{"id":55069,"date":"2018-04-17T09:00:45","date_gmt":"2018-04-17T01:00:45","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=55069"},"modified":"2018-04-17T15:48:54","modified_gmt":"2018-04-17T07:48:54","slug":"%e6%a9%9f%e5%99%a8%e5%ad%b8%e7%bf%92%e5%a6%82%e4%bd%95%e5%81%b5%e6%b8%ac%e8%99%9b%e6%93%ac%e8%b2%a8%e5%b9%a3%e6%8c%96%e7%a4%a6%e7%97%85%e6%af%92","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=55069","title":{"rendered":"\u6a5f\u5668\u5b78\u7fd2\u5982\u4f55\u5075\u6e2c\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2?"},"content":{"rendered":"<p>\u96a8\u8457<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=50965\">\u865b\u64ec\u8ca8\u5e63<\/a>\u60e1\u610f\u6316\u7926\u6d3b\u52d5\u7684\u6025\u901f\u767c\u5c55\uff0c\u80fd\u5920\u8070\u660e\u4e14\u6301\u7e8c\u6709\u6548\u5075\u6e2c\u9019\u985e\u5a01\u8105\u7684\u65b9\u6cd5\u4e5f\u6210\u70ba\u7db2\u8def\u5b89\u5168\u9632\u8b77\u7684\u5fc5\u5099\u529f\u80fd\u3002<a href=\"https:\/\/github.com\/trendmicro\/tlsh\/\">\u900f\u904e\u8da8\u52e2\u79d1\u6280\u7684TLSH<\/a>\uff08Trend Micro Locality Sensitive Hashing\uff0c\u7528\u4f86\u8b58\u5225\u76f8\u4f3c\u6a94\u6848\u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/machine-learning\">\u6a5f\u5668\u5b78\u7fd2<\/a>\u96dc\u6e4a\u6f14\u7b97\u6cd5\uff09\uff0c\u53ef\u4ee5\u5c07\u6536\u96c6\u5230\u7684\u76f8\u4f3c\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u6a23\u672c\u96c6\u7fa4\uff08cluster\uff09\u8d77\u4f86\u3002\u5c07\u6a23\u672c\u4f9d\u7167\u884c\u70ba\u548c\u6a94\u6848\u985e\u578b\u9032\u884c\u5206\u7d44\uff0c\u5c31\u80fd\u5920\u5075\u6e2c\u76f8\u4f3c\u6216\u4fee\u6539\u904e\u7684\u60e1\u610f\u8edf\u9ad4\u3002<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-54760\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1.jpg\" alt=\"\" width=\"1390\" height=\"925\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1.jpg 1390w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1-300x200.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1-768x511.jpg 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1-1024x681.jpg 1024w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1-600x399.jpg 600w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1-30x20.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/03\/bitcoin-mining1-800x532.jpg 800w\" sizes=\"(max-width: 1390px) 100vw, 1390px\" \/><\/a><\/p>\n<p>TLSH\u53ef\u4ee5\u5e6b\u52a9\u6211\u5011\u5c07\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u96c6\u7fa4\u8d77\u4f86\u3002\u505a\u6cd5\u662f\u8a08\u7b97\u6a94\u6848\u8207\u6a94\u6848\u9593\u6578\u5b78\u610f\u7fa9\u4e0a\u7684\u201c\u8ddd\u96e2\u5206\u6578\u201d\uff0c\u7528\u4f86\u5206\u6790\u548c\u5075\u6e2c\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u96c6\u7fa4\u3002\u6211\u5011\u7684\u6f14\u7b97\u6cd5\u6703\u7522\u751f\u67d0\u4e00\u7d44\u60e1\u610f\u8edf\u9ad4\u90fd\u63a5\u8fd1\u7684\u6316\u7926\u75c5\u6bd2\u4e2d\u5fc3TLSH\u3002<\