KyberÀÕË÷Èí¼þ˫ƽ̨¹¥»÷£¬£¬£¬ £¬£¬£¬ºÅ³ÆºóÁ¿×Ó¼ÓÃÜ

Ðû²¼Ê±¼ä 2026-04-23

1. KyberÀÕË÷Èí¼þ˫ƽ̨¹¥»÷£¬£¬£¬ £¬£¬£¬ºÅ³ÆºóÁ¿×Ó¼ÓÃÜ


4ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Rapid7ÔÚ2026Äê3ÔµÄÒ»´ÎÇå¾²ÊÂÎñÏìÓ¦ÖУ¬£¬£¬ £¬£¬£¬·¢Ã÷²¢ÆÊÎöÁËÒ»ÖÖÃûΪKyberµÄÐÂÐÍÀÕË÷Èí¼þ¡£¡£¡£ ¡£¸ÃÀÕË÷Èí¼þͬʱ¾ß±¸Õë¶ÔWindowsϵͳºÍVMware ESXiÐéÄ⻯ƽ̨µÄÁ½¸ö²î±ð±äÖÖ£¬£¬£¬ £¬£¬£¬ÇÒÓÉͳһ¸öÀÕË÷Èí¼þ¹ØÁª×éÖ¯°²ÅÅÔÚÍ³Ò»ÍøÂçÖУ¬£¬£¬ £¬£¬£¬Òâͼͨ¹ýͬ²½¼ÓÃÜËùÓÐЧÀÍÆ÷ÒÔ×î´ó»¯ÆÆËðЧ¹û¡£¡£¡£ ¡£Á½¸ö±äÖÖ¹²ÏíÏàͬµÄ»î¶¯IDºÍ»ùÓÚTorµÄÀÕË÷»ù´¡ÉèÊ©¡£¡£¡£ ¡£ÆäÖУ¬£¬£¬ £¬£¬£¬ESXi±äÖÖרÃÅÕë¶ÔVMwareÇéÐι¹½¨£¬£¬£¬ £¬£¬£¬Äܹ»Ã¶¾ÙËùÓÐÐéÄâ»ú¡¢¼ÓÃÜÊý¾Ý´æ´¢Îļþ£¬£¬£¬ £¬£¬£¬²¢ÓÃÀÕË÷ÐŸĶ¯ESXiÖÎÀí½çÃæ£¬£¬£¬ £¬£¬£¬Ö¸µ¼Êܺ¦ÕßÍê³ÉÊê½ðÖ§¸¶Á÷³Ì¡£¡£¡£ ¡£¸Ã±äÖÖÉù³Æ½ÓÄÉÁËKyber1024ºóÁ¿×Ó¼ÓÃÜÊÖÒÕ£¬£¬£¬ £¬£¬£¬µ«Rapid7ÆÊÎö·¢Ã÷Õâһ˵·¨²¢²»Êôʵ£¬£¬£¬ £¬£¬£¬ESXi±äÖÖÏÖʵʹÓÃChaCha8¾ÙÐÐÎļþ¼ÓÃÜ£¬£¬£¬ £¬£¬£¬²¢Ê¹ÓÃRSA-4096¾ÙÐÐÃÜÔ¿·â×°¡£¡£¡£ ¡£Ïà±È֮ϣ¬£¬£¬ £¬£¬£¬Windows±äÖÖÓÃRust±àд£¬£¬£¬ £¬£¬£¬ÊÖÒÕʵÏÖ¸üΪ³ÉÊì¡£¡£¡£ ¡£ËüȷʵʵÏÖÁËKyber1024ºÍX25519ÃÜÔ¿±£»£»£»¤»úÖÆ£¬£¬£¬ £¬£¬£¬ÓëÀÕË÷ÐÅÖеÄÉùÃ÷Ò»Ö¡£¡£¡£ ¡£Ïêϸ¶øÑÔ£¬£¬£¬ £¬£¬£¬Kyber1024ÓÃÓÚ±£»£»£»¤¶Ô³ÆÃÜÔ¿ÖÊÁÏ£¬£¬£¬ £¬£¬£¬¶øAES-CTRÔòÈÏÕæÅúÁ¿Êý¾Ý¼ÓÃÜ¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows/


