{"id":63532,"date":"2020-03-19T09:00:00","date_gmt":"2020-03-19T01:00:00","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=63532"},"modified":"2020-03-12T17:49:27","modified_gmt":"2020-03-12T09:49:27","slug":"%e9%87%9d%e5%b0%8d%e6%9d%b1%e5%8d%97%e4%ba%9e%e5%8d%9a%e5%bc%88%e5%85%ac%e5%8f%b8%e7%9a%84%e7%b6%b2%e8%b7%af%e9%96%93%e8%ab%9c%e6%b4%bb%e5%8b%95","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=63532","title":{"rendered":"\u91dd\u5c0d\u6771\u5357\u4e9e\u535a\u5f08\u516c\u53f8\u7684\u7db2\u8def\u9593\u8adc\u6d3b\u52d5"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p> \u9019\u6ce2\u91dd\u5c0d\u535a\u5f08\u516c\u53f8\u7684\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u80cc\u5f8c\u99ed\u5ba2\u5229\u7528\u516c\u958b\u53ef\u53d6\u5f97\u4ee5\u53ca\u81ea\u88fd\u5de5\u5177\u4f86\u505a\u5230\u63d0\u6b0a\u548c\u9032\u884c\u6a6b\u5411\u79fb\u52d5\u3002\u6240\u7528\u7684\u60e1\u610f\u8edf\u9ad4\u4e4b\u4e00\u6703\u7528Dropbox \u4f5c\u70ba\u901a\u8a0a\u53ca\u5f9e\u76ee\u6a19\u53d6\u51fa\u8cc7\u6599\u7684\u7ba1\u9053\u3002 <\/p><\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"563\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling1.jpg\" alt=\"\" class=\"wp-image-63533\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling1.jpg 663w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling1-300x255.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling1-30x25.jpg 30w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/figure>\n\n\n\n<p>DRBControl\u60e1\u610f\u6d3b\u52d5\u5c07\u7528\u5728\u5176\u4ed6\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u7684\u60e1\u610f\u8edf\u9ad4\u53ca\u6280\u8853\u7528\u4f86\u653b\u64ca\u5176\u76ee\u6a19\u3002<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/uncovering-DRBControl-pdf-thumb.jpg\" alt=\"Uncovering DRBControl: Inside the Cyberespionage Campaign Targeting Gambling Operations\" width=\"226\" height=\"321\"\/><\/a><figcaption> <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\">\u4e0b\u8f09\u300c\u63ed\u9732 DRBControl\uff1a\u89e3\u6790\u91dd\u5c0d\u535a\u5f08\u7522\u696d\u7684\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u300d <\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p><a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\"><\/a><\/p>\n\n\n\n<p>\u8a6e\u777f\u79d1\u6280\u57282019 \u5e74\u6642\u5c31\u5176\u5728\u4e00\u8d77\u4e8b\u4ef6\u56de\u61c9\u6240<a href=\"https:\/\/www.talent-jump.com\/article\/2020\/02\/17\/CLAMBLING-A-New-Backdoor-Base-On-Dropbox-en\/\">\u767c\u73fe<\/a>\u7684\u5f8c\u9580\u554f\u984c\u806f\u7e6b\u4e86\u8da8\u52e2\u79d1\u6280\u3002\u6211\u5011\u63d0\u4f9b\u4e86\u95dc\u65bc\u6b64\u5f8c\u9580\u7a0b\u5f0f\u9032\u4e00\u6b65\u7684\u60c5\u5831\u548c\u5206\u6790\uff0c\u8a72\u5f8c\u9580\u7a0b\u5f0f\u4e4b\u524d\u88ab\u540d\u70baDRBControl\u7684\u99ed\u5ba2\u7d44\u7e54\u7528\u4f86\u767c\u52d5<a