{"id":1217,"date":"2024-09-22T10:57:59","date_gmt":"2024-09-22T02:57:59","guid":{"rendered":"https:\/\/www.kafeizha.com\/?p=1217"},"modified":"2024-09-22T10:57:59","modified_gmt":"2024-09-22T02:57:59","slug":"%e7%be%8e%e5%9b%bdfbi%e7%a7%b0%e5%b7%b2%e4%b8%ad%e6%96%ad%e9%92%88%e5%af%b9%e7%be%8e%e5%9b%bd%e5%85%b3%e9%94%ae%e5%9f%ba%e7%a1%80%e8%ae%be%e6%96%bd%e7%9a%84%e9%87%8d%e5%a4%a7%e4%b8%ad%e5%9b%bd","status":"publish","type":"post","link":"https:\/\/news.tomjun.com\/?p=1217","title":{"rendered":"\u7f8e\u56fdFBI\u79f0\u5df2\u4e2d\u65ad\u9488\u5bf9\u7f8e\u56fd\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u7684\u91cd\u5927\u4e2d\u56fd\u9ed1\u5ba2\u884c\u52a8"},"content":{"rendered":"<p><b>\u65b0\u95fb\u6765\u6e90\uff1a<\/b>www.cnn.com<br \/> <b>\u539f\u6587\u5730\u5740\uff1a<\/b><font size=\"-1\"><a href=\"https:\/\/www.cnn.com\/2024\/09\/18\/politics\/fbi-chinese-hacking\/index.html target=\"_blank\">FBI says it has disrupted major Chinese hacking operation that threatened US critical infrastructure<\/a><\/font><br \/> <b>\u65b0\u95fb\u65e5\u671f\uff1a<\/b>2024-09-18<\/p>\n<p> \u7f8e\u56fd\u8054\u90a6\u8c03\u67e5\u5c40\uff08FBI\uff09\u901a\u8fc7\u6cd5\u5ead\u547d\u4ee4\u5df2\u6210\u529f\u63a7\u5236\u4e86\u4e00\u5f20\u7531\u6570\u5341\u4e07\u53f0\u88ab\u9ed1\u5ba2\u5165\u4fb5\u7684\u4e92\u8054\u7f51\u8def\u7531\u5668\u548c\u5176\u4ed6\u8bbe\u5907\u7ec4\u6210\u7684\u7f51\u7edc\uff0c\u8fd9\u4e9b\u8bbe\u5907\u6b63\u88ab\u4e2d\u56fd\u653f\u5e9c\u652f\u6301\u7684\u9ed1\u5ba2\u7528\u6765\u5a01\u80c1\u7f8e\u56fd\u53ca\u6d77\u5916\u7684\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002\u8fd9\u662fFBI\u5c40\u957f\u514b\u91cc\u65af\u6258\u5f17\u00b7\u96f7\u4f0a\u5728\u534e\u76db\u987fDC\u7684\u4e00\u573a\u5173\u4e8e\u7f51\u7edc\u5b89\u5168\u5cf0\u4f1a\u4e0a\u7684\u8bf4\u6cd5\u3002\u201c\u8fd9\u53ea\u662f\u6f2b\u957f\u6218\u6597\u4e2d\u7684\u4e00\u4e2a\u73af\u8282\u3002\u201d\u4ed6\u8bf4\uff0c\u201c\u4e2d\u56fd\u653f\u5e9c\u5c06\u7ee7\u7eed\u653b\u51fb\u5404\u7ec4\u7ec7\u548c\u6211\u4eec\u7684\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u3002\u201d<\/p>\n<p>\u6839\u636e\u7f8e\u56fd\u5b98\u5458\u7684\u8bf4\u6cd5\uff0c\u8fd9\u4e2a\u5e9e\u5927\u7684\u9ed1\u5ba2\u7f51\u7edc\u5df2\u7ecf\u5b58\u5728\u591a\u6708\u3002\u5b83\u66fe\u5728\u4eca\u5e746\u6708\u5305\u62ec\u6765\u81ea\u5317\u7f8e\u3001\u5357\u7f8e\u4e43\u81f3\u6fb3\u5927\u5229\u4e9a\u7684\u8d85\u8fc726\u4e07\u53f0\u88ab\u5165\u4fb5\u8bbe\u5907\u3002\u96f7\u4f0a\u8868\u793a\uff0c\u5728\u8fd9\u4e9b\u8bbe\u5907\u4e2d\uff0c\u7ea6\u6709\u4e00\u534a\u4f4d\u4e8e\u7f8e\u56fd\u5883\u5185\u3002<\/p>\n<p>\u4e2d\u56fd\u9a7b\u534e\u76db\u987f\u5927\u4f7f\u9986\u7684\u4e00\u540d\u53d1\u8a00\u4eba\u79f0\uff0c\u7f8e\u56fd\u65b9\u9762\u7684\u6307\u63a7\u201c\u6beb\u65e0\u6839\u636e\u201d\uff0c\u5e76\u6307\u8d23\u7f8e\u56fd\u653f\u5e9c\u5bf9\u4e2d\u56fd\u8fdb\u884c\u7f51\u7edc\u653b\u51fb\u3002\u8fd9\u662f\u4e2d\u7f8e\u4e24\u56fd\u5728\u7f51\u7edc\u7a7a\u95f4\u5173\u7cfb\u7d27\u5f20\u65f6\u7684\u6700\u65b0\u4e00\u6b21\u9488\u950b\u76f8\u5bf9\u3002<\/p>\n<p>\u53bb\u5e7412\u6708\u5e95\uff0c\u8fd9\u4e2a\u9ed1\u5ba2\u7f51\u7edc\u66fe\u5bf9\u7f8e\u56fd\u519b\u4e8b\u53ca\u5176\u4ed6\u653f\u5e9c\u90e8\u95e8\u8fdb\u884c\u4e86\u5e7f\u6cdb\u7684\u626b\u63cf\u3002\u636e\u7f8e\u56fd\u79d1\u6280\u516c\u53f8Lumen