{"id":7160,"date":"2023-07-27T15:07:06","date_gmt":"2023-07-27T08:07:06","guid":{"rendered":"https:\/\/vacif.com\/?p=7160"},"modified":"2023-07-27T15:07:06","modified_gmt":"2023-07-27T08:07:06","slug":"tim-hieu-ve-dac-diem-va-cach-hoat-dong-cua-cac-loai-ransomware","status":"publish","type":"post","link":"https:\/\/vacif.com\/en\/tim-hieu-ve-dac-diem-va-cach-hoat-dong-cua-cac-loai-ransomware\/","title":{"rendered":"T\u00ccM HI\u1ec2U V\u1ec0 \u0110\u1eb6C \u0110I\u1ec2M V\u00c0 C\u00c1CH HO\u1ea0T \u0110\u1ed8NG C\u1ee6A C\u00c1C LO\u1ea0I RANSOMWARE."},"content":{"rendered":"\n<p><strong>1.Kh\u00e1i ni\u1ec7m v\u1ec1 Ransomware.<\/strong><\/p>\n\n\n\n<p>T\u1eeb &#8220;<strong>ransomware<\/strong>&#8221; b\u1eaft ngu\u1ed3n t\u1eeb hai th\u00e0nh ph\u1ea7n ch\u00ednh: &#8220;<strong>ransom&#8221; (ti\u1ec1n chu\u1ed9c)<\/strong> v\u00e0 <strong>&#8220;ware<\/strong>&#8221; (c\u1ee5 th\u1ec3 l\u00e0 p<strong>h\u1ea7n m\u1ec1m<\/strong>). Ransomware l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i (malware) \u0111\u1eb7c bi\u1ec7t, \u0111\u01b0\u1ee3c t\u1ea1o ra v\u1edbi m\u1ee5c ti\u00eau m\u00e3 h\u00f3a d\u1eef li\u1ec7u ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n. Khi m\u1ed9t m\u00e1y t\u00ednh, m\u00e1y ch\u1ee7 ho\u1eb7c thi\u1ebft b\u1ecb di \u0111\u1ed9ng b\u1ecb t\u1ea5n c\u00f4ng b\u1edfi ransomware, c\u00e1c t\u1ec7p d\u1eef li\u1ec7u quan tr\u1ecdng tr\u00ean h\u1ec7 th\u1ed1ng \u0111\u00f3 s\u1ebd b\u1ecb m\u00e3 h\u00f3a v\u00e0 tr\u1edf th\u00e0nh kh\u00f4ng th\u1ec3 \u0111\u1ecdc \u0111\u01b0\u1ee3c m\u00e0 kh\u00f4ng c\u00f3 kh\u00f3a gi\u1ea3i m\u00e3 \u0111\u00fang.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"672\" height=\"378\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-343.png\" alt=\"\" class=\"wp-image-7161\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-343.png 672w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-343-600x338.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-343-300x169.png 300w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/figure>\n<\/div>\n\n\n<p>Sau khi t\u1ea5n c\u00f4ng th\u00e0nh c\u00f4ng, ransomware s\u1ebd hi\u1ec3n th\u1ecb th\u00f4ng b\u00e1o y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c (ransom note) tr\u00ean m\u00e0n h\u00ecnh c\u1ee7a n\u1ea1n nh\u00e2n. Trong th\u00f4ng b\u00e1o n\u00e0y, hacker s\u1ebd y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 m\u1ed9t kho\u1ea3n ti\u1ec1n chu\u1ed9c th\u00f4ng qua ti\u1ec1n \u0111i\u1ec7n t\u1eed nh\u01b0 Bitcoin, Ethereum ho\u1eb7c c\u00e1c ph\u01b0\u01a1ng th\u1ee9c thanh to\u00e1n tr\u1ef1c tuy\u1ebfn kh\u00e1c \u0111\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c kh\u00f3a gi\u1ea3i m\u00e3 v\u00e0 l\u1ea5y l\u1ea1i quy\u1ec1n truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p>Ransomware c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m v\u00e0o h\u1ec7 th\u1ed1ng th\u00f4ng qua nhi\u1ec1u c\u00e1ch, bao g\u1ed3m c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng phishing qua email gi\u1ea3 m\u1ea1o, t\u1ea3i xu\u1ed1ng t\u1eeb c\u00e1c trang web \u0111\u1ed9c h\u1ea1i, s\u1eed d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt, v\u00e0 khai th\u00e1c c\u00e1c \u0111i\u1ec3m y\u1ebfu trong h\u1ec7 th\u1ed1ng m\u1ea1ng.<\/p>\n\n\n\n<p><strong>2. S\u1ef1 nguy hi\u1ec3m c\u1ee7a Ransomware.