Schemata API·ì϶й¶¾üÊÂѵÁ·×ÊÁÏÓëÓû§Êý¾Ý
°ä²¼¹¦·ò 2026-05-081. Schemata API·ì϶й¶¾üÊÂѵÁ·×ÊÁÏÓëÓû§Êý¾Ý
5ÔÂ6ÈÕ£¬£¬¾Ý¿ªÔ´×ÔÖ÷°²È«²âÊÔÏîÄ¿Strix°ä²¼µÄ»ã±¨£¬£¬Ò»¼ÒÓëÃÀ¹ú¹ú·À²¿Ç©¶¨Á˼ÛÖµ340ÍòÃÀÔªºÏͬµÄ¹ú·À¼¼Êõ¹«Ë¾Schemata£¬£¬ÒòÆäAPI¶Ëµã²»×ãÓÐЧµÄÊÚȨ²é³£¬£¬Ð¹Â¶ÁËÓû§¼Í¼ºÍ¾üÊÂѵÁ·×ÊÁÏ¡£¡£Õâ´Î°²È«·ì϶ӰÏìÁËSchemata¹«Ë¾¿ª·¢µÄAIÇý¶¯ÐÍÐ鹹ѵÁ·Æ½Ì¨£¬£¬¸ÃÆ½Ì¨ÖØÒªÓÃÓÚ¾üʺ͹ú·ÀÁìÓò¡£¡£Strix¹«Ë¾³Æ£¬£¬Ò»¸öͨ³£µÄµÍȨÏÞÕË»§¼´¿É½Ó¼û¶à¸ö×â»§µÄÊý¾Ý£¬£¬Ô̺¬Óû§ÁÐ±í¡¢¡¢×éÖ¯¼Í¼¡¢¡¢¿Î³ÌÐÅÏ¢¡¢¡¢ÑµÁ·ÔªÊý¾ÝÒÔ¼°Ö¸ÏòÍйÜÔÚAWSʵÀýÉϵÄÎĵµµÄÖ±½ÓÁ´½Ó¡£¡£Ð¹Â¶µÄ×ÊÁÏÔ̺¬ÃæÏòˮʦάÐÞÈËÔ±µÄ3DÐ鹹ѵÁ·¿Î³Ì¡¢¡¢Ô̺¬Â½¾ü±¬Õ¨Îï´¦ÖúÍÕ½Êõ²¿ÊðÒ°Õ½ÊÖ²áµÄ¿Î³Ì£¬£¬ÒÔ¼°Êý°ÙÌõÓë»ùµØºÍѵÁ·×¢²áÓйصÄÓû§¼Í¼£¬£¬´ËÍâ»¹Éæ¼°ÐÕÃû¡¢¡¢µç×ÓÓʼþµØÖ·¼°ÃÀ¹úÎäʿפÔúµÄ¾üÊ»ùµØÐÅÏ¢¡£¡£Õâ´Î·ì϶ÀûÓò¢²»¸´ÔÓ£º£º×êÑÐÈËԱʹÓõÍȨÏÞÕË»§¼à¿ØÕý³£ä¯ÀÀÆ÷Á÷Á¿£¬£¬¼ø±ðÀûÓ÷¨Ê½Â¶³öµÄAPI¶Ëµã£¬£¬ËæºóÔÚͳһ»á»°ÖÐÒªÇó¸ß¼ÛÖµÊý¾Ý£¬£¬ÕâЩҪÇó³É¹¦·µ»ØÁ˸ÃÕË»§µØµã×éÖ¯ÍⲿµÄ¼Í¼£¬£¬Åú×¢APIδÄÜÕýÈ·Ö´ÐÐ×â»§Ììǵ»òÓû§È¨ÏÞ½ÚÖÆ¡£¡£SchemataÈÏ¿ÉÊÜÓ°ÏìµÄ¶ËµãÓÚ5ÔÂ1Èյõ½ÐÞ¸´¡£¡£
https://cyberscoop.com/schemata-dod-contractor-api-flaw-military-data-exposure/
2. ShinyHuntersÔÙÏ®Instructure£¬£¬´Û¸ÄCanvasÃÅ»§
