{"id":10662,"date":"2020-02-04T18:32:18","date_gmt":"2020-02-04T10:32:18","guid":{"rendered":"https:\/\/www.kaspersky.com.cn\/blog\/?p=10662"},"modified":"2020-11-09T19:50:21","modified_gmt":"2020-11-09T11:50:21","slug":"coronavirus-used-to-spread-malware-online","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/coronavirus-used-to-spread-malware-online\/10662\/","title":{"rendered":"\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u5229\u7528\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u4f20\u64ad\u6076\u610f\u8f6f\u4ef6"},"content":{"rendered":"<p>\u6700\u65b0\u7814\u7a76\u53d1\u73b0\uff0c\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u5229\u7528\u5927\u4f17\u5bf9\u611f\u67d3\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u7684\u6050\u60e7\u8fdb\u884c\u6076\u610f\u6d3b\u52a8\uff0c\u5c06\u6076\u610f\u8f6f\u5c06\u4f2a\u88c5\u6210\u4ee5\u6559\u80b2\u548c\u6307\u5bfc\u4e3a\u76ee\u7684\u7684\u6587\u4ef6\u3002<\/p>\n<p>\u5361\u5df4\u65af\u57fa\u6280\u672f\u56e2\u961f\u5df2\u7ecf\u53d1\u73b0\u6709\u6076\u610fpdf\u6587\u4ef6\u3001mp4\u89c6\u9891\u6587\u4ef6\u4ee5\u53cadoc\u6587\u6863\u88ab\u4f2a\u88c5\u6210\u4e0e\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u76f8\u5173\u7684\u6587\u4ef6\u3002\u6587\u4ef6\u540d\u4e2d\u901a\u5e38\u6697\u793a\u6587\u4ef6\u5185\u5bb9\u4e0e\u75c5\u6bd2\u9632\u62a4\u63aa\u65bd\u3001\u76ee\u524d\u7684\u75c5\u6bd2\u5a01\u80c1\u53d1\u5c55\u60c5\u51b5\u3001\u751a\u81f3\u662f\u75c5\u6bd2\u68c0\u6d4b\u6280\u672f\u76f8\u5173\u3002<\/p>\n<p>\u4f46\u5b9e\u9645\u4e0a\uff0c\u8fd9\u4e9b\u6587\u4ef6\u4e2d\u5305\u542b\u4e86\u5927\u91cf\u7684\u6076\u610f\u8f6f\u4ef6\u6837\u672c\uff0c\u5305\u62ec\u80fd\u591f\u7834\u574f\u6216\u52a0\u5bc6\u6570\u636e\u7684\u6728\u9a6c\u548c\u8815\u866b\u75c5\u6bd2\u7b49\u3002<\/p>\n<p>\u6211\u4eec\u7684\u6076\u610f\u8f6f\u4ef6\u5206\u6790\u5e08Anton Ivanov\u8ba4\u4e3a\uff1a<\/p>\n<p><i>\u201c\u76ee\u524d\u5728\u5404\u5927\u5a92\u4f53\u5e73\u53f0\u4e0a\u90fd\u6709\u5927\u91cf\u4e0e\u672c\u6b21\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u76f8\u5173\u7684\u6fc0\u70c8\u8ba8\u8bba\uff0c\u7f51\u7edc\u72af\u7f6a\u4efd\u5b50\u5229\u7528\u4e86\u4eba\u4eec\u7684\u5173\u6ce8\u5ea6\uff0c\u4ee5\u6b64\u4e3a\u8bf1\u9975\u4f20\u64ad\u5206\u53d1\u6076\u610f\u8f6f\u4ef6\u3002\u622a\u6b62\u76ee\u524d\u4e3a\u6b62\uff0c\u6211\u4eec\u4ec5\u786e\u8ba4\u4e8610\u4e2a\u4e0e\u672c\u6b21\u65f6\u95f4\u76f8\u5173\u7684\u6587\u4ef6\uff0c\u4f46\u6839\u636e\u70ed\u95e8\u5a92\u4f53\u6d3b\u52a8\u53d1\u8d77\u7684\u8fd9\u79cd\u7c7b\u578b\u6d3b\u52a8\u5341\u5206\u5e38\u89c1\uff0c\u5728\u63a5\u4e0b\u6765\u7684\u8fd9\u6bb5\u65f6\u95f4\u5185\uff0c\u8fd9\u4e2a\u6570\u5b57\u8fd8\u5c06\u4e0d\u65ad\u589e\u957f\u3002\u5f53\u4eba\u4eec\u6301\u7eed\u62c5\u5fc3\u81ea\u8eab\u7684\u5065\u5eb7\u95ee\u9898\u65f6\uff0c\u4ee5\u5e2e\u52a9\u4eba\u4eec\u4e86\u89e3\u51a0\u72b6\u75c5\u6bd2\u7684\u540d\u4e49\u5206\u53d1\u7684\u865a\u5047\u6587\u6863\u4e5f\u5728\u540c\u6b65\u4f20\u64ad\u66f4\u591a\u7684\u6076\u610f\u8f6f\u4ef6\u3002\u201d<\/i><\/p>\n<p>\u5361\u5df4\u65af\u57fa\u4ea7\u54c1\u76ee\u524d\u68c0\u6d4b\u5230\u4e0e\u672c\u6b21\u51a0\u72b6\u75c5\u6bd2\u76f8\u5173\u7684\u6076\u610f\u6587\u4ef6\u540d\u79f0\u5982\u4e0b\uff1a<\/p>\n<ul>\n<li>Worm.VBS.Dinihou.r<\/li>\n<li>Worm.Python.Agent.c <\/li>\n<li>UDS: