¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷ £¬£¬£¬³¬ÆßÍòÓû§ÔâÖÒÑÔ

Ðû²¼Ê±¼ä 2026-04-17

1. ¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷ £¬£¬£¬³¬ÆßÍòÓû§ÔâÖÒÑÔ


4ÔÂ16ÈÕ £¬£¬£¬ÔÚ¹ú¼ÊÖ´·¨Ðж¯¡°¶ÏµçÐж¯¡±µÄ×îн׶ÎÖÐ £¬£¬£¬È«Çò21¸ö¹ú¼ÒЭͬ·¢Á¦ £¬£¬£¬¶ÔÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¹¤ÒµÁ´¾ÙÐÐÁËÉî¶È¹¥»÷¡£¡£¡£´Ë´ÎÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯Ö§³Ö £¬£¬£¬ÒÑÏòÁè¼Ý75,000ÃûʹÓÃÏà¹ØÆ½Ì¨Ìᳫ²»·¨¹¥»÷µÄСÎÒ˽¼Ò·¢ËÍÁËÖÒÑÔÓʼþ»òÐżþ¡£¡£¡£Ðж¯Ê±´ú £¬£¬£¬Ö´·¨²¿·Ö¾Ð²¶ÁËËÄÃûÏÓÒÉÈË £¬£¬£¬²é·âÁË53¸öÉæÊÂÓòÃû £¬£¬£¬²¢Ö´ÐÐÁË25·ÝËѲéÁî¡£¡£¡£¼ÓÈë¹ú¼Òº­¸Ç¶à¸öÅ·Ã˳ÉÔ±¹ú £¬£¬£¬ÒÔ¼°°Ä´óÀûÑÇ¡¢Ì©¹ú¡¢ÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾ºÍ°ÍÎ÷ £¬£¬£¬Õ¹ÏÖÁËÈ«ÇòÁªºÏ¹¥»÷ÍøÂç·¸·¨µÄ¿ÌÒâ¡£¡£¡£¡°¶ÏµçÐж¯¡±´ËǰÒѲð³ýÁË´ó×ÚÒªº¦»ù´¡ÉèÊ© £¬£¬£¬²¢²é»ñÁ˰üÀ¨Óâ300Íò¸ö·¸·¨ÕË»§µÄÊý¾Ý¿â¡£¡£¡£ÔÚ×îн׶Π£¬£¬£¬Ðж¯ÖصãתÏòÔ¤·ÀÓëÕðÉå¡£¡£¡£¸÷¹úר¼ÒÔÚ¡°Ðж¯ÖÜ¡±Ç°¿ªÕ¹ÁËϵÁгå´ÌÐж¯ £¬£¬£¬¾Û½¹ÓÚDDoS¹¥»÷ƽ̨µÄ¸ß¼ÛֵĿµÄÓû§ £¬£¬£¬Í¬Ê±ÌáÉý¹«ÖÚ¶ÔÕâÀà»î¶¯²»·¨ÐÔµÄÈÏÖª¡£¡£¡£Ö´·¨»ú¹¹²»µ«µ·»ÙÁ˲»·¨¹¥»÷ЧÀ͵ÄÊÖÒÕÉèÊ© £¬£¬£¬»¹¶Ô¡°BooterЧÀÍ¡±¾ÙÐÐÁËϵͳÐÔÕûÀí¡£¡£¡£Ö»¹Ü²¿·ÖÔËÓªÕßÒÔ¡°Õýµ±Ñ¹Á¦²âÊÔ¡±Îª»Ï×ÓÑÚÊÎÆäÕæÊµÄ¿µÄ £¬£¬£¬µ«ÓÉÓÚÆ½Ì¨È±·¦¶Ô¹¥»÷Ä¿µÄËùÓÐȨµÄÑéÖ¤ £¬£¬£¬ÕâЩЧÀÍÏÖʵÉϺã¾Ã±»ÓÃÓÚ²»·¨¹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains/


