Gemini AI¸±ÊÖÒý·¢Google APIÃÜԿ¶³ö·çÏÕ
°ä²¼¹¦·ò 2026-02-281. Gemini AI¸±ÊÖÒý·¢Google APIÃÜԿ¶³ö·çÏÕ
2ÔÂ26ÈÕ£¬½üÆÚ£¬TruffleSecurity×êÑÐÈËÔ±ÔÚɨÃèÈ«ÇòÍøÕ¾Ê±·¢ÏÖ£¬½ü3000¸öǶÈëÔÚ¹«¹²JavaScript´úÂëÖеÄGoogle APIÃÜÔ¿´æÔÚÑϳÁ°²È«·çÏÕ¡£ÕâЩÃÜÔ¿Õý±¾ÓÃÓÚµØÍ¼¡¢YouTubeǶÈë¡¢FirebaseµÈ·þÎñ£¬ÔÚGoogleÍÆ³öGemini AI¸±ÊÖºó£¬ÆäȨÏÞ±»Òâ±íÀ©´óÖÁGeminiÉí·ÝÑéÖ¤£¬µ¼Ö¹¥»÷Õ߿ɸ´ÔìÃÜÔ¿½Ó¼û˽º±¼û¾Ý²¢ÀÄÓÃAPIŲÓûñÀû¡£×êÑÐÏÔʾ£¬ÕâЩ¶³öÃÜÔ¿¶à²¿ÊðÓÚ½ðÈÚ»ú¹¹¡¢°²±£¹«Ë¾¡¢ÕÐÆ¸ÆóÒµµÈ×éÖ¯µÄÍøÕ¾Ô´´úÂëÖУ¬²¿ÃÅÃÜÔ¿×Ô2023Äê2ÔÂÆð±ã³ÖÐøÂ¶³ö¡£TruffleSecurityͨ¹ý²âÊÔGemini APIµÄ/models¶ËµãÑéÖ¤ÁËÃÜÔ¿µÄÓÐЧÐÔ£¬·¢ÏÖµ¥ÈÕ×î¸ß¿É²úÉúÊýǧÃÀÔªÓöȡ£ÎÊÌâ±¾ÔÔÚÓÚ£¬¿ª·¢Õß´Ëǰ½«GoogleÔÆAPIÃÜÔ¿ÊÓΪ·ÇÃô¸ÐÊý¾Ý¹«¿ª£¬¶øGeminiÍÆ³öºó£¬ÕâЩÃÜÔ¿ºöÈ»»ñµÃ¸ü¸ßȨÏÞȴδ±»ÊµÊ±¾õ²ì¡£×êÑÐÈËÔ±ÓÚ2025Äê11ÔÂ21ÈÕÏò¹È¸è»ã±¨·ì϶£¬¹È¸èÀúʱÊýÔÂÓÚ2026Äê1ÔÂ13ÈÕ½«Æä¹éÀàΪ¡°µ¥·þÎñȨÏÞÌáÉý¡±¡£¹È¸èÒѲÉÈ¡»ý¼«´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/
2. ManoManoÔâµÚÈý·½·þÎñÉ̺ڿÍÈëÇÖÖÂÊý¾Ýй¶
2ÔÂ26ÈÕ£¬·¨¹úDIYµçÉ̾ÞÍ·ManoMano½üÈÕÅû¶£¬ÆäÒ»¼ÒµÚÈý·½¿Í»§·þÎñÌṩÉÌÓÚ2026Äê1ÔÂÔâ·êºÚ¿Í¹¥»÷£¬µ¼ÖÂÔ¼3800ÍòÓû§Êý¾Ýй¶¡£¸Ã¹«Ë¾Ö¤Êµ£¬ºÚ¿Íͨ¹ýδ¾ÊÚȨ½Ó¼û¸ÃÍ»Äá˹·Ö°üÉÌϵͳ£¬ÇÔÈ¡ÁËÓëÓû§ÕË»§¼°¿Í·þ»¥¶¯ÓйصÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°¿Í»§·þÎñ¹µÍ¨¼Í¼£¬µ«Î´Éæ¼°ÕË»§ÃÜÂë»ò¹«Ë¾ÏµÍ³Êý¾ÝÅú¸Ä¡£×÷ΪŷÖÞµ±ÏȵļҾÓ×°½¨¡¢Ô°ÒÕ²úÆ·ÔÚÏßÊг¡£¬ManoManoÔÚ·¨¡¢±È¡¢Î÷¡¢Òâ¡¢µÂ¡¢Ó¢Áù¹úÔËÓª£¬Ô¾ù¶ÀÁ¢·Ã¿Í´ï5000Íò¡£Õâ´ÎÊÂÎñÔ´ÓÚºÚ¿ÍÂÛ̳ÉÏ»¯Ãû¡°Indra¡±µÄ¹¥»÷ÕßÐû³Æ¶ÔÈëÇÖÕÆ¹Ü£¬²¢Ðû³Æ»ñÈ¡ÁË3780