<\/strong><\/p>\n\n\n\n<p>Ransomware l\u00e0 m\u1ed9t trong nh\u1eefng m\u1ed1i \u0111e d\u1ecda nguy hi\u1ec3m v\u00e0 ph\u1ed5 bi\u1ebfn nh\u1ea5t trong l\u0129nh v\u1ef1c an ninh m\u1ea1ng. N\u00f3 c\u00f3 th\u1ec3 g\u00e2y ra h\u1eadu qu\u1ea3 nghi\u00eam tr\u1ecdng cho c\u00e1 nh\u00e2n, doanh nghi\u1ec7p v\u00e0 t\u1ed5 ch\u1ee9c. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 kh\u00eda c\u1ea1nh quan tr\u1ecdng v\u1ec1 m\u1ed1i \u0111e d\u1ecda ransomware:<\/p>\n\n\n\n<p><strong>M\u00e3 h\u00f3a d\u1eef li\u1ec7u:<\/strong> Ransomware m\u00e3 h\u00f3a (Encrypting ransomware) l\u00e0 lo\u1ea1i ph\u1ed5 bi\u1ebfn nh\u1ea5t v\u00e0 nguy hi\u1ec3m nh\u1ea5t. N\u00f3 s\u1eed d\u1ee5ng c\u00e1c thu\u1eadt to\u00e1n m\u00e3 h\u00f3a m\u1ea1nh m\u1ebd \u0111\u1ec3 m\u00e3 h\u00f3a c\u00e1c t\u1ec7p quan tr\u1ecdng tr\u00ean h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n, khi\u1ebfn cho d\u1eef li\u1ec7u tr\u1edf n\u00ean kh\u00f4ng th\u1ec3 \u0111\u1ecdc \u0111\u01b0\u1ee3c m\u00e0 kh\u00f4ng c\u00f3 kh\u00f3a gi\u1ea3i m\u00e3 \u0111\u00fang. \u0110i\u1ec1u n\u00e0y l\u00e0m h\u1ecfng v\u00e0 ng\u0103n ch\u1eb7n ng\u01b0\u1eddi d\u00f9ng truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p><strong>Y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c:<\/strong> Sau khi m\u00e3 h\u00f3a d\u1eef li\u1ec7u, ransomware hi\u1ec3n th\u1ecb th\u00f4ng b\u00e1o y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c. Hacker y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n tr\u1ea3 ti\u1ec1n th\u00f4ng qua ti\u1ec1n \u0111i\u1ec7n t\u1eed nh\u01b0 Bitcoin, Ethereum ho\u1eb7c c\u00e1c ph\u01b0\u01a1ng th\u1ee9c thanh to\u00e1n tr\u1ef1c tuy\u1ebfn kh\u00e1c \u0111\u1ec3 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3 v\u00e0 kh\u00f4i ph\u1ee5c quy\u1ec1n truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u.<\/p>\n\n\n\n<p><strong>L\u00e2y nhi\u1ec5m v\u00e0 lan truy\u1ec1n:<\/strong> Ransomware c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m v\u00e0o h\u1ec7 th\u1ed1ng th\u00f4ng qua nhi\u1ec1u c\u00e1ch, bao g\u1ed3m c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng phishing qua email gi\u1ea3 m\u1ea1o, t\u1ea3i xu\u1ed1ng t\u1eeb c\u00e1c trang web \u0111\u1ed9c h\u1ea1i, s\u1eed d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt v\u00e0 khai th\u00e1c c\u00e1c \u0111i\u1ec3m y\u1ebfu trong h\u1ec7 th\u1ed1ng m\u1ea1ng. M\u1ed9t khi n\u00f3 \u0111\u00e3 x\u00e2m nh\u1eadp v\u00e0o m\u1ed9t m\u00e1y t\u00ednh ho\u1eb7c m\u00e1y ch\u1ee7, n\u00f3 c\u00f3 th\u1ec3 lan truy\u1ec1n qua m\u1ea1ng n\u1ed9i b\u1ed9 v\u00e0 l\u00e2y nhi\u1ec5m c\u00e1c thi\u1ebft b\u1ecb kh\u00e1c.<\/p>\n\n\n\n<p><strong>H\u1eadu qu\u1ea3 nghi\u00eam tr\u1ecdng: <\/strong>N\u1ebfu n\u1ea1n nh\u00e2n kh\u00f4ng tr\u1ea3 ti\u1ec1n chu\u1ed9c ho\u1eb7c kh\u00f4ng c\u00f3 kh\u1ea3 n\u0103ng kh\u00f4i ph\u1ee5c d\u1eef li\u1ec7u, h\u1eadu qu\u1ea3 c\u00f3 th\u1ec3 r\u1ea5t nghi\u00eam tr\u1ecdng. D\u1eef li\u1ec7u quan tr\u1ecdng c\u00f3 th\u1ec3 b\u1ecb m\u1ea5t ho\u00e0n to\u00e0n, g\u00e2y ra thi\u1ec7t h\u1ea1i kinh t\u1ebf v\u00e0 \u1ea3nh h\u01b0\u1edfng x\u1ea5u \u0111\u1ebfn ho\u1ea1t \u0111\u1ed9ng kinh doanh v\u00e0 \u0111\u1eddi s\u1ed1ng c\u00e1 nh\u00e2n c\u1ee7a n\u1ea1n nh\u00e2n.<\/p>\n\n\n\n<p><strong>T\u1ea5n c\u00f4ng v\u00e0o t\u1ed5 ch\u1ee9c: <\/strong>Ransomware th\u01b0\u1eddng nh\u1eafm v\u00e0o c\u00e1c t\u1ed5 ch\u1ee9c l\u1edbn, ch\u00ednh ph\u1ee7, b\u1ec7nh vi\u1ec7n, tr\u01b0\u1eddng h\u1ecdc v\u00e0 c\u00e1c c\u01a1 quan c\u00f4ng c\u1ed9ng, n\u01a1i c\u00f3 nhi\u1ec1u d\u1eef li\u1ec7u quan tr\u1ecdng v\u00e0 c\u00e1c th\u00f4ng tin nh\u1ea1y c\u1ea3m kh\u00e1c.