{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/nyheder\/banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023\/","title":{"rendered":"Banktrojanere, phishing og ransomware forts\u00e6tter med at dominere i 2023"},"content":{"rendered":"<p>Covid-19-situationen har fremskyndet digitale transformationsprocesser og formaliseret telearbejde, hvilket har resulteret i en stigning i cybertrusler til niveauer, der aldrig er set f\u00f8r og aldrig forudsagt. Lad os huske, at malware er en kombination af to ord - \"ondsindet\" og \"software\". Dette udtryk henviser til enhver form for ondsindet kode, uanset hvordan den p\u00e5virker ofre, opf\u00f8rer sig eller for\u00e5rsager skade. Malware omfatter alle former for ondsindet software, herunder trojanske heste, ransomware, vira, orme og bank-malware. Det er sv\u00e6rt for en normal bruger at se, hvilke filer der er malware, og hvilke der ikke er. Det er derfor, der findes sikkerhedsl\u00f8sninger som f.eks. store databaser med tidligere ondsindede eksempler og brug af flere beskyttelsesteknologier til at opdage de nyeste.<\/p>\n\n\n\n<p>Malwareforfattere er i dag ekstremt opfindsomme. For at undg\u00e5 at blive opdaget spreder deres \"kreationer\" sig gennem s\u00e5rbarheder i upatchede systemer, omg\u00e5r sikkerhedsforanstaltninger, gemmer sig i hukommelsen eller efterligner legitime programmer. Men selv i dag er en af de mest potente infektionsvektorer det svageste led i k\u00e6den: mennesker. E-mails med ondsindede vedh\u00e6ftede filer har vist sig at v\u00e6re en effektiv og billig m\u00e5de at kompromittere et system p\u00e5. Og det kr\u00e6ver kun et enkelt klik.<\/p>\n\n\n\n<p>Det f\u00f8rste skridt er at holde al software, herunder operativsystemet og alle programmer, opdateret. Ikke kun for at tilf\u00f8je funktioner og forbedringer, men ogs\u00e5 for at rette fejl og adressere s\u00e5rbarheder, som cyberkriminelle og ondsindet kode kan udnytte. Dette d\u00e6kker dog ikke alle aktuelle trusler. Desuden er det n\u00f8dvendigt med en p\u00e5lidelig og opdateret sikkerhedsl\u00f8sning for at afv\u00e6rge potentielle angrebsfors\u00f8g. Regelm\u00e6ssige sikkerhedskopier, der gemmes p\u00e5 en offline-harddisk, er en anden m\u00e5de at bek\u00e6mpe malware p\u00e5, s\u00e5 brugeren nemt kan erstatte data, der er blevet beskadiget eller krypteret af cyberangribere.<\/p>\n\n\n\n<p>Lad os genkalde os og huske lidt historie. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">Den pakistanske hjerne<\/a> var den f\u00f8rste virus, der blev identificeret i begyndelsen af 1986. Dens m\u00e5l var at v\u00e6re s\u00e5 ubem\u00e6rket som muligt. Den inficerede boot-systemet p\u00e5 5,25\u2033 disketter og spredte sig globalt i l\u00f8bet af f\u00e5 uger, hvilket er bem\u00e6rkelsesv\u00e6rdigt i betragtning af, at den kun blev distribueret via 5,25\u2033 disketter. Siden da har malware udviklet sig p\u00e5 mange forskellige m\u00e5der, og skaberne finder hele tiden p\u00e5 nye m\u00e5der at inficere ofrene p\u00e5. De har et st\u00e6rkt distributionsnetv\u00e6rk med internettet, som giver dem mulighed for at p\u00e5virke potentielle ofre meget lettere. Dette vil altid v\u00e6re hackernes grundl\u00e6ggende logik, og det er op til os at praktisere efterretning og kontraspionage for at modvirke dem. Nogle malware-familier, som WannaCryptor, spreder sig vilk\u00e5rligt ved at kryptere filer og for\u00e5rsage global skade. Andre rammer mindre grupper af ofre, f.eks. virksomheder fra et bestemt land, som det er tilf\u00e6ldet med Diskcoder. Petya aka C. Industroyer var et nyligt eksempel p\u00e5 m\u00e5lrettet malware. Denne malware, der blev opdaget af ESET, angriber industrielle kontrolsystemer, der bruges i elnettet, og har for\u00e5rsaget str\u00f8mafbrydelser i Ukraine ved at misbruge legitime, men usikre protokoller. Det er en af de f\u00e5 malware-familier, der kan sammenlignes med Stuxnet, det f\u00f8rste cyberv\u00e5ben, der nogensinde er blevet brugt.