StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
°ä²¼¹¦·ò 2026-03-121. StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾
3ÔÂ11ÈÕ£¬²Æ¸»500ǿҽÁƿƼ¼ÆóÒµStrykerÔâ·êÓëÒÁÀʵý±¨²¿ÃÅÓйصÄÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯HandalaÌáÒéµÄ¸²ÃðÐÔÍøÂç¹¥»÷¡£¸Ã×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þÇÔÈ¡50TB¹Ø¼üÊý¾Ý²¢¶Ï¸ùÈ«Çò20ÓàÍǫ̀ϵͳ¡¢·þÎñÆ÷¼°Òƶ¯É豸Êý¾Ý£¬µ¼ÖÂStrykerÔÚ79¸ö¹ú¶ÈµÄ·ÖÖ§»ú¹¹±»ÆÈ¹Ø¹Ø£¬Òý·¢¹«Ë¾³ÉÁ¢ÒÔÀ´×îÑϳÁΣ»ú¡£Õâ´Î¹¥»÷Ôì³ÉStrykerÈ«Çò΢Èí»·¾³È«ÃæÖжϣ¬Ô±¹¤WindowsÉ豸¼°Òƶ¯ÖÕ¶ËÔÚ°ëÒ¹ÔâÔ¶³ÌÊý¾Ý²Á³ý¡£¾ÝÔ±¹¤Ð¹Â©£¬²¿ÃÅʹÓÃÓ×ÎÒÊÖ»ú×¢²á¹¤×÷ȨÏÞµÄÉ豸ͬÑùÃÔʧÊý¾Ý£¬¹«Ë¾±»ÆÈÒªÇóÔ±¹¤Ð¶ÔØIntune¡¢TeamsµÈÖÎÀíµ±Óü°VPN¿Í»§¶Ë¡£¶àµØ°ì¹«ÊÒÒòϵͳ̱»¾¸´Ô¡°Ö½±Ê¡±²Ù×÷ģʽ£¬ÄÚ²¿·þÎñ½Ó¼ûÖжÏÓ°ÏìÈÕ³£ÔËÓª¡£Handala×éÖ¯³ÉÁ¢ÓÚ2023Äê12Ô£¬ÓëÒÁÀʵý±¨°²È«Êý£¨MOIS£©´æÔÚ¹ØÁª£¬´ËǰÒÔÕë¶ÔÒÔÉ«ÁÐ×éÖ¯¼°Ê¹Ó÷ÛËéÐÔ¶ñÒâÈí¼þ²Á³ýÉ豸ÎÅÃû¡£¸Ã×é֯ͨ¹ý´Û¸ÄStrykerµÄEntraµÇÂ¼Ò³ÃæÕ¹Ê¾Æä±êÖ¾£¬²¢ÔÚÊý¾Ýй¼ûÅ»§°ä²¼Ãô¸ÐÐÅÏ¢¡£
https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/
2. WordPress²å¼þAlly©¶Â±Ã§¬25ÍòÍøÕ¾Ãæ¶Ô·çÏÕ
3ÔÂ11ÈÕ£¬AllyÊÇElementor¿ª·¢µÄWordPress¿É½Ó¼ûÐÔ²å¼þ£¬×°ÖÃÁ¿³¬40Íò´Î£¬Òò´æÔÚ±àºÅΪCVE-2026-2313µÄ¸ßΣSQL×¢Èë·ì϶Òý·¢°²È«¾¯Ê¾¡£¸Ã·ì϶ÓÉAcquia¹¥»÷ÐÔ°²È«¹¤³ÌʦDrew Webber£¨mcdruid£©·¢ÏÖ£¬ÆäÑϳÁÐÔÆÀ·Ö¼«¸ß£¬Ô´ÓÚ²å¼þ4.0.3¼°¸üÔç°æ±¾ÖÐget_global_remediations()²½Öè¶ÔÓû§ÌṩµÄURL²ÎÊý´¦Öò»µ±£¬Î´¶ÔSQL¸ßµÍÎĽøÐгä·ÖËãÕÊ£¬µ¼Ö¹¥»÷Õß¿Éͨ¹ýURLõè¾¶×¢ÈëSQL²éÎÊ¡£WordFence¼¼Êõ·ÖÎöÖ¸³ö£¬Ö»¹Üesc_url_raw()