<\/p>\n\n\n\n<p><strong>S\u1ef1 ti\u1ebfn b\u1ed9 c\u1ee7a ransomware:<\/strong> Ransomware ng\u00e0y c\u00e0ng ph\u00e1t tri\u1ec3n v\u00e0 ti\u1ebfn b\u1ed9 h\u01a1n, khi\u1ebfn vi\u1ec7c ph\u00f2ng ch\u1ed1ng v\u00e0 lo\u1ea1i b\u1ecf ch\u00fang tr\u1edf n\u00ean ph\u1ee9c t\u1ea1p h\u01a1n. Hacker li\u00ean t\u1ee5c c\u1eadp nh\u1eadt v\u00e0 t\u1ed1i \u01b0u h\u00f3a ransomware c\u1ee7a h\u1ecd \u0111\u1ec3 tr\u00e1nh ph\u00e1t hi\u1ec7n v\u00e0 ng\u0103n ch\u1eb7n t\u1eeb c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt th\u00f4ng th\u01b0\u1eddng.<\/p>\n\n\n\n<p><strong>3. Ph\u00e2n t\u00edch \u0111\u1eb7c \u0111i\u1ec3m v\u00e0 c\u00e1ch ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u00e1c lo\u1ea1i Ransomware.<\/strong><\/p>\n\n\n\n<p><strong>3.1 Ransomware m\u00e3 h\u00f3a (Encrypting ransomware).<\/strong><\/p>\n\n\n\n<p><strong>\u0110\u1eb7c \u0111i\u1ec3m:<\/strong> Lo\u1ea1i ransomware n\u00e0y l\u00e0 m\u1ed9t trong nh\u1eefng ph\u1ed5 bi\u1ebfn nh\u1ea5t v\u00e0 nguy hi\u1ec3m nh\u1ea5t. N\u00f3 s\u1eed d\u1ee5ng thu\u1eadt to\u00e1n m\u00e3 h\u00f3a m\u1ea1nh m\u1ebd \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u quan tr\u1ecdng tr\u00ean h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n, khi\u1ebfn cho c\u00e1c t\u1ec7p tr\u1edf th\u00e0nh kh\u00f4ng th\u1ec3 \u0111\u1ecdc \u0111\u01b0\u1ee3c m\u00e0 kh\u00f4ng c\u00f3 kh\u00f3a gi\u1ea3i m\u00e3 \u0111\u00fang.<\/p>\n\n\n\n<p><strong>C\u00e1ch ho\u1ea1t \u0111\u1ed9ng: <\/strong>Khi ransomware m\u00e3 h\u00f3a x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng, n\u00f3 qu\u00e9t v\u00e0 m\u00e3 h\u00f3a c\u00e1c lo\u1ea1i t\u1ec7p d\u1eef li\u1ec7u th\u00f4ng th\u01b0\u1eddng nh\u01b0 v\u0103n b\u1ea3n, h\u00ecnh \u1ea3nh, video, t\u00e0i li\u1ec7u c\u00f4ng vi\u1ec7c v\u00e0 c\u1ea3 d\u1eef li\u1ec7u c\u1ee7a c\u00e1c \u1ee9ng d\u1ee5ng. Sau \u0111\u00f3, n\u00f3 hi\u1ec3n th\u1ecb th\u00f4ng b\u00e1o y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c, th\u01b0\u1eddng y\u00eau c\u1ea7u tr\u1ea3 ti\u1ec1n qua ti\u1ec1n \u0111i\u1ec7n t\u1eed \u0111\u1ec3 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3 v\u00e0 kh\u00f4i ph\u1ee5c d\u1eef li\u1ec7u.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"437\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-344.png\" alt=\"\" class=\"wp-image-7162\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-344.png 630w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-344-600x416.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-344-300x208.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>C\u00f4ng ngh\u1ec7 m\u00e3 h\u00f3a \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>M\u00e3 h\u00f3a m\u00e3 \u0111\u1ed1i x\u1ee9ng: <\/strong>Encrypting ransomware th\u01b0\u1eddng s\u1eed d\u1ee5ng m\u00e3 h\u00f3a m\u00e3 \u0111\u1ed1i x\u1ee9ng \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u c\u1ee7a n\u1ea1n nh\u00e2n. Trong m\u00e3 h\u00f3a m\u00e3 \u0111\u1ed1i x\u1ee9ng, c\u00f9ng m\u1ed9t kh\u00f3a \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 m\u00e3 h\u00f3a v\u00e0 gi\u1ea3i m\u00e3 d\u1eef li\u1ec7u. \u0110i\u1ec1u n\u00e0y \u0111\u1ea3m b\u1ea3o r\u1eb1ng ch\u1ec9 nh\u1eefng ng\u01b0\u1eddi c\u00f3 kh\u00f3a gi\u1ea3i m\u00e3 \u0111\u00fang m\u1edbi c\u00f3 th\u1ec3 truy c\u1eadp d\u1eef li\u1ec7u \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a.