Ç×ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖÒÔÉ«Áйú·À¿Æ¼¼¹«Ë¾
°ä²¼¹¦·ò 2026-04-081. Ç×ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖÒÔÉ«Áйú·À¿Æ¼¼¹«Ë¾
4ÔÂ3ÈÕ£¬Ç×ÒÁÀʵĺڿÍ×éÖ¯HandalaÓÚ4ÔÂ2ÈÕ°ä·¢ÈëÇÖÁËPSK Wind Technologies£¬ÕâÊÇÒ»¼ÒÒÔÉ«Áй¤³ÌºÍIT¹«Ë¾£¬×¨ÃÅ´Óʹú·ÀºÍ¹Ø¼üͨѶµÄ¼¯³Éϵͳ£¬Ô̺¬Ö¸»ÓºÍ½ÚÔì½â¾ö¹æ»®¡£¾Ý±¨Â·£¬Handala±í±íÉÏÊÇÒ»¸öÖ§³Ö°ÍÀÕ˹̹µÄºÚ¿Í×éÖ¯£¬µ«ÆÕ±é±»ÒÔΪÊÇÒÁÀÊÖ§³ÖµÄVoid ManticoreµÄ»Ï×Ó¡£¸Ã×éÖ¯ÒÔÍøÂç´¹µö¡¢Êý¾ÝÇÔÈ¡¡¢ÀÕË÷ºÍ·ÛËéÐÔ²Á³ý¹¥»÷¶øÎÅÃû£¬Í¬Ê±´ÓÊÂÐÅÏ¢Õ½ºÍÉúÀíÕ½¡£×ÔÒÁÀÊì¶Ü·¢×÷ÒÔÀ´£¬ËûÃÇÒ»ÏòÒÔÒÔÉ«Áоü·½·þÎñÆ÷¡¢µý±¨ÈËÔ±ºÍ¹«Ë¾ÎªÖ¸±ê£¬ÇÔÈ¡»ò²Á³ýÊý¾Ý¡£Handala×éÖ¯Ðû³Æ´ÓPSK WindÇÔÈ¡ÁËÃô¸ÐÊý¾Ý£¬Ô̺¬µ¼µ¯·ÀÓùϵͳ¼°Ö¸»Ó½ÚÔìϵͳµÄÓйØÎļþ£¬²¢¾Ý³Æ½«Æä·¢Ë͸øÁË¡°µÖ¿¹ÖáÐÄ¡±µ¼µ¯¶ÓÁС£¡°µÖ¿¹ÖáÐÄ¡±ÊÇÓÉÒÁÀʸ¨µ¼µÄÕþÖξüÊÂͬÃË£¬³ÉÔ±Ô̺¬Àè°ÍÄÛÕæÖ÷µ³¡¢°ÍÀÕ˹̹ÒÁ˹À¼Ê¥Õ½×éÖ¯¡¢ÐðÀûÑÇÕþȨ¶ÓÁÐÒÔ¼°ÒÁÀ¿ËʲҶÅÉÃñ±ø×éÖ¯µÈ·ñ¾öÒÔÉ«ÁÓ×¢ÃÀ¹ú¼°ÆäÃËÓѵÄ×éÖ¯¡£HandalaÔÚÓÌÌ«½Ì³ÁÒª½ÚÈÕÓâÔ½½ÚÆÚ¼ä·¢³öÍþв£¬ÖÒ¸æÒÔÉ«Áйú·ÀºÍÖ¸»ÓÖÐÐĽ«Ô⵽Ϯ»÷¡£Æäʱ£¬PSK WindºÍÒÔÉ«Áоü·½¾ùδ¶Ô´Ë°ä·¢ÆÀÂÛ£¬¶ø¸Ã×éÖ¯ÒѰ䲼Á˾øÃÜͨѶϵͳ¡¢ÄÚ²¿Îļþ¡¢µØÖ·ÕÕÆ¬µÈ»úÃÜÎļþ¡£
https://securityaffairs.com/190319/data-breach/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies.html
