{"id":49354,"date":"2017-05-03T09:00:13","date_gmt":"2017-05-03T01:00:13","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=49354"},"modified":"2017-05-03T14:54:21","modified_gmt":"2017-05-03T06:54:21","slug":"brickerbot%e8%a6%81%e8%ae%93%e6%99%ba%e6%85%a7%e5%9e%8b%e5%ae%b6%e9%9b%bb%e7%9b%a3%e6%8e%a7%e6%94%9d%e5%bd%b1%e6%a9%9f%e7%ad%89%e7%89%a9%e8%81%af%e7%b6%b2%e8%a8%ad%e5%82%99%e8%ae%8a%e7%a3%9a","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=49354","title":{"rendered":"\u6bd4 Mirai \u66f4\u72e0, BrickerBot \u8981\u8b93\u667a\u6167\u578b\u5bb6\u96fb,\u76e3\u63a7\u651d\u5f71\u6a5f\u2026 \u7b49 IoT \u88dd\u7f6e,\u6c38\u9060\u8b8a\u78da\u584a!"},"content":{"rendered":"<p>\u4e00\u7a2e\u91dd\u5c0d<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8802\">\u7269\u806f\u7db2\uff08IoT ,Internet of Thing\uff09<\/a>\u8a2d\u5099\u7684\u65b0\u60e1\u610f\u8edf\u9ad4 BrickerBot \u8fd1\u65e5\u767b\u4e0a<a href=\"https:\/\/www.scmagazine.com\/brickerbot-malware-attacks-and-destroys-unsecure-iot-devices\/article\/649375\/\">\u5a92\u9ad4<\/a>,\u96d6\u7136<a href=\"https:\/\/www.theregister.co.uk\/2017\/04\/08\/brickerbot_malware_kills_iot_devices\/\">\u64da\u7a31<\/a>\u5b83\u7684\u653b\u64ca\u5a92\u4ecb\u8ddf\u00a0<a href=\"https:\/\/blog.trendmicro.com.tw\/?s=Mirai\">Mirai<\/a>\u00a0\u985e\u4f3c\uff0c\u4f46\u662f\u4e0d\u540c\u65bc\u00a0Mirai \u6703\u5c07\u53d7\u611f\u67d3\u8a2d\u5099\u8b8a\u6210<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=106\">\u300cBotnet<em>\u5080\u5121<\/em>\u6bad\u5c4d\u7db2\u8def\u300d<\/a>\u96fb\u8166\uff0c<span style=\"color: #4a4a4a;\">BrickerBot \u662f\u6240\u8b02\u300cphlashing\u300d(\u7db2\u8def\u5237\u6a5f) \u653b\u64ca\u7684\u771f\u5be6\u6848\u4f8b\uff0c\u9019\u662f\u4e00\u7a2e\u6c38\u4e45\u963b\u65b7\u670d\u52d9\u653b\u64ca (\u7c21\u7a31 PDoS)\uff0c\u5229\u7528\u786c\u9ad4\u88dd\u7f6e\u7684\u5b89\u5168\u6f0f\u6d1e\uff0c\u76f4\u63a5\u7834\u58de\u88dd\u7f6e\u7684\u97cc\u9ad4\u3002<\/span><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-49410\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks.png\" alt=\"\" width=\"1184\" height=\"923\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks.png 1184w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks-300x234.png 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks-768x599.png 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks-1024x798.png 1024w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks-600x468.png 600w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2017\/05\/bricks-800x624.png 800w\" sizes=\"(max-width: 1184px) 100vw, 