JLTS
2021-03-11
...
Up to 60,000 computer systems exposed in Germany to Microsoft flaw - BSI
免责声明:上述内容仅代表发帖人个人观点,不构成本平台的任何投资建议。
分享至
微信
复制链接
精彩评论
我们需要你的真知灼见来填补这片空白
打开APP,发表看法
APP内打开
发表看法
{"i18n":{"language":"zh_CN"},"detailType":1,"isChannel":false,"data":{"magic":2,"id":321363245,"tweetId":"321363245","gmtCreate":1615395059387,"gmtModify":1703488524302,"author":{"id":3575002815051060,"idStr":"3575002815051060","authorId":3575002815051060,"authorIdStr":"3575002815051060","name":"JLTS","avatar":"https://static.laohu8.com/default-avatar.jpg","vip":1,"userType":1,"introduction":"","boolIsFan":false,"boolIsHead":false,"crmLevel":2,"crmLevelSwitch":0,"individualDisplayBadges":[],"fanSize":0,"starInvestorFlag":false},"themes":[],"images":[],"coverImages":[],"extraTitle":"","html":"<html><head></head><body><p>...</p></body></html>","htmlText":"<html><head></head><body><p>...</p></body></html>","text":"...","highlighted":1,"essential":1,"paper":1,"likeSize":0,"commentSize":0,"repostSize":0,"favoriteSize":0,"link":"https://laohu8.com/post/321363245","repostId":2118182677,"repostType":2,"repost":{"id":"2118182677","weMediaInfo":{"introduction":"Reuters.com brings you the latest news from around the world, covering breaking news in markets, business, politics, entertainment and technology","home_visible":1,"media_name":"Reuters","id":"1036604489","head_image":"https://static.tigerbbs.com/443ce19704621c837795676028cec868"},"pubTimestamp":1615394391,"share":"https://www.laohu8.com/m/news/2118182677?lang=&edition=full","pubTime":"2021-03-11 00:39","market":"us","language":"en","title":"Up to 60,000 computer systems exposed in Germany to Microsoft flaw - BSI","url":"https://stock-news.laohu8.com/highlight/detail?id=2118182677","media":"Reuters","summary":"By Andreas Rinke BERLIN, March 10 (Reuters) - As many as 60,000 computer systems in Germany were e","content":"<html><body><p>By Andreas Rinke</p><p> BERLIN, March 10 (Reuters) - As many as 60,000 computer systems in Germany were exposed to a flaw that allows unauthorized users to access systems in Microsoft Corp's</p><p> email software, the head of its cybersecurity watchdog said on Wednesday.</p><p> More than half of the vulnerabilities were addressed following a warning last weekend by the Federal Office for Information Security <a href=\"https://laohu8.com/S/BSI\">$(BSI)$</a>, but around 25,000 systems still need to be fixed, BSI chief Arne Schoenbohm said.</p><p> \"The warning has worked. In Germany, many Exchange servers have been secured by downloading patches,\" Schoenbohm said in written comments to Reuters. \"Every vulnerable system is <a href=\"https://laohu8.com/S/AONE\">one</a> too many and can lead to harm.\" </p><p> The flaw appears to have been widely exploited by hackers and affected more than 20,000 U.S. organisations. The European Union's banking regulator and the Norwegian parliament have also been hit. </p><p> In a 14-page report on the Microsoft vulnerability, the BSI said the behaviour of hackers exploiting it had changed sharply since it was publicly revealed.</p><p> Initially, most targets had been think tanks, universities, non-governmental organisations, law firms and defence companies - mostly in the United States.</p><p> \"Now, these exploits are being deployed at mass scale against thousands of targets - apparently worldwide,\" the report said.</p><p> At least 10 different hacking groups were using the latest flaw in Microsoft's mail server software to break into targets around the world, according to researchers at cybersecurity company ESET.</p><p> In Germany, two federal authorities have been affected by the hack, the BSI said, declining to say which.</p><p> The BSI said it had been contacted since the weekend by around 100 companies ranging from small businesses to leading companies seeking guidance, well above the usual number.