2. HarvesterÓÃGoGraºóÃÅÀÄÓÃ΢ÈíÔÆAPIʵÑé¹¥»÷


4ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßHarvester±»Ö¸Ê¹ÓÃÁËаæLinux°æ±¾µÄGoGraºóÃÅ£¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÔÚVirusTotalƽ̨ÉÏ·¢Ã÷ÁËÀ´×ÔÓ¡¶ÈºÍ°¢¸»º¹µÄ¶ñÒâÈí¼þÑù±¾£¬£¬£¬ £¬£¬£¬Åú×¢ÕâÁ½¸ö¹ú¼Ò¿ÉÄÜÊÇÌØ¹¤»î¶¯µÄÄ¿µÄ¡£¡£¡£ ¡£×îз¢Ã÷Åú×¢£¬£¬£¬ £¬£¬£¬HarvesterÕýÔÚ¼ÌÐøÀ©Õ¹Æä¹¤¾ß¼¯£¬£¬£¬ £¬£¬£¬Ê¹Æä²»ÔÙ¾ÖÏÞÓÚWindowsϵͳ£¬£¬£¬ £¬£¬£¬¶øÊÇʹÓÃͳһºóÃųÌÐòµÄбäÖÖѬȾLinuxϵͳ¡£¡£¡£ ¡£¹¥»÷ʹÓÃÉç»á¹¤³ÌѧÊÖ¶ÎÓÕÆ­Êܺ¦Õß·­¿ªÎ±×°³ÉPDFÎĵµµÄELF¶þ½øÖÆÎļþ¡£¡£¡£ ¡£¹¥»÷ÕßËæºó»áÏÔʾÓÕ¶üÎĵµ£¬£¬£¬ £¬£¬£¬Í¬Ê±ÇÄÇÄÔËÐкóÃųÌÐò¡£¡£¡£ ¡£ÓëWindows°æ±¾ÀàËÆ£¬£¬£¬ £¬£¬£¬Linux°æGoGraÒ²ÀÄÓÃ΢ÈíµÄÔÆ»ù´¡ÉèÊ©£¬£¬£¬ £¬£¬£¬Ê¹Óÿª·ÅÊý¾ÝЭÒéÅÌÎÊ£¬£¬£¬ £¬£¬£¬Ã¿Á½ÃëÖÓÏòÒ»¸öÃûΪ¡°Zomato Pizza¡±µÄÌØ¶¨OutlookÓÊÏäÎļþ¼Ð·¢ËÍÒ»´ÎÇëÇ󡣡£¡£ ¡£¸ÃºóÃųÌÐò»áɨÃèÊÕ¼þÏ䣬£¬£¬ £¬£¬£¬²éÕÒÖ÷ÌâÐÐÒÔ¡°Input¡±¿ªÍ·µÄµç×ÓÓʼþ¡£¡£¡£ ¡£Ò»µ©ÊÕµ½ÇкÏÌõ¼þµÄÓʼþ£¬£¬£¬ £¬£¬£¬³ÌÐò»á½âÃÜBase64±àÂëµÄÓʼþÕýÎÄ£¬£¬£¬ £¬£¬£¬²¢Ê¹Óá°/bin/bash¡±½«Æä×÷ΪshellÏÂÁîÖ´ÐС£¡£¡£ ¡£Ö´ÐÐЧ¹û»áÒÔÖ÷ÌâΪ¡°Output¡±µÄµç×ÓÓʼþÐÎʽ·¢Ë͸ø²Ù×÷Ô±¡£¡£¡£ ¡£Êý¾ÝÇÔÈ¡Íê³Éºó£¬£¬£¬ £¬£¬£¬Ö²Èë³ÌÐò»áɨ³ýԭʼʹÃüÓʼþÒÔÑÚÊκۼ£¡£¡£¡£ ¡£


