{"id":9965,"date":"2018-11-20T00:25:00","date_gmt":"2018-11-19T16:25:00","guid":{"rendered":"https:\/\/www.kaspersky.com.cn\/blog\/?p=9965"},"modified":"2020-05-27T00:06:03","modified_gmt":"2020-05-26T16:06:03","slug":"five-most-notorious-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/five-most-notorious-cyberattacks\/9965\/","title":{"rendered":"\u4e94\u5927\u6700\u81ed\u540d\u662d\u8457\u7684\u7f51\u7edc\u653b\u51fb"},"content":{"rendered":"<p>\u5927\u591a\u6570\u7f51\u7edc\u653b\u51fb\u90fd\u76f8\u5f53\u666e\u901a\u3002\u6700\u6076\u52a3\u7684\u7f51\u7edc\u653b\u51fb\u662f, \u7528\u6237\u4f1a\u5728\u5c4f\u5e55\u4e0a\u770b\u5230\u652f\u4ed8\u8d4e\u91d1\u7684\u58f0\u660e, \u58f0\u660e\u4e2d\u79f0\u8ba1\u7b97\u673a\u5df2\u88ab\u52a0\u5bc6, \u987b\u4ed8\u6b3e\u540e\u624d\u80fd\u89e3\u9501\u3002\u4e0d\u8fc7, \u4e00\u822c\u60c5\u51b5\u4e0b, \u5e76\u6ca1\u6709\u4ec0\u4e48\u7279\u522b\u7684\u7f51\u7edc\u653b\u51fb\u53d1\u751f \u2013 \u8bb8\u591a\u7c7b\u578b\u7684\u6076\u610f\u8f6f\u4ef6\u662f\u8d76\u5728\u88ab\u53d1\u73b0\u4e4b\u524d, \u5c3d\u53ef\u80fd\u5730\u5077\u5077\u5730\u7a83\u53d6\u6700\u591a\u7684\u6570\u636e\u3002<\/p>\n<p>\u4f46\u662f\u6709\u4e00\u4e9b\u7f51\u7edc\u653b\u51fb, \u5b83\u4eec\u7684\u89c4\u6a21\u6216\u590d\u6742\u7a0b\u5ea6\u4e0d\u80fd\u4e0d\u5f15\u8d77\u4eba\u4eec\u7684\u6ce8\u610f\u3002\u672c\u6587\u7740\u91cd\u9610\u8ff0\u7684\u662f\u8fc7\u53bb\u5341\u5e74\u4e2d\u4e94\u79cd\u89c4\u6a21\u6700\u5927\u3001\u6700\u81ed\u540d\u662d\u8457\u7684\u7f51\u7edc\u653b\u51fb\u3002<\/p>\n<h3> WannaCry\uff1a\u771f\u6b63\u5927\u8086\u4f20\u64ad\u7684\u75c5\u6bd2<\/h3>\n<p>WannaCry\u653b\u51fb\u5229\u7528\u7684\u662f\u52d2\u7d22\u8f6f\u4ef6\u548c\u5e38\u89c4\u8ba1\u7b97\u673a\u6076\u610f\u8f6f\u4ef6, \u653b\u51fb\u5bf9\u8c61\u662f\u6240\u6709\u4eba, \u751a\u81f3\u5305\u62ec\u5bf9\u8ba1\u7b97\u673a\u4e00\u65e0\u6240\u77e5\u7684\u4eba\u3002\u653b\u51fb\u8005\u5229\u7528Shadow Brokers<a target=\"_blank\" href=\"https:\/\/threatpost.com\/shadowbrokers-windows-zero-days-already-patched\/125009\/\" rel=\"noopener noreferrer nofollow\">\u516c\u5f00\u63d0\u4f9b<\/a>\u7684\u6f0f\u6d1e\uff08\u6765\u81eaEquation Group\u9ed1\u5ba2\u56e2\u961f\uff09\u521b\u9020\u4e86\u4e00\u4e2a\u602a\u7269 \u2013 \u4e00\u79cd\u80fd\u591f\u901a\u8fc7\u4e92\u8054\u7f51\u548c\u672c\u5730\u7f51\u7edc\u5feb\u901f\u4f20\u64ad\u7684\u52d2\u7d22\u8f6f\u4ef6\u52a0\u5bc6\u5668\u3002<\/p>\n<p>\u4ec5\u4ec5\u56db\u5929, WannaCry\u75c5\u6bd2\u5c31\u5bfc\u81f4150\u4e2a\u56fd\u5bb620\u591a\u4e07\u53f0\u8ba1\u7b97\u673a\u762b\u75ea\u3002\u5176\u4e2d\u5305\u62ec\u5173\u952e\u57fa\u7840\u8bbe\u65bd\uff1aWannaCry\u52a0\u5bc6\u4e86\u67d0\u4e9b\u533b\u9662\u7684\u6240\u6709\u8bbe\u5907, \u5305\u62ec\u533b\u7597\u8bbe\u5907\u5728\u5185\uff1b\u4e00\u4e9b\u5de5\u5382\u88ab\u8feb\u505c\u5de5\u3002\u5728\u8fd1\u671f\u7684\u653b\u51fb\u4e2d, WannaCry\u7684\u5f71\u54cd\u9762\u6700\u5927\u3002<\/p>\n<p><em><em>\u6709\u5173WannaCry\u7684\u8be6\u7ec6\u4fe1\u606f, \u8bf7\u9605\u8bfb<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-ransomware\/16518\/\" rel=\"noopener noreferrer nofollow\"><em>\u672c\u6587<\/em><\/a><em>, \u8981\u4e86\u89e3\u8be5\u75c5\u6bd2\u4e1a\u52a1\u65b9\u9762\u7684\u4fe1\u606f, \u8bf7\u9605\u8bfb<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-for-b2b\/16544\/\" rel=\"noopener noreferrer nofollow\"><em>\u6b64\u5904<\/em><\/a> <em>\u548c<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-and-embedded\/16604\/\" rel=\"noopener noreferrer nofollow\"><em>\u6b64\u5904<\/em><\/a><em>\u3002\u53e6\u5916, WannaCry\u4ecd\u7136\u5b58\u5728, \u5371\u53ca\u7740\u5168\u4e16\u754c\u7684\u8ba1\u7b97\u673a\u3002\u8981\u4e86\u89e3\u5982\u4f55\u914d\u7f6eWindows\u4ee5\u9632\u8303\u6b64\u75c5\u6bd2, \u8bf7\u9605\u8bfb<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-windows-update\/16593\/\" rel=\"noopener noreferrer nofollow\"><em>\u672c\u6587<\/em><\/a><em>\u3002<\/em><\/em><\/p>\n<h3>NotPetya\/ExPetr\uff1a\u8fc4\u4eca\u4e3a\u6b62\u4ee3\u4ef7\u6700\u9ad8\u7684\u7f51\u7edc\u653b\u51fb<\/h3>\n<p>\u636e\u79f0, WannaCry\u5e76\u4e0d\u662f\u4ee3\u4ef7\u6700\u9ad8\u7684\u6d41\u884c\u75c5\u6bd2, \u8fd9\u4e00\u5934\u8854\u843d\u5728\u4e86\u53e6\u4e00\u4e2a\u540d\u4e3aExPetr\u7684\u52d2\u7d22\u8f6f\u4ef6\u52a0\u5bc6\u5668\u5934\u4e0a\uff08\u4ece\u6280\u672f\u4e0a\u6765\u8bf4, \u8fd9\u662f\u4e00\u79cd<a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/wiper\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">\u64e6\u9664\u5668<\/a>, \u4f46\u4e0d\u4f1a\u6539\u53d8\u5e95\u7ebf\uff09, \u8be5\u52a0\u5bc6\u5668\u53c8\u540dNotPetya\u3002\u5b83\u7684\u5de5\u4f5c\u539f\u7406\u76f8\u540c\uff1a\u8815\u866b\u75c5\u6bd2\u5229\u7528EternalBlue\u548cEtrernalRomance\u6f0f\u6d1e\u5728\u7f51\u7edc\u4e0a\u56db\u5904\u79fb\u52a8, \u4e0d\u53ef\u9006\u8f6c\u5730\u52a0\u5bc6\u5176\u8def\u5f84\u4e2d\u7684\u6240\u6709\u5185\u5bb9\u3002<\/p>\n<p>\u867d\u7136\u88ab\u611f\u67d3\u7684\u673a\u5668\u603b\u6570\u5e76\u4e0d\u5927, \u4f46NotPetya\u611