<\/p>\n\n\n\n<p>Siden pandemien blev erkl\u00e6ret, er cyberangrebene taget til, f.eks. mod Remote Desktop Protocol (RDP) og Ransomware. Verden vil have en milliard ondsindede koder i 2022. Men cybertruslerne er ikke kun blevet flere, de er ogs\u00e5 blevet mere sofistikerede. I dag diskuterer vi for eksempel \"Fileless Malware\", som ikke kr\u00e6ver, at brugeren indtaster nogen filer i systemet for at k\u00f8re malwaren: Den kan gemmes i systemets flygtige hukommelse. Derfor er overv\u00e5gnings- og forebyggelsesteknologier afg\u00f8rende.<\/p>\n\n\n\n<p><br><strong>Malware af f\u00f8lgende typer blev opdaget i 2021 og 2022:<\/strong><\/p>\n\n\n\n<p>1) <strong>Ondsindede torrents<\/strong>: fra den tidligere ukendte Kryptocibule Malware-familie. Den stj\u00e6ler kryptovaluta og exfiltrerer kryptovaluta-relaterede filer ved hj\u00e6lp af kryptominere og kapring af udklipsholder.<\/p>\n\n\n\n<p>2) <strong>Trusler mod Android<\/strong>: Malware i kategorien 'Skjulte apps' har domineret i tre kvartaler i tr\u00e6k i 2022. Denne cybertrussel best\u00e5r af vildledende apps, der giver sig ud for at v\u00e6re spil eller hj\u00e6lpeprogrammer, men efter installationen skjuler de deres ikoner og viser fuldsk\u00e6rmsannoncer.<\/p>\n\n\n\n<p>3)<strong> IoT-cybertrusler<\/strong>: Fordi IoT-enheder er designet med ringe eller ingen sikkerhed, er de nemme m\u00e5l for cyberangribere. Angribere kan inficere s\u00e5danne enheder med ondsindede bots og bruge dem i botnet til angreb i stor skala.<\/p>\n\n\n\n<p>4) <strong>Malware til Mac<\/strong>: I 2021 blev Kattana-handelsprogrammet til Mac-computere kopieret og trojaniseret. Angriberne brugte malware til at stj\u00e6le oplysninger som browsercookies, kryptovaluta-tegneb\u00f8ger og sk\u00e6rmbilleder; i 2022 var denne type cybertrussel blevet fuldst\u00e6ndig elimineret.<\/p>\n\n\n\n<p>5) <strong>Ondsindede e-mails<\/strong>: Distributionen af ondsindet software via e-mail vil stige i 2022. En Microsoft Office Exploit er den mest almindelige opdagelse i 2022.<\/p>\n\n\n\n<p>Ransomware er en vedvarende cybertrussel, der konstant angriber organisationer og kompromitterer kritisk infrastruktur som f.eks. offentlige institutioner, sundheds- og energiinstitutioner, og som bliver stadig mere kompleks. Opdagelse og udryddelse. I 2020 blev ransomware og datal\u00e6kager sl\u00e5et sammen. I <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">denne artikel<\/a>Han p\u00e5peger, at operat\u00f8rerne af forskellige Ransomware-familier har tilf\u00f8jet en anden risiko til denne type angreb, fordi de ud over at kapre filer nu praktiserer afpresning med cybertruslen om at l\u00e6kke de kompromitterede oplysninger. Denne metode anvender Doxing-teknikken, som indeb\u00e6rer, at man f\u00e5r fortrolige data fra ofrene og truer med at offentligg\u00f8re dem, medmindre der betales afpresning. Det \u00f8ger uden tvivl presset p\u00e5 de ber\u00f8rte, fordi det ikke kun handler om at genskabe de krypterede oplysninger, men ogs\u00e5 om at forhindre, at de stj\u00e5lne data bliver offentliggjort.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Banktrojanere<\/a>ogs\u00e5 kendt som \"Bankers\", er ondsindet kode, der er meget udbredt inden for cyberkriminalitet. Deres funktion er at stj\u00e6le bankoplysninger fra brugere af denne type tjenester. Disse oplysninger er tilg\u00e6ngelige p\u00e5 det sorte marked. Nogle mennesker f\u00e5r fat i dem for at deltage i kriminelle aktiviteter som afpresning og bedrageri. P\u00e5 verdensplan er der identificeret elleve familier af banktrojanere.<\/p>\n\n\n\n<p>Disse familier bruger krypterings- og tilsl\u00f8ringsv\u00e6rkt\u00f8jer til at beskytte koden mod analyse og dermed beskytte den ondsindede aktivitet, de udf\u00f8rer i systemerne. For at undg\u00e5 opdagelser inkluderer de instruktioner i deres programmering, der ikke har en specifik handling; de er fyldt, de er skraldespandskode. Indtil videre er mere end 50 finansielle institutioner blevet identificeret som ofre for identitetstyveri for at bedrage deres kunder.