href=\"file:\/\/\/D:\/@Tracy%202010\/@\u8b6f\u69c1\u53ca%20Tracy%20\u6587\u7ae0\/Keith\/HYPERLINK%20%22http:\/blog.trendmicro.com.tw\/%3fp=123%22APTHYPERLINK%20%22http:\/blog.trendmicro.com.tw\/%3fp=123%22\u653b\u64ca\">\u653b\u64ca<\/a>\u3002\u9019\u5718\u9ad4\u76ee\u524d\u5c07\u76ee\u6a19\u653e\u5728\u6771\u5357\u4e9e\u5730\u5340\uff0c\u7279\u5225\u662f\u535a\u5f08\u516c\u53f8\u3002\u6b50\u6d32\u548c\u4e2d\u6771\u4e5f\u6709\u5411<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u56de\u5831\u6210\u70ba\u653b\u64ca\u7684\u76ee\u6a19\uff0c\u4f46\u6211\u5011\u5728\u672c\u5831\u544a\u64b0\u5beb\u6642\u5c1a\u7121\u6cd5\u52a0\u4ee5\u8b49\u5be6\u3002\u5916\u6d29\u7684\u8cc7\u6599\u4e3b\u8981\u662f\u8cc7\u6599\u5eab\u548c\u539f\u59cb\u78bc\uff0c\u9019\u4f7f\u5f97\u6211\u5011\u76f8\u4fe1\u8a72\u5718\u9ad4\u7684\u4e3b\u8981\u76ee\u7684\u662f\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u3002<\/p>\n\n\n\n<p>\u9019\u8d77\u653b\u64ca\u6d3b\u52d5\u7528\u4e86\u5169\u500b\u4e4b\u524d\u672a\u770b\u904e\u7684\u5f8c\u9580\u7a0b\u5f0f\u3002\u99ed\u5ba2\u540c\u6642\u9084\u7528\u4e86\u5df2\u77e5\u60e1\u610f\u8edf\u9ad4\u5bb6\u65cf\uff08\u5982<a href=\"https:\/\/attack.mitre.org\/software\/S0013\/\">PlugX<\/a>\u548c<a href=\"https:\/\/attack.mitre.org\/software\/S0398\/\">HyperBro<\/a>\u5f8c\u9580\u7a0b\u5f0f\uff09\u53ca\u81ea\u88fd\u7684\u5f8c\u6ef2\u900f\uff08post-exploitation\uff09\u5de5\u5177\u3002\u6709\u610f\u601d\u7684\u662f\uff0c\u5176\u4e2d\u6709\u500b\u5f8c\u9580\u7a0b\u5f0f\u5229\u7528\u96f2\u7aef\u5132\u5b58\u670d\u52d9 Dropbox\u4f5c\u70ba\u547d\u4ee4\u548c\u63a7\u5236 \uff08C&amp;C\uff09\u7ba1\u9053\u3002\u6211\u5011\u5df2\u7d93\u5411 Dropbox \u62ab\u9732\u4e86\u9019\u9805\u767c\u73fe\uff0c\u4ed6\u5011\u4e5f\u8207\u8da8\u52e2\u79d1\u6280\u4e00\u540c\u5408\u4f5c\u89e3\u6c7a\u6b64\u554f\u984c\u3002<\/p>\n\n\n\n<!--more-->\n\n\n\n<h3 class=\"wp-block-heading\"><br>\u76ee\u6a19:\u6771\u5357\u4e9e\u7684\u535a\u5f08\u516c\u53f8 <\/h3>\n\n\n\n<p><br>DRBControl\u7684\u76ee\u6a19\u662f\u6771\u5357\u4e9e\u7684\u535a\u5f08\u516c\u53f8\u3002<\/p>\n\n\n\n<p>\u60e1\u610f\u6d3b\u52d5\u80cc\u5f8c\u7684\u99ed\u5ba2\u5229\u7528\u5404\u7a2e\u5f8c\u6ef2\u900f\uff08post-exploitation\uff09\u5de5\u5177\uff08\u5982\u526a\u8cbc\u7c3f\u64f7\u53d6\u7a0b\u5f0f\u3001\u7db2\u8def\u6d41\u91cf\u901a\u9053\u3001\u66b4\u529b\u7834\u89e3\u5de5\u5177\u53ca\u5bc6\u78bc\u63d0\u53d6\u5de5\u5177\u3002\uff09<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>\u60e1\u610f\u6d3b\u52d5<\/h3>\n\n\n\n<p><br>\u7b2c\u4e00\u968e\u6bb5\u7684\u5165\u4fb5\u6d3b\u52d5\u662f\u5229\u7528<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=15888\">\u9b5a\u53c9\u5f0f\u91e3\u9b5a\uff08spear