<\/li>\n\n\n\n<li><strong>M\u00e3 h\u00f3a m\u00e3 b\u1ea5t \u0111\u1ed1i x\u1ee9ng (Asymmetric Encryption):<\/strong> M\u1ed9t s\u1ed1 ransomware s\u1eed d\u1ee5ng m\u00e3 h\u00f3a m\u00e3 b\u1ea5t \u0111\u1ed1i x\u1ee9ng nh\u01b0 RSA (Rivest-Shamir-Adleman). Trong m\u00e3 h\u00f3a m\u00e3 b\u1ea5t \u0111\u1ed1i x\u1ee9ng, m\u1ed9t c\u1eb7p kh\u00f3a \u0111\u01b0\u1ee3c t\u1ea1o ra, bao g\u1ed3m kh\u00f3a c\u00f4ng khai v\u00e0 kh\u00f3a ri\u00eang t\u01b0. Kh\u00f3a c\u00f4ng khai \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u v\u00e0 kh\u00f3a ri\u00eang t\u01b0 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 gi\u1ea3i m\u00e3 d\u1eef li\u1ec7u. Kh\u00f3a ri\u00eang t\u01b0 \u0111\u01b0\u1ee3c gi\u1eef b\u00ed m\u1eadt v\u00e0 ch\u1ec9 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi k\u1ebb t\u1ea5n c\u00f4ng \u0111\u1ec3 gi\u1ea3i m\u00e3 d\u1eef li\u1ec7u sau khi ti\u1ec1n chu\u1ed9c \u0111\u01b0\u1ee3c tr\u1ea3.<\/li>\n\n\n\n<li><strong>AES (Advanced Encryption Standard): <\/strong>AES l\u00e0 m\u1ed9t thu\u1eadt to\u00e1n m\u00e3 h\u00f3a \u0111\u1ed1i x\u1ee9ng ph\u1ed5 bi\u1ebfn v\u00e0 m\u1ea1nh m\u1ebd \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng trong encrypting ransomware \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u. AES \u0111\u00e3 \u0111\u01b0\u1ee3c ch\u1ea5p nh\u1eadn l\u00e0 ti\u00eau chu\u1ea9n m\u00e3 h\u00f3a c\u1ee7a Ch\u00ednh ph\u1ee7 Hoa K\u1ef3.<\/li>\n\n\n\n<li><strong>C\u00e1c thu\u1eadt to\u00e1n m\u00e3 h\u00f3a kh\u00e1c:<\/strong> Ngo\u00e0i RSA v\u00e0 AES, encrypting ransomware c\u0169ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1c thu\u1eadt to\u00e1n m\u00e3 h\u00f3a kh\u00e1c nh\u01b0 Blowfish, Triple DES (3DES) ho\u1eb7c ECC (Elliptic Curve Cryptography) \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u.<\/li>\n\n\n\n<li><strong>Random Key Generation:<\/strong> Encrypting ransomware th\u01b0\u1eddng t\u1ea1o ng\u1eabu nhi\u00ean c\u00e1c kh\u00f3a m\u00e3 h\u00f3a \u0111\u1ec3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u, l\u00e0m cho vi\u1ec7c gi\u1ea3i m\u00e3 tr\u1edf n\u00ean kh\u00f3 kh\u0103n h\u01a1n m\u00e0 kh\u00f4ng c\u00f3 kh\u00f3a gi\u1ea3i m\u00e3 \u0111\u00fang.<\/li>\n\n\n\n<li><strong>K\u1ef9 thu\u1eadt k\u1ebft h\u1ee3p: <\/strong>M\u1ed9t s\u1ed1 phi\u00ean b\u1ea3n ransomware k\u1ebft h\u1ee3p nhi\u1ec1u k\u1ef9 thu\u1eadt m\u00e3 h\u00f3a kh\u00e1c nhau \u0111\u1ec3 l\u00e0m cho qu\u00e1 tr\u00ecnh m\u00e3 h\u00f3a v\u00e0 gi\u1ea3i m\u00e3 ph\u1ee9c t\u1ea1p h\u01a1n, \u0111\u1ed3ng th\u1eddi l\u00e0m t\u0103ng t\u00ednh b\u1ea3o m\u1eadt c\u1ee7a ch\u00fang.<\/li>\n<\/ul>\n\n\n\n<p><strong>V\u00ed d\u1ee5: WannaCry <\/strong>l\u00e0 m\u1ed9t lo\u1ea1i ransomware m\u00e3 h\u00f3a ph\u1ed5 bi\u1ebfn v\u00e0 nguy hi\u1ec3m, xu\u1ea5t hi\u1ec7n l\u1ea7n \u0111\u1ea7u v\u00e0o n\u0103m 2017. N\u00f3 l\u00e2y nhi\u1ec5m qua c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt trong h\u1ec7 \u0111i\u1ec1u h\u00e0nh Windows v\u00e0 sau \u0111\u00f3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u quan tr\u1ecdng tr\u00ean h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n. N\u1ea1n nh\u00e2n nh\u00ecn th\u1ea5y m\u1ed9t th\u00f4ng b\u00e1o y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c v\u00e0 ph\u1ea3i tr\u1ea3 ti\u1ec1n b\u1eb1ng Bitcoin \u0111\u1ec3 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3 v\u00e0 kh\u00f4i ph\u1ee5c d\u1eef li\u1ec7u.