當前位置

首頁 > 英語閱讀 > 英語閱讀理解 > WannaCry之後又出更牛病毒,然而開發者慫了

WannaCry之後又出更牛病毒,然而開發者慫了

推薦人: 來源: 閱讀: 5.02K 次

Security researcher who discovered worm that could have bigger impact than WannaCry says the author seems to have given up.
安全研究員發現了一種本可以比勒索病毒影響更大的蠕蟲病毒,但他表示這種病毒的開發者似乎認輸了。

The EternalRocks worm attracts intense media attention because of fears that, once weaponised, it could have a much greater impact than the WannaCry ransomware attacks.
永恆之石病毒引起了媒體的密切關注,因爲大家擔心,一旦這種病毒被武器化,與勒索病毒發動時所產生的影響相比,這種病毒的影響可能要大的多。

Some security commentators have said EternalRocks appears to be designed to establish a launchpad for future attacks using the NSA exploits.
一些安全評論員表示,策劃永恆之石似乎是爲了建造一個發射臺,以便未來用美國國家安全局的網絡武器進行攻擊。

WannaCry之後又出更牛病毒,然而開發者慫了

The worm caused a stir in the wake of WannaCry because it uses seven of the exploits and attack tools developed by the NSA and leaked by the Shadow Brokers hacking group, including the two used by WannaCry.
緊隨勒索病毒而來的這種蠕蟲病毒引起了巨大的騷動,因爲它使用了由黑客組織“影子經紀人”所泄漏的、美國國家安全局開發的7種網絡武器和攻擊工具,其中有兩種還被勒索病毒使用過。

EternalRocks was discovered and named by Miroslav Stampar, a security researcher and member of the Croatian government’s computer emergency response team (Cert), who captured a sample of the worm in a Windows 7 honeypot he runs.
永恆之石是由米羅斯拉夫·斯丹姆帕發現並命名的,他是一名安全研究員,也是克羅地亞政府計算機緊急情況處理小組的成員,他在自己運行的Windows7誘捕系統中捕獲了這種病毒的一個樣本。

Stampar also reports that the code of EternalRocks has been updated so that it no longer downloads the Shadow Brokers exploit pack, but a dummy executable file instead.
斯丹姆帕還指出,永恆之石的代碼已被更新,所以不再下載影子經紀人泄漏的網絡武器工具包,而是下載一個虛擬的可執行文件。

“Well, it seems that I captured author’s worm in testing phase. It had great potential, though,” Stamper said. “Anyway, I suppose that he got scared because of all this fuzz and just dropped everything before being blamed for even something he didn’t do.”
“好吧,似乎我捕獲了這名開發者還在測試階段的病毒,雖然這個病毒有很大的潛力,”斯丹姆帕說道。“不過,我認爲因爲這場混亂,他害怕了,即使他什麼都沒做,他還是在大家指責他之前把一切都放棄了。”