ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub£¬£¬£¬½ü12000´æ´¢¿âÃæÁÙΣº¦
Ðû²¼Ê±¼ä 2025-03-171. ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub£¬£¬£¬½ü12000´æ´¢¿âÃæÁÙΣº¦
3ÔÂ16ÈÕ£¬£¬£¬Ò»³¡´ó¹æÄ£µÄÍøÂç´¹ÂڻÕë¶Ô½ü12,000¸öGitHub´æ´¢¿âÌᳫÁËÐéαµÄ¡°Çå¾²¾¯±¨¡±£¬£¬£¬ÍýÏëÓÕÆ¿ª·¢Ö°Ô±ÊÚȨһ¸ö¶ñÒâµÄOAuthÓ¦ÓóÌÐò¡£¡£¸ÃÓ¦ÓóÌÐòÒ»µ©»ñµÃÊÚȨ£¬£¬£¬½«¸¶Óë¹¥»÷Õß¶ÔÓû§ÕÊ»§ºÍ´úÂëµÄÍêÈ«¿ØÖÆÈ¨¡£¡£ÕâÐ©ÍøÂç´¹ÂÚÎÊÌâ¶¼°üÀ¨ÏàͬµÄÎı¾£¬£¬£¬Éù³Æ¼ì²âµ½À´×Ô±ùµºÀ׿ËÑÅδ¿ËºÍÌØ¶¨IPµØµãµÄÒì³£µÇ¼ʵÑé¡£¡£ÍøÂçÇå¾²Ñо¿Ô±Luc4mÊ×ÏÈ·¢Ã÷ÁËÕâһȦÌ×£¬£¬£¬ÆäÖÐÖÒÑÔÓû§Ó¦¸üÐÂÃÜÂë¡¢¼ì²é»î¶¯»á»°²¢ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤£¬£¬£¬µ«ËùÓÐÁ´½Ó¾ùÖ¸ÏòÒ»¸öÃûΪ¡°gitsecurityapp¡±µÄ¶ñÒâOAuthÓ¦ÓóÌÐò£¬£¬£¬ÇëÇó´ó×ÚΣÏÕȨÏÞ¡£¡£ÈôÓû§Ê§É÷ÊÚȨ£¬£¬£¬¸ÃÓ¦Óý«»ñÈ¡¶Ô¹«¹²ºÍ˽Óд洢¿âµÄÍêÈ«»á¼û¡¢Óû§×ÊÁÏÖÎÀí¡¢×éÖ¯ÏîÄ¿¶ÁÈ¡¡¢ÌÖÂÛ¶Áд¡¢GitHub gist»á¼û¼°´æ´¢¿âɾ³ýµÈȨÏÞ¡£¡£´Ë´Î»î¶¯Ê¼ÓÚ½ñÈÕÔçÉÏ6:52£¬£¬£¬ÏÖÔÚÈÔÔÚÒ»Á¬£¬£¬£¬ÊÜÓ°Ïì´æ´¢¿âÊýÄ¿ÓÐËù²¨¶¯£¬£¬£¬ÌåÏÖGitHubÕýÔÚ½ÓÄɲ½·¥Ó¦¶Ô¡£¡£ÈôÄúÊÜÓ°Ïì²¢ÒÑÊÚȨ¸Ã¶ñÒâÓ¦Ó㬣¬£¬ÇëÁ¬Ã¦ÔÚGitHubÉèÖÃÖÐ×÷·ÏÆä»á¼ûȨÏÞ£¬£¬£¬²¢²éÕÒÈκβ»ÊìϤ»ò¿ÉÒɵÄÓ¦ÓóÌÐò¼°GitHub ActionsÊÂÇéÁ÷¡£¡£±ðµÄ£¬£¬£¬½¨ÒéÂÖ»»ÄúµÄƾ֤ºÍÊÚȨÁîÅÆÒÔÔöÇ¿ÕË»§Çå¾²¡£¡£
https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/
2. ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝÕþ¸®ÎÀÉúÆø¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂЧÀÍÖÐÖ¹
3ÔÂ16ÈÕ£¬£¬£¬ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝ£¬£¬£¬×÷Ϊ̫ƽÑ󵺹úÃÜ¿ËÂÞÄáÎ÷ÑÇÁª°îµÄËĸöÖÝÖ®Ò»£¬£¬£¬½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£2025Äê3ÔÂ11ÈÕ£¬£¬£¬ÑÅÆÖµºÎÀÉú²¿¼ì²âµ½ÕâÒ»¹¥»÷£¬£¬£¬²¢Á¬Ã¦¹Ø±ÕÁËÆäÍøÂçºÍÊý×ÖÒ½ÁÆÏµÍ³ÒÔ±ÜÃâÍþвÀ©É¢¡£¡£¸ÃÖÝÕþ¸®Í¨¹ýFacebookÐû²¼ÁËÇå¾²Îó²î֪ͨ£¬£¬£¬Ðû²¼ËäȻЧÀÍÈÔÔÚ¼ÌÐø£¬£¬£¬µ«ËÙÂʽÏÂý¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬Õû¸öÍøÂçÒѱ»ÍÑ»ú£¬£¬£¬ËùÓÐÅÌËã»ú¶¼Òѹرգ¬£¬£¬ÁìÍÁÇå¾²²¿ÕýÓëÏà¹Ø²¿·Ö¼°Ë½ÈËIT³Ð°üÉÌÏàÖú£¬£¬£¬ÆÀ¹ÀÉøÍ¸Ë®Æ½£¬£¬£¬È·¶¨Ãü¾Ýй¶ÇéÐΣ¬£¬£¬²¢Æð¾¢»Ö¸´Ð§ÀÍ¡£¡£ÑÅÆÖÎÀÉú¾ÖÕýÔÚÆäËûÕþ¸®»ú¹¹ºÍÍⲿIT³Ð°üÉ̵ÄÐÖúÏÂÊÓ²ì´Ë´ÎÊÂÎñ£¬£¬£¬²¢Æð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳºÍЧÀÍ¡£¡£ÏÖÔÚ£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Ì«Æ½ÑóµºÓìÒѶà´Î³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄÄ¿µÄ£¬£¬£¬°üÀ¨ÌÀ¼Ó¡¢ÍßŬ°¢Í¼ºÍ·ÆÂɱöµÈ¹ú¶¼ÔøÔâÊܹý´ËÀ๥»÷¡£¡£
https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html
3. Çå¾²Ñо¿Ô±Ðû²¼AkiraÀÕË÷Èí¼þLinux±äÖÖGPU½âÃÜÆ÷
3ÔÂ15ÈÕ£¬£¬£¬Çå¾²Ñо¿Ô±Yohanes