{"id":2636,"date":"2024-09-02T16:20:55","date_gmt":"2024-09-02T16:20:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2636"},"modified":"2024-09-02T16:20:58","modified_gmt":"2024-09-02T16:20:58","slug":"tinba-virus-en-snodig-bank-trojaner","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/cyber-trusler\/tinba-virus-en-snodig-bank-trojaner\/","title":{"rendered":"Tinba-virus: En skurkagtig banktrojaner"},"content":{"rendered":"<p>Cybersikkerhedsverdenen leger katten efter musen og fors\u00f8ger at overliste nye cybertrusler, bl.a. den berygtede Tinba-virus, som allerede har angrebet flere millioner brugere verden over. Tinba er en forkortelse for \"Tiny Banker\" p\u00e5 grund af dens lille filst\u00f8rrelse, men i virkeligheden har den en langt fra ubetydelig indvirkning. I denne artikel vil vi diskutere, hvad Tinba-virussen er, hvordan den fungerer, lidt baggrund, og hvad du kan g\u00f8re for at beskytte dig mod denne cybertrussel.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-tinba-virus\"><strong>Hvad er Tinba-virus?<\/strong><\/h2>\n\n\n<p>Tinba er en bankvirksomhed <a href=\"https:\/\/us.norton.com\/blog\/malware\/what-is-a-trojan\" target=\"_blank\" rel=\"noreferrer noopener\">Trojansk malware<\/a> rettet mod f\u00f8lsomme finansielle oplysninger. Alt fra netbankoplysninger til kreditkortoplysninger falder i dens f\u00e6lde. Derudover indsamles alle andre personlige oplysninger ogs\u00e5 og bruges til at beg\u00e5 forskellige \u00f8konomiske bedragerier. Selv om den kun fylder 20 KB, er den b\u00e5de effektiv og farlig.<\/p>\n\n\n\n<p>Det fungerer ved at injicere sig selv i en brugers webbrowser og derefter overv\u00e5ge og opfange netbanksessionerne. S\u00e5 snart Tinba opdager, at en bruger har logget ind p\u00e5 sin konto, registrerer den loginoplysningerne og andre vigtige oplysninger og sender dem til angriberne. Desuden er Tinba ogs\u00e5 i stand til at \u00e6ndre, hvad der vises p\u00e5 offerets sk\u00e6rm, hvilket yderligere g\u00f8r det muligt for angriberne at udf\u00f8re andre former for svindel mod brugeren.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-history-of-tinba\"><strong>Historien om Tinba<\/strong><\/h3>\n\n\n<p>Tinba dukkede f\u00f8rste gang op i cybersikkerhedslandskabet tilbage i 2012. Den fik et berygtet ry p\u00e5 grund af sin effektivitet og den hastighed, hvormed den spredte sig. Oprindeligt blev Tinba brugt til m\u00e5lrettede angreb mod specifikke finansielle organisationer og fortsatte med at udvikle sig aktivt og sprede sig til st\u00f8rre sf\u00e6rer via internettet. Malwaren blev distribueret gennem <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" target=\"_blank\" rel=\"noreferrer noopener\">phishing-mails<\/a>Det kan ogs\u00e5 v\u00e6re en del af store botnet-operationer. Det mest bem\u00e6rkelsesv\u00e6rdige ved Tinba var, at den undgik at blive opdaget af de fleste traditionelle antivirusprogrammer. Dens ekstremt kompakte st\u00f8rrelse og snigende natur gjorde den n\u00e6sten usynlig for cybersikkerhedsforskere, der arbejder p\u00e5 at identificere og neutralisere malware. Med tiden udviklede Tinba sig konstant, og hver ny version blev mere kompleks i et fors\u00f8g p\u00e5 at forblive uopdaget endnu l\u00e6ngere og inficere flere brugere.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-tinba-works\"><strong>S\u00e5dan fungerer Tinba<\/strong><\/h3>\n\n\n<p>Infektioner sker typisk via phishing-mails. Det er beskeder, der er designet til at se \u00e6gte ud, som om de kommer fra en p\u00e5lidelig kilde: det kan v\u00e6re banker, tjenesteudbydere eller endda kolleger. De indeholder som regel et link eller en vedh\u00e6ftet fil, der starter download af Tinba Trojan p\u00e5 enheden, n\u00e5r man klikker p\u00e5 den eller \u00e5bner den. N\u00e5r den er installeret, arbejder Tinba stille i baggrunden og observerer passivt brugerens aktivitet p\u00e5 nettet. N\u00e5r brugeren g\u00e5r ind p\u00e5 en bankside, g\u00e5r den trojanske hest i aktion. Den registrerer ikke kun brugerens login-oplysninger, men ogs\u00e5 alle andre oplysninger, der indtastes p\u00e5 siden. Tinba kan ogs\u00e5 udf\u00f8re \"web injects\", hvor den \u00e6ndrer udseendet af bankwebstedet for at narre brugeren til at give ekstra oplysninger: svar p\u00e5 sikkerhedssp\u00f8rgsm\u00e5l, engangsadgangskoder osv.