ÍòÓû§ÕË»§¼°Êýǧ·ÝÖ§³Ö¹¤µ¥Ó븽¼þ¡£ÍøÂ簲ȫ¹«Ë¾HackmanacÖ¸³ö£¬Ð¹Â¶±¾Ô»òÓëZendeskÊý¾Ýй¶Óйأ¬µ«ManoManoδֱ½ÓÈ·Èϼ¼Êõϸ½Ú¡£ÊÂÎñÆØ¹âºó£¬ManoManoµ±¼´²ÉȡӦ¼±´ëÊ©£º½ûÓÃÓйؽӼûȨÏÞ¡¢³·Ïú·Ö°üÉÌÊý¾Ý½Ó¼ûȨ¡¢Ç¿»¯½Ó¼û½ÚÔìÓë¼à¿Ø£¬²¢Í¬²½´«µÝ·¨¹ú¹ú¶ÈÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©¼°¹ú¶È¿ÆÑ§Ó빤ҵÖÎÀí¾Ö£¨ANSSI£©¡£
https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/
3. ÂíÈü×ãÇò¾ãÀÖ²¿ÔâÍøÂç¹¥»÷£¬40ÍòÓû§ÐÅÏ¢Ãæ¶Ô·çÏÕ
2ÔÂ26ÈÕ£¬·¨¹úÂíÈü°ÂÁÔ쥿Ë×ãÇò¾ãÀÖ²¿£¨OM£©½üÈÕ֤ʵÔâ·êÍøÂç¹¥»÷£¬³ÉΪ½üÆÚÕë¶Ô´óÐÍÌåÓý×éÖ¯ÍøÂ簲ȫÊÂÎñµÄ×îа¸Àý¡£¸Ã¾ãÀÖ²¿³ÉÁ¢ÓÚ1899Ä꣬ÊÇ·¨¼×ÁªÈüÊ×´´³ÉÔ±Ö®Ò»£¬²¢ÓÚ1993Äê³ÉΪÊ×Ö§¶áµÃÅ·ÖÞ¹Ú¾üÁªÈü¹Ú¾üµÄ·¨¹úÇò¶Ó¡£¾ÝÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Åû¶£¬ÆäÓÚ±¾Ô³õÈëÇÖ¾ãÀÖ²¿²¿ÃÅ·þÎñÆ÷£¬ÇÔÈ¡ÁËÔ̺¬40ÍòÃûÔ±¹¤¡¢ÇòÃÔ¼°Ö§³ÖÕßÐÅÏ¢µÄÊý¾Ý¿â£¬¾ßÌåÊý¾ÝÉæ¼°ÐÕÃû¡¢µØÖ·¡¢¶©µ¥¼Í¼¡¢µç×ÓÓʼþ¼°ÊÖ»úºÅÂë¡£¹¥»÷Õß»¹Ðû³Æ»ñÈ¡ÁË2050¸öDrupal CMSÕË»§ÐÅÏ¢£¬ÆäÖÐÔ̺¬34Ãû¾ãÀÖ²¿Ô±¹¤ºÍ1770Ãû¹±Ï×Õß¡¢°æÖ÷µÄÕË»§Æ¾Ö¤¡£ÎªÖ¤Ã÷¹¥»÷ÕæÊµÐÔ£¬¹¥»÷Õß¹«¿ªÁ˲¿ÃÅÊý¾ÝÑù±¾£¬²¢ÊÔͼÔÚÂÛ̳ÏúÊÛËùν¡°2026Äê2Ô½ÇÖðÊý¾Ý¡±¡£¾ãÀÖ²¿ÔÚÖܶþ°ä²¼µÄÉêÃ÷ÖÐÈ·ÈÏÁ˹¥»÷ÊÂÎñ£¬µ«Ç¿µ÷¡°µÃÒæÓÚ¼¼ÊõÍŶÓÓëרҵ·þÎñÉ̵ļ±¾çÏìÓ¦£¬ÊÂ̬Òѵõ½½ÚÔ족¡£Ä¿Ç°¾ãÀÖ²¿ËùÓÐÒµÎñ¾ùÔÚ°²È«»·¾³ÏÂÕý³£ÔËÐУ¬ÇÒÎÞÒøÐÐÐÅÏ¢»òÃÜÂëй¶¡£È»¶ø£¬¾ãÀÖ²¿°µÊ¾ÈÔÔÚµ÷²éÊÂÎñ¾ßÌåÁìÓò£¬²¢ÒÑÏò·¨¹úÊý¾Ý±£»¤»ú¹¹£¨CNIL£©Õýʽ»ã±¨£¬Í¬Ê±ºôÓõÇòÃÔ¾¯Ìè´¹µö¹¥»÷¼°¿ÉÒɻ¡£
https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/
4. UAT-10027ÀûÓÃDohdoorºóÃŹ¥»÷ÃÀ¹ú½ÌÓýºÍÒ½ÁƱ£½¡ÏµÍ³
