{"id":5316,"date":"2022-07-02T11:42:48","date_gmt":"2022-07-02T03:42:48","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=5316"},"modified":"2022-07-02T11:42:48","modified_gmt":"2022-07-02T03:42:48","slug":"%e4%ba%ba%e4%b8%ba%e6%93%8d%e4%bd%9c%e7%9a%84%e5%8b%92%e7%b4%a2%e8%bd%af%e4%bb%b6human-operated-ransomware%e6%94%bb%e5%87%bb","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/5316.html","title":{"rendered":"\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6(Human-operated ransomware)\u653b\u51fb"},"content":{"rendered":"\n<p>=Start=<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7f18\u7531\uff1a<\/h4>\n\n\n\n<p>\u524d\u6bb5\u65f6\u95f4\u4e0d\u592a\u5fd9\u7684\u65f6\u5019\u559c\u6b22\u7ffb\u9605 Microsoft \u7684\u5b89\u5168\u6587\u6863\uff0c\u8fd1\u671f\u62bd\u65f6\u95f4\u628a <a rel=\"noreferrer noopener\" href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/human-operated-ransomware\" data-type=\"URL\" data-id=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/human-operated-ransomware\" target=\"_blank\">Human operated ransomware<\/a> \u8fd9\u4e00\u7bc7\u7ed9\u7ffb\u8bd1\u6574\u7406\u4e86\u51fa\u6765\uff08\u5fae\u8f6f\u5176\u5b9e\u4e5f\u63d0\u4f9b\u4e86\u673a\u5668\u7ffb\u8bd1\u7684\u7248\u672c\uff0c\u4f46\u770b\u8d77\u6765\u7a0d\u5fae\u6709\u4e9b\u522b\u626d\u5c31\u6ca1\u6709\u76f4\u63a5\u7528\uff09\uff0c\u65b9\u4fbf\u81ea\u5df1\u548c\u6709\u9700\u8981\u7684\u540c\u5b66\u67e5\u9605\u3002<\/p>\n\n\n\n<p>\u53e6\u5916\u8865\u5145\u8bf4\u4e00\u70b9\uff0c\u867d\u7136\u5728\u5fae\u8f6f\u5bf9\u5916\u5f00\u653e\u51fa\u6765\u7684\u6587\u7ae0\u4e2d\u5939\u6742\u4e86\u4e00\u4e9b\u79c1\u8d27\uff08\u6bd4\u5982\u63a8\u5e7f\u81ea\u5bb6\u7684Azure\u4e91\u3001Microsoft Defender\u7b49\u4ea7\u54c1\uff0c\u5176\u5b83\u5bb6\u6bd4\u5982Google\u4e5f\u8fd9\u6837\uff09\uff0c\u4f46\u6574\u4f53\u8d28\u91cf\u548c\u5185\u5bb9\u8fd8\u662f\u6709\u4fdd\u8bc1\u7684\uff0c\u5bf9\u4e8e\u60f3\u4e86\u89e3\u56fd\u5916\u5927\u5382\u662f\u5982\u4f55\u505a\u7684\u540c\u5b66\u53ef\u4ee5\u591a\u7ffb\u4e00\u4e0b\u5b83\u4eec\u7684\u5b98\u65b9\u6587\u6863\/\u535a\u5ba2\uff0c\u53ef\u4ee5\u5b66\u5230\u4e0d\u5c11\u4e1c\u897f\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u6b63\u6587\uff1a<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#fe0000\" class=\"has-inline-color\"><strong>\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\u662f\u4e00\u79cd\u7f51\u7edc\u5b89\u5168\u653b\u51fb\uff0c\u5b83\u7834\u574f\u6216\u52a0\u5bc6\u6587\u4ef6\u548c\u6587\u4ef6\u5939\uff0c\u963b\u6b62\u53d7\u5f71\u54cd\u8bbe\u5907\u7684\u6240\u6709\u8005\u8bbf\u95ee\u4ed6\u4eec\u7684\u6570\u636e\u3002<\/strong>\u7136\u540e\uff0c\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u501f\u673a\u5411\u4f01\u4e1a\u4e3b\u52d2\u7d22\u94b1\u8d22\uff0c\u4ee5\u6362\u53d6\u89