NugrohoÀÖ³ÉÐû²¼ÁËAkiraÀÕË÷Èí¼þLinux±äÖֵĽâÃÜÆ÷¡£¡£¸Ã½âÃÜÆ÷ʹÓÃGPUÄÜÁ¦¼ìË÷½âÃÜÃÜÔ¿£¬£¬£¬ÎÞÐèÓû§ÌṩÃÜÔ¿¼´¿ÉÃ⺬»ìËøÎļþ¡£¡£NugrohoºÍÅóÙÆ¾Ö¤AkiraʹÓÃʱ¼ä´ÁÌìÉú¼ÓÃÜÃÜÔ¿µÄ·½·¨£¬£¬£¬Ô±¾Ô¤¼ÆÒ»ÖÜÄÚÆÆ½â£¬£¬£¬µ«ÒòÖØ´óÐÔÔöÌí£¬£¬£¬×îÖÕºÄʱÈýÖÜ£¬£¬£¬ÆÆ·Ñ1,200ÃÀÔª¹ºÖÃGPU×ÊÔ´¡£¡£AkiraÀÕË÷Èí¼þʹÓÃËĸö²î±ðµÄʱ¼ä´ÁÖÖ×ÓÒÔÄÉÃ뾫¶ÈΪÿ¸öÎļþÌìÉúΨһµÄ¼ÓÃÜÃÜÔ¿£¬£¬£¬²¢Í¨¹ý1,500ÂÖSHA-256¾ÙÐйþÏ£´¦Öóͷ££¬£¬£¬Ê¹ÓÃRSA-4096¼ÓÃܲ¢¸½¼ÓÔÚ¼ÓÃÜÎļþĩβ¡£¡£Ñо¿Ö°Ô±Í¨¹ýÉó²éÈÕÖ¾ÎļþËõСÁ˱©Á¦ÆÆ½âµÄ¿ÉÄÜʱ¼ä´Á¹æÄ££¬£¬£¬²¢Ê¹ÓÃRunPodºÍVast.aiÔÆGPUЧÀÍ£¬£¬£¬×îÖÕʹÓÃ16¿éRTX 4090 GPUÔÚԼĪ10СʱÄÚÇ¿ÐÐÆÆ½âÏàʶÃÜÃÜÔ¿¡£¡£µ«»Ö¸´¼ÓÃÜÎļþÊýÄ¿¶àµÄ»°£¬£¬£¬¸ÃÀú³Ì¿ÉÄÜÐèÒª¼¸Ììʱ¼ä¡£¡£NugrohoÒÑÔÚGitHubÉÏÌṩ½âÃÜÆ÷ºÍ»Ö¸´ÎļþµÄ˵Ã÷£¬£¬£¬µ«Ê¹ÓÃʱÐè×ÔÐм縺Σº¦£¬£¬£¬ÓÉÓÚBleepingComputerÉÐδ²âÊԸù¤¾ßµÄÇå¾²ÐÔ»òÓÐÓÃÐÔ¡£¡£
https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/
4. Coinbase ´¹ÂÚµç×ÓÓʼþʹÓÃÐéαǮ°üǨáãÓÕÆÓû§
3ÔÂ14ÈÕ£¬£¬£¬Ò»Æð´ó¹æÄ£µÄÍøÂç´¹ÂÚ¹¥»÷Õë¶ÔCoinbaseÓû§£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװµÄµç×ÓÓʼþ£¬£¬£¬Éù³ÆCoinbaseÒªÇóÓû§¹ý¶Éµ½×ÔÍйÜÇ®°ü£¬£¬£¬²¢ÓÕµ¼Óû§Ê¹Óù¥»÷Õß¿ØÖƵÄÔ¤ÌìÉú»Ö¸´¶ÌÓïÉèÖÃÐÂÇ®°ü¡£¡£ÕâЩÓʼþÉù³ÆÀ´×ÔCoinbase£¬£¬£¬µ«ÓʼþµÄ»Ø¸´µØµãºÍ·¢ËÍIPµØµãÈ´ÏÔʾÒì³£¡£¡£Ö»¹ÜÓʼþͨ¹ýÁ˶àÏîµç×ÓÓʼþÇå¾²¼ì²é£¬£¬£¬µ«ÏÖʵÉÏÊÇÍøÂç´¹ÂÚÕ©Æ¡£¡£´Ë´Î´¹ÂڻµÄÌØµãÊÇÓʼþÖÐûÓд¹ÂÚÁ´½Ó£¬£¬£¬¶øÊǰüÀ¨Ò»¸ö»Ö¸´¶ÌÓ£¬£¬ÓÕµ¼Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü¡£¡£»£»£»Ö¸´¶ÌÓïÊǼÓÃÜÇ®±ÒÇ®°ü˽ԿµÄÈËÀà¿É¶Á°æ±¾£¬£¬£¬ÕÆÎոöÌÓïµÄÈË¿ÉÒÔ»á¼ûÇ®°üÖеļÓÃÜÇ®±ÒºÍNFTs¡£¡£È»¶ø£¬£¬£¬¹¥»÷Õß²¢Î´ÇÔÈ¡Óû