ÍøÂç´¹µö¹¥»÷¶Ô×¼GitHub£¬½ü12000´æ´¢¿âÃæ¶Ô·çÏÕ
°ä²¼¹¦·ò 2025-03-171. ÍøÂç´¹µö¹¥»÷¶Ô×¼GitHub£¬½ü12000´æ´¢¿âÃæ¶Ô·çÏÕ
3ÔÂ16ÈÕ£¬Ò»³¡´ó¹æÄ£µÄÍøÂç´¹µö»î¶¯Õë¶Ô½ü12,000¸öGitHub´æ´¢¿âÌáÒéÁËÐéαµÄ¡°°²È«¾¯±¨¡±£¬Ì°Í¼ÓÕÆ¿ª·¢ÈËÔ±ÊÚȨһ¸ö¶ñÒâµÄOAuthÀûÓ÷¨Ê½¡£¸ÃÀûÓ÷¨Ê½Ò»µ©»ñµÃÊÚȨ£¬½«¸³Óè¹¥»÷Õß¶ÔÓû§ÕÊ»§ºÍ´úÂëµÄÆëÈ«½ÚÔìȨ¡£ÕâÐ©ÍøÂç´¹µöÎÊÌâ¶¼Ô̺¬Ò»ÑùµÄÎı¾£¬Ðû³Æ¼ì²âµ½À´×Ô±ùµºÀ׿ËÑÅδ¿ËºÍÌØ¶¨IPµØÖ·µÄÒì³£µÇ¼³¢ÊÔ¡£ÍøÂ簲ȫ×êÑÐÔ±Luc4mÊ×ÏÈ·¢ÏÖÁËÕâһȦÌ×£¬ÆäÖÐÖÒ¸æÓû§Ó¦¸üÐÂÃÜÂë¡¢²é³»î¶¯»á»°²¢ÆôÓÃË«³É·ÖÉí·ÝÑéÖ¤£¬µ«ËùÓÐÁ´½Ó¾ùÖ¸ÏòÒ»¸öÃûΪ¡°gitsecurityapp¡±µÄ¶ñÒâOAuthÀûÓ÷¨Ê½£¬ÒªÇó´óÁ¿Î£ÏÕȨÏÞ¡£ÈôÓû§Ê§É÷ÊÚȨ£¬¸ÃÀûÓý«»ñÈ¡¶Ô¹«¹²ºÍ˽Óд洢¿âµÄÆëÈ«½Ó¼û¡¢Óû§×ÊÁÏÖÎÀí¡¢×éÖ¯ÏîÄ¿¶ÁÈ¡¡¢»áÉ̶Áд¡¢GitHub gist½Ó¼û¼°´æ´¢¿âɾ³ýµÈȨÏÞ¡£Õâ´Î»î¶¯Ê¼ÓÚ½ñÈÕÔçÉÏ6:52£¬Ä¿Ç°ÈÔÔÚ³ÖÐø£¬ÊÜÓ°Ïì´æ´¢¿âÊýÁ¿ÓÐËùµßô¤£¬°µÊ¾GitHubÔÚ²ÉÈ¡´ëʩӦ¶Ô¡£ÈôÄúÊÜÓ°Ïì²¢ÒÑÊÚȨ¸Ã¶ñÒâÀûÓã¬Çëµ±¼´ÔÚGitHubÉèÖÃÖг·ÏúÆä½Ó¼ûȨÏÞ£¬²¢²éÕÒÈκβ»ÊìϤ»ò¿ÉÒɵÄÀûÓ÷¨Ê½¼°GitHub Actions¹¤×÷Á÷¡£´Ë±í£¬½¨ÒéÂÖ»»ÄúµÄƾ֤ºÍÊÚȨÁîÅÆÒÔ¼ÓÇ¿ÕË»§°²È«¡£
https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/
2. ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖݵ±¾ÖÎÀ³¯Æø¹¹ÔâÀÕË÷Èí¼þ¹¥»÷Ö·þÎñÖжÏ
3ÔÂ16ÈÕ£¬ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝ£¬×÷ΪÉýƽÑ󵺹úÃÜ¿ËÂÞÄáÎ÷ÑÇÁª¹úµÄËĸöÖÝÖ®Ò»£¬½üÆÚÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷¡£2025Äê3ÔÂ11ÈÕ£¬ÑÅÆÖµºÎÀÉú²¿¼ì²âµ½ÕâÒ»¹¥»÷£¬²¢µ±¼´¹Ø¹ØÁËÆäÍøÂçºÍÊý×ÖÒ½ÁÆÏµÍ³ÒÔÔ¤·ÀÍþвÀ©É¢¡£¸ÃÖݵ±¾Öͨ¹ýFacebook°ä²¼Á˰²È«·ì϶֪ͨ£¬°ä·¢¹ÌÈ»·þÎñÈÔÔÚ³ÖÐø£¬µ«¿ìÂʽÏÂý¡£²¼¸æÖ¸³ö£¬Õû¸öÍøÂçÒѱ»ÍÑ»ú£¬ËùÓÐÍÆËã»ú¶¼Òѹعأ¬ºÓɽ°²È«ÊýÕýÓëÓйز¿Ãż°¸öÈËIT³Ð°üÉ̺Ï×÷£¬ÆÀ¹ÀÉøÈëˮƽ£¬È·¶¨Êý¾Ýй¶Çé¿ö£¬²¢ÖÂÁ¦¸´Ô·þÎñ¡£ÑÅÆÖÎÀÉú¾ÖÔÚÆäËûµ±¾Ö»ú¹¹ºÍ±í²¿IT³Ð°üÉ̵ÄÐÖúϵ÷²éÕâ´ÎÊÂÎñ£¬²¢ÖÂÁ¦¸´ÔÊÜÓ°ÏìµÄϵͳºÍ·þÎñ¡£Ä¿Ç°£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ÉýƽÑóµºÓìÒÑÂŴγÉΪÀÕË÷Èí¼þ¹¥»÷µÄÖ¸±ê£¬Ô̺¬ÌÀ¼Ó¡¢ÍßŬ°¢Í¼ºÍ·ÆÂɱöµÈ¶¼³ÇÔøÔâ·ê¹ý´ËÀ๥»÷¡£
https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html
3. °²È«×êÑÐÔ±°ä²¼AkiraÀÕË÷Èí¼þLinux±äÖÖGPU½âÃÜÆ÷
3ÔÂ15ÈÕ£¬°²È«×êÑÐÔ±Yohanes Nugroho³É¹¦°ä²¼ÁËAkiraÀÕË÷Èí¼þLinux±äÖֵĽâÃÜÆ÷¡£¸Ã½âÃÜÆ÷ÀûÓÃGPUÄÜÁ¦¼ìË÷½âÃÜÃÜÔ¿£¬ÎÞÐèÓû§ÌṩÃÜÔ¿¼´¿ÉÃâ·Ñ½âËøÎļþ¡£NugrohoºÍ°éÂÂÆ¾¾ÝAkiraʹÓù¦·ò´ÁÌìÉú¼ÓÃÜÃÜÔ¿µÄ·½Ê½£¬Õý±¾Ô¤¼ÆÒ»ÖÜÄÚÆÆ½â£¬µ«Òò¸´ÔÓÐÔÔö³¤£¬×îÖÕºÄʱÈýÖÜ£¬ÆÆ·Ñ1,200ÃÀÔª²É°ìGPU×ÊÔ´¡£AkiraÀÕË÷Èí¼þʹÓÃËĸö·ÖÆçµÄ¹¦·ò´ÁÖÖ×ÓÒÔÄÉÃ뾫¶ÈΪÿ¸öÎļþÌìÉúΨһµÄ¼ÓÃÜÃÜÔ¿£¬²¢Í¨¹ý1,500ÂÖSHA-256½øÐйþÏ£´¦Öã¬Ê¹ÓÃRSA-4096¼ÓÃܲ¢¸½¼ÓÔÚ¼ÓÃÜÎļþĩβ¡£×êÑÐÈËԱͨ¹ý²é¿´ÈÕÖ¾ÎļþËõÓ×Á˱©Á¦ÆÆ½âµÄ¿ÉÄܹ¦·ò´ÁÁìÓò£¬²¢Ê¹ÓÃRunPodºÍVast.aiÔÆGPU·þÎñ£¬×îÖÕʹÓÃ16¿éRTX 4090 GPUÔÚԼĪ10Ó×ʱÄÚÇ¿ÐÐÆÆ½âÏàʼûÜÃÜÔ¿¡£µ«¸´Ô¼ÓÃÜÎļþÊýÁ¿¶àµÄ»°£¬¸Ã¹ý³Ì¿ÉÄܱØÒª¼¸Ì칦·ò¡£NugrohoÒÑÔÚGitHubÉÏÌṩ½âÃÜÆ÷ºÍ¸´ÔÎļþµÄ×¢Ã÷£¬µ«Ê¹ÓÃʱÐè×ÔÐге£·çÏÕ£¬ÓÉÓÚBleepingComputerÉÐδ²âÊԸù¤¾ßµÄ°²È«ÐÔ»òÓÐЧÐÔ¡£
https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/
4. Coinbase ´¹µöµç×ÓÓʼþÀûÓÃÐéαǮ°üǨáãºýŪÓû§
