ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub£¬£¬£¬£¬£¬½ü12000´æ´¢¿âÃæÁÙΣº¦

Ðû²¼Ê±¼ä 2025-03-17

1. ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub£¬£¬£¬£¬£¬½ü12000´æ´¢¿âÃæÁÙΣº¦


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬Ò»³¡´ó¹æÄ£µÄÍøÂç´¹ÂڻÕë¶Ô½ü12,000¸öGitHub´æ´¢¿âÌᳫÁËÐéαµÄ¡°Çå¾²¾¯±¨¡±£¬£¬£¬£¬£¬ÍýÏëÓÕÆ­¿ª·¢Ö°Ô±ÊÚȨһ¸ö¶ñÒâµÄOAuthÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓóÌÐòÒ»µ©»ñµÃÊÚȨ£¬£¬£¬£¬£¬½«¸¶Óë¹¥»÷Õß¶ÔÓû§ÕÊ»§ºÍ´úÂëµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£ÕâÐ©ÍøÂç´¹ÂÚÎÊÌâ¶¼°üÀ¨ÏàͬµÄÎı¾£¬£¬£¬£¬£¬Éù³Æ¼ì²âµ½À´×Ô±ùµºÀ׿ËÑÅδ¿ËºÍÌØ¶¨IPµØµãµÄÒì³£µÇ¼ʵÑé¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±Luc4mÊ×ÏÈ·¢Ã÷ÁËÕâһȦÌ×£¬£¬£¬£¬£¬ÆäÖÐÖÒÑÔÓû§Ó¦¸üÐÂÃÜÂë¡¢¼ì²é»î¶¯»á»°²¢ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬µ«ËùÓÐÁ´½Ó¾ùÖ¸ÏòÒ»¸öÃûΪ¡°gitsecurityapp¡±µÄ¶ñÒâOAuthÓ¦ÓóÌÐò£¬£¬£¬£¬£¬ÇëÇó´ó×ÚΣÏÕȨÏÞ¡£¡£¡£¡£¡£¡£ÈôÓû§Ê§É÷ÊÚȨ£¬£¬£¬£¬£¬¸ÃÓ¦Óý«»ñÈ¡¶Ô¹«¹²ºÍ˽Óд洢¿âµÄÍêÈ«»á¼û¡¢Óû§×ÊÁÏÖÎÀí¡¢×éÖ¯ÏîÄ¿¶ÁÈ¡¡¢ÌÖÂÛ¶Áд¡¢GitHub gist»á¼û¼°´æ´¢¿âɾ³ýµÈȨÏÞ¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯Ê¼ÓÚ½ñÈÕÔçÉÏ6:52£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚÒ»Á¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì´æ´¢¿âÊýÄ¿ÓÐËù²¨¶¯£¬£¬£¬£¬£¬ÌåÏÖGitHubÕýÔÚ½ÓÄɲ½·¥Ó¦¶Ô¡£¡£¡£¡£¡£¡£ÈôÄúÊÜÓ°Ïì²¢ÒÑÊÚȨ¸Ã¶ñÒâÓ¦Ó㬣¬£¬£¬£¬ÇëÁ¬Ã¦ÔÚGitHubÉèÖÃÖÐ×÷·ÏÆä»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢²éÕÒÈκβ»ÊìϤ»ò¿ÉÒɵÄÓ¦ÓóÌÐò¼°GitHub ActionsÊÂÇéÁ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬½¨ÒéÂÖ»»ÄúµÄƾ֤ºÍÊÚȨÁîÅÆÒÔÔöÇ¿ÕË»§Çå¾²¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/


2. ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝÕþ¸®ÎÀÉúÆø¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂЧÀÍÖÐÖ¹


