SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´

Ðû²¼Ê±¼ä 2026-02-10

1. SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´


2ÔÂ9ÈÕ£¬£¬£¬Huntress SecurityÑо¿Ö°Ô±Åû¶ºÚ¿ÍÕýʹÓÃSolarWinds Web Help Desk£¨WHD£©Îó²î°²ÅÅÕýµ±¹¤¾ßʵÑé¶ñÒâ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷ÕßÕë¶ÔÖÁÉÙÈý¸ö×éÖ¯£¬£¬£¬Í¨¹ýCVE-2025-40551ºÍCVE-2025-26399Á½¸ö¸ßΣÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬Ëæºó´ÓCatboxƽ̨ÏÂÔØMSIÎļþ×°ÖÃZoho ManageEngine AssistÊðÀí£¬£¬£¬ÉèÖÃÎÞÈËÖµÊØ»á¼û²¢½«ÊÜѬȾÖ÷»ú×¢²áÖÁÄäÃûProton Mail¹ØÁªµÄZohoÕË»§¡£¡£¡£¡£¡£¸Ã¹¤¾ß±»ÓÃÓÚÖ±½Ó¼üÅ̲Ù×÷¡¢ADÕì̽¼°°²ÅÅVelociraptor£¬£¬£¬ºóÕß´ÓSupabase´æ´¢Í°»ñÈ¡£¬£¬£¬×÷ΪC2¿ò¼Üͨ¹ýCloudflare WorkersÓë¹¥»÷ÕßͨѶ¡£¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬ÍþвÐÐΪÕß½ÓÄɶàÊÖ¶Îά³Ö³¤ÆÚ»¯£º°²ÅŹýʱVelociraptor 0.73.4°æ¡¢×°ÖÃCloudflared½¨ÉèC2ÈßÓàËíµÀ¡¢Í¨¹ýÍýÏëʹÃüTPMProfilerÁ¬ÏµQEMU¿ªÆôSSHºóÃÅ£¬£¬£¬²¢ÐÞ¸Ä×¢²á±í½ûÓÃWindows Defender¼°·À»ðǽÒÔ¹æ±Ü¼ì²â¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷Õß¶ÌÔݽûÓÃDefenderºóÏÂÔØVS Codeи±±¾£¬£¬£¬È·±£ºóÐøÔØºÉ˳ËìÖ´ÐС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/


2. SmarterToolsÔâWarlockÀÕË÷Èí¼þ¹¥»÷


2ÔÂ9ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬SmarterTools¹«Ë¾ÔâÓöWarlockÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬£¬£¬ÒòÓÉϵԱ¹¤°²ÅŵÄδ¸üÐÂSmarterMailÐéÄâ»ú£¨VM£©±£´æCVE-2026-23760Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÃÜÂë²¢»ñÈ¡ÍêȫȨÏÞ£¬£¬£¬½ø¶øÍ¨¹ýActive DirectoryºáÏòÉøÍ¸ÖÁ12̨WindowsЧÀÍÆ÷¼°¸¨ÖúÊý¾ÝÖÐÐÄ¡£¡£¡£¡£¡£Ö»¹Ü¹«Ë¾LinuxЧÀÍÆ÷δÊܲ¨¼°£¬£¬£¬ÇÒSentinel OneÇå¾²²úÆ·ÀÖ³É×èµ²×îÖÕ¼ÓÃÜÔØºÉ£¬£¬£¬ÊÜÓ°ÏìϵͳÒѸôÀë²¢´Ó±¸·Ý»Ö¸´£¬£¬£¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÑÏÖØÇ徲Σº¦¡£¡£¡£¡£¡£¾ÝÊ×ϯÉÌÎñ¹ÙµÂÀï¿Ë¡¤¿ÂµÙ˹͸¶£¬£¬£¬¹«Ë¾ÍøÂçÖÐÔ¼30̨SmarterMailЧÀÍÆ÷/ÐéÄâ»úÖб£´æµ¥µãÎó²î£¬£¬£¬¹¥»÷ÕßʹÓôËȱ¿Ú°²ÅÅVelociraptor¡¢SimpleHelp¼°±£´æÎó²îµÄWinRAR°æ±¾£¬£¬£¬Á¬ÏµÆô¶¯ÏîÓëÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¡£¡£¡£¡£¡£Cisco Talos´ËǰÒѱ¨¸æVelociraptor±»ÀÄÓÃÓÚÀÕË÷Èí¼þ¹¥»÷µÄ°¸Àý£¬£¬£¬¶ø´Ë´Î¹¥»÷ÖУ¬£¬£¬WarlockÍÅ»ï¸üͨ¹ýSmarterMailÄÚÖõġ°¾í¹ÒÔØ¡±¹¦Ð§Ç¿»¯ÏµÍ³¿ØÖÆÈ¨¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/