<\/p>\n\n\n\n<p><strong>3.2 Ransomware kh\u00f3a (Locker ransomware).<\/strong><\/p>\n\n\n\n<p><strong>\u0110\u1eb7c \u0111i\u1ec3m: <\/strong>Lo\u1ea1i ransomware n\u00e0y kh\u00f4ng m\u00e3 h\u00f3a d\u1eef li\u1ec7u, nh\u01b0ng kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n, khi\u1ebfn h\u1ecd kh\u00f4ng th\u1ec3 truy c\u1eadp v\u00e0o m\u00e1y t\u00ednh ho\u1eb7c c\u00e1c t\u1ec7p quan tr\u1ecdng c\u1ee7a m\u00ecnh.<\/p>\n\n\n\n<p><strong>C\u00e1ch ho\u1ea1t \u0111\u1ed9ng:<\/strong> Ransomware kh\u00f3a th\u01b0\u1eddng l\u00e0m h\u1ecfng c\u1eeda s\u1ed5 \u0111\u0103ng nh\u1eadp, m\u00e0n h\u00ecnh ch\u00ednh ho\u1eb7c c\u00e1c t\u1ec7p quan tr\u1ecdng, sau \u0111\u00f3 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 cung c\u1ea5p m\u1eadt kh\u1ea9u ho\u1eb7c kh\u00f3a truy c\u1eadp. Ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng th\u1ec3 ti\u1ebfp t\u1ee5c s\u1eed d\u1ee5ng m\u00e1y t\u00ednh cho \u0111\u1ebfn khi tr\u1ea3 ti\u1ec1n chu\u1ed9c v\u00e0 nh\u1eadn kh\u00f3a m\u1edf kh\u00f3a.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"460\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-345.png\" alt=\"\" class=\"wp-image-7163\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-345.png 795w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-345-600x347.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-345-300x174.png 300w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-345-768x444.png 768w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>C\u00f4ng ngh\u1ec7 kh\u00f3a \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Bootloader Locking: <\/strong>Locker ransomware c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 bootlocker \u0111\u1ec3 kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n ngay khi m\u00e1y t\u00ednh kh\u1edfi \u0111\u1ed9ng. \u0110i\u1ec1u n\u00e0y khi\u1ebfn ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng th\u1ec3 truy c\u1eadp v\u00e0o h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 t\u1ec7p c\u1ee7a h\u1ecd.<\/li>\n\n\n\n<li><strong>Lock Screen: <\/strong>Locker ransomware th\u01b0\u1eddng thay \u0111\u1ed5i m\u00e0n h\u00ecnh kh\u00f3a c\u1ee7a h\u1ec7 th\u1ed1ng v\u00e0 y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n nh\u1eadp m\u1eadt kh\u1ea9u ho\u1eb7c m\u00e3 \u0111\u1ec3 m\u1edf kh\u00f3a. Tuy nhi\u00ean, k\u1ebb t\u1ea5n c\u00f4ng kh\u00f4ng cung c\u1ea5p m\u1eadt kh\u1ea9u ho\u1eb7c m\u00e3 cho n\u1ea1n nh\u00e2n cho \u0111\u1ebfn khi h\u1ecd tr\u1ea3 ti\u1ec1n chu\u1ed9c.<\/li>\n\n\n\n<li><strong>Remote Desktop Protocol (RDP) Locking:<\/strong> M\u1ed9t s\u1ed1 locker ransomware c\u00f3 th\u1ec3 t\u1ea5n c\u00f4ng v\u00e0o d\u1ecbch v\u1ee5 Remote Desktop Protocol (RDP) \u0111\u1ec3 kh\u00f3a truy c\u1eadp t\u1eeb xa v\u00e0o m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n.<\/li>\n\n\n\n<li><strong>Thay \u0111\u1ed5i t\u1ec7p c\u1ea5u h\u00ecnh h\u1ec7 th\u1ed1ng:<\/strong> Locker ransomware c\u00f3 th\u1ec3 thay \u0111\u1ed5i t\u1ec7p c\u1ea5u h\u00ecnh h\u1ec7 th\u1ed1ng quan tr\u1ecdng, l\u00e0m cho h\u1ec7 th\u1ed1ng kh\u00f4ng th\u1ec3 ho\u1ea1t \u0111\u1ed9ng \u0111\u00fang c\u00e1ch v\u00e0 khi\u1ebfn ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng th\u1ec3 truy c\u1eadp v\u00e0o c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0 d\u1eef li\u1ec7u c\u1ee7a h\u1ecd.