KyberÀÕË÷Èí¼þ˫ƽ̨¹¥»÷£¬£¬£¬£¬£¬£¬ºÅ³ÆºóÁ¿×Ó¼ÓÃÜ
Ðû²¼Ê±¼ä 2026-04-231. KyberÀÕË÷Èí¼þ˫ƽ̨¹¥»÷£¬£¬£¬£¬£¬£¬ºÅ³ÆºóÁ¿×Ó¼ÓÃÜ
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Rapid7ÔÚ2026Äê3ÔµÄÒ»´ÎÇå¾²ÊÂÎñÏìÓ¦ÖУ¬£¬£¬£¬£¬£¬·¢Ã÷²¢ÆÊÎöÁËÒ»ÖÖÃûΪKyberµÄÐÂÐÍÀÕË÷Èí¼þ¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þͬʱ¾ß±¸Õë¶ÔWindowsϵͳºÍVMware ESXiÐéÄ⻯ƽ̨µÄÁ½¸ö²î±ð±äÖÖ£¬£¬£¬£¬£¬£¬ÇÒÓÉͳһ¸öÀÕË÷Èí¼þ¹ØÁª×éÖ¯°²ÅÅÔÚÍ³Ò»ÍøÂçÖУ¬£¬£¬£¬£¬£¬Òâͼͨ¹ýͬ²½¼ÓÃÜËùÓÐЧÀÍÆ÷ÒÔ×î´ó»¯ÆÆËðЧ¹û¡£¡£¡£¡£Á½¸ö±äÖÖ¹²ÏíÏàͬµÄ»î¶¯IDºÍ»ùÓÚTorµÄÀÕË÷»ù´¡ÉèÊ©¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬ESXi±äÖÖרÃÅÕë¶ÔVMwareÇéÐι¹½¨£¬£¬£¬£¬£¬£¬Äܹ»Ã¶¾ÙËùÓÐÐéÄâ»ú¡¢¼ÓÃÜÊý¾Ý´æ´¢Îļþ£¬£¬£¬£¬£¬£¬²¢ÓÃÀÕË÷ÐŸĶ¯ESXiÖÎÀí½çÃæ£¬£¬£¬£¬£¬£¬Ö¸µ¼Êܺ¦ÕßÍê³ÉÊê½ðÖ§¸¶Á÷³Ì¡£¡£¡£¡£¸Ã±äÖÖÉù³Æ½ÓÄÉÁËKyber1024ºóÁ¿×Ó¼ÓÃÜÊÖÒÕ£¬£¬£¬£¬£¬£¬µ«Rapid7ÆÊÎö·¢Ã÷Õâһ˵·¨²¢²»Êôʵ£¬£¬£¬£¬£¬£¬ESXi±äÖÖÏÖʵʹÓÃChaCha8¾ÙÐÐÎļþ¼ÓÃÜ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃRSA-4096¾ÙÐÐÃÜÔ¿·â×°¡£¡£¡£¡£Ïà±È֮ϣ¬£¬£¬£¬£¬£¬Windows±äÖÖÓÃRust±àд£¬£¬£¬£¬£¬£¬ÊÖÒÕʵÏÖ¸üΪ³ÉÊì¡£¡£¡£¡£ËüȷʵʵÏÖÁËKyber1024ºÍX25519ÃÜÔ¿±£»£»£»¤»úÖÆ£¬£¬£¬£¬£¬£¬ÓëÀÕË÷ÐÅÖеÄÉùÃ÷Ò»Ö¡£¡£¡£¡£Ïêϸ¶øÑÔ£¬£¬£¬£¬£¬£¬Kyber1024ÓÃÓÚ±£»£»£»¤¶Ô³ÆÃÜÔ¿ÖÊÁÏ£¬£¬£¬£¬£¬£¬¶øAES-CTRÔòÈÏÕæÅúÁ¿Êý¾Ý¼ÓÃÜ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows/
2. HarvesterÓÃGoGraºóÃÅÀÄÓÃ΢ÈíÔÆAPIʵÑé¹¥»÷
