SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´
Ðû²¼Ê±¼ä 2026-02-101. SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´
2ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Huntress SecurityÑо¿Ö°Ô±Åû¶ºÚ¿ÍÕýʹÓÃSolarWinds Web Help Desk£¨WHD£©Îó²î°²ÅÅÕýµ±¹¤¾ßʵÑé¶ñÒâ¹¥»÷¡£¡£¡£¹¥»÷ÕßÕë¶ÔÖÁÉÙÈý¸ö×éÖ¯£¬£¬£¬£¬£¬£¬Í¨¹ýCVE-2025-40551ºÍCVE-2025-26399Á½¸ö¸ßΣÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬Ëæºó´ÓCatboxƽ̨ÏÂÔØMSIÎļþ×°ÖÃZoho ManageEngine AssistÊðÀí£¬£¬£¬£¬£¬£¬ÉèÖÃÎÞÈËÖµÊØ»á¼û²¢½«ÊÜѬȾÖ÷»ú×¢²áÖÁÄäÃûProton Mail¹ØÁªµÄZohoÕË»§¡£¡£¡£¸Ã¹¤¾ß±»ÓÃÓÚÖ±½Ó¼üÅ̲Ù×÷¡¢ADÕì̽¼°°²ÅÅVelociraptor£¬£¬£¬£¬£¬£¬ºóÕß´ÓSupabase´æ´¢Í°»ñÈ¡£¡£¡£¬£¬£¬£¬£¬£¬×÷ΪC2¿ò¼Üͨ¹ýCloudflare WorkersÓë¹¥»÷ÕßͨѶ¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß½ÓÄɶàÊÖ¶Îά³Ö³¤ÆÚ»¯£º°²ÅŹýʱVelociraptor 0.73.4°æ¡¢×°ÖÃCloudflared½¨ÉèC2ÈßÓàËíµÀ¡¢Í¨¹ýÍýÏëʹÃüTPMProfilerÁ¬ÏµQEMU¿ªÆôSSHºóÃÅ£¬£¬£¬£¬£¬£¬²¢ÐÞ¸Ä×¢²á±í½ûÓÃWindows Defender¼°·À»ðǽÒÔ¹æ±Ü¼ì²â¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷Õß¶ÌÔݽûÓÃDefenderºóÏÂÔØVS Codeи±±¾£¬£¬£¬£¬£¬£¬È·±£ºóÐøÔØºÉ˳ËìÖ´ÐС£¡£¡£
https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/
2. SmarterToolsÔâWarlockÀÕË÷Èí¼þ¹¥»÷
2ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬SmarterTools¹«Ë¾ÔâÓöWarlockÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÒòÓÉϵԱ¹¤°²ÅŵÄδ¸üÐÂSmarterMailÐéÄâ»ú£¨VM£©±£´æCVE-2026-23760Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÃÜÂë²¢»ñÈ¡ÍêȫȨÏÞ£¬£¬£¬£¬£¬£¬½ø¶øÍ¨¹ýActive DirectoryºáÏòÉøÍ¸ÖÁ12̨WindowsЧÀÍÆ÷¼°¸¨ÖúÊý¾ÝÖÐÐÄ¡£¡£¡£Ö»¹Ü¹«Ë¾LinuxЧÀÍÆ÷δÊܲ¨¼°£¬£¬£¬£¬£¬£¬ÇÒSentinel