VECT 2.0ÀÕË÷Èí¼þȱµã£º £º£º´óÎļþ±»ÓÀÔ¶Ïú»Ù

°ä²¼¹¦·ò 2026-04-29

1. VECT 2.0ÀÕË÷Èí¼þȱµã£º £º£º´óÎļþ±»ÓÀÔ¶Ïú»Ù


4ÔÂ28ÈÕ£¬£¬×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬£¬VECT 2.0ÀÕË÷Èí¼þÔÚ´¦ÖüÓÃÜËæ»úÊýµÄ·½Ê½ÉÏ´æÔÚÑÏÖØÈ±µã£¬£¬µ¼Ö½ϴóµÄÎļþÔÚ¼ÓÃܹý³ÌÖб»ÓÀÔ¶Ïú»Ù£¬£¬¶ø·ÇÕæÕý±»¼ÓÃÜ ¡£¡£VECTÔÚ×îÐÂÒ»ÆÚBreachForumsÂÛ̳ÉϽøÐÐÐû´«£¬£¬Ô¼Çë×¢²áÓû§³ÉΪÆäºÏ×÷ͬ°é£¬£¬²¢Í¨¹ý˽ÐÅ·Ö·¢½Ó¼ûÃÜÔ¿ ¡£¡£VECTÔËÓªÉÌÔø°ä·¢ÓëTeamPCP³ÉÁ¢ºÏ×÷¹ØÏµ£¬£¬Íþв×éÖ¯Ó¦¶Ô½üÆÚÓ°ÏìTrivy¡¢¡¢¡¢LiteLLMºÍTelnyxµÄ¹©¸øÁ´¹¥»÷ÒÔ¼°Õë¶ÔÅ·ÃËίԱ»áµÄ¹¥»÷ÕÆ¹Ü ¡£¡£ÔÚ²¼¸æÖУ¬£¬VECTÔËÓªḚ́µÊ¾ÆäÖ¸±êÊÇÀûÓÃÕâЩ¹©¸øÁ´·ì϶µÄÊܺ¦Õߣ¬£¬ÔÚÆä»·¾³Öв¿ÊðÀÕË÷Èí¼þÔØºÉ£¬£¬²¢¶ÔÆäËû×éÖ¯·¢Æð¸ü´ó¹æÄ£µÄ¹©¸øÁ´¹¥»÷ ¡£¡£¸ÃÀÕË÷Èí¼þµÄÖÂÃüȱµãÔÚÓÚÆä¼ÓÃÜ»úÖÆµÄÉè¼Æ ¡£¡£ÎªÁËÌáºêΰÎļþµÄ¼ÓÃÜËÙ¶È£¬£¬VECT½«ËùÓÐÎļþ¾Þϸ³¬¹ý128KBµÄÊÓΪ´óÎļþ£¬£¬²¢½«Æä·Ö³ÉËĸöÊý¾Ý¿é½øÐмÓÃÜ ¡£¡£ÎÊÌâÔÚÓÚ£¬£¬Ã¿¸öÊý¾Ý¿é¼ÓÃÜʱÌìÉúµÄËæ»úÊý¶¼Êä³öµ½Í³Ò»¸öÄڴ滺³åÇøÖУ¬£¬µ¼ÖÂÿ¸öеÄËæ»úÊý³ÇÊи²¸Çǰһ¸ö ¡£¡£µ±Ëùº±¼û¾Ý¿é´¦ÖýáÊøºó£¬£¬ÄÚ´æÖÐÖ»ÁôÏÂ×îºóÒ»¸öÌìÉúµÄËæ»úÊý£¬£¬ÇÒÖ»»á½«¸ÃËæ»úÊýдÈë´ÅÅÌ ¡£¡£Òò¶ø£¬£¬±»Ô׸î³ÉËÄ¿éµÄ´óÎļþÖУ¬£¬½öÓÐ×îºó25%µÄ²¿ÃÅÄܹ»¸´Ô­£¬£¬Ç°Èý²¿ÃÅÒòËæ»úÊýÃÔʧ¶øÎÞ·¨½âÃÜ ¡£¡£


https://www.bleepingcomputer.com/news/security/broken-vect-20-ransomware-acts-as-a-data-wiper-for-large-files/