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßHarvester±»Ö¸Ê¹ÓÃÁËаæLinux°æ±¾µÄGoGraºóÃÅ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚVirusTotalƽ̨ÉÏ·¢Ã÷ÁËÀ´×ÔÓ¡¶ÈºÍ°¢¸»º¹µÄ¶ñÒâÈí¼þÑù±¾£¬£¬£¬£¬£¬£¬Åú×¢ÕâÁ½¸ö¹ú¼Ò¿ÉÄÜÊÇÌØ¹¤»î¶¯µÄÄ¿µÄ¡£¡£¡£¡£×îз¢Ã÷Åú×¢£¬£¬£¬£¬£¬£¬HarvesterÕýÔÚ¼ÌÐøÀ©Õ¹Æä¹¤¾ß¼¯£¬£¬£¬£¬£¬£¬Ê¹Æä²»ÔÙ¾ÖÏÞÓÚWindowsϵͳ£¬£¬£¬£¬£¬£¬¶øÊÇʹÓÃͳһºóÃųÌÐòµÄбäÖÖѬȾLinuxϵͳ¡£¡£¡£¡£¹¥»÷ʹÓÃÉç»á¹¤³ÌѧÊÖ¶ÎÓÕÆÊܺ¦Õß·¿ªÎ±×°³ÉPDFÎĵµµÄELF¶þ½øÖÆÎļþ¡£¡£¡£¡£¹¥»÷ÕßËæºó»áÏÔʾÓÕ¶üÎĵµ£¬£¬£¬£¬£¬£¬Í¬Ê±ÇÄÇÄÔËÐкóÃųÌÐò¡£¡£¡£¡£ÓëWindows°æ±¾ÀàËÆ£¬£¬£¬£¬£¬£¬Linux°æGoGraÒ²ÀÄÓÃ΢ÈíµÄÔÆ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬Ê¹Óÿª·ÅÊý¾ÝÐÒéÅÌÎÊ£¬£¬£¬£¬£¬£¬Ã¿Á½ÃëÖÓÏòÒ»¸öÃûΪ¡°Zomato Pizza¡±µÄÌØ¶¨OutlookÓÊÏäÎļþ¼Ð·¢ËÍÒ»´ÎÇëÇ󡣡£¡£¡£¸ÃºóÃųÌÐò»áɨÃèÊÕ¼þÏ䣬£¬£¬£¬£¬£¬²éÕÒÖ÷ÌâÐÐÒÔ¡°Input¡±¿ªÍ·µÄµç×ÓÓʼþ¡£¡£¡£¡£Ò»µ©ÊÕµ½ÇкÏÌõ¼þµÄÓʼþ£¬£¬£¬£¬£¬£¬³ÌÐò»á½âÃÜBase64±àÂëµÄÓʼþÕýÎÄ£¬£¬£¬£¬£¬£¬²¢Ê¹Óá°/bin/bash¡±½«Æä×÷ΪshellÏÂÁîÖ´ÐС£¡£¡£¡£Ö´ÐÐЧ¹û»áÒÔÖ÷ÌâΪ¡°Output¡±µÄµç×ÓÓʼþÐÎʽ·¢Ë͸ø²Ù×÷Ô±¡£¡£¡£¡£Êý¾ÝÇÔÈ¡Íê³Éºó£¬£¬£¬£¬£¬£¬Ö²Èë³ÌÐò»áɨ³ýÔʼʹÃüÓʼþÒÔÑÚÊκۼ£¡£¡£¡£¡£
https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html
3. RitualsÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬³¬4100Íò»áÔ±Êý¾Ýй¶
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚºÉÀ¼µÄ»¯×±Æ·¾ÞÍ·Rituals¿ËÈÕ֤ʵ£¬£¬£¬£¬£¬£¬ºÚ¿Í´ÓÆä»áÔ±Êý¾Ý¿âÖÐÇÔÈ¡ÁË´ó×ÚÊý¾Ý£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£RitualsÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ4Ô·ݷ¢Ã÷ÁËÒ»Æð¡°Î´¾ÊÚȨÏÂÔØ¡±»áÔ±Êý¾ÝµÄÊÂÎñ£¬£¬£¬£¬£¬£¬±»ÇÔÐÅÏ¢°üÀ¨¿Í»§µÄÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢ÓÊÕþµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ룬£¬£¬£¬£¬£¬ÒÔ¼°ËûÃÇÆ«ºÃµÄRitualsÊÐËÁºÍÕË»§ÀàÐÍ¡£¡£¡£¡£Rituals½²»°ÈËEline