Placeholder Image

字幕列表 影片播放

由 AI 自動生成
  • Russia has been launching cyber attacks against the Ukrainian government's private industry, even critical infrastructure that truly have no precedent in history.

    俄羅斯一直在對烏克蘭政府的私營行業,甚至是關鍵基礎設施發動網絡攻擊,這在歷史上確實沒有先例。

  • These are some of the most disruptive cyberattacks we've ever seen.

    這些是我們所見過的最具破壞性的網絡攻擊。

  • I'm Andy Greenberg, I'm a senior writer with wired and the author of the book Sand worm and I'm going to walk you through the history of Russia's cyberattacks against Ukraine.

    我是安迪-格林伯格,我是有線電視的高級作家,也是《沙蟲》一書的作者,我將帶領大家瞭解俄羅斯對烏克蘭的網絡攻擊歷史。

  • Right now, of course, there is an actual full scale Russian invasion of Ukraine taking place.

    當然,現在有一個實際的俄羅斯對烏克蘭的全面入侵正在發生。

  • Ukraine is now the epicenter of Russia's conflict with the West as it has been in some ways sort of under the radar for the last almost decade.

    烏克蘭現在是俄羅斯與西方衝突的中心,因為在過去的近十年裡,它在某些方面一直處於被忽視的狀態。

  • But it also is a country whose recent history has these lessons about the nature of cyber war and it's a country where we can look to understand what Russia is capable of in its digital disruption and how to be prepared for it.

    但它也是一個國家,其最近的歷史有這些關於網絡戰爭性質的教訓,它是一個我們可以看的國家,以瞭解俄羅斯在其數字破壞方面的能力,以及如何為它做好準備。

  • 2014, Russia hacks the Ukrainian Central Election Commission In 2014, Ukraine has a revolution and it pulls away from Russia's sphere of influence.

    2014年,俄羅斯黑掉了烏克蘭中央選舉委員會 2014年,烏克蘭發生了一場革命,它從俄羅斯的勢力範圍中拉了出來。

  • And then later that year, as it's having its first presidential election, Russian state sponsored hackers break into its Central Election Commission and essentially try to fake the results.

    然後在那年晚些時候,當它正在舉行其第一次總統選舉時,俄羅斯國家支持的黑客闖入其中央選舉委員會,並基本上試圖偽造結果。

  • They plant a spoofed image that seems to show that this far right candidate has won by a landslide.

    他們植入一個惡搞的圖片,似乎顯示這個極右翼候選人以壓倒性優勢獲勝。

  • In fact he won like single digit percentages of the votes.

    事實上,他贏得了類似個位數百分比的選票。

  • Actually, the Central Election Commission caught this fake results in time and managed to foil this, but Russian tv.

    實際上,中央選舉委員會及時發現了這個假結果,併成功地挫敗了這一點,但俄羅斯電視臺。

  • Nonetheless broadcast those fake results, which kind of shows how they were working in league with these hackers Putin and the Kremlin have always wanted to paint the new Ukrainian democratic government as controlled secretly by neo nazis And so trying to spoof that the results showed that the actual winner of the election was this super far right candidate was just another kind of beat in that campaign of disinformation.

    儘管如此,他們還是播出了這些虛假的結果,這表明他們是如何與這些黑客合作的,普京和克里姆林宮一直想把新的烏克蘭民主政府描繪成由新納粹分子祕密控制的。

  • 2015 Russia hacks, Ukraine's power grid, A now notorious group of state sponsored hackers called sandworm takes over Russia's cyber warfare in Ukraine and they launch a whole series of attacks that hits Ukrainian media government agencies and then just before christmas they cap all this off with a cyber attack on Ukrainian power grid, which is the first time in history that hackers actually trigger a blackout, but just to kind of add insult to injury, Sandworm also destroyed hundreds of computers inside of these utilities, they bombarded them with fake phone calls just to add an extra layer of chaos and they even turned off the backup power supply to the control rooms themselves so that these operators were thrown into a kind of blackout in the midst of their own blackout.