https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html


3. RitualsÔâºÚ¿Í¹¥»÷£¬£¬£¬ £¬£¬£¬³¬4100Íò»áÔ±Êý¾Ýй¶


4ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬×ܲ¿Î»ÓÚºÉÀ¼µÄ»¯×±Æ·¾ÞÍ·Rituals¿ËÈÕ֤ʵ£¬£¬£¬ £¬£¬£¬ºÚ¿Í´ÓÆä»áÔ±Êý¾Ý¿âÖÐÇÔÈ¡ÁË´ó×ÚÊý¾Ý£¬£¬£¬ £¬£¬£¬µ¼Ö¿ͻ§Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£ ¡£RitualsÌåÏÖ£¬£¬£¬ £¬£¬£¬ËûÃÇÔÚ4Ô·ݷ¢Ã÷ÁËÒ»Æð¡°Î´¾­ÊÚȨÏÂÔØ¡±»áÔ±Êý¾ÝµÄÊÂÎñ£¬£¬£¬ £¬£¬£¬±»ÇÔÐÅÏ¢°üÀ¨¿Í»§µÄÈ«Ãû¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢ÓÊÕþµØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ룬£¬£¬ £¬£¬£¬ÒÔ¼°ËûÃÇÆ«ºÃµÄRitualsÊÐËÁºÍÕË»§ÀàÐÍ¡£¡£¡£ ¡£Rituals½²»°ÈËEline van MalssenÈ·ÈÏ£¬£¬£¬ £¬£¬£¬ºÚ¿ÍÇÔÈ¡µÄÊÇÅ·ÖÞºÍÓ¢¹ú¿Í»§µÄ»áÔ±Êý¾Ý£¬£¬£¬ £¬£¬£¬Í¬Ê±²¿·ÖÃÀ¹ú¿Í»§Ò²Êܵ½Ó°Ïì¡£¡£¡£ ¡£×èÖ¹ÏÖÔÚ£¬£¬£¬ £¬£¬£¬RitualsÉÐδÐÎò´Ë´ÎÍøÂç¹¥»÷µÄÏêϸÐÔ×Ó£¬£¬£¬ £¬£¬£¬Ò²Î´ËµÃ÷Êý¾Ýй¶±¬·¢µÄÏêϸ·½·¨£¬£¬£¬ £¬£¬£¬Í¬Ê±¾Ü¾ø¾Í¹«Ë¾ÊÇ·ñÊÕµ½ºÚ¿ÍµÄÈκÎÐÅÏ¢¡¢¸ü׼ȷµÄÊÂÎñʱ¼äÏß»òÊÜÓ°Ïì»áÔ±¼òÖ±ÇÐÈËÊý½ÒÏþ̸ÂÛ£¬£¬£¬ £¬£¬£¬ÀíÓÉΪ¡°Çå¾²Ôµ¹ÊÔ­ÓÉ¡±¡£¡£¡£ ¡£¾ÝÆä¹ÙÍøÏÔʾ£¬£¬£¬ £¬£¬£¬RitualsµÄ»áÔ±Êý¾Ý¿âÓµÓÐÁè¼Ý4100Íò¿Í»§£¬£¬£¬ £¬£¬£¬Õâ¼ÒÁãÊÛ¾ÞÍ·ÔÚ2025ÄêµÄÊÕÈëµÖ´ï24ÒÚÅ·Ôª£¨Ô¼28ÒÚÃÀÔª£©¡£¡£¡£ ¡£


https://techcrunch.com/2026/04/22/cosmetics-giant-rituals-confirms-data-breach-of-customer-membership-records/


