{"id":1221,"date":"2024-09-22T10:59:18","date_gmt":"2024-09-22T02:59:18","guid":{"rendered":"https:\/\/www.kafeizha.com\/?p=1221"},"modified":"2024-09-22T10:59:18","modified_gmt":"2024-09-22T02:59:18","slug":"%e7%be%8e%e5%9b%bd%e5%8f%b8%e6%b3%95%e9%83%a8%e4%b8%ad%e6%96%ad%e4%b8%ad%e5%9b%bd%e5%a4%a7%e8%a7%84%e6%a8%a1%e9%bb%91%e5%ae%a2%e8%a1%8c%e5%8a%a8%ef%bc%8c%e6%84%9f%e6%9f%93%e5%a4%9a%e7%a7%8d%e6%b6%88","status":"publish","type":"post","link":"https:\/\/news.tomjun.com\/?p=1221","title":{"rendered":"\u7f8e\u56fd\u53f8\u6cd5\u90e8\u4e2d\u65ad\u4e2d\u56fd\u5927\u89c4\u6a21\u9ed1\u5ba2\u884c\u52a8\uff0c\u611f\u67d3\u591a\u79cd\u6d88\u8d39\u8bbe\u5907"},"content":{"rendered":"<p><b>\u65b0\u95fb\u6765\u6e90\uff1a<\/b>www.abcnews.go.com<br \/> <b>\u539f\u6587\u5730\u5740\uff1a<\/b><font size=\"-1\"><a href=\"https:\/\/abcnews.go.com\/Technology\/wireStory\/fbi-disrupts-chinese-cyber-operation-targeting-critical-infrastructure-113810486 target=\"_blank\">Justice Department disrupts vast Chinese hacking operation that infected consumer devices<\/a><\/font><br \/> <b>\u65b0\u95fb\u65e5\u671f\uff1a<\/b>2024-09-18<\/p>\n<p> \u7f8e\u56fd\u8054\u90a6\u8c03\u67e5\u5c40(FBI)\u6628\u65e5\u5ba3\u5e03\uff0c\u5df2\u6253\u65ad\u4e00\u4e2a\u4e2d\u56fd\u653f\u5e9c\u6307\u6325\u7684\u9ed1\u5ba2\u56e2\u961f\u300cFlax Typhoon\u300d\u7684\u6d3b\u52a8\uff0c\u8be5\u56e2\u961f\u9488\u5bf9\u7684\u76ee\u6807\u5305\u62ec\u5927\u5b66\u3001\u653f\u5e9c\u673a\u6784\u548c\u5176\u4ed6\u7ec4\u7ec7\u3002<\/p>\n<p>\u8be5\u9ed1\u5ba2\u56e2\u961f\u5728\u8d85\u8fc720\u4e07\u53f0\u6d88\u8d39\u8bbe\u5907\u4e0a\u5b89\u88c5\u4e86\u6076\u610f\u8f6f\u4ef6\uff0c\u8fd9\u4e9b\u8bbe\u5907\u5305\u62ec\u6444\u50cf\u5934\u3001\u89c6\u9891\u5f55\u50cf\u673a\u548c\u5bb6\u5ead\u53ca\u529e\u516c\u5ba4\u8def\u7531\u5668\uff0c\u5f62\u6210\u4e86\u5e9e\u5927\u7684\u300c\u50f5\u5c38\u7f51\u7edc\u300d\u3002\u8fd9\u4e00\u300c\u50f5\u5c38\u7f51\u7edc\u300d\u7528\u4e8e\u5b9e\u65bd\u7f51\u7edc\u72af\u7f6a\uff0c\u5982\u7a83\u53d6\u654f\u611f\u4fe1\u606f\u3002<\/p>\n<p>FBI\u5c40\u957f\u514b\u91cc\u65af\u00b7\u97e6\u745e\u8bf4\uff1a\u300cFlax Typhoon\u7684\u6d3b\u52a8\u7ed9\u53d7\u5bb3\u8005\u5e26\u6765\u4e86\u5b9e\u9645\u635f\u5bb3\uff0c\u4ed6\u4eec\u9700\u8981\u82b1\u8d39\u5b9d\u8d35\u65f6\u95f4\u6e05\u7406\u95ee\u9898\u3002\u300d<\/p>\n<p>\u7f8e\u56fd\u53f8\u6cd5\u90e8\u548cFBI\u672a\u900f\u9732\u5177\u4f53\u76ee\u6807\u540d\u79f0\uff0c\u4f46\u79f0\u5305\u62ec\u5927\u5b66\u3001\u653f\u5e9c\u673a\u6784\u3001\u901a\u8baf\u670d\u52a1\u5546\u3001\u5a92\u4f53\u7ec4\u7ec7\u53ca\u975e\u653f\u5e9c\u7ec4\u7ec7\u3002<\/p>\n<p>\u7f8e\u56fd\u8054\u90a6\u8c03\u67e5\u5c40\u5c40\u957f\u514b\u91cc\u65af\u00b7\u97e6\u745e\u8b66\u544a\uff1a\u300c\u4e2d\u56fd\u653f\u5e9c\u5c06\u7ee7\u7eed\u653b\u51fb\u6211\u4eec\u7684\u7ec4\u7ec7\u548c\u5173\u952e\u57fa\u7840\u8bbe\u65bd\uff0c\u6211\u4eec\u5c06\u4f1a\u4e0e\u5408\u4f5c\u4f19\u4f34\u4e00\u8d77\uff0c\u8bc6\u522b\u4ed6\u4eec\u7684\u6076\u610f\u6d3b\u52a8\u3001\u6253\u65ad\u4ed6\u4eec\u7684\u9ed1\u5ba2\u884c\u52a8\uff0c\u5e76\u5c06\u8fd9\u4e9b\u4fe1\u606f\u516c\u4e4b\u4e8e\u4f17\u3002\u300d<\/p>\n<p>\u300cFlax Typhoon\u300d\u57282023\u5e748\u6708\u88ab\u5fae\u8f6f\u62a5\u544a\u63d0\u53ca\uff0c\u8be5\u56e2\u961f\u5df2\u7ecf\u5f00\u59cb\u9488\u5bf9\u53f0\u6e7e\u673a\u6784\u53ca\u5176\u4ed6\u56fd\u5bb6\u7684\u653f\u5e9c\u673a\u6784\u3002<\/p>\n<p>\u97e6\u745e\u5c40\u957f\u6628\u65e5\u900f\u9732\uff0c\u6b64\u6b21\u662f\u4eca\u5e74\u7b2c\u4e8c\u6b21\u5bf9\u4e2d\u56fd\u9ed1\u5ba2\u56e2\u961f\u7684\u6253\u65ad\u884c\u52a8\uff0c\u6b64\u524d\u4e00\u6b21\u662f\u5728\u4ed6\u5728\u56fd\u4f1a\u4f1a\u8bae\u4e0a\u62ab\u9732\u7684\u300cVolt Typhoon\u300d\u6d3b\u52a8\u3002 <\/p>\n<hr>\n<p> <b>\u539f\u6587\u6458\u8981\uff1a<\/b><\/p>\n<p> The FBI has disrupted a group of hackers working at the direction of the Chinese government who targeted universities, government agencies and other organizations, Director Chris Wray said Wednesday.