SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´

Ðû²¼Ê±¼ä 2026-02-10

1. SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´


2ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬Huntress SecurityÑо¿Ö°Ô±Åû¶ºÚ¿ÍÕýʹÓÃSolarWinds Web Help Desk£¨WHD£©Îó²î°²ÅÅÕýµ±¹¤¾ßʵÑé¶ñÒâ¹¥»÷¡£¡£¡£¹¥»÷ÕßÕë¶ÔÖÁÉÙÈý¸ö×éÖ¯£¬£¬ £¬£¬£¬£¬Í¨¹ýCVE-2025-40551ºÍCVE-2025-26399Á½¸ö¸ßΣÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬Ëæºó´ÓCatboxƽ̨ÏÂÔØMSIÎļþ×°ÖÃZoho ManageEngine AssistÊðÀí£¬£¬ £¬£¬£¬£¬ÉèÖÃÎÞÈËÖµÊØ»á¼û²¢½«ÊÜѬȾÖ÷»ú×¢²áÖÁÄäÃûProton Mail¹ØÁªµÄZohoÕË»§¡£¡£¡£¸Ã¹¤¾ß±»ÓÃÓÚÖ±½Ó¼üÅ̲Ù×÷¡¢ADÕì̽¼°°²ÅÅVelociraptor£¬£¬ £¬£¬£¬£¬ºóÕß´ÓSupabase´æ´¢Í°»ñÈ¡£¡£¡£¬£¬ £¬£¬£¬£¬×÷ΪC2¿ò¼Üͨ¹ýCloudflare WorkersÓë¹¥»÷ÕßͨѶ¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬ £¬£¬£¬£¬ÍþвÐÐΪÕß½ÓÄɶàÊÖ¶Îά³Ö³¤ÆÚ»¯£º°²ÅŹýʱVelociraptor 0.73.4°æ¡¢×°ÖÃCloudflared½¨ÉèC2ÈßÓàËíµÀ¡¢Í¨¹ýÍýÏëʹÃüTPMProfilerÁ¬ÏµQEMU¿ªÆôSSHºóÃÅ£¬£¬ £¬£¬£¬£¬²¢ÐÞ¸Ä×¢²á±í½ûÓÃWindows Defender¼°·À»ðǽÒÔ¹æ±Ü¼ì²â¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷Õß¶ÌÔݽûÓÃDefenderºóÏÂÔØVS Codeи±±¾£¬£¬ £¬£¬£¬£¬È·±£ºóÐøÔØºÉ˳ËìÖ´ÐС£¡£¡£


https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/


2. SmarterToolsÔâWarlockÀÕË÷Èí¼þ¹¥»÷


2ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬£¬SmarterTools¹«Ë¾ÔâÓöWarlockÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬ÒòÓÉϵԱ¹¤°²ÅŵÄδ¸üÐÂSmarterMailÐéÄâ»ú£¨VM£©±£´æCVE-2026-23760Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÃÜÂë²¢»ñÈ¡ÍêȫȨÏÞ£¬£¬ £¬£¬£¬£¬½ø¶øÍ¨¹ýActive DirectoryºáÏòÉøÍ¸ÖÁ12̨WindowsЧÀÍÆ÷¼°¸¨ÖúÊý¾ÝÖÐÐÄ¡£¡£¡£Ö»¹Ü¹«Ë¾LinuxЧÀÍÆ÷δÊܲ¨¼°£¬£¬ £¬£¬£¬£¬ÇÒSentinel OneÇå¾²²úÆ·ÀÖ³É×èµ²×îÖÕ¼ÓÃÜÔØºÉ£¬£¬ £¬£¬£¬£¬ÊÜÓ°ÏìϵͳÒѸôÀë²¢´Ó±¸·Ý»Ö¸´£¬£¬ £¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÑÏÖØÇ徲Σº¦¡£¡£¡£¾ÝÊ×ϯÉÌÎñ¹ÙµÂÀï¿Ë¡¤¿ÂµÙ˹͸¶£¬£¬ £¬£¬£¬£¬¹«Ë¾ÍøÂçÖÐÔ¼30̨SmarterMailЧÀÍÆ÷/ÐéÄâ»úÖб£´æµ¥µãÎó²î£¬£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓôËȱ¿Ú°²ÅÅVelociraptor¡¢SimpleHelp¼°±£´æÎó²îµÄWinRAR°æ±¾£¬£¬ £¬£¬£¬£¬Á¬ÏµÆô¶¯ÏîÓëÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¡£¡£¡£Cisco Talos´ËǰÒѱ¨¸æVelociraptor±»ÀÄÓÃÓÚÀÕË÷Èí¼þ¹¥»÷µÄ°¸Àý£¬£¬ £¬£¬£¬£¬¶ø´Ë´Î¹¥»÷ÖУ¬£¬ £¬£¬£¬£¬WarlockÍÅ»ï¸üͨ¹ýSmarterMailÄÚÖõġ°¾í¹ÒÔØ¡±¹¦Ð§Ç¿»¯ÏµÍ³¿ØÖÆÈ¨¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/