4. Î÷°àÑÀµ·»Ù×î´óÎ÷ÓïÂþ»­µÁ°æÆ½Ì¨Tu Manga Online


4ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬Î÷°àÑÀ¾¯·½¿ËÈÕµ·»ÙÁËËûÃÇËù³ÆµÄ¹æÄ£×î´óµÄÎ÷°àÑÀÓïÂþ»­µÁ°æÆ½Ì¨¡£¡£¡£ ¡£¸Ãƽ̨×Ô2014Äê×îÏÈÔËÓª£¬£¬£¬ £¬£¬£¬Ã¿ÔÂΪȫÇòÊý°ÙÍòÓû§ÌṩЧÀÍ£¬£¬£¬ £¬£¬£¬Í¨¹ýÃâ·ÑÌṩÊܰæÈ¨±£»£»£»¤µÄ×÷Æ·£¬£¬£¬ £¬£¬£¬²¢Ê¹Óñ¬·¢µÄÍøÂçÁ÷Á¿»ñÈ¡¹ã¸æÊÕÈë¡£¡£¡£ ¡£¾¯·½Í¨¸æÖÐδÃ÷È·Ìἰƽ̨Ãû³Æ£¬£¬£¬ £¬£¬£¬µ«¾ÝTorrentFreak±¨µÀ£¬£¬£¬ £¬£¬£¬¸Ãƽ̨ÕýÊÇ×ÅÃûµÄÎ÷°àÑÀÓïÂþ»­ÍøÕ¾Tu Manga Online£¨TMO£©¡£¡£¡£ ¡£ÔÚ°üÀ¨º«¹ú֪ʶ²úȨ³ÖÓÐÕßÔÚÄÚµÄÖ´·¨Ñ¹Á¦Ï£¬£¬£¬ £¬£¬£¬¸Ãƽ̨Òѱ»ÆÈÏÂÏß¡£¡£¡£ ¡£¾¯·½ÓÚ2025Äê6ÔÂÕö¿ªÊӲ죬£¬£¬ £¬£¬£¬·¢Ã÷¸Ãƽ̨ͨ¹ýÆÌÌì¸ÇµØµÄµ¯´°¹ã¸æÄ²ÀûÁè¼Ý470ÍòÃÀÔª¡£¡£¡£ ¡£ÆäÖÐ´ó²¿·Ö¹ã¸æÎªÉ«ÇéÄÚÈÝ£¬£¬£¬ £¬£¬£¬¼øÓÚ¸ÃÍøÕ¾Ðí¶à»á¼ûÕßΪδ³ÉÄêÈË£¬£¬£¬ £¬£¬£¬ÕâÒ»ÇéÐÎÁîÈ˵£ÐÄ¡£¡£¡£ ¡£Óû§ÔÚÍøÕ¾ÉϾÙÐеÄÿ¸ö²Ù×÷°üÀ¨Ñ¡ÔñÄÚÈÝ¡¢ÔĶÁÐÎò»òä¯ÀÀĿ¼¶¼»á´¥·¢µ¯´°£¬£¬£¬ £¬£¬£¬´Ó¶ø×î´ó»¯¹ã¸æÆØ¹âÂÊ¡£¡£¡£ ¡£¾¯·½Í¨¸æ³Æ£¬£¬£¬ £¬£¬£¬×Ô2014ÄêÒÔÀ´£¬£¬£¬ £¬£¬£¬¸Ã×é֯һֱϵͳµØ¡¢Ãâ·ÑÇÒδ¾­ÊÚȨµØÌṩ´ó×ÚÊÜ֪ʶ²úȨ±£»£»£»¤µÄ×÷Æ·µÄ»á¼ûȨÏÞ¡£¡£¡£ ¡£¸ÃÃÅ»§ÍøÕ¾ÒѳÉΪÎ÷°àÑÀÓïÂþ»­µÁ°æµÄÖ÷Òª²Î¿¼µã£¬£¬£¬ £¬£¬£¬Ã¿Ô»á¼ûÁ¿´ïÊý°ÙÍò£¬£¬£¬ £¬£¬£¬¾ßÓÐÏÔÖøµÄ¹ú¼ÊÓ°ÏìÁ¦£¬£¬£¬ £¬£¬£¬¶Ô°æÈ¨ËùÓÐÕß¡¢³öÊéÉÌ¡¢·­ÒëÖ°Ô±¼°Õû¸öÎÄ»¯¹¤ÒµÔì³ÉÁËÑÏÖØË𺦡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/spain-dismantles-major-47m-manga-piracy-platform-arrests-four/