3. BeyondTrustÐÞ¸´¸ßΣCVE-2026-1731Îó²î


2ÔÂ9ÈÕ£¬£¬£¬BeyondTrustÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬ÐÞ¸´Ó°ÏìÔ¶³ÌÖ§³Ö£¨RS£©¼°ÌØÈ¨Ô¶³Ì»á¼û£¨PRA£©²úÆ·µÄ¸ßΣÎó²îCVE-2026-1731¡£¡£¡£¡£¡£¸ÃÎó²î±»¹éÀàΪ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ý·¢ËÍÈ«ÐĽṹµÄÇëÇ󣬣¬£¬ÔÚÍøÕ¾Óû§ÉÏÏÂÎÄÖÐÖ´ÐвÙ×÷ϵͳÏÂÁ£¬£¬½ø¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС¢Î´ÊÚȨ»á¼û¡¢Êý¾Ýй¶¼°Ð§ÀÍÖÐÖ¹¡£¡£¡£¡£¡£BeyondTrustÇ¿µ÷£¬£¬£¬×ÔÍйܿͻ§ÈôδÆôÓÃ×Ô¶¯¸üУ¬£¬£¬ÐèÊÖ¶¯Ó¦Óò¹¶¡£¡£¡£¡£¡£»£» £»£»£»£»ÔËÐеÍÓÚ21.3°æ±¾µÄRS»òµÍÓÚ22.1°æ±¾µÄPRAÓû§ÐèÏÈÉý¼¶ÖÁ¼æÈݰ汾ÔÙ´ò²¹¶¡¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Harsh JaiswalÓÚ2026Äê1ÔÂ31ÈÕͨ¹ýAIÇý¶¯µÄ±äÖÖÆÊÎö·¢Ã÷¡£¡£¡£¡£¡£¾ÝÆäÅû¶£¬£¬£¬È«ÇòÔ¼11,000¸öBeyondTrustʵÀý̻¶ÓÚ»¥ÁªÍø£¬£¬£¬ÆäÖÐ8,500¸öΪÍâµØ°²ÅÅ£¬£¬£¬Èôδʵʱ´ò²¹¶¡£¬£¬£¬ÈÔ±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Îó²îϸ½ÚÉÐδÍêÈ«¹ûÕæ£¬£¬£¬ÒÔÁô³öÓû§Éý¼¶Ê±¼ä¡£¡£¡£¡£¡£


