3、安全厂商称外来的PS脚本是企业主要威胁
标题:PowerShell threats surge: 95.4 percent of analyzed scripts were malicious
Symantec analyzed 111 threat families that use PowerShell, finding that they leverage the framework to download payloads and traverse through networks.
作者信息: 08 Dec 2016 By Candid Wueest
//BEGIN
Malicious PowerShell scripts are on the rise, as attackers are using the framework’s flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger they posed.
Of all of the PowerShell scripts analyzed through the BlueCoat Malware Analysis sandbox, 95.4 percent were malicious. This shows that externally sourced PowerShell scripts are a major threat to enterprises.
安全公司Symantec宣称通过其沙盒分析PowerShell脚本统计分析发现,恶意PowerShell脚本占95.4%。这个惊人的数字显示采用外包方式的PowerShell脚本正给企业安全造成严重的威胁。PowerShell脚本本来只是Windows下使用的,它非常灵活、多变,可是恶意代码却利用它来下载恶意组件、在被感染网络中进行横向移动并在感染的网络中寻找其有价值信息。
//END
However, out of the 111 analyzed threat families that use PowerShell, only eight percent used any obfuscation such as mixed-case letters. None of the
analyzed threats randomized the order of the command arguments. The most commonly used PowerShell command-line argument was “NoProfile” (34 percent), followed by “WindowStyle” (24 percent), and “ExecutionPolicy” (23 percent).
在111个被分析的PowerShell恶意脚本中,只有8%的采用一些大小写混淆技术;没有一个脚本采用将命令行随机分配的方式。三个最流行的命令行参数是NoProfile、WindowStyle和ExecutionPolicy,占比分别为34%,24%和23%。
//下载:
increased-use-of-powershell-in-attacks-16-en.pdf
(3.09 MB, 下载次数: 1097)
文件名:increased-use-of-powershell-in-attacks-16-en.pdf
文件大小:3,237,482 bytes
MD5 : A7A45D9DCDC738F5D4DDB6F7D105D49D
点评:PS的确正大行其道。
|