ÇØÄ¿Áî´º½º / ÇØÄ¿´ëÇÐ

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡
¡¡

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡

°øÁö

¡¡

1. MS ¿§Áö ºê¶ó¿ìÀú¿¡¼­ÀÇ °æ°íâÀº 'À©µµ¿ì µðÆæ´õ'¸¦ ²ô½Ã¸é µË´Ï´Ù.

             'À©µµ¿ì µðÆæ´õ ²ô±â'

2. Å©·Ò ºê¶ó¿ìÀú·Î Á¢¼Ó½Ã ³ª¿À´Â ¾Ç¼ºÄÚµå °æ°íâÀº ±¸±Û Å©·ÒÀÇ ¿¡·¯, Áï ¿ÀŽ(ŽÁö ¿À·ù)À̹ǷΠ¹«½ÃÇÏ½Ã¸é µË´Ï´Ù.

3. ÀÌ »çÀÌÆ®´Â ¾ÈÀüÇÏ¸ç ±ú²ýÇÏ´Ù´Â °ÍÀ» ¾Ë·Á µå¸³´Ï´Ù.

4. ¹«°íÇÑ »çÀÌÆ®µé¿¡ ´ëÇÑ °ø·æ ±â¾÷ ºê¶ó¿ìÀúµéÀÇ ¹«Â÷º°ÀûÀÎ 'ŽÁö ¿À·ù ȾÆ÷'°¡ »ç¿ëÀÚµéÀÇ Á¤º¸ °øÀ¯ÀÇ ÀÚÀ¯¸¦ ħÇØÇÏ°í ÀÖ½À´Ï´Ù. ÀÌ¿¡ ´ëÀÀÇÏ¿© ÀÌ ±â¾÷µéÀ» »ó´ë·Î ¼Ò¼ÛÀ» ÁغñÇÏ°í ÀÖ½À´Ï´Ù.

¡¡




±¸ºÐ: ÇØÅ·
À帣: MS
2024/10/19(Åä)
Á¶È¸: 136
MS º¸°í¼­ ¡°ºÏÇÑ, ¹Ì±¹ µî °ø±Þ¸Á ÇØÅ· °ø°Ý¡¦¾ÏȣȭÆó 30¾ï ´Þ·¯ Å»Ã롱  

ÇØÄ¿ ÀÏ·¯½ºÆ®. (ÀÚ·áÈ­¸é)
ÇØÄ¿ ÀÏ·¯½ºÆ®. (ÀÚ·áÈ­¸é)

ºÏÇÑ°ú ¿¬°èµÈ ÇØÄ¿µéÀÌ ¹Ì±¹ Á¤ºÎ ¹× Á¶Á÷ÀÇ °ø±Þ¸ÁÀ» °Ü³ÉÇÑ ÇØÅ· °ø°ÝÀ» ¹úÀÌ°í ÀÖ´Ù´Â ºÐ¼®ÀÌ ³ª¿Ô½À´Ï´Ù. ¶Ç ¾ÏȣȭÆó Å»Ãë¿¡ Ä¡ÁßÇϸ鼭 Áö³­ 2017³âºÎÅÍ Áö±Ý±îÁö 30¾ï ´Þ·¯°¡ ³Ñ´Â ÀÚ±ÝÀ» »©µ¹·È´Ù°í ÁöÀûÇß½À´Ï´Ù. Á¶»óÁø ±âÀÚ°¡ º¸µµÇÕ´Ï´Ù.

¼¼°è ÃÖ´ë IT ±â¾÷ Áß ÇϳªÀÎ ¹Ì±¹ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®(MS)»ç´Â 15ÀÏ ¡°·¯½Ã¾Æ, Áß±¹, À̶õ, ºÏÇÑÀÇ À§Çù ÇàÀ§ÀÚµéÀÌ Á¤ºÎ ¹× ±âŸ ¹Î°¨ÇÑ Á¶Á÷¿¡ ´ëÇÑ °ø±Þ¸Á °ø°ÝÀ» ¼öÇàÇϱâ À§ÇØ IT Á¦Ç° ¹× ¼­ºñ½º¿¡ ´ëÇÑ Á¢±ÙÀ» Ãß±¸Çß´Ù¡±°í ÁöÀûÇß½À´Ï´Ù.

