ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖFBI¾Ö³¤Ð¡ÎÒ˽¼ÒÓÊÏä

Ðû²¼Ê±¼ä 2026-03-30

1. ÒÁÀʺڿÍ×éÖ¯HandalaÈëÇÖFBI¾Ö³¤Ð¡ÎÒ˽¼ÒÓÊÏä


3ÔÂ29ÈÕ £¬£¬£¬ £¬ÓëÒÁÀÊÏà¹ØµÄHandalaºÚ¿Í×éÖ¯¿ËÈÕÈëÇÖÁËFBI¾Ö³¤Kash PatelµÄСÎÒ˽¼Òµç×ÓÓʼþÕË»§ £¬£¬£¬ £¬²¢Ðû²¼ÁËÕÕÆ¬ºÍÎļþ¡£¡£¡£¡£¡£¡£FBIÒÑÈ·ÈÏ´Ë´ÎÈëÇÖ £¬£¬£¬ £¬ÌåÏÖ±»µÁÊý¾Ý²»ÊǽüÆÚµÄ £¬£¬£¬ £¬²»°üÀ¨ÈκÎÕþ¸®Êý¾Ý¡£¡£¡£¡£¡£¡£ÖÜÎå £¬£¬£¬ £¬HandalaÍþвÐÐΪÕßÔÚÆäÒ»¸öÍøÕ¾ÉÏÐû²¼½«Patel¼ÓÈëÊܺ¦ÕßÃûµ¥ £¬£¬£¬ £¬Éù³ÆËûÃÇÔÚ¼¸Ð¡Ê±ÄÚ¹¥ÏÝÁË"Ëùν'¼áÈçÅÌʯ'µÄFBIϵͳ"¡£¡£¡£¡£¡£¡£ºÚ¿ÍÌåÏÖ £¬£¬£¬ £¬ËûÃǵÄÐж¯ÊǶÔFBI¿ÛѺHandalaÓòÃûÒÔ¼°ÃÀ¹úÕþ¸®Îª¸ÃÍþв×éÖ¯³ÉÔ±ÐÅÏ¢Ìṩ¸ß´ï1000ÍòÃÀÔªÐüÉ͵ĻØÓ¦¡£¡£¡£¡£¡£¡£ºÚ¿ÍÈëÇÖÁËFBI¾Ö³¤µÄСÎÒ˽¼ÒGmailÊÕ¼þÏä¡£¡£¡£¡£¡£¡£HandalaºÚ¿ÍÔÚÐû²¼ÈëÇÖÖ¤¾ÝǰÌåÏÖ£º"Kash PatelµÄËùÓÐСÎÒ˽¼ÒºÍÉñÃØÐÅÏ¢ £¬£¬£¬ £¬°üÀ¨µç×ÓÓʼþ¡¢¶Ô»°¡¢ÎļþÉõÖÁÉñÃØÎļþ £¬£¬£¬ £¬ÏÖÔÚ¶¼¿É¹ûÕæÏÂÔØ¡£¡£¡£¡£¡£¡£"ͨ¸æÐû²¼ºó²»¾Ã £¬£¬£¬ £¬ÍþвÐÐΪÕßÐû²¼ÁËÒ»×é´ÓPatelÊÕ¼þÏäÖÐÌáÈ¡µÄ´øË®Ó¡Ð¡ÎÒ˽¼ÒÕÕÆ¬ºÍÎļþ £¬£¬£¬ £¬ÒÔ¼°³ÉΪFBI¾Ö³¤Ö®Ç°µÄµç×ÓÓʼþͨѶ¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£º"FBIÒâʶµ½¶ñÒâÐÐΪÕßÕë¶ÔPatel¾Ö³¤µÄСÎÒ˽¼Òµç×ÓÓʼþÐÅÏ¢ £¬£¬£¬ £¬ÎÒÃÇÒѽÓÄÉËùÓÐÐëÒª²½·¥¼õÇáÓë´Ë»î¶¯Ïà¹ØµÄDZÔÚΣº¦¡£¡£¡£¡£¡£¡£Ïà¹ØÐÅÏ¢ÊÇÀúÊ·Ð﵀ £¬£¬£¬ £¬²»Éæ¼°ÈκÎÕþ¸®ÐÅÏ¢¡£¡£¡£¡£¡£¡£"


https://www.bleepingcomputer.com/news/security/fbi-confirms-hack-of-director-patels-personal-email-inbox/


