ÐǰͿËÅû¶Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÊý°ÙÃûÔ±¹¤
°ä²¼¹¦·ò 2026-03-161. ÐǰͿËÅû¶Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÊý°ÙÃûÔ±¹¤
3ÔÂ13ÈÕ£¬È«Çò×î´ó¿§·ÈÁ¬ËøÆ·ÅÆÐǰͿ˽üÈÕÅû¶һ·³Á´óÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°Êý°ÙÃûÔ±¹¤ÕË»§±»µÁ¡£¸Ã¹«Ë¾Õ¼Óг¬38ÍòÃûÔ±¹¤¼°½ü4.1Íò¼ÒÃŵ꣬±é²¼È«Çò88¸ö¹ú¶È¡£¾ÝÆäÏòÃåÒòÖÝ×ܼì²ì³¤Ìá½»µÄ֪ͨÎļþÏÔʾ£¬2026Äê2ÔÂ6ÈÕ£¬ÐǰͿ˷¢ÏÖ²¿ÃźÏ×÷ͬ°éÖÐÐÄÕË»§Ôâδ¾ÊÚȨ½Ó¼û£¬¾Óë±í²¿ÍøÂ簲ȫר¼Ò½áºÏµ÷²éÈ·ÈÏ£¬¹¥»÷Õßͨ¹ýαÔìµÇÂ¼Ò³Ãæ»ñȡƾ֤£¬ÔÚ1ÔÂ19ÈÕÖÁ2ÔÂ11ÈÕÆÚ¼äÈëÇÖÁË889¸öÔ±¹¤ÕË»§¡£ÕâЩÕË»§´æ´¢×ÅÔ±¹¤Ó×ÎÒÐÅÏ¢¡¢¸£Àû¼°ÈËÁ¦×ÊÔ´Êý¾Ý£¬Ð¹Â¶ÄÚÈÝÔ̺¬ÐÕÃû¡¢Éç»á±£ÏÕºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢½ðÈÚÕË»§¼°Â·ÓɺÅÂëµÈÃô¸ÐÐÅÏ¢¡£ÐǰͿËÔÚÊÂÎñ·¢ÏÖºóÁ¢¼´Æô¶¯Ó¦¼±ÏìÓ¦£ºÍ¨Öª·¨ÂÉ»ú¹¹¡¢½¨ÒéÔ±¹¤¼à¿ØÒøÐÐÕË»§Òì³£»î¶¯£¬²¢Í¨¹ýExperian IdentityWorksΪÊÜÓ°ÏìÔ±¹¤ÌṩÁ½ÄêÃâ·ÑÉí·Ý͵ÇÔ±£»¤¼°ÐÅÓþ¼à¿Ø·þÎñ¡£Í¬Ê±£¬¹«Ë¾°µÊ¾ÒѼÓÇ¿ÕË»§½Ó¼ûÓйصݲȫ½ÚÔì´ëÊ©£¬µ«Î´Ú¹ÊÍΪºÎÔÚ·¢ÏÖ¹¥»÷ºóÎåÌì²ÅÒÆ³ýÊÜÓ°ÏìÕË»§¡£
https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/
2. ¹È¸è´¹Î£°ä²¼Chrome 146¸üн¨¸´¸ßΣÁãÈÕ·ì϶
3ÔÂ13ÈÕ£¬¹È¸è°ä·¢´¹Î£°ä²¼Chrome 146°æ±¾¸üУ¬³Áµã½¨¸´Á½¸öÒѱ»ÏÖʵÀûÓõÄÁãÈÕ·ì϶£¬CVE-2026-3909ÓëCVE-2026-3910£¬Á½ÕßCVSSÆÀ·Ö¾ù´ï8.8£¬Êô¸ßΣ¼¶±ð¡£¾Ý¹È¸è²¼¸æ£¬¹¥»÷ÕßÒÑͨ¹ýαÔìµÇÂ¼Ò³ÃæµÈ¼¿Á©ÔÚÕæÊµ»·¾³ÖÐÀûÓÃÕâЩ·ì϶¡£CVE-2026-3909ΪSkiaͼÐοâÖеÄÔ½½çдÈëȱµã£¬¶ñÒâHTMLÒ³Ãæ¿É´¥·¢ÄÚ´æ°Ü»µ£¬µ¼ÖÂËÁÒâ´úÂëÖ´Ðлò·¨Ê½±ÀÀ££»CVE-2026-3910ÔòÊÇV8 