DangerousObject.Multi.Generic<\/li>\n<li>Trojan.WinLNK.Agent.gg<\/li>\n<li>Trojan.WinLNK.Agent.ew <\/li>\n<li>HEUR: Trojan.WinLNK.Agent.gen <\/li>\n<li>HEUR: Trojan.PDF.Badur.b<\/li>\n<\/ul>\n<p>\u5173\u4e8e\u5982\u4f55\u4fdd\u62a4\u81ea\u5df1\u514d\u53d7\u6709\u5bb3\u5185\u5bb9\u4fb5\u5bb3\uff0c\u5361\u5df4\u65af\u57fa\u5efa\u8bae\uff1a<\/p>\n<ul>\n<li>\u4e0d\u8981\u6253\u5f00\u627f\u8bfa\u63d0\u4f9b\u72ec\u5bb6\u4fe1\u606f\u7684\u53ef\u7591\u94fe\u63a5\uff0c\u4ece\u5b98\u65b9\u4ee5\u53ca\u5176\u4ed6\u53ef\u4fe1\u6765\u6e90\u83b7\u53d6\u4fe1\u606f\u3002<\/li>\n<li>\u68c0\u67e5\u4e0b\u8f7d\u6587\u4ef6\u7684\u62d3\u5c55\u540d\uff0c\u6587\u6863\u548c\u89c6\u9891\u6587\u4ef6\u4e0d\u4f1a\u4ee5.exe\u683c\u5f0f\u7ed3\u5c3e\u3002<\/li>\n<li>\u4f7f\u7528\u5982<a href=\"http:\/\/www.kaspersky.com.cn\/internet-security?icid=cn_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kis___\" target=\"_blank\" rel=\"noopener\">\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6<\/a>\u7b49\u53ef\u9760\u7684\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u8fdb\u884c\u5168\u65b9\u4f4d\u9632\u62a4\uff0c\u907f\u514d\u5e7f\u6cdb\u5a01\u80c1\u4fb5\u6270.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-ransomware-cn\">\n","protected":false},"excerpt":{"rendered":"<p>\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u5229\u7528\u4eba\u4eec\u5bf9\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u7684\u6050\u60e7\uff0c\u4f20\u64ad\u6728\u9a6c\u4ee5\u53ca\u6076\u610f\u8f6f\u4ef6\u3002<\/p>\n","protected":false},"author":437,"featured_media":10664,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1506,1450],"tags":[871,25,857,858],"class_list":{"0":"post-10662","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-news","9":"tag-871","10":"tag-25","11":"tag-857","12":"tag-858"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/coronavirus-used-to-spread-malware-online\/10662\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/coronavirus-used-to-spread-malware-online\/18457\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/coronavirus-used-to-spread-malware-online\/15332\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/coronavirus-used-to-spread-malware-online\/20213\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/coronavirus-used-to-spread-malware-online\/18533\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/coronavirus-used-to-spread-malware-online\/12773\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/coronavirus-used-to-spread-malware-online\/25737\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/coronavirus-used-to-spread-malware-online\/25570\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/%e6%81%b6%e6%84%8f%e8%bd%af%e4%bb%b6\/","name":"\u6076\u610f\u8f6f\u4ef6"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/10662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=10662"}],"version-history":[{"count":11,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/10662\/revisions"}],"predecessor-version":[{"id":12222,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/10662\/revisions\/12222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/10664"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=10662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=10662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=10662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}