2ÔÂ26ÈÕ£¬Cisco Talos½üÈÕÅû¶±àºÅΪUAT-10027µÄÍþв¼¯Èº£¬¸Ã¼¯Èº×Ô2025Äê12ÔÂÆðÒÔÃÀ¹ú½ÌÓý¼°Ò½ÁƱ£½¡»ú¹¹ÎªÖ¸±ê£¬²¿ÊðÁËÐÂÐͺóÃÅ·¨Ê½Dohdoor¡£¹¥»÷³õʼ½×¶Îͨ¹ý´¹µöÓʼþ´¥·¢PowerShell¾ç±¾£¬ÏÂÔØ¶ñÒâ.batÎļþ²¢ÀûÓÃDLL²àÔØ¼¼Êõ¼ÓÔØDohdoor¶ñÒâDLL¡£¸ÃºóÃÅͨ¹ýDNS over HTTPS£¨DoH£©ÓëCloudflare»ù´¡ÉèÊ©°µ²ØC2ͨѶ£¬½«Á÷Á¿¼Ù×°³ÉºÏ·¨HTTPSÏνӣ¬ÊµÏÖÈÆ¹ý´«Í³°²È«¼ì²âµÄ³ÖÐø½Ó¼û¡£DohdoorΪ2025Äê11Ô±àÒëµÄ64λDLL¼ÓÔØÆ÷£¬Ñ¡È¡Ë«³Á½âÃÜ»úÔ죺ÅúÁ¿Êý¾ÝʹÓÃSIMDÖ¸ÁîµÄXOR-SUBËã·¨´¦Öã¬Ôü×ÒÊý¾Ýͨ¹ýµØÎ»Óйع«Ê½½âÃÜ¡£ÆäC2ͨѶͨ¹ý½âÎöCloudflareµÄJSONÏìÓ¦»ñÈ¡·þÎñÆ÷IP£¬²¢·ÂÕÕcurlÁ÷Á¿·¢ËÍHTTPS GETÒªÇóÏÂÔØ¼ÓÃÜÔØºÉ¡£Îª¶ã±ÜEDR¼ì²â£¬Dohdoor»á¶¯Ì¬¶¨Î»ntdll.dllÖеÄNtProtectVirtualMemoryº¯Êý£¬Í¨¹ý½¨²¹ÏµÍ³Å²Óôæ¸ù´´½¨Ö±½ÓϵͳŲÓÃÌø×ª£¬ÈƹýÓû§Ä£Ê½¹³×Ó¡£TalosÆÀ¹ÀÒÔΪ£¬Ö»¹ÜUAT-10027ÓëLazarus´æÔÚ¼¼Êõ¹ØÁª£¬µ«ÆäÖ¸±êÁìÓòÌØÊâÐÔÈÔÐèÒýÆðÓйØÐÐÒµ¸ß¶È¾¯Ìè¡£
https://securityaffairs.com/188558/apt/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor.html
5. ³¯ÏÊAPT37×éÖ¯ÌáÒéRuby Jumper¶ñÒâ»î¶¯
2ÔÂ27ÈÕ£¬Ôư²È«¹«Ë¾Zscaler½üÈÕÅû¶£¬Óɳ¯Ïʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯APT37ÌáÒéµÄ"Ruby Jumper"¶ñÒâ»î¶¯£¬Õýͨ¹ý¿ÉÒÆ¶¯´æ´¢Çý¶¯Æ÷ÔÚÎïÀí¸ôÀëϵͳÓëÁªÍøÏµÍ³¼ä³ÉÁ¢Òñ±ÎÊý¾Ý´«Êäͨ·¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦Õß´ò¿ª¼Ù×°³É³¯ÏÊýÌ幨ÓÚ°ÍÒÔì¶Ü°¢À²®ÓïÒë±¾µÄ¶ñÒâLNKÎļþ£¬¸ÃÎļþ»á²¿ÊðPowerShell¾ç±¾ÌáÈ¡ÓÐÐ§ÔØºÉ²¢Æô¶¯µö¶üÎĵµ¡£¾ç±¾Ê×ÏȼÓÔØRESTLEAFÖ²È뷨ʽ£¬Í¨¹ýZoho WorkDriveÓëC2·þÎñÆ÷ͨѶ£¬»ñÈ¡¼ÓÃÜshellcodeºóÏÂÔØ»ùÓÚRubyµÄSNAKEDROPPER¼ÓÔØÆ÷¡£¸Ã¼ÓÔØÆ÷»á×°ÖüÙ×°³Éusbspeed.exeµÄRuby 