当前位置

首页 > 英语阅读 > 双语新闻 > 杭州雄迈在美召回旧版网络摄像头

杭州雄迈在美召回旧版网络摄像头

推荐人: 来源: 阅读: 2.37W 次

杭州雄迈在美召回旧版网络摄像头

Chinese electronics manufacturer Xiongmai is recalling some older versions of its webcams sold in the US after they were linked to the “botnet” attack that disrupted internet services from Twitter to the New York Times on Friday.

中国电子产品制造商雄迈正在召回其在美国销售的部分老款网络摄像头,这些产品被认为与上周五瘫痪美国互联网服务——从Twitter到《纽约时报》——的“僵尸网络”攻击有关联。

Hangzhou Xiongmai Technology said it would recall earlier versions of the webcams after cyber security researchers identified them as a contributor to the network that hackers used to flood Dyn, a domain name service provider, with traffic.

杭州雄迈信息技术有限公司(Hangzhou Xiongmai Technology)称,将召回一些早期版本的网络摄像头,此前,网络安全研究人员确认,黑客利用了包括这些网络摄像头在内的设备,对域名服务提供商Dyn进行超大规模流量访问。

The Chinese manufacturer told the Financial Times that it had issued security updates to cameras sold before April 2015, adding that its internet-connected cameras were still safe to use and that it was not responsible for the internet outage.

这家中国制造商对英国《金融时报》表示,此前该公司已向2015年4月之前出售的摄像头发布了安全更新程序,并补充称,其与互联网连接的摄像头仍可安全使用,此次网络瘫痪的责任不在该公司。

It said that any attack could only have occurred on equipment using firmware from before April 2015, with an unchanged preset password and exposed to public internet.

该公司表示,只有仍在使用2015年4月之前发布的固件、初始密码未修改且暴露于公共网络的设备才会遭到攻击。

Hackers used source code for Mirai, malicious software that takes over internet of things devices and is now widely available on the internet, to create a “botnet” — or interconnected network of computers controlled by cybercriminals.

黑客利用恶意软件Mirai的源代码建立了一个“僵尸网络”(由被网络犯罪分子控制的相互连接的计算机网络)。这款恶意软件能够控制物联网设备,很容易在互联网上获得。

The botnet attacked Dyn, making it unable to translate the names of many major websites into addresses that the internet can understand, so disrupting access.

僵尸网络攻击了Dyn,令它无法将许多主要网站的名称翻译成互联网可以理解的地址,导致网络访问中断。

Dyn said on Saturday that many of the internet protocol addresses associated with the Mirai botnet had been used in the two attacks, as well as one attempted attack it was trying to defend against.

上周六Dyn表示,许多与Mirai僵尸网络有关的互联网协议地址在两次攻击中被使用过,另外还有一次攻击企图被其努力阻拦。

Kyle York, Dyn’s chief strategy officer, said the company, alongside law enforcement agencies, was still investigating who was behind the attack.

Dyn首席战略官凯尔.约克(Kyle York)表示,该公司与执法机构仍在调查这次攻击的幕后黑手。