* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分類](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr) * MyDoom 2019年依然活躍 台灣受到威脅全球... # MyDoom 2019年依然活躍 台灣受到威脅全球第三 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2019%2F08%2Fmydoom-still-active-in-2019%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=MyDoom+2019%E5%B9%B4%E4%BE%9D%E7%84%B6%E6%B4%BB%E8%BA%8D+%E5%8F%B0%E7%81%A3%E5%8F%97%E5%88%B0%E5%A8%81%E8%84%85%E5%85%A8%E7%90%83%E7%AC%AC%E4%B8%89&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2019%2F08%2Fmydoom-still-active-in-2019%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2019%2F08%2Fmydoom-still-active-in-2019%2F%3Flang%3Dzh-hant&title=MyDoom+2019%E5%B9%B4%E4%BE%9D%E7%84%B6%E6%B4%BB%E8%BA%8D+%E5%8F%B0%E7%81%A3%E5%8F%97%E5%88%B0%E5%A8%81%E8%84%85%E5%85%A8%E7%90%83%E7%AC%AC%E4%B8%89&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2019/08/mydoom-still-active-in-2019/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=MyDoom 2019年依然活躍 台灣受到威脅全球第三) Link copied By [Brad Duncan](https://www.paloaltonetworks.com/blog/author/bduncan/?lang=zh-hant&ts=markdown "Posts by Brad Duncan") Aug 16, 2019 2 minutes [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) This post is also available in: [简体中文 (簡體中文)](https://www2.paloaltonetworks.com/blog/2019/08/mydoom-still-active-in-2019/?lang=zh-hans "Switch to 簡體中文(简体中文)") ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/Malicious-email-r3d2.png) MyDoom是一種惡名昭彰的電腦蠕蟲病毒,[最早於2004年初被發現](https://www.symantec.com/security-center/writeup/2004-012612-5422-99)。這種惡意軟體已成為[最具破壞性的電腦病毒](https://www.smithsonianmag.com/science-nature/top-ten-most-destructive-computer-viruses-159542266/),估計損失達[380億美元](https://uk.norton.com/norton-blog/2016/02/the_8_most_famousco.html)(台幣1兆1千4百萬元)。儘管現在已經過了它的全盛時期,MyDoom仍繼續存在於網路威脅領域。例如,就在2017年,Palo Alto Networks特別在[雙月度威脅報告](https://unit42.paloaltonetworks.com/unit42-emea-bi-monthly-threat-reports-united-kingdom-germany-france/)中紀錄MyDoom在EMEA(中東和非洲)地區的活動。 MyDoom在過去幾年相對來說保持著一致性,平均大概1.1%的電子郵件中會發現惡意軟體附件。我們每個月都會持續紀錄成千上萬的MyDoom樣本。絕大多數MyDoom電子郵件位址來自中國,而美國則排在第二位。這些電子郵件被發送到全世界,主要針對高科技,批發和零售,醫療保健,教育和製造業。 這篇部落格文章近年來追蹤MyDoom,並關注2019年前六個月的趨勢。 # MyDoom活動:2015年至2018年 雖然沒有其他惡意軟體系列那麼突出,但近年來我們發現前後表現一致的MyDoom樣本。MyDoom的傳播方法是透過電子郵件使用[SMTP](https://tools.ietf.org/html/rfc5321)。我們將包含MyDoom附件的電子郵件與包含其他惡意軟體附件的電子郵件進行比較。從2015年至2018年的四年期間,平均每1.1%的惡意電子郵件中包含MyDoom。在同一時期查看各個單一惡意軟體樣本時,MyDoom平均佔所有惡意軟體也高達21.4%。 為什麼MyDoom電子郵件的百分比遠低於MyDoom附件的百分比? 因為許多惡意電子郵件,都會透過活動訊息挾帶相同的惡意樣本給成千上萬的收件人。 MyDoom是[多態性的](https://en.wikipedia.org/wiki/Polymorphic_code),這會導致在我們發現的每封電子郵件中有著不同的散列檔案。因此,雖然電子郵件的數量相對較少,但與通過電子郵件散播的其他惡意軟體相比,樣本數量相對較高。表1包含2015年至2018年的統計數據。 |--------|---------------------|-------------------|-------------------------|-------------------|-------------|-----------------------| | **年份** | **MyDoom** **電子郵件** | **包含惡意軟體的電子郵件總數** | **MyDoom** **電子郵件的百分比** | **MyDoom** **樣本** | **惡意軟體總樣本** | **MyDoom** **樣本的百分比** | | 2015 | 574,674 | 27,599,631 | 2.1% | 87,119 | 615,386 | 14.2% | | 2016 | 589,107 | 77,575,376 | 0.8% | 142,659 | 960,517 | 14.9% | | 2017 | 309,978 | 79,599,864 | 0.4% | 95,115 | 340,433 | 27.9% | | 2018 | 663,212 | 64,919,295 | 1.0% | 150,075 | 528,306 | 28.4% | *表* *1. 