当前位置:网站首页>Many ministries and commissions strengthened regulation, and Tencent security helped enterprises resist the "mining" Trojan horse
Many ministries and commissions strengthened regulation, and Tencent security helped enterprises resist the "mining" Trojan horse
2022-06-24 01:24:00 【Tencent security】
11 month 16 Japan , The national development and Reform Commission held a press conference , Focus on the virtual currency “ dig ” government . At the meeting , Spokesman Meng Wei clearly expounded the virtual currency “ dig ” Hazards of , And said it would continue to do a good job in virtual currency “ dig ” Whole chain management , Establish a long-term mechanism , Strict precautions “ A stirring among the dry bones ”.
all the time , Tencent security is based on its many years of security operation experience and capability , Created a series of solutions , Help enterprises improve their defense against the threat of mining Trojan horse invasion , Build a solid enterprise security defense line .
The national development and Reform Commission has made great efforts to rectify “ dig ” Behavior
At the press conference , Meng Wei, spokesman of the national development and Reform Commission, said , Virtual currency related business activities are illegal financial activities . The national development and Reform Commission will focus on industry “ dig ”、 State owned units involve “ dig ” And bitcoin “ dig ” Focus on comprehensive rectification . For the unit implementing residential electricity price , If you find yourself participating in virtual currency “ dig ” Activities , We will study the imposition of punitive electricity prices .
As early as this year 9 month , The national development and Reform Commission and the Central Propaganda Department 、 Internet Information Office 、 Ministry of industry and information technology 11 Jointly issued by the department 《 On the regulation of virtual currency “ dig ” Notice of the event 》, Clearly strengthen the virtual currency “ dig ” The whole industry chain supervision of upstream and downstream activities , It is strictly prohibited to add virtual currency “ dig ” project , Accelerate the orderly exit of stock projects , Promote the optimization of industrial structure and help carbon peak 、 The goal of carbon neutralization was achieved on schedule .
The relevant person in charge of the national development and Reform Commission pointed out , One side ,“ dig ” High energy consumption and carbon emission intensity , To realize dual control of energy consumption and carbon peak in China 、 Carbon neutralization target has a great impact , Add the pressure of power security in most areas , And aggravate the tension between supply and demand of relevant electronic information products ; On the other hand , Bitcoin speculation and trading disturbs China's normal financial order , Give birth to illegal and criminal activities , And become money laundering 、 tax evasion 、 Channels for terrorist financing and cross-border capital transfer , To a certain extent, it threatens social stability and national security .
It can be seen that ,“ dig ” The harm of Trojans , Far more serious than people think .
“ dig ” The harm of Trojans is seriously underestimated
“ dig ” Does the Trojan just make the system card slow down and consume electricity ? No ! Your business may lose money due to data leakage .
In the early “ dig ” Behavior , It is indeed illegal black production, which invades the server on a large scale and implants the mining Trojan horse , Then, the computer resources of the controlled host system are used to mine digital cryptocurrency for profit . therefore , Many people think that the mining Trojan just slows down the system , Consume system resources , There will be no destructive consequences . This view seriously underestimates the harm of mining Trojans , The impact of mining Trojans is much more than that .
According to the latest report of Tencent security team , In the attack of the public cloud , Proportion of invasion for mining purposes 54.9%, Tencent cloud in the past 30 Mining Trojan horse attacks have been detected for more than days 6000 rise . There are scientific and technological media reports , The mining Trojan horse attack exceeded... In all security incidents 25%.
In addition to consuming a lot of host computer resources , Interfere with normal business operation . Mining Trojans usually operate “ close Linux/Windows A firewall ”“ install Rootkit back door ” And other high-risk behaviors , The Trojan controller may steal the server's confidential information at any time , The control server performs the following operations DDoS attack , Use this server as a springboard to attack other computers , It can even release the blackmail virus at any time and completely paralyze the server .“ dig ” The harmfulness of the Trojan horse can be seen .
Tencent security provides all-round solutions
How to effectively deal with such security threats , And in this process to promote enterprise network security capabilities , It has become the common goal of enterprise security managers and network security manufacturers .
Tencent security is based on a complete product matrix , Including the host side 、 Terminal side 、 Traffic side, security management platform and other security products and services , Help businesses deal with “ dig ” Trojans .
- Main engine side , Enterprises can deploy Tencent security host security , Detect and fix vulnerabilities 、 Detect weak passwords 、 And high-risk orders , Reduce the possibility of hacker intrusion . At the same time, the host security can automatically detect and isolate the landing files downloaded by the mining Trojan horse , Tencent host security has been connected to the network based on artificial intelligence algorithm BinaryAI engine , The detection ability of known and unknown mining Trojans is stronger ;
- Container side , Enterprises can sort out their container assets through container security , Discover mirror and cluster security issues , Provide vulnerability and baseline detection capabilities , File access control , Abnormal process protection , Trojan Detection , The container escape detection and other capabilities protect the safety of the container during operation ;
