{"id":661,"date":"2022-07-16T13:03:31","date_gmt":"2022-07-16T05:03:31","guid":{"rendered":"http:\/\/www.aqwu.net\/wp\/?p=661"},"modified":"2022-09-21T17:22:53","modified_gmt":"2022-09-21T09:22:53","slug":"%e9%80%86%e5%90%91%e5%b7%a5%e7%a8%8b%e6%81%b6%e6%84%8f%e8%bd%af%e4%bb%b6%ef%bc%8cvault7-%e6%8f%ad%e7%a4%ba%e7%94%9a%e8%87%b3-cia-%e9%80%86%e5%90%91%e5%b7%a5%e7%a8%8b%e5%b8%88%e6%81%b6%e6%84%8f","status":"publish","type":"post","link":"https:\/\/www.aqwu.net\/wp\/?p=661","title":{"rendered":"\u9006\u5411\u5de5\u7a0b\u6076\u610f\u8f6f\u4ef6\uff0cVault7 \u63ed\u793a\u751a\u81f3 CIA \u9006\u5411\u5de5\u7a0b\u5e08\u6076\u610f\u8f6f\u4ef6\u91cd\u7528\u4ee3\u7801"},"content":{"rendered":"\n<p>\u6700\u8fd1\u6765\u81ea\u7ef4\u57fa\u89e3\u5bc6\u7684 CIA \u6570\u636e\u8f6c\u50a8\u540d\u4e3a Vault7\uff0c\u63ed\u793a\u4e86\u6709\u5173 CIA \u7f51\u7edc\u60c5\u62a5\u5de5\u4f5c\u7684\u8bb8\u591a\u4e8b\u60c5\u3002\u5c31\u6211\u800c\u8a00\uff0cCIA \u7528\u6765\u76d1\u89c6\u6765\u81ea\u4e16\u754c\u5404\u5730\u7684\u5916\u56fd\u4eba\u7684\u8bb8\u591a\u200b\u200b\u6076\u610f\u4ee3\u7801\u90fd\u4f7f\u7528\u4e86\u6765\u81ea\u5df2\u77e5\u516c\u5171\u6076\u610f\u8f6f\u4ef6\u7684\u4ee3\u7801\u201c\u7247\u6bb5\u201d\uff0c\u8fd9\u662f\u6700\u91cd\u8981\u548c\u6700\u91cd\u8981\u7684\u89c1\u89e3\u4e4b\u4e00\u3002<\/p>\n\n\n\n<p>\u539f\u6587\u94fe\u63a5\uff1ahttps:\/\/www.hackers-arise.com\/post\/2017\/03\/14\/Vault7-Reveals-that-Even-the-CIA-Reverse-Engineers-Malware-to-Re-Use-Code<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_7f8c843428bc42698188e70ee4f181be~mv2.jpg\/v1\/fill\/w_740,h_389,al_c,q_80,usm_0.66_1.00_0.01,enc_auto\/6a4a49_7f8c843428bc42698188e70ee4f181be~mv2.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p id=\"viewer-8nun0\">\u6700\u8fd1\uff0c\u7ef4\u57fa\u89e3\u5bc6\u53d1\u5e03\u4e86\u540d\u4e3a Vault7 \u7684\u6587\u4ef6\uff0c\u5176\u4e2d\u5305\u542b\u6709\u5173\u4e2d\u592e\u60c5\u62a5\u5c40\u7f51\u7edc\u60c5\u62a5\u8ba1\u5212\u7684\u4fe1\u606f\u3002\u4e2d\u592e\u60c5\u62a5\u5c40\u5728\u5f17\u5409\u5c3c\u4e9a\u5dde\u5170\u5229\u8bbe\u6709\u4e00\u4e2a\u5206\u652f\u673a\u6784\uff0c\u79f0\u4e3a CCI \u6216\u7f51\u7edc\u60c5\u62a5\u4e2d\u5fc3\uff08\u53c2\u89c1\u4e0b\u9762\u7684\u7ec4\u7ec7\u7ed3\u6784\u56fe\uff09\u3002\u8be5\u90e8\u95e8\u8d1f\u8d23\u5f00\u53d1\u81ea\u5df1\u7684\u72ec\u7acb\u4e8e NSA \u7684\u7f51\u7edc\u76d1\u89c6\u7a0b\u5e8f\u3002\u8be5\u6570\u636e\u8f6c\u50a8\u663e\u793a\u8be5\u7a0b\u5e8f\u5f00\u53d1\u4e86\u611f\u67d3 iPhone\u3001Windows \u7cfb\u7edf\u3001Android \u624b\u673a\u751a\u81f3\u4e09\u661f\u7535\u89c6\u7684\u6076\u610f\u8f6f\u4ef6\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_a50d71a3d32b423ba5241e7f21c0f781~mv2_d_1800_2700_s_2.png\/v1\/fill\/w_740,h_1110,al_c,q_90,usm_0.66_1.00_0.01,enc_auto\/6a4a49_a50d71a3d32b423ba5241e7f21c0f781~mv2_d_1800_2700_s_2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p id=\"viewer-1mdgf\">\u5728\u4e2d\u592e\u60c5\u62a5\u5c40\u7684 CCI \u5185\uff0c\u8fd8\u6709\u53e6\u4e00\u4e2a\u88ab\u79f0\u4e3a Umbrage \u5c0f\u7ec4\u7684\u5c0f\u7ec4\u3002\u5982\u4e0b\u6587\u6240\u793a\uff0cUmbrage Group \u7684\u4efb\u52a1\u662f\u7ef4\u62a4\u6765\u81ea\u5176\u4ed6\u5df2\u77e5\u516c\u5171\u6076\u610f\u8f6f\u4ef6\u7684\u53ef\u91cd\u7528\u4ee3\u7801\u5e93\u3002\u901a\u8fc7\u8fd9\u79cd\u65b9\u5f0f\uff0cCIA \u53ef\u4ee5\u4ece\u5176\u4ed6\u5df2\u77e5\u6076\u610f\u8f6f\u4ef6\u7684\u7247\u6bb5\u4e2d\u5feb\u901f\u5f00\u53d1\u6076\u610f\u8f6f\u4ef6\u3002\u8fd9\u4e9b\u6587\u4ef6\u8868\u660e\uff0cCIA \u91cd\u590d\u4f7f\u7528\u4e86 Shamoon\u3001Upclicker\u3001Nuclear Exploit Kits \u548c HiKit \u7b49\u516c\u53f8\u7684\u4ee3\u7801\u3002\u4ed6\u4eec\u4f7f\u7528\u4e86\u4ece\u8fd9\u4e9b\u6587\u6863\u4e2d\u7f16\u8f91\u7684\u5176\u4ed6\u5df2\u77e5\u6076\u610f\u8f6f\u4ef6\u3002\u6b64\u5916\uff0cCIA \u53ef\u80fd\u4f7f\u7528\u4e86 Hacking Team \u7684\u5168\u90e8\u6216\u90e8\u5206\u96f6\u65e5\u6f0f\u6d1e\uff0cHacking Team \u662f\u4e00\u5bb6\u5c06\u5176\u6f0f\u6d1e\u51fa\u552e\u7ed9\u653f\u5e9c\u7684\u610f\u5927\u5229\u79c1\u4eba\u6f0f\u6d1e\u5f00\u53d1\u516c\u53f8\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/static.wixstatic.com\/media\/6a4a49_332d4f39139f4016811d23b3f28dc22c~mv2.png\/v1\/fill\/w_740,h_103,al_c,q_85,usm_0.66_1.00_0.01,enc_auto\/6a4a49_332d4f39139f4016811d23b3f28dc22c~mv2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p id=\"viewer-6u5r\">\u8fd9\u6709\u529b\u5730\u8bc1\u660e\u4e86\u901a\u8fc7\u5b66\u4e60<strong><u><a href=\"http:\/\/www.aqwu.net\/wp\/?p=663\" target=\"_blank\" rel=\"noreferrer noopener\">\u9006\u5411\u5de5\u7a0b\u6076\u610f\u8f6f\u4ef6<\/a><\/u><\/strong>\u6765\u63d0\u9ad8\u60a8\u4f5c\u4e3a\u7f51\u7edc\u200b\u200b\u5b89\u5168\u4e13\u4e1a\u4eba\u5458\u7684\u6280\u80fd\u3002\u6839\u636e\u6211\u7684\u7ecf\u9a8c\uff0c\u5728\u5f00\u53d1\u65b0\u7684\u6076\u610f\u8f6f\u4ef6\u65f6\uff0cNSA \u6216 CIA \u90fd\u6ca1\u6709\u91cd\u65b0\u53d1\u660e\u8f6e\u5b50\u3002\u4ed6\u4eec\u53ea\u662f\u901a\u8fc7\u9996\u5148\u4f7f\u7528\u8c03\u8bd5\u5668\u548c\u53cd\u6c47\u7f16\u5668\u6765\u627e\u5230\u4ed6\u4eec\u53ef\u4ee5\u91cd\u590d\u4f7f\u7528\u7684\u4ee3\u7801\u90e8\u5206\u6765\u91cd\u65b0\u8bbe\u8ba1\u548c\u91cd\u65b0\u5229\u7528\u6076\u610f\u8f6f\u4ef6\u3002\u8fd9\u79cd\u65b9\u6cd5\u7684\u4f17\u591a\u4f18\u70b9\u4e4b\u4e00\u662f\u8bef\u5bfc\u53d6\u8bc1\u5206\u6790\u5458\u4e86\u89e3\u6076\u610f\u8f6f\u4ef6\u7684\u6765\u6e90\uff08\u53d6\u8bc1\u5206\u6790\u5458\u7ecf\u5e38\u4ece\u91cd\u590d\u4f7f\u7528\u7684\u4ee3\u7801\u7247\u6bb5\u4e2d\u8ffd\u8e2a\u6076\u610f\u8f6f\u4ef6\u7684\u6765\u6e90\uff09\u3002<\/p>\n\n\n\n<p id=\"viewer-bbpga\">\u8fd9\u662f\u6211\u5f00\u59cb\u65b0\u7684\u9006\u5411\u5de5\u7a0b\u6076\u610f\u8f6f\u4ef6\u7cfb\u5217\u7684\u4e3b\u8981\u539f\u56e0\u4e4b\u4e00\u3002\u5728\u4e4b\u524d\u7684\u4e00\u7bc7\u6587\u7ae0\u4e2d\uff0c\u6211\u6307\u51fa\u4e86<u><a href=\"http:\/\/www.aqwu.net\/wp\/?p=338\" target=\"_blank\" rel=\"noreferrer noopener\">\u60a8\u5e94\u8be5\u7814\u7a76\u9006\u5411\u5de5\u7a0b\u6076\u610f\u8f6f\u4ef6\u7684\u8bb8\u591a\u539f\u56e0<\/a><\/u><a rel=\"noreferrer noopener\" href=\"http:\/\/www.hackers-arise.com\/single-post\/2017\/01\/18\/Reverse-Engineering-Malware-Why-YOU-Should-Study-Reverse-Engineering-Malware\" target=\"_blank\"><u>\uff0c<\/u><\/a>\u4f46\u6211\u76f8\u4fe1\u8fd9\u4e9b\u6587\u4ef6\u8868\u660e\u8bb8\u591a\u7ec4\u7ec7\u5bf9\u6076\u610f\u8f6f\u4ef6\u8fdb\u884c\u4e86\u9006\u5411\u5de5\u7a0b\uff0c\u5305\u62ec CIA\u3002<\/p>\n\n\n\n<p id=\"viewer-6q2o1\">\u8981\u8fbe\u5230\u6f0f\u6d1e\u5229\u7528\u5f00\u53d1\u548c\u6076\u610f\u8f6f\u4ef6\u53d6\u8bc1\u7684\u5dc5\u5cf0\uff0c\u60a8\u9700\u8981\u4e86\u89e3\u9006\u5411\u5de5\u7a0b\u6076\u610f\u8f6f\u4ef6\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6700\u8fd1\u6765\u81ea\u7ef4\u57fa\u89e3\u5bc6\u7684 CIA \u6570\u636e\u8f6c\u50a8\u540d\u4e3a Vault7\uff0c\u63ed\u793a\u4e86\u6709\u5173 CIA \u7f51\u7edc\u60c5\u62a5\u5de5\u4f5c\u7684\u8bb8\u591a\u4e8b\u60c5\u3002\u5c31\u6211\u800c\u8a00\uff0c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[86,90,43],"tags":[93],"class_list":["post-661","post","type-post","status-publish","format-standard","hentry","category-kali","category-reverse-engineering-malware","category-infoarticle","tag-reverse-engineering-malware"],"views":842,"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=661"}],"version-history":[{"count":3,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/661\/revisions"}],"predecessor-version":[{"id":679,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/661\/revisions\/679"}],"wp:attachment":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}