º¯ÊýÓÃÓÚURL°²È«´¦Ö㬵«ÎÞ·¨×èÖ¹SQLÔª×Ö·û£¨Èçµ¥ÒýºÅ¡¢À¨ºÅ£©µÄ×¢È룬ʹδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÄܸ½¼Ó¶î±íSQL²éÎÊ£¬ÀûÓûùÓÚ¹¦·òµÄäע¼¼Êõ´ÓÊý¾Ý¿âÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ÖµÍ×ÌùÐĵÄÊÇ£¬·ì϶ÀûÓÃÐèÂú×ã²å¼þÏνÓElementorÕË»§ÇÒ½¨¸´Ä£¿é´¦Óڻ״̬µÄǰÌá¡£ElementorÓÚ2ÔÂ23ÈÕ°ä²¼4.1.0°æ±¾½¨¸´¸Ã·ì϶£¬²¢Ïò×êÑÐÈËÔ±Ðû¸æ800ÃÀÔª·ì϶Éͽð¡£È»¶ø£¬WordPress.orgÊý¾ÝÏÔʾ£¬½öÔ¼36%µÄAllyÓû§ÊµÏÖÉý¼¶£¬ÈÔÓг¬25ÍòÍøÕ¾Â¶³öÔÚCVE-2026-2313·çÏÕÖС£
https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/
3. CISA´¹Î£ÒªÇóµ±¾Ö»ú¹¹½¨²¹n8n¸ßΣ·ì϶
3ÔÂ11ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Ç¿ÔìÒªÇóÁª¹ú»ú¹¹ÔÚ3ÔÂ25ÈÕǰ½¨²¹n8nƽ̨´æÔÚµÄCVE-2025-68613Ô¶³Ì´úÂëÖ´Ðзì϶£¬¸Ã·ì϶Õý±»»ý¼«ÀûÓá£n8n×÷Ϊ¿ªÔ´¹¤×÷Á÷×Ô¶¯»¯Æ½Ì¨£¬ÔÚAI¿ª·¢ÖÐ¿í·ºÓÃÓÚÊý¾ÝÉãÈ¡£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬Docker HubÀÈ¡Á¿³¬1ÒڴΣ¬³£´æ´¢APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÊý¾Ý£¬³ÉΪ¹¥»÷Õß³ÁµãÖ¸±ê¡£CVE-2025-68613Ô´ÓÚn8n¹¤×÷Á÷±í°×ʽÆÀ¹Àϵͳ¶Ô¶¯Ì¬´úÂë×ÊÔ´½ÚÔì²»µ±£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷ÕßÒÔn8n¹ý³ÌȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£n8nÍŶÓ12Ô°䲼µÄv1.122.0°æ±¾Òѽ¨¸´´Ë·ì϶£¬²¢½¨ÒéÖÎÀíÔ±Á¢¼´Éý¼¶¡£Ò»Ê±»º½â´ëÊ©Ô̺¬Ï޶ȹ¤×÷Á÷±à×ëȨÏÞÖÁÆëÈ«ÐÅÀµÃü»§¡¢½µµÍ²Ù×÷ϵͳȨÏÞ¼°ÍøÂç½Ó¼ûÏÞ¶È¡£Shadowserver¼à²â·¢ÏÖ£¬È«Çò³¬4Íò¸öδ´ò²¹¶¡µÄn8nÊ·ý¶³öÓÚ»¥ÁªÍø£¬ÆäÖб±ÃÀÕ¼18,000Óà¸ö£¬Å·ÖÞ³¬14,000¸ö¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/