2015* *年至* *2018* *年的* *MyDoom* *統計數據。* **2015** **包含惡意軟體的電子郵件總數** **2015** **惡意軟體樣本** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖1.png) 圖1. 2015年MyDoom活躍程度。 **2016** **包含惡意軟體的電子郵件總數** **2016** **惡意軟體樣本** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖2.png) 圖2. 2016年MyDoom活躍程度。 **2017** **包含惡意軟體的電子郵件總數** **2017** **惡意軟體樣本** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖3.png) 圖3. 2017年MyDoom活躍程度。 **2018** **包含惡意軟體的電子郵件總數** **2018** **惡意軟體樣本** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖4.png) 圖4. 2018年MyDoom活躍程度。 # MyDoom活動:2019年 與2018整年相比,MyDoom在2019年前六個月的活動顯示出相似的平均值,電子郵件和惡意軟體樣本的比例略高。詳細資訊請參見表2。 |--------------------------------------|---------------------|-------------------|-------------------------|-------------------|-------------|-----------------------| | **年份** | **MyDoom** **電子郵件** | **包含惡意軟體的電子郵件總數** | **MyDoom** **電子郵件的百分比** | **MyDoom** **樣本** | **惡意軟體總樣本** | **MyDoom** **樣本的百分比** | | **1** **月至** **6** **月** 2019 | 465,896 | 41,002,585 | 1.1% | 92,932 | 302,820 | 30.1% | 表2. 2019年前六個月的MyDoom統計數據。 **2019 1** **月至** **6** **月** **2019 1** **月至** **6** **月** **包含惡意軟體的電子郵件總數** **惡意軟體樣本** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖5.png) 圖5. 2019年前六個月的MyDoom活躍程度。 574 MyDoom樣本出現超過一個月,因此下表3中的MyDoom惡意軟體樣本總數與上表中六個月內MyDoom樣本總數不同。 |----------|---------------------|-----------------------| | **月份** | **MyDoom** **電子郵件** | **MyDoom** **惡意軟體樣本** | | 2019/1月 | 54,371 | 14,441 | | 2019 /2月 | 47,748 | 11,566 | | 2019/3月 | 80,537 | 18,789 | | 2019/4月 | 92,049 | 17,278 | | 2019 /5月 | 113,037 | 15,586 | | 2019/6月 | 78,154 | 15,846 | 表3. 2019年前六個月的MyDoom月度統計數據。 **推送** **MyDoom** **的電子郵件數量** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖6.png) **2019/1** **月** **2019/2** **月** **2019/3** **月** **2019/4** **月** **2019/5** **月** **2019 6** **月** 圖6.繪製2019年1月至6月MyDoom活動的圖表。 這些電子郵件來自哪裡? 我們在2019年前六個月看到的十大國家的位址是: * 中國:349,454封電子郵件 * 美國:18,590封電子郵件 * 英國:10,151封電子郵件 * 越南:4,426封電子郵件 * 南韓:2,575封電子郵件 * 西班牙:2,154封電子郵件 * 俄羅斯:1,007封電子郵件 * 印度:657封電子郵件 * 台灣:536封電子郵件 * 哈薩克:388封電子郵件 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖7.png) 圖7. 2019年前六個月MyDoom電子郵件出現的國家/地區。 目標國家比來源國更加多樣化和均勻分佈。十大目標國家是: * 中國:72,713封電子郵件 * 美國:56,135封電子郵件 * 台灣:5,628封電子郵件 * 德國:5,503封電子郵件 * 日本:5,105封電子郵件 * 新加坡:3,097封電子郵件 * 南韓:1,892封電子郵件 * 羅馬尼亞:1,651封電子郵件 * 澳洲:1,295封電子郵件 * 英國:1,187封電子郵件 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖8.png) 圖8. 2019年前六個月MyDoom發送電子郵件的目標國家。 在此期間,前十大垂直行業是: * 高科技:212,641封電子郵件 * 批發和零售:84,996封電子郵件 * 醫療保健:49,782封電子郵件 * 教育:37,961封電子郵件 * 製造業:32,429封電子郵件 * 專業和法律服務:19,401封電子郵件 * 電信:4,125封電子郵件 * 財務:2,259封電子郵件 * 運輸和物流:1,595封電子郵件 * 保險:796封電子郵件 這些結果偏向我們的客戶群。但是,這些數據表明中國和美國是大多數MyDoom電子郵件的來源國亦是排名最高的重點目標國家。 # MyDoom的特徵 MyDoom發行版已有多年的類似特徵。在2019年2月,[Cylance分析了一個MyDoom樣本](https://threatvector.cylance.com/en_us/home/cylance-vs-mydoom-email-worm.html),現今的MyDoom樣本遵循類似的特徵。發送MyDoom的電子郵件時常被偽裝成報告稱電子郵件未成功發送,其中主旨為: * 傳送失敗 * 關於您電子郵件的傳送報告 * 郵件系統錯誤 -- 退回郵件 * 可能無法發送消息 * 退回郵件:數據格式錯誤 * 退回郵件:詳見文字報告 但是,我們還經常在郵件主題中看到夾帶隨機字母的MyDoom電子郵件。 