注:本文主要是本人記錄使用,英語水平有限,翻譯內容有什么問題,還望各位小伙伴指出,將不勝感激~
翻譯自How to Protect Yourself from 'Ransomware'
- 譯文如下
如何從勒索軟件中免受傷害
上周五,超過150個國家超過了20000臺計算機受到了最大的網絡攻擊影響。這個攻擊使用了一個病毒鎖定計算機數據,攻擊者要求支付一定的費用才解鎖計算機。
這個病毒,被命名為WannaCry,在組織中受感染的電腦包含了【受感染的電腦的機構包括】英國的醫療保健系統,美國的聯邦快遞公司和俄羅斯內政部。
我們的故事,勒索軟件影響全球計算機這篇文章,解釋了更多的關于病毒內容。
盡管周五網絡攻擊停止了,這個病毒可能會以另一種不同的方式卷土重來。學習關于這個病毒和你現在應該采取的措施來保護你的數據免受WannaCry未來版本影響,這是很重要的。
病毒如何鎖定電腦
WannaCry攻擊的是連接到互聯網中并且使用了windows操作系統的電腦。微軟在三月份發布了安全補丁,還沒有更新的操作系統會受影響。
如何阻止WannaCry
一個開發者意外的發現了能夠阻止WannaCry傳播的方式。他看到計算機代碼并且注意到這個病毒正在引導計算機指向一個域名。他查詢到這個域名并且發現還沒有被注冊,因此他花費了不到11美元買下它。這個簡單的操作啟用殺手開關來阻止WannaCry進一步傳播。
不幸的是,這個殺手開關不能解鎖已經感染到病毒的計算機。
這個開發者選擇保持無名,但是使用的Twitter賬號@malwaretechblog。他寫了一篇博文詳細解釋了他發現阻止WannaCry的殺手開關的過程。這篇博文被命名為《如何偶然阻止全球網絡攻擊》。
但是我們還不安全
這個網絡攻擊使用了一個安全漏洞,這仍然能存在運行舊版本的Windows計算機上。計算運行windows10,還沒有安裝更新的也是存在風險的。
這個病毒可能會再次攻擊。黑客發起新的網絡攻擊所要做的僅僅只是給WannaCry更換域名,然后發布更新后的病毒。
如何保護你的數據未來再次受到網絡攻擊
你可以保護你自己未來再次受到網絡攻擊。確保給你的計算機下載最新的Windows安全補丁。微軟,Windows的制作者,已經為老版本的Windows發布了防護WannaCry的安全補丁。
如果你需要幫助,請訪問微軟主頁“如何保持你的計算機Windows是最新版本”。
如果你不想關心保持你的計算機更新那么請允許Windows自動更新。
還有,確保保存和備份你的數據。在本地硬盤和云上定期備份你的數據。當另外一個網絡攻擊發生時通過這種方式你可以保護你的數據。
不要點擊鏈接或在郵件中下載附件,除非你確保它們不是來自黑客的網絡釣魚郵件。盡管WannaCry病毒攻擊沒有通過這種方式發生,在過去有其它的病毒是通過這種方式發生的。
- 原文如下
How to Protect Yourself from 'Ransomware'
Last Friday, the largest cyberattack ever affected more than 200,000 computers in more than 150 countries. The attack used a virus that locked the computers' data. The attackers demanded payment to unlock the computers.
The virus, called WannaCry, infected computers in organizations including the British healthcare system, the American company FedEx and Russia's Interior Ministry.
Our story, 'Ransomware' Affects Computers Worldwide explains more about the virus.
Although Friday's cyberattack was stopped, the virus may soon return in a different form. It is important to learn about the virus and the steps you should take now to protect your data from future versions of WannaCry.
How the virus locked computers
WannaCry attacked computers that were connected to the Internet and used Windows operating systems. The systems affected had not yet been updated with a security patch that Microsoft released in March.
How WannaCry was blocked
A developer accidentally discovered a way to prevent WannaCry from spreading. He looked at the computer code and noticed that the virus was directing computers to a domain name. He checked on the domain name and discovered that it was available, so he bought it for less than $11. That simple move enabled a "kill switch" that prevented WannaCry from spreading further.
Unfortunately, the kill switch does not unlock computers that were already infected by the virus.
The developer has chosen to remain nameless but uses the Twitter account @malwaretechblog. He wrote a blog post that explains in detail how he happened to discover the kill switch for WannaCry. The post is called How to Accidentally Stop a Global Cyber Attacks.
But we are not safe yet
This cyberattack used a security hole that still exists for computers running older versions of Windows. Computers running Windows 10 that have not yet installed the update are also at risk.
The virus may attack again. All the hackers have to do to launch a new cyberattack is to change the domain name in WannaCry, then release the updated virus.
How to protect your data against future cyberattacks
You can protect yourself against future cyberattacks. Make sure to download the latest Windows security patch to your computer. Microsoft, the maker of Windows, has now released security patches for older versions of Windows that give protection against WannaCry.
For help, visit Microsoft's page called "How to Keep Your Windows Computer Up-to-date."
Permit automatic Windows updates if you do not want to worry about keeping your computer updated.
Also, make sure that you save, or back up, your data. Do regular backups of your data, both locally with an external drive and in the Cloud. That way you can protect your data when another cyberattack occurs.
Be sure not to click on links or download attachments in emails unless you are sure that they are not "phishing" emails from hackers. Although the WannaCry virus attack did not happen this way, others have happened this way in the past.