Botnet 'ensnares government PCs' 僵尸网络“入侵政府PC”
文章来源: 文章作者: 发布时间:2009-04-22 03:25 字体: [ ]  进入论坛
(单词翻译:双击或拖选)

Almost two million PCs globally, including machines inside UK and US government departments, have been taken over by malicious1 hackers2.

包括英国和美国政府部门在内的全球将近200万的电脑被黑客恶意攻击。

 

Security experts Finjan traced the giant network of remotely-controlled PCs, called a botnet(僵尸网络), back to a gang of cyber criminals in the Ukraine.

Several PCs inside six UK government bodies were compromised by the botnet.

Finjan has contacted the Metropolitan3 Police with details of the government PCs and it is now investigating.

A spokesman for the Cabinet Office, which is charged with setting standards for the use of information technology across government, said it would not comment on specific attacks "for security reasons".

"It is Government policy neither to confirm nor deny if an individual organisation4 has been the subject of an attack nor to speculate(思索,推测) on the origins or success of such attacks."

He added: "We constantly monitor new and existing risks and work to minimise their impact by alerting departments and giving them advice and guidance on dealing5 with the threat."

How does a botnet work?

It is the second time in a year that PCs inside government departments have been hacked6 to form part of a botnet.

On this occasion, the machines were infected with software which allowed them to be taken over and enslaved in the botnet due to vulnerabilities(脆弱点) in web browsers7.

 

PCs inside a botnet can be forced to carry out instructions

At the mercy

Once a machine has been compromised, it can be instructed to download further software, which puts the machine at the mercy of malicious hackers.

The compromised PCs are capable of reading e-mail addresses, copying files, recording8 keystrokes, sending spam and capturing screen shots.

Once a single machine inside a corporate9 network has been made part of the botnet it puts other machines on the network at risk.

The Cabinet Office would not give details of what the compromised machines had been instructed to do, nor the names of the different government departments that had been infiltrated(浸润,渗透).

The cyber criminals, who have not been caught, were selling access to the compromised machines, thought to be mainly PCs inside companies, on a hackers' forum10 in Russia.

One thousand machines were being sold at a time for between $50 and $100.

Finjan reports that the botnet is under the control of six criminals who are able to remotely control the infected machines.

Different organisations

Almost half of the infected machines were in the US. Six percent of the botnet, about 114,000 machines from 52 different organisations, were from the UK, among them a single PC inside the BBC's network.

Many of the infected machines will have been caught by routine information security policies at firms, as it was in the case of the BBC, but Finjan says many of the botnet PCs are still active.

More than 70 different national government agencies from around the world were caught up in the malicious network.

Yuval Ben-Itzhak, chief technology officer for Finjan, told BBC News: "When we looked at the network domain11 names to see where the [compromised PCs] come from we were surprised to see many government networks, including UK government computers.

"Obviously we reported it and they have now dealt with it. There were six UK agencies with at least one computer in each department that was running the bot.

"I'm not at liberty to name the actual agencies - but this isn't a unique story to the UK, they were running in many other non-UK, government bodies too."

 

Government bodies

A number of different government bodies are responsible for IT security and deployment12 across the UK.

They include the Central Sponsor for Information Assurance, the National Technical Authority for Information Assurance, and the the Centre for the Protection of National Infrastructure13 (CPNI), the government body which is part of the British Security Service and responsible for providing security advice to organisations that make up critical services in the UK.

All of the infected machines were Windows-based PCs and the vulnerability(弱点,漏洞) was targeting security holes in Internet Explorer and Firefox.

Mr Ben-Itzhak said: "What is unique is the number the size of the network. When we look at a similar network last year they were in the hundreds of thousands. Now were looking at mega-size botnets."

In contact

A spokeswoman for the Metropolitan Police said: "This is an ongoing14 investigation15. We are aware of this botnet and are taking appropriate action."

Large botnets can be used to co-ordinate attacks to knock parts of the network, or specific websites, offline, called a Distributed Denial of Service attack.

