|
樓主 |
發表於 2017-7-2 14:03:13
|
顯示全部樓層
本帖最後由 jgyjgw 於 2017-7-2 14:11 編輯
Two cybersecurity outfits have publicly tied the NotPetya malware to hacking groups that many experts believe are linked to Russian intelligence operations.
Russian anti-virus company Kaspersky Lab has identified similarities between NotPetya and BlackEnergy, a sophisticated malware assumed to have been used in a series of cyberattacks on Ukrainian infrastructure in recent years.
“There are several parts of the code and strings that are shared,” said Vyacheslav Zakorzhevsky, the head of Kaspersky’s anti-virus research department, told The Associated Press on Saturday. “These families are connected.”
ESET, a Slovakian cybersecurity firm, said the cyberattacks did not come out of nowhere.
“This was not an isolated incident. This is the latest in a series of similar attacks in Ukraine,” ESET said in a Friday report.
ESET suggested the reason that countries other than Ukraine were affected was because the hackers had underestimated the power of the malware they had created and it spun out of control.
Major companies that reported being hit by NotPetya included Danish shipping giant A.P. Moller-Maersk, Russian state-owned oil behemoth Rosneft and FedEx subsidiary TNT. Most of the organizations hurt by the attack had resumed normal operation within 48 hours.
Ukraine has repeatedly accused Russia of sponsoring cyberattacks, including the hack of Ukraine’s voting system ahead of 2014 national election and an assault that knocked its power grid offline in 2015.
Relations between Russia and Ukraine collapsed when Moscow annexed Ukraine’s Crimean Peninsula in 2014 and began backing separatists fighting forces loyal to Kiev in eastern Ukraine. That fighting has left over 10,000 people dead since April 2014.
[註: FOX News 是美國極右保守党喉舌. 專長攪所謂 fake news 假野.] |
|