Get to know # Unit 42 The Unit 42 team brings together world-renowned threat researchers with incident responders and security consultants. Together, they create an intelligence-driven, response-ready organization who are passionate about helping customers more proactively manage cyber risk. With a deeply rooted reputation for delivering world-class threat intelligence, the Unit 42 team provides industry-leading incident response and cyber risk management services to security leaders around the globe. [![linkedin](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/linkedin.svg)](https://www.linkedin.com/company/unit42/) *** ** * ** *** Blogs by Unit 42 Sort By: Recent Recent Popular *** ** * ** *** [![網絡攻擊者模仿知名品牌網站域名以欺騙消費者](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/09/Cybersquatting-v3.png)](https://www2.paloaltonetworks.com/blog/2020/09/cybersquatting/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [網絡攻擊者模仿知名品牌網站域名以欺騙消費者](https://www2.paloaltonetworks.com/blog/2020/09/cybersquatting/?lang=zh-hant) Palo Alto Networks威脅情報團隊Unit 42旗下的域名搶注檢測系統發現,共有13,857個域名於2019年12月遭搶注,平均每天450個。 Sep 02, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![八大資安自保方式 即使「在家工作」也能遠離網路詐騙](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/05/Facebook-Linkedin-PHOTO-F-PANW-blank.png)](https://www2.paloaltonetworks.com/blog/2020/05/8-tips-working-from-home/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [八大資安自保方式 即使「在家工作」也能遠離網路詐騙](https://www2.paloaltonetworks.com/blog/2020/05/8-tips-working-from-home/?lang=zh-hant) Palo Alto Networks威脅情報小組Unit 42在過去90天裡(1月30日至4月30日),觀察到三個SilverTerrier(來自奈及利亞的網路駭客組織)發起一系列以COVID-19為主題的10個惡意軟體活動。這些活動產生了超過170個網絡釣魚郵件。以台灣的數據來說,已知的分別是危險網域covid-19.apea2019.scalacube.xyz(IP位址:54.39.141.121)以及惡意軟體cpcontacts.covid19diag.com(IP位址:43.254.18.7)。 May 11, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![網絡犯罪分子如何利用新冠肺炎疫情作惡](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/04/covid19.png)](https://www2.paloaltonetworks.com/blog/2020/04/how-cybercriminals-prey-on-the-covid-19/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [網絡犯罪分子如何利用新冠肺炎疫情作惡](https://www2.paloaltonetworks.com/blog/2020/04/how-cybercriminals-prey-on-the-covid-19/?lang=zh-hant) 隨著新型冠狀病毒蔓延全球,疫情相關的話題備受關注。Palo Alto Networks威脅情報團隊Unit 42的研究人員發現,自2月初以來,與新冠肺炎相關的Google搜索量和URL瀏覽量大幅增加。網絡犯罪分子也正是利用這些熱門話題為誘餌牟利,在疫情當前的危難時刻,令數十億人的生活雪上加霜。 Apr 24, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![Unit 42: 商業電子郵件詐騙,台灣受攻擊次數北亞最多](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/04/Crime-r3d2.png)](https://www2.paloaltonetworks.com/blog/2020/04/unit42-silverterrier-2019-update/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [Unit 42: 商業電子郵件詐騙,台灣受攻擊次數北亞最多](https://www2.paloaltonetworks.com/blog/2020/04/unit42-silverterrier-2019-update/?lang=zh-hant) Palo Alto Networks威脅情報小組Unit 42近期公佈了來自奈及利亞駭客組織SilverTerrier的商業電子郵件(BEC)調查報告。根據美國聯邦調查局(FBI)旗下的網路犯罪投訴中心(IC3)最近發布的網路年度報告,過去一年中BEC詐騙攻擊造成了17.7億美元的損失,成為受害者損失最慘重的手法。這數據讓網路戀愛詐騙、身份盜用、信用卡詐欺、網絡釣魚和勒索軟體等事件,顯得相形失色。 Apr 20, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![COVID-19 / 新型冠狀病毒帶來新的網路威脅](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/03/Malicious-email-r3d3.png)](https://www2.paloaltonetworks.com/blog/2020/04/covid19-cyber-threats/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [COVID-19 / 新型冠狀病毒帶來新的網路威脅](https://www2.paloaltonetworks.com/blog/2020/04/covid19-cyber-threats/?lang=zh-hant) 威脅情報小組Unit 42近期公布了「冠狀病毒的網路威脅」因應報告,隨著COVID-19蔓延到世界各地,許多網路攻擊者也藉機利用疫情期間發動網路攻擊,這次疫情爆發為網路攻擊者帶來的最佳時機,而是人類為了應對危機而改變的行為及模式。