KelpDAOÔâ2.9ÒÚÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ

Ðû²¼Ê±¼ä 2026-04-21

1. KelpDAOÔâ2.9ÒÚÃÀÔª¼ÓÃÜÇ®±Ò͵ÇÔ


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬DeFiÏîÄ¿KelpDAOÔâÊÜÁ˼ÛÖµÔ¼2.9ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬£¬¾ÝÐÅÊdz¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿ÍËùΪ¡£¡£¡£´Ë´Î¹¥»÷»¹Ó°ÏìÁËCompound¡¢EulerºÍAaveµÈ½è´ûЭÒ飬£¬£¬£¬£¬£¬ÆäÖÐAaveÒÑÐû²¼¶³½á²¢×èֹʹÓÃrsETH×÷ΪµäÖÊÆ·µÄдæ¿î»òÆò´û¡£¡£¡£4ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬KelpDAOÐû²¼¼ì²âµ½Éæ¼°rsETHµÄ¡°¿ÉÒÉ¿çÁ´»î¶¯¡±£¬£¬£¬£¬£¬£¬Ëæ¼´ÔÝÍ£ÁËÒÔÌ«·»Ö÷ÍøºÍL2ÉϵÄrsETHºÏÔ¼£¬£¬£¬£¬£¬£¬²¢ÔÚLayerZero¡¢UnichainµÈÏàÖúͬ°éµÄЭÖúÏÂÕö¿ªÊӲ졣¡£¡£Çø¿éÁ´»î¶¯ÏÔʾ£¬£¬£¬£¬£¬£¬Ô¼ÓÐ116,500¸örsETH±»µÁ£¬£¬£¬£¬£¬£¬¼ÛÖµÔ¼2.93ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬Ëæºó×ʽðͨ¹ýTornado Cash¾ÙÐÐ×ªÒÆÒÔÑÚÊÎ×Ù¼£¡£¡£¡£Æ¾Ö¤LayerZero·ÖÏíµÄϸ½Ú£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄÄ¿µÄÊÇÓÃÓÚÑéÖ¤rsETH¿çÁ´ÐÂÎŵÄÑéÖ¤²ã£¨DVN£©¡£¡£¡£¹¥»÷ÕßÈëÇÖÁËÑéÖ¤Æ÷ʹÓõÄһЩRPC½Úµã£¬£¬£¬£¬£¬£¬ÏòÆäÌṩαÔìµÄÇø¿éÁ´Êý¾Ý£¬£¬£¬£¬£¬£¬Í¬Ê±¶Ô¿µ½¡µÄRPC½ÚµãÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬£¬ÆÈʹϵͳÒÀÀµÓÚ±»¡°ÎÛȾ¡±µÄ½Úµã¡£¡£¡£ÕâʹµÃαÔìµÄ¿çÁ´ÐÂÎű»½ÓÊÜΪÓÐÓÃÐÂÎÅ£¬£¬£¬£¬£¬£¬ÏµÍ³È·ÈÏÁËÏÖʵÉÏ´ÓδÔÚÁ´Éϱ¬·¢µÄÉúÒ⣬£¬£¬£¬£¬£¬²¢ÔÊÐíÔÚδ¾­ÊÚȨµÄÇéÐÎÏÂ×ªÒÆrsETH¡£¡£¡£


https://www.bleepingcomputer.com/news/security/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers/


2. ·¨¹úANTSƽ̨ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬½ü1900ÍòÌõСÎÒ˽¼ÒÊý¾Ýй¶