    2015年俄羅斯黑客攻擊烏克蘭電網,一個現在臭名昭著的國家支持的黑客組織 "沙蟲 "接管了俄羅斯在烏克蘭的網絡戰,他們發起了一系列攻擊,打擊烏克蘭媒體政府機構,然後就在聖誕節前,他們用網絡攻擊烏克蘭電網來結束這一切,這是歷史上第一次黑客真正引發的停電。但為了雪上加霜,"沙蟲 "還破壞了這些公用事業部門的數百臺電腦,他們用假電話轟炸他們,以增加額外的混亂,他們甚至關閉了控制室的備用電源,以便這些操作員在自己的停電中被拋入一種停電狀態。

  • This blackout really only lasted six hours or so before Ukrainians were able to manually switch the power back on, but I think it was intended to have a kind of Terrorizing effect and it shocked the world and it's also kind of gave sand worm this reputation as perhaps the most disruptive, the most cyberwar oriented hacker group in the world, 2016 sandworm attacks, Ukraine's power grid again, this time in Kiev, about a year after sand worms first attacks in Ukraine, it returns with another even more severe collection of cyber attacks against Ukrainian government agencies, the Ministry of Defense and Infrastructure and finance.

    這次停電真的只持續了6個小時左右,然後烏克蘭人就能手動恢復供電,但我認為它是為了產生一種恐怖的效果,它震驚了世界,它也給沙蟲帶來了這種聲譽,也許是最具破壞性的。2016年沙蟲攻擊,烏克蘭的電網再次被攻擊,這次是在基輔,在沙蟲第一次攻擊烏克蘭大約一年後,它又回來了,對烏克蘭政府機構、國防部、基礎設施和財政部進行了更嚴重的網絡攻擊。

  • The hackers destroyed terabytes of data on these agency networks.

    黑客破壞了這些機構網絡上的數兆字節的數據。

  • They actually wiped the country's national budget for the year.

    他們實際上抹去了該國當年的國家預算。

  • This series of cyberattacks culminates in an attack on the power grid, causing another blackout this time in the capital of Kiev.

    這一系列網絡攻擊的高潮是對電網的攻擊,這次在首都基輔又造成了停電。

  • The second blackout only lasted an hour, but in some ways it was nonetheless kind of escalation of what sand worm had inflicted the year before.

    第二次停電只持續了一個小時,但在某些方面,它仍然是沙蟲在前一年所造成的一種升級。

  • They actually disabled safety systems in this transmission station with the intention that when the Ukrainian operators rushed to turn the power back on, they might have caused an overload of currents on power lines or even exploded.

    他們實際上禁用了這個輸電站的安全系統,目的是當烏克蘭的操作人員急於重新通電時,可能會造成電力線電流過載,甚至爆炸。

  • A transformer, truly dangerous and physically destructive effects of a kind that we had never seen before inside of an electrical utility and that only failed because of a tiny miss configuration.

    一臺變壓器,真正危險和具有物理破壞性的影響,我們以前從未在電力設施內見過,而且只是因為一個微小的錯誤配置而失敗。

  • In sand worms malware, 2017 sand worm releases the not petty.

    在沙蟲惡意軟件中,2017年沙蟲發佈的不是小事。

  • A malware That morning of 27 June 2017 Ukrainians across the country began to see this ransomware message appear on computers in all sorts of networks from private industry and banks to government, agencies hospitals.

    一款惡意軟件 2017年6月27日上午,全國各地的烏克蘭人開始看到這個勒索軟件的資訊出現在各種網絡的電腦上,從私營企業、銀行到政府、機構醫院。

  • it seemed to be encrypting computers and demanding a ransom in the ways that cyber criminal hackers often do.

    它似乎正在加密計算機,並以網絡犯罪黑客經常採用的方式要求贖金。

  • But even when you paid the ransom, you couldn't recover your files.

    但即使你支付了贖金,你也無法恢復你的文件。

  • It was actually a data destroying piece of code designed to cause maximum chaos.