- Terminal side , Enterprises can deploy Tencent zero trust iOA, Scan and repair vulnerabilities of the system , Check, kill and intercept virus Trojan horse attacks . By configuring zero trust iOA Security policy , Isolate potential intruders , In the worst case, even if there is a hacker intrusion , The security policy can also limit threats to individual failed terminals through micro isolation , So that it cannot be widely spread in the intranet . Zero trust iOA Authentication capabilities , It can also completely eliminate the possibility of weak password explosion intrusion ;
- Flow side , Enterprises can bypass the deployment of Tencent security advanced threat detection system ( Royal boundary NDR), Analyze and detect the traffic between intranet and network , Discover hacker attacks in time . Enhanced domain penetration lateral movement detection capability , Never let go of any traces of hackers' activities on the intranet . At present, it has supported the whole process detection of mining Trojan horse from upload and implantation to intranet diffusion . Relying on Hubble's dynamic behavior sandbox and TAV Self developed anti-virus engine , It can accurately and efficiently detect the mining Trojan files transmitted in the current network . Based on Tencent sky curtain PaaS Safe computing support , Provide alarms -- Respond to one touch closed-loop disposal , Fast alarm processing , Improve overall operational efficiency ;
- meanwhile , Virtual machines can also deploy cloud firewalls 、Web Apply firewall to prevent vulnerability attacks , The built-in virtual patch mechanism of cloud firewall can effectively prevent high-risk vulnerabilities and 0day Loophole attack , The professional vulnerability response team will respond to the latest high-risk vulnerabilities , Timely upgrade the interception rules to prevent hackers from taking advantage of . Through the network traffic control strategy , Limit the spread of threats . Cloud firewall supports configuring wechat code scanning login , It can completely eliminate the possibility of hackers using weak password blasting attacks .
Enterprises can according to their own network 、 Deploy corresponding security products according to business characteristics , Build an enterprise exclusive multi-level security defense network . For enterprises large enough , The security operation center can also be configured , Manage all deployed security product capabilities organically and uniformly , The enterprise security management team can fully control the overall situation of network security through the security operation center . Tencent security operation center supports access to Tencent's own security product alarm data , It also supports access to third-party security product data . Through strong data analysis ability , Summarize and analyze a large amount of data that is difficult for enterprise operation and maintenance personnel to deal with , Change numerous for brief , Disperse disordered alarm fragments , The output is the complete threat incident investigation results presented by timeline , Let the security operation and maintenance personnel detect 、 Respond to 、 Handling threats is simpler .
Enterprise security trilogy
Mining Trojans have multiplied , High risk vulnerabilities are frequently exposed , The current security situation cannot be ignored . For government and enterprise organizations to prevent the harm of mining Trojan horse , Tencent security expert Li Tiejun gave four suggestions :
1、 Mining Trojan horse usually invades the channel through high-risk vulnerability attack and weak password blasting , Enterprise security operation and maintenance personnel can focus on these two types of weaknesses , Use corresponding safety products to carry out risk detection on enterprise assets , Timely reinforce the risks found .
2、 It is recommended that the enterprise configuration cover all nodes , A complete defense system distributed at multiple levels , Attackers often attack a single system with weaknesses , After success , Quickly use a large number of hacker tools to spread in the network .
3、 Zero trust is recommended iOA Or other management methods , Configure strict security policies , Manage employee behavior , Avoid downloading software or server component installation source without enterprise security audit .
4、 It is recommended to organize employees to conduct network security training regularly , Enhance the awareness of prevention , Be careful with emails and documents of unknown origin . Give up using weak passwords , Or configure multiple authentication for important services , Weak password is the most common means of all kinds of hacker attacks .
Mining Trojan horse is one of the most common threats to host computer , It is also a test of enterprise security defense mechanism 、 The key to the level of environmental and technological capabilities . For small and medium-sized enterprises that lack manpower and budget , Last month, Tencent security and China Association of small and medium-sized commercial enterprises jointly launched “ The same boat project ”, by 1000 Enterprises and institutions provide free emergency response and risk detection services , Help many small and medium-sized enterprises to make up for the shortcomings of safety construction , Improve the security line .
meanwhile , Tencent security will continue to export its own capability accumulation and technology accumulation , Partners of collaborative industrial ecology , Together against “ dig ” Trojan horse , Effectively prevent the serious harm it brings , Provide assistance for industrial safety , Together , Defend beauty .
边栏推荐
- Salesforce batch apex batch processing (I)
- Thread safety and lock optimization
- Talk to Wu Jiesheng, head of Alibaba cloud storage: my 20 years of data storage (unlimited growth)
- How to realize IP invariance in the private network of basic network ECs and cloud database resource switching
- Solve the problem that Base64 compressed files are extracted with spaces after post request
- Leetcode lecture on algorithm interview for large factories 2 Time space complexity
- Textplus - reverse engineering of textplus
- Part of the problem solution of unctf2020
- GNN上分利器!与其绞尽脑汁炼丹,不如给你的GNN撒点trick吧
- How to build a high-quality website
猜你喜欢

