¢£¬£¬Íƶ¯Á˼äµýÈí¼þ¹©¸øÉÌÊг¡µÄÅ·¢Õ¹¡£¡£¹¥»÷ÕßѡȡµÍ³É±¾¼äµýÈí¼þµÄµäÐÍÕ½Êõ£º£º£º·ÛËé·þÎñºóÓÕÆÊܺ¦Õß×°ÖÃÐéα¸´ÔÀûÓᣡ£Ö¸±êÓû§ÊÕµ½º¬¼Ù×°³É»¥ÁªÍø·þÎñÌṩÉÌÍøÕ¾µÄ¶ÌÐÅÁ´½Ó£¬£¬µÚÒ»½×¶ÎͶ·ÅÆ÷»á×°Öðµ²ØµÄµÚ¶þ½×¶ÎÔØºÉ£¬£¬²¢ÔÚÓû§ÏÕЩ²»ÖªÇéµÄÇé¿öϲ¿Ê𡣡£µÚ¶þ½×¶Î¼Ù×°³ÉºÏ·¨ÏµÍ³×é¼þ£¬£¬Ê¹ÓÃÐéαͼ±êºÍÃû³Æ²©ÊØÐÅÀµ£¬£¬Ð²ÆÈÓû§ÊÚÓèÔ̺¬¸¨ÖúÖ°ÄܽӼûÔÚÄÚµÄΣÏÕȨÏÞ¡£¡£»ñµÃ¸¨ÖúÖ°ÄÜȨÏ޺󣬣¬¼äµýÈí¼þÆô¶¯È¨ÏÞ¹¤×÷Á÷£¬£¬´´½¨Ô̺¬Ðéα¸üÐÂÁ÷³ÌºÍÖØÆôÆÁÄ»µÄ¸²¸Ç²ã£¬£¬ÔÚºó¶ÜÖ´ÐÐËùÓв½ÖèÒÔÊÚÓèÈ«ÊýȨÏÞ£¬£¬Ô̺¬ÆôÓÿª·¢ÕßÑ¡Ïî¡¢¡¢¡¢¿ªÆôÎÞÏßµ÷ÊÔ²¢Óë±¾µØADBÊØ»¤·¨Ê½Åä¶Ô¡£¡£ÔÚµÚÈý½×¶Î£¬£¬¸Ã¼äµýÈí¼þÎÞÐèrootȨÏÞ¼´¿É½ûÓöà¿î³ÛÃûɱ¶¾Èí¼þ¡£¡£
https://securityaffairs.com/191398/malware/new-android-spyware-morpheus-linked-to-italian-surveillance-firm.html


¾©¹«Íø°²±¸11010802024551ºÅ