phishing\uff09<\/a>\uff08DOCX\u6a94\uff09\u3002DRBControl\u4f7f\u7528\u4e86\u4e09\u500b\u7248\u672c\u7684\u60e1\u610f\u6587\u4ef6\u3002<\/p>\n\n\n\n<ul><li>\u9019\u6ce2\u6d3b\u52d5\u4e3b\u8981\u4f7f\u7528\u4e86\u5169\u500b\u5f8c\u9580\u7a0b\u5f0f\uff0c\u9019\u5169\u500b\u5f8c\u9580\u7a0b\u5f0f\u90fd\u6703\u5229\u7528Microsoft\u7c3d\u7ae0\u7684 MSMpEng.exe\u4f86\u4f7f\u7528DLL \u5074\u8f09\u5165\uff08side-loading\uff09\u3002<\/li><li>\u7b2c\u4e00\u578b\u5f8c\u9580\u7a0b\u5f0f\u5df2\u7d93\u51fa\u73fe\u4e86\u4e5d\u500b\u7248\u672c\uff0c\u6240\u6709\u7684\u7248\u672c\u90fd\u57282019\u5e745\u6708\u523010\u6708\u9593\u958b\u767c\u3002\u800c\u4e14\u90fd\u4f7f\u7528\u96f2\u7aef\u5132\u5b58\u670d\u52d9Dropbox\u4f5c\u70baC&amp;C\u7ba1\u9053\u3002<\/li><li>\u7b2c\u4e8c\u578b\u5f8c\u9580\u7a0b\u5f0f\u4f7f\u7528\u542b\u6709C&amp;C\u7db2\u57df\u548c\u9023\u63a5\u7aef\u53e3\u7684\u8a2d\u5b9a\u6a94\uff0c\u8a2d\u5b9a\u6a94\u5167\u9084\u5305\u542b\u4e86\u60e1\u610f\u8edf\u9ad4\u76ee\u9304\u548c\u6a94\u6848\u540d\u7a31\uff0c\u540c\u6642\u9084\u6703\u8a2d\u5b9a\u5176\u6301\u7e8c\u6027\u6a5f\u5236\u3002<\/li><li>\u5728\u5927\u591a\u6578\u60c5\u6cc1\u4e0b\uff0cIP\u5730\u5740\u53ea\u80fd\u5f9e\u5beb\u6b7b\u5728\u60e1\u610f\u8edf\u9ad4\u5167\u7684\u5b50\u7db2\u57df\u89e3\u6790\u51fa\u4f86\uff1b\u6c92\u6709IP\u5730\u5740\u9023\u7d50\u5230\u7db2\u57df\u672c\u8eab\u3002<\/li><li>\u653b\u64ca\u6d3b\u52d5\u4e2d\u9084\u4f7f\u7528\u4e86\u5df2\u77e5\u60e1\u610f\u8edf\u9ad4\uff08\u5982PlugX\u9060\u7aef\u5b58\u53d6\u6728\u99ac\u3001Trochilus\u9060\u7aef\u5b58\u53d6\u6728\u99ac\u548cHyperBro\u5f8c\u9580\u7a0b\u5f0f\uff09\u548cCobalt Strike\u8edf\u9ad4\u3002<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>\u7db2\u8def\u6d3b\u52d5<\/strong><\/h3>\n\n\n\n<p><br>\u8207\u5176\u4ed6\u9032\u968e\u6301\u7e8c\u6027\u5a01\u8105\uff08APT\uff09\u653b\u64ca\u7684\u95dc\u806f<\/p>\n\n\n\n<p><br>\u6709\u5e7e\u96bb\u60e1\u610f\u8edf\u9ad4\u88ab\u8b58\u5225\u51fa\u8ddf<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/winnti-group-resurfaces-with-portreuse-backdoor-now-engages-in-illicit-cryptocurrency-mining\">Winnti<\/a>\u8207<a href=\"https:\/\/attack.mitre.org\/groups\/G0027\/\">Emissary Panda<\/a>\u653b\u64ca\u6d3b\u52d5\u6709\u95dc\u3002\u8ddfWinnti\u96c6\u5718\u7684\u95dc\u806f\u5f9emutex\u5230\u7db2\u57df\u540d\u7a31\u548c\u767c\u51fa\u7684\u547d\u4ee4\u90fd\u53ef\u4ee5\u770b\u51fa\u3002\u800c\u4f3c\u4e4e\u5c08\u5c6c\u65bcEmissary Panda\u7684HyperBro\u5f8c\u9580\u7a0b\u5f0f\u4e5f\u88ab\u7528\u65bc\u9019\u6ce2\u653b\u64ca\u6d3b\u52d5\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>\u4e3b\u8981\u767c\u73fe\uff1a<\/strong><\/h3>\n\n\n\n<ul><li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20earliest%20documented%20spear-phishing%20activity%20by%20%23DRBControl%20against%20targets%20was%20identified%20in%20May%202019.%20The%20attack%20targets%20organizations%27%20support%20teams.