Technologies\u79f0\uff0c\u5f53\u65f6\u5176\u6b63\u5728\u8c03\u67e5\u8be5\u6d3b\u52a8\u7684\u60c5\u51b5\u3002<\/p>\n<p>\u96f7\u4f0a\u8bf4\uff0c\u8fd9\u4e2a\u88abFBI\u548c\u76df\u53cb\u63a7\u5236\u7684\u7f51\u7edc\u9020\u6210\u4e86\u201c\u5168\u516c\u53f8\u52a8\u5458\u201d\u7684\u7f51\u7edc\u5b89\u5168\u4e8b\u4ef6\uff0c\u5e76\u7ed9\u4e00\u5bb6\u672a\u547d\u540d\u7684\u52a0\u5dde\u7ec4\u7ec7\u5e26\u6765\u4e86\u201c\u91cd\u5927\u7ecf\u6d4e\u635f\u5931\u201d\u3002<\/p>\n<p>\u4e0d\u8fc7\uff0c\u8fd9\u6b21\u7834\u574f\u4e3b\u8981\u662f\u5173\u4e8e\u8be5\u7f51\u7edc\u53ef\u80fd\u505a\u7684\u548c\u5b9e\u9645\u505a\u4e86\u7684\u533a\u522b\u3002\u636e\u4e13\u5bb6\u5206\u6790\uff0c\u8fd9\u4e2a\u7531\u201c\u50f5\u5c38\u201d\u8ba1\u7b97\u673a\u7ec4\u6210\u7684\u519b\u961f\u5df2\u7ecf\u5bf9\u7f8e\u56fd\u653f\u5e9c\u7f51\u7edc\u6784\u6210\u4e86\u4e00\u4e2a\u6301\u7eed\u7684\u5a01\u80c1\u3002<\/p>\n<p>\u4eca\u5e741\u6708\uff0c\u96f7\u4f0a\u66fe\u5411\u56fd\u4f1a\u8868\u793a\uff0c\u53e6\u4e00\u652f\u4e2d\u56fd\u652f\u6301\u7684\u9ed1\u5ba2\u90e8\u961f\u6b63\u6f5c\u4f0f\u5728\u7f8e\u56fd\u7684\u4ea4\u901a\u548c\u901a\u4fe1\u7f51\u7edc\u4e2d\uff0c\u51c6\u5907\u5229\u7528\u5176\u8bbf\u95ee\u6743\u6270\u4e71\u4efb\u4f55\u9488\u5bf9\u53f0\u6e7e\u53ef\u80fd\u9762\u4e34\u7684\u4e2d\u56fd\u5165\u4fb5\u7684\u7f8e\u56fd\u53cd\u5e94\u3002\u4ed6\u5f53\u65f6\u79f0\u8fd9\u652f\u90e8\u961f\u5c06\u201c\u7ed9\u7f8e\u56fd\u5e26\u6765\u6df7\u4e71\uff0c\u5e76\u9020\u6210\u73b0\u5b9e\u4f24\u5bb3\u201d\u3002<\/p>\n<p>Lumen\u7814\u7a76\u4eba\u5458\u6307\u51fa\uff0c\u8fd9\u4e2a\u4e2d\u56fd\u7684\u9ed1\u5ba2\u7f51\u7edc\u5177\u5907\u5b9a\u5236\u5316\u7684\u653b\u51fb\u80fd\u529b\u3002\u4f46\u76ee\u524d\u5c1a\u65e0\u8ff9\u8c61\u8868\u660e\u4e2d\u56fd\u9ed1\u5ba2\u4f1a\u91cd\u65b0\u542f\u52a8\u8be5\u7f51\u7edc\u3002<\/p>\n<p>\u636eFBI\u8868\u793a\uff0c\u53bb\u5e742\u6708\uff0c\u4ed6\u4eec\u5df2\u6210\u529f\u7834\u574f\u4e86\u4fc4\u7f57\u65af\u519b\u4e8b\u60c5\u62a5\u673a\u6784\u7528\u4ee5\u5bf9\u7f8e\u56fd\u53ca\u5176\u6b27\u6d32\u76df\u53cb\u5b9e\u65bd\u7f51\u7edc\u95f4\u8c0d\u6d3b\u52a8\u7684\u4e00\u5f20\u5305\u542b1000\u591a\u53f0\u88ab\u5165\u4fb5\u4e92\u8054\u7f51\u8def\u7531\u5668\u7684\u7f51\u7edc\u3002<\/p>\n<p>\u4eca\u5e749\u670818\u65e5\uff0c\u7531\u4e8e\u6267\u6cd5\u90e8\u95e8\u7684\u52aa\u529b\u548c\u201cnull routing\u201d\u7684\u4f5c\u7528\uff0c\u8fd9\u4e2a\u4e2d\u56fd\u9ed1\u5ba2\u7f51\u7edc\u5df2\u88ab\u505c\u8fd0\u3002\u201cnull routing\u201d\u662f\u4e92\u8054\u7f51\u6280\u672f\u63d0\u4f9b\u5546\u7528\u6765\u963b\u6b62\u6570\u636e\u53d1\u9001\u5230\u7279\u5b9aIP\u5730\u5740\u7684\u4e00\u79cd\u65b9\u6cd5\u3002\u636eFBI\u7684\u8bf4\u6cd5\uff0c\u8fc7\u53bb\u4e09\u5e74\u91cc\uff0c\u4e00\u5bb6\u540d\u4e3aIntegrity Technology Group\u7684\u4e2d\u56fd\u4f01\u4e1a\u7ba1\u7406\u7740\u8fd9\u5f20\u7f51\u7edc\u3002\u76ee\u524d\uff0cCNN\u5df2\u8bf7\u6c42\u8be5\u516c\u53f8\u5bf9\u6b64\u53d1\u8868\u8bc4\u8bba\u3002<\/p>\n<p>\u5b89\u5168\u54a8\u8be2\u516c\u53f8SentinelOne\u7684\u7814\u7a76\u5458Dakota