<\/li>\n\n\n\n<li><strong>M\u00e3 h\u00f3a c\u00e1c t\u1ec7p h\u1ec7 th\u1ed1ng:<\/strong> M\u1ed9t s\u1ed1 locker ransomware c\u00f3 th\u1ec3 m\u00e3 h\u00f3a c\u00e1c t\u1ec7p h\u1ec7 th\u1ed1ng c\u1ea7n thi\u1ebft \u0111\u1ec3 m\u00e1y t\u00ednh ho\u1ea1t \u0111\u1ed9ng \u0111\u00fang c\u00e1ch, l\u00e0m cho h\u1ec7 th\u1ed1ng tr\u1edf n\u00ean kh\u00f4ng th\u1ec3 s\u1eed d\u1ee5ng v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 cung c\u1ea5p kh\u00f3a gi\u1ea3i m\u00e3.<\/li>\n<\/ul>\n\n\n\n<p><strong>V\u00ed d\u1ee5:<\/strong> <strong>Reveton<\/strong> l\u00e0 m\u1ed9t v\u00ed d\u1ee5 \u0111i\u1ec3n h\u00ecnh c\u1ee7a ransomware kh\u00f3a. Khi nhi\u1ec5m v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n, n\u00f3 kh\u00f3a truy c\u1eadp v\u00e0o m\u00e1y t\u00ednh v\u00e0 hi\u1ec3n th\u1ecb m\u1ed9t th\u00f4ng b\u00e1o gi\u1ea3 m\u1ea1o t\u1eeb c\u1ea3nh s\u00e1t ho\u1eb7c c\u01a1 quan ph\u00e1p lu\u1eadt y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n ph\u1ea3i tr\u1ea3 ti\u1ec1n chu\u1ed9c v\u00ec vi ph\u1ea1m ph\u00e1p lu\u1eadt. \u0110\u1ec3 m\u1edf kh\u00f3a m\u00e1y t\u00ednh, n\u1ea1n nh\u00e2n ph\u1ea3i tr\u1ea3 m\u1ed9t kho\u1ea3n ti\u1ec1n nh\u1ea5t \u0111\u1ecbnh.<\/p>\n\n\n\n<p><strong>3.3 Doxware ho\u1eb7c LeakerLocker.<\/strong><\/p>\n\n\n\n<p><strong>\u0110\u1eb7c \u0111i\u1ec3m:<\/strong> Lo\u1ea1i ransomware n\u00e0y kh\u00f4ng m\u00e3 h\u00f3a ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u, m\u00e0 n\u00f3 \u0111e d\u1ecda c\u00f4ng b\u1ed1 ho\u1eb7c ti\u1ebft l\u1ed9 th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m c\u1ee7a n\u1ea1n nh\u00e2n n\u1ebfu kh\u00f4ng nh\u1eadn ti\u1ec1n chu\u1ed9c.<\/p>\n\n\n\n<p><strong>C\u00e1ch ho\u1ea1t \u0111\u1ed9ng:<\/strong> LeakerLocker th\u01b0\u1eddng hi\u1ec3n th\u1ecb c\u1ea3nh b\u00e1o r\u1eb1ng d\u1eef li\u1ec7u c\u1ee7a n\u1ea1n nh\u00e2n \u0111\u00e3 b\u1ecb sao ch\u00e9p v\u00e0 s\u1ebd \u0111\u01b0\u1ee3c c\u00f4ng b\u1ed1 n\u1ebfu kh\u00f4ng tr\u1ea3 ti\u1ec1n chu\u1ed9c. \u0110i\u1ec1u n\u00e0y g\u00e2y ra s\u1ef1 lo l\u1eafng v\u00e0 \u00e1p l\u1ef1c l\u1edbn \u0111\u1ed1i v\u1edbi n\u1ea1n nh\u00e2n, khi\u1ebfn h\u1ecd s\u1eb5n l\u00f2ng tr\u1ea3 ti\u1ec1n chu\u1ed9c \u0111\u1ec3 ng\u0103n ch\u1eb7n vi\u1ec7c ti\u1ebft l\u1ed9 th\u00f4ng tin c\u00e1 nh\u00e2n.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"300\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-347.png\" alt=\"\" class=\"wp-image-7165\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-347.png 730w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-347-600x247.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-347-300x123.png 300w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>V\u00ed d\u1ee5: <\/strong>LeakerLocker l\u00e0 m\u1ed9t d\u1ea1ng ransomware t\u1ea5n c\u00f4ng thi\u1ebft b\u1ecb di \u0111\u1ed9ng ch\u1ea1y h\u1ec7 \u0111i\u1ec1u h\u00e0nh Android. N\u00f3 kh\u00f4ng m\u00e3 h\u00f3a d\u1eef li\u1ec7u nh\u01b0ng thay v\u00e0o \u0111\u00f3 \u0111e d\u1ecda c\u00f4ng b\u1ed1 th\u00f4ng tin nh\u1ea1y c\u1ea3m c\u1ee7a n\u1ea1n nh\u00e2n. N\u00f3 s\u1ebd hi\u1ec3n th\u1ecb c\u00e1c c\u1ea3nh b\u00e1o v\u00e0 th\u00f4ng b\u00e1o r\u1eb1ng d\u1eef li\u1ec7u c\u00e1 nh\u00e2n, h\u00ecnh \u1ea3nh, tin nh\u1eafn v\u00e0 c\u00e1c t\u1ec7p ri\u00eang t\u01b0 \u0111\u00e3 \u0111\u01b0\u1ee3c sao ch\u00e9p v\u00e0 s\u1ebd \u0111\u01b0\u1ee3c c\u00f4ng b\u1ed1 n\u1ebfu n\u1ea1n nh\u00e2n kh\u00f4ng tr\u1ea3 ti\u1ec1n chu\u1ed9c.<\/p>\n\n\n\n<p><strong>3.4 Mobile Ransomware.