2. ÓÀÀû¶È¼Ù´åÊý¾Ýй¶ӰÏ쳬2.1ÍòÃûÔ±¹¤
4ÔÂ7ÈÕ£¬¸ß¶Ë¶Ä³¡ºÍ¾ÆµêÔËÓªÉÌÓÀÀû¶È¼Ù´å½üÈÕÅû¶£¬×î½ü²úÉúµÄÊý¾Ýй¶ÊÂÎñÒÑÓ°Ï쳬¹ý2.1ÍòÈË¡£ÓÀÀûÔÚ2ÔÂÏÂѮ֤ʵºÚ¿Í»ñÈ¡ÁËÔ±¹¤Êý¾Ý£¬´Ëǰ³ôÃûÔ¶ÑïµÄÍøÂç·¸×ï×éÖ¯ShinyHuntersÐû³ÆÇÔÈ¡Á˳¬¹ý80ÍòÌõÔ̺¬Ó×ÎÒÉí·ÝÐÅÏ¢¼°Éç»á±£ÏÕºÅÂëµÄ¼Í¼¡£ºÚ¿ÍËæºó½«ÓÀÀû´ÓÐ¹Â¶ÍøÕ¾ÉÏÒÆ³ý£¬ÕâÒ»ÐÐΪͨ³£Åú×¢Êܺ¦ÕßÒѾö¶¨Ö§¸¶Êê½ð£¬µ«ÆäʱÓÀÀû»Ø¾ø¾Í´ËÖÃÆÀ¡£ÔÚ½üÈÕÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«ÊÒÌá½»µÄÊý¾Ýй¶֪ͨÖУ¬ÓÀÀûÌṩÁ˸ü¶àÊÂÎñϸ½Ú¡£¹«Ë¾ÔÚ·¢¸øÊÜÓ°ÏìÓ×ÎÒµÄ֪ͨÖаµÊ¾¡°ÍþвÐÐΪÕßÐû³ÆËùº±¼û¾Ý¶¼Òѱ»É¾³ý¡±£¬Õâ½øÒ»²½Ó¡Ö¤ÁËÊê½ð¿ÉÄÜÒѱ»Ö§¸¶µÄ˵·¨¡£¾Ý±¨Â·£¬ºÚ¿ÍË÷ÒªµÄÊê½ð³¬¹ý22¸ö±ÈÌØ±Ò£¬Ô¼ºÏ150ÍòÃÀÔª¡£Í¨ÖªÏÔʾ£¬Õâ´Î¹¥»÷²úÉúÔÚ2025Äê10Ô£¬Ö¸±êÊÇÈËÁ¦×ÊԴϵͳ£¬ºÜ¿ÉÄÜÊôÓÚShinyHuntersÕë¶Ô100¶à¼Ò»ú¹¹ÌáÒéµÄ´ó¹æÄ£¹¥»÷»î¶¯µÄÒ»²¿ÃÅ¡£ÓÀÀûÏòÃåÒòÖÝ×ܼì²ì³¤°ì¹«Êһ㱨³Æ£¬Õâ´ÎÊÂÎñ¹²Ó°Ïì21775ÃûÔ±¹¤¡£ÊÜÓ°ÏìÔ±¹¤½«»ñµÃÃâ·ÑµÄÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£
https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/
3. ºÚ¿ÍÀûÓÃNinja Forms WordPress²å¼þµÄÑϳÁ·ì϶
4ÔÂ7ÈÕ£¬WordPressÊ¢ÐÐµÄ±íµ¥¹¹½¨Æ÷Ninja FormsËùÅäÌ×µÄFile