VercelÅû¶Çå¾²Îó²î£ºÔ±¹¤ÕË»§ÔâAI¹¤¾ßÈëÇÖ
Ðû²¼Ê±¼ä 2026-04-201. VercelÅû¶Çå¾²Îó²î£ºÔ±¹¤ÕË»§ÔâAI¹¤¾ßÈëÇÖ
4ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬ÔÆ¿ª·¢Æ½Ì¨Vercel¿ËÈÕÅû¶ÁËÒ»ÆðÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬³ÆÓÐδ¾ÊÚȨµÄµÚÈý·½ÈëÇÖÁËÆä²¿·ÖÄÚ²¿ÏµÍ³¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒÑÓ°Ï첿·Ö¿Í»§£¬£¬£¬£¬£¬£¬µ«Æä½¹µãЧÀÍ¡¢Next.js¡¢Turbopack¼°ÆäËû¿ªÔ´ÏîÄ¿¾ùδÊÜÓ°Ïì¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬VercelÒÑÔ¼ÇëÊÂÎñÏìӦר¼ÒÐÖúÊӲ죬£¬£¬£¬£¬£¬²¢ÒÑִ֪ͨ·¨²¿·Ö¡£¡£¡£¡£¾ÝºóÐø¸üУ¬£¬£¬£¬£¬£¬´Ë´ÎÇå¾²Îó²îÔ´ÓÚµÚÈý·½AI¹¤¾ßContext.aiµÄGoogle Workspace OAuthÓ¦ÓÃÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼ÖÂÒ»ÃûVercelÔ±¹¤µÄGoogle WorkspaceÕË»§±»¹¥ÆÆ¡£¡£¡£¡£¹¥»÷ÕßËæºóʹÓøÃÕË»§ÌáÉýÁËÔÚVercelÇéÐÎÖеĻá¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢ÀÖ³Éö¾ÙÁËÄÇЩδ±»±ê¼ÇΪ¡°Ãô¸Ð¡±µÄÇéÐαäÁ¿£¬£¬£¬£¬£¬£¬ÕâЩ±äÁ¿ÔÚ¾²Ì¬´æ´¢Ê±Î´¼ÓÃÜ£¬£¬£¬£¬£¬£¬Ô±¾½öÓÃÓÚ´æ·Å·ÇÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«¹¥»÷Õßͨ¹ýö¾Ù½øÒ»²½»ñÈ¡ÁË»á¼ûȨÏÞ¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬Ò»Ãû×Գơ°ShinyHunters¡±µÄÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳ÉÏ·¢Ìû£¬£¬£¬£¬£¬£¬Éù³ÆÒÑÈëÇÖVercel²¢ÊÔͼ³öÊÛ±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨»á¼ûÃÜÔ¿¡¢Ô´´úÂë¡¢Êý¾Ý¿âÊý¾Ý¡¢ÄÚ²¿°²ÅźÍAPIÃÜÔ¿µÈ¡£¡£¡£¡£¸ÃºÚ¿Í»¹·ÖÏíÁËÒ»·Ý°üÀ¨580ÌõVercelÔ±¹¤ÐÅÏ¢£¨ÐÕÃû¡¢ÓÊÏä¡¢ÕË»§×´Ì¬µÈ£©µÄÎı¾Îļþ£¬£¬£¬£¬£¬£¬ÒÔ¼°Ò»ÕÅÒÉËÆÄÚ²¿¿ØÖÆÃæ°åµÄ½ØÍ¼¡£¡£¡£¡£¹¥»÷Õß»¹Éù³ÆÔøÓëVercelÁªÏµ²¢Ìá³öÔ¼200ÍòÃÀÔªµÄÊê½ðÒªÇ󡣡£¡£¡£
https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/
2. Nexcorium½©Ê¬ÍøÂçʹÓÃTBK DVR¼°ÀϾÉ·ÓÉÆ÷Îó²îÈö²¥
4ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬FortinetµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓÃTBK DVR×°±¸ÖеÄÒ»¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2024-3721£©ÒÔ¼°ÒÑÍ£²úµÄTP-Link·ÓÉÆ÷µÈÆäËûÀϾÉÎïÁªÍø×°±¸µÄÇ徲ȱÏÝ£¬£¬£¬£¬£¬£¬Èö²¥Ò»ÖÖÃûΪNexcoriumµÄÐÂÐÍMirai±äÖÖ¶ñÒâÈí¼þ¡£¡£¡£¡£¹¥»÷Õßͨ¹ý¸Ä¶¯Ìض¨ÇëÇó²ÎÊý£¬£¬£¬£¬£¬£¬Ê¹ÓÃCVE-2024-3721Îó²îÈö²¥ÏÂÔØ¾ç±¾¡£¡£¡£¡£Ïà¹ØÍøÂçÁ÷Á¿ÖаüÀ¨Ò»¸ö×Ô½ç˵µÄ¡°X-Hacked-By¡±±êÍ·£¬£¬£¬£¬£¬£¬ÆäֵΪ¡°Nexus Team¡±£¬£¬£¬£¬£¬£¬ÌåÏÖÁ˹¥»÷ÕߵĿÉÄÜÉí·Ý£¬£¬£¬£¬£¬£¬µ«¸Ã×éÖ¯µÄÏêϸÇéÐÎÈÔ²»Ã÷È·¡£¡£¡£¡£¸Ã¾ç±¾ÃûΪ¡°dvr¡±£¬£¬£¬£¬£¬£¬»áÏÂÔØ±ê¼ÇΪ¡°nexuscorp¡±µÄ¶ñÒâÈí¼þÑù±¾¡£¡£¡£¡£¶Ô¡°nexuscorp.x86¡±Ñù±¾µÄ½øÒ»²½ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÃûΪNexcorium£¬£¬£¬£¬£¬£¬ÊôÓÚMirai¼Ò×å±äÖÖ£¬£¬£¬£¬£¬£¬ÔÚÖ´ÐÐʱ»áÏÔʾ½ÓÊÜÐÅÏ¢¡£¡£¡£¡£ËüʹÓÃXOR½âÂë·½·¨ÌáȡǶÈëʽÉèÖÃÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨C2ЧÀÍÆ÷ÐÅÏ¢¡¢¹¥»÷ÏÂÁîºÍ³¤ÆÚ»¯¾ç±¾¡£¡£¡£¡£ÓëÆäËûMirai±äÖÖÒ»Ñù£¬£¬£¬£¬£¬£¬NexcoriumÅ䱸Á˼àÊÓ³ÌÐò¡¢É¨ÃèÆ÷ºÍ¶àÖÖDDoS¹¥»÷Ä£¿£¿£¿é¡£¡£¡£¡£Ëü»áÖ´ÐÐÍêÕûÐÔ¼ì²é£¬£¬£¬£¬£¬£¬Ò»µ©¼ì²âµ½¸Ä¶¯±ã¾ÙÐÐ×ÔÎÒ¸´ÖÆ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ç¶ÈëÁËÕë¶Ô»ªÎª×°±¸µÄÎó²îʹÓóÌÐò£¨ÈçCVE-2017-17215£©£¬£¬£¬£¬£¬£¬²¢°üÀ¨´ó×ÚĬÈÏÆ¾Ö¤£¬£¬£¬£¬£¬£¬ÓÃÓÚ¶ÔTelnet»á¼û¾ÙÐб©Á¦ÆÆ½â¡£¡£¡£¡£
https://securityaffairs.com/190974/malware/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-to-launch-ddos-attacks.html
3. ΢ÈíDefenderÈýÁãÈÕÎó²îÔâʹÓ㺽öBlueHammerÒÑÐÞ¸´
4ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃ΢ÈíDefenderÖÐ×î½üÅû¶µÄÈý¸öÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ÒÔÔÚÊÜѬȾϵͳÉÏ»ñÈ¡¸ü¸ßȨÏÞ¡£¡£¡£¡£ÕâÈý¸öÎó²î»®·ÖÃûΪBlueHammer¡¢RedSunºÍUnDefend£¬£¬£¬£¬£¬£¬ÓÉһλ¼ÙÃû¡°Chaotic