Ç×ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖÒÔÉ«Áйú·À¿Æ¼¼¹«Ë¾

Ðû²¼Ê±¼ä 2026-04-08

1. Ç×ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖÒÔÉ«Áйú·À¿Æ¼¼¹«Ë¾


4ÔÂ3ÈÕ£¬£¬£¬£¬Ç×ÒÁÀʵĺڿÍ×éÖ¯HandalaÓÚ4ÔÂ2ÈÕÐû²¼ÈëÇÖÁËPSK Wind Technologies£¬£¬£¬£¬ÕâÊÇÒ»¼ÒÒÔÉ«Áй¤³ÌºÍIT¹«Ë¾£¬£¬£¬£¬×¨ÃÅ´Óʹú·ÀºÍÒªº¦Í¨Ñ¶µÄ¼¯³Éϵͳ£¬£¬£¬£¬°üÀ¨Ö¸»ÓºÍ¿ØÖƽâ¾ö¼Æ»®¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬HandalaÍâòÉÏÊÇÒ»¸öÖ§³Ö°ÍÀÕ˹̹µÄºÚ¿Í×éÖ¯£¬£¬£¬£¬µ«ÆÕ±é±»ÒÔΪÊÇÒÁÀÊÖ§³ÖµÄVoid ManticoreµÄ»Ï×Ó¡£¡£¡£¸Ã×éÖ¯ÒÔÍøÂç´¹ÂÚ¡¢Êý¾ÝÇÔÈ¡¡¢ÀÕË÷ºÍÆÆËðÐÔ²Á³ý¹¥»÷¶øÖøÃû£¬£¬£¬£¬Í¬Ê±´ÓÊÂÐÅÏ¢Õ½ºÍÐÄÀíÕ½¡£¡£¡£×ÔÒÁÀʳåÍ»±¬·¢ÒÔÀ´£¬£¬£¬£¬ËûÃÇÒ»Ö±ÒÔÒÔÉ«Áоü·½Ð§ÀÍÆ÷¡¢Ç鱨ְԱºÍ¹«Ë¾ÎªÄ¿µÄ£¬£¬£¬£¬ÇÔÈ¡»ò²Á³ýÊý¾Ý¡£¡£¡£Handala×éÖ¯Éù³Æ´ÓPSK WindÇÔÈ¡ÁËÃô¸ÐÊý¾Ý£¬£¬£¬£¬°üÀ¨µ¼µ¯·ÀÓùϵͳ¼°Ö¸»Ó¿ØÖÆÏµÍ³µÄÏà¹ØÎļþ£¬£¬£¬£¬²¢¾Ý³Æ½«Æä·¢Ë͸øÁË¡°¶Ô¿¹ÖáÐÄ¡±µ¼µ¯²½¶Ó¡£¡£¡£¡°¶Ô¿¹ÖáÐÄ¡±ÊÇÓÉÒÁÀÊÏòµ¼µÄÕþÖξüÊÂͬÃË£¬£¬£¬£¬³ÉÔ±°üÀ¨Àè°ÍÄÛÕæÖ÷µ³¡¢°ÍÀÕ˹̹ÒÁ˹À¼Ê¥Õ½×éÖ¯¡¢ÐðÀûÑÇÕþȨ²½¶ÓÒÔ¼°ÒÁÀ­¿ËʲҶÅÉÃñ±ø×éÖ¯µÈ×èµ²ÒÔÉ«ÁС¢ÃÀ¹ú¼°ÆäÃËÓѵÄ×éÖ¯¡£¡£¡£HandalaÔÚÓÌÌ«½ÌÖ÷Òª½ÚÈÕÓâÔ½½Úʱ´ú·¢³öÍþв£¬£¬£¬£¬ÖÒÑÔÒÔÉ«Áйú·ÀºÍÖ¸»ÓÖÐÐĽ«Ô⵽Ϯ»÷¡£¡£¡£Æäʱ£¬£¬£¬£¬PSK WindºÍÒÔÉ«Áоü·½¾ùδ¶Ô´Ë½ÒÏþ̸ÂÛ£¬£¬£¬£¬¶ø¸Ã×éÖ¯ÒÑÐû²¼Á˾øÃÜͨѶϵͳ¡¢ÄÚ²¿Îļþ¡¢ËùÔÚÕÕÆ¬µÈÉñÃØÎļþ¡£¡£¡£


https://securityaffairs.com/190319/data-breach/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies.html


