{"id":62316,"date":"2019-10-23T09:00:17","date_gmt":"2019-10-23T01:00:17","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=62316"},"modified":"2022-05-30T18:12:27","modified_gmt":"2022-05-30T10:12:27","slug":"%e5%8d%b3%e4%bd%bf%e6%bc%8f%e6%b4%9e%e4%bf%ae%e8%a3%9c%e4%ba%86%e5%85%a9%e5%b9%b4-wannacry-%e5%81%b5%e6%b8%ac%e9%87%8f%e4%bb%8d%e6%98%af-%e4%bd%bf%e7%94%a8eternalblue-%e6%bc%8f%e6%b4%9e%e6%94%bb","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=62316","title":{"rendered":"\u5373\u4f7f\u6f0f\u6d1e\u4fee\u88dc\u4e86\u5169\u5e74, WannaCry \u4ecd\u662f\u4f7f\u7528EternalBlue \u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5\u4e2d,\u5075\u6e2c\u5230\u6700\u591a\u7684\u52d2\u7d22\u75c5\u6bd2"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u5373\u4f7f\u5728 <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.trendmicro.com.tw\/?p=54909\" target=\"_blank\">EternalBlue(\u6c38\u6046\u4e4b\u85cd)<\/a>\u6f0f\u6d1e\u5df2\u7d93\u4fee\u88dc\u4e86\u5169\u5e74\u591a\u5f8c\uff0cEternalBlue \u4ecd\u820a\u975e\u5e38\u6d3b\u8e8d\u3002\u5373\u4f7f\u5230\u4e86 2019 \u5e74\uff0cWannaCry \u9084\u662f\u6240\u6709\u4f7f\u7528 EternalBlue \u653b\u64ca\u624b\u6cd5\u7684\u60e1\u610f\u7a0b\u5f0f\u7576\u4e2d\u5075\u6e2c\u6578\u91cf\u6700\u591a\u7684\u3002\u5b83\u7684\u5075\u6e2c\u6578\u91cf\u5e7e\u4e4e\u662f\u6240\u6709\u5176\u4ed6\u52d2\u7d22\u75c5\u6bd2\u6578\u91cf\u52a0\u7e3d\u7684\u56db\u500d\u3002<\/p><\/blockquote>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/20190829010113539-828-9xukbfo-800.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"> \u52d2\u7d22\u75c5\u6bd2\u548c\u6316\u7926\u7a0b\u5f0f\u7684\u6700\u611b:  EternalBlue <\/h3>\n\n\n\n<p>2017 \u5e74\uff0c\u5168\u7403\u6709\u53f2\u4ee5\u4f86\u6700\u56b4\u91cd\u7684\n<a href=\"https:\/\/blog.trendmicro.com.tw\/?cat=3220\">WannaCry(\u60f3\u54ed)\u52d2\u7d22\u75c5\u6bd2<\/a>\u52d2\u7d22\u75c5\u6bd2\u7206\u767c\u4e8b\u4ef6\uff0c\u5176\u80cc\u5f8c\u7684\u52d5\u529b\u5c31\u662f\n<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=54909\" target=\"_blank\" rel=\"noreferrer noopener\">EternalBlue(\u6c38\u6046\u4e4b\u85cd)<\/a> \u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5\u3002\u76f4\u5230\u4eca\u5929\uff0c\u5118\u7ba1\u8a72\u624b\u6cd5\u6240\u5229\u7528\u7684\u6f0f\u6d1e\u65e9\u5df2\u4fee\u6b63\uff0c\u9084\u662f\u6709\u5f88\u591a\u60e1\u610f\u7a0b\u5f0f (\u5f9e<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=12412\">\u52d2\u7d22\u75c5\u6bd2HYPERLINK &#8220;https:\/\/blog.trendmicro.com.tw\/?p=12412&#8221; Ransomware<\/a>\u5230\u5e38\u898b\u7684<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=50965\">\u865b\u64ec\u8ca8\u5e63<\/a>\u8ca8\u5e63\u6316\u7926\u7a0b\u5f0f)\n\u9084\u5728\u5229\u7528\u9019\u9805\u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5\u3002<\/p>\n\n\n\n<p>\u300cWannaCry\u300d\u5c0d\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\u3001\u4f01\u696d\u3001\u751a\u81f3\u662f\u4e00\u822c\u7db2\u8def\u4f7f\u7528\u8005\u90fd\u662f\u4e00\u500b\u8033\u719f\u80fd\u8a73\u7684\u540d\u5b57\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-recap-the-week-of-wannacry\" target=\"_blank\" rel=\"noreferrer