f\u67d3\u7684\u4e3b\u8981\u662f\u4f01\u4e1a, \u90e8\u5206\u539f\u56e0\u662f\u5176\u4e2d\u4e00\u4e2a\u521d\u59cb\u4f20\u64ad\u9002\u91cf\u662f\u901a\u8fc7\u8d22\u52a1\u8f6f\u4ef6MeDoc\u5f15\u5165\u7684\u3002\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u8bbe\u6cd5\u53d6\u5f97\u4e86MeDoc\u66f4\u65b0\u670d\u52a1\u5668\u7684\u63a7\u5236\u6743, \u7ed3\u679c\u5bfc\u81f4\u8bb8\u591a\u4f7f\u7528\u8be5\u8f6f\u4ef6\u7684\u5ba2\u6237\u7aef\u6536\u5230\u4f2a\u88c5\u6210\u66f4\u65b0\u7684\u6076\u610f\u8f6f\u4ef6, \u7531\u6b64\u5728\u7f51\u7edc\u4e0a\u8086\u610f\u4f20\u64ad\u3002<\/p>\n<p>NotPetya\u7f51\u7edc\u653b\u51fb\u9020\u6210\u7684\u635f\u5931<a target=\"_blank\" href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" rel=\"noopener noreferrer nofollow\">\u4f30\u8ba1\u8fbe\u5230100\u4ebf\u7f8e\u5143<\/a>, \u800c\u6839\u636e\u5404\u79cd\u4f30\u8ba1\u6570\u636e, WannaCry\u9020\u6210\u7684\u635f\u5931\u7ea6\u572840\u523080\u4ebf\u7f8e\u5143\u4e4b\u95f4\u3002\u56e0\u6b64, NotPetya\u88ab\u89c6\u4e3a\u662f\u5386\u53f2\u4e0a\u4ee3\u4ef7\u6700\u9ad8\u7684\u5168\u7403\u7f51\u7edc\u653b\u51fb\u3002\u4f46\u613f\u8fd9\u4e2a\u8bb0\u5f55\u4e0d\u4f1a\u5f88\u5feb\u6253\u7834\u3002<\/p>\n<p><em><em>\u6709\u5173NotPetya \/ ExPetr\u6d41\u884c\u75c5\u6bd2\u7684\u66f4\u591a\u4fe1\u606f\u53ef\u4ee5\u9605\u8bfb<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/new-ransomware-epidemics\/17314\/\" rel=\"noopener noreferrer nofollow\"><em>\u672c\u6587<\/em><\/a><em>\uff1b<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" rel=\"noopener noreferrer nofollow\"><em>\u6b64\u5904<\/em><\/a><em>\u8ba8\u8bba\u4e86\u5b83\u7ed9\u4f01\u4e1a\u9020\u6210\u7684\u75db\u82e6\uff1b\u5728<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-everyone\/17374\/\" rel=\"noopener noreferrer nofollow\"><em>\u6b64\u5904<\/em><\/a><em>\u53ef\u4e86\u89e3\u4e3a\u4ec0\u4e48\u8fd9\u79cd\u75c5\u6bd2\u80fd\u4f7f\u5927\u578b\u4f01\u4e1a\u762b\u75ea, \u4e3a\u4ec0\u4e48\u8bf4\u5f71\u54cd\u7684\u4e0d\u4ec5\u4ec5\u662f\u8ba1\u7b97\u673a\u88ab\u611f\u67d3\u7684\u4eba, \u8fd8\u4f1a\u5f71\u54cd\u5176\u4ed6\u6240\u6709\u4eba\u3002<\/em><\/em><\/p>\n<h3> Stuxnet\uff1a\u5192\u70df\u7684\u7f51\u7edc\u6b66\u5668<\/h3>\n<p>\u6216\u8bb8\u6700\u51fa\u540d\u7684\u653b\u51fb\u662f\u5bfc\u81f4\u4f0a\u6717\u7684\u94c0\u6d53\u7f29\u79bb\u5fc3\u673a\u762b\u75ea\u7684\u6076\u610f\u8f6f\u4ef6, \u8fd9\u662f\u4e00\u79cd\u5341\u5206\u590d\u6742\u7684\u591a\u9762\u6076\u610f\u8f6f\u4ef6, \u5bfc\u81f4\u4f0a\u6717\u