Last year, the CPNI told a Cabinet Office-commissioned independent review that stopping such attacks was difficult.

It said: "The attacks are relatively16 low in sophistication(诡辩,强词夺理), but have been highly effective due to the large number of compromised machines involved.

"It is difficult to defend against a sophisticated Distributed Denial of Service attack without impacting legitimate17 business use."

The CPNI recommended that the best defence against these attacks was appropriate monitoring of the network.



点击收听单词发音收听单词发音  

1 malicious e8UzX     
adj.有恶意的,心怀恶意的
参考例句:
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
2 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
3 metropolitan mCyxZ     
adj.大城市的,大都会的
参考例句:
  • Metropolitan buildings become taller than ever.大城市的建筑变得比以前更高。
  • Metropolitan residents are used to fast rhythm.大都市的居民习惯于快节奏。
4 organisation organisation     
n.组织,安排,团体,有机休
参考例句:
  • The method of his organisation work is worth commending.他的组织工作的方法值得称道。
  • His application for membership of the organisation was rejected.他想要加入该组织的申请遭到了拒绝。
5 dealing NvjzWP     
n.经商方法,待人态度
参考例句:
  • This store has an excellent reputation for fair dealing.该商店因买卖公道而享有极高的声誉。
  • His fair dealing earned our confidence.他的诚实的行为获得我们的信任。
6 hacked FrgzgZ     
生气
参考例句:
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
7 browsers b559db93c279b7e4886705cb45f7ca9c     
浏览器
参考例句:
  • Three-layer architecture is a model made up of browser, web server and background database server. 这种体系结构是由Browser、Web Server、Database Server组成的浏览器/Web服务器/后台数据库服务器三层模型。 来自互联网
  • Another excellent approach is to abandon the browser entirely and, instead, create a non-browser-based, Internet-enabled application. 另一个非常好的方法是干脆放弃浏览器,取而代之,创建一个不基于浏览器,但却是基于互联网的应用。 来自About Face 3交互设计精髓
8 recording UktzJj     
n.录音,记录
参考例句:
  • How long will the recording of the song take?录下这首歌得花多少时间?
  • I want to play you a recording of the rehearsal.我想给你放一下彩排的录像。
9 corporate 7olzl     
adj.共同的,全体的;公司的,企业的
参考例句:
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
10 forum cilx0     
n.论坛,讨论会
参考例句:
  • They're holding a forum on new ways of teaching history.他们正在举行历史教学讨论会。
  • The organisation would provide a forum where problems could be discussed.这个组织将提供一个可以讨论问题的平台。
11 domain ys8xC     
n.(活动等)领域,范围;领地,势力范围
参考例句:
  • This information should be in the public domain.这一消息应该为公众所知。
  • This question comes into the domain of philosophy.这一问题属于哲学范畴。
12 deployment 06e5c0d0f9eabd9525e5f9dc4f6f37cf     
n. 部署,展开
参考例句:
  • He has inquired out the deployment of the enemy troops. 他已查出敌军的兵力部署情况。
  • Quality function deployment (QFD) is a widely used customer-driven quality, design and manufacturing management tool. 质量功能展开(quality function deployment,QFD)是一个广泛应用的顾客需求驱动的设计、制造和质量管理工具。
13 infrastructure UbBz5     
n.下部构造,下部组织,基础结构,基础设施
参考例句:
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
14 ongoing 6RvzT     
adj.进行中的,前进的
参考例句:
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
15 investigation MRKzq     
n.调查,调查研究
参考例句:
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
16 relatively bkqzS3     
adv.比较...地,相对地
参考例句:
  • The rabbit is a relatively recent introduction in Australia.兔子是相对较新引入澳大利亚的物种。
  • The operation was relatively painless.手术相对来说不痛。
17 legitimate L9ZzJ     
adj.合法的,合理的,合乎逻辑的;v.使合法
参考例句:
  • Sickness is a legitimate reason for asking for leave.生病是请假的一个正当的理由。
  • That's a perfectly legitimate fear.怀有这种恐惧完全在情理之中。
TAG标签:
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片