成人小说亚洲一区二区三区,亚洲国产精品一区二区三区,国产精品成人精品久久久,久久综合一区二区三区,精品无码av一区二区,国产一级a毛一级a看免费视频,欧洲uv免费在线区一二区,亚洲国产欧美中日韩成人综合视频,国产熟女一区二区三区五月婷小说,亚洲一区波多野结衣在线

立即打開
勒索病毒攻擊的幕后黑手指向朝鮮

勒索病毒攻擊的幕后黑手指向朝鮮

Jeff John Roberts 2017年05月17日
美國和歐洲網(wǎng)絡(luò)安全官員表示,現(xiàn)在說誰是幕后黑手還為時過早,但也未排除朝鮮就是“嫌疑人”。

?

?

?

誰是橫掃全球計(jì)算機(jī)的勒索病毒W(wǎng)annaCry的幕后黑手?對此我們并不確定,但是一位網(wǎng)絡(luò)安全研究人員發(fā)現(xiàn)了指向罪魁禍?zhǔn)住r黑客集團(tuán)拉撒路集團(tuán)(Lazarus Group)——的證據(jù)。

這場始于上周五的互聯(lián)網(wǎng)瘟疫,與利用微軟公司(Microsoft)舊版軟件漏洞的黑客有關(guān),其目的是鎖定計(jì)算機(jī),包括企業(yè)和英國國家衛(wèi)生署的計(jì)算機(jī),繼而索要解鎖計(jì)算機(jī)的贖金。

本周一,谷歌公司(Google)的網(wǎng)絡(luò)安全研究人員奈耳·梅赫塔在推文中發(fā)布了本次勒索病毒攻擊使用的代碼,而在2015年發(fā)生的一次計(jì)算機(jī)攻擊中,也使用了這些代碼。2015年發(fā)生的那場計(jì)算機(jī)攻擊與拉撒路集團(tuán)有關(guān),所以代碼的重新使用,或許成為拉撒路集團(tuán)是此次勒索病毒幕后黑手的線索。

拉撒路集團(tuán)對一系列針對中央銀行的網(wǎng)絡(luò)劫案負(fù)責(zé)。據(jù)報(bào)道,拉撒路集團(tuán)是朝鮮的軍事機(jī)構(gòu),通過犯罪為其網(wǎng)絡(luò)戰(zhàn)斗行動提供資金。本次勒索病毒攻擊顯示出的不道德的特征,與拉撒路集團(tuán)此前的行為特征一致。

但是,梅赫塔在推文中發(fā)布的計(jì)算機(jī)代碼,與朝鮮作為此次勒索病毒母后黑手的確鑿證據(jù)相去甚遠(yuǎn)——有很多原因能讓這一結(jié)論站不住腳(包括黑客定期借用惡意計(jì)算機(jī)代碼這一事實(shí))。

但是,梅赫塔的發(fā)現(xiàn)引起眾多著名網(wǎng)絡(luò)安全研究人員的高度關(guān)注,他們紛紛加入Twitter上的辯論。

在此看到共享的代碼,是非常有趣的。https://t.co/CVnCEnzcvd

- 肖恩·亨特利(@ShaneHuntley)2017年5月15日

對于關(guān)注#Wannacry/#wannacrypt的每個人來說,@neelmehta提供了連線。https://t.co/UQwWd04KWx

- 摩根·馬奎斯-布瓦爾(@headhntr)2017年5月15日

與此同時,一位Twitter用戶提出了一種觀點(diǎn),稱朝鮮莫名其妙搞砸了這次計(jì)算機(jī)攻擊,或許揭示了以下事實(shí):英國網(wǎng)絡(luò)安全研究人員能觸發(fā)所謂的“kill switch(殺戮開關(guān))”機(jī)制,阻止了部分勒索病毒攻擊,這在一定程度上限制了病毒攻擊的附帶結(jié)果。

好吧,我相信這種觀點(diǎn)。接受過俄羅斯培訓(xùn)的朝鮮人企圖通過搞砸這次計(jì)算機(jī)攻擊賺錢https://t.co/mTqsSHoWpt

- davi (((????)))德海 (@daviottenheimer)2017年5月15日

同時,安全媒體CyberScoop報(bào)道稱,著名的網(wǎng)絡(luò)安全公司卡巴斯基實(shí)驗(yàn)室(Kaspersky Labs)的研究人員發(fā)布了博客貼子,對拉撒路集團(tuán)與此次勒索病毒攻擊有關(guān)的觀點(diǎn)表示支持。

這篇博客貼子指出,“我們認(rèn)為,這可能是解開此次計(jì)算機(jī)攻擊部分秘密的關(guān)鍵所在。有一件事是肯定的,奈爾·梅赫塔的發(fā)現(xiàn)是迄今為止關(guān)于Wannacry起源的最重要線索?!?

