{"id":10609,"date":"2014-12-04T17:06:12","date_gmt":"2014-12-04T09:06:12","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=10609"},"modified":"2014-12-16T11:15:17","modified_gmt":"2014-12-16T03:15:17","slug":"%e7%b4%a2%e5%b0%bc%e5%bd%b1%e8%a6%96%ef%bc%88sony-pictures%ef%bc%89%e4%bc%81%e6%a5%ad%e7%b6%b2%e8%b7%af%e9%81%ad%e5%8f%97%e9%87%8d%e5%a4%a7%e6%94%bb%e6%93%8a%ef%bc%9a%e7%82%ba%e4%bd%95%e4%bd%a0","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=10609","title":{"rendered":"\u7d22\u5c3c\u5f71\u8996\uff08Sony Pictures\uff09\u4f01\u696d\u7db2\u8def\u906d\u53d7\u91cd\u5927\u653b\u64ca\uff1a\u70ba\u4f55\u4f60\u9700\u8981\u9818\u5148APT \u76ee\u6a19\u653b\u64ca\u4e00\u6b65"},"content":{"rendered":"<p>\u8655\u7406\u653b\u64ca\u3001\u5165\u4fb5\u548c\u8cc7\u6599\u7aca\u53d6\u554f\u984c\u662f\u76ee\u524d\u8a31\u591a\u7d44\u7e54\u8981\u9762\u5c0d\u7684\u5de5\u4f5c\u4e4b\u4e00\u3002\u9019\u985e\u5a01\u8105\u5c31\u50cf\u662f\u7d44\u7e54\u56fa\u5b9a\u6703\u9762\u5c0d\u7684\u554f\u984c\uff0c\u800c\u4e0d\u6b63\u78ba\u9632\u79a6\u7b56\u7565\u6240\u5e36\u4f86\u7684\u5f8c\u679c\u5c07\u6703\u5f88\u5feb\u5730\u986f\u73fe\u51fa\u4f86\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/www.trendmicro.com\/vinfo\/resources\/images\/tex\/blogicons\/targets.jpg\" alt=\"\" width=\"624\" height=\"427\" \/><\/p>\n<p>\u7d22\u5c3c\u5f71\u8996\uff08Sony Pictures\uff09<a href=\"https:\/\/securityaffairs.co\/wordpress\/30498\/cyber-crime\/sony-pictures-corporate-network-compromised-major-attack.html\">\u6700\u8fd1\u7684\u653b\u64ca\u4e8b\u4ef6<\/a>\u7a81\u986f\u51fa\u9019\u500b\u554f\u984c\u3002\u572811\u6708\u4e0b\u65ec\uff0c\u8a72\u516c\u53f8\u4f01\u696d\u7db2\u8def\u88ab\u81ea\u7a31\u70ba\u548c\u5e73\u5b88\u8b77\u8005\uff08#GoP\uff09\u7684\u5718\u9ad4\u6240\u5165\u4fb5\u3002\u4e00\u5f35\u9996\u5148\u767c\u8868\u5728Reddit\u7684\u5716\u6a94\u8868\u793a\u6b64\u5716\u88ab\u79c0\u5728\u6bcf\u4e00\u4f4d\u54e1\u5de5\u7684\u96fb\u8166\u4e0a\uff0c\u5e36\u4f86\u99ed\u5ba2\u5011\u7684\u8a0a\u606f\uff0c\u8981\u6c42\u4ed6\u5011\u7684\u300c\u9700\u6c42\u9700\u8981\u5f97\u5230\u6eff\u8db3\u300d\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2014\/12\/WIPALL_fig7-1.png\" alt=\"\" width=\"611\" height=\"531\" \/>\u99ed\u5ba2\u8072\u7a31\u4ed6\u5011\u64c1\u6709\u6578\u500b\u5305\u542b\u6a5f\u5bc6\u54e1\u5de5\u8cc7\u6599\u7684ZIP\u6a94\u6848\uff0c\u5305\u62ec\u59d3\u540d\u3001\u500b\u4eba\u6a94\u6848\u3001\u85aa\u8cc7\u548c\u751f\u65e5\u3002\u5176\u4ed6\u64da\u7a31\u88ab\u7aca\u7684\u8cc7\u6599\u662f\u4e3b\u6f14\u7d22\u5c3c\u5f71\u8996\uff08Sony Pictures\uff09\u96fb\u5f71\u660e\u661f\u7684\u500b\u4eba\u8cc7\u6599\u3002<\/p>\n<p>\u4e94\u90e8\u5c1a\u672a\u767c\u8868\u7684\u5b8c\u6574\u9577\u5ea6\u5f71\u7247\u4e5f\u88ab\u6d29\u9732\u5230\u5404\u500b\u6a94\u6848\u5206\u4eab\u7db2\u7ad9\u3002<\/p>\n<p>\u7d22\u5c3c\u5f71\u8996\uff08Sony