SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´

Ðû²¼Ê±¼ä 2026-02-10

1. SolarWinds WHDÎó²î±»ÓÃÓÚ°²ÅŶà½×¶ÎÍøÂç¹¥»÷Á´


2ÔÂ9ÈÕ£¬Huntress SecurityÑо¿Ö°Ô±Åû¶ºÚ¿ÍÕýʹÓÃSolarWinds Web Help Desk£¨WHD£©Îó²î°²ÅÅÕýµ±¹¤¾ßʵÑé¶ñÒâ¹¥»÷¡£¹¥»÷ÕßÕë¶ÔÖÁÉÙÈý¸ö×éÖ¯£¬Í¨¹ýCVE-2025-40551ºÍCVE-2025-26399Á½¸ö¸ßΣÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ£¬Ëæºó´ÓCatboxƽ̨ÏÂÔØMSIÎļþ×°ÖÃZoho ManageEngine AssistÊðÀí£¬ÉèÖÃÎÞÈËÖµÊØ»á¼û²¢½«ÊÜѬȾÖ÷»ú×¢²áÖÁÄäÃûProton Mail¹ØÁªµÄZohoÕË»§¡£¸Ã¹¤¾ß±»ÓÃÓÚÖ±½Ó¼üÅ̲Ù×÷¡¢ADÕì̽¼°°²ÅÅVelociraptor£¬ºóÕß´ÓSupabase´æ´¢Í°»ñÈ¡£¬×÷ΪC2¿ò¼Üͨ¹ýCloudflare WorkersÓë¹¥»÷ÕßͨѶ¡£¹¥»÷Á´ÏÔʾ£¬ÍþвÐÐΪÕß½ÓÄɶàÊÖ¶Îά³Ö³¤ÆÚ»¯£º°²ÅŹýʱVelociraptor 0.73.4°æ¡¢×°ÖÃCloudflared½¨ÉèC2ÈßÓàËíµÀ¡¢Í¨¹ýÍýÏëʹÃüTPMProfilerÍŽáQEMU¿ªÆôSSHºóÃÅ£¬²¢ÐÞ¸Ä×¢²á±í½ûÓÃWindows Defender¼°·À»ðǽÒÔ¹æ±Ü¼ì²â¡£Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷Õß¶ÌÔݽûÓÃDefenderºóÏÂÔØVS Codeи±±¾£¬È·±£ºóÐøÔØºÉ˳ËìÖ´ÐС£


https://www.bleepingcomputer.com/news/security/threat-actors-exploit-solarwinds-wdh-flaws-to-deploy-velociraptor/


2. SmarterToolsÔâWarlockÀÕË÷Èí¼þ¹¥»÷


2ÔÂ9ÈÕ£¬¿ËÈÕ£¬SmarterTools¹«Ë¾ÔâÓöWarlockÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬ÒòÓÉϵԱ¹¤°²ÅŵÄδ¸üÐÂSmarterMailÐéÄâ»ú£¨VM£©±£´æCVE-2026-23760Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÃÜÂë²¢»ñÈ¡ÍêȫȨÏÞ£¬½ø¶øÍ¨¹ýActive DirectoryºáÏòÉøÍ¸ÖÁ12̨Windows·þÎñÆ÷¼°¸¨ÖúÊý¾ÝÖÐÐÄ¡£Ö»¹Ü¹«Ë¾Linux·þÎñÆ÷δÊܲ¨¼°£¬ÇÒSentinel OneÇå¾²²úÆ·ÀÖ³É×èµ²×îÖÕ¼ÓÃÜÔØºÉ£¬ÊÜÓ°ÏìϵͳÒѸôÀë²¢´Ó±¸·Ý»Ö¸´£¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÑÏÖØÇ徲Σº¦¡£¾ÝÊ×ϯÉÌÎñ¹ÙµÂÀï¿Ë¡¤¿ÂµÙ˹͸¶£¬¹«Ë¾ÍøÂçÖÐÔ¼30̨SmarterMail·þÎñÆ÷/ÐéÄâ»úÖб£´æµ¥µãÎó²î£¬¹¥»÷ÕßʹÓôËȱ¿Ú°²ÅÅVelociraptor¡¢SimpleHelp¼°±£´æÎó²îµÄWinRAR°æ±¾£¬ÍŽáÆô¶¯ÏîÓëÍýÏëʹÃüʵÏÖ³¤ÆÚ»¯¡£Cisco Talos´ËǰÒѱ¨¸æVelociraptor±»ÀÄÓÃÓÚÀÕË÷Èí¼þ¹¥»÷µÄ°¸Àý£¬¶ø´Ë´Î¹¥»÷ÖУ¬WarlockÍÅ»ï¸üͨ¹ýSmarterMailÄÚÖõġ°¾í¹ÒÔØ¡±¹¦Ð§Ç¿»¯ÏµÍ³¿ØÖÆÈ¨¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/