noopener\">2017\u5e74\u8a72\u52d2\u7d22\u75c5\u6bd2\u7206\u767c<\/a>\u7684\u75ab\u60c5\u5728\u7576\u6642\u5e7e\u4e4e\u4f54\u64da\u4e86\u5168\u7403\u5a92\u9ad4\u7248\u9762\uff0c\u9020\u6210\u8a31\u591a\u8de8\u570b\u4f01\u696d\u82b1\u8cbb<a href=\"https:\/\/www.zdnet.com\/article\/this-is-how-much-the-wannacry-ransomware-attack-cost-the-nhs\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u6578\u767e\u842c\u3001\u6578\u5343\u842c\u751a\u81f3\u4e0a\u5104\u7f8e\u5143<\/a>\u7684\u6210\u672c\u4f86\u9032\u884c\u4fee\u5fa9\u548c\u5fa9\u539f\u3002\u5169\u5e74\u5f8c\u7684\u4eca\u5929\uff0c\u4f01\u696d\u4f9d\u7136\u7d93\u5e38\u906d\u5230 WannaCry \u8972\u64ca\u3002\u6839\u64da\u8da8\u52e2\u79d1\u6280\nSmart Protection Network&#x2122; \u7684\u8cc7\u6599\uff0cWannaCry\n\u4ecd\u662f 2019 \u5e74\u5075\u6e2c\u6578\u91cf\u6700\u591a\u7684\u52d2\u7d22\u75c5\u6bd2\u3002\u4e8b\u5be6\u4e0a\uff0cWannaCry \u7684\u5075\u6e2c\u6578\u91cf\u751a\u81f3\u8d85\u8d8a\u6240\u6709\u5176\u4ed6\u52d2\u7d22\u75c5\u6bd2\u5bb6\u65cf\u5075\u6e2c\u6578\u91cf\u7684\u7e3d\u5408\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"437\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/WCRY.jpg\" alt=\"\" class=\"wp-image-62317\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/WCRY.jpg 820w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/WCRY-300x160.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/WCRY-768x409.jpg 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/WCRY-30x16.jpg 30w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><figcaption> WannaCry \u4f9d\u7136\u5360\u4e86\u7d55\u5927\u90e8\u5206\u7684\u52d2\u7d22\u75c5\u6bd2\u5075\u6e2c\u6578\u91cf\uff1aWannaCry \u8207\u6240\u6709\u5176\u4ed6\u52d2\u7d22\u75c5\u6bd2\u5bb6\u65cf\u5075\u6e2c\u6578\u91cf\u9010\u6708\u6bd4\u8f03 (2019 \u4e0a\u534a\u5e74)\u3002 <\/figcaption><\/figure>\n\n\n\n<p>WannaCry\n\u4e4b\u6240\u4ee5\u80fd\u9020\u6210\u5927\u91cf\u611f\u67d3\uff0c\u5176\u80cc\u5f8c\u7684\u52d5\u529b\u5c31\u662f EternalBlue \u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5 (Microsoft \u65e9\u5728 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/ms17-010-eternalblue\/\" target=\"_blank\" rel=\"noreferrer noopener\">MS17-010<\/a> \u8cc7\u5b89\u516c\u544a\u7576\u4e2d\u5373\u4fee\u88dc\u4e86\u8a72\u6f0f\u6d1e)\uff0c\u8a72\u624b\u6cd5\u662f\u7531 <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/shadow-brokers-leaks-hacking-tools-what-it-means-for-enterprises\" target=\"_blank\" rel=\"noreferrer noopener\">ShadowBrokers \u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6d41\u50b3\u5230\u7db2\u8def\u4e0a<\/a>\uff0c\u4f46\u6839\u64da\u8a31\u591a\u5831\u5c0e\u6307\u51fa\uff0c\u8a72\u624b\u6cd5\u662f\u7aca\u53d6\u81ea\u7f8e\u570b\u570b\u5b89\u5168\u5c40 (NSA)\u3002EternalBlue\n\u5be6\u969b\u4e0a\u5229\u7528\u4e86 <a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2017-0143 \u81f3 CVE-2017-0148 \u7b49\u591a\u9805\u6f0f\u6d1e<\/a>\uff0c\u9019\u4e9b\u90fd\u662f Microsoft \u67d0\u4e9b\nWindows \u7248\u672c\u6240\u4f7f\u7528\u7684 SMBv1 \u4f3a\u670d\u5668\u901a\u8a0a\u5354\u5b9a\u7684\u6f0f\u6d1e\u3002\u9019\u4e9b\u6f0f\u6d1e\u53ef\u8b93\u99ed\u5ba2\u7d93\u7531\u767c\u9001\u7279\u88fd\u7684\u8a0a\u606f\u7d66\u53d7\u5bb3\u7cfb\u7d71\u4e0a\u7684 SMBv1 \u4f3a\u670d\u5668\u4f86\u89f8\u767c\uff0c\u4e26\u4e14\u53ef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002\u7531\u65bc\nMicrosoft SMB \u6f0f\u6d1e\u6240\u5f71\u97ff\u7684\u7522\u696d\u6975\u5ee3\uff0c\u5f9e\u91ab\u7642\u8a2d\u5099\u5230\u8fa6\u516c\u5ba4\u5370\u8868\u6a5f\u3001\u5132\u5b58\u88dd\u7f6e\u7b49\u7b49\uff0c\u56e0\u6b64\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u5f88\u5feb\u5c31\u770b\u4e0a EternalBlue \u7684\u50f9\u503c\u3002\u518d\u52a0\u4e0a\u8a31\u591a\u4f01\u696d\u5728\u4fee\u88dc\u7ba1\u7406\u65b9\u9762\u7686\u529b\u6709\u672a\u902e\uff0c\u56e0\u6b64\u9084\u6709\u5f88\u591a\u5b58\u5728\u8457\u6f0f\u6d1e\u7684\u7cfb\u7d71\uff0c\u6240\u4ee5\nEternalBlue \u624d\u6703\u81f3\u4eca\u4ecd\u53d7\u5230\u6b79\u5f92\u559c\u611b\u3002<\/p>\n\n\n\n<!--more-->\n\n\n\n<h3 class=\"wp-block-heading\">\u5f9e 2017 \u5e74\u8d77 EnternalBlue \u6f0f\u6d1e\u653b\u64ca\u5f9e\u672a\u9593\u65b7\u904e <\/h3>\n\n\n\n<p>EternalBlue\n\u6f0f\u6d1e\u653b\u64ca\u6848\u4f8b\u5f9e 2017 \u5e74\u8d77\u5c31\u5f9e\u672a\u9593\u65b7\u904e\u3002\u5728\u5b83\u958b\u59cb\u6d41\u50b3\u7684\u5e7e\u500b\u661f\u671f\u5167\u5c31\u51fa\u73fe\u4e86\u4e0d\u5c11\u4f7f\u7528\u8a72\u624b\u6cd5\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c\u9664\u4e86 WannaCry \u4e4b\u5916\uff0c\u9084\u6709 UIWIX <a href=\"https:\/\/blog.trendmicro.com.tw\/?p=57676\">\u7121\u6a94\u6848\u75c5\u6bd2(fileless malware)<\/a>\u5f0f\u52d2\u7d22\u75c5\u6bd2\u3001Adylkuzz\n\u6316\u7926\u7a0b\u5f0f\uff0c\u4ee5\u53ca EternalRocks SMB \u8815\u87f2\u3002\u5230\u4e86 2018 \u5e74\uff0c\u751a\u81f3\u6709\u66f4\u591a\u52d2\u7d22\u75c5\u6bd2\u63a1\u7528\u30022019 \u5e74\u66f4\u6536\u9304\u5230\u8a31\u591a\u6316\u7926\u60e1\u610f\u7a0b\u5f0f\u7684\u5de5\u5177\u5957\u4ef6\u7576\u4e2d\u3002\u6709\u4e9b\u4f7f\u7528\nEternalBlue \u7684\u60e1\u610f\u7a0b\u5f0f\u90fd\u662f\u5b58\u5728\u5df2\u4e45\u7684\u5df2\u77e5\u5a01\u8105\uff0c\u4f46\u537b\u591a\u4e86\u4e00\u4e9b\u65b0\u7684\u5de5\u5177\u548c\u529f\u80fd\u3002<\/p>\n\n\n\n<p><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u900f\u904e\u81ea\u5bb6\u7684<a