https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html


4. PhorpiexÈö²¥Global GroupÀÕË÷Èí¼þ´¹ÂÚÐÂÊÖ·¨


2ÔÂ9ÈÕ£¬£¬£¬Forcepoint X-LabsÑо¿Ö°Ô±·¢Ã÷Ò»ÆðʹÓÃPhorpiex¶ñÒâÈí¼þÈö²¥Global GroupÀÕË÷Èí¼þµÄ´ó¹æÄ£ÍøÂç´¹Âڻ¡£¡£¡£¡£¡£¸Ã¹¥»÷ͨ¹ýαװ³É¡°Document.doc¡±µÄWindows¿ì½Ý·½·¨Îļþ£¨.lnk£©ÊµÑ飬£¬£¬Ê¹ÓÃË«À©Õ¹ÃûÓÕÆ­Óû§µã»÷£¬£¬£¬ÏÖʵÎļþΪ.lnkÃûÌ㬣¬£¬µ«WindowsĬÈÏÒþ²Ø×îºóÀ©Õ¹Ãû£¬£¬£¬µ¼ÖÂÓû§ÎóÒÔΪÊÇͨË×WordÎĵµ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ´¹ÂÚÓʼþ£¬£¬£¬Ö÷Ìâ¶àΪ¡°ÄúµÄÎĵµ¡±ÒÔÒý·¢Óû§ºÃÆæ»òµ£ÐÄ¡£¡£¡£¡£¡£µã»÷.lnkÎļþºó£¬£¬£¬¹¥»÷Õß½ÓÄÉ¡°½èÁ¦´òÁ¦¡±£¨Living off the Land£¬£¬£¬LotL£©ÊÖÒÕ£¬£¬£¬Ð®ÖÆÏµÍ³×Ô´ø¹¤¾ßÈçPowerShellºÍÏÂÁîÌáÐÑ·ûÖ´ÐжñÒâÏÂÁ£¬£¬ÏÂÔØ²¢ÔËÐÐαװ³Éϵͳ×é¼þ£¨Èçwindrv.exe£©µÄ²¡¶¾¡£¡£¡£¡£¡£Global GroupÀÕË÷Èí¼þ×÷ΪMamonaµÄÉý¼¶°æ£¬£¬£¬Æä½¹µãÍþвÔÚÓÚ¡°¾²Ä¬¡±Ä£Ê½£ºËùÓвÙ×÷¾ùÔÚÍâµØÍê³É£¬£¬£¬ÎÞÐèÅþÁ¬ÍⲿЧÀÍÆ÷»ñÈ¡¼ÓÃÜÃÜÔ¿£¬£¬£¬Ö÷»ú×ÔÉíÌìÉúÃÜÔ¿ºóÖ±½Ó¼ÓÃÜÎļþ£¬£¬£¬Ö§³ÖÀëÏß״̬ÏÂËø¶¨Ãü¾Ý¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þ½ÓÄÉChaCha20-Poly1305¼ÓÃÜËã·¨£¬£¬£¬ÎÞÊý×ÖÃÜԿʱÎļþÏÕЩÎÞ·¨»Ö¸´¡£¡£¡£¡£¡£


https://hackread.com/hackers-global-group-ransomware-offline-phishing-emails/


5. Å·ÃËίԱ»áÖÐÑëÒÆ¶¯×°±¸ÖÎÀíϵͳÔâÍøÂç¹¥»÷


2ÔÂ9ÈÕ£¬£¬£¬Å·ÃËίԱ»á¼ì²âµ½ÖÐÑëÒÆ¶¯×°±¸ÖÎÀí£¨MDM£©ÏµÍ³1ÔÂ30ÈÕÔâÍøÂç¹¥»÷£¬£¬£¬¿ÉÄÜй¶Ա¹¤ÐÕÃû¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬µ«ÏÖʵÊÖ³Ö×°±¸Î´±»ÈëÇÖ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ç¡·êIvanti¹«Ë¾Åû¶ÆäEndpoint Manager Mobile£¨EPMM£©Èí¼þ±£´æCVE-2026-1281¡¢CVE-2026-1340Á½¸ö¸ßΣ´úÂë×¢ÈëÎó²îÔ½ÈÕ£¬£¬£¬ÕâЩÎó²îÔÊÐíºÚ¿ÍÈÆ¹ýÈÏÖ¤Ô¶³Ì¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£¡£¡£Î¯Ô±»áÔÚ·¢Ã÷¹¥»÷ºó9СʱÄÚÍê³ÉϵͳÇå¾²¼Ó¹ÌÓëÕûÀí£¬£¬£¬µ«ÊÂÎñÈÔÒý·¢¶ÔIvanti²¹¶¡Õ½ÂÔµÄÖÊÒÉ¡£¡£¡£¡£¡£Ç徲ר¼ÒDavid NeesonÖ¸³ö£¬£¬£¬IvantiδÌṩÍêÕûÐÞ¸´¼Æ»®£¬£¬£¬½öÐû²¼ÔÝʱ²¹¶¡£¬£¬£¬ÇÒ²¹¶¡Òò°æ±¾ÊÊÅäÎÊÌâ±£´æÊ§Ð§Î£º¦£¬£¬£¬ÕâÖÖ"Ë鯬»¯ÐÞ¸´"¿ÉÄÜ´øÀ´±ÈÖÜÈ«¸üиü´óµÄÇå¾²Òþ»¼¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬IvantiÍýÏëÔÚδÀ´ÊýÔ¿ª·¢ÖÜÈ«ÐÞ¸´£¬£¬£¬²¢ÍƳöRPM¼ì²â¹¤¾ß¸¨ÖúÎó²îÅŲ顣¡£¡£¡£¡£Å·ÃËίԱ»áÔÊÐíÖÜÈ«Éó²éÊÂÎñ£¬£¬£¬Ç¿»¯CERT-EUµÈ»ú¹¹24СʱÍþв¼à¿ØÄÜÁ¦¡£¡£¡£¡£¡£