2. Smart Slider 3²å¼þÎó²îÓ°Ïì80ÍòWordPressÍøÕ¾


3ÔÂ29ÈÕ £¬£¬£¬ £¬WordPress²å¼þSmartSlider3¿ËÈÕ±»Åû¶±£´æÒ»¸öÇå¾²Îó²î £¬£¬£¬ £¬¿É±»¶©ÔÄÕß¼¶±ðÓû§Ê¹Óûá¼ûЧÀÍÆ÷ÉÏí§ÒâÎļþ¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2026-3098 £¬£¬£¬ £¬ÓÉÑо¿Ö°Ô±DmitriiIgnatyev·¢Ã÷²¢±¨¸æ £¬£¬£¬ £¬Ó°ÏìSmartSlider3²å¼þ3.5.1.33¼°ÒÔÏÂËùÓа汾¡£¡£¡£¡£¡£¡£SmartSlider3ÊÇ×îÊ¢ÐеÄWordPress²å¼þÖ®Ò» £¬£¬£¬ £¬ÓÃÓÚ½¨ÉèºÍÖÎÀíͼÏñ»¬¿éºÍÄÚÈÝÂÖ²¥ £¬£¬£¬ £¬ÓµÓÐÁè¼Ý80Íò¸ö»îÔ¾ÍøÕ¾×°Öᣡ£¡£¡£¡£¡£¸Ã²å¼þÌṩÒ×ÓÚʹÓõÄÍϷű༭Æ÷ºÍ¸»ºñµÄÄ£°åÑ¡Ôñ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ²å¼þAJAXµ¼³ö²Ù×÷ÖÐȱʧµÄ¹¦Ð§¼ì²é £¬£¬£¬ £¬ÔÊÐíÈκξ­ÓÉÉí·ÝÑéÖ¤µÄÓû§£¨°üÀ¨¶©ÔÄÕߣ©Å²ÓÃËüÃÇ¡£¡£¡£¡£¡£¡£Æ¾Ö¤WordPressÇå¾²¹«Ë¾DefiantµÄÑо¿Ö°Ô±³Æ £¬£¬£¬ £¬actionExportAllº¯Êýȱ·¦ÎļþÀàÐͺÍÔ´ÑéÖ¤ £¬£¬£¬ £¬Òò´ËÔÊÐí¶ÁÈ¡í§ÒâЧÀÍÆ÷Îļþ²¢Ìí¼Óµ½µ¼³ö´æµµÖС£¡£¡£¡£¡£¡£IgnatyevÓÚ2ÔÂ23ÈÕÏòWordfence±¨¸æÁËËûµÄ·¢Ã÷ £¬£¬£¬ £¬Ñо¿Ö°Ô±ÑéÖ¤ÁËÌṩµÄ¿´·¨Ñé֤ʹÓóÌÐò £¬£¬£¬ £¬²¢Í¨ÖªÁËSmartSlider3µÄ¿ª·¢ÉÌNextendweb¡£¡£¡£¡£¡£¡£NextendwebÓÚ3ÔÂ2ÈÕÈ·ÈÏÁ˸ñ¨¸æ £¬£¬£¬ £¬²¢ÓÚ3ÔÂ24ÈÕÐû²¼SmartSlider3.5.1.34°æ±¾¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/