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úµÄANTSƽ̨½üÆÚÔâÓöÁËÒ»´ÎÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¸Ãƽ̨ÈÏÕæ´¦Öóͷ£»¤ÕÕ¡¢Éí·ÝÖ¤¡¢¾ÓÁôÔÊÐíºÍ¼ÝʻִÕÕµÄÉêÇë¡£¡£¡£Õþ¸®ÓÚ4ÔÂ15ÈÕ·¢Ã÷ÁËÕâÆðÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÖÒÑԳƣ¬£¬£¬£¬£¬£¬´Ë´ÎÎó²î¿ÉÄܵ¼ÖÂСÎÒ˽¼ÒºÍרҵÈËÊ¿µÄСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£ÄÚÕþ²¿ÒÑÈ·ÈÏ´Ë´ÎÇå¾²Îó²î£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÊÓ²ìÎó²î¹æÄ£¼°¶ÔÊÜÓ°ÏìÓû§µÄÓ°Ïì¡£¡£¡£ANTSÐû²¼µÄͨ¸æÏÔʾ£¬£¬£¬£¬£¬£¬´Ë´ÎÇå¾²Îó²î¿ÉÄÜй¶ÁËÓû§µÄµÇ¼ID¡¢ÐÕÃû¡¢ÓÊÏä¡¢³öÉúÈÕÆÚºÍÕË»§IDµÈÏêϸÐÅÏ¢¡£¡£¡£ÔÚijЩÇéÐÎÏ£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢»¹°üÀ¨µØµã¡¢³öÉúµØ»òµç»°ºÅÂë¡£¡£¡£Óйز¿·ÖÕýÔÚ֪ͨÊÜÓ°ÏìµÄÓû§¡£¡£¡£Æ¾Ö¤Êý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾Ý²»°üÀ¨ÒÑÉÏ´«µÄÎļþ£¬£¬£¬£¬£¬£¬Ò²ÎÞ·¨Ö±½Ó»á¼ûÓû§ÕË»§¡£¡£¡£Õþ¸®Òѽ«´Ëʱ¨¸æ¸ø·¨¹úÊý¾Ý±£»£»£»£»£»¤¾Ö£¨CNIL£©£¬£¬£¬£¬£¬£¬Í¨ÖªÁËÉó²é¹Ù£¬£¬£¬£¬£¬£¬²¢Ïò¹ú¼ÒÍøÂçÇå¾²»ú¹¹·¢³ö¾¯±¨¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÉù³ÆÕýÔÚ³öÊÛ´ÓANTSÇÔÈ¡µÄ´óÐÍÊý¾Ý¼¯£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô¼1800ÍòÖÁ1900ÍòÌõ¼Í¼£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢³öÉúÏêÇé¡¢µØµãºÍÕË»§ÔªÊý¾Ý¡£¡£¡£


https://securityaffairs.com/191069/data-breach/frances-ants-id-system-website-hit-by-cyberattack-possible-data-breach.html


