GPUBreach¹¥»÷ÀûÓÃGPUÄÚ´æ·ì϶ʵÏÖϵͳÊÕÊÜ

°ä²¼¹¦·ò 2026-04-07

1. GPUBreach¹¥»÷ÀûÓÃGPUÄÚ´æ·ì϶ʵÏÖϵͳÊÕÊÜ


4ÔÂ6ÈÕ £¬¶àÂ×¶à´óѧ×êÑÐÍŶӿª·¢³öÒ»ÖÖÃûΪGPUBreachµÄÐÂÐ͹¥»÷·½Ê½ £¬¸Ã¹¥»÷¿ÉÄÜÓÕ·¢GPU GDDR6ÄÚ´æÉϵÄRowhammerλ·­×ª £¬½ø¶øÊµÏÖȨÏÞÌáÉý²¢µ¼ÖÂϵͳÆëÈ«±»¹¥ÆÆ ¡£ÕâÏî×êÑÐµÄÆëȫϸ½Ú½«ÓÚ4ÔÂ13ÈÕÔڰ¿ËÀ¼½øÐеÄIEEE°²È«ÓëÒþÖÔ×êÑлáÉÏÕýʽ°ä²¼ ¡£×êÑÐÈËÔ±Ö¤Ã÷ £¬RowhammerÒýÆðµÄGDDR6λ·­×ª»á·ÛËéGPUÒ³±í £¬ÔÊÐí·ÇÌØÈ¨CUDAÄÚ²é¶ÔËÁÒâGPUÄÚ´æ½øÐжÁд½Ó¼û ¡£¹¥»÷ÕßËæºó¿ÉÀûÓÃNVIDIAÇý¶¯·¨Ê½ÖеÄÄڴ氲ȫ·ì϶ £¬½«´Ë¹¥»÷ÓëCPU¶ËµÄȨÏÞÌáÉýÏàÏνÓ £¬´Ó¶øÔÚÎÞÐè½ûÓÃÊäÈëÊä³öÄÚ´æÖÎÀíµ¥Ôª±£»¤µÄÇé¿öÏÂʵÏÖϵͳÆëÈ«±»¹¥ÆÆ ¡£IOMMUÊÇÒ»ÖÖÓÃÓÚÔ¤·ÀÖ±½ÓÄÚ´æ¹¥»÷µÄÓ²¼þµ¥Ôª £¬Ëüͨ¹ýÖÎÀíÿ¸öÉ豸¿É½Ó¼ûµÄÄÚ´æÇøÓòÀ´½ÚÔìºÍÏÞ¶ÈÉ豸¶ÔÄÚ´æµÄ½Ó¼û·½Ê½ ¡£Ö»¹ÜIOMMUÊÇÕмܴóÎÞÊýÖ±½ÓÄÚ´æ½Ó¼û¹¥»÷µÄÓÐЧ´ëÊ© £¬µ«×êÑÐÈËÔ±Ã÷È·Ö¸³öËüÎÞ·¨×èÖ¹GPUBreach¹¥»÷ ¡£×êÑÐÈËÔ±°µÊ¾ £¬GPUBreachÅú×¢GPU Rowhammer¹¥»÷²»½ö¿ÉÔì³ÉÊý¾Ý°Ü»µ £¬»¹ÄÜʵÏÖÕæÕýµÄȨÏÞÌáÉý £¬ÕâÊÇĿǰÆäËû¹¥»÷·½Ê½Ëù²»¾ß±¸µÄÄÜÁ¦ £¬Ê¹µÃGPUBreach³ÉΪһÖÖ¸ü׳´óµÄÍþв ¡£


