{"id":11957,"date":"2020-09-15T18:34:56","date_gmt":"2020-09-15T10:34:56","guid":{"rendered":"https:\/\/www.kaspersky.com.cn\/blog\/?p=11957"},"modified":"2020-11-09T18:04:38","modified_gmt":"2020-11-09T10:04:38","slug":"threats-targeting-linux","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/threats-targeting-linux\/11957\/","title":{"rendered":"Linux\u7cfb\u7edf\u7684\u5b89\u5168\u6027\u7a76\u7adf\u5982\u4f55\uff1f"},"content":{"rendered":"<p>\u591a\u5e74\u6765\u5f88\u591a\u4eba\u90fd\u8ba4\u4e3aLinux\u7cfb\u7edf\u4e0d\u4f1a\u611f\u67d3\u75c5\u6bd2\uff0c\u8fd9\u79cd\u9519\u89c9\u4ea7\u751f\u4e8e\u4e09\u4e2a\u539f\u56e0\u3002\u9996\u5148\uff0cLinux\u7cfb\u7edf\u8fdc\u4e0d\u5982Windows\u7cfb\u7edf\u5e38\u89c1\uff1b\u5176\u6b21\uff0c\u5b83\u7684\u4f7f\u7528\u8005\u4e3b\u8981\u662f\u6bd4\u666e\u901a\u4eba\u66f4\u52a0\u4e86\u89e3\u8ba1\u7b97\u673a\u7684IT\u4e13\u4e1a\u4eba\u58eb\uff1b\u6700\u540e\uff0c\u7531\u4e8e\u7cfb\u7edf\u7279\u6027\uff0c\u6076\u610f\u7a0b\u5e8f\u5728Linux\u7cfb\u7edf\u4e2d\u5fc5\u987b\u83b7\u5f97\u6839\u6743\u9650\u624d\u80fd\u9020\u6210\u5b9e\u8d28\u4f24\u5bb3\uff0c\u8fd9\u5927\u5927\u589e\u52a0\u4e86\u8fdb\u653b\u7684\u590d\u6742\u6027\u3002<\/p>\n<p>\u7136\u800c\u65f6\u4ee3\u5728\u53d8\u5316\uff0c\u5982\u4eca\u57fa\u4e8eLinux\u7684\u64cd\u4f5c\u7cfb\u7edf\u5728\u67d0\u4e9b\u9886\u57df\u6b63\u5728\u8ffd\u8d76\u6216\u8005\u5df2\u7ecf\u8d85\u8fc7Windows\u7cfb\u7edf\u3002\u9664\u6b64\u4e4b\u5916\uff0c\u8bb8\u591a\u5f00\u53d1\u4eba\u5458\u6b63\u8bd5\u56fe\u901a\u8fc7\u6dfb\u52a0\u56fe\u5f62\u7ec8\u7aef\u548c\u5de5\u5177\u6765\u8ba9\u7cfb\u7edf\u53d8\u5f97\u5bf9\u7528\u6237\u66f4\u52a0\u53cb\u597d\uff0c\u800c\u8fd9\u4e9b\u56fe\u5f62\u754c\u9762\u770b\u4e0a\u53bb\u548c\u65b9\u4fbf\u4f7f\u7528\u7684Windows\u754c\u9762\u5f88\u76f8\u4f3c\u3002\u8fd9\u6781\u5927\u5730\u589e\u52a0\u4e86Linux\u7cfb\u7edf\u7684\u6570\u91cf\uff0c\u4f46\u662f\u4e5f\u5438\u5f15\u4e86\u66f4\u591a\u5bb9\u6613\u72af\u9519\u7684\u666e\u901a\u7528\u6237\uff0c\u800c\u8d8a\u6765\u8d8a\u591a\u91cd\u8981\u7684\u670d\u52a1\u5668\u548c\u5de5\u4f5c\u7ad9\u5bf9Linux\u7cfb\u7edf\u7684\u4f7f\u7528\u4e5f\u5f15\u8d77\u4e86\u66f4\u591a\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u7684\u6ce8\u610f\u3002<\/p>\n<p>\u4e0d\u53ef\u5426\u8ba4\uff0c\u6211\u4eec\u76ee\u524d\u8fd8\u6ca1\u6709\u53d1\u73b0\u5f71\u54cd\u5230Linux\u7cfb\u7edf\u7684\u5927\u89c4\u6a21\u653b\u51fb\uff0c\u4f46\u662fAPT\u548c\u9488\u5bf9\u6027\u653b\u51fb\u80cc\u540e\u7684\u64cd\u7eb5\u8005\u6b63\u5728\u9488\u5bf9\u6b64\u7c7b\u64cd\u4f5c\u7cfb\u7edf\u6253\u9020\u524d\u6240\u672a\u6709\u6570\u91cf\u7684\u201d\u4f5c\u6848\u201d\u5de5\u5177\u3002\u6211\u4eecGReAT\u5206\u6790\u56e2\u961f\u7684\u540c\u4e8b\u5bf9\u8fd1\u5e74\u6765\u7684\u5927\u91cf\u9ad8\u7ea7\u5a01\u80c1\u8fdb\u884c\u4e86\u5206\u6790\uff0c\u53d1\u73b0\u5982\u4eca\u5927\u591a\u6570\u653b\u51fb\u56e2\u4f19\u90fd\u5bf9\u653b\u51fbLinux\u7cfb\u7edf\u5341\u5206\u611f\u5174\u8da3\u3002<\/p>\n<p>\u62e5\u6709\u653b\u51fbLinux\u7cfb\u7edf\u7684\u5de5\u5177\u7684\u9ed1\u5ba2\u56e2\u4f19\u4e0d\u5728\u5c11\u6570\uff0c\u6bd4\u5982Winniti\u3001Cloud