Pictures\uff09\u5c0d\u6b64\u4e8b\u4ef6\u7684\u53cd\u61c9\u4e5f\u503c\u5f97\u5f37\u8abf\u3002\u5c0d\u65bc\u9019\u985e\u9ad8\u5c64\u7d1a\u653b\u64ca\u7684<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/four-steps-to-an-effective-targeted-attack-response\/\">\u5178\u578b\u53cd\u61c9<\/a>\u662f\u8981\u8b93\u7d44\u7e54\u53ef\u4ee5\u9069\u7576\u5730\u8abf\u67e5\u73fe\u6709\u653b\u64ca\u4e26\u5c07\u5c0d\u7d44\u7e54\u7684\u65e5\u5e38\u904b\u4f5c\u5f71\u97ff\u6e1b\u81f3\u6700\u4f4e\u3002\u7136\u800c\uff0c\u73fe\u6709\u95dc\u65bc\u6b64\u6b21\u653b\u64ca\u7684\u5831\u544a\u986f\u793a\u4ed6\u5011\u7684\u53cd\u61c9\u662f\u7981\u7528\u6574\u500b\u4f01\u696d\u7db2\u8def\u3002\u4e0d\u50c5\u56b4\u91cd\u5730\u5f71\u97ff\u65e5\u5e38\u71df\u904b\uff0c\u4e5f\u8b93\u8abf\u67e5\u4efb\u4f55\u653b\u64ca\u8b8a\u5f97\u66f4\u52a0\u56f0\u96e3\u3002<\/p>\n<p>\u4e00\u822c\u4f86\u8aaa\uff0c\u653b\u64ca\u4f01\u696d\u7db2\u8def\u88ab\u8a8d\u70ba\u662f\u5c0d\u7aca\u53d6\u91d1\u9322\u6216\u8cc7\u8a0a\u6709\u8208\u8da3\u3002\u9019\u6b21\u653b\u64ca\u63d0\u9192\u4e86IT\u7ba1\u7406\u54e1\u67d0\u4e9b\u653b\u64ca\u4e3b\u8981\u662f\u88ab\u8a2d\u8a08\u4f86\u7834\u58de\u76ee\u6a19\u7d44\u7e54\u7684\u904b\u4f5c \u2013 \u5be6\u969b\u4e0a\uff0c\u5c31\u662f\u99ed\u5ba2\u4e3b\u7fa9\u7684\u5448\u73fe\u3002\u7d44\u7e54\u5fc5\u9808\u8003\u616e\u5230\u9019\u4e00\u9ede\u4e26\u76f8\u5c0d\u61c9\u5730\u4f86\u4fdd\u8b77\u81ea\u5df1\u7684\u7db2\u8def\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\uff20\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/sony-pictures-hit-by-attack-why-you-need-to-stay-ahead-of-targeted-attacks\">Sony Pictures Corporate Network Hit by Major Attack: Why You Need to Stay Ahead of Targeted Attacks<\/a><\/p>\n<p>\u5c0d\u7d22\u5c3c\u88ab\u653b\u64ca\u4e8b\u4ef6\u7684\u5831\u5c0e\u96a8\u8457\u6211\u5011\u770b\u5230\u66f4\u591a\u767c\u5c55\u800c\u7e7c\u7e8c\u4e0b\u53bb\u3002\u9019\u88e1\u662f\u8ddf\u6b64\u4e8b\u4ef6\u6709\u95dc\u7684\u6587\u7ae0\u5217\u8868\uff1a<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=10651\">\u5206\u6790\u7f8e\u570b\u806f\u90a6\u8abf\u67e5\u5c40\u8b66\u8a0a\u80cc\u5f8c\u7684\u7834\u58de\u6027\u60e1\u610f\u8edf\u9ad4<\/a> \u2013 \u5206\u6790\u7f8e\u570b\u806f\u90a6\u8abf\u67e5\u5c40\uff08FBI\uff09\u95dc\u65bc\u8b66\u544a\u7f8e\u570b\u4f01\u696d\u7684\u5831\u544a\u4e2d\u6240\u63d0\u5230\u7684\u300c\u7834\u58de\u6027\u300d\u60e1\u610f\u8edf\u9ad4<\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=10609\">\u7d22\u5c3c\u5f71\u8996\uff08Sony Pictures\uff09\u88ab\u99ed\uff1a\u6211\u5011\u77e5\u9053\u4ec0\u9ebc\u548c\u4f60\u8a72\u77e5\u9053\u4ec0\u9ebc <\/a>\u2013\u7d22\u5c3c\u5f71\u8996\uff08Sony Pictures\uff09\u53d7\u99ed\u6642\u9593\u8868<\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=10654\" rel=\"bookmark\">&lt; \u7d22\u5c3c\u5f71\u696d\u88ab\u99ed\u4e8b\u4ef6 &gt; GOP \u99ed\u5ba2\u7d44\u7e54\u7d66Sony Pictures\u54e1\u5de5\u7684\u8b66\u544a\u8207 WIPALL \u60e1\u610f\u8edf\u9ad4\u8b8a\u7a2e\u5206\u6790<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u8655\u7406\u653b\u64ca\u3001\u5165\u4fb5\u548c\u8cc7\u6599\u7aca\u53d6\u554f\u984c\u662f\u76ee\u524d\u8a31\u591a\u7d44\u7e54\u8981\u9762\u5c0d\u7684\u5de5\u4f5c\u4e4b\u4e00\u3002\u9019\u985e\u5a01\u8105\u5c31\u50cf\u662f\u7d44\u7e54\u56fa\u5b9a\u6703\u9762\u5c0d\u7684\u554f\u984c\uff0c\u800c\u4e0d\u6b63\u78ba\u9632\u79a6\u7b56 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[10,1856,8,179],"tags":[45,1817,2280,1853,1854,1863],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/10609"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10609"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/10609\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}