{"id":1297,"date":"2012-05-31T23:36:55","date_gmt":"2012-05-31T15:36:55","guid":{"rendered":"http:\/\/localhost\/portal\/2012\/05\/31\/flame-maher-skywiper-worm\/"},"modified":"2012-05-31T23:36:55","modified_gmt":"2012-05-31T15:36:55","slug":"flame-maher-skywiper-worm","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1297","title":{"rendered":"\u9632\u6bd2\u8edf\u9ad4\u4e5f\u64cb\u4e0d\u4f4f\uff01\u3000\u53f2\u4e0a\u6700\u5f37\u75c5\u6bd2\u300c\u706b\u7130\u300d\u73fe\u8eab"},"content":{"rendered":"<p><a target=\"_blank\" href=\"http:\/\/www.nownews.com\/2012\/05\/30\/339-2819295.htm\" rel=\"noopener\">\u4eca\u65e5\u65b0\u805e<\/a>\u8a18\u8005\u7518\u5049\u4e2d\uff0f\u7d9c\u5408\u5831\u5c0e<br \/>\n<!-- \u5c07\u6b64\u6a19\u8a18\u653e\u5728\u60a8\u60f3\u8981\u986f\u793a +1 \u6309\u9215\u7684\u4f4d\u7f6e --> <g:plusone annotation=\"inline\"><\/g:plusone>  <!-- \u5c07\u6b64\u986f\u793a\u547c\u53eb (render call) \u653e\u5728\u9069\u7576\u4f4d\u7f6e --> <script type=\"text\/javascript\">\n  window.___gcfg = {lang: 'zh-TW'};<\/p>\n<p>  (function() {\n    var po = document.createElement('script'); po.type = 'text\/javascript'; po.async = true;\n    po.src = 'https:\/\/apis.google.com\/js\/plusone.js';\n    var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s);\n  })();\n<\/script><\/p>\n<p>\u4e00\u7a2e\u6975\u70ba\u8907\u96dc\u7684\u96fb\u8166\u75c5\u6bd2\u8fd1\u65e5\u88ab\u5404\u5927\u8cc7\u5b89\u7814\u7a76\u55ae\u4f4d\u767c\u73fe\uff0c\u6b64\u75c5\u6bd2\u88ab\u7cbe\u5fc3\u8a2d\u8a08\u6210\u5177\u6709\u591a\u7a2e\u529f\u80fd\uff0c\u4e26\u4e14\u9084\u6703\u8070\u660e\u7684\u907f\u958b\u9632\u6bd2\u8edf\u9ad4\u5075\u6e2c\uff0c\u5373\u4f7f\u662f\u66f4\u65b0\u5230\u6700\u65b0\u7684 Windows 7 \u96fb\u8166\uff0c\u4e5f\u96e3\u9003\u6b64\u75c5\u6bd2\u7684\u611f\u67d3\u3002<\/p>\n<p>\u4f4d\u65bc\u4e2d\u6771\u3001\u7f8e\u6d32\u3001\u6b50\u6d32\u7684\u8cc7\u5b89\u7814\u7a76\u55ae\u4f4d\u9678\u7e8c\u767c\u73fe\u6b64\u75c5\u6bd2\u7684\u5b58\u5728\uff0c\u4e26\u5c0d\u5b83\u6709\u4e0d\u540c\u7684\u547d\u540d\u65b9\u5f0f\uff0c\u4f0a\u6717\u96fb\u8166\u7dca\u6025\u61c9\u8b8a\u5718\u968a\uff08Computer Emergency Response Team\uff0cMAHER\uff09\u7a31\u5b83\u70ba Flamer\uff0c\u5361\u5df4\u65af\u57fa\u5be6\u9a57\u5ba4\uff08Kaspersky Lab\uff09\u7a31\u4e4b\u70ba Worm.Win32.Flame\u3001\u8cfd\u9580\u9435\u514b\uff08Symantec\uff09\u7a31\u5176\u70ba Win32.Flamer\uff0c\u6b50\u6d32\u52a0\u5bc6\u53ca\u7cfb\u7d71\u5b89\u5168\u5be6\u9a57\u5ba4\uff08Laboratory of Cryptography and System Security\uff0cCrySyS\uff09\u5247\u628a\u5b83\u53eb\u505a