Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦

Ðû²¼Ê±¼ä 2026-02-28

1. Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬TruffleSecurityÑо¿Ö°Ô±ÔÚɨÃèÈ«ÇòÍøÕ¾Ê±·¢Ã÷£¬£¬£¬£¬£¬½ü3000¸öǶÈëÔÚ¹«¹²JavaScript´úÂëÖеÄGoogle APIÃÜÔ¿±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£¡£¡£¡£ÕâЩÃÜÔ¿Ô­±¾ÓÃÓÚµØÍ¼¡¢YouTubeǶÈë¡¢FirebaseµÈЧÀÍ£¬£¬£¬£¬£¬ÔÚGoogleÍÆ³öGemini AIÖúÊֺ󣬣¬£¬£¬£¬ÆäȨÏÞ±»ÒâÍâÀ©Õ¹ÖÁGeminiÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɸ´ÖÆÃÜÔ¿»á¼û˽ÓÐÊý¾Ý²¢ÀÄÓÃAPIŲÓÃ׬Ǯ¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬ÕâЩ̻¶ÃÜÔ¿¶à°²ÅÅÓÚ½ðÈÚ»ú¹¹¡¢°²±£¹«Ë¾¡¢ÕÐÆ¸ÆóÒµµÈ×éÖ¯µÄÍøÕ¾Ô´´úÂëÖУ¬£¬£¬£¬£¬²¿·ÖÃÜÔ¿×Ô2023Äê2ÔÂÆð±ãÒ»Á¬Ì»Â¶¡£¡£¡£¡£¡£¡£TruffleSecurityͨ¹ý²âÊÔGemini APIµÄ/models¶ËµãÑéÖ¤ÁËÃÜÔ¿µÄÓÐÓÃÐÔ£¬£¬£¬£¬£¬·¢Ã÷µ¥ÈÕ×î¸ß¿É±¬·¢ÊýǧÃÀÔªÓöÈ¡£¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ£¬£¬£¬£¬£¬¿ª·¢Õß´Ëǰ½«GoogleÔÆAPIÃÜÔ¿ÊÓΪ·ÇÃô¸ÐÊý¾Ý¹ûÕæ£¬£¬£¬£¬£¬¶øGeminiÍÆ³öºó£¬£¬£¬£¬£¬ÕâЩÃÜԿͻȻ»ñµÃ¸ü¸ßȨÏÞȴδ±»ÊµÊ±²ì¾õ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2025Äê11ÔÂ21ÈÕÏò¹È¸è±¨¸æÎó²î£¬£¬£¬£¬£¬¹È¸èÀúʱÊýÔÂÓÚ2026Äê1ÔÂ13ÈÕ½«Æä¹éÀàΪ¡°µ¥Ð§ÀÍȨÏÞÌáÉý¡±¡£¡£¡£¡£¡£¡£¹È¸èÒѽÓÄÉÆð¾¢²½·¥¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/