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝ£¬£¬£¬£¬£¬×÷Ϊ̫ƽÑ󵺹úÃÜ¿ËÂÞÄáÎ÷ÑÇÁª°îµÄËĸöÖÝÖ®Ò»£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£2025Äê3ÔÂ11ÈÕ£¬£¬£¬£¬£¬ÑÅÆÖµºÎÀÉú²¿¼ì²âµ½ÕâÒ»¹¥»÷£¬£¬£¬£¬£¬²¢Á¬Ã¦¹Ø±ÕÁËÆäÍøÂçºÍÊý×ÖÒ½ÁÆÏµÍ³ÒÔ±ÜÃâÍþвÀ©É¢¡£¡£¡£¡£¡£¡£¸ÃÖÝÕþ¸®Í¨¹ýFacebookÐû²¼ÁËÇå¾²Îó²î֪ͨ£¬£¬£¬£¬£¬Ðû²¼ËäȻЧÀÍÈÔÔÚ¼ÌÐø£¬£¬£¬£¬£¬µ«ËÙÂʽÏÂý¡£¡£¡£¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬Õû¸öÍøÂçÒѱ»ÍÑ»ú£¬£¬£¬£¬£¬ËùÓÐÅÌËã»ú¶¼Òѹرգ¬£¬£¬£¬£¬ÁìÍÁÇå¾²²¿ÕýÓëÏà¹Ø²¿·Ö¼°Ë½ÈËIT³Ð°üÉÌÏàÖú£¬£¬£¬£¬£¬ÆÀ¹ÀÉøÍ¸Ë®Æ½£¬£¬£¬£¬£¬È·¶¨Ãü¾Ýй¶ÇéÐΣ¬£¬£¬£¬£¬²¢Æð¾¢»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£ÑÅÆÖÎÀÉú¾ÖÕýÔÚÆäËûÕþ¸®»ú¹¹ºÍÍⲿIT³Ð°üÉ̵ÄЭÖúÏÂÊÓ²ì´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬²¢Æð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳºÍЧÀÍ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Ì«Æ½ÑóµºÓìÒѶà´Î³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬°üÀ¨ÌÀ¼Ó¡¢ÍßŬ°¢Í¼ºÍ·ÆÂɱöµÈ¹ú¶¼ÔøÔâÊܹý´ËÀ๥»÷¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html


3. Çå¾²Ñо¿Ô±Ðû²¼AkiraÀÕË÷Èí¼þLinux±äÖÖGPU½âÃÜÆ÷


3ÔÂ15ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Yohanes NugrohoÀÖ³ÉÐû²¼ÁËAkiraÀÕË÷Èí¼þLinux±äÖֵĽâÃÜÆ÷¡£¡£¡£¡£¡£¡£¸Ã½âÃÜÆ÷ʹÓÃGPUÄÜÁ¦¼ìË÷½âÃÜÃÜÔ¿£¬£¬£¬£¬£¬ÎÞÐèÓû§ÌṩÃÜÔ¿¼´¿ÉÃ⺬»ìËøÎļþ¡£¡£¡£¡£¡£¡£NugrohoºÍÅó٭ƾ֤AkiraʹÓÃʱ¼ä´ÁÌìÉú¼ÓÃÜÃÜÔ¿µÄ·½·¨£¬£¬£¬£¬£¬Ô­±¾Ô¤¼ÆÒ»ÖÜÄÚÆÆ½â£¬£¬£¬£¬£¬µ«ÒòÖØ´óÐÔÔöÌí£¬£¬£¬£¬£¬×îÖÕºÄʱÈýÖÜ£¬£¬£¬£¬£¬ÆÆ·Ñ1,200ÃÀÔª¹ºÖÃGPU×ÊÔ´¡£¡£¡£¡£¡£¡£AkiraÀÕË÷Èí¼þʹÓÃËĸö²î±ðµÄʱ¼ä´ÁÖÖ×ÓÒÔÄÉÃ뾫¶ÈΪÿ¸öÎļþÌìÉúΨһµÄ¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬²¢Í¨¹ý1,500ÂÖSHA-256¾ÙÐйþÏ£´¦Öóͷ££¬£¬£¬£¬£¬Ê¹ÓÃRSA-4096¼ÓÃܲ¢¸½¼ÓÔÚ¼ÓÃÜÎļþĩβ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýÉó²éÈÕÖ¾ÎļþËõСÁ˱©Á¦ÆÆ½âµÄ¿ÉÄÜʱ¼ä´Á¹æÄ££¬£¬£¬£¬£¬²¢Ê¹ÓÃRunPodºÍVast.aiÔÆGPUЧÀÍ£¬£¬£¬£¬£¬×îÖÕʹÓÃ16¿éRTX 4090 GPUÔÚԼĪ10СʱÄÚÇ¿ÐÐÆÆ½âÏàʶÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£µ«»Ö¸´¼ÓÃÜÎļþÊýÄ¿¶àµÄ»°£¬£¬£¬£¬£¬¸ÃÀú³Ì¿ÉÄÜÐèÒª¼¸Ììʱ¼ä¡£¡£¡£¡£¡£¡£NugrohoÒÑÔÚGitHubÉÏÌṩ½âÃÜÆ÷ºÍ»Ö¸´ÎļþµÄ˵Ã÷£¬£¬£¬£¬£¬µ«Ê¹ÓÃʱÐè×ÔÐм縺Σº¦£¬£¬£¬£¬£¬ÓÉÓÚBleepingComputerÉÐδ²âÊԸù¤¾ßµÄÇå¾²ÐÔ»òÓÐÓÃÐÔ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/


