TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Jumping the Air Gap: 15 Years of Nation-State Effort [pdf]

70 点作者 shishy超过 3 年前

6 条评论

chrisseaton超过 3 年前
I feel like the first person in security who used the term 'nation-state' read it somewhere but didn't know what it meant and now it's meaningless.
评论 #29518065 未加载
评论 #29518177 未加载
评论 #29519877 未加载
评论 #29517789 未加载
评论 #29519554 未加载
评论 #29517340 未加载
sounds超过 3 年前
The executive summary is worth the 1-minute read.<p>Interesting that all the malicious frameworks known (by ESET) that target air-gapped networks were for some form of espionage.
评论 #29515896 未加载
评论 #29516030 未加载
jonathankoren超过 3 年前
&gt;Over 75% of all the frameworks used malicious LNK or autorun files on USB drives to either perform the initial air-gapped system compromise or to move laterally within the air-gapped network.<p>I don&#x27;t get why autorun was created. It&#x27;s an obvious security issue.
评论 #29519292 未加载
评论 #29517298 未加载
评论 #29516899 未加载
pstuart超过 3 年前
&gt; All the frameworks were built to attack Windows systems.<p>Well there you go. Perhaps using an OpenBSD USB bastion is the way to go.
评论 #29520856 未加载
liketochill超过 3 年前
They didn’t detail any espionage activity other than stealing files, even though their study included stuxnet which we know altered centrifuge control parameters.<p>I wanted to know what types of facilities and platforms are being targeted.
ur-whale超过 3 年前
TL;DR:<p><pre><code> - only targets windows - only uses USB drives </code></pre> The rest of the article dives into windows highly specific exploits and therefore lacks in generality.
评论 #29518439 未加载