<\/p>\n\n\n\n<p>Det, der virkelig g\u00f8r Tinba s\u00e6rlig farlig, er, hvordan den kan manipulere websessioner - for eksempel ved at generere <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/all\/fake-pop-up\/7498aa68-db84-47ab-a2e7-a2e28a705d62\" target=\"_blank\" rel=\"noreferrer noopener\">falske pop-up vinduer<\/a> og beder om yderligere oplysninger, som brugeren m\u00e5ske uforvarende giver. Disse oplysninger sendes derefter direkte til angriberne, som kan bruge dem til at f\u00e5 adgang til offerets bankkonto, overf\u00f8re penge eller foretage falske k\u00f8b.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tinba\"><strong>Beskyt dig selv mod Tinba<\/strong><\/h2>\n\n\n<p>I betragtning af hvor alvorlig Tinba-virussen er, er det vigtigt med et proaktivt forsvar mod denne og lignende trusler. God praksis for sikkerhed omfatter:<\/p>\n\n\n\n<p><strong>V\u00e6r forsigtig med phishing-mails:<\/strong> V\u00e6r meget forsigtig, n\u00e5r du \u00e5bner dine e-mails, is\u00e6r fra ukendte afsendere. Klik aldrig p\u00e5 links eller download vedh\u00e6ftede filer, hvis du ikke er sikker p\u00e5, at de er sikre. Kontroll\u00e9r afsenderens e-mailadresse og eventuelle hints, der kan tyde p\u00e5 en phishing-mail.<\/p>\n\n\n\n<p><strong>Brug st\u00e6rke, unikke adgangskoder:<\/strong> St\u00e6rke og unikke adgangskoder er afg\u00f8rende for alle dine netbank- og f\u00f8lsomme konti. Genbrug aldrig adgangskoder p\u00e5 flere sider, og overvej at bruge en adgangskodeadministrator til at holde styr p\u00e5 dine oplysninger p\u00e5 en sikker m\u00e5de.<\/p>\n\n\n\n<p><strong>Aktiv\u00e9r to-faktor-autentificering (2FA):<\/strong> Hvor det er muligt, skal du aktivere to-faktor-autentificering for dine onlinekonti. Det tilf\u00f8jer et ekstra lag af sikkerhed ved at kr\u00e6ve en anden form for bekr\u00e6ftelse, f.eks. en kode, der sendes til din telefon, f\u00f8r du kan f\u00e5 adgang til din konto.<\/p>\n\n\n\n<p><strong>Hold din software opdateret:<\/strong> S\u00f8rg for, at dit operativsystem, din webbrowser og <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/understanding-anti-virus-software\" target=\"_blank\" rel=\"noreferrer noopener\">Antivirussoftware<\/a> opdateres regelm\u00e6ssigt. Cyberkriminelle udnytter ofte s\u00e5rbarheder i for\u00e6ldet software, s\u00e5 det er et vigtigt forsvar at holde alt opdateret.<\/p>\n\n\n\n<p>Fordi Tinba er designet til at undg\u00e5 at blive opdaget, kan installationer af p\u00e5lidelig antivirussoftware hj\u00e6lpe med at identificere malwaren og blokere den. K\u00f8r regelm\u00e6ssige scanninger for at opdage eventuelle trusler p\u00e5 din enhed.<\/p>\n\n\n\n<p><strong>Overv\u00e5g dine konti regelm\u00e6ssigt:<\/strong> Tjek j\u00e6vnligt dine kontoudtog og onlinekonti for mist\u00e6nkelig aktivitet. Tidlig opdagelse af uautoriserede transaktioner kan begr\u00e6nse skaden og hj\u00e6lpe dig med at handle hurtigt.<\/p>\n\n\n\n<p>Tinba-virussen er en kraftig p\u00e5mindelse om de allestedsn\u00e6rv\u00e6rende risici i den digitale verden. Som banktrojaner er dens hovedm\u00e5l at stj\u00e6le dine finansielle oplysninger og muligvis g\u00f8re et stort indhug i din lomme. Hvis du forst\u00e5r, hvordan Tinba fungerer, og tr\u00e6ffer proaktive foranstaltninger til dit forsvar, vil det i h\u00f8j grad reducere sandsynligheden for, at du ikke kun bliver offer for denne, men ogs\u00e5 for andre cybertrusler. V\u00e6r p\u00e5 vagt, hold dig informeret, og oprethold et st\u00e6rkt digitalt forsvar.