StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾

Ðû²¼Ê±¼ä 2026-03-12

1. StrykerÔâÒÁÀʺڿÍHandala¹¥»÷ÖÂÈ«Çòϵͳ̱»¾


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬²Æ²ú500ǿҽÁƿƼ¼ÆóÒµStrykerÔâÓöÓëÒÁÀÊÇ鱨²¿·ÖÏà¹ØµÄÇ×°ÍÀÕ˹̹ºÚ¿Í×éÖ¯HandalaÌᳫµÄɱ¾øÐÔÍøÂç¹¥»÷¡£ ¡£¡£¸Ã×éÖ¯Ðû³ÆÍ¨¹ý¶ñÒâÈí¼þÇÔÈ¡50TBÒªº¦Êý¾Ý²¢É¨³ýÈ«Çò20ÓàÍǫ̀ϵͳ¡¢Ð§ÀÍÆ÷¼°Òƶ¯×°±¸Êý¾Ý£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂStrykerÔÚ79¸ö¹ú¼ÒµÄ·ÖÖ§»ú¹¹±»ÆÈ¹Ø±Õ£¬£¬£¬£¬£¬£¬£¬Òý·¢¹«Ë¾½¨ÉèÒÔÀ´×îÑÏÖØÎ £»£»£»£»£»£» £»ú¡£ ¡£¡£´Ë´Î¹¥»÷Ôì³ÉStrykerÈ«Çò΢ÈíÇéÐÎÖÜÈ«ÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬Ô±¹¤Windows×°±¸¼°Òƶ¯ÖÕ¶ËÔÚÈý¸üÔâÔ¶³ÌÊý¾Ý²Á³ý¡£ ¡£¡£¾ÝÔ±¹¤Í¸Â¶£¬£¬£¬£¬£¬£¬£¬²¿·ÖʹÓÃСÎÒ˽¼ÒÊÖ»ú×¢²áÊÂÇéȨÏÞµÄ×°±¸Í¬ÑùɥʧÊý¾Ý£¬£¬£¬£¬£¬£¬£¬¹«Ë¾±»ÆÈÒªÇóÔ±¹¤Ð¶ÔØIntune¡¢TeamsµÈÖÎÀíÓ¦Óü°VPN¿Í»§¶Ë¡£ ¡£¡£¶àµØ°ì¹«ÊÒÒòϵͳ̱»¾»Ö¸´¡°Ö½±Ê¡±²Ù×÷ģʽ£¬£¬£¬£¬£¬£¬£¬ÄÚ²¿Ð§ÀÍ»á¼ûÖÐÖ¹Ó°ÏìÒ»Ñùƽ³£ÔËÓª¡£ ¡£¡£Handala×éÖ¯½¨ÉèÓÚ2023Äê12Ô£¬£¬£¬£¬£¬£¬£¬ÓëÒÁÀÊÇ鱨Çå¾²²¿£¨MOIS£©±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬£¬´ËǰÒÔÕë¶ÔÒÔÉ«ÁÐ×éÖ¯¼°Ê¹ÓÃÆÆËðÐÔ¶ñÒâÈí¼þ²Á³ý×°±¸ÖøÃû¡£ ¡£¡£¸Ã×é֯ͨ¹ý¸Ä¶¯StrykerµÄEntraµÇÂ¼Ò³ÃæÕ¹Ê¾Æä±ê¼Ç£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÊý¾Ýй¶ÃÅ»§Ðû²¼Ãô¸ÐÐÅÏ¢¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/