2. ManoManoÔâµÚÈý·½Ð§ÀÍÉ̺ڿÍÈëÇÖÖÂÊý¾Ýй¶


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬·¨¹úDIYµçÉ̾ÞÍ·ManoMano¿ËÈÕÅû¶£¬£¬£¬£¬£¬ÆäÒ»¼ÒµÚÈý·½¿Í»§Ð§ÀÍÌṩÉÌÓÚ2026Äê1ÔÂÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÔ¼3800ÍòÓû§Êý¾Ýй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýδ¾­ÊÚȨ»á¼û¸ÃÍ»Äá˹·Ö°üÉÌϵͳ£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÓëÓû§ÕË»§¼°¿Í·þ»¥¶¯Ïà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°¿Í»§Ð§ÀÍÏàͬ¼Í¼£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÕË»§ÃÜÂë»ò¹«Ë¾ÏµÍ³Êý¾ÝÐ޸ġ£¡£¡£¡£¡£¡£×÷ΪŷÖÞÁìÏȵļҾÓ×°ÐÞ¡¢Ô°ÒÕ²úÆ·ÔÚÏßÊг¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬ManoManoÔÚ·¨¡¢±È¡¢Î÷¡¢Òâ¡¢µÂ¡¢Ó¢Áù¹úÔËÓª£¬£¬£¬£¬£¬Ô¾ù×ÔÁ¦·Ã¿Í´ï5000Íò¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚºÚ¿ÍÂÛ̳ÉϼÙÃû¡°Indra¡±µÄ¹¥»÷ÕßÐû³Æ¶ÔÈëÇÖÈÏÕæ£¬£¬£¬£¬£¬²¢Éù³Æ»ñÈ¡ÁË3780ÍòÓû§ÕË»§¼°Êýǧ·ÝÖ§³Ö¹¤µ¥Ó븽¼þ¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾HackmanacÖ¸³ö£¬£¬£¬£¬£¬Ð¹Â¶ÈªÔ´»òÓëZendeskÊý¾Ýй¶Ïà¹Ø£¬£¬£¬£¬£¬µ«ManoManoδֱ½ÓÈ·ÈÏÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬ManoManoÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£º½ûÓÃÏà¹Ø»á¼ûȨÏÞ¡¢×÷·Ï·Ö°üÉÌÊý¾Ý»á¼ûȨ¡¢Ç¿»¯»á¼û¿ØÖÆÓë¼à¿Ø£¬£¬£¬£¬£¬²¢Í¬²½×ª´ï·¨¹ú¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©¼°¹ú¼Ò¿ÆÑ§Ó빤ҵÖÎÀí¾Ö£¨ANSSI£©¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/


3. ÂíÈü×ãÇò¾ãÀÖ²¿ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬40ÍòÓû§ÐÅÏ¢ÃæÁÙΣº¦


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬·¨¹úÂíÈü°ÂÁÖÆ¥¿Ë×ãÇò¾ãÀÖ²¿£¨OM£©¿ËÈÕ֤ʵÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬³ÉΪ½üÆÚÕë¶Ô´óÐÍÌåÓý×éÖ¯ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¡£¡£¡£¸Ã¾ãÀÖ²¿½¨ÉèÓÚ1899Ä꣬£¬£¬£¬£¬ÊÇ·¨¼×ÁªÈüÊ×´´³ÉÔ±Ö®Ò»£¬£¬£¬£¬£¬²¢ÓÚ1993Äê³ÉΪÊ×Ö§¶áµÃÅ·ÖÞ¹Ú¾üÁªÈü¹Ú¾üµÄ·¨¹úÇò¶Ó¡£¡£¡£¡£¡£¡£¾ÝÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Åû¶£¬£¬£¬£¬£¬ÆäÓÚ±¾Ô³õÈëÇÖ¾ãÀÖ²¿²¿·ÖЧÀÍÆ÷£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨40ÍòÃûÔ±¹¤¡¢ÇòÃÔ¼°Ö§³ÖÕßÐÅÏ¢µÄÊý¾Ý¿â£¬£¬£¬£¬£¬ÏêϸÊý¾ÝÉæ¼°ÐÕÃû¡¢µØµã¡¢¶©µ¥¼Í¼¡¢µç×ÓÓʼþ¼°ÊÖ»úºÅÂë¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Éù³Æ»ñÈ¡ÁË2050¸öDrupal CMSÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÆäÖаüÀ¨34Ãû¾ãÀÖ²¿Ô±¹¤ºÍ1770ÃûТ˳Õß¡¢°æÖ÷µÄÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬£¬£¬£¬¹¥»÷Õß¹ûÕæÁ˲¿·ÖÊý¾ÝÑù±¾£¬£¬£¬£¬£¬²¢ÊÔͼÔÚÂÛ̳³öÊÛËùν¡°2026Äê2Ô½ÇÖðÊý¾Ý¡±¡£¡£¡£¡£¡£¡£¾ãÀÖ²¿ÔÚÖܶþÐû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬µ«Ç¿µ÷¡°µÃÒæÓÚÊÖÒÕÍŶÓÓëרҵЧÀÍÉ̵ĿìËÙÏìÓ¦£¬£¬£¬£¬£¬ÊÂ̬ÒÑ»ñµÃ¿ØÖÆ¡±¡£¡£¡£¡£¡£¡£ÏÖÔÚ¾ãÀÖ²¿ËùÓÐÓªÒµ¾ùÔÚÇå¾²ÇéÐÎÏÂÕý³£ÔËÐУ¬£¬£¬£¬£¬ÇÒÎÞÒøÐÐÐÅÏ¢»òÃÜÂëй¶¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬¾ãÀÖ²¿ÌåÏÖÈÔÔÚÊÓ²ìÊÂÎñÏêϸ¹æÄ££¬£¬£¬£¬£¬²¢ÒÑÏò·¨¹úÊý¾Ý±£»£»£»£»£» £»¤»ú¹¹£¨CNIL£©Õýʽ±¨¸æ£¬£¬£¬£¬£¬Í¬Ê±ºôÓõÇòÃÔСÐÄ´¹ÂÚ¹¥»÷¼°¿ÉÒɻ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/