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersikkerhedsverdenen leger katten efter musen og fors\u00f8ger at overliste nye cybertrusler, bl.a. den berygtede Tinba-virus, som allerede har angrebet flere millioner brugere verden over. Tinba er en forkortelse for... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/cyber-trusler\/tinba-virus-en-snodig-bank-trojaner\/\">Read more <span class=\"screen-reader-text\">Tinba-virus: En skurkagtig banktrojaner<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,15,21,25,26,29],"tags":[],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-cybersecurity","category-malware","category-phishing","category-scams","category-spyware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tinba Virus: A Nefarious Banking Trojan | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/cyber-trusler\/tinba-virus-en-snodig-bank-trojaner\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; L\u00e6s mere Tinba Virus: A Nefarious Banking Trojan\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/cyber-trusler\/tinba-virus-en-snodig-bank-trojaner\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T16:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T16:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tinba Virus: A Nefarious Banking Trojan\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"articleSection\":[\"Cyber Threats\",\"cybersecurity\",\"Malware\",\"Phishing\",\"scams\",\"spyware\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"name\":\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"width\":1265,\"height\":422,\"caption\":\"Tinba Virus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tinba Virus: A Nefarious Banking Trojan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tinba Virus: En Nefarious Banking Trojan | Sikkerhedsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/cyber-trusler\/tinba-virus-en-snodig-bank-trojaner\/","og_locale":"da_DK","og_type":"article","og_title":"Tinba Virus: A Nefarious Banking Trojan | Security Briefing","og_description":"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; L\u00e6s mere Tinba Virus: A Nefarious Banking Trojan","og_url":"https:\/\/securitybriefing.net\/da\/cyber-trusler\/tinba-virus-en-snodig-bank-trojaner\/","og_site_name":"Security Briefing","article_published_time":"2024-09-02T16:20:55+00:00","article_modified_time":"2024-09-02T16:20:58+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","type":"image\/png"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"C\u00e9sar Daniel Barreto","Estimeret l\u00e6setid":"4 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tinba Virus: A Nefarious Banking Trojan","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"wordCount":849,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","articleSection":["Cyber Threats","cybersecurity","Malware","Phishing","scams","spyware"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","name":"Tinba Virus: En Nefarious Banking Trojan | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","width":1265,"height":422,"caption":"Tinba Virus"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tinba Virus: A Nefarious Banking Trojan"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto er en anerkendt cybersikkerhedsskribent og -ekspert, der er kendt for sin dybdeg\u00e5ende viden og evne til at forenkle komplekse cybersikkerhedsemner. Med omfattende erfaring inden for netv\u00e6rkssikkerhed og databeskyttelse bidrager han regelm\u00e6ssigt med indsigtsfulde artikler og analyser om de seneste cybersikkerhedstendenser, der uddanner b\u00e5de fagfolk og offentligheden.","url":"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/2637"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}