<\/strong><\/p>\n\n\n\n<p><strong>\u0110\u1eb7c \u0111i\u1ec3m:<\/strong> Lo\u1ea1i ransomware n\u00e0y \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 t\u1ea5n c\u00f4ng v\u00e0o thi\u1ebft b\u1ecb di \u0111\u1ed9ng, nh\u01b0 \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh ho\u1eb7c m\u00e1y t\u00ednh b\u1ea3ng.<\/p>\n\n\n\n<p><strong>C\u00e1ch ho\u1ea1t \u0111\u1ed9ng: <\/strong>Mobile ransomware c\u00f3 th\u1ec3 m\u00e3 h\u00f3a ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u tr\u00ean thi\u1ebft b\u1ecb di \u0111\u1ed9ng v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c. N\u00f3 c\u0169ng c\u00f3 th\u1ec3 kh\u00f3a m\u00e0n h\u00ecnh v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 m\u1edf kh\u00f3a.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"990\" height=\"549\" src=\"https:http:\/\/aws.vacif.com\/wp-content\/uploads\/sites\/3\/2023\/07\/image-349.png\" alt=\"\" class=\"wp-image-7167\" srcset=\"https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-349.png 990w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-349-600x333.png 600w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-349-300x166.png 300w, https:\/\/vacif.com\/en\/wp-content\/uploads\/sites\/3\/2023\/07\/image-349-768x426.png 768w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>V\u00ed d\u1ee5: <\/strong>Simplocker l\u00e0 m\u1ed9t lo\u1ea1i ransomware d\u00e0nh cho thi\u1ebft b\u1ecb Android. N\u00f3 m\u00e3 h\u00f3a c\u00e1c t\u1ec7p tr\u00ean thi\u1ebft b\u1ecb v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3. Trong khi c\u00e1c lo\u1ea1i ransomware di \u0111\u1ed9ng kh\u00e1c nh\u01b0 LeakerLocker \u0111e d\u1ecda c\u00f4ng b\u1ed1 d\u1eef li\u1ec7u, Simplocker l\u00e0 m\u1ed9t v\u00ed d\u1ee5 v\u1ec1 mobile ransomware m\u00e3 h\u00f3a t\u1ec7p d\u1eef li\u1ec7u tr\u00ean thi\u1ebft b\u1ecb di \u0111\u1ed9ng c\u1ee7a n\u1ea1n nh\u00e2n.<\/p>\n\n\n\n<p><strong>4. Gi\u1ea3i ph\u00e1p Sophos Endpoint.<\/strong><\/p>\n\n\n\n<p>Sophos Endpoint Protection l\u00e0 m\u1ed9t gi\u1ea3i ph\u00e1p b\u1ea3o m\u1eadt d\u00e0nh cho c\u00e1c m\u00e1y t\u00ednh v\u00e0 thi\u1ebft b\u1ecb di \u0111\u1ed9ng, bao g\u1ed3m t\u00ednh n\u0103ng n\u00e2ng cao \u0111\u1ec3 ng\u0103n ng\u1eeba ransomware. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 t\u00ednh n\u0103ng ch\u00ednh trong Sophos Endpoint Protection gi\u00fap b\u1ea3o v\u1ec7 kh\u1ecfi ransomware:<\/p>\n\n\n\n<p><strong>Anti-Malware v\u00e0 Anti-Ransomware Engine: <\/strong>Sophos Endpoint s\u1eed d\u1ee5ng m\u1ed9t c\u00f4ng ngh\u1ec7 ch\u1ed1ng malware v\u00e0 ch\u1ed1ng ransomware m\u1ea1nh m\u1ebd. \u0110\u1ed9i ng\u0169 ph\u1ea7n m\u1ec1m c\u1ee7a Sophos li\u00ean t\u1ee5c c\u1eadp nh\u1eadt v\u00e0 ph\u00e2n t\u00edch c\u00e1c m\u1eabu m\u00e3 \u0111\u1ed9c h\u1ea1i m\u1edbi nh\u1ea5t \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o gi\u1ea3i ph\u00e1p c\u00f3 kh\u1ea3 n\u0103ng ph\u00e1t hi\u1ec7n v\u00e0 ch\u1eb7n c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1edbi nh\u1ea5t.<\/p>\n\n\n\n<p><strong>Heuristic Analysis: <\/strong>Gi\u1ea3i ph\u00e1p n\u00e0y s\u1eed d\u1ee5ng ph\u00e2n t\u00edch ki\u1ec3u ch\u1eef \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1c h\u00e0nh vi \u0111\u00e1ng ng\u1edd c\u1ee7a c\u00e1c t\u1ec7p v\u00e0 ch\u01b0\u01a1ng tr\u00ecnh. Khi Sophos Endpoint ph\u00e1t hi\u1ec7n m\u1ed9t h\u00e0nh vi g\u00e2y nghi ng\u1edd, n\u00f3 c\u00f3 th\u1ec3 c\u1ea3nh b\u00e1o ho\u1eb7c ng\u0103n ch\u1eb7n t\u1ec7p \u0111\u00f3 tr\u01b0\u1edbc khi n\u00f3 g\u00e2y h\u1ea1i cho h\u1ec7 th\u1ed1ng.