4. UAT-10027ʹÓÃDohdoorºóÃŹ¥»÷ÃÀ¹ú½ÌÓýºÍÒ½ÁƱ£½¡ÏµÍ³


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬Cisco Talos¿ËÈÕÅû¶±àºÅΪUAT-10027µÄÍþв¼¯Èº£¬£¬£¬£¬£¬¸Ã¼¯Èº×Ô2025Äê12ÔÂÆðÒÔÃÀ¹ú½ÌÓý¼°Ò½ÁƱ£½¡»ú¹¹ÎªÄ¿µÄ£¬£¬£¬£¬£¬°²ÅÅÁËÐÂÐͺóÃųÌÐòDohdoor¡£¡£¡£¡£¡£¡£¹¥»÷³õʼ½×¶Îͨ¹ý´¹ÂÚÓʼþ´¥·¢PowerShell¾ç±¾£¬£¬£¬£¬£¬ÏÂÔØ¶ñÒâ.batÎļþ²¢Ê¹ÓÃDLL²àÔØÊÖÒÕ¼ÓÔØDohdoor¶ñÒâDLL¡£¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ýDNS over HTTPS£¨DoH£©ÓëCloudflare»ù´¡ÉèÊ©Òþ²ØC2ͨѶ£¬£¬£¬£¬£¬½«Á÷Á¿Î±×°³ÉÕýµ±HTTPSÅþÁ¬£¬£¬£¬£¬£¬ÊµÏÖÈÆ¹ý¹Å°åÇå¾²¼ì²âµÄÒ»Á¬»á¼û¡£¡£¡£¡£¡£¡£DohdoorΪ2025Äê11Ô±àÒëµÄ64λDLL¼ÓÔØÆ÷£¬£¬£¬£¬£¬½ÓÄÉË«ÖØ½âÃÜ»úÖÆ£ºÅúÁ¿Êý¾ÝʹÓÃSIMDÖ¸ÁîµÄXOR-SUBËã·¨´¦Öóͷ££¬£¬£¬£¬£¬Ê£ÓàÊý¾Ýͨ¹ýλÖÃÏà¹Ø¹«Ê½½âÃÜ¡£¡£¡£¡£¡£¡£ÆäC2ͨѶͨ¹ýÆÊÎöCloudflareµÄJSONÏìÓ¦»ñȡЧÀÍÆ÷IP£¬£¬£¬£¬£¬²¢Ä£ÄâcurlÁ÷Á¿·¢ËÍHTTPS GETÇëÇóÏÂÔØ¼ÓÃÜÔØºÉ¡£¡£¡£¡£¡£¡£Îª¹æ±ÜEDR¼ì²â£¬£¬£¬£¬£¬Dohdoor»á¶¯Ì¬¶¨Î»ntdll.dllÖеÄNtProtectVirtualMemoryº¯Êý£¬£¬£¬£¬£¬Í¨¹ýÐÞ²¹ÏµÍ³Å²Óôæ¸ù½¨ÉèÖ±½ÓϵͳŲÓÃÌø×ª£¬£¬£¬£¬£¬ÈƹýÓû§Ä£Ê½¹³×Ó¡£¡£¡£¡£¡£¡£TalosÆÀ¹ÀÒÔΪ£¬£¬£¬£¬£¬Ö»¹ÜUAT-10027ÓëLazarus±£´æÊÖÒÕ¹ØÁª£¬£¬£¬£¬£¬µ«ÆäÄ¿µÄÁìÓòÌØÊâÐÔÈÔÐèÒýÆðÏà¹ØÐÐÒµ¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/188558/apt/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor.html