UploadÀ©´ó²å¼þ£¬±»·¢ÏÖÒ»¸ö±àºÅΪCVE-2026-0740µÄÑϳÁ°²È«·ì϶£¬ÆäCVSS·çÏÕÆÀ·Ö¸ß´ï9.8¡£¸Ã·ì϶ԴÓÚ²å¼þÔÚÖ¸±êÎļþÃû´¦ÖÃÉϲ»×ã±ØÒªµÄÎļþÀàÐÍÓëÀ©´óÃûÑéÖ¤£¬µ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÉÏ´«ËÁÒâÎļþ£¬Ô̺¬Î£ÏÕµÄPHP¾ç±¾£¬ÉõÖÁͨ¹ýõè¾¶±éÀú¼¿Á©½«ÎļþÒÆ¶¯ÖÁÍøÕ¾¸ùĿ¼£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐС£³É¹¦ÀûÓô˷ì϶µÄ¹¥»÷Õß¿ÉÄܲ¿ÊðWeb Shell£¬²¢×îÖÕÆëÈ«ÊÕÊÜÖ¸±êÍøÕ¾¡£¸Ã·ì϶ӰÏìNinja FormsÎļþÉÏ´«À©´ó×î¸ßÖÁ3.3.26°æ±¾£¬¶øNinja Forms×ÔÉíÏÂÔØÁ¿³¬¹ý60Íò´Î£¬ÆäFile UploadÀ©´óÒ²Õ¼ÓÐ9ÍòÓû§£¬Òò¶øÇ±ÔÚÊÜÓ°ÏìÁìÓò¼«¹ã¡£¹©¸øÉÌÔÚ2ÔÂ10ÈÕʵÏÖ²¿Ãލ¸´ºó£¬ÓÚ3ÔÂ19ÈÕÕýʽ°ä²¼3.3.27°æ±¾ÒÔ³¹µ×½¨¸´·ì϶¡£È»¶ø£¬ÔÚ´ÓǰµÄ24Ó×ʱÄÚ£¬Wordfence·À»ðǽÒÑÀ¹½Ø³¬¹ý3600´ÎÕë¶Ô¸Ã·ì϶µÄÏÖʵ¹¥»÷³¢ÊÔ£¬Åú×¢·ì϶Òѱ»¹¥»÷Õß»ý¼«ÀûÓá£
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/
4. ¶íÂÞ˹µçОÞÍ·RostelecomÔâ´ó¹æÄ£DDoS¹¥»÷
4ÔÂ7ÈÕ£¬ÖÜÒ»Íí¼ä£¬¶íÂÞ˹¹úÓеçОÞÍ·RostelecomÔâ·êÁËÒ»³¡¡°´ó¹æÄ£¡±É¢²¼Ê½»Ø¾ø·þÎñ£¨DDoS£©¹¥»÷£¬µ¼Ö¸ùúÊýÊ®¸ö³ÇÊеÄÍøÉÏÒøÐÓ×¢µ±¾Ôì½Ì¨¼°ÆäËûÊý×Ö·þÎñ³öÏÖÁÙʱÐÔÖжϡ£¾Ý¶íÂÞ˹µçÐŹ«Ë¾Ïò¹Ù·½Ã½Ìåй©£¬Õâ´Î¹¥»÷Ë䱻ѸËÙ½ÚÔ죬µ«ÍøÂç·þÎñµÄÖжÏÏÖʵÉÏÊÇÆäΪ»º½â¹¥»÷¶øÆô¶¯´¹Î£¹ýÂË´ëÊ©ËùÔì³ÉµÄ¡£DDoS¹¥»÷µÄµÀÀíÊÇͨ¹ýÏòÖ¸±êÍøÕ¾ºÍÔÚÏß·þÎñ·¢Ëͺ£Á¿À¬»øÁ÷Á¿£¬Ê¹Æä²»Ê¤³Á¸º£¬´Ó¶øÁîºÏ·¨Óû§ÎÞ·¨Õý³£½Ó¼û¡£ÊÜÕâ´Î¹¥»÷Ó°Ï죬ÖÜÒ»Íí¼ä¶íÂÞ˹ԼÓÐ30¸ö³ÇÊеľÓÃñ·´Ó³RostelecomµÄ¼ÒÍ¥»¥ÁªÍø·þÎñ³öÏÖ¹ÊÕÏ£¬Ô̺¬ÓÎϷƽ̨Steam¡¢µ±¾Ö·þÎñÃÅ»§ÍøÕ¾Gosuslugi¡¢ÊÓÆµÆ½Ì¨RutubeÒÔ¼°¸÷ÀàÒøÐзþÎñÔÚÄڵĶà¸öÖØÒªÍøÕ¾¾ùÎÞ·¨½Ó¼û¡£²¿ÃÅÓû§Ïò±¾µØÃ½Ì尵ʾ£¬ËûÃÇÖ»ÄܽӼûËùνµÄ¡°°×Ãûµ¥¡±ÍøÕ¾£¬¼´µ±¾ÖºË×¼µÄ·þÎñÁÐ±í£¬ÕâЩ·þÎñ¼´±ãÔÚ»¥ÁªÍøÖÐ¶ÏÆÚ¼äÒ²ÄÜά³ÖÁ¬Í¨¡£¶ø¾Ý±¾µØ»¥ÁªÍø¼à²â·þÎñ»ú¹¹³Æ£¬½ØÖÁÖܶþ£¬ÈÔÓжíÂÞ˹»¥ÁªÍøÓû§³ÖÐø·´Ó³ÎÞ·¨½Ó¼û²¿Ãŵ±¾ÖÍøÕ¾¡£
https://therecord.media/rostelecom-cyberattack-disrupts-russian-internet-access
5. Flowise RCE·ì϶CVE-2025-59528Òѱ»¹¥»÷ÕßÀûÓÃ
4ÔÂ7ÈÕ£¬¿ªÔ´Æ½Ì¨Flowise±»·¢ÏÖ´æÔÚÒ»¸ö×î¸ßÑϳÁÐÔ·ì϶£¬±àºÅΪCVE-2025-59528£¬Ä¿Ç°Òѱ»ºÚ¿ÍÀûÓÃÀ´Ö´ÐÐËÁÒâ´úÂë¡£¸Ã·ì϶ÔÊÐí¹¥»÷ÕßÔÚûÓÐÈκΰ²È«²é³µÄÇé¿öÏÂ×¢Èë¶ñÒâJavaScript´úÂ룬ÓÚÈ¥Äê9Ô¹«¿ªÅû¶ʱ±ãÒÑÖÒ¸æ³Æ£¬³É¹¦ÀûÓÿɵ¼ÖºÅÁîÖ´ÐкÍÎļþϵͳ½Ó¼û¡£ÎÊÌâµÄ±¾ÔÔÚÓÚFlowiseµÄCustomMCP½Úµã£º¸Ã½ÚµãÔÊÐíÅäÖÃÉèÖÃÏνӵ½±í²¿Ä£Ð͸ߵÍÎĺÍ̸·þÎñÆ÷£¬µ«ÔÚ´¦ÖÃÓû§ÊäÈëµÄ¡°mcpServerConfig¡±²ÎÊýʱ£¬»á²»°²È«µØÆÀ¹À²¢Ö´ÐÐÆäÖеÄJavaScript´úÂ룬¶øÆëȫδ¶ÔÆä°²È«ÐÔ½øÐÐÑéÖ¤¡£¿ª·¢ÕßÒÑÔÚFlowise 3.0.6°æ±¾Öн¨¸´ÁËÕâÒ»ÎÊÌ⣬Ŀǰ×îеİ汾Ϊ3.1.1£¬ÓÚÁ½ÖÜǰ°ä²¼¡£·ì϶µý±¨¹«Ë¾VulnCheckµÄ°²È«×êÑÐÔ±Caitlin CondonÔÚLinkedInÉÏÅû¶£¬ÆäCanaryÍøÂçÒѳõ´Î¼ì²âµ½CVE-2025-59528·ì϶µÄÔÚÒ°ÀûÓá£Ö»¹ÜĿǰ¹¥»÷»î¶¯ÁìÓòÓÐÏÞ£¬½öÔ´×ÔÒ»¸öStarlink IPµØÖ·£¬µ«×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬µ±Ç°Ô¼ÓÐ12,000ÖÁ15,000¸öFlowiseÊ·ý¶³öÔÚ¹«ÍøÉÏ£¬ÆäÖдæÔÚ·ì϶µÄ·þÎñÆ÷±ÈÀýÉв»Ã÷È·¡£
