* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr) * 網絡犯罪分子如何利用新冠肺炎疫情作惡... # 網絡犯罪分子如何利用新冠肺炎疫情作惡 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F04%2Fhow-cybercriminals-prey-on-the-covid-19%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=%E7%B6%B2%E7%B5%A1%E7%8A%AF%E7%BD%AA%E5%88%86%E5%AD%90%E5%A6%82%E4%BD%95%E5%88%A9%E7%94%A8%E6%96%B0%E5%86%A0%E8%82%BA%E7%82%8E%E7%96%AB%E6%83%85%E4%BD%9C%E6%83%A1&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F04%2Fhow-cybercriminals-prey-on-the-covid-19%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2020%2F04%2Fhow-cybercriminals-prey-on-the-covid-19%2F%3Flang%3Dzh-hant&title=%E7%B6%B2%E7%B5%A1%E7%8A%AF%E7%BD%AA%E5%88%86%E5%AD%90%E5%A6%82%E4%BD%95%E5%88%A9%E7%94%A8%E6%96%B0%E5%86%A0%E8%82%BA%E7%82%8E%E7%96%AB%E6%83%85%E4%BD%9C%E6%83%A1&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2020/04/how-cybercriminals-prey-on-the-covid-19/?lang=zh-hant&ts=markdown) [](mailto:?subject=網絡犯罪分子如何利用新冠肺炎疫情作惡) Link copied By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") Apr 24, 2020 1 minutes [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) This post is also available in: [简体中文 (簡體中文)](https://www.paloaltonetworks.com/blog/2020/04/how-cybercriminals-prey-on-the-covid-19/?lang=zh-hans "Switch to 簡體中文(简体中文)") ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/04/covid19.png) 隨著新型冠狀病毒蔓延全球,疫情相關的話題備受關注。Palo Alto Networks威脅情報團隊Unit 42的研究人員發現,自2月初以來,與新冠肺炎相關的Google搜索量和URL瀏覽量大幅增加。網絡犯罪分子也正是利用這些熱門話題為誘餌牟利,在疫情當前的危難時刻,令數十億人的生活雪上加霜。 由於不法分子經常利用熱門話題作惡,Unit 42的研究人員密切監測網絡用戶對這些熱話及其相關新註冊域名的關注程度,以保障客戶安全。 透過使用Google搜尋趨勢和我們的流量日誌,我們發現用戶對新冠肺炎相關話題的關注度暴增,並在2020年1月底、2月底及3月中旬達到高峰。 隨著用戶關注度上升,從2月到3月,與新冠肺炎相關的域名註冊量日均增長656%。同一時期,惡意的域名註冊增加569%,涉及惡意軟件和網絡釣魚;「高風險」的域名註冊增加788%,包括欺詐、非法開採加密貨幣,以及涉嫌與惡意網址有關或使用防彈主機(Bulletproof hosting)的域名。 截至3月底,我們已發現116,357個與新冠肺炎相關的新註冊域名,當中2,022個為惡意域名,40,261個為「高風險」域名。 我們根據域名的Whois信息、DNS記錄和屏幕截圖(由我們的自動抓取工具收集)分類進行分析以檢測註冊活動,發現許多域名被惡意註冊並轉售牟利,當中一大部分被用於典型的惡意活動,或用於銷售短缺商品的詐騙網店。 其他濫用新冠肺炎疫情的典型惡意行為還包括:域名載有惡意軟件、釣魚網站、欺詐網站、惡意廣告、加密貨幣開採,以及用於提升不道德網站搜索排名的黑帽搜索引擎優化(Black Hat SEO)。我們檢測到許多使用新註冊域名的網店不僅試圖欺騙用戶,更有一類銷售手法極為不良的域名群組利用用戶對新冠肺炎的恐懼,進一步恐嚇他們購買其產品。此外,我們亦發現一組以新冠病毒為主題的域名正使用高風險的JavaScript提供網域寄放服務,而這些JavaScript可能隨時會將用戶重新定向到惡意內容。 # **總結** 網絡犯罪分子總會在地區、國家及全球大事期間,利用大眾的恐懼落井下石。當災難發生時我們一次又一次觀察到網絡犯罪分子圍困受害者的行為。遺憾的是,這類惡行相信不會很快消除。 大眾應該加倍提防任何以COVID-19為題的電郵或新註冊網站,不論該電郵或網站聲稱擁有疫情資訊、測試工具還是治療方法。用戶亦要特別留意域名的合法性和安全性,例如確保域名是合法域名(例如: google \[.\] com VS g00gle \[.\] com),而且瀏覽器的地址欄左側有「鎖」的圖示,確保有效的HTTPS連接。 對於任何以COVID-19為題的電郵都應該採取謹慎一致的措施:查看發件人的電郵地址,因為不正當的電郵往往並非從熟識的發件人發送、地址拼寫錯誤或過份冗長,或其內容是隨機出現的字符。 