ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖFBI¾Ö³¤Ð¡ÎÒ˽¼ÒÓÊÏä
Ðû²¼Ê±¼ä 2026-03-301. ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖFBI¾Ö³¤Ð¡ÎÒ˽¼ÒÓÊÏä
3ÔÂ29ÈÕ£¬£¬£¬£¬ÓëÒÁÀÊÏà¹ØµÄHandalaºÚ¿Í×éÖ¯¿ËÈÕÈëÇÖÁËFBI¾Ö³¤Kash PatelµÄСÎÒ˽¼Òµç×ÓÓʼþÕË»§£¬£¬£¬£¬²¢Ðû²¼ÁËÕÕÆ¬ºÍÎļþ¡£¡£¡£¡£¡£¡£FBIÒÑÈ·ÈÏ´Ë´ÎÈëÇÖ£¬£¬£¬£¬ÌåÏÖ±»µÁÊý¾Ý²»ÊǽüÆÚµÄ£¬£¬£¬£¬²»°üÀ¨ÈκÎÕþ¸®Êý¾Ý¡£¡£¡£¡£¡£¡£ÖÜÎ壬£¬£¬£¬HandalaÍþвÐÐΪÕßÔÚÆäÒ»¸öÍøÕ¾ÉÏÐû²¼½«Patel¼ÓÈëÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬Éù³ÆËûÃÇÔÚ¼¸Ð¡Ê±ÄÚ¹¥ÏÝÁË"Ëùν'¼áÈçÅÌʯ'µÄFBIϵͳ"¡£¡£¡£¡£¡£¡£ºÚ¿ÍÌåÏÖ£¬£¬£¬£¬ËûÃǵÄÐж¯ÊǶÔFBI¿ÛѺHandalaÓòÃûÒÔ¼°ÃÀ¹úÕþ¸®Îª¸ÃÍþв×éÖ¯³ÉÔ±ÐÅÏ¢Ìṩ¸ß´ï1000ÍòÃÀÔªÐüÉ͵ĻØÓ¦¡£¡£¡£¡£¡£¡£ºÚ¿ÍÈëÇÖÁËFBI¾Ö³¤µÄСÎÒ˽¼ÒGmailÊÕ¼þÏä¡£¡£¡£¡£¡£¡£HandalaºÚ¿ÍÔÚÐû²¼ÈëÇÖÖ¤¾ÝǰÌåÏÖ£º"Kash PatelµÄËùÓÐСÎÒ˽¼ÒºÍÉñÃØÐÅÏ¢£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ¡¢¶Ô»°¡¢ÎļþÉõÖÁÉñÃØÎļþ£¬£¬£¬£¬ÏÖÔÚ¶¼¿É¹ûÕæÏÂÔØ¡£¡£¡£¡£¡£¡£"ͨ¸æÐû²¼ºó²»¾Ã£¬£¬£¬£¬ÍþвÐÐΪÕßÐû²¼ÁËÒ»×é´ÓPatelÊÕ¼þÏäÖÐÌáÈ¡µÄ´øË®Ó¡Ð¡ÎÒ˽¼ÒÕÕÆ¬ºÍÎļþ£¬£¬£¬£¬ÒÔ¼°³ÉΪFBI¾Ö³¤Ö®Ç°µÄµç×ÓÓʼþͨѶ¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£º"FBIÒâʶµ½¶ñÒâÐÐΪÕßÕë¶ÔPatel¾Ö³¤µÄСÎÒ˽¼Òµç×ÓÓʼþÐÅÏ¢£¬£¬£¬£¬ÎÒÃÇÒѽÓÄÉËùÓÐÐëÒª²½·¥¼õÇáÓë´Ë»î¶¯Ïà¹ØµÄDZÔÚΣº¦¡£¡£¡£¡£¡£¡£Ïà¹ØÐÅÏ¢ÊÇÀúÊ·ÐԵ쬣¬£¬£¬²»Éæ¼°ÈκÎÕþ¸®ÐÅÏ¢¡£¡£¡£¡£¡£¡£"
https://www.bleepingcomputer.com/news/security/fbi-confirms-hack-of-director-patels-personal-email-inbox/
2. Smart Slider 3²å¼þÎó²îÓ°Ïì80ÍòWordPressÍøÕ¾
