{"id":16041,"date":"2016-01-11T14:20:30","date_gmt":"2016-01-11T06:20:30","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=16041"},"modified":"2016-05-11T19:30:40","modified_gmt":"2016-05-11T11:30:40","slug":"%e7%ac%ac%e4%b8%80%e8%b5%b7%e7%94%b1%e6%83%a1%e6%84%8f%e8%bb%9f%e9%ab%94%e9%80%a0%e6%88%90%e7%9a%846%e5%b0%8f%e6%99%82%e5%a4%a7%e6%96%b7%e9%9b%bb%e5%b0%8e%e8%87%b4%e7%83%8f%e5%85%8b%e8%98%ad%e6%95%b8","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=16041","title":{"rendered":"\u7b2c\u4e00\u8d77\u7531\u60e1\u610f\u8edf\u9ad4\u9020\u6210\u76846\u5c0f\u6642\u5927\u65b7\u96fb,\u5c0e\u81f4\u70cf\u514b\u862d\u6578\u5341\u842c\u6236\u4f4f\u5bb6\u505c\u96fb"},"content":{"rendered":"<p>\u57282015\u5e74\u9032\u5165\u5c3e\u8072\u6642\u51fa\u73fe\u4e00\u8d77\u7279\u5225\u7684\u4e8b\u4ef6\uff0c\u70cf\u514b\u862d\u7684\u4f0a\u842c\u8afe-\u5f17\u862d\u79d1\u592b\u65af\u514b\u5730\u5340\u6709\u6578\u5341\u842c\u6236\u4f4f\u5bb6\uff0c\u76f8\u7576\u65bc\u7576\u5730\u4e00\u534a\u7684\u4f4f\u5b85\uff0c\u7c60\u7f69\u5728\u7121\u96fb\u529b\u4f9b\u61c9\u7684\u9ed1\u6697\u4e4b\u4e0b\u3002\u9019\u8d77\u4e8b\u4ef6\u8ddf11\u6708\u6642\u70cf\u514b\u862d\u6c11\u65cf\u4e3b\u7fa9\u5206\u5b50\u5728\u514b\u91cc\u7c73\u4e9e\u534a\u5cf6\u9032\u884c\u7834\u58de\u9020\u6210<a href=\"https:\/\/research.dyn.com\/2015\/11\/explosions-leave-crimea-in-the-dark\/\">\u505c\u96fb<\/a>\u4e26\u6c92\u6709\u95dc\u4fc2\u3002\u6839\u64da\u7814\u7a76\u4eba\u54e1\u8868\u793a\uff0c\u9019\u6b21\u4e8b\u4ef6\u662f\u7531\u7cfb\u7d71\u5167\u7684<a href=\"https:\/\/arstechnica.com\/security\/2016\/01\/first-known-hacker-caused-power-outage-signals-troubling-escalation\/\">\u60e1\u610f\u8edf\u9ad4<\/a>\u9020\u6210\uff0c\u5c0e\u81f412\u670823\u65e5\u51fa\u73fe6\u5c0f\u6642\u7684\u96fb\u529b\u4e2d\u65b7\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16048\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle.png\" alt=\"\u881f\u71ed\" width=\"481\" height=\"479\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle.png 902w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle-150x150.png 150w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle-300x300.png 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle-768x765.png 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle-800x796.png 800w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2016\/01\/candle-600x597.png 600w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>\u6839\u64da<a href=\"https:\/\/www.thestar.com.my\/tech\/tech-news\/2016\/01\/05\/ukraine-utility-cyber-attack-wider-than-reported\/\">\u60e1\u610f\u8edf\u9ad4\u7814\u7a76\u4eba\u54e1Robert Lipovsky<\/a>\uff0c\u70cf\u514b\u862d\u897f\u90e8\u7684\u96fb\u529b\u516c\u53f8Prykarpattyaoblenergo\u662f\u552f\u4e00\u63d0\u4f9b\u76f8\u95dc\u8a73\u60c5\u7684\u516c\u53f8\uff0c\u800c\u6709\u5169\u5bb6\u96fb\u529b\u516c\u53f8\u4e5f\u53d7\u5230\u985e\u4f3c\u60e1\u610f\u8edf\u9ad4\u7684\u5f71\u97ff\u3002<\/p>\n<p>\u70cf\u514b\u862d\u60c5\u5831\u55ae\u4f4d\u8a8d\u70ba\u9019\u8d77\u505c\u96fb\u4e8b\u4ef6\u8ddf<a