5. ³¯ÏÊAPT37×éÖ¯ÌᳫRuby Jumper¶ñÒâ»î¶¯


2ÔÂ27ÈÕ£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾Zscaler¿ËÈÕÅû¶£¬£¬£¬£¬£¬Óɳ¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯APT37ÌᳫµÄ"Ruby Jumper"¶ñÒâ»î¶¯£¬£¬£¬£¬£¬Õýͨ¹ý¿ÉÒÆ¶¯´æ´¢Çý¶¯Æ÷ÔÚÎïÀí¸ôÀëϵͳÓëÁªÍøÏµÍ³¼ä½¨ÉèÒþ²ØÊý¾Ý´«ÊäͨµÀ¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦Õß·­¿ªÎ±×°³É³¯ÏÊýÌ幨ÓÚ°ÍÒÔ³åÍ»°¢À­²®ÓïÒë±¾µÄ¶ñÒâLNKÎļþ£¬£¬£¬£¬£¬¸ÃÎļþ»á°²ÅÅPowerShell¾ç±¾ÌáÈ¡ÓÐÓÃÔØºÉ²¢Æô¶¯ÓÕ¶üÎĵµ¡£¡£¡£¡£¡£¡£¾ç±¾Ê×ÏȼÓÔØRESTLEAFÖ²Èë³ÌÐò£¬£¬£¬£¬£¬Í¨¹ýZoho WorkDriveÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬»ñÈ¡¼ÓÃÜshellcodeºóÏÂÔØ»ùÓÚRubyµÄSNAKEDROPPER¼ÓÔØÆ÷¡£¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷»á×°ÖÃαװ³Éusbspeed.exeµÄRuby 3.3.0ÔËÐÐʱÇéÐΣ¬£¬£¬£¬£¬²¢Í¨¹ýÿÎå·ÖÖÓÖ´ÐеÄÍýÏëʹÃüÌæ»»RubyGemsĬÈÏÎļþ£¬£¬£¬£¬£¬ÊµÏÖ×Ô¶¯¼ÓÔØ¡£¡£¡£¡£¡£¡£THUMBSBDºóÃÅÒÔascii.rbÎļþÐÎʽÏÂÔØ£¬£¬£¬£¬£¬ÈÏÕæÍøÂçϵͳÐÅÏ¢¡¢ÔÝ´æÏÂÁîÎļþ£¬£¬£¬£¬£¬²¢ÔÚUSBÇý¶¯Æ÷½¨ÉèÒþ²ØÄ¿Â¼¾ÙÐÐÊý¾ÝË«Ïò´«Ê䣬£¬£¬£¬£¬½«¿ÉÒÆ¶¯½éÖÊת»¯Îª"Òþ²ØC2ÖмÌ"¡£¡£¡£¡£¡£¡£VIRUSTASKÔòͨ¹ýÌæ»»Õýµ±ÎļþΪ¶ñÒâ¿ì½Ý·½·¨£¬£¬£¬£¬£¬ÔÚÇý¶¯Æ÷ÓÐ2GBÒÔÉϿռäʱ´¥·¢Ñ¬È¾£¬£¬£¬£¬£¬ÏòÐÂÎïÀí¸ôÀë×°±¸Èö²¥¡£¡£¡£¡£¡£¡£FOOTWINEÌØ¹¤Èí¼þαװ³ÉAPKÎļþ£¬£¬£¬£¬£¬Ö§³Ö¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ÒôÊÓÆµÂ¼ÖƵÈÔ¶³Ì²Ù×÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/