3. BeyondTrustÐÞ¸´¸ßΣCVE-2026-1731Îó²î


2ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬BeyondTrustÐû²¼½ôÆÈÇå¾²¸üУ¬£¬ £¬£¬£¬£¬ÐÞ¸´Ó°ÏìÔ¶³ÌÖ§³Ö£¨RS£©¼°ÌØÈ¨Ô¶³Ì»á¼û£¨PRA£©²úÆ·µÄ¸ßΣÎó²îCVE-2026-1731¡£¡£¡£¸ÃÎó²î±»¹éÀàΪ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬ £¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9£¬£¬ £¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ý·¢ËÍÈ«ÐĽṹµÄÇëÇ󣬣¬ £¬£¬£¬£¬ÔÚÍøÕ¾Óû§ÉÏÏÂÎÄÖÐÖ´ÐвÙ×÷ϵͳÏÂÁ£¬ £¬£¬£¬£¬½ø¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС¢Î´ÊÚȨ»á¼û¡¢Êý¾Ýй¶¼°Ð§ÀÍÖÐÖ¹¡£¡£¡£BeyondTrustÇ¿µ÷£¬£¬ £¬£¬£¬£¬×ÔÍйܿͻ§ÈôδÆôÓÃ×Ô¶¯¸üУ¬£¬ £¬£¬£¬£¬ÐèÊÖ¶¯Ó¦Óò¹¶¡£¡£¡£»£»£»ÔËÐеÍÓÚ21.3°æ±¾µÄRS»òµÍÓÚ22.1°æ±¾µÄPRAÓû§ÐèÏÈÉý¼¶ÖÁ¼æÈݰ汾ÔÙ´ò²¹¶¡¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Harsh JaiswalÓÚ2026Äê1ÔÂ31ÈÕͨ¹ýAIÇý¶¯µÄ±äÖÖÆÊÎö·¢Ã÷¡£¡£¡£¾ÝÆäÅû¶£¬£¬ £¬£¬£¬£¬È«ÇòÔ¼11,000¸öBeyondTrustʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬ £¬£¬£¬£¬ÆäÖÐ8,500¸öΪÍâµØ°²ÅÅ£¬£¬ £¬£¬£¬£¬Èôδʵʱ´ò²¹¶¡£¡£¡£¬£¬ £¬£¬£¬£¬ÈÔ±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬Îó²îϸ½ÚÉÐδÍêÈ«¹ûÕæ£¬£¬ £¬£¬£¬£¬ÒÔÁô³öÓû§Éý¼¶Ê±¼ä¡£¡£¡£