JavaScriptÒýÇæµÄ²»Êʵ±ÊµÏÖ·ì϶£¬¹¥»÷Õ߿ɻú¹Ø¶ñÒâÒ³ÃæÖ´ÐÐËÁÒâ´úÂ룬ÇÒV8·ì϶³£±»ÓÃÓÚɳÏäÌÓÒݹ¥»÷¡£Õâ´Î½¨¸´¸²¸ÇWindows¡¢macOS£¨°æ±¾146.0.7680.75/76£©¡¢Linux£¨146.0.7680.75£©¼°Android£¨146.0.76380.115£©Æ½Ì¨¡£³ýÁãÈÕ·ì϶±í£¬Chrome 146²»±ä°æÉý¼¶Á½Ììºó£¬¹Ù·½»¹´¹Î£½¨¸´ÁË29¸ö·ì϶£¬Éæ¼°WebML¡¢Web Speech¡¢Agents¡¢WebMCP¡¢Extensions¡¢TextEncoding¡¢MediaStream¡¢WebMIDI¡¢WindowDialogµÈ¶à¸öÄ£¿é£¬Ô̺¬¸ßΣ¼°ÖеÍΣÎÊÌâ¡£
https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/
3. »ùÓÚRustµÄVENON¶ñÒâÈí¼þ¹¥»÷33¼Ò°ÍÎ÷ÒøÐÐ
3ÔÂ12ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶ÁËÒ»¿îÕë¶Ô°ÍÎ÷Óû§µÄRust˵»°±àÐ´ÒøÐжñÒâÈí¼þVENON£¬ÆäÓÚ2026Äê2Ô³õ´Î±»·¢ÏÖ£¬ÓÉZenoX¹«Ë¾¶¨Ãû¡£ÓëÀ¶¡ÃÀÖÞ´«Í³»ùÓÚDelphiµÄÒøÐÐľÂí£¨ÈçGrandoreiro¡¢Mekotio£©·ÖÆç£¬VENONѡȡRust³Áд²¢À©´óÁ˳ÉÊìľÂíÖ°ÄÜ£¬Ð迪·¢Õ߾߱¸Éîºñ¼¼Êõ¾Ñ飬ÇÒ´úÂë½á¹¹ÏÔʾÆäÀûÓÃÌìÉúʽAI½øÐпª·¢¡£¸ÃľÂíͨ¹ýDLL²à¼ÓÔØ¼¼Êõ´«²¼£¬½áºÏClickFixÉç»á¹¤³ÌÕ½ÊõÓÕÆÓû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔØº¬ÔغɵÄZIP°ü¡£VENONµÄ¹¥»÷Á´Ô̺¬¾Å²ã¶ã±Ü¼¼Êõ£º·´É³Ïä²é³¡¢¼ä½ÓϵͳŲÓá¢ETW/AMSIÈÆ¹ýµÈ£¬Ö´Ðкó»á½Ó¼ûGoogle Cloud Storage»ñÈ¡ÅäÖã¬×°ÖôòË㹤×÷£¬²¢Í¨¹ýWebSocket³ÉÁ¢C2Ïνӡ£ÆäÖ÷ÌâÖ°ÄÜÔ̺¬Õë¶Ô33¼Ò½ðÈÚ»ú¹¹µÄ´°¿Ú±êÌâºÍÓòÃû¼à¿Ø£¬½öµ±Ö¸±êÀûÓÃÆô¶¯Ê±¼¤»î£¬Í¨¹ýÐéα¸²¸Ç²ãÇÔȡʹ´¦¡£VENONÔçÆÚÑù±¾Â¶³öÁË¿ª·¢Õßõè¾¶"C:\Users\byst4"£¬µ«ÉÐδ¹ØÁªÒÑÖª×éÖ¯¡£
https://thehackernews.com/2026/03/rust-based-venon-malware-targets-33.html
4. PayloadÀÕË÷Èí¼þÍŻ﹥»÷°ÍÁֻʼÒÒ½Ôº
