ÀͰ£µÂÒøÐÐϵͳ¸üÐÂȱÏÝÖÂ44.8Íò¿Í»§Êý¾Ýй¶
Ðû²¼Ê±¼ä 2026-04-011. ÀͰ£µÂÒøÐÐϵͳ¸üÐÂȱÏÝÖÂ44.8Íò¿Í»§Êý¾Ýй¶
3ÔÂ30ÈÕ£¬£¬£¬ÀͰ£µÂÒøÐм¯ÍÅÔÚ3ÔÂ12ÈÕÒ¹¼äϵͳ¸üÐÂÀú³ÌÖÐÒòÒýÈëÈí¼þȱÏÝ£¬£¬£¬µ¼Ö¶à´ï447,936Ãû¿Í»§µÄСÎÒ˽¼ÒÊý¾Ýй¶£¬£¬£¬Éæ¼°ÀͰ£µÂÒøÐС¢¹þÀû·¨¿ËË¹ÒøÐкÍËÕ¸ñÀ¼ÒøÐÐʹÓÃÊÖ»úÒøÐÐÓ¦ÓóÌÐòµÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬²¿·ÖÓû§¿É¶ÌÔÝÉó²éÆäËû¿Í»§µÄÉúÒâ¼Í¼£¬£¬£¬°üÀ¨ÕË»§ÏêÇé¡¢¸¶¿î²Î¿¼ÐÅÏ¢¼°¹úÃñ°ü¹ÜºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬Ô¼114,182Ãû¿Í»§µã»÷ÁËÏÔʾËûÈËÐÅÏ¢µÄÉúÒ⣬£¬£¬¶øÊý¾Ýй¶ÐèÖª×ãÓû§Í¬Ê±·¿ªÓ¦ÓóÌÐòµÄÌØ¶¨Ìõ¼þ¡£¡£¡£¡£¡£¡£¡£ÀͰ£µÂÒøÐн«Ê¹ÊÔµ¹ÊÔÓɹé×ïÓÚÀýÐÐITϵͳ¸üÐÂÖеÄÈí¼þȱÏÝ£¬£¬£¬²¢ÒÑÓÚ3ÔÂ12ÈÕÉÏÎçÏòÓ¢¹ú½ðÈÚÐÐΪî¿Ïµ¾Ö£¨FCA£©±¨¸æ£¬£¬£¬Í¬Ê±°´»®¶¨ÔÚ72СʱÄÚ֪ͨÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©¡£¡£¡£¡£¡£¡£¡£ÒøÐÐÖÒÑԳƣ¬£¬£¬Ð¹Â¶µÄÉúÒâÏêÇé¿ÉÄÜÉæ¼°·Ç±¾Ðпͻ§£¬£¬£¬ÈçÊտСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ÒøÐÐÒÑÏò3625ÃûÊÜÓ°Ïì¿Í»§Ö§¸¶13.9ÍòÓ¢°÷£¨Ô¼18.3ÍòÃÀÔª£©Åâ³¥½ð£¬£¬£¬ÒÔÌî²¹À§ÈźÍδ±ã£¬£¬£¬²¢Ç¿µ÷ÎÞÖ¤¾ÝÅú×¢ÊÂÎñµ¼Ö²ÆÎñËðʧ»òÚ²ÆÐÐΪ£¬£¬£¬µ«½«Ò»Á¬¼à¿Ø¡£¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/
2. DeepLoadʹÓÃClickFixºÍWMI³¤ÆÚ»¯ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤
3ÔÂ30ÈÕ£¬£¬£¬ReliaQuestÑо¿Ö°Ô±Åû¶һÆðʹÓÃClickFixÉç½»¹¤³ÌÊֶηַ¢ÐÂÐͶñÒâÈí¼þ¼ÓÔØÆ÷DeepLoadµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚClickFixÓÕ¶ü£¬£¬£¬ÓÕÆÓû§ÔÚWindowsÔËÐжԻ°¿òÕ³ÌùPowerShellÏÂÁî½â¾öÐé¹¹ÎÊÌ⣬£¬£¬Ëæºóͨ¹ýÕýµ±¹¤¾ßmshta.exeÏÂÔØ²¢Ö´ÐлìÏýµÄPowerShell¼ÓÔØÆ÷¡£¡£¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷½«½¹µã¹¦Ð§Òþ²ØÔÚÎÞÒâÒå±äÁ¿¸³ÖµÖУ¬£¬£¬¿ÉÄܽèÖúAI¹¤¾ß¿ª·¢»ìÏý²ãÒÔÓÕÆÇå¾²¹¤¾ß¡£¡£¡£¡£¡£¡£¡£DeepLoadÉî¶ÈÈÚÈëWindows»î¶¯ÊµÏÖÒþ²Ø£ºÔغÉǶÈëËøÆÁÖÎÀíÀú³ÌLockAppHost.exe£¬£¬£¬½ûÓÃPowerShellÏÂÁîÀúÊ·£¬£¬£¬Ö±½ÓŲÓÃÔÉúWindows½¹µãº¯ÊýÈÆ¹ý¼à¿Ø£¬£¬£¬²¢Í¨¹ýAdd-Type¶¯Ì¬ÌìÉúËæ»úÎļþÃûDLLÖÁTempĿ¼¹æ±Ü»ùÓÚÎļþµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£·ÀÓù¹æ±ÜÕ½ÂÔ·½Ã棬£¬£¬DeepLoad½ÓÄÉAPC×¢ÈëÔÚÊÜÐÅÈÎÀú³ÌÄÚÔËÐÐÖ÷ÔØºÉ£¬£¬£¬ÎÞÐ轫½âÂëÔØºÉдÈë´ÅÅÌ£»£»£»Ê¹ÓÃWMIÊÂÎñ¶©ÔÄÔÚÈýÌìºóÎÞÐèÓû§²Ù×÷ÖØÐÂѬȾ"Çå½à"Ö÷»ú£¬£¬£¬Í»ÆÆ¹Å°å¸¸×ÓÀú³ÌÁ´¼ì²âÂß¼¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÇÔȡģ¿£¿£¿£¿£¿£¿éͨ¹ýÌáÈ¡ä¯ÀÀÆ÷ÃÜÂ롢Ͷ·Å¶ñÒâÀ©Õ¹×èµ²µÇ¼ƾ֤£¬£¬£¬²¢×Ô¶¯¼ì²âUÅ̵ȿÉÒÆ¶¯×°±¸£¬£¬£¬ÒÔ"ChromeSetup.lnk"µÈαװÎļþʵÏÖ¶þ´ÎÈö²¥¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
3. Axios NPM°üÔ⹩ӦÁ´¹¥»÷£¬£¬£¬¶ñÒâ´úÂë±»×¢Èë
3ÔÂ31ÈÕ£¬£¬£¬JavaScriptÉú̬½¹µã×é¼þAxiosÔâÓö¹©Ó¦Á´¹¥»÷£¬£¬£¬¹¥»÷Õßͨ¹ýnpm×¢²á±í×¢Èë¶ñÒâת´ïÒÀÀµ£¬£¬£¬Òý·¢´ó¹æÄ£Ç徲Σº¦¡£¡£¡£¡£¡£¡£¡£Axios×÷ΪÆÕ±é¼¯³ÉÓÚǰ¶Ë¿ò¼Ü¡¢ºó¶Ë΢ЧÀͼ°ÆóÒµÓ¦ÓõÄHTTP¿Í»§¶Ë£¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿Ô¼8300Íò´Î£¬£¬£¬´Ë´ÎÊÂÎñDZÔÚÓ°Ïì¹æÄ£¼«¹ã¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉ¡°Èƹý±ê×¼Ðû²¼Á÷³Ì+¾«×¼ÒÀÀµ×¢È롱սÂÔ£ºÎ´¾ÊÚȨÐû²¼Ð°æAxios£¨Èç1.14.1¡¢0.30.4£©£¬£¬£¬×Ô¶¯ÒýÈ뺬¶ñÒâ´úÂëµÄplain-crypto-js@4.2.1°ü¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâ°üÓÚ3ÔÂ30ÈÕ23:59:12 