2. ÐÂÐͶñÒâÈí¼þZionSiphonÃé×¼ÒÔÉ«ÁÐË®ÉèÊ©


4ÔÂ16ÈÕ £¬£¬£¬Ò»¿îÃûΪZionSiphonµÄÐÂÐͶñÒâÈí¼þרÃÅÕë¶ÔÔËÓªÊÖÒÕÁìÓò £¬£¬£¬ÓÈÆäÒÔË®´¦Öóͷ£ºÍº£Ë®µ­»¯ÇéÐÎΪ¹¥»÷Ä¿µÄ £¬£¬£¬ÊÔͼͨ¹ýµ÷ÀíҺѹºÍ½«ÂȺ¬Á¿ÌáÉýÖÁΣÏÕˮƽÀ´ÆÆËðÒªº¦»ù´¡ÉèÊ©¡£¡£¡£¸ÃÈí¼þÓÉÈ˹¤ÖÇÄÜÍøÂçÇå¾²¹«Ë¾Darktrace·¢Ã÷ £¬£¬£¬ÆäIP¶¨Î»¼°Ç¶Èë×Ö·û´®ÖеÄÕþÖÎÐÅÏ¢ÏÔʾ £¬£¬£¬ËüËÆºõרעÓÚ¹¥»÷λÓÚÒÔÉ«ÁеÄÄ¿µÄ¡£¡£¡£°²ÅÅºó £¬£¬£¬ZionSiphon»á¼ì²éÖ÷»úIPÊÇ·ñÔÚÒÔÉ«ÁйæÄ£ÄÚ £¬£¬£¬²¢È·ÈÏϵͳÊÇ·ñ°üÀ¨ÓëË®»òÔËÓªÊÖÒÕÏà¹ØµÄÈí¼þ¼°Îļþ £¬£¬£¬ÒÔÈ·±£ÆäÔËÐÐÓÚË®´¦Öóͷ£»òº£Ë®µ­»¯ÏµÍ³ÖС£¡£¡£ÈôÌõ¼þÖª×ã £¬£¬£¬Ëü»áͨ¹ýÃûΪ¡°IncreaseChlorineLevel()¡±µÄº¯Êý £¬£¬£¬ÔÚÏÖÓÐÉèÖÃÎļþÖÐÌí¼ÓÎı¾¿é £¬£¬£¬ÔÚ¹¤³§»úеϵͳÎïÀíÖ§³Ö¹æÄ£ÄÚ×î´óÏÞ¶ÈÌá¸ßÂȵļÁÁ¿ºÍÁ÷Á¿ £¬£¬£¬Í¬Ê±¿ªÆôÂȱᢷ§ÃŲ¢½«·´ÉøÍ¸Ñ¹Á¦µ÷ÖÁ80¡£¡£¡£±ðµÄ £¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áɨÃèÍâµØ×ÓÍøÖеÄModbus¡¢DNP3ºÍS7commµÈ¹¤Òµ¿ØÖÆÍ¨Ñ¶Ð­Òé £¬£¬£¬ÒâͼÓ빤ҵ¿ØÖÆÏµÍ³Ö±½Ó½»»¥¡£¡£¡£ZionSiphon»¹¾ß±¸USBÈö²¥»úÖÆ £¬£¬£¬¿É½«×ÔÉí¸´ÖÆµ½¿ÉÒÆ¶¯Çý¶¯Æ÷²¢ÒÔÒþ²ØµÄ¡°svchost.exe¡±Àú³ÌÔËÐÐ £¬£¬£¬Í¬Ê±½¨Éè¶ñÒâ¿ì½Ý·½·¨Îļþ¡£¡£¡£ÓÉÓÚÖÎÀíÒªº¦¹¦Ð§µÄÅÌËã»úͨ³£´¦ÓÚÎïÀí¸ôÀë״̬ £¬£¬£¬²»Ö±½ÓÅþÁ¬»¥ÁªÍø £¬£¬£¬USB³ÉΪ´ËÀ๥»÷µÄÖ÷ÒªÈö²¥Í¾¾¶¡£¡£¡£


https://www.bleepingcomputer.com/news/security/zionsiphon-malware-designed-to-sabotage-water-treatment-systems/