<\/p>\n\n\n\n<p><strong>I de sidste tre \u00e5r har de mest almindelige cybertrusler v\u00e6ret:<\/strong><\/p>\n\n\n\n<p>1) <strong>ransomware<\/strong>: Dens udviklere danner organiserede grupper og auktionerer stj\u00e5lne data fra deres ofre p\u00e5 det m\u00f8rke web. Der er blevet identificeret 203 forskellige Ransomware-varianter.<\/p>\n\n\n\n<p>2) <strong>Udnyttelse<\/strong>: ondsindet kode, der fors\u00f8ger at f\u00e5 adgang til udstyr ved at udnytte en s\u00e5rbarhed i systemerne. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">EternalBlue<\/a> (som WannaCry-virussen tilh\u00f8rer) og BlueKeep er to mere udbredte familier (fjernskrivebordss\u00e5rbarhed, noget, der bliver relevant i 2022 p\u00e5 grund af tendensen til telearbejde).<\/p>\n\n\n\n<p>3) <strong>Spyware<\/strong>: \"klassiske v\u00e6rkt\u00f8jer\" for cyberkriminelle. Det er stadig afg\u00f8rende for dem at have en bred r\u00e6kkevidde i udbredelsen. Siden 2020 har HoudRat-trojaneren st\u00e5et \u00f8verst p\u00e5 listen.<\/p>\n\n\n\n<p>4) <strong>phishing<\/strong>: I 2020 steg antallet af opdagelser af filer knyttet til phishing-kampagner med 27% og steg til 53% i 2022. Det repr\u00e6senterer en betydelig stigning, da disse opdagelser var 15% i 2019.<\/p>\n\n\n\n<p>Omkostningerne ved finansiel cyberkriminalitet har oversteget $600 milliarder. Som om det ikke var nok, er der mangel p\u00e5 specialister p\u00e5 grund af \u00e6ndringer i cybertrusselslandskabet og de mange nye malware-udviklinger, som har understreget manglen p\u00e5 fagfolk inden for cybersikkerhed. If\u00f8lge forskellige unders\u00f8gelser, der blev offentliggjort i slutningen af 2019, var der behov for 4,07 millioner fagfolk inden for cybersikkerhed.<\/p>","protected":false},"excerpt":{"rendered":"<p>Covid-19-situationen har fremskyndet digitale transformationsprocesser og formaliseret telearbejde, hvilket har resulteret i en stigning i cybertrusler til niveauer, der aldrig er set f\u00f8r og aldrig forudsagt. Lad os huske, at malware er... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/nyheder\/banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023\/\">Read more <span class=\"screen-reader-text\">Banktrojanere, phishing og ransomware forts\u00e6tter med at dominere i 2023<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/nyheder\/banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/nyheder\/banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digitale trusler i 2023 - Securitybriefing.net","description":"L\u00e6r om den fortsatte dominans af banktrojanere, phishing og ransomware i 2023. F\u00e5 tips til, hvordan du holder dig beskyttet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/nyheder\/banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023\/","og_locale":"da_DK","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/da\/nyheder\/banktrojanere-phishing-og-ransomware-fortsaetter-med-at-dominere-i-2023\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"C\u00e9sar Daniel Barreto","Estimeret l\u00e6setid":"6 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"Digitale trusler i 2023 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"L\u00e6r om den fortsatte dominans af banktrojanere, phishing og ransomware i 2023. F\u00e5 tips til, hvordan du holder dig beskyttet.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto er en anerkendt cybersikkerhedsskribent og -ekspert, der er kendt for sin dybdeg\u00e5ende viden og evne til at forenkle komplekse cybersikkerhedsemner. Med omfattende erfaring inden for netv\u00e6rkssikkerhed og databeskyttelse bidrager han regelm\u00e6ssigt med indsigtsfulde artikler og analyser om de seneste cybersikkerhedstendenser, der uddanner b\u00e5de fagfolk og offentligheden.","url":"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}