2. LiteLLM·ì϶£º £º£ºÎ´ÊÚȨSQL×¢Èë¿ÉÇÔÈ¡APIÃÜÔ¿


4ÔÂ28ÈÕ£¬£¬ºÚ¿ÍÕýÀûÓñàºÅΪCVE-2026-42208µÄÑÏÖØ·ì϶£¬£¬¹¥»÷´æ´¢ÔÚLiteLLM¿ªÔ´´óÐÍ˵»°Ä£ÐÍÍø¹ØÖеÄÃô¸ÐÐÅÏ¢ ¡£¡£¸Ã·ì϶ÊÇLiteLLM´úÀíAPIÃÜÔ¿ÑéÖ¤²½ÖèÖгöÏÖµÄSQL×¢ÈëÎÊÌ⣬£¬¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÀûÓ㬣¬Ö»ÐèÏòÈκÎLLM API·ÓÉ·¢ËÍÌØÖÆµÄAuthorization±êÍ·£¬£¬±ãÄܶÁÈ¡´úÀíÊý¾Ý¿âÖеÄÊý¾Ý²¢½øÐÐÅú¸Ä ¡£¡£Æ¾¾ÝÊØ»¤Õߵݲȫ²¼¸æ£¬£¬¹¥»÷Õß¿ÉÀûÓôËÖ°ÄÜ»ñµÃ¶Ô´úÀí¼°ÆäÖÎÀíÍ´´¦µÄδÊÚȨ½Ó¼û ¡£¡£LiteLLM´æ´¢APIÃÜÔ¿¡¢¡¢¡¢Ðé¹¹ÃÜÔ¿¡¢¡¢¡¢Ö÷ÃÜÔ¿ÒÔ¼°»·¾³/ÅäÖÃÃÜÔ¿£¬£¬Òò¶øÊý¾Ý¿â±»½Ó¼ûÒâζןڿͿɶÁÈ¡´óÁ¿Ãô¸ÐÊý¾Ý£¬£¬½ø¶ø·¢Æð½øÒ»²½¹¥»÷ ¡£¡£¸Ã·ì϶ÔÚLiteLLM 1.83.7°æ±¾ÖÐͨ¹ý²ÎÊý»¯²éÎÊÈ¡´úÁ˲»°²È«µÄ×Ö·û´®Æ´½ÓµÃÒÔÐÞ¸´ ¡£¡£LiteLLM½üÆÚ»¹³ÉΪ¹©¸øÁ´¹¥»÷µÄÖ¸±ê£¬£¬TeamPCPºÚ¿ÍÔø°ä²¼¶ñÒâPyPI°ü²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½£¬£¬´ÓÊÜϰȾϵͳÖÐÇÔȡƾ֤¡¢¡¢¡¢ÁîÅÆºÍÃÜÔ¿ ¡£¡£Ôư²È«¹«Ë¾SysdigµÄ×êÑл㱨ָ³ö£¬£¬CVE-2026-42208·ì϶µÄÀûÓÃÔÚ4ÔÂ24ÈÕ¹«¿ªÅû¶ºóÔ¼36Сʱ±ãÒÑÆðÍ·£¬£¬×êÑÐÈËÔ±¹Û²ìµ½ÐîÒâÇÒÓÐÕë¶ÔÐԵĹ¥»÷³¢ÊÔ ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw/


