* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分类](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * 无需恐慌:新冠疫情下的网络威胁... # 无需恐慌:新冠疫情下的网络威胁 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F03%2Fcovid19-cyber-threats%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E6%97%A0%E9%9C%80%E6%81%90%E6%85%8C%EF%BC%9A%E6%96%B0%E5%86%A0%E7%96%AB%E6%83%85%E4%B8%8B%E7%9A%84%E7%BD%91%E7%BB%9C%E5%A8%81%E8%83%81&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F03%2Fcovid19-cyber-threats%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F03%2Fcovid19-cyber-threats%2F%3Flang%3Dzh-hans&title=%E6%97%A0%E9%9C%80%E6%81%90%E6%85%8C%EF%BC%9A%E6%96%B0%E5%86%A0%E7%96%AB%E6%83%85%E4%B8%8B%E7%9A%84%E7%BD%91%E7%BB%9C%E5%A8%81%E8%83%81&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2020/03/covid19-cyber-threats/?lang=zh-hans&ts=markdown) [](mailto:?subject=无需恐慌:新冠疫情下的网络威胁) Link copied By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?lang=zh-hans&ts=markdown "Posts by Ryan Olson") Mar 25, 2020 1 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) This post is also available in: [繁體中文 (繁体中文)](https://www2.paloaltonetworks.com/blog/2020/04/covid19-cyber-threats/?lang=zh-hant "切换到 繁体中文(繁體中文)") ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/Malicious-email-r3d3.png) 每当有人问我Unit 42是做什么的? 我通常会一言概之,"我们是研究坏人坏事的。"当前,随着新冠疫情在世界各地蔓延,我们中的许多人都不得不调整自己的生活来应对疫情带来的新问题。网络犯罪分子也不例外,他们正在利用此次大流行发动网络攻击。 对网络攻击者来说,新冠疫情无疑提供了作恶良机。无关乎技术,他们利用了人们在疫情之下新的行为方式。 本文的目的是为了帮助您了解最新动态以及如何更好地保护您和您的企业,而不是制造更大的恐慌与不安。为此,我们在今后还将进一步分享我们的看法和建议。 **利用新冠肺炎相关话题实施网络钓鱼或分发恶意软件** 与其他重大事件一样,网络攻击者正是利用人们对新冠疫情的高度关注来诱导受害者打开恶意电子邮件附件、点击钓鱼网站链接。这不是单纯的一次攻击行为或攻击事件,而是网络攻击者利用新冠肺炎相关话题为诱饵实施的全球性网络攻击。目前,我们已发现许多主题包含新冠肺炎及相关字样的恶意电子邮件(带有NetWire、NanoCore或LokiBot等远程管理工具),及其他恶意软件。 * 新冠肺炎疫情动态//2020年3月以来的业务连续性计划公告 * 新冠肺炎疫情最新动态 * 联合国儿童基金会(UNICEF )新冠肺炎预防指南APP * 菲律宾海外就业管理局(POEA)有关2020新型冠状病毒的健康提示 * 警惕!新冠病毒 部分恶意邮件附件名称包括: * AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT\_pdf.exe * Coronavirus COVID-19 upadte.xlsx * CORONA VIRUS1.uue * CORONA VIRUS AFFECTED CREW AND VESSEL.xlsm * covid19.ZIP 以上两个列表均非全面详尽,且所列主题很快就会出现各种变体,这一趋势在未来数周甚至数月内还将持续发生,这是因为网络攻击者会根据新闻头条故事的不断变化来更新这些主题。同时,还有一些利用与税务申报、发票和发货订单相关的常见主题来发起同类攻击行为。 **虚假应用** 当人们在寻找有关新冠病毒的信息时,如它会带来哪些影响?如何确保自身安全?许多人都会通过手机寻求帮助。我们已经看到[多起](https://urldefense.proofpoint.com/v2/url?u=https-3A__blog.lookout.com_commercial-2Dsurveillanceware-2Doperators-2Dlatest-2Dto-2Dtake-2Dadvantage-2Dof-2Dcovid-2D19&d=DwMFoQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=rlV3QLKXfVd47fRPwA7WrCCSjqFsgIzvhSPB3-jJ4YQ&m=IWaU8YyzaCWLc7oBjhVcUlOqcdnurMPM-JsU1t35RvI&s=diJe69BFCYpvH9a86uKVyF5E6eYojfFvqK-j1HhdkU0&e=)有关恶意安卓应用的报道,这些应用声称提供有关新冠病毒的信息。这使得攻击者可以通过您的设备实施监控,或者对您的设备进行加密并以此要挟赎金。 和往常一样,我们建议安卓用户不要从不可信来源安装应用,iPhone用户也不应越狱并从第三方来源安装应用。 **新冠肺炎** **COVID-19** **主题域名** 在过去的几周中,已经有超过100,000个域名被注册,其中包含诸如"covid"、"virus"和"corona"之类的词汇。当然,并非所有这些都是恶意的,但所有这些都应视为可疑。无论他们声称拥有相关信息、检测工具还是治疗方法,在新冠病毒大流行之后才建立网站的这一事实,都应对其有效性产生怀疑。 **如何防护** 通常情况下,我们推荐的[最佳实践](https://docs.paloaltonetworks.com/best-practices)仍然是帮助企业和网络免受这些威胁影响的正确方法。我们的产品和服务在阻止新冠病毒(COVID-19)相关主题的威胁方面,以及在应对跟踪用户点击链接和打开附件等其他信息方面具备同等的防护能力。您可以考虑采取以下措施,确保充分利用我们提供的防护优势。 * 进行[最佳实践评估](https://www.paloaltonetworks.com/services/bpa),以确定在何处更改配置,进一步增强安全性。 * 使用PAN-DB URL过滤来阻止"新注册域名",其中包含在过去32天内注册的域名。虽然这些不一定都是恶意的,但它可以防止用户受骗上当。 随着与此威胁相关信息的出现,我们还将进一步分享我们的看法和建议。 *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www2.paloaltonetworks.com/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www2.paloaltonetworks.com/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www2.paloaltonetworks.com/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 面对性命攸关的时刻,如何实现可靠的医疗物联网安全](https://www2.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www2.paloaltonetworks.com/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www2.paloaltonetworks.com/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language