[MS º¸°í¼­] ¡°Threat actors from Russia, China, Iran, and North Korea pursued access to IT products and services, in part to conduct supply chain attacks against government and other sensitive organizations.¡±

¹Ì±¹ ¿ö½ÌÅÏÁÖ ·¹µå¸ÕµåÀÇ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® º»»ç¿¡ ¼¼¿öÁø ȸ»ç ·Î°í.
¹Ì±¹ ¿ö½ÌÅÏÁÖ ·¹µå¸ÕµåÀÇ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® º»»ç¿¡ ¼¼¿öÁø ȸ»ç ·Î°í.

MS»ç´Â À̳¯ °ø°³ÇÑ ¡®2024 µðÁöÅÐ ¹æ¾î º¸°í¼­¡¯¿¡¼­ ºÏÇÑÀ» ÇØÅ· ºÐ¾ß¿¡¼­ ÁÖ¿ä ±¹°¡ ÁÖµµ À§Çù ÇàÀ§ÀÚ·Î Áö¸ñÇϸ鼭 ÀÌ°°ÀÌ ¹àÇû½À´Ï´Ù.

º¸°í¼­´Â ÀÌµé ±¹°¡ ÁÖµµ ÇàÀ§ÀÚµéÀÌ ÇØÅ·À» ÅëÇØ Àڱݰú Á¤º¸¸¦ Å»ÃëÇÏ°í ¼±°Å Á¦µµ¸¦ À§ÇùÇϱâ À§ÇØ »çÀ̹ö ¹üÁËÀÚµéÀ» ´õ¿í °ø°ÝÀûÀÌ°í Á¤±³ÇÑ ¹æ¹ýÀ» ÅëÇØ ¸ðÁýÇÏ°í ÀÖ´Ù°í ÁöÀûÇß½À´Ï´Ù.

¡°ºÏÇÑ, ¡®ºÏ¹Ì Áö¿ª IT ºÐ¾ß¡¯ °¡Àå ¸¹ÀÌ ÇØÅ·¡±

ƯÈ÷ ºÏÇÑÀÇ °æ¿ì ¹Ì±¹ÀÌ ¼ÓÇÑ ºÏ¹Ì Áö¿ªÀ» °Ü³ÉÇØ °¡Àå ¸¹Àº ÇØÅ· °ø°ÝÀ» °¨ÇàÇß´Ù°í ¹àÇû½À´Ï´Ù.

MS»ç°¡ °ø°³ÇÑ Á¶»ç °á°ú¿¡ µû¸£¸é, ºÏÇÑÀº ºÏ¹Ì Áö¿ª¿¡¼­ ÀüüÀÇ Àý¹ÝÀÌ ³Ñ´Â 54% ÀÌ»óÀÇ ÇØÅ·À» ½ÃµµÇÑ °ÍÀ¸·Î ³ªÅ¸³µ½À´Ï´Ù.

ÀÌ¾î µ¿¾Æ½Ã¾Æ¡¤ÅÂÆò¾ç Áö¿ª°ú À¯·´¡¤Áß¾Ó¾Æ½Ã¾Æ Áö¿ª¿¡¼­ °¢°¢ 18%¸¦ ±â·ÏÇß½À´Ï´Ù.

¶Ç ºÏÇÑÀÌ °¡Àå ÁýÁßÀûÀ¸·Î ÇØÅ·ÇÑ ºÐ¾ß´Â IT(Á¤º¸±â¼ú) ºÐ¾ß·Î 44%¿´°í, ¡®±³À° ¹× ¿¬±¸¡¯ ºÐ¾ß°¡ 21%·Î µÚ¸¦ À̾ú½À´Ï´Ù.