3. BeyondTrustÐÞ¸´¸ßΣCVE-2026-1731Îó²î


2ÔÂ9ÈÕ£¬BeyondTrustÐû²¼½ôÆÈÇå¾²¸üУ¬ÐÞ¸´Ó°ÏìÔ¶³ÌÖ§³Ö£¨RS£©¼°ÌØÈ¨Ô¶³Ì»á¼û£¨PRA£©²úÆ·µÄ¸ßΣÎó²îCVE-2026-1731¡£¸ÃÎó²î±»¹éÀàΪ²Ù×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬CVSSÆÀ·Ö¸ß´ï9.9£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ý·¢ËÍÈ«ÐĽṹµÄÇëÇó£¬ÔÚÍøÕ¾Óû§ÉÏÏÂÎÄÖÐÖ´ÐвÙ×÷ϵͳÏÂÁ½ø¶øµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС¢Î´ÊÚȨ»á¼û¡¢Êý¾Ýй¶¼°·þÎñÖÐÖ¹¡£BeyondTrustÇ¿µ÷£¬×ÔÍйܿͻ§ÈôδÆôÓÃ×Ô¶¯¸üУ¬ÐèÊÖ¶¯Ó¦Óò¹¶¡ £»ÔËÐеÍÓÚ21.3°æ±¾µÄRS»òµÍÓÚ22.1°æ±¾µÄPRAÓû§ÐèÏÈÉý¼¶ÖÁ¼æÈݰ汾ÔÙ´ò²¹¶¡¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Harsh JaiswalÓÚ2026Äê1ÔÂ31ÈÕͨ¹ýAIÇý¶¯µÄ±äÖÖÆÊÎö·¢Ã÷¡£¾ÝÆäÅû¶£¬È«ÇòÔ¼11,000¸öBeyondTrustʵÀý̻¶ÓÚ»¥ÁªÍø£¬ÆäÖÐ8,500¸öΪÍâµØ°²ÅÅ£¬Èôδʵʱ´ò²¹¶¡£¬ÈÔ±£´æÑÏÖØÇ徲Σº¦¡£ÏÖÔÚ£¬Îó²îϸ½ÚÉÐδÍêÈ«¹ûÕæ£¬ÒÔÁô³öÓû§Éý¼¶Ê±¼ä¡£


https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html


4. PhorpiexÈö²¥Global GroupÀÕË÷Èí¼þ´¹ÂÚÐÂÊÖ·¨


2ÔÂ9ÈÕ£¬Forcepoint X-LabsÑо¿Ö°Ô±·¢Ã÷Ò»ÆðʹÓÃPhorpiex¶ñÒâÈí¼þÈö²¥Global GroupÀÕË÷Èí¼þµÄ´ó¹æÄ£ÍøÂç´¹ÂÚÔ˶¯¡£¸Ã¹¥»÷ͨ¹ýαװ³É¡°Document.doc¡±µÄWindows¿ì½Ý·½·¨Îļþ£¨.lnk£©ÊµÑ飬ʹÓÃË«À©Õ¹ÃûÓÕÆ­Óû§µã»÷£¬ÏÖʵÎļþΪ.lnkÃûÌ㬵«WindowsĬÈÏÒþ²Ø×îºóÀ©Õ¹Ãû£¬µ¼ÖÂÓû§ÎóÒÔΪÊÇͨË×WordÎĵµ¡£¹¥»÷Á´Ê¼ÓÚ´¹ÂÚÓʼþ£¬Ö÷Ìâ¶àΪ¡°ÄúµÄÎĵµ¡±ÒÔÒý·¢Óû§ºÃÆæ»òµ£ÐÄ¡£µã»÷.lnkÎļþºó£¬¹¥»÷Õß½ÓÄÉ¡°½èÁ¦´òÁ¦¡±£¨Living off the Land£¬LotL£©ÊÖÒÕ£¬Ð®ÖÆÏµÍ³×Ô´ø¹¤¾ßÈçPowerShellºÍÏÂÁîÌáÐÑ·ûÖ´ÐжñÒâÏÂÁÏÂÔØ²¢ÔËÐÐαװ³Éϵͳ×é¼þ£¨Èçwindrv.exe£©µÄ²¡¶¾¡£Global GroupÀÕË÷Èí¼þ×÷ΪMamonaµÄÉý¼¶°æ£¬Æä½¹µãÍþвÔÚÓÚ¡°¾²Ä¬¡±Ä£Ê½£ºËùÓвÙ×÷¾ùÔÚÍâµØÍê³É£¬ÎÞÐèÅþÁ¬Íⲿ·þÎñÆ÷»ñÈ¡¼ÓÃÜÃÜÔ¿£¬Ö÷»ú×ÔÉíÌìÉúÃÜÔ¿ºóÖ±½Ó¼ÓÃÜÎļþ£¬Ö§³ÖÀëÏß״̬ÏÂËø¶¨Ãü¾Ý¡£¸ÃÀÕË÷Èí¼þ½ÓÄÉChaCha20-Poly1305¼ÓÃÜËã·¨£¬ÎÞÊý×ÖÃÜԿʱÎļþÏÕЩÎÞ·¨»Ö¸´¡£


