{"id":702,"date":"2010-03-19T11:20:13","date_gmt":"2010-03-19T03:20:13","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/03\/19\/usb-2\/"},"modified":"2010-03-19T11:20:13","modified_gmt":"2010-03-19T03:20:13","slug":"usb-2","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=702","title":{"rendered":"USB\u5145\u96fb\u7a0b\u5f0f\u5167\u85cf\u6728\u99ac\u7a0b\u5f0f"},"content":{"rendered":"<p>\u73fe\u4ee3\u4eba3C\u7522\u54c1\u4f7f\u7528\u7387\u9ad8\uff0c\u5916\u51fa\u6642\u96fb\u5b50\u914d\u4ef6\u6709\u8a31\u591a\uff0c\u4f7f\u7528USB\u7dda\u50b3\u8f38\u548c\u5145\u96fb\u56e0\u6b64\u800c\u975e\u5e38\u666e\u904d\u3002\u8cfd\u9580\u9435\u514b\u5b89\u5168\u56de\u61c9\u4e2d\u5fc3\u767c\u73fe\uff0c\u5927\u773e\u4f7f\u7528USB\u7dda\u50b3\u8f38\u6216\u5145\u96fb\u6642\uff0c\u8981\u6ce8\u610f\u5176\u4ecd\u6709\u6f5b\u5728\u98a8\u96aa\uff0c\u4e2d\u5fc3\u767c\u73fe\u4e00\u500b\u5229\u7528USB\u5145\u96fb\u7a0b\u5f0f\u50b3\u64ad\u7684\u6728\u99ac\u75c5\u6bd2Trojan.Arugizer\u3002\u3002<\/p>\n<p>Trojan.Arugizer\u5728\u57f7\u884c\u5f8c\u6703\u5c07\u81ea\u5df1\u8907\u88fd\u5230C:\\WINDOWS\\system32\\Arucer.dll\uff0c\u4e26\u4e14\u4fee\u6539\u767b\u9304\u8868 (registry key)\u9054\u5230\u958b\u6a5f\u81ea\u52d5\u555f\u52d5\u7684\u76ee\u7684\u3002\u7136\u5f8c\u5b83\u5c07\u6253\u958b\u96fb\u8166\u5f8c\u9580\uff0c\u57e0\u865f\u70ba7777\uff0c\u653b\u64ca\u8005\u5229\u7528\u9019\u500b\u57e0\u9054\u5230\u4ee5\u4e0b\u76ee\u7684\uff1a\uff081\uff09\u4e0b\u8f09\u57f7\u884c\u53ef\u57f7\u884c\u7a0b\u5f0f\uff082\uff09\u522a\u9664\u6a94\uff083\uff09\u767c\u9001\u6a94\u5230\u9060\u7aef\u4f3a\u670d\u5668\uff084\uff09\u5411\u653b\u64ca\u8005\u767c\u9001\u96fb\u8166\u6a94\u76ee\u9304\u8cc7\u8a0a\u3002<\/p>\n<p>\u6b64\u6728\u99ac\u901a\u5e38\u88ab\u96b1\u85cf\u5728USB\u5145\u96fb\u8edf\u9ad4\u7684\u5b89\u88dd\u7a0b\u5f0f\u4e2d\uff0c\u82e5\u4f7f\u7528\u8005\u4e0b\u8f09\u4e26\u5b89\u88dd\u7a0b\u5f0f\uff0c\u5c31\u53ef\u80fd\u6703\u88abTrojan.Arugizer \u611f\u67d3\u3002<\/p>\n<p>\u4ee5\u4e0a\u6587\u7ae0\u4f86\u6e90\uff1a<a target=\"_blank\" href=\"http:\/\/www.informationsecurity.com.tw\/article\/article_detail.aspx?tv=11&amp;aid=5615\" rel=\"noopener\">\u8cc7\u5b89\u4eba<\/a><br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u73fe\u4ee3\u4eba3C\u7522\u54c1\u4f7f\u7528\u7387\u9ad8\uff0c\u5916\u51fa\u6642\u96fb\u5b50\u914d\u4ef6\u6709\u8a31\u591a\uff0c\u4f7f\u7528USB\u7dda\u50b3\u8f38\u548c\u5145\u96fb\u56e0\u6b64\u800c\u975e\u5e38\u666e\u904d\u3002\u8cfd\u9580\u9435\u514b\u5b89\u5168\u56de\u61c9\u4e2d\u5fc3\u767c\u73fe\uff0c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-702","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=702"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/702\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}