Skip to content

常見的 WhatsApp 詐騙方式及自保方法

使用社交媒體或通訊可能會帶來許多風險,例如在 Whatsapp 上遇到詐騙。這些詐騙可能會導致您失去個人資訊、金錢或者網絡安全。在這篇文章中,我們將介紹一些常見的 Whatsapp 詐騙和如何避免成為受害者。

1. 恐嚇式詐騙
恐嚇式詐騙是一種騙取金錢的詐騙,詐騙者會聲稱擁有您的私人資訊或裸照,並威脅公開這些資訊,除非您支付贖金。為了避免這種詐騙,請勿將任何私人資訊或裸照傳送給陌生人,並將您的私隱設定為僅限好友或家人可見。

2. 獎金詐騙
獎金詐騙是一種騙取個人資訊的詐騙,詐騙者會聲稱您已獲得一個大獎金,但需要您提供個人資訊或支付手續費才能領取獎金。為了避免這種詐騙,請不要相信任何您沒有參加的獎項或比賽,並避免向陌生人提供個人資訊。

3. 購物詐騙
購物詐騙是一種騙取金錢的詐騙,詐騙者會聲稱他們可以提供高品質、低價格的產品或服務,但實際上他們只會收取您的金錢但不履行承諾。為了避免這種詐騙,請避免在 Whatsapp 上向陌生人購買產品或服務,而應該選擇可信賴的網上商店進行購物。

4. 假冒身份詐騙
假冒身份詐騙是一種騙取個人資訊的詐騙,詐騙者會冒充一個權威機構或公司,要求您提供個人資訊或登錄帳戶。為了避免這種詐騙,請先驗證該機構或公司是否真實存在,可以通過他們的官方網站或聯繫他們的客戶支援部門。同時,不要在 Whatsapp 上向任何人透露您的帳戶資訊或密碼。

5. 鏈結詐騙
鏈結詐騙是一種通過向您發送有害鏈結來騙取個人資訊或網絡安全的詐騙。這些鏈結可能會帶有惡意軟件或病毒,一旦您點擊了這些鏈接,詐騙者就能夠在您的設備上偷取您的個人資訊。為了避免這種詐騙,請不要點擊任何來自陌生人或未知來源的鏈接,同時,請使用最新的防病毒軟件保護您的設備。

總結
在使用 Whatsapp 時,請注意上述常見的詐騙,避免成為受害者。同時,請保護您的私隱和網絡安全,不要將任何私人資訊傳送給陌生人,並使用最新的防病毒軟件保護您的設備。如果您收到任何可疑信息,請勿點擊鏈結或提供個人資訊。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

February 2023: What’s New?

“What’s New?” is a series of blog posts covering recent changes to Comet in more detail. This article covers the latest changes in Comet Voyager over February 2023.

There were just three Comet software releases during February – two in the 22.12.x Voyager release series, plus the launch of our latest quarterly series 23.3.0 “Leda”.

February is a short month, and it was also a quiet month for new feature development as we focused on quality assurance ahead of the new quarterly software release. Most new feature development this month has been held back as a result, so you will see many more exciting new features land in the 23.3.x “Voyager” series when it reopens shortly next month in March.

Better email reports

The latest 22.12.x versions of Comet included improvements to the email reporting features that launched at the start of the 22.12.x series.

The Recent Activity email report template now includes a table legend in the email footer, helping to distinguish the color series from each other. By way of comparison, when you view Comet Server’s Recent Activity page in a web browser, it’s possible to hover the mouse over each color segment to display more detailed information about the breakdown of different job types. However, email is a more limited technology medium and an equivalent hover feature is not available. The legend is a simple solution that makes the Recent Activity email report more accessible to Comet Server operators who are not yet familiar with the colors.

The email feature has received more attention to detail, leading to us developing additional fixes for email report previews; for filtering the subset of customers; and for partial configuration of time boundaries.

Better granular restore

Another one of our areas of focus this month has been the granular single-file restore system, that now shares some common core functionality across both the Disk Image and Hyper-V Protected Item types. Granular restore now supports more types of NTFS compressed file, including a fix for files that have been compressed with the LZNT1 algorithm. We also fixed an issue with reading single files from within NTFS partitions that have a highly fragmented MFT (Master File Table).

