成人小说亚洲一区二区三区,亚洲国产精品一区二区三区,国产精品成人精品久久久,久久综合一区二区三区,精品无码av一区二区,国产一级a毛一级a看免费视频,欧洲uv免费在线区一二区,亚洲国产欧美中日韩成人综合视频,国产熟女一区二区三区五月婷小说,亚洲一区波多野结衣在线

立即打開
科普勒索軟件:中毒后要不要支付贖金?

科普勒索軟件:中毒后要不要支付贖金?

Robert Hackett 2017年06月30日
最新的勒索軟件攻擊取消了“自殺開關”,這意味著這一波攻擊或許更難抵御。

上個月,一個叫WannaCry的勒索軟件搞得全世界很多公司欲哭無淚,而現(xiàn)在這種勒索病毒又出新變種了。

本周二,又一波肆虐的勒索軟件攻擊令很多毫無準備的公司陷入停滯。這波攻擊的傳播方式也WannaCry大同小異,都使用了一種叫做“永恒之藍”的黑客工具,而據(jù)說這種工具還與美國國家安全局有關。

這兩次攻擊的主要區(qū)別之一是最近的這次攻擊取消了“自殺開關”,這意味著這一波攻擊或許更難抵御。

網(wǎng)絡安全專家早就警告過那些沒有安裝微軟Windows系統(tǒng)補丁的企業(yè),下一次攻擊對他們來說只是時間問題,他們的預言也果然應驗了。

下面我們就這次勒索軟件攻擊做一個小小的科普。

究竟發(fā)生了什么?

本周二,一波勒索軟件攻擊像野火一般在全球蔓延開來。許多微軟Windows操作系統(tǒng)的電腦都中招了,特別是那些沒有針對SMB-1協(xié)議漏洞進行保護的計算機。很多企業(yè)的系統(tǒng)都被鎖死了,無法進入桌面,只會顯示勒索信息。

中了病毒的用戶無法訪問文件夾和文件,在勒索信息中,黑客要求中病毒者支付價值300美元的比特幣作為贖金。比特幣也是“網(wǎng)絡敲詐犯”的最愛,因為它不僅支付起來很容易,而且也很難追蹤其去向。

受影響的都有誰?

俄羅斯網(wǎng)絡安全公司卡巴斯基的全球研究主任科斯廷·拉尤近日在他的推特賬號上發(fā)布了一張圖表,顯示了該公司追蹤到的此次勒索病毒受害者的地理分布。從圖表上看,這一波襲擊的重災區(qū)主要是美國、意大利、德國、波蘭、烏克蘭和俄羅斯。但卡巴斯基的客戶群在很大程度上向俄語國家傾斜,因此它給出這樣的分布也是可以理解的。)

受到此輪攻擊影響的企業(yè)有:丹麥航運巨頭馬士基、俄羅斯石油公司、英國廣告公司W(wǎng)PP以及美國制藥巨頭默克公司等。另有報道表明,這次攻擊也對銀行、學校、政府機構、機場和其他一些組織造成了影響。

Petya病毒是什么?

初步分析表明,最近的這波網(wǎng)絡攻擊使用了一種基于Petya病毒的惡意軟件。Petya是去年才首次出現(xiàn)的一種勒索軟件程序。不過進一步的調(diào)查卻對這種說法提出了質(zhì)疑。為了將它與Petya病毒區(qū)分開,包括卡巴斯基在內(nèi)的一些網(wǎng)絡安全公司給這種最新的勒索軟件起了個新名字,叫做“NotPetya”。

網(wǎng)絡安全公司SentinelOne的首席安全戰(zhàn)略師耶利米·格羅斯曼對《財富》表示,目前尚無足夠證據(jù)揭露該惡意軟件的源頭?!按舜尾《颈l(fā)與Petya病毒有些相似特點,比如它們都感染了MBR(MBR又叫主引導記錄,是Windows系統(tǒng)硬盤驅(qū)動器的一個重要部分),最且對整個硬盤進行了加密。不過我們現(xiàn)在尚不清楚它是否是Petya病毒的變種?!?/p>

這一切是怎樣發(fā)生的?