href=\"https:\/\/www.trendmicro.tw\/tw\/business\/complete-software-protection\/index.html\">Smart Protection Network&#x2122;<\/a> \u5168\u7403\u5a01\u8105\u60c5\u5831\u7db2\u8207\u53ef\u516c\u958b\u53d6\u5f97\u7684\u4e00\u4e9b\u5165\u4fb5\u6307\u6a19\u4f86\u8ffd\u8e64\u4f7f\u7528\nEternalBlue \u7684\u77e5\u540d\u60e1\u610f\u7a0b\u5f0f\uff0c\u6e05\u695a\u5730\u986f\u793a\u51fa\u9019\u9805\u653b\u64ca\u624b\u6cd5\u4ecd\u7d93\u5e38\u88ab\u7528\u65bc\u653b\u64ca\u4e00\u4e9b\u81f3\u4eca\u4ecd\u672a\u4fee\u88dc\u7684\u7cfb\u7d71\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"632\" height=\"310\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/TOP-5.jpg\" alt=\"\" class=\"wp-image-62318\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/TOP-5.jpg 632w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/TOP-5-300x147.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/TOP-5-30x15.jpg 30w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><figcaption> 2017 \u5e74 5 \u6708\u81f3 2019 \u5e74 9 \u6708,\u4f7f\u7528 EternalBlue \u7684\u77e5\u540d\u60e1\u610f\u7a0b\u5f0f\uff0c\u6e05\u695a\u5730\u986f\u793a\u51fa\u9019\u9805\u653b\u64ca\u624b\u6cd5\u4ecd\u7d93\u5e38\u88ab\u7528\u65bc\u653b\u64ca\u4e00\u4e9b\u81f3\u4eca\u4ecd\u672a\u4fee\u88dc\u7684\u7cfb\u7d71 <\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">\u6f0f\u6d1e\u5df2\u7d93\u4fee\u88dc\u4e86\u5169\u5e74\u591a\u5f8c\uff0cEternalBlue \u4ecd\u820a\u975e\u5e38\u6d3b\u8e8d <\/h3>\n\n\n\n<p>\u6b63\u5982\u6211\u5011\u6240\u898b\uff0c\u5373\u4f7f\u5728\u6f0f\u6d1e\u5df2\u7d93\u4fee\u88dc\u4e86\u5169\u5e74\u591a\u5f8c\uff0cEternalBlue \u4ecd\u820a\u975e\u5e38\u6d3b\u8e8d\u3002\u5f9eSmart\nProtection Network (SPN) 2017 \u81f3 2019 \u5e74 9 \u6708\u7684\u8cc7\u6599\u5373\u53ef\u770b\u51fa\uff0c\u90a3\u4e9b\u4f7f\u7528 EternalBlue \u4f86\u653b\u64ca MS17-010\n\u5df2\u4fee\u88dc\u6f0f\u6d1e\u7684\u60e1\u610f\u7a0b\u5f0f\u5f9e 2017 \u5e74\u4fbf\u4e00\u76f4\u6d3b\u8e8d\u81f3\u4eca\u3002\u6b64\u5916\uff0c\u6211\u5011\u4e5f\u767c\u73fe\uff0c\u5373\u4f7f\u5230\u4e86 2019 \u5e74\uff0cWannaCry \u9084\u662f\u6240\u6709\u4f7f\u7528 EternalBlue \u653b\u64ca\u624b\u6cd5\u7684\u60e1\u610f\u7a0b\u5f0f\u7576\u4e2d\u5075\u6e2c\u6578\u91cf\u6700\u591a\u7684\u3002WannaCry \u7684\u5075\u6e2c\u6578\u91cf\u5e7e\u4e4e\u662f\u6240\u6709\u5176\u4ed6\u52d2\u7d22\u75c5\u6bd2\u6578\u91cf\u52a0\u7e3d\u7684\u56db\u500d\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"648\" height=\"320\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/SPN-detection-number.jpg\" alt=\"\" class=\"wp-image-62319\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/SPN-detection-number.jpg 648w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/SPN-detection-number-300x148.