BianLianÀÕË÷Èí¼þÀûÓÃSVG´¹µö¹¥»÷ίÄÚÈðÀÆóÒµ
°ä²¼¹¦·ò 2026-03-311. BianLianÀÕË÷Èí¼þÀûÓÃSVG´¹µö¹¥»÷ίÄÚÈðÀÆóÒµ
3ÔÂ27ÈÕ£¬WatchGuard×êÑÐÈËÔ±½üÈÕÅû¶£¬BianLianÀÕË÷Èí¼þ×éÖ¯ÕýÕë¶ÔίÄÚÈðÀÆóÒµÌáÒéÐÂÐÍÍøÂç´¹µö¹¥»÷£¬Í¨¹ý¶ñÒâSVGͼÏñÎļþºÍÆæÃî³Á¶¨Ïò¼¼ÊõÈÆ¹ý´«Í³°²È«·À»¤£¬Ö´ÐиßËÙAES¼ÓÃÜÀÕË÷¡£Õâ´Î¹¥»÷¸ß¶È¼¯ÖÐÔÚίÄÚÈðÀ£¬¹¥»÷Á´Ê¼ÓÚ¼Ù×°³É·¢Æ±»òÔ¤ËãµÄ´¹µöÓʼþ£¬¸½¼þΪʹÓÃÎ÷°àÑÀÓﶨÃûµÄSVGÎļþ£¬¿´ËÆÍ¨³£Í¼Æ¬ÊµÔòǶÈëXML´úÂë¡£Óû§´ò¿ªÎļþºó£¬»á°ÂÃØÏÎ½Ó±í²¿URL£¬ÏÂÔØÓÉGo˵»°±àдµÄÒñ±ÎWindows·¨Ê½×÷ΪÓÐÐ§ÔØºÉ¡£¹¥»÷Õßѡȡ16λÁîÅÆÏµÍ³´«µÝ¶ñÒⷨʽ£¬¸Ã·¨Ê½¾ß±¸·´¼à¿ØÄÜÁ¦£¬»á¼ì²âWine¹¤¾ßÒÔÅжÏÊÇ·ñ´¦ÓÚ°²È«·ÖÎö»·¾³£¬²¢ÔÚϵͳ¡°¹ÒÆð¡±Ê±³ÖÐø¼à¶½£¬ÀûÓ÷ÀÓù¿ÕµØÖ´Ðй¥»÷¡£ÆäÖ÷Ìâ±øÆ÷ÊǸßËÙAES¼ÓÃÜÄ£¿é£¬¿É¼±¾çËø¶¨ÎļþÖ´ÐÐÀÕË÷¡£¼¼Êõϸ½ÚÏÔʾ£¬¸Ã¹¥»÷ͨ¹ýËõ¶ÌÁ´½Ó·þÎñja.cat½øÐÐÁ÷Á¿³Á¶¨Ïò£¬×îÖÕÖ¸Ïò±»ÈëÇֵİÍÎ÷ÓòÃû£¬Ðγɶà²ãÌø°å¶ã±Ü×·×Ù¡£WatchGuard×êÑÐÖ¸³ö£¬ÕâЩսÊõÓëBianLian×éÖ¯×Ô2022ÄêÒÔÀ´µÄ×÷°¸ÊÖ·¨¸ß¶ÈÎǺϡ£
https://hackread.com/bianlian-ransomware-fake-invoice-svg-images-attacks/
2. Î÷°àÑÀά¸ê¸ÛÔâÀÕË÷Èí¼þ¹¥»÷
3ÔÂ26ÈÕ£¬Î÷°àÑÀά¸ê¸Û½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÊý×ÖϵͳÑϳÁÊÜËð¡£¹¥»÷ÓÚÖܶþÔ糿±»·¢ÏÖ£¬Ó°Ïì¼ÓÀûÎ÷ÑǵØÓò¸Û¿ÚÓÃÓÚ»õÎïÔËÊäÖÎÀí¼°ÆäËûÊý×Ö·þÎñµÄÍÆËã»ú·þÎñÆ÷¡£²¿ÃÅÉ豸±»Ëø¶¨£¬¹¥»÷ÕßÒªÇóÖ§¸¶Êê½ðÒÔ¸´Ôϵͳ½Ó¼ûȨÏÞ¡£Îª¶ôÔì¹¥»÷À©É¢£¬¸ÛÎñ¾Ö¼¼ÊõÍŶÓѸËÙ½«ÊÜÓ°ÏìϵͳÓë±í²¿ÍøÂç¸ôÀ룬²¢Æô×ÅÊÖ×÷Ϊҵģʽ¡£¸Û¿Ú×ܲÿ¨Âå˹¡¤²©ËþÄÉÇ¿µ÷£¬ÔÚ°²È«ÍŶÓÈ·ÈÏϵͳ¾ø¶Ô°²È«Ç°£¬²»