<br \/>\nThe hacking campaign known as Flax Typhoon installed malicious software on more than 200,000 consumer devices, including cameras, video recorders and home and office routers, to create a massive botnet \u2014 a network of infected computers. The botnet was used to facilitate cyber crimes, such as the theft of sensitive information from victims&#8217; networks.<br \/>\n\u201cFlax Typhoon\u2019s actions caused real harm to its victims, who had to devote precious time to clean up the mess when they discovered the malware,\u201d Wray said at the Aspen Cyber Summit.<br \/>\nSpeaking at the same conference, Deputy Attorney General Lisa Monaco said the average citizen should care because the case involves \u201ccriminal activity, disruptive activity going on in potentially their devices. And, and it is part of a broader ecosystem that malicious cyber actors are using.\u201d<br \/>\nThe FBI and Justice Department, which obtained a warrant to seize the botnet&#8217;s infrastructure, did not identify any of the targets by name but said they included universities, government agencies, telecommunications providers, media organizations and nongovernmental organizations. Half of the hijacked devices were located in the U.S., Wray said.<br \/>\n\u201cThis was another successful disruption, but make no mistake \u2014 it\u2019s just one round in a much longer fight,\u201d Wray said. \u201cThe Chinese government is going to continue to target your organizations and our critical infrastructure, either by their own hand or concealed through their proxies, and we\u2019ll continue to work with our partners to identify their malicious activity, disrupt their hacking campaigns, and bring them to light.\u201d<br \/>\nFlax Typhoon was described in a Microsoft report in August 2023 that said the group had stepped up its targeting of Taiwanese organizations as well as government agencies in other countries.<br \/>\nThe disruption was revealed nine months after Wray disclosed to Congress a separate takedown of a Chinese state-sponsored hacking group known as Volt Typhoon, in which U.S.-based small office and home routers owned by private citizens and companies were hijacked by hackers to cover their tracks as they sowed the malware. Their ultimate targets included water treatment plants, the electrical grid and transportation systems across the U.S.<br \/><\/p>\n<div style=\"margin: 20px 0;\"><div class=\"qrcswholewtapper\" style=\"text-align:left;\"><div class=\"qrcprowrapper\"  id=\"qrcwraa2leds\"><div class=\"qrc_canvass\" id=\"qrc_cuttenpages_2\" style=\"display:inline-block\" data-text=\"https:\/\/news.tomjun.com\/?p=1221\"><\/div><div><a download=\"\u7f8e\u56fd\u53f8\u6cd5\u90e8\u4e2d\u65ad\u4e2d\u56fd\u5927\u89c4\u6a21\u9ed1\u5ba2\u884c\u52a8\uff0c\u611f\u67d3\u591a\u79cd\u6d88\u8d39\u8bbe\u5907.png\" class=\"qrcdownloads\" id=\"worign\">\r\n           <button type=\"button\" style=\"min-width:200px;background:#44d813;color:#000;font-weight: 600;border: 1px solid #44d813;border-radius:20px;font-size:12px;padding: 6px 0;\" class=\"uqr_code_btn\">\u6587\u7ae0\u4e8c\u7ef4\u7801<\/button>\r\n           <\/a><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u65b0\u95fb\u6765\u6e90\uff1awww.abcnews.go.com \u539f\u6587\u5730\u5740\uff1a<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[110],"tags":[1013,2010,407,2025,2024],"class_list":["post-1221","post","type-post","status-publish","format-standard","hentry","category-110","tag-fbi","tag-flax-typhoon","tag-407","tag-2025","tag-2024"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1221"}],"version-history":[{"count":1,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1221\/revisions"}],"predecessor-version":[{"id":1222,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1221\/revisions\/1222"}],"wp:attachment":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}