15ÀÏ ¹Ì±¹ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®(MS)»ç °ø°³ÇÑ '2024 µðÁöÅÐ ¹æ¾î º¸°í¼­' ÇÑ ºÎºÐ.
15ÀÏ ¹Ì±¹ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®(MS)»ç °ø°³ÇÑ '2024 µðÁöÅÐ ¹æ¾î º¸°í¼­' ÇÑ ºÎºÐ.

MS»ç´Â ¹Ì±¹Àº ¿©ÀüÈ÷ ºÏÇÑÀÇ À§ÇùÇàÀ§ÀÚµéÀÌ °¡Àå ¸¹ÀÌ Ç¥ÀûÀ¸·Î »ï´Â ±¹°¡¿´À¸¸ç, ¿ÃÇØ ¿µ±¹ÀÌ 2À§·Î ¼øÀ§°¡ »ó½ÂÇߴٸ鼭, ºÏÇÑ À§Çù ÇàÀ§ÀÚµéÀÇ Ç¥ÀûÀÌ µÈ ³ª¶ó´Â ÃÑ 44°³±¹¿¡ ´ÞÇÑ´Ù°í ÁöÀûÇß½À´Ï´Ù.

[MS º¸°í¼­] ¡°The United States remained the most heavily targeted country by North Korean threat actors, but the United Kingdom rose up the ranks this year to second place. The ¡°Other¡± category comprised 44 other countries targeted by North Korean threat actors. North Korean threat actors targeted the IT sector the most, particularly to conduct increasingly sophisticated software supply chain attacks. They also continued to heavily target experts in the education sector for intelligence collection. The ¡°Other¡± category comprised seven other sectors.¡±

¶Ç ºÏÇÑ À§Çù ÇàÀ§ÀÚµéÀº Á¡Á¡ ´õ Á¤±³ÇØÁö´Â ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á °ø°ÝÀ» ¼öÇàÇϱâ À§ÇØ IT ºÎ¹®À» °¡Àå ¸¹ÀÌ Ç¥ÀûÀ¸·Î »ï¾ÒÀ¸¸ç, Á¤º¸ ¼öÁýÀ» À§ÇØ ±³À° ºÐ¾ßÀÇ Àü¹®°¡µéÀ» ÁýÁßÀûÀ¸·Î °ø°ÝÇß´Ù°í ¼³¸íÇß½À´Ï´Ù.

¡°ºÏÇÑ, 2017³â ÀÌÈÄ ¾ÏȣȭÆó 30¾ï ´Þ·¯ Å»Ã롱

º¸°í¼­´Â ¶Ç ÃÖ±Ù ÇØÅ· ºÐ¾ßÀÇ Æ¯Â¡À¸·Î ±¹°¡ ¿¬°è À§Çù ÇàÀ§ÀÚ¿Í »çÀ̹ö ¹üÁËÀÚ »çÀÌÀÇ °æ°è°¡ ¸ðÈ£ÇØÁö°í ÀÖ´Ù´Â Á¡À» µé¾ú½À´Ï´Ù.

ƯÈ÷ ¡°ºÏÇÑ ÇØÄ¿µéÀº ¿À·§µ¿¾È ÀÌ ¸ðÈ£ÇÑ °æ°è¸¦ ³Ñ³ªµé¸ç ±¹°¡ÀÇ ±Ý°í¿Í ¿ì¼±¼øÀ§ »ç¾÷À» À§ÇÑ ÀÚ±ÝÀ» È®º¸Çϱâ À§ÇØ ±ÝÀüÀû µ¿±â¸¦ °¡Áø ÀÛÀüÀ» ¼öÇàÇØ¿Ô´Ù¡±°í Æò°¡Çß½À´Ï´Ù.