5. Mirai½©Ê¬ÍøÂçÃé×¼ÒÑÍ£²úD-Link·ÓÉÆ÷


4ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬Akamai×îб¨¸æÖ¸³ö£¬£¬£¬ £¬£¬£¬Mirai½©Ê¬ÍøÂçÕýÔÚ¹¥»÷ÒÑÍ£²úµÄD-Link·ÓÉÆ÷£¬£¬£¬ £¬£¬£¬Ê¹ÓõÄÊÇÒ»ÄêǰÅû¶µÄÏÂÁî×¢ÈëÎó²îCVE-2025-29635¡£¡£¡£ ¡£¸ÃÎó²î±£´æÓÚD-Link DIR-823XϵÁзÓÉÆ÷ÖУ¬£¬£¬ £¬£¬£¬Ó°Ïì¹Ì¼þ°æ±¾240126ºÍ24082¡£¡£¡£ ¡£Îó²î³ÉÒòÊǹ¥»÷Õ߿ɿØÖƵĺ¯ÊýÖµÔÚδÂÄÀúÖ¤µÄÇéÐÎϱ»¸´ÖÆ£¬£¬£¬ £¬£¬£¬²¢ÇÒ¿ÉÒÔͨ¹ýÈ«ÐĽṹµÄPOSTÇëÇó¼ÓÒÔʹÓᣡ£¡£ ¡£AkamaiÚ¹ÊͳÆ£¬£¬£¬ £¬£¬£¬Â·ÓÉÆ÷´ÓÇëÇóÕýÎÄÖÐÌáÈ¡×îÖÕ½øÈëÏÂÁ³åÇøµÄÖµ£¬£¬£¬ £¬£¬£¬¶ø²»¼ì²éËüÀ´×ÔÄĸö±íµ¥×ֶΡ£¡£¡£ ¡£ÊӲ쵽µÄ¹¥»÷ʵÑéÕë¶ÔµÄÊÇÏàͬµÄ´úÂ룬£¬£¬ £¬£¬£¬²¢´¥·¢ÁËÏàͬµÄϵͳŲÓ㬣¬£¬ £¬£¬£¬ÕâÓëÈ¥ÄêÔÚGitHubÉÏÐû²¼ºóÒѱ»É¾³ýµÄ¿´·¨ÑéÖ¤Îó²îʹÓóÌÐòÍêȫһÖ¡£¡£¡£ ¡£×÷ΪִÐз¾¶µÄÒ»²¿·Ö£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¼ÓÔØÁËÒ»¸öshell½ÅÔ­À´ÏÂÔØ²¢ÔËÐÐÓÐÓÃÔØºÉ£¬£¬£¬ £¬£¬£¬¸ÃÔØºÉ¾ßÓÐÐí¶àMiraiÌØÕ÷£¬£¬£¬ £¬£¬£¬°üÀ¨XOR±àÂë¡¢Ó²±àÂëµÄ¿ØÖÆÌ¨Ö´ÐÐ×Ö·û´®ºÍÓ²±àÂëµÄÏÂÔØÆ÷IP¡£¡£¡£ ¡£ÊÜÓ°ÏìµÄD-Link DIR-823XϵÁзÓÉÆ÷ÒÑÓÚÈ¥ÄêÍ£²ú£¬£¬£¬ £¬£¬£¬ÇÒ²»ÔÙ´Ó¹©Ó¦ÉÌ´¦»ñµÃÈí¼þ¸üС£¡£¡£ ¡£D-LinkÔçÔÚ9Ô·ݾÍÒÑ·¢³öÖÒÑÔ£¬£¬£¬ £¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§Í£ÓøòúÆ·£¬£¬£¬ £¬£¬£¬²¢Ö¸³ö¼ÌÐøÊ¹ÓÿÉÄÜ»á¶ÔÅþÁ¬µ½¸Ã×°±¸µÄÆäËû×°±¸Ôì³ÉΣº¦¡£¡£¡£ ¡£


https://www.securityweek.com/mirai-botnet-targets-flaw-in-discontinued-d-link-routers/