href=\"https:\/\/mobile.reuters.com\/article\/idUSKBN0UE0ZZ20151231\">\u4fc4\u7f85\u65af<\/a>\u6709\u95dc\uff0c\u56e0\u70ba\u5169\u570b\u9593\u6b63\u5728\u9032\u884c\u8ecd\u4e8b\u548c\u653f\u6cbb\u4e0a\u7684\u9b25\u722d\uff0c\u8abf\u67e5\u6307\u51fa\u662f\u60e1\u610f\u8edf\u9ad4\u9020\u6210\u4e86\u9019\u6b21\u7684\u505c\u96fb\u4e8b\u4ef6\u3002\u7db2\u8def\u5b89\u5168\u5c08\u5bb6<a href=\"https:\/\/ics.sans.org\/blog\/2016\/01\/01\/potential-sample-of-malware-from-the-ukrainian-cyber-attack-uncovered\">Robert M. Lee<\/a>\u5728\u5176\u6587\u7ae0\u4e2d\u6307\u51fa\uff0c\u300c\u9019\u60e1\u610f\u8edf\u9ad4\u662f\u4e00\u500b32\u4f4d\u5143\u7684Windows\u57f7\u884c\u6a94\uff0c\u5176\u6a21\u7d44\u5316\u7279\u8cea\u986f\u793a\u9019\u662f\u500b\u66f4\u52a0\u8907\u96dc\u60e1\u610f\u8edf\u9ad4\u7684\u6a21\u7d44\u4e4b\u4e00\u3002\u300d<\/p>\n<p>\u4e0d\u4e45\u5f8c\uff0cLee\u8207<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u7684\u524d\u77bb\u6027\u5a01\u8105\u7814\u7a76\u4eba\u54e1Kyle Wilhoit\u5354\u8abf\u53d6\u5f97\u6a23\u672c\uff0c\u78ba\u8a8d\u8a72\u60e1\u610f\u8edf\u9ad4\u5177\u5099\u62b9\u9664\u80fd\u529b\u6703\u640d\u5bb3\u53d7\u611f\u67d3\u7cfb\u7d71\u3002\u5728Lee\u7684\u521d\u6b65\u8abf\u67e5\u5f8c\u4e0d\u4e45\uff0c\u6709\u8a31\u591a\u5206\u6790\u53ca\u7814\u7a76\u4eba\u54e1\u8b49\u5be6\u9019\u4e9b\u96fb\u529b\u516c\u53f8\u78ba\u5be6\u53d7\u5230\u7db2\u8def\u653b\u64ca\uff0c\u8b93\u6b64\u6b21\u4e8b\u4ef6\u6210\u70ba\u7b2c\u4e00\u8d77\u7531\u60e1\u610f\u8edf\u9ad4\u5f15\u8d77\u7684\u505c\u96fb\u3002<\/p>\n<p>\u8207\u5176\u4ed6\u5206\u6790\u53ca\u7814\u7a76\u4eba\u54e1\u7684\u898b\u89e3\u4e00\u81f4\uff0cWilhoit\u5206\u4eab\u9053\uff1a\u300c\u6211\u5011\u770b\u5230\u7b2c\u4e00\u8d77\u516c\u958b\u767c\u5e03\u60e1\u610f\u8edf\u9ad4\u5c0e\u81f4SCADA-\u8cc7\u6599\u8490\u96c6\u8207\u76e3\u63a7\u7cfb\u7d71(supervisory control and data acquisition\uff1bSCADA)\u8a2d\u5099\u505c\u64fa\u7684\u6d88\u606f\u3002\u4ee4\u4eba\u6182\u5fc3,\u4e0b\u4e00\u500b\u53d7\u5bb3\u7684\u662f\u4ec0\u9ebc\u7522\u696d\uff1f\u66f4\u589e\u52a0\u4e86\u5b83\u7684\u795e\u79d8\u611f\u3002\u300d<\/p>\n<p>\u300c\u6211\u5011\u6240\u77e5\u9053\u7684\u662f\uff0cPrykarpattyaoblenergo\u7684\u505c\u96fb\u662f\u7531\u60e1\u610f\u8edf\u9ad4\u6240\u9020\u6210\u3002\u6211\u5011\u4e5f\u77e5\u9053\u9019\u60e1\u610f\u8edf\u9ad4\u4e0d\u50c5\u91dd\u5c0dPrykarpattyaoblenergo\uff0c\u81f3\u5c11\u9084\u6709\u4e00\u500b\u70cf\u514b\u862d\u7684\u5ee3\u64ad\u516c\u53f8\u3002\u5728\u76ee\u524d\u770b\u4f86\uff0c\u53d7\u5bb3\u8005\u4f3c\u4e4e\u90fd\u5728\u70cf\u514b\u862d\uff0c\u6c92\u6709\u51fa\u73fe\u5728\u5176\u4ed6\u7684\u5730\u65b9\uff0c\u300dWilhoit\u88dc\u5145\u8aaa\u660e\u3002<!