台灣在面對疫情的當前,也出現了許多以「Corona」為名的惡意軟體和惡意網域,近期也有不少業者利用一頁式網站銷售口罩,試圖欺騙消費者上鉤,趁機竊取消費者的個資。 Apr 06, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** Load more *** ** * ** *** Blogs by Unit 42 Sort By: Popular Popular Recent *** ** * ** *** [![八大資安自保方式 即使「在家工作」也能遠離網路詐騙](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/05/Facebook-Linkedin-PHOTO-F-PANW-blank.png)](https://www2.paloaltonetworks.com/blog/2020/05/8-tips-working-from-home/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [八大資安自保方式 即使「在家工作」也能遠離網路詐騙](https://www2.paloaltonetworks.com/blog/2020/05/8-tips-working-from-home/?lang=zh-hant) Palo Alto Networks威脅情報小組Unit 42在過去90天裡(1月30日至4月30日),觀察到三個SilverTerrier(來自奈及利亞的網路駭客組織)發起一系列以COVID-19為主題的10個惡意軟體活動。這些活動產生了超過170個網絡釣魚郵件。以台灣的數據來說,已知的分別是危險網域covid-19.apea2019.scalacube.xyz(IP位址:54.39.141.121)以及惡意軟體cpcontacts.covid19diag.com(IP位址:43.254.18.7)。 May 11, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![COVID-19 / 新型冠狀病毒帶來新的網路威脅](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/03/Malicious-email-r3d3.png)](https://www2.paloaltonetworks.com/blog/2020/04/covid19-cyber-threats/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [COVID-19 / 新型冠狀病毒帶來新的網路威脅](https://www2.paloaltonetworks.com/blog/2020/04/covid19-cyber-threats/?lang=zh-hant) 威脅情報小組Unit 42近期公布了「冠狀病毒的網路威脅」因應報告,隨著COVID-19蔓延到世界各地,許多網路攻擊者也藉機利用疫情期間發動網路攻擊,這次疫情爆發為網路攻擊者帶來的最佳時機,而是人類為了應對危機而改變的行為及模式。台灣在面對疫情的當前,也出現了許多以「Corona」為名的惡意軟體和惡意網域,近期也有不少業者利用一頁式網站銷售口罩,試圖欺騙消費者上鉤,趁機竊取消費者的個資。 Apr 06, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![老舊作業系統,為醫療影像裝置(IoMT)帶來新威脅](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/04/89191951_10157184054952711_4589944876795166720_o.jpg)](https://www2.paloaltonetworks.com/blog/2020/04/hospital-ransomware-medical-imaging/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [老舊作業系統,為醫療影像裝置(IoMT)帶來新威脅](https://www2.paloaltonetworks.com/blog/2020/04/hospital-ransomware-medical-imaging/?lang=zh-hant) 威脅情報小組Unit 42近期公佈了最新的2020年物聯網威脅報告,其中利用物聯網(IoT)的資安產品Zingbox分析2018年至2019年,美國 IT 企業和醫療機構數千個實際地點所使用的 120 萬個物聯網的設備裝置,發現企業更容易遭受以物聯網為目標的新型惡意軟體或利用老舊的作業系統的漏洞惡意入侵。 Apr 01, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![98% 的美國物聯網設備流量未加密](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/03/unit42-iot-report-tch-1200x500-1.jpg)](https://www2.paloaltonetworks.com/blog/2020/03/unit42-iot-threat-report/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [98% 的美國物聯網設備流量未加密](https://www2.paloaltonetworks.com/blog/2020/03/unit42-iot-threat-report/?lang=zh-hant) 《Unit 42 2020年物聯網威脅報告》發現,物聯網設備的整體安全部署正在轉差,使組織容易遭受以物聯網為目標的新型惡意軟件以及被遺忘的舊式攻擊技術的入侵。 Mar 18, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** [![網絡攻擊者模仿知名品牌網站域名以欺騙消費者](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2020/09/Cybersquatting-v3.png)](https://www2.paloaltonetworks.com/blog/2020/09/cybersquatting/?lang=zh-hant) ## [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) ### [網絡攻擊者模仿知名品牌網站域名以欺騙消費者](https://www2.paloaltonetworks.com/blog/2020/09/cybersquatting/?lang=zh-hant) Palo Alto Networks威脅情報團隊Unit 42旗下的域名搶注檢測系統發現,共有13,857個域名於2019年12月遭搶注,平均每天450個。 Sep 02, 2020 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hant&ts=markdown "Posts by Unit 42") *** ** * ** *** Load more {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language