{"id":7146,"date":"2023-07-27T14:02:54","date_gmt":"2023-07-27T07:02:54","guid":{"rendered":"https:\/\/vacif.com\/?p=7146"},"modified":"2023-07-27T14:02:54","modified_gmt":"2023-07-27T07:02:54","slug":"su-khac-biet-giua-ransomware-vs-malware","status":"publish","type":"post","link":"https:\/\/vacif.com\/en\/su-khac-biet-giua-ransomware-vs-malware\/","title":{"rendered":"S\u1ef0 KH\u00c1C BI\u1ec6T GI\u1eeeA RANSOMWARE VS MALWARE."},"content":{"rendered":"\n<p><strong>1.Kh\u00e1i ni\u1ec7m v\u1ec1 Ransomware v\u00e0 Malware.<\/strong><\/p>\n\n\n\n<p><strong>1.1<\/strong> <strong>Ransomware<\/strong>.<\/p>\n\n\n\n<p><strong>Ransomware<\/strong> l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i (malware) \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi hacker \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u, t\u1ec7p tin, ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n. Sau khi d\u1eef li\u1ec7u b\u1ecb m\u00e3 h\u00f3a ho\u1eb7c b\u1ecb kh\u00f3a, hacker y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 m\u1ed9t kho\u1ea3n ti\u1ec1n chu\u1ed9c (ransom) th\u00f4ng qua ti\u1ec1n \u0111i\u1ec7n t\u1eed nh\u01b0 Bitcoin, Ethereum ho\u1eb7c c\u00e1c ph\u01b0\u01a1ng th\u1ee9c thanh to\u00e1n tr\u1ef1c tuy\u1ebfn kh\u00e1c \u0111\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c kh\u00f3a gi\u1ea3i m\u00e3 v\u00e0 l\u1ea5y l\u1ea1i quy\u1ec1n truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u c\u1ee7a h\u1ecd.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"350\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-333.png\" alt=\"\" class=\"wp-image-7148\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-333.png 800w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-333-600x263.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-333-300x131.png 300w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-333-768x336.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n<p>Khi ransomware t\u1ea5n c\u00f4ng, n\u1ea1n nh\u00e2n th\u01b0\u1eddng nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t th\u00f4ng b\u00e1o chu\u1ed9c tr\u00ean m\u00e0n h\u00ecnh m\u00e1y t\u00ednh, cung c\u1ea5p h\u01b0\u1edbng d\u1eabn v\u1ec1 c\u00e1ch thanh to\u00e1n ti\u1ec1n chu\u1ed9c v\u00e0 th\u00f4ng tin \u0111\u1ec3 li\u00ean l\u1ea1c v\u1edbi hacker. Th\u00f4ng b\u00e1o n\u00e0y c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi l\u1eddi \u0111e d\u1ecda r\u1eb1ng n\u1ebfu kh\u00f4ng tr\u1ea3 ti\u1ec1n chu\u1ed9c trong kho\u1ea3ng th\u1eddi gian nh\u1ea5t \u0111\u1ecbnh, d\u1eef li\u1ec7u s\u1ebd b\u1ecb h\u1ee7y ho\u1eb7c r\u00f2 r\u1ec9<\/p>\n\n\n\n<p>Ransomware th\u01b0\u1eddng \u0111\u01b0\u1ee3c tri\u1ec3n khai th\u00f4ng qua c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng phishing, email gi\u1ea3 m\u1ea1o, drive-by download, khai th\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt, ho\u1eb7c s\u1eed d\u1ee5ng c\u00e1c exploit kits. N\u1ebfu n\u1ea1n nh\u00e2n tr\u1ea3 ti\u1ec1n chu\u1ed9c, kh\u00f4ng c\u00f3 \u0111\u1ea3m b\u1ea3o r\u1eb1ng hacker s\u1ebd cung c\u1ea5p kh\u00f3a gi\u1ea3i m\u00e3 sau khi nh\u1eadn ti\u1ec1n.<\/p>\n\n\n\n<p>Ransomware \u0111\u00e3 tr\u1edf th\u00e0nh m\u1ed9t trong nh\u1eefng m\u1ed1i \u0111e d\u1ecda ch\u00ednh trong l\u0129nh v\u1ef1c an ninh m\u1ea1ng v\u00e0 g\u00e2y ra nhi\u1ec1u t\u1ed5n th\u1ea5t v\u1ec1 t\u00e0i ch\u00ednh v\u00e0 d\u1eef li\u1ec7u cho c\u00e1c t\u1ed5 ch\u1ee9c v\u00e0 c\u00e1 nh\u00e2n. Vi\u1ec7c ph\u00f2ng ch\u1ed1ng ransomware l\u00e0 r\u1ea5t quan tr\u1ecdng \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o an to\u00e0n v\u00e0 b\u1ea3o m\u1eadt cho d\u1eef li\u1ec7u v\u00e0 h\u1ec7 th\u1ed1ng c\u1ee7a m\u1ed7i ng\u01b0\u1eddi.