Skip to content

您的加密貨幣錢包安全嗎?ESET 研究報告揭示新攻擊手法

 

ESET 研究人員近日發現,黑客利用偽裝成 WhatsApp 和 Telegram 的木馬病毒,針對 Android 平台上的加密貨幣錢包展開攻擊。今次的攻擊使用了多種技巧,包括網絡釣魚、偽造程式以及利用網絡廣告等途徑,誘使用戶下載受感染的應用程式。

病毒被植入到了偽造的即時通訊應用中,當用戶下載並安裝這些程式後,木馬將開始監控用戶的行為。病毒會將手機中的加密貨幣錢包資訊盜取,並將其發送到黑客的遠端伺服器。此外,木馬還具有追蹤用戶的聊天記錄、通訊錄以及其他敏感資料的功能。

研究人員表示,這些惡意應用程式使用了多種技術來繞過 Google Play 商店的安全措施。例如,它們使用了動態代碼加載(DCL)來隱藏惡意行為,並在應用程式啟動時將木馬下載到受害者的裝置上。此外,它們還利用了短時間內大量的五星評價,以提高應用程式的排名,吸引更多用戶下載。

目前,這些偽裝成 WhatsApp 和 Telegram 的木馬病毒已經影響了數萬名用戶。為了避免成為受害者,安全專家建議用戶遵循以下幾點建議:

  • 必須從官方應用商店下載應用程式,避免使用第三方應用市場或直接下載 APK 文件
  • 在下載應用程式前,查看應用的評論和評分,並確保開發者具有良好的口碑
  • 定期更新手機操作系統和應用程式,以獲得最新的安全更新
  • 安裝可靠的安全軟件,以防範惡意軟件和其他網絡威脅
  • 對於敏感的金融資訊,使用額外的安全措施,如雙重身份驗證

 

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

常見的 WhatsApp 詐騙方式及自保方法

使用社交媒體或通訊可能會帶來許多風險,例如在 Whatsapp 上遇到詐騙。這些詐騙可能會導致您失去個人資訊、金錢或者網絡安全。在這篇文章中,我們將介紹一些常見的 Whatsapp 詐騙和如何避免成為受害者。

1. 恐嚇式詐騙
恐嚇式詐騙是一種騙取金錢的詐騙,詐騙者會聲稱擁有您的私人資訊或裸照,並威脅公開這些資訊,除非您支付贖金。為了避免這種詐騙,請勿將任何私人資訊或裸照傳送給陌生人,並將您的私隱設定為僅限好友或家人可見。

2. 獎金詐騙
獎金詐騙是一種騙取個人資訊的詐騙,詐騙者會聲稱您已獲得一個大獎金,但需要您提供個人資訊或支付手續費才能領取獎金。為了避免這種詐騙,請不要相信任何您沒有參加的獎項或比賽,並避免向陌生人提供個人資訊。

3. 購物詐騙
購物詐騙是一種騙取金錢的詐騙,詐騙者會聲稱他們可以提供高品質、低價格的產品或服務,但實際上他們只會收取您的金錢但不履行承諾。為了避免這種詐騙,請避免在 Whatsapp 上向陌生人購買產品或服務,而應該選擇可信賴的網上商店進行購物。

4. 假冒身份詐騙
假冒身份詐騙是一種騙取個人資訊的詐騙,詐騙者會冒充一個權威機構或公司,要求您提供個人資訊或登錄帳戶。為了避免這種詐騙,請先驗證該機構或公司是否真實存在,可以通過他們的官方網站或聯繫他們的客戶支援部門。同時,不要在 Whatsapp 上向任何人透露您的帳戶資訊或密碼。

5. 鏈結詐騙
鏈結詐騙是一種通過向您發送有害鏈結來騙取個人資訊或網絡安全的詐騙。這些鏈結可能會帶有惡意軟件或病毒,一旦您點擊了這些鏈接,詐騙者就能夠在您的設備上偷取您的個人資訊。為了避免這種詐騙,請不要點擊任何來自陌生人或未知來源的鏈接,同時,請使用最新的防病毒軟件保護您的設備。

總結
在使用 Whatsapp 時,請注意上述常見的詐騙,避免成為受害者。同時,請保護您的私隱和網絡安全,不要將任何私人資訊傳送給陌生人,並使用最新的防病毒軟件保護您的設備。如果您收到任何可疑信息,請勿點擊鏈結或提供個人資訊。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

February 2023: What’s New?