3. GentlemenÀÕË÷Èí¼þ½èSystemBCѬȾ³¬1570¼ÒÆóÒµÖ÷»ú


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÔÚ¶ÔÒ»ÆðÓÉÍÅ»ï³ÉԱʵÑéµÄGentlemenÀÕË÷Èí¼þ¹¥»÷¾ÙÐÐÊÓ²ìºó£¬£¬£¬£¬£¬£¬Check PointÑо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÓÉÁè¼Ý1570̨Ö÷»ú×é³ÉµÄSystemBCÊðÀí¶ñÒâÈí¼þ½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬ÕâЩÖ÷»ú¾ÝÐÅÖ÷ҪΪÆóÒµÊܺ¦Õß¡£¡£¡£GentlemenÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÔËӪԼĪÔÚ2025ÄêÖÐÆÚ·ºÆð£¬£¬£¬£¬£¬£¬ÌṩÁ˿ɼÓÃÜWindows¡¢Linux¡¢NASºÍBSDϵͳµÄGoÓïÑÔ¼ÓÃÜÆ÷£¬£¬£¬£¬£¬£¬ÒÔ¼°Õë¶ÔESXiÐéÄâ»úÖÎÀí³ÌÐòµÄCÓïÑÔ¼ÓÃÜÆ÷¡£¡£¡£È¥Äê12Ô£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þ¹¥»÷ÁËÂÞÂíÄáÑÇ×î´óµÄÄÜÔ´¹©Ó¦ÉÌÖ®Ò»°Â¶ûÌØÄáÑÇÄÜÔ´×ÛºÏÌå¡£¡£¡£Ö»¹Ü¸ÃRaaSÐж¯¹ûÕæÉù³ÆÒÑÔì³ÉÔ¼320ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬ÆäÖд󲿷ֹ¥»÷±¬·¢ÔÚ½ñÄ꣬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±·¢Ã÷Æä¹ØÁª×éÖ¯ÕýÔÚѸËÙÀ©Õ¹¹¥»÷¹¤¾ß°üºÍ»ù´¡ÉèÊ©¡£¡£¡£ÔÚÒ»´ÎÊÂÎñÏìÓ¦Àú³ÌÖУ¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÀÕË÷Èí¼þÐж¯µÄÒ»¸ö¹ØÁª·½ÊÔͼ°²ÅÅSystemBCÊðÀí¶ñÒâÈí¼þÒÔ¾ÙÐÐÒþ²ØµÄÓÐÓÃÔØºÉͶ·Å¡£¡£¡£SystemBCÖÁÉÙ´Ó2019Äê¾ÍÒѱ£´æ£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚSOCKS5ËíµÀ´«Ê䣬£¬£¬£¬£¬£¬ÒòÆäÄܹ»×ª´ï¶ñÒâÔØºÉ¶ø±»ÀÕË÷Èí¼þÍÅ»ïÆÕ±é½ÓÄÉ¡£¡£¡£¾ÝCheck PointÊӲ죬£¬£¬£¬£¬£¬ÓëGentlemen°²ÅÅSystemBCÏà¹ØµÄ´ó´ó¶¼Êܺ¦ÕßλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢µÂ¹ú¡¢°Ä´óÀûÑǺÍÂÞÂíÄáÑÇ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/


4. ¾«¹¤ÃÀ¹ú¹ÙÍøÔâ¸Ä¶¯£¬£¬£¬£¬£¬£¬¹¥»÷ÕßË÷ÒªÊê½ð


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬¾«¹¤ÃÀ¹ú¹ÙÍøÔâµ½¸Ä¶¯£¬£¬£¬£¬£¬£¬Æä¡°ÐÂÎÅÐû²¼Ìü¡±Ò³Ãæ±»Ìæ»»Îª¹¥»÷ÕßÐû²¼µÄÐÂÎÅ£¬£¬£¬£¬£¬£¬Éù³ÆÒÑÇÔÈ¡¸Ã¹«Ë¾µÄShopify¿Í»§Êý¾Ý¿â£¬£¬£¬£¬£¬£¬²¢Íþв³Æ³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬²»È»½«¹ûÕæÐ¹Â¶ÕâЩÊý¾Ý¡£¡£¡£±»¸Ä¶¯µÄÍøÒ³ÒÔ¡°±»ºÚ¡±ÎªÎÊÌ⣬£¬£¬£¬£¬£¬½«Õý³£ÄÚÈÝÌæ»»³ÉÁËÒ»ÔòÀÕË÷¼°Êý¾Ýй¶֪ͨ¡£¡£¡£¹¥»÷ÕßÉù³ÆÒÑÀÖ³ÉÈëÇÖ¾«¹¤ÃÀ¹úµÄShopifyÊÐËÁÇ徲ϵͳ£¬£¬£¬£¬£¬£¬²¢ÏÂÔØÁËÕû¸ö¿Í»§Êý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨µÄÐÅÏ¢°üÀ¨£º¿Í»§ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¶©µ¥ÀúÊ·¼Í¼¡¢ÉúÒâÏêÇé¡¢ÊÕ»õµØµãÓëÆ«ºÃ¡¢ÕË»§½¨ÉèÈÕÆÚÒÔ¼°¿Í»§±¸×¢µÈ¡£¡£¡£¹¥»÷ÕßÖÒÑԳƣ¬£¬£¬£¬£¬£¬³ý·Ç¾«¹¤ÃÀ¹ú¹«Ë¾¼ÓÈë̸ÅУ¬£¬£¬£¬£¬£¬²»È»±»µÁÊý¾Ý½«±»¹ûÕæ¡£¡£¡£×÷ΪҪÇóµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬ËûÃÇָʾ¸Ã¹«Ë¾ÔÚShopifyÖÎÀíºǫ́ÖвéÕÒÒ»¸öÌØ¶¨¿Í»§ÕË»§£¨IDΪ8069776801871£©£¬£¬£¬£¬£¬£¬²¢Éù³Æ¸ÃÕË»§×ÊÁÏÖÐÌí¼ÓÁËÒ»¸öÁªÏµÓÊÏ䵨µã£¬£¬£¬£¬£¬£¬Ó¦Ê¹ÓøÃÓÊÏäÌᳫ̸ÅС£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹ÒªÇ󾫹¤ÃÀ¹ú±ØÐèÔÚ72СʱÄÚÓëËûÃÇÁªÏµ£¬£¬£¬£¬£¬£¬²»È»ËùνµÄÊý¾Ý¿â½«±»Ðû²¼¡£¡£¡£


