BianLianÀÕË÷Èí¼þÀûÓÃSVG´¹µö¹¥»÷ίÄÚÈðÀÆóÒµ
°ä²¼¹¦·ò 2026-03-311. BianLianÀÕË÷Èí¼þÀûÓÃSVG´¹µö¹¥»÷ίÄÚÈðÀÆóÒµ
3ÔÂ27ÈÕ£¬£¬£¬WatchGuard×êÑÐÈËÔ±½üÈÕÅû¶£¬£¬£¬BianLianÀÕË÷Èí¼þ×éÖ¯ÕýÕë¶ÔίÄÚÈðÀÆóÒµÌáÒéÐÂÐÍÍøÂç´¹µö¹¥»÷£¬£¬£¬Í¨¹ý¶ñÒâSVGͼÏñÎļþºÍÆæÃîÖØ¶¨Ïò¼¼ÊõÈÆ¹ý´«Í³°²È«·À»¤£¬£¬£¬Ö´ÐиßËÙAES¼ÓÃÜÀÕË÷¡£¡£¡£Õâ´Î¹¥»÷¸ß¶È¼¯ÖÐÔÚίÄÚÈðÀ£¬£¬£¬¹¥»÷Á´Ê¼ÓÚ¼Ù×°³É·¢Æ±»òÔ¤ËãµÄ´¹µöÓʼþ£¬£¬£¬¸½¼þΪʹÓÃÎ÷°àÑÀÓﶨÃûµÄSVGÎļþ£¬£¬£¬¿´ËÆÍ¨³£Í¼Æ¬ÊµÔòǶÈëXML´úÂë¡£¡£¡£Óû§´ò¿ªÎļþºó£¬£¬£¬»á°ÂÃØÏνÓÍⲿURL£¬£¬£¬ÏÂÔØÓÉGo˵»°±àдµÄÒñ±ÎWindows·¨Ê½×÷ΪÓÐÐ§ÔØºÉ¡£¡£¡£¹¥»÷Õßѡȡ16λÁîÅÆÏµÍ³´«µÝ¶ñÒⷨʽ£¬£¬£¬¸Ã·¨Ê½¾ß±¸·´¼à¿ØÄÜÁ¦£¬£¬£¬»á¼ì²âWine¹¤¾ßÒÔÅжÏÊÇ·ñ´¦ÓÚ°²È«·ÖÎö»·¾³£¬£¬£¬²¢ÔÚϵͳ¡°¹ÒÆð¡±Ê±³ÖÐø¼à¶½£¬£¬£¬ÀûÓ÷ÀÓù¿ÕµØÖ´Ðй¥»÷¡£¡£¡£ÆäÖ÷Ìâ±øÆ÷ÊǸßËÙAES¼ÓÃÜÄ£¿é£¬£¬£¬¿É¼±¾çËø¶¨ÎļþÖ´ÐÐÀÕË÷¡£¡£¡£¼¼Êõϸ½ÚÏÔʾ£¬£¬£¬¸Ã¹¥»÷ͨ¹ýËõ¶ÌÁ´½Ó·þÎñja.cat½øÐÐÁ÷Á¿Öض¨Ïò£¬£¬£¬×îÖÕÖ¸Ïò±»ÈëÇֵİÍÎ÷ÓòÃû£¬£¬£¬Ðγɶà²ãÌø°å¶ã±Ü×·×Ù¡£¡£¡£WatchGuard×êÑÐÖ¸³ö£¬£¬£¬ÕâЩսÊõÓëBianLian×éÖ¯×Ô2022ÄêÒÔÀ´µÄ×÷°¸ÊÖ·¨¸ß¶ÈÎǺϡ£¡£¡£
https://hackread.com/bianlian-ransomware-fake-invoice-svg-images-attacks/
2. Î÷°àÑÀά¸ê¸ÛÔâÀÕË÷Èí¼þ¹¥»÷