2. ÓÀÀû¶È¼Ù´åÊý¾Ýй¶ӰÏ쳬2.1ÍòÃûÔ±¹¤


4ÔÂ7ÈÕ£¬£¬£¬£¬¸ß¶Ë¶Ä³¡ºÍÂùÝÔËÓªÉÌÓÀÀû¶È¼Ù´å¿ËÈÕÅû¶£¬£¬£¬£¬×î½ü±¬·¢µÄÊý¾Ýй¶ÊÂÎñÒÑÓ°ÏìÁè¼Ý2.1ÍòÈË¡£¡£¡£ÓÀÀûÔÚ2ÔÂÏÂѮ֤ʵºÚ¿Í»ñÈ¡ÁËÔ±¹¤Êý¾Ý£¬£¬£¬£¬´ËǰÎÛÃûÕÑÖøµÄÍøÂç·¸·¨×éÖ¯ShinyHuntersÉù³ÆÇÔÈ¡ÁËÁè¼Ý80ÍòÌõ°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°Éç»á°ü¹ÜºÅÂëµÄ¼Í¼¡£¡£¡£ºÚ¿ÍËæºó½«ÓÀÀû´ÓÐ¹Â¶ÍøÕ¾ÉÏÒÆ³ý£¬£¬£¬£¬ÕâÒ»ÐÐΪͨ³£Åú×¢Êܺ¦ÕßÒѾöÒéÖ§¸¶Êê½ð£¬£¬£¬£¬µ«ÆäʱÓÀÀû¾Ü¾ø¾Í´ËÖÃÆÀ¡£¡£¡£ÔÚ¿ËÈÕÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÊý¾Ýй¶֪ͨÖУ¬£¬£¬£¬ÓÀÀûÌṩÁ˸ü¶àÊÂÎñϸ½Ú¡£¡£¡£¹«Ë¾ÔÚ·¢¸øÊÜÓ°ÏìСÎÒ˽¼ÒµÄ֪ͨÖÐÌåÏÖ¡°ÍþвÐÐΪÕßÉù³ÆËùÓÐÊý¾Ý¶¼Òѱ»É¾³ý¡±£¬£¬£¬£¬Õâ½øÒ»²½Ó¡Ö¤ÁËÊê½ð¿ÉÄÜÒѱ»Ö§¸¶µÄ˵·¨¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬ºÚ¿ÍË÷ÒªµÄÊê½ðÁè¼Ý22¸ö±ÈÌØ±Ò£¬£¬£¬£¬Ô¼ºÏ150ÍòÃÀÔª¡£¡£¡£Í¨ÖªÏÔʾ£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2025Äê10Ô£¬£¬£¬£¬Ä¿µÄÊÇÈËÁ¦×ÊԴϵͳ£¬£¬£¬£¬ºÜ¿ÉÄÜÊôÓÚShinyHuntersÕë¶Ô100¶à¼Ò»ú¹¹ÌᳫµÄ´ó¹æÄ£¹¥»÷»î¶¯µÄÒ»²¿·Ö¡£¡£¡£ÓÀÀûÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨¸æ³Æ£¬£¬£¬£¬´Ë´ÎÊÂÎñ¹²Ó°Ïì21775ÃûÔ±¹¤¡£¡£¡£ÊÜÓ°ÏìÔ±¹¤½«»ñµÃÃâ·ÑµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£