<\/p>\n\n\n\n<p><strong>1.2<\/strong> <strong>T\u1ed5ng quan v\u1ec1 l\u1ecbch s\u1eed ransomware<\/strong>.<\/p>\n\n\n\n<p>L\u1ecbch s\u1eed ransomware b\u1eaft \u0111\u1ea7u t\u1eeb nh\u1eefng n\u0103m \u0111\u1ea7u c\u1ee7a th\u1eadp k\u1ef7 1990 v\u00e0 \u0111\u00e3 tr\u1ea3i qua nhi\u1ec1u giai \u0111o\u1ea1n ph\u00e1t tri\u1ec3n v\u00e0 ti\u1ebfn h\u00f3a.<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 1990-2005:<\/strong> Ransomware \u0111\u1ea7u ti\u00ean xu\u1ea5t hi\u1ec7n v\u00e0o nh\u1eefng n\u0103m 1990, \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 &#8220;AIDS Trojan&#8221; (c\u0169ng \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn v\u1edbi t\u00ean PC Cyborg). Lo\u1ea1i ransomware n\u00e0y \u0111\u00e3 m\u00e3 h\u00f3a t\u1ec7p tr\u00ean \u1ed5 c\u1ee9ng c\u1ee7a n\u1ea1n nh\u00e2n v\u00e0 y\u00eau c\u1ea7u thanh to\u00e1n ti\u1ec1n chu\u1ed9c qua th\u01b0 \u0111i\u1ec7n t\u1eed \u0111\u1ec3 gi\u1ea3i m\u00e3 ch\u00fang.<\/p>\n\n\n\n<p>Trong nh\u1eefng n\u0103m ti\u1ebfp theo, ransomware ph\u00e1t tri\u1ec3n ch\u1eadm ch\u1ea1p v\u00e0 kh\u00f4ng ph\u1ed5 bi\u1ebfn l\u1eafm. M\u1ed9t s\u1ed1 phi\u00ean b\u1ea3n ti\u1ebfp theo c\u1ee7a ransomware t\u1ea5n c\u00f4ng th\u00f4ng qua c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt trong tr\u00ecnh duy\u1ec7t ho\u1eb7c trang web v\u00e0 m\u00e3 h\u00f3a c\u00e1c t\u1ec7p tr\u00ean m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n.<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 2006-2012:<\/strong> Trong giai \u0111o\u1ea1n n\u00e0y, ransomware b\u1eaft \u0111\u1ea7u tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n v\u00e0 ti\u1ebfn h\u00f3a v\u1edbi s\u1ef1 xu\u1ea5t hi\u1ec7n c\u1ee7a c\u00e1c lo\u1ea1i ransomware ph\u1ee9c t\u1ea1p h\u01a1n.<\/p>\n\n\n\n<p>Ransomware Reveton \u0111\u01b0\u1ee3c t\u1ea1o ra v\u00e0o n\u0103m 2012, th\u1ef1c hi\u1ec7n cu\u1ed9c t\u1ea5n c\u00f4ng ph\u00e1p ch\u00fang trong t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng v\u00e0 l\u1eeba \u0111\u1ea3o ng\u01b0\u1eddi d\u00f9ng r\u1eb1ng h\u1ecd vi ph\u1ea1m ph\u00e1p lu\u1eadt v\u00e0 c\u1ea7n ph\u1ea3i thanh to\u00e1n ti\u1ec1n ph\u1ea1t \u0111\u1ec3 tr\u00e1nh vi\u1ec7c b\u1ecb truy t\u1ed1.<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 2013-2017:<\/strong> Trong giai \u0111o\u1ea1n n\u00e0y, c\u00f3 s\u1ef1 xu\u1ea5t hi\u1ec7n c\u1ee7a c\u00e1c lo\u1ea1i ransomware ti\u00eau bi\u1ec3u nh\u01b0 CryptoLocker, CryptoWall, v\u00e0 Locky. Nh\u1eefng lo\u1ea1i ransomware n\u00e0y \u0111\u00e3 t\u1ea5n c\u00f4ng r\u1ed9ng r\u00e3i v\u00e0 g\u00e2y ra thi\u1ec7t h\u1ea1i l\u1edbn v\u1ec1 t\u00e0i ch\u00ednh v\u00e0 d\u1eef li\u1ec7u cho ng\u01b0\u1eddi d\u00f9ng c\u00e1 nh\u00e2n v\u00e0 doanh nghi\u1ec7p.<\/p>\n\n\n\n<p>CryptoLocker, xu\u1ea5t hi\u1ec7n v\u00e0o n\u0103m 2013, \u0111\u00e3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c b\u1eb1ng Bitcoin \u0111\u1ec3 gi\u1ea3i m\u00e3. CryptoWall v\u00e0 Locky, xu\u1ea5t hi\u1ec7n v\u00e0o n\u0103m 2014-2016, ti\u1ebfp t\u1ee5c g\u00e2y ra s\u1ef1 kinh ho\u00e0ng cho c\u1ed9ng \u0111\u1ed3ng m\u1ea1ng v\u00e0 t\u1ea1o ra c\u00e1c bi\u1ebfn th\u1ec3 ph\u1ee9c t\u1ea1p.<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 2018-2023:<\/strong> Trong giai \u0111o\u1ea1n n\u00e0y, ransomware v\u1eabn ti\u1ebfp t\u1ee5c ti\u1ebfn h\u00f3a v\u00e0 ph\u00e1t tri\u1ec3n v\u1edbi s\u1ef1 xu\u1ea5t hi\u1ec7n c\u1ee7a c\u00e1c bi\u1ebfn th\u1ec3 ng\u00e0y c\u00e0ng ph\u1ee9c t\u1ea1p v\u00e0 nguy hi\u1ec3m h\u01a1n. C\u00e1c nh\u00f3m hacker chuy\u00ean nghi\u1ec7p v\u00e0 human-operated ransomware tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn, s\u1eed d\u1ee5ng c\u00e1c chi\u1ebfn thu\u1eadt t\u1ea5n c\u00f4ng cao c\u1ea5p v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c l\u1edbn.