2. WordPress²å¼þAllyÎó²îÖ³¬25ÍòÍøÕ¾ÃæÁÙΣº¦


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬AllyÊÇElementor¿ª·¢µÄWordPress¿É»á¼ûÐÔ²å¼þ£¬£¬£¬£¬£¬£¬£¬×°ÖÃÁ¿³¬40Íò´Î£¬£¬£¬£¬£¬£¬£¬Òò±£´æ±àºÅΪCVE-2026-2313µÄ¸ßΣSQL×¢ÈëÎó²îÒý·¢Çå¾²¾¯Ê¾¡£ ¡£¡£¸ÃÎó²îÓÉAcquia¹¥»÷ÐÔÇå¾²¹¤³ÌʦDrew Webber£¨mcdruid£©·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÆäÑÏÖØÐÔÆÀ·Ö¼«¸ß£¬£¬£¬£¬£¬£¬£¬Ô´ÓÚ²å¼þ4.0.3¼°¸üÔç°æ±¾ÖÐget_global_remediations()ÒªÁì¶ÔÓû§ÌṩµÄURL²ÎÊý´¦Öóͷ£²»µ±£¬£¬£¬£¬£¬£¬£¬Î´¶ÔSQLÉÏÏÂÎľÙÐгä·ÖÕûÀí£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿Éͨ¹ýURL·¾¶×¢ÈëSQLÅÌÎÊ¡£ ¡£¡£WordFenceÊÖÒÕÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ö»¹Üesc_url_raw()º¯ÊýÓÃÓÚURLÇå¾²´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬µ«ÎÞ·¨×èÖ¹SQLÔª×Ö·û£¨Èçµ¥ÒýºÅ¡¢À¨ºÅ£©µÄ×¢È룬£¬£¬£¬£¬£¬£¬Ê¹Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»¸½¼ÓÌØÊâSQLÅÌÎÊ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓûùÓÚʱ¼äµÄäעÊÖÒÕ´ÓÊý¾Ý¿âÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Îó²îʹÓÃÐèÖª×ã²å¼þÅþÁ¬ElementorÕË»§ÇÒÐÞ¸´Ä£¿£¿£¿£¿£¿£¿£¿é´¦Óڻ״̬µÄÌõ¼þ¡£ ¡£¡£ElementorÓÚ2ÔÂ23ÈÕÐû²¼4.1.0°æ±¾ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬²¢ÏòÑо¿Ö°Ô±½ÒÏþ800ÃÀÔªÎó²îÉͽð¡£ ¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬WordPress.orgÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬½öÔ¼36%µÄAllyÓû§Íê³ÉÉý¼¶£¬£¬£¬£¬£¬£¬£¬ÈÔÓг¬25ÍòÍøÕ¾Ì»Â¶ÔÚCVE-2026-2313Σº¦ÖС£ ¡£¡£


https://www.bleepingcomputer.com/news/security/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites/


3. CISA½ôÆÈÒªÇóÕþ¸®»ú¹¹ÐÞ²¹n8n¸ßΣÎó²î


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ç¿ÖÆÒªÇóÁª°î»ú¹¹ÔÚ3ÔÂ25ÈÕǰÐÞ²¹n8nƽ̨±£´æµÄCVE-2025-68613Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÕý±»Æð¾¢Ê¹Óᣠ¡£¡£n8n×÷Ϊ¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨£¬£¬£¬£¬£¬£¬£¬ÔÚAI¿ª·¢ÖÐÆÕ±éÓÃÓÚÊý¾ÝÉãÈ¡£¬£¬£¬£¬£¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬£¬£¬£¬£¬Docker HubÀ­È¡Á¿³¬1ÒڴΣ¬£¬£¬£¬£¬£¬£¬³£´æ´¢APIÃÜÔ¿¡¢Êý¾Ý¿âƾ֤µÈÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬³ÉΪ¹¥»÷ÕßÖØµãÄ¿µÄ¡£ ¡£¡£CVE-2025-68613Ô´ÓÚn8nÊÂÇéÁ÷±í´ïʽÆÀ¹Àϵͳ¶Ô¶¯Ì¬´úÂë×ÊÔ´¿ØÖƲ»µ±£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÒÑÈÏÖ¤¹¥»÷ÕßÒÔn8nÀú³ÌȨÏÞÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£n8nÍŶÓ12ÔÂÐû²¼µÄv1.122.0°æ±¾ÒÑÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½¨ÒéÖÎÀíÔ±Á¬Ã¦Éý¼¶¡£ ¡£¡£ÔÝʱ»º½â²½·¥°üÀ¨ÏÞÖÆÊÂÇéÁ÷±à¼­È¨ÏÞÖÁÍêÈ«ÐÅÈÎÓû§¡¢½µµÍ²Ù×÷ϵͳȨÏÞ¼°ÍøÂç»á¼ûÏÞÖÆ¡£ ¡£¡£Shadowserver¼à²â·¢Ã÷£¬£¬£¬£¬£¬£¬£¬È«Çò³¬4Íò¸öδ´ò²¹¶¡µÄn8nʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬£¬ÆäÖб±ÃÀÕ¼18,000Óà¸ö£¬£¬£¬£¬£¬£¬£¬Å·ÖÞ³¬14,000¸ö¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/