UTCÐû²¼£¬£¬£¬Êý·ÖÖÓºó±»ÈëÇÖµÄAxios°æ±¾¼´ÉÏÏß¡£¡£¡£¡£¡£¡£¡£SocketÇå¾²¹¤¾ßÔÚ31ÈÕ00:05:41 UTC¼ì²âµ½Òì³££¬£¬£¬Í¹ÏÔ¹¥»÷ÕßÊÔͼÔÚÇå¾²¹¤¾ß·´Ó¦Ç°Íê³É¿ìËÙÈö²¥¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Í»ÆÆÍ¨Àý°æ±¾¿ØÖÆÂß¼£¬£¬£¬Õý³£Á÷³ÌÖÐAxiosά»¤Õß»áÔÚGitHub´ò±êÇ©ºóͬ²½Ðû²¼ÖÁnpm£¬£¬£¬µ«¶ñÒâ°æ±¾Î´¶ÔÓ¦GitHub±êÇ©£¬£¬£¬Åú×¢¹¥»÷ÕßÖ±½Ó²Ù¿Ønpm×¢²á±í¡£¡£¡£¡£¡£¡£¡£Í¨¹ýС¹æÄ£¸Ä¶¯£¬£¬£¬¹¥»÷Õß¹æ±Ü´ó¹æÄ£´úÂëÉó²é£¬£¬£¬Ê¹ÓÃת´ïÒÀÀµÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£×¢²á±íÈÕÖ¾ÏÔʾ£¬£¬£¬¶ñÒâ°ü¹ØÁªnpmÕË»§jasonsaayman£¬£¬£¬Ö¸ÏòÕË»§½ÓÊÜ»ò¿ª·¢Õ߯¾Ö¤Ð¹Â¶Î£º¦¡£¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/axios-npm-packages-compromised/
4. ºÉÀ¼²ÆÎñ²¿ÍøÂç¹¥»÷ÊÂÎñÖ¶àϵͳ̱»¾
3ÔÂ31ÈÕ£¬£¬£¬ºÉÀ¼²ÆÎñ²¿3ÔÂ19ÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬µ¼Ö²¿·ÖϵͳÏÂÏߣ¬£¬£¬°üÀ¨¹ú¿âÒøÐÐÊý×ÖÃÅ»§¡£¡£¡£¡£¡£¡£¡£²ÆÎñ²¿ÉÏÖÜÅû¶£¬£¬£¬´Ë´ÎÇå¾²Îó²î䲨¼°Ë°ÊÕ¡¢½òÌùÖÎÀí¼°ÊÕÖ§¿Ú¹æÔòϵͳ£¬£¬£¬µ«²¿·ÖÔ±¹¤Êý¾ÝÊÜÓ°Ï죬£¬£¬ÏêϸÈËÊý¼°Ãô¸ÐÊý¾Ýй¶ÇéÐÎÉÐδ¹ûÕæ£¬£¬£¬ÇÒÎÞÍþвÐÐΪÕß»ò·¸·¨×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£¡£Îª×èֹΣº¦£¬£¬£¬²ÆÎñ²¿ÓÚ3ÔÂ23ÈÕ×Ô¶¯¹Ø±Õ¶à¸öϵͳ£¬£¬£¬Ö±½ÓÓ°ÏìÔ¼1600¼ÒÒÀÀµ¹ú¿â×ʽðµÄ¹«¹²»ú¹¹£¬£¬£¬º¸ÇÕþ¸®²¿Î¯¡¢½ÌÓý×éÖ¯¡¢Éç»á»ù½ð¼°µØ·½Õþ¸®¡£¡£¡£¡£¡£¡£¡£¹ú¿âÒøÐÐÊý×ÖÃÅ»§ÀëÏߺ󣬣¬£¬Ïà¹Ø»ú¹¹ÎÞ·¨ÔÚÏßÅÌÎÊÕË»§Óà¶î¡¢ÉêÇë´û¿î»òµ÷½âÈÕÄÚÏ޶£¬£¬µ«×ʽðÏÖʵ»á¼ûÓëÊÕ¸¶¿îÈÔͨ¹ýͨÀýÒøÐÐÇþµÀÕý³£ÔË×÷£¬£¬£¬ÐëҪʱ½«½ÓÄÉÈ˹¤·½·¨Î¬³Ö»ù±¾Á÷³Ì¡£¡£¡£¡£¡£¡£¡£ºÉÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÓëÍⲿȡ֤ר¼ÒÒѽéÈëÊӲ죬£¬£¬²ÆÎñ²¿ÒÑÏòºÉÀ¼Êý¾Ý±£»£»£»¤¾Ö£¨AP£©×ª´ïÊÂÎñ£¬£¬£¬²¢Ìá½»ÖÁ¹ú¼Ò¾¯Ô±¸ß¿Æ¼¼·¸·¨Ð¡×é¡£¡£¡£¡£¡£¡£¡£²ÆÎñ²¿³¤°£¶û¿Æ¡¤º£ÄþÌåÏÖ£¬£¬£¬Òò·¨Ö¤ÊӲ켰Ç徲˼Á¿£¬£¬£¬ÏµÍ³»Ö¸´Ê±¼ä±íÔÝÎÞ·¨È·¶¨£¬£¬£¬ÐèÒ»Á¬¼à¿ØÏ£Íû¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach/
5. È«Çò»¯¹¤¾ÞÍ·ÌÕÊϹ«Ë¾Ôâ÷è÷ëÀÕË÷Èí¼þ¹¥»÷
3ÔÂ31ÈÕ£¬£¬£¬È«Çò»¯¹¤¾ÞÍ·ÌÕÊϹ«Ë¾Ôâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯ÈëÇÖ£¬£¬£¬¸Ã×éÖ¯Òѽ«ÆäÁÐÈëTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬µ«ÉÐδÐû²¼Ïêϸ¹¥»÷Ö¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÌÕÊÏ×÷ΪÄêÊÕÈëÔ¼400ÒÚÃÀÔª¡¢Ô±¹¤³¬3.6Íò¡¢ÓªÒµÁýÕÖ160¶à¸ö¹ú¼ÒµÄ¿ç¹úÆóÒµ£¬£¬£¬Éæ¼°°ü×°¡¢»ù½¨¡¢½»Í¨¼°ÏûºÄÆ·µÈ¶àÁìÓòÖÊÁϹ©Ó¦£¬£¬£¬´Ë´ÎÊÂÎñÒý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×Ô2022ÄêÆð»îÔ¾£¬£¬£¬2025ÄêÒÑÔ¾ÉýΪ×î»îÔ¾µÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©×éÖ¯Ö®Ò»£¬£¬£¬Ã¿ÔÂÊܺ¦Õß³¬40¼Ò£¬£¬£¬6Ô¸ü´ï·åÖµ100¼Ò¡£¡£¡£¡£¡£¡£¡£Æä½ÓÄÉ¡°Ë«ÖØÀÕË÷¡±Õ½ÂÔ£º¼È¼ÓÃÜÊܺ¦ÕßÊý¾Ý£¬£¬£¬ÓÖÍþвͨ¹ýTorÃÅ»§Ð¹Â¶Ãô¸ÐÐÅÏ¢£¬£¬£¬Í¨¹ý´¹ÂÚ¹¥»÷ºÍÒÑÖªÎó²îÉøÍ¸Ò½ÁÆ¡¢ÖÆÔì¡¢½ðÈڵȶàÐÐÒµ¡£¡£¡£¡£¡£¡£¡£Ä¿½ñ£¬£¬£¬ÌÕÊϹ«Ë¾ÕýÃæÁÙÊý¾Ýй¶Σº¦Óëϵͳ»Ö¸´Ñ¹Á¦£¬£¬£¬¶ø÷è÷ë×éÖ¯µÄÄäÃûÐÔ¼°RaaSģʽʹ¹¥»÷ËÝÔ´ÄѶȼӾ硣¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/190186/cyber-crime/qilin-ransomware-allegedly-breached-chemical-manufacturer-giant-dow-inc.html