<\/p>\n\n\n\n<p>M\u1ed9t s\u1ed1 ransomware s\u1eed d\u1ee5ng c\u00e1c c\u00f4ng ngh\u1ec7 m\u00e3 h\u00f3a m\u1ea1nh m\u1ebd v\u00e0 s\u1eed d\u1ee5ng c\u00e1c k\u1ef9 thu\u1eadt \u1ea9n n\u1ea5p \u0111\u1ec3 tr\u00e1nh ph\u00e1t hi\u1ec7n v\u00e0 ng\u0103n ch\u1eb7n.<\/p>\n\n\n\n<p><strong>1.3 Malware<\/strong>.<\/p>\n\n\n\n<p><strong>Malware<\/strong> (malicious software) l\u00e0 m\u1ed9t thu\u1eadt ng\u1eef t\u1ed5ng qu\u00e1t d\u00f9ng \u0111\u1ec3 ch\u1ec9 nh\u1eefng ch\u01b0\u01a1ng tr\u00ecnh ho\u1eb7c ph\u1ea7n m\u1ec1m c\u00f3 m\u1ee5c \u0111\u00edch g\u00e2y h\u1ea1i, x\u00e2m nh\u1eadp, ho\u1eb7c g\u00e2y r\u1ed1i \u0111\u1ed1i v\u1edbi m\u00e1y t\u00ednh, thi\u1ebft b\u1ecb di \u0111\u1ed9ng, h\u1ec7 th\u1ed1ng m\u1ea1ng, ho\u1eb7c ng\u01b0\u1eddi d\u00f9ng. Malware th\u01b0\u1eddng \u0111\u01b0\u1ee3c t\u1ea1o ra v\u1edbi m\u1ee5c \u0111\u00edch th\u1ef1c hi\u1ec7n c\u00e1c ho\u1ea1t \u0111\u1ed9ng kh\u00f4ng mong mu\u1ed1n v\u00e0 th\u01b0\u1eddng th\u1ef1c hi\u1ec7n c\u00e1c h\u00e0nh vi m\u00e0 ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng bi\u1ebft ho\u1eb7c kh\u00f4ng \u0111\u1ed3ng \u00fd.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"336\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-334.png\" alt=\"\" class=\"wp-image-7149\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-334.png 1024w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-334-600x197.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-334-300x98.png 300w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-334-768x252.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Malware c\u00f3 th\u1ec3 t\u1ed3n t\u1ea1i d\u01b0\u1edbi nhi\u1ec1u h\u00ecnh th\u1ee9c kh\u00e1c nhau v\u00e0 ch\u00fang th\u01b0\u1eddng \u0111\u01b0\u1ee3c ph\u00e2n lo\u1ea1i d\u1ef1a tr\u00ean c\u00e1ch th\u1ee9c ho\u1ea1t \u0111\u1ed9ng ho\u1eb7c m\u1ee5c ti\u00eau c\u1ee7a ch\u00fang. M\u1ed9t s\u1ed1 lo\u1ea1i malware ph\u1ed5 bi\u1ebfn bao g\u1ed3m:<\/p>\n\n\n\n<p><strong>Virus:<\/strong> L\u00e0 m\u1ed9t lo\u1ea1i malware c\u00f3 kh\u1ea3 n\u0103ng l\u00e2y nhi\u1ec5m v\u00e0 sao ch\u00e9p sang c\u00e1c t\u1ec7p v\u00e0 ch\u01b0\u01a1ng tr\u00ecnh kh\u00e1c. Virus th\u01b0\u1eddng g\u1eafn k\u00e8m v\u00e0o c\u00e1c t\u1ec7p ho\u1eb7c ch\u01b0\u01a1ng tr\u00ecnh t\u1ed3n t\u1ea1i v\u00e0 khi ch\u1ea1y, n\u00f3 s\u1ebd lan truy\u1ec1n v\u00e0 t\u1ea5n c\u00f4ng h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p><strong>Trojan: <\/strong>Trojan l\u00e0 lo\u1ea1i malware gi\u1ea3 m\u1ea1o th\u00e0nh c\u00e1c ph\u1ea7n m\u1ec1m h\u1eefu \u00edch ho\u1eb7c tin c\u1eady \u0111\u1ec3 l\u1eeba \u0111\u1ea3o ng\u01b0\u1eddi d\u00f9ng t\u1ea3i v\u00e0 c\u00e0i \u0111\u1eb7t ch\u00fang. Khi Trojan \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t, n\u00f3 th\u1ef1c hi\u1ec7n c\u00e1c ho\u1ea1t \u0111\u1ed9ng g\u00e2y h\u1ea1i m\u00e0 ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng bi\u1ebft.<\/p>\n\n\n\n<p><strong>Worms:<\/strong> Worms l\u00e0 c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh malware t\u1ef1 \u0111\u1ed9ng sao ch\u00e9p v\u00e0 lan truy\u1ec1n qua m\u1ea1ng m\u00e0 kh\u00f4ng c\u1ea7n s\u1ef1 t\u01b0\u01a1ng t\u00e1c c\u1ee7a ng\u01b0\u1eddi d\u00f9ng. Worms th\u01b0\u1eddng t\u1ea5n c\u00f4ng c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt trong h\u1ec7 th\u1ed1ng m\u1ea1ng \u0111\u1ec3 l\u00e2y lan.