{"id":97296,"date":"2019-02-27T00:00:58","date_gmt":"2019-02-27T08:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=97296"},"modified":"2019-02-24T22:33:56","modified_gmt":"2019-02-25T06:33:56","slug":"preventing-malware-ransomware-traps-kr","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/02\/preventing-malware-ransomware-traps-kr\/?lang=ko","title":{"rendered":"Traps\ub97c \ud1b5\ud55c \uba40\uc6e8\uc5b4 \ubc0f \ub79c\uc12c\uc6e8\uc5b4 \ubc29\uc9c0"},"content":{"rendered":"<p>\ub79c\uc12c\uc6e8\uc5b4\uac00 \uc0c8\ub85c\uc6b4 \uc545\uc131 \ucf54\ub4dc\ub294 \uc544\ub2c8\uc9c0\ub9cc, WannaCry, Petya\/NotPetya \uadf8\ub9ac\uace0 \ucd5c\uadfc TrickBot \ub4f1\uc758 \uc8fc\uc694 \uacf5\uaca9\uc740 \uae30\uc874\uc758 \uc608\ubc29 \ubc29\ubc95\uc774 \uc9c0\ub2a5\ud615 \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \ub370 \ud6a8\uacfc\uc801\uc774\uc9c0 \uc54a\ub2e4\ub294 \uac83\uc744 \ubcf4\uc5ec\uc8fc\uc5c8\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub4e4\uc740 \uba40\uc6e8\uc5b4\uc758 \uc811\uadfc\ubc95\uacfc \uc6a9\ub3c4\ub97c \uc9c4\ud654\uc2dc\ucf1c \ub354 \uc815\uad50\ud558\uace0 \uc790\ub3d9\ud654\ub418\uace0 \ud45c\uc801\ud654\ub418\uace0 \ub9e4\uc6b0 \ud0d0\uc9c0\ud558\uae30 \uc5b4\ub835\uac8c \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n<p>WannaCry\ub294 \uc57d 2\ub144 \uc804\uc5d0 \ucc98\uc74c \uacf5\uaca9\ud588\uc744 \ub54c \ub9e4\uc6b0 \ud6a8\uacfc\uc801\uc73c\ub85c \uce68\ud22c\ub418\uc5b4, \uc6b0\ub9ac\ub294 \uc774 \uc704\ud5d8\ud55c \uba40\uc6e8\uc5b4\ub85c \uc778\ud55c \uc720\ucd9c \uc0ac\uace0\ub97c \ub274\uc2a4\uc5d0\uc11c \uacc4\uc18d \ubcf4\uc544\uc57c \ud588\uc2b5\ub2c8\ub2e4.\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/unit42-threat-brief-wanacrypt0r-know\/\">WannaCry<\/a>\ub294 \uba40\uc6e8\uc5b4\uc640 \uc775\uc2a4\ud50c\ub85c\uc787\uc758 \uc870\ud569\uc744 \uc0ac\uc6a9\ud558\uc5ec \uacf5\uaca9\ud588\uae30 \ub54c\ubb38\uc5d0 \uacc4\uc18d\ud574\uc11c \ud6a8\uacfc\uc801\uc77c \uc218 \uc788\uc5c8\uc2b5\ub2c8\ub2e4. \uccab\uc9f8, WannaCry\ub294 Microsoft SMB \ud504\ub85c\ud1a0\ucf5c\uc758 \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud558\uc5ec \ucee4\ub110 \uc218\uc900\uc758 \uad8c\ud55c\uc744 \uc5bb\uc2b5\ub2c8\ub2e4. \uc774 \uacf5\uaca9\uc774 \uc740\ubc00\ud558\uac8c \uc774\ub8e8\uc5b4\uc9c0\ub294 \uac83\uc740\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/10\/threat-brief-understanding-kernel-apc-attacks\/\">\ucee4\ub110 APC<\/a>(\ube44\ub3d9\uae30 \ud504\ub85c\uc2dc\uc800 \ud638\ucd9c) \uacf5\uaca9\uc744 \uc0ac\uc6a9\ud558\uae30 \ub54c\ubb38\uc774\uae30\ub3c4 \ud569\ub2c8\ub2e4. \ucee4\ub110\uc5d0 \ub300\ud55c \uacf5\uaca9\uc740 \ud55c\ub3d9\uc548 \uacc4\uc18d \uc774\ub8e8\uc5b4\uc84c\uace0 \uc798 \uc54c\ub824\uc838 \uc788\uc73c\uba70 \ubcf4\ud638\uac00 \uac00\ub2a5\ud569\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ucee4\ub110 APC \uacf5\uaca9\uc740 \ub2e4\ub978 \ucc28\uc6d0\uc758 \uacf5\uaca9\uc785\ub2c8\ub2e4. WannaCry\ub294 \ucee4\ub110\uc744 \uacf5\uaca9\ud574\uc11c \uad8c\ud55c\uc744 \uc5bb\ub294 \uac83\uc774 \uc544\ub2d9\ub2c8\ub2e4. \ucee4\ub110 APC \uacf5\uaca9\uc740 \ucee4\ub110 \uad8c\ud55c\uc744 <u>\uc774\ubbf8 \uac16\uace0 \uc788\uace0<\/u> \uc774\ub97c \uc774\uc6a9\ud558\uc5ec \ubaa9\uc801\uc744 \uc218\ud589\ud569\ub2c8\ub2e4. \uc774 \uacbd\uc6b0\uc5d0\ub294 \ud569\ubc95\uc801\uc778 \ud504\ub85c\uadf8\ub7a8\uc774 \ud569\ubc95\uc801\uc778 \ucf54\ub4dc\ub97c \uc2e4\ud589\ud558\ub294 \uac83\uc774 \uc544\ub2c8\ub77c \uc545\uc131 \ucf54\ub4dc\ub97c \uc2e4\ud589\ud558\uac8c \ud558\ub294 \ubc29\uc2dd\uc73c\ub85c \ubaa9\ud45c\ub97c \uc218\ud589\ud569\ub2c8\ub2e4.<\/p>\n<p>\ucd5c\uc885 \uc0ac\uc6a9\uc790\uc758 \uad00\uc810\uc5d0\uc11c \ubcf4\uba74, \ub79c\uc12c\uc6e8\uc5b4 \ud654\uba74\uc740 \ubaa8\ub4e0 \uc0ac\ub78c\uc5d0\uac8c \uc7a0\uaca8\uc11c \uc5d4\ub4dc\ud3ec\uc778\ud2b8\uc5d0\uc11c\ub294 \uc5b4\ub5a4 \ucd94\uac00 \ud65c\ub3d9\ub3c4 \ubcf4\uc774\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \ud558\uc9c0\ub9cc \ub3d9\uc2dc\uc5d0, \uba40\uc6e8\uc5b4\ub294 \uacc4\uc18d \ud37c\uc838 \ub098\uac00 \ub0b4\ubd80\uc640 \uc678\ubd80 \ubaa8\ub450\uc5d0\uc11c \ucde8\uc57d\ud55c \uc2dc\uc2a4\ud15c\uc744 \ucd5c\ub300\ud55c \ub9ce\uc774 \uac10\uc5fc\uc2dc\ud0b5\ub2c8\ub2e4.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-95680 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-500x281.png\" alt=\"\" width=\"500\" height=\"281\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-500x281.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-768x432.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-510x287.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-71x40.png 71w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-534x300.png 534w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2.png 1912w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\">\uac04\ub7b5\ud558\uac8c \ub098\ud0c0\ub0b8 WannaCry \uacf5\uaca9 \uc21c\uc11c<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks Traps\ub97c \uc2dc\uc791\ud558\uc138\uc694. Traps advanced endpoint protection \uc740 \uc54c\ub824\uc9c4 \uba40\uc6e8\uc5b4\uc640 \uc54c\ub824\uc9c0\uc9c0 \uc54a\uc740 \uba40\uc6e8\uc5b4, \ub79c\uc12c\uc6e8\uc5b4 \ubc0f \uc775\uc2a4\ud50c\ub85c\uc787\uc5d0 \ub300\ud55c \uc5ec\ub7ec \uac00\uc9c0 \uc608\ubc29 \ubc29\ubc95\uc744 \uacb0\ud569\ud558\uc5ec, \uc5d4\ub4dc\ud3ec\uc778\ud2b8\uac00 \uc190\uc0c1\ub418\uae30 \uc804\uc5d0 \uc545\uc131 \ud504\ub85c\uadf8\ub7a8\uc758 \uc2e4\ud589\uc744 \uc911\uc9c0\uc2dc\ud0b5\ub2c8\ub2e4. \uacf5\uaca9 \uc8fc\uae30\uc758 \uc911\uc694\ud55c \ub2e8\uacc4\uc5d0\uc11c \ubcf4\ud638 \uae30\ub2a5\uc744 \uc801\uc6a9\ud568\uc73c\ub85c\uc368, \uc6b4\uc601 \uccb4\uc81c\uac00 \ubb34\uc5c7\uc774\ub4e0, \uc5d4\ub4dc\ud3ec\uc778\ud2b8\uac00 \uc628\ub77c\uc778\uc774\ub4e0 \uc624\ud504\ub77c\uc778\uc774\ub4e0, \ud68c\uc0ac \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5f0\uacb0\ub418\uc5c8\ub4e0 \uc544\ub2c8\ub4e0 \uc0c1\uad00\uc5c6\uc774 \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>WannaCry \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud558\ub294 \uacfc\uc815\uc5d0\uc11c, Traps\uac00 \ubcf4\ud638\ud558\ub294 \uc5d4\ub4dc\ud3ec\uc778\ud2b8\ub294 \uacf5\uaca9 \uc8fc\uae30\uc758 \uc5ec\ub7ec \uc9c0\uc810\uc5d0\uc11c \uc774\ub7ec\ud55c \uacf5\uaca9\uc744 \ud0d0\uc9c0\ud558\uace0 \uc911\ub2e8\uc2dc\ud0ac \uc218 \uc788\uc5c8\uc2b5\ub2c8\ub2e4. \uba3c\uc800, Traps\ub294 \ucee4\ub110 \uad8c\ud55c\uc744 \uc0ac\uc6a9\uc790 \uc218\uc900\uc73c\ub85c \uc0c1\uc2b9\ud558\ub824\ub294 \uc2dc\ub3c4\uac00 \uc788\uc744 \ub54c \uc775\uc2a4\ud50c\ub85c\uc787 \uae30\ubc95\uc744 \ud0d0\uc9c0\ud558\uac8c \ub429\ub2c8\ub2e4. Traps\ub294 \uadf8 \ud589\ub3d9\uc744 \ud0d0\uc9c0\ud558\uc790\ub9c8\uc790 \uadf8 \uacf5\uaca9\uc744 \uc911\ub2e8\uc2dc\ud0a4\uac8c \ub429\ub2c8\ub2e4. \uc774 \uae30\ub2a5\uc774 \uc791\ub3d9\ud558\uc9c0 \uc54a\uc740 \uacbd\uc6b0\uc5d0\ub294, \uc545\uc131 \ud504\ub85c\uc138\uc2a4 \ubc29\uc9c0 \ubaa8\ub4c8\uc774 \ud558\uc704 \ud504\ub85c\uc138\uc2a4\ub97c \uc0dd\uc131\ud558\ub294 \uc0c1\uc704 \ud504\ub85c\uc138\uc2a4\ub97c \ud0d0\uc9c0\ud558\uace0 \uc911\uc9c0\uc2dc\ud0a4\uac8c \ub429\ub2c8\ub2e4. \uc774\uc804 \ubaa8\ub4c8\uc5d0\uc11c \uc704\ud611\uc744 \ud0d0\uc9c0\ud558\uc9c0 \ubabb\ud558\uba74, \uc5d0\uc774\uc804\ud2b8\uac00 \ub85c\uceec \ubd84\uc11d\uc744 \ud1b5\ud574, \ub79c\uc12c\uc6e8\uc5b4 \ubc29\uc9c0 \ubaa8\ub4c8\uc744 \ud1b5\ud574, \ub610\ub294 \uc0c1\uc138\ud55c WildFire \ubd84\uc11d\uc744 \ud1b5\ud574 \uacf5\uaca9\uc744 \ud0d0\uc9c0\ud558\uace0 \uc54c\ub824\uc9c4 \uc704\ud611\uc73c\ub85c \uc2dd\ubcc4\ud558\uc5ec \uc911\uc9c0\uc2dc\ud0a4\uac8c \ub429\ub2c8\ub2e4.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-95667 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-500x281.png\" alt=\"\" width=\"500\" height=\"281\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-500x281.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-768x431.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-510x286.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-71x40.png 71w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-535x300.png 535w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1.png 1910w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>WannaCry \uacf5\uaca9\uc774 \uc774\ub8e8\uc5b4\uc9c0\ub294 \ub3d9\uc548\uacfc \uadf8 \ud6c4\uc5d0, WannaCry\uc5d0 \uac10\uc5fc\ub41c \uac83\uc73c\ub85c \uc54c\ub824\uc9c4 Palo Alto Networks \uace0\uac1d\uc740 \uc5c6\uc5c8\uc2b5\ub2c8\ub2e4. \uc601\uad6d \uad6d\ubbfc \uac74\uac15 \uc11c\ube44\uc2a4\uac00 \uacf5\uaca9\uc744 \ubc1b\uc740 2017\ub144 5\uc6d4 12\uc77c\uc774 \ub418\uae30 \uac70\uc758 \ud55c \ub2ec \uc804\uc5d0 WildFire \uba40\uc6e8\uc5b4 \uc608\ubc29 \uc11c\ube44\uc2a4\uc5d0 \uc774 \uc704\ud611\uc774 \uc81c\ucd9c\ub418\uc5c8\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. AutoFocus\ub97c \uc0b4\ud3b4\ubcf4\uba74, WannaCry\uac00 2017\ub144 4\uc6d4 16\uc77c\uc5d0 \ucc98\uc74c \ubc1c\uacac\ub418\uc5c8\uace0 \ubcf4\ud638 \uae30\ub2a5\uc774 \ub9cc\ub4e4\uc5b4\uc838 \ubaa8\ub4e0 Palo Alto Networks \ubc29\ud654\ubcbd, \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ub4f1\uc5d0 \ubc30\ud3ec\ub418\uc5c8\ub2e4\ub294 \uac83\uc744 \uc54c \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uacb0\uad6d, \uacf5\uaca9\uc790\ub294 \uacf5\uaca9 \uc8fc\uae30\uc758 \ubaa8\ub4e0 \ub2e8\uacc4\uc5d0\uc11c \uc131\uacf5\ud574\uc57c \ud558\uace0, \ubc18\uba74\uc5d0 Traps \uace0\uae09 \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638 \uae30\ub2a5\uc740 \ud55c \ub2e8\uacc4\uc5d0\uc11c\ub9cc \ubc29\uc5b4\uc5d0 \uc131\uacf5\ud574\ub3c4 \uacf5\uaca9\uc744 \uc911\ub2e8\uc2dc\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638\uc5d0 \ub300\ud55c \ud544\uc218 \uc694\uac74\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\ub824\uba74 <a href=\"https:\/\/www.sans.org\/webcasts\/109540\" rel=\"nofollow,noopener\" >\uc774 \uc628\ub514\ub9e8\ub4dc \uc6f9\uce90\uc2a4\ud2b8\ub97c \ud1b5\ud574<\/a> Traps\uac00 \ubcf4\ud638 \uae30\ub2a5\uc744 \ub2e8\uc21c\ud654\ud558\uace0 \ub9ac\uc18c\uc2a4 \ubbfc\uac10\uc131 \ud658\uacbd \ubcf4\ud638 \ube44\uc6a9\uc744 \uc808\uac10\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ub79c\uc12c\uc6e8\uc5b4\uac00 \uc0c8\ub85c\uc6b4 \uc545\uc131 \ucf54\ub4dc\ub294 \uc544\ub2c8\uc9c0\ub9cc, WannaCry, Petya\/NotPetya \uadf8\ub9ac\uace0 \ucd5c\uadfc TrickBot \ub4f1\uc758 \uc8fc\uc694 \uacf5\uaca9\uc740 \uae30\uc874\uc758 \uc608\ubc29 \ubc29\ubc95\uc774 \uc9c0\ub2a5\ud615 \ub79c\uc12c\uc6e8\uc5b4 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud558\ub294 \ub370 \ud6a8\uacfc\uc801\uc774\uc9c0 \uc54a\ub2e4\ub294 \uac83\uc744 \ubcf4\uc5ec\uc8fc\uc5c8\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub4e4\uc740 \uba40\uc6e8\uc5b4\uc758 \uc811\uadfc\ubc95\uacfc \uc6a9\ub3c4\ub97c \uc9c4\ud654\uc2dc\ucf1c \ub354 \uc815\uad50\ud558\uace0 &hellip;<\/p>\n","protected":false},"author":483,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3555],"tags":[],"coauthors":[5049,2416],"class_list":["post-97296","post","type-post","status-publish","format-standard","hentry","category-3555"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/483"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=97296"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97296\/revisions"}],"predecessor-version":[{"id":97298,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97296\/revisions\/97298"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=97296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=97296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=97296"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=97296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}