* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分類](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr) * COVID-19 / 新型冠狀病毒帶來新的網路威脅... # COVID-19 / 新型冠狀病毒帶來新的網路威脅 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F04%2Fcovid19-cyber-threats%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=COVID-19+%2F+%E6%96%B0%E5%9E%8B%E5%86%A0%E7%8B%80%E7%97%85%E6%AF%92%E5%B8%B6%E4%BE%86%E6%96%B0%E7%9A%84%E7%B6%B2%E8%B7%AF%E5%A8%81%E8%84%85&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F04%2Fcovid19-cyber-threats%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2020%2F04%2Fcovid19-cyber-threats%2F%3Flang%3Dzh-hant&title=COVID-19+%2F+%E6%96%B0%E5%9E%8B%E5%86%A0%E7%8B%80%E7%97%85%E6%AF%92%E5%B8%B6%E4%BE%86%E6%96%B0%E7%9A%84%E7%B6%B2%E8%B7%AF%E5%A8%81%E8%84%85&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2020/04/covid19-cyber-threats/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=COVID-19 / 新型冠狀病毒帶來新的網路威脅) Link copied By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") Apr 06, 2020 1 minutes [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) This post is also available in: [简体中文 (簡體中文)](https://www2.paloaltonetworks.com/blog/2020/03/covid19-cyber-threats/?lang=zh-hans "Switch to 簡體中文(简体中文)") ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2020/03/Malicious-email-r3d3.png) 威脅情報小組Unit 42近期公布了「冠狀病毒的網路威脅」因應報告,隨著COVID-19蔓延到世界各地,許多網路攻擊者也藉機利用疫情期間發動網路攻擊,這次疫情爆發為網路攻擊者帶來的最佳時機,而是人類為了應對危機而改變的行為及模式。台灣在面對疫情的當前,也出現了許多以「Corona」為名的惡意軟體和惡意網域,近期也有不少業者利用一頁式網站銷售口罩,試圖欺騙消費者上鉤,趁機竊取消費者的個資。 威脅情報小組認為,該報告的目的不是助長人們對冠狀病毒或網路攻擊的恐慌與焦慮,而是幫助大眾瞭解正在發生的事情以及如何該如何保護企業及使用者。 **利用COVID-19** **主題的網路釣魚/** **惡意軟體散佈** 報告中提到,就像利用其熱門話題,攻擊者正在利用COVID-19所獲得的高度關注來誘使受害者打開惡意電子郵件的附件或點擊網路釣魚連結。這並非單純的一次性攻擊行為或攻擊行動,而是網路攻擊者利用大量病毒相關主題。Palo Alto Networks辨認出了含有COVID-19與遠程管理工具(例如NetWire,NanoCore和LokiBot)等相關關鍵字的惡意電子郵件,以及其他惡意軟體。 **威脅情報小組整理出利用COVID-19** **為主題的網路釣魚/** **惡意軟體散佈如下:** * CORONAVIRUS(COVID-19)更新:自2020年3月開始的連續性商業計劃公告。 * 最新冠狀病毒動態 * UNICEF COVID-19 TIPS應用軟體 * POEA HEALTH ADVISORY re-2020新型冠狀病毒。 * 警告!新型冠狀病毒 **威脅情報小組整理出利用COVID-19** **為主題的附件名稱包括:** * AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT\_pdf.exe * Coronavirus COVID-19 upadte.xlsx * CORONA VIRUS1.uue * CORONA VIRUS AFFECTED CREW AND VESSEL.xlsm * covid19.ZIP 這個列表並非全面詳盡,未來會很快出現新的變化。這些情況估計將在未來幾週和幾個月內持續下去,攻擊者也會根據頭條新聞的發展而有所變化。Palo Alto Networks同時發現利用與稅務申報、發票和運輸訂單等相關的主題也是駭客常見攻擊的目標。 **偽應用程式** 當人們尋找有關COVID-19的訊息(例如它如何影響以及如何確保安全)時,許多人都是透過智慧型手機搜尋資料。已經有多起聲稱提供有關病毒訊息的惡意Android應用程式[案件](https://urldefense.proofpoint.com/v2/url?u=https-3A__www.domaintools.com_resources_blog_covidlock-2Dmobile-2Dcoronavirus-2Dtracking-2Dapp-2Dcoughs-2Dup-2Dransomware&d=DwMFaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=rlV3QLKXfVd47fRPwA7WrCCSjqFsgIzvhSPB3-jJ4YQ&m=czPwkQwSKoAiCxJQ5_Z9U5rkDU9cz3b10BnRhJ4Pm08&s=d-xxCr6WjP-yo7tGldoOvXH0o1VaZViA54tMcFC9yj0&e=)。這使攻擊者可以透過使用者的裝置進行監視,或者對裝置進行加密並用以勒索。 與往常一樣,Android使用者不應從不受信任的來源(應堅持到Google Play商店)安裝應用程式,iPhone使用者也不應越獄到第三方來源安裝應用程式。 **COVID-19** **主題網域名稱** 在過去的幾週已經有數千個(實際上超過十萬個)使用包了含「covid」、「virus」和「corona」等術語註冊的網域。這些網域並非全部都是惡意的,但都可以被視為可疑網域。無論他們聲稱擁有資訊、檢驗工具還是治療方法,這些網站在疫情成為新聞之前都不存在的事實,應該對其有效性保持懷疑。 **企業該如何自我保護** 一般情形下,Palo Alto Networks所推薦的[最佳方案](https://docs.paloaltonetworks.com/best-practices),仍是保護企業及使用者免受這些威脅影響的正確方法。Palo Alto Networks的產品和服務旨在防止COVID-19相關主題的威脅,與防止其他誘使使用者點擊連結和打開附件的訊息一樣有效。可以考慮採取以下措施,以確保受到Palo Alto Networks的保護。 * 遠端工作時,請將企業帳戶和個人帳戶分開。從個人到企業流失的風險可能對公司或政府組織有害。 * 執行最佳的基本防護做法,例如使用更強的密碼並定期更改,使用多重身份驗證,身份管理和設備安全設置。 * 確保使用者知道如果設備以任何其他方式遺失,被盜或損壞時該怎麼做。 確保IT和安全團隊擁有適當的工具進行監視和跨雲端的權限。 * 在雲端採用與內部軟體相同的原則,包括最重要的保護措施,資源優先的決定,以及能夠審查和阻止對核心任務構成最大風險威脅的決策。 * 最重要的是,請試著讓事情盡可能簡單。 在不確定的環境中,避免複雜性。 *** ** * ** *** ## Related Blogs ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Strata Copilot - 加速邁向自發性網路安全性的未來](https://www2.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 醫療企業是勒索軟體攻擊者的首要目標](https://www2.paloaltonetworks.com/blog/2021/10/healthcare-organizations-are-the-top-target/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 適用於 5G 的零信任:實現安全的數位轉型](https://www2.paloaltonetworks.com/blog/2021/10/zero-trust-for-5g-digital-transformation/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 網路攻擊鎖定金融服務企業的 3 個原因以及防禦方式](https://www2.paloaltonetworks.com/blog/2021/10/financial-services-cyberattacks/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 連續 7 年提供出色的客戶服務](https://www2.paloaltonetworks.com/blog/2021/10/delivering-outstanding-customer-service/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Palo Alto Networks 研究:61% 的企業難以確保在家工作的遙距網絡安全](https://www2.paloaltonetworks.com/blog/2021/09/state-of-hybrid-workforce-security-2021/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language