3ÔÂ29ÈÕ£¬£¬£¬£¬WordPress²å¼þSmartSlider3¿ËÈÕ±»Åû¶±£´æÒ»¸öÇå¾²Îó²î£¬£¬£¬£¬¿É±»¶©ÔÄÕß¼¶±ðÓû§Ê¹Óûá¼ûЧÀÍÆ÷ÉÏí§ÒâÎļþ¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2026-3098£¬£¬£¬£¬ÓÉÑо¿Ö°Ô±DmitriiIgnatyev·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬Ó°ÏìSmartSlider3²å¼þ3.5.1.33¼°ÒÔÏÂËùÓа汾¡£¡£¡£¡£¡£¡£SmartSlider3ÊÇ×îÊ¢ÐеÄWordPress²å¼þÖ®Ò»£¬£¬£¬£¬ÓÃÓÚ½¨ÉèºÍÖÎÀíͼÏñ»¬¿éºÍÄÚÈÝÂÖ²¥£¬£¬£¬£¬ÓµÓÐÁè¼Ý80Íò¸ö»îÔ¾ÍøÕ¾×°Öᣡ£¡£¡£¡£¡£¸Ã²å¼þÌṩÒ×ÓÚʹÓõÄÍÏ·Å±à¼Æ÷ºÍ¸»ºñµÄÄ£°åÑ¡Ôñ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ²å¼þAJAXµ¼³ö²Ù×÷ÖÐȱʧµÄ¹¦Ð§¼ì²é£¬£¬£¬£¬ÔÊÐíÈκξÓÉÉí·ÝÑéÖ¤µÄÓû§£¨°üÀ¨¶©ÔÄÕߣ©Å²ÓÃËüÃÇ¡£¡£¡£¡£¡£¡£Æ¾Ö¤WordPressÇå¾²¹«Ë¾DefiantµÄÑо¿Ö°Ô±³Æ£¬£¬£¬£¬actionExportAllº¯Êýȱ·¦ÎļþÀàÐͺÍÔ´ÑéÖ¤£¬£¬£¬£¬Òò´ËÔÊÐí¶ÁÈ¡í§ÒâЧÀÍÆ÷Îļþ²¢Ìí¼Óµ½µ¼³ö´æµµÖС£¡£¡£¡£¡£¡£IgnatyevÓÚ2ÔÂ23ÈÕÏòWordfence±¨¸æÁËËûµÄ·¢Ã÷£¬£¬£¬£¬Ñо¿Ö°Ô±ÑéÖ¤ÁËÌṩµÄ¿´·¨Ñé֤ʹÓóÌÐò£¬£¬£¬£¬²¢Í¨ÖªÁËSmartSlider3µÄ¿ª·¢ÉÌNextendweb¡£¡£¡£¡£¡£¡£NextendwebÓÚ3ÔÂ2ÈÕÈ·ÈÏÁ˸ñ¨¸æ£¬£¬£¬£¬²¢ÓÚ3ÔÂ24ÈÕÐû²¼SmartSlider3.5.1.34°æ±¾¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/
3. Å·ÃËίԱ»áÔâShinyHunters¹¥»÷350GBÊý¾Ý±»µÁ
3ÔÂ28ÈÕ£¬£¬£¬£¬Å·ÃËίԱ»á¿ËÈÕÔâShinyHuntersÍøÂç·¸·¨×éÖ¯¹¥»÷£¬£¬£¬£¬¾Ý±¨µÀÊý¾Ýй¶°üÀ¨ÓʼþЧÀÍÆ÷ÄÚÈݺÍÄÚ²¿Í¨Ñ¶ÏµÍ³Êý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÍøÂç·¸·¨×éÖ¯½«Å·ÃËίԱ»áÌí¼Óµ½ÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁËÁè¼Ý350GBÊý¾Ý¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý¿ÉÄܰüÀ¨ÓʼþЧÀÍÆ÷Êý¾Ýת´¢¡¢Êý¾Ý¿â¡¢ÉñÃØÎļþ¡¢ÌõÔ¼ºÍ¸ü¶àÃô¸ÐÖÊÁÏ¡£¡£¡£¡£¡£¡£3ÔÂ24ÈÕ£¬£¬£¬£¬Å·ÃËίԱ»á¼ì²âµ½Ò»ÆðÓ°ÏìÆäEuropa.euÍøÕ¾ÍйÜÔÆ»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÊÂÎñѸËÙ»ñµÃ¿ØÖÆ£¬£¬£¬£¬ÒѽÓÄÉ»º½â²½