https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html


4. PhorpiexÈö²¥Global GroupÀÕË÷Èí¼þ´¹ÂÚÐÂÊÖ·¨


2ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬Forcepoint X-LabsÑо¿Ö°Ô±·¢Ã÷Ò»ÆðʹÓÃPhorpiex¶ñÒâÈí¼þÈö²¥Global GroupÀÕË÷Èí¼þµÄ´ó¹æÄ£ÍøÂç´¹Âڻ¡£¡£¡£¸Ã¹¥»÷ͨ¹ýαװ³É¡°Document.doc¡±µÄWindows¿ì½Ý·½·¨Îļþ£¨.lnk£©ÊµÑ飬£¬ £¬£¬£¬£¬Ê¹ÓÃË«À©Õ¹ÃûÓÕÆ­Óû§µã»÷£¬£¬ £¬£¬£¬£¬ÏÖʵÎļþΪ.lnkÃûÌ㬣¬ £¬£¬£¬£¬µ«WindowsĬÈÏÒþ²Ø×îºóÀ©Õ¹Ãû£¬£¬ £¬£¬£¬£¬µ¼ÖÂÓû§ÎóÒÔΪÊÇͨË×WordÎĵµ¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬Ö÷Ìâ¶àΪ¡°ÄúµÄÎĵµ¡±ÒÔÒý·¢Óû§ºÃÆæ»òµ£ÐÄ¡£¡£¡£µã»÷.lnkÎļþºó£¬£¬ £¬£¬£¬£¬¹¥»÷Õß½ÓÄÉ¡°½èÁ¦´òÁ¦¡±£¨Living off the Land£¬£¬ £¬£¬£¬£¬LotL£©ÊÖÒÕ£¬£¬ £¬£¬£¬£¬Ð®ÖÆÏµÍ³×Ô´ø¹¤¾ßÈçPowerShellºÍÏÂÁîÌáÐÑ·ûÖ´ÐжñÒâÏÂÁ£¬ £¬£¬£¬£¬ÏÂÔØ²¢ÔËÐÐαװ³Éϵͳ×é¼þ£¨Èçwindrv.exe£©µÄ²¡¶¾¡£¡£¡£Global GroupÀÕË÷Èí¼þ×÷ΪMamonaµÄÉý¼¶°æ£¬£¬ £¬£¬£¬£¬Æä½¹µãÍþвÔÚÓÚ¡°¾²Ä¬¡±Ä£Ê½£ºËùÓвÙ×÷¾ùÔÚÍâµØÍê³É£¬£¬ £¬£¬£¬£¬ÎÞÐèÅþÁ¬ÍⲿЧÀÍÆ÷»ñÈ¡¼ÓÃÜÃÜÔ¿£¬£¬ £¬£¬£¬£¬Ö÷»ú×ÔÉíÌìÉúÃÜÔ¿ºóÖ±½Ó¼ÓÃÜÎļþ£¬£¬ £¬£¬£¬£¬Ö§³ÖÀëÏß״̬ÏÂËø¶¨Ãü¾Ý¡£¡£¡£¸ÃÀÕË÷Èí¼þ½ÓÄÉChaCha20-Poly1305¼ÓÃÜËã·¨£¬£¬ £¬£¬£¬£¬ÎÞÊý×ÖÃÜԿʱÎļþÏÕЩÎÞ·¨»Ö¸´¡£¡£¡£


https://hackread.com/hackers-global-group-ransomware-offline-phishing-emails/


5. Å·ÃËίԱ»áÖÐÑëÒÆ¶¯×°±¸ÖÎÀíϵͳÔâÍøÂç¹¥»÷


2ÔÂ9ÈÕ£¬£¬ £¬£¬£¬£¬Å·ÃËίԱ»á¼ì²âµ½ÖÐÑëÒÆ¶¯×°±¸ÖÎÀí£¨MDM£©ÏµÍ³1ÔÂ30ÈÕÔâÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬¿ÉÄÜй¶Ա¹¤ÐÕÃû¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬£¬£¬£¬µ«ÏÖʵÊÖ³Ö×°±¸Î´±»ÈëÇÖ¡£¡£¡£´Ë´Î¹¥»÷Ç¡·êIvanti¹«Ë¾Åû¶ÆäEndpoint Manager Mobile£¨EPMM£©Èí¼þ±£´æCVE-2026-1281¡¢CVE-2026-1340Á½¸ö¸ßΣ´úÂë×¢ÈëÎó²îÔ½ÈÕ£¬£¬ £¬£¬£¬£¬ÕâЩÎó²îÔÊÐíºÚ¿ÍÈÆ¹ýÈÏÖ¤Ô¶³Ì¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£Î¯Ô±»áÔÚ·¢Ã÷¹¥»÷ºó9СʱÄÚÍê³ÉϵͳÇå¾²¼Ó¹ÌÓëÕûÀí£¬£¬ £¬£¬£¬£¬µ«ÊÂÎñÈÔÒý·¢¶ÔIvanti²¹¶¡Õ½ÂÔµÄÖÊÒÉ¡£¡£¡£Ç徲ר¼ÒDavid NeesonÖ¸³ö£¬£¬ £¬£¬£¬£¬IvantiδÌṩÍêÕûÐÞ¸´¼Æ»®£¬£¬ £¬£¬£¬£¬½öÐû²¼ÔÝʱ²¹¶¡£¡£¡£¬£¬ £¬£¬£¬£¬ÇÒ²¹¶¡Òò°æ±¾ÊÊÅäÎÊÌâ±£´æÊ§Ð§Î£º¦£¬£¬ £¬£¬£¬£¬ÕâÖÖ"Ë鯬»¯ÐÞ¸´"¿ÉÄÜ´øÀ´±ÈÖÜÈ«¸üиü´óµÄÇå¾²Òþ»¼¡£¡£¡£¾ÝϤ£¬£¬ £¬£¬£¬£¬IvantiÍýÏëÔÚδÀ´ÊýÔ¿ª·¢ÖÜÈ«ÐÞ¸´£¬£¬ £¬£¬£¬£¬²¢ÍƳöRPM¼ì²â¹¤¾ß¸¨ÖúÎó²îÅŲé¡£¡£¡£Å·ÃËίԱ»áÔÊÐíÖÜÈ«Éó²éÊÂÎñ£¬£¬ £¬£¬£¬£¬Ç¿»¯CERT-EUµÈ»ú¹¹24СʱÍþв¼à¿ØÄÜÁ¦¡£¡£¡£