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/SPN-detection-number-30x15.jpg 30w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><figcaption> \u5404\u7a2e\u4f7f\u7528 EternalBlue \u653b\u64ca\u624b\u6cd5\u7684\u60e1\u610f\u7a0b\u5f0f\u6a23\u672c\u5728 SPN \u7684\u5075\u6e2c\u6578\u91cf (2017 \u5e74 5 \u6708\u81f3 2019 \u5e74 9 \u6708)\u3002 <\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"308\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/monthly-detection.jpg\" alt=\"\" class=\"wp-image-62320\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/monthly-detection.jpg 719w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/monthly-detection-300x129.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/monthly-detection-30x13.jpg 30w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><figcaption> \u4f7f\u7528 EternalBlue \u653b\u64ca\u624b\u6cd5\u7684\u60e1\u610f\u7a0b\u5f0f\u6bcf\u6708\u5075\u6e2c\u6578\u91cf (2019 \u5e74 1 \u6708\u81f3 9 \u6708)\u3002 <\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"870\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/notable-malware-attack.jpg\" alt=\"\" class=\"wp-image-62321\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/notable-malware-attack.jpg 901w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/notable-malware-attack-300x290.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/notable-malware-attack-768x742.jpg 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/10\/notable-malware-attack-30x30.jpg 30w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><figcaption> 2019 \u5e74\u4f7f\u7528 EternalBlue \u653b\u64ca\u624b\u6cd5\u7684\u524d\u4e94\u5927\u60e1\u610f\u7a0b\u5f0f (\u6839\u64da SPN \u7684\u8cc7\u6599)\u3002 <\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">  \u4f01\u696d\u9632\u7bc4 EternalBlue \u6700\u7c21\u55ae\u7684\u65b9\u6cd5\u5c31\u662f &#8230;&#8230;<\/h3>\n\n\n\n<p>EternalBlue\n\u662f\u99ed\u5ba2\u5927\u91cf\u5165\u4fb5\u53d7\u5bb3\u8005\u96fb\u8166\u7684\u4e00\u9805\u5229\u5668\uff0c\u9019\u5c31\u662f\u70ba\u4f55\u52d2\u7d22\u75c5\u6bd2\u548c\u6316\u7926\u7a0b\u5f0f\u6703\u9019\u9ebc\u559c\u6b61\u5b83\u3002\u52d2\u7d22\u75c5\u6bd2\u6563\u5e03\u8005\u5c0d\u65bc\u4ed6\u5011\u6240\u611f\u67d3\u7684\u53d7\u5bb3\u8005\uff0c\u5411\u4f86\u662f\u504f\u597d\u6578\u91cf\u800c\u975e\u54c1\u8cea\uff0c\u5118\u7ba1\u9019\u6a23\u7684\u7b56\u7565<a href=\"https:\/\/10.42.100.69\/vinfo\/us\/security\/news\/preview\/evasive-threats-pervasive-effects\" target=\"_blank\" rel=\"noreferrer noopener\">\u4f3c\u4e4e\u6b63\u5728\u8f49\u8b8a<\/a>\u3002\u6487\u958b WannaCry \u4e0d\u8ac7\uff0c2019\n\u5e74\uff0c\u7d55\u5927\u591a\u6578\u4f7f\u7528 EternalBlue \u7684\u60e1\u610f\u7a0b\u5f0f\u90fd\u662f\u865b\u64ec\u52a0\u5bc6\u8ca8\u5e63\u6316\u7926\u60e1\u610f\u7a0b\u5f0f\u3002\u56e0\u6b64\uff0c\u8d8a\u591a\u88dd\u7f6e\u611f\u67d3\uff0c\u5c31\u80fd\u5e36\u4f86\u8d8a\u591a\u7684\u904b\u7b97\u6548\u80fd\u3002<\/p>\n\n\n\n<p>\u4f01\u696d\u9632\u7bc4\nEternalBlue \u6700\u7c21\u55ae\u7684\u65b9\u6cd5\u5c31\u662f\u78ba\u5be6\u4fee\u88dc\u81ea\u5df1\u7684\u7cfb\u7d71\u3002Microsoft\n\u5728 2017 \u5e74 3 \u6708\u5373\u91dd\u5c0d\u9019\u9805\u6f0f\u6d1e<a href=\"https:\/\/support.microsoft.com\/en-ph\/help\/4013389\/title\" target=\"_blank\" rel=\"noreferrer noopener\">\u91cb\u51fa\u4e86\u4fee\u88dc\u66f4\u65b0<\/a>\uff0c\u5c31\u5728\u9019\u9805\u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5\u88ab\u63ed\u9732\u7684\u5e7e\u500b\u661f\u671f\u524d\u3002\u4f46\u5c0d\u4f01\u696d\u4f86\u8aaa\uff0c\u4fee\u88dc\u7cfb\u7d71\u6709\u6642\u662f\u4e00\u9805\u8271\u96e3\u7684\u5de5\u4f5c\uff0c\u56e0\u70ba\u9019\u5f88\u53ef\u80fd\u6703\u803d\u8aa4\u5230\u696d\u52d9\u7684\u71df\u904b\uff0c\u800c\u4e14\u5c0d\u5927\u516c\u53f8\u6216\u8de8\u570b\u96c6\u5718\u800c\u8a00\uff0c\u9019\u9805\u7a0b\u5e8f\u53ef\u80fd\u9700\u82b1\u8cbb\u5f88\u9577\u4e00\u6bb5\u6642\u9593\u3002\u4e0d\u904e\u9019\u7684\u78ba\u6709\u5176\u5fc5\u8981\uff0c\u56e0\u70ba\nEternalBlue \u76ee\u524d\u4ecd\u662f\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u4f7f\u7528\u975e\u5e38\u983b\u7e41\u7684\u4e00\u9805\u5de5\u5177\u3002<\/p>\n\n\n\n<p>\u8981\u5fb9\u5e95\u9632\u7bc4 EternalBlue \u653b\u64ca\u624b\u6cd5\uff0c\u4f01\u696d\u53ef\u90e8\u7f72\u80fd\u5920\u5075\u6e2c\u4e26\u9632\u6b62\u60e1\u610f\u7a0b\u5f0f\u5229\u7528\u6b64\u653b\u64ca\u624b\u6cd5\u7684\u8cc7\u5b89\u9632\u8b77\u3002\u63a1\u7528\u4e00\u5957\u5b8c\u6574\u6db5\u84cb\u9598\u9053\u3001\u7aef\u9ede\u3001\u7db2\u8def\u3001\u4f3a\u670d\u5668\u7b49\u5404\u74b0\u7bc0\u7684\u591a\u5c64\u5f0f\u9632\u8b77\u76f8\u7576\u91cd\u8981\u3002\u8da8\u52e2\u79d1\u6280\u4ee5<a href=\"https:\/\/www.trendmicro.tw\/business\/xgen-security.html\">\u8da8\u52e2\u79d1\u6280\u7684XGen\u5b89\u5168\u9632\u8b77\u6280\u8853<\/a>\u70ba\u57fa\u790e\u7684\u89e3\u6c7a\u65b9\u6848\uff0c\u5982\uff1a<a href=\"https:\/\/t.rend.tw\/?i=ODAzMw\">\u8da8\u52e2\u79d1\u6280PC-cillin<\/a>\u8207<a rel=\"noreferrer noopener\" href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/network.html\" target=\"_blank\">\u8da8\u52e2\u79d1\u6280 Network Defense \u7db2\u8def\u9632\u79a6<\/a>\u7686\u80fd\u5075\u6e2c\u76f8\u95dc\u7684\u60e1\u610f\u6a94\u6848\u548c\u7db2\u5740\u4ee5\u4fdd\u8b77\u4f7f\u7528\u8005\u7cfb\u7d71\u3002<a href=\"https:\/\/www.trendmicro.tw\/tw\/business\/complete-software-protection\/index.html\">Smart Protection Network&#x2122;<\/a> \u548c &nbsp;<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/small-business\/all-products-for-smb.html\">Worry-Free Business Security&nbsp;<\/a>\u5167\u5efa\u7684<a rel=\"noreferrer