當前位置

首頁 > 英語閱讀 > 雙語新聞 > 杭州雄邁在美召回舊版網絡攝像頭

杭州雄邁在美召回舊版網絡攝像頭

推薦人: 來源: 閱讀: 2.49W 次

杭州雄邁在美召回舊版網絡攝像頭

Chinese electronics manufacturer Xiongmai is recalling some older versions of its webcams sold in the US after they were linked to the “botnet” attack that disrupted internet services from Twitter to the New York Times on Friday.

中國電子產品製造商雄邁正在召回其在美國銷售的部分老款網絡攝像頭,這些產品被認爲與上週五癱瘓美國互聯網服務——從Twitter到《紐約時報》——的“殭屍網絡”攻擊有關聯。

Hangzhou Xiongmai Technology said it would recall earlier versions of the webcams after cyber security researchers identified them as a contributor to the network that hackers used to flood Dyn, a domain name service provider, with traffic.

杭州雄邁信息技術有限公司(Hangzhou Xiongmai Technology)稱,將召回一些早期版本的網絡攝像頭,此前,網絡安全研究人員確認,黑客利用了包括這些網絡攝像頭在內的設備,對域名服務提供商Dyn進行超大規模流量訪問。

The Chinese manufacturer told the Financial Times that it had issued security updates to cameras sold before April 2015, adding that its internet-connected cameras were still safe to use and that it was not responsible for the internet outage.

這家中國製造商對英國《金融時報》表示,此前該公司已向2015年4月之前出售的攝像頭髮布了安全更新程序,並補充稱,其與互聯網連接的攝像頭仍可安全使用,此次網絡癱瘓的責任不在該公司。

It said that any attack could only have occurred on equipment using firmware from before April 2015, with an unchanged preset password and exposed to public internet.

該公司表示,只有仍在使用2015年4月之前發佈的固件、初始密碼未修改且暴露於公共網絡的設備纔會遭到攻擊。

Hackers used source code for Mirai, malicious software that takes over internet of things devices and is now widely available on the internet, to create a “botnet” — or interconnected network of computers controlled by cybercriminals.

黑客利用惡意軟件Mirai的源代碼建立了一個“殭屍網絡”(由被網絡犯罪分子控制的相互連接的計算機網絡)。這款惡意軟件能夠控制物聯網設備,很容易在互聯網上獲得。

The botnet attacked Dyn, making it unable to translate the names of many major websites into addresses that the internet can understand, so disrupting access.

殭屍網絡攻擊了Dyn,令它無法將許多主要網站的名稱翻譯成互聯網可以理解的地址,導致網絡訪問中斷。

Dyn said on Saturday that many of the internet protocol addresses associated with the Mirai botnet had been used in the two attacks, as well as one attempted attack it was trying to defend against.

上週六Dyn表示,許多與Mirai殭屍網絡有關的互聯網協議地址在兩次攻擊中被使用過,另外還有一次攻擊企圖被其努力阻攔。

Kyle York, Dyn’s chief strategy officer, said the company, alongside law enforcement agencies, was still investigating who was behind the attack.

Dyn首席戰略官凱爾.約克(Kyle York)表示,該公司與執法機構仍在調查這次攻擊的幕後黑手。