https://hackread.com/cyber-attack-european-commission-staff-mobile-systems/


6. dYdX¹©Ó¦Á´ÔâÐÂÐÍ¿çÓïÑÔ¶ñÒâ°ü¹¥»÷


2ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶npmºÍPyPI¿ÍÕ»ÖÐdYdXÏà¹ØÕýµ±°üÔ⹩ӦÁ´¹¥»÷£º@dydxprotocol/v4-client-js£¨npm£©3.4.1µÈ°æ±¾¼°dydx-v4-client£¨PyPI£©1.1.5post1°æ±¾±»Ö²Èë¶ñÒâ´úÂë¡£¡£¡£ÕâЩ°üÓÃÓÚdYdX v4ЭÒéµÄ¼ÓÃÜÇ®±ÒÉúÒ⡢Ǯ°ü¹ÜÀíµÈ¸ßÃô¸Ð²Ù×÷£¬£¬ £¬£¬£¬£¬ÀÛ¼ÆÉúÒâÁ¿³¬1.5ÍòÒÚÃÀÔª¡£¡£¡£¹¥»÷Õßͨ¹ýµÁÓÿª·¢ÕßÕË»§ÍÆËͶñÒâ¸üУ¬£¬ £¬£¬£¬£¬npm°üÀ¨Ç®°üÇÔÈ¡Æ÷£¬£¬ £¬£¬£¬£¬¿ÉÇÔÈ¡Öú¼Ç´Ê¼°×°±¸ÐÅÏ¢£»£»£»PyPI°üÌØÊâÖ²ÈëÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬ £¬£¬£¬£¬ÅþÁ¬ÍⲿЧÀÍÆ÷»ñȡָÁ£¬ £¬£¬£¬£¬WindowsϵͳÏÂͨ¹ý¡°CREATE_NO_WINDOW¡±±ê¼ÇÒþÄäÖ´ÐС£¡£¡£¶ñÒâ´úÂë±»Ö²Èë½¹µãÎļþ£¬£¬ £¬£¬£¬£¬ÔÚ°üÕý³£Ê¹ÓÃʱ´¥·¢£¬£¬ £¬£¬£¬£¬PyPI°æ±¾½ÓÄÉ100ÂÖ»ìÏý´¦Öóͷ££¬£¬ £¬£¬£¬£¬¿çÉú̬ϵͳ¹¥»÷ЭͬÐÔÅú×¢¹¥»÷ÕßÖ±½Ó»ñÈ¡Ðû²¼»ù´¡ÉèÊ©»á¼ûȨ¡£¡£¡£dYdXÔÚXƽ̨ȷÈÏÊÂÎñ£¬£¬ £¬£¬£¬£¬½¨ÒéÓû§¸ôÀë×°±¸¡¢×ªÒÆ×ʲúÖÁÐÂÇ®°ü¡¢Ìæ»»APIÃÜÔ¿¼°Æ¾Ö¤¡£¡£¡£


https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html