https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/


3. ºÚ¿ÍʹÓÃNinja Forms WordPress²å¼þµÄÑÏÖØÎó²î


4ÔÂ7ÈÕ£¬£¬£¬£¬WordPressÊ¢ÐÐµÄ±íµ¥¹¹½¨Æ÷Ninja FormsËùÅäÌ×µÄFile UploadÀ©Õ¹²å¼þ£¬£¬£¬£¬±»·¢Ã÷Ò»¸ö±àºÅΪCVE-2026-0740µÄÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬ÆäCVSSΣº¦ÆÀ·Ö¸ß´ï9.8¡£¡£¡£¸ÃÎó²îÔ´ÓÚ²å¼þÔÚÄ¿µÄÎļþÃû´¦Öóͷ£ÉÏȱ·¦ÐëÒªµÄÎļþÀàÐÍÓëÀ©Õ¹ÃûÑéÖ¤£¬£¬£¬£¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÉÏ´«í§ÒâÎļþ£¬£¬£¬£¬°üÀ¨Î£ÏÕµÄPHP¾ç±¾£¬£¬£¬£¬ÉõÖÁͨ¹ý·¾¶±éÀúÊֶν«ÎļþÒÆ¶¯ÖÁÍøÕ¾¸ùĿ¼£¬£¬£¬£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£ÀÖ³ÉʹÓôËÎó²îµÄ¹¥»÷ÕßÄܹ»°²ÅÅWeb Shell£¬£¬£¬£¬²¢×îÖÕÍêÈ«½ÓÊÜÄ¿µÄÍøÕ¾¡£¡£¡£¸ÃÎó²îÓ°ÏìNinja FormsÎļþÉÏ´«À©Õ¹×î¸ßÖÁ3.3.26°æ±¾£¬£¬£¬£¬¶øNinja Forms×Ô¼ºÏÂÔØÁ¿Áè¼Ý60Íò´Î£¬£¬£¬£¬ÆäFile UploadÀ©Õ¹Ò²ÓµÓÐ9ÍòÓû§£¬£¬£¬£¬Òò´ËDZÔÚÊÜÓ°Ïì¹æÄ£¼«¹ã¡£¡£¡£¹©Ó¦ÉÌÔÚ2ÔÂ10ÈÕÍê³É²¿·ÖÐÞ¸´ºó£¬£¬£¬£¬ÓÚ3ÔÂ19ÈÕÕýʽÐû²¼3.3.27°æ±¾ÒÔ³¹µ×ÐÞ¸´Îó²î¡£¡£¡£È»¶ø£¬£¬£¬£¬ÔÚÒÑÍùµÄ24СʱÄÚ£¬£¬£¬£¬Wordfence·À»ðǽÒÑ×èµ²Áè¼Ý3600´ÎÕë¶Ô¸ÃÎó²îµÄÏÖʵ¹¥»÷ʵÑ飬£¬£¬£¬Åú×¢Îó²îÒѱ»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/


4. ¶íÂÞ˹µçОÞÍ·RostelecomÔâ´ó¹æÄ£DDoS¹¥»÷


4ÔÂ7ÈÕ£¬£¬£¬£¬ÖÜÒ»Íí¼ä£¬£¬£¬£¬¶íÂÞ˹¹úÓеçОÞÍ·RostelecomÔâÊÜÁËÒ»³¡¡°´ó¹æÄ£¡±ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬µ¼Ö¸ùúÊýÊ®¸ö¶¼»áµÄÍøÉÏÒøÐС¢Õþ¸®Æ½Ì¨¼°ÆäËûÊý×ÖЧÀÍ·ºÆðÔÝʱÐÔÖÐÖ¹¡£¡£¡£¾Ý¶íÂÞ˹µçÐŹ«Ë¾Ïò¹Ù·½Ã½Ìå͸¶£¬£¬£¬£¬´Ë´Î¹¥»÷Ë䱻ѸËÙ¿ØÖÆ£¬£¬£¬£¬µ«ÍøÂçЧÀ͵ÄÖÐÖ¹ÏÖʵÉÏÊÇÆäΪ»º½â¹¥»÷¶øÆô¶¯½ôÆÈ¹ýÂ˲½·¥ËùÔì³ÉµÄ¡£¡£¡£DDoS¹¥»÷µÄÔ­ÀíÊÇͨ¹ýÏòÄ¿µÄÍøÕ¾ºÍÔÚÏßЧÀÍ·¢Ëͺ£Á¿À¬»øÁ÷Á¿£¬£¬£¬£¬Ê¹Æä²»¿°Öظº£¬£¬£¬£¬´Ó¶øÁîÕýµ±Óû§ÎÞ·¨Õý³£»á¼û¡£¡£¡£Êܴ˴ι¥»÷Ó°Ï죬£¬£¬£¬ÖÜÒ»Íí¼ä¶íÂÞ˹ԼÓÐ30¸ö¶¼»áµÄסÃñ·´Ó¦RostelecomµÄ¼ÒÍ¥»¥ÁªÍøÐ§ÀÍ·ºÆð¹ÊÕÏ£¬£¬£¬£¬°üÀ¨ÓÎϷƽ̨Steam¡¢Õþ¸®Ð§ÀÍÃÅ»§ÍøÕ¾Gosuslugi¡¢ÊÓÆµÆ½Ì¨RutubeÒÔ¼°ÖÖÖÖÒøÐÐЧÀÍÔÚÄڵĶà¸öÖ÷ÒªÍøÕ¾¾ùÎÞ·¨»á¼û¡£¡£¡£²¿·ÖÓû§ÏòÍâµØÃ½ÌåÌåÏÖ£¬£¬£¬£¬ËûÃÇÖ»ÄÜ»á¼ûËùνµÄ¡°°×Ãûµ¥¡±ÍøÕ¾£¬£¬£¬£¬¼´Õþ¸®Åú×¼µÄЧÀÍÁбí£¬£¬£¬£¬ÕâЩЧÀÍ×ÝÈ»ÔÚ»¥ÁªÍøÖÐֹʱ´úÒ²Äܼá³ÖÁ¬Í¨¡£¡£¡£¶ø¾ÝÍâµØ»¥ÁªÍø¼à²âЧÀÍ»ú¹¹³Æ£¬£¬£¬£¬×èÖ¹Öܶþ£¬£¬£¬£¬ÈÔÓжíÂÞ˹»¥ÁªÍøÓû§Ò»Á¬·´Ó¦ÎÞ·¨»á¼û²¿·ÖÕþ¸®ÍøÕ¾¡£¡£¡£