https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/


2. ¶íÂÞ˹´ó¹æÄ£ÒøÐÐϵͳ̱»¾ £¬¹Ø±ÕVPNÒÉΪµ¼»ðË÷


4ÔÂ6ÈÕ £¬ÉÏÖÜÎå £¬¶íÂÞ˹²úÉúһ·³Á´óÍøÂç¹ÊÕÏ £¬µ¼ÖÂĪ˹¿ÆµÈ¶à¸öµØÓòµÄÒøÐÐÀûÓ÷¨Ê½ºÍÖ§¸¶ÏµÍ³Ì±»¾ÊýÓ×ʱ £¬Óû§ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶¡¢È¡¿î»ò½Ó¼ûÊÖ»úÒøÐзþÎñ ¡£ÊÜÓ°ÏìµÄÔ̺¬¶íÂÞ˹Áª¹ú´¢ÐîÒøÐÓ×¢¶íÂÞ˹±íÃ³ÒøÐÓ×¢°¢¶û·¨ÒøÐÓ×¢TÒøÐкͶíÂÞ˹ÌìÈ»Æø¹¤ÒµÒøÐеȸùú×î´óÒøÐÐ ¡£¹ÊÕÏ»¹²¨¼°×Ô¶¯È¡¿î»úºÍ¹«¹²½»Í¨ÏµÍ³ £¬ÄªË¹¿ÆµØÌúºÍ³Ç½¼ÁгµÕ¢»úÖÕ³¡½ÓÊÜÒøÐп¨Ö§¸¶ £¬¹¤×÷ÈËÔ±±»ÆÈÔÊÐí³Ë¿ÍÃâ·Ñͨ³©ÒÔÔ¤·ÀÓµ¼· ¡£Õâ´ÎÖжϼòÖ±ÇÐÔ­ÒòÉв»Ã÷È· ¡£×î³õÓÐýÌå²Â²âÓëµÐÔÖÊÔͼ¹Ø±ÕÒøÐлù´¡ÉèʩʹÓõÄIPµØÖ·ÓйØ £¬µ«µ½ÖÜÒ» £¬Óйر¨Â·´ó¶à±»É¾³ý ¡£¶íÂÞ˹¶ÀÁ¢Ã½Ì屨·³Æ £¬»¥ÁªÍø¼à¹Ü»ú¹¹RoskomnadzorÒªÇóýÌåɾ³ý½«ÒøÐÐÖжÏÓë¹Ø±ÕÐж¯ÁªÏµÆðÀ´µÄÄÚÈÝ ¡£¿¨°Í˹»ù³¢ÊÔÊÒ½áºÏÊ×´´ÈËÄÈËþÀòÑÇ¡¤¿¨Ë¹çê˹¿¨æ«ÔÚTelegramÉϰµÊ¾ £¬ÎÊÌâÔ´ÓÚRoskomnadzorÊÔͼ¹Ø±ÕVPN·þÎñ ¡£