<\/p>\n\n\n\n<p><strong>Application Control:<\/strong> T\u00ednh n\u0103ng n\u00e0y cho ph\u00e9p qu\u1ea3n tr\u1ecb vi\u00ean ch\u1ec9 \u0111\u1ecbnh c\u00e1c \u1ee9ng d\u1ee5ng \u0111\u01b0\u1ee3c ph\u00e9p ch\u1ea1y tr\u00ean h\u1ec7 th\u1ed1ng. Khi c\u00f3 m\u1ed9t \u1ee9ng d\u1ee5ng \u0111\u1ed9c h\u1ea1i c\u1ed1 g\u1eafng ch\u1ea1y, Sophos Endpoint s\u1ebd ch\u1eb7n n\u00f3 \u0111\u1ec3 ng\u0103n ng\u1eeba ti\u1ec1m n\u0103ng b\u1ecb nhi\u1ec5m ransomware.<\/p>\n\n\n\n<p><strong>Web Protection: <\/strong>Sophos Endpoint cung c\u1ea5p b\u1ea3o v\u1ec7 web ch\u1eb7t ch\u1ebd, gi\u00fap ng\u0103n ch\u1eb7n ng\u01b0\u1eddi d\u00f9ng truy c\u1eadp v\u00e0o c\u00e1c trang web \u0111\u1ed9c h\u1ea1i ho\u1eb7c c\u00f3 ch\u1ee9a m\u00e3 \u0111\u1ed9c h\u1ea1i. \u0110i\u1ec1u n\u00e0y gi\u00fap gi\u1ea3m nguy c\u01a1 b\u1ecb nhi\u1ec5m ransomware qua c\u00e1c trang web \u0111\u1ed9c h\u1ea1i.<\/p>\n\n\n\n<p><strong>Data Loss Prevention (DLP): <\/strong>T\u00ednh n\u0103ng DLP gi\u00fap ng\u0103n ch\u1eb7n vi\u1ec7c r\u00f2 r\u1ec9 th\u00f4ng tin nh\u1ea1y c\u1ea3m v\u00e0 d\u1eef li\u1ec7u quan tr\u1ecdng. N\u00f3 c\u00f3 th\u1ec3 ng\u0103n ch\u1eb7n vi\u1ec7c m\u00e3 h\u00f3a d\u1eef li\u1ec7u quan tr\u1ecdng c\u1ee7a b\u1ea1n v\u00e0 gi\u1ea3m nguy c\u01a1 tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a ransomware.<\/p>\n\n\n\n<p><strong>Behavioral Analysis: <\/strong>Sophos Endpoint s\u1eed d\u1ee5ng ph\u00e2n t\u00edch h\u00e0nh vi \u0111\u1ec3 theo d\u00f5i ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u00e1c \u1ee9ng d\u1ee5ng v\u00e0 qu\u00e1 tr\u00ecnh tr\u00ean h\u1ec7 th\u1ed1ng. N\u1ebfu ph\u00e1t hi\u1ec7n h\u00e0nh vi \u0111\u00e1ng ng\u1edd li\u00ean quan \u0111\u1ebfn ransomware, n\u00f3 s\u1ebd ch\u1eb7n v\u00e0 b\u00e1o c\u00e1o s\u1ef1 c\u1ed1.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.Kh\u00e1i ni\u1ec7m v\u1ec1 Ransomware. T\u1eeb &#8220;ransomware&#8221; b\u1eaft ngu\u1ed3n t\u1eeb hai th\u00e0nh ph\u1ea7n ch\u00ednh: &#8220;ransom&#8221; (ti\u1ec1n chu\u1ed9c) v\u00e0 &#8220;ware&#8221; (c\u1ee5 th\u1ec3 l\u00e0 ph\u1ea7n m\u1ec1m). Ransomware l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i (malware) \u0111\u1eb7c bi\u1ec7t, \u0111\u01b0\u1ee3c t\u1ea1o ra v\u1edbi m\u1ee5c ti\u00eau m\u00e3 h\u00f3a d\u1eef li\u1ec7u ho\u1eb7c kh\u00f3a truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a n\u1ea1n nh\u00e2n. Khi [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":7168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[80],"tags":[185,186,158,92,97],"class_list":["post-7160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-huong-dan-tai-lieu","tag-encrypting-ransomware","tag-locker-ransomware","tag-mobile-ransomware","tag-ransomware","tag-sophos-endpoint","entry","has-media"],"_links":{"self":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/7160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/comments?post=7160"}],"version-history":[{"count":0,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/posts\/7160\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media\/7168"}],"wp:attachment":[{"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/media?parent=7160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/categories?post=7160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vacif.com\/en\/wp-json\/wp\/v2\/tags?post=7160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}