-
(单词翻译:双击或拖选)
DAVID GREENE, HOST:
Two cybersecurity firms say they have found some technical similarities between the WannaCry ransomware and earlier attacks from hackers1 in North Korea, though they are not calling these clues proof that North Korea is behind the worldwide attacks that began last week. Other experts are saying that they are puzzled by WannaCry. As NPR's Martin Kaste reports, they say the ransomware actually contains some pretty amateurish2 flaws.
MARTIN KASTE, BYLINE3: Nick Selby's a police detective in Texas who specializes in cybercrime. He says the cops have a decent shot at catching4 certain kinds of online scammers - say, that guy selling the too-good-to-be-true car on Craigslist. But when it comes to ransomware, that's tougher.
NICK SELBY: It tends to be a crime that is born on the Internet, is born through tips that are sold on a dark web that already prebuild in anonymity5 of the perpetrators.
KASTE: And that's what the experts think they're seeing here with WannaCry. Somebody is using software tools that were created by somebody else. Paul Burbage is a malware researcher for Flashpoint-Intel.
PAUL BURBAGE: The ransomware itself - we have seen that in the wild before, and it's not that sophisticated.
KASTE: He says the most obvious tip-off is the fact that the malware contained an easy-to-find kill switch, basically a URL address included in the code, which was used to stop the malware's spread.
BURBAGE: The kill switch allowed people to prevent the infection chain fairly quickly. It was kind of a new mistake, if you ask me.
KASTE: And WannaCry has some other deficiencies, too. Sophisticated ransomware usually has an automated6 way to accept payments from its victims who want to unlock their computers. But Burbage says WannaCry's system seems to be manual. The scammers have to send each victim a decryption code, which isn't very practical for an infection that involves thousands and thousands of computers.
BURBAGE: It leads me to believe that they did not think that it was going to spread as far as it is. You know, I really think that these guys are running scared, and they're probably laying low at this point.
KASTE: And then there's this - so far, at least, the scammers have collected payments from fewer than 200 victims. We know this because they're demanding Bitcoin, and Bitcoin transactions are public. We don't know the scammers' names, but we know the Bitcoin addresses they're using to receive payment - just three addresses. Again, a more sophisticated ransomware would have had the ability to generate a unique Bitcoin address for each victim.
Jonathan Levin is a co-founder of Chainalysis. It's a company that analyzes7 Bitcoin usage to identify money laundering9. He's been watching the Bitcoins accumulating at WannaCry's three addresses. So far, they've collected about $60,000 worth. But those Bitcoins are just sitting there, he says, untouched.
JONATHAN LEVIN: It might be that they don't have another good idea yet about how they want to launder8 the Bitcoin. Perhaps they're not really set up to take advantage of the success of their campaign so far.
KASTE: Levin says one way to turn dirty Bitcoin into real-world money is to do that conversion10 in a jurisdiction11 where the financial authorities turn a blind eye, so the scammers will sometimes have safe zones. Usually it's their home country, where the malware is not allowed to do any damage. He gives the example of a very successful ransomware called locky, which favors Russia.
LEVIN: So if it detects that there is a Russian language on the machine, it actually does not execute and deletes itself.
KASTE: WannaCry, in contrast, does not seem to be playing geographic12 favorites this way. And Levin says if the perpetrators live in one of the countries that have been hit hard by this - say, in Russia - that would be, as he puts it, an incredibly bad life choice. Martin Kaste, NPR News.
(SOUNDBITE OF FLVKE'S "ZERO STATION")
1 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
2 amateurish | |
n.业余爱好的,不熟练的 | |
参考例句: |
|
|
3 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
4 catching | |
adj.易传染的,有魅力的,迷人的,接住 | |
参考例句: |
|
|
5 anonymity | |
n.the condition of being anonymous | |
参考例句: |
|
|
6 automated | |
a.自动化的 | |
参考例句: |
|
|
7 analyzes | |
v.分析( analyze的第三人称单数 );分解;解释;对…进行心理分析 | |
参考例句: |
|
|
8 launder | |
v.洗涤;洗黑钱(把来路可疑的钱弄得似乎合法) | |
参考例句: |
|
|
9 laundering | |
n.洗涤(衣等),洗烫(衣等);洗(钱)v.洗(衣服等),洗烫(衣服等)( launder的现在分词 );洗(黑钱)(把非法收入改头换面,变为貌似合法的收入) | |
参考例句: |
|
|
10 conversion | |
n.转化,转换,转变 | |
参考例句: |
|
|
11 jurisdiction | |
n.司法权,审判权,管辖权,控制权 | |
参考例句: |
|
|
12 geographic | |
adj.地理学的,地理的 | |
参考例句: |
|
|