    這實際上是一段破壞數據的代碼,旨在造成最大的混亂。

  • And then because internet worms do not generally like stay within national boundaries, it spread to the rest of the world.

    然後,由於互聯網蠕蟲一般不喜歡停留在國家邊界內,它傳播到了世界其他地方。

  • Not to, to immediately hit companies like Maersk, the world's largest shipping firm, and Fedex and Mondelez, which owns Cadbury and Nabisco and Merck, the pharmaceutical giants.

    不到,要立即打擊世界上最大的航運公司馬士基和聯邦快遞以及擁有吉百利和納貝斯克的蒙代爾茲和製藥巨頭默克等公司。

  • In the case of mask for instance, that meant that tens of thousands of trucks were lining up outside of terminals and ports around the world and ships with thousands and thousands of containers on them are arriving at those ports and nobody knows what is on them for market meant.

    以面膜為例,這意味著數以萬計的卡車在世界各地的碼頭和港口外排隊,裝載著成千上萬個貨櫃的船隻正在抵達這些港口,沒有人知道上面有什麼東西是市場的意思。

  • They had to borrow their own HPV vaccine from the Center for Disease control because their manufacturing was shut down.

    他們不得不從疾病控制中心借用自己的HPV疫苗,因為他們的生產被關閉了。

  • In each of these cases, these companies lost hundreds of millions of dollars, more than a billion in some cases, all because of this one cyber attack that had spilled out from Ukraine, what comes next In the years after sand worm hit other targets around the world, including the 2018 Winter.

    在每一個案例中,這些公司都損失了數億美元,在某些情況下超過10億美元,都是因為這一次從烏克蘭蔓延出來的網絡攻擊,接下來是什麼 在沙蟲襲擊世界各地其他目標後的幾年裡,包括2018年冬季。

  • Olympics in Pyeongchang Korea To the nation of Georgia where they shut down television stations in 2019, but we haven't seen sand worm reappear in any obvious way in Ukraine.

    在韓國平昌舉行的奧運會上,格魯吉亞國家在2019年關閉了電視臺,但我們還沒有看到沙蟲以任何明顯的方式在烏克蘭重新出現。

  • Now, just before the full scale physical Russian invasion of Ukraine that occurred on February 24, we did see another round of cyber attacks that destroyed hundreds of computers in Ukrainian governments and military agencies.

    現在,就在2月24日發生的俄羅斯對烏克蘭的全面實際入侵之前,我們確實看到了另一輪網絡攻擊,摧毀了烏克蘭政府和軍事機構的數百臺計算機。

  • Um although we don't have any conclusive evidence yet that it really was sand worm.

    呃......雖然我們還沒有任何確鑿的證據表明它真的是沙蟲。

  • This time.

    這一次。

  • Now in the midst of this invasion, cyberwar has been a pretty secondary element at best, people are dying by the thousands, refugees are fleeing the country.

    現在在這場入侵中,網絡戰爭充其量只是一個相當次要的因素,人們正在成千上萬地死去,難民正在逃離這個國家。

  • That is of course the context in which anything I say about cyberwar has to be framed.

    當然,這也是我所說的關於網絡戰爭的任何內容都必須在此框架內進行的。

  • It might even make attacks on computer systems seem kind of trivial.

    它甚至可能使對計算機系統的攻擊看起來有點微不足道。

  • But I think that now that we understand Russia's cyber Warfare playbook, now that we see what sand worm is capable of, we have to kind of reckon with those capabilities, Russia is now in this conflict with the West as a whole.

    但我認為,現在我們瞭解了俄羅斯的網絡戰爭玩法,現在我們看到了沙蟲的能力,我們必須對這些能力進行某種估計,俄羅斯現在與整個西方的這種衝突。

Russia has been launching cyber attacks against the Ukrainian government's private industry, even critical infrastructure that truly have no precedent in history.

俄羅斯一直在對烏克蘭政府的私營行業,甚至是關鍵基礎設施發動網絡攻擊,這在歷史上確實沒有先例。

字幕與單字
由 AI 自動生成

單字即點即查 點擊單字可以查詢單字解釋