精品国产_亚洲人成在线高清,国产精品成人久久久久,国语自产偷拍精品视频偷拍

首頁 500強 活動 榜單 商業 科技 領導力 專題 品牌中心
雜志訂閱

垃圾郵件太多,問題出在我們自己身上?

Robert Hackett
2017-09-05

如果你的收件箱塞滿了垃圾郵件,并不是偶然。

文本設置
小號
默認
大號
Plus(0條)

垃圾郵件制造者操縱大批被盜用的電腦和互聯網賬號,針對可能受害的人傳播惡意程序、釣魚軟件、竊取密碼的網頁、推銷假藥的廣告,以及發起社交工程攻擊。被病毒感染或者被黑的賬號每增加一個,暗黑產業就擴張一步。

最近,巴黎一位網名為Benkow的網絡安全研究人士發現,一個臭名昭著的垃圾郵件機器人攫取了多達40G的海量數據。用來發送垃圾郵件的計算機程序叫Onliner,存有7.11億個電郵地址和數百萬盜取的密碼,由此可一窺龐大的網絡犯罪如何利用分發渠道四處蔓延。

上周二科技網站ZDNet率先報道,Benkow查到了Onliner下達指令和控制的服務器,也即操縱垃圾郵件傳播活動的元兇。Benkow在Blogspot上發表博文解釋稱,服務器的目錄是開放的,所以他能下載其中所有數據。

隨后Benkow通知了另一位知名的網絡安全研究者特洛伊·亨特。亨特將信息上傳到聚合外泄數據網站haveibeenpwned.com。訪問該網站可以查看自己的個人電郵賬戶是否已遭泄露。(亨特自己的賬號也在列表中。)

據亨特分析,在Onliner操控的7.11億電郵地址中,有一些是無效的。他指出,所有他測試過的曝光密碼都是去年從社交網站LinkedIn盜出的。這意味著,垃圾郵件制造者在利用以前泄密的數據,也就是說如果用戶使用跟失竊賬戶相同的登陸信息,或者在個人信息泄露后麻痹大意忘記修改密碼,就會遭垃圾郵件傳播者利用。

在電郵中,殺毒軟件初創公司Cylance的高級研究科學家吉姆·沃爾特向《財富》雜志表示:“公開曝光之后數據泄露也沒有結束。泄密的數據會一直存在,黑客可以反復使用、出售、轉售,都是些見不得人的勾當?!?/p>

社交媒體安全初創公司ZeroFOX的首席數據科學家菲爾·徒利表示贊同。他在電郵中指出:“有些用戶比較懶,各處用的密碼都一樣或者極其相似,黑客就能輕易破解其他社交網絡、電郵、零售或者銀行賬戶,導致損失情況很復雜。”

溫馨提示:保障網絡賬戶安全,請用多種方式認證身份(比如安全鍵盤、生成隨機數字的應用或者手機短信驗證,這三種安全性依次降低)。在密碼管理應用上生成并存儲復雜又獨特的長串密碼。另外,可以訪問haveibeenpwned.com查看個人賬戶是否泄露。(如果已經泄露,最好趕緊更改登陸信息。)

“遺憾的是,就算從數據庫中發現信息泄露,也沒法搞清到底從哪里漏出去的,所以不知道該怎么防范,”亨特在個人博客中寫道,“我也不知道垃圾信息為什么找上我。身為從業者,我在日常工作中會接觸各種數據信息,原本應該比較了解 ,但研究一通之后我也只能感嘆一下‘啊,原來垃圾郵件是這樣發給我的。’”(財富中文網)

譯者:Pessy

審稿:夏林

Spammers use armies of compromised computers and online accounts to disseminate malware, phishing lures, password-stealing webpages, knockoff drug ads, and social engineering attacks to prospective victims. Every additional infection or hijacked account grows the shady enterprise.

A security researcher based in Paris who goes by the online alias "Benkow" recently stumbled across a treasure trove of data—40 gigabytes worth—related to a notorious spambot, a computer program used to send spam, dubbed "Onliner." The cache contains 711 email addresses and millions of hacked passwords, and it provides a glimpse inside the distribution channel of a vast cybercriminal operation.

In this case, "Benkow" uncovered the spambot's command and control server, the machine that orchestrates a spam campaign's activity, as ZDNet first reported on Tuesday. The server's directory was open, meaning he was able to download all the data therein contained, as he explained in a post on his personal Google (goog, +1.02%) Blogspot website.

Benkow tipped off another well-known security researcher, Troy Hunt, who subsequently uploaded the information to his data breach aggregation site, haveibeenpwned.com. You can visit the site to see whether credentials related to your own email account were included in the dump. (Hunt's were included.)

According to Hunt's analysis, some portion of the 711 million email addresses were malformed, or invalid. He noted that all of the exposed passwords he tested originally leaked in an earlier breach of LinkedIn, meaning that the spammers were reusing data from past breaches—allowing them to take advantage of people who reuse login credentials or neglect to change their passwords after their exposure in security breaches—to fuel their operation.

"Data breaches don’t end after the public disclosure," said Jim Walter, senior research scientist at Cylance, an antivirus startup, in an email to Fortune. "Leaked/breached data can continue to live on and be used, reused, sold, re-sold, etc. for purposes just as described here."

Phil Tully, principal data scientist at ZeroFOX, a social media security startup, concurred. "As users notoriously set identical or highly-similar passwords across different digital channels, attackers are able to use them to pivot to a victim’s other social, email, retail or banking accounts, compounding the initial damage," he said in an email.

Some advice: Secure your online accounts using multi-factor authentication (security keys, random number generating apps, or phone messages, in descending order of security). Generate and store long, complex, unique passwords in password manager apps. And check to see whether you've been compromised in haveibeenpwned.com. (If you have, best to switch up your login credentials.)

"Finding yourself in this data set unfortunately doesn't give you much insight into where your email address was obtained from nor what you can actually do about it," wrote Hunt in a blog post on his website. "I have no idea how this service got mine, but even for me with all the data I see doing what I do, there was still a moment where I went 'ah, this helps explain all the spam I get.'"

財富中文網所刊載內容之知識產權為財富媒體知識產權有限公司及/或相關權利人專屬所有或持有。未經許可,禁止進行轉載、摘編、復制及建立鏡像等任何使用。
0條Plus
精彩評論
評論

撰寫或查看更多評論

請打開財富Plus APP

前往打開

            主站蜘蛛池模板: 峡江县| 滦南县| 毕节市| 高唐县| 乌什县| 聂荣县| 通辽市| 贞丰县| 固镇县| 专栏| 台东县| 垦利县| 阿坝县| 高雄市| 黄平县| 繁峙县| 濉溪县| 桃园市| 兴城市| 兴山县| 台东市| 伊吾县| 新闻| 清水县| 吉木乃县| 无棣县| 长岭县| 长沙县| 讷河市| 德惠市| 福泉市| 峡江县| 江口县| 贵德县| 苍山县| 玉林市| 荥阳市| 开封市| 揭阳市| 上虞市| 满洲里市|