https://therecord.media/outage-hits-russian-banking-apps


3. ¶íÓïÀÕË÷ÍÅ»ï÷è÷ë¹¥»÷µÂ¹ú×óÒíµ³Ë÷ÒªÊê½ð


4ÔÂ6ÈÕ £¬ÉÏÖÜ £¬Ò»¸ö½²¶íÓïµÄÀÕË÷Èí¼þ×éÖ¯÷è÷ëÐû³Æ¶ÔµÂ¹úÃñÖ÷Éç»áÖ÷ÒåÕþµ³×óÒíµ³µÄÍøÂç¹¥»÷ÕÆ¹Ü £¬²¢½«¸Ãµ³ÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥ £¬ÍþвÈô²»Ö§¸¶Êê½ð½«°ä²¼±»µÁÊý¾Ý ¡£÷è÷ë×Ô2022ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬´ËÇ°ÔøÒÔÅ·ÖÞ¡¢ÑÇÖÞºÍÃÀ¹úµÄÒ½Ôº¡¢µ±¾Ö»ú¹¹ºÍ˽Ӫ¹«Ë¾Îª¹¥»÷Ö¸±ê ¡£3ÔÂÏÂÑ® £¬×óÒíµ³Ö¤ÊµÆäIT»ù´¡ÉèÊ©Ôâ·êÁËÒ»´Î¡°ÑϳÁµÄÍøÂç¹¥»÷¡± £¬²¢°µÊ¾ÊÕµ½µÄÐÅÏ¢Åú×¢÷è÷ëºÚ¿Í×éÖ¯¿ÉÄÜÊÇÄ»ºóºÚÊÖ ¡£¸Ãµ³ÔÚÒ»·ÝÉêÃ÷ÖÐÖ¸³ö£º¡°´ËÀàÊý×Ö¹¥»÷ £¬³ö¸ñÊÇÀÕË÷Èí¼þµÄʹÓà £¬Í¨³£ÊÇ»ìºÏÕ½ÕùµÄÒ»²¿ÃÅ £¬Ò²ÊǶԹؼü»ù´¡ÉèÊ©µÄ¹¥»÷ ¡£¡±ÊÂÎñ²úÉúºó £¬×óÒíµ³ÁÙʱ¹Ø¹ØÁ˲¿ÃÅITϵͳÒÔÏ÷¼õËðʧ £¬²¢ÏòµÂ¹úµ±¾ÖÌáÆðÐÌÊÂËßËÏ ¡£¸Ãµ³ÖÒ¸æ³Æ £¬ºÚ¿Í¿ÉÄÜÊÔͼй¶Æä×ܲ¿ÄÚ²¿×éÖ¯Êý¾ÝºÍÔ±¹¤Ó×ÎÒÐÅÏ¢ £¬µ«°µÊ¾ÎÞ·¨ÆÀ¹À´ËÊÂÊÇ·ñ»áÔÚ¶à´óˮƽÉϳɹ¦»òÒѾ­²úÉú £¬Í¬Ê±²¹³äÆä³ÉÔ±Êý¾Ý¿âδÊÜÓ°Ïì ¡£×óÒíµ³³ÆÕâ´ÎÏ®»÷ÊÇÖ¼ÔÚ·ÛËéÃñÖ÷Ôì¶ÈµÄ¸ü¿í·ºÐж¯µÄÒ»²¿ÃÅ £¬ÉêÃ÷°µÊ¾¡°´ËÀ๥»÷Ö¼ÔÚ¼õÈõÃñÖ÷ÌåÔì¼°Æä²Î¼ÓÕß ¡£ÔÚÕâÖÖÇé¿öÏ £¬ÒÔÃñÖ÷µ³ÎªÖ¸±êËÆºõ²¢·ÇżºÏ ¡£¡±¸Ãµ³Ã»ÓÐ×¢Ã÷ÊÇ·ñÔÚÓëÏ®»÷Õß½»Éæ £¬Ò²Î´Ë¼¿¼Ö§¸¶Êê½ð ¡£