3. Å·ÃËίԱ»áÔâShinyHunters¹¥»÷350GBÊý¾Ý±»µÁ


3ÔÂ28ÈÕ £¬£¬£¬ £¬Å·ÃËίԱ»á¿ËÈÕÔâShinyHuntersÍøÂç·¸·¨×éÖ¯¹¥»÷ £¬£¬£¬ £¬¾Ý±¨µÀÊý¾Ýй¶°üÀ¨ÓʼþЧÀÍÆ÷ÄÚÈݺÍÄÚ²¿Í¨Ñ¶ÏµÍ³Êý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÍøÂç·¸·¨×éÖ¯½«Å·ÃËίԱ»áÌí¼Óµ½ÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾ £¬£¬£¬ £¬Éù³ÆÇÔÈ¡ÁËÁè¼Ý350GBÊý¾Ý¡£¡£¡£¡£¡£¡£±»µÁÊý¾Ý¿ÉÄܰüÀ¨ÓʼþЧÀÍÆ÷Êý¾Ýת´¢¡¢Êý¾Ý¿â¡¢ÉñÃØÎļþ¡¢ÌõÔ¼ºÍ¸ü¶àÃô¸ÐÖÊÁÏ¡£¡£¡£¡£¡£¡£3ÔÂ24ÈÕ £¬£¬£¬ £¬Å·ÃËίԱ»á¼ì²âµ½Ò»ÆðÓ°ÏìÆäEuropa.euÍøÕ¾ÍйÜÔÆ»ù´¡ÉèÊ©µÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÊÂÎñѸËÙ»ñµÃ¿ØÖÆ £¬£¬£¬ £¬ÒѽÓÄÉ»º½â²½·¥ £¬£¬£¬ £¬ÍøÕ¾¿ÉÓÃÐÔδÊÜÖÐÖ¹¡£¡£¡£¡£¡£¡£ÔçÆÚÊÓ²ìЧ¹ûÅú×¢²¿·ÖÊý¾Ý¿ÉÄܱ»»á¼û £¬£¬£¬ £¬ÕýÔÚ֪ͨ¿ÉÄÜÊÜÓ°ÏìµÄÅ·ÃËʵÌå¡£¡£¡£¡£¡£¡£Å·ÃËίԱ»áÔÚÐÂΟåÖÐÌåÏÖ£º"ÎÒÃÇÒ»Á¬ÊÓ²ìµÄÔçÆÚЧ¹ûÅú×¢Êý¾ÝÒÑ´ÓÕâÐ©ÍøÕ¾±»»ñÈ¡¡£¡£¡£¡£¡£¡£Î¯Ô±»áÕýÔÚÕýʽ֪ͨ¿ÉÄÜÊÜÊÂÎñÓ°ÏìµÄͬÃËʵÌå¡£¡£¡£¡£¡£¡£"ίԱ»áЧÀͲ¿·ÖÈÔÔÚÊÓ²ìÊÂÎñµÄËùÓÐÓ°Ïì¡£¡£¡£¡£¡£¡£Î¯Ô±»áÌåÏÖÆäÄÚ²¿ÏµÍ³Î´ÊÜÓ°Ïì £¬£¬£¬ £¬½«¼ÌÐø¼à¿ØÊ±ÊÆÍ¬Ê±ÔöÇ¿±£»£»£»£»¤²½·¥¡£¡£¡£¡£¡£¡£Î¯Ô±»á½«ÆÊÎöÊÂÎñÒÔ¸ÄÉÆÍøÂçÇå¾² £¬£¬£¬ £¬ÓÉÓÚÅ·ÃËÃæÁÙÕë¶ÔÒªº¦Ð§Àͺͻú¹¹µÄÒ»Á¬ÍøÂçºÍ»ìÏýÍþв¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/190095/data-breach/shinyhunters-claims-the-hack-of-the-european-commission.html


