英語閱讀 學(xué)英語,練聽力,上聽力課堂! 注冊 登錄
> 輕松閱讀 > 雙語閱讀 >  內(nèi)容

黑客從俄羅斯一家銀行“轉(zhuǎn)走”百萬美元

所屬教程:雙語閱讀

瀏覽:

2018年07月26日

手機版
掃描二維碼方便學(xué)習和分享
A notorious hacking gang has struck again, stealing almost $910,000 from a Russian bank, reports a cyber-security company.

據(jù)一家網(wǎng)絡(luò)安全公司爆料,一臭名昭著的黑客團伙再次對銀行發(fā)起襲擊,此次從俄羅斯銀行得手約91萬美元。

Group-IB was called in to help Russia’s PIR Bank after it noticed the theft, said the firm.

Group-IB公司表示,在俄羅斯PIR銀行意識到該盜竊案件后立刻聯(lián)系了該公司協(xié)助解決問題

The raid is believed to have been carried out by the MoneyTaker gang which has hit other financial firms.

此次盜竊事件經(jīng)判斷應(yīng)該是由MoneyTaker團伙主導(dǎo),該團伙還襲擊了其他金融機構(gòu)。

In 2017 it was suspected of stealing nearly $10m from Russian, British and American companies.

2017年,該團伙涉嫌從俄羅斯、英國和美國公司偷走近1000萬美元。

In its report, Group-IB said the cash was taken in a series of transfers on 3 July via a computer at the bank to which the gang had obtained access.

Group-IB集團在其報告中說,這筆錢是7月3日該團伙進入銀行系統(tǒng),通過銀行的一臺計算機進行了一系列轉(zhuǎn)賬中而取得的。

Staff at PIR were able to stop some of the transfers, said Group-IB, but the gang’s swift action to "cash out" using paid helpers or "mules" at ATMs stopped the bank recovering much of it.

Group-IB稱,PIR的工作人員阻止了部門轉(zhuǎn)賬,但是該團伙迅速采取行動,通過支付助手或ATM取款機上的“錢騾”“兌現(xiàn)”等,阻止了銀行收回其中的大部分。

Group-IB said the tools and techniques used by the gang to penetrate the bank and lurk on its internal systems were known to have been used by MoneyTaker in other robberies.

該公司補充說道,此次犯罪團伙用于滲入銀行及潛伏其內(nèi)部系統(tǒng)的技術(shù)手段正是MoneyTaker曾在各項搶劫案中多次使用的。

The attack began in late May, said Group-IB, and initially concentrated on a piece of networking hardware known as a router, which the gang was able to compromise.

此次犯罪從五月底開始,犯罪手段是起初從使用一種被稱為路由器的硬件著手,而該行徑則是MoneyTaker常用于攻擊的手段。

By taking over this router, the gang gained access to the bank’s internal network.

通過黑進這個路由器,這個團伙獲得了進入銀行內(nèi)部網(wǎng)絡(luò)的機會。

Once on the network, the gang took time to find a specific computer used to authorise transfers of cash. It then used its knowledge of this system, known as the Automated Work Station Client of the Russian Central Bank (AWS-CBR), to set up the bogus transfers.

一旦得以侵入內(nèi)部網(wǎng)絡(luò),該團伙即伺機找到一臺特定的電腦用以轉(zhuǎn)賬授權(quán)。隨后利用其對該系統(tǒng)(俄羅斯中央銀行自助操作客戶端)的了解得以實現(xiàn)虛假轉(zhuǎn)賬。

Attacks on AWS-CBR are difficult to implement and are not conducted very often, because many hackers just cannot work on computers with AWS-CBR successfully, said Valeriy Baulin, head of Group-IB’s digital forensics lab.

Group-IB數(shù)字取證實驗室負責人Valeriy Baulin表示:“針對AWS-CBR的攻擊很難實施,也不太經(jīng)常發(fā)生,因為許多黑客無法成功地在AWS-CBR的電腦上工作。”
 


用戶搜索

瘋狂英語 英語語法 新概念英語 走遍美國 四級聽力 英語音標 英語入門 發(fā)音 美語 四級 新東方 七年級 賴世雄 zero是什么意思平?jīng)鍪型_花園(北后街)英語學(xué)習交流群

網(wǎng)站推薦

英語翻譯英語應(yīng)急口語8000句聽歌學(xué)英語英語學(xué)習方法

  • 頻道推薦
  • |
  • 全站推薦
  • 推薦下載
  • 網(wǎng)站推薦