3ÔÂ26ÈÕ£¬£¬£¬Î÷°àÑÀά¸ê¸Û½üÈÕÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ¼ÖÂÆäÊý×ÖϵͳÑÏÖØÊÜË𡣡£¡£¹¥»÷ÓÚÖܶþÔ糿±»·¢ÏÖ£¬£¬£¬Ó°Ïì¼ÓÀûÎ÷ÑǵØÓò¸Û¿ÚÓÃÓÚ»õÎïÔËÊäÖÎÀí¼°ÆäËûÊý×Ö·þÎñµÄÍÆËã»ú·þÎñÆ÷¡£¡£¡£²¿ÃÅÉ豸±»Ëø¶¨£¬£¬£¬¹¥»÷ÕßÒªÇóÖ§¸¶Êê½ðÒÔ¸´Ôϵͳ½Ó¼ûȨÏÞ¡£¡£¡£Îª¶ôÖÆ¹¥»÷À©É¢£¬£¬£¬¸ÛÎñ¾Ö¼¼ÊõÍŶÓѸËÙ½«ÊÜÓ°ÏìϵͳÓëÍâ²¿ÍøÂç¸ôÀ룬£¬£¬²¢Æô×ÅÊÖ×÷Ϊҵģʽ¡£¡£¡£¸Û¿Ú×ܲÿ¨Âå˹¡¤²©ËþÄÉÇ¿µ÷£¬£¬£¬ÔÚ°²È«ÍŶÓÈ·ÈÏϵͳ¾ø¶Ô°²È«Ç°£¬£¬£¬²»»áÖØÐÂÏνÓÈκÎÊý×Öϵͳ£¬£¬£¬Ä¿Ç°ÉÐÎÞ¸´ÔÊý×ÖÔËÓªµÄ¹¦·ò±í¡£¡£¡£Ö»¹Ü´¬²°º½ÐкͻõÎïװжµÈʵÌåÔËÓªÈÔÔÚ³ÖÐø£¬£¬£¬µ«ÒÀÀµÊý×ÖÆ½Ì¨µÄÎïÁ÷е÷¹¤×÷Êܵ½ÏÔÖøÓ°Ï죬£¬£¬²¿ÃŲÙ×÷ÈËÔ±ÒÑתΪÈËΪ²Ù×÷²¢ÒÀÀµÖ½ÖÊÎļþʵÏÖ¹¤×÷¡£¡£¡£µ÷²éÕýÔÚ½øÐÐÖУ¬£¬£¬ÒÔÈ·¶¨¹¥»÷ÕßÈôºÎÈëÇÖÍøÂçÒÔ¼°ÊÇ·ñ´æÔÚÃô¸ÐÊý¾Ýй¶¡£¡£¡£²©ËþÄɽ«Õâ´ÎÊÂÎñ¶¨ÐÔΪ¾¼Ã¶¯»úµÄÍøÂç¹¥»÷£¬£¬£¬Ö¼ÔÚÀÕË÷Êê½ð¡£¡£¡£½ØÖÁĿǰ£¬£¬£¬ÉÐÎÞÈκÎÍøÂç·¸×ï×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¡£¡£
https://therecord.media/port-of-vigo-ransomware
3. FortiClient EMS¸ßΣSQL×¢Èë·ì϶Ôâ»îÔ¾ÀûÓÃ
3ÔÂ30ÈÕ£¬£¬£¬Íþвµý±¨¹«Ë¾Defused½üÈÕÅû¶£¬£¬£¬¹¥»÷ÕßÕý»ý¼«ÀûÓÃFortinet FortiClient EMSƽ̨µÄCVE-2026-21643ÑÏÖØSQL×¢Èë·ì϶¡£¡£¡£¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÍþвÐÐΪÕßͨ¹ý»ú¹Ø¶ñÒâHTTPÒªÇ󣬣¬£¬ÔÚδÐÞ²¹µÄFortiClient EMS 