AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽ°²È«¾¯±¨
°ä²¼¹¦·ò 2026-03-031. AI¹¥»÷¹¤¾ßCyberStrikeAI´¥·¢·À»ðǽ°²È«¾¯±¨
3ÔÂ2ÈÕ£¬×êÑÐÈËÔ±½üÈÕÖҸ棬һ³¡Õë¶ÔÈ«ÇòÊý°Ų̀Fortinet FortiGate·À»ðǽµÄ´ó¹æÄ£¹¥»÷ÊÂÎñÖУ¬ÍþвÐÐΪÕßʹÓÃÁËÃûΪCyberStrikeAIµÄÐÂÐÍ¿ªÔ´AI°²È«²âÊÔÆ½Ì¨¡£¡£¸Ãƽ̨ÓÉ»¯Ãû"Ed1s0nZ"µÄ¿ª·¢Õß´´½¨£¬ÆäGitHub´úÂë¿âÏÔʾÆäΪ"ÓÃGo˵»°¹¹½¨µÄAIÔÉú°²È«²âÊÔÆ½Ì¨"£¬¼¯³É100ÓàÖÖ°²È«¹¤¾ß£¬Ô̺¬ÖÇÄܱàÅÅÒýÇæ¡¢¡¢Ô¤Ô¼Ò尲ȫ½ÇÉ«¼°¼¼Êõϵͳ£¬Ö§³ÖGPT¡¢¡¢ClaudeµÈÄ£ÐÍÇý¶¯µÄ¾ö²ßÒýÇæ£¬²¢½¨ÉèÃÜÂë±£»£»¤µÄWeb½çÃæÓëÉó¼ÆÈÕÖ¾Ö°ÄÜ¡£¡£¾ÝTeam Cymru¸ß¼¶Íþвµý±¨ÕÕ·÷Will Thomas·ÖÎö£¬¹¥»÷ÕßʹÓõÄ212.11.64[.]250·þÎñÆ÷ÔÚ8080¶Ë¿ÚÔËÐÐCyberStrikeAI·þÎñ£¬¸ÃIPÓë±»¹¥ÆÆµÄFortiGateÉ豸´æÔÚÍøÂçͨѶ¼Í¼£¬×îºóÒ»´Î»î¶¯¼Í¼Ϊ2026Äê1ÔÂ30ÈÕ¡£¡£¸Ã¹¤¾ßͨ¹ýÔÉúMCPºÍ̸ʵÏÖ´Ó¶Ô»°Ê½ºÅÁîµ½·ì϶·¢ÏÖ¡¢¡¢¹¥»÷Á´·ÖÎö¡¢¡¢Á˾ֿÉÊÓ»¯µÄÈ«Á÷³Ì×Ô¶¯»¯£¬Ö§³ÖÍøÂçɨÃ裨nmap£©¡¢¡¢·ì϶ÀûÓã¨metasploit£©¡¢¡¢ÃÜÂëÆÆ½â£¨hashcat£©µÈÆëÈ«¹¥»÷Á´²Ù×÷£¬Ê¹µÍ¼¼Êõ¹¥»÷ÕßÒ²ÄÜÖ´Ðи´ÔÓ¹¥»÷¡£¡£
https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/
2. Ö¥¼Ó¸çInsightÒ½Ôº360GBÃô¸ÐÐÅÏ¢Ôâй¶