e3\u9501\u52a0\u5bc6\u6570\u636e\u7684\u5bc6\u94a5\u3002<\/mark><strong>\u4f46\u662f\uff0c\u5373\u4f7f\u652f\u4ed8\u4e86\u8d39\u7528\uff0c\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u4e5f\u53ef\u80fd\u4e0d\u4f1a\u63d0\u4f9b\u89e3\u5bc6\u5bc6\u94a5\u3002<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u81ea\u52a8\u5316\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb<\/h4>\n\n\n\n<p>\u5546\u54c1\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\uff08Commodity ransomware attacks\uff09\u901a\u5e38\u662f\u81ea\u52a8\u5316\u7684\u3002\u8fd9\u4e9b\u7f51\u7edc\u653b\u51fb\u53ef\u4ee5\u50cf\u75c5\u6bd2\u4e00\u6837\u4f20\u64ad\uff0c\u901a\u8fc7\u7535\u5b50\u90ae\u4ef6\u9493\u9c7c\u548c\u6076\u610f\u8f6f\u4ef6\u4f20\u9012\u7b49\u65b9\u6cd5\u611f\u67d3\u8bbe\u5907\uff0c\u5e76\u4e14\u9700\u8981\u6076\u610f\u8f6f\u4ef6\u4fee\u590d\u3002\u8fd9\u610f\u5473\u7740\u5176\u4e2d\u4e00\u79cd\u52d2\u7d22\u8f6f\u4ef6\u9884\u9632\u6280\u672f\u662f\u4f7f\u7528Microsoft Defender for Office 365\u6216Microsoft 365 Defender\u7b49\u7cfb\u7edf\u4fdd\u62a4\u60a8\u7684\u90ae\u4ef6\uff0c\u4ee5\u4fbf\u53ca\u65e9\u68c0\u6d4b\u51fa\u6076\u610f\u8f6f\u4ef6\u653b\u51fb\u548c\u7f51\u7edc\u9493\u9c7c\u5c1d\u8bd5\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb<\/h4>\n\n\n\n<p>\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6\uff08<em>Human-operated ransomware<\/em>\uff09\u662f\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u3010\u4e3b\u52a8\u653b\u51fb\u3011\u7684\u7ed3\u679c\uff0c\u8fd9\u4e9b\u72af\u7f6a\u5206\u5b50\u6e17\u900f\u5230\u7ec4\u7ec7\u7684\u672c\u5730\u6216\u4e91\u4e0a\u7684IT\u57fa\u7840\u8bbe\u65bd\uff0c\u8bbe\u6cd5\u63d0\u5347\u4ed6\u4eec\u7684\u6743\u9650\u5e76\u5c06\u52d2\u7d22\u8f6f\u4ef6\u90e8\u7f72\u5230\u5b58\u50a8\u4e86\u5173\u952e\u6570\u636e\u7684\u670d\u52a1\u5668\u4e0a\u3002<\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u8fd9\u4e9b\u201chands-on-keyboard\u201d\u653b\u51fb\u9488\u5bf9\u7684\u662f\u7ec4\u7ec7\u800c\u4e0d\u662f\u5355\u4e2a\u8bbe\u5907\u3002<strong>\u4eba\u4e3a\u64cd\u4f5c\u610f\u5473\u7740\u5b58\u5728\u4eba\u7c7b\u653b\u51fb\u8005\u5229\u7528\u4ed6\u4eec\u5bf9\u5e38\u89c1\u7cfb\u7edf\u548c\u5b89\u5168\u9519\u8bef\u914d\u7f6e\u7684\u6df1\u523b\u8ba4\u77e5\u6765\u6e17\u900f\u7ec4\u7ec7\uff0c\u5728\u5185\u7f51\u6f2b\u6e38\uff0c\u5e76\u968f\u65f6\u9002\u5e94\u73af\u5883\u53ca\u5229\u7528\u5176\u5f31\u70b9\u3002<\/strong>\uff08\u4e2a\u4eba\u8ba4\u4e3a\u53ef\u4ee5\u7b80\u5355\u7406\u89e3\u4e3a\u201c\u5f31\u5316\u7248\u672c\u7684\u201dAPT\u653b\u51fb\u4e86\uff09<\/mark><\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#fd0000\" class=\"has-inline-color\">\u8fd9\u4e9b\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\u7684\u7279\u5f81\u901a\u5e38\u5305\u62ec\u3010\u51ed\u8bc1\u7a83\u53d6\u