van MalssenÈ·ÈÏ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡µÄÊÇÅ·ÖÞºÍÓ¢¹ú¿Í»§µÄ»áÔ±Êý¾Ý£¬£¬£¬£¬£¬£¬Í¬Ê±²¿·ÖÃÀ¹ú¿Í»§Ò²Êܵ½Ó°Ïì¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬RitualsÉÐδÐÎò´Ë´ÎÍøÂç¹¥»÷µÄÏêϸÐÔ×Ó£¬£¬£¬£¬£¬£¬Ò²Î´ËµÃ÷Êý¾Ýй¶±¬·¢µÄÏêϸ·½·¨£¬£¬£¬£¬£¬£¬Í¬Ê±¾Ü¾ø¾Í¹«Ë¾ÊÇ·ñÊÕµ½ºÚ¿ÍµÄÈκÎÐÅÏ¢¡¢¸ü׼ȷµÄÊÂÎñʱ¼äÏß»òÊÜÓ°Ïì»áÔ±¼òÖ±ÇÐÈËÊý½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬£¬ÀíÓÉΪ¡°Çå¾²Ôµ¹ÊÔÓÉ¡±¡£¡£¡£¡£¾ÝÆä¹ÙÍøÏÔʾ£¬£¬£¬£¬£¬£¬RitualsµÄ»áÔ±Êý¾Ý¿âÓµÓÐÁè¼Ý4100Íò¿Í»§£¬£¬£¬£¬£¬£¬Õâ¼ÒÁãÊÛ¾ÞÍ·ÔÚ2025ÄêµÄÊÕÈëµÖ´ï24ÒÚÅ·Ôª£¨Ô¼28ÒÚÃÀÔª£©¡£¡£¡£¡£
https://techcrunch.com/2026/04/22/cosmetics-giant-rituals-confirms-data-breach-of-customer-membership-records/
4. Î÷°àÑÀµ·»Ù×î´óÎ÷ÓïÂþ»µÁ°æÆ½Ì¨Tu Manga Online
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬Î÷°àÑÀ¾¯·½¿ËÈÕµ·»ÙÁËËûÃÇËù³ÆµÄ¹æÄ£×î´óµÄÎ÷°àÑÀÓïÂþ»µÁ°æÆ½Ì¨¡£¡£¡£¡£¸Ãƽ̨×Ô2014Äê×îÏÈÔËÓª£¬£¬£¬£¬£¬£¬Ã¿ÔÂΪȫÇòÊý°ÙÍòÓû§ÌṩЧÀÍ£¬£¬£¬£¬£¬£¬Í¨¹ýÃâ·ÑÌṩÊܰæÈ¨±£»£»£»¤µÄ×÷Æ·£¬£¬£¬£¬£¬£¬²¢Ê¹Óñ¬·¢µÄÍøÂçÁ÷Á¿»ñÈ¡¹ã¸æÊÕÈë¡£¡£¡£¡£¾¯·½Í¨¸æÖÐδÃ÷È·Ìἰƽ̨Ãû³Æ£¬£¬£¬£¬£¬£¬µ«¾ÝTorrentFreak±¨µÀ£¬£¬£¬£¬£¬£¬¸Ãƽ̨ÕýÊÇ×ÅÃûµÄÎ÷°àÑÀÓïÂþ»ÍøÕ¾Tu Manga Online£¨TMO£©¡£¡£¡£¡£ÔÚ°üÀ¨º«¹ú֪ʶ²úȨ³ÖÓÐÕßÔÚÄÚµÄÖ´·¨Ñ¹Á¦Ï£¬£¬£¬£¬£¬£¬¸Ãƽ̨Òѱ»ÆÈÏÂÏß¡£¡£¡£¡£¾¯·½ÓÚ2025Äê6ÔÂÕö¿ªÊӲ죬£¬£¬£¬£¬£¬·¢Ã÷¸Ãƽ̨ͨ¹ýÆÌÌì¸ÇµØµÄµ¯´°¹ã¸æÄ²ÀûÁè¼Ý470ÍòÃÀÔª¡£¡£¡£¡£ÆäÖÐ´ó²¿·Ö¹ã¸æÎªÉ«ÇéÄÚÈÝ£¬£¬£¬£¬£¬£¬¼øÓÚ¸ÃÍøÕ¾Ðí¶à»á¼ûÕßΪδ³ÉÄêÈË£¬£¬£¬£¬£¬£¬ÕâÒ»ÇéÐÎÁîÈ˵£ÐÄ¡£¡£¡£¡£Óû§ÔÚÍøÕ¾ÉϾÙÐеÄÿ¸ö²Ù×÷°üÀ¨Ñ¡ÔñÄÚÈÝ¡¢ÔĶÁÐÎò»òä¯ÀÀĿ¼¶¼»á´¥·¢µ¯´°£¬£¬£¬£¬£¬£¬´Ó¶ø×î´ó»¯¹ã¸æÆØ¹âÂÊ¡£¡£¡£¡£¾¯·½Í¨