OneÇå¾²²úÆ·ÀÖ³É×èµ²×îÖÕ¼ÓÃÜÔØºÉ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìϵͳÒѸôÀë²¢´Ó±¸·Ý»Ö¸´£¬£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÑÏÖØÇ徲Σº¦¡£¡£¡£¾ÝÊ×ϯÉÌÎñ¹ÙµÂÀï¿Ë¡¤¿ÂµÙ˹͸¶£¬£¬£¬£¬£¬£¬¹«Ë¾ÍøÂçÖÐÔ¼30̨SmarterMailЧÀÍÆ÷/ÐéÄâ»úÖб£´æµ¥µãÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓôËȱ¿Ú°²ÅÅVelociraptor¡¢SimpleHelp¼°±£´æÎó²îµÄWinRAR°æ±¾£¬£¬£¬£¬£¬£¬Á¬ÏµÆô¶¯ÏîÓëÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¡£¡£¡£Cisco Talos´ËǰÒѱ¨¸æVelociraptor±»ÀÄÓÃÓÚÀÕË÷Èí¼þ¹¥»÷µÄ°¸Àý£¬£¬£¬£¬£¬£¬¶ø´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬£¬WarlockÍÅ»ï¸üͨ¹ýSmarterMailÄÚÖõġ°¾í¹ÒÔØ¡±¹¦Ð§Ç¿»¯ÏµÍ³¿ØÖÆÈ¨¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/
3. BeyondTrustÐÞ¸´¸ßΣCVE-2026-1731Îó²î
2ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬BeyondTrustÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Ó°ÏìÔ¶³ÌÖ§³Ö£¨RS£©¼°ÌØÈ¨Ô¶³Ì»á¼û£¨PRA£©²úÆ·µÄ¸ßΣÎó²îCVE-2026-1731¡£¡£¡£¸ÃÎó²î±»¹éÀàΪ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ý·¢ËÍÈ«ÐĽṹµÄÇëÇ󣬣¬£¬£¬£¬£¬ÔÚÍøÕ¾Óû§ÉÏÏÂÎÄÖÐÖ´ÐвÙ×÷ϵͳÏÂÁ£¬£¬£¬£¬£¬½ø¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС¢Î´ÊÚȨ»á¼û¡¢Êý¾Ýй¶¼°Ð§ÀÍÖÐÖ¹¡£¡£¡£BeyondTrustÇ¿µ÷£¬£¬£¬£¬£¬£¬×ÔÍйܿͻ§ÈôδÆôÓÃ×Ô¶¯¸üУ¬£¬£¬£¬£¬£¬ÐèÊÖ¶¯Ó¦Óò¹¶¡£¡£¡£»£»£»ÔËÐеÍÓÚ21.3°æ±¾µÄRS»òµÍÓÚ22.1°æ±¾µÄPRAÓû§ÐèÏÈÉý¼¶ÖÁ¼æÈݰ汾ÔÙ´ò²¹¶¡¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Harsh JaiswalÓÚ2026Äê1ÔÂ31ÈÕͨ¹ýAIÇý¶¯µÄ±äÖÖÆÊÎö·¢Ã÷¡£¡£¡£¾ÝÆäÅû¶£¬£¬£¬£¬£¬£¬È«ÇòÔ¼11,000¸öBeyondTrustʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬ÆäÖÐ8,500¸öΪÍâµØ°²ÅÅ£¬£¬£¬£¬£¬£¬Èôδʵʱ´ò²¹¶¡£¡£¡£¬£¬£¬£¬£¬£¬ÈÔ±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Îó²îϸ½ÚÉÐδÍêÈ«¹ûÕæ£¬£¬£¬£¬£¬£¬ÒÔÁô³öÓû§Éý¼¶Ê±¼ä¡£¡£¡£
https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html