https://www.bleepingcomputer.com/news/security/seiko-usa-website-defaced-as-hacker-claims-customer-data-theft/


5. MastodonÆì½¢Ð§ÀÍÆ÷ÔâDDoS¹¥»÷


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Éç½»ÍøÂçÈí¼þÖÆÔìÉÌMastodonÖÜһ֤ʵ£¬£¬£¬£¬£¬£¬ÆäÆì½¢Ð§ÀÍÆ÷mastodon.socialÔâÓöÁËÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¸ÃʵÀýÔÚ²¿·Öʱ¶ÎÎÞ·¨Õý³£»á¼û¡£¡£¡£ÍøÕ¾´ó²¿·ÖÄÚÈÝҪôÏÔʾ¹ýʧÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒªÃ´·ºÆðÈ«ÆÁ¹ÊÕÏÖÒÑÔ¡£¡£¡£MastodonÓÚÃÀ¹ú¶«²¿Ê±¼äÔçÉÏ7µã×óÓÒÐû²¼×´Ì¬¸üУ¬£¬£¬£¬£¬£¬ÌåÏÖÕýÔÚÊÓ²ì´Ë´Î¹¥»÷¡£¡£¡£ÉÏÎç9µã05·Ö£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾³ÆÒѽÓÄÉÓ¦¶Ô²½·¥£¬£¬£¬£¬£¬£¬ÍøÕ¾Òѻָ´»á¼û£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚ¹¥»÷ÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬¿ÉÄÜÈԻ᷺ÆðһЩ²»ÎȹÌÇéÐΡ£¡£¡£MastodonÌåÏÖ£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÊÕµ½Êý°ÙÍò´Î¶ñÒâÇëÇ󣬣¬£¬£¬£¬£¬ÇкÏDDoS¹¥»÷µÄģʽ¡£¡£¡£¹¥»÷ÏÖÔÚ½öÕë¶Ômastodon.socialÕâÒ»¸öʵÀý£¬£¬£¬£¬£¬£¬ÆäÍŶÓÒÑÔÚ¹¥»÷×îÏȺóµÄ¼¸Ð¡Ê±ÄÚ°²ÅÅÓ¦¶Ô²½·¥²¢»Ö¸´ÁË»á¼û¡£¡£¡£MastodonͨѶÖ÷¹ÜAndy PiperÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬£¬£¬Áª°îÓîÖæµÄÈ¥ÖÐÐÄ»¯ÌØÕ÷ȷʵÊÇÒ»ÏîÓÅÊÆ¡£¡£¡£ÔÚÆäËûMastodonЧÀÍÆ÷»òÈÎºÎÆäËûÁª°îÓîÖæÐ§ÀÍÆ÷ÉÏÓµÓÐÕË»§µÄÓû§ÍêÈ«²»ÊÜÓ°Ï죬£¬£¬£¬£¬£¬ÔÚ´ó´ó¶¼ÇéÐÎÏÂÉõÖÁ»ù´¡¸ÐÊܲ»µ½Ð§ÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬ËûÃÇÄܹ»ÏñÍù³£Ò»Ñù»á¼ûÍøÂç¡¢ÔĶÁºÍ·ÖÏíÌû×Ó¡£¡£¡£


https://techcrunch.com/2026/04/20/mastodon-says-its-flagship-server-was-hit-by-a-ddos-attack/