·¥£¬£¬£¬£¬ÍøÕ¾¿ÉÓÃÐÔδÊÜÖÐÖ¹¡£¡£¡£¡£¡£¡£ÔçÆÚÊÓ²ìЧ¹ûÅú×¢²¿·ÖÊý¾Ý¿ÉÄܱ»»á¼û£¬£¬£¬£¬ÕýÔÚ֪ͨ¿ÉÄÜÊÜÓ°ÏìµÄÅ·ÃËʵÌå¡£¡£¡£¡£¡£¡£Å·ÃËίԱ»áÔÚÐÂΟåÖÐÌåÏÖ£º"ÎÒÃÇÒ»Á¬ÊÓ²ìµÄÔçÆÚЧ¹ûÅú×¢Êý¾ÝÒÑ´ÓÕâÐ©ÍøÕ¾±»»ñÈ¡¡£¡£¡£¡£¡£¡£Î¯Ô±»áÕýÔÚÕýʽ֪ͨ¿ÉÄÜÊÜÊÂÎñÓ°ÏìµÄͬÃËʵÌå¡£¡£¡£¡£¡£¡£"ίԱ»áЧÀͲ¿·ÖÈÔÔÚÊÓ²ìÊÂÎñµÄËùÓÐÓ°Ïì¡£¡£¡£¡£¡£¡£Î¯Ô±»áÌåÏÖÆäÄÚ²¿ÏµÍ³Î´ÊÜÓ°Ï죬£¬£¬£¬½«¼ÌÐø¼à¿ØÊ±ÊÆÍ¬Ê±ÔöÇ¿±£»£»£»£»¤²½·¥¡£¡£¡£¡£¡£¡£Î¯Ô±»á½«ÆÊÎöÊÂÎñÒÔ¸ÄÉÆÍøÂçÇå¾²£¬£¬£¬£¬ÓÉÓÚÅ·ÃËÃæÁÙÕë¶ÔÒªº¦Ð§Àͺͻú¹¹µÄÒ»Á¬ÍøÂçºÍ»ìÏýÍþв¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/190095/data-breach/shinyhunters-claims-the-hack-of-the-european-commission.html
4. TeamPCPÈëÇÖTelnyx Python°üÇÔȡƾ֤
3ÔÂ27ÈÕ£¬£¬£¬£¬TeamPCPºÚ¿Í×éÖ¯¿ËÈÕÈëÇÖÁËPython°üË÷Òý£¨PyPI£©ÉϵÄTelnyxÈí¼þ°ü£¬£¬£¬£¬ÉÏ´«Á˶ñÒâ°æ±¾£¬£¬£¬£¬ÕâЩ°æ±¾»á½«ÇÔȡƾ֤µÄ¶ñÒâÈí¼þÒþ²ØÔÚWAVÎļþÖС£¡£¡£¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾Aikido¡¢SocketºÍEndorLabsÊӲ쵽Á˴˴ι©Ó¦Á´¹¥»÷£¬£¬£¬£¬²¢Æ¾Ö¤Óë֮ǰͳһ¹¥»÷ÕßÔì³ÉµÄÊÂÎñÖÐÏàͬµÄÊý¾Ýй¶ģʽºÍRSAÃÜÔ¿£¬£¬£¬£¬½«´Ë´Î¹¥»÷¹é×ïÓÚTeamPCP¡£¡£¡£¡£¡£¡£½ñÌìÔçЩʱ¼ä£¬£¬£¬£¬¸ÃÍþвÐÐΪÕßÐû²¼ÁË´øÓкóÃŵÄTelnyxÈí¼þ°ü4.87.1ºÍ4.87.2°æ±¾¡£¡£¡£¡£¡£¡£ÔÚLinuxºÍmacOSϵͳÉÏ£¬£¬£¬£¬¶ñÒâ°æ±¾»áÊͷŶñÒâÈí¼þ£¬£¬£¬£¬ÇÔÈ¡SSHÃÜÔ¿¡¢Æ¾Ö¤¡¢ÔÆÁîÅÆ¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢ÇéÐαäÁ¿ºÍÆäËûÀàÐ͵ÄÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£¡£ÔÚWindowsϵͳÖУ¬£¬£¬£¬¶ñÒâÈí¼þ»á±»°²ÅÅÔÚÆô¶¯Îļþ¼ÐÖÐÒÔʵÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬Ã¿´ÎµÇ¼ʱ¶¼»áÔËÐС£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬ºÚ¿ÍʹÓÃÇÔÈ¡µÄPyPI×¢²á±íÐû²¼ÕË»§Æ¾Ö¤ÈëÇÖÁ˸