6838\u8ba1\u5212\u5ef6\u7f13\u4e86\u6570\u5e74\u3002\u6b63\u662f\u4eceStuxnet\u75c5\u6bd2\u5f00\u59cb, \u5f15\u53d1\u4e86\u4eba\u4eec\u5c31\u4f7f\u7528<a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cyberweapon\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">\u7f51\u7edc\u6b66\u5668<\/a>\u5bf9\u6297\u5de5\u4e1a\u7cfb\u7edf\u7684\u8ba8\u8bba\u3002<\/p>\n<p>\u5f53\u65f6, \u6ca1\u6709\u54ea\u79cd\u75c5\u6bd2\u5728\u590d\u6742\u6027\u548c\u72e1\u733e\u6027\u65b9\u9762\u80fd\u8d85\u8d8aStuxnet \u2013 \u8fd9\u79cd\u8815\u866b\u75c5\u6bd2\u80fd\u591f\u901a\u8fc7USB\u95ea\u5b58\u9a71\u52a8\u5668\u6084\u65e0\u58f0\u606f\u5730\u4f20\u64ad, \u751a\u81f3\u53ef\u4ee5\u6e17\u900f\u5230\u672a\u8fde\u5230\u4e92\u8054\u7f51\u6216\u672c\u5730\u7f51\u7edc\u7684\u8ba1\u7b97\u673a\u3002<\/p>\n<p>\u8fd9\u79cd\u8815\u866b\u75c5\u6bd2\u5f88\u5feb\u5931\u63a7, \u8fc5\u901f\u5728\u4e16\u754c\u8303\u56f4\u5185\u6269\u6563, \u611f\u67d3\u4e86\u6570\u5341\u4e07\u53f0\u8ba1\u7b97\u673a\u3002\u4f46\u5b83\u4e0d\u4f1a\u7834\u574f\u8fd9\u4e9b\u8ba1\u7b97\u673a\uff1b\u5b83\u662f\u4e3a\u4e13\u4e3a\u6267\u884c\u4e00\u9879\u975e\u5e38\u5177\u4f53\u7684\u4efb\u52a1\u800c\u521b\u9020\u51fa\u6765\u7684\u3002\u8fd9\u79cd\u8815\u866b\u75c5\u6bd2\u53ea\u5728\u7531\u897f\u95e8\u5b50\u53ef\u7f16\u7a0b\u63a7\u5236\u5668\u548c\u8f6f\u4ef6\u64cd\u4f5c\u7684\u8ba1\u7b97\u673a\u4e0a\u8d77\u4f5c\u7528\u3002\u5728\u767b\u5f55\u5230\u8fd9\u7c7b\u8ba1\u7b97\u673a\u540e, \u5b83\u4f1a\u5bf9\u8fd9\u4e9b\u63a7\u5236\u5668\u91cd\u65b0\u7f16\u7a0b\u3002\u968f\u540e\u5c06\u94c0\u6d53\u7f29\u79bb\u5fc3\u673a\u7684\u8f6c\u901f\u8bbe\u5b9a\u5f97\u8fc7\u9ad8\u7684\u503c, \u4ece\u800c\u4ee5\u7269\u7406\u65b9\u5f0f\u7834\u574f\u79bb\u5fc3\u673a\u3002<\/p>\n<p><em><em>\u5173\u4e8eStuxnet\u75c5\u6bd2\u7684\u6587\u7ae0\u6570\u4e0d\u80dc\u6570, \u5305\u62ec\u6709\u4e00<\/em><a target=\"_blank\" href=\"https:\/\/www.amazon.com\/Countdown-Zero-Day-Stuxnet-Digital\/dp\/0770436196\/\" rel=\"noopener noreferrer nofollow\"><em>\u6574\u672c\u4e66<\/em><\/a><em>\u4e13\u95e8\u63cf\u8ff0\u8fd9\u79cd\u75c5\u6bd2, \u4f46\u5982\u679c\u53ea\u60f3\u5927\u81f4\u4e86\u89e3\u8fd9\u79cd\u8815\u866b\u5982\u4f55\u4f20\u64ad\u4ee5\u53ca\u611f\u67d3\u7684\u5bf9\u8c61, \u90a3\u4e48\u53ea\u8981\u9605\u8bfb<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/stuxnet-victims-zero\/6775\/\" rel=\"noopener noreferrer