</p><p> \"We are in touch with all Computer Emergency Response Teams <a href=\"https://laohu8.com/S/CERT\">$(CERT)$</a> in Europa and abroad, especially the Cybersecurity and Infrastructure Security Agency (CISA) in the United States,\" the BSI said, adding it was also in close contact with Microsoft. </p><p> (Additional reporting by Raphael Satter, Writing by Douglas Busvine; Editing by Bernadette Baum)</p><p>((douglas.busvine@tr.com; +49 30 220 133 562;))</p></body></html>","collect":0,"html":"<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\" />\n<meta name=\"viewport\" content=\"width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0,user-scalable=no\"/>\n<meta name=\"format-detection\" content=\"telephone=no,email=no,address=no\" />\n<title>Up to 60,000 computer systems exposed in Germany to Microsoft flaw - BSI</title>\n<style type=\"text/css\">\na,abbr,acronym,address,applet,article,aside,audio,b,big,blockquote,body,canvas,caption,center,cite,code,dd,del,details,dfn,div,dl,dt,\nem,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,html,i,iframe,img,ins,kbd,label,legend,li,mark,menu,nav,\nobject,ol,output,p,pre,q,ruby,s,samp,section,small,span,strike,strong,sub,summary,sup,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{ font:inherit;margin:0;padding:0;vertical-align:baseline;border:0 }\nbody{ font-size:16px; line-height:1.5; color:#999; background:transparent; }\n.wrapper{ overflow:hidden;word-break:break-all;padding:10px; }\nh1,h2{ font-weight:normal; line-height:1.35; margin-bottom:.6em; }\nh3,h4,h5,h6{ line-height:1.35; margin-bottom:1em; }\nh1{ font-size:24px; }\nh2{ font-size:20px; }\nh3{ font-size:18px; }\nh4{ font-size:16px; }\nh5{ font-size:14px; }\nh6{ font-size:12px; }\np,ul,ol,blockquote,dl,table{ margin:1.2em 0; }\nul,ol{ margin-left:2em; }\nul{ list-style:disc; }\nol{ list-style:decimal; }\nli,li p{ margin:10px 0;}\nimg{ max-width:100%;display:block;margin:0 auto 1em; }\nblockquote{ color:#B5B2B1; border-left:3px solid #aaa; padding:1em; }\nstrong,b{font-weight:bold;}\nem,i{font-style:italic;}\ntable{ width:100%;border-collapse:collapse;border-spacing:1px;margin:1em 0;font-size:.9em; }\nth,td{ padding:5px;text-align:left;border:1px solid #aaa; }\nth{ font-weight:bold;background:#5d5d5d; }\n.symbol-link{font-weight:bold;}\n/* header{ border-bottom:1px solid #494756; } */\n.title{ margin:0 0 8px;line-height:1.3;color:#ddd; }\n.meta {color:#5e5c6d;font-size:13px;margin:0 0 .5em; }\na{text-decoration:none; color:#2a4b87;}\n.meta .head { display: inline-block; overflow: hidden}\n.head .h-thumb { width: 30px; height: 30px; margin: 0; padding: 0; border-radius: 50%; float: left;}\n.head .h-content { margin: 0; padding: 0 0 0 9px; float: left;}\n.head .h-name {font-size: 13px; color: #eee; margin: 0;}\n.head .h-time {font-size: 11px; color: #7E829C; margin: 0;line-height: 11px;}\n.small {font-size: 12.5px; display: inline-block; transform: scale(0.9); -webkit-transform: scale(0.9); transform-origin: left; -webkit-transform-origin: left;}\n.smaller {font-size: 12.5px; display: inline-block; transform: scale(0.8); -webkit-transform: scale(0.8); transform-origin: left; -webkit-transform-origin: left;}\n.bt-text {font-size: 12px;margin: 1.5em 0 0 0}\n.bt-text p {margin: 0}\n</style>\n</head>\n<body>\n<div class=\"wrapper\">\n<header>\n<h2 class=\"title\">\nUp to 60,000 computer systems exposed in Germany to Microsoft flaw - BSI\n</h2>\n\n<h4 class=\"meta\">\n\n\n<a class=\"head\" href=\"https://laohu8.com/wemedia/1036604489\">\n\n\n<div class=\"h-thumb\" style=\"background-image:url(https://static.tigerbbs.com/443ce19704621c837795676028cec868);background-size:cover;\"></div>\n\n<div class=\"h-content\">\n<p class=\"h-name\">Reuters </p>\n<p class=\"h-time\">2021-03-11 00:39</p>\n</div>\n\n</a>\n\n\n</h4>\n\n</header>\n<article>\n<html><body><p>By Andreas Rinke</p><p> BERLIN, March 10 (Reuters) - As many as 60,000 computer systems in Germany were exposed to a flaw that allows unauthorized users to access systems in Microsoft Corp's</p><p> email software, the head of its cybersecurity watchdog said on Wednesday.</p><p> More than half of the vulnerabilities were addressed following a warning last weekend by the Federal Office for Information Security <a href=\"https://laohu8.com/S/BSI\">$(BSI)$</a>, but around 25,000 systems still need to be fixed, BSI chief Arne Schoenbohm said.</p><p> \"The warning has worked. In Germany, many Exchange servers have been secured by downloading patches,\" Schoenbohm said in written comments to Reuters. \"Every vulnerable system is <a href=\"https://laohu8.com/S/AONE\">one</a> too many and can lead to harm.\" </p><p> The flaw appears to have been widely exploited by hackers and affected more than 20,000 U.S. organisations. The European Union's banking regulator and the Norwegian parliament have also been hit. </p><p> In a 14-page report on the Microsoft vulnerability, the BSI said the behaviour of hackers exploiting it had changed sharply since it was publicly revealed.