7.4.4°æ±¾Web½çÃæÖ´ÐÐËÁÒâ´úÂë»òºÅÁ£¬£¬¹¥»÷¸´ÔӶȵÍÇÒÎÞÐèÌØÊâȨÏÞ¡£¡£¡£DefusedÇ¿µ÷£¬£¬£¬Ö»¹ÜCISA¼°ÆäËûÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ÈÔÏóÕ÷¸Ã·ì϶Ϊ¡°Î´±»ÀûÓá±£¬£¬£¬µ«ÆäÄÚ²¿Êý¾ÝÒÑ֤ʵËÄÌìǰ³öÏÖ³õ´ÎÀûÓð¸Àý¡£¡£¡£·ì϶ÓÉFortinet°²È«ÍŶÓÄÚ²¿·¢ÏÖ£¬£¬£¬Ó°Ïì7.4.4°æ±¾£¬£¬£¬Óû§¿Éͨ¹ýÉý¼¶ÖÁ7.4.5»ò¸ü¸ß°æ±¾ÐÞ¸´¡£¡£¡£È»¶ø£¬£¬£¬FortinetÉÐδ¸üа²È«²¼¸æ»òÈ·ÈÏ·ì϶Òѱ»ÏÖʵÀûÓᣡ£¡£¾ÝShodanɨÃ裬£¬£¬½ü1000¸öFortiClient EMSʵÀýÒѹ«¿ªÂ¶³ö£»£»£»Shadowserver×·×Ùµ½³¬2000¸ö¶³öʵÀý£¬£¬£¬ÆäÖÐ1400¸öIPµØÖ·Î»ÓÚÃÀ¹úºÍÅ·ÖÞ£¬£¬£¬ÎÞÊý¼¯ÖÐÔÚÃÀ¹ú¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/
4. ¶íTA446ÀûÓÃDarkSword·ì϶¶ÔiOSÉ豸ÌáÒé´¹µö¹¥»÷
3ÔÂ30ÈÕ£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄ¸ß¼¶³ÖÐøÍþв×éÖ¯TA446£¨±ðºÅSEABORGIUM¡¢¡¢¡¢ColdRiverµÈ£©ÕýÀûÓÃDarkSword·ì϶ÀûÓù¤¾ß°ü£¬£¬£¬Õë¶ÔiOSÉ豸ÌáÒ鶨ÏòÓã²æÊ½ÍøÂç´¹µö¹¥»÷¡£¡£¡£¸Ã×éÖ¯×Ô2017ÄêÆð³ÖÐø»îÔ¾£¬£¬£¬ÖØÒªÕë¶Ô±±Ô¼¹ú¶È¼°¶«Å·µØÓò£¨º¬ÎÚ¿ËÀ¼£©£¬£¬£¬Ö¸±êº¸Ç¹ú·À/µý±¨¹«Ë¾¡¢¡¢¡¢·Çµ±¾Ö×éÖ¯¡¢¡¢¡¢µ±¾ÐÄä×éÖ¯¡¢¡¢¡¢Öǿ⡢¡¢¡¢¸ßУ£¬£¬£¬ÒÔ¼°Ç°µý±¨¹ÙÔ±¡¢¡¢¡¢¶íÂÞ˹ÊÂÎñר¼ÒºÍÍâÑó¶í¹«Ãñ£¬£¬£¬Í¨¹ýÇÔȡƾ֤Óëµý±¨ÊµÏÖÈëÇÖºÍÊý¾ÝÇÔÈ¡¡£¡£¡£Õâ´Î¹¥»÷ÖУ¬£¬£¬TA446ͨ¹ýαÔì´óÎ÷ÑóÀíÊ»áÓʼþ·¢ËÍÁ´½Ó£¬£¬£¬Á´½ÓÖ¸Ïò¿´ËÆÎÞº¦µÄPDFµö¶üÎļþ£¬£¬£¬ÀûÓ÷þÎñÆ÷¶Ë¹ýÂË»úÖÆ½«Óû§Öض¨ÏòÖÁDarkSword·ì϶ÀûÓù¤¾ß°ü£¬£¬£¬Ö´Ðж¨ÏòͶ·ÅÕ½Êõ¡£¡£¡£¸Ã¹¤¾ß°üÔ̺¬Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡¢¡¢¡¢PACÈÆ¹ýµÈ×é¼þ£¬£¬£¬Ëäδ·¢ÏÖɳÏäÌÓÒÝ£¬£¬£¬µ«ÒÑ֤ʵͨ¹ý¼ÓÔØÆ÷MD5¹ØÁªTA446µÚ¶þ½×¶ÎÓòÃû£¬£¬£¬ÏÔʾÆäÏÖʵʹÓᣡ£¡£