<\/p>\n\n\n\n<p><strong>Spyware: <\/strong>Spyware l\u00e0 lo\u1ea1i malware \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 thu th\u1eadp th\u00f4ng tin c\u00e1 nh\u00e2n c\u1ee7a ng\u01b0\u1eddi d\u00f9ng m\u00e0 kh\u00f4ng h\u1ec1 \u0111\u01b0\u1ee3c s\u1ef1 cho ph\u00e9p. Th\u00f4ng tin thu th\u1eadp bao g\u1ed3m l\u1ecbch s\u1eed duy\u1ec7t web, t\u00e0i kho\u1ea3n \u0111\u0103ng nh\u1eadp, ho\u1ea1t \u0111\u1ed9ng tr\u1ef1c tuy\u1ebfn v\u00e0 c\u00e1c d\u1eef li\u1ec7u kh\u00e1c.<\/p>\n\n\n\n<p><strong>Ransomware:<\/strong> L\u00e0 m\u1ed9t d\u1ea1ng \u0111\u1eb7c bi\u1ec7t c\u1ee7a malware, n\u00f3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n, sau \u0111\u00f3 y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 ti\u1ec1n chu\u1ed9c \u0111\u1ec3 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3 ho\u1eb7c l\u1ea5y l\u1ea1i quy\u1ec1n truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u.<\/p>\n\n\n\n<p><strong>1.4<\/strong> <strong>T\u1ed5ng quan v\u1ec1<\/strong> <strong>l\u1ecbch s\u1eed Malware.<\/strong><\/p>\n\n\n\n<p>L\u1ecbch s\u1eed c\u1ee7a malware b\u1eaft \u0111\u1ea7u t\u1eeb nh\u1eefng n\u0103m \u0111\u1ea7u c\u1ee7a c\u00f4ng ngh\u1ec7 m\u00e1y t\u00ednh v\u00e0 m\u1ea1ng, v\u00e0 \u0111\u00e3 ph\u00e1t tri\u1ec3n m\u1ea1nh m\u1ebd qua c\u00e1c giai \u0111o\u1ea1n v\u00e0 xu h\u01b0\u1edbng c\u00f4ng ngh\u1ec7 kh\u00e1c nhau. <\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 1970-1980:<\/strong> Malware \u0111\u1ea7u ti\u00ean xu\u1ea5t hi\u1ec7n l\u00e0 c\u00e1c lo\u1ea1i virus m\u00e1y t\u00ednh \u0111\u01a1n gi\u1ea3n. Virus \u0111\u1ea7u ti\u00ean c\u00f3 t\u00ean &#8220;Creeper&#8221; v\u00e0 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n n\u0103m 1971. N\u00f3 ch\u1ec9 l\u00e0 m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh t\u00ecm ki\u1ebfm c\u00e1c m\u00e1y t\u00ednh kh\u00e1c tr\u00ean m\u1ea1ng ARPANET v\u00e0 hi\u1ec3n th\u1ecb th\u00f4ng b\u00e1o &#8220;I&#8217;m the creeper, catch me if you can!&#8221; tr\u00ean m\u00e0n h\u00ecnh.<\/p>\n\n\n\n<p>N\u0103m 1982, xu\u1ea5t hi\u1ec7n virus PC VX. N\u00f3 \u0111\u01b0\u1ee3c coi l\u00e0 lo\u1ea1i virus \u0111\u1ea7u ti\u00ean th\u1ef1c s\u1ef1 l\u00e2y lan gi\u1eefa c\u00e1c m\u00e1y t\u00ednh th\u00f4ng qua c\u00e1c t\u1ec7p \u0111\u01b0\u1ee3c chia s\u1ebb tr\u00ean c\u00e1c \u0111\u0129a m\u1ec1m.<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 1990-2000:<\/strong> Trong nh\u1eefng n\u0103m 1990, c\u00e1c lo\u1ea1i virus tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n v\u00e0 ti\u1ebfn h\u00f3a ph\u1ee9c t\u1ea1p h\u01a1n. Melissa v\u00e0 ILOVEYOU l\u00e0 hai v\u00ed d\u1ee5 \u0111i\u1ec3n h\u00ecnh v\u1ec1 c\u00e1c virus lan truy\u1ec1n qua email, g\u00e2y ra thi\u1ec7t h\u1ea1i l\u1edbn trong vi\u1ec7c l\u00e2y lan v\u00e0 g\u00e2y \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn h\u00e0ng tri\u1ec7u ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n\n<p>Nh\u1eefng n\u0103m 2000 ch\u1ee9ng ki\u1ebfn \u200b\u200bs\u1ef1 xu\u1ea5t hi\u1ec7n c\u1ee7a c\u00e1c lo\u1ea1i malware \u0111a ch\u1ee9c n\u0103ng, nh\u01b0 trojan v\u00e0 spyware. Trojan g\u00e2y ra thi\u1ec7t h\u1ea1i b\u1eb1ng c\u00e1ch gi\u1ea3 m\u1ea1o c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh h\u1eefu \u00edch nh\u01b0ng th\u1ef1c t\u1ebf l\u00e0 malware. Spyware \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 gi\u00e1m s\u00e1t ho\u1ea1t \u0111\u1ed9ng c\u1ee7a ng\u01b0\u1eddi d\u00f9ng v\u00e0 \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u00e1 nh\u00e2n.