§µÄ»Ö¸´¶ÌÓ£¬£¬¶øÊÇÌṩÁËËûÃÇÒÑÖªºÍ¿ØÖƵĶÌÓï¡£¡£Ò»µ©Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü²¢×ªÈë×ʽ𣬣¬£¬ËùÓÐ×ʲú¶¼½«±»¹¥»÷ÕßÇÔÈ¡¡£¡£CoinbaseÒÑÐû²¼ÖÒÑÔ£¬£¬£¬³ÆËûÃÇÓÀÔ¶²»»áÏò¿Í»§·¢Ëͻָ´¶ÌÓ£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄ´ËÀàÕ©Æ¡£¡£¹ØÓÚÒÑÏÝÈëȦÌ×µÄÓû§£¬£¬£¬½¨ÒéѸËÙ½«ÐÂÇ®°üÖеÄ×ʽðת»Ø×Ô¼ºµÄÇ®°ü¡£¡£Í¬Ê±£¬£¬£¬Óû§Ó¦Ìá¸ßСÐÄ£¬£¬£¬ÓÀÔ¶²»ÒªÊ¹ÓÃͨ¹ýµç×ÓÓʼþºÍÍøÕ¾¹²ÏíµÄ»Ö¸´¶ÌÓ£¬£¬ÒÔ°ü¹Ü×Ô¼ºµÄ¼ÓÃÜÇ®±ÒÇå¾²¡£¡£
https://www.bleepingcomputer.com/news/security/coinbase-phishing-email-tricks-users-with-fake-wallet-migration/
5. ΪÆÚÒ»ÖܵÄExchange OnlineÖÐÖ¹µ¼Öµç×ÓÓʼþʧ°Ü»òÑÓ³Ù
3ÔÂ14ÈÕ£¬£¬£¬Î¢Èí½üÆÚÔâÓöÁ˳¤´ïÒ»ÖܵÄExchange OnlineÖÐÖ¹ÎÊÌ⣬£¬£¬µ¼ÖÂÈ«ÇòÓû§·¢ËÍ»òÎüÊÕµç×ÓÓʼþʱ·ºÆðÑÓ³Ù»òʧ°Ü¡£¡£ËäȻ΢Èíδ¹ûÕæÍ¸Â¶ÏêϸÐÅÏ¢£¬£¬£¬µ«È·ÈÏ´ËÊÂÎñΪMicrosoft 365ÖÎÀíÖÐÐĸú×ÙµÄÒªº¦Ð§ÀÍÎÊÌâEX1027675¡£¡£ÖÐÖ¹Ó°ÏìÁËʹÓÃÊÜÓ°Ïì»ù´¡ÉèʩЧÀ͵ÄËùÓÐÓû§£¬£¬£¬Ðí¶à¿Í»§ÊÕµ½Î´Ëʹﱨ¸æ£¬£¬£¬ÏÔʾ¡°554 5.6.0 ÓʼþÄÚÈÝË𻵡±¹ýʧ¡£¡£Î¢ÈíÔÚ3ÔÂ10ÈÕÊ×´ÎÈÏ¿ÉÎÊÌ⣬£¬£¬µ«±¨¸æ³ÆÖÐֹʼÓÚ3ÔÂ7ÈÕ¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬ÎÊÌâÔ´ÓÚÖ¼ÔÚ¸ÄÉÆÐÅÏ¢´«ÊäЧÀ͵ĸüÐÂÖеĴúÂë¹ýʧ£¬£¬£¬Ó°ÏìÁ˲¿·ÖЧÀÍ»ù´¡ÉèÊ©¡£¡£Óû§·¢Ã÷ÎÞ·¨·¢ËÍ´ø¸½¼þµÄµç×ÓÓʼþ£¬£¬£¬µ«Ê¹ÓÃZIPÎļþÐÎʽ·¢ËÍ¿ÉÈÆ¹ý´ËÎÊÌâ¡£¡£Ö»¹Ü΢ÈíÒÑÍÆ³öÐÞ¸´³ÌÐò»º½âÁËEX1027675ÎÊÌ⣬£¬£¬µ«ÁíÒ»ÏÕЩÏàͬµÄÊÂÎñEX1030895ÈÔÔÚ±¬·¢£¬£¬£¬´¥·¢Î´Ëʹﱨ¸æµÄ¹