4. ±´¶û¾È»¤³µ¹«Ë¾23.8ÍòÈËÊý¾Ýй¶
3ÔÂ11ÈÕ£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ¾È»¤³µ·þÎñÌṩÉ̱´¶û¾È»¤³µ¹«Ë¾½üÈÕÅû¶£¬Æä2025Äê2Ô²úÉúµÄÍøÂçÈëÇÖÊÂÎñµ¼Ö½ü23.8ÍòÈËÓ×ÎÒ¡¢²ÆÕþ¼°Ò½Áƽ¡È«ÐÅϢй¶¡£Æ¾¾ÝÌá½»¸øÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒµÄÎļþ£¬ºÚ¿ÍÓÚ2025Äê2ÔÂ7ÈÕÖÁ14ÈÕÆÚ¼äÈëÇָù«Ë¾ÍøÂ磬±´¶û¹«Ë¾ÓÚ2ÔÂ13ÈÕ³õ´Î¼ì²âµ½Òì³££¬µ«Ö±ÖÁ4ÔÂ14ÈղŶԱí°ä²¼ÊÂÎñ£¬Ô¼Ò»¸öÔºó£¬MedusaÀÕË÷Èí¼þÍÅ»ïÐû³Æ´Ó±´¶û¹«Ë¾ÇÔÈ¡219.50GBÊý¾Ý£¬²¢¹«¿ª²¿Ãű»µÁÄÚÈÝ¡£Õâ´Îй¶µÄÐÅÏ¢ÁìÓò¿í·º£¬Ô̺¬ÐÕÃû¡¢Éç»á±£ÏÕºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕºÅÂ룬ÒÔ¼°²ÆÕþÕË»§¡¢Ò½ÁƼͼºÍ½¡È«±£ÏÕÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£±´¶û¹«Ë¾°µÊ¾£¬ÊÂÎñµ÷²éÒÑÓÚ2026Äê2ÔÂ20ÈÕʵÏÖ£¬È·ÈÏÊý¾Ýй¶¹æÄ£Ô¶³¬×î³õÅû¶µÄ11.4ÍòÈË£¬ÏÖʵÊÜÓ°ÏìÈËÊý´ï237,830ÈË¡£ÎªÓ¦¶ÔÕâ´ÎΣ»ú£¬±´¶û¹«Ë¾²ÉÈ¡Á˶àÏî²¹¾È´ëÊ©£ºÈ«Ãæ¼ÓÇ¿ÍøÂ簲ȫ·À»¤¡¢Ç¿Ôì³ÁÖÃËùÓÐÕË»§ÃÜÂ룬²¢ÎªÊÜÓ°Ïì¸ö±ðÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ£¬Í¬Ê±ÌáÐÑÓû§¾¯ÌèDZÔÚڲƼ°Éí·Ý͵ÇÔ·çÏÕ¡£
https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/
5. ¶íAPT28²¿Êð¶¨Ôì¶ñÒâÈí¼þ³Ö¾Ã¼à¶½ÎÚ¾ü·½
3ÔÂ10ÈÕ£¬¾ÝESET×îл㱨£¬´ÓÊôÓÚ¶íÂÞ˹Áª¹ú¾üʵý±¨×ܾ֣¨GRU£©µÚ26165¶ÓÁеĹú¶È¼¶ºÚ¿Í×éÖ¯APT28£¨±ðºÅÔ̺¬Fancy Bear¡¢SednitµÈ£©×Ô2024Äê4ÔÂÆð£¬Ê¹ÓÃÈý¿î¶¨Ôì¶ñÒâÈí¼þBEARDSHELL¡¢COVENANT¼°SLIMAGENT£¬¶ÔÎÚ¿ËÀ¼¾ü·½ÈËÔ±·¢Õ¹³Ö¾Ã¼à¶½»î¶¯¡£SLIMAGENT×÷ΪÖ÷Ìâ¼äµý¹¤¾ß£¬¿É¼Í¼¼üÅÌÊäÈë¡¢²¶»ñÆÁÄ»½ØÍ¼²¢ÍøÂç¼ôÌù°åÊý¾Ý£¬Æä·¢Ô´¿É×·ÒäÖÁAPT28ÔÚ2010Äê´úʹÓõÄXAgentÖ²È뷨ʽ¡£BEARDSHELLºóÃÅ·¨Ê½Í¨¹ýºÏ·¨ÔÆ´æ´¢·þÎñIcedrive³ÉÁ¢ºÅÁîÓë½ÚÔ죨C2£©Í¨Â·£¬Ö´ÐÐPowerShellºÅÁî¡£Æäѡȡ¹ÖÒìµÄ¡°²»Í¨Ã÷ν´Ê¡±»ìºÏ¼¼Êõ£¬¸Ã¼¼ÊõͬÑù³Ê´Ë¿ÌAPT28ÓÚ2016Äê¹¥»÷ÃÀ¹úÃñÖ÷µ³È«¹úίԱ»á£¨DNC£©Ê±Ê¹ÓõÄXTunnelËí·¹¤¾ßÖС£COVENANT×÷Ϊ¿ªÔ´.NETºóÉøÈë¿ò¼Ü£¬¾Éî¶ÈÅú¸Äºó×Ô2025Äê7ÔÂÆðѡȡ»ùÓÚÔÆµÄÐÂÍøÂçºÍ̸£¬ÀÄÓÃFilenÔÆ´æ´¢·þÎñ½øÐÐC2ͨѶ¡£´Ëǰ£¬¸Ã¿ò¼Ü±äÌåÔøÊ¹ÓÃpCloud£¨2023Ä꣩¡¢Koofr£¨2024-2025Ä꣩¡£
https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
6. UNC6426ÀûÓù©¸øÁ´¹¥»÷72Ó×ʱÆëÈ«ÈëÇÖÔÆ»·¾³
3ÔÂ11ÈÕ£¬nx npm°ü¹©¸øÁ´2025Äê8ÔÂÔâ·ÛËéºó£¬ÍþвÐÐΪÕßUNC6426ÀûÓÃÇÔÈ¡µÄGitHubÁîÅÆ£¬ÔÚ72Ó×ʱÄÚʵÏÖ¶ÔÊܺ¦ÕßÔÆ»·¾³µÄÆëÈ«ÈëÇÖ¡£Õâ´Î¹©¸øÁ´¹¥»÷Ô´ÓÚnx npm°üÒ×Êܹ¥»÷µÄpull_request_target¹¤×÷Á÷±»ÀûÓ㬹¥»÷Õßͨ¹ý¡°Pwn Request¡±¹¥»÷»ñÈ¡ÌáÉýȨÏÞ²¢½Ó¼ûGITHUB_TOKEN£¬½«Ä¾Âí»¯°üÍÆË͵½npm×¢²á±í¡£Ä¾Âí°üÔ̺¬QUIETVAULTƾ֤ÇÔÈ¡·¨Ê½£¬Í¨¹ýLLM¹¤¾ßɨÃèϵͳÃô¸ÐÐÅÏ¢£¬Êý¾Ý±»ÉÏ´«´ó¹«¹²GitHub´æ´¢¿â¡£Êܺ¦ÕßÔ±¹¤ÔËÐÐNx Console²å¼þʱ´¥·¢¸üУ¬µ¼ÖÂQUIETVAULTÖ´ÐС£UNC6426ÀûÓñ»µÁPAT£¬Í¨¹ýNord Stream¹¤¾ß´ÓCI/CD»·¾³ÌáÈ¡»úÃÜ£¬Ð¹Â¶GitHub·þÎñÕË»§Í´´¦ºó£¬ÀûÓá°--aws-role¡±²ÎÊýÌìÉúһʱAWS STSÁîÅÆ£¬ÔÚAWS»·¾³°²Éí¡£ÓÉÓÚGitHub Actions CloudFormation½ÇɫȨÏÞ¹ý¸ß£¬¹¥»÷Õß²¿ÊðÐÂAWS Stack£¬¸½¼ÓAdministratorAccessÕ½Êõ£¬72Ó×ʱÄÚ½«È¨ÏÞÌáÉýÖÁÆëÈ«ÖÎÀíԱȨÏÞ¡£Ëæºó£¬¹¥»÷Õßö¾ÙS3´æ´¢Í°¶ÔÏó¡¢ÖÕÖ¹³ö²ú»·¾³EC2ºÍRDSÊ·ý¡¢½âÃÜÀûÓÃÃÜÔ¿£¬²¢½«ËùÓÐÄÚ²¿GitHub´úÂë¿â³Á¶¨ÃûΪ¡°/s1ngularity-repository-[Ëæ»ú×Ö·û]¡±²¢¹«¿ª¡£
https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html


¾©¹«Íø°²±¸11010802024551ºÅ