3. VimeoÊÜAnodotй¶ÖêÁ¬£¬£¬ShinyHuntersÍþв¹«¿ªÊý¾Ý


4ÔÂ28ÈÕ£¬£¬ÊÓÆµÆ½Ì¨Vimeo½üÈÕÅû¶£¬£¬ÓÉÓÚµÚÈý·½Êý¾ÝÒì³£¼ì²â¹«Ë¾Anodot²úÉúÊý¾Ýй¶ÊÂÎñ£¬£¬Æä²¿Ãſͻ§ºÍÓû§µÄÊý¾ÝÔ⵽δ¾­ÊÚȨµÄ½Ó¼û ¡£¡£Vimeo°µÊ¾£¬£¬¹¥»÷Õß»ñÈ¡Á˲¿Ãſͻ§µÄµç×ÓÓʼþµØÖ·£¬£¬µ«Ð¹Â¶µÄ´ó²¿ÃÅÐÅÏ¢Ô̺¬¼¼·¨Êõ¾Ý¡¢¡¢¡¢ÊÓÆµ±êÌâºÍÔªÊý¾Ý ¡£¡£³õ´ëÊ©²éÁ˾ÖÅú×¢£¬£¬±»½Ó¼ûµÄÊý¾Ý¿âÖØÒªÔ̺¬¼¼·¨Êõ¾Ý¡¢¡¢¡¢ÊÓÆµ±êÌâºÍÔªÊý¾Ý£¬£¬ÔÚijЩÇé¿öÏ»¹Ô̺¬¿Í»§µÄµç×ÓÓʼþµØÖ· ¡£¡£Õâ´ÎÊý¾Ýй¶ÊÂÎñÒѱ»³ôÃûÔ¶ÑïµÄÀÕË÷×éÖ¯ShinyHuntersÐû³ÆÕƹÜ£¬£¬¸Ã×éÖ¯ÍþвÐû³Æ°ÑÎÕÁ˸ù«Ë¾SnowflakeºÍBigQueryʵÀýÖеÄÊý¾Ý£¬£¬³ý·ÇVimeoÖ§¸¶Êê½ð£¬£¬²»È»½«ÔÚ4ÔÂ30ÈÕ֮ǰ°ä²¼±»µÁÊý¾Ý ¡£¡£ÔÚAnodotÊÂÎñÖУ¬£¬¹¥»÷ÕßÇÔÈ¡ÁËÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬²¢ÀûÓÃÕâЩÁîÅÆ½Ó¼û¿Í»§»·¾³£¨ÖØÒªÊÇSnowflake£©£¬£¬´Ó¶à¸ö×éÖ¯ÖÐÇÔÈ¡Êý¾Ý ¡£¡£¾ÍVimeo¶øÑÔ£¬£¬ÓÉÓÚÉæÊ·½Î´×¢Ã÷±»µÁÊý¾ÝµÄÊýÁ¿£¬£¬Ó°ÏìÒÀÈ»²»Ë¬ÀÊ ¡£¡£VimeoÒÑÃ÷È·°µÊ¾£¬£¬Ð¹Â¶µÄÊý¾Ý²»Ô̺¬Óû§ÉÏ´«µ½Æ½Ì¨µÄÊÓÆµÄÚÈÝ¡¢¡¢¡¢ÕË»§Æ¾Ö¤»òÖ§¸¶¿¨ÐÅÏ¢£¬£¬Æ½Ì¨ÔËӪδÊÜÓ°Ïì ¡£¡£¸Ã¹«Ë¾ÏÖÒѽûÓÃËùÓÐAnodotƾ֤£¬£¬²¢È¡µÞÁ˸÷þÎñÓëÆäϵͳµÄ¼¯³É ¡£¡£


https://www.bleepingcomputer.com/news/security/video-service-vimeo-confirms-anodot-breach-exposed-user-data/


4. Checkmarx֤ʵLAPSUS$й¶ÆäGitHubÊý¾Ý


4ÔÂ28ÈÕ£¬£¬ÀûÓð²È«¹«Ë¾CheckmarxÒÑ֤ʵ£¬£¬LAPSUS$Íþв×é֯й¶ÁË´ÓÆä˽ÓÐGitHub´æ´¢¿âÖÐÇÔÈ¡µÄÊý¾Ý ¡£¡£¹ÌÈ»µ÷²éÈÔÔÚ½øÐÐÖУ¬£¬µ«CheckmarxÒÔΪ¹¥»÷Èë¿ÚÊÇ´Ëǰ¹é×ïÓÚºÚ¿Í×éÖ¯TeamPCPµÄTrivy¹©¸øÁ´¹¥»÷£¬£¬¸Ã¹¥»÷»ñÈ¡ÁËÏÂÓÎÓû§µÄƾ֤ ¡£¡£ÀûÓôÓTrivyÊÂÎñÖÐÇÔÈ¡µÄƾ֤£¬£¬¹¥»÷ÕßµÃÒÔ½Ó¼ûCheckmarxµÄGitHub´æ´¢¿â£¬£¬²¢ÓÚ3ÔÂ23ÈÕ°ä²¼Á˶ñÒâ´úÂë ¡£¡£CheckmarxÚ¹ÊͳÆ£¬£¬ÓÉÓÚ»ñµÃÁËÕâÖÖ½Ó¼ûȨÏÞ£¬£¬¹¥»÷Õß¿ÉÄÜÓëÆäGitHub»·¾³½øÐн»»¥£¬£¬Ëæºó½«¶ñÒâ´úÂë°ä²¼µ½Ä³Ð©¹¤¼þÖÐ ¡£¡£4ÔÂ22ÈÕ£¬£¬¹¥»÷ÕßÀûÓÃÖØÐ»ñµÃµÄ½Ó¼ûȨÏÞ»ò³ÖÐø¹¥»÷Ò»¸öÔ£¬£¬°ä²¼ÁËÕë¶ÔCheckmarxÆìÏÂKICS°²È«É¨ÃèÆ÷µÄ¶ñÒâDocker¾µÏñ¡¢¡¢¡¢VSCodeºÍOpen VSXÀ©´ó£¬£¬´ÓÖÐÇÔÈ¡ÁËÍ´´¦¡¢¡¢¡¢ÃÜÔ¿¡¢¡¢¡¢ÁîÅÆºÍÅäÖÃÎļþ ¡£¡£×òÈÕ£¬£¬Checkmarx°ä²¼×îÐÂÐÂÎųÆ£¬£¬LAPSUS$×éÖ¯ÔÚÆäÀÕË÷ÃÅ»§ÍøÕ¾Éϰ䲼µÄÊý¾ÝÊôÓÚCheckmarx£¬£¬ÇÒÔ´×Ô3ÔÂ23ÈÕµÄÈëÇÖÊÂÎñ ¡£¡£¹«Ë¾ÓëÒ»¼Òµ±ÏȵÚÈý·½È¡Ö¤¹«Ë¾ºÏ×÷½øÐеĵ÷²éÅú×¢£¬£¬Ò»¸öÍøÂç·¸×ïÍÅ»ïÒѽ«ÓйØÊý¾Ý°ä²¼µ½°µÍø ¡£¡£