Eclipse¡±µÄÑо¿Ö°Ô±·¢Ã÷¡£¡£¡£¡£¸ÃÑо¿Ö°Ô±ÔÚ¹ûÕæÆ·ÆÀ΢Èí¶ÔÎó²îÅû¶µÄ´¦Öóͷ£·½·¨ºó£¬£¬£¬£¬£¬£¬²»µ«Åû¶ÁËÎó²îϸ½Ú£¬£¬£¬£¬£¬£¬»¹Ðû²¼ÁËÕë¶ÔδÐÞ¸´WindowsÎó²îµÄ¿´·¨ÑéÖ¤´úÂë¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬BlueHammerºÍRedSunÔÊÐí¹¥»÷ÕßÔÚMicrosoft DefenderÖÐʵÏÖÍâµØÈ¨ÏÞÌáÉý£¬£¬£¬£¬£¬£¬¶øUnDefendÔò»á´¥·¢¾Ü¾øÐ§À͹¥»÷£¬£¬£¬£¬£¬£¬×èÖ¹Çå¾²½ç˵¸üУ¬£¬£¬£¬£¬£¬´Ó¶øÏ÷ÈõϵͳµÄÕûÌå·À»¤ÄÜÁ¦¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬Î¢Èí½öÐÞ¸´ÁËBlueHammerÎó²î£¬£¬£¬£¬£¬£¬²¢ÎªÆä·ÖÅÉÁ˱àºÅCVE-2026-33825£¬£¬£¬£¬£¬£¬µ«RedSunºÍUnDefendÈÔδ»ñµÃÐÞ²¹¡£¡£¡£¡£¾ÝHuntressÑо¿Ö°Ô±±¨¸æ£¬£¬£¬£¬£¬£¬ÕâÈý¸öÎó²îÒѱ»ÏÖÊÊÓÃÓÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ö»¹ÜÊܺ¦Õߺ͹¥»÷ÕßµÄÏêϸÉí·ÝÉв»ÇåÎú¡£¡£¡£¡£HuntressÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷Õß´Ó2026Äê4ÔÂ10ÈÕ×îÏÈʹÓÃBlueHammerÎó²îÕö¿ª¹¥»÷£¬£¬£¬£¬£¬£¬ËæºóÔÚ4ÔÂ16ÈÕÓÖʹÓÃÁËRedSunºÍUnDefendÎó²î¾ÙÐп´·¨ÑéÖ¤¹¥»÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬¹¥»÷ÕߺܿÉÄÜÕýÔÚʹÓÃChaotic EclipseÔÚÍøÉϹûÕæÐû²¼µÄÎó²îʹÓôúÂë¡£¡£¡£¡£
https://securityaffairs.com/190961/hacking/microsoft-defender-under-attack-as-three-zero-days-two-of-them-still-unpatched-enable-elevated-access.html
4. GrinexÉúÒâËùÔâ1370ÍòÃÀÔª¹¥»÷ºóÍ£ÔË
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ¼ª¶û¼ªË¹Ë¹Ì¹µÄ¼ÓÃÜÇ®±ÒÉúÒâËùGrinexÔÚÔâÊÜÒ»³¡Éæ¼°1370ÍòÃÀÔªµÄºÚ¿Í¹¥»÷ºó£¬£¬£¬£¬£¬£¬ÒÑÔÝÍ£ÔËÓª¡£¡£¡£¡£¸Ãƽ̨Ö÷ҪЧÀÍÓÚ¶íÂÞ˹Óû§£¬£¬£¬£¬£¬£¬ÔÊÐí¶íÂÞ˹ÆóÒµºÍСÎÒ˽¼ÒÖ®¼ä¾ÙÐмÓÃÜÇ®±ÒÓ묲¼µÄ¶Ò»»ÉúÒâ¡£¡£¡£¡£±»µÁ×ʽðÖ±½ÓÀ´×Ô¶íÂÞ˹Óû§µÄ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¾ÝGrinexÐû²¼µÄÉùÃ÷£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄÀàÐͺÍÊý×Ö×ã¼£Åú×¢£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÓë¡°Íâ¹