¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷£¬£¬£¬³¬ÆßÍòÓû§ÔâÖÒÑÔ
Ðû²¼Ê±¼ä 2026-04-171. ¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷£¬£¬£¬³¬ÆßÍòÓû§ÔâÖÒÑÔ
4ÔÂ16ÈÕ£¬£¬£¬ÔÚ¹ú¼ÊÖ´·¨Ðж¯¡°¶ÏµçÐж¯¡±µÄ×îн׶ÎÖУ¬£¬£¬È«Çò21¸ö¹ú¼ÒÐͬ·¢Á¦£¬£¬£¬¶ÔÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¹¤ÒµÁ´¾ÙÐÐÁËÉî¶È¹¥»÷¡£¡£¡£´Ë´ÎÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯Ö§³Ö£¬£¬£¬ÒÑÏòÁè¼Ý75,000ÃûʹÓÃÏà¹ØÆ½Ì¨Ìᳫ²»·¨¹¥»÷µÄСÎÒ˽¼Ò·¢ËÍÁËÖÒÑÔÓʼþ»òÐżþ¡£¡£¡£Ðж¯Ê±´ú£¬£¬£¬Ö´·¨²¿·Ö¾Ð²¶ÁËËÄÃûÏÓÒÉÈË£¬£¬£¬²é·âÁË53¸öÉæÊÂÓòÃû£¬£¬£¬²¢Ö´ÐÐÁË25·ÝËѲéÁî¡£¡£¡£¼ÓÈë¹ú¼Òº¸Ç¶à¸öÅ·Ã˳ÉÔ±¹ú£¬£¬£¬ÒÔ¼°°Ä´óÀûÑÇ¡¢Ì©¹ú¡¢ÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾ºÍ°ÍÎ÷£¬£¬£¬Õ¹ÏÖÁËÈ«ÇòÁªºÏ¹¥»÷ÍøÂç·¸·¨µÄ¿ÌÒâ¡£¡£¡£¡°¶ÏµçÐж¯¡±´ËǰÒѲð³ýÁË´ó×ÚÒªº¦»ù´¡ÉèÊ©£¬£¬£¬²¢²é»ñÁ˰üÀ¨Óâ300Íò¸ö·¸·¨ÕË»§µÄÊý¾Ý¿â¡£¡£¡£ÔÚ×îн׶Σ¬£¬£¬Ðж¯ÖصãתÏòÔ¤·ÀÓëÕðÉå¡£¡£¡£¸÷¹úר¼ÒÔÚ¡°Ðж¯ÖÜ¡±Ç°¿ªÕ¹ÁËϵÁгå´ÌÐж¯£¬£¬£¬¾Û½¹ÓÚDDoS¹¥»÷ƽ̨µÄ¸ß¼ÛֵĿµÄÓû§£¬£¬£¬Í¬Ê±ÌáÉý¹«ÖÚ¶ÔÕâÀà»î¶¯²»·¨ÐÔµÄÈÏÖª¡£¡£¡£Ö´·¨»ú¹¹²»µ«µ·»ÙÁ˲»·¨¹¥»÷ЧÀ͵ÄÊÖÒÕÉèÊ©£¬£¬£¬»¹¶Ô¡°BooterЧÀÍ¡±¾ÙÐÐÁËϵͳÐÔÕûÀí¡£¡£¡£Ö»¹Ü²¿·ÖÔËÓªÕßÒÔ¡°Õýµ±Ñ¹Á¦²âÊÔ¡±Îª»Ï×ÓÑÚÊÎÆäÕæÊµÄ¿µÄ£¬£¬£¬µ«ÓÉÓÚÆ½Ì¨È±·¦¶Ô¹¥»÷Ä¿µÄËùÓÐȨµÄÑéÖ¤£¬£¬£¬ÕâЩЧÀÍÏÖʵÉϺã¾Ã±»ÓÃÓÚ²»·¨¹¥»÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains/
2. ÐÂÐͶñÒâÈí¼þZionSiphonÃé×¼ÒÔÉ«ÁÐË®ÉèÊ©
4ÔÂ16ÈÕ£¬£¬£¬Ò»¿îÃûΪZionSiphonµÄÐÂÐͶñÒâÈí¼þרÃÅÕë¶ÔÔËÓªÊÖÒÕÁìÓò£¬£¬£¬ÓÈÆäÒÔË®´¦Öóͷ£ºÍº£Ë®µ»¯ÇéÐÎΪ¹¥»÷Ä¿µÄ£¬£¬£¬ÊÔͼͨ¹ýµ÷ÀíҺѹºÍ½«ÂȺ¬Á¿ÌáÉýÖÁΣÏÕˮƽÀ´ÆÆËðÒªº¦»ù´¡ÉèÊ©¡£¡£¡£¸ÃÈí¼þÓÉÈ˹¤ÖÇÄÜÍøÂçÇå¾²¹«Ë¾Darktrace·¢Ã÷£¬£¬£¬ÆäIP¶¨Î»¼°Ç¶Èë×Ö·û´®ÖеÄÕþÖÎÐÅÏ¢ÏÔʾ£¬£¬£¬ËüËÆºõרעÓÚ¹¥»÷λÓÚÒÔÉ«ÁеÄÄ¿µÄ¡£¡£¡£°²Åź󣬣¬£¬ZionSiphon»á¼ì²éÖ÷»úIPÊÇ·ñÔÚÒÔÉ«ÁйæÄ£ÄÚ£¬£¬£¬²¢È·ÈÏϵͳÊÇ·ñ°üÀ¨ÓëË®»òÔËÓªÊÖÒÕÏà¹ØµÄÈí¼þ¼°Îļþ£¬£¬£¬ÒÔÈ·±£ÆäÔËÐÐÓÚË®´¦Öóͷ£»òº£Ë®µ»¯ÏµÍ³ÖС£¡£¡£ÈôÌõ¼þÖª×㣬£¬£¬Ëü»áͨ¹ýÃûΪ¡°IncreaseChlorineLevel()¡±µÄº¯Êý£¬£¬£¬ÔÚÏÖÓÐÉèÖÃÎļþÖÐÌí¼ÓÎı¾¿é£¬£¬£¬ÔÚ¹¤³§»úеϵͳÎïÀíÖ§³Ö¹æÄ£ÄÚ×î´óÏÞ¶ÈÌá¸ßÂȵļÁÁ¿ºÍÁ÷Á¿£¬£¬£¬Í¬Ê±¿ªÆôÂȱᢷ§ÃŲ¢½«·´ÉøÍ¸Ñ¹Á¦µ÷ÖÁ80¡£¡£¡£±ðµÄ£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áɨÃèÍâµØ×ÓÍøÖеÄModbus¡¢DNP3ºÍS7commµÈ¹¤Òµ¿ØÖÆÍ¨Ñ¶ÐÒ飬£¬£¬ÒâͼÓ빤ҵ¿ØÖÆÏµÍ³Ö±½Ó½»»¥¡£¡£¡£ZionSiphon»¹¾ß±¸USBÈö²¥»úÖÆ£¬£¬£¬¿É½«×ÔÉí¸´ÖÆµ½¿ÉÒÆ¶¯Çý¶¯Æ÷²¢ÒÔÒþ²ØµÄ¡°svchost.exe¡±Àú³ÌÔËÐУ¬£¬£¬Í¬Ê±½¨Éè¶ñÒâ¿ì½Ý·½·¨Îļþ¡£¡£¡£ÓÉÓÚÖÎÀíÒªº¦¹¦Ð§µÄÅÌËã»úͨ³£´¦ÓÚÎïÀí¸ôÀë״̬£¬£¬£¬²»Ö±½ÓÅþÁ¬»¥ÁªÍø£¬£¬£¬USB³ÉΪ´ËÀ๥»÷µÄÖ÷ÒªÈö²¥Í¾¾¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/zionsiphon-malware-designed-to-sabotage-water-treatment-systems/
3. н©Ê¬ÍøÂçPowMixÒԽݿËÀͶ¯Á¦ÎªÄ¿µÄ
4ÔÂ16ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬Ò»³¡Õë¶Ô½Ý¿Ë¹²ºÍ¹úÀͶ¯Á¦µÄ¶ñÒâ¹¥»÷»î¶¯ÕýÔÚÒ»Á¬¾ÙÐУ¬£¬£¬ÆäʹÓÃÒ»¸öÃûΪPowMixµÄ´Ëǰδ±»¼Í¼µÄ½©Ê¬ÍøÂ磬£¬£¬ÖÁÉÙ´Ó2025Äê12ÔÂ×îÏÈ»îÔ¾¡£¡£¡£¾ÝCisco TalosÑо¿Ô±Chetan Raghuprasad±¨¸æ£¬£¬£¬PowMix½ÓÄÉËæ»úµÄÏÂÁîÓë¿ØÖÆ£¨C2£©Ðűê¾àÀ룬£¬£¬¶ø·ÇÓëC2ЧÀÍÆ÷¼á³ÖÒ»Á¬ÅþÁ¬£¬£¬£¬ÒԴ˹æ±ÜÍøÂçÊðÃû¼ì²â¡£¡£¡£¸Ã¶ñÒâÈí¼þ½«¼ÓÃܵÄÐÄÌøÊý¾Ý¼°Êܺ¦Õß»úеµÄΨһ±êʶ·ûǶÈëC2 