4. PhorpiexÈö²¥Global GroupÀÕË÷Èí¼þ´¹ÂÚÐÂÊÖ·¨
2ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Forcepoint X-LabsÑо¿Ö°Ô±·¢Ã÷Ò»ÆðʹÓÃPhorpiex¶ñÒâÈí¼þÈö²¥Global GroupÀÕË÷Èí¼þµÄ´ó¹æÄ£ÍøÂç´¹Âڻ¡£¡£¡£¸Ã¹¥»÷ͨ¹ýαװ³É¡°Document.doc¡±µÄWindows¿ì½Ý·½·¨Îļþ£¨.lnk£©ÊµÑ飬£¬£¬£¬£¬£¬Ê¹ÓÃË«À©Õ¹ÃûÓÕÆÓû§µã»÷£¬£¬£¬£¬£¬£¬ÏÖʵÎļþΪ.lnkÃûÌ㬣¬£¬£¬£¬£¬µ«WindowsĬÈÏÒþ²Ø×îºóÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬µ¼ÖÂÓû§ÎóÒÔΪÊÇͨË×WordÎĵµ¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬Ö÷Ìâ¶àΪ¡°ÄúµÄÎĵµ¡±ÒÔÒý·¢Óû§ºÃÆæ»òµ£ÐÄ¡£¡£¡£µã»÷.lnkÎļþºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß½ÓÄÉ¡°½èÁ¦´òÁ¦¡±£¨Living off the Land£¬£¬£¬£¬£¬£¬LotL£©ÊÖÒÕ£¬£¬£¬£¬£¬£¬Ð®ÖÆÏµÍ³×Ô´ø¹¤¾ßÈçPowerShellºÍÏÂÁîÌáÐÑ·ûÖ´ÐжñÒâÏÂÁ£¬£¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐαװ³Éϵͳ×é¼þ£¨Èçwindrv.exe£©µÄ²¡¶¾¡£¡£¡£Global GroupÀÕË÷Èí¼þ×÷ΪMamonaµÄÉý¼¶°æ£¬£¬£¬£¬£¬£¬Æä½¹µãÍþвÔÚÓÚ¡°¾²Ä¬¡±Ä£Ê½£ºËùÓвÙ×÷¾ùÔÚÍâµØÍê³É£¬£¬£¬£¬£¬£¬ÎÞÐèÅþÁ¬ÍⲿЧÀÍÆ÷»ñÈ¡¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬Ö÷»ú×ÔÉíÌìÉúÃÜÔ¿ºóÖ±½Ó¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬Ö§³ÖÀëÏß״̬ÏÂËø¶¨Ãü¾Ý¡£¡£¡£¸ÃÀÕË÷Èí¼þ½ÓÄÉChaCha20-Poly1305¼ÓÃÜËã·¨£¬£¬£¬£¬£¬£¬ÎÞÊý×ÖÃÜԿʱÎļþÏÕЩÎÞ·¨»Ö¸´¡£¡£¡£
https://hackread.com/hackers-global-group-ransomware-offline-phishing-emails/
5. Å·ÃËίԱ»áÖÐÑëÒÆ¶¯×°±¸ÖÎÀíϵͳÔâÍøÂç¹¥»÷
2ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Å·ÃËίԱ»á¼ì²âµ½ÖÐÑëÒÆ¶¯×°±¸ÖÎÀí£¨MDM£©ÏµÍ³1ÔÂ30ÈÕÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉÄÜй¶Ա¹¤ÐÕÃû¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«ÏÖʵÊÖ³Ö×°±¸Î´±»ÈëÇÖ¡£¡£¡£´Ë´Î¹¥»÷Ç¡·êIvanti¹«Ë¾Åû¶ÆäEndpoint Manager