Snooper\u3001DarkHotel\u3001Equation\u3001Lazarus\u3001Sofacy\u3001The Dukes\u3001The Lamberts\u3001Turla\u548cWildNeutron\u7b49\u7b49\u3002Linux\u7cfb\u7edf\u653b\u51fb\u5de5\u5177\u7684\u53e6\u4e00\u4e2a\u7814\u53d1\u8005\u662fHackingTeam\u516c\u53f8\uff0c\u5b83\u5411\u653f\u5e9c\u548c\u6267\u6cd5\u90e8\u95e8\u51fa\u552e\u6240\u8c13\u7684\u6cd5\u5f8b\u76d1\u7763\u8f6f\u4ef6\u3002\u82e5\u5e72\u5e74\u524d\u5b83\u66fe\u7ecf\u88ab\u9ed1\u5ba2\u5165\u4fb5\u8fc7\u4e00\u6b21\uff0c\u5bfc\u81f4\u4e00\u4e9b\u6280\u672f\u843d\u5230\u4e86\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u7684\u624b\u4e2d\u3002\u5982\u679c\u60f3\u4e86\u89e3\u66f4\u591a\u6709\u5173\u653b\u51fb\u56e2\u4f19\u53ca\u5176\u5de5\u5177\u7684\u4fe1\u606f\uff0c\u8bf7\u9605\u8bfb\u6211\u4eec\u5728<a href=\"https:\/\/securelist.com\/an-overview-of-targeted-attacks-and-apts-on-linux\/98440\" target=\"_blank\" rel=\"noopener\">Securelist\u4e0a\u7684\u62a5\u544a<\/a>\u3002<\/p>\n<h2>Linux\u5b89\u5168\u8d34\u58eb<\/h2>\n<p>\u6211\u4eec\u7684\u5b89\u5168\u4e13\u5bb6\u63d0\u51fa\u4ee5\u4e0b\u5efa\u8bae\u6765\u5c06Linux\u7cfb\u7edf\u9762\u5bf9\u7684\u5a01\u80c1\u964d\u81f3\u6700\u4f4e\u3002<\/p>\n<ul>\n<li>\u4e3aLinux\u521b\u5efa\u4fe1\u4efb\u8f6f\u4ef6\u6e90\u7684\u5217\u8868\uff0c\u5e76\u4e14\u963b\u62e6\u6765\u81ea\u7b2c\u4e09\u65b9\u7684\u8f6f\u4ef6\u548c\u811a\u672c\u7684\u5b89\u88c5\u8fd0\u884c\uff1b<\/li>\n<li>\u53ca\u65f6\u66f4\u65b0\u8f6f\u4ef6\u2014\u2014\u8bbe\u7f6e\u81ea\u52a8\u66f4\u65b0\u5e76\u4e14\u4f7f\u7528\u52a0\u5bc6\u4fe1\u9053\u66f4\u65b0\uff1b<\/li>\n<li>\u4ed4\u7ec6\u914d\u7f6e\u9632\u706b\u5899\uff0c\u786e\u4fdd\u5b83\u4fdd\u5b58\u65e5\u5fd7\u4fe1\u606f\u5e76\u4e14\u963b\u62e6\u6240\u6709\u672a\u4f7f\u7528\u7684\u7aef\u53e3\uff1b<\/li>\n<li>\u4f7f\u7528\u53cc\u91cd\u8ba4\u8bc1\u548c\u786c\u4ef6\u4ee4\u724c\uff1b<\/li>\n<li>\u9632\u62a4\u6765\u81ea\u5185\u90e8\u7684\u653b\u51fb\uff1a\u4f7f\u7528\u52a0\u5bc6\u3001\u53ef\u4fe1\u5f15\u5bfc\u548c\u786c\u4ef6\u5b8c\u6574\u6027\u63a7\u5236\u5de5\u5177\uff1b<\/li>\n<li>\u5b9a\u671f\u5bf9\u7cfb\u7edf\u8fdb\u884c\u68c0\u67e5\u5de5\u4f5c\uff0c\u67e5\u770b\u65e5\u5fd7\u4e2d\u662f\u5426\u5b58\u5728\u653b\u51fb\u75d5\u8ff9\uff0c\u5e76\u8fdb\u884c\u6e17\u900f\u6d4b\u8bd5\uff1b<\/li>\n<li>\u4f7f\u7528\u9488\u5bf9Linux\u670d\u52a1\u5668\u7684\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u3002<\/li>\n<\/ul>\n<p>\u7279\u522b\u63d0\u793a\uff0c\u6211\u4eec\u7684\u4f01\u4e1a\u7ea7\u89e3\u51b3\u65b9\u6848<a href=\"https:\/\/www.kaspersky.com.cn\/small-to-medium-business-security?icid=cn_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">\u5361\u5df4\u65af\u57fa\u4f01\u4e1a\u7248\u5168\u65b9\u4f4d\u5b89\u5168\u8f6f\u4ef6<\/a>\uff0c\u5185\u7f6e\u4e13\u95e8\u4e3a\u90ae\u4ef6\u670d\u52a1\u5668\u548c\u7f51\u5173\u63d0\u4f9b\u5b89\u5168\u9632\u62a4\u7684\u7ec4\u4ef6\u3002\u4f60\u4e5f\u53ef\u4ee5\u5728<a