%20Details%20on%20their%20operations:%20%20https%3A%2F%2Fwww.trendmicro.com%2Fvinfo%2Fus%2Fsecurity%2Fnews%2Fcyber-attacks%2Foperation-drbcontrol-uncovering-a-cyberespionage-campaign-targeting-gambling-companies-in-southeast-asia\">\u6700\u65e9\u6709\u8a18\u9304\u5c0d\u76ee\u6a19\u9032\u884c\u653b\u64ca\u7684\u9b5a\u53c9\u5f0f\u7db2\u8def\u91e3\u9b5a\u6d3b\u52d5\u57282019 \u5e74 5 \u6708\u78ba\u8a8d\u3002\u9019\u6ce2\u653b\u64ca\u91dd\u5c0d\u516c\u53f8\u7684\u652f\u63f4\u5718\u968a<\/a>\u3002<\/li><li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=%23DRBControl%20campaign%20has%20several%20relations%20to%20well-known%20APT%20groups%20%23Winnti%20and%20%23EmissaryPanda,%20whose%20previously%20observed%20campaigns%20involved%20self-developed%20tools%20and%20espionage%20targets.%20Read%20in%20full%20here:%20%20https%3A%2F%2Fwww.trendmicro.com%2Fvinfo%2Fus%2Fsecurity%2Fnews%2Fcyber-attacks%2Foperation-drbcontrol-uncovering-a-cyberespionage-campaign-targeting-gambling-companies-in-southeast-asia\">\u9019\u6ce2\u653b\u64ca\u6d3b\u52d5\u8ddf\u77e5\u540d\u9032\u968e\u6301\u7e8c\u6027\u5a01\u8105\uff08APT\uff09\u99ed\u5ba2\u96c6\u5718Winnti\u548cEmissary Panda\u53ef\u4ee5\u770b\u51fa\u6709\u8a31\u591a\u76f8\u95dc\u4e4b\u8655\uff0c\u9019\u4e9b\u5718\u9ad4\u4e4b\u524d\u7684\u653b\u64ca\u6d3b\u52d5\u90fd\u6709\u81ea\u884c\u958b\u767c\u5de5\u5177\u548c\u4e26\u4e14\u5c0d\u76ee\u6a19\u9032\u884c\u9593\u8adc\u6d3b\u52d5\u3002<\/a><\/li><li><a href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20%23DRBControl%20%23cyberespionage%20campaign%20appears%20to%20be%20targeting%20%23gambling%20and%20betting%20companies.%20It%20utilizes%20newly%20identified%20backdoors,%20one%20of%20which%20allowed%20the%20perpetrators%20to%20use%20multiple%20%23Dropbox%20repositories%20for%20harvested%20information.%20More:%20%20https%3A%2F%2Fwww.trendmicro.com%2Fvinfo%2Fus%2Fsecurity%2Fnews%2Fcyber-attacks%2Foperation-drbcontrol-uncovering-a-cyberespionage-campaign-targeting-gambling-companies-in-southeast-asia\">\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u4f3c\u4e4e\u662f\u5728\u91dd\u5c0d\u535a\u5f08\u516c\u53f8\u3002\u5b83\u5229\u7528\u4e86\u65b0\u7684\u5f8c\u9580\u7a0b\u5f0f\uff0c\u5176\u4e2d\u4e00\u500b\u53ef\u4ee5\u8b93\u99ed\u5ba2\u4f7f\u7528\u591a\u500bDropbox\u6a94\u6848\u5eab\u4f86\u53d6\u5f97\u8cc7\u8a0a\u3002<\/a><\/li><\/ul>\n\n\n\n<p><br>DRBControl\u653b\u64ca\u6d3b\u52d5\u4f7f\u7528\u4e86\u5404\u7a2e\u60e1\u610f\u8edf\u9ad4\u548c\u6280\u8853\u4f86\u653b\u64ca\u76ee\u6a19\uff0c\u9019\u4e9b\u60e1\u610f\u8edf\u9ad4\u548c\u6280\u8853\u8207\u5176\u4ed6\u5df2\u77e5\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u6240\u7528\u7684\u76f8\u7b26\u5408\u3002\u60e1\u610f\u4efd\u5b50\u7dad\u8b77\u4e86\u591a\u5957\u57fa\u790e\u8a2d\u65bd\uff0c\u4e26\u5229\u7528\u5f8c\u6ef2\u900f\uff08post-exploitation\uff09\u5de5\u5177\u4f86\u63a8\u52d5\u5176\u884c\u52d5\u3002<\/p>\n\n\n\n<p><br>\u653b\u64ca\u6d3b\u52d5\u4e0d\u50c5\u50c5\u4f7f\u7528\u96f2\u7aef\u5132\u5b58\u670d\u52d9Dropbox\u4f5c\u70baC&amp;C\u7ba1\u9053\uff0c\u9084\u5c07\u5176\u7528\u4f86\u6d3e\u9001\u5404\u7a2e\u60e1\u610f\u8edf\u9ad4\u3002Dropbox\u6a94\u6848\u5eab\u9084\u88ab\u7528\u4f86\u5132\u5b58\u5982\u547d\u4ee4\u3001\u5f8c\u6ef2\u900f\uff08post-exploitation\uff09\u5de5\u5177\u3001\u76ee\u6a19\u4f7f\u7528\u8005\u5de5\u4f5c\u7ad9\u8cc7\u8a0a\u548c\u88ab\u7aca\u6a94\u6848\u7b49\u8cc7\u8a0a\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"padding:20px\" class=\"wp-block-tnp-minimal\"><p>\u8a02\u95b1\u8cc7\u5b89\u8da8\u52e2\u96fb\u5b50\u5831<\/p><div><div class=\"tnp tnp-subscription-minimal  \"><form action=\"https:\/\/blog.trendmicro.com.tw\/wp-admin\/admin-ajax.php?action=tnp&amp;na=s\" method=\"post\" style=\"text-align: center\"><input type=\"hidden\" name=\"nr\" value=\"minimal\">\n<input type=\"hidden\" name=\"nlang\" value=\"\">\n<input class=\"tnp-email\" type=\"email\" required name=\"ne\" value=\"\" placeholder=\"Email\"><input class=\"tnp-submit\" type=\"submit\" value=\"\u8a02\u95b1\" style=\"background-color:undefined;\">\n<\/form><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u526a\u8cbc\u7c3f\u64f7\u53d6\u7a0b\u5f0f<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"711\" height=\"394\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling3.jpg\" alt=\"\" class=\"wp-image-63534\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling3.jpg 711w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling3-300x166.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2020\/02\/gambling3-30x17.jpg 30w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><figcaption> DRBControl \u4f7f\u7528\u7684\u5f8c\u6ef2\u900f\uff08post-exploitation\uff09\u5de5\u5177 :<br> EarthWorm\u7db2\u8def\u6d41\u91cf\u901a\u9053\/ \u516c\u5171 IP\u5730\u5740\u6aa2\u7d22\u7a0b\u5f0f\/ NBTScan\u5de5\u5177\/ \u66b4\u529b\u7834\u89e3\u5de5\u5177 \u63d0\u6b0a\u6f0f\u6d1e\u5de5\u5177\/\u5bc6\u78bc\u63d0\u53d6\u7a0b\u5f0f\/ \u7528\u6236\u5e33\u6236\u63a7\u5236\uff08UAC\uff09\/\u7e5e\u904e\u5de5\u5177 \/\u7a0b\u5f0f\u78bc\u8f09\u5165\u5668 <br><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br><strong>\u7d50\u8ad6<\/strong><\/h3>\n\n\n\n<p><br>\u8207\u4e3b\u8981\u76ee\u6a19\u70ba\u50b3\u7d71\u7db2\u8def\u72af\u7f6a\u7684\u7121\u5dee\u5225\u653b\u64ca\u4e0d\u540c\uff0c\u99ed\u5ba2\u5728\u9032\u884c\u91dd\u5c0d\u6027\u653b\u64ca\u6642\u66f4\u8457\u5728\u7a4d\u6975\u5730\u7814\u7a76\u548c\u5165\u4fb5\u7279\u5b9a\u76ee\u6a19\uff08\u5982\u900f\u904e\u9b5a\u53c9\u5f0f\u7db2\u8def\u91e3\u9b5a\uff09\u4f86\u9032\u884c\u7db2\u8def\u6a6b\u5411\u79fb\u52d5\u548c\u654f\u611f\u8cc7\u8a0a\u63d0\u53d6\u3002\u80fd\u5920