3011\u548c\u3010\u6a2a\u5411\u79fb\u52a8\u3011\u4ee5\u53ca\u88ab\u76d7\u5e10\u6237\u7684\u3010\u6743\u9650\u63d0\u5347\u3011\u3002<\/mark><\/strong>\u653b\u51fb\u6d3b\u52a8\u53ef\u80fd\u53d1\u751f\u5728\u7ef4\u62a4\u7a97\u53e3\u671f\u95f4\uff0c\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u5229\u7528\u53d1\u73b0\u7684\u5b89\u5168\u914d\u7f6e\u6f0f\u6d1e\u3002\u76ee\u6807\u662f\u5c06\u52d2\u7d22\u8f6f\u4ef6\u6709\u6548\u8d1f\u8f7d\u90e8\u7f72\u5230\u653b\u51fb\u8005\u9009\u62e9\u7684\u4efb\u610f\u6709\u9ad8\u4e1a\u52a1\u5f71\u54cd\u7684\u670d\u52a1\u5668\u4e0a\u3002<\/p>\n\n\n\n<p><strong>\u8fd9\u4e9b\u653b\u51fb\u5bf9\u4e1a\u52a1\u8fd0\u8425\u53ef\u80fd\u662f\u707e\u96be\u6027\u7684\uff0c\u5e76\u4e14\u96be\u4ee5\u6e05\u7406\uff0c\u9700\u8981\u5b8c\u5168\u9a71\u9010\u5bf9\u624b\u4ee5\u9632\u6b62\u672a\u6765\u7684\u653b\u51fb\u3002<\/strong>\u4e0e\u901a\u5e38\u53ea\u9700\u8981\u6076\u610f\u8f6f\u4ef6\u4fee\u590d\u7684\u5546\u54c1\u52d2\u7d22\u8f6f\u4ef6\u4e0d\u540c\uff0c\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\u5c06\u5728\u521d\u6b21\u906d\u9047\u540e\u6301\u7eed\u5a01\u80c1\u4f60\u7684\u4e1a\u52a1\u8fd0\u8425\u3002<\/p>\n\n\n\n<p>\u4e0b\u56fe\u663e\u793a\u4e86\u8fd9\u79cd\u57fa\u4e8e\u52d2\u7d22\u7684\u653b\u51fb\u7684\u5f71\u54cd\u529b\u548c\u53ef\u80fd\u6027\u7684\u589e\u957f\u8d8b\u52bf\uff1a<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"388\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2022\/07\/ransomware-extortion-based-attack-1024x388.png\" alt=\"\" class=\"wp-image-5317\" srcset=\"https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/07\/ransomware-extortion-based-attack-1024x388.png 1024w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/07\/ransomware-extortion-based-attack-300x114.png 300w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/07\/ransomware-extortion-based-attack-768x291.png 768w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/07\/ransomware-extortion-based-attack.png 1198w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>\u9ad8\u4e1a\u52a1\u5f71\u54cd<\/strong>\u2014\u2014\u6572\u8bc8\u52d2\u7d22\u80af\u5b9a\u4f1a\u7834\u574f\u5546\u4e1a\u8fd0\u8425\u6765\u903c\u8feb\u4f60\u652f\u4ed8\u8d4e\u91d1<\/li><li><strong>\u653b\u51fb\u8005\u76c8\u5229<\/strong>\u2014\u2014\u52d2\u7d22\u7ecf\u6d4e\u56de\u62a5\u4e0d\u65ad\u589e\u957f<\/li><li><strong>\u6210\u957f\u7a7a\u95f4\u5927<\/strong>\u2014\u2014\u653b\u51fb\u8005\u53ef\u4ee5\u4ece\u5b89\u5168\u8fd0\u8425\u548c\u914d\u7f6e\u7684\u5dee\u8ddd\u4e2d\u83b7\u5229\uff0c\u4e3a\u4e86\u4fdd\u62a4\u4f60\u6240\u5728\u7684\u4f01\u4e1a\uff0c\u4f60\u9700\u8981\uff1a\u6301\u7eed\u4e3a\u6240\u6709\u7684\u8bbe\u5907\u5e94\u7528\u5b89\u5168\u66f4\u65b0\u3001\u4f7f\u7528\u4e1a\u754c\u6700\u4f73\u5b9e\u8df5\u5bf9\u8d44\u6e90\u8fdb\u884