“What’s New?” is a series of blog posts covering recent changes to Comet in more detail. This article covers the latest changes in Comet Voyager over February 2023.

There were just three Comet software releases during February – two in the 22.12.x Voyager release series, plus the launch of our latest quarterly series 23.3.0 “Leda”.

February is a short month, and it was also a quiet month for new feature development as we focused on quality assurance ahead of the new quarterly software release. Most new feature development this month has been held back as a result, so you will see many more exciting new features land in the 23.3.x “Voyager” series when it reopens shortly next month in March.

Better email reports

The latest 22.12.x versions of Comet included improvements to the email reporting features that launched at the start of the 22.12.x series.

The Recent Activity email report template now includes a table legend in the email footer, helping to distinguish the color series from each other. By way of comparison, when you view Comet Server’s Recent Activity page in a web browser, it’s possible to hover the mouse over each color segment to display more detailed information about the breakdown of different job types. However, email is a more limited technology medium and an equivalent hover feature is not available. The legend is a simple solution that makes the Recent Activity email report more accessible to Comet Server operators who are not yet familiar with the colors.

The email feature has received more attention to detail, leading to us developing additional fixes for email report previews; for filtering the subset of customers; and for partial configuration of time boundaries.

Better granular restore

Another one of our areas of focus this month has been the granular single-file restore system, that now shares some common core functionality across both the Disk Image and Hyper-V Protected Item types. Granular restore now supports more types of NTFS compressed file, including a fix for files that have been compressed with the LZNT1 algorithm. We also fixed an issue with reading single files from within NTFS partitions that have a highly fragmented MFT (Master File Table).

Additionally, we have fixed additional issues with the new Hyper-V single-file restore if a single Protected Item contains multiple virtual machines with multiple VHDX images, as well as fixing cosmetic issues when toggling between Protected Item types in the Comet Backup desktop app.

Better syncing with Gradient MSP

There have been improvements to the process of syncing Comet data with Gradient MSP. As a reminder, this is an external service that can correlate your Comet user accounts and storage usage with RMM invoices in systems such as Autotask, Syncro RMM, Connectwise, and many more.

The latest versions of Comet Server allow more fine-grained control of the connected feature set; the ability to toggle sending backup job failures to the RMM; optimizing the number of alerts that are sent; and providing clearer error messages if there is an error from Gradient’s service.

Comet 23.3.0 “Leda”

All of our focus on bugfixes this month has been building up to one thing – a smooth and seamless release of our latest quarterly milestone software version. This time, it’s named “Leda”, and this rolls up the whole quarter’s worth of 22.12.x enhancements into a new fixed point for you to build your business on.

Like Comet’s previous recent quarterly software releases, “Leda” is named after a moon of Jupiter. Jupiter has a great number of moons and more are continuing to be discovered. When Leda was discovered as recently as 1974, it was one of Jupiter’s 13 known moons. Today, Jupiter has 92 known moons, with the most recent discovered just this month in February 2023!

You can read the full release notes for Comet 23.2.0 “Leda” to see the full details – or if you’d prefer to watch rather than read, I’m hosting a webinar next week to discuss this new quarterly release and all its new features. Please register for a notification before we go live on March 7th (PST) to catch up on all the latest Comet news with me – there will be a free live Q&A session after the presentation.