6. RESURGE¶ñÒâÈí¼þʵÏÖIvanti×°±¸Òþ²Ø³¤ÆÚÈëÇÖ


2ÔÂ27ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Á˹ØÓÚRESURGE¶ñÒâÖ²Èë³ÌÐòµÄ×îÐÂÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¸Ã³ÌÐò±»ÓÃÓÚʹÓÃCVE-2025-0282ÁãÈÕÎó²îÈëÇÖIvanti Connect Secure×°±¸£¬£¬£¬£¬£¬¾ßÓÐÑÓ³ÙÆô¶¯¡¢ÖØ´óÍøÂç¼¶¹æ±ÜºÍÈÏÖ¤ÊÖÒÕµÈÌØÕ÷£¬£¬£¬£¬£¬¿ÉʵÏÖÒþ²ØÍ¨Ñ¶Ó볤ÆÚÐÔפÁô¡£¡£¡£¡£¡£¡£¾ÝCISAÆÊÎö£¬£¬£¬£¬£¬RESURGEÊÇÒ»¸öÃûΪlibdsupgrade.soµÄ32λLinux¹²Ïí¹¤¾ßÎļþ£¬£¬£¬£¬£¬¾ß±¸rootkit¡¢bootkit¡¢ºóÃÅ¡¢Í¶·ÅÆ÷¡¢ÊðÀíºÍËíµÀµÈ¶àÖØ¹¦Ð§¡£¡£¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ²»×Ô¶¯ÏòC2ЧÀÍÆ÷·¢ËÍÐű꣬£¬£¬£¬£¬¶øÊÇÎÞÏÞÆÚÆÚ´ýÌØ¶¨ÈëÕ¾TLSÅþÁ¬£¬£¬£¬£¬£¬Í¨¹ýCRC32 TLSÖ¸ÎÆ¹þÏ£¼Æ»®Ê¶±ð¹¥»÷ÕßµÄÅþÁ¬ÊµÑé¡£¡£¡£¡£¡£¡£µ±ÔÚ"web"Àú³ÌϼÓÔØÊ±£¬£¬£¬£¬£¬Ëü»á¹Ò¹³"accept()"º¯Êý£¬£¬£¬£¬£¬ÔÚÁ÷Á¿µÖ´ïЧÀÍÆ÷ǰ¼ì²éTLSÊý¾Ý°ü£¬£¬£¬£¬£¬ÈôÖ¸ÎÆÆ¥ÅäÔò½¨ÉèË«ÏòTLS»á»°£¬£¬£¬£¬£¬²»È»½«Á÷Á¿µ¼ÏòÕýµ±IvantiЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃαÔìµÄIvantiÖ¤Êé¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬¸ÃÖ¤Êé½öÓÃÓÚÈÏÖ¤¶ø·Ç¼ÓÃÜ£¬£¬£¬£¬£¬ÇÒͨ¹ý»¥ÁªÍøÃ÷ÎÄ´«Ê䣬£¬£¬£¬£¬·ÀÓùÕ߿ɽ«Æä×÷ÎªÍøÂçÊðÃû¼ì²âÈëÇÖ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/