ýʧ½öÏÞÓÚһС²¿·ÖÐÂÎż°´øÓÐwinmail.dat¸½¼þµÄ¼äЪÐÔ´¿ÎĽñÈÕÀúÔ¼Çëµç×ÓÓʼþ¡£¡£Î¢ÈíÕýÔÚ²âÊÔDZÔÚÐÞ¸´³ÌÐò£¬£¬£¬²¢¶Ô°üÀ¨ÐÞ¸´³ÌÐòµÄ»úе¾ÙÐÐÓÐÕë¶ÔÐÔµÄÖØÆô£¬£¬£¬Í¬Ê±Ç×½ü¼à¿ØÕï¶ÏÒ£²âÊý¾ÝÒÔÕÒ³öÎÊÌâȪԴ¡£¡£
https://www.bleepingcomputer.com/news/microsoft/week-long-exchange-online-outage-causes-email-failures-delays/
6. ˼¿ÆÐÞ²¹¸ßÑÏÖØÐÔDoSÎó²î£¬£¬£¬ÖÒÑÔBGPͬÃËÉèÖÃΣº¦
3ÔÂ14ÈÕ£¬£¬£¬Ë¼¿Æ½üÆÚÐÞ²¹ÁËÒ»¸ö¾Ü¾øÐ§ÀÍ(DoS)Îó²î£¬£¬£¬¸ÃÎó²îÓ°ÏìIOS XR·ÓÉÆ÷ÉϵĽçÏßÍø¹ØÐÒé(BGP)Àú³Ì£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýµ¥¸öBGP¸üÐÂÐÂÎÅÆÆËðBGP¡£¡£´Ë¸ßÑÏÖØÐÔÎó²î£¨CVE-2025-20115£©½öÔÚÉèÖÃÁËBGPͬÃ˵ÄÇéÐÎÏÂÓ°ÏìCisco IOS XR×°±¸£¬£¬£¬¿ÉÄܵ¼ÖÂBGPÀú³ÌÖØÆô²¢Ô¶³Ì¹Ø±Õ×°±¸¡£¡£Îó²îÔ´ÓÚBGP¸üÐÂʱÄÚ´æË𻵣¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÈ«ÐÄÉè¼ÆµÄÐÂÎÅ»òÉè¼ÆÍøÂçʹAS_CONFED_SEQUENCEÊôÐÔÔöÌíµ½255¸ö×ÔÖÎϵͳ±àºÅ»ò¸ü¶àÀ´Ê¹ÓôËÎó²î¡£¡£Cisco IOS XRÈí¼þÓû§ÐèǨáãÖÁÀο¿°æ±¾ÒÔÐÞ¸´´ËÎÊÌ⣬£¬£¬Í¬Ê±½¨Ò齫BGP AS_CONFED_SEQUENCEÊôÐÔÏÞÖÆÎª254¸ö»ò¸üÉÙµÄAS±àºÅÒÔ¼õÇáDZÔÚ¹¥»÷Ó°Ïì¡£¡£Ë¼¿ÆÎ´·¢Ã÷¸ÃÎó²îÒѱ»Ò°ÍâʹÓ㬣¬£¬µ«APNIC²©¿ÍÉϵÄһƪÎÄÕÂÌṩÁ˸ü¶àÊÖÒÕϸ½Ú¡£¡£±ðµÄ£¬£¬£¬Ë¼¿Æ»¹ÖÒÑÔÁËWebex BroadWorksÖеÄÎó²îºÍCISA±ê¼ÇµÄÆð¾¢Ê¹ÓõÄVPN·ÓÉÆ÷Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î£¬£¬£¬²¢½¨Òé¿Í»§Éý¼¶Ó²¼þÒÔÐÞ¸´ÕâЩÎó²î¡£¡£
https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/