[º¸¾È´º½º ±Ç ÁØ] Àü ¼¼°è ±¹°¡µéÀÇ º¸¾ÈÀ§Çù Á¤µµ¸¦ Áö¼öÈÇÑ ¼¼°è º¸¾ÈÁöµµ(Global Security Map)¿¡¼ ¿ì¸®³ª¶ó´Â ¾î¶² À§Ä¡¸¦ Â÷ÁöÇÏ°í ÀÖÀ»±î?
HostExploit ±×·ìÀÌ ¹ßÇ¥ÇÑ ¼¼°è º¸¾ÈÁöµµ [Ãâó : HostExploit, "The Global Security Map - A Question and Answer Session on Cybercrime", 2012/6/23]
»çÀ̹ö ¹üÁË ¼¹öÀÇ À§Ä¡¿Í ±â´ÉÀ» ÃßÀûÇÏ´Â ¿¬±¸±â°üÀÎ HostExploit ±×·ìÀº Áö¿ªº°·Î »çÀ̹öº¸¾È À§Çù ºÐÆ÷ ¹× ¼öÁØÀ» ½Ã°¢ÈÇÑ ¼¼°è º¸¾ÈÁöµµ¸¦ Áö³ 6¿ù¸» ¹ßÇ¥Çߴµ¥, ¿©±â¼ ¿ì¸®³ª¶ó´Â 26À§ÀÎ °ÍÀ¸·Î ³ªÅ¸³µ´Ù.
Çѱ¹ÀÎÅͳÝÁøÈï¿ø(KISA)ÀÌ ¹ßÇ¥ÇÑ 7¿ù 1ÁÖÂ÷ ÀÎÅÍ³Ý µ¿Çâ¿¡ µû¸£¸é Áö³ 6¿ù 23ÀÏ °øÇ¥µÈ ¼¼°è º¸¾ÈÁöµµ´Â ¾Ç¼ºÄÚµå È£½ºÆà ¹× À¯Æ÷, ½ºÆÔ, º¿³Ý, ÇǽÌ, ±âŸ °ø°ÝÈ°µ¿ µîÀ» HEÁö¼ö·Î Æò°¡ÇÏ°í, º¸¾ÈÀ§Çù ¹ß»ý ±Ù¿øÁö Á¤º¸¸¦ ±â¹ÝÀ¸·Î ½Ã°¢ÈÇÑ °ÍÀÌ´Ù.
¿©±â¼ ¸»ÇÏ´Â HEÁö¼ö(HostExploit Áö¼ö)´Â À¯ÇØÇÑ È°µ¿ ¹ß»ý ±¹°¡ÀÇ ÀÎÇÁ¶ó ±Ô¸ð ´ëºñ, ¹ß»ýÇÏ´Â »çÀ̹ö º¸¾ÈÀ§Çù ¼öÁØÀ» 0~1,000 »çÀÌ ¹üÀ§·Î Á¡¼öÈÇÑ Áö¼ö·Î 0¿¡ °¡±î¿ï¼ö·Ï À§Çù Á¤µµ°¡ ³·Àº Áö¿ªÀÓÀ» ÀǹÌÇÑ´Ù.
¼¼°è º¸¾ÈÁöµµÀÇ Æò°¡±âÁØÀÌ µÇ´Â HEÁö¼ö´Â »çÀ̹ö º¸¾ÈÀ§ÇùÀÇ Á¾·ù¿¡ µû¶ó ±¸ºÐµÇ´Âµ¥, ºÐ·ù±âÁØÀº ´ÙÀ½°ú °°´Ù.
»çÀ̹ö º¸¾ÈÀ§ÇùÀÇ Á¾·ù [Ãâó : HostExploit, "The Global Security Map - A Question and Answer Session on Cybercrime", 2012/6/23, KISA Internet Weekly 7¿ù 1ÁÖ(20120705)] |
Á¶»ç°á°ú »çÀ̹ö º¸¾ÈÀ§ÇùÀÇ ¹ß»ý¿ì·Á°¡ °¡Àå Å« ³ª¶ó´Â ¸®Åõ¾Æ´Ï¾Æ, °¡Àå ÀûÀº ³ª¶ó´Â Çɶõµå·Î Æò°¡µÆÀ¸¸ç, ÃÑ 219°³ ³ª¶ó Áß Çѱ¹Àº 26À§·Î, ¹Ì±¹(11À§)°ú Áß±¹(20À§)¿¡ ºñÇØ ³·Àº ¼öÁØÀ̳ª, ÀϺ»(64À§)º¸´Ù´Â ³ôÀº À§Çù¼öÁØÀ» ³ªÅ¸³»°í ÀÖ´Â °ÍÀ¸·Î Á¶»çµÆ´Ù.
¿ì¸®³ª¶óÀÇ HEÁö¼ö[Ãâó : HostExploit, "The Global Security Map - A Question and Answer Session on Cybercrime", 2012/6/23, KISA Internet Weekly 7¿ù 1ÁÖ(20120705)] |
Àü ¼¼°èÀûÀ¸·Î ·¯½Ã¾Æ ¹× µ¿À¯·´ Áö¿ª ±¹°¡¿¡¼ ½ºÆÔ ¹ß¼Û, ¾Ç¼ºÄÚµå À¯Æ÷Áö, C&C µîÀÇ º¸¾ÈÀ§ÇùÀÇ ÁÖ¿ä ±Ù¿øÁö·Î ³ªÅ¸³ª°í Àִµ¥, ÁÖ·Î »çÀ̹ö ħÇØ¿¡ °üÇÑ ¹ý·ü ¹× ó¹úÀÌ ¹ÌºñÇÑ ±¹°¡¿¡¼ º¸¾ÈÀ§Çù ¹ß»ýÀÇ ±Ù¿øÁö°¡ µÇ°í ÀÖ´Â °ÍÀ¸·Î ³ªÅ¸³µ´Ù.
[±Ç ÁØ ±âÀÚ(editor@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>