https://therecord.media/hackers-threaten-to-leak-german-political-party-data


4. ¾¯ÌèÐÂÐÍ·¨ÔºÚ¿Æ­¶ÌÐÅ £¬¶þάÂëÇÔÈ¡Ó×ÎÒÐÅÏ¢


4ÔÂ5ÈÕ £¬Ú¿Æ­·Ö×Ó½üÆÚ¼ÙÒâÃÀ¹ú¸÷µØÖÝ·¨Ôº £¬·¢ËÍÐéαµÄ¡°Î¥Ô¼Í¨Öª¡±½»Í¨Î¥Õ¶ÌÐÅ £¬Ð²ÆÈÊÕ¼þÈËɨÃè¶þάÂë½øÈë´¹µöÍøÕ¾ £¬ÒªÇóÖ§¸¶6.99ÃÀÔª £¬Í¬Ê±ÇÔÈ¡Ó×ÎҺͲÆÕþÐÅÏ¢ ¡£ÕâÏîлʼÓÚ¼¸ÖÜǰ £¬ÓÐÈË·ÖÏíÁËÕë¶ÔŦԼ¾ÓÃñµÄ¶ÌÐÅ £¬ËæºóºÜ¶àÈËÔÚÍøÉϻ㱨ÁËÕë¶Ô¼ÓÀû¸£ÄáÑÇÖÝ¡¢±±¿¨ÂÞÀ´ÄÉÖÝ¡¢ÒÁÀûŵÒÁÖÝ¡¢¸¥¼ªÄáÑÇÖÝ¡¢µÃ¿ËÈøË¹ÖÝ¡¢¿µÄùµÒ¸ñÖݺÍÐÂÔóÎ÷ÖݵÈÖݵÄÀàËÆ¶ÌÐÅ ¡£ÓëÒÔÍùÔ̺¬¶ÌÐźʹ¹µöÍøÕ¾Á´½ÓµÄÚ¿Æ­·ÖÆç £¬Ð°汾Ô̺¬Ò»ÕžݳÆÊÇ·¨ÔºÍ¨ÖªµÄͼƬ £¬ÆäÖÐǶÈëÁ˶þάÂë ¡£¶ÌÐÅÐû³ÆÀ´×Ô¡°Å¦Ô¼ÊÐÐÌÊ·¨Í¥¡± £¬ÄÚÈÝÉæ¼°Ç·½ÉÍ£³µ×Ê»òͨ³©·Ñ £¬ÒªÇóÁ¢¼´½ÉÄɲ»È»±ØÐë³öÍ¥ £¬²¢¸½ÓÐɨÃè¶þάÂëÖ§¸¶Ç·¿îµÄ×¢Ã÷ ¡£É¨Ãè¶þάÂëºó £¬Óû§»á±»Êèµ¼ÖÁÒ»¸öÖÐÑëÍøÕ¾ £¬¸ÃÍøÕ¾Ê×ÏÈÒªÇóʵÏÖÑéÖ¤ÂëÒÔÖ¤Ã÷ÊÇÕæÈË £¬Óû§±»³Á¶¨Ïòµ½ÁíÒ»¸ö´¹µöÍøÕ¾ £¬¸ÃÍøÕ¾¼ÙÒâÖݳµÁ¾ÖÎÀí¾Ö»òÆäËû»ú¹¹ £¬Ðû³ÆÓÐδ½ÉµÄͨ³©·Ñ»òÍ£³µ·£µ¥ ¡£µã»÷¡°³ÖÐø¡±°´Å¥ºó £¬Óû§½øÈëÒ»¸öÒ³Ãæ £¬±ØÒªÊäÈëÓ×ÎÒÐÅÏ¢ºÍÐÅÓþ¿¨ÐÅÏ¢ÒÔÖ§¸¶ËùνÓöÈ ¡£


https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/


5. FortiClient EMSзì϶Òѱ»¹¥»÷ÕßÀûÓÃ


4ÔÂ5ÈÕ £¬FortinetÓÚÖÜÄ©°ä²¼´¹Î£°²È«¸üР£¬ÒÔ½¨¸´FortiClientÆóÒµÖÎÀí·þÎñÆ÷ÖÐÒ»¸öÔÚ±»¹¥»÷Õß»ý¼«ÀûÓõÄÑϳÁ·ì϶ ¡£¸Ã·ì϶±àºÅΪCVE-2026-35616 £¬ÊôÓÚ½Ó¼û½ÚÔì²»µ±·ì϶ £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý¾«ÐÄ»ú¹ØµÄÒªÇóÖ´ÐдúÂë»òºÅÁî ¡£FortinetÒÑÈ·Èϸ÷ì϶ÔÚÏÖʵÀûÓÃÖб»ÀûÓà £¬²¢¶½´ÙÒ×Êܹ¥»÷µÄ¿Í»§×°ÖÃÈȽ¨¸´·¨Ê½ ¡£¸Ã·ì϶ӰÏìFortiClient EMS 7.4.5ºÍ7.4.6°æ±¾ £¬¿Éͨ¹ý×°ÖöÔÓ¦µÄÈȽ¨¸´·¨Ê½½øÐлº½â £¬Í¬Ê±½«ÔÚ¼´½«°ä²¼µÄ7.4.7°æ±¾ÖÐÕýʽ½¨¸´ £¬¶ø7.2°æ±¾²»ÊÜÓ°Ïì ¡£¸Ã·ì϶ÓÉÍøÂ簲ȫ¹«Ë¾Defused·¢ÏÖ £¬¸Ã¹«Ë¾½«ÆäÃèÊöΪԤÉí·ÝÑéÖ¤API½Ó¼ûÈÆ¹ý·ì϶ £¬ÔÊÐí¹¥»÷Õ߯ëÈ«ÈÆ¹ýÉí·ÝÑéÖ¤ºÍÊÚȨ½ÚÔì ¡£DefusedÔÚXƽ̨ÉÏй© £¬ËûÃÇÓÚ±¾ÖÜÔçЩʱ³½·¢Ïָ÷ì϶±»ÓÃ×÷ÁãÈÕ·ì϶ÀûÓà £¬²¢Æ¾¾ÝÕÆ¹ÜÈεÄÅû¶׼ÔòÏòFortinet½øÐÐÁ˻㱨 ¡£»¥ÁªÍø°²È«¼à¹Ü»ú¹¹ShadowserverÔÚÍøÉÏ·¢ÏÖÁ˳¬¹ý2000¸ö¶³öµÄFortiClient EMSÊ·ý £¬ÆäÖдó²¿ÃÅλÓÚÃÀ¹úºÍµÂ¹ú £¬ÕâÒâζ×Å´óÁ¿»ú¹¹¿ÉÄÜÃæ¶ÔDZÔÚÍþв ¡£


