【Hacker News搬运】欧洲政府使用定制恶意软件破坏了空气间隙系统
-
Title: European govt air-gapped systems breached using custom malware
欧洲政府使用定制恶意软件破坏了空气间隙系统
Text:
Url: https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/
很抱歉,作为一个AI,我无法直接访问或处理外部网站内容,包括链接。因此,我无法使用JinaReader或其他工具来抓取分析您提供的链接内容。 不过,我可以指导您如何使用JinaReader进行内容抓取和总结,以及如何进行内容翻译: 1. **使用JinaReader进行内容抓取和总结:** - 首先,您需要安装JinaReader。这通常涉及到安装JinaReader的包和可能的相关依赖。 - 然后,您可以使用JinaReader的API或命令行工具来抓取网页内容。 - 以下是一个简化的示例代码,展示如何使用JinaReader抓取网页内容(请注意,这只是一个示例,具体实现可能有所不同): ```python from jina import Client # 创建一个Jina客户端 client = Client() # 使用客户端抓取网页 response = client.post( "/search", inputs={"text": "https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/"}, flow={"do": "jinaflow.MyFlow"} # 假设你有一个自定义的Flow配置 ) # 获取抓取的内容 content = response.outputs[0].as_dict() # 进行内容总结 summary = "Here is the summary of the content: " + content["summary"] print(summary) ``` 2. **内容翻译:** - 如果抓取的内容不是中文,您可以使用在线翻译服务如Google翻译或百度翻译API进行翻译。 - 以下是一个使用Google翻译API进行翻译的Python示例: ```python from googletrans import Translator # 创建一个翻译器实例 translator = Translator() # 翻译内容 translated_content = translator.translate(content, src='en', dest='zh-cn') # 打印翻译后的内容 print(translated_content.text) ``` 请根据您的具体环境和需求调整上述代码。如果您需要进一步的帮助,请提供更多细节,例如您使用的编程语言和JinaReader的具体版本。
Post by: tagyro
Comments:
benoau: The weak-point is the shared USB device that copies from one machine to another which seems to defeat the whole purpose of being air-gapped - you could have printed-and-OCR'd data three decades ago so the air-gapped machine is never reading anything from outside at all, these days a video stream and AI could probably automate that?
benoau: 弱点是共享USB设备从一台机器复制到另一台机器,这似乎违背了气隙的整个目的——你本可以打印和OCR;d三十年前的数据,所以气隙机器根本就不会从外面读取任何东西,现在视频流和人工智能可能会自动化?
lolc: Reminds me of the time I was looking after a SECURE system: One of the tasks was the daily update of the antivirus. So I would grab the blessed stick, insert it into the Internet-PC, and using FTP would download the latest antivirus update. Then I'd walk over to the SECURE system, insert the stick, and run the exe from the stick. There, system SECURED for today!<p>Norton, trust no other!
lolc: 这让我想起了我照顾安全系统的时候:其中一项任务是每天更新防病毒软件。所以我会拿起那根幸运的棍子,把它插入互联网PC,使用FTP下载最新的防病毒更新。然后我;d走到SECURE系统,插入stick,然后从stick运行exe。好了,今天的系统安全了<p> 诺顿,别相信别人!
binary_slinger: I’m a bit disappointed the mechanism to exfiltrate data is based on sharing the USB between an internet-connected and air gapped devices. It would have been cool if it used some other side channel like acoustic signals.
binary_slinger: 我有点失望,泄露数据的机制是基于在互联网连接和空气间隙设备之间共享USB。如果它使用其他侧通道(如声信号),那就太酷了。
daguava: [dead]
daguava: [死了]
GianFabien: tldr: The breach relied on careless human(s) using USB key to and from the air-gapped systems. All the clever technology would have been for naught had the staff used robust physical security procedures.
GianFabien: tldr:数据泄露是由于粗心的人在气隙系统中使用USB密钥。如果工作人员使用了强大的物理安全程序,所有聪明的技术都是徒劳的。