malware?['m?lwe?]??

n. 惡意軟件

圖片來(lái)源:視覺(jué)中國(guó)

Google’s?Threat Analysis Group (TAG) has published a blog post detailing a number of exploits in iOS that allowed hacked websites to hack into an iPhone simply if the iPhone visited the site.?
谷歌威脅分析小組(TAG)在博客上詳細(xì)介紹了一些iOS上的漏洞,iPhone只要訪問(wèn)被黑客入侵的網(wǎng)站,這些網(wǎng)站就能輕易黑進(jìn)iPhone。

Once an iPhone did that,?malware?was installed on the device that allowed the hackers to monitor the iPhone’s live location every 60 seconds as well as upload virtually any files from the iPhone—including iMessage and WhatsApp messages.
iPhone一旦訪問(wèn)這些網(wǎng)站,就會(huì)被安裝惡意軟件,黑客每隔60秒就能監(jiān)控iPhone的實(shí)時(shí)位置,還可以從iPhone上上傳任何文件,包括iMessage和WhatsApp的信息。

TAG says the exploit “may be one of the largest attacks against iPhone users ever.” It reportedly affected iPhones running iOS 10 to iOS 12:
威脅分析小組稱這個(gè)漏洞“可能是目前針對(duì)iPhone用戶最大的一個(gè)威脅”,據(jù)稱它會(huì)影響iPhone iOS 10到iOS 12的每個(gè)版本。

Working with TAG, we discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. Initial analysis indicated that at least one of the privilege escalation chains was still 0-day and unpatched at the time of discovery.
我們和威脅分析小組合作發(fā)現(xiàn)五個(gè)攻擊鏈中共有14個(gè)漏洞:其中7個(gè)針對(duì)iPhone的網(wǎng)絡(luò)瀏覽器、5個(gè)針對(duì)內(nèi)核,還有2個(gè)獨(dú)立的沙箱逃逸。初步分析表明特權(quán)升級(jí)鏈中至少有一個(gè)仍然是零日漏洞(指被發(fā)現(xiàn)后立即被惡意利用的安全漏洞),而且發(fā)現(xiàn)以后沒(méi)有進(jìn)行修復(fù)。

There is some good news, however. First, an iPhone user had to visit one of the hacked websites in order for their iPhone to be infected. TAG did not specify which websites were hacked, but their report says the sites received “thousands of visitors per week,” suggesting the sites received relatively minor traffic relative to the number of iPhones in the wild.
但也有好消息。首先iPhone用戶需要訪問(wèn)一個(gè)被黑的網(wǎng)站才會(huì)被攻擊,威脅分析小組并未具體說(shuō)明哪些網(wǎng)站被黑了,但報(bào)告中稱這些網(wǎng)站“每周有數(shù)千訪問(wèn)者”,相比iPhone的使用量來(lái)說(shuō)這些網(wǎng)站的訪問(wèn)量只是很小一部分。

Further, even if the malware made it onto an iPhone, when a user restarted their iPhone, the malware would be wiped clean in most instances. Of course, news of any exploits in iOS isn’t good—no matter how few users were impacted.?
而且即使iPhone被安裝了惡意軟件,在大多數(shù)情況下用戶重啟手機(jī)后惡意軟件都會(huì)被清理干凈。當(dāng)然任何關(guān)于iOS漏洞的消息都不是好消息,即使受影響人數(shù)很少。

The good news is that Apple acted quickly once TAG alerted them to the exploits. TAG says it contacted Apple about the exploits on February 1, 2019, and Apple fixed all of the exploits just six days later with the release of iOS 12.1.4 on February 7, 2019.
好消息是威脅分析小組一提醒蘋果公司漏洞的問(wèn)題,他們就立刻采取了行動(dòng),威脅分析小組稱在2019年2月1日就漏洞問(wèn)題聯(lián)系了蘋果公司,該公司僅用6天就修復(fù)了所有漏洞,在2019年2月7日發(fā)布了iOS 12.1.4。

?

今日詞匯?

malware?['m?lwe?]??

n. 惡意軟件
?

從這個(gè)詞的前綴mal-(“壞的”),就看出了滿滿惡意。

?

How do I download and install Malware Protector??
我如何下載安裝惡意軟件防護(hù)器呢?