\u4e86\u89e3\u653b\u64ca\u5de5\u5177\u3001\u6280\u8853\u548c\u57fa\u790e\u8a2d\u65bd\u53ca\u8207\u985e\u4f3c\u653b\u64ca\u6d3b\u52d5\u9593\u7684\u9023\u7d50\uff0c\u53ef\u4ee5\u70ba\u8a55\u4f30\u6f5b\u5728\u5f71\u97ff\u548c\u63a1\u53d6\u9632\u79a6\u63aa\u65bd\u63d0\u4f9b\u5fc5\u9808\u7684\u8108\u7d61\u8cc7\u8a0a\u3002\u8da8\u52e2\u79d1\u6280\u7684\u4f7f\u7528\u8005\u80fd\u5920\u85c9\u7531\u63d0\u4f9b\u53ef\u64cd\u4f5c\u5a01\u8105\u60c5\u5831\u3001\u7db2\u8def\u80fd\u898b\u5ea6\u548c\u53ca\u6642\u5a01\u8105\u4fdd\u8b77\u7684\u5b89\u5168\u9632\u8b77\u4f86\u62b5\u79a6\u9032\u968e\u6301\u7e8c\u6027\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u6211\u5011\u5728\u7814\u7a76\u5831\u544a\u300c<a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\">\u63ed\u9732 DRBControl\uff1a\u89e3\u6790\u91dd\u5c0d\u535a\u5f08\u7522\u696d\u7684\u7db2\u8def\u9593\u8adc\u6d3b\u52d5<\/a>\u300d\u5167\u8a73\u7d30\u63cf\u8ff0\u4e86\u6211\u5011\u7684\u767c\u73fe\uff0c\u5728\u5831\u544a\u4e2d\u6aa2\u8996\u4e86DRBControl\u6240\u7528\u7684\u60e1\u610f\u8edf\u9ad4\u3001\u8207\u5df2\u77e5APT\u99ed\u5ba2\u96c6\u5718\u7684\u95dc\u4fc2\u3001\u5176\u6d3b\u52d5\u5176\u4ed6\u503c\u5f97\u6ce8\u610f\u7684\u9ede\u53ca\u5165\u4fb5\u6307\u6a19\u3002<\/p>\n\n\n\n<p><a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\"><\/a><\/p>\n\n\n\n<p>\u4e0b\u8f09<a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\">\u300c\u63ed\u9732 DRBControl\uff1a\u89e3\u6790\u91dd\u5c0d\u535a\u5f08\u7522\u696d\u7684\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u300d<\/a><\/p>\n\n\n\n<p><br>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/operation-drbcontrol-uncovering-a-cyberespionage-campaign-targeting-gambling-companies-in-southeast-asia\">Operation DRBControl Uncovering a Cyberespionage Campaign Targeting Gambling Companies in Southeast Asia<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u9019\u6ce2\u91dd\u5c0d\u535a\u5f08\u516c\u53f8\u7684\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u80cc\u5f8c\u99ed\u5ba2\u5229\u7528\u516c\u958b\u53ef\u53d6\u5f97\u4ee5\u53ca\u81ea\u88fd\u5de5\u5177\u4f86\u505a\u5230\u63d0\u6b0a\u548c\u9032\u884c\u6a6b\u5411\u79fb\u52d5\u3002\u6240\u7528\u7684\u60e1\u610f\u8edf\u9ad4\u4e4b\u4e00\u6703 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[10],"tags":[498,4525],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/63532"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63532"}],"version-history":[{"count":2,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/63532\/revisions"}],"predecessor-version":[{"id":63536,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/63532\/revisions\/63536"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=63532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=63532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}