»á³ÁÐÂÏνÓÈκÎÊý×Öϵͳ£¬Ä¿Ç°ÉÐÎÞ¸´ÔÊý×ÖÔËÓªµÄ¹¦·ò±í¡£Ö»¹Ü´¬²°º½ÐкͻõÎïװжµÈʵÌåÔËÓªÈÔÔÚ³ÖÐø£¬µ«ÒÀÀµÊý×Ôì½Ì¨µÄÎïÁ÷е÷¹¤×÷Êܵ½ÏÔÖøÓ°Ï죬²¿ÃŲÙ×÷ÈËÔ±ÒÑתΪÈËΪ²Ù×÷²¢ÒÀÀµÖ½ÖÊÎļþʵÏÖ¹¤×÷¡£µ÷²éÔÚ½øÐÐÖУ¬ÒÔÈ·¶¨¹¥»÷ÕßÈôºÎÈëÇÖÍøÂçÒÔ¼°ÊÇ·ñ´æÔÚÃô¸ÐÊý¾Ýй¶¡£²©ËþÄɽ«Õâ´ÎÊÂÎñ¶¨ÐÔΪ¾¼Ã¶¯»úµÄÍøÂç¹¥»÷£¬Ö¼ÔÚÀÕË÷Êê½ð¡£½ØÖÁĿǰ£¬ÉÐÎÞÈκÎÍøÂç·¸×ï×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://therecord.media/port-of-vigo-ransomware
3. FortiClient EMS¸ßΣSQL×¢Èë·ì϶Ôâ»îÔ¾ÀûÓÃ
3ÔÂ30ÈÕ£¬Íþвµý±¨¹«Ë¾Defused½üÈÕÅû¶£¬¹¥»÷ÕßÕý»ý¼«ÀûÓÃFortinet FortiClient EMSƽ̨µÄCVE-2026-21643ÑϳÁSQL×¢Èë·ì϶¡£¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßͨ¹ý»ú¹Ø¶ñÒâHTTPÒªÇó£¬ÔÚ佨²¹µÄFortiClient EMS 7.4.4°æ±¾Web½çÃæÖ´ÐÐËÁÒâ´úÂë»òºÅÁ¹¥»÷¸´ÔӶȵÍÇÒÎÞÐèÌØÊâȨÏÞ¡£DefusedÇ¿µ÷£¬Ö»¹ÜCISA¼°ÆäËûÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÈÔÏóÕ÷¸Ã·ì϶Ϊ¡°Î´±»ÀûÓá±£¬µ«ÆäÄÚ²¿Êý¾ÝÒÑ֤ʵËÄÌìǰ³öÏÖ³õ´ÎÀûÓð¸Àý¡£·ì϶ÓÉFortinet°²È«ÍŶÓÄÚ²¿·¢ÏÖ£¬Ó°Ïì7.4.4°æ±¾£¬Óû§¿Éͨ¹ýÉý¼¶ÖÁ7.4.5»ò¸ü¸ß°æ±¾½¨¸´¡£È»¶ø£¬FortinetÉÐδ¸üа²È«²¼¸æ»òÈ·ÈÏ·ì϶Òѱ»ÏÖʵÀûÓ᣾ÝShodanɨÃ裬½ü1000¸öFortiClient EMSÊ·ýÒѹ«¿ªÂ¶³ö£»Shadowserver×·×Ùµ½³¬2000¸ö¶³öÊ·ý£¬ÆäÖÐ1400¸öIPµØÖ·Î»ÓÚÃÀ¹úºÍÅ·ÖÞ£¬ÎÞÊý¼¯ÖÐÔÚÃÀ¹ú¡£
https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/
4. ¶íTA446ÀûÓÃDarkSword·ì϶¶ÔiOSÉ豸ÌáÒé´¹µö¹¥»÷
