当前位置:网站首页>Why is the blackmail virus that shut down half of America's energy system terrible? Interpretation of authoritative reports
Why is the blackmail virus that shut down half of America's energy system terrible? Interpretation of authoritative reports
2022-06-24 15:34:00 【Tencent security】
The largest product pipeline operator in the United States Colonial Pipeline At local time 5 month 7 Was attacked by blackmail software on the th , Forced to shut down its key fuel network supplying oil to the eastern coastal states of the United States .
Colonial Of 5500 Miles of pipelines carry fuel from refineries along the Gulf coast to customers in the southern and eastern United States , It was transported 45% East Coast fuel , covers 5000 Ten thousand Americans .
distance 2017 year 5 month 12 Japanese extortion virus WannaCry The first outbreak has passed 4 Years. , A lot of people were impressed by the “ one 's sabre-rattling is getting louder and the smell of gunpowder thicker ” Still fresh in my memory , But this is just the beginning , The next few years , Blackmail virus has increasingly become a tried and true means of attack , And more and more varieties have been developed , Only in the last few months , foxconn 、 Acer 、 Kia and other well-known enterprises are still receiving extortion virus attacks , The ransom has set new records again and again .
This time, Colonial Pipeline event , The blackmail virus directly damaged a national energy system , The harm is evident .
Extortion virus is still almost unsolved , It's almost impossible to decrypt once you get caught , Fortunately, some technical means can also be used to enhance the immunity to extortion virus . Tencent security united with Southern Metropolis Daily to summarize the attack methods of blackmail virus 、 Attack the target 、 Attack path 、 Prevention methods and other information , Compiled 《2021 Blackmail virus trend report and protection scheme suggestions in the first half of the year 》, For institutions and enterprises to extort virus “ Enemy and know yourself ”, Try to avoid being attacked .
meanwhile , Tencent Security Alliance Nanfang Metropolis Daily 、 Watch the snow forum , Invite three senior safety experts , They were in Windows System kernel security 、 Years of experience in the field of anti-virus and Threat Intelligence , Decrypt all aspects of blackmail virus for you .
Sweep yards attention Tencent security video Number
Or direct video number search “ Tencent security ”
Follow and make an appointment for live broadcast
5 month 11 On Tuesday night 19:00
Be there or be square
边栏推荐
- 熬夜整理出的软件测试【高频】面试题大全(2022最新)
- Tencent cloud native intelligent data Lake Conference will be held, revealing the panoramic matrix of Tencent cloud data Lake products for the first time
- Laravel 8 realizes auth login
- Typescript raw data type
- Application of motion capture system in positioning and mapping of mobile robot in underground tunnel
- Sequential representation and implementation of linear table (refer to YanWeiMin version)
- 安装wireshark时npcap怎么都安装不成功,建议先用winpcap
- R语言实战应用精讲50篇(二十三)-贝叶斯理论重要概念: 可信度Credibility, 模型Models, 和参数Parameters
- Actual combat | a tortuous fishing counteraction
- 缓存使用中Redis,Memcached的共性和差异分析
猜你喜欢

Method after charging the idea plug-in material theme UI

From pair to unordered_ Map, theory +leetcode topic practice

CVPR 2022 - Interpretation of selected papers of meituan technical team

熬夜整理出的软件测试【高频】面试题大全(2022最新)

Do you really know the difference between H5 and applet?

Application of motion capture system in positioning and mapping of mobile robot in underground tunnel

FreeRTOS新建任务不执行问题解决办法

Laravel8 uses faker to call factory to fill data

How to generate assembly code using clang in Intel syntax- How to generate assembly code with clang in Intel syntax?
Redis consistency hash and hash slot
随机推荐
[parameter configuration tutorial] how should the parameters in the RTMP streaming camera be configured?
实战 | 记一次曲折的钓鱼溯源反制
Golang实现Biginteger大数计算
ES mapping之keyword;term查詢添加keyword查詢;更改mapping keyword類型
CVPR 2022 - Interpretation of selected papers of meituan technical team
FreeRTOS新建任务不执行问题解决办法
leetcode 139. Word break word split (medium)
Allwinner a40i industrial Internet gateway design scheme, smart site, smart city core gateway
update+catroot+c000021a+critical service failed+drivers+intelide+viaide+000000f
CVPR2022 | 可精简域适应
Istio FAQ: 431 request header fields too large
At? Let's blow the air conditioner together!
Task priority motion planning of floating base
Xingxinghai, it is said that the new generation can fight better?
The industrial control security of roaming the Intranet
Esp32 series -- comparison of esp32 series
手机同花顺股票开户安全吗!
Design of vga/lcd display controller system based on FPGA (Part 2)
Fine! Huawei firewall dual computer hot standby Technology: HRP, vgmp, VRRP
A common defect management tool - Zen, which teaches you from installation to using the handle