4. TeamPCPÈëÇÖTelnyx Python°üÇÔȡƾ֤


3ÔÂ27ÈÕ £¬£¬£¬ £¬TeamPCPºÚ¿Í×éÖ¯¿ËÈÕÈëÇÖÁËPython°üË÷Òý£¨PyPI£©ÉϵÄTelnyxÈí¼þ°ü £¬£¬£¬ £¬ÉÏ´«Á˶ñÒâ°æ±¾ £¬£¬£¬ £¬ÕâЩ°æ±¾»á½«ÇÔȡƾ֤µÄ¶ñÒâÈí¼þÒþ²ØÔÚWAVÎļþÖС£¡£¡£¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾Aikido¡¢SocketºÍEndorLabsÊӲ쵽Á˴˴ι©Ó¦Á´¹¥»÷ £¬£¬£¬ £¬²¢Æ¾Ö¤Óë֮ǰͳһ¹¥»÷ÕßÔì³ÉµÄÊÂÎñÖÐÏàͬµÄÊý¾Ýй¶ģʽºÍRSAÃÜÔ¿ £¬£¬£¬ £¬½«´Ë´Î¹¥»÷¹é×ïÓÚTeamPCP¡£¡£¡£¡£¡£¡£½ñÌìÔçЩʱ¼ä £¬£¬£¬ £¬¸ÃÍþвÐÐΪÕßÐû²¼ÁË´øÓкóÃŵÄTelnyxÈí¼þ°ü4.87.1ºÍ4.87.2°æ±¾¡£¡£¡£¡£¡£¡£ÔÚLinuxºÍmacOSϵͳÉÏ £¬£¬£¬ £¬¶ñÒâ°æ±¾»áÊͷŶñÒâÈí¼þ £¬£¬£¬ £¬ÇÔÈ¡SSHÃÜÔ¿¡¢Æ¾Ö¤¡¢ÔÆÁîÅÆ¡¢¼ÓÃÜÇ®±ÒÇ®°ü¡¢ÇéÐαäÁ¿ºÍÆäËûÀàÐ͵ÄÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£¡£ÔÚWindowsϵͳÖÐ £¬£¬£¬ £¬¶ñÒâÈí¼þ»á±»°²ÅÅÔÚÆô¶¯Îļþ¼ÐÖÐÒÔʵÏÖ³¤ÆÚÐÔ £¬£¬£¬ £¬Ã¿´ÎµÇ¼ʱ¶¼»áÔËÐС£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±ÒÔΪ £¬£¬£¬ £¬ºÚ¿ÍʹÓÃÇÔÈ¡µÄPyPI×¢²á±íÐû²¼ÕË»§Æ¾Ö¤ÈëÇÖÁ˸ÃÏîÄ¿¡£¡£¡£¡£¡£¡£×î³õ £¬£¬£¬ £¬TeamPCPÓÚUTCʱ¼ä03:51Ðû²¼ÁËTelnyx4.87.1°æ±¾ £¬£¬£¬ £¬µ«¸ÃÈí¼þ°ü°üÀ¨¶ñÒ⵫ÎÞ·¨Õý³£ÔËÐеÄÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£¡£Ô¼ÄªÒ»Ð¡Ê±ºó £¬£¬£¬ £¬¹¥»÷ÕßÓÚUTCʱ¼ä04:07Ðû²¼ÁËTelnyx4.87.2°æ±¾ £¬£¬£¬ £¬ÐÞÕýÁ˸ùýʧ¡£¡£¡£¡£¡£¡£Ç¿ÁÒ½¨Ò鿪·¢Ö°Ô±ÈôÊÇ·¢Ã÷ÆäÇéÐÎÖб£´æTelnyx4.87.1»ò4.87.2°æ±¾ £¬£¬£¬ £¬ÔòÓ¦»Ø¹öµ½4.87.0°æ±¾¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/


5. GitHub¿ª·¢ÕßÔâ´ó¹æÄ£¶ñÒâ´¹ÂÚ¹¥»÷


3ÔÂ27ÈÕ £¬£¬£¬ £¬½üÆÚ £¬£¬£¬ £¬Ò»³¡Õë¶ÔGitHub¿ª·¢ÕߵĴó¹æÄ£¶ñÒâ¹¥»÷»î¶¯ÕýÔÚÉìÕÅ¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÔÚGitHubÏîÄ¿ÌÖÂÛÇøÐû²¼Î±×°³ÉVisual Studio Code£¨VS Code£©Çå¾²¾¯±¨µÄÐéαÌû×Ó £¬£¬£¬ £¬ÓÕµ¼¿ª·¢ÕßÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÕâЩÌû×ÓʹÓá°ÑÏÖØÎó²î-ÐèÒªÁ¬Ã¦¸üС±µÈ±ÆÕæÎÊÌâ £¬£¬£¬ £¬Ðé¹¹CVE ID²¢ÅäÒÔ½ôÆÈÓïÑÔ £¬£¬£¬ £¬ÉõÖÁð³äÕæÊµ´úÂëά»¤Õß»òÑо¿Ö°Ô±ÒÔÔöÇ¿¿ÉÐŶȡ£¡£¡£¡£¡£¡£¸Ã¹¥»÷·ºÆðÏÔ×ŵÄ×éÖ¯»¯ÌØÕ÷¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ó¦ÓÃÇå¾²¹«Ë¾SocketµÄ±¨¸æ £¬£¬£¬ £¬Êýǧ¸öÏÕЩÏàͬµÄÌû×ÓÔÚ¶Ìʱ¼äÄÚ×Ô¶¯Ðû²¼µ½GitHubµÄÊýǧ¸ö´æ´¢¿âÖÐ £¬£¬£¬ £¬É漰н¨»ò²»»îÔ¾ÕË»§¡£¡£¡£¡£¡£¡£ÕâЩÌû×ӻᴥ·¢GitHubµÄµç×ÓÓʼþ֪ͨϵͳ £¬£¬£¬ £¬Ö±½Ó·¢ËÍÖÁ±»±ê¼ÇÓû§ºÍ¹Ø×¢ÕßµÄÊÕ¼þÏä £¬£¬£¬ £¬À©´óÈö²¥¹æÄ£¡£¡£¡£¡£¡£¡£Ìû×ÓÖеÄÁ´½ÓÖ¸ÏòGoogle DriveµÈÍⲿЧÀÍ £¬£¬£¬ £¬Éù³ÆÌṩÒÑÐÞ¸´µÄVS CodeÀ©Õ¹°æ±¾¡£¡£¡£¡£¡£¡£Ö»¹ÜGoogle Drive²¢·Ç¹Ù·½·Ö·¢ÇþµÀ £¬£¬£¬ £¬µ«Óû§¿ÉÄÜÒòÐÅÈθÃЧÀͶøºöÂÔΣº¦¡£¡£¡£¡£¡£¡£µã»÷Á´½Óºó £¬£¬£¬ £¬Êܺ¦Õß»á±»ÖØ¶¨ÏòÖÁ¶ñÒâÓòÃû £¬£¬£¬ £¬¸ÃÍøÕ¾ÔËÐÐJavaScript¾ç±¾ÍøÂçÓû§Ê±Çø¡¢²Ù×÷ϵͳ¡¢ä¯ÀÀÆ÷Ö¸ÎÆµÈÏêϸÐÅÏ¢ £¬£¬£¬ £¬²¢Í¨¹ýPOSTÇëÇó·¢ËÍÖÁÏÂÁî¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£¡£¸Ã°ì·¨×÷ΪÁ÷Á¿¹ýÂ˲㠣¬£¬£¬ £¬ÓÃÓÚÇø·ÖÕæÊÊÓû§ÓëÑо¿Ö°Ô± £¬£¬£¬ £¬½öÏòÑéÖ¤ºóµÄÊܺ¦ÕßͶ·ÅµÚ¶þ½×¶Î¶ñÒâÔØºÉ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-vs-code-alerts-on-github-spread-malware-to-developers/