4. ±´¶û¾È»¤³µ¹«Ë¾23.8ÍòÈËÊý¾Ýй¶


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ¾È»¤³µÐ§ÀÍÌṩÉ̱´¶û¾È»¤³µ¹«Ë¾¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬Æä2025Äê2Ô±¬·¢µÄÍøÂçÈëÇÖÊÂÎñµ¼Ö½ü23.8ÍòÈËСÎÒ˽¼Ò¡¢²ÆÎñ¼°Ò½ÁÆ¿µ½¡ÐÅϢй¶¡£ ¡£¡£Æ¾Ö¤Ìá½»¸øÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒµÄÎļþ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÓÚ2025Äê2ÔÂ7ÈÕÖÁ14ÈÕʱ´úÈëÇָù«Ë¾ÍøÂ磬£¬£¬£¬£¬£¬£¬±´¶û¹«Ë¾ÓÚ2ÔÂ13ÈÕÊ״μì²âµ½Òì³££¬£¬£¬£¬£¬£¬£¬µ«Ö±ÖÁ4ÔÂ14ÈղŶÔÍâÐû²¼ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ô¼Ò»¸öԺ󣬣¬£¬£¬£¬£¬£¬MedusaÀÕË÷Èí¼þÍÅ»ïÉù³Æ´Ó±´¶û¹«Ë¾ÇÔÈ¡219.50GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢¹ûÕæ²¿·Ö±»µÁÄÚÈÝ¡£ ¡£¡£´Ë´Îй¶µÄÐÅÏ¢¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢³öÉúÈÕÆÚ¡¢¼ÝʻִÕÕºÅÂ룬£¬£¬£¬£¬£¬£¬ÒÔ¼°²ÆÎñÕË»§¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÊý¾Ý¡£ ¡£¡£±´¶û¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÊÂÎñÊÓ²ìÒÑÓÚ2026Äê2ÔÂ20ÈÕÍê³É£¬£¬£¬£¬£¬£¬£¬È·ÈÏÊý¾Ýй¶¹æÄ£Ô¶³¬×î³õÅû¶µÄ11.4ÍòÈË£¬£¬£¬£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý´ï237,830ÈË¡£ ¡£¡£ÎªÓ¦¶Ô´Ë´ÎÎ £»£»£»£»£»£» £»ú£¬£¬£¬£¬£¬£¬£¬±´¶û¹«Ë¾½ÓÄÉÁ˶àÏîµ÷½â²½·¥£ºÖÜÈ«ÔöÇ¿ÍøÂçÇå¾²·À»¤¡¢Ç¿ÖÆÖØÖÃËùÓÐÕË»§ÃÜÂ룬£¬£¬£¬£¬£¬£¬²¢ÎªÊÜÓ°Ïì¸öÌåÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý± £»£»£»£»£»£» £»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÌáÐÑÓû§Ð¡ÐÄDZÔÚڲƭ¼°Éí·Ý͵ÇÔΣº¦¡£ ¡£¡£


https://www.securityweek.com/238000-impacted-by-bell-ambulance-data-breach/


5. ¶íAPT28°²ÅŶ¨ÖƶñÒâÈí¼þºã¾Ã¼àÊÓÎÚ¾ü·½


3ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬¾ÝESET×îб¨¸æ£¬£¬£¬£¬£¬£¬£¬Á¥ÊôÓÚ¶íÂÞ˹Áª°î¾üÊÂÇ鱨×ܾ֣¨GRU£©µÚ26165²½¶ÓµÄ¹ú¼Ò¼¶ºÚ¿Í×éÖ¯APT28£¨ÓÖÃû°üÀ¨Fancy Bear¡¢SednitµÈ£©×Ô2024Äê4ÔÂÆð£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÈý¿î¶¨ÖƶñÒâÈí¼þBEARDSHELL¡¢COVENANT¼°SLIMAGENT£¬£¬£¬£¬£¬£¬£¬¶ÔÎÚ¿ËÀ¼¾ü·½Ö°Ô±¿ªÕ¹ºã¾Ã¼àÊӻ¡£ ¡£¡£SLIMAGENT×÷Ϊ½¹µãÌØ¹¤¹¤¾ß£¬£¬£¬£¬£¬£¬£¬¿É¼Í¼¼üÅÌÊäÈë¡¢²¶»ñÆÁÄ»½ØÍ¼²¢ÍøÂç¼ôÌù°åÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÆäÆðÔ´¿É×·ËÝÖÁAPT28ÔÚ2010ÄêÔÂʹÓõÄXAgentÖ²Èë³ÌÐò¡£ ¡£¡£BEARDSHELLºóÃųÌÐòͨ¹ýÕýµ±Ôƴ洢ЧÀÍIcedrive½¨ÉèÏÂÁîÓë¿ØÖÆ£¨C2£©Í¨µÀ£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐPowerShellÏÂÁî¡£ ¡£¡£Æä½ÓÄÉÆæÒìµÄ¡°²»Í¸Ã÷ν´Ê¡±»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÖÒÕͬÑù·ºÆðÔÚAPT28ÓÚ2016Äê¹¥»÷ÃÀ¹úÃñÖ÷µ³ÌìÏÂίԱ»á£¨DNC£©Ê±Ê¹ÓõÄXTunnelËíµÀ¹¤¾ßÖС£ ¡£¡£COVENANT×÷Ϊ¿ªÔ´.NETºóÉøÍ¸¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬¾­Éî¶ÈÐ޸ĺó×Ô2025Äê7ÔÂÆð½ÓÄÉ»ùÓÚÔÆµÄÐÂÍøÂçЭÒ飬£¬£¬£¬£¬£¬£¬ÀÄÓÃFilenÔÆ´æ´¢Ð§À;ÙÐÐC2ͨѶ¡£ ¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬¸Ã¿ò¼Ü±äÌåÔøÊ¹ÓÃpCloud£¨2023Ä꣩¡¢Koofr£¨2024-2025Ä꣩¡£ ¡£¡£