<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 2010-2020: <\/strong>Ransomware tr\u1edf n\u00ean n\u1ed5i ti\u1ebfng v\u00e0o nh\u1eefng n\u0103m 2010, v\u1edbi c\u00e1c lo\u1ea1i nh\u01b0 CryptoLocker v\u00e0 WannaCry g\u00e2y ra nhi\u1ec1u thi\u1ec7t h\u1ea1i l\u1edbn v\u1ec1 t\u00e0i ch\u00ednh v\u00e0 d\u1eef li\u1ec7u cho c\u00e1c t\u1ed5 ch\u1ee9c v\u00e0 doanh nghi\u1ec7p tr\u00ean to\u00e0n th\u1ebf gi\u1edbi.<\/p>\n\n\n\n<p>S\u1ef1 gia t\u0103ng c\u1ee7a k\u1ef9 thu\u1eadt t\u1ea5n c\u00f4ng m\u1edbi nh\u01b0 Advanced Persistent Threats (APT) v\u00e0 \u0111e d\u1ecda t\u1eeb c\u00e1c nh\u00f3m hacker c\u00f3 chuy\u00ean m\u00f4n cao g\u1eafn v\u1edbi c\u00e1c qu\u1ed1c gia. Xu h\u01b0\u1edbng \u0111\u00e1nh c\u1eafp ti\u1ec1n \u0111i\u1ec7n t\u1eed v\u00e0 ti\u1ec1n m\u00e3 h\u00f3a b\u1eb1ng c\u00e1c lo\u1ea1i malware nh\u01b0 miner malware (m\u00e3 khai th\u00e1c ti\u1ec1n m\u00e3 h\u00f3a) v\u00e0 banking trojan (trojan li\u00ean quan \u0111\u1ebfn giao d\u1ecbch ng\u00e2n h\u00e0ng).<\/p>\n\n\n\n<p><strong>Nh\u1eefng n\u0103m 2020-2023: <\/strong>Ti\u1ebfp t\u1ee5c xu\u1ea5t hi\u1ec7n c\u00e1c lo\u1ea1i ransomware m\u1edbi v\u00e0 ti\u1ebfn h\u00f3a c\u1ee7a ch\u00fang, bao g\u1ed3m c\u00e1c bi\u1ebfn th\u1ec3 ph\u1ee9c t\u1ea1p, ph\u01b0\u01a1ng th\u1ee9c ti\u1ebfp c\u1eadn m\u1edbi v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u00f2i h\u1ecfi ng\u00e0y c\u00e0ng t\u0103ng.<\/p>\n\n\n\n<p>T\u00edch h\u1ee3p tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o v\u00e0 h\u1ecdc m\u00e1y v\u00e0o c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng malware, gi\u00fap ch\u00fang t\u1ef1 \u0111\u1ed9ng h\u00f3a v\u00e0 t\u1ea5n c\u00f4ng hi\u1ec7u qu\u1ea3 h\u01a1n.<\/p>\n\n\n\n<p><strong>2. S\u1ef1 kh\u00e1c bi\u1ec7t gi\u1eefa Ransomware vs Malware.<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"618\" height=\"279\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-335.png\" alt=\"\" class=\"wp-image-7150\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-335.png 618w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-335-600x271.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-335-300x135.png 300w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/figure>\n<\/div>\n\n\n<p>Ch\u00fang ta s\u1ebd c\u00f9ng ph\u00e2n t\u00edch s\u1ef1 kh\u00e1c bi\u1ec7t gi\u1eefa <strong>Ransomware vs Malware<\/strong> \u1edf c\u00e1c kh\u00eda c\u1ea1nh sau.<\/p>\n\n\n\n<p><strong>2.1 T\u00ednh ch\u1ea5t v\u00e0 m\u1ee5c ti\u00eau<\/strong>.<\/p>\n\n\n\n<p><strong>Malware:<\/strong> Malware l\u00e0 m\u1ed9t thu\u1eadt ng\u1eef t\u1ed5ng qu\u00e1t, bao g\u1ed3m m\u1ed9t lo\u1ea1t c\u00e1c ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i nh\u1eb1m th\u1ef1c hi\u1ec7n c\u00e1c ho\u1ea1t \u0111\u1ed9ng tr\u00e1i ph\u00e9p v\u00e0 g\u00e2y h\u1ea1i \u0111\u1ed1i v\u1edbi m\u00e1y t\u00ednh v\u00e0 h\u1ec7 th\u1ed1ng. M\u1ee5c ti\u00eau c\u1ee7a malware bao g\u1ed3m l\u00e2y nhi\u1ec5m v\u00e0 sao ch\u00e9p \u0111\u1ec3 lan truy\u1ec1n, thu th\u1eadp th\u00f4ng tin c\u00e1 nh\u00e2n, \u0111\u00e1nh c\u1eafp th\u00f4ng tin t\u00e0i kho\u1ea3n, t\u1ea5n c\u00f4ng h\u1ec7 th\u1ed1ng, l\u00e0m h\u1ecfng d\u1eef li\u1ec7u, theo d\u00f5i ho\u1ea1t \u0111\u1ed9ng tr\u1ef1c tuy\u1ebfn v\u00e0 nhi\u1ec1u h\u00e0nh vi kh\u00e1c nhau.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-337-1024x512.png\" alt=\"\" class=\"wp-image-7152\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-337-1024x512.png 1024w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-337-600x300.