https://www.bleepingcomputer.com/news/security/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data/


5. Å·ÖÞÕþÒªÔâSignal´¹µö¹¥»÷£¬£¬µÂ·½Ö¸¶íÂÞ˹ÊÇÄ»ºóºÚÊÖ


4ÔÂ28ÈÕ£¬£¬µÂ¹úµ±¾Ö½üÆÚµÄµ÷²éÏÔʾ£¬£¬ÓÐÈËÀûÓÃSignal¼´Ê±Í¨Ñ¶Æ½Ì¨ÌáÒéÁËÒ»³¡´ó¹æÄ£µÄÍøÂç´¹µö»î¶¯£¬£¬²¢Ç¿ÁÒÒÉ»ó¶íÂÞ˹²Î¼ÓÆäÖÐ ¡£¡£Õâ´ÎÐж¯µÄÖ¸±êÔ̺¬µÂ¹ú¹Ù³¡ÈËÊ¿¡¢¡¢¡¢²¿³¤¡¢¡¢¡¢¾ü·½ÈËÔ±¡¢¡¢¡¢Íâ½»¹ÙºÍ¼ÇÕßÔÚÄڵijÛÃûÈËÊ¿ ¡£¡£µÂ¹ú¼ì²ì¹ÙÒÑ·¢Õ¹µ÷²é£¬£¬ÒÔΪÕâ¿ÉÄÜÊÇһ·ÓÐ×éÖ¯µÄ¼äµý»î¶¯£¬£¬³õ²½Ö¤¾ÝÅúעĻºóºÚÊÖ¿ÉÄÜÊǹú¶ÈÐÐΪÌå ¡£¡£¹¥»÷Õß¼ÙÒâSignal¹Ù·½¿Í·þ»ò¿ÉÐÅÁªÏµÈË£¬£¬Í¨¹ý·¢ËÍÐÅÏ¢¿¿½üÊܺ¦Õߣ¬£¬ÓÕÆ­ËûÃÇ·ÖÏíÑéÖ¤Âë¡¢¡¢¡¢É¨Ãè¶ñÒâ¶þάÂë»òµã»÷¾«ÐÄÉè¼ÆµÄÁ´½Ó ¡£¡£Ò»µ©Êܺ¦Õß±»¹¥ÆÆ£¬£¬¹¥»÷Õß±ã¿É½Ó¼û¸öÈË̸Ìì¼Í¼¡¢¡¢¡¢ÁªÏµÈËÁбí£¬£¬ÉõÖÁ¿ÉÄÜÉæ¼°Ãô¸ÐµÄÕþÖλáÉÌÄÚÈÝ ¡£¡£Õâ´ÎÐж¯»¹ÊÔͼ¹¥»÷µÂ¹ú×ÜÀí¸¥ÀïµÂÀïÏ£¡£¡¤Ä¬´Ä£¬£¬µ«ÉÐδ֤ʵÆäÕË»§Ò²Ôâµ½ÈëÇÖ ¡£¡£µ±¾Ö¹À¼Æ¿ÉÄܺ±¼û°Ù¸öÕË»§Êܵ½Ó°Ïì ¡£¡£¹ÌÈ»°ØÁÖ·½ÃæÉÐδÕýʽָÈϹ¥»÷Õߣ¬£¬µ«µý±¨ÆðÔ´Ô½À´Ô½¶àµØÖ¸Ïò¶íÂÞ˹²Î¼ÓÆäÖУ¬£¬ÕâÓëÕë¶ÔÅ·ÖÞÃñÖ÷¹ú¶ÈµÄ¸ü¿í·ºÍøÂç»î¶¯Ä£Ê½Ïà·û ¡£¡£µÂ¹úµ±¾Ö½²»°È˰µÊ¾£¬£¬µÂ¹úµ±¾ÖÒÉ»ó¶íÂÞ˹ÊÇÄ»ºóºÚÊÖ ¡£¡£