3. н©Ê¬ÍøÂçPowMixÒԽݿËÀͶ¯Á¦ÎªÄ¿µÄ


4ÔÂ16ÈÕ £¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬Ò»³¡Õë¶Ô½Ý¿Ë¹²ºÍ¹úÀͶ¯Á¦µÄ¶ñÒâ¹¥»÷»î¶¯ÕýÔÚÒ»Á¬¾ÙÐÐ £¬£¬£¬ÆäʹÓÃÒ»¸öÃûΪPowMixµÄ´Ëǰδ±»¼Í¼µÄ½©Ê¬ÍøÂç £¬£¬£¬ÖÁÉÙ´Ó2025Äê12ÔÂ×îÏÈ»îÔ¾¡£¡£¡£¾ÝCisco TalosÑо¿Ô±Chetan Raghuprasad±¨¸æ £¬£¬£¬PowMix½ÓÄÉËæ»úµÄÏÂÁîÓë¿ØÖÆ£¨C2£©Ðűê¾àÀë £¬£¬£¬¶ø·ÇÓëC2ЧÀÍÆ÷¼á³ÖÒ»Á¬ÅþÁ¬ £¬£¬£¬ÒԴ˹æ±ÜÍøÂçÊðÃû¼ì²â¡£¡£¡£¸Ã¶ñÒâÈí¼þ½«¼ÓÃܵÄÐÄÌøÊý¾Ý¼°Êܺ¦Õß»úеµÄΨһ±êʶ·ûǶÈëC2 URL·¾¶ÖÐ £¬£¬£¬Ä£ÄâÕýµ±µÄREST API URL £¬£¬£¬²¢Äܹ»Ô¶³Ì¶¯Ì¬µØ½«ÐµÄC2ÓòÃû¸üе½½©Ê¬ÍøÂçÉèÖÃÎļþÖС£¡£¡£¹¥»÷Á´Ê¼ÓÚÒ»¸ö¶ñÒâZIPÎļþ £¬£¬£¬¸ÃÎļþ¼¤»î¶à½×¶ÎѬȾÁ´ £¬£¬£¬×îÖÕÊÍ·ÅPowMix¡£¡£¡£Ñ¬È¾Á´Éæ¼°Ò»¸öWindows¿ì½Ý·½·¨£¨LNK£© £¬£¬£¬ÓÃÓÚÆô¶¯PowerShell¼ÓÔØÆ÷ £¬£¬£¬ºóÕßÌáȡǶÈëÔÚѹËõ°üÖеĶñÒâÈí¼þ £¬£¬£¬½âÃܺóÔÚÄÚ´æÖÐÔËÐС£¡£¡£ÕâÖÖÐÂÐͽ©Ê¬ÍøÂçÖ¼ÔÚʵÏÖÔ¶³Ì»á¼û¡¢Õì̽ºÍÔ¶³Ì´úÂëÖ´ÐÐ £¬£¬£¬Í¨¹ý׼ʱʹÃü½¨É賤ÆÚÐÔ £¬£¬£¬²¢ÑéÖ¤Àú³ÌÊ÷ÒÔ±ÜÃâͳһÖ÷»úÉÏÔËÐжà¸ö¶ñÒâÈí¼þʵÀý¡£¡£¡£Óë´Ëͬʱ £¬£¬£¬¹¥»÷Õß»¹»á·­¿ªÒԺϹæÎªÖ÷ÌâµÄÓÕ¶üÎļþ £¬£¬£¬Ìá¼°EdekaµÈÕýµ±Æ·ÅƲ¢°üÀ¨Ð½³êÊý¾Ý¼°Ö´ÂÉÀýÔò²Î¿¼ £¬£¬£¬ÒÔÊèÉ¢×¢ÖØÁ¦²¢ÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£