Shardingsphere-proxy-5.0.0 implementation of capacity range partition (V)

The concept of TP FP TN FN in machine learning

Error reported using worker: uncaught domexception: failed to construct 'worker': script at***

所见之处都是我精准定位的范畴!显著图可视化新方法开源

实时计算框架:Spark集群搭建与入门案例

Arm learning (7) symbol table and debugging

用一个软件纪念自己故去的母亲,这或许才是程序员最大的浪漫吧

13 `bs_ duixiang. Tag tag ` get a tag object

这不会又是一个Go的BUG吧?

Installation and use of winscp and putty
随机推荐
【Flutter】如何使用Flutter包和插件
DML operation
WinSCP和PuTTY的安装和使用
What is the website construction process? What details need to be valued?
Shardingsphere-proxy-5.0.0 implementation of capacity range partition (V)
13 `bs_ duixiang. Tag tag ` get a tag object
Everything I see is the category of my precise positioning! Open source of a new method for saliency map visualization
[planting grass by technology] 13 years' record of the prince of wool collecting on the cloud moving to Tencent cloud
[applet] when compiling the preview applet, a -80063 error prompt appears
[log service CLS] experience of troubleshooting abnormal scenarios with tke event log
How to build a pagoda panel web site on Tencent ECS?
Why traifik ingress?
Open source model library of flying propeller industry: accelerating the development and application of enterprise AI tasks
Solve the problem that Base64 compressed files are extracted with spaces after post request
4 most common automated test challenges and Countermeasures
[technical grass planting] deploy a super large capacity and unlimited speed network disk in Tencent cloud
DML操作
Openstack
对抗训练理论分析:自适应步长快速对抗训练
ICML'22 | ProGCL: 重新思考图对比学习中的难样本挖掘