Skip to content

CISO 戰略簡報:以機器速度執行還原

預防雖然必要,但在 2026 年已不足以保全大局。隨著 AI 驅動的攻擊極大縮短了漏洞與入侵之間的距離,「還原」已從備份功能轉變為核心資安支柱。

「『希望』不是一種資安策略。在自主攻擊者與內部『AI 破壞』橫行的世界裡,您唯一的護盾就是即時恢復數據完整性與信任的能力。」

韌性的四大支柱

獨立性
減少供應商鎖定與交叉風險,以簡化還原流程。
不可竄改性
備份必須具備防篡改能力,即便管理員憑證遭竊也無法被刪除。
偵測能力
在損害擴散前,識別出異常行為與大規模數據損壞。
精準度
無需全環境回滾,即可針對特定項目或紀錄進行還原。

壓力測試您的策略

  • 您能否提供證據,辨識出 SaaS 數據最後一個已知的正常狀態?
  • 如果您的管理員帳號被盜,您的備份數據是否能免於被刪除?
  • 您能否快速且細粒度地僅針對受影響的部分進行還原?

關於 Keepit

Keepit 立足於為雲端時代提供新世代的 SaaS 資料保護。其核心理念是透過獨立於應用程式供應商的雲端儲存,為企業關鍵應用加上一道安全鎖,不僅強化網路韌性,更實現前瞻性的資料保護策略。其獨特、分隔且不可變的資料儲存設計,不涉及任何次級處理器,確保符合各地法規,有效抵禦勒索軟體等威脅,並保證關鍵資料隨時可存取、業務不中斷,以及快速高效的災難復原能力。總部位於丹麥哥本哈根的 Keepit,其辦公室與資料中心遍及全球,已贏得超過 15,000 家企業的深度信賴,客戶普遍讚譽其平台的直覺易用性,以及輕鬆、可靠的雲端資料備份與復原體驗。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

複製魚叉式網路釣魚:網路韌性簡報

複製魚叉式網路釣魚是一種精確的社交工程策略,攻擊者攔截合法郵件並製作完美複製品。透過將安全附件替換為惡意軟體,他們利用了您與同事或服務提供商之間已建立的信任。

戰術分析: 複製釣魚之所以成功,是因為它模仿了「重寄」或「修正」的行為。當我們相信信任的發件人只是在修復損壞的檔案或錯誤的連結時,心理防禦機制會大幅降低。

戰略比較

攻擊類型主要基礎執行風格
魚叉式網路釣魚針對性研究全新的、量身定制的郵件對話
複製魚叉式網路釣魚現有的信任感「重寄」或「更新」後的連結

零信任防禦檢查清單

  • 驗證發件人: 檢查「回覆地址」欄位是否存在技術上的異常。
  • 懸停測試: 在點擊任何連結前,務必檢查目標網址。
  • 憑證與網域綁定: 使用 NordPass 確保憑證僅在經過驗證的官方網域輸入。
  • 多管道確認: 透過 Slack 或電話確認可疑的「修正」請求。

OpenClaw 安全指南

安全警示: 提示詞注入不再只是文字遊戲,而是一種功能性漏洞,可能觸發非預期的系統級動作。
 

核心安全支柱

1. 環境隔離
在容器化沙盒(Docker/VM)中運行代理程式,防止主機遭受侵害。
2. 身分治理
為所有 API 整合部署具備特定權限範圍的「免洗」帳號,以限制損害半徑。
3. 人機協作控制
針對高影響力的系統指令與財務動作,建立人工審核關卡。
 

營運檢查清單

重點領域安全行動
網路層將服務綁定至 127.0.0.1;限制外部暴露。
存取權針對所有檔案存取強制執行最小權限原則 (PoLP)。
監控記錄所有代理指令與 API 互動,以利即時審計。