nofollow\"><em>\u6587\u7ae0<\/em><\/a><em>\u5c31\u591f\u4e86\u3002<\/em><\/em><\/p>\n<h3>DarkHotel\uff1a\u5957\u623f\u4e2d\u7684\u95f4\u8c0d<\/h3>\n<p>\u4f17\u6240\u5468\u77e5, \u5496\u5561\u9986\u6216\u673a\u573a\u7684\u516c\u5171Wi-Fi\u7f51\u7edc\u5e76\u4e0d\u662f\u6700\u5b89\u5168\u7684\u3002\u7136\u800c, \u8bb8\u591a\u4eba\u8ba4\u4e3a\u9152\u5e97\u7f51\u7edc\u7684\u5b89\u5168\u6027\u5e94\u8be5\u4f1a\u597d\u4e00\u4e9b\u3002\u56e0\u4e3a\u867d\u7136\u9152\u5e97\u4e5f\u91c7\u7528\u516c\u5171\u7f51\u7edc, \u4f46\u81f3\u5c11\u9700\u8981\u67d0\u79cd\u6388\u6743\u3002<\/p>\n<p>\u7136\u800c, \u8fd9\u79cd\u8bef\u89e3\u8ba9\u5404\u79cd\u9ad8\u7ba1\u548c\u9ad8\u7ea7\u5b98\u5458\u4ed8\u51fa\u4e86\u6c89\u91cd\u7684\u4ee3\u4ef7\u3002\u4ed6\u4eec\u5728\u8fde\u5230\u9152\u5e97\u7f51\u7edc\u65f6, \u7cfb\u7edf\u63d0\u793a\u4ed6\u4eec\u5b89\u88c5\u4e00\u4e2a\u8c8c\u4f3c\u6d41\u884c\u8f6f\u4ef6\u7684\u5408\u6cd5\u66f4\u65b0\u3002\u4e00\u65e6\u5b89\u88c5\u540e, \u4ed6\u4eec\u7684\u8bbe\u5907\u968f\u5373\u88abDarkHotel<a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/spyware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">\u95f4\u8c0d\u8f6f\u4ef6<\/a>\u6240\u611f\u67d3\u3002\u653b\u51fb\u8005\u4f1a\u5728\u4ed6\u4eec\u5165\u4f4f\u524d\u51e0\u5929\u4e13\u95e8\u5728\u7f51\u7edc\u5f15\u5165\u8be5\u8f6f\u8f6f, \u5728\u4ed6\u4eec\u79bb\u5f00\u597d\u51e0\u5929\u5185\u5220\u9664\u3002\u8fd9\u79cd\u9690\u5f62\u7684\u95f4\u8c0d\u8f6f\u4ef6\u4f1a\u8bb0\u5f55\u51fb\u952e, \u5e76\u5141\u8bb8\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u8fdb\u884c\u6709\u9488\u5bf9\u6027\u7684\u7f51\u7edc\u9493\u9c7c\u653b\u51fb\u3002<\/p>\n<p><em><em>\u8bf7\u9605\u8bfb<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/darkhotel-apt\/6613\/\" rel=\"noopener noreferrer nofollow\"><em>\u672c\u6587<\/em><\/a><em>\u4e86\u89e3\u6709\u5173DarkHotel\u611f\u67d3\u53ca\u5176\u540e\u679c\u7684\u66f4\u591a\u4fe1\u606f\u3002<\/em><\/em><\/p>\n<h3> Mirai\uff1a\u4e92\u8054\u7f51\u7684\u8870\u843d<\/h3>\n<p><a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/botnet\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">\u50f5\u5c38\u7f51\u7edc<\/a>\u5df2\u7ecf\u6709\u591a\u5e74\u7684\u5386\u53f2\u4e86, \u4f46\u7269\u8054\u7f51\u7684\u51fa\u73b0\u786e\u5b9e\u4e3a\u5b83\u4eec\u6ce8\u5165\u4e86\u65b0\u7684\u6d3b\u529b\u3002\u4ece\u672a\u8003\u8651\u8fc7\u5b89\u5168\u6027\u5e76\u4e14\u6ca1\u6709\u5b89\u88c5\u53cd\u75c5\u6bd2\u8f6f\u4ef6\u7684\u8bbe\u5907\u7a81\u7136\u5f00\u59cb\u88ab\u5927\u89c4\u6a21\u611f\u67d3\u3002\u88ab\u611f\u67d3\u7684\u8bbe\u5907\u4f1a\u8ddf\u8e2a\u4e86\u540c\u7c7b\u7684