https://securityaffairs.com/190139/apt/russia-linked-apt-ta446-uses-darksword-exploit-to-target-iphone-users-in-phishing-wave.html
5. Ò½ÁƿƼ¼¹«Ë¾CareCloud³ÆºÚ¿ÍÇÔÈ¡ÁË»¼ÕßÊý¾Ý
3ÔÂ30ÈÕ£¬£¬£¬Ò½ÁÆÐÅÏ¢¼¼Êõ¹«Ë¾CareCloud½üÈÕÅû¶һ·ÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Òý¿¯ÐÐÒµ¹Ø×¢¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚÃÀ¹úÐÂÔóÎ÷ÖÝ£¬£¬£¬×÷Ϊ¹«¿ªÉÏÊеÄÒ½ÁƱ£½¡IT·þÎñÉÌ£¬£¬£¬ÖØÒªÌṩSaaSÈí¼þ¡¢¡¢¡¢ÊÕÈëÖÜÆÚÖÎÀí¡¢¡¢¡¢µç×Ó½¡¿µ¼Í¼£¨EHR£©µÈ½â¾ö¹æ»®¡£¡£¡£¾ÝCareCloudÏòÃÀ¹ú֤ȯÂòÂôίԱ»áÌá½»µÄÎļþÏÔʾ£¬£¬£¬2026Äê3ÔÂ16ÈÕ£¬£¬£¬ÆäÆìÏÂCareCloud Health²¿ÃÅÔâ·êÍøÂçÖжϣ¬£¬£¬µ¼ÖÂÁù¸öµç×Ó½¡¿µ¼Í¼»·¾³Ö®Ò»µÄÖ°ÄܺÍÊý¾Ý½Ó¼ûÅö±Ú£¬£¬£¬³ÖÐøÔ¼8СʱºóÆëÈ«¸´Ô¡£¡£¡£¾µ÷²éÈ·ÈÏ£¬£¬£¬ºÚ¿ÍÔÚÈëÇÖÆÚ¼ä½Ó¼ûÁ˸ù«Ë¾IT»ù´¡ÉèÊ©£¬£¬£¬²¢Ôì³É´æ´¢¿Í»§»¼Õß½¡¿µ¼Í¼µÄÌØ¶¨»·¾³Êý¾Ýй¶¡£¡£¡£Ö»¹Ü¹«Ë¾Ç¿µ÷δ¾ÊÚȨµÄÊý¾Ý½Ó¼ûÁìÓòÓÐÏÞ£¬£¬£¬µ«¾ßÌåÊÜÓ°ÏìÈËÊý¼°Êý¾ÝÀàÐÍÈÔ´ý½øÒ»´ëÊ©²éÈ·ÈÏ¡£¡£¡£ÊÂÎñ²úÉúºó£¬£¬£¬CareCloudѸËÙÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ¡£¡£¡£¹«Ë¾Ç¿µ÷Õâ´ÎÊÂÎñ䲨¼°ÆäËûƽ̨¡¢¡¢¡¢²¿ÃÅ»òϵͳ£¬£¬£¬¹¥»÷ÕßÒÑÎÞ·¨³ÖÐø½Ó¼ûÆäÊý¾Ý¿â£¬£¬£¬ËùÓÐÊÜÓ°Ïìϵͳ¾ùÒÑÆëÈ«¸´Ô¡£¡£¡£