3ÔÂ15ÈÕ£¬½üÈÕ£¬PayloadÀÕË÷Èí¼þÍÅ»ïÐû³ÆÒÑÈëÇÖ°ÍÁֻʼÒÒ½Ôº£¨RBH£©£¬ÇÔÈ¡110GBÃô¸ÐÊý¾Ý£¬²¢½«¸ÃÒ½ÁÆ»ú¹¹ÁÐÈëÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬Í¬²½°ä²¼±»ÈëÇÖϵͳ¾µÏñ×÷Ϊ¹¥»÷Ö¤¾Ý¡£¸ÃÍÅ»ïÍþв³Æ£¬ÈôÊܺ¦ÕßδÔÚ3ÔÂ23ÈÕǰ֧¸¶Êê½ð£¬½«¹«¿ªÐ¹Â¶È«Êý±»µÁÊý¾Ý£¬Òý·¢¹ú¼ÊÍøÂ簲ȫÁìÓò¸ß¶È¹Ø×¢¡£°ÍÁֻʼÒÒ½Ôº³ÉÁ¢ÓÚ2011Ä꣬×÷ΪռÓÐ70ÕÅ´²Î»µÄ×ÛºÏÒ½ÁÆ»ú¹¹£¬Æä·þÎñÁìÓòºµ²×¡Ôº¡¢ÃÅÕï¡¢±í¿ÆÊÖÊõ¡¢²ú¿Æ»¤Àí¼°Õï¶ÏµÈÖ÷ÌâÒ½ÁÆÒµÎñ£¬·þÎñ¶ÔÏó²»½öÔ̺¬°ÍÁÖ±¾ÍÁ»¼Õߣ¬»¹·øÉä°¢Âü¡¢¿¨Ëþ¶û¡¢É³Ìذ¢À²®¡¢°¢ÁªÇõµÈÁÚ¹ú£¬ÓµÓÐÇøÓòÐÔÒ½ÁÆÊàŦµÄ³ÁҪְλ¡£Õâ´ÎÊý¾Ýй¶¿ÉÄÜÉæ¼°»¼ÕßÒþÖÔ¡¢Ò½ÁƼͼµÈ¸ß¶ÈÃô¸ÐÐÅÏ¢£¬¶ÔÒ½ÔºÔËÓª¼°»¼ÕßȨÀû×é³ÉÑϳÁÍþв¡£PayloadÀÕË÷Èí¼þ×÷ΪÐÂÐËÍøÂç·¸×﹤¾ß£¬Ñ¡È¡"Ë«³ÁÀÕË÷"ģʽ£¬Í¨¹ýÊý¾ÝÇÔÈ¡ÓëÎļþ¼ÓÃÜË«³Á¼¿Á©ÏòÊܺ¦Õßʩѹ¡£¸ÃÍÅ»ïÖØÒª¶Ô×¼ÐÂÐËÊг¡ÖдóÐÍÆóÒµ£¬¹¥»÷Ö¸±êÉæ¼°·¿µØ²ú¡¢ÎïÁ÷µÈ¶à¸öÐÐÒµ£¬Õ¹Ê¾³ö¿çÐÐ񵃿ÈëÄÜÁ¦¡£
https://securityaffairs.com/189467/cyber-crime/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital.html
5. FBIµ÷²éSteamƽ̨¶ñÒâÓÎÏ·ÊÂÎñ
3ÔÂ13ÈÕ£¬ÃÀ¹úÁª¹úµ÷²é¾ÖÎ÷ÑÅͼ·Ö¾ÖÕý¶ÔSteamƽ̨ÉÏ´«µÄ°Ë¿î¶ñÒâÓÎÏ··¢Õ¹µ÷²é£¬ÕâЩÓÎÏ·ÔÚ2024Äê5ÔÂÖÁ2026Äê1ÔÂÆÚ¼äͨ¹ýǶÈë¶ñÒâÈí¼þÇÔÈ¡Íæ¼ÒÐÅÏ¢¡£FBIºôÓõÊÜÓ°ÏìÓû§Ìîд¹Ù·½±í¸ñ£¬³Áµãµ÷²é¼ÓÃÜÇ®±Ò͵ÇÔ¡¢ÕË»§½Ù³Ö¼°Í¨Ñ¶¼Í¼£¬ÒÔ×·×Ù·¸×ïÁ´Ìõ²¢±£»¤Êܺ¦ÕßȨÀû¡£ÉæÊÂÓÎÏ·Ô̺¬BlockBlasters¡¢Chemia¡¢Dashverse/DashFPS¡¢Lampy¡¢Lunara¡¢PirateFiºÍTokenova¡£ÆäÖУ¬BlockBlasters×÷ΪÃâ·Ñ2Dºá°æÓÎÏ·£¬×î³õÉÏ´«Ê±Îª¡°¸É¾»·¨Ê½¡±£¬µ«ºóÐø±»Ö²Èëcryptodrainer¶ñÒâÈí¼þ£¬µ¼ÖÂÓÎÏ·Ö÷²¥Raivo