c\u5b89\u5168\u914d\u7f6e\u3001\u6d88\u89e3\u7279\u6743\u8d26\u6237\u88ab\u76d7\u5f15\u53d1\u7684\u5f71\u54cd<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">\u4e3a\u60a8\u7684\u7ec4\u7ec7\u63d0\u4f9b\u4fdd\u62a4\u6765\u907f\u514d\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb<\/h4>\n\n\n\n<p>\u5982\u9700\u5168\u9762\u4e86\u89e3\u52d2\u7d22\u8f6f\u4ef6\u548c\u52d2\u7d22\u4ee5\u53ca\u5982\u4f55\u4fdd\u62a4\u60a8\u7684\u7ec4\u7ec7\uff0c\u8bf7\u5177\u4f53\u67e5\u770b<a rel=\"noreferrer noopener\" href=\"https:\/\/download.microsoft.com\/download\/7\/5\/1\/751682ca-5aae-405b-afa0-e4832138e436\/RansomwareRecommendations.pptx\" data-type=\"URL\" data-id=\"https:\/\/download.microsoft.com\/download\/7\/5\/1\/751682ca-5aae-405b-afa0-e4832138e436\/RansomwareRecommendations.pptx\" target=\"_blank\">\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6\u7f13\u89e3\u9879\u76ee\u8ba1\u5212\u6f14\u793a\u6587\u7a3f<\/a>\u4e2d\u7684\u5185\u5bb9\u3002\u4e0b\u9762\u662f\u4e00\u4e2a\u6307\u5bfc\u6458\u8981\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u4f01\u4e1a\u906d\u9047\u52d2\u7d22\u8f6f\u4ef6\u548c\u57fa\u4e8e\u52d2\u7d22\u7684\u653b\u51fb\u7684\u98ce\u9669\u5f88\u9ad8\uff08\u53ef\u4ee5\u8ba4\u4e3a\u662f\u770b\u4e0d\u5230\u5c3d\u5934\u7684\uff09\u3002<\/li><li>\u4f46\u662f\uff0c\u8fd9\u4e9b\u52d2\u7d22\u653b\u51fb\u4e5f\u6709\u5b83\u7684\u5f31\u70b9\uff0c\u5229\u7528\u8fd9\u4e9b\u5f31\u70b9\u53ef\u4ee5\u964d\u4f4e\u4f01\u4e1a\u88ab\u653b\u51fb\u7684\u53ef\u80fd\u6027\u3002<\/li><li>\u914d\u7f6e\u57fa\u7840\u8bbe\u65bd\u4ee5\u5229\u7528\u653b\u51fb\u5f31\u70b9\u6765\u89c4\u907f\u98ce\u9669\u6709\u4e09\u4e2a\u9636\u6bb5\u3002<\/li><\/ul>\n\n\n\n<p>\u5982\u679c\u60f3\u5168\u9762\u4e86\u89e3\u5229\u7528\u653b\u51fb\u5f31\u70b9\u7684\u4e09\u4e2a\u9636\u6bb5\uff0c\u8bf7\u53c2\u9605[<a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/protect-against-ransomware\" data-type=\"URL\" data-id=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/protect-against-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">\u94fe\u63a5<\/a>]\u4e2d\u7684\u89e3\u51b3\u65b9\u6848\uff0c\u4e0b\u9762\u662f\u5feb\u901f\u914d\u7f6e\u4f01\u4e1a\u7684IT\u57fa\u7840\u67b6\u6784\u4ee5\u83b7\u5f97\u6700\u4f73\u4fdd\u62a4\u7684\u6982\u8981\u8bf4\u660e\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>\u8ba9\u4f01\u4e1a\u505a\u597d\u4ece\u653b\u51fb\u4e2d\u6062\u590d\u7684\u51c6\u5907<\/strong>\uff08\u4e1a\u52a1\u8fde\u7eed\u6027\u8ba1\u5212\uff0cBCP\/BCM\uff09\uff0c\u4ece\u800c\u65e0\u9700\u652f\u4ed8\u8d4e\u91d1\u3002<\/li><li><strong>\u901a\u8fc7\u4fdd\u62a4\u7279\u6743\u8d26\u53f7\u6765\u9650\u5236\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\u7684\u7834\u574f\u8303\u56f4<\/strong>\u3002<\/li><li><strong>\u901a\u8fc7\u9010\u6b65\u6d88\u9664\u98ce\u9669\uff0c\u4f7f\u653b\u51fb\u8005\u66f4\u96be\u8fdb\u5165\u60a8\u7684\u73af\u5883<\/strong>\u3002<\/li><\/ol>\n\n\n\n<p>\u5404\u9636\u6bb5\u7684\u9632\u62a4\u65b9\u6cd5\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u9636\u6bb51. (\u8fdb\u4e0d\u6765)Prevent