/p>\n<p>\u96c6\u7fa4\u60e1\u610f\u8edf\u9ad4\u6a23\u672c\u53ef\u4ee5\u8b93\u5b89\u5168\u7814\u7a76\u4eba\u54e1\u5efa\u7acb\u4e00\u5c0d\u591a\u7684\u7279\u5fb5\u78bc\uff0c\u7528\u4f86\u4e3b\u52d5\u8b58\u5225\u66f4\u591a\u76f8\u4f3c\u6a94\u6848\u3002\u9019\u662f\u56e0\u70ba\u81ea\u52d5\u5316\u7cfb\u7d71\uff08\u6216\u662f\u9006\u5411\u5de5\u7a0b\u5e2b\uff09\u53ef\u4ee5\u6aa2\u67e5\u60e1\u610f\u8edf\u9ad4\u7fa4\u7d44\u6210\u54e1\u4e26\u8b58\u5225\u6210\u54e1\u9593\u7684\u76f8\u4f3c\u6027\u3002\u7576\u6211\u5011\u7684\u7cfb\u7d71\u5728\u6aa2\u67e5\u65b0\u6a94\u6848\u6642\uff0c\u6703\u53bb\u6aa2\u8996\u662f\u5426\u5177\u5099\u60e1\u610f\u8edf\u9ad4\u7fa4\u7d44\u5448\u73fe\u7684\u5143\u7d20\uff0c\u4e26\u78ba\u8a8d\u65b0\u6a94\u6848\u662f\u5426\u5c6c\u65bc\u60e1\u610f\u8edf\u9ad4\u7fa4\u7d44\u7684\u7bc4\u570d\u3002<\/p>\n<p>\u9664\u6b64\u4e4b\u5916\uff0cTLSH\u9084\u53ef\u4ee5\u5c07\u5927\u91cf\u53ef\u80fd\u60e1\u610f\u6216\u672a\u77e5\u6a94\u6848\u5c0d\u5df2\u77e5\u5a01\u8105\u9032\u884c\u5373\u6642\u4e14\u53ef\u64f4\u5145\u7684\u641c\u5c0b\u548c\u4ea4\u53c9\u6bd4\u5c0d\u3002<!--more--><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2018\/03\/crypto-ml-1.png\" \/><\/p>\n<p><em>\u88681<\/em><em>\u3001\u4e00\u500b\u6709123<\/em><em>\u6210\u54e1\u7684\u96c6\u7fa4\u51675<\/em><em>\u500b\u6a23\u672c\u7684TLSH<\/em><em>\u503c\u8207\u4e2d\u5fc3TLSH<\/em><em>\u503c\u9032\u884c\u6bd4\u8f03\uff0c\u6709\u5f88\u63a5\u8fd1\u7684\u8ddd\u96e2\u5206\u6578<\/em><\/p>\n<p><em>\u6ce8\u610f\uff1a\u6211\u5011\u6aa2\u67e5\u4e26\u6bd4\u8f03\u6240\u6536\u96c6\u6a94\u6848\u7684\u76f8\u4f3c\u5ea6\u5f8c\u78ba\u5b9a\u4e86\u4e2d\u5fc3TLSH<\/em><em>\u503c\u3002\u8da8\u52e2\u79d1\u6280\u4e3b\u52d5\u5075\u6e2c\u70baCoinminer_TOOLXMR.SM2-WIN32<\/em><em>\u3002<\/em><\/p>\n<p>\u6211\u5011\u5df2\u7d93\u5c07TLSH\u61c9\u7528\u4f86\u5075\u6e2c\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u7684\u76f8\u4f3c\u5ea6\u3002\u672c\u6587\u4e2d\u6240\u8a0e\u8ad6\u7684\u5a01\u8105\u53ef\u4ee5\u88ab\u8da8\u52e2\u79d1\u6280\u7684\u9810\u6e2c\u6027\u6a5f\u5668\u5b78\u7fd2\u4ee5\u53ca\u5373\u6642\u6383\u63cf\u6240\u7528\u75c5\u6bd2\u7279\u5fb5\u78bc\u5075\u6e2c\u70baCoinminer_XMRMINE.SM\u3001Coinminer_TOOLXMR.SM2-WIN32\u548cCoinminer_MALXMR.SMN1-WIN32\u3002<\/p>\n<p>\u5f9e\u6536\u96c6\u5230\u7684\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u4e2d\uff0c\u6211\u5011\u767c\u73fe\u5927\u90e8\u5206\u90fd\u662f\u5728\u91dd\u5c0d\u9580\u7f85\u5e63\uff0c\u4f7f\u7528\u7684\u6316\u7926\u6f14\u7b97\u6cd5\u662fCryptoNight\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>\u60e1\u610f\u8edf\u9ad4\u79fb\u52d5\u5230\u9580\u7f85\u5e63<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/bitcoin\">\u6bd4\u7279\u5e63<\/a>\u4e00\u76f4\u662f\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u7684\u9996\u9078\u76ee\u6a19\uff0c\u5176\u50f9\u503c\u4e5f\u7a81\u7136\u5730\u66b4\u6f32\uff0c\u751a\u81f3\u57282017\u5e74\u9054\u5230\u4e862\u842c