3ÔÂ2ÈÕ£¬Ö¥¼Ó¸çInsightÒ½ÔººÍÒ½ÁÆÖÐÐÄ2026Äê1ÔÂ26ÈÕ°ä²¼´úÌæÍ¨Öª£¬Åû¶ÆäÓÚ2025Äê9Ô¼ì²âµ½ÍøÂçÒì³£»£»î¶¯£¬¾µ÷²éÈ·ÈÏ£¬2025Äê8ÔÂ22ÈÕÖÁ9ÔÂ11ÈÕÆÚ¼ä£¬Ò»Ãûδ¾ÊÚȨÈËÔ±½Ó¼ûÁ˸ûú¹¹ÍøÂç¡£¡£Í¨ÖªÖ¸³ö£¬¿ÉÄÜй¶µÄÐÅÏ¢ÀàÐͺ¸ÇÐÕÃû¡¢¡¢Éç»á°²È«ºÅÂë¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢¼ÝÊ»ÅÆÕÕ/»¤ÕÕºÅÂë¡¢¡¢½ðÈÚÕË»§ÐÅÏ¢¼°Ò½ÖÎÓйØÊý¾Ý£¨º¬½¡¿µ±£ÏÕÐÅÏ¢£©£¬µ«½ØÖÁ֪ͨ°ä²¼Ê±£¬InsightÉÐδÆô¶¯¶ÔÊÜÓ°ÏìСÎÒµÄ֪ͨ·¨Ê½£¬ÒàδÌá¼°ÌṩÃâ·ÑÉí·ÝµÁÓûº½â·þÎñ¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬2026Äê2ÔÂ24ÈÕ£¬×Գơ°°×ÒÏ¡±£¨Termite£©µÄÍþв×éÖ¯½«InsightÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾£¬Ðû³ÆÒÑ»ñȡԼ360GB£¨Ô¼90Íò¸öÎļþ£©µÄ¡°»úÃÜÊý¾Ý¡±£¬²¢·Ö¶àÅú´Îй¶£¬ÆäÖÐÔ̺¬´óÁ¿.jpegºÍ.dcmÌåʽÎļþ¡£¡£Ä¿Ç°Éв»Ã÷ÏÔInsightÊÇ·ñÓë¸Ã×éÖ¯½øÐйý½Ó´¥»ò½»Éæ¡£¡£
https://databreaches.net/2026/03/02/data-from-insight-hospital-and-medical-center-leaked-on-dark-web/
3. α¹È¸è°²È«Ò³´¹µö£º£º£ºPWAÇÔÈ¡OTP¼°¼ÓÃÜÇ®±Ò
3ÔÂ2ÈÕ£¬½üÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±Åû¶һÖÖÀûÓÃαÔì¹È¸è°²È«Ò³ÃæµÄÍøÂç´¹µö¹¥»÷£¬¸Ã¹¥»÷ͨ¹ý½¥½øÊ½WebÀûÓã¨PWA£©¼¼ÊõÇÔÈ¡Óû§Ò»´ÎÐÔÃÜÂ루OTP£©¡¢¡¢¼ÓÃÜÇ®±ÒÇ®°üµØÖ·£¬²¢½«Êܺ¦Õßä¯ÀÀÆ÷ת»¯Îª¹¥»÷ÕßÁ÷Á¿´úÀí¡£¡£¹¥»÷Õßͨ¹ýÓòÃûgoogle-prism[.]com¼Ù×°³É¹È¸èºÏ·¨°²È«·þÎñ£¬ÓÕµ¼Óû§ÊµÏÖËIJ½ÉèÖÃÁ÷³Ì£¬Ô̺¬ÊÚÓè¸ß·çÏÕȨÏÞºÍ×°ÖöñÒâPWAÀûÓᣡ£¸ÃPWAÔÚä¯ÀÀÆ÷ÖÐÒÔ¶ÀÁ¢ÀûÓôó¾ÖÔËÐУ¬Î޿ɼûä¯ÀÀÆ÷¿Ø¼þ£¬ÀûÓÃÉç»á¹¤³Ì¼¿Á©ºýŪÓû§ÏàÐÅÆäÕýÔÚ½øÐа²È«²é³»òÉ豸±£»£»¤²Ù×÷¡£¡£¶ñÒâPWA¾ß±¸¶àÏî¸ßΣְÄÜ£º£º£º¿ÉÇÔÈ¡ÁªÏµÈË¡¢¡¢ÊµÊ±GPSÊý¾Ý¡¢¡¢¼ôÌù°åÄÚÈÝ£¬²¢Í¨¹ýWebOTP APIÀ¹½Ø¶ÌÐÅÑéÖ¤Â룻£»Æä·þÎñ¹¤×÷Ïß³ÌÖ§³ÖÍÆËÍ֪ͨ¡¢¡¢Ö´Ðкó¶Ü¹¤×÷¼°ÍâйÊý¾Ý£»£»WebSocketÖмÌÖ°ÄܸüÔÊÐí¹¥»÷Õßͨ¹ýÊܺ¦Õßä¯ÀÀÆ÷·ÓÉHTTPÒªÇ󣬷ÂÕÕÆäÍøÂç»î¶¯¡£¡£´ËÍ⣬¹¥»÷Õßÿ30Ãëͨ¹ý/api/heartbeat²é³ÐºÅÁ²¢Í¨¹ýÐéα°²È«¾¯±¨ÓÕµ¼Óû§ÖØÐ´ò¿ªPWAÒÔ³ÖÐøÇÔÈ¡Êý¾Ý¡£¡£
https://www.bleepingcomputer.com/news/security/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/
4. °Í»ù˹̹Ö÷Á÷ÐÂÎÅÆµµÀÔâºÚ¿Í¹¥»÷
3ÔÂ2ÈÕ£¬°Í»ù˹̹Èý´óÖ÷Á÷ÐÂÎÅÆµµÀGeo News¡¢¡¢ARY NewsºÍSamaa TV 3ÔÂ1ÈÕÍí¼äÔâ·êÑÏÖØ°²È«·ì϶£¬Õý³£½ÚÄ¿ÔÚ¿ªÕ«·¹ºóµÄ»Æ½ðʱ¶Î£¨Íí9µãǰºó£©±»Î´¾ÊÚȨÐÅÏ¢Öжϡ£¡£Geo News°ä²¼ÉêÃ÷֤ʵ£¬Æäͨ¹ýPakSatÎÀÐÇ´«ÊäµÄÐźÅÔâ²»Ã÷Éí·ÝºÚ¿Í¹¥»÷£¬½ÚÄ¿³ÖÐøÖжϲ¢³öÏÖÕë¶Ô°Í»ù˹̹Îä×°¶ÓÁеĹÄÀøÐÔÄÚÈÝ£¬Ô̺¬ºôÓõÃñÖÚ·´¿¹¾ü·½¡¢¡¢Ö¸¿Ø¾ü¶Ó¡°·ÛËé¹ú¶È¡±µÈÖ±½Ó°áŪÓßÂÛ¡£¡£Õâ´Î¹¥»÷ͨ¹ý½ÚÖÆÎÀÐÇÐźźÍÖ±²¥Á÷ʵÏÖ£¬ºÚ¿ÍÔÚÆÁÄ»ÉÏչʾÓëÆµµÀÄÚÈÝÎ޹صÄÎÄ×Ö£¬Æä¹æÄ£º£º£ºÍÕë¶ÔÐÔÅú×¢ÕâÊÇÒ»´Îе÷Ðж¯¡£¡£Ö»¹Ü²¿Ãű¨µÀ´§Ä¦¹¥»÷¿ÉÄÜÉæ¼°°¢¸»º¹ºÚ¿Í£¬µ«ÉÐδÓÐÈ·ÔäÖ¤¾Ý¡£¡£×÷Ϊ»ØÓ¦£¬°Í»ù˹̹±»Ö¸ÌáÒéÍøÂç»Ø»÷£¬Ô̺¬¶ÔÓ¡¶ÈABPÐÂÎÅÆµµÀºÍFood