ÃÏîÄ¿¡£¡£¡£¡£¡£¡£×î³õ£¬£¬£¬£¬TeamPCPÓÚUTCʱ¼ä03:51Ðû²¼ÁËTelnyx4.87.1°æ±¾£¬£¬£¬£¬µ«¸ÃÈí¼þ°ü°üÀ¨¶ñÒ⵫ÎÞ·¨Õý³£ÔËÐеÄÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£¡£Ô¼ÄªÒ»Ð¡Ê±ºó£¬£¬£¬£¬¹¥»÷ÕßÓÚUTCʱ¼ä04:07Ðû²¼ÁËTelnyx4.87.2°æ±¾£¬£¬£¬£¬ÐÞÕýÁ˸ùýʧ¡£¡£¡£¡£¡£¡£Ç¿ÁÒ½¨Ò鿪·¢Ö°Ô±ÈôÊÇ·¢Ã÷ÆäÇéÐÎÖб£´æTelnyx4.87.1»ò4.87.2°æ±¾£¬£¬£¬£¬ÔòÓ¦»Ø¹öµ½4.87.0°æ±¾¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/
5. GitHub¿ª·¢ÕßÔâ´ó¹æÄ£¶ñÒâ´¹ÂÚ¹¥»÷
3ÔÂ27ÈÕ£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬Ò»³¡Õë¶ÔGitHub¿ª·¢ÕߵĴó¹æÄ£¶ñÒâ¹¥»÷»î¶¯ÕýÔÚÉìÕÅ¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÔÚGitHubÏîÄ¿ÌÖÂÛÇøÐû²¼Î±×°³ÉVisual Studio Code£¨VS Code£©Çå¾²¾¯±¨µÄÐéαÌû×Ó£¬£¬£¬£¬ÓÕµ¼¿ª·¢ÕßÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÕâЩÌû×ÓʹÓá°ÑÏÖØÎó²î-ÐèÒªÁ¬Ã¦¸üС±µÈ±ÆÕæÎÊÌ⣬£¬£¬£¬Ðé¹¹CVE ID²¢ÅäÒÔ½ôÆÈÓïÑÔ£¬£¬£¬£¬ÉõÖÁð³äÕæÊµ´úÂëά»¤Õß»òÑо¿Ö°Ô±ÒÔÔöÇ¿¿ÉÐŶȡ£¡£¡£¡£¡£¡£¸Ã¹¥»÷·ºÆðÏÔ×ŵÄ×éÖ¯»¯ÌØÕ÷¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ó¦ÓÃÇå¾²¹«Ë¾SocketµÄ±¨¸æ£¬£¬£¬£¬Êýǧ¸öÏÕЩÏàͬµÄÌû×ÓÔÚ¶Ìʱ¼äÄÚ×Ô¶¯Ðû²¼µ½GitHubµÄÊýǧ¸ö´æ´¢¿âÖУ¬£¬£¬£¬É漰н¨»ò²»»îÔ¾ÕË»§¡£¡£¡£¡£¡£¡£ÕâЩÌû×ӻᴥ·¢GitHubµÄµç×ÓÓʼþ֪ͨϵͳ£¬£¬£¬£¬Ö±½Ó·¢ËÍÖÁ±»±ê¼ÇÓû§ºÍ¹Ø×¢ÕßµÄÊÕ¼þÏ䣬£¬£¬£¬À©´óÈö²¥¹æÄ£¡£¡£¡£¡£¡£¡£Ìû×ÓÖеÄÁ´½ÓÖ¸ÏòGoogle DriveµÈÍⲿЧÀÍ£¬£¬£¬£¬Éù³ÆÌṩÒÑÐÞ¸´µÄVS CodeÀ©Õ¹°æ±¾¡£¡£¡£¡£¡£¡£Ö»¹ÜGoogle