AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽ°²È«¾¯±¨
°ä²¼¹¦·ò 2026-03-031. AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽ°²È«¾¯±¨
3ÔÂ2ÈÕ£¬×êÑÐÈËÔ±½üÈÕÖҸ棬һ³¡Õë¶ÔÈ«ÇòÊý°Ų̀Fortinet FortiGate·À»ðǽµÄ´ó¹æÄ£¹¥»÷ÊÂÎñÖУ¬ÍþвÐÐΪÕßʹÓÃÁËÃûΪCyberStrikeAIµÄÐÂÐÍ¿ªÔ´AI°²È«²âÊÔÆ½Ì¨¡£¸Ãƽ̨ÓÉ»¯Ãû"Ed1s0nZ"µÄ¿ª·¢Õß´´½¨£¬ÆäGitHub´úÂë¿âÏÔʾÆäΪ"ÓÃGo˵»°¹¹½¨µÄAIÔÉú°²È«²âÊÔÆ½Ì¨"£¬¼¯³É100ÓàÖÖ°²È«¹¤¾ß£¬Ô̺¬ÖÇÄܱàÅÅÒýÇæ¡¢Ô¤Ô¼Ò尲ȫ½ÇÉ«¼°¼¼Êõϵͳ£¬Ö§³ÖGPT¡¢ClaudeµÈÄ£ÐÍÇý¶¯µÄ¾ö²ßÒýÇæ£¬²¢½¨ÉèÃÜÂë±£»¤µÄWeb½çÃæÓëÉó¼ÆÈÕÖ¾Ö°ÄÜ¡£¾ÝTeam Cymru¸ß¼¶Íþвµý±¨ÕÕ·÷Will Thomas·ÖÎö£¬¹¥»÷ÕßʹÓõÄ212.11.64[.]250·þÎñÆ÷ÔÚ8080¶Ë¿ÚÔËÐÐCyberStrikeAI·þÎñ£¬¸ÃIPÓë±»¹¥ÆÆµÄFortiGateÉ豸´æÔÚÍøÂçͨѶ¼Í¼£¬×îºóÒ»´Î»î¶¯¼Í¼Ϊ2026Äê1ÔÂ30ÈÕ¡£¸Ã¹¤¾ßͨ¹ýÔÉúMCPºÍ̸ʵÏÖ´Ó¶Ô»°Ê½ºÅÁîµ½·ì϶·¢ÏÖ¡¢¹¥»÷Á´·ÖÎö¡¢Á˾ֿÉÊÓ»¯µÄÈ«Á÷³Ì×Ô¶¯»¯£¬Ö§³ÖÍøÂçɨÃ裨nmap£©¡¢·ì϶ÀûÓã¨metasploit£©¡¢ÃÜÂëÆÆ½â£¨hashcat£©µÈÆëÈ«¹¥»÷Á´²Ù×÷£¬Ê¹µÍ¼¼Êõ¹¥»÷ÕßÒ²ÄÜÖ´Ðи´ÔÓ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/
2. Ö¥¼Ó¸çInsightÒ½Ôº360GBÃô¸ÐÐÅÏ¢Ôâй¶
3ÔÂ2ÈÕ£¬Ö¥¼Ó¸çInsightÒ½ÔººÍÒ½ÁÆÖÐÐÄ2026Äê1ÔÂ26ÈÕ°ä²¼´úÌæÍ¨Öª£¬Åû¶ÆäÓÚ2025Äê9Ô¼ì²âµ½ÍøÂçÒì³£»î¶¯£¬¾µ÷²éÈ·ÈÏ£¬2025Äê8ÔÂ22ÈÕÖÁ9ÔÂ11ÈÕÆÚ¼ä£¬Ò»Ãûδ¾ÊÚȨÈËÔ±½Ó¼ûÁ˸ûú¹¹ÍøÂ硣ָ֪ͨ³ö£¬¿ÉÄÜй¶µÄÐÅÏ¢ÀàÐͺ¸ÇÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢¼ÝÊ»ÅÆÕÕ/»¤ÕÕºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¼°Ò½ÖÎÓйØÊý¾Ý£¨º¬½¡È«±£ÏÕÐÅÏ¢£©£¬µ«½ØÖÁ֪ͨ°ä²¼Ê±£¬InsightÉÐδÆô¶¯¶ÔÊÜÓ°ÏìÓ×ÎÒµÄ֪ͨ·¨Ê½£¬ÒàδÌá¼°ÌṩÃâ·ÑÉí·ÝµÁÓûº½â·þÎñ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬2026Äê2ÔÂ24ÈÕ£¬×Գơ°°×ÒÏ¡±£¨Termite£©µÄÍþв×éÖ¯½«InsightÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾£¬Ðû³ÆÒÑ»ñȡԼ360GB£¨Ô¼90Íò¸öÎļþ£©µÄ¡°»úÃÜÊý¾Ý¡±£¬²¢·Ö¶àÅú´Îй¶£¬ÆäÖÐÔ̺¬´óÁ¿.jpegºÍ.dcmÌåʽÎļþ¡£Ä¿Ç°Éв»Ã÷ÏÔInsightÊÇ·ñÓë¸Ã×éÖ¯½øÐйý½Ó´¥»ò½»Éæ¡£
https://databreaches.net/2026/03/02/data-from-insight-hospital-and-medical-center-leaked-on-dark-web/
3. α¹È¸è°²È«Ò³´¹µö£ºPWAÇÔÈ¡OTP¼°¼ÓÃÜÇ®±Ò
3ÔÂ2ÈÕ£¬½üÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶һÖÖÀûÓÃαÔì¹È¸è°²È«Ò³ÃæµÄÍøÂç´¹µö¹¥»÷£¬¸Ã¹¥»÷ͨ¹ý½¥½øÊ½WebÀûÓã¨PWA£©¼¼ÊõÇÔÈ¡Óû§Ò»´ÎÐÔÃÜÂ루OTP£©¡¢¼ÓÃÜÇ®±ÒÇ®°üµØÖ·£¬²¢½«Êܺ¦Õßä¯ÀÀÆ÷ת»¯Îª¹¥»÷ÕßÁ÷Á¿´úÀí¡£¹¥»÷Õßͨ¹ýÓòÃûgoogle-prism[.]com¼Ù×°³É¹È¸èºÏ·¨°²È«·þÎñ£¬ÓÕµ¼Óû§ÊµÏÖËIJ½ÉèÖÃÁ÷³Ì£¬Ô̺¬ÊÚÓè¸ß·çÏÕȨÏÞºÍ×°ÖöñÒâPWAÀûÓ᣸ÃPWAÔÚä¯ÀÀÆ÷ÖÐÒÔ¶ÀÁ¢ÀûÓôó¾ÖÔËÐУ¬Î޿ɼûä¯ÀÀÆ÷¿Ø¼þ£¬ÀûÓÃÉç»á¹¤³Ì¼¿Á©ºýŪÓû§ÏàÐÅÆäÔÚ½øÐа²È«²é³»òÉ豸±£»¤²Ù×÷¡£¶ñÒâPWA¾ß±¸¶àÏî¸ßΣְÄÜ£º¿ÉÇÔÈ¡ÁªÏµÈË¡¢ÊµÊ±GPSÊý¾Ý¡¢¼ôÌù°åÄÚÈÝ£¬²¢Í¨¹ýWebOTP APIÀ¹½Ø¶ÌÐÅÑéÖ¤Â룻Æä·þÎñ¹¤×÷Ïß³ÌÖ§³ÖÍÆËÍ֪ͨ¡¢Ö´Ðкó¶Ü¹¤×÷¼°±íйÊý¾Ý£»WebSocketÖмÌÖ°ÄܸüÔÊÐí¹¥»÷Õßͨ¹ýÊܺ¦Õßä¯ÀÀÆ÷·ÓÉHTTPÒªÇ󣬷ÂÕÕÆäÍøÂç»î¶¯¡£´Ë±í£¬¹¥»÷Õßÿ30Ãëͨ¹ý/api/heartbeat²é³ÐºÅÁ²¢Í¨¹ýÐéα°²È«¾¯±¨ÓÕµ¼Óû§³Áдò¿ªPWAÒÔ³ÖÐøÇÔÈ¡Êý¾Ý¡£
https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/