sKyWIper\uff0c\u672c\u6587\u66ab\u7a31\u5176\u70ba\u300c\u706b\u7130\u300d\u3002<\/p>\n<p>\u5361\u5df4\u65af\u57fa\u5206\u6790\u706b\u7130\u539f\u59cb\u78bc\u767c\u73fe\uff0c\u5b83\u8207\u8457\u540d\u7684\u75c5\u6bd2 Stuxnet \u8207 Duqu \u985e\u4f3c\uff0cStuxnet \u7576\u5e74\u66fe\u611f\u67d3\u4f0a\u6717 3 \u842c\u591a\u53f0\u96fb\u8166\uff0c\u4e26\u5c0d\u5176\u6838\u80fd\u63a7\u5236\u7cfb\u7d71\u767c\u52d5\u653b\u64ca\u3002Duqu \u8207 Stuxnet \u6709\u76f8\u540c\u7684\u6838\u5fc3\uff0c\u88ab\u8a2d\u8a08\u7528\u4ee5\u9060\u7aef\u64cd\u63a7\u3001\u6536\u96c6\u8cc7\u6599\u3002\u706b\u7130\u611f\u67d3\u7684\u5730\u5340\u8207\u653b\u64ca\u76ee\u6a19\u8207\u4e0a\u8ff0\u5169\u7a2e\u75c5\u6bd2\u985e\u4f3c\uff0c\u4f46\u5728\u529f\u80fd\u4e0a\u537b\u8907\u96dc\u7684\u591a\u3002<\/p>\n<p>\u706b\u7130\u7d93\u7531\u611f\u67d3\u53d7\u5bb3\u8005\u7684 USB \u96a8\u8eab\u789f\u9032\u884c\u64f4\u6563\uff0c\u4e26\u8a2d\u8a08\u6210\u6a21\u7d44\u5316\u67b6\u69cb\uff0c\u5177\u6709\u975e\u5e38\u591a\u6a23\u7684\u653b\u64ca\u65b9\u5f0f\uff0c\u53ef\u4ee5\u52dd\u4efb\u5404\u7a2e\u4e0d\u540c\u7684\u9593\u8adc\u4efb\u52d9\uff0c\u4f8b\u5982\uff1a\u900f\u904e\u53d7\u5bb3\u8005\u96fb\u8166\u7684\u9ea5\u514b\u98a8\u9304\u97f3\u3001\u64f7\u53d6\u96fb\u8166\u756b\u9762\u3001\u7d00\u9304\u9375\u76e4\u64cd\u4f5c\u884c\u70ba\u3001\u5075\u6e2c\u7db2\u8def\u6d41\u91cf\u3001\u8207\u9031\u908a\u85cd\u7259\u8a2d\u5099\u9032\u884c\u901a\u8a0a\u7b49\u3002<\/p>\n<p>\u66f4\u53ef\u6015\u7684\u662f\uff0c\u706b\u7130\u53ef\u80fd\u5df2\u7d93\u6f5b\u4f0f\u5728\u6211\u5011\u5468\u570d\u9577\u9054\u5169\u5e74\u4e86\uff01\u5361\u5df4\u65af\u57fa\u5be6\u9a57\u5ba4\u9996\u5e2d\u60e1\u610f\u8edf\u9ad4\u5c08\u5bb6 Vitaly Kamluk \u8868\u793a\uff0c\u5206\u6790\u706b\u7130\u4e2d\u7684\u7a0b\u5f0f\u78bc\uff0c\u767c\u73fe\u6700\u65e9\u7684\u5275\u9020\u65e5\u671f\u662f\u5728 2010 \u5e74\uff0c\u986f\u793a\u9019\u5169\u5e74\u4f86\uff0c\u706b\u7130\u662f\u7121\u8072\u7121\u606f\u7684\u5728\u6211\u5011\u8eab\u65c1\u8513\u5ef6\uff0c\u5230\u5e95\u6709\u591a\u5c11\u96fb\u8166\u5df2\u7d93\u88ab\u5165\u4fb5\uff1f\u76ee\u524d\u4ecd\u662f\u500b\u672a\u77e5\u6578\uff0c\u56e0\u70ba\u706b\u7130\u88ab\u8a2d\u8a08\u6210\u6703\u907f\u958b\u9632\u6bd2\u8edf\u9ad4\u7684\u5075\u6e2c\uff0c\u9019\u4e5f\u662f\u70ba\u4ec0\u9ebc\u5b83\u6703\u9019\u9ebc\u4e45\u624d\u88ab\u767c\u73fe\u7684\u539f\u56e0\u3002\u800c\u5728\u76ee\u524d\u5df2\u77e5\u53d7\u5bb3\u7684\u96fb\u8166\u4e2d\uff0c\u4e5f\u767c\u73fe\u5373\u4f7f\u662f\u66f4\u65b0\u5230\u6700\u65b0\u7684 Windows 