ÔÚ¹ýÈ¥µÄ¼¸¸öÔÂÖУ¬ÎÒÃǶÁµ½¹ýºÜ¶à¹ØÓÚNecurs½©Ê¬ÍøÂç»î¶¯µÄÐÂÎÅ£¬ÍøÂçÆ×ÓÀûÓøÃÍøÂç·¢ËÍÖÂÃüµÄLockyÀÕË÷Èí¼þ¡£Proofpoint ÉÏÖܵÄÒ»·Ý±¨¸æÒ²Ö¸³ö£¬ÔÚËùÓÐͨ¹ýÀ¬»øÓʼþ´«²¥µÄ¶ñÒâÎļþÖУ¬LockyÕ¼97%¡£
Check Point·¢²¼µÄÍêÕûÅÅÐаñÈçÏ£º
1.Conficker
ConfickerÊÇÒ»ÖÖÕë¶Ô΢ÈíµÄWindows²Ù×÷ϵͳµÄ¼ÆËã»úÈ䳿²¡¶¾£¬Conficker²¡¶¾×îÔçµÄ°æ±¾³öÏÖÔÚ2008ÄêÇï¼¾¡£ Conficker×÷ΪһÖÖ¡°¸ÐȾ¡±¹¤¾ß£¬´«²¥Ö÷Ҫͨ¹ýÔËÐÐWindowsϵͳµÄ·þÎñµÄ»º³åÇøÂ©¶´¡£²»¹ýµ±ConfickerÈ䳿²¡¶¾½ÓÊÕÀ´×ÔC£¦C·þÎñÆ÷µÄÖ¸Áîʱ£¬ËüÃÇ»¹¿ÉÒÔÏÂÔØÆäËû¶ñÒâÈí¼þ¡¢ÇÔȡƾ֤»ò½ûÓð²È«Èí¼þ ¡£
2.Sality
Sality²¡¶¾³öÏÖÓÚ2003Ä꣬ËüÄܹ»Í¨¹ý²»Í¬µÄ·½·¨¸ÐȾ¼ÆËã»ú£¬ÕâÒ»²¡¶¾±»ÈÏΪԴÓÚ¶íÂÞ˹¡£SalityÊÇÒ»ÖÖ¶àÐÎ̬µÄ¶ñÒâÈí¼þ£¬Ëü²»¶Ï·¢Õ¹±ä»¯²¢ÄÑÒÔ±»¼ì²âµ½£¬¶øÇÒͨ¹ý¸ÐȾ¿ÉÖ´ÐÐÎļþ²¢ÏÂÔØ¸ü¼Ó¸´ÔӵĶñÒâÈí¼þʵʩ¹¥»÷¡£Ëü¾ÍÏñConfickerÒ»Ñù£¬Í¨¹ýÒ»¸ö¾Þ´óµÄ½©Ê¬ÍøÂçÊܿء£
3. Locky
LockyÊÇÀÕË÷Èí¼þ¼Ò×åгÉÔ±£¬³öÏÖÓÚ2016ÄêÄê³õ£¬Í¨¹ýRSA-2048ºÍAES-128Ëã·¨¶Ô100¶àÖÖÎļþÀàÐͽøÐмÓÃÜ¡£Lockyͨ¹ý©¶´¹¤¾ß°ü»ò°üº¬JS¡¢WSF¡¢ HTA»òLNKÎļþµÄµç×ÓÓʼþ´«²¥¡£
4. Cutwail
CutwailÊÇÒ»¿î½©Ê¬ÍøÂ磬ÓÃÓÚDDoS¹¥»÷²¢·¢ËÍÀ¬»øÓʼþ¡£CutwailʹÓÃÁ˼òµ¥µÄÐÇÐνṹ£¬ÃüÁîºÍ¿ØÖÆ·þÎñÆ÷λÓÚÖм䡣
5. Zeus
ZeusÊǼ¸Äêǰ³öÏÖµÄÒ»¿îÒøÐÐľÂí£¬ÆäÔ´ÂëÔÚ¼¸Äêǰ¾Í±»Ð¹Â¶¡£ZeusÊǵ±Ç°Ðí¶àÕë¶Ô×ÀÃæÓû§µÄÒøÐÐľÂíµÄ»ù´¡¡£ZeusÀûÓÃä¯ÀÀÆ÷ÖмäÈ˼üÅÌÈÕÖ¾ºÍÐÎʽץȡ·½Ê½ÇÔÈ¡¿Í»§Êý¾Ý¡£
6. Chanitor
ChanitorÓÖ±»³ÆÎªHancitor »òH1N1,ʹÓÃÀ¬»øÓʼþÀ´´«²¥Ä¾Âí¡£
7. Tinba
TinbaÒ²±»³ÆÎªTiny Banker»òZusy£¬ÊÇÊÀ½çÉÏ×îСµÄÒøÐÐľÂíÖ®Ò»£¬¹ýÈ¥ËüµÄ¸ÐȾĿ±êÒ»Ö±¶¼ÊÇÑÇÖÞ¹ú¼Ò¡£TinbaʹÓÃÍøÂç¸ÐȾÀ´¹¥ÏÝä¯ÀÀÆ÷²¢ÔÚÕæÊµµÄÒøÐÐÃÅ»§ÍøÕ¾ÉÏÏÔʾÐé¼ÙµÄÍøÒ³¡£
8. Cryptowall
CryptowallÊÇCryptoLockerÀÕË÷Èí¼þµÄ±äÖÖ¡£Æ×Óͨ¹ý¶ñÒâ¹ã¸æºÍµöÓãÀ´´«²¥CryptowallÀÕË÷Èí¼þ¡£
9.Blackhole
BlackholeÊÇÒ»ÖÖ¶ñÒâ³ÌÐò¹¤¾ß°ü£¬×÷ÕßÊÇÏÖÄê29ËêµÄ¶íÂÞ˹ÈËDmitry Fedotov¡£Blackhole±»ÎÞÊý·¸×OÍÅÀûÓã¬Ä¿Ç°FedotovÒѱ»¾¯·½´þ²¶¡£
10. Nivdort
NivdortÓÖ³ÆBayrob£¬ÊÇÔÚ2007Äê³öÏÖµÄÄ£¿é»¯Ä¾Âí¡£Æ×Óͨ¹ýÀ¬»øÓʼþ´«²¥Nivdort²¢ÓÃËüÀ´ÊÕ¼¯ÃÜÂë¡¢ÐÞ¸ÄϵͳÉèÖûòÏÂÔØÆäËû¶ñÒâÈí¼þ¡£
±¾ÎĵØÖ·£ºhttp://www.linuxprobe.com/malicious-software.html


Ronny ÓÚ 2016-11-08 23:07:08·¢±í:
´ó¼Ò¿ìÀ´¿´¿´ÕâЩ¶ñÒâÈí¼þÄãÓÐûÓмû¹ý