4. Coinbase ´¹ÂÚµç×ÓÓʼþʹÓÃÐéαǮ°üǨáãÓÕÆ­Óû§


3ÔÂ14ÈÕ£¬£¬£¬£¬£¬Ò»Æð´ó¹æÄ£µÄÍøÂç´¹ÂÚ¹¥»÷Õë¶ÔCoinbaseÓû§£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬Éù³ÆCoinbaseÒªÇóÓû§¹ý¶Éµ½×ÔÍйÜÇ®°ü£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ê¹Óù¥»÷Õß¿ØÖƵÄÔ¤ÌìÉú»Ö¸´¶ÌÓïÉèÖÃÐÂÇ®°ü¡£¡£¡£¡£¡£¡£ÕâЩÓʼþÉù³ÆÀ´×ÔCoinbase£¬£¬£¬£¬£¬µ«ÓʼþµÄ»Ø¸´µØµãºÍ·¢ËÍIPµØµãÈ´ÏÔʾÒì³£¡£¡£¡£¡£¡£¡£Ö»¹ÜÓʼþͨ¹ýÁ˶àÏîµç×ÓÓʼþÇå¾²¼ì²é£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇÍøÂç´¹ÂÚÕ©Æ­¡£¡£¡£¡£¡£¡£´Ë´Î´¹ÂڻµÄÌØµãÊÇÓʼþÖÐûÓд¹ÂÚÁ´½Ó£¬£¬£¬£¬£¬¶øÊǰüÀ¨Ò»¸ö»Ö¸´¶ÌÓ£¬£¬£¬£¬ÓÕµ¼Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü¡£¡£¡£¡£¡£¡ £»£»£»£»Ö¸´¶ÌÓïÊǼÓÃÜÇ®±ÒÇ®°ü˽ԿµÄÈËÀà¿É¶Á°æ±¾£¬£¬£¬£¬£¬ÕÆÎոöÌÓïµÄÈË¿ÉÒÔ»á¼ûÇ®°üÖеļÓÃÜÇ®±ÒºÍNFTs¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬¹¥»÷Õß²¢Î´ÇÔÈ¡Óû§µÄ»Ö¸´¶ÌÓ£¬£¬£¬£¬¶øÊÇÌṩÁËËûÃÇÒÑÖªºÍ¿ØÖƵĶÌÓï¡£¡£¡£¡£¡£¡£Ò»µ©Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü²¢×ªÈë×ʽ𣬣¬£¬£¬£¬ËùÓÐ×ʲú¶¼½«±»¹¥»÷ÕßÇÔÈ¡¡£¡£¡£¡£¡£¡£CoinbaseÒÑÐû²¼ÖÒÑÔ£¬£¬£¬£¬£¬³ÆËûÃÇÓÀÔ¶²»»áÏò¿Í»§·¢Ëͻָ´¶ÌÓ£¬£¬£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄ´ËÀàÕ©Æ­¡£¡£¡£¡£¡£¡£¹ØÓÚÒÑÏÝÈëȦÌ×µÄÓû§£¬£¬£¬£¬£¬½¨ÒéѸËÙ½«ÐÂÇ®°üÖеÄ×ʽðת»Ø×Ô¼ºµÄÇ®°ü¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬Óû§Ó¦Ìá¸ßСÐÄ£¬£¬£¬£¬£¬ÓÀÔ¶²»ÒªÊ¹ÓÃͨ¹ýµç×ÓÓʼþºÍÍøÕ¾¹²ÏíµÄ»Ö¸´¶ÌÓ£¬£¬£¬£¬ÒÔ°ü¹Ü×Ô¼ºµÄ¼ÓÃÜÇ®±ÒÇå¾²¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/coinbase-phishing-email-tricks-users-with-fake-wallet-migration/