https://hackread.com/hackers-global-group-ransomware-offline-phishing-emails/


5. Å·ÃËίԱ»áÖÐÑëÒÆ¶¯×°±¸ÖÎÀíϵͳÔâÍøÂç¹¥»÷


2ÔÂ9ÈÕ£¬Å·ÃËίԱ»á¼ì²âµ½ÖÐÑëÒÆ¶¯×°±¸ÖÎÀí£¨MDM£©ÏµÍ³1ÔÂ30ÈÕÔâÍøÂç¹¥»÷£¬¿ÉÄÜй¶Ա¹¤ÐÕÃû¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬µ«ÏÖʵÊÖ³Ö×°±¸Î´±»ÈëÇÖ¡£´Ë´Î¹¥»÷Ç¡·êIvanti¹«Ë¾Åû¶ÆäEndpoint Manager Mobile£¨EPMM£©Èí¼þ±£´æCVE-2026-1281¡¢CVE-2026-1340Á½¸ö¸ßΣ´úÂë×¢ÈëÎó²îÔ½ÈÕ£¬ÕâЩÎó²îÔÊÐíºÚ¿ÍÈÆ¹ýÈÏÖ¤Ô¶³Ì¿ØÖÆ·þÎñÆ÷¡£Î¯Ô±»áÔÚ·¢Ã÷¹¥»÷ºó9СʱÄÚÍê³ÉϵͳÇå¾²¼Ó¹ÌÓëÕûÀí£¬µ«ÊÂÎñÈÔÒý·¢¶ÔIvanti²¹¶¡Õ½ÂÔµÄÖÊÒÉ¡£Ç徲ר¼ÒDavid NeesonÖ¸³ö£¬IvantiδÌṩÍêÕûÐÞ¸´¼Æ»®£¬½öÐû²¼ÔÝʱ²¹¶¡£¬ÇÒ²¹¶¡Òò°æ±¾ÊÊÅäÎÊÌâ±£´æÊ§Ð§Î£º¦£¬ÕâÖÖ"Ë鯬»¯ÐÞ¸´"¿ÉÄÜ´øÀ´±ÈÖÜÈ«¸üиü´óµÄÇå¾²Òþ»¼¡£¾ÝϤ£¬IvantiÍýÏëÔÚδÀ´ÊýÔ¿ª·¢ÖÜÈ«ÐÞ¸´£¬²¢ÍƳöRPM¼ì²â¹¤¾ß¸¨ÖúÎó²îÅŲ顣ŷÃËίԱ»áÔÊÐíÖÜÈ«Éó²éÊÂÎñ£¬Ç¿»¯CERT-EUµÈ»ú¹¹24СʱÍþв¼à¿ØÄÜÁ¦¡£


https://hackread.com/cyber-attack-european-commission-staff-mobile-systems/


6. dYdX¹©Ó¦Á´ÔâÐÂÐÍ¿çÓïÑÔ¶ñÒâ°ü¹¥»÷


2ÔÂ6ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶npmºÍPyPI¿ÍÕ»ÖÐdYdXÏà¹ØÕýµ±°üÔ⹩ӦÁ´¹¥»÷£º@dydxprotocol/v4-client-js£¨npm£©3.4.1µÈ°æ±¾¼°dydx-v4-client£¨PyPI£©1.1.5post1°æ±¾±»Ö²Èë¶ñÒâ´úÂë¡£ÕâЩ°üÓÃÓÚdYdX v4ЭÒéµÄ¼ÓÃÜÇ®±ÒÉúÒ⡢Ǯ°ü¹ÜÀíµÈ¸ßÃô¸Ð²Ù×÷£¬ÀÛ¼ÆÉúÒâÁ¿³¬1.5ÍòÒÚÃÀÔª¡£¹¥»÷Õßͨ¹ýµÁÓÿª·¢ÕßÕË»§ÍÆËͶñÒâ¸üУ¬npm°üÀ¨Ç®°üÇÔÈ¡Æ÷£¬¿ÉÇÔÈ¡Öú¼Ç´Ê¼°×°±¸ÐÅÏ¢ £»PyPI°üÌØÊâÖ²ÈëÔ¶³Ì»á¼ûľÂí£¨RAT£©£¬ÅþÁ¬Íⲿ·þÎñÆ÷»ñȡָÁWindowsϵͳÏÂͨ¹ý¡°CREATE_NO_WINDOW¡±±ê¼ÇÒþÄäÖ´ÐС£¶ñÒâ´úÂë±»Ö²Èë½¹µãÎļþ£¬ÔÚ°üÕý³£Ê¹ÓÃʱ´¥·¢£¬PyPI°æ±¾½ÓÄÉ100ÂÖ»ìÏý´¦Öóͷ££¬¿çÉú̬ϵͳ¹¥»÷ЭͬÐÔÅú×¢¹¥»÷ÕßÖ±½Ó»ñÈ¡Ðû²¼»ù´¡ÉèÊ©»á¼ûȨ¡£dYdXÔÚXƽ̨ȷÈÏÊÂÎñ£¬½¨ÒéÓû§¸ôÀë×°±¸¡¢×ªÒÆ×ʲúÖÁÐÂÇ®°ü¡¢Ìæ»»APIÃÜÔ¿¼°Æ¾Ö¤¡£


https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html