3ÔÂ30ÈÕ£¬Óë¶íÂÞ˹¹ØÁªµÄ¸ß¼¶³ÖÐøÍþв×éÖ¯TA446£¨±ðºÅSEABORGIUM¡¢ColdRiverµÈ£©ÕýÀûÓÃDarkSword·ì϶ÀûÓù¤¾ß°ü£¬Õë¶ÔiOSÉ豸ÌáÒ鶨ÏòÓã²æÊ½ÍøÂç´¹µö¹¥»÷¡£¸Ã×éÖ¯×Ô2017ÄêÆð³ÖÐø»îÔ¾£¬ÖØÒªÕë¶Ô±±Ô¼¹ú¶È¼°¶«Å·µØÓò£¨º¬ÎÚ¿ËÀ¼£©£¬Ö¸±êº¸Ç¹ú·À/µý±¨¹«Ë¾¡¢·Çµ±¾Ö×éÖ¯¡¢µ±¾ÐÄä×éÖ¯¡¢Öǿ⡢¸ßУ£¬ÒÔ¼°Ç°µý±¨¹ÙÔ±¡¢¶íÂÞ˹ÊÂÎñר¼ÒºÍº£±í¶í¹«Ãñ£¬Í¨¹ýÇÔȡƾ֤Óëµý±¨ÊµÏÖÈëÇÖºÍÊý¾ÝÇÔÈ¡¡£Õâ´Î¹¥»÷ÖУ¬TA446ͨ¹ýαÔì´óÎ÷ÑóÀíÊ»áÓʼþ·¢ËÍÁ´½Ó£¬Á´½ÓÖ¸Ïò¿´ËÆÎÞº¦µÄPDFµö¶üÎļþ£¬ÀûÓ÷þÎñÆ÷¶Ë¹ýÂË»úÔ콫Óû§³Á¶¨ÏòÖÁDarkSword·ì϶ÀûÓù¤¾ß°ü£¬Ö´Ðж¨ÏòͶ·ÅÕ½Êõ¡£¸Ã¹¤¾ß°üÔ̺¬Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡¢PACÈÆ¹ýµÈ×é¼þ£¬Ëäδ·¢ÏÖɳÏäÌÓÒÝ£¬µ«ÒÑ֤ʵͨ¹ý¼ÓÔØÆ÷MD5¹ØÁªTA446µÚ¶þ½×¶ÎÓòÃû£¬ÏÔʾÆäÏÖʵʹÓá£
https://securityaffairs.com/190139/apt/russia-linked-apt-ta446-uses-darksword-exploit-to-target-iphone-users-in-phishing-wave.html
5. Ò½ÁƿƼ¼¹«Ë¾CareCloud³ÆºÚ¿ÍÇÔÈ¡ÁË»¼ÕßÊý¾Ý
3ÔÂ30ÈÕ£¬Ò½ÁÆÐÅÏ¢¼¼Êõ¹«Ë¾CareCloud½üÈÕÅû¶һ·ÑϳÁÊý¾Ýй¶ÊÂÎñ£¬Òý¿¯ÐÐÒµ¹Ø×¢¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚÃÀ¹úÐÂÔóÎ÷ÖÝ£¬×÷Ϊ¹«¿ªÉÏÊеÄÒ½ÁƱ£½¡IT·þÎñÉÌ£¬ÖØÒªÌṩSaaSÈí¼þ¡¢ÊÕÈëÖÜÆÚÖÎÀí¡¢µç×Ó½¡È«¼Í¼£¨EHR£©µÈ½â¾ö¹æ»®¡£¾ÝCareCloudÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄÎļþÏÔʾ£¬2026Äê3ÔÂ16ÈÕ£¬ÆäÆìÏÂCareCloud Health²¿ÃÅÔâ·êÍøÂçÖжϣ¬µ¼ÖÂÁù¸öµç×Ó½¡È«¼Í¼»·¾³Ö®Ò»µÄÖ°ÄܺÍÊý¾Ý½Ó¼ûÅö±Ú£¬³ÖÐøÔ¼8Ó×ʱºóÆëÈ«¸´Ô¡£¾µ÷²éÈ·ÈÏ£¬ºÚ¿ÍÔÚÈëÇÔìÚ¼ä½Ó¼ûÁ˸ù«Ë¾IT»ù´¡ÉèÊ©£¬²¢Ôì³É´æ´¢¿Í»§»¼Õß½¡È«¼Í¼µÄÌØ¶¨»·¾³Êý¾Ýй¶¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