¸æ³Æ£¬£¬£¬£¬£¬£¬×Ô2014ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬¸Ã×é֯һֱϵͳµØ¡¢Ãâ·ÑÇÒδ¾ÊÚȨµØÌṩ´ó×ÚÊÜ֪ʶ²úȨ±£»£»£»¤µÄ×÷Æ·µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¸ÃÃÅ»§ÍøÕ¾ÒѳÉΪÎ÷°àÑÀÓïÂþ»µÁ°æµÄÖ÷Òª²Î¿¼µã£¬£¬£¬£¬£¬£¬Ã¿Ô»á¼ûÁ¿´ïÊý°ÙÍò£¬£¬£¬£¬£¬£¬¾ßÓÐÏÔÖøµÄ¹ú¼ÊÓ°ÏìÁ¦£¬£¬£¬£¬£¬£¬¶Ô°æÈ¨ËùÓÐÕß¡¢³öÊéÉÌ¡¢·ÒëÖ°Ô±¼°Õû¸öÎÄ»¯¹¤ÒµÔì³ÉÁËÑÏÖØË𺦡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/spain-dismantles-major-47m-manga-piracy-platform-arrests-four/
5. Mirai½©Ê¬ÍøÂçÃé×¼ÒÑÍ£²úD-Link·ÓÉÆ÷
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬Akamai×îб¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Mirai½©Ê¬ÍøÂçÕýÔÚ¹¥»÷ÒÑÍ£²úµÄD-Link·ÓÉÆ÷£¬£¬£¬£¬£¬£¬Ê¹ÓõÄÊÇÒ»ÄêǰÅû¶µÄÏÂÁî×¢ÈëÎó²îCVE-2025-29635¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚD-Link DIR-823XϵÁзÓÉÆ÷ÖУ¬£¬£¬£¬£¬£¬Ó°Ïì¹Ì¼þ°æ±¾240126ºÍ24082¡£¡£¡£¡£Îó²î³ÉÒòÊǹ¥»÷Õ߿ɿØÖƵĺ¯ÊýÖµÔÚδÂÄÀúÖ¤µÄÇéÐÎϱ»¸´ÖÆ£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÒÔͨ¹ýÈ«ÐĽṹµÄPOSTÇëÇó¼ÓÒÔʹÓᣡ£¡£¡£AkamaiÚ¹Êͳƣ¬£¬£¬£¬£¬£¬Â·ÓÉÆ÷´ÓÇëÇóÕýÎÄÖÐÌáÈ¡×îÖÕ½øÈëÏÂÁ³åÇøµÄÖµ£¬£¬£¬£¬£¬£¬¶ø²»¼ì²éËüÀ´×ÔÄĸö±íµ¥×ֶΡ£¡£¡£¡£ÊӲ쵽µÄ¹¥»÷ʵÑéÕë¶ÔµÄÊÇÏàͬµÄ´úÂ룬£¬£¬£¬£¬£¬²¢´¥·¢ÁËÏàͬµÄϵͳŲÓ㬣¬£¬£¬£¬£¬ÕâÓëÈ¥ÄêÔÚGitHubÉÏÐû²¼ºóÒѱ»É¾³ýµÄ¿´·¨ÑéÖ¤Îó²îʹÓóÌÐòÍêȫһÖ¡£¡£¡£¡£×÷ΪִÐз¾¶µÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼ÓÔØÁËÒ»¸öshell½ÅÔÀ´ÏÂÔØ²¢ÔËÐÐÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬¸ÃÔØºÉ¾ßÓÐÐí¶àMiraiÌØÕ÷£¬£¬£¬£¬£¬£¬°üÀ¨XOR±àÂë¡¢Ó²±àÂëµÄ¿ØÖÆÌ¨Ö´ÐÐ×Ö·û´®ºÍÓ²±àÂëµÄÏÂÔØÆ÷IP¡£¡£¡£¡£ÊÜÓ°ÏìµÄD-Link DIR-823XϵÁзÓÉÆ÷ÒÑÓÚÈ¥ÄêÍ£²ú£¬£¬£¬£¬£¬£¬ÇÒ²»ÔÙ´Ó¹©Ó¦ÉÌ´¦»ñµÃÈí¼þ¸üС£¡£¡£¡£D-LinkÔçÔÚ9Ô·ݾÍÒÑ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§Í£ÓøòúÆ·£¬£¬£¬£¬£¬£¬²¢Ö¸³ö¼ÌÐøÊ¹ÓÿÉÄÜ»á¶ÔÅþÁ¬µ½¸Ã×°±¸µÄÆäËû×°±¸Ôì³ÉΣº¦¡£¡£¡£¡£
