这位小哥化名为MalwareTech,他无意中将该病毒中隐藏的“自杀开关” 据BBC报道:
The researcher first noticed that the malware was trying to contact a specific web address every time it infected a new computer.
这位研究员率先注意到这款病毒每次感染一台新的电脑时都试图访问一个特定的域名。
But the web address it was trying to contact had not been registered.
但是这个域名并没有被注册。
MalwareTech decided to register it, and bought it for $10.69. Owning it would let him see where computers were accessing it from, and give him an idea of how widespread the ransomware was.
MalwareTech花10.69美元 By doing so, he unexpectedly triggered part of the ransomware's code that told it to stop spreading.
但令他没有料到的是,这种做法激活了该勒索程序内终止传播的代码。
This type of code is known as a "kill switch", which some attackers use to halt the spread of their software if things get out of hand.
这种代码被称为“自杀开关”,有些黑客为了防止事态失控将其作为一个停止病毒扩散的开关。
小哥表示,只要该域名不被撤销,就不必担心。不过,他还是提醒大家“这事没完”,要尽快对操作系统安装补丁。因为他只是阻止了该病毒现行样本的扩散,但开发者也已经意识到了这项弱点,随时可能用升级版勒索程序卷土重来。
【注意:瘫痪全球电脑、逼哭中国学生,这个病毒又升级了!】相关文章:
最新
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15
2020-09-15