As well as that, we have many more videos available on our YouTube channel, including guides on getting started with Comet, individual features, demonstrations with our technology partners, and webinars for previous quarterly software releases.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

BlackLotus UEFI Bootkit 突破現有的安全防禦措施?

 

近日,ESET 研究人員發現了一個新的 UEFI Bootkit,稱為 BlackLotus,並對其進行了深入分析。在過去的幾年中,關於 UEFI Bootkit 的討論一直存在,但實際上,這樣的攻擊並不常見。然而 BlackLotus 的出現表明,UEFI Bootkit 攻擊不再是一個傳說,而是一個實實在在的威脅。

BlackLotus 是一個高度進化的 Bootkit,它可以繞過 UEFI 固件的保護措施,並在系統啟動時啟動。它使用高度加密的代碼,使其難以被檢測和分析。它可以在啟動過程中載入惡意操作系统(OS),從而掌控系統。一旦控制權被取得,攻擊者可以執行各種攻擊,包括竊取敏感數據、執行命令和銷毀系統。

BlackLotus 使用的技術和技巧顯示出攻擊者對 UEFI Bootkit 攻擊的深入理解和進階技能。這也表明,對於電腦製造商和用戶來說,保護 UEFI 固件的安全非常重要。

BlackLotus 的攻擊主要包括三個步驟:


ESET 的研究人員建議,為了防止 UEFI Bootkit 攻擊,電腦製造商和用戶應該採取以下措施:

  • 更新 UEFI 固件:定期檢查並更新 UEFI 固件,以確保其安全性
  • 檢測 UEFI Bootkit:使用安全軟件和工具,檢測是否存在 UEFI Bootkit 攻擊
  • 強化安全措施:加強安全措施,包括使用可信的軟件、設置強密碼和啟用 UEFI Secure Boot 等

ESET 的研究人員表示,UEFI Bootkit 攻擊的出現表明,攻擊者不斷尋找新的攻擊方法,以突破現有的安全防禦措施。因此,對於企業和個人用戶來說,保持高度警覺和強化安全措施是非常重要。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

BlackLotus UEFI Bootkit 突破現有的安全防禦措施?

 

近日,ESET 研究人員發現了一個新的 UEFI Bootkit,稱為 BlackLotus,並對其進行了深入分析。在過去的幾年中,關於 UEFI Bootkit 的討論一直存在,但實際上,這樣的攻擊並不常見。然而 BlackLotus 的出現表明,UEFI Bootkit 攻擊不再是一個傳說,而是一個實實在在的威脅。

BlackLotus 是一個高度進化的 Bootkit,它可以繞過 UEFI 固件的保護措施,並在系統啟動時啟動。它使用高度加密的代碼,使其難以被檢測和分析。它可以在啟動過程中載入惡意操作系统(OS),從而掌控系統。一旦控制權被取得,攻擊者可以執行各種攻擊,包括竊取敏感數據、執行命令和銷毀系統。

BlackLotus 使用的技術和技巧顯示出攻擊者對 UEFI Bootkit 攻擊的深入理解和進階技能。這也表明,對於電腦製造商和用戶來說,保護 UEFI 固件的安全非常重要。

BlackLotus 的攻擊主要包括三個步驟:


ESET 的研究人員建議,為了防止 UEFI Bootkit 攻擊,電腦製造商和用戶應該採取以下措施:

  • 更新 UEFI 固件:定期檢查並更新 UEFI 固件,以確保其安全性
  • 檢測 UEFI Bootkit:使用安全軟件和工具,檢測是否存在 UEFI Bootkit 攻擊
  • 強化安全措施:加強安全措施,包括使用可信的軟件、設置強密碼和啟用 UEFI Secure Boot 等

ESET 的研究人員表示,UEFI Bootkit 攻擊的出現表明,攻擊者不斷尋找新的攻擊方法,以突破現有的安全防禦措施。因此,對於企業和個人用戶來說,保持高度警覺和強化安全措施是非常重要。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×