MyDoom電子郵件還使用其他主旨,如: * 再次點擊我,寶貝 * 你好 * 嗨 * 對我的朋友說嗨 圖9、10和11顯示了[2019年7月MyDoom電子郵件樣本](https://www.malware-traffic-analysis.net/2019/07/15/index.html)的螢幕截圖。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖9.png) 圖9. 2019年7月發布的MyDoom電子郵件範例(1/3)。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖10.png) 圖10. 2019年7月發布的MyDoom電子郵件範例(2/3)。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖11.png) 圖11. 2019年7月發布的MyDoom電子郵件範例(3/3)。 這些MyDoom電子郵件的附件是可執行檔,或者是包含可執行檔的zip存檔。 MyDoom惡意軟體將受感染的Windows主機變為惡意設備,然後將MyDoom電子郵件發送到各種電子郵件位址。即使受感染的Windows主機沒有郵件客戶端,也會發生這種情況。MyDoom的另一個特徵是嘗試通過TCP埠1042連接IP位址。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖12.png) 圖12. 2019年7月15日來自感染MyDoom的主機的電子郵件流量。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖13.png) 圖13.通過TCP埠1042從感染MyDoom的主機嘗試連接。 一個有Windows 7的主機,MyDoom在用戶的AppData \\ Local \\ Temp目錄中製作了自己的副本lsass.exe,但惡意軟體在Windows註冊表中沒有持久化 一個具有Windows XP的主機,MyDoom可執行檔在C:\\ Windows \\ lsass.exe中自行複製,並通過HKEY\_LOCAL\_MACHINE配置單元中的Windows註冊表保持持久性,並在SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Run中使用名為Traybar的密鑰 如圖13所示。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/08/圖14.png) 圖14. MyDoom在Windows XP主機上持久存在。 # 結論 MyDoom雖然在2004年首次出現,但是今天仍然活躍,也證明了它最初的破壞性。多年以來除了看到許多的基礎設施被感染,Palo Alto Networks持續觀察MyDoom在現今的威脅領域裡,雖然惡意軟體電子郵件包含MyDoom的總數減少,但此惡意軟體仍然存在。 根據我們的數據,MyDoom感染的基礎設施位於中國的IP位址,而美國則排在第二位。中國和美國都是MyDoom電子郵件的主要接收者,而發送仍然是全球性的,並且針對許多其他國家。高科技是最大的目標行業。 Palo Alto Networks的客戶可藉由輕鬆移除惡意軟體的威脅,並且預防平臺受到威脅而受到保護。[AutoFocus](https://www.paloaltonetworks.tw/resources/datasheets/autofocus-threat-intelligence.html)用戶可以使用MyDoom標記來追蹤[MyDoom](https://autofocus.paloaltonetworks.com/#/tag/Commodity.MyDoom)攻擊。 # 妥協的指標 **MyDoom EXE** **樣品從** **2019** **年** **7** **月開始** 1b46afe1779e897e6b9f3714e9276ccb7a4cef6865eb6a4172f0dd1ce1a46b42 48cf912217c1b5ef59063c7bdb93b54b9a91bb6920b63a461f8ac7fcff43e205 50dfd9af6953fd1eba41ee694fe26782ad4c2d2294030af2d48efcbcbfe09e11 6a9c46d96f001a1a3cc47d166d6c0aabc26a5cf25610cef51d2b834526c6b596 9e4c6410ab9eda9a3d3cbf23c58215f3bc8d3e66ad55e40b4e30eb785e191bf8 *** ** * ** *** ## Related Blogs ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Strata Copilot - 加速邁向自發性網路安全性的未來](https://www2.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 醫療企業是勒索軟體攻擊者的首要目標](https://www2.paloaltonetworks.com/blog/2021/10/healthcare-organizations-are-the-top-target/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 適用於 5G 的零信任:實現安全的數位轉型](https://www2.paloaltonetworks.com/blog/2021/10/zero-trust-for-5g-digital-transformation/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 網路攻擊鎖定金融服務企業的 3 個原因以及防禦方式](https://www2.paloaltonetworks.com/blog/2021/10/financial-services-cyberattacks/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 連續 7 年提供出色的客戶服務](https://www2.paloaltonetworks.com/blog/2021/10/delivering-outstanding-customer-service/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Palo Alto Networks 研究:61% 的企業難以確保在家工作的遙距網絡安全](https://www2.paloaltonetworks.com/blog/2021/09/state-of-hybrid-workforce-security-2021/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language