https://securityaffairs.com/191425/intelligence/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation.html


6. Morpheus¼äµýÈí¼þ£º £º£º¼Ù×°°²×¿¸üÐÂÇÔÈ¡Êý¾Ý


4ÔÂ28ÈÕ£¬£¬ÎÞµ³ÅÉ·ÇͶ»ú×éÖ¯Osservatorio NessunoÆØ¹âÁËÒ»ÖÖÃûΪMorpheusµÄÐÂÐͼäµýÈí¼þ£¬£¬¸ÃÈí¼þͨ¹ý¼Ù×°³Éϵͳ¸üеÄÐéα°²×¿ÀûÓýøÐд«²¼ ¡£¡£Ò»µ©×°Ö㬣¬Ëü¾ÍÄÜ´ÓÊÜϰȾµÄÉ豸ÉÏÇÔÈ¡´óÁ¿Êý¾Ý ¡£¡£»ã±¨ÏÔʾ£¬£¬·¨Âɺ͵ý±¨»ú¹¹¶Ô´ËÀàÈí¼þÐèҪǿ¾¢£¬£¬Íƶ¯Á˼äµýÈí¼þ¹©¸øÉÌÊг¡µÄÅ·¢Õ¹ ¡£¡£¹¥»÷ÕßѡȡµÍ³É±¾¼äµýÈí¼þµÄµäÐÍÕ½Êõ£º £º£º·ÛËé·þÎñºóÓÕÆ­Êܺ¦Õß×°ÖÃÐéα¸´Ô­ÀûÓà ¡£¡£Ö¸±êÓû§ÊÕµ½º¬¼Ù×°³É»¥ÁªÍø·þÎñÌṩÉÌÍøÕ¾µÄ¶ÌÐÅÁ´½Ó£¬£¬µÚÒ»½×¶ÎͶ·ÅÆ÷»á×°Öðµ²ØµÄµÚ¶þ½×¶ÎÔØºÉ£¬£¬²¢ÔÚÓû§ÏÕЩ²»ÖªÇéµÄÇé¿öϲ¿Êð ¡£¡£µÚ¶þ½×¶Î¼Ù×°³ÉºÏ·¨ÏµÍ³×é¼þ£¬£¬Ê¹ÓÃÐéαͼ±êºÍÃû³Æ²©ÊØÐÅÀµ£¬£¬Ð²ÆÈÓû§ÊÚÓèÔ̺¬¸¨ÖúÖ°ÄܽӼûÔÚÄÚµÄΣÏÕȨÏÞ ¡£¡£»ñµÃ¸¨ÖúÖ°ÄÜȨÏ޺󣬣¬¼äµýÈí¼þÆô¶¯È¨ÏÞ¹¤×÷Á÷£¬£¬´´½¨Ô̺¬Ðéα¸üÐÂÁ÷³ÌºÍÖØÆôÆÁÄ»µÄ¸²¸Ç²ã£¬£¬ÔÚºó¶ÜÖ´ÐÐËùÓв½ÖèÒÔÊÚÓèÈ«ÊýȨÏÞ£¬£¬Ô̺¬ÆôÓÿª·¢ÕßÑ¡Ïî¡¢¡¢¡¢¿ªÆôÎÞÏßµ÷ÊÔ²¢Óë±¾µØADBÊØ»¤·¨Ê½Åä¶Ô ¡£¡£ÔÚµÚÈý½×¶Î£¬£¬¸Ã¼äµýÈí¼þÎÞÐèrootȨÏÞ¼´¿É½ûÓöà¿î³ÛÃûɱ¶¾Èí¼þ ¡£¡£


https://securityaffairs.com/191398/malware/new-android-spyware-morpheus-linked-to-italian-surveillance-firm.html