[7¿ù] Àü ¼¼°è ·£¼¶¿þ¾î °ø°Ý¿¡ ´ëÇÑ Æ÷½ºÆ÷ÀÎÆ® º¸°í¼ – ÆäÆ®¾ß(Petya)
»õ·Î¿î ·£¼¶¿þ¾îÀÇ ÃâÇöÀ¸·Î ´ëÇü Ç×±¸ÀÇ ¿î¿µ Áß´Ü°ú °°Àº ½É°¢ÇÑ ¿µÇâÀÌ Àü ¼¼°è¿¡¼ º¸°íµÇ°í ÀÖ½À´Ï´Ù.
https://blogs.forcepoint.com/insights/forcepoint-statement-june-27-worldwide-ransomware-attack-petya
6¿ù 27ÀÏ Àü ¼¼°è ·£¼¶¿þ¾î °ø°Ý¿¡ ´ëÇÑ Æ÷½ºÆ÷ÀÎÆ® º¸°í¼ – ÆäÆ®¾ß(Petya)
Forcepoint
Security Labs´Â Àü ¼¼°èÀÇ Á¶Á÷¿¡ ¿µÇâÀ» ¹ÌÄ¡´Â ÆäÆ®¾ß(Petya) ·£¼¶¿þ¾îÀÇ »õ·Î¿î
º¯Á¾À» ½Äº°ÇÏ¿´½À´Ï´Ù. º¸°í¼´Â ¿µ±¹, ¿ìÅ©¶óÀ̳ª, ³×´ú¶õµå, ½ºÆäÀÎ, ¹Ì±¹°ú
´Ù¾çÇÑ ½ÃÀå¿¡ Æ÷ÇÔµÈ Á¶Á÷¿¡¼ ³ª¿Ô½À´Ï´Ù. SMBv1 ÇÁ·ÎÅäÄÝÀÇ Ãë¾àÁ¡À» ÅëÇØ Á¶Á÷ ³»¿¡¼ Ãø¸éÀ¸·Î
È®»êÇÒ ¼ö ÀÖ´Ù°í ÆǺ°Çß½À´Ï´Ù.
°ø°ÝÀº ÀϹÝÀûÀÎ ºñÆ® µ¿Àü Áö°©À» »ç¿ëÇÏ¿© ¿¬°áµÇ¸ç ¾Æ·¡´Â °¨¿°µÈ ½Ã½ºÅÛ¿¡¼ º¸¿©ÁÖ´Â ·£¼¶¿þ¾î ¸Þ½ÃÁöÀÇ ½ºÅ©¸° ¼¦ÀÔ´Ï´Ù.
¿ì¸®´Â ¿©ÀüÈ÷ ÆäÆ®¾ß(Petya) ·£¼¶¿þ¾îÀÇ »õ·Î¿î º¯Á¾¿¡ ´ëÇØ ´õ ¸¹Àº °ÍÀ» ¹è¿ì°í ÀÖÁö¸¸ Wannacry ´ë±Ô¸ð ¹ß»ý µ¿¾È Á¦°øµÈ ±³ÈÆ(¾Æ·¡ ¸µÅ©)À» ´Ù½Ã ÀÍÈ÷´Â ù ¹ø° ´Ü°è·Î ¸ðµç »ç¶÷¿¡°Ô Á¶¾ðÇÕ´Ï´Ù. ¿ì¸®´Â ÀÌ ´ë±Ô¸ð È®»êÀ» Àû±ØÀûÀ¸·Î Á¶»çÇÏ°í ÀÖÀ¸¸ç ´õ ¸¹Àº Á¤º¸¸¦ °ð °øÀ¯ÇÒ °ÍÀÔ´Ï´Ù.
https://blogs.forcepoint.com/security-labs/wannacry-multiple-malware-families-using-eternalblue-exploit
https://blogs.forcepoint.com/security-labs/wannacry-post-outbreak-analysis
Á¶´Þ Business ¹Ù·Î°¡±â
Security ¹Ù·Î°¡±â
Solution ¹Ù·Î°¡±â
Software ¹Ù·Î°¡±â