Cary\u8868\u793a\uff0c\u8fd9\u5bb6\u4e2d\u56fd\u79d1\u6280\u516c\u53f8\u201c\u53c2\u4e0e\u4e86\u8bb8\u591a\u4e2d\u56fd\u6700\u91cd\u8981\u7684\u9879\u76ee\uff0c\u5e76\u81f4\u529b\u4e8e\u63d0\u5347\u5176\u9ed1\u5ba2\u80fd\u529b\u201d\u3002\u4ed6\u6307\u51fa\uff0c\u547d\u540d\u8be5\u516c\u53f8\u7684\u610f\u4e49\u5728\u4e8e\u5c55\u793a\u4e86\u76df\u56fd\u653f\u5e9c\u5bf9\u4e2d\u56fd\u64cd\u4f5c\u7684\u80fd\u89c1\u5ea6\uff0c\u4e5f\u6709\u52a9\u4e8e\u7814\u7a76\u4eba\u5458\u8fdb\u4e00\u6b65\u4e86\u89e3\u8fd9\u5bb6\u516c\u53f8\u3002 <\/p>\n<hr>\n<p> <b>\u539f\u6587\u6458\u8981\uff1a<\/b><\/p>\n<p> The FBI has used a court order to seize control of a network of hundreds of thousands of hacked internet routers and other devices that Chinese government-linked hackers were using to threaten critical infrastructure in the US and overseas, FBI Director Christopher Wray said Wednesday. \u201cIt is just one round in a much longer fight,\u201d Wray said in a speech at the Aspen Cyber Summit in Washington, DC. \u201cThe Chinese government is going to continue to target your organizations and our critical infrastructure.\u201d The massive web of hacked devices \u2014\u00a0known as a botnet \u2014\u00a0was a menace that the Chinese hackers could have used to conduct targeted cyberattacks on US companies or government agencies, according to an\u00a0advisory\u00a0released by the US and its \u201cFive Eyes\u201d allies (the English-speaking alliance that includes Australia, Canada, New Zealand and the United Kingdom). As of June, the botnet included over 260,000 hacked devices from all over the world, from North and South America to Australia, according to US officials. Those hacked devices ranged from webcams to DVRs to routers, and about half of them were located in the US, according to Wray. A spokesperson for the Chinese Embassy in Washington called the US allegations \u201cgroundless\u201d and accused the US government of conducting cyberattacks against China. It\u2019s the latest tit-for-tat in the often-tense relations between US and China in cyberspace. The US government has long warned that another Chinese government-backed hacking group has been lurking in US transportation and communication networks, waiting to use that access to disrupt any US response to a potential Chinese invasion of Taiwan. That Chinese hacking unit is preparing to \u201cwreak havoc and cause real-world harm\u201d to the US, Wray\u00a0told Congress\u00a0in January. A tool of choice The botnet targeted by the FBI and its allies on Wednesday was an active menace, Wray said in his speech. The botnet caused \u201can all-hands-on deck cybersecurity incident\u201d for one unnamed California-based organization, causing \u201csignificant financial loss,\u201d the FBI director said. But Wednesday\u2019s takedown was more about what the botnet could have done than what it did. The army of zombie computers has been a quiet and looming threat to US government networks for many months, according to experts. In late December 2023, the botnet\u2019s operators \u201cconducted extensive scanning efforts\u201d of US military and other government agencies,\u00a0according\u00a0to US tech firm Lumen Technologies, which investigated the activity. Botnets are a tool of choice for both cybercriminals and state-backed hackers because users around the world are often unaware that their computers have been hijacked for scamming or espionage. The FBI\u00a0said in February\u00a0that it had helped disrupt a network of over 1,000 hacked internet routers that Russia\u2019s military intelligence agency was allegedly using for cyber espionage\u00a0operations against the United States and its European allies. The Chinese botnet targeted on Wednesday had an array of capabilities, including the ability to conducted tailored cyberattacks using the devices it had compromised, according to Lumen researchers. Lumen researchers are watching for signs that the Chinese hackers will resurrect the botnet. But for now, \u201cwe assess that the botnet has been taken offline due to a combination of law enforcement efforts and null routing as of September 18,\u201d Danny Adamitis, principle information security engineer at Lumen\u2019s Black Lotus Labs threat intelligence division, told CNN. Null routing is a process that internet technology providers can use to stop data from being sent to a specific IP address. A Chinese company named Integrity Technology Group managed the botnet for the last three years, according to US officials. CNN has requested comment from the company. The Chinese tech firm is \u201cinvolved in many of China\u2019s most important programs and efforts to improve its hacking capabilities,\u201d Dakota Cary, a consultant at security firm SentinelOne who focuses on China,\u00a0told CNN. \u201cThe naming of the company is significant as it demonstrates allied governments\u2019 visibility into China\u2019s operations, as well as enabling researchers to further investigate the company.\u201d<\/p>\n<div style=\"margin: 20px 0;\"><div class=\"qrcswholewtapper\" style=\"text-align:left;\"><div class=\"qrcprowrapper\"  id=\"qrcwraa2leds\"><div class=\"qrc_canvass\" id=\"qrc_cuttenpages_2\" style=\"display:inline-block\" data-text=\"https:\/\/news.tomjun.com\/?p=1217\"><\/div><div><a download=\"\u7f8e\u56fdFBI\u79f0\u5df2\u4e2d\u65ad\u9488\u5bf9\u7f8e\u56fd\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u7684\u91cd\u5927\u4e2d\u56fd\u9ed1\u5ba2\u884c\u52a8.png\" class=\"qrcdownloads\" id=\"worign\">\r\n           <button type=\"button\" style=\"min-width:200px;background:#44d813;color:#000;font-weight: 600;border: 1px solid #44d813;border-radius:20px;font-size:12px;padding: 6px 0;\" class=\"uqr_code_btn\">\u6587\u7ae0\u4e8c\u7ef4\u7801<\/button>\r\n           <\/a><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u65b0\u95fb\u6765\u6e90\uff1awww.cnn.com \u539f\u6587\u5730\u5740\uff1a<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[69],"tags":[1013,2019,2018,2020,2017],"class_list":["post-1217","post","type-post","status-publish","format-standard","hentry","category-69","tag-fbi","tag-2019","tag-2018","tag-2020","tag-2017"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1217"}],"version-history":[{"count":1,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1217\/revisions"}],"predecessor-version":[{"id":1218,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1217\/revisions\/1218"}],"wp:attachment":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}