5. ΪÆÚÒ»ÖܵÄExchange OnlineÖÐÖ¹µ¼Öµç×ÓÓʼþʧ°Ü»òÑÓ³Ù


3ÔÂ14ÈÕ£¬£¬£¬£¬£¬Î¢Èí½üÆÚÔâÓöÁ˳¤´ïÒ»ÖܵÄExchange OnlineÖÐÖ¹ÎÊÌ⣬£¬£¬£¬£¬µ¼ÖÂÈ«ÇòÓû§·¢ËÍ»òÎüÊÕµç×ÓÓʼþʱ·ºÆðÑÓ³Ù»òʧ°Ü¡£¡£¡£¡£¡£¡£ËäȻ΢Èíδ¹ûÕæÍ¸Â¶ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬µ«È·ÈÏ´ËÊÂÎñΪMicrosoft 365ÖÎÀíÖÐÐĸú×ÙµÄÒªº¦Ð§ÀÍÎÊÌâEX1027675¡£¡£¡£¡£¡£¡£ÖÐÖ¹Ó°ÏìÁËʹÓÃÊÜÓ°Ïì»ù´¡ÉèʩЧÀ͵ÄËùÓÐÓû§£¬£¬£¬£¬£¬Ðí¶à¿Í»§ÊÕµ½Î´Ëʹﱨ¸æ£¬£¬£¬£¬£¬ÏÔʾ¡°554 5.6.0 ÓʼþÄÚÈÝË𻵡±¹ýʧ¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ3ÔÂ10ÈÕÊ×´ÎÈÏ¿ÉÎÊÌ⣬£¬£¬£¬£¬µ«±¨¸æ³ÆÖÐֹʼÓÚ3ÔÂ7ÈÕ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚÖ¼ÔÚ¸ÄÉÆÐÅÏ¢´«ÊäЧÀ͵ĸüÐÂÖеĴúÂë¹ýʧ£¬£¬£¬£¬£¬Ó°ÏìÁ˲¿·ÖЧÀÍ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£Óû§·¢Ã÷ÎÞ·¨·¢ËÍ´ø¸½¼þµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬µ«Ê¹ÓÃZIPÎļþÐÎʽ·¢ËÍ¿ÉÈÆ¹ý´ËÎÊÌâ¡£¡£¡£¡£¡£¡£Ö»¹Ü΢ÈíÒÑÍÆ³öÐÞ¸´³ÌÐò»º½âÁËEX1027675ÎÊÌ⣬£¬£¬£¬£¬µ«ÁíÒ»ÏÕЩÏàͬµÄÊÂÎñEX1030895ÈÔÔÚ±¬·¢£¬£¬£¬£¬£¬´¥·¢Î´Ëʹﱨ¸æµÄ¹ýʧ½öÏÞÓÚһС²¿·ÖÐÂÎż°´øÓÐwinmail.dat¸½¼þµÄ¼äЪÐÔ´¿ÎĽñÈÕÀúÔ¼Çëµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£Î¢ÈíÕýÔÚ²âÊÔDZÔÚÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬²¢¶Ô°üÀ¨ÐÞ¸´³ÌÐòµÄ»úе¾ÙÐÐÓÐÕë¶ÔÐÔµÄÖØÆô£¬£¬£¬£¬£¬Í¬Ê±Ç×½ü¼à¿ØÕï¶ÏÒ£²âÊý¾ÝÒÔÕÒ³öÎÊÌâȪԴ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/week-long-exchange-online-outage-causes-email-failures-delays/


6. ˼¿ÆÐÞ²¹¸ßÑÏÖØÐÔDoSÎó²î£¬£¬£¬£¬£¬ÖÒÑÔBGPͬÃËÉèÖÃΣº¦


3ÔÂ14ÈÕ£¬£¬£¬£¬£¬Ë¼¿Æ½üÆÚÐÞ²¹ÁËÒ»¸ö¾Ü¾øÐ§ÀÍ(DoS)Îó²î£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìIOS XR·ÓÉÆ÷ÉϵĽçÏßÍø¹ØÐ­Òé(BGP)Àú³Ì£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýµ¥¸öBGP¸üÐÂÐÂÎÅÆÆËðBGP¡£¡£¡£¡£¡£¡£´Ë¸ßÑÏÖØÐÔÎó²î£¨CVE-2025-20115£©½öÔÚÉèÖÃÁËBGPͬÃ˵ÄÇéÐÎÏÂÓ°ÏìCisco IOS XR×°±¸£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂBGPÀú³ÌÖØÆô²¢Ô¶³Ì¹Ø±Õ×°±¸¡£¡£¡£¡£¡£¡£Îó²îÔ´ÓÚBGP¸üÐÂʱÄÚ´æË𻵣¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÈ«ÐÄÉè¼ÆµÄÐÂÎÅ»òÉè¼ÆÍøÂçʹAS_CONFED_SEQUENCEÊôÐÔÔöÌíµ½255¸ö×ÔÖÎϵͳ±àºÅ»ò¸ü¶àÀ´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£Cisco IOS XRÈí¼þÓû§ÐèǨáãÖÁÀο¿°æ±¾ÒÔÐÞ¸´´ËÎÊÌ⣬£¬£¬£¬£¬Í¬Ê±½¨Ò齫BGP AS_CONFED_SEQUENCEÊôÐÔÏÞÖÆÎª254¸ö»ò¸üÉÙµÄAS±àºÅÒÔ¼õÇáDZÔÚ¹¥»÷Ó°Ïì¡£¡£¡£¡£¡£¡£Ë¼¿ÆÎ´·¢Ã÷¸ÃÎó²îÒѱ»Ò°ÍâʹÓ㬣¬£¬£¬£¬µ«APNIC²©¿ÍÉϵÄһƪÎÄÕÂÌṩÁ˸ü¶àÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ë¼¿Æ»¹ÖÒÑÔÁËWebex BroadWorksÖеÄÎó²îºÍCISA±ê¼ÇµÄÆð¾¢Ê¹ÓõÄVPN·ÓÉÆ÷Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§Éý¼¶Ó²¼þÒÔÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/