6. AnthropicÒâÍâй¶Claude CodeÔ´´úÂë
3ÔÂ31ÈÕ£¬£¬£¬È˹¤ÖÇÄܹ«Ë¾AnthropicÒòÈËΪ²Ù×÷ʧÎóµ¼Ö±ÕÔ´Èí¼þClaude CodeµÄÔ´´úÂëÒâÍâй¶£¬£¬£¬Òý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¡£¡£¡£¡£3ÔÂ31ÈÕÐû²¼µÄClaude Code°æ±¾2.1.88Öйýʧ°üÀ¨ÁËÄÚ²¿µ÷ÊÔÎļþcli.js.map£¬£¬£¬¸ÃÎļþͨ¹ý¡°sourcesContent¡±×Ö¶ÎÍêÕû̻¶ÁËÔ¼1900¸öÎļþ¡¢50ÍòÐдúÂ룬£¬£¬º¸ÇClaude¶àÏî¶À¼Ò¹¦Ð§µÄʵÏÖϸ½Ú¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÊÂÎñÓÉ¿ª·¢ÕßChaofan ShouÔÚGitHubµÈƽ̨Ê״η¢Ã÷ºóѸËÙÈö²¥£¬£¬£¬Ö»¹ÜAnthropicÇ¿µ÷δй¶¿Í»§Êý¾Ý»òƾ֤£¬£¬£¬µ«ÒÑÆô¶¯DMCAÇÖȨ֪ͨÁ÷³ÌÒÔɾ³ýÍøÉÏÈö²¥µÄ´úÂë¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÒâÍâ½ÒÆÆÁËAnthropicÕýÔÚ²âÊÔµÄÁ½´óÁ¢Ò칦Ч£ºÈ«Ììºò±àÂëµÄ¡°×Ô¶¯Ä£Ê½¡±ºÍºǫ́һÁ¬Ë¼Ë÷µÄ¡°ÃÎÏëģʽ¡±£¬£¬£¬Òý·¢¿ª·¢ÕßÉçÇø¶Ôδ¹ûÕæ¹¦Ð§µÄÆÊÎöÈȳ±¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬Åãͬй¶ÊÂÎñµÄÊÇÓû§¶ÔClaudeЧÀÍÁ÷Á¿ÏÞÖÆÒì³£µÄ¼¯Öз´Ïì¡£¡£¡£¡£¡£¡£¡£¶àλPro¼°MaxÌײÍÓû§±¨¸æ£¬£¬£¬ÔÚ¼òÆÓ½»»¥ºóʹÓÃÂÊ¿ìËÙìÉýÖÁ100%£¬£¬£¬Ô¶³¬Õý³£ÏûºÄËÙÂÊ¡£¡£¡£¡£¡£¡£¡£Anthropic Games¹Ù·½È·ÈÏÕýÔÚÊÓ²ì¸ÃÎÊÌ⣬£¬£¬ÊÖÒÕÈÏÕæÈËLydia HallieÔÚXƽ̨ÌåÏÖ£º¡°Óû§Ê¹ÓÃÁ¿Òì³£¼¤ÔöÒѳÉÍŶÓÖ÷Òª½â¾öʹÃü£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸üÐÂÏ£Íû¡£¡£¡£¡£¡£¡£¡£¡±×èÖ¹3ÔÂ31ÈÕÏÂÖ磬£¬£¬¸ÃÁ÷Á¿Òì³£ÎÊÌâÈÔδÍêÈ«½â¾ö¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/artificial-intelligence/claude-code-source-code-accidentally-leaked-in-npm-package/


¾©¹«Íø°²±¸11010802024551ºÅ