透過 NordLayer,團隊可以實施網路分段與設備狀態安全檢查,確保其 AI 環境在面對新興代理型威脅時依然具備強大的韌性。

關於 NordLayer
NordLayer 是現代企業的自適應性網絡存取安全解決方案,來自世界上其中一個最值得信賴的網絡安全品牌 Nord Security。致力於幫助 CEO、CIO 和 IT 管理員輕鬆應對網絡擴展和安全挑戰。NordLayer 與零信任網絡存取(ZTNA)和安全服務邊緣(SSE)原則保持一致,是一個無需硬件的解決方案,保護公司企業免受現代網絡威脅。通過 NordLayer,各種規模的公司企業都可以在不需要深入專業技術知識的情況下保護他們的團隊和網絡,它易於部署、管理和擴展。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Research uncovers CallPhantom scam on Google Play: Fake logs for real money

  • A new Android scam, CallPhantom, falsely claims to provide access to call logs, SMS records, and WhatsApp call history for any phone number in exchange for payment.
  • We identified and reported 28 separate CallPhantom apps on Google Play, cumulatively downloaded more than 7.3 million times.
  • Some CallPhantom apps sidestep Google Play’s official billing system, complicating victims’ refund efforts.

BRATISLAVA, KOŠICEMay 7, 2026 — ESET researchers have uncovered fraudulent apps on Google Play that claim to provide the call history “for any number.” The offending apps, which ESET named CallPhantom based on their false claims, purport to provide access to call histories, SMS records, and even WhatsApp call logs for any phone number. To unlock this supposed feature, users are asked to pay — but all they get in return is randomly generated data. ESET’s investigation identified 28 such fraudulent apps, cumulatively downloaded more than 7.3 million times. As an App Defense Alliance partner, we reported our findings to Google, which removed all of the apps identified in this report from Google Play. 

The CallPhantom apps mainly targeted Android users in India and the broader Asia Pacific region. Many of the apps came with India’s +91 country code preselected, and support UPI, a payment system used primarily in India.

“In November 2025, we came across a Reddit post discussing an app named Call History of Any Number, found on Google Play. Unsurprisingly, our analysis showed that the ‘call history’ data provided by this app is entirely fabricated — the app generates random phone numbers and matches them with fixed names, call times, and call durations, which were embedded directly in the code,” says ESET researcher Lukáš Štefanko, who uncovered the CallPhantom fraud.

In general, CallPhantom apps have a simple user interface and do not request any intrusive or sensitive permissions — they don’t need to. Coincidentally, they do not contain any functionality capable of retrieving actual call, SMS, or WhatsApp data.
In the CallPhantom apps ESET analyzed, researchers saw three different payment methods used, two of which are in violation of Google Play’s payments policy. Some of the apps relied on subscriptions via Google Play’s official billing system. Others relied on payments via a third party; in some cases, payment card checkout forms were included directly in the CallPhantom apps.

The fees requested for the fake service differ widely across the apps. The apps also appear to offer different subscription packages, such as weekly, monthly, or yearly services, with the highest requested price sitting at US$80. For the lowest “subscription tier,” the average requested price was €5.

In general, subscriptions purchased through the official Google Play billing system can be canceled. For the 28 apps described in this blog post, existing subscriptions were canceled when the apps were removed from Google Play. In some cases, refunds for Google Play purchases are possible.

If the purchase was made outside of Google Play — for example, by entering payment card details inside the app or by paying via third-party services — then Google cannot cancel the subscription or issue a refund, and users have to contact their payment provider.

For a more details about CallPhantom, check out the latest ESET Research blog post, “Fake call logs, real payments: How CallPhantom tricks Android users,” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

Examples of CallPhantom apps found on Google Play

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

簡化監控架構 | 戰略指南

Windows monitoring with Sysmon requires custom XML configuration for effective security logging. Integrating Sysmon with a SIEM like Pandora SIEM enhances centralized analysis, threat detection, and correlation for robust security management and operational efficiency.

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×