attackers from getting in<\/mark><\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u9636\u6bb52. (\u4f4e\u6743\u9650)Prevent an attacker from escalating their privileges<\/mark><\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u9636\u6bb53. (\u5220\u4e0d\u6389\/\u6709\u5907\u4efd)Protect your critical data from access and destruction<\/mark><\/li><\/ul>\n\n\n\n<p><strong>\u9636\u6bb51\u7684\u72b6\u6001\u4ee5\u53ca\u7f13\u89e3\u76ee\u6807\u548c\u8861\u91cf\u6807\u51c6\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u72b6\u6001\uff1a\u653b\u51fb\u8005\u8fd8\u88ab\u6321\u5728\u4f01\u4e1a\u5916\u90e8\u6ca1\u6709\u8fdb\u6765\uff1b<\/li><li>\u7f13\u89e3\u76ee\u6807\uff1a\u670d\u52a1\/\u8bbe\u5907\/\u8d26\u53f7\u90fd\u57fa\u4e8e\u5df2\u77e5\u7684\u653b\u51fb\u5411\u91cf\u505a\u4e86\u52a0\u56fa\uff1b<\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u6210\u529f\u6807\u51c6\uff1a\u653b\u51fb\u8005\u5f88\u96be\u653b\u9677\u4efb\u4f55\u8bbe\u5907\u6216\u8005\u83b7\u53d6\u4efb\u4f55\u6709\u7528\u7684\u8d26\u6237\u51ed\u8bc1\u3002<\/mark>\uff08\u5b9e\u9645\u60c5\u51b5\u4e2d\u5f88\u96be\u8fbe\u5230\uff09<\/li><\/ul>\n\n\n\n<p><strong>\u9636\u6bb52\u7684\u72b6\u6001\u4ee5\u53ca\u7f13\u89e3\u76ee\u6807\u548c\u8861\u91cf\u6807\u51c6\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u72b6\u6001\uff1a\u653b\u51fb\u8005\u7a81\u7834\u4e86\u5916\u7f51\u9632\u62a4\u8fdb\u5165\u4e86\u5185\u7f51\uff1b<\/li><li>\u7f13\u89e3\u76ee\u6807\uff1a\u901a\u8fc7\u4fdd\u62a4\u7ba1\u7406\u5458\u7b49\u9ad8\u6743\u9650\u8d26\u53f7\u5e76\u5feb\u901f\u5bf9\u653b\u51fb\u505a\u51fa\u54cd\u5e94\u4ee5\u9650\u5236\u653b\u51fb\u8005\u7684\u653b\u51fb\u534a\u5f84\uff1b<\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u6210\u529f\u6807\u51c6\uff1a\u653b\u51fb\u8005\u5f88\u96be\u5728\u9632\u5b88\u8005\u6ca1\u6709\u4efb\u4f55\u611f\u77e5\u7684\u60c5\u51b5\u4e0b\u83b7\u53d6\u4efb\u4f55\u7ba1\u7406\u5458\u7b49\u9ad8\u6743\u9650\u8d26\u53f7\u51ed\u8bc1\u3002<\/mark>\uff08\u8fd9\u4f9d\u8d56\u4e8e\u9632\u5b88\u65b9\u65e5\u5fd7\u57cb\u70b9\u7684\u5168\u9762\u6027\u548c\u8f83\u9ad8\u7684\u5de5\u7a0b\u5b9e\u73b0\u80fd\u529b\uff0c\u5b9e\u9645\u60c5\u51b5\u4e2d\u80fd\u8fbe\u5230\u8fd9\u4e00\u70b9\u8981\u6c42\u7684\u4f01\u4e1a\u4e5f\u4e0d\u591a\uff09<\/li><\/ul>\n\n\n\n<p><strong>\u9636\u6bb53\u7684\u72b6\u6001\u4ee5\u53ca\u7f13\u89e3\u76ee\u6807\u548c\u8861\u91cf\u6807\u51c6\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u72b6\u6001\uff1a\u653b\u51fb\u8005\u83b7\u53d6\u4e86\u9ad8\u6743\u9650\u8d26\u53f7\u51