7\uff0c\u4e5f\u96e3\u9003\u4e2d\u62db\u7684\u547d\u904b\u3002<\/p>\n<p>\u7d71\u8a08\u8cc7\u6599\u986f\u793a\u706b\u7130\u7684\u653b\u64ca\u76ee\u6a19\u5927\u90fd\u5728\u4e2d\u6771\u5730\u5340\uff0c\u4e0d\u904e\u8cfd\u9580\u9435\u514b\u4e5f\u767c\u73fe\u4f4d\u65bc\u6fb3\u6d32\u3001\u9999\u6e2f\u7b49\u5730\u7684\u53d7\u5bb3\u8005\uff0c\u4e0d\u6392\u9664\u75c5\u6bd2\u7d93\u7531\u7b46\u8a18\u578b\u96fb\u8166\u7b49\u79fb\u52d5\u8a2d\u5099\uff0c\u98c4\u6d0b\u904e\u6d77\u88ab\u5e36\u5230\u4e9e\u6d32\u4f86\u7684\u53ef\u80fd\u6027\u3002<\/p>\n<p>\u76ee\u524d\u4ecd\u7121\u6cd5\u5224\u5b9a\u706b\u7130\u88ab\u8a2d\u8a08\u51fa\u4f86\u7684\u76ee\u7684\u70ba\u4f55\uff0c\u56e0\u70ba\u5b83\u5177\u6709\u592a\u591a\u529f\u80fd\u4e86\uff0c\u5b83\u7684\u89aa\u621a Stuxnet \u8207 Duqu \u9019\u5169\u500b\u75c5\u6bd2\u5927\u5c0f\u7d04\u70ba 500KB\uff0c\u4f46\u6574\u500b\u706b\u7130\u7684\u5927\u5c0f\u537b\u53ef\u4ee5\u8d85\u904e 20MB\uff01\u6b50\u6d32\u52a0\u5bc6\u53ca\u7cfb\u7d71\u5b89\u5168\u5be6\u9a57\u5ba4\u767c\u8868\u7684\u5831\u544a\u4e2d\u8868\u793a\uff0c\u5982\u6b64\u8907\u96dc\u7684\u75c5\u6bd2\uff0c\u6975\u6709\u53ef\u80fd\u80cc\u5f8c\u662f\u7531\u653f\u5e9c\u6240\u8d0a\u52a9\uff0c\u5177\u6709\u76f8\u7576\u7684\u4eba\u529b\u7269\u529b\u624d\u6709\u8fa6\u6cd5\u958b\u767c\u51fa\u4f86\uff0c\u76ee\u7684\u4e0d\u5916\u4e4e\u662f\u9032\u884c\u7db2\u8def\u6230\u3002\u800c\u5230\u5e95\u662f\u54ea\u500b\u570b\u5bb6\u6240\u88fd\u4f5c\u51fa\u4f86\uff1f\u76ee\u524d\u4e0d\u5f97\u800c\u77e5\uff0c\u300c\u5f9e\u75c5\u6bd2\u539f\u59cb\u78bc\u4e2d\u53ea\u80fd\u770b\u51fa\u4f86\uff0c\u67d0\u4e9b\u958b\u767c\u8005\u61c9\u8a72\u662f\u4ee5\u82f1\u6587\u70ba\u6bcd\u8a9e\u3002\u300d\u8cfd\u9580\u9435\u514b\u767c\u8a00\u4eba\u5982\u6b64\u8868\u793a\u3002<\/p>\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a<br \/>\nResearchers Identify Stuxnet-like Cyberespionage Malware Called &#8216;Flame&#8217; | PCWorld<br \/>\nThe Flame: Questions and Answers &#8211; Securelist<br \/>\nFlamer: Highly Sophisticated and Discreet Threat Targets the Middle East | Symantec Connect Community  <\/p>\n<p><script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script> <script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script> <br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4eca\u65e5\u65b0\u805e\u8a18\u8005\u7518\u5049\u4e2d\uff0f\u7d9c\u5408\u5831\u5c0e \u4e00\u7a2e\u6975\u70ba\u8907\u96dc\u7684\u96fb\u8166\u75c5\u6bd2\u8fd1\u65e5\u88ab\u5404\u5927\u8cc7\u5b89\u7814\u7a76\u55ae\u4f4d\u767c\u73fe\uff0c\u6b64\u75c5\u6bd2\u88ab\u7cbe\u5fc3\u8a2d\u8a08\u6210\u5177\u6709\u591a\u7a2e\u529f\u80fd [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1297","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1297"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1297\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}