noopener\" href=\"https:\/\/success.trendmicro.com\/tw\/\" target=\"_blank\">\u884c\u70ba\u76e3\u63a7\u529f\u80fd<\/a>\u53ef\u984d\u5916\u9632\u8b77\u9019\u985e\u5a01\u8105\uff0c\u5075\u6e2c\u60e1\u610f\u7684\u6a94\u6848\u4e26\u6514\u622a\u6240\u6709\u76f8\u95dc\u7684\u60e1\u610f\u7db2\u5740\u3002<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/t.rend.tw\/?i=ODAzMw \"><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/08\/Windows10Banner-540x90v5.gif\" alt=\"\"\/><\/a><\/figure>\n\n\n\n<p>\u91dd\u5c0d EternalBlue \u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5\uff0c<strong>\u8da8\u52e2\u79d1\u6280 Deep Security \u548c Vulnerability\nProtection<\/strong> \u53ef\u5229\u7528\u4ee5\u4e0b IPS \u898f\u5247\u4f86\u52a0\u4ee5\u9632\u7bc4\uff1a<\/p>\n\n\n\n<ul><li><strong>IPS \u898f\u5247 1008224\u30011008228\u30011008225\u30011008227<\/strong> &#8211; \u53ef\u9632\u8b77 MS17-010 \u6240\u4fee\u88dc\u7684\u6f0f\u6d1e\u4ee5\u53ca\u67d0\u4e9b\u7279\u5b9a\u7684 Windows\nSMB \u9060\u7aef\u7a0b\u5f0f\u78bc\u57f7\u884c\u6f0f\u6d1e\u3002<\/li><\/ul>\n\n\n\n<p><strong>\u8da8\u52e2\u79d1\u6280\nDeep Discovery Inspector<\/strong> \u5ba2\u6236\u53ef\u4f7f\u7528\u4ee5\u4e0b\u898f\u5247\u4f86\u4fdd\u8b77\u81ea\u5df1\uff1a<\/p>\n\n\n\n<ul><li><strong>DDI Rule 2383:<\/strong> CVE-2017-0144\n&#8211; Remote Code Execution &#8211; SMB (Request)<\/li><\/ul>\n\n\n\n<p><strong>\u8da8\u52e2\u79d1\u6280\nTippingPoint<\/strong> \u5ba2\u6236\u53ea\u8981\u5177\u5099\u4ee5\u4e0b\u904e\u6ffe\u898f\u5247\u5c31\u64c1\u6709\u6700\u65b0\u7684\u9632\u8b77\uff1a<\/p>\n\n\n\n<ul><li><strong>\u904e\u6ffe\u898f\u5247 5614\u300127433\u300127711\u300127935\u300127928<\/strong> &#8211; \u9632\u8b77 MS17-010 \u6240\u4fee\u88dc\u7684\u6f0f\u6d1e\u4ee5\u53ca\u67d0\u4e9b\u7279\u5b9a\u7684 Windows\nSMB \u9060\u7aef\u7a0b\u5f0f\u78bc\u57f7\u884c\u6f0f\u6d1e\u8207\u653b\u64ca\u3002<\/li><\/ul>\n\n\n\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/putting-the-eternal-in-eternalblue-mapping-the-use-of-the-infamous-exploit\">Putting the Eternal\nin EternalBlue: Mapping the Use of the Infamous Exploit<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5373\u4f7f\u5728 EternalBlue(\u6c38\u6046\u4e4b\u85cd)\u6f0f\u6d1e\u5df2\u7d93\u4fee\u88dc\u4e86\u5169\u5e74\u591a\u5f8c\uff0cEternalBlue \u4ecd\u820a\u975e\u5e38\u6d3b\u8e8d\u3002\u5373\u4f7f\u5230 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[4439,1268,156],"tags":[3219,2559,3221,3335,452],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/62316"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=62316"}],"version-history":[{"count":1,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/62316\/revisions"}],"predecessor-version":[{"id":72605,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/62316\/revisions\/72605"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=62316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=62316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=62316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}