[新聞] 部落客意外地暫停勒索病毒消失

看板Gossiping作者時間8年前 (2017/05/14 01:38), 編輯推噓7(1148)
留言23則, 20人參與, 最新討論串1/1
1.媒體來源: ※ 例如蘋果日報、奇摩新聞 BBC 2.完整新聞標題: ※ 標題沒有寫出來 ---> 依照板規刪除文章 Global cyber-attack: Security blogger halts ransomware 'by accident' 3.完整新聞內文: ※ 社論特稿都不能貼! 違者退文,貼廣告也會被退文喔! A 22-year-old UK security researcher has told the BBC how he "accidentally" halted the spread of ransomware affecting hundreds of organisations, including the UK's NHS. The man, known online as MalwareTech, was analysing the code behind the ransomware on Friday night when he made his discovery. He first noticed the software was trying to contact an unusual web address - iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com - but this was not connected to a website, because nobody had registered it. NHS 'robust' after cyber-attack So, every time the ransomware tried to contact this mysterious website, it failed - and set about doing damage. So the blogger decided to spend $10.69 (£8) to claim the web address. By owning this web address, he could also access analytical data and get an idea of how widespread the ransomware was. Image copyright MalwareTech Image caption Owning the web address let MalwareTech monitor where infections were happening But he later realised that registering the web address had also stopped the ransomware trying to spread itself. "It was actually partly accidental," he told the BBC, after spending the night investigating. "I have not slept a wink." What happened? Originally it was suggested that whoever created the ransomware had included a "kill switch" - a way of stopping it from spreading, perhaps if things got out of hand. In this case, the act of registering the mysterious web address would trigger the kill switch. But the blogger MalwareTech now thinks it was not a kill switch. He thinks it was a way of detecting whether the ransomware was being investigated within a secured, disposable environment that researchers use to inspect viruses. This is known as a "virtual machine". "The [ransomware] exits to prevent further analysis," MalwareTech wrote in a blog post. "My registration... caused all infections globally to believe they were inside a [virtual machine] and exit…thus we initially unintentionally prevented the spread and further ransoming of computers." The researcher has been called an "accidental hero" for slowing the spread of the ransomware. "I would say that's correct," he told the BBC. Does this mean the ransomware is defeated? While the registration of the web address appears to have stopped one strain of the malware spreading, it does not mean the ransomware itself has been defeated. Any files that were scrambled by the ransomware will still be held to ransom. Security experts have also warned that new variants of the ransomware that ignore the "kill switch" will appear. "This variant shouldn't be spreading any further, however there'll almost certainly be copycats," said security researcher Troy Hunt in a blog post. MalwareTech warned: "We have stopped this one, but there will be another one coming and it will not be stoppable by us. "There's a lot of money in this, there is no reason for them to stop. It's not much effort for them to change the code and start over." 4.完整新聞連結 (或短網址): ※ 當新聞連結過長時,需提供短網址方便網友點擊 https://goo.gl/mnFCxW 5.備註: ※ 一個人一天只能張貼一則新聞,被刪或自刪也算額度內超貼者水桶,請注意 大致上是說一名研究網路安全的部落客意外發現 勒索病毒會先存取一個網址: iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 但這網址卻還沒人註冊, 所以存取會失敗,病毒就會進行下一步感染。 所以這位老兄就去註冊了這個網址, 然後收到了一堆資料… 也暫時停止了病毒的傳播。 這個故事告訴我們, 寫程式時要寫對網址。 -- ※ 發信站: 批踢踢實業坊(ptt.cc), 來自: 31.53.114.218 ※ 文章網址: https://www.ptt.cc/bbs/Gossiping/M.1494697106.A.F35.html

05/14 01:38, , 1F
鴿子到了?
05/14 01:38, 1F

05/14 01:38, , 2F
好恐怖
05/14 01:38, 2F

05/14 01:39, , 3F
看不懂......
05/14 01:39, 3F

05/14 01:39, , 4F
防毒版有詳細解說
05/14 01:39, 4F

05/14 01:39, , 5F
快推 不然別人以為我看不懂
05/14 01:39, 5F

05/14 01:39, , 6F
我覺得這新聞出來後 變種的就會更好玩了
05/14 01:39, 6F

05/14 01:39, , 7F
這個故事告訴我們 文組的思維沒有下限
05/14 01:39, 7F

05/14 01:39, , 8F
所以這位部落客是拯救世界的英雄?
05/14 01:39, 8F

05/14 01:40, , 9F
http://tinyurl.com/knmjbgg 防毒版有解說
05/14 01:40, 9F

05/14 01:40, , 10F
我早就發現了還用你說
05/14 01:40, 10F

05/14 01:42, , 11F
樓上理組宅男中毒崩潰
05/14 01:42, 11F

05/14 01:42, , 12F
自己開的後門吧
05/14 01:42, 12F

05/14 01:43, , 13F
寫對網址...文組嗎
05/14 01:43, 13F

05/14 01:43, , 14F
駭客改個網址就繼續傳播了 治標不治本
05/14 01:43, 14F

05/14 01:44, , 15F
我比較好奇的是為何要用固定網域 讓每個病毒感染時隨機產
05/14 01:44, 15F

05/14 01:44, , 16F
這故事告訴我們,做病毒時不要hard code,要用隨機數值
05/14 01:44, 16F

05/14 01:45, , 17F
生一個亂數長網域不是就不會被這招破解?
05/14 01:45, 17F

05/14 01:46, , 18F
駭客總是會故意露出馬腳
05/14 01:46, 18F

05/14 02:02, , 19F
他故意的吧 總得有個辦法停止。
05/14 02:02, 19F

05/14 02:09, , 20F
這只是用來確認網路是通的吧,網址改一下就可以了
05/14 02:09, 20F

05/14 02:09, , 21F
應該是駭客給自己留的後門吧?
05/14 02:09, 21F

05/14 02:24, , 22F
這是個假網址來掩護真網址用的,他再弄一個新的假
05/14 02:24, 22F

05/14 02:24, , 23F
網址就能繼續了,只是暫時中斷而已
05/14 02:24, 23F
文章代碼(AID): #1P5qIIyr (Gossiping)