當前位置

首頁 > 英語閱讀 > 雙語新聞 > 中國數十萬蘋果設備或已染病毒

中國數十萬蘋果設備或已染病毒

推薦人: 來源: 閱讀: 6.93K 次

Compared with Android phones or Windows PCs, Apple’s products are relatively impervious to malware, which is what makes WireLurker so interesting.

相對安卓(Android)手機和Windows電腦而言,蘋果的產品不太容易受到惡意軟件的侵襲,這讓本次WireLurker事件關注度頗高。

中國數十萬蘋果設備或已染病毒

According to Palo Alto Networks, a California company that sells firewalls to businesses, a new family of malware has been quietly infiltrating OS X and iOS devices for the past six months, gathering information and preparing for some kind of unspecified attack.

據位於加州的企業防火牆公司帕洛阿爾託網絡(Palo Alto Networks)稱,在過去六個月中,一種新的惡意軟件悄然侵入了裝有OS X和iOS系統的設備,這種軟件會蒐集信息,並籌備某些未明攻擊。

The researchers who discovered the plot called it WireLurker because it can infect even pristine, non-jailbroken iPhones and iPads through computer cables.

發現這種軟件的研究人員將其稱作WireLurker(意爲“數據線潛伏者”),因爲它可以通過電腦數據線感染甚至是原裝非越獄的iPhone和iPad。

There are no reports of WireLurker infecting Apple devices outside China, and Apple says it has taken steps to prevent that from happening.

目前在中國境外,尚沒有WireLurker感染蘋果(Apple)設備的報道。蘋果公司表示,已經採取措施阻止該病毒感染蘋果設備。

“We are aware of malicious software available from a download site aimed at users in China, and we’ve blocked the identified apps to prevent them from launching,” anspokesperson told Fortune. “As always, we recommend that users download and install software from trusted sources.”

蘋果發言人對《財富》(Fortune)表示:“我們正密切關注這種惡意軟件,它來自於某個面向中國用戶的下載站。我們確認並阻止了它的運行。如往常一樣,我們建議用戶從可靠來源下載和安裝軟件。”

The fact that someone found a way to do it has to be troubling news for Apple, which markets itself as the company that protects its users’ privacy and keeps them safe.

有人找到了攻擊蘋果設備的方法,這對於一直以來宣稱自身能夠保護用戶隱私和安全的蘋果而言,實在是件麻煩事。攻破蘋果的防禦體系並不輕鬆,它還需要中國數十萬部越獄的iOS設備作爲啓動基礎。

Getting through Apple’s defense systems wasn’t easy, and it required the breeding ground of hundreds of millions of jailbroken Chinese iOS devices to get started.

帕洛阿爾託網絡公司第42單元的研究人員通過WireLurker追蹤到了中國一家名爲“麥芽地(Maiyadi)”的第三方Mac應用商店。根據公司週三發佈的白皮書顯示,那裏流出了467個受到感染的應用,這些應用總共被下載了超過356,104次。也就是說,可能有數十萬用戶已經受到惡意軟件的影響。

Researchers at Palo Alto Network’s PANW 3.50% Unit 42 traced WireLurker to a third-party Mac application store in China called Maiyadi App Store. There it “trojanized” 467 OS X applications, according to a white paper published Wednesday, and those apps were downloaded more than 356,104 times. In all, hundreds of thousands of users may have been affected.

用戶需要更改Mac電腦上的安全設置,並忽略自動彈出的好幾次警告,才能成功下載帶病毒的應用。

To download the infected apps, users would have had to change the security settings on their Macs and ignore several pop-up warnings.

應用一旦安裝成功,就會按照設定好的指令,感染多個移動設備。

But once installed, the apps could make the leap to devices that followed all the rules.

以下是帕洛阿爾託網絡公司發佈的新聞稿:

From Palo Alto Network’s press release:

“如果一臺OS X電腦感染了WireLurker病毒,任何通過USB數據線與該電腦連接的iOS設備,無論是否越獄,都會被監控並自動安裝下載好的第三方應用或自動生成的惡意應用。這就是爲何我們叫它WireLurker(數據線潛伏者)。”

WireLurker monitors any iOS device connected via USB with an infected OS X computer and installs downloaded third-party applications or automatically generated malicious applications onto the device, regardless of whether it is jailbroken. This is the reason we call it ‘wire lurker’…

“WireLurker可以竊取受感染的移動設備上的多種信息,還能定期向黑客的指揮和控制服務器發送升級請求。黑客正在積極地開發這個惡意軟件,其目的尚不明確。”

Security experts have long debated why it is that Apple’s computers were spared the waves of malware that have infected competing systems over the years. Was it because Apple’s systems were inherently more secure? Or because there weren’t enough Macs out there to make an interesting target?

惡意軟件肆虐蘋果競爭對手的系統已有多年,而蘋果電腦卻始終倖免,安全專家對其中緣由爭論已久。是蘋果系統本身就更加安全嗎?還是因爲Mac電腦數量太少,黑客沒有興趣攻擊它?

In the post-PC era, with Apple selling hundreds of millions of devices per year, the “security by obscurity” theory may get put to the test.

在後PC時代,蘋果每年都會售出數十萬臺設備,“被忽視所以安全”的理論將會得到檢驗。

Meanwhile, Palo Alto Networks offers some advice:

與此同時,帕洛阿爾託網絡公司提供了一些建議:

o In the OS X System Preferences panel under “Security & Privacy,” ensure “Allow apps downloaded from Mac App Store (or Mac App Store and identified developers)” is set

o 在OS X系統的系統偏好設置裏的“安全與隱私”中,請選擇“僅允許從Mac應用商店下載的應用程序 ”(或“僅允許來自Mac應用商店或來自蘋果認可的開發者的應用程序 ”)

o Do not download and run Mac applications or games from any third-party app store, download site or other untrusted source

o 不要下載和運行來自第三方應用商店、下載站和其他不可信來源的Mac應用及遊戲

o Keep the iOS version on your device up-to-date

o 保證移動設備上的iOS系統是最新版的

o Do not accept any unknown enterprise provisioning profile unless an authorized, trusted party (e.g. your IT corporate help desk) explicitly instructs you to do so

o 不要接受任何不明企業的配置文件,除非是獲得授權的可信方(比如貴公司IT部門的幫助中心)明確讓你這麼做

o Do not pair your iOS device with untrusted or unknown computers or devices

o 不要將你的iOS設備與不受信任或未知的電腦或設備配對

o Avoid powering your iOS device through chargers from untrusted or unknown sources

o 避免用不受信任或未知來源的充電器給你的iOS設備充電

o Similarly, avoid connecting iOS devices with untrusted or unknown accessories or computers (Mac or PC)

o 與此類似,避免將你的iOS設備與不受信任或未知的配件或電腦(Mac或PC機)連接

o Do not jailbreak your iOS device; If you do jailbreak it, only use credible Cydia community sources and avoid the use or storage of sensitive personal information on that device

o 不要給你的iOS設備越獄。如果你已經越獄,請只使用來自Cydia社區的可靠資源,避免在設備上儲存敏感的個人信息