[MS º¸°í¼­] ¡°$3 billion in cryptocurrency stolen by North Korean hackers since 2017. North Korean threat actors have long straddled this blurry line, conducting financially motivated operations to secure funding for state coffers and priority initiatives.¡±

±×·¯¸é¼­ ¡°ºÏÇÑÀº 2017³â ÀÌÈÄ 30¾ï ´Þ·¯ ±Ô¸ðÀÇ ¾ÏȣȭÆó¸¦ ÈÉÃÆ´Ù¡±°í ÁöÀûÇß½À´Ï´Ù.

º¸°í¼­´Â À¯¿£ ÀڷḦ ÀοëÇØ ºÏÇÑÀÌ Áö³­ÇØ¿¡¸¸ 6¾ï ´Þ·¯¿¡¼­ 10¾ï ´Þ·¯¿¡ À̸£´Â ÀÚ±Ý Å»Ãë »ç°Ç¿¡ ¿¬·çµÆÀ¸¸ç, ¿©±â¼­ ÈÉÄ£ ÀÚ±ÝÀº ºÏÇÑÀÇ ÇÙ°ú ¹Ì»çÀÏ ÇÁ·Î±×·¥ Àç¿øÀÇ Àý¹Ý ÀÌ»óÀ» Ãæ´çÇÑ °ÍÀ¸·Î ¾Ë·ÁÁ³´Ù°í ¹àÇû½À´Ï´Ù.

¶ÇÇÑ ºÏÇÑÀº ÇØÅ· ÇØÁ¦ÀÇ ´ë°¡·Î ±ÝÀüÀ» ¿ä±¸ÇÏ´Â ÇØÅ· ¼ö¹ýÀÎ ·£¼¶¿þ¾î¿¡ ¶Ù¾îµé°í ÀÖÀ» °¡´É¼ºÀÌ ÀÖÀ¸¸ç, ·£¼¶¿þ¾î º¯Á¾ ÇÁ·Î±×·¥ °³¹ßÀ» ÅëÇØ Ç×°ø¿ìÁÖ ¹× ¹æÀ§ »ê¾÷ Á¶Á÷¿¡µµ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ´Ù°í ÁöÀûÇß½À´Ï´Ù.

±×·¯¸é¼­ ¡°ÀÌ·¯ÇÑ ÇൿÀº ºÏÇÑÀÌ Á¤º¸ ¼öÁý°ú Á¢±ÙÀ» ÅëÇÑ ¼öÀÍâÃâÀ̶ó´Â µÎ °¡Áö ¸ñÀûÀ» ¸ðµÎ °¡Áö°í ÀÖ¾úÀ½À» ½Ã»çÇÑ´Ù¡±°í ¹àÇû½À´Ï´Ù.

¡°ºÏÇÑ, Çѱ¹ ³» ºÏÇÑ °ü·ÃÀÚ ÇØÅ·¡±

ºÏÇÑÀÌ Á¤º¸ Å»Ã븦 ¸ñÀûÀ¸·Î ÇØÅ·À» ½ÃµµÇÏ´Â Á¤È²Àº ÃÖ±Ù ÀÕµû¶ó ¹ß°ßµÇ°í ÀÖ½À´Ï´Ù.

Çѱ¹ ±¹°¡»çÀ̹ö¾Èº¸¼¾ÅÍ(NCSC)¿Í ¹Î°£ »çÀ̹öº¸¾È±â¾÷ ¾È·¦Àº 16ÀÏ °øµ¿ ¹ßÇ¥ÇÑ ºÐ¼® º¸°í¼­¿¡¼­ ºÏÇÑ ÇØÅ·Á¶Á÷ ¡®TA-·¹µå¾ØÆ®(TA-RedAnt)¡¯°¡ Çѱ¹ ³» ´ëºÏ Àü¹®°¡¿Í Å»ºÏ¹Î µîÀ» ´ë»óÀ¸·Î ÇØÅ· È°µ¿À» ¹ú¿´´Ù°í ¹ßÇ¥Çß½À´Ï´Ù.

