Automobilka musela na deň zastaviť výrobu, ešte teraz ju infikoval červ WannaCry
Diskusia k článku: Automobilka musela na deň zastaviť výrobu, ešte teraz ju infikoval červ WannaCry
Prispievajte do diskusií ako
prihlásený užívateľ.
Komentár, na ktorý odpovedáte:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Jednoduchý dôvod prečo to pingovalo...
Od: Nepochopiteľný mechanizmus
|
Pridané:
2017-06-21 22:24:59
Security researchers studying malware like WannaCry will often install it in a virtual environment, much as biologists will grow bacteria in a petri dish. Anticipating this, malware sometimes tries to detect whether it’s in a digital petri dish. If so, it shuts down to prevent further analysis.
WannaCry’s petri dish detection strategy was to ping a web address that the program’s authors knew didn’t exist. On the real internet, the request would fail, but a virtual machine might return a fake website, alerting WannaCry that the software wasn’t operating on the real internet.
But once a security researcher actually registered the domain, this strategy backfired. Suddenly, copies of WannaCry on the real internet believed they were in a digital sandbox and shut down.
|