{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/hirek\/a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban\/","title":{"rendered":"A banki tr\u00f3jai programok, adathal\u00e1szat \u00e9s zsarol\u00f3programok tov\u00e1bbra is domin\u00e1lnak 2023-ban"},"content":{"rendered":"<p>A Covid-19 helyzet felgyors\u00edtotta a digit\u00e1lis \u00e1talakul\u00e1si folyamatokat \u00e9s formaliz\u00e1lta a t\u00e1vmunka rendszereket, ami a kibervesz\u00e9lyek soha nem l\u00e1tott \u00e9s soha nem v\u00e1rt szintre emelked\u00e9s\u00e9t eredm\u00e9nyezte. Ne feledj\u00fck, hogy a Malware k\u00e9t sz\u00f3 kombin\u00e1ci\u00f3ja \u2013 \u201cmalicious\u201d \u00e9s \u201csoftware\u201d. Ez a kifejez\u00e9s b\u00e1rmilyen t\u00edpus\u00fa rosszindulat\u00fa k\u00f3dra utal, f\u00fcggetlen\u00fcl att\u00f3l, hogy hogyan hat az \u00e1ldozatokra, hogyan viselkedik, vagy milyen k\u00e1rokat okoz. A Malware mag\u00e1ban foglal minden rosszindulat\u00fa szoftvert, bele\u00e9rtve a tr\u00f3jai falovakat, a zsarol\u00f3programokat, a v\u00edrusokat, a f\u00e9rgeket \u00e9s a banki malware-eket. Egy \u00e1tlagos felhaszn\u00e1l\u00f3 sz\u00e1m\u00e1ra neh\u00e9z megk\u00fcl\u00f6nb\u00f6ztetni, hogy mely f\u00e1jlok malware-ek \u00e9s melyek nem. Ez\u00e9rt l\u00e9teznek biztons\u00e1gi megold\u00e1sok, mint p\u00e9ld\u00e1ul a kor\u00e1bban l\u00e1tott rosszindulat\u00fa mint\u00e1k hatalmas adatb\u00e1zisai \u00e9s t\u00f6bbf\u00e9le v\u00e9delmi technol\u00f3gia haszn\u00e1lata a leg\u00fajabbak felismer\u00e9s\u00e9re.<\/p>\n\n\n\n<p>A malware szerz\u0151k ma rendk\u00edv\u00fcl tal\u00e1l\u00e9konyak. Az \u00e9szlel\u00e9s elker\u00fcl\u00e9se \u00e9rdek\u00e9ben \u201calkot\u00e1saik\u201d kihaszn\u00e1lj\u00e1k a jav\u00edtatlan rendszerek sebezhet\u0151s\u00e9geit, megker\u00fclik a biztons\u00e1gi int\u00e9zked\u00e9seket, elrejt\u0151znek a mem\u00f3ri\u00e1ban, vagy legitim alkalmaz\u00e1soknak \u00e1lc\u00e1zz\u00e1k magukat. M\u00e9g ma is azonban az egyik leger\u0151sebb fert\u0151z\u00e9si vektor a l\u00e1nc leggyeng\u00e9bb l\u00e1ncszeme: az emberek. A rosszindulat\u00fa mell\u00e9kleteket tartalmaz\u00f3 e-mailek hat\u00e9kony \u00e9s alacsony k\u00f6lts\u00e9g\u0171 m\u00f3dnak bizonyultak egy rendszer kompromitt\u00e1l\u00e1s\u00e1ra. \u00c9s ehhez csak egy kattint\u00e1s sz\u00fcks\u00e9ges.<\/p>\n\n\n\n<p>Az els\u0151 l\u00e9p\u00e9s az \u00f6sszes szoftver, bele\u00e9rtve az oper\u00e1ci\u00f3s rendszert \u00e9s az \u00f6sszes alkalmaz\u00e1st, naprak\u00e9szen tart\u00e1sa. Nemcsak a funkci\u00f3k \u00e9s fejleszt\u00e9sek hozz\u00e1ad\u00e1sa \u00e9rdek\u00e9ben, hanem a hib\u00e1k jav\u00edt\u00e1sa \u00e9s a kiberb\u0171n\u00f6z\u0151k \u00e9s rosszindulat\u00fa k\u00f3dok \u00e1ltal kihaszn\u00e1lhat\u00f3 sebezhet\u0151s\u00e9gek kezel\u00e9se \u00e9rdek\u00e9ben is. Ez azonban nem fedi le az \u00f6sszes jelenlegi fenyeget\u00e9st. Tov\u00e1bb\u00e1, megb\u00edzhat\u00f3 \u00e9s naprak\u00e9sz biztons\u00e1gi megold\u00e1s sz\u00fcks\u00e9ges a potenci\u00e1lis t\u00e1mad\u00e1si k\u00eds\u00e9rletek megakad\u00e1lyoz\u00e1s\u00e1ra. A rendszeresen k\u00e9sz\u00edtett \u00e9s offline merevlemezen t\u00e1rolt biztons\u00e1gi ment\u00e9sek egy m\u00e1sik m\u00f3dja a malware elleni k\u00fczdelemnek, lehet\u0151v\u00e9 t\u00e9ve a felhaszn\u00e1l\u00f3 sz\u00e1m\u00e1ra, hogy k\u00f6nnyen p\u00f3tolja a kiberb\u0171n\u00f6z\u0151k \u00e1ltal megrong\u00e1lt vagy titkos\u00edtott adatokat.<\/p>\n\n\n\n<p>Eml\u00e9kezz\u00fcnk vissza egy kicsit a t\u00f6rt\u00e9nelemre. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">Pakiszt\u00e1ni Brain<\/a> volt az els\u0151 v\u00edrus, amelyet 1986 elej\u00e9n azonos\u00edtottak. C\u00e9lja az volt, hogy a lehet\u0151 leg\u00e9szrev\u00e9tlenebb legyen. A 5,25 h\u00fcvelykes floppy lemezek ind\u00edt\u00f3rendszer\u00e9t fert\u0151zte meg, \u00e9s hetek alatt vil\u00e1gszerte elterjedt, ami figyelemre m\u00e9lt\u00f3, tekintve, hogy csak 5,25 h\u00fcvelykes floppy lemezeken terjesztett\u00e9k. Az\u00f3ta a malware-ek sokf\u00e9lek\u00e9ppen fejl\u0151dtek, \u00e9s alkot\u00f3ik folyamatosan \u00faj m\u00f3dszereket tal\u00e1lnak ki az \u00e1ldozatok megfert\u0151z\u00e9s\u00e9re. Az internet r\u00e9v\u00e9n er\u0151teljes terjeszt\u00e9si h\u00e1l\u00f3zatuk van, amely lehet\u0151v\u00e9 teszi sz\u00e1mukra, hogy sokkal k\u00f6nnyebben \u00e9rints\u00e9k meg a potenci\u00e1lis \u00e1ldozatokat. Ez mindig is a hacker alapvet\u0151 logik\u00e1ja lesz, \u00e9s rajtunk m\u00falik, hogy intelligenci\u00e1t \u00e9s ellenintelligenci\u00e1t gyakoroljunk, hogy ellens\u00falyozzuk \u0151ket. N\u00e9h\u00e1ny malware csal\u00e1d, mint p\u00e9ld\u00e1ul a WannaCryptor, v\u00e1logat\u00e1s n\u00e9lk\u00fcl terjed, f\u00e1jlokat titkos\u00edtva \u00e9s glob\u00e1lis k\u00e1rokat okozva. M\u00e1sok kisebb \u00e1ldozati csoportokat \u00e9rintenek, p\u00e9ld\u00e1ul egy adott orsz\u00e1g v\u00e1llalatait a Diskcoder eset\u00e9ben. Petya, m\u00e1s n\u00e9ven C. Industroyer egy k\u00f6zelm\u00faltbeli p\u00e9lda a c\u00e9lzott malware-re. Ezt a malware-t az ESET fedezte fel, \u00e9s az ipari vez\u00e9rl\u0151rendszereket t\u00e1madja meg, amelyeket az elektromos h\u00e1l\u00f3zatban haszn\u00e1lnak, \u00e9s \u00e1ramkimarad\u00e1sokat okozott Ukrajn\u00e1ban az\u00e1ltal, hogy vissza\u00e9lt a legitim, de nem biztons\u00e1gos protokollokkal. Ez az egyik azon kev\u00e9s malware csal\u00e1d k\u00f6z\u00fcl, amely \u00f6sszehasonl\u00edthat\u00f3 a Stuxnettel, az els\u0151 valaha haszn\u00e1lt kiberfegyverrel.<\/p>\n\n\n\n<p>A pand\u00e9mia kihirdet\u00e9se \u00f3ta a kibert\u00e1mad\u00e1sok, p\u00e9ld\u00e1ul a Remote Desktop Protocol (RDP) \u00e9s a zsarol\u00f3programok elleni t\u00e1mad\u00e1sok sz\u00e1ma megn\u0151tt. A vil\u00e1gon 2022-re egymilli\u00e1rd rosszindulat\u00fa k\u00f3d lesz. A kibervesz\u00e9lyek azonban nemcsak sz\u00e1mban n\u00f6vekedtek, hanem egyre kifinomultabb\u00e1 is v\u00e1ltak. P\u00e9ld\u00e1ul ma \u201cFileless Malware\u201d-r\u0151l besz\u00e9l\u00fcnk, amely nem ig\u00e9nyli, hogy a felhaszn\u00e1l\u00f3 b\u00e1rmilyen f\u00e1jlt be\u00edrjon a rendszerbe a Malware futtat\u00e1s\u00e1hoz: a rendszer volatilis mem\u00f3ri\u00e1j\u00e1ban t\u00e1rolhat\u00f3. Ez\u00e9rt kritikus fontoss\u00e1g\u00fa a megfigyel\u00e9si \u00e9s megel\u0151z\u00e9si technol\u00f3gi\u00e1k alkalmaz\u00e1sa.<\/p>\n\n\n\n<p><br><strong>A k\u00f6vetkez\u0151 t\u00edpus\u00fa malware-eket fedezt\u00e9k fel 2021-ben \u00e9s 2022-ben:<\/strong><\/p>\n\n\n\n<p>1) <strong>Rosszindulat\u00fa Torrents<\/strong>: a kor\u00e1bban ismeretlen Kryptocibule Malware csal\u00e1db\u00f3l. Kriptovalut\u00e1t lop el, \u00e9s kriptovalut\u00e1val kapcsolatos f\u00e1jlokat exfiltr\u00e1l kriptob\u00e1ny\u00e1szok \u00e9s v\u00e1g\u00f3lap elt\u00e9r\u00edt\u00e9s seg\u00edts\u00e9g\u00e9vel.<\/p>\n\n\n\n<p>2) <strong>Android fenyeget\u00e9sek<\/strong>: A \u2018Hidden Apps\u2019 kateg\u00f3ri\u00e1ba tartoz\u00f3 malware h\u00e1rom egym\u00e1st k\u00f6vet\u0151 negyed\u00e9vben domin\u00e1lt 2022-ben. Ez a kibervesz\u00e9ly megt\u00e9veszt\u0151 alkalmaz\u00e1sokb\u00f3l \u00e1ll, amelyek j\u00e1t\u00e9koknak vagy seg\u00e9dprogramoknak \u00e1lc\u00e1zz\u00e1k magukat, de a telep\u00edt\u00e9s ut\u00e1n elrejtik ikonjaikat \u00e9s teljes k\u00e9perny\u0151s hirdet\u00e9seket jelen\u00edtenek meg.<\/p>\n\n\n\n<p>3)<strong> IoT kibervesz\u00e9lyek<\/strong>: Mivel az IoT eszk\u00f6z\u00f6ket kev\u00e9s vagy semmilyen biztons\u00e1ggal nem tervezt\u00e9k, k\u00f6nny\u0171 c\u00e9lpontok a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra. A t\u00e1mad\u00f3k megfert\u0151zhetik az ilyen eszk\u00f6z\u00f6ket rosszindulat\u00fa botokkal, \u00e9s botnetekben haszn\u00e1lhatj\u00e1k \u0151ket nagyszab\u00e1s\u00fa t\u00e1mad\u00e1sokhoz.<\/p>\n\n\n\n<p>4) <strong>Malware Mac-re<\/strong>: 2021-ben a Mac sz\u00e1m\u00edt\u00f3g\u00e9pekhez k\u00e9sz\u00fclt Kattana keresked\u00e9si alkalmaz\u00e1st lem\u00e1solt\u00e1k \u00e9s tr\u00f3jai programmal fert\u0151zt\u00e9k meg. A t\u00e1mad\u00f3k malware-t haszn\u00e1ltak, hogy inform\u00e1ci\u00f3kat lopjanak el, p\u00e9ld\u00e1ul b\u00f6ng\u00e9sz\u0151 s\u00fctiket, kriptovaluta t\u00e1rc\u00e1kat \u00e9s k\u00e9perny\u0151k\u00e9peket; 2022-re ezt a t\u00edpus\u00fa kibervesz\u00e9lyt teljesen megsz\u00fcntett\u00e9k.