6. npmÈ䳿¹¥»÷£º16¸öNamastex°üÔâͶ¶¾ÇÔȡƾ֤


4ÔÂ22ÈÕ£¬£¬£¬ £¬£¬£¬Ò»ÖÖÕë¶ÔnpmÉú̬ϵͳµÄÐÂÐ͹©Ó¦Á´¹¥»÷ÕýÔÚÇÔÈ¡¿ª·¢Õ߯¾Ö¤£¬£¬£¬ £¬£¬£¬²¢Í¨¹ý´Ó±»µÁÕË»§Ðû²¼µÄ¶ñÒâÈí¼þ°ü¾ÙÐÐÀàËÆÈ䳿µÄÈö²¥¡£¡£¡£ ¡£¸ÃÍþвÓÉSocketºÍStepSecurityµÄÑо¿Ö°Ô±ÔÚNamastex LabsµÄ¶à¸öÈí¼þ°üÖз¢Ã÷¡£¡£¡£ ¡£×èÖ¹·¢¸åʱ£¬£¬£¬ £¬£¬£¬ÒÑÈ·Èϱ»¹¥ÆÆµÄNamastexÈí¼þ°ü¹²ÓÐ16¸ö¡£¡£¡£ ¡£ÕâЩÈí¼þ°üÖ÷ÒªÓÃÓÚAIÊðÀí¹¤¾ßºÍÊý¾Ý¿â²Ù×÷£¬£¬£¬ £¬£¬£¬Òò´Ë¹¥»÷Ä¿µÄΪ¸ß¼ÛÖµÖÕ¶Ë£¬£¬£¬ £¬£¬£¬¶ø·Ç´ó¹æÄ£Ñ¬È¾¡£¡£¡£ ¡£×¢ÈëµÄ¶ñÒâ´úÂë»áÍøÂçÓëÖÖÖÖÉñÃØÏà¹ØµÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬£¬°üÀ¨ÁîÅÆ¡¢APIÃÜÔ¿¡¢SSHÃÜÔ¿¡¢ÔÆÐ§ÀÍÆ¾Ö¤¡¢CI/CDϵͳƾ֤¡¢×¢²á±í¼°LLMƽ̨ƾ֤£¬£¬£¬ £¬£¬£¬ÒÔ¼°Kubernetes/DockerÉèÖᣡ£¡£ ¡£±ðµÄ£¬£¬£¬ £¬£¬£¬Ëü»¹»áʵÑéÌáÈ¡ChromeºÍFirefoxä¯ÀÀÆ÷Öд洢µÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬£¬º­¸ÇMetaMask¡¢Exodus¡¢Atomic WalletºÍPhantomµÈ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£ ¡£StepSecurityÖ¸³ö£¬£¬£¬ £¬£¬£¬¸Ã¶ñÒâÈí¼þʵÖÊÉÏÊÇÒ»ÖÖ¡°¹©Ó¦Á´È䳿¡±¡£¡£¡£ ¡£ËüÄܹ»Ñ°ÕÒÓÃÓÚnpmÐû²¼µÄÁîÅÆ£¬£¬£¬ £¬£¬£¬²¢½«×ÔÉí×¢Èëµ½¸ÃÁîÅÆÓÐȨÐû²¼µÄÿһ¸öÈí¼þ°üÖУ¬£¬£¬ £¬£¬£¬´Ó¶øÊµÏÖ½øÒ»²½Èö²¥¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/