º¸°í¼­´Â TA-·¹µå¾ØÆ®°¡ ¿ÃÇØ 5¿ù ¹«·á ¼ÒÇÁÆ®¿þ¾î ±¤°í ÇÁ·Î±×·¥À» ÅëÇØ Çѱ¹ ³» ±¤°í ´ëÇà»çÀÇ ¼­¹ö¸¦ ÇØÅ·Çß°í, À̸¦ ÅëÇØ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®ÀÇ ÀÎÅÍ³Ý ÀͽºÇ÷η¯ ºê¶ó¿ìÀúÀÇ Ãë¾àÁ¡À» ¾Ç¿ëÇÑ °ÍÀ¸·Î ³ªÅ¸³µ´Ù°í ¹àÇû½À´Ï´Ù.

±×·¯¸é¼­ °ø°ÝÀÚ´Â ÀÌ Ãë¾àÁ¡À» ¾Ç¿ëÇØ ±¤°í ÇÁ·Î±×·¥ÀÌ ¼³Ä¡µÈ ÄÄÇ»ÅÍ¿¡ ¾Ç¼º Äڵ带 À¯Æ÷Çß´Ù°í ÁöÀûÇß½À´Ï´Ù.

º¸°í¼­´Â ¡°ºÏÇÑ ÇØÅ· Á¶Á÷µéÀÌ MS ÀÎÅÍ³Ý ÀͽºÇ÷η¯ ¿Ü¿¡µµ ´Ù¾çÇÑ Ãë¾àÁ¡À» ¾Ç¿ëÇÏ´Â µî °íµµÈ­µÈ °ø°Ý Ãß¼¼¸¦ º¸ÀÌ°í ÀÖ´Ù¡±¸ç, »ç¿ëÀڵ鿡 ¿î¿µÃ¼Á¦ ¹× ¼ÒÇÁÆ®¿þ¾îÀÇ º¸¾È¿¡ À¯ÀÇÇÒ °ÍÀ» ´çºÎÇß½À´Ï´Ù.

Àü¹®°¡µéÀº ºÏÇÑÀÌ ÃÖ±Ù Á¤º¸ Å»Ãë¿Í ±ÝÀüÀû µ¿±âÀÇ ÇØÅ·À» µ¿½Ã¿¡ ¼öÇàÇÏ´Â µ¶Æ¯ÇÑ ÇüŸ¦ º¸ÀÌ°í ÀÖ´Ù°í ÁöÀûÇØ¿Ô½À´Ï´Ù.

¸¶ÀÌŬ ¹ÝÇÏÆ® ¸Çµð¾ðÆ® ¼ö¼®ºÐ¼®°¡´Â ÃÖ±Ù VOA¿ÍÀÇ È­»óÅëÈ­¿¡¼­ ºÏÇÑ ÇØÅ·Á¶Á÷µéÀÌ Á¤º¸¸¦ Å»ÃëÇÑ µÚ À̸¦ ·£¼¶¿þ¾î °ø°Ý¿¡ È°¿ëÇÏ°í, ¿©±â¼­ ¾òÀº ±ÝÀüÀû À̵æÀ» ´Ù½Ã Á¤º¸ Å»Ãë¿¡ È°¿ëÇÏ´Â ¹æ½ÄÀ» ÃëÇÏ°í ÀÖ´Ù°í ÁöÀûÇß½À´Ï´Ù.

