-
(单词翻译:双击或拖选)
JUDY WOODRUFF: There is new and troubling information on a massive cyberattack against the U.S. The Cybersecurity and Infrastructure1 Agency has determined2 that the recent hacking4 of federal, state, and local governments, as well as critical infrastructure and other private sector5 organizations, poses -- quote -- "a grave risk." They also said that eliminating the malicious6 computer code from compromised computer networks will be highly complex and challenging. We start by turning again to Dmitri Alperovitch. He's co-founder of Silverado Policy Accelerator. It's a Washington-based think tank. Dmitri Alperovitch, thank you so much for being with us again. We are learning from the cyber agency that the hackers7 used possibly more than one path to get in. How significant is that?
DMITRI ALPEROVITCH, Co-Founder, Silverado Policy Accelerator: ...espionage8 campaigns in history. And we have just breaking this tonight before you went on the air that Microsoft was one of the other vendors9 whose software was impacted here. And the Russians were able to leverage10 it to get into some of the victims, in addition to the original company called SolarWinds. But the impact is huge, because you have so many companies using the software that essentially11 gave a map to the Russian intelligence service, who is believed to be behind this, to gain entry, government agencies, private sector companies alike.
JUDY WOODRUFF: Well, it sounds serious enough. But then there is this additional reporting today from Politico that they managed to get inside the Energy Department, inside the national Nuclear Security Administration, which manages the nuclear weapons stockpiles. It sounds serious. How serious is this?
DMITRI ALPEROVITCH: Well, this was a supply chain hack3. So, in effect, the Russians were able to infiltrate12 into these software companies whose software is used by tens of thousands of organizations globally, including most of the sensitive government agencies. And then they cherry-picked. They decided13 which targets they wanted to go after to actually get into the doors and exfiltrate very sensitive information from those networks. And that is why we are seeing this drip, drip, by drip reports of numerous government agencies that you can imagine would be of high interest to the Russian intelligence services, like the State Department, like the Treasury14 Department, like the Pentagon, and now the Department of Energy as well and others.
JUDY WOODRUFF: So, Dmitri Alperovitch, do we have a sense of how close they came to triggering something -- I mean, the whole thing is serious enough -- but to triggering, I don't know, a nuclear incident or some other unthinkable sort of incident, step, emergency?
DMITRI ALPEROVITCH: This is an incredibly dangerous situation and very detrimental15 to our national security. But there are two silver linings17 here that I think it's useful for us to remember. One, it looks like this was a traditional espionage attack. It looks like they were not interested in destruction. And it looks like no data was -- is being changed. We may find out differently in the future. But, for now at least, it looks like they went in and did traditional theft of information, very, very serious stuff, but -- of course, but it could have been so much worse. And second silver lining16 is that, in this particular case, it looks like they were not able to get access to classified networks. Those are networks that are disconnected from the Internet, so they are extremely difficult to infiltrate. And that's where most of the U.S. government secrets, of course, are located on. But even compromising the unclassified networks, they still contain enormous amounts of sensitive information. So, this is going to be very, very damaging to our national security for many years to come.
JUDY WOODRUFF: And, as we reported, very difficult to unwind, to undo18 whatever damage was done?
DMITRI ALPEROVITCH: It is going to take us months to get the Russians out of those networks. In particular, if it is indeed the SVR, the Russian foreign intelligence service, they are the ones that infiltrated19 the White House, the Joint20 Chiefs of Staff, and the State Department back in 2015. And it took many, many weeks for those organizations back then to kick them out, because they are so good at burying themselves in, staying stealthy, maintaining that foothold within the organization, that it's going to take us probably months to get them out of all these networks that they have been able to infiltrate.
JUDY WOODRUFF: Dmitri Alperovitch, as always, we thank you.
DMITRI ALPEROVITCH: Thank you so much.
朱迪·伍德乐夫:关于美国遭遇大规模网络攻击事件出现了新的令人不安的消息。网络安全与基础设施局认定,最近针对联邦、州和地方政府以及关键基础设施和其他私营部门组织的黑客攻击构成了“严重风险”。他们还说,从被攻破的计算机网络中消除恶意计算机代码将是非常复杂和具有挑战性的。我们再次连线德米特里·阿尔佩洛维奇,他是智库“Silverado Policy Accelerator”的联合创始人,其总部设在华盛顿。德米特里·阿尔佩洛维奇,非常感谢你再次来到我们的节目。我们从网络机构了解到黑客可能使用了不止一条途径进入。这一点有多重要呢?