--more--><\/p>\n<p>\u5b89\u5168\u5c08\u5bb6\u6307\u51fa\uff0c\u4e8b\u5be6\u4e0a\u96fb\u529b\u516c\u53f8\u4e4b\u524d\u4e5f\u51fa\u73fe\u904e\u60e1\u610f\u8edf\u9ad4\uff0c\u7a31\u70ba<a href=\"https:\/\/arstechnica.com\/security\/2014\/11\/this-system-will-self-destruct-crimeware-gets-powerful-new-functions\/\">BlackEnergy<\/a>\uff0c\u5b83\u57282007\u5e74\u7b2c\u4e00\u6b21\u51fa\u73fe\uff0c\u5e7e\u5e74\u524d\u66f4\u65b0\u52a0\u5165\u66f4\u591a\u529f\u80fd\u3002\u4e00\u500b\u65b0\u589e\u529f\u80fdKillDisk\u53ef\u4ee5\u8b93\u53d7\u611f\u67d3\u7cfb\u7d71\u7121\u6cd5\u4f7f\u7528\uff0c\u4e26\u6467\u6bc0\u53d7\u611f\u67d3\u7cfb\u7d71\u7684\u91cd\u8981\u5143\u4ef6\u3002\u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c\u64da\u5831\u5b83\u80fd\u5920\u8b93\u5de5\u696d\u63a7\u5236\u7cfb\u7d71\uff08ICS\uff09\u9677\u5165\u5371\u96aa\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/cyber-attack-plant.jpg\" alt=\"\" width=\"700\" height=\"479\" \/><\/p>\n<p>\u300cKillDisk\u662f\u65b0BlackEnergy\u653b\u64ca\u6d3b\u52d5\u7684\u4e00\u90e8\u5206\uff0c\u6975\u6709\u53ef\u80fd\u662f\u900f\u904e\u5e36\u6709Microsoft Excel\u5de8\u96c6\u6587\u4ef6\u7684<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=136\">\u7db2\u8def\u91e3\u9b5a\uff08Phishing\uff09<\/a>\u90f5\u4ef6\u9001\u81f3\u9810\u5b9a\u53d7\u5bb3\u8005\u3002\u4e00\u65e6\u57f7\u884c\u8a72\u6a94\u6848\u5c31\u6703\u555f\u52d5\u7b2c\u4e8c\u968e\u6bb5\uff0c\u4e0b\u8f09\u76f8\u61c9\u7a0b\u5f0f\u4ee5\u5728\u53d7\u611f\u67d3\u6a5f\u5668\u80fd\u5920\u6301\u7e8c\u5b58\u5728\uff0c\u300dWilhoit\u6307\u51fa\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u9019\u4e26\u975eBlackEnergy\u60e1\u610f\u8edf\u9ad4\u7b2c\u4e00\u6b21\u8207\u91dd\u5c0d\u70cf\u514b\u862d\u7684\u653b\u64ca\u639b\u52fe\u3002\u57282014\u5e74\uff0c\u6839\u64da<a href=\"https:\/\/cert.gov.ua\/?p=2370\">\u96fb\u8166\u7dca\u6025\u61c9\u8b8a\u5c0f\u7d44<\/a>\u56de\u5831\uff0c\u5b83\u7684KillDisk\u6a21\u7d44\u5c0d\u50b3\u5a92\u6a5f\u69cb\u9020\u6210\u6c38\u4e45\u6027\u7684\u50b7\u5bb3\uff0c\u5c24\u5176\u662f\u5f71\u7247\u8ddf\u5176\u4ed6\u5167\u5bb9\u3002\u540c\u5e74\uff0c<a href=\"https:\/\/www.isightpartners.com\/2014\/10\/cve-2014-4114\/\">BlackEnergy\u5e55\u5f8c\u7684Sandworm\u5718\u968a<\/a>\u4e5f\u91dd\u5c0d\u4e86\u5317\u5927\u897f\u6d0b\u516c\u7d04\u7d44\u7e54\uff08NATO\uff09\u6210\u54e1\uff0c\u70cf\u514b\u862d\u548c\u6ce2\u862d\u653f\u5e9c\uff0c\u53ca\u6b50\u6d32\u773e\u591a\u7522\u696d\u3002\u7d93\u7531\u8da8\u52e2\u79d1\u6280\u5a01\u8105\u7814\u7a76\u5c0f\u7d44\u7684\u9032\u4e00\u6b65\u8abf\u67e5\u767c\u73fe\uff0c\u8a72\u96c6\u5718<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=10227\">\u91dd\u5c0d\u4e86\u4ee5SCADA\u70ba\u4e3b\u7684\u53d7\u5bb3\u8005<\/a>\u3002<\/p>\n<p>\u6839\u64da\u904e\u53bb\u4e00\u5468\u6240\u6536\u96c6\u7684\u8b49\u64da\uff0c\u7814\u7a76\u4eba\u54e1\u5c0f\u5fc3\u7ffc\u7ffc\u5730\u5f97\u5230\u4e00\u500b\u7d50\u8ad6\uff0c\u5c0e\u81f4\u70cf\u514b\u862d\u505c\u96fb\u7684\u653b\u64ca\u4e8b\u5be6\u4e0a\u8ddfSandworm\u6709\u95dc\u3002\u5230\u76ee\u524d\u70ba\u6b62\uff0c\u5df2\u7d93