https://hackread.com/cyber-attack-european-commission-staff-mobile-systems/


6. dYdX¹©Ó¦Á´ÔâÐÂÐÍ¿çÓïÑÔ¶ñÒâ°ü¹¥»÷


2ÔÂ6ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶npmºÍPyPI¿ÍÕ»ÖÐdYdXÏà¹ØÕýµ±°üÔ⹩ӦÁ´¹¥»÷£º@dydxprotocol/v4-client-js£¨npm£©3.4.1µÈ°æ±¾¼°dydx-v4-client£¨PyPI£©1.1.5post1°æ±¾±»Ö²Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£ÕâЩ°üÓÃÓÚdYdX v4ЭÒéµÄ¼ÓÃÜÇ®±ÒÉúÒ⡢Ǯ°ü¹ÜÀíµÈ¸ßÃô¸Ð²Ù×÷£¬£¬£¬ÀÛ¼ÆÉúÒâÁ¿³¬1.5ÍòÒÚÃÀÔª¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýµÁÓÿª·¢ÕßÕË»§ÍÆËͶñÒâ¸üУ¬£¬£¬npm°üÀ¨Ç®°üÇÔÈ¡Æ÷£¬£¬£¬¿ÉÇÔÈ¡Öú¼Ç´Ê¼°×°±¸ÐÅÏ¢£»£» £»£»£»£»PyPI°üÌØÊâÖ²ÈëÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬£¬£¬ÅþÁ¬ÍⲿЧÀÍÆ÷»ñȡָÁ£¬£¬WindowsϵͳÏÂͨ¹ý¡°CREATE_NO_WINDOW¡±±ê¼ÇÒþÄäÖ´ÐС£¡£¡£¡£¡£¶ñÒâ´úÂë±»Ö²Èë½¹µãÎļþ£¬£¬£¬ÔÚ°üÕý³£Ê¹ÓÃʱ´¥·¢£¬£¬£¬PyPI°æ±¾½ÓÄÉ100ÂÖ»ìÏý´¦Öóͷ££¬£¬£¬¿çÉú̬ϵͳ¹¥»÷ЭͬÐÔÅú×¢¹¥»÷ÕßÖ±½Ó»ñÈ¡Ðû²¼»ù´¡ÉèÊ©»á¼ûȨ¡£¡£¡£¡£¡£dYdXÔÚXƽ̨ȷÈÏÊÂÎñ£¬£¬£¬½¨ÒéÓû§¸ôÀë×°±¸¡¢×ªÒÆ×ʲúÖÁÐÂÇ®°ü¡¢Ìæ»»APIÃÜÔ¿¼°Æ¾Ö¤¡£¡£¡£¡£¡£


https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html