6. CISA½«F5 BIG-IP¸ßΣRCEÎó²îÄÉÈëÒÑ֪ʹÓÃĿ¼


3ÔÂ28ÈÕ £¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«F5 BIG-IPÓ¦ÓÃÇå¾²ÖÎÀíÆ½Ì¨£¨APM£©ÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2025-53521£©ÕýʽÁÐÈëÆä¡°ÒÑ֪ʹÓÃÎó²î£¨KEV£©¡±Ä¿Â¼¡£¡£¡£¡£¡£¡£¸ÃÎó²îCVSS 3.1ÆÀ·Ö¸ß´ï9.8 £¬£¬£¬ £¬ÊôÓÚÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î £¬£¬£¬ £¬Ó°Ïì¹æÄ£º­¸ÇÆôÓûá¼ûÕ½ÂÔµÄBIG-IP APMÐéÄâЧÀÍÆ÷ÉèÖó¡¾°¡£¡£¡£¡£¡£¡£Æ¾Ö¤F5Ç徲ͨ¸æ £¬£¬£¬ £¬µ±¶ñÒâÁ÷Á¿´¥·¢ÐéÄâЧÀÍÆ÷ÉÏÉèÖõÄBIG-IP APM»á¼ûÕ½ÂÔʱ £¬£¬£¬ £¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆ²¢Ö´ÐÐí§Òâ´úÂë £¬£¬£¬ £¬µ¼ÖÂϵͳ±»ÍêÈ«¿ØÖÆ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬ £¬¸ÃÎó²î×î³õ±»¹éÀàΪ¾Ü¾øÐ§ÀÍ£¨DoS£©Îó²î £¬£¬£¬ £¬µ«2026Äê3ÔµÄз¢Ã÷֤ʵ×Åʵ¼ÊΣº¦ÎªÔ¶³Ì´úÂëÖ´ÐÐ £¬£¬£¬ £¬Òò´ËCVSSÆÀ·Ö±»ÏÔÖøÌáÉý £¬£¬£¬ £¬ÑÏÖØÐÔÆ·¼¶´ó·ùÉϵ÷¡£¡£¡£¡£¡£¡£Ö»¹ÜÔ­ÓÐÐÞ¸´¼Æ»®ÈÔÓÐÓà £¬£¬£¬ £¬µ«F5ÒÑÈ·ÈϸÃÎó²îÔÚ²¿·Ö±£´æÎó²îµÄBIG-IP°æ±¾ÖÐÒѱ»ÏÖʵʹÓᣡ£¡£¡£¡£¡£Æ¾Ö¤CISAÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01 £¬£¬£¬ £¬Áª°î»ú¹¹±ØÐèÔÚ2026Äê3ÔÂ30ÈÕǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇé £¬£¬£¬ £¬ÒÔ½µµÍÒÑÖªÎó²î±»Ê¹ÓõÄÖØ´óΣº¦¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/190076/uncategorized/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog.html