\u7f8e\u5143\u3002\u4f46\u770b\u8d77\u4f86<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-2018-new-menace\/\">\u9580\u7f85\u5e63\u76ee\u524d\u6210\u70ba\u9996\u8981\u76ee\u6a19<\/a>\u3002\u96d6\u7136\u5b83\u7684\u50f9\u503c\uff08\u672c\u6587\u64b0\u5beb\u6642\u70ba224\u7f8e\u5143\uff09\u9060\u4f4e\u65bc\u6bd4\u7279\u5e63\uff08\u672c\u6587\u8f49\u5beb\u6642\u70ba9,000\u7f8e\u5143\uff09\uff0c\u4f46\u5b83\u80fd\u5920\u5728\u4e00\u822c\u500b\u4eba\u96fb\u8166\u548c\u7b46\u8a18\u578b\u96fb\u8166\u4e0a\u9032\u884c\u6316\u7926\u3002\u52a0\u4e0a\u4ea4\u6613\u7121\u6cd5\u8ffd\u8e2a\uff0c\u8b93\u60e1\u610f\u4efd\u5b50\u53ef\u4ee5\u5c07\u975e\u6cd5\u6316\u7926\u7684\u76ee\u6a19\u66f4\u52a0\u64f4\u5927\u3002<\/p>\n<p>\u6211\u5011\u9084\u5075\u6e2c\u5230\u60e1\u610f\u8edf\u9ad4\u4f7f\u7528\u4fee\u6539\u904e\u7684\u958b\u653e\u539f\u59cb\u78bcXMRig\u4f86\u6316\u6398\u9580\u7f85\u5e63\u6216\u5176\u4ed6\u4f7f\u7528CryptoNight\u7684\u865b\u64ec\u8ca8\u5e63\u3002<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2018\/03\/crypto-ml-2.png\" \/><\/p>\n<p><em>\u57161<\/em><em>\u3001\u4f86\u81ea\u96c6\u7fa4\u6a23\u672c\u7684\u4fee\u6539\u904eXMRig<\/em><em>\u547d\u4ee4\u5217\u6316\u7926\u5de5\u5177<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>\u6ce8\u610f\uff1a\u4fee\u6539\u904eXMRig<\/em><em>\u7684\u7248\u672c\u662f2.4.1<\/em><em>\uff0c\u800c\u5728\u672c\u6587\u64b0\u5beb\u6642\uff0cGithub<\/em><em>\u4e0a\u7684\u6700\u65b0\u53ef\u7528XMRig<\/em><em>\u7248\u672c\u662f2.4.5<\/em><em>\u3002<\/em><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2018\/03\/crypto-ml-3.png\" \/><\/p>\n<p><em>\u57162<\/em><em>\u3001\u4fee\u6539\u904eXMRig<\/em><em>\u547d\u4ee4\u5217\u6316\u7926\u5de5\u5177\u7684\u87a2\u5e55\u622a\u5716<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>\u6ce8\u610f\uff1a\u8da8\u52e2\u79d1\u6280\u7814\u7a76\u4eba\u54e1\u70ba\u4e86\u6e2c\u8a66\uff0c\u63d0\u4f9b\u4e86\u6e2c\u8a66\u7528\u6316\u7926\u8a2d\u5b9a\u6a94\uff08\u7926\u6c60\u5730\u5740\/<\/em><em>\u7aef\u53e3\u548c\u9580\u7f85\u5e63\u9322\u5305\u5730\u5740\uff09\u3002<\/em><\/p>\n<p>XMRig\u53d7\u99ed\u5ba2\u9752\u775e\u7684\u539f\u56e0\u4e4b\u4e00\u662f\u5176\u70ba\u958b\u653e\u539f\u59cb\u78bc\uff0c\u53ef\u4ee5\u8f15\u6613\u5730\u7528\u5728\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u653b\u64ca\u4e2d\u3002\u4e0d\u904e\u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c\u4e0d\u662f\u53ea\u6709\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u504f\u597d\u4f7f\u7528\u9019\u7a2e\u547d\u4ee4\u5217\u7684\u6316\u7926\u5de5\u5177\uff0c\u5408\u6cd5\u7684\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u611b\u597d\u8005\u4e5f\u6703\u4f7f\u7528\u5b83\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2<\/em><\/strong><\/p>\n<p>\u5728<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/security-101-the-impact-of-cryptocurrency-mining-malware\">\u77ed\u77ed\u5e7e\u5e74<\/a>\u9593\uff0c\