1184px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin: 15.6pt 0cm 15.6pt 0cm;\"><span style=\"color: #4a4a4a;\">BrickerBot \u548c Mirai \u53ca LuaBot (ELF_LUABOT) \u9019\u985e<\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/linux-security-a-closer-look-at-the-latest-linux-threats\"><span style=\"color: #cc0000;\">\u5c08\u9580\u653b\u64ca IoT \u88dd\u7f6e<\/span><\/a><span style=\"color: #4a4a4a;\">\u7684\u60e1\u610f\u7a0b\u5f0f\u4e00\u6a23\uff0c\u6703\u85c9\u7531\u88dd\u7f6e\u9810\u8a2d\u7684\u5e33\u865f\u5bc6\u78bc\u4f86\u767b\u5165\u88dd\u7f6e\u3002\u4e0d\u904e\uff0cBrickerBot \u537b\u4e0d\u50cf\u5176\u4ed6\u653b\u64ca IoT \u88dd\u7f6e\u7684\u75c5\u6bd2\u5c07\u611f\u67d3\u7684\u88dd\u7f6e\u8b8a\u6210<\/span>\u6bad\u5c4d\u4ee5<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=48158\"><span style=\"color: #cc0000;\">\u5efa\u7acb\u9f90\u5927\u7684\u6bad\u5c4d\u7db2\u8def\uff0c\u9032\u800c\u767c\u52d5\u5206\u6563\u5f0f\u963b\u65b7\u670d\u52d9 (DDos) \u653b\u64ca<\/span><\/a><span style=\"color: #4a4a4a;\">\u3002BrickerBot \u6703\u5728\u611f\u67d3\u88dd\u7f6e\u4e0a\u57f7\u884c\u4e00\u9023\u4e32\u7684 Linux \u6307\u4ee4\uff0c\u5c0e\u81f4\u611f\u67d3\u88dd\u7f6e\u6c38\u4e45\u640d\u58de\u3002\u5176\u4e2d\u67d0\u4e9b\u6307\u4ee4\u6703\u6bc0\u640d\u6216\u60e1\u610f\u4fee\u6539\u88dd\u7f6e\u5132\u5b58\u5bb9\u91cf\u8a2d\u5b9a\u53ca\u6838\u5fc3\u53c3\u6578\u3001\u963b\u7919\u7db2\u969b\u7db2\u8def\u9023\u7dda\u3001\u5f71\u97ff\u88dd\u7f6e\u6548\u80fd\uff0c\u4ee5\u53ca\u6e05\u9664\u88dd\u7f6e\u4e0a\u6240\u6709\u6a94\u6848\u3002<\/span><\/p>\n<p><strong>[<\/strong><strong>\u5ef6\u4f38\u95b1\u8b80\uff1a<\/strong><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=40152\">\u5982\u4f55\u8b93\u5bb6\u7528\u8def\u7531\u5668\u4e0d\u8b8a\u6210\u6bad\u5c4d\u6a5f\u5668,\u63a5\u6536\u6307\u4ee4\u9032\u884c\u7db2\u8def\u72af\u7f6a?<\/a><strong>]<\/strong><\/p>\n<p style=\"margin: 15.6pt 0cm 15.6pt 0cm;\"><span style=\"color: #4a4a4a;\">\u76ee\u524d\u5df2\u77e5 BrickerBot \u6709\u5169\u7a2e\u7248\u672c:<\/span><\/p>\n<p style=\"margin: 15.6pt 0cm 15.6pt 0cm;\"><span style=\"color: #4a4a4a;\">BrickerBot.1 \u7248\u672c\u5c08\u9580\u653b\u64ca\u4f7f\u7528 BusyBox \u8edf\u9ad4\u7684 IoT \u88dd\u7f6e (\u9019\u662f\u4e00\u5957\u985e\u4f3c Unix \u5de5\u5177\u5305\u7684\u8edf\u9ad4\uff0c\u9069\u7528 Linux \u548c Android \u7cfb\u7d71)\uff0c\u88dd\u7f6e\u82e5\u958b\u653e\u4e86 Telnet \u6216 Secure Shell (SSH) \u9023\u7dda\u5c31\u53ef\u80fd\u906d\u5230\u653b\u64ca\uff0c\u5f8c\u8005\u4e4b\u6240\u4ee5\u906d\u5230\u653b\u64ca\u662f\u56e0\u70ba\u63a1\u7528\u4e86\u820a\u7248\u7684 SSH \u4f3a\u670d\u5668\u3002\u4e00\u4e9b\u4ecd\u5728\u4f7f\u7528\u820a\u7248\u97cc\u9ad4\u7684\u7db2\u8def\u88dd\u7f6e\u6700\u53ef\u80fd\u906d\u5230\u6b64\u7248\u672c\u7684\u653b\u64ca\u3002<\/span><\/p>\n<p style=\"margin: 15.6pt 0cm 15.6pt 0cm;\"><span style=\"color: #4a4a4a;\">BrickerBot.2 \u7248\u672c\u5c08\u9580\u653b\u64ca\u958b\u653e Telnet \u670d\u52d9\u4e26\u4f7f\u7528\u9810\u8a2d (\u6216\u5beb\u6b7b) \u5e33\u865f\u5bc6\u78bc\u7684 Linux \u88dd\u7f6e\u3002\u7b2c\u4e8c\u500b\u7248\u672c\u6703\u5229\u7528 TOR \u51fa\u53e3\u7bc0\u9ede (exit node) \u4f86\u96b1\u85cf\u5176\u884c\u8e64\u3002<\/span><\/p>\n<p style=\"margin: 15.6pt 0cm 15.6pt 0cm;\"><span style=\"color: #4a4a4a;\">\u6839\u64da\u8da8\u52e2\u79d1\u6280\u5c0d BrickerBot \u7684\u9577\u671f\u89c0\u5bdf\uff0c\u8a72\u7a0b\u5f0f\u9084\u6703\u5229\u7528\u8def\u7531\u5668\u4e2d\u7684\u9060\u7aef\u7a0b\u5f0f\u78bc\u57f7\u884c\u6f0f\u6d1e\u3002\u800c\u521d\u6b65\u5206\u6790\u4e5f\u8b49\u5be6 BrickerBot \u7684\u78ba\u6703\u4f7f\u7528\u9810\u8a2d\u7684\u5e33\u865f\/\u5bc6\u78bc\u7d44\u5408 (\u5982\uff1a\u300croot\/root\u300d\u548c\u300croot\/vizxv\u300d) \u4f86\u8a66\u5716\u767b\u5165\u88dd\u7f6e\uff0c\u6b64\u5916\u9084\u6703\u96a8\u6a5f\u5beb\u5165\u88dd\u7f6e\u7684\u5132\u5b58\u88dd\u7f6e\u3002<\/span><\/p>\n<p><strong>[\u5ef6\u4f38\u95b1\u8b80\uff1a<\/strong><strong>\u00a0<\/strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/securing-routers-against-mirai-home-network-attacks\"><strong>\u5982\u4f55\u4fdd\u8b77\u8def\u7531\u5668\u4ee5\u9632\u7bc4\u5bb6\u7528\u7db2\u8def\u653b\u64ca<\/strong><\/a><strong>]<\/strong><\/p>\n<p style=\"margin: 15.6pt 0cm 15.6pt 0cm;\"><span style=\"color: #4a4a4a;\">\u53bb\u5e74\uff0c\u7531\u65bc Mirai \u6bad\u5c4d\u75c5\u6bd2\u7684\u51fa\u73fe\uff0c\u4ee5\u53ca\u5b83\u5c0d\u4f01\u696d\u548c\u500b\u4eba\u6240\u9020\u6210\u7684<\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/a-rundown-of-the-biggest-cybersecurity-incidents-of-2016\"><span style=\"color: #cc0000;\">\u56b4\u91cd\u707d\u60c5<\/span><\/a><span style=\"color: #4a4a4a;\">\uff0c<span class=\"apple-converted-space\">\u00a0<\/span><\/span><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=32628\"><span style=\"color: #cc0000;\">IoT \u88dd\u7f6e\u5b89\u5168<\/span><\/a><span style=\"color: #4a4a4a;\">\u6210\u4e86\u6700\u8feb\u5207\u7684\u8b70\u984c\u3002\u6b64\u6b21 BrickerBot \u7684\u73fe\u8eab\uff0c\u53cd\u6620\u51fa <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2017\"><span style=\"color: #cc0000;\">IoT \u88dd\u7f6e\u5728\u7db2\u8def\u653b\u64ca\u7576\u4e2d\u6b63\u9010\u6f38\u626e\u6f14\u91cd\u8981\u89d2\u8272<\/span><\/a><span