<\/p>\n\n\n\n<p>5) <strong>Rosszindulat\u00fa e-mailek<\/strong>: A rosszindulat\u00fa szoftverek e-mailen kereszt\u00fcli terjeszt\u00e9se 2022-ben n\u00f6vekedni fog. A Microsoft Office Exploit a leggyakoribb \u00e9szlel\u00e9s 2022-ben.<\/p>\n\n\n\n<p>A zsarol\u00f3programok tart\u00f3s kibervesz\u00e9lyt jelentenek, amelyek tart\u00f3san t\u00e1madj\u00e1k a szervezeteket, vesz\u00e9lyeztetve a kritikus infrastrukt\u00far\u00e1kat, p\u00e9ld\u00e1ul a korm\u00e1nyzati, eg\u00e9szs\u00e9g\u00fcgyi \u00e9s energiaint\u00e9zm\u00e9nyeket, \u00e9s egyre \u00f6sszetettebb\u00e9 v\u00e1lnak. Az \u00e9szlel\u00e9s\u00fck \u00e9s felsz\u00e1mol\u00e1suk. 2020-ban a zsarol\u00f3programok \u00e9s az adatsziv\u00e1rg\u00e1sok egyes\u00fcltek. Ebben <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">a cikkben<\/a>, r\u00e1mutat arra, hogy a k\u00fcl\u00f6nb\u00f6z\u0151 zsarol\u00f3program csal\u00e1dok \u00fczemeltet\u0151i \u00fajabb kock\u00e1zatot adtak ehhez a t\u00e1mad\u00e1st\u00edpushoz, mert a f\u00e1jlok elt\u00e9r\u00edt\u00e9se mellett most zsarol\u00e1st is gyakorolnak, a kompromitt\u00e1lt inform\u00e1ci\u00f3k kisziv\u00e1rogtat\u00e1s\u00e1nak kibervesz\u00e9ly\u00e9vel. Ez a m\u00f3dszer a Doxing technik\u00e1t alkalmazza, amely mag\u00e1ban foglalja az \u00e1ldozatok bizalmas adatainak megszerz\u00e9s\u00e9t, \u00e9s azzal fenyeget, hogy nyilv\u00e1noss\u00e1gra hozza azokat, hacsak nem fizetik ki a zsarol\u00e1st. K\u00e9ts\u00e9gtelen\u00fcl ez n\u00f6veli az \u00e9rintettekre nehezed\u0151 nyom\u00e1st, mert nemcsak a titkos\u00edtott inform\u00e1ci\u00f3k visszaszerz\u00e9s\u00e9r\u0151l van sz\u00f3, hanem arr\u00f3l is, hogy megakad\u00e1lyozz\u00e1k a lopott adatok nyilv\u00e1noss\u00e1gra ker\u00fcl\u00e9s\u00e9t.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Banki tr\u00f3jai programok<\/a>, m\u00e1s n\u00e9ven \u201cBankers\u201d, rosszindulat\u00fa k\u00f3dok, amelyeket sz\u00e9les k\u00f6rben haszn\u00e1lnak a kiberb\u0171n\u00f6z\u00e9s ter\u00fclet\u00e9n. Funkci\u00f3juk, hogy banki inform\u00e1ci\u00f3kat lopjanak el az ilyen t\u00edpus\u00fa szolg\u00e1ltat\u00e1sok felhaszn\u00e1l\u00f3it\u00f3l. Ezek a r\u00e9szletek el\u00e9rhet\u0151k a feketepiacon. N\u00e9h\u00e1nyan megszerzik \u0151ket, hogy b\u0171ncselekm\u00e9nyeket k\u00f6vessenek el, p\u00e9ld\u00e1ul zsarol\u00e1st \u00e9s csal\u00e1st. Vil\u00e1gszerte tizenegy banki tr\u00f3jai csal\u00e1dot azonos\u00edtottak.<\/p>\n\n\n\n<p>Ezek a csal\u00e1dok titkos\u00edt\u00e1si \u00e9s elhom\u00e1lyos\u00edt\u00e1si eszk\u00f6z\u00f6ket haszn\u00e1lnak, hogy megv\u00e9dj\u00e9k a k\u00f3dot az elemz\u00e9st\u0151l, \u00e9s \u00edgy megv\u00e9dj\u00e9k a rendszerekben v\u00e9gzett rosszindulat\u00fa tev\u00e9kenys\u00e9g\u00fcket. Az \u00e9szlel\u00e9sek elker\u00fcl\u00e9se \u00e9rdek\u00e9ben olyan utas\u00edt\u00e1sokat tartalmaznak a programoz\u00e1sukban, amelyeknek nincs konkr\u00e9t cselekv\u00e9s\u00fck; kit\u00f6ltik \u0151ket, ezek szem\u00e9tk\u00f3dok. Eddig t\u00f6bb mint 50 p\u00e9nzint\u00e9zetet azonos\u00edtottak az \u00fcgyfeleik megt\u00e9veszt\u00e9s\u00e9re ir\u00e1nyul\u00f3 szem\u00e9lyazonoss\u00e1g-lop\u00e1s \u00e1ldozatak\u00e9nt.