</p><p> Initially, most targets had been think tanks, universities, non-governmental organisations, law firms and defence companies - mostly in the United States.</p><p> \"Now, these exploits are being deployed at mass scale against thousands of targets - apparently worldwide,\" the report said.</p><p> At least 10 different hacking groups were using the latest flaw in Microsoft's mail server software to break into targets around the world, according to researchers at cybersecurity company ESET.</p><p> In Germany, two federal authorities have been affected by the hack, the BSI said, declining to say which.</p><p> The BSI said it had been contacted since the weekend by around 100 companies ranging from small businesses to leading companies seeking guidance, well above the usual number.</p><p> \"We are in touch with all Computer Emergency Response Teams <a href=\"https://laohu8.com/S/CERT\">$(CERT)$</a> in Europa and abroad, especially the Cybersecurity and Infrastructure Security Agency (CISA) in the United States,\" the BSI said, adding it was also in close contact with Microsoft. </p><p> (Additional reporting by Raphael Satter, Writing by Douglas Busvine; Editing by Bernadette Baum)</p><p>((douglas.busvine@tr.com; +49 30 220 133 562;))</p></body></html>\n\n</article>\n</div>\n</body>\n</html>\n","type":0,"thumbnail":"","relate_stocks":{"09086":"华夏纳指-U","MSFT":"微软","03086":"华夏纳指"},"source_url":"http://api.rkd.refinitiv.com/api/News/News.svc/REST/News_1/RetrieveStoryML_1","is_english":true,"share_image_url":"https://static.laohu8.com/e9f99090a1c2ed51c021029395664489","article_id":"2118182677","content_text":"By Andreas Rinke BERLIN, March 10 (Reuters) - As many as 60,000 computer systems in Germany were exposed to a flaw that allows unauthorized users to access systems in Microsoft Corp's email software, the head of its cybersecurity watchdog said on Wednesday. More than half of the vulnerabilities were addressed following a warning last weekend by the Federal Office for Information Security $(BSI)$, but around 25,000 systems still need to be fixed, BSI chief Arne Schoenbohm said. \"The warning has worked. In Germany, many Exchange servers have been secured by downloading patches,\" Schoenbohm said in written comments to Reuters. \"Every vulnerable system is one too many and can lead to harm.\" The flaw appears to have been widely exploited by hackers and affected more than 20,000 U.S. organisations. The European Union's banking regulator and the Norwegian parliament have also been hit. In a 14-page report on the Microsoft vulnerability, the BSI said the behaviour of hackers exploiting it had changed sharply since it was publicly revealed. Initially, most targets had been think tanks, universities, non-governmental organisations, law firms and defence companies - mostly in the United States. \"Now, these exploits are being deployed at mass scale against thousands of targets - apparently worldwide,\" the report said. At least 10 different hacking groups were using the latest flaw in Microsoft's mail server software to break into targets around the world, according to researchers at cybersecurity company ESET. In Germany, two federal authorities have been affected by the hack, the BSI said, declining to say which. The BSI said it had been contacted since the weekend by around 100 companies ranging from small businesses to leading companies seeking guidance, well above the usual number. \"We are in touch with all Computer Emergency Response Teams $(CERT)$ in Europa and abroad, especially the Cybersecurity and Infrastructure Security Agency (CISA) in the United States,\" the BSI said, adding it was also in close contact with Microsoft. (Additional reporting by Raphael Satter, Writing by Douglas Busvine; Editing by Bernadette Baum)((douglas.busvine@tr.com; +49 30 220 133 562;))","news_type":1},"isVote":1,"tweetType":1,"viewCount":112,"commentLimit":10,"likeStatus":false,"favoriteStatus":false,"reportStatus":false,"symbols":[],"verified":2,"subType":0,"readableState":1,"langContent":"EN","currentLanguage":"EN","warmUpFlag":false,"orderFlag":false,"shareable":true,"causeOfNotShareable":"","featuresForAnalytics":[],"commentAndTweetFlag":false,"andRepostAutoSelectedFlag":false,"upFlag":false,"length":3,"xxTargetLangEnum":"ORIG"},"commentList":[],"isCommentEnd":true,"isTiger":false,"isWeiXinMini":false,"url":"/m/post/321363245"}
精彩评论