URL·¾¶ÖУ¬£¬£¬Ä£ÄâÕýµ±µÄREST API URL£¬£¬£¬²¢Äܹ»Ô¶³Ì¶¯Ì¬µØ½«ÐµÄC2ÓòÃû¸üе½½©Ê¬ÍøÂçÉèÖÃÎļþÖС£¡£¡£¹¥»÷Á´Ê¼ÓÚÒ»¸ö¶ñÒâZIPÎļþ£¬£¬£¬¸ÃÎļþ¼¤»î¶à½×¶ÎѬȾÁ´£¬£¬£¬×îÖÕÊÍ·ÅPowMix¡£¡£¡£Ñ¬È¾Á´Éæ¼°Ò»¸öWindows¿ì½Ý·½·¨£¨LNK£©£¬£¬£¬ÓÃÓÚÆô¶¯PowerShell¼ÓÔØÆ÷£¬£¬£¬ºóÕßÌáȡǶÈëÔÚѹËõ°üÖеĶñÒâÈí¼þ£¬£¬£¬½âÃܺóÔÚÄÚ´æÖÐÔËÐС£¡£¡£ÕâÖÖÐÂÐͽ©Ê¬ÍøÂçÖ¼ÔÚʵÏÖÔ¶³Ì»á¼û¡¢Õì̽ºÍÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬Í¨¹ý׼ʱʹÃü½¨É賤ÆÚÐÔ£¬£¬£¬²¢ÑéÖ¤Àú³ÌÊ÷ÒÔ±ÜÃâͳһÖ÷»úÉÏÔËÐжà¸ö¶ñÒâÈí¼þʵÀý¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬¹¥»÷Õß»¹»á·¿ªÒԺϹæÎªÖ÷ÌâµÄÓÕ¶üÎļþ£¬£¬£¬Ìá¼°EdekaµÈÕýµ±Æ·ÅƲ¢°üÀ¨Ð½³êÊý¾Ý¼°Ö´ÂÉÀýÔò²Î¿¼£¬£¬£¬ÒÔÊèÉ¢×¢ÖØÁ¦²¢ÔöÇ¿ÓÕÆÐÔ¡£¡£¡£
https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html
4. Rhysida¹¥»÷ÖÂÃÀÒ½ÁÆÖÐÐÄ33.7ÍòÈËÊý¾Ýй¶
4ÔÂ16ÈÕ£¬£¬£¬ÌïÄÉÎ÷ÖÝ¿â¿Ëά¶ûµØÇøÒ½ÁÆÖÐÐÄ£¨CRMC£©ÓÚ2025Äê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬µ¼ÖÂÔ¼33.7ÍòÈ˵ÄСÎÒ˽¼Ò¼°Ò½ÁÆÐÅϢй¶¡£¡£¡£¸ÃÖÐÐÄÓÚ7ÔÂ14ÈÕ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬Ñ¸ËÙÁªºÏÖ´·¨²¿·Ö¼°·¨Ö¤¹«Ë¾Õö¿ªÊӲ죬£¬£¬È·ÈÏÔÚ7ÔÂ11ÈÕÖÁ14ÈÕʱ´ú£¬£¬£¬ÓÐδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÒ½ÔºÍøÂ磬£¬£¬¿ÉÄÜÉó²é»òÇÔÈ¡ÁË´ó×ÚÃô¸ÐÎļþ¡£¡£¡£¾ÖÜÈ«Éó²éÊÜÓ°ÏìÎļþºó£¬£¬£¬CRMCÈ·ÈÏй¶ÐÅÏ¢ÒòСÎÒ˽¼ÒÇéÐζøÒ죬£¬£¬¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢ÒøÐÐÕ˺š¢Ò½ÁÆÐÅÏ¢¡¢²¡ÀúºÅ¼°¿µ½¡°ü¹Üµ¥ÐÅÏ¢¡£¡£¡£Ò½ÔºÕýÔÚͨ¹ýÓʼþÏòÓµÓÐÓÐÓõصãµÄÊÜÓ°ÏìСÎÒ˽¼Ò¼ÄËÍ֪ͨÐÅ£¬£¬£¬½¨ÒéÊÕÐÅÈË×ñÕÕÐÅÖÐÖ¸Òý±£»