為保障用戶免受網絡罪犯分子攻擊,Palo Alto Networks認為以[URL過濾](https://www.paloaltonetworks.com/products/threat-detection-and-prevention/web-security?ts=markdown)禁止瀏覽「新註冊域名」是最佳的做法。然而,如果不能阻止瀏覽,我們則建議對這些URL強制實施SSL解密以提高其可視性,阻止用戶下載諸如PowerShell和可執行檔案之類的危險文件類型,並使用更嚴格的威脅防護策略,在訪問新註冊域名時增加日誌記錄。我們還建議使用[DNS層保護](https://www.paloaltonetworks.com/products/threat-detection-and-prevention/dns-security?ts=markdown),因為超過80%的惡意軟件都使用DNS建立C2。 關於全文版中特別提到的威脅和入侵指標(IOC),在Palo Alto Networks技術棧內已採取了以下步驟來確保達到最佳的檢測和預防機制: * 已對功能變數名稱、IP位址和網址進行了適當分類。 * 已更新和/或驗證了所有樣本的Wildfire判定。 * 已創建、更新和/或驗證了入侵防禦系統簽名。 * 已部署、更新和/或驗證了Cortex XDR檢測。 * 已創建、更新和/或驗證了Autofocus標籤。 由於疫情來得突然,許多員工正自我隔離並在家工作。儘管企業一直通過VPN連接為員工提供安全訪問,但是涉及的員工數量卻是前所未有,需要額外的資源和容量。 Palo Alto Networks的[Prisma Access](https://www.paloaltonetworks.com/prisma/access?ts=markdown)產品為雲端產生的安全存取服務邊緣(SASE)平台,可為遠程辦公和移動用戶提供統一的策略和保安,並能隨著業務需求調整規模。如需了解更多Palo Alto Networks如何幫助遠程員工,請按[此處](https://www.paloaltonetworks.com/our-response-to-covid-19?ts=markdown),並查看[Nir Zuk討論如何實現業務連續性的網絡廣播](https://register.paloaltonetworks.com/securemobileworkforce)。 如欲了解是次研究的更多詳情,請瀏覽此[網誌全文](https://unit42.paloaltonetworks.com/how-cybercriminals-prey-on-the-covid-19-pandemic/?utm_source=marketo&utm_medium=email&utm_campaign=Digest%201254-2020-02-21T14:47:20.000-08:00&mkt_tok=eyJpIjoiWkRBMllqSmhaR1l4WWpVNCIsInQiOiIrV1JZTDdhZnJQcDZHMTJxaytlZlwvcmpIa2FpWjJWS2tuTDFRdXdIQWpobUpvS3B3YUIzVnhITUM0SnJyOVFQOUxPY3EzanlxbE90QVNiTzZSUzRsdkVDcmpmMlJ5aDJQZTBnSnVER1FjeVlIY080WFhWZ3U2QXp5b3huakRJMVwvIn0%3D)。 *** ** * ** *** ## Related Blogs ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Strata Copilot - 加速邁向自發性網路安全性的未來](https://www.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 醫療企業是勒索軟體攻擊者的首要目標](https://www.paloaltonetworks.com/blog/2021/10/healthcare-organizations-are-the-top-target/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 適用於 5G 的零信任:實現安全的數位轉型](https://www.paloaltonetworks.com/blog/2021/10/zero-trust-for-5g-digital-transformation/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 網路攻擊鎖定金融服務企業的 3 個原因以及防禦方式](https://www.paloaltonetworks.com/blog/2021/10/financial-services-cyberattacks/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 連續 7 年提供出色的客戶服務](https://www.paloaltonetworks.com/blog/2021/10/delivering-outstanding-customer-service/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Palo Alto Networks 研究:61% 的企業難以確保在家工作的遙距網絡安全](https://www.paloaltonetworks.com/blog/2021/09/state-of-hybrid-workforce-security-2021/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language