ed\u8bc1\uff1b<\/li><li><strong>\u7f13\u89e3\u76ee\u6807\uff1a\u901a\u8fc7\u4e25\u683c\u7684\u6743\u9650\u63a7\u5236\u3001\u52a0\u5bc6\u548c\u4e0d\u53ef\u53d8\u7684\u79bb\u7ebf\u5907\u4efd\uff0c\u6700\u5927\u9650\u5ea6\u5730\u51cf\u5c11\u653b\u51fb\u8005\u5bf9\u4f01\u4e1a\u7684\u8d22\u52a1\u5f71\u54cd\u3002<\/strong><\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u6210\u529f\u6807\u51c6\uff1a\u4f01\u4e1a\u4ece\u653b\u51fb\u4e2d\u6062\u590d\u7684\u6210\u672c\u6bd4\u652f\u4ed8\u8d4e\u91d1\u7684\u6210\u672c\u8981\u4f4e\u3002<\/mark>\uff08\u8fd9\u4e00\u70b9\u76f8\u5bf9\u524d\u4e24\u70b9\u6765\u8bf4\u66f4\u5bb9\u6613\u8fbe\u5230\u4e00\u4e9b\uff0c\u4f01\u4e1a\u4ece\u8fd9\u70b9\u51fa\u53d1\u7684\u6027\u4ef7\u6bd4\u4e5f\u6bd4\u8f83\u9ad8\uff09<\/li><\/ul>\n\n\n\n<p><strong>\u5bb9\u6613\u88ab\u52d2\u7d22\u653b\u51fb\u6311\u4e2d\u7684\u8d44\u4ea7\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u672c\u5730\u7684AD\u57df\u63a7\/\u9ad8\u6743\u9650\u8d26\u53f7\uff1b<\/li><li>\u672c\u5730\u7684\u670d\u52a1\u5668\/\u6587\u4ef6\u8d44\u6e90\uff1b<\/li><li>\u8bbe\u5907\uff1b<\/li><li>\u5907\u4efd\u6587\u4ef6\uff1b<\/li><li>\u4e91\u4e0a\u7684AD\u57df\u63a7\/\u9ad8\u6743\u9650\u8d26\u53f7\uff1b<\/li><li>\u4e91\u4e0a\u7684\u6587\u4ef6\/\u90ae\u4ef6\/\u5e94\u7528\/\u7528\u6237\u6570\u636e\u2026\u2026\uff1b<\/li><li>\u2026\u2026<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n\n\n\n<p>What is ransomware<br><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/human-operated-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/security\/compass\/human-operated-ransomware<\/a><\/p>\n\n\n\n<p>Quickly deploy ransomware preventions<br><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/protect-against-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/security\/compass\/protect-against-ransomware<\/a><\/p>\n\n\n\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u524d\u6bb5\u65f6\u95f4\u4e0d\u592a\u5fd9\u7684\u65f6\u5019\u559c\u6b22\u7ffb\u9605 Microsoft \u7684\u5b89\u5168\u6587\u6863\uff0c\u8fd1\u671f\u62bd\u65f6\u95f4\u628a Human [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25],"tags":[1820,1848,37,1847,1849],"class_list":["post-5316","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","tag-microsoft","tag-ransomware","tag-security","tag-1847","tag-1849"],"views":2389,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=5316"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5316\/revisions"}],"predecessor-version":[{"id":5318,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5316\/revisions\/5318"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=5316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=5316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=5316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}