https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html


4. Rhysida¹¥»÷ÖÂÃÀÒ½ÁÆÖÐÐÄ33.7ÍòÈËÊý¾Ýй¶


4ÔÂ16ÈÕ £¬£¬£¬ÌïÄÉÎ÷ÖÝ¿â¿Ëά¶ûµØÇøÒ½ÁÆÖÐÐÄ£¨CRMC£©ÓÚ2025Äê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬£¬£¬µ¼ÖÂÔ¼33.7ÍòÈ˵ÄСÎÒ˽¼Ò¼°Ò½ÁÆÐÅϢй¶¡£¡£¡£¸ÃÖÐÐÄÓÚ7ÔÂ14ÈÕ¼ì²âµ½¿ÉÒɻºó £¬£¬£¬Ñ¸ËÙÁªºÏÖ´·¨²¿·Ö¼°·¨Ö¤¹«Ë¾Õö¿ªÊÓ²ì £¬£¬£¬È·ÈÏÔÚ7ÔÂ11ÈÕÖÁ14ÈÕʱ´ú £¬£¬£¬ÓÐδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÒ½ÔºÍøÂç £¬£¬£¬¿ÉÄÜÉó²é»òÇÔÈ¡ÁË´ó×ÚÃô¸ÐÎļþ¡£¡£¡£¾­ÖÜÈ«Éó²éÊÜÓ°ÏìÎļþºó £¬£¬£¬CRMCÈ·ÈÏй¶ÐÅÏ¢ÒòСÎÒ˽¼ÒÇéÐζøÒì £¬£¬£¬¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢ÒøÐÐÕ˺š¢Ò½ÁÆÐÅÏ¢¡¢²¡ÀúºÅ¼°¿µ½¡°ü¹Üµ¥ÐÅÏ¢¡£¡£¡£Ò½ÔºÕýÔÚͨ¹ýÓʼþÏòÓµÓÐÓÐÓõصãµÄÊÜÓ°ÏìСÎÒ˽¼Ò¼ÄËÍ֪ͨÐÅ £¬£¬£¬½¨ÒéÊÕÐÅÈË×ñÕÕÐÅÖÐÖ¸Òý±£»£»£»¤×ÔÉíÈ¨Òæ¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ֤ʵÒѱ¬·¢Êý¾ÝÀÄÓà £¬£¬£¬CRMCÈÔΪÊÜÓ°ÏìÕßÌṩÃâ·ÑµÄÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ £¬£¬£¬²¢±Þ²ß¹«ÖÚÇ×½ü¹Ø×¢ÕË»§ºÍÐÅÓñ¨¸æ £¬£¬£¬ÊµÊ±¾Ù±¨¿ÉÒɻ £¬£¬£¬ÐëҪʱÁªÏµÓйز¿·Ö¡£¡£¡£Ò½Ôº»¹ÒýÓÃÁËÁª°îÉÌҵίԱ»áµÄ×ÊÔ´ £¬£¬£¬Îª¹«ÖÚÌṩڲƭ¾¯±¨¼°ÐÅÓñ£»£»£»¤µÄÏà¹ØÌáÐÑ¡£¡£¡£2025Äê8Ô £¬£¬£¬RhysidaÀÕË÷Èí¼þ×éÖ¯½«¸ÃÒ½ÁÆÖÐÐÄÌí¼ÓÖÁÆäTorÊý¾Ýй¶վµã £¬£¬£¬Éù³ÆÇÔÈ¡ÁË538GBÊý¾Ý¡£¡£¡£ÓÉÓÚÎÞÈ˹ºÖÃÕâЩ±»µÁÊý¾Ý £¬£¬£¬¸Ã×éÖ¯×îÖÕ½«ÆäÃâ·Ñ¹ûÕæÐ¹Â¶¡£¡£¡£


https://securityaffairs.com/190898/cyber-crime/cookeville-regional-medical-center-hospital-data-breach-impacts-337917-people.html


5. ATHRƽ̨4000ÃÀÔª³öÊÛ £¬£¬£¬È«×Ô¶¯ÓïÒô´¹ÂÚÇÔȡƾ֤


4ÔÂ16ÈÕ £¬£¬£¬Ò»ÖÖÃûΪATHRµÄÐÂÐÍÍøÂç·¸·¨Æ½Ì¨ÕýÒÔ4000ÃÀÔªµÄ¼ÛÇ®ÔÚµØÏÂÂÛ̳³öÊÛ £¬£¬£¬²¢ÊÕÈ¡10%µÄÀûÈóÓ¶½ð¡£¡£¡£¸Ãƽ̨Äܹ»Í¨¹ýÈ«×Ô¶¯ÓïÒôÍøÂç´¹ÂÚ¹¥»÷ÇÔÈ¡°üÀ¨Google¡¢Microsoft¡¢CoinbaseÔÚÄڵĶàÏîЧÀ͵Ǽƾ֤ £¬£¬£¬ÆäÉç»á¹¤³Ì½×¶ÎͬʱʹÓÃÈËÀà²Ù×÷Ô±ºÍÈ˹¤ÖÇÄÜÊðÀí¡£¡£¡£¾ÝÔÆµç×ÓÓʼþÇå¾²¹«Ë¾AbnormalµÄÑо¿Ö°Ô±ÆÊÎö £¬£¬£¬ATHRÊÇÒ»¸öÍêÕûµÄÍøÂç´¹ÂÚÓëÓïÒô´¹ÂÚ¹¥»÷ÌìÉúÆ÷ £¬£¬£¬Ìá¹©Æ·ÅÆÌØ¶¨µÄµç×ÓÓʼþÄ£°å¡¢Õë¶Ôÿ¸öÄ¿µÄµÄ¶¨Öƹ¦Ð§ÒÔ¼°ÓÕÆ­»úÖÆ £¬£¬£¬Ê¹Óʼþ¿´ËÆÀ´×Ô¿ÉÐÅ·¢¼þÈË¡£¡£¡£ÏÖÔÚ¸ÃÆ½Ì¨Ö§³Ö°ËÏîÔÚÏßЧÀÍ£ºGoogle¡¢Microsoft¡¢Coinbase¡¢Binance¡¢Gemini¡¢Crypto.com¡¢YahooºÍAOL¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦ÕßÊÕµ½Ò»·âÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþ £¬£¬£¬ÄÚÈÝͨ³£ÎªÐéαµÄÇå¾²¾¯±¨»òÕÊ»§Í¨Öª £¬£¬£¬½ôÆÈˮƽ×ãÒÔ´ÙʹÓû§²¦´òµç»° £¬£¬£¬µ«ÓÖ×ã¹»ÁýͳÒԱܿª»ùÓÚÄÚÈݵĹýÂËÆ÷¡£¡£¡£²¦´òÓʼþÖеĵ绰ºÅÂëºó £¬£¬£¬Êܺ¦Õß»áͨ¹ýAsteriskºÍWebRTCÅþÁ¬µ½AIÓïÒôÊðÀí £¬£¬£¬ÕâЩÊðÀíÆ¾Ö¤¶à°ì·¨¾ç±¾Ä£ÄâÇå¾²ÊÂÎñ¡£¡£¡£Æ½Ì¨ÒDZíÅÌʹ²Ù×÷Ô±Äܹ»¿ØÖÆÕû¸öÁ÷³Ì £¬£¬£¬°üÀ¨µç×ÓÓʼþ·Ö·¢¡¢µç»°ÖÎÀíºÍʵʱ¼à¿Ø £¬£¬£¬²¢ÎüÊÕ°üÀ¨±»µÁÊý¾ÝµÄÈÕÖ¾¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/