Additionally, we have fixed additional issues with the new Hyper-V single-file restore if a single Protected Item contains multiple virtual machines with multiple VHDX images, as well as fixing cosmetic issues when toggling between Protected Item types in the Comet Backup desktop app.

Better syncing with Gradient MSP

There have been improvements to the process of syncing Comet data with Gradient MSP. As a reminder, this is an external service that can correlate your Comet user accounts and storage usage with RMM invoices in systems such as Autotask, Syncro RMM, Connectwise, and many more.

The latest versions of Comet Server allow more fine-grained control of the connected feature set; the ability to toggle sending backup job failures to the RMM; optimizing the number of alerts that are sent; and providing clearer error messages if there is an error from Gradient’s service.

Comet 23.3.0 “Leda”

All of our focus on bugfixes this month has been building up to one thing – a smooth and seamless release of our latest quarterly milestone software version. This time, it’s named “Leda”, and this rolls up the whole quarter’s worth of 22.12.x enhancements into a new fixed point for you to build your business on.

Like Comet’s previous recent quarterly software releases, “Leda” is named after a moon of Jupiter. Jupiter has a great number of moons and more are continuing to be discovered. When Leda was discovered as recently as 1974, it was one of Jupiter’s 13 known moons. Today, Jupiter has 92 known moons, with the most recent discovered just this month in February 2023!

You can read the full release notes for Comet 23.2.0 “Leda” to see the full details – or if you’d prefer to watch rather than read, I’m hosting a webinar next week to discuss this new quarterly release and all its new features. Please register for a notification before we go live on March 7th (PST) to catch up on all the latest Comet news with me – there will be a free live Q&A session after the presentation.

As well as that, we have many more videos available on our YouTube channel, including guides on getting started with Comet, individual features, demonstrations with our technology partners, and webinars for previous quarterly software releases.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

BlackLotus UEFI Bootkit 突破現有的安全防禦措施?

 

近日,ESET 研究人員發現了一個新的 UEFI Bootkit,稱為 BlackLotus,並對其進行了深入分析。在過去的幾年中,關於 UEFI Bootkit 的討論一直存在,但實際上,這樣的攻擊並不常見。然而 BlackLotus 的出現表明,UEFI Bootkit 攻擊不再是一個傳說,而是一個實實在在的威脅。

BlackLotus 是一個高度進化的 Bootkit,它可以繞過 UEFI 固件的保護措施,並在系統啟動時啟動。它使用高度加密的代碼,使其難以被檢測和分析。它可以在啟動過程中載入惡意操作系统(OS),從而掌控系統。一旦控制權被取得,攻擊者可以執行各種攻擊,包括竊取敏感數據、執行命令和銷毀系統。

BlackLotus 使用的技術和技巧顯示出攻擊者對 UEFI Bootkit 攻擊的深入理解和進階技能。這也表明,對於電腦製造商和用戶來說,保護 UEFI 固件的安全非常重要。

BlackLotus 的攻擊主要包括三個步驟:


ESET 的研究人員建議,為了防止 UEFI Bootkit 攻擊,電腦製造商和用戶應該採取以下措施:

  • 更新 UEFI 固件:定期檢查並更新 UEFI 固件,以確保其安全性
  • 檢測 UEFI Bootkit:使用安全軟件和工具,檢測是否存在 UEFI Bootkit 攻擊
  • 強化安全措施:加強安全措施,包括使用可信的軟件、設置強密碼和啟用 UEFI Secure Boot 等

ESET 的研究人員表示,UEFI Bootkit 攻擊的出現表明,攻擊者不斷尋找新的攻擊方法,以突破現有的安全防禦措施。因此,對於企業和個人用戶來說,保持高度警覺和強化安全措施是非常重要。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

BlackLotus UEFI Bootkit 突破現有的安全防禦措施?

