安全专家:“想哭”增强版可能本周出炉_OK阅读网
双语新闻
Bilingual News


双语对照阅读
分级系列阅读
智能辅助阅读
在线英语学习
首页 |  双语新闻 |  双语读物 |  双语名著 | 
[英文] [中文] [双语对照] [双语交替]    []        


安全专家:“想哭”增强版可能本周出炉
Businesses around the world told to prepare for fresh cyber attacks

来源:FT中文网    2017-05-15 06:51



        Businesses must brace for further cyber attacks this week on a potentially “significant scale”, British intelligence officials warned yesterday, less than 48 hours after the debilitating WannaCry software virus swept across the world.        毒性较大的“想哭”(WannaCry)软件病毒肆虐世界各地不到48小时之后,英国情报官员昨日警告,企业本周必须准备好对付进一步的网络攻击。
        Data show more than 1.3m computer systems are still vulnerable to infection by WannaCry, which paralysed hospitals, disrupted transport networks and immobilised businesses, according to cyber security analysts.        据网络安全分析人士介绍,数据显示,超过130万电脑系统仍然容易被“想哭”感染,这种勒索软件已经致使医院瘫痪、扰乱了运输网络,还使企业无法运转。
        So far, 200,000 computers across 150 countries are known to have been infected in the first wave of the cyber attack, Europol said yesterday. “The recent attack is at an unprecedented level and will require a complex international investigation to identify the culprits,” Europe’s police agency added.        欧洲刑警组织(Europol)昨日表示,迄今已有150个国家的20万台电脑在第一波网络攻击中受到感染。“最近这起袭击达到前所未有的水平,将需要展开一场复杂的国际调查来找出幕后黑手,”该组织补充称。
        Intelligence agencies in Europe and the US spent the weekend warning companies and organisations that the threat from the ransomware — malicious software that encrypts machines’ hard drives and demands payment to release the data — may escalate.        周末期间,欧洲和美国的情报机构忙着警告企业和组织,来自勒索软件(对电脑硬盘进行加密,然后要求交钱以换取释放数据的恶意软件)的威胁可能会升级。(上图为“想哭”软件病毒的勒索信息。——编者注
        “We are aware of attempts to attack other UK centres beyond the health service,” Ciaran Martin, director of the National Cyber Security Centre, an arm of the electronic intelligence agency GCHQ, told the Financial Times.        “据我们掌握,有一些针对医疗部门以外的英国其他中心的攻击企图,”隶属英国电子情报机构——政府通信总部(GCHQ)的国家网络安全中心(National Cyber Security Centre)主任夏兰•马丁(Ciaran Martin)告诉英国《金融时报》。
        He said although the agency had warned British organisations there were likely to be further attacks today, there was no evidence WannaCry had been updated by its creators to address the element in its coding that halted its spread late on Friday. Officials still believe WannaCry is the creation of a criminal group.        他说,尽管该机构已警告英国境内的组织:今日可能会发生进一步攻击,但尚未有证据证明,“想哭”的作者已更新其代码,以解决导致其在上周五停止传播的编码问题。官员们仍然相信,“想哭”是一个犯罪集团的产物。
        “With the National Crime Agency we have an around-the-clock effort to work out who is responsible,” Mr Martin said. “We have a number of leads but we can’t comment on them.”        “我们正与国家打击犯罪局(National Crime Agency)合作,全天候追查罪魁祸首,”马丁表示。“我们有一些线索,但现在不能置评。”
        Anthony Ferrante, a former director for Cyber Incident Response at the US National Security Council, said: “We could see activity on Monday morning when people show up for work.”        美国国家安全委员会(National Security Council)网络事件响应(Cyber Incident Response)前主任安东尼•费兰特(Anthony Ferrante)表示:“周一上午,当人们上班后,我们可能会看到一些活动。”
        Mr Ferrante, now managing director at FTI Consulting’s forensics and litigation unit, said the US government was taking the threat “extremely seriously”.        如今担任富事高咨询(FTI Consulting)司法鉴定和诉讼部门董事总经理的费兰特表示,美国政府“非常重视”这一威胁。
        The list of organisations hit by WannaCry has lengthened in the past 48 hours: alongside Britain’s National Health Service, which saw more than a third of hospitals and clinics incapacitated, victims include German rail operator Deutsche Bahn, US logistics group FedEx, Russia’s interior ministry, French carmaker Renault, Spanish telecoms group Telefónica and state-owned China National Petroleum Corp.        “想哭”袭击的组织名单在过去48小时变得更长:除了英国国家医疗服务体系(NHS)三分之一以上的医院和诊所陷于瘫痪,受害者还包括德国铁路(Deutsche Bahn)、美国物流集团联邦快递(FedEx)、俄罗斯内务部、法国汽车制造商雷诺(Renault)、西班牙电信(Telefónica)以及国有的中国石油天然气集团公司(CNPC)。
        Despite urgent appeals from security authorities for organisations to address the critical Windows security vulnerability exploited by WannaCry, many still have not done so. “We must change our approach,” said Julian King, EU security commissioner. “We all need to take responsibility for cyber security.”        尽管安全部门紧急呼吁各组织堵上“想哭”利用的Windows严重安全漏洞,但仍有许多组织没有这样做。“我们必须改变我们的做法,”欧盟安全专员朱利安•金(Julian King)表示,“我们都需要对网络安全负责。”
                
   返回首页                  

OK阅读网 版权所有(C)2017 | 联系我们