ÈðµäOutpost24¹«Ë¾¸ß¹ÜÔâKratos´¹ÂÚ¹¥»÷
Ðû²¼Ê±¼ä 2026-03-181. ÈðµäOutpost24¹«Ë¾¸ß¹ÜÔâKratos´¹ÂÚ¹¥»÷
3ÔÂ16ÈÕ£¬£¬£¬£¬Èðµä̻¶ÖÎÀíÓëÉí·ÝÇå¾²¹«Ë¾Outpost24µÄ×Ó¹«Ë¾Specops Software¿ËÈÕÅû¶£¬£¬£¬£¬¸Ã¹«Ë¾Ò»ÃûC¼¶¸ß¹Ü³ÉÎªÖØ´ó´¹ÂÚ¹¥»÷µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¿ÉÄÜʹÓÃÁËÃûΪKratosµÄ´¹ÂÚ¼´Ð§À͹¤¾ß°ü£¬£¬£¬£¬½ÓÄÉÆß²½¹¥»÷Á´£¬£¬£¬£¬Ê¹Ó÷ֲã»ù´¡ÉèÊ©ºÍÕýµ±Ð§À͹æ±Ü¼ì²â¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßð³ä½ðÈÚЧÀÍÌṩÉÌJP Morgan£¬£¬£¬£¬½«´¹ÂÚÓʼþαװ³ÉÏÖÓÐÓʼþÏ̵߳ÄÒ»²¿·Ö£¬£¬£¬£¬Ô¼ÇëÊÕ¼þÈËÉó²é²¢Ç©ÊðÎļþ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ½¸öDomainKeys Identified Mail(DKIM) ÊðÃûÈ·±£Óʼþͨ¹ýDMARCÑéÖ¤£¬£¬£¬£¬ÔöÌí¿ÉÐŶȡ£¡£¡£¡£¡£¡£¡£ÓʼþÖаüÀ¨Ö¸ÏòCiscoÕýµ±ÓòÃûsecure-web.cisco.comµÄ"Éó²éÎļþ"Á´½Ó£¬£¬£¬£¬¸ÃÓòÃûͨ³£ÓÃÓÚCiscoÑéÖ¤ºóÖØÐ´ÓʼþURL¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´ÏÂÒ»²½Éæ¼°ÖØ¶¨ÏòÖÁÕýµ±ÓʼþAPIƽ̨Nylas£¬£¬£¬£¬È·±£´¹ÂÚÁ´½Óͨ¹ýCisco Secure Web»ù´¡ÉèÊ©ÖØ¶¨Ïò¡£¡£¡£¡£¡£¡£¡£ËæºóÄ¿µÄ±»Öض¨ÏòÖÁÒ»¼ÒÓ¡¶È¿ª·¢¹«Ë¾ÍøÕ¾µÄ×ÓÓòÃû£¬£¬£¬£¬ÔÙÌø×ªÖÁÒ»¸ö×î³õÓÉÖйúʵÌåÓÚ2017Äê×¢²áµÄÓòÃû¡£¡£¡£¡£¡£¡£¡£Óû§×îÖÕ±»Öض¨ÏòÖÁ°²ÅÅÔÚCloudflareºó·½µÄ´¹ÂÚ»ù´¡ÉèÊ©£¬£¬£¬£¬Òþ²ØÔ´Ð§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£×îºóÊܺ¦Õß±»·ºÆðÒ»¸ö±ÆÕæµÄ´¹ÂÚÒ³Ãæ£¬£¬£¬£¬ÓÃÓÚÇÔÈ¡Microsoft 365ƾ֤¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/security-firm-executive-targeted-in-sophisticated-phishing-attack/
2. ¶íÂÞ˹±Ë¶ûÄ·ÊÐÍ£³µÖ§¸¶ÏµÍ³ÔâDDoS¹¥»÷̱»¾