德米特里·阿尔佩洛维奇,联合创始人,Silverado Policy Accelerator:...历史上的间谍活动。微软和其它供应商一样其软件都受到了影响,在该新闻播出之前我们今晚打破了这个局面。除了最初的“SolarWinds”公司,俄罗斯人能够利用它接触到一些受害者信息,但影响是巨大的,因为该软件说白了就是给幕后黑手、即俄罗斯情报机构提供了一张地图以便获取入口,进入政府机构、私营企业等,而使用这款软件的公司太多了。
朱迪·伍德乐夫:嗯,听起来挺严重的。但是,之后Politico网站今天又有报道称他们成功进入了能源部、进入了国家核安全局,该机构负责管理核武器库存。听起来很严重,那么到底有多严重呢?
德米特里·阿尔佩洛维奇:嗯,这是一条供应链黑客。所以,其实俄罗斯能够渗透到这些软件公司,这些公司的软件被全球数以万计的组织使用,其中包括很多敏感的政府机构。然后他们精心挑选,决定追踪哪个目标进入入口,从这些网络中窃取非常敏感的信息。这就是为什么我们看到有那么多的政府机构报告,你可以想象俄罗斯情报机构会对这些报告有多感兴趣,比如国务院、财政部、五角大楼、现在还有能源部等等。
朱迪·伍德乐夫:所以,德米特里·阿尔佩罗维奇,这件事触发一些事情的几率有多大,就是说,这件事情非常严重,所以会出发核事故或者其它什么不可思议的大事,过程是怎样的呢?紧急吗?
德米特里·阿尔佩洛维奇:这是一个非常危险的局面,对我们国家的安全非常不利。但有两点希望,有两点是我觉得有利的。首先,这次网络袭击好像只是一般的间谍攻击,他们似乎对破坏没什么兴趣,因为数据看起来没有被改变,不过后期说不准。但是,至少就目前而言他们只是像以往那样黑进来然后盗窃了信息,非常非常机密的东西。但是,当然,情况本来会更糟的。第二点希望是,在这种特殊情况下他们似乎无法进入机密网络,这些网络是跟互联网断开连接的,所以很难黑进来。当然,美国政府的大多数机密文件都存储在那里。不过,虽说是非机密网络,但它们涵盖的敏感信息的量还是非常多的。所以还是会在未来多年对我们国家的国家安全造成非常、非常严重的损害。
朱迪·伍德乐夫:还有就是,正如我们报道的那样,已经造成的损害很难消除吗?
德米特里·阿尔佩洛维奇:我们要花几个月的时间才能把俄罗斯人从这些网络里赶出来。尤其是,如果他们真的是SVR(俄罗斯对外情报机构),就是2015年渗透进白宫、参谋长联席会议和国务院的人,当时那些组织花了好多个星期的时间才把他们赶出去,因为他们非常善于隐藏自己,秘密行事,保持组织内的立足点,我们可能要花几个月的时间才能把他们从他们能够渗透的所有网络中踢出去。
朱迪·伍德乐夫:德米特里·阿尔佩洛维奇,还是,谢谢。
德米特里·阿尔佩洛维奇:非常感谢。
1 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
2 determined | |
adj.坚定的;有决心的 | |
参考例句: |
|
|
3 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
4 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
5 sector | |
n.部门,部分;防御地段,防区;扇形 | |
参考例句: |
|
|
6 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
7 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
8 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
9 vendors | |
n.摊贩( vendor的名词复数 );小贩;(房屋等的)卖主;卖方 | |
参考例句: |
|
|
10 leverage | |
n.力量,影响;杠杆作用,杠杆的力量 | |
参考例句: |
|
|
11 essentially | |
adv.本质上,实质上,基本上 | |
参考例句: |
|
|
12 infiltrate | |
vt./vi.渗入,透过;浸润 | |
参考例句: |
|
|
13 decided | |
adj.决定了的,坚决的;明显的,明确的 | |
参考例句: |
|
|
14 treasury | |
n.宝库;国库,金库;文库 | |
参考例句: |
|
|
15 detrimental | |
adj.损害的,造成伤害的 | |
参考例句: |
|
|
16 lining | |
n.衬里,衬料 | |
参考例句: |
|
|
17 linings | |
n.衬里( lining的名词复数 );里子;衬料;组织 | |
参考例句: |
|
|
18 undo | |
vt.解开,松开;取消,撤销 | |
参考例句: |
|
|
19 infiltrated | |
adj.[医]浸润的v.(使)渗透,(指思想)渗入人的心中( infiltrate的过去式和过去分词 ) | |
参考例句: |
|
|
20 joint | |
adj.联合的,共同的;n.关节,接合处;v.连接,贴合 | |
参考例句: |
|
|