£»£»¤×ÔÉíÈ¨Òæ¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ֤ʵÒѱ¬·¢Êý¾ÝÀÄÓ㬣¬£¬CRMCÈÔΪÊÜÓ°ÏìÕßÌṩÃâ·ÑµÄÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ£¬£¬£¬²¢±Þ²ß¹«ÖÚÇ×½ü¹Ø×¢ÕË»§ºÍÐÅÓñ¨¸æ£¬£¬£¬ÊµÊ±¾Ù±¨¿ÉÒɻ£¬£¬£¬ÐëҪʱÁªÏµÓйز¿·Ö¡£¡£¡£Ò½Ôº»¹ÒýÓÃÁËÁª°îÉÌҵίԱ»áµÄ×ÊÔ´£¬£¬£¬Îª¹«ÖÚÌṩڲƾ¯±¨¼°ÐÅÓñ£»£»£»¤µÄÏà¹ØÌáÐÑ¡£¡£¡£2025Äê8Ô£¬£¬£¬RhysidaÀÕË÷Èí¼þ×éÖ¯½«¸ÃÒ½ÁÆÖÐÐÄÌí¼ÓÖÁÆäTorÊý¾Ýй¶վµã£¬£¬£¬Éù³ÆÇÔÈ¡ÁË538GBÊý¾Ý¡£¡£¡£ÓÉÓÚÎÞÈ˹ºÖÃÕâЩ±»µÁÊý¾Ý£¬£¬£¬¸Ã×éÖ¯×îÖÕ½«ÆäÃâ·Ñ¹ûÕæÐ¹Â¶¡£¡£¡£
https://securityaffairs.com/190898/cyber-crime/cookeville-regional-medical-center-hospital-data-breach-impacts-337917-people.html
5. ATHRƽ̨4000ÃÀÔª³öÊÛ£¬£¬£¬È«×Ô¶¯ÓïÒô´¹ÂÚÇÔȡƾ֤
4ÔÂ16ÈÕ£¬£¬£¬Ò»ÖÖÃûΪATHRµÄÐÂÐÍÍøÂç·¸·¨Æ½Ì¨ÕýÒÔ4000ÃÀÔªµÄ¼ÛÇ®ÔÚµØÏÂÂÛ̳³öÊÛ£¬£¬£¬²¢ÊÕÈ¡10%µÄÀûÈóÓ¶½ð¡£¡£¡£¸Ãƽ̨Äܹ»Í¨¹ýÈ«×Ô¶¯ÓïÒôÍøÂç´¹ÂÚ¹¥»÷ÇÔÈ¡°üÀ¨Google¡¢Microsoft¡¢CoinbaseÔÚÄڵĶàÏîЧÀ͵Ǽƾ֤£¬£¬£¬ÆäÉç»á¹¤³Ì½×¶ÎͬʱʹÓÃÈËÀà²Ù×÷Ô±ºÍÈ˹¤ÖÇÄÜÊðÀí¡£¡£¡£¾ÝÔÆµç×ÓÓʼþÇå¾²¹«Ë¾AbnormalµÄÑо¿Ö°Ô±ÆÊÎö£¬£¬£¬ATHRÊÇÒ»¸öÍêÕûµÄÍøÂç´¹ÂÚÓëÓïÒô´¹ÂÚ¹¥»÷ÌìÉúÆ÷£¬£¬£¬Ìá¹©Æ·ÅÆÌØ¶¨µÄµç×ÓÓʼþÄ£°å¡¢Õë¶Ôÿ¸öÄ¿µÄµÄ¶¨Öƹ¦Ð§ÒÔ¼°ÓÕÆ»úÖÆ£¬£¬£¬Ê¹Óʼþ¿´ËÆÀ´×Ô¿ÉÐÅ·¢¼þÈË¡£¡£¡£ÏÖÔÚ¸ÃÆ½Ì¨Ö§³Ö°ËÏîÔÚÏßЧÀÍ£ºGoogle¡¢Microsoft¡¢Coinbase¡¢Binance¡¢Gemini¡¢Crypto.com¡¢YahooºÍAOL¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦ÕßÊÕµ½Ò»·âÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþ£¬£¬£¬ÄÚÈÝͨ³£ÎªÐéαµÄÇå¾²¾¯±¨»òÕÊ»§Í¨Öª£¬£¬£¬½ôÆÈˮƽ×ãÒÔ´ÙʹÓû§²¦´òµç»°£¬£¬£¬µ«ÓÖ×ã¹»ÁýͳÒԱܿª»ùÓÚÄÚÈݵĹýÂËÆ÷¡£¡£¡£²¦´òÓʼþÖеĵ绰ºÅÂëºó£¬£¬£¬Êܺ¦Õß»áͨ¹ýAsteriskºÍWebRTCÅþÁ¬µ½AIÓïÒôÊðÀí£¬£¬£¬ÕâЩÊðÀíÆ¾Ö¤¶à°ì·¨¾ç±¾Ä£ÄâÇå¾²ÊÂÎñ¡£¡£¡£Æ½Ì¨ÒDZíÅÌʹ²Ù×÷Ô±Äܹ»¿ØÖÆÕû¸öÁ÷³Ì£¬£¬£¬°üÀ¨µç×ÓÓʼþ·Ö·¢¡¢µç»°ÖÎÀíºÍʵʱ¼à¿Ø£¬£¬£¬²¢ÎüÊÕ°üÀ¨±»µÁÊý¾ÝµÄÈÕÖ¾¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/
6. ºÚ¿ÍʹÓÃMarimoÎó²î°²ÅÅNKAbuseбäÖÖ
4ÔÂ16ÈÕ£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃMarimoÏìӦʽPython notebookÖеÄÒ»¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2026-39987£©£¬£¬£¬°²ÅÅÍйÜÔÚHugging Face Spacesƽ̨ÉϵÄNKAbuse¶ñÒâÈí¼þбäÖÖ¡£¡£¡£¾ÝÔÆÇå¾²¹«Ë¾SysdigÊý¾Ý£¬£¬£¬Ïà¹Ø¹¥»÷ÔÚÉÏÖÜ×îÏÈ£¬£¬£¬Ä¿µÄÊÇÇÔȡƾ֤£¬£¬£¬¶ø´Ëʱ¾àÀëÊÖÒÕϸ½Ú¹ûÕæÅû¶Éв»µ½10Сʱ¡£¡£¡£SysdigÑо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËû¹¥»÷»î¶¯£¬£¬£¬°üÀ¨4ÔÂ12ÈÕ×îÏȵÄÒ»ÏîÐж¯£¬£¬£¬¸ÃÐж¯ÀÄÓÃHugging Face Spacesƽ̨£¬£¬£¬¸Ãƽ̨ÔÊÐíÓû§´ÓGit¿ÍÕ»°²Åź͹²Ïí½»»¥Ê½WebÓ¦ÓóÌÐò£¬£¬£¬Í¨³£ÓÃÓÚAIÏà¹ØµÄÑÝʾÓëʵÑé¡£¡£¡£ÔÚSysdigÊӲ쵽µÄ¹¥»÷ÖУ¬£¬£¬¹¥»÷Õß½¨ÉèÁËÒ»¸öÃûΪ¡°vsccode-modetx¡±µÄ¿Õ¼ä£¬£¬£¬ÆäÖÐÍйÜÁËÒ»¸öͶ·Å¾ç±¾ºÍÒ»¸öÃûΪ¡°kagent¡±µÄ¶ñÒâÈí¼þ¶þ½øÖÆÎļþ£¬£¬£¬ÊÔͼģÄâÕýµ±µÄKubernetes AIÊðÀí¹¤¾ß¡£¡£¡£Ê¹ÓÃMarimoÎó²îºó£¬£¬£¬¹¥»÷ÕßÔËÐÐcurlÏÂÁî´ÓHugging FaceÏÂÔØ²¢Ö´Ðо籾¡£¡£¡£¸ÃͶ·Å¾ç±¾ÏÂÔØkagent¶þ½øÖÆÎļþ£¬£¬£¬½«Æä×°Öõ½ÍâµØ£¬£¬£¬²¢Í¨¹ýsystemd¡¢cron»òmacOS LaunchAgentÉèÖó¤ÆÚÐÔ¡£¡£¡£¸ÃÓÐÓÃÔØºÉÊÇ´Ëǰδ±»¼Í¼µÄDDoS¹¥»÷¶ñÒâÈí¼þNKAbuseµÄ±äÖÖ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face/


¾©¹«Íø°²±¸11010802024551ºÅ