https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html


6. UNC6426ʹÓù©Ó¦Á´¹¥»÷72СʱÍêÈ«ÈëÇÖÔÆÇéÐÎ


3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬nx npm°ü¹©Ó¦Á´2025Äê8ÔÂÔâÆÆËðºó£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßUNC6426ʹÓÃÇÔÈ¡µÄGitHubÁîÅÆ£¬£¬£¬£¬£¬£¬£¬ÔÚ72СʱÄÚÍê³É¶ÔÊܺ¦ÕßÔÆÇéÐεÄÍêÈ«ÈëÇÖ¡£ ¡£¡£´Ë´Î¹©Ó¦Á´¹¥»÷Ô´ÓÚnx npm°üÒ×Êܹ¥»÷µÄpull_request_targetÊÂÇéÁ÷±»Ê¹Ó㬣¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¡°Pwn Request¡±¹¥»÷»ñÈ¡ÌáÉýȨÏÞ²¢»á¼ûGITHUB_TOKEN£¬£¬£¬£¬£¬£¬£¬½«Ä¾Âí»¯°üÍÆË͵½npm×¢²á±í¡£ ¡£¡£Ä¾Âí°ü°üÀ¨QUIETVAULTƾ֤ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬Í¨¹ýLLM¹¤¾ßɨÃèϵͳÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Êý¾Ý±»ÉÏ´«ÖÁ¹«¹²GitHub´æ´¢¿â¡£ ¡£¡£Êܺ¦ÕßÔ±¹¤ÔËÐÐNx Console²å¼þʱ´¥·¢¸üУ¬£¬£¬£¬£¬£¬£¬µ¼ÖÂQUIETVAULTÖ´ÐС£ ¡£¡£UNC6426ʹÓñ»µÁPAT£¬£¬£¬£¬£¬£¬£¬Í¨¹ýNord Stream¹¤¾ß´ÓCI/CDÇéÐÎÌáÈ¡ÉñÃØ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶GitHubЧÀÍÕË»§Æ¾Ö¤ºó£¬£¬£¬£¬£¬£¬£¬Ê¹Óá°--aws-role¡±²ÎÊýÌìÉúÔÝʱAWS STSÁîÅÆ£¬£¬£¬£¬£¬£¬£¬ÔÚAWSÇéÐÎפ×ã¡£ ¡£¡£ÓÉÓÚGitHub Actions CloudFormation½ÇɫȨÏÞ¹ý¸ß£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß°²ÅÅÐÂAWS Stack£¬£¬£¬£¬£¬£¬£¬¸½¼ÓAdministratorAccessÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬72СʱÄÚ½«È¨ÏÞÌáÉýÖÁÍêÕûÖÎÀíԱȨÏÞ¡£ ¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßö¾ÙS3´æ´¢Í°¹¤¾ß¡¢ÖÕÖ¹Éú²úÇéÐÎEC2ºÍRDSʵÀý¡¢½âÃÜÓ¦ÓÃÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬²¢½«ËùÓÐÄÚ²¿GitHub´úÂë¿âÖØÃüÃûΪ¡°/s1ngularity-repository-[Ëæ»ú×Ö·û]¡±²¢¹ûÕæ¡£ ¡£¡£


https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html