3ÔÂ17ÈÕ£¬£¬£¬£¬¶íÂÞ˹±Ë¶ûÄ·ÊÐ(Perm)Í£³µÖ§¸¶ÏµÍ³¿ËÈÕÔâÊÜ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷ºó»Ö¸´ÔËÓª¡£¡£¡£¡£¡£¡£¡£¸ÃÊÐÕþ¸®ÖÜһȷÈÏ£¬£¬£¬£¬ÏµÍ³ÏÖÒÑÍêÈ«»Ö¸´Õý³£ÔËÐУ¬£¬£¬£¬ËùÓÐÖ§¸¶·½·¨¾ù¿ÉÕý³£Ê¹Óᣡ£¡£¡£¡£¡£¡£ÍâµØ¹ÙÔ±ÌåÏÖ£¬£¬£¬£¬´Ë´ÎÖÐÖ¹ÓÉ´ó¹æÄ£DDoS¹¥»÷ÒýÆð£¬£¬£¬£¬¹¥»÷ѹ¿åÁ˸ÃÊÐ×Ô¶¯Í£³µÖ§¸¶»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£¹¥»÷µ¼ÖÂÈ«ÊÐÍ£³µÖ§¸¶ÔÝÍ££¬£¬£¬£¬¼ÝʻԱÎÞ·¨Í¨¹ý¹Ù·½Ó¦ÓóÌÐòºÍÍøÕ¾Ö§¸¶Í£³µ·Ñ¡£¡£¡£¡£¡£¡£¡£3ÔÂ10ÈÕÖÁ3ÔÂ13ÈÕϵͳ̱»¾Ê±´ú£¬£¬£¬£¬¹ÙÔ±ÌåÏÖ¼ÝʻԱ²»»áÒòδ֧¸¶Í£³µ·Ñ¶øÃæÁÙ´¦·Ö¡£¡£¡£¡£¡£¡£¡£±Ë¶ûÄ·Êеĸ¶·ÑÍ£³µÇøÍ¨³£ÔÚÖÜÄ©Ãâ·Ñ¡£¡£¡£¡£¡£¡£¡£ÕâÊǽüÄêÀ´¶íÂÞ˹¶¼»áÍ£³µÏµÍ³ÖÁÉÙµÚÈý´ÎÔâÊÜ´ËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£È¥Äê1Ô£¬£¬£¬£¬¿ËÀ˹ŵ´ï¶û(Krasnodar)ÊмÝʻԱÒòµçÐÅÔËÓªÉÌÔâÊÜDDoS¹¥»÷¶øÎÞ·¨Ö§¸¶Í£³µ·Ñ£¬£¬£¬£¬Ïà¹ØÐ§ÀÍÊܵ½×ÌÈÅ¡£¡£¡£¡£¡£¡£¡£2024Äê10Ô£¬£¬£¬£¬ÌØÎ¬¶ûÊÐ(Tver)Í£³µÖ§¸¶Ò²ÒòÆÆËðÐÔÍøÂç¹¥»÷ÍâµØÕþ¸®ÍøÂç¶øÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú±Ë¶ûÄ·ÊÂÎñÊÇ·ñÓëÏÈǰ¹¥»÷ÓйØÁª£¬£¬£¬£¬ÔÝÎÞºÚ¿Í×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/cyberattack-russia-parking-system
3. Ó¢¹ú¹«Ë¾×¢²á¾ÖWebFilingЧÀÍÆØÒªº¦Îó²î
3ÔÂ17ÈÕ£¬£¬£¬£¬Ó¢¹ú¹«Ë¾×¢²á¾Ö£¨CompaniesHouse£©¿ËÈÕÈ·ÈÏÆäWebFilingÍøÂçfilingЧÀͱ£´æÒªº¦Çå¾²Îó²î£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜʹ¹¥»÷Õß»á¼û500Íò¼Ò×¢²á¹«Ë¾µÄ·Ç¹ûÕæÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Îó²îÓÚ2025Äê10ÔÂÒýÈëϵͳ£¬£¬£¬£¬2026Äê3ÔÂ12ÈÕÓÉGhostMailÑо¿Ö°Ô±JohnHewitt·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬ËæºóÓÚµ±ÖÜÖÜÄ©Íê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÈκÎÒѵÇÈÎÃü»§»á¼ûÆäËû¹«Ë¾ÔÚCompaniesHouseƽ̨ÉϵÄÕË»§¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÎÞÐèÌØÊâÊÖÒÕÊÖÒÕ£¬£¬£¬£¬Ö»ÐèÑ¡Ôñ"ΪÁíÒ»¼Ò¹«Ë¾filing"Ñ¡Ï£¬£¬£¬ÊäÈëÄ¿µÄ¹«Ë¾µÄΨһ±àºÅ£¬£¬£¬£¬ÔÚÌáÐÑÊäÈëÑéÖ¤Âëʱ°´Ò»ÔÙ·µ»Ø¼ü£¬£¬£¬£¬¼´¿É×Ô¶¯µÇ¼ĿµÄ¹«Ë¾ÕË»§¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²îµÄ¹¥»÷Õß¿ÉÄÜ»ñÈ¡¶Ê³öÉúÈÕÆÚ¡¢¼ÒͥסַºÍµç×ÓÓÊÏäµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬»¹¿ÉÐ޸Ĺ«Ë¾ÏêϸÐÅÏ¢²¢Ìύδ¾ÊÚȨµÄfilingÎļþ¡£¡£¡£¡£¡£¡£¡£CompaniesHouseÔÚÖÜÒ»Ðû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˸ÃÇå¾²Îó²î£¬£¬£¬£¬ÌåÏÖ¸ÃÎÊÌâ½öÓ°ÏìÆäWebFilingЧÀÍ¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»ú¹¹Ç¿µ÷£¬£¬£¬£¬Îó²îÖ»ÄÜÓɾÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓ㬣¬£¬£¬Í¨Ë×¹«ÖÚÎÞ·¨»á¼û¡£¡£¡£¡£¡£¡£¡£Îó²îδ̻¶ÃÜÂë¼°Éí·ÝÑéÖ¤Àú³ÌÖÐÍøÂçµÄÐÅÏ¢£¨È绤Õյȣ©¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷ÕßÎÞ·¨¶ÔÏÖÓÐfilingÎļþ¾ÙÐÐÐ޸ġ£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/uk-companies-house-exposed-details-of-millions-of-firms/
4. RondoDox½©Ê¬ÍøÂçÉý¼¶¹¥»÷Õ½ÂÔ
3ÔÂ17ÈÕ£¬£¬£¬£¬RondoDox½©Ê¬ÍøÂç¿ËÈÕÉý¼¶¹¥»÷»î¶¯£¬£¬£¬£¬Õë¶Ô174¸öÎó²îÌᳫÖðÈոߴï15,000´ÎµÄʹÓÃʵÑ飬£¬£¬£¬½ÓÄÉÔ½·¢¼¯ÖкÍÕ½ÂÔ»¯µÄ¹¥»÷Õ½ÂÔ¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾BitsightÐû²¼µÄ±¨¸æÏÔʾ£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂç×Ô2025Äê5ÔÂ25ÈÕÖÁ2026Äê2ÔÂ16ÈÕʱ´úÒ»Á¬À©´ó¹¥»÷¹æÄ£¡£¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç×îÔçÓÉTrendMicroÓÚ2025Äê6ÔÂ15ÈÕ·¢Ã÷£¬£¬£¬£¬ÆäʱÕýÔÚʹÓÃCVE-2023-1389Îó²î¹¥»÷TP-LinkArcherAX21·ÓÉÆ÷¡£¡£¡£¡£¡£¡£¡£ÒԺ󣬣¬£¬£¬RondoDoxÒ»Á¬À©Õ¹¹¥»÷Ä¿µÄ£¬£¬£¬£¬º¸ÇDVR¡¢NVR¡¢±Õ·µçÊÓϵͳºÍWebЧÀÍÆ÷µÈ30¶àÖÖ×°±¸ÀàÐÍ¡£¡£¡£¡£¡£¡£¡£2025Äê12Ô£¬£¬£¬£¬CloudSEKÑо¿Ö°Ô±ÖÒÑԸý©Ê¬ÍøÂçÕýÔÚʹÓÃÒªº¦React2ShellÎó²î£¨CVE-2025-55182£©ÔÚÒ×Êܹ¥»÷µÄNext.jsЧÀÍÆ÷ÉÏͶ·Å¶ñÒâÈí¼þºÍ¼ÓÃܿ󹤡£¡£¡£¡£¡£¡£¡£BitsightÑо¿Ö°Ô±ÆÊÎö·¢Ã÷£¬£¬£¬£¬¹¥»÷ÕßÒ»Á¬ÂÖ»»Ê¹ÓõÄÎó²î£¬£¬£¬£¬ÔÚ174¸öÎó²îÖÐÓ³Éä³ö148¸öCVE£¬£¬£¬£¬ÆäÖÐ15¸öÓйûÕæ¿´·¨ÑéÖ¤µ«ÎÞCVE±àºÅ£¬£¬£¬£¬ÉÐÓÐ11¸öδÕÒµ½¹ûÕæ¿´·¨ÑéÖ¤¡£¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯·ºÆðº£ÀËÊ½ÌØÕ÷£ºÆÕ±é²âÊԽ׶κó×·ËæÑ¡¶¨Îó²îµÄºã¾ÃʹÓÃÆÚ¡£¡£¡£¡£¡£¡£¡£2025Äê10ÔÂÎó²îʹÓÃÊýÄ¿µÖ´ïµ¥ÈÕ49¸öµÄ·åÖµ£¬£¬£¬£¬ËæºóÎȹÌÔÚ40¸ö×óÓÒ£¬£¬£¬£¬2026ÄêÍ·¼±¾çϽµÖÁ½ö2¸öÎó²î£¬£¬£¬£¬Åú×¢¹¥»÷Õ½ÂÔתÏò¸üÉÙµ«¸üÓÐÓõÄÎó²îʹÓᣡ£¡£¡£¡£¡£¡£
https://securityaffairs.com/189569/malware/rondodox-botnet-expands-arsenal-targeting-174-flaws-and-hits-15000-daily-exploit-attempts.html
5. LeakNetÀÕË÷Èí¼þ½ÓÄÉÐÂÐÍBYOR¹¥»÷ÊÖÒÕ
3ÔÂ17ÈÕ£¬£¬£¬£¬LeakNetÀÕË÷Èí¼þÍÅ»ï¿ËÈÕ½ÓÄÉClickFixÉç»á¹¤³Ì¹¥»÷ÊÖÒÕ»ñÈ¡ÆóÒµÇéÐγõʼ»á¼ûȨÏÞ£¬£¬£¬£¬²¢°²ÅÅ»ùÓÚ¿ªÔ´DenoÔËÐÐʱµÄ¶ñÒâÈí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2024Äêµ×ÒÔÀ´»îÔ¾£¬£¬£¬£¬Æ½¾ùÿÔ¹¥»÷Ô¼3¸öÊܺ¦Õߣ¬£¬£¬£¬Ëæ×ÅÐÂÊÖÒյĽÓÄÉ£¬£¬£¬£¬Æä¹¥»÷¹æÄ£¿£¿£¿£¿£¿£¿ÉÄܽøÒ»²½À©´ó¡£¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾ReliaQuest½«ÕâÖÖÕ½Êõ³ÆÎª"×Ô´øÔËÐÐʱ"£¨BYOR£©¹¥»÷¡£¡£¡£¡£¡£¡£¡£DenoÊÇÕýµ±µÄJavaScript/TypeScriptÔËÐÐʱ£¬£¬£¬£¬ÔÊÐíÔÚϵͳÉÏÖ´ÐÐä¯ÀÀÆ÷ÍâµÄJS/TS´úÂë¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚDeno¾ÓÉÊý×ÖÊðÃûÇÒÕýµ±£¬£¬£¬£¬¿ÉÈÆ¹ýδ֪¶þ½øÖÆÖ´ÐеÄ×èÖ¹ÁбíºÍ¹ýÂËÆ÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý×°ÖÃÕýµ±µÄDeno¿ÉÖ´ÐÐÎļþÀ´ÔËÐжñÒâ´úÂ룬£¬£¬£¬¶ø·Ç°²ÅŸüÈÝÒ×±»±ê¼ÇµÄ×Ô½ç˵¶ñÒâÈí¼þ¼ÓÔØÆ÷¡£¡£¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬´úÂë»áÖ¸ÎÆÊ¶±ðÖ÷»ú¡¢ÌìÉúΨһÊܺ¦ÕßID£¬£¬£¬£¬²¢ÅþÁ¬ÏÂÁî¿ØÖÆÐ§ÀÍÆ÷»ñÈ¡µÚ¶þ½×¶ÎÔØºÉ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±ÔËÐг¤ÆÚÂÖѯѻ·ÒÔÎüÊÕÀ´×ÔÏÂÁî¿ØÖÆÐ§ÀÍÆ÷µÄÐÂÏÂÁî¡£¡£¡£¡£¡£¡£¡£ÔÚºóʹÓý׶Σ¬£¬£¬£¬LeakNetʹÓÃDLL²à¼ÓÔØ¡¢ÏÂÁî¿ØÖÆÐűꡢͨ¹ýklistö¾Ù¾ÙÐÐÆ¾Ö¤·¢Ã÷¡¢Í¨¹ýPsExec¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬ÒÔ¼°Í¨¹ýÀÄÓÃAmazonS3´æ´¢Í°¾ÙÐÐÔØºÉstagedºÍÊý¾ÝÍâй¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/
6. GlassWorm¹©Ó¦Á´¹¥»÷¾íÍÁÖØÀ´²¨¼°433¸ö×é¼þ
3ÔÂ17ÈÕ£¬£¬£¬£¬GlassWorm¹©Ó¦Á´¹¥»÷»î¶¯¿ËÈÕ¾íÍÁÖØÀ´£¬£¬£¬£¬Õë¶ÔGitHub¡¢npmºÍVSCode/OpenVSXƽ̨ÉϵÄÊý°Ù¸öÈí¼þ°ü¡¢¿ÍÕ»ºÍÀ©Õ¹Ìᳫе÷¹¥»÷¡£¡£¡£¡£¡£¡£¡£Aikido¡¢Socket¡¢StepSecurityºÍOpenSourceMalwareÉçÇøµÄÑо¿Ö°Ô±±¾Ô¹²Ê¶±ð³ö433¸ö±»¹¥ÏݵÄ×é¼þ¡£¡£¡£¡£¡£¡£¡£×îÐÂÒ»ÂÖGlassWorm¹¥»÷¹æÄ£¸üÎªÖØ´ó£¬£¬£¬£¬²¨¼°200¸öGitHubPython¿ÍÕ»¡¢151¸öGitHubJS/TS¿ÍÕ»¡¢72¸öVSCode/OpenVSXÀ©Õ¹ºÍ10¸önpmÈí¼þ°ü¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÊ×Ïȹ¥ÏÝGitHubÕË»§Ç¿ÖÆÍÆËͶñÒâÌá½»£¬£¬£¬£¬È»ºóÔÚnpmºÍVSCode/OpenVSXÉÏÐû²¼°üÀ¨»ìÏý´úÂëµÄ¶ñÒâÈí¼þ°üºÍÀ©Õ¹ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£ÔÚËùÓÐÆ½Ì¨ÉÏ£¬£¬£¬£¬¶ñÒâ´úÂëÿ5ÃëÅÌÎÊÒ»´ÎSolanaÇø¿éÁ´»ñÈ¡ÐÂÖ¸Áî¡£¡£¡£¡£¡£¡£¡£2025Äê11ÔÂ27ÈÕÖÁ2026Äê3ÔÂ13ÈÕʱ´ú£¬£¬£¬£¬¹²·¢Ã÷50±ÊÐÂÉúÒ⣬£¬£¬£¬Ö÷ÒªÓÃÓÚ¸üÐÂÔØºÉURL¡£¡£¡£¡£¡£¡£¡£Ö¸ÁîǶÈëÉúÒⱸÍü¼ÖУ¬£¬£¬£¬Ö¸µ¼ÏÂÔØNode.jsÔËÐÐʱ²¢Ö´ÐлùÓÚJavaScriptµÄÐÅÏ¢ÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÕë¶Ô¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý¡¢Æ¾Ö¤ºÍ»á¼ûÁîÅÆ¡¢SSHÃÜÔ¿ÒÔ¼°¿ª·¢ÕßÇéÐÎÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´úÂë×¢ÊÍÆÊÎöÅú×¢GlassWormÓɶíÓïÍþвÐÐΪÕ߲߻®£¬£¬£¬£¬¶ñÒâÈí¼þÔÚ¼ì²âµ½ÏµÍ³Îª¶íÓïÇéÐÎʱ»áÌø¹ýÖ´ÐС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-npm-vscode-openvsx/


¾©¹«Íø°²±¸11010802024551ºÅ