https://www.bleepingcomputer.com/news/security/healthcare-tech-firm-carecloud-says-hackers-stole-patient-data/
6. RoadK1ll£º£º£ºWebSocket·´ÏòËíµÀʵÏÖÒñ±ÎÉøÈë
3ÔÂ30ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬Íйܼì²âºÍÏìÓ¦£¨MDR£©ÌṩÉÌBlackpointÔÚÊÂÎñÏìÓ¦Öз¢ÏÖÁËÃûΪRoadK1llµÄÐÂÐÍNode.js¶ñÒâÖ²È뷨ʽ£¬£¬£¬¸Ã·¨Ê½Í¨¹ý×Ô½ç˵WebSocketºÍ̸ʵÏÖ¹¥»÷ÕßÓëÊÜϰȾÖ÷»úµÄ³ÖÐøÍ¨Ñ¶£¬£¬£¬¾ß±¸¸ß¶ÈÒñ±ÎÐÔºÍÀ©´óÐÔ¡£¡£¡£RoadK1ll±»½ç˵ΪÇáÁ¿¼¶·´ÏòËíµÀÖ²ÈëÎ£¬£¬ÆäÖ÷ÌâÖ°ÄÜÊǽ«ÊÜËðÖ÷»úת»¯Îª¿É¿ØÖм̵㡣¡£¡£Í¨¹ý³ÉÁ¢µ½¹¥»÷Õß½ÚÖÆ»ù´¡ÉèÊ©µÄ³öÕ¾WebSocketÏνӣ¬£¬£¬¸Ã·¨Ê½¿É°´Ðèת·¢TCPÁ÷Á¿£¬£¬£¬Ê¹ÍþвÐÐΪÕßÎÞÐèÒÀÀµ´«Í³ÈëÕ¾¼àÌýÆ÷¼´¿É½Ó¼ûÄÚ²¿ÍøÂç×ÊÔ´¡£¡£¡£ÕâÖÖÉè¼ÆÊ¹¹¥»÷ÕßÄÜÈÆ¹ýÌìǵ½ÚÖÆ£¬£¬£¬ÓÉÓÚÏνÓÔ´×Ô±»ÈëÇÖ»úе£¬£¬£¬¿É¼Ì³ÐÆäÍøÂçÐÅÀµºÍµØÎ»£¬£¬£¬ÓÐЧ½Ó¼ûÕý±¾ÎÞ·¨´ÓÍⲿֱ½Ó½Ó¼ûµÄÄÚ²¿ÏµÍ³¡¢¡¢¡¢·þÎñ¼°ÍøÂç¶Î¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ§³Ö¶à²¢·¢ÏνÓÄÜÁ¦£¬£¬£¬ÔÊÐíͬʱÓë¶à¸öÖ¸±êͨѶ¡£¡£¡£ÆäºÅÁÔ̺¬Ïνӡ¢¡¢¡¢Êý¾Ýת·¢¡¢¡¢¡¢ÏνÓÈ·ÈÏ¡¢¡¢¡¢ÏνÓÖÕÖ¹¼°ÃýÎó·´À¡µÈ»ù´¡Ö¸Á£¬£¬ÆäÖÐCONNECTºÅÁî¿É´¥·¢ÏòÖ¸¶¨Ö÷»úºÍ¶Ë¿ÚµÄ³öÕ¾TCPÏνӣ¬£¬£¬ÊµÏÖ¹¥»÷ÁìÓòµÄºáÏòÀ©´ó¡£¡£¡£ÈôͨѶÖжϣ¬£¬£¬·¨Ê½»á×Ô¶¯Æô¶¯ÖØÁ¬»úÖÆ¸´ÔËíµÀ£¬£¬£¬È·±£¹¥»÷³ÖÐøÐÔÇÒÏ÷¼õÊÖ¶¯¹ýÎʲúÉúµÄÔëÒô¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks/


¾©¹«Íø°²±¸11010802024551ºÅ