style=\"color: #4a4a4a;\">\uff0c\u56e0\u70ba\u67d0\u4e9b\u7522\u696d\u7684\u4f01\u696d\u5df2\u958b\u59cb\u6162\u6162\u5c0e\u5165\u9019\u4e9b\u88dd\u7f6e\uff0c\u4f8b\u5982\uff1a\u88fd\u9020\u696d\u548c\u80fd\u6e90\u7522\u696d\u3002\u5c31\u9023\u50cf\u4e00\u822c\u5bb6\u7528\u8def\u7531\u5668\u9019\u6a23\u5e73\u51e1\u7684\u88dd\u7f6e\uff0c\u4e00\u65e6\u88ab\u8b8a\u6210\u6bad\u5c4d\uff0c\u5c31\u6703\u5b8c\u5168\u807d\u5f9e\u99ed\u5ba2\u7684\u6307\u793a\u653b\u64ca\u4f01\u696d\u3001\u7aca\u53d6\u4f01\u696d\u8cc7\u7522\uff0c\u6216\u7aca\u53d6\u611f\u67d3\u88dd\u7f6e\u4e0a\u7684\u8cc7\u6599\u3002<\/span><\/p>\n<p><!--more--><\/p>\n<h3>\u5982\u4f55\u9632\u7bc4 BrickerBot<\/h3>\n<p>\u6709\u9451\u65bc BrickerBot \u7684\u7834\u58de\u6027\uff0c\u7f8e\u570b\u5de5\u696d\u63a7\u5236\u7cfb\u7d71\u7db2\u8def\u7dca\u6025\u61c9\u8b8a\u5c0f\u7d44 (Industrial Control Systems Cyber Emergency Response Team\uff0c\u7c21\u7a31 ICS-CERT) \u7279\u5225\u91dd\u5c0d\u5de5\u696d\u63a7\u5236\u7cfb\u7d71\u5ee0\u5546\u3001\u6301\u6709\u8005\u8207\u64cd\u4f5c\u8005\u767c\u8868\u4e86\u4e00\u4efd<a href=\"https:\/\/ics-cert.us-cert.gov\/alerts\/ICS-ALERT-17-102-01A\">\u8cc7\u5b89\u516c\u544a<\/a>\u00a0\uff0c\u5efa\u8b70\u63a1\u53d6\u4ee5\u4e0b\u9632\u79a6\u63aa\u65bd\uff1a<\/p>\n<ul>\n<li>\u76e1\u53ef\u80fd\u907f\u514d\u6240\u6709\u5de5\u696d\u63a7\u5236\u7cfb\u7d71 (ICS) \u88dd\u7f6e\u9023\u4e0a\u5c0d\u5916\u7db2\u8def\/\u7db2\u969b\u7db2\u8def\u3002<\/li>\n<li>\u555f\u7528\u9632\u706b\u7246\u4e26\u4e14\u5c07 ICS \u88dd\u7f6e\u8207\u4f01\u696d\u7db2\u8def\u9694\u96e2\u3002<\/li>\n<li>\u7576\u5f9e\u9060\u7aef\u5b58\u53d6 ICS \u88dd\u7f6e\u6642\uff0c\u52d9\u5fc5\u900f\u904e<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/setting-up-a-virtual-private-network-vpn\">\u865b\u64ec\u79c1\u4eba\u7db2\u8def (VPN)<\/a>\u3002<\/li>\n<li>\u5b9a\u671f\u66f4\u65b0\/\u4fee\u88dc\u7cfb\u7d71\uff0c\u4e00\u6709\u66f4\u65b0\u4fbf\u7acb\u5373\u5957\u7528\u3002<\/li>\n<li>\u589e\u52a0\u984d\u5916\u7684\u9a57\u8b49\u6a5f\u5236\uff0c\u7279\u5225\u662f\u91dd\u5c0d\u7cfb\u7d71\u7ba1\u7406\u54e1\u5e33\u865f\u3002<\/li>\n<\/ul>\n<p>\u9632\u7bc4 BrickerBot \u6700\u6709\u6548\u7684\u65b9\u6cd5\u5c31\u662f\u8b8a\u66f4\u4e26\u5f37\u5316\u88dd\u7f6e\u9810\u8a2d\u7684\u5e33\u865f\u5bc6\u78bc\uff0c\u6e1b\u5c11\u88dd\u7f6e\u906d\u5230\u4e0d\u7576\u5b58\u53d6\u7684\u6a5f\u6703\u3002\u6b64\u5916\u4e5f\u61c9\u8003\u616e\u505c\u7528\u9060\u7aef\u7ba1\u7406\u529f\u80fd\uff0c\u4f8b\u5982\u50cf BrickerBot \u6703\u4f7f\u7528\u7684 Telnet\u3002<\/p>\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u4f01\u696d\u548c\u4e00\u822c\u4f7f\u7528\u8005\u4e5f\u61c9\u96a8\u6642\u4fdd\u6301 