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-337-300x150.png 300w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-337-768x384.png 768w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-337.png 1072w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Ransomware: <\/strong>L\u00e0 m\u1ed9t lo\u1ea1i malware \u0111\u1eb7c bi\u1ec7t, ransomware t\u1eadp trung v\u00e0o vi\u1ec7c m\u00e3 h\u00f3a d\u1eef li\u1ec7u ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n. M\u1ee5c ti\u00eau c\u1ee7a ransomware l\u00e0 thu h\u00fat ti\u1ec1n chu\u1ed9c t\u1eeb n\u1ea1n nh\u00e2n b\u1eb1ng c\u00e1ch y\u00eau c\u1ea7u h\u1ecd tr\u1ea3 m\u1ed9t kho\u1ea3n ti\u1ec1n qua ti\u1ec1n \u0111i\u1ec7n t\u1eed \u0111\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c kh\u00f3a gi\u1ea3i m\u00e3 v\u00e0 truy c\u1eadp l\u1ea1i d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh.<\/p>\n\n\n\n<p><strong>2.2 M\u1ee5c \u0111\u00edch t\u1ea5n c\u00f4ng.<\/strong><\/p>\n\n\n\n<p><strong>Malware: <\/strong>Ph\u1ea7n l\u1edbn c\u00e1c lo\u1ea1i malware kh\u00f4ng y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c. Ch\u00fang c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u00e1 nh\u00e2n v\u00e0 t\u00e0i kho\u1ea3n, g\u00e2y h\u1ea1i \u0111\u1ebfn h\u1ec7 th\u1ed1ng v\u00e0 g\u00e2y r\u1ed1i cho ng\u01b0\u1eddi d\u00f9ng, nh\u01b0ng kh\u00f4ng y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 ti\u1ec1n.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"495\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-339.png\" alt=\"\" class=\"wp-image-7154\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-339.png 938w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-339-600x317.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-339-300x158.png 300w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-339-768x405.png 768w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Ransomware:<\/strong> \u0110\u1eb7c tr\u01b0ng c\u1ee7a ransomware l\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c. Khi n\u1ea1n nh\u00e2n b\u1ecb t\u1ea5n c\u00f4ng, h\u1ecd s\u1ebd nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t th\u00f4ng b\u00e1o chu\u1ed9c v\u1edbi h\u01b0\u1edbng d\u1eabn v\u1ec1 c\u00e1ch thanh to\u00e1n ti\u1ec1n \u0111\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c kh\u00f3a gi\u1ea3i m\u00e3. Hacker th\u01b0\u1eddng y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 ti\u1ec1n qua ti\u1ec1n \u0111i\u1ec7n t\u1eed \u0111\u1ec3 gi\u1eef b\u00ed m\u1eadt v\u1ec1 giao d\u1ecbch v\u00e0 d\u1ec5 d\u00e0ng thu th\u1eadp ti\u1ec1n.<\/p>\n\n\n\n<p><strong>2.3 C\u01a1 ch\u1ebf t\u1ea5n c\u00f4ng.<\/strong><\/p>\n\n\n\n<p><strong>Malware:<\/strong> Malware c\u00f3 th\u1ec3 x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng qua nhi\u1ec1u ph\u01b0\u01a1ng th\u1ee9c, bao g\u1ed3m email gi\u1ea3 m\u1ea1o, trang web \u0111\u1ed9c h\u1ea1i, t\u1ec7p \u0111\u00ednh k\u00e8m, l\u1ee3i d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt, ho\u1eb7c s\u1eed d\u1ee5ng c\u00e1c exploit kits. N\u00f3 c\u00f3 th\u1ec3 lan truy\u1ec1n qua c\u00e1c ph\u01b0\u01a1ng ti\u1ec7n truy\u1ec1n th\u00f4ng, m\u1ea1ng n\u1ed9i b\u1ed9 v\u00e0 internet.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"411\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-340.png\" alt=\"\" class=\"wp-image-7155\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-340.png 730w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-340-600x338.