全球各地的超級電腦( Supercomputers )現時正受到網絡攻擊,網絡安全公司ESET發現一隻名為 Kobalos 的Linux惡意軟件,正通過竊取SSH credentials入侵檔案系統,由於政府反不少學術機構都會借助超級電腦的運算力進行分析及研究,所以這次入侵便極有可能是間碟活動。u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright U4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright
根據ESET安全專家的分析,Kobalos的影響範圍極廣,包括美洲、歐洲及亞洲,而涉事機構更有政府、大學及亞洲的電訊商。這款以希臘神話中愛惡作劇的動物取名的惡意軟件,只是一個容量極少的木馬版OpenSSH軟件,但就具備在Linux系統上執行惡意程式碼,記錄目標機構的帳戶登入資料,再加密傳送至網絡犯罪組織手上,讓他們有權限進入檔案系統,竊取內裏的重要數據。U4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright
專家通過對捕獲的惡意軟件樣本進行逆向工程分析,為Kobalos製作出獨有的攻擊模式「指紋」後,便掃描網絡搜尋已被入侵的電腦裝置,指出雖然Kobalos主要是針對超級電腦發動攻擊,但亦有涉及私人伺服器。雖然找出了不少被入侵的裝置,不過ESET安全專家坦然亦未能發現這次攻擊與任何網絡犯罪組織有關聯,而且目的亦不詳,例如過往有一些挖礦(cryptomining)惡意軟件便旨在借用其超級運算力賺取加密貨幣,但Kobalos則未有相關活動。U4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright
按此看:歐盟藥廠被入侵 新冠疫苗數據遭惡意刪改 Supercomputers Kobalos
最後,專家指出Kobalos的入侵功能雖然非常複雜,而且擁有自我加密及混淆程式碼的能力,但整個軟件只得24KB大小,證明開發者的Linux編程技術非常高超,與一般的Linux惡意軟件開發者顯著不同。相信專家必須掌握更多證據,才有可能找出幕後黑手。 U4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright
詳情:http://bit.ly/3oJPbBp U4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright U4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright u4get copyright