 

近日,ESET 研究人員發現了一個新的 UEFI Bootkit,稱為 BlackLotus,並對其進行了深入分析。在過去的幾年中,關於 UEFI Bootkit 的討論一直存在,但實際上,這樣的攻擊並不常見。然而 BlackLotus 的出現表明,UEFI Bootkit 攻擊不再是一個傳說,而是一個實實在在的威脅。

BlackLotus 是一個高度進化的 Bootkit,它可以繞過 UEFI 固件的保護措施,並在系統啟動時啟動。它使用高度加密的代碼,使其難以被檢測和分析。它可以在啟動過程中載入惡意操作系统(OS),從而掌控系統。一旦控制權被取得,攻擊者可以執行各種攻擊,包括竊取敏感數據、執行命令和銷毀系統。

BlackLotus 使用的技術和技巧顯示出攻擊者對 UEFI Bootkit 攻擊的深入理解和進階技能。這也表明,對於電腦製造商和用戶來說,保護 UEFI 固件的安全非常重要。

BlackLotus 的攻擊主要包括三個步驟:


ESET 的研究人員建議,為了防止 UEFI Bootkit 攻擊,電腦製造商和用戶應該採取以下措施:

  • 更新 UEFI 固件:定期檢查並更新 UEFI 固件,以確保其安全性
  • 檢測 UEFI Bootkit:使用安全軟件和工具,檢測是否存在 UEFI Bootkit 攻擊
  • 強化安全措施:加強安全措施,包括使用可信的軟件、設置強密碼和啟用 UEFI Secure Boot 等

ESET 的研究人員表示,UEFI Bootkit 攻擊的出現表明,攻擊者不斷尋找新的攻擊方法,以突破現有的安全防禦措施。因此,對於企業和個人用戶來說,保持高度警覺和強化安全措施是非常重要。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

ESET Research: China-aligned Mustang Panda’s latest backdoor targets Europe, Asia, and Australia

  • ESET researchers have analyzed MQsTTang, a new custom backdoor that we attribute to the China-aligned Mustang Panda APT group.
  • Confirmed targets are in Bulgaria and Australia, with a likely target in Taiwan.
  • Due to the nature of the decoy filenames used, ESET researchers believe that political and governmental organizations in Europe and Asia are also being targeted.
  • The malware uses the MQTT protocol for Command and Control communication. MQTT is typically used for communication between Internet of Things (IoT) devices and controllers. This protocol hasn’t been used in many publicly documented malware families.
  • MQsTTang is distributed in RAR archives that only contain a single executable. These executables usually have names related to diplomacy and passports.

BRATISLAVA, MONTREAL — March 2, 2023 — ESET researchers have just analyzed MQsTTang, a new custom backdoor that we attribute to the China-aligned Mustang Panda APT group. This backdoor is part of an ongoing campaign that ESET can trace back to early January 2023. ESET Research has seen unknown entities in Bulgaria and Australia in our telemetry as targets. ESET also has information indicating that Mustang Panda is targeting a governmental institution in Taiwan. Due to the nature of the decoy filenames used, ESET researchers believe that political and governmental organizations in Europe and Asia are also being targeted. The Mustang Panda campaign is still ongoing as of this writing, and the group has increased its activity in Europe since Russia’s invasion of Ukraine.

“Unlike most of the group’s malware, MQsTTang doesn’t seem to be based on existing families or publicly available projects,” says ESET researcher Alexandre Côté Cyr, who discovered the ongoing campaign. “This new MQsTTang backdoor provides a kind of remote shell without any of the bells and whistles associated with the group’s other malware families. However, it shows that Mustang Panda is exploring new technology stacks for its tools,” he explains. “It remains to be seen whether this backdoor will become a recurring part of their arsenal, but it is one more example of the group’s fast development and deployment cycle,” concludes Côté Cyr.

Based on our telemetry, ESET Research can confirm that unknown entities in Bulgaria and Australia are being targeted. In addition, a governmental institution in Taiwan appears to be a target. The victimology is unclear, but the decoy filenames make ESET believe that political and governmental organizations in Europe and Asia are also being targeted. This would also be in line with the targeting of the group’s latest campaigns.

MQsTTang is a barebones backdoor that allows the attacker to execute arbitrary commands on a victim’s machine and capture the output. The malware uses the MQTT protocol for Command-and-Control communication. MQTT is typically used for communication between IoT devices and controllers, and the protocol hasn’t been used in many publicly documented malware families. MQsTTang is distributed in RAR archives that only contain a single executable. These executables usually have filenames related to diplomacy and passports. For more technical information about MQsTTang, check out the blog post “MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×