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u5927\u91cf\u5730\u9752\u775e\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\uff0c\u5e0c\u671b\u4e0d\u6cd5\u53d6\u5f97\u865b\u64ec\u8ca8\u5e63\u7684\u50f9\u683c\u4e0a\u6f32\u800c\u7372\u5229\u3002\u85c9\u7531\u4f7f\u7528\u60e1\u610f\u8edf\u9ad4\uff0c\u4ed6\u5011\u6feb\u7528\u5225\u4eba\u7684\u96fb\u8166\u8cc7\u6e90\u4f86\u5077\u5077\u975e\u6cd5\u5730\u7372\u53d6\u6709\u50f9\u503c\u7684\u865b\u64ec\u8ca8\u5e63\u3002<\/p>\n<p>\u5728\u53bb\u5e74\uff0c\u6211\u5011\u770b\u5230\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u5438\u5f15\u4e86\u8a31\u591a\u6295\u5165\u3002\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u662f\u8da8\u52e2\u79d1\u6280Smart Home Network<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/a-look-into-the-most-noteworthy-home-network-security-threats-of-2017\">\u5075\u6e2c\u6700\u591a\u7684\u5bb6\u5ead\u7db2\u8def\u4e8b\u4ef6<\/a>\uff0c\u800cSmart Protection Network\u4e5f\u5075\u6e2c\u5230<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-2018-new-menace\/\">\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u51fa\u73fe\u5c16\u5cf0<\/a>\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2018\/02\/cryptocurrency-mining-malware-2.png\" alt=\"\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u662f\u8da8\u52e2\u79d1\u6280Smart Home Network\u5075\u6e2c\u6700\u591a\u7684\u5bb6\u5ead\u7db2\u8def\u4e8b\u4ef6\uff0c\u800cSmart Protection Network\u4e5f\u5075\u6e2c\u5230\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u51fa\u73fe\u5c16\u5cf0\" width=\"931\" height=\"502\" \/><\/p>\n<p>\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u5c0d\u53d7\u5bb3\u8005\u7684\u96fb\u8166\u6709\u4e0d\u826f\u5f71\u97ff\u3002\u6316\u7926\u52d5\u4f5c\u6703<a href=\"https:\/\/www.theguardian.com\/technology\/2018\/jan\/17\/bitcoin-electricity-usage-huge-climate-cryptocurrency\">\u4f7f\u7528\u5927\u91cf\u96fb\u529b<\/a>\u4e26\u8017\u7528\u904b\u7b97\u80fd\u529b\uff08\u60e1\u610f\u8edf\u9ad4\u4e5f\u662f\uff09 \u2013 \u751a\u81f3\u6703<a href=\"https:\/\/www.zdnet.com\/article\/this-crypto-mining-android-malware-is-so-demanding-it-burst-a-smartphone\/\">\u8b93\u667a\u6167\u624b\u6a5f\u96fb\u6c60\u904e\u71b1<\/a>\u9032\u800c\u7206\u958b\u3002\u9019\u4e5f\u8b93\u6211\u5011\u898b\u8b58\u5230\u99ed\u5ba2\u5011\u5982\u4f55\u5730\u9858\u610f\u63a2\u7d22\u65b0\u624b\u6bb5\u4f86\u9032\u884c\u6539\u8b8a\u4ee5\u8cfa\u53d6\u6536\u76ca\u3002<\/p>\n<p>\u96a8\u8457\u865b\u64ec\u8ca8\u5e63\u975e\u6cd5\u6316\u7926\u6d3b\u52d5\u7684\u6301\u7e8c\u589e\u52a0\u4ee5\u53ca\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u591a\u6a23\u5316\u7684\u653b\u64ca\u624b\u6bb5\uff0c\u53ef\u4ee5\u770b\u51fa\u5efa\u7acb\u89e3\u6c7a\u65b9\u6848\u4f86\u9632\u8b77\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u7684\u5404\u7a2e\u8b8a\u5316\u4e5f\u5c31\u66f4\u52a0\u91cd\u8981\u4e86\u3002<\/p>\n<p>\u8da8\u52e2\u79d1\u6280\u7684<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/all-solutions.html\">XGen\u5b89\u5168\u9632\u8b77<\/a>\u63d0\u4f9b\u8de8\u4e16\u4ee3\u6df7\u5408\u7684\u9632\u79a6\u6280\u8853\u4f86\u4fdd\u8b77\u7cfb\u7d71\u514d\u65bc\u865b\u64ec\u8ca8\u5e63\u6316\u7926\u75c5\u6bd2\u4fb5\u5bb3\u3002\u5b83\u5177\u5099\u9ad8\u4fdd\u771f\u6a5f\u5668\u5b78\u7fd2\u529f\u80fd\uff0c\u53ef\u4ee5\u4f7f\u7528TLSH\u4f86\u9632\u8b77<a