太阳风黑客攻击后网络安全的最新趋势

Q4 Environmental Science Iranian Journal of Botany Pub Date : 2021-03-24 DOI:10.33897/FUJEAS.V1I2.347
Naveed Akhtar
{"title":"太阳风黑客攻击后网络安全的最新趋势","authors":"Naveed Akhtar","doi":"10.33897/FUJEAS.V1I2.347","DOIUrl":null,"url":null,"abstract":"That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings. The  breach was not found until the unmistakable cybersecurity company FireEye, which itself employments Solar Winds, decided it had experienced a breach through the program. FireEye has not freely faulted that breach on the Solar Winds hack, but it allegedly affirmed that was the case to the tech location Krebs On Security on Tuesday. FireEye depicted the malware’s bewildering capabilities, from at first lying torpid up to two weeks, to stowed away. That was December 13, 2020. FireEye gauges programmers to begin with picked up get to in Walk 2020. For about eight months, malevolent on-screen characters carted absent untold sums of touchy information from contaminated organizations — and the total scope of the breach is still unfolding. Despite Microsoft seizing the code’s command and control server (a common component in botnet assaults as well), a few security specialists think the assailants may still have get to the Solar Winds Orion program system. Others are conjecturing that these programmers cleared out behind extra, yet-to-be-seen malevolent code.","PeriodicalId":36255,"journal":{"name":"Iranian Journal of Botany","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Latest trends in the Cybersecurity after the solar wind hacking attack\",\"authors\":\"Naveed Akhtar\",\"doi\":\"10.33897/FUJEAS.V1I2.347\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings. The  breach was not found until the unmistakable cybersecurity company FireEye, which itself employments Solar Winds, decided it had experienced a breach through the program. FireEye has not freely faulted that breach on the Solar Winds hack, but it allegedly affirmed that was the case to the tech location Krebs On Security on Tuesday. FireEye depicted the malware’s bewildering capabilities, from at first lying torpid up to two weeks, to stowed away. That was December 13, 2020. FireEye gauges programmers to begin with picked up get to in Walk 2020. For about eight months, malevolent on-screen characters carted absent untold sums of touchy information from contaminated organizations — and the total scope of the breach is still unfolding. Despite Microsoft seizing the code’s command and control server (a common component in botnet assaults as well), a few security specialists think the assailants may still have get to the Solar Winds Orion program system. Others are conjecturing that these programmers cleared out behind extra, yet-to-be-seen malevolent code.\",\"PeriodicalId\":36255,\"journal\":{\"name\":\"Iranian Journal of Botany\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Iranian Journal of Botany\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33897/FUJEAS.V1I2.347\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Environmental Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Iranian Journal of Botany","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33897/FUJEAS.V1I2.347","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Environmental Science","Score":null,"Total":0}
引用次数: 1

摘要

无论如何,这种主导地位已经成为一种风险。周日,太阳风公司提醒了成千上万的客户,一个“境外国家”找到了进入其最知名产品的后门。该产品名为“猎户座”(Orion),可以让组织在电脑系统和服务器上屏蔽停电情况。该公司发现,程序员在Orion的升级中偷偷植入了一段恶意代码,使他们无法访问客户的系统。太阳风承认,黑客早在Walk就开始了,这给了程序员充足的时间进入客户的内部工作。直到网络安全公司火眼(FireEye)(它自己也雇佣了太阳风公司)认定它通过该项目遭遇了一次入侵,才发现了漏洞。火眼并没有自由地指责太阳风的黑客攻击,但据称它在周二向技术机构克雷布斯安全公司(Krebs on Security)证实了这一点。FireEye描述了该恶意软件令人困惑的能力,从一开始休眠到两周,再到隐藏起来。那是2020年12月13日。FireEye测量程序员从2020年开始到2020年。在大约8个月的时间里,屏幕上的恶意角色从受污染的组织中带走了数不清的敏感信息,而这次入侵的总体范围仍在扩大。尽管微软抓住了代码的命令和控制服务器(也是僵尸网络攻击的常见组件),但一些安全专家认为攻击者可能仍然可以进入太阳风猎户座程序系统。其他人则猜测,这些程序员清除了额外的、尚未被发现的恶意代码。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Latest trends in the Cybersecurity after the solar wind hacking attack
That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings. The  breach was not found until the unmistakable cybersecurity company FireEye, which itself employments Solar Winds, decided it had experienced a breach through the program. FireEye has not freely faulted that breach on the Solar Winds hack, but it allegedly affirmed that was the case to the tech location Krebs On Security on Tuesday. FireEye depicted the malware’s bewildering capabilities, from at first lying torpid up to two weeks, to stowed away. That was December 13, 2020. FireEye gauges programmers to begin with picked up get to in Walk 2020. For about eight months, malevolent on-screen characters carted absent untold sums of touchy information from contaminated organizations — and the total scope of the breach is still unfolding. Despite Microsoft seizing the code’s command and control server (a common component in botnet assaults as well), a few security specialists think the assailants may still have get to the Solar Winds Orion program system. Others are conjecturing that these programmers cleared out behind extra, yet-to-be-seen malevolent code.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Iranian Journal of Botany
Iranian Journal of Botany Environmental Science-Ecology
CiteScore
0.80
自引率
0.00%
发文量
0
期刊最新文献
A Comparative Analysis of Fruits and Vegetables Quality Using AI-Assisted Technologies: A review Multiple eye disease detection using deep learning Behavioral Authentication for Smartphones backed by Something you Process Country level Social Aggression using Computational Modelling Heart Diseases Prediction and Diagnosis using Supervised Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1