6. ºÚ¿ÍʹÓÃMarimoÎó²î°²ÅÅNKAbuseбäÖÖ


4ÔÂ16ÈÕ £¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃMarimoÏìӦʽPython notebookÖеÄÒ»¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2026-39987£© £¬£¬£¬°²ÅÅÍйÜÔÚHugging Face Spacesƽ̨ÉϵÄNKAbuse¶ñÒâÈí¼þбäÖÖ¡£¡£¡£¾ÝÔÆÇå¾²¹«Ë¾SysdigÊý¾Ý £¬£¬£¬Ïà¹Ø¹¥»÷ÔÚÉÏÖÜ×îÏÈ £¬£¬£¬Ä¿µÄÊÇÇÔȡƾ֤ £¬£¬£¬¶ø´Ëʱ¾àÀëÊÖÒÕϸ½Ú¹ûÕæÅû¶Éв»µ½10Сʱ¡£¡£¡£SysdigÑо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËû¹¥»÷»î¶¯ £¬£¬£¬°üÀ¨4ÔÂ12ÈÕ×îÏȵÄÒ»ÏîÐж¯ £¬£¬£¬¸ÃÐж¯ÀÄÓÃHugging Face Spacesƽ̨ £¬£¬£¬¸Ãƽ̨ÔÊÐíÓû§´ÓGit¿ÍÕ»°²Åź͹²Ïí½»»¥Ê½WebÓ¦ÓóÌÐò £¬£¬£¬Í¨³£ÓÃÓÚAIÏà¹ØµÄÑÝʾÓëʵÑé¡£¡£¡£ÔÚSysdigÊӲ쵽µÄ¹¥»÷ÖÐ £¬£¬£¬¹¥»÷Õß½¨ÉèÁËÒ»¸öÃûΪ¡°vsccode-modetx¡±µÄ¿Õ¼ä £¬£¬£¬ÆäÖÐÍйÜÁËÒ»¸öͶ·Å¾ç±¾ºÍÒ»¸öÃûΪ¡°kagent¡±µÄ¶ñÒâÈí¼þ¶þ½øÖÆÎļþ £¬£¬£¬ÊÔͼģÄâÕýµ±µÄKubernetes AIÊðÀí¹¤¾ß¡£¡£¡£Ê¹ÓÃMarimoÎó²îºó £¬£¬£¬¹¥»÷ÕßÔËÐÐcurlÏÂÁî´ÓHugging FaceÏÂÔØ²¢Ö´Ðо籾¡£¡£¡£¸ÃͶ·Å¾ç±¾ÏÂÔØkagent¶þ½øÖÆÎļþ £¬£¬£¬½«Æä×°Öõ½ÍâµØ £¬£¬£¬²¢Í¨¹ýsystemd¡¢cron»òmacOS LaunchAgentÉèÖó¤ÆÚÐÔ¡£¡£¡£¸ÃÓÐÓÃÔØºÉÊÇ´Ëǰδ±»¼Í¼µÄDDoS¹¥»÷¶ñÒâÈí¼þNKAbuseµÄ±äÖÖ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face/