δ¾ÊÚȨµÄÊý¾Ý½Ó¼ûÁìÓòÓÐÏÞ£¬µ«¾ßÌåÊÜÓ°ÏìÈËÊý¼°Êý¾ÝÀàÐÍÈÔ´ý½øÒ»´ëÊ©²éÈ·ÈÏ¡£ÊÂÎñ²úÉúºó£¬CareCloudѸËÙÆô¶¯Ó¦¼±ÏìÓ¦»úÔì¡£¹«Ë¾Ç¿µ÷Õâ´ÎÊÂÎñ䲨¼°ÆäËûƽ̨¡¢²¿ÃÅ»òϵͳ£¬¹¥»÷ÕßÒÑÎÞ·¨³ÖÐø½Ó¼ûÆäÊý¾Ý¿â£¬ËùÓÐÊÜÓ°Ïìϵͳ¾ùÒÑÆëÈ«¸´Ô¡£
https://www.bleepingcomputer.com/news/security/healthcare-tech-firm-carecloud-says-hackers-stole-patient-data/
6. RoadK1ll£ºWebSocket·´ÏòËí·ʵÏÖÒñ±ÎÉøÈë
3ÔÂ30ÈÕ£¬½üÈÕ£¬Íйܼì²âºÍÏìÓ¦£¨MDR£©ÌṩÉÌBlackpointÔÚÊÂÎñÏìÓ¦Öз¢ÏÖÁËÃûΪRoadK1llµÄÐÂÐÍNode.js¶ñÒâÖ²È뷨ʽ£¬¸Ã·¨Ê½Í¨¹ý×Ô½ç˵WebSocketºÍ̸ʵÏÖ¹¥»÷ÕßÓëÊÜϰȾÖ÷»úµÄ³ÖÐøÍ¨Ñ¶£¬¾ß±¸¸ß¶ÈÒñ±ÎÐÔºÍÀ©´óÐÔ¡£RoadK1ll±»½ç˵ΪÇáÁ¿¼¶·´ÏòËí·ֲÈëÎÆäÖ÷ÌâÖ°ÄÜÊǽ«ÊÜËðÖ÷»úת»¯Îª¿É¿ØÖм̵㡣ͨ¹ý³ÉÁ¢µ½¹¥»÷Õß½ÚÔì»ù´¡ÉèÊ©µÄ³öÕ¾WebSocketÏνӣ¬¸Ã·¨Ê½¿É°´Ðèת·¢TCPÁ÷Á¿£¬Ê¹ÍþвÐÐΪÕßÎÞÐèÒÀÀµ´«Í³ÈëÕ¾¼àÌýÆ÷¼´¿É½Ó¼ûÄÚ²¿ÍøÂç×ÊÔ´¡£ÕâÖÖÉè¼ÆÊ¹¹¥»÷ÕßÄÜÈÆ¹ýÌìǵ½ÚÔ죬ÓÉÓÚÏνÓÔ´×Ô±»ÈëÇÖ»úе£¬¿É¼Ì³ÐÆäÍøÂçÐÅÀµºÍµØÎ»£¬ÓÐЧ½Ó¼ûÕý±¾ÎÞ·¨´Ó±í²¿Ö±½Ó½Ó¼ûµÄÄÚ²¿ÏµÍ³¡¢·þÎñ¼°ÍøÂç¶Î¡£¸Ã¶ñÒâÈí¼þÖ§³Ö¶à²¢·¢ÏνÓÄÜÁ¦£¬ÔÊÐíͬʱÓë¶à¸öÖ¸±êͨѶ¡£ÆäºÅÁÔ̺¬Ïνӡ¢Êý¾Ýת·¢¡¢ÏνÓÈ·ÈÏ¡¢ÏνÓÖÕÖ¹¼°ÃýÎó·´À¡µÈ»ù´¡Ö¸ÁÆäÖÐCONNECTºÅÁî¿É´¥·¢ÏòÖ¸¶¨Ö÷»úºÍ¶Ë¿ÚµÄ³öÕ¾TCPÏνӣ¬ÊµÏÖ¹¥»÷ÁìÓòµÄºáÏòÀ©´ó¡£ÈôͨѶÖжϣ¬·¨Ê½»á×Ô¶¯Æô¶¯³ÁÁ¬»úÔ츴ÔËí·£¬È·±£¹¥»÷³ÖÐøÐÔÇÒÏ÷¼õÊÖ¶¯¹ýÎʲúÉúµÄÔëÒô¡£
https://www.bleepingcomputer.com/news/security/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks/


¾©¹«Íø°²±¸11010802024551ºÅ