href=\"https:\/\/www.trendmicro.com\/us\/business\/complete-user-protection\/index.html\">\u9598\u9053<\/a>\u548c<a href=\"https:\/\/www.trendmicro.com\/us\/enterprise\/product-security\/vulnerability-protection\/\">\u7aef\u9ede<\/a>\uff0c\u4e26\u4fdd\u8b77\u5be6\u9ad4\u3001\u865b\u64ec\u548c\u96f2\u7aef\u7684\u5de5\u4f5c\u6a5f\u3002\u5177\u5099\u7db2\u7ad9\/\u7db2\u5740\u904e\u6ffe\u3001\u884c\u70ba\u5206\u6790\u4ee5\u53ca\u5ba2\u88fd\u5316\u6c99\u7bb1\u7b49\u529f\u80fd\uff0c\u8b93XGen\u53ef\u4ee5\u62b5\u79a6\u4eca\u65e5\u80fd\u5920\u7e5e\u904e\u50b3\u7d71\u63a7\u5236\uff0c\u653b\u64ca\u5df2\u77e5\u3001\u672a\u77e5\u6216\u672a\u516c\u958b\u6f0f\u6d1e\uff0c\u7aca\u53d6\u6216\u52a0\u5bc6\u500b\u4eba\u8eab\u4efd\u8b58\u5225\u8cc7\u6599\u6216\u57f7\u884c\u865b\u64ec\u8ca8\u5e63\u60e1\u610f\u6316\u7926\u7684\u5404\u7a2e\u5a01\u8105\u3002\u667a\u6167\u5316\u3001\u6700\u4f73\u5316\u548c\u4e92\u76f8\u9023\u7d50\uff0cXGen\u9a45\u52d5\u8457\u8da8\u52e2\u79d1\u6280\u7684\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\uff1a<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/deep-security-for-cloud.html\">Hybrid Cloud Security<\/a>\uff0c<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection.html\">User Protection<\/a>\u548c<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network.html\">Network Defense<\/a>\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cluster-of-coins-how-machine-learning-detects-cryptocurrency-mining-malware\/?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29\">Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware<\/a> \u4f5c\u8005\uff1a Jon Oliver\u548cMenard Ose\u00f1a<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u96a8\u8457\u865b\u64ec\u8ca8\u5e63\u60e1\u610f\u6316\u7926\u6d3b\u52d5\u7684\u6025\u901f\u767c\u5c55\uff0c\u80fd\u5920\u8070\u660e\u4e14\u6301\u7e8c\u6709\u6548\u5075\u6e2c\u9019\u985e\u5a01\u8105\u7684\u65b9\u6cd5\u4e5f\u6210\u70ba\u7db2\u8def\u5b89\u5168\u9632\u8b77\u7684\u5fc5\u5099\u529f\u80fd\u3002\u900f\u904e\u8da8\u52e2 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[3373,3603,3647,3455,3024],"tags":[3575,2961,3723],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/55069"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=55069"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/55069\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=55069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=55069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=55069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}