此外,對于梅赫塔的發(fā)現(xiàn)是此次計(jì)算機(jī)攻擊幕后黑手設(shè)計(jì)的“虛假旗幟”,從而錯誤地歸罪于朝鮮,卡巴斯基實(shí)驗(yàn)室對這一觀點(diǎn)表示反對。

不愿透露姓名的美國和歐洲網(wǎng)絡(luò)安全官員對路透社表示,現(xiàn)在說誰是幕后黑手還為時過早,但也未排除朝鮮就是“嫌疑人”。(財(cái)富中文網(wǎng))

譯者:劉進(jìn)龍/汪皓

Who's behind the ransomware known as WannaCry that is wrecking havoc on computers around the world? We don't know for sure, but a security researcher has found a piece of evidence that points to a culprit: a North Korean operation known as the Lazarus Group.

The online epidemic, which began on Friday, involves hackers exploiting a flaw in older versions of Microsoft software in order to lock the computers—including those of companies and the U.K. health service—and demanding payment to unlock them.

On Monday, Google security researcher Neel Mehta tweeted lines of code from the current ransomware attack that had also been used in a separate 2015 attack. The earlier attack has been tied to the Lazarus Group, so the reuse of the code is a possible clue that the group is also behind the ransom.

The Lazarus Group, which is responsible for a series of online heists targeting central banks, is believed to be a North Korea military outfit that funds its cyber warfare operations through crime. The wanton character of the current ransomware attacks would be consistent with previous behavior by the Lazarus Group.

The computer code tweeted by Mehta, however, is far from definitive evidence North Korea is responsible for the ransomware. There are numerous reasons (including the fact hackers regularly borrow malicious computer code) to avoid drawing firm conclusions.

Nonetheless, Mehta's discovery is getting serious attention from top security researchers, who are weighing in on Twitter:

Very interesting seeing shared code here. https://t.co/CVnCEnzcvd

- Shane Huntley (@ShaneHuntley) May 15, 2017

For everyone following #Wanacry / #wannacrypt, @neelmehta has provided a join the dots. https://t.co/UQwWd04KWx

- Morgan Marquis-Boire (@headhntr) May 15, 2017

Meanwhile, one Twitter user floated a theory that the North Koreans had somehow fouled up the attack—possibly referring to the fact that a U.K. security researcher was able to trigger a so-called "kill switch" that shut down part of the ransomware attacks, partially limiting the fallout.

ok, i'll buy this theory. Russian-trained North Koreans attempting to actually make money when they screwed up https://t.co/mTqsSHoWpt

Meanwhile, as reported by CyberScoop, researchers at Kaspersky Labs—a highly regarded security firm—published a blog post supporting the theory that Lazarus Group could be tied to the ransomware attacks.

"We believe this might hold the key to solve some of the mysteries around this attack. One thing is for sure — Neel Mehta’s discovery is the most significant clue to date regarding the origins of Wannacry," said the blog post.

Kaspersky Labs also rejected the idea that Mehta's discovery was a "false flag" planted by the perpetrator of the attacks in order to wrongly incriminate North Korea.

U.S. and European security officials told Reuters on condition of anonymity that it was still too early to say who might be behind the attacks, but they did not rule out North Korea as a suspect.

掃碼打開財(cái)富Plus App
小12萝自慰喷水亚洲网站| 精品人妻av区天天看片| 岛国少妇精品久久中文字幕| 我国产码在线观看AV哈哈哈网站| YIN荡到骨子里的SAO货| 中国老太卖婬HD播放| 久久99亚洲含羞草影院| 亚洲欧美日韩国产精品影院| 精品视频在线观看一区二区三区| 97成人无码免费一区二区中文| 丰满人妻熟妇乱又伦精品软件| 国产91久久九九免费精品无码| 精品欧美一区二区精品久久| 草木影视在线视频免费观看| 迈开腿让我看一下小鸡蛋视频| 亚洲乱码国产乱码精品精| 日韩亚洲欧美无砖专区| 久久精品一区二区三区日韩| 国产亚洲色婷婷久久99精品| 欧美日韩中文国产一区发布| 中文字幕一区二区AⅤ无码| 国产成人香蕉久久久久| 厨房里抱着岳丰满大屁股| 14表妺好紧没带套经过| 台湾无码中文娱乐网| 日本中文一区二区三区亚洲| 一品道一卡二卡三卡永久| 免费黄色看片网站| 国产精品91在线播放久| 国产成人一区二区三区视频免费| 亚洲AV无码成人精品区狼人影院| 人与动人物a级毛片免费视频| 欧美午夜福利一级高清一区二区| 最新亚洲卡一卡二卡三新区| 国产亚洲精品无码拍拍拍| 91精品国产日韩91久久久久久无码乱码| 午夜免费无码福利视频麻豆| 成人免费ā片在线观看| 久国产三级无码内射在线看| 久久人人爽人人爽人人片AV麻烦| 亚洲日韩精品欧美一区二区a|