\u6210\u7acb\u4e86\u4e00\u500b\u7279\u5225\u59d4\u54e1\u6703\u4e26\u4e14\u9084\u5728\u9032\u884c\u5206\u6790\u53ca\u8abf\u67e5\uff0c\u5c1a\u672a\u78ba\u5207\u5730\u78ba\u8a8d\u662f\u4ec0\u9ebc\u9020\u6210\u6b64\u6b21\u4e8b\u4ef6\uff0c\u4f46\u5b89\u5168\u5c08\u5bb6\u65e9\u5df2\u7d93\u70ba\u6b64\u985e\u4e8b\u4ef6\u63d0\u51fa\u8b66\u544a\u3002<\/p>\n<p>Wilhoit\u88dc\u5145\u8aaa\uff1a\u300c\u6211\u5011\u662f\u5426\u77e5\u9053\u5b8c\u5168\u662f\u7531\u60e1\u610f\u8edf\u9ad4\u9020\u6210\u7684\uff1f\u4e0d\u3002\u6211\u5011\u662f\u5426\u77e5\u9053\u6709\u5176\u4ed6\u60e1\u610f\u8edf\u9ad4\u8ddf\u6b64\u4e00\u4e8b\u4ef6\u6709\u95dc\uff1f\u9084\u6c92\u3002\u6211\u5011\u77e5\u9053\u653b\u64ca\u8005\u662f\u5426\u70baSandworm\u55ce\uff1f\u4e26\u4e0d\u3002\u4f46\u6211\u8a8d\u70ba\u9019\u4e26\u975e\u6700\u5f8c\u4e00\u500b\u8207Prykarpattyaoblenergo\u4e8b\u4ef6\u76f8\u95dc\u7684\u60e1\u610f\u8edf\u9ad4\u3002\u6211\u8a8d\u70ba\u6211\u5011\u6703\u5728\u672a\u4f86\u7684\u65e5\u5b50\u88e1\u770b\u5230\u66f4\u591a\u8ddf\u6b64\u6b21\u4e8b\u4ef6\u6709\u95dc\u7684\u6a23\u672c\uff0c\u53ef\u80fd\u5305\u62ec\u66f4\u591a\u7684BlackEnergy\u6a21\u7d44\u6216\u7b2c\u4e8c\u968e\u6bb5\u5de5\u5177\u3002\u300d<\/p>\n<p>Wilhoit\u767c\u8868\u4e86\u4e00\u4efd\u7814\u7a76\u5831\u544a\u4f86\u8a73\u7d30\u8aaa\u660e<a href=\"https:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-whos-really-attacking-your-ics-equipment.pdf\">SCADA\u8a2d\u5099\u7684\u4e0d\u5b89\u5168\u6027<\/a>\uff0c\u52a0\u4e0a\u4e86\u300cSCADA\u7cfb\u7d71\u74b0\u5883\u53ef\u4ee5\u5be6\u4f5c\u57fa\u672c\u7684\u5b89\u5168\u5354\u5b9a\u524d\uff0c\u6050\u6015\u9019\u985e\u4e8b\u60c5\u6703\u8b8a\u5f97\u66f4\u52a0\u666e\u904d\u3002\u300d<\/p>\n<p>&nbsp;<\/p>\n<p>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.co.id\/vinfo\/id\/security\/news\/cyber-attacks\/first-malware-driven-power-outage-reported-in-ukraine\">First Malware-Driven Power Outage Reported in Ukraine<\/a><\/p>\n<p><a href=\"https:\/\/t.rend.tw\/?i=NDA4NQ==\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-15633\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1-1024x373.png\" alt=\"Deep Security\" width=\"736\" height=\"268\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1-1024x373.png 1024w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1-300x109.png 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1-768x280.png 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1-800x292.png 800w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1-600x219.png 600w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/12\/Deep-Security1.png 1347w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p style=\"font-size: 8pt;\">\u300a \u60f3\u4e86\u89e3\u66f4\u591a\u95dc\u65bc\u7db2\u8def\u5b89\u5168\u7684\u79d8\u8a23\u548c\u5efa\u8b70\uff0c\u53ea\u8981\u5230<a href=\"https:\/\/www.facebook.com\/trendmicrotaiwan\">\u8da8\u52e2\u79d1\u6280\u7c89\u7d72\u7db2\u9801<\/a> \u6216\u4e0b\u9762\u7684\u6309\u9215\u6309\u8b9a \u300b<\/p>\n<p><iframe loading=\"lazy\" style=\"border: none; overflow: hidden; width: 350px; height: 62px;\" src=\"https:\/\/www.facebook.com\/plugins\/likebox.php?id=255176705131&amp;width=350&amp;connections=0&amp;stream=false&amp;header=false&amp;height=62\" width=\"300\" height=\"150\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p style=\"font-size: 8pt;\"><b><\/b>\u300a\u63d0\u9192\u300b\u5c07\u6ed1\u9f20\u6e38\u6a19\u79fb\u52d5\u5230\u7c89\u7d72\u9801\u53f3\u4e0a\u65b9\u7684<strong>\u300c\u5df2\u8aaa\u8b9a\u300d<\/strong>\u6b04\u4f4d\uff0c\u52fe\u9078<strong>\u300c\u6436\u5148\u770b\u300d<\/strong>\u9078\u9805<strong>,<\/strong>\u6700\u65b0\u8cbc\u6587\u5c31\u6703\u512a\u5148\u986f\u793a\u5728\u52d5\u614b\u6d88\u606f\u9802\u7aef\uff0c\u8b93\u4f60\u4e0d\u6703\u932f\u904e\u4efb\u4f55\u66f4\u65b0\u3002<br \/>\n*\u624b\u6a5f\u7248\u76f4\u63a5\u524d\u5f80\u5c08\u9801\u9996\u9801\uff0c\u4e0b\u62c9\u8ffd\u8e64\u4e2d\uff0c\u5c31\u80fd\u5c07\u7c89\u7d72\u5c08\u9801\u8a2d\u5b9a\u6436\u5148\u770b\u3002<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p style=\"font-size: 8pt;\">\u25bc \u6b61\u8fce\u52a0\u5165\u8da8\u52e2\u79d1\u6280\u793e\u7fa4\u7db2\u7ad9\u25bc<br \/>\n<strong><br \/>\n<\/strong><strong><a href=\"https:\/\/line.me\/ti\/p\/%40fgt4590r\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/biz.line.naver.jp\/line_business\/img\/btn\/addfriends_zh-Hant.png\" alt=\"\u597d\u53cb\u4eba\u6578\" width=\"89\" height=\"30\" border=\"0\" \/><\/a> <\/strong><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2762&amp;name=20111213\"><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/08\/eNews_images_2015_0161.gif\" alt=\"\" \/><\/a> <a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2764&amp;name=20111213\"><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/08\/eNews_images_2015_0171.gif\" alt=\"\" \/><\/a> <a href=\"https:\/\/www.trendmicro.tw\/tw\/\"><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/08\/eNews_images_2015_0131.gif\" alt=\"\" \/><\/a> <a href=\"https:\/\/esupport.trendmicro.com\/zh-tw\/business\/default.aspx\"><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/08\/eNews_images_2015_0141.gif\" alt=\"\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u57282015\u5e74\u9032\u5165\u5c3e\u8072\u6642\u51fa\u73fe\u4e00\u8d77\u7279\u5225\u7684\u4e8b\u4ef6\uff0c\u70cf\u514b\u862d\u7684\u4f0a\u842c\u8afe-\u5f17\u862d\u79d1\u592b\u65af\u514b\u5730\u5340\u6709\u6578\u5341\u842c\u6236\u4f4f\u5bb6\uff0c\u76f8\u7576\u65bc\u7576\u5730\u4e00\u534a\u7684\u4f4f\u5b85 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[2741,2621,2588,46,2454,179],"tags":[2589,2590,2591,2592],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/16041"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16041"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/16041\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}