5ÔÂ7ÈÕ£¬£¬ÀÕË÷ÍÅ»ïShinyHunters½üÆÚÔٴι¥Ï½ÌÓý¼¼Êõ¾ÞÍ·Instructure£¬£¬ÀûÓÃϵͳ·ì϶´Û¸ÄÁËÊý°ÙËùѧԺºÍ´óѧʹÓõÄCanvasѧϰÖÎÀíϵͳµÇ¼ÃÅ»§¡£¡£Õâ´Î´Û¸Ä³ÖÐøÔ¼30·ÖÖÓºó±»³·Ï£¬£¬ÆÚ¼ä¹¥»÷ÕßÔÚµÇÂ¼Ò³ÃæÉϰ䲼ÀÕË÷ÐÅÏ¢£¬£¬Ðû³Æ¶Ô֮ǰµÄÊý¾Ýй¶ÊÂÎñÕÆ¹Ü£¬£¬²¢Íþв³ÆÈô²»ÔÚ2026Äê5ÔÂ12ÈÕʵÏÖǰ֧¸¶Êê½ð£¬£¬½«¹«¿ªËùÓб»µÁÊý¾Ý¡£¡£ÐÅÏ¢ÖÐÔð¹ÖInstructureδ×Ô¶¯ÁªÏµ½â¾öÎÊÌ⣬£¬·´¶ø½ö×öÁË¡°°²È«²¹¶¡¡±£¬£¬Í¬Ê±½¨ÒéÊÜÓ°ÏìѧÌÃͨ¹ýÍøÂ簲ȫÕ÷ѯ¹«Ë¾ÁªÏµ¹¥»÷ÕßÐÉÌ¡£¡£¾Ý±¨µÀ£¬£¬Ô¼330Ëù½ÌÓý»ú¹¹µÄCanvasÃÅ»§±»´úÌæÎª³ß¶ÈÀÕË÷Ò³Ãæ£¬£¬ÉõÖÁ³Ê´Ë¿ÌCanvasÀûÓ÷¨Ê½ÖС£¡£Îª´Ë£¬£¬InstructureÒÑ´¹Î£ÏÂÏßCanvasÍøÕ¾ÒÔÓ¦¶Ô¹¥»÷¡£¡£´ËǰһÖÜ£¬£¬Instructure¸ÕÅûÂ¶Ò»Â·ÍøÂç¹¥»÷£¬£¬ShinyHuntersÐû³ÆÒÑͨ¹ýCanvasÊý¾Ýµ¼³öÖ°ÄܺÍAPIÇÔÈ¡ÁËÉæ¼°8809ËùѧУ¡£¡¢¡¢´óѧºÍ½ÌÓýƽ̨µÄ2.8ÒÚÌõѧÉúÓë½ÌÖ°¹¤¼Í¼£¬£¬Ô̺¬Óû§ÐÅÏ¢¡¢¡¢¸öÈËÐÂÎż°×¢²áÊý¾ÝµÈ¡£¡£InstructureËä֤ʵÊý¾Ý±»µÁ£¬£¬µ«ÈÔÔÚµ÷²éÖС£¡£
https://www.bleepingcomputer.com/news/security/canvas-login-portals-hacked-in-mass-shinyhunters-extortion-campaign/
3. ľÂíTCLBanker½èÂÞ¼¼Èí¼þÈä³æÊ½´«²¼
5ÔÂ7ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪTCLBankerµÄÐÂÐÍÒøÐÐľÂí£¬£¬ËüÒÔ59¼ÒÒøÐС¢¡¢½ðÈڿƼ¼¼°¼ÓÃÜÇ®±Òƽ̨Ϊָ±ê£¬£¬ÀûÓñ»Ö²Èë¶ñÒâ´úÂëµÄLogitech AI Prompt Builder MSI×°Ö÷¨Ê½½øÐд«²¼¡£¡£¾Ý·ÖÎö£¬£¬TCLBanker±»ÒÔΪÊÇÔçÆÚMaverick/Sorvepotel¶ñÒâÈí¼þ¼Ò×åµÄÖØ´óÑݱ䡣¡£Ä¿Ç°£¬£¬ËüÖØÒªÕë¶Ô°ÍÎ÷Óû§£¬£¬Í¨¹ý²é³Ê±Çø¡¢¡¢¼üÅ̲¼¾ÖºÍ˵»°ÇøÓòÀ´É¸Ñ¡Ö¸±ê¡£¡£ÔÚÖ°ÄÜÉÏ£¬£¬TCLBanker¾ß±¸¼«Ç¿µÄ¿¹·ÖÎöÓëµ÷ÊÔÄÜÁ¦¡£¡£ÆäÒøÐÐÄ£¿£¿£¿éÀûÓÃWindows