\u5176\u4ed6\u8bbe\u5907, \u5e76\u7acb\u5373\u8fdb\u884c\u611f\u67d3\u3002\u8fd9\u4e00\u50f5\u5c38\u961f\u4f0d\u7684\u7ec4\u5efa\u57fa\u4e8e\u4e00\u4e2a\u88ab\u6d6a\u6f2b\u5730\u547d\u540d\u4e3aMirai\uff08\u4ece\u65e5\u8bed\u7ffb\u8bd1\u800c\u6765, \u610f\u4e3a\u201d\u672a\u6765\u201d\uff09\u7684\u6076\u610f\u8f6f\u4ef6, \u50f5\u5c38\u961f\u4f0d\u4e0d\u65ad\u53d1\u5c55\u58ee\u5927\u5e76\u968f\u65f6\u5f85\u547d\u3002<\/p>\n<p>\u7136\u540e\u7ec8\u4e8e\u6709\u4e00\u5929 \u2013 2016\u5e7410\u670821\u65e5 \u2013 \u8fd9\u4e2a\u5e9e\u5927\u50f5\u5c38\u7f51\u7edc\u7684\u6240\u6709\u8005\u51b3\u5b9a\u6d4b\u8bd5\u4e00\u4e0b\u50f5\u5c38\u7f51\u7edc\u7684\u80fd\u529b, \u7ed3\u679c\u5bfc\u81f4\u6570\u767e\u4e07\u53f0\u6570\u5b57\u5f55\u50cf\u673a\u3001\u8def\u7531\u5668\u3001IP\u6444\u50cf\u673a\u548c\u5176\u4ed6\u201d\u667a\u80fd\u201d\u8bbe\u5907\u5411DNS\u670d\u52a1\u63d0\u4f9b\u5546Dyn\u53d1\u9001\u6d77\u91cf\u8bf7\u6c42\u3002<\/p>\n<p>Dyn\u6839\u672c\u65e0\u6cd5\u627f\u53d7\u5982\u6b64\u5927\u89c4\u6a21\u7684<a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ddos-distributed-denial-of-service-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">DDoS\u653b\u51fb<\/a>\u3002DNS\u4ee5\u53ca\u4f9d\u8d56DNS\u7684\u670d\u52a1\u968f\u5373\u53d8\u5f97\u4e0d\u53ef\u7528\uff1aPayPal\u3001Twitter\u3001Netflix\u3001Spotify\u3001PlayStation\u5728\u7ebf\u670d\u52a1\u4ee5\u53ca\u7f8e\u56fd\u5176\u4ed6\u8bb8\u591a\u670d\u52a1\u90fd\u53d7\u5230\u5f71\u54cd\u3002Dyn\u6700\u7ec8\u6062\u590d\u4e86\u6b63\u5e38\u8fd0\u8f6c, \u4f46\u662fMirai\u653b\u51fb\u7684\u89c4\u6a21\u8ba9\u5168\u4e16\u754c\u5bdd\u98df\u96be\u5b89, \u8feb\u4f7f\u5927\u5bb6\u601d\u8003\u201d\u667a\u80fd\u201d\u8bbe\u5907\u7684\u5b89\u5168\u6027 \u2013 \u6b63\u662f\u5b83\u6572\u54cd\u4e86\u667a\u80fd\u8bbe\u5907\u5b89\u5168\u6027\u7684\u8b66\u949f\u3002<\/p>\n<p><em><em>\u4f60\u53ef\u4ee5\u5728<\/em><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/attack-on-dyn-explained\/13325\/\" rel=\"noopener noreferrer nofollow\"><em>\u8fd9\u7bc7\u6587\u7ae0<\/em><\/a><em>\u4e2d\u9605\u8bfb\u5173\u4e8eMirai\u3001Dyn\u548c\u201d\u7834\u574f\u4e92\u8054\u7f51\u7684\u653b\u51fb\u201d\u7684\u66f4\u591a\u5185\u5bb9\u3002<\/em><\/em><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-ransomware-cn\">\n","protected":false},"excerpt":{"rendered":"<p>\u6d41\u884c\u75c5\u6bd2\uff0c\u95f4\u8c0d\u6d3b\u52a8\uff0c\u7834\u574f\uff1a\u6211\u4eec\u9610\u8ff0\u4e86\u8fd1\u5e74\u6765\u8ba9\u4eba\u8bb0\u5fc6\u6700\u6df1\u523