https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/


6. LinkedIn°ÂÃØÉ¨ÃèÓû§ä¯ÀÀÆ÷À©´ó


4ÔÂ3ÈÕ £¬Ò»·ÝÃûΪ¡°ä¯ÀÀÆ÷ÃÅ¡±µÄл㱨ÖÒ¸æ³Æ £¬Î¢ÈíÆìϵÄÁìÓ¢ÔÚÆäÍøÕ¾ÉÏʹÓðµ²ØµÄJavaScript¾ç±¾É¨Ãè½Ó¼ûÕßµÄä¯ÀÀÆ÷ £¬²éÕÒÒÑ×°ÖõÄÀ©´ó·¨Ê½²¢ÍøÂçÉ豸Êý¾Ý ¡£¾Ý×Ô³ÆLinkedInóÒ×Óû§Ð­»áµÄFairlinked eV»ã±¨ÏÔʾ £¬¸Ãƽ̨½«JavaScript×¢ÈëÓû§»á»° £¬²é³­Êýǧ¸öä¯ÀÀÆ÷À©´ó·¨Ê½ £¬²¢½«Á˾ÖÓë¿Éʶ´ËÍâÓû§Ó×ÎÒ×ÊÁϹØÁªÆðÀ´ ¡£»ã±¨×÷ÕßÐû³Æ £¬ÕâÖÖÐÐΪ±»ÓÃÀ´ÍøÂçÃô¸ÐµÄÓ×ÎҺ͹«Ë¾ÐÅÏ¢ £¬ÓÉÓÚLinkedInÕÊ»§ÓëÕæÊµÉí·Ý¡¢¹ÍÖ÷ºÍְλçÇÃܰó¶¨ ¡£»ã±¨Ö¸³ö £¬LinkedIn»áɨÃ賬¹ý200ÖÖÓëÆäÏúÊÛ¹¤¾ßÖ±½Ó¾ºÕùµÄ²úÆ· £¬Ô̺¬Apollo¡¢LushaºÍZoomInfo ¡£ÓÉÓÚLinkedIn֪·ÿ¸öÓû§µÄ¹ÍÖ÷ £¬ËüÄܹ»×·×ÙÄÄЩ¹«Ë¾Ê¹ÓÃÄÄЩ¾ºÕùµÐÊֵIJúÆ· £¬ÔÚÓû§²»ÖªÇéµÄÇé¿öÏÂÌáÈ¡Êýǧ¼ÒÈí¼þ¹«Ë¾µÄ¿Í»§Ãûµ¥ £¬²¢ÀûÓ÷¢ÏÖµÄÐÅÏ¢ÏòµÚÈý·½¹¤¾ßÓû§·¢³öÇ¿ÔìÖ´ÐÐÍþв ¡£


https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/