PlavnieksÔÚÖ±²¥³ï¿îÆÚ¼äËðʧ³¬3.2ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡£Çø¿éÁ´µ÷²éÔ±ZachXBT¹À¼Æ£¬¹¥»÷Õß´Ó261¸öSteamÕË»§ÇÔȡԼ15ÍòÃÀÔª£¬¶øÍøÂ簲ȫ×êÑÐÔ±VX-UndergroundÔòÖ¸³öÊܺ¦ÕßÈËÊý¸ß´ï478ÈË¡£ÔÚ¶ñÒâÉú¼Æ½¨ÔìÓÎÏ·¡¶Chemia¡·ÖУ¬Íþв×éÖ¯EncryptHubÖ²ÈëÁËHijackLoader¶ñÒâÈí¼þ£¬¸ÃÈí¼þ»áÏÂÔØVidarÐÅÏ¢ÇÔÈ¡·¨Ê½£¬²¢×°Öö¨Ôì°æFickle Stealer£¬ÓÃÓÚÇÔȡƾ֤¡¢ä¯ÀÀÆ÷Êý¾Ý¡¢CookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£PirateFiÓÎÏ·ÔòÓÚ2025Äê2ÔÂÔÚSteamÉϼÜÔ¼Ò»ÖÜ£¬´«²¼VidarÐÅÏ¢ÇÔÈ¡·¨Ê½£¬¿ÉÄÜÓ°Ïì¶à´ï1500ÃûÓû§¡£
https://www.bleepingcomputer.com/news/security/fbi-seeks-victims-of-steam-games-used-to-spread-malware/
6. ²¨À¼ºË×êÑÐÖÐÐÄÔâÍøÂç¹¥»÷
3ÔÂ13ÈÕ£¬²¨À¼¹ú¶ÈºË×êÑÐÖÐÐÄ£¨NCBJ£©½üÈÕ°ä·¢ÆäIT»ù´¡ÉèÊ©Ôâ·êÍøÂç¹¥»÷δË죬µ«µÃÒæÓÚ°²Õûϵͳ¼±¾çÏìÓ¦¼°ÍŶӸßЧºÏ×÷£¬³É¹¦±£»¤Ö¸±êϵͳÆëÈ«ÐÔ£¬Î´¶ÔÔËÓªÔì³ÉÈκÎÓ°Ïì¡£¸ÃÖÐÐÄ×÷Ϊ²¨À¼ºË¿ÆÑ§×êÑÐÖ÷Ìâ˼¹¹£¬ÔËÐÐ×ÅÅ·ÖÞ×î׳´óµÄ×êÑз´Ó³¶ÑÖ®Ò»ÂêÀöÑÇ·´Ó³¶Ñ£¬³Ðµ£×źËÄÜ×êÑÓ×¢Í¬Î»ËØ³ö²ú¼°¹ú¼Ê¿ÆÑкÏ×÷µÈ¹Ø¼ü¹¤×÷¡£Õâ´Î¹¥»÷²úÉúÔÚ¡°×î½ü¼¸Ì족£¬¹¥»÷¹æÄ£ÓÐÏÞµ«ÒâÍ¼Í»ÆÆ°²±£ÏµÍ³£¬×îÖÕ±»°²È«ÍŶÓÓÐЧÀ¹½Ø¡£¾ÝÖÐÐÄÖ÷ÈÎÑſⲼ¡¤¿âÅå´Ä»ù֤ʵ£¬³ö²ú¡¢×êÑм°·´Ó³¶ÑÔËÐоùδÖжϣ¬ÂêÀöÑÇ·´Ó³¶Ñ³ÖÐøÒÔÂú¹¦Âʰ²È«ÔËÐС£²¨À¼µ±¾ÖÕýÓë¹ú¶È°²È«¾Ö-¹«¹²ÀûÒæ×êÑÐËù£¨NASK-PIB£©¡¢Êý×ÖÊÂÎñ²¿¡¢¸±×ÜÀí°ì¹«ÊÒ¼°ÄÜÔ´²¿µÈ¶à²¿ÃÅÐͬӦ¶Ô£¬È·±£¹Ø¼ü»ù´¡ÉèÊ©»ñµÃµÚÒ»Á÷±ð·À»¤¡£Êý×ÖÊÂÎñ²¿³¤½üÈÕʲÍзò¡¤¼Ó·ò¿Æ·ò˹»ùй©£¬³õ´ëÊ©²éÏÔʾ¹¥»÷ÆðÔ´ÓëÒÁÀÊ´æÔÚ¹ØÁª£¬µ«Ç¿µ÷Ðè´ý×îÖÕÐÅÏ¢ºËʵºó·½¿ÉÈ·ÈÏ£¬Í¬Ê±¾¯Ê¾Óйؼ£Ïó¿ÉÄÜ´æÔÚÎóµ¼ÐÔ¡£
https://securityaffairs.com/189399/security/hackers-targeted-polands-national-centre-for-nuclear-research.html


¾©¹«Íø°²±¸11010802024551ºÅ