OdishaÍøÕ¾µÄDDoS¹¥»÷¼°ÈëÇÖÐж¯£¬ºÚ¿ÍÉõÖÁÀûÓÃÖ±²¥ÐźŲ¥·Å°Í»ù˹̹½¾üÕÕ·÷³¤µÄ½²»°¡£¡£Õâ´ÎÊÂÎñ»¹²¨¼°19¸ö¹ú¶ÈµÄÍøÕ¾£¬ºÚ¿Í±»ÆØÔÚÕâÐ©ÍøÕ¾Í¶·Åδ¾ÊÚȨµÄ¹È¸è¸æ°×¡£¡£Geo News°µÊ¾£¬¸ÃƵµÀÓëºÚ¿ÍÆ¥µÐ½ü24Сʱºó²Å¸´Ô½ÚÖÆ£¬Ç¿µ÷Óк¦ÐÅÏ¢ÆëÈ«ÓÉÍâ²¿È¨ÊÆÖ²Èë¡£¡£
https://hackread.com/pakistan-news-channels-hacked-anti-military-messages/
5. ÃÀµ±¾ÖÓëAnthropic AIʹÓÃÕùÒéÉý¼¶
2ÔÂ28ÈÕ£¬ÃÀ¹ú¹ú·À²¿³¤ºÕ¸ñÈû˼½«AnthropicÁÐΪ¡°¹©¸øÁ´·çÏÕ¡±ºó£¬Ë«·½ÝÓÈÆAIÄ£ÐÍClaudeµÄ¾üÊÂÀûÓ÷¢×÷Ç¿ÁÒì¶Ü¡£¡£AnthropicǿӲ»ØÓ¦³Æ£¬´Ë¾ÙÔ´ÓÚÊýÔ½»É潩¾Ö£¬Æä¶ÔÖÅΪClaudeµÄºÏ·¨Ê¹ÓÃÔöÉèÁ½ÏîÀýÍ⣬²»ÈÝÓÃÓÚÃÀ¹úÃñÖÚ´ó¹æÄ£¹úÄÚ¼à¿ØÓëÆëÈ«×ÔÖ÷±øÆ÷£¬²¢Ç¿µ÷¡°ÎÞÂÛÎå½Ç´ó¥ʩ¼ÓºÎÖÖ¿ÖÏÅ£¬¶¼²»»áŤת̬¶È¡±¡£¡£ÌØÀÊÆÕµ±¾ÖѸËÙ²ÉÈ¡Ðж¯£¬ÒªÇóÁª°î»ú¹¹Áù¸öÔÂÄÚÍ£ÓÃAnthropic¼¼Êõ£¬ºÕ¸ñÈû˼½øÒ»²½Ö¸ÁîÃÀ¾ü³Ð°üÉÌ¡¢¡¢¹©¸øÉ̼°ºÏ×÷ͬ°éÁ¢¼´ÖÕÖ¹ÓëAnthropicµÄóÒ׺Ï×÷¡£¡£Îå½Ç´óÂ¥Ðû³Æ£¬´Ë¾ÙÖ¼ÔÚ´òÔì¡°AIÓÅÏÈ¡±×÷Õ½¶ÓÁУ¬ÒªÇóAIÄ£ÐÍÎÞʹÓÃÕþ²ßÏÞ¶È¡¢¡¢²»¹ÊÕϺϷ¨¾üÊÂÀûÓ㬲¢Ôð¹ÖAnthropicµÄ̬¶È¡°Î£¼°¹Ø¼ü¾üÊÂÐж¯¡±¡£¡£Anthropic±ç²µ³Æ£¬Îå½Ç´óÂ¥µÄÒªÇó²»×ã˾·¨Æ¾¾Ý£¬½«¿ª´´Î£ÏÕÏÈÀý¡£¡£¹«Ë¾Ç¿µ÷£¬ÆäÖ§³ÖAIÓÃÓںϷ¨¶ÔÍâµý±¨¹¤×÷£¬µ«´ó¹æÄ£¹úÄÚ¼à¿ØÓëÃñÖ÷¼ÛÖµ¹ÛÏà㣣¬ÇÒAIÇý¶¯µÄ´ó¹æÄ£¼à¿Ø¶Ô¸ù»ù×ÔÓÉ×é³ÉÐÂÐÍ·çÏÕ¡£¡£¹«Ë¾Ô®Òý¡¶ÃÀÍõ·¨µä¡·µÚ10±àµÚ3252Ìõ£¬Ö¸³ö¹©¸øÁ´·çÏÕÈ϶¨½öÓ°ÏìÕ½Õù²¿ºÏͬÖеÄClaudeʹÓ㬲»Ó°ÏìÆäËû¿Í»§¡£¡£
https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html
6. Íþ˹¿µÐǵ¤ÂóÑ§ÇøÔâÍøÂçÊÂÎñÖÂÎåÈÕ¶ÏÍø
3ÔÂ2ÈÕ£¬Íþ˹¿µÐÇÖݵ¤Âó´åµ¤ÂóÑ§ÇøÒò"ÍøÂçÊÂÎñ"Â½ÐøÎå¸öÉÏ¿ÎÈÕÎÞ·¨ÁªÍø£¬Ô¼1500ÃûK-12ѧÉú¼°½ÌÈËÔ±¹¤±»ÆÈʹÓÃÖ½ÖÊ×ÊÁϽ²ÊÚ£¬¸ÃÊÂÎñ²úÉúÔÚ1ÔÂ30ÈÕÖÁ2ÔÂ5ÈÕ¡£¡£µ¤ÂóÐÂÎÅÍø2ÔÂ9ÈÕ±¨µÀ³Æ£¬Õâ´ÎÖжÏÓÉ"ÍøÂçÊÂÎñ"Òý·¢£¬µ«Î´Ã÷È·¹¥»÷ÀàÐÍ£»£»Ñ§ÇøÍøÂçÌṩÉÌWiscNetµÄ״̬ÊÂÎñÏÔʾ£¬Ñ§Çø"½»´ú¶Ë¿Ú"å´»ú7Ì죬µ××ÓÔÒò±êעΪ"ÄÚ²¿ÔÒò"¡£¡£½ØÖÁ3ÔÂ3ÈÕ£¬Ñ§Çø¹ÙÔ±ÉÐδ¹«¿ª¾ßÌåÐÅÏ¢£¬Ô̺¬ÊÜÓ°ÏìϵͳÁìÓò¡¢¡¢Êý¾ÝÊÇ·ñ±»½Ó¼û¡¢¡¢ÊÇ·ñÉæ¼°·¨Âɲ¿ÃÅ»òÍⲿÏìÓ¦¹«Ë¾È¾Ö¸µÈϸ½Ú¡£¡£ÀÕË÷Èí¼þ×·×ÙÍøÕ¾ransomware.live½«Ñ§ÇøÓòÃûdenmark.k12.wi.usÁÐΪÍþв×éÖ¯"Incransom"µÄÊܺ¦Õߣ¬¸Ã×éÖ¯Ðû³Æ3ÔÂ1ÈÕ·¢ÏÖ¹¥»÷£¬µ«Õâһ˵·¨×ÔÉíÎÞ·¨Ö¤ÊµÀÕË÷Èí¼þ»òÊý¾Ý͵ÇÔÏÖʵ²úÉú¡£¡£Ñ§Çø¶ÔýÌåÖÃÆÀÒªÇóδÓè»ØÓ¦¡£¡£µ¤ÂóÑ§Çø¸²¸Ç²¼ÀÊÏØ¡¢¡¢ÂíÄáÍÐÎÖ¿ËÏØºÍ»ùÎÖÄáÏØ²¿ÃÅÇøÓò£¬Õâ´Î¶ÏÍø²»½öÓ°ÏìÈÕ³£½²ÊÚ£¬¸ü¶³ö³ö½ÌÓý»ú¹¹ÔÚÍøÂ簲ȫ·À»¤·½ÃæµÄ´àÈõÐÔ¡£¡£
https://dysruptionhub.com/denmark-schools-outage-wisconsin/


¾©¹«Íø°²±¸11010802024551ºÅ