b\u7684\u7f51\u7edc\u653b\u51fb\u3002<\/p>\n","protected":false},"author":696,"featured_media":9966,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1506],"tags":[265,1757,752,1440,1756,1441,1755,1427,218,102,165,871,857,992,447],"class_list":{"0":"post-9965","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apt","9":"tag-darkhotel","10":"tag-ddos","11":"tag-expetr","12":"tag-mirai","13":"tag-notpetya","14":"tag-stuxnet","15":"tag-wannacry","16":"tag-218","17":"tag-102","18":"tag-165","19":"tag-871","20":"tag-857","21":"tag-992","22":"tag-447"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/five-most-notorious-cyberattacks\/9965\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/five-most-notorious-cyberattacks\/14716\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/13613\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/five-most-notorious-cyberattacks\/17277\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/five-most-notorious-cyberattacks\/16543\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/five-most-notorious-cyberattacks\/21607\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/five-most-notorious-cyberattacks\/5394\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/24506\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/five-most-notorious-cyberattacks\/11130\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/five-most-notorious-cyberattacks\/11042\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/five-most-notorious-cyberattacks\/10015\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/five-most-notorious-cyberattacks\/18055\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/five-most-notorious-cyberattacks\/21943\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/five-most-notorious-cyberattacks\/17566\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/%e6%94%bb%e5%87%bb\/","name":"\u653b\u51fb"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/9965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=9965"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/9965\/revisions"}],"predecessor-version":[{"id":11479,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/9965\/revisions\/11479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/9966"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=9965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=9965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=9965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}