3ÔÂ14ÈÕ£¬Ò»Â·´ó¹æÄ£µÄÍøÂç´¹µö¹¥»÷Õë¶ÔCoinbaseÓû§£¬¹¥»÷Õßͨ¹ý·¢ËͼÙ×°µÄµç×ÓÓʼþ£¬Ðû³ÆCoinbaseÒªÇóÓû§¹ý¶Éµ½×ÔÍйÜÇ®°ü£¬²¢ÓÕµ¼Óû§Ê¹Óù¥»÷Õß½ÚÔìµÄÔ¤ÌìÉú¸´Ô¶ÌÓïÉèÖÃÐÂÇ®°ü¡£ÕâЩÓʼþÐû³ÆÀ´×ÔCoinbase£¬µ«ÓʼþµÄ»Ø¸´µØÖ·ºÍ·¢ËÍIPµØÖ·È´ÏÔʾÒì³£¡£Ö»¹ÜÓʼþͨ¹ýÁ˶àÏîµç×ÓÓʼþ°²È«²é³£¬µ«ÏÖʵÉÏÊÇÍøÂç´¹µöÚ¿Æ¡£Õâ´Î´¹µö»î¶¯µÄÌØµãÊÇÓʼþÖÐûÓд¹µöÁ´½Ó£¬¶øÊÇÔ̺¬Ò»¸ö¸´Ô¶ÌÓÓÕµ¼Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü¡£¸´Ô¶ÌÓïÊǼÓÃÜÇ®±ÒÇ®°ü˽ԿµÄÈËÀà¿É¶Á°æ±¾£¬°ÑÎոöÌÓïµÄÈËÄܹ»½Ó¼ûÇ®°üÖеļÓÃÜÇ®±ÒºÍNFTs¡£È»¶ø£¬¹¥»÷Õß²¢Î´ÇÔÈ¡Óû§µÄ¸´Ô¶ÌÓ¶øÊÇÌṩÁËËûÃÇÒÑÖªºÍ½ÚÔìµÄ¶ÌÓï¡£Ò»µ©Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü²¢×ªÈë×ʽð£¬ËùÓÐ×ʲú¶¼½«±»¹¥»÷ÕßÇÔÈ¡¡£CoinbaseÒѰ䲼ÖҸ棬³ÆËûÃÇʼÖÕ²»»áÏò¿Í»§·¢Ë͸´Ô¶ÌÓ²¢ÌáÐÑÓû§¾¯Ìè´ËÀàÚ¿Æ¡£¶ÔÓÚÒÑÏÝÈëȦÌ×µÄÓû§£¬½¨ÒéѸ¿ì½«ÐÂÇ®°üÖеÄ×ʽðת»Ø×Ô¼ºµÄÇ®°ü¡£Í¬Ê±£¬Óû§Ó¦Ìá¸ß¾¯Ì裬ʼÖÕ²»ÒªÊ¹ÓÃͨ¹ýµç×ÓÓʼþºÍÍøÕ¾¹²ÏíµÄ¸´Ô¶ÌÓÒÔ±£ÏÕ×Ô¼ºµÄ¼ÓÃÜÇ®±Ò°²È«¡£
https://www.bleepingcomputer.com/news/security/coinbase-phishing-email-tricks-users-with-fake-wallet-migration/
5. ΪÆÚÒ»ÖܵÄExchange OnlineÖжϵ¼Öµç×ÓÓʼþʧ°Ü»òÑÓ³¤
3ÔÂ14ÈÕ£¬Î¢Èí½üÆÚÔâ·êÁ˳¤´ïÒ»ÖܵÄExchange OnlineÖжÏÎÊÌ⣬µ¼ÖÂÈ«ÇòÓû§·¢ËÍ»ò½Ó¹Üµç×ÓÓʼþʱ³öÏÖÑÓ³¤»òʧ°Ü¡£¹ÌȻ΢Èíδ¹«¿ªÐ¹Â©¾ßÌåÐÅÏ¢£¬µ«È·ÈÏ´ËÊÂÎñΪMicrosoft 365ÖÎÀíÖÐÐĸú×ٵĹؼü·þÎñÎÊÌâEX1027675¡£ÖжÏÓ°ÏìÁËʹÓÃÊÜÓ°Ïì»ù´¡ÉèÊ©·þÎñµÄËùÓÐЧ»§£¬ºÜ¶à¿Í»§ÊÕµ½Î´Í¶µÝ»ã±¨£¬ÏÔʾ¡°554 5.6.0 