有些公司沒有針對Windows的系統(tǒng)漏洞升級補丁,這是導致他們易感病毒的主要原因。我們現(xiàn)在還不知道該病毒的初始攻擊途徑。但它一旦進入了網(wǎng)絡,就可以通過Windows系統(tǒng)的SBM-1協(xié)議漏洞,在計算機網(wǎng)絡上迅速傳播。

很多受勒索軟件影響的企業(yè)運行的都是工業(yè)級系統(tǒng)。這些機器是很難打補丁的,因為它們上面運行著很多重要程序,企業(yè)很難允許這些重要內(nèi)容下線。應用安全公司Veracode的聯(lián)合創(chuàng)始人、首席技術官克里斯·威斯波爾表示:“像他們這樣的企業(yè),要想給所有機器都打上補丁是很難的,因為很多系統(tǒng)根本就不可能有停機檢修的時間?!?Veracode公司今年早些時候已經(jīng)被CA Technologies公司收購了。

企業(yè)如何自保?

網(wǎng)絡安全公司Palo Alto Networks在其“威脅簡報”博客上指出,面對勒索病毒的威脅,企業(yè)是可以采取一些簡單的措施進行自保的。首先要安裝微軟的MS17-010補丁。其次,要關閉微軟Windows系統(tǒng)與相關漏洞有關的445端口。最后,要經(jīng)常做好數(shù)據(jù)備份,必要時可以用它們來恢復系統(tǒng)。

中招了怎么辦,該付贖金嗎?

這也是信息安全界持續(xù)爭論的一個問題。主流的看法是,用戶不應向黑客支付贖金。首先,誰也不能保證黑客會不會解封你的文件。其次,一旦我們給網(wǎng)絡罪犯提供了資助,只會刺激他們以后繼續(xù)開展類似的攻擊。

盡管如此,有時中招的企業(yè)也想賭一把,希望犯罪分子能夠大發(fā)慈悲,還原他們電腦上的重要文件和信息。不過事實證明,即便受害人支付了贖金,他們的數(shù)據(jù)也無法還原。黑客們所使用的電子郵件系統(tǒng)的提供商Posteo近日表示,他們已經(jīng)封鎖了黑客創(chuàng)建的賬號,這意味著黑客已經(jīng)失去了與受害人聯(lián)系溝通的渠道,因此也就無法向受害人發(fā)送解碼密鑰了。另外,截止到本周二美國東部時間的下午3點,黑客的比特幣錢包已經(jīng)收到了28筆轉(zhuǎn)賬,合計收入約3個比特幣,價值超過了7000美元。(財富中文網(wǎng))

譯者:樸成奎

Meet the sequel to WannaCry, the wide-ranging ransomware attack that crippled businesses around the globe last month.

On Tuesday, another widespread ransomware attack began halting unprepared businesses in their tracks. The new attack uses the same method of propagation as WannaCry: A leaked hacking tool called Eternal Blue, which has been linked to the U.S. National Security Agency.

One of the major differences between the two attacks is that the most recent event does not yet appear to be susceptible to a hardcoded "kill switch." That means it may prove harder to overcome.

Security experts have been warning organizations that failed to apply security patches to their Microsoft Windows-based computer systems that it was only a matter of time before another digital siege surfaced. It seems their predictions have borne true.

Here's a quick FAQ to get you up to speed.

What has happened?

A wave of ransomware attacks spread like wildfire on Tuesday. Many Microsoft Windows-based computers—specifically, ones not protected against a vulnerability in a Microsoft messaging protocol called SMB-1—began seizing up worldwide, locking employees out of their desktops, and displaying ransom notes.

Unable to access their files and folders, workers and managers were greeted by on-screen demands for payment of $300 in Bitcoin, a digital currency often used by cyber extortionists because it's easy to send and hard to track.

Who has been affected?

The attack struck organizations in the U.S., Italy, Germany, Poland, Ukraine and Russia. Costin Raiu, director of global research at Russian security firm Kaspersky Labs, posted a bar graph on Twitter showing the geographic distribution of victims, according to what his firm could measure. (Kaspersky's customer base skews towards Russian-speaking countries, which might explain the spread.)

Some of the affected companies include Maersk (amkby, +0.41%), the Danish shipping giant, Rosneft, the Russian oil company, WPP, the British advertising agency, and Merck (mrk, -0.58%), the U.S. pharmaceutical giant. There are reports that the attack has also affected banks, hospitals, governments, airports, and other organizations.