UI×Ô¶¯»¯APIÿÃë¼à¿ØÒ»´Îä¯ÀÀÆ÷µØÖ·À¸£¬£¬Ò»µ©·¢ÏÖÊܺ¦Õß´ò¿ª59¸öÖ¸±êƽ̨֮һ£¬£¬±ãÁ¢¼´ÓëC2·þÎñÆ÷³ÉÁ¢WebSocket»á»°£¬£¬²¢½«Êܺ¦ÕߺÍϵͳÐÅÏ¢·¢ËͳöÈ¥¡£¡£×îÖµµÃ¹Ø×¢µÄÊÇÆäÈä³æÊ½´«²¼ÄÜÁ¦£º£º¸ÃľÂí»áËÑË÷Chromiumä¯ÀÀÆ÷ÖÐÒÑÈÏÖ¤µÄWhatsApp WebÊý¾Ý£¬£¬Æô¶¯°µ²ØµÄChromiumʵÀý½Ù³ÖÊܺ¦ÕßÕ˺ţ¬£¬É¸Ñ¡°ÍÎ÷ºÅÂëºóÏòÆä·¢ËͶñÒâÁ´½Ó£»£»£»Í¬Ê±£¬£¬Ëü»¹ÄÜͨ¹ýCOM×Ô¶¯»¯ÀÄÓÃMicrosoft Outlook£¬£¬´ÓÊܺ¦ÕßÓÊÏäÏòÁªÏµÈË·¢ËÍ´¹µöÓʼþ¡£¡£
https://www.bleepingcomputer.com/news/security/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook/
4. ¶ñÒâ¿ò¼ÜPCPJack£º£ºÇÔȡƾ֤²¢¶Ï¸ùµÐÊÖ
5ÔÂ7ÈÕ£¬£¬ÍøÂ簲ȫ¹«Ë¾SentinelLabs·¢ÏÖÁËÒ»ÖÖÃûΪPCPJackµÄÐÂÐͶñÒâÈí¼þ¿ò¼Ü£¬£¬ÆäÖ¸±êֱָ¶³öµÄÔÆ»ù´¡ÉèÊ©£¬£¬Ö¼ÔÚ´ó¹æÄ£ÇÔÈ¡¸÷ÀàÆ¾Ö¤²¢¿ÉÄÜͨ¹ý½ðÈÚڲơ¢¡¢À¬»øÓʼþ¡¢¡¢Æ¾Ö¤×ªÊÛ»òÀÕË÷»ñÀû¡£¡£¸Ã¿ò¼Ü¹¥»÷µÄ·þÎñÔ̺¬Docker¡¢¡¢Kubernetes¡¢¡¢Redis¡¢¡¢MongoDB¡¢¡¢RayMLÒÔ¼°´æÔÚ·ì϶µÄWebÀûÓ÷¨Ê½£¬£¬²¢ÇÒÔںܶàÇé¿öÏ»áÔÚÍøÂçÖнøÐкáÏòÒÆ¶¯¡£¡£PCPJackµÄÒ»¸öÏÔÖøÌØµãÊÇ£¬£¬ÔÚϰȾϵͳºó£¬£¬Ëü»á×Ô¶¯ËÑË÷²¢³¹µ×ÒÆ³ýÁíÒ»¸öÒÔÔÆÎª¹¥»÷Ö¸±êµÄÍþв×éÖ¯TeamPCPµÄ¹¤¾ß¡¢¡¢¹ý³Ì¡¢¡¢ÈÝÆ÷¡¢¡¢ÎļþºÍÓÆ¾ÃÐÔ¹¤¼þ£¬£¬´Ó¶øÈ·±£×ÔÉí¶ÔÈëÇÖϵͳµÄ¶ÀÕ¼½ÚÖÆ¡£¡£¸Ã¿ò¼ÜµÄÖ÷ÌâÖ°ÄÜÝÓÈÆÆ¾Ö¤ÇÔÈ¡·¢Õ¹£¬£¬Ö¸±êº¸ÇÔÆ»·¾³¡¢¡¢¿ª·¢Õßϵͳ¡¢¡¢¼´Ê±Í¨Ñ¶ÀûÓᢡ¢½ðÈÚ·þÎñ¡¢¡¢Êý¾Ý¿â¡¢¡¢SSHÃÜÔ¿¡¢¡¢SlackÁîÅÆ¡¢¡¢WordPressÅäÖᢡ¢OpenAIÓëAnthropicÃÜÔ¿¡¢¡¢Discord¡¢¡¢DigitalOceanµÈ¡£¡£ÔÚ±»ÈëÇֵĻ·¾³ÄÚ²¿£¬£¬PCPJackͨ¹ýÍøÂçSSHÃÜÔ¿ºÍÍ´´¦¡¢¡¢Ã¶¾ÙKubernetes¼¯ÈºÓëDockerÊØ»¤·¨Ê½£¬£¬²¢ÔڿɽӼûµÄÄÚ²¿Ö÷»úÉÏ×ÔÎÒ¸´ÖÆÀ´ÊµÏÖºáÏòÒÆ¶¯¡£¡£
https://www.bleepingcomputer.com/news/security/new-pcpjack-worm-steals-credentials-cleans-teampcp-infections/
5. IvantiÖÒ¸æEPMM¸ßΣÁãÈÕ·ì϶Õý±»ÀûÓÃ
5ÔÂ7ÈÕ£¬£¬Ivanti½üÈÕÏò¿Í»§·¢³ö´¹Î£ÖҸ棬£¬ÒªÇóÐÞ¸´Endpoint Manager Mobile£¨EPMM£©ÖеÄÒ»¸ö¸ßΣԶ³Ì´úÂëÖ´Ðзì϶£¨CVE-2026-6973£©£¬£¬¸Ã·ì϶Òѱ»ÓÐÏÞµÄÁãÈÕ¹¥»÷ËùÀûÓᣡ£´Ë·ì϶ԴÓÚÊäÈëÑéÖ¤²»µ±£¬£¬ÔÊÐíÓµÓÐÖÎÀíԱȨÏÞµÄÔ¶³Ì¹¥»÷ÕßÔÚÔËÐÐEPMM 12.8.0.0¼°¸üÔç°æ±¾µÄϵͳÉÏÖ´ÐÐËÁÒâ´úÂë¡£¡£Îª»º½â·çÏÕ£¬£¬Ivanti½¨Òé¿Í»§×°ÖÃ12.6.1.1¡¢¡¢12.7.0.1ºÍ12.8.0.1°æ±¾£¬£¬²¢²é³ÓµÓÐÖÎÀíԱȨÏÞµÄÕË»§£¬£¬±ØÒªÊ±ÂÖ»»Í´´¦¡£¡£IvantiÇ¿µ÷£¬£¬¸Ã·ì϶½öÓ°Ïì±¾µØ²¿ÊðµÄEPMM²úÆ·£¬£¬ÆäÔÆ½â¾ö¹æ»®¼°ÆäËû²úÆ·¾ù²»ÊÜÓ°Ïì¡£¡£¾ÝShadowserver¼à²â£¬£¬Ä¿Ç°Óг¬¹ý850¸öIvanti EPMMµÄIPµØÖ·ÔÚÏß¶³ö£¬£¬ÖØÒª¼¯ÖÐÔÚÅ·Ö޺ͱ±ÃÀ£¬£¬µ«Éв»Ã÷ÏÔÓм¸¶àÒѵõ½ÐÞ¸´¡£¡£Í³Ò»Ì죬£¬Ivanti»¹ÐÞ¸´Á˱ðµÄËĸö¸ßΣEPMM·ì϶£¨CVE-2026-5786¡¢¡¢CVE-2026-5787¡¢¡¢CVE-2026-5788ºÍCVE-2026-7821£©£¬£¬ÕâЩ·ì϶¿ÉÄÜÔÊÐí¹¥»÷Õß»ñµÃÖÎÀíԱȨÏÞ¡¢¡¢¼ÙÒâSentryÖ÷»ú»ñÈ¡ÓÐЧ֤ÊéµÈ£¬£¬µ«Ä¿Ç°ÉÐÎÞÖ¤¾ÝÅú×¢ËüÃÇÒѱ»ÔÚÏÖʵ¹¥»÷ÖÐÀûÓᣡ£