ÓʼþÄÚÈݰܻµ¡±ÃýÎó¡£Î¢ÈíÔÚ3ÔÂ10ÈÕ³õ´ÎÈÏ¿ÉÎÊÌ⣬µ«»ã±¨³ÆÖжÏʼÓÚ3ÔÂ7ÈÕ¡£Î¢Èí°µÊ¾£¬ÎÊÌâÔ´ÓÚÖ¼ÔÚ¸ÄÉÆÐÅÏ¢´«Êä·þÎñµÄ¸üÐÂÖеĴúÂëÃýÎó£¬Ó°ÏìÁ˲¿ÃÅ·þÎñ»ù´¡ÉèÊ©¡£Óû§·¢ÏÖÎÞ·¨·¢ËÍ´ø¸½¼þµÄµç×ÓÓʼþ£¬µ«Ê¹ÓÃZIPÎļþ´ó¾Ö·¢ËÍ¿ÉÈÆ¹ý´ËÎÊÌâ¡£Ö»¹Ü΢ÈíÒÑÍÆ³ö½¨¸´·¨Ê½»º½âÁËEX1027675ÎÊÌ⣬µ«ÁíÒ»ÏÕЩһÑùµÄÊÂÎñEX1030895ÈÔÔÚ²úÉú£¬´¥·¢Î´Í¶µÝ»ã±¨µÄÃýÎó½öÏÞÓÚÒ»Óײ¿ÃÅÐÂÎż°´øÓÐwinmail.dat¸½¼þµÄ¼äЪÐÔ´¿ÎĽñÌìÀúÔ¼Çëµç×ÓÓʼþ¡£Î¢ÈíÔÚ²âÊÔDZÔÚ½¨¸´·¨Ê½£¬²¢¶ÔÔ̺¬½¨¸´·¨Ê½µÄ»úе½øÐÐÓÐÕë¶ÔÐԵijÁÆô£¬Í¬Ê±Ç×êÇ¼à¿ØÕï¶ÏÒ£²âÊý¾ÝÒÔÕÒ³öÎÊÌâ±¾Ô¡£
https://www.bleepingcomputer.com/news/microsoft/week-long-exchange-online-outage-causes-email-failures-delays/
6. ˼¿Æ½¨²¹¸ßÑϳÁÐÔDoS·ì϶£¬ÖÒ¸æBGPͬÃËÅäÖ÷çÏÕ
3ÔÂ14ÈÕ£¬Ë¼¿Æ½üÆÚ½¨²¹ÁËÒ»¸ö»Ø¾ø·þÎñ(DoS)·ì϶£¬¸Ã·ì϶ӰÏìIOS XR·ÓÉÆ÷ÉϵÄÌìÇµÍø¹ØºÍ̸(BGP)¹ý³Ì£¬ÔÊÐí¹¥»÷Õßͨ¹ýµ¥¸öBGP¸üÐÂÐÂÎÅ·ÛËéBGP¡£´Ë¸ßÑϳÁÐÔ·ì϶£¨CVE-2025-20115£©½öÔÚÅäÖÃÁËBGPͬÃ˵ÄÇé¿öÏÂÓ°ÏìCisco IOS XRÉ豸£¬¿ÉÄܵ¼ÖÂBGP¹ý³Ì³ÁÆô²¢Ô¶³Ì¹Ø¹ØÉ豸¡£·ì϶ԴÓÚBGP¸üÐÂʱÄÚ´æ°Ü»µ£¬¹¥»÷Õß¿Éͨ¹ý·¢Ë;«ÐÄÉè¼ÆµÄÐÂÎÅ»òÉè¼ÆÍøÂçʹAS_CONFED_SEQUENCEÊôÐÔÔö³¤µ½255¸ö×ÔÖÎϵͳ±àºÅ»ò¸ü¶àÀ´ÀûÓô˷ì϶¡£Cisco IOS XRÈí¼þÓû§ÐèǨáãÖÁ¹Ì¶¨°æ±¾ÒÔ½¨¸´´ËÎÊÌ⣬ͬʱ½¨Ò齫BGP AS_CONFED_SEQUENCEÊôÐÔÏÞ¶ÈΪ254¸ö»ò¸üÉÙµÄAS±àºÅÒÔ¼õÇáDZÔÚ¹¥»÷Ó°Ï졣˼¿ÆÎ´·¢Ïָ÷ì϶Òѱ»Ò°±íÀûÓ㬵«APNIC²©¿ÍÉϵÄһƪÎÄÕÂÌṩÁ˸ü¶à¼¼Êõϸ½Ú¡£´Ë±í£¬Ë¼¿Æ»¹ÖÒ¸æÁËWebex BroadWorksÖеķì϶ºÍCISAÏóÕ÷µÄ»ý¼«ÀûÓõÄVPN·ÓÉÆ÷Ô¶³ÌºÅÁîÖ´Ðзì϶£¬²¢½¨Òé¿Í»§Éý¼¶Ó²¼þÒÔ½¨¸´ÕâЩ·ì϶¡£
https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/


¾©¹«Íø°²±¸11010802024551ºÅ