https://www.securityweek.com/mirai-botnet-targets-flaw-in-discontinued-d-link-routers/
6. npmÈ䳿¹¥»÷£º16¸öNamastex°üÔâͶ¶¾ÇÔȡƾ֤
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÕë¶ÔnpmÉú̬ϵͳµÄÐÂÐ͹©Ó¦Á´¹¥»÷ÕýÔÚÇÔÈ¡¿ª·¢Õ߯¾Ö¤£¬£¬£¬£¬£¬£¬²¢Í¨¹ý´Ó±»µÁÕË»§Ðû²¼µÄ¶ñÒâÈí¼þ°ü¾ÙÐÐÀàËÆÈ䳿µÄÈö²¥¡£¡£¡£¡£¸ÃÍþвÓÉSocketºÍStepSecurityµÄÑо¿Ö°Ô±ÔÚNamastex LabsµÄ¶à¸öÈí¼þ°üÖз¢Ã÷¡£¡£¡£¡£×èÖ¹·¢¸åʱ£¬£¬£¬£¬£¬£¬ÒÑÈ·Èϱ»¹¥ÆÆµÄNamastexÈí¼þ°ü¹²ÓÐ16¸ö¡£¡£¡£¡£ÕâЩÈí¼þ°üÖ÷ÒªÓÃÓÚAIÊðÀí¹¤¾ßºÍÊý¾Ý¿â²Ù×÷£¬£¬£¬£¬£¬£¬Òò´Ë¹¥»÷Ä¿µÄΪ¸ß¼ÛÖµÖÕ¶Ë£¬£¬£¬£¬£¬£¬¶ø·Ç´ó¹æÄ£Ñ¬È¾¡£¡£¡£¡£×¢ÈëµÄ¶ñÒâ´úÂë»áÍøÂçÓëÖÖÖÖÉñÃØÏà¹ØµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ÁîÅÆ¡¢APIÃÜÔ¿¡¢SSHÃÜÔ¿¡¢ÔÆÐ§ÀÍÆ¾Ö¤¡¢CI/CDϵͳƾ֤¡¢×¢²á±í¼°LLMƽ̨ƾ֤£¬£¬£¬£¬£¬£¬ÒÔ¼°Kubernetes/DockerÉèÖᣡ£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ëü»¹»áʵÑéÌáÈ¡ChromeºÍFirefoxä¯ÀÀÆ÷Öд洢µÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬º¸ÇMetaMask¡¢Exodus¡¢Atomic WalletºÍPhantomµÈ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£StepSecurityÖ¸³ö£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þʵÖÊÉÏÊÇÒ»ÖÖ¡°¹©Ó¦Á´È䳿¡±¡£¡£¡£¡£ËüÄܹ»Ñ°ÕÒÓÃÓÚnpmÐû²¼µÄÁîÅÆ£¬£¬£¬£¬£¬£¬²¢½«×ÔÉí×¢Èëµ½¸ÃÁîÅÆÓÐȨÐû²¼µÄÿһ¸öÈí¼þ°üÖУ¬£¬£¬£¬£¬£¬´Ó¶øÊµÏÖ½øÒ»²½Èö²¥¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/


¾©¹«Íø°²±¸11010802024551ºÅ