3.3.0ÔËÐÐʱ»·¾³£¬²¢Í¨¹ýÿÎå·ÖÖÓÖ´ÐеĴòË㹤×÷´úÌæRubyGemsĬÈÏÎļþ£¬ÊµÏÖ×Ô¶¯¼ÓÔØ¡£THUMBSBDºóÃÅÒÔascii.rbÎļþ´ó¾ÖÏÂÔØ£¬ÕƹÜÍøÂçϵͳÐÅÏ¢¡¢ÔÝ´æºÅÁîÎļþ£¬²¢ÔÚUSBÇý¶¯Æ÷´´½¨°µ²ØÄ¿Â¼½øÐÐÊý¾ÝË«Ïò´«Ê䣬½«¿ÉÒÆ¶¯½éÖÊת»¯Îª"Òñ±ÎC2ÖмÌ"¡£VIRUSTASKÔòͨ¹ý´úÌæºÏ·¨ÎļþΪ¶ñÒâ¿ì½Ý·½Ê½£¬ÔÚÇý¶¯Æ÷ÓÐ2GBÒÔÉϿռäʱ´¥·¢Ï°È¾£¬ÏòÐÂÎïÀí¸ôÀëÉ豸´«²¼¡£FOOTWINE¼äµýÈí¼þ¼Ù×°³ÉAPKÎļþ£¬Ö§³Ö¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ÒôÊÓÆµÂ¼Ôìµ·±¶³Ì²Ù×÷¡£
https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
6. RESURGE¶ñÒâÈí¼þʵÏÖIvantiÉ豸Òñ±ÎÓÆ¾ÃÈëÇÖ
2ÔÂ27ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ°ä²¼Á˹ØÓÚRESURGE¶ñÒâÖ²È뷨ʽµÄ×îм¼Êõϸ½Ú¡£¸Ã·¨Ê½±»ÓÃÓÚÀûÓÃCVE-2025-0282ÁãÈÕ·ì϶ÈëÇÖIvanti Connect SecureÉ豸£¬ÓµÓÐÑÓ³¤Æô¶¯¡¢¸´ÔÓÍøÂç¼¶¶ã±ÜºÍÈÏÖ¤¼¼ÊõµÈ¸öÐÔ£¬¿ÉʵÏÖÒñ±ÎͨѶÓëÓÆ¾ÃÐÔפÁô¡£¾ÝCISA·ÖÎö£¬RESURGEÊÇÒ»¸öÃûΪlibdsupgrade.soµÄ32λLinux¹²Ïí¶ÔÏóÎļþ£¬¾ß±¸rootkit¡¢bootkit¡¢ºóÃÅ¡¢Í¶·ÅÆ÷¡¢´úÀíºÍËí·µÈ¶à³ÁÖ°ÄÜ¡£Æä¹ÖÒìÖ®´¦ÔÚÓÚ²»×Ô¶¯ÏòC2·þÎñÆ÷·¢ËÍÐű꣬¶øÊÇÎÞÆÚÏÞÆÚ´ýÌØ¶¨ÈëÕ¾TLSÏνӣ¬Í¨¹ýCRC32 TLSÖ¸ÎÆ¹þÏ£¹æ»®¼ø±ð¹¥»÷ÕßµÄÏνӳ¢ÊÔ¡£µ±ÔÚ"web"¹ý³ÌϼÓÔØÊ±£¬Ëü»á¹Ò¹³"accept()"º¯Êý£¬ÔÚÁ÷Á¿´ïµ½·þÎñÆ÷ǰ²é³TLSÊý¾Ý°ü£¬ÈôÖ¸ÎÆÆ¥ÅäÔò³ÉÁ¢Ë«ÏòTLS»á»°£¬²»È»½«Á÷Á¿µ¼ÏòºÏ·¨Ivanti·þÎñÆ÷¡£¹¥»÷Õß»¹Ê¹ÓÃαÔìµÄIvantiÖ¤Êé½øÐÐÉí·ÝÑéÖ¤£¬¸ÃÖ¤Êé½öÓÃÓÚÈÏÖ¤¶ø·Ç¼ÓÃÜ£¬ÇÒͨ¹ý»¥ÁªÍøÃ÷ÎÄ´«Ê䣬·ÀÓùÕ߿ɽ«Æä×÷ÎªÍøÂçÊðÃû¼ì²âÈëÇÖ¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/


¾©¹«Íø°²±¸11010802024551ºÅ