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-340-300x169.png 300w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Ransomware:<\/strong> Ransomware th\u01b0\u1eddng \u0111\u01b0\u1ee3c ph\u00e2n ph\u1ed1i qua c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng phishing, email gi\u1ea3 m\u1ea1o, drive-by download, ho\u1eb7c s\u1eed d\u1ee5ng c\u00e1c exploit kits \u0111\u1ec3 khai th\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt. Khi n\u1ea1n nh\u00e2n m\u1edf t\u1ec7p \u0111\u00ednh k\u00e8m ho\u1eb7c truy c\u1eadp v\u00e0o c\u00e1c trang web \u0111\u1ed9c h\u1ea1i, ransomware s\u1ebd b\u1eaft \u0111\u1ea7u t\u1ea5n c\u00f4ng v\u00e0 m\u00e3 h\u00f3a d\u1eef li\u1ec7u c\u1ee7a n\u1ea1n nh\u00e2n.<\/p>\n\n\n\n<p><strong>2.4 H\u1eadu qu\u1ea3.<\/strong><\/p>\n\n\n\n<p><strong>Malware<\/strong>: H\u1eadu qu\u1ea3 c\u1ee7a malware c\u00f3 th\u1ec3 r\u1ea5t \u0111a d\u1ea1ng, t\u1eeb m\u1ea5t d\u1eef li\u1ec7u, h\u1ecfng h\u00f3c h\u1ec7 th\u1ed1ng, \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn hi\u1ec7u su\u1ea5t ho\u1ea1t \u0111\u1ed9ng c\u1ee7a m\u00e1y t\u00ednh, t\u00e0i kho\u1ea3n v\u00e0 th\u00f4ng tin c\u00e1 nh\u00e2n b\u1ecb \u0111\u00e1nh c\u1eafp, cho \u0111\u1ebfn c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng l\u1edbn h\u01a1n. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"319\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-342.png\" alt=\"\" class=\"wp-image-7157\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-342.png 568w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-342-300x168.png 300w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Ransomware:<\/strong> H\u1eadu qu\u1ea3 c\u1ee7a ransomware c\u00f3 th\u1ec3 l\u00e0 n\u1ea1n nh\u00e2n m\u1ea5t d\u1eef li\u1ec7u quan tr\u1ecdng, kh\u00f4ng th\u1ec3 truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng ho\u1eb7c t\u1ec7p c\u1ee7a h\u1ecd cho \u0111\u1ebfn khi tr\u1ea3 ti\u1ec1n chu\u1ed9c. N\u1ebfu n\u1ea1n nh\u00e2n kh\u00f4ng tr\u1ea3 ti\u1ec1n, h\u1ecd c\u00f3 th\u1ec3 m\u1ea5t ho\u1eb7c kh\u00f4ng th\u1ec3 s\u1eed d\u1ee5ng d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh.<\/p>\n\n\n\n<p><strong>3. Gi\u1ea3i ph\u00e1p Sophos Endpoint b\u1ea3o v\u1ec7 t\u1ea5n c\u00f4ng Malware vs Ransomware.<\/strong><\/p>\n\n\n\n<p>Sophos Endpoint l\u00e0 m\u1ed9t ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt d\u00f9ng \u0111\u1ec3 b\u1ea3o v\u1ec7 c\u00e1c thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i m\u1ea1ng, bao g\u1ed3m m\u00e1y t\u00ednh, m\u00e1y ch\u1ee7 v\u00e0 thi\u1ebft b\u1ecb di \u0111\u1ed9ng, kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda b\u1ea3o m\u1eadt nh\u01b0 ransomware v\u00e0 malware. N\u00f3 cung c\u1ea5p m\u1ed9t s\u1ed1 t\u00ednh n\u0103ng ch\u1ed1ng ransomware v\u00e0 malware sau:<\/p>\n\n\n\n<p><strong>M\u00f4 h\u00ecnh ph\u00f2ng th\u1ee7 \u0111a l\u1edbp:<\/strong> Sophos Endpoint s\u1eed d\u1ee5ng m\u00f4 h\u00ecnh ph\u00f2ng th\u1ee7 \u0111a l\u1edbp, bao g\u1ed3m ch\u1ee9c n\u0103ng b\u1ea3o v\u1ec7 t\u01b0\u1eddng l\u1eeda, ch\u1ed1ng x\u00e2m nh\u1eadp, b\u1ea3o v\u1ec7 email v\u00e0 web, gi\u00fap ng\u0103n ch\u1eb7n c\u00e1c m\u1ed1i \u0111e d\u1ecda t\u1eeb vi\u1ec7c x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p><strong>Ph\u00e1t hi\u1ec7n v\u00e0 ng\u0103n ch\u1eb7n ransomware: <\/strong>Sophos Endpoint s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 ph\u00e1t hi\u1ec7n h\u00e0nh vi c\u1ea7n thi\u1ebft \u0111\u1ec3 ph\u00e1t hi\u1ec7n v\u00e0 ch\u1eb7n ransomware tr\u01b0\u1edbc khi n\u00f3 c\u00f3 th\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u c\u1ee7a n\u1ea1n nh\u00e2n. N\u00f3 theo d\u00f5i c\u00e1c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u00e1c t\u1ec7p v\u00e0 ch\u01b0\u01a1ng tr\u00ecnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n c\u00e1c h\u00e0nh vi \u0111\u00e1ng ng\u1edd c\u1ee7a ransomware.