What is Petya?

Initial analyses suggested that the latest wave of attacks involved malware based on Petya, a type of ransomware that first surfaced last year. Further investigations have disputed this analysis. In lieu of a better name, some cybersecurity firms, such as Kaspersky, have begun referring to the latest malware as "NotPetya."

Jeremiah Grossman, chief security strategist at the cybersecurity firm SentinelOne, told Fortune there isn't enough evidence yet to uncover the malware's provenance. "This outbreak has similar characteristics as Petya, such as infecting the MBR [Master Boot Record, an important component of Microsoft computer hard drives] and encrypting the entire drive, however, it is not clear yet that this is a Petya variant," he said.

How did this happen?

Companies that failed to patch their systems against the Microsoft vulnerability were open to this attack. It's still not clear what the initial attack vector was. But once inside, the worm could spread across computer networks via the hole in Microsoft SMB-1.

It seems that many of the organizations affected by the malware operated industrial systems. These machines can be hard to patch because they run critical processes are difficult to take offline. "Organizations like these typically have a hard time patching all of their machines because so many systems simply cannot have down time," said Chris Wysopal, cofounder and chief tech officer of Veracode, an application security firm purchased by CA Technologies earlier this year.

What can businesses do to protect themselves?

There are a few simple steps businesses can take, as the cybersecurity firm Palo Alto Networks (panw, -1.55%) explains on its "threat brief" blog. First, apply Microsoft patch MS17-010. Second, block connections to Microsoft Windows' port 445, the part of the operating system associated with the vulnerable protocol. And finally, maintain regular data backups, and use them to restore systems.

Should you pay the ransom?

This is a continual source of debate in the information security community. The general belief is, no, you should not pay the ransom. For one, there's no guarantee extortionists will return your files. Second, funding cybercriminals will encourage them to develop similar attacks in the future.

Still, sometimes companies take a gamble and pay up in the hopes that the criminals will restore access to their files and information. In this case, it appears as though customers will not be able to reclaim their data even if they do pay up. Posteo, the email service chosen by the attackers, said it blocked the account they created, meaning the extortionists have lost their channel to communicate with victims and hand over decryption keys. Despite this, the attackers' Bitcoin wallet had already received 28 transactions equaling 3 Bitcoins, or more than $7,000, as of 3 P.M. ET on Tuesday.

掃碼打開財富Plus App
亚洲AV无码乱观看明星换脸VA| 亚洲av日韩av高潮潮喷无码| 亚洲欧美日韩综合俺去了| 久久国产精品99国产精| 久久久亚洲精品无码| 国产高潮呻吟久久| 久久黄色视频二区| 少妇人妻无码专区在线视频| 国产高清av在线免费观看一区二区| 亚洲女初尝黑人巨高清| 久久午夜夜伦鲁鲁片免费无码影视| 性欧美暴力猛交在线播放| 91热久久免费频精品18韩国,| 国产AV日韩AⅤ亚洲AV无码馆| 成人免费无码不卡国产一区二区三区| 精品亚洲午夜久久久久四季| 国产蹂躏精品免费| 久久午夜夜伦鲁鲁片无码免费| 99久久免费精品高清特色大片| 国产精品人人做人人爽人人添 | 日韩精品久久无码二区| 亚洲精品国产专区91在线| 日韩一精品视频在线观看| 国产av电影区二区三区曰曰骚网| 欧美日韩中文人妻一区| 午夜成人理论无码电影在线播放| 免费观看黄色视频的网址| 精品人妻潮喷久久久又裸又黄| 国产欧美精品一区二区三区| 久久久久亚洲AV成人网人人软件| 大地资源二在线观看免费高清| 精品久久久久久久久久久aⅴ| 亚洲精品无码专区久久久| 亚洲国产精品三级片∧v卡在线| 日本熟妇在线手机视频| 国产在线精品一区二区不卡麻豆 1080P| 中文字幕女人妻热女人妻| 伊人久久大香线蕉av一区| 日本VA在线视频播放| 国产精品高潮呻吟久久av无码午夜鲁丝片| 国产女人与黑人精品中文|