https://therecord.media/rostelecom-cyberattack-disrupts-russian-internet-access


5. Flowise RCEÎó²îCVE-2025-59528Òѱ»¹¥»÷ÕßʹÓÃ


4ÔÂ7ÈÕ£¬£¬£¬£¬¿ªÔ´Æ½Ì¨Flowise±»·¢Ã÷±£´æÒ»¸ö×î¸ßÑÏÖØÐÔÎó²î£¬£¬£¬£¬±àºÅΪCVE-2025-59528£¬£¬£¬£¬ÏÖÔÚÒѱ»ºÚ¿ÍʹÓÃÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÔÚûÓÐÈκÎÇå¾²¼ì²éµÄÇéÐÎÏÂ×¢Èë¶ñÒâJavaScript´úÂ룬£¬£¬£¬ÓÚÈ¥Äê9Ô¹ûÕæÅû¶ʱ±ãÒÑÖÒÑԳƣ¬£¬£¬£¬ÀÖ³ÉʹÓÿɵ¼ÖÂÏÂÁîÖ´ÐкÍÎļþϵͳ»á¼û¡£¡£¡£ÎÊÌâµÄȪԴÔÚÓÚFlowiseµÄCustomMCP½Úµã£º¸Ã½ÚµãÔÊÐíÉèÖÃÉèÖÃÅþÁ¬µ½Íⲿģ×ÓÉÏÏÂÎÄЭÒéЧÀÍÆ÷£¬£¬£¬£¬µ«ÔÚ´¦Öóͷ£Óû§ÊäÈëµÄ¡°mcpServerConfig¡±²ÎÊýʱ£¬£¬£¬£¬»á²»Çå¾²µØÆÀ¹À²¢Ö´ÐÐÆäÖеÄJavaScript´úÂ룬£¬£¬£¬¶øÍêȫδ¶ÔÆäÇå¾²ÐÔ¾ÙÐÐÑéÖ¤¡£¡£¡£¿£¿£¿£¿ª·¢ÕßÒÑÔÚFlowise 3.0.6°æ±¾ÖÐÐÞ¸´ÁËÕâÒ»ÎÊÌ⣬£¬£¬£¬ÏÖÔÚ×îеİ汾Ϊ3.1.1£¬£¬£¬£¬ÓÚÁ½ÖÜǰÐû²¼¡£¡£¡£Îó²îÇ鱨¹«Ë¾VulnCheckµÄÇå¾²Ñо¿Ô±Caitlin CondonÔÚLinkedInÉÏÅû¶£¬£¬£¬£¬ÆäCanaryÍøÂçÒÑÊ״μì²âµ½CVE-2025-59528Îó²îµÄÔÚҰʹÓᣡ£¡£Ö»¹ÜÏÖÔÚ¹¥»÷»î¶¯¹æÄ£ÓÐÏÞ£¬£¬£¬£¬½öÔ´×ÔÒ»¸öStarlink IPµØµã£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬Ä¿½ñÔ¼ÓÐ12,000ÖÁ15,000¸öFlowiseʵÀý̻¶ÔÚ¹«ÍøÉÏ£¬£¬£¬£¬ÆäÖб£´æÎó²îµÄЧÀÍÆ÷±ÈÀýÉв»Ã÷È·¡£¡£¡£


https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/


6. ¹ú¼ÊÖ´·¨Ðж¯´ì°ÜAPT28µÄFrostArmada¹¥»÷


4ÔÂ7ÈÕ£¬£¬£¬£¬Ò»³¡ÓÉÖ´·¨²¿·ÖÓë˽Ӫ¹«Ë¾ÏàÖú¿ªÕ¹µÄ¹ú¼ÊÐж¯£¬£¬£¬£¬Àֳɴì°ÜÁ˶íÂÞ˹¹ú¼Ò¼¶ºÚ¿Í×éÖ¯APT28ÌᳫµÄFrostArmada´ó¹æÄ£¹¥»÷»î¶¯¡£¡£¡£¸Ã×éÖ¯Óë¶íÂÞ˹×ÜÕÕÁϲ¿Ç鱨×ֵܾÚ85ÌØÊâЧÀÍÖÐÐÄ26165¾üʵ¥Î»ÓйØÁª£¬£¬£¬£¬Ôڴ˴ι¥»÷ÖÐÖ÷ÒªÈëÇÖСÐͰ칫ÊҺͼÒÍ¥°ì¹«ÊÒ·ÓÉÆ÷£¬£¬£¬£¬ÓÈÆäÊÇMikroTikºÍTP-LinkÆ·ÅÆ£¬£¬£¬£¬Í¨¹ý¸ü¸ÄÓòÃûϵͳÉèÖ㬣¬£¬£¬½«ÍâµØÁ÷Á¿Öض¨ÏòÖÁ¹¥»÷Õß¿ØÖƵÄÐéÄâרÓÃЧÀÍÆ÷£¨VPS£©¡£¡£¡£ÕâЩ¶ñÒâDNSÉèÖÃͨ¹ý¶¯Ì¬Ö÷»úÉèÖÃЭÒé×Ô¶¯ÍÆË͵½ÄÚ²¿×°±¸£¬£¬£¬£¬µ±Óû§ÊµÑé»á¼ûÉí·ÝÑéÖ¤Ïà¹ØÓòÃûʱ£¬£¬£¬£¬DNSЧÀÍÆ÷·µ»Ø¹¥»÷ÕßµÄIPµØµã¶ø·ÇÕæÊµµØµã£¬£¬£¬£¬´Ó¶ø½«Êܺ¦ÕßÖØ¶¨ÏòÖÁÖÐÐÄÈËÊðÀí¡£¡£¡£¶ÔÊܺ¦Õß¶øÑÔ£¬£¬£¬£¬Î¨Ò»µÄڲƭ¼£ÏóÊÇÎÞЧTLSÖ¤ÊéµÄÖÒÑÔ£¬£¬£¬£¬µ«¸ÃÖÒÑÔ³£±»ºöÂÔ£¬£¬£¬£¬Ê¹µÃ¹¥»÷ÕßÄܹ»ÇÔȡ΢ÈíÕÊ»§µÇ¼ƾ֤ºÍOAuthÁîÅÆ¡£¡£¡£2025Äê12Ô£¬£¬£¬£¬FrostArmada¹¥»÷µÖ´ïá۷壬£¬£¬£¬Ñ¬È¾ÁËÈ«Çò120¸ö¹ú¼ÒºÍµØÇøµÄÔ¼18,000̨װ±¸£¬£¬£¬£¬Ö÷ҪĿµÄ°üÀ¨Õþ¸®»ú¹¹¡¢Ö´·¨²¿·Ö¡¢ITºÍÍйÜЧÀÍÌṩÉ̵È¡£¡£¡£Î¢ÈíÊǴ˴ι¥»÷µÄÖ÷ҪĿµÄ£¬£¬£¬£¬Î¢ÈíÓëLumen¹«Ë¾µÄBlack Lotus LabsÏàÖú»æÖÆÁ˶ñÒâ»î¶¯Í¼Æ×²¢Ê¶±ðÊܺ¦Õß¡£¡£¡£ÔÚÁª°îÊÓ²ì¾Ö£¨FBI£©¡¢ÃÀ¹ú˾·¨²¿ºÍ²¨À¼Õþ¸®µÄÖ§³ÖÏ£¬£¬£¬£¬·¸·¨»ù´¡ÉèÊ©Òѱ»´Ý»Ù¡£¡£¡£


https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/