English 中文網 漫畫網 愛新聞iNews 翻譯論壇
中國網站品牌欄目(頻道)
當前位置: Language Tips > 新聞選讀

世界最強計算機病毒被發現
Flame: world's most complex computer virus exposed

[ 2012-05-29 13:03] 來源:中國日報網     字號 [] [] []  
免費訂閱30天China Daily雙語新聞手機報:移動用戶編輯短信CD至106580009009

俄羅斯電腦安全公司卡巴斯基實驗室近日宣布,他們發現了目前為止世界上最復雜的一種電腦病毒“火焰”,它能收集數據、遠程更改電腦設置、打開電腦麥克風并收錄電腦周邊的談話,還能截屏并復制即時通訊工具聊天內容。專家表示,該病毒主要鎖定伊朗等中東國家,其破壞能力比之前發現的Stuxnet和Duqu蠕蟲病毒要強20多倍,推測應為國家資助開發的病毒。卡巴斯基實驗室表示,該病毒早在五年前就進入計算機網絡,目前已經感染了伊朗、以色列、蘇丹、敘利亞、黎巴嫩、沙特阿拉伯以及埃及等國的計算機設備。有研究人員表示,“火焰”病毒背后的操作者可能與Stuxnet和Duqu蠕蟲病毒為同一個或幾個國家。

世界最強計算機病毒被發現

世界最強計算機病毒被發現

Kaspersky Labs said the program appeared to have been released five years ago and had infected machines in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.

Middle Eastern states were targeted and Iran ordered an emergency review of official computer installations after the discovery of a new virus, known as Flame.

Experts said the massive malicious software was 20 times more powerful than other known cyber warfare programs including the Stuxnet virus and could only have been created by a state.

It is the third cyber attack weapon targeting systems in the Middle East to be exposed in recent years.

Iran has alleged that the West and Israel are orchestrating a secret war of sabotage using cyber warfare and targeted assassinations of its scientists as part of the dispute over its nuclear program.

Stuxnet attacked Iran's nuclear program in 2010, while a related program, Duqu, named after the Star Wars villain, stole data.

Flame can gather data files, remotely change settings on computers, turn on computer microphones to record conversations, take screen shots and copy instant messaging chats.

The virus was discovered by a Russian security firm Kaspersky lad that specializes in targeting malicious computer code.

It made the 20 gigabyte virus available to other researchers yesterday claiming it did not fully understand its scope and said its code was 100 times the size of the most malicious software.

Kaspersky Labs said the program appeared to have been released five years ago and had infected machines in Iran, Israel, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.

"If Flame went on undiscovered for five years, the only logical conclusion is that there are other operations ongoing that we don't know about," Roel Schouwenberg, a Kaspersky security senior researcher, said.

Professor Alan Woodward from the department of computing at the University of Surrey said the virus was extremely invasive. It could "vacuum up" information by copying keyboard strokes and the voices of people nearby.

"This wasn't written by some spotty teenager in his/her bedroom. It is large, complicated and dedicated to stealing data whilst remaining hidden for a long time," he said.

The virus contains about 20 times as much code as Stuxnet, which attacked an Iranian uranium enrichment facility, causing centrifuges to fail. Iran's output of uranium was suffered a severe blow as a result of the Stuxnet activities.

Mr Schouwenberg said there was evidence to suggest the code was commissioned by the same nation or nations that were behind Stuxnet and Duqu.

Iran's Computer Emergency Response Team said it was "a close relation" of Stuxnet, which has itself been linked to Duqu, another complicated information-stealing virus is believed to be the work of state intelligence.

It said organizations had been given software to detect and remove the newly-discovered virus at the beginning of May.

Crysys Lab, which analyses computer viruses at Budapest University. said the technical evidence for a link between Flame and Stuxnet or Duqu was inconclusive.

The newly-discovered virus does not spread itself automatically but only when hidden controllers allow it.

Unprecedented layers of software allow Flame to penetrate remote computer networks undetected.

The file, which infects Microsoft Windows computers, has five encryption algorithms, exotic data storage formats and the ability to steal documents, spy on computer users and more.

Components enable those behind it, who use a network of rapidly-shifting "command and control" servers to direct the virus, to turn microphone into listening devices, siphon off documents and log keystrokes.

Eugene Kaspersky, the founder of Kaspersky Lab, noted that "it took us 6 months to analyse Stuxnet. [This] is 20 times more complicated".

Once a machine is infected additional modules can be added to the system allowing the machine to undertake specific tracking projects.

相關閱讀

黑客以MJ之名傳播病毒

病毒今日爆發 愚人還是害人

(Agencies)

世界最強計算機病毒被發現

(中國日報網英語點津 Helen 編輯)

 
中國日報網英語點津版權說明:凡注明來源為“中國日報網英語點津:XXX(署名)”的原創作品,除與中國日報網簽署英語點津內容授權協議的網站外,其他任何網站或單位未經允許不得非法盜鏈、轉載和使用,違者必究。如需使用,請與010-84883631聯系;凡本網注明“來源:XXX(非英語點津)”的作品,均轉載自其它媒體,目的在于傳播更多信息,其他媒體如需轉載,請與稿件來源方聯系,如產生任何問題與本網無關;本網所發布的歌曲、電影片段,版權歸原作者所有,僅供學習與研究,如果侵權,請提供版權證明,以便盡快刪除。
 

關注和訂閱

人氣排行

翻譯服務

中國日報網翻譯工作室

我們提供:媒體、文化、財經法律等專業領域的中英互譯服務
電話:010-84883468
郵件:translate@chinadaily.com.cn
 
 
主站蜘蛛池模板: 男女性爽大片视频男女生活| 打屁股xxxx| 波少野结衣色在线| 浮生陌笔趣阁免费阅读| 欧美精品亚洲精品日韩专区| 穿长筒袜的有夫之妇hd中文 | 少妇愉情理伦片高潮日本| 亚洲中文字幕无码久久| 精品国产一区二区三区久久| 国产成人无码免费看片软件 | 国产另类ts人妖一区二区| 99ri在线观看| 扒开双腿疯狂进出爽爽动态图 | 日韩在线播放全免费| 女人扒开下面让男人桶爽视频| 久久午夜羞羞影院免费观看| 欧美日韩亚洲人人夜夜澡| 午夜精品在线视频| 麻豆精品传媒成人精品| 国产色视频网免费| 一区二区不卡久久精品| 日本在线高清视频| 亚洲三级黄色片| 激情五月亚洲色图| 午夜视频在线观看区二区| 韩国三级bd高清中文字幕合集| 国产精品无码午夜福利| tstye.cn| 撞击老妇肉体之乱小说| 久久精品国产四虎| 欧美在线xxx| 亚洲精品一卡2卡3卡三卡四卡| 精品国产福利第一区二区三区| 国产又爽又黄又无遮挡的激情视频| 3d白洁妇珍藏版漫画第一章| 天天操天天干天天舔| 中国china体内谢o精| 日本免费色网站| 久久综合五月婷婷| 欧美人妻aⅴ中文字幕| 任我爽精品视频在线播放|