úÇ鱨»ú¹¹¡±Óйأ¬£¬£¬£¬£¬£¬ÕâЩ»ú¹¹ÓµÓС°Ø¨¹ÅδÓеÄ×ÊÔ´ºÍÊÖÒÕ£¬£¬£¬£¬£¬£¬Ö»ÓгðÊÓ¹ú¼ÒµÄʵÌå²Å»ª»ñµÃ¡±¡£¡£¡£¡£¸ÃÉúÒâËùÉù³Æ£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÆðÔ´Êý¾Ý£¬£¬£¬£¬£¬£¬ÕâÊÇÒ»´ÎÖ¼ÔÚÖ±½ÓË𺦶íÂÞ˹½ðÈÚÖ÷ȨµÄе÷¹¥»÷¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ÎÞÂÛÊÇGrinexµÄÉùÃ÷£¬£¬£¬£¬£¬£¬ÕÕ¾ÉÇø¿éÁ´ÆÊÎö¹«Ë¾EllipticÓëTRM LabsµÄ±¨¸æ£¬£¬£¬£¬£¬£¬¾ùδÌṩÈκÎÏêϸµÄÊÖÒÕÖ¤¾Ý»òÖ¸±êÀ´Ö§³Ö½«´Ë´Î¹¥»÷¹é×ïÓÚÎ÷·½Ç鱨»ú¹¹¡£¡£¡£¡£EllipticÅû¶£¬£¬£¬£¬£¬£¬ÍµÇÔÊÂÎñ±¬·¢ÓÚÖÜÈýUTCʱ¼ä12:00£¬£¬£¬£¬£¬£¬±»µÁ×ʽ𱻷¢ËÍÖÁTRONºÍÒÔÌ«·»µØµã£¬£¬£¬£¬£¬£¬Ëæºóͨ¹ýSunSwapÈ¥ÖÐÐÄ»¯ÉúÒâÐÒéת»»ÎªTRXºÍETH¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/grinex-exchange-blames-western-intelligence-for-137m-crypto-hack/
5. ¸ßΣApache ActiveMQÎó²îÔâÆð¾¢Ê¹ÓÃ
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖÜËÄÐû²¼ÖÒÑԳƣ¬£¬£¬£¬£¬£¬±¾ÔÂÔçЩʱ¼äÐÞ¸´µÄÒ»¸ö¸ßΣApache ActiveMQÎó²îÏÖÔÚÕý±»Æð¾¢ÓÃÓÚÏÖʵ¹¥»÷¡£¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2026-34197£¬£¬£¬£¬£¬£¬ÔÚ³¤´ï13ÄêµÄʱ¼äÀïδ±»·¢Ã÷£¬£¬£¬£¬£¬£¬×îÖÕÓÉHorizon3Ñо¿Ô±Naveen Sunkavally½èÖúClaude AIÖúÊÖ·¢Ã÷¡£¡£¡£¡£Apache ActiveMQÊÇ×îÊ¢ÐеĻùÓÚJavaµÄ¿ªÔ´ÐÂÎÅÊðÀí£¬£¬£¬£¬£¬£¬ÆÕ±éÓ¦ÓÃÓÚÓ¦ÓóÌÐòÖ®¼äµÄÒ첽ͨѶ¡£¡£¡£¡£¾ÝSunkavallyÚ¹ÊÍ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚÊäÈëÑéÖ¤²»µ±£¬£¬£¬£¬£¬£¬Ê¹µÃ¾ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»Í¨¹ý×¢Èë¹¥»÷Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Apacheά»¤Ö°Ô±ÒÑÓÚ3ÔÂ30ÈÕÔÚActiveMQ Classic 6.2.3ºÍ5.19.4°æ±¾ÖÐÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Íþв¼à¿ØÐ§ÀÍShadowServerÒÑ×·×Ùµ½Áè¼Ý7500̨̻¶ÓÚÍøÂçÉϵÄApache ActiveMQЧÀÍÆ÷¡£¡£¡£¡£CISAÒѽ«CVE-2026-34197ÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬£¬²¢ÏÂÁîÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚÁ½ÖÜÄÚ£¨¼´4ÔÂ30ÈÕ֮ǰ£©Íê³É¶ÔActiveMQЧÀÍÆ÷µÄÐÞ²¹ÊÂÇé¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-apache-activemq-flaw-as-actively-exploited-in-attacks/