Drive²¢·Ç¹Ù·½·Ö·¢ÇþµÀ£¬£¬£¬£¬µ«Óû§¿ÉÄÜÒòÐÅÈθÃЧÀͶøºöÂÔΣº¦¡£¡£¡£¡£¡£¡£µã»÷Á´½Óºó£¬£¬£¬£¬Êܺ¦Õß»á±»ÖØ¶¨ÏòÖÁ¶ñÒâÓòÃû£¬£¬£¬£¬¸ÃÍøÕ¾ÔËÐÐJavaScript¾ç±¾ÍøÂçÓû§Ê±Çø¡¢²Ù×÷ϵͳ¡¢ä¯ÀÀÆ÷Ö¸ÎÆµÈÏêϸÐÅÏ¢£¬£¬£¬£¬²¢Í¨¹ýPOSTÇëÇó·¢ËÍÖÁÏÂÁî¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¸Ã°ì·¨×÷ΪÁ÷Á¿¹ýÂ˲㣬£¬£¬£¬ÓÃÓÚÇø·ÖÕæÊÊÓû§ÓëÑо¿Ö°Ô±£¬£¬£¬£¬½öÏòÑéÖ¤ºóµÄÊܺ¦ÕßͶ·ÅµÚ¶þ½×¶Î¶ñÒâÔØºÉ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-vs-code-alerts-on-github-spread-malware-to-developers/
6. CISA½«F5 BIG-IP¸ßΣRCEÎó²îÄÉÈëÒÑ֪ʹÓÃĿ¼
3ÔÂ28ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«F5 BIG-IPÓ¦ÓÃÇå¾²ÖÎÀíÆ½Ì¨£¨APM£©ÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2025-53521£©ÕýʽÁÐÈëÆä¡°ÒÑ֪ʹÓÃÎó²î£¨KEV£©¡±Ä¿Â¼¡£¡£¡£¡£¡£¡£¸ÃÎó²îCVSS 3.1ÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬ÊôÓÚÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬£¬Ó°Ïì¹æÄ£º¸ÇÆôÓûá¼ûÕ½ÂÔµÄBIG-IP APMÐéÄâЧÀÍÆ÷ÉèÖó¡¾°¡£¡£¡£¡£¡£¡£Æ¾Ö¤F5Ç徲ͨ¸æ£¬£¬£¬£¬µ±¶ñÒâÁ÷Á¿´¥·¢ÐéÄâЧÀÍÆ÷ÉÏÉèÖõÄBIG-IP APM»á¼ûÕ½ÂÔʱ£¬£¬£¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆ²¢Ö´ÐÐí§Òâ´úÂ룬£¬£¬£¬µ¼ÖÂϵͳ±»ÍêÈ«¿ØÖÆ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¸ÃÎó²î×î³õ±»¹éÀàΪ¾Ü¾øÐ§ÀÍ£¨DoS£©Îó²î£¬£¬£¬£¬µ«2026Äê3ÔµÄз¢Ã÷֤ʵ×Åʵ¼ÊΣº¦ÎªÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬Òò´ËCVSSÆÀ·Ö±»ÏÔÖøÌáÉý£¬£¬£¬£¬ÑÏÖØÐÔÆ·¼¶´ó·ùÉϵ÷¡£¡£¡£¡£¡£¡£Ö»¹ÜÔÓÐÐÞ¸´¼Æ»®ÈÔÓÐÓ㬣¬£¬£¬µ«F5ÒÑÈ·ÈϸÃÎó²îÔÚ²¿·Ö±£´æÎó²îµÄBIG-IP°æ±¾ÖÐÒѱ»ÏÖʵʹÓᣡ£¡£¡£¡£¡£Æ¾Ö¤CISAÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬£¬Áª°î»ú¹¹±ØÐèÔÚ2026Äê3ÔÂ30ÈÕǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇ飬£¬£¬£¬ÒÔ½µµÍÒÑÖªÎó²î±»Ê¹ÓõÄÖØ´óΣº¦¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/190076/uncategorized/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