Mobile£¨EPMM£©Èí¼þ±£´æCVE-2026-1281¡¢CVE-2026-1340Á½¸ö¸ßΣ´úÂë×¢ÈëÎó²îÔ½ÈÕ£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÔÊÐíºÚ¿ÍÈÆ¹ýÈÏÖ¤Ô¶³Ì¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£Î¯Ô±»áÔÚ·¢Ã÷¹¥»÷ºó9СʱÄÚÍê³ÉϵͳÇå¾²¼Ó¹ÌÓëÕûÀí£¬£¬£¬£¬£¬£¬µ«ÊÂÎñÈÔÒý·¢¶ÔIvanti²¹¶¡Õ½ÂÔµÄÖÊÒÉ¡£¡£¡£Ç徲ר¼ÒDavid NeesonÖ¸³ö£¬£¬£¬£¬£¬£¬IvantiδÌṩÍêÕûÐÞ¸´¼Æ»®£¬£¬£¬£¬£¬£¬½öÐû²¼ÔÝʱ²¹¶¡£¡£¡£¬£¬£¬£¬£¬£¬ÇÒ²¹¶¡Òò°æ±¾ÊÊÅäÎÊÌâ±£´æÊ§Ð§Î£º¦£¬£¬£¬£¬£¬£¬ÕâÖÖ"Ë鯬»¯ÐÞ¸´"¿ÉÄÜ´øÀ´±ÈÖÜÈ«¸üиü´óµÄÇå¾²Òþ»¼¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬IvantiÍýÏëÔÚδÀ´ÊýÔ¿ª·¢ÖÜÈ«ÐÞ¸´£¬£¬£¬£¬£¬£¬²¢ÍƳöRPM¼ì²â¹¤¾ß¸¨ÖúÎó²îÅŲ顣¡£¡£Å·ÃËίԱ»áÔÊÐíÖÜÈ«Éó²éÊÂÎñ£¬£¬£¬£¬£¬£¬Ç¿»¯CERT-EUµÈ»ú¹¹24СʱÍþв¼à¿ØÄÜÁ¦¡£¡£¡£
https://hackread.com/cyber-attack-european-commission-staff-mobile-systems/
6. dYdX¹©Ó¦Á´ÔâÐÂÐÍ¿çÓïÑÔ¶ñÒâ°ü¹¥»÷
2ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶npmºÍPyPI¿ÍÕ»ÖÐdYdXÏà¹ØÕýµ±°üÔ⹩ӦÁ´¹¥»÷£º@dydxprotocol/v4-client-js£¨npm£©3.4.1µÈ°æ±¾¼°dydx-v4-client£¨PyPI£©1.1.5post1°æ±¾±»Ö²Èë¶ñÒâ´úÂë¡£¡£¡£ÕâЩ°üÓÃÓÚdYdX v4ÐÒéµÄ¼ÓÃÜÇ®±ÒÉúÒ⡢Ǯ°ü¹ÜÀíµÈ¸ßÃô¸Ð²Ù×÷£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÉúÒâÁ¿³¬1.5ÍòÒÚÃÀÔª¡£¡£¡£¹¥»÷Õßͨ¹ýµÁÓÿª·¢ÕßÕË»§ÍÆËͶñÒâ¸üУ¬£¬£¬£¬£¬£¬npm°üÀ¨Ç®°üÇÔÈ¡Æ÷£¬£¬£¬£¬£¬£¬¿ÉÇÔÈ¡Öú¼Ç´Ê¼°×°±¸ÐÅÏ¢£»£»£»PyPI°üÌØÊâÖ²ÈëÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬£¬£¬£¬ÅþÁ¬ÍⲿЧÀÍÆ÷»ñȡָÁ£¬£¬£¬£¬£¬WindowsϵͳÏÂͨ¹ý¡°CREATE_NO_WINDOW¡±±ê¼ÇÒþÄäÖ´ÐС£¡£¡£¶ñÒâ´úÂë±»Ö²Èë½¹µãÎļþ£¬£¬£¬£¬£¬£¬ÔÚ°üÕý³£Ê¹ÓÃʱ´¥·¢£¬£¬£¬£¬£¬£¬PyPI°æ±¾½ÓÄÉ100ÂÖ»ìÏý´¦Öóͷ££¬£¬£¬£¬£¬£¬¿çÉú̬ϵͳ¹¥»÷ÐͬÐÔÅú×¢¹¥»÷ÕßÖ±½Ó»ñÈ¡Ðû²¼»ù´¡ÉèÊ©»á¼ûȨ¡£¡£¡£dYdXÔÚXƽ̨ȷÈÏÊÂÎñ£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¸ôÀë×°±¸¡¢×ªÒÆ×ʲúÖÁÐÂÇ®°ü¡¢Ìæ»»APIÃÜÔ¿¼°Æ¾Ö¤¡£¡£¡£
https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html


¾©¹«Íø°²±¸11010802024551ºÅ