6. ¹¥»÷ÕßÀÄÓÃTeamsð³äITÖ°Ô±ÓÕÆ­Ô¶³Ì»á¼û


4ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬Î¢Èí¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬³ÆÍþвÐÐΪÕßÕýÔÚÔ½À´Ô½¶àµØÀÄÓÃMicrosoft TeamsµÄÍⲿЭ×÷¹¦Ð§£¬£¬£¬£¬£¬£¬²¢ÒÀÀµÕýµ±¹¤¾ß»á¼ûÆóÒµÍøÂç¡¢¾ÙÐкáÏòÒÆ¶¯ºÍÊý¾ÝÇÔÈ¡¡£¡£¡£ÔÚÕâЩ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Íð³äIT»òЧÀĮְ́Ա£¬£¬£¬£¬£¬£¬Í¨¹ý¿ç×⻧̸ÌìÁªÏµÔ±¹¤£¬£¬£¬£¬£¬£¬ÓÕÆ­ËûÃÇÌṩԶ³Ì»á¼ûȨÏÞ¡£¡£¡£Î¢ÈíÊӲ쵽¶àÆðÈëÇÖÊÂÎñ¾ù½ÓÄÉÀàËÆµÄ¹¥»÷Á´£¬£¬£¬£¬£¬£¬Ê¹ÓÃÉÌÒµÔ¶³ÌÖÎÀíÈí¼þ£¨ÈçQuick Assist£©ºÍRcloneÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬½«Îļþ´«Êäµ½Íâ²¿ÔÆ´æ´¢Ð§ÀÍ¡£¡£¡£ÓÉÓÚ´ó×ÚʹÓÃÕýµ±Ó¦ÓóÌÐòºÍÔ­ÉúÖÎÀíЭÒ飬£¬£¬£¬£¬£¬ºóÐø¶ñÒâ»î¶¯ºÜÄÑÓëÕý³£²Ù×÷ÇøÍÑÀëÀ´¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷Õß´Ó³õʼפ×ãµã³ö·¢£¬£¬£¬£¬£¬£¬Ê¹ÓÃÊÜÐÅÈεŤ¾ßºÍÍâµØÖÎÀíЭÒéÔÚÆóÒµÄÚ²¿ºáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬²¢×¼±¸Ãô¸ÐÊý¾ÝÒÔ¾ÙÐÐÇÔÈ¡£¬£¬£¬£¬£¬£¬Õû¸öÀú³ÌÍùÍùÈÚÈëµ½Ò»Ñùƽ³£ITÖ§³Ö»î¶¯ÖС£¡£¡£ÔÚ×î½üµÄÒ»·Ý±¨¸æÖУ¬£¬£¬£¬£¬£¬Î¢ÈíÏêϸÐÎòÁËÒ»¸ö¾Å½×¶ÎµÄ¹¥»÷Á´¡£¡£¡£¸Ã¹¥»÷Á´Ê¼ÓÚÍþвÐÐΪÕßͨ¹ýÍⲿTeams̸ÌìÁªÏµÄ¿µÄ£¬£¬£¬£¬£¬£¬Ã°Ã»ÊÕ˾ITÖ°Ô±£¬£¬£¬£¬£¬£¬Éù³ÆÐèÒª½â¾öÕË»§ÎÊÌâ»òÖ´ÐÐÇå¾²¸üУ¬£¬£¬£¬£¬£¬Ä¿µÄÊÇÓÕʹĿµÄÓû§Æô¶¯Ô¶³ÌÖ§³Ö»á»°£¬£¬£¬£¬£¬£¬Í¨³£ÊÇͨ¹ýQuick Assist£¬£¬£¬£¬£¬£¬´Ó¶øÈù¥»÷ÕßÖ±½Ó¿ØÖÆÔ±¹¤µÄÅÌËã»ú¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-teams-increasingly-abused-in-helpdesk-impersonation-attacks/