¸¶ÀÌŬ ¹ÝÇÏÆ® ¸Çµð¾ðÆ® ¼ö¼®ºÐ¼®°¡
¸¶ÀÌŬ ¹ÝÇÏÆ® ¸Çµð¾ðÆ® ¼ö¼®ºÐ¼®°¡

[³ìÃë: ¹ÝÇÏÆ® ºÐ¼®°¡] ¡°The main goal is to attack these entities over here get the money to do what I'm doing now and then go after the missile, the defense industrial base, the satellite information and then they can revert back to any type of ransomware stuff if they need it. Now again, that's not the main reason why they're there they're there to actually that that effort is basically just to prop up the real cyber espionage efforts.¡±

¹ÝÇÏÆ® ¼ö¼®ºÐ¼®°¡´Â ºÏÇÑ ÇØÅ·Á¶Á÷ÀÌ Á¤º¸ Å»Ã븦 ¸Å°³·Î ±ÝÀüÀû À̵æÀ» ÃëÇÏ°í À̸¦ ´Ù½Ã Á¤º¸ Ãëµæ¿¡ È°¿ëÇÏ¸ç ±Ã±ØÀûÀ¸·Î´Â Á¤±ÇÀ» À§ÇÑ ÇÙ°ú ¹Ì»çÀÏ °³¹ß ¿ª·® ÁøÀüÀ» Áö¿øÇÏ°í ÀÖ´Ù´Â Á¡À» ÁÖ¸ñÇØ¾ß ÇÑ´Ù°í ¸»Çß½À´Ï´Ù.

±×·¯¸é¼­ ÀÌ°ÍÀÌ ¹Ù·Î ¹Ì±¹À» ºñ·ÔÇÑ ±¹Á¦»çȸ¿Í ¹Î°£ º¸¾È¾÷°è°¡ ÁÖ¸ñÇÏ°í °æ°íÇÏ´Â ÀÌÀ¯À̸ç, ¾ÕÀ¸·Îµµ ´õ ¸¹Àº ±¹°¡ ±â°ü°ú ¹Î°£ º¸¾È ±â¾÷ÀÌ Çù·ÂÇØ ÀÌ °°Àº »çÀ̹ö À§Çù¿¡ °æÁ¾À» ¿ï·Á¾ß ÇÑ´Ù°í °­Á¶Çß½À´Ï´Ù.


                    ¼öÁ¤/»èÁ¦     ÀÌÀü±Û ´ÙÀ½±Û    
¹øÈ£±¸ºÐÀ帣Á¦ ¸ñÀÛ¼ºÀÏ
10278 º¸¾È  Ãë¾àÁ¡    À©µµ¿ì 11 ¹öÀü 24H2 ¾÷µ¥ÀÌÆ®, Ŭ¸³º¸µå ±â·Ï ¹ö±× 2024/10/21
10277 º¸¾È  AI    AI äÆÿ¡ °³ÀÎÁ¤º¸ ¹àÈ÷¸é ¾È µÇ´Â ÀÌÀ¯¡¦ãæ ÇØÅ·¼ö¹ý ³ª¿Ô´Ù 2024/10/20
10276 ÇØÅ·  MS    MS º¸°í¼­ ¡°ºÏÇÑ, ¹Ì±¹ µî °ø±Þ¸Á ÇØÅ· °ø°Ý¡¦¾ÏȣȭÆó 30¾ï ´Þ... 2024/10/19
10275 ÇØÅ·  °ÔÀÓ    'Æ÷ÄÏ¸ó °³¹ß»ç' °ÔÀÓÇÁ¸®Å©, ÇØÅ·À¸·Î ³»ºÎ ÀÚ·á ´ë·® À¯Ãâ 2024/10/18
10274 º¸¾È  IE    ÝÁ ÇØÅ·Á¶Á÷, MS ÀͽºÇ÷η¯ Ãë¾àÁ¡ ¾Ç¿ë 2024/10/17
10273 ÇØÅ·  »ç°Ç»ç°í    ·¯½Ã¾ÆÀÇ ÇØÅ· Á¶Á÷ APT29, Àü ¼¼°èÀûÀ¸·Î Áüºê¶ó¿Í ÆÀ½ÃƼ °ø·«... 2024/10/16

 
óÀ½ ÀÌÀü ´ÙÀ½       ¸ñ·Ï