https://www.bleepingcomputer.com/news/security/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/
6. ¹ú¼Ê·¨ÂÉÐж¯´ì°ÜAPT28µÄFrostArmada¹¥»÷
4ÔÂ7ÈÕ£¬Ò»³¡ÓÉ·¨Âɲ¿ÃÅÓë˽Ӫ¹«Ë¾ºÏ×÷·¢Õ¹µÄ¹ú¼ÊÐж¯£¬³É¹¦´ì°ÜÁ˶íÂÞ˹¹ú¶È¼¶ºÚ¿Í×éÖ¯APT28ÌáÒéµÄFrostArmada´ó¹æÄ£¹¥»÷»î¶¯¡£¸Ã×éÖ¯Óë¶íÂÞ˹×ÜÕÕ·÷²¿µý±¨×ֵܾÚ85³ö¸ñ·þÎñÖÐÐÄ26165¾üʵ¥ÔªÓйØÁª£¬ÔÚÕâ´Î¹¥»÷ÖÐÖØÒªÈëÇÖÓ×ÐͰ칫ÊҺͼÒÍ¥°ì¹«ÊÒ·ÓÉÆ÷£¬ÓÈÆäÊÇMikroTikºÍTP-LinkÆ·ÅÆ£¬Í¨¹ý¸ü¸ÄÓòÃûϵͳÉèÖ㬽«±¾µØÁ÷Á¿³Á¶¨ÏòÖÁ¹¥»÷Õß½ÚÔìµÄÐ鹹רÓ÷þÎñÆ÷£¨VPS£©¡£ÕâЩ¶ñÒâDNSÅäÖÃͨ¹ý¶¯Ì¬Ö÷»úÅäÖúÍ̸×Ô¶¯ÍÆË͵½ÄÚ²¿É豸£¬µ±Óû§³¢ÊÔ½Ó¼ûÉí·ÝÑéÖ¤ÓйØÓòÃûʱ£¬DNS·þÎñÆ÷·µ»Ø¹¥»÷ÕßµÄIPµØÖ·¶ø·ÇÕæÊµµØÖ·£¬´Ó¶ø½«Êܺ¦Õß³Á¶¨ÏòÖÁÖÐÑëÈË´úÀí¡£¶ÔÊܺ¦Õß¶øÑÔ£¬Î¨Ò»µÄڲƼ£ÏóÊÇÎÞЧTLSÖ¤ÊéµÄÖҸ棬µ«¸ÃÖҸ泣±»ºöÂÔ£¬Ê¹µÃ¹¥»÷Õß¿ÉÄÜÇÔȡ΢ÈíÕÊ»§µÇ¼ƾ֤ºÍOAuthÁîÅÆ¡£2025Äê12Ô£¬FrostArmada¹¥»÷´ïµ½¶¥·å£¬Ï°È¾ÁËÈ«Çò120¸ö¹ú¶ÈºÍµØÓòµÄÔ¼18,000̨É豸£¬ÖØÒªÖ¸±êÔ̺¬µ±¾Ö»ú¹¹¡¢·¨Âɲ¿ÃÅ¡¢ITºÍÍйܷþÎñÌṩÉ̵ȡ£Î¢ÈíÊÇÕâ´Î¹¥»÷µÄÖØÒªÖ¸±ê£¬Î¢ÈíÓëLumen¹«Ë¾µÄBlack Lotus LabsºÏ×÷»æÔìÁ˶ñÒâ»î¶¯Í¼Æ×²¢¼ø±ðÊܺ¦Õß¡£ÔÚÁª¹úµ÷²é¾Ö£¨FBI£©¡¢ÃÀ¹ú˾·¨²¿ºÍ²¨À¼µ±¾ÖµÄÖ§³ÖÏ£¬·¸×ï»ù´¡ÉèÊ©Òѱ»·ÛËé¡£
https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/


¾©¹«Íø°²±¸11010802024551ºÅ