https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks/
6. ¾¯ÌèÐéαClaudeÍøÕ¾·Ö·¢BeagleºóÃÅ
5ÔÂ7ÈÕ£¬£¬ÍøÂ簲ȫ×êÑÐÈËÔ±·¢ÏÖ£¬£¬Ò»¸ö¼ÙðµÄClaude AIÍøÕ¾ÕýÔÚ´«²¼Ò»ÖÖÃûΪBeagleµÄ´Ëǰδ֪µÄWindowsºóÃÅ·¨Ê½¡£¡£¸ÃÐéÎ±ÍøÕ¾½«¶ñÒâÈí¼þ°ü×°³É¡°Claude-Pro Relay¡±·þÎñ£¬£¬Ðû³ÆÊÇ¡°×¨ÎªClaude-Code¿ª·¢ÕßÉè¼ÆµÄ¸ß»úÄÜÖм̷þÎñ¡±£¬£¬²¢Í¨¹ý·ÂÕպϷ¨ClaudeÍøÕ¾µÄÉ«²ÊºÍ×ÖÌåÀ´ºýŪÓû§¡£¡£È»¶ø£¬£¬ÆäÁ´½ÓÏÖʵÎÞ·¨Õý³£Ìø×ª¡£¡£Óû§½Ó¼û¡°claude-pro[.]com¡±ºó£¬£¬»á±»ÓÕµ¼µã»÷´óÐÍÏÂÔØ°´Å¥£¬£¬»ñȡһ¸öÃûΪ¡°Claude-Pro-windows-x64.zip¡±µÄ505MBѹËõ°ü£¬£¬ÆäÖÐÔ̺¬Ò»¸öMSI×°Ö÷¨Ê½¡£¡£¸Ã¹¥»÷»î¶¯×î³õÓÉMalwarebytes·¢ÏÖ£¬£¬Æä×êÑÐÈËÔ±Ö¸³ö£¬£¬¸Ã¡°Pro¡±×°Ö÷¨Ê½ÊÇClaudeµÄľÂí»¯¸±±¾£¬£¬ÔÚÕý³£ÔËÐеÄͬʱ»áÔÚºó¶Ü²¿ÊðPlugX¶ñÒâÈí¼þÁ´£¬£¬Ê¹¹¥»÷ÕßÄÜÔ¶³Ì½Ó¼ûϵͳ¡£¡£Sophos¹«Ë¾½øÒ»²½·ÖÎöºó·¢ÏÖ£¬£¬µÚÒ»½×¶ÎµÄÓÐÐ§ÔØºÉΪDonutLoader£¬£¬Ëü»á¼ÓÔØÒ»¸öÏà¶Ôµ¥Ò»µÄºóÃÅBeagle¡£¡£BeagleÖ§³ÖÓÐÏ޵ĺÅÁ£¬£¬Ô̺¬Ð¶ÔØ´úÀí¡¢¡¢Ö´ÐкÅÁî¡¢¡¢ÉÏ´«ºÍÏÂÔØÎļþ¡¢¡¢´´½¨ºÍÖØ¶¨ÃûĿ¼¡¢¡¢ÁгöĿ¼ÄÚÈÝÒÔ¼°É¾³ýĿ¼µÈÖ°ÄÜ¡£¡£
https://www.bleepingcomputer.com/news/security/fake-claude-ai-website-delivers-new-beagle-windows-malware/


¾©¹«Íø°²±¸11010802024551ºÅ