IoT \u88dd\u7f6e\u97cc\u9ad4\u66f4\u65b0\uff0c\u4ee5\u4fee\u88dc\u99ed\u5ba2\u53ef\u80fd\u5165\u4fb5\u7684\u6f0f\u6d1e\uff0c\u907f\u514d BrickerBot \u5c07\u88dd\u7f6e\u8b8a\u6210\u78da\u584a\u3002\u540c\u6642\uff0c\u82e5\u80fd\u5728\u7db2\u8def\u9598\u9053\u90e8\u7f72\u5165\u4fb5\u9632\u8b77\u7cfb\u7d71\uff0c\u4e5f\u53ef\u63d0\u4f9b\u4e00\u5c64\u984d\u5916\u7684\u5b89\u5168\u4fdd\u8b77\uff0c\u5728\u9598\u9053\u7aef\u5075\u6e2c\u4e26\u6514\u622a\u99ed\u5ba2\u5165\u4fb5\u3002IT \u7cfb\u7d71\u7ba1\u7406\u54e1\u8207\u8cc7\u5b89\u4eba\u54e1\u66f4\u61c9\u4e3b\u52d5\u767c\u6398\u4f01\u696d\u7db2\u8def\u5167\u7684\u53ef\u7591\u6216\u60e1\u610f\u6d3b\u52d5\u3002<\/p>\n<p>\u4e0d\u5e78\u7684\u662f\uff0c\u6709\u8a31\u591a IoT \u88dd\u7f6e\u5167\u5efa\u4e86\u56fa\u5b9a\u6216\u5beb\u6b7b\u7684\u5e33\u865f\u5bc6\u78bc\u3001\u5de5\u5177\u53ca\u670d\u52d9\uff0c\u800c\u4e14\u7121\u6cd5\u505c\u7528\u3001\u66f4\u65b0\u6216\u4fee\u88dc\u3002\u7684\u78ba\uff0cBrickerBot \u5c0d\u4f01\u696d\u548c\u5bb6\u5ead\u4f7f\u7528\u8005\u4e0d\u50c5\u662f\u4e00\u8a18\u8b66\u9418\uff0c\u800c\u4e14\u4e5f\u9ede\u51fa\u4e86 IoT \u88dd\u7f6e\u88fd\u9020\u5ee0\u5546\u61c9\u8a72\u8ca0\u8d77\u6539\u5584\u88dd\u7f6e\u5b89\u5168\u7684\u8cac\u4efb\u3002<\/p>\n<h3><strong>\u8da8\u52e2\u79d1\u6280\u89e3\u6c7a\u65b9\u6848\uff1a<\/strong><\/h3>\n<p><a href=\"https:\/\/t.rend.tw\/?i=Mzc4MQ\">\u8da8\u52e2\u79d1\u6280Deep Security<\/a>\u00a0\u80fd\u9632\u6b62\u7aef\u9ede\u88dd\u7f6e\u906d\u5230\u6f0f\u6d1e\u653b\u64ca\u7684\u5a01\u8105\u3002<a href=\"https:\/\/www.trendmicro.tw\/tw\/enterprise\/security-risk-management\/deep-discovery\/\">Deep Discovery<\/a>\u80fd\u5920\u5075\u6e2c\u3001\u6df1\u5165\u5206\u6790\u4e26\u4e3b\u52d5\u56de\u61c9\u6f0f\u6d1e\u653b\u64ca\u4ee5\u53ca\u5176\u4ed6\u985e\u4f3c\u5a01\u8105\uff0c\u5229\u7528\u7279\u6b8a\u7684\u5f15\u64ce\u3001\u5ba2\u88fd\u5316\u00a0<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/deploying-a-smart-sandbox-for-unknown-threats-and-zero-day-attacks\/\">\u6c99\u76d2\u6a21\u64ec\u5206\u6790<\/a>\u4ee5\u53ca\u5bc6\u5207\u7684\u4ea4\u53c9\u95dc\u806f\u5206\u6790\uff0c\u5b8c\u6574\u6db5\u84cb\u7db2\u8def\u653b\u64ca\u7684\u6240\u6709\u968e\u6bb5\uff0c\u751a\u81f3\u4e0d\u9808\u66f4\u65b0\u5f15\u64ce\u6216\u75c5\u6bd2\u78bc\u5c31\u80fd\u5075\u6e2c\u9019\u985e\u653b\u64ca\u3002<\/p>\n<p>TippingPoint \u7684\u00a0<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/integrated-atp.html\">\u6574\u5408\u5f0f\u9032\u968e\u5a01\u8105\u9632\u8b77<\/a>\u00a0\u80fd\u63d0\u4f9b\u4e00\u4e9b\u53ef\u63a1\u53d6\u884c\u52d5\u7684\u8cc7\u5b89\u60c5\u5831\u4f86\u9632\u5835\u6f0f\u6d1e\u8207\u6f0f\u6d1e\u653b\u64ca\uff0c\u4e26\u9632\u7bc4\u5df2\u77e5\u53ca\u96f6\u6642\u5dee\u653b\u64ca\u3002TippingPoint \u4ee5 <a href=\"https:\/\/t.rend.tw\/?i=NTAyMA\">XGen<\/a>\u9632\u8b77\u70ba\u5f8c\u76fe\u7684 <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/integrated-atp\/advanced-threat-protection.html\">Advanced Threat Protection<\/a> \u8207 <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/integrated-atp\/next-gen-intrusion-prevention-system.html\">Intrusion Prevention System<\/a> \u7d50\u5408\u4e86\u6df1\u5c64\u5c01\u5305\u6aa2\u67e5\u3001\u5a01\u8105\u4fe1\u8b7d\u8a55\u7b49\u3001\u9032\u968e\u60e1\u610f\u7a0b\u5f0f\u5206\u6790\u7b49\u6280\u8853\u4f86\u6514\u622a\u653b\u64ca\u8207\u9032\u968e\u5a01\u8105\u3002<\/p>\n<p>TippingPoint \u5ba2\u6236\u53ef\u5229\u7528\u4e0b\u5217 ThreatDV \u904e\u6ffe\u689d\u4ef6\u4f86\u9632\u7bc4\u9019\u9805\u5a01\u8105\uff1a<\/p>\n<ul>\n<li>27944: HTTP: ELF_MIRAI.A (BrickerBot) Checkin<\/li>\n<\/ul>\n<p>Deep Discovery Inspector \u5ba2\u6236\u53ef\u900f\u904e\u4ee5\u4e0b DDI \u898f\u5247\u4f86\u9632\u7bc4\u9019\u9805\u5a01\u8105\uff1a<\/p>\n<ul>\n<li>DDI Rule 3285: MIRAI \u2013 HTTP (Request)<\/li>\n<\/ul>\n<p>\u8da8\u52e2\u79d1\u6280\u7684 Smart Home Network Security \u667a\u6167\u5bb6\u5ead\u7db2\u8def\u9632\u8b77\u53ef\u5229\u7528\u4ee5\u4e0b\u5075\u6e2c\u898f\u5247\u4f86\u9632\u7bc4 BrickerBot\uff0c\u4fdd\u8b77\u6d88\u8cbb\u8005\uff1a<\/p>\n<ul>\n<li>1133255: WEB Remote Command Execution in XML -1<\/li>\n<li>1133121: TELNET Default Password Login -14<\/li>\n<li>1133598: MALWARE Suspicious IoT Worm TELNET Activity -3<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>\uff20\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/brickerbot-malware-permanently-bricks-iot-devices\">BrickerBot Malware Emerges, Permanently Bricks IoT Devices<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4e00\u7a2e\u91dd\u5c0d\u7269\u806f\u7db2\uff08IoT ,Internet of Thing\uff09\u8a2d\u5099\u7684\u65b0\u60e1\u610f\u8edf\u9ad4 BrickerBot \u8fd1\u65e5\u767b\u4e0a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1723,1335],"tags":[1599,3182,3183,3184,1593,3187],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/49354"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=49354"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/49354\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=49354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=49354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=49354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}