<\/p>\n\n\n\n<p><strong>Gi\u00e1m s\u00e1t v\u00e0 ch\u1eb7n c\u00e1c URL \u0111\u1ed9c h\u1ea1i:<\/strong> Sophos Endpoint c\u00f3 kh\u1ea3 n\u0103ng gi\u00e1m s\u00e1t v\u00e0 ch\u1eb7n c\u00e1c URL \u0111\u1ed9c h\u1ea1i, tr\u00e1nh nguy c\u01a1 truy c\u1eadp v\u00e0o c\u00e1c trang web ch\u1ee9a ransomware v\u00e0 malware.<\/p>\n\n\n\n<p><strong>H\u1ec7 th\u1ed1ng qu\u1ea3n l\u00fd trung t\u00e2m: <\/strong>Sophos Endpoint cung c\u1ea5p m\u1ed9t h\u1ec7 th\u1ed1ng qu\u1ea3n l\u00fd trung t\u00e2m \u0111\u1ec3 qu\u1ea3n l\u00fd v\u00e0 gi\u00e1m s\u00e1t to\u00e0n b\u1ed9 m\u1ea1ng, t\u1eeb \u0111\u00f3 cung c\u1ea5p ki\u1ec3m so\u00e1t t\u1ed1t h\u01a1n v\u00e0 gi\u00fap qu\u1ea3n tr\u1ecb vi\u00ean \u0111\u00e1p \u1ee9ng nhanh ch\u00f3ng \u0111\u1ed1i v\u1edbi c\u00e1c s\u1ef1 c\u1ed1 b\u1ea3o m\u1eadt.<\/p>\n\n\n\n<p><strong>Qu\u00e9t th\u1eddi gian th\u1ef1c v\u00e0 qu\u00e9t \u0111\u1ecbnh k\u1ef3:<\/strong> Sophos Endpoint th\u1ef1c hi\u1ec7n qu\u00e9t th\u1eddi gian th\u1ef1c tr\u00ean c\u00e1c t\u1ec7p v\u00e0 ch\u01b0\u01a1ng tr\u00ecnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n c\u00e1c m\u1ed1i \u0111e d\u1ecda nguy hi\u1ec3m. Ngo\u00e0i ra, n\u00f3 c\u0169ng th\u1ef1c hi\u1ec7n qu\u00e9t \u0111\u1ecbnh k\u1ef3 tr\u00ean h\u1ec7 th\u1ed1ng \u0111\u1ec3 t\u00ecm ki\u1ebfm v\u00e0 lo\u1ea1i b\u1ecf c\u00e1c malware \u0111\u00e3 th\u00e2m nh\u1eadp.<\/p>\n\n\n\n<p><strong>H\u1ed9p c\u00e1t ch\u1ed1ng ransomware: <\/strong>Sophos Endpoint c\u00f3 t\u00edch h\u1ee3p c\u00f4ng ngh\u1ec7 &#8220;H\u1ed9p c\u00e1t&#8221; (Sandboxing) \u0111\u1ec3 gi\u00fap ph\u00e1t hi\u1ec7n c\u00e1c t\u00e1c nh\u00e2n \u0111\u1ed9c h\u1ea1i m\u00e0 kh\u00f4ng th\u1ec3 nh\u00ecn th\u1ea5y tr\u01b0\u1edbc \u0111\u00f3. H\u1ed9p c\u00e1t cho ph\u00e9p nghi\u00ean c\u1ee9u c\u00e1c m\u1eabu malware v\u00e0 ransomware trong m\u00f4i tr\u01b0\u1eddng c\u00f4 l\u1eadp \u0111\u1ec3 t\u00ecm hi\u1ec3u c\u00e1ch ch\u00fang ho\u1ea1t \u0111\u1ed9ng v\u00e0 t\u1ea1o c\u00e1c ch\u1eef k\u00fd \u0111\u1ec3 ph\u00e1t hi\u1ec7n ch\u00fang trong t\u01b0\u01a1ng lai.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.Kh\u00e1i ni\u1ec7m v\u1ec1 Ransomware v\u00e0 Malware. 1.1 Ransomware. Ransomware l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i (malware) \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi hacker \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u, t\u1ec7p tin, ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n. Sau khi d\u1eef li\u1ec7u b\u1ecb m\u00e3 h\u00f3a ho\u1eb7c b\u1ecb kh\u00f3a, hacker y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":7158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[18,80,17,15],"tags":[116,184,92,97],"class_list":["post-7146","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","category-huong-dan-tai-lieu","category-bao-mat","category-uncategorized","tag-malware","tag-malware-vs-ransomware","tag-ransomware","tag-sophos-endpoint","entry","has-media"],"_links":{"self":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/7146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/comments?post=7146"}],"version-history":[{"count":0,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/7146\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media\/7158"}],"wp:attachment":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media?parent=7146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/categories?post=7146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/tags?post=7146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}