2、安全团队分析恶意代码Depriz工作机理
标题:Windows 10: protection, detection, and response against recent Depriz malware attacks
作者信息:December 9, 2016 By Mathieu Letourneau
//BEGIN
A few weeks ago, multiple organizations in the Middle East fell victim to targeted and destructive attacks that wiped data from computers, and in many cases rendering them unstable and unbootable. Destructive attacks like these have been observed repeatedly over the years and the Windows Defender and Windows Defender Advanced Threat Protection Threat Intelligence teams are working on protection, detection, and response to these threats.
微软公司的威胁情报小组将化学元素周期表中的元素作为发现恶意组织的代码。最新发现的一个组织被称为Tb代号:序号65 元素Tb 汉字铽 读音tè 英文全称为TERBIUM.该小组开发的恶意代码被称为Depriz,几周以前被发现针对中东的多个组织发起攻击,删除这些被感染电脑的数据,甚至重写硬盘的主引导记录MBR,然后还强制重新启动计算机,显然这将导致机器的不能正常启动、数据不能正常访问。
该组织的活动已经很多年了,看来还是很有目的很针对性的。他们并不是漫无目的的散兵游勇。
//END
Step 4: Rendering the machine unusable
Finally, the following command is used to reboot the system into the intended unusable state:
shutdown -r -f -t 2
When the computer attempts to restart after shutting down, it is unable to find the operating system because the MBR was overwritten in step 3. The machine will no longer boot properly.
执行如下命令:shutdown -r -f -t 2。由于之前的MBR已经被重写,因此机器会不能正常启动。
点评:仅仅从改写MBR这一点来看,想起来了类似CIH等传统病毒呀! |