4. °Í»ù˹̹Ö÷Á÷ÐÂÎÅÆµÂ·ÔâºÚ¿Í¹¥»÷
3ÔÂ2ÈÕ£¬°Í»ù˹̹Èý´óÖ÷Á÷ÐÂÎÅÆµÂ·Geo News¡¢ARY NewsºÍSamaa TV 3ÔÂ1ÈÕÍí¼äÔâ·êÑϳÁ°²È«·ì϶£¬Õý³£½ÚÄ¿ÔÚ¿ªÕ«·¹ºóµÄ»Æ½ðʱ¶Î£¨Íí9µãǰºó£©±»Î´¾ÊÚȨÐÅÏ¢Öжϡ£Geo News°ä²¼ÉêÃ÷֤ʵ£¬Æäͨ¹ýPakSatÎÀÐÇ´«ÊäµÄÐźÅÔâ²»Ã÷Éí·ÝºÚ¿Í¹¥»÷£¬½ÚÄ¿³ÖÐøÖжϲ¢³öÏÖÕë¶Ô°Í»ù˹̹Îä×°¶ÓÁеĹÄÀøÐÔÄÚÈÝ£¬Ô̺¬ºôÓõÃñ¶à·´¿¹¾ü·½¡¢Ö¸¿Ø¾ü¶Ó¡°·ÛËé¹ú¶È¡±µÈÖ±½Ó°áŪÓßÂÛ¡£Õâ´Î¹¥»÷ͨ¹ý½ÚÔìÎÀÐÇÐźźÍÖ±²¥Á÷ʵÏÖ£¬ºÚ¿ÍÔÚÆÁÄ»ÉÏչʾÓëÆµÂ·ÄÚÈÝÎ޹صÄÎÄ×Ö£¬Æä¹æÄ£ºÍÕë¶ÔÐÔÅú×¢ÕâÊÇÒ»´Îе÷Ðж¯¡£Ö»¹Ü²¿Ãű¨Â·´§Ä¦¹¥»÷¿ÉÄÜÉæ¼°°¢¸»º¹ºÚ¿Í£¬µ«ÉÐδÓÐÈ·ÔäÖ¤¾Ý¡£×÷Ϊ»ØÓ¦£¬°Í»ù˹̹±»Ö¸ÌáÒéÍøÂç»Ø»÷£¬Ô̺¬¶ÔÓ¡¶ÈABPÐÂÎÅÆµÂ·ºÍFood OdishaÍøÕ¾µÄDDoS¹¥»÷¼°ÈëÇÖÐж¯£¬ºÚ¿ÍÉõÖÁÀûÓÃÖ±²¥ÐźŲ¥·Å°Í»ù˹̹½¾üÕÕ·÷³¤µÄ½²»°¡£Õâ´ÎÊÂÎñ»¹²¨¼°19¸ö¹ú¶ÈµÄÍøÕ¾£¬ºÚ¿Í±»ÆØÔÚÕâÐ©ÍøÕ¾Í¶·Åδ¾ÊÚȨµÄ¹È¸è¸æ°×¡£Geo News°µÊ¾£¬¸ÃƵ·ÓëºÚ¿ÍÆ¥µÐ½ü24Ó×ʱºó²Å¸´Ô½ÚÔ죬ǿµ÷Óк¦ÐÅÏ¢ÆëÈ«ÓÉ±í²¿È¨ÊÆÖ²Èë¡£
https://hackread.com/pakistan-news-channels-hacked-anti-military-messages/
5. ÃÀµ±¾ÖÓëAnthropic AIʹÓÃÕùÒéÉý¼¶
2ÔÂ28ÈÕ£¬ÃÀ¹ú¹ú·À²¿³¤ºÕ¸ñÈû˼½«AnthropicÁÐΪ¡°¹©¸øÁ´·çÏÕ¡±ºó£¬Ë«·½ÝÓÈÆAIÄ£ÐÍClaudeµÄ¾üÊÂÀûÓ÷¢×÷Ç¿ÁÒì¶Ü¡£AnthropicǿӲ»ØÓ¦³Æ£¬´Ë¾ÙÔ´ÓÚÊýÔ½»É潩¾Ö£¬Æä¶ÔÖÅΪClaudeµÄºÏ·¨Ê¹ÓÃÔöÉèÁ½ÏîÀý±í£¬²»ÈÝÓÃÓÚÃÀ¹úÃñ¶à´ó¹æÄ£¹úÄÚ¼à¿ØÓëÆëÈ«×ÔÖ÷±øÆ÷£¬²¢Ç¿µ÷¡°ÎÞÂÛÎå½Ç´ó¥ʩ¼ÓºÎÖÖ¿ÖÏÅ£¬¶¼²»»áŤת̬¶È¡±¡£ÌØÀÊÆÕµ±¾ÖѸËÙ²ÉÈ¡Ðж¯£¬ÒªÇóÁª¹ú»ú¹¹Áù¸öÔÂÄÚÍ£ÓÃAnthropic¼¼Êõ£¬ºÕ¸ñÈû˼½øÒ»²½Ö¸ÁîÃÀ¾ü³Ð°üÉÌ¡¢¹©¸øÉ̼°ºÏ×÷ͬ°éÁ¢¼´ÖÕÖ¹ÓëAnthropicµÄóÒ׺Ï×÷¡£Îå½Ç´óÂ¥Ðû³Æ£¬´Ë¾ÙÖ¼ÔÚ´òÔì¡°AIÓÅÏÈ¡±×÷Õ½¶ÓÁУ¬ÒªÇóAIÄ£ÐÍÎÞʹÓÃÕþ²ßÏÞ¶È¡¢²»¹ÊÕϺϷ¨¾üÊÂÀûÓ㬲¢Ôð¹ÖAnthropicµÄ̬¶È¡°Î£¼°¹Ø¼ü¾üÊÂÐж¯¡±¡£Anthropic±ç²µ³Æ£¬Îå½Ç´óÂ¥µÄÒªÇó²»×ã˾·¨Æ¾¾Ý£¬½«¿ª´´Î£ÏÕÏÈÀý¡£¹«Ë¾Ç¿µ÷£¬ÆäÖ§³ÖAIÓÃÓںϷ¨¶Ô±íµý±¨¹¤×÷£¬µ«´ó¹æÄ£¹úÄÚ¼à¿ØÓëÃñÖ÷¼ÛÖµ¹ÛÏà㣣¬ÇÒAIÇý¶¯µÄ´ó¹æÄ£¼à¿Ø¶Ô¸ù»ù×ÔÓÉ×é³ÉÐÂÐÍ·çÏÕ¡£¹«Ë¾Ô®Òý¡¼ûÀÍõ·¨µä¡·µÚ10±àµÚ3252Ìõ£¬Ö¸³ö¹©¸øÁ´·çÏÕÈ϶¨½öÓ°ÏìÕ½Õù²¿ºÏͬÖеÄClaudeʹÓ㬲»Ó°ÏìÆäËû¿Í»§¡£
https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html
6. Íþ˹¿µÐǵ¤ÂóÑ§ÇøÔâÍøÂçÊÂÎñÖÂÎåÈÕ¶ÏÍø
3ÔÂ2ÈÕ£¬Íþ˹¿µÐÇÖݵ¤Âó´åµ¤ÂóÑ§ÇøÒò"ÍøÂçÊÂÎñ"Â½ÐøÎå¸öÉÏ¿ÎÈÕÎÞ·¨ÁªÍø£¬Ô¼1500ÃûK-12ѧÉú¼°½ÌÈËÔ±¹¤±»ÆÈʹÓÃÖ½ÖÊ×ÊÁϽ²ÊÚ£¬¸ÃÊÂÎñ²úÉúÔÚ1ÔÂ30ÈÕÖÁ2ÔÂ5ÈÕ¡£µ¤ÂóÐÂÎÅÍø2ÔÂ9ÈÕ±¨Â·³Æ£¬Õâ´ÎÖжÏÓÉ"ÍøÂçÊÂÎñ"Òý·¢£¬µ«Î´Ã÷È·¹¥»÷ÀàÐÍ£»Ñ§ÇøÍøÂçÌṩÉÌWiscNetµÄ״̬ÊÂÎñÏÔʾ£¬Ñ§Çø"½»´ú¶Ë¿Ú"å´»ú7Ì죬µ××ÓÔÒò±êעΪ"ÄÚ²¿ÔÒò"¡£½ØÖÁ3ÔÂ3ÈÕ£¬Ñ§Çø¹ÙÔ±ÉÐδ¹«¿ª¾ßÌåÐÅÏ¢£¬Ô̺¬ÊÜÓ°ÏìϵͳÁìÓò¡¢Êý¾ÝÊÇ·ñ±»½Ó¼û¡¢ÊÇ·ñÉæ¼°·¨Âɲ¿ÃÅ»ò±í²¿ÏìÓ¦¹«Ë¾È¾Ö¸µÈϸ½Ú¡£ÀÕË÷Èí¼þ×·×ÙÍøÕ¾ransomware.live½«Ñ§ÇøÓòÃûdenmark.k12.wi.usÁÐΪÍþв×éÖ¯"Incransom"µÄÊܺ¦Õߣ¬¸Ã×éÖ¯Ðû³Æ3ÔÂ1ÈÕ·¢ÏÖ¹¥»÷£¬µ«Õâһ˵·¨×ÔÉíÎÞ·¨Ö¤Ê·ÕË÷Èí¼þ»òÊý¾Ý͵ÇÔÏÖʵ²úÉú¡£Ñ§Çø¶ÔýÌåÖÃÆÀÒªÇóδÓè»ØÓ¦¡£µ¤ÂóÑ§Çø¸²¸Ç²¼ÀÊÏØ¡¢ÂíÄáÍÐÎÖ¿ËÏØºÍ»ùÎÖÄáÏØ²¿ÃÅÇøÓò£¬Õâ´Î¶ÏÍø²»½öÓ°ÏìÈÕ³£½²ÊÚ£¬¸ü¶³ö³ö½ÌÓý»ú¹¹ÔÚÍøÂ簲ȫ·À»¤·½ÃæµÄ´àÈõÐÔ¡£
https://dysruptionhub.com/denmark-schools-outage-wisconsin/


¾©¹«Íø°²±¸11010802024551ºÅ