href=\"https:\/\/securelist.com\/an-overview-of-targeted-attacks-and-apts-on-linux\/98440\" target=\"_blank\" rel=\"noopener\">\u8fd9\u7bc7Securelist\u6587\u7ae0<\/a>\u4e2d\u627e\u5230\u66f4\u591a\u5efa\u8bae\u548c\u7ec6\u8282\u4fe1\u606f\u3002<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-cn\">\n","protected":false},"excerpt":{"rendered":"<p>\u6211\u4eec\u7684\u5b89\u5168\u4e13\u5bb6\u5bf9\u4ee5Linux\u4e3a\u76ee\u6807\u7684\u9ad8\u7ea7\u7f51\u7edc\u653b\u51fb\u548cAPT\u6d3b\u52a8\u8fdb\u884c\u4e86\u5206\u6790\uff0c\u5e76\u63d0\u4f9b\u4e86\u4e00\u4e9b\u7f51\u7edc\u5b89\u5168\u5efa\u8bae\u3002<\/p>\n","protected":false},"author":2581,"featured_media":11958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1845],"tags":[265,66,2377,729],"class_list":{"0":"post-11957","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-1845","8":"tag-apt","9":"tag-linux","10":"tag-targeted-attacks","11":"tag-729"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/threats-targeting-linux\/11957\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/threats-targeting-linux\/21895\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/threats-targeting-linux\/17369\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/threats-targeting-linux\/8593\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/threats-targeting-linux\/23286\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/threats-targeting-linux\/21471\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/threats-targeting-linux\/20081\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/threats-targeting-linux\/23848\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/threats-targeting-linux\/22799\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/threats-targeting-linux\/29068\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/threats-targeting-linux\/8803\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/threats-targeting-linux\/37001\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/threats-targeting-linux\/15657\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/threats-targeting-linux\/16032\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/threats-targeting-linux\/13973\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/threats-targeting-linux\/25138\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/threats-targeting-linux\/29222\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/threats-targeting-linux\/26066\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/threats-targeting-linux\/22869\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/threats-targeting-linux\/28189\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/threats-targeting-linux\/28021\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/linux\/","name":"Linux"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/11957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=11957"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/11957\/revisions"}],"predecessor-version":[{"id":12185,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/11957\/revisions\/12185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/11958"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=11957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=11957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=11957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}