6. Payouts KingʹÓÃQEMUÄ£ÄâÆ÷ÔËÐÐÒþ²ØÐéÄâ»ú
4ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬Payouts KingÀÕË÷Èí¼þÕýÔÚʹÓÿªÔ´µÄQEMUÄ£ÄâÆ÷×÷Ϊ·´ÏòSSHºóÃÅ£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾµÄϵͳÉÏÔËÐÐÒþ²ØµÄÐéÄâ»ú£¬£¬£¬£¬£¬£¬´Ó¶øÈƹýÖÕ¶ËÇå¾²²½·¥¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²¹«Ë¾SophosµÄÑо¿Ö°Ô±¼Í¼£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÁËÁ½Æð¹¥»÷Õß°²ÅÅQEMUµÄ»î¶¯¡£¡£¡£¡£Æ¾Ö¤ZscalerµÄ±¨¸æ£¬£¬£¬£¬£¬£¬Payouts King¿ÉÄÜÓëǰBlackBastaͬÃ˳ÉÔ±Óйأ¬£¬£¬£¬£¬£¬ÒòÆäʹÓÃÁËÀàËÆµÄ³õʼ»á¼ûÒªÁì¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þ½ÓÄÉ´ó×Ú»ìÏýºÍ·´ÆÊÎö»úÖÆ£¬£¬£¬£¬£¬£¬Í¨¹ýÍýÏëʹÃü½¨É賤ÆÚÐÔ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓõײãϵͳŲÓÃÖÕÖ¹Çå¾²¹¤¾ß¡£¡£¡£¡£Æä¼ÓÃܼƻ®ÎªAES-256£¨CTR£©Á¬ÏµRSA-4096£¬£¬£¬£¬£¬£¬¶Ô´óÎļþ½ÓÄɼäЪʽ¼ÓÃÜ¡£¡£¡£¡£Sophos¼Í¼µÄµÚ¶þÆð»î¶¯×Ô2ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬Ê¹ÓÃCitrixBleed 2Îó²î£¨CVE-2025-5777£©»ñÈ¡³õʼ»á¼ûȨÏÞ¡£¡£¡£¡£¹¥»÷ÕßÔÚÈëÇÖNetScaler×°±¸ºó£¬£¬£¬£¬£¬£¬°²ÅŶñÒâZIP´æµµ£¬£¬£¬£¬£¬£¬×°ÖÃÃûΪ¡°AppMgmt¡±µÄЧÀÍ£¬£¬£¬£¬£¬£¬½¨ÉèÍâµØÖÎÀíÔ±Óû§£¬£¬£¬£¬£¬£¬²¢×°ÖÃScreenConnect¿Í»§¶ËÒÔʵÏÖ³¤ÆÚ»¯£¬£¬£¬£¬£¬£¬ËæºóÊͷŲ¢ÌáÈ¡QEMUÈí¼þ°ü£¬£¬£¬£¬£¬£¬ÔËÐÐÒþ²ØµÄAlpine Linux VM¡£¡£¡£¡£¹¥»÷ÕßÔÚÐéÄâ»úÄÚ²¿ÊÖ¶¯×°ÖúͱàÒëImpacket¡¢BloodHound.py¡¢MetasploitµÈ¹¤¾ß£¬£¬£¬£¬£¬£¬¾ÙÐÐÆ¾Ö¤ÍøÂç¡¢Active DirectoryÕì̽ºÍÊý¾ÝÍâй¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security/


¾©¹«Íø°²±¸11010802024551ºÅ