<\/p>\n\n\n\n<p><strong>Az elm\u00falt h\u00e1rom \u00e9vben a leggyakoribb kibervesz\u00e9lyek a k\u00f6vetkez\u0151k voltak:<\/strong><\/p>\n\n\n\n<p>1) <strong>Zsarol\u00f3programok<\/strong>: fejleszt\u0151ik szervezett csoportokat alkotnak, \u00e9s az \u00e1ldozataikt\u00f3l ellopott adatokat a Dark Weben \u00e1rverezik el. 203 k\u00fcl\u00f6nb\u00f6z\u0151 zsarol\u00f3program-v\u00e1ltozatot azonos\u00edtottak.<\/p>\n\n\n\n<p>2) <strong>Exploitek<\/strong>: rosszindulat\u00fa k\u00f3d, amely megpr\u00f3b\u00e1l hozz\u00e1f\u00e9rni a berendez\u00e9sekhez a rendszerek sebezhet\u0151s\u00e9g\u00e9nek kihaszn\u00e1l\u00e1s\u00e1val. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">EternalBlue<\/a> (amelyhez a WannaCry v\u00edrus tartozik) \u00e9s a BlueKeep k\u00e9t elterjedtebb csal\u00e1d (t\u00e1voli asztali sebezhet\u0151s\u00e9g, ami 2022-ben v\u00e1lik relev\u00e1nss\u00e1 a t\u00e1vmunka trendje miatt).<\/p>\n\n\n\n<p>3) <strong>K\u00e9mprogramok<\/strong>: a kiberb\u0171n\u00f6z\u0151k \u201cklasszikus eszk\u00f6zei\u201d. Sz\u00e1mukra tov\u00e1bbra is kritikus fontoss\u00e1g\u00fa, hogy sz\u00e9les k\u00f6r\u0171 el\u00e9rhet\u0151s\u00e9ggel rendelkezzenek a terjeszt\u00e9sben. 2020 \u00f3ta a HoudRat tr\u00f3jai program \u00e1ll a lista \u00e9l\u00e9n.<\/p>\n\n\n\n<p>4) <strong>Adathal\u00e1szat<\/strong>: 2020-ban a phishing kamp\u00e1nyokhoz kapcsol\u00f3d\u00f3 f\u00e1jlok \u00e9szlel\u00e9se 27%-kal n\u0151tt, 2022-ben pedig 53%-ra emelkedett. Jelent\u0151s n\u00f6veked\u00e9st jelent, mivel ezek az \u00e9szlel\u00e9sek 2019-ben 15%-osak voltak.<\/p>\n\n\n\n<p>A p\u00e9nz\u00fcgyi kiberb\u0171n\u00f6z\u00e9s k\u00f6lts\u00e9ge meghaladta az 1600 milli\u00e1rd doll\u00e1rt. Mintha ez nem lenne el\u00e9g, a szakemberek hi\u00e1nya is fenn\u00e1ll a kibervesz\u00e9lyek v\u00e1ltoz\u00f3 t\u00e1jk\u00e9pe \u00e9s az \u00faj malware fejleszt\u00e9sek sokf\u00e9les\u00e9ge miatt, amelyek kiemelt\u00e9k a kiberbiztons\u00e1g ter\u00fclet\u00e9n dolgoz\u00f3 szakemberek hi\u00e1ny\u00e1t. K\u00fcl\u00f6nb\u00f6z\u0151, 2019 v\u00e9g\u00e9n k\u00f6zz\u00e9tett tanulm\u00e1nyok szerint 4,07 milli\u00f3 kiberbiztons\u00e1gi szakemberre volt sz\u00fcks\u00e9g.<\/p>","protected":false},"excerpt":{"rendered":"<p>A Covid-19 helyzet felgyors\u00edtotta a digit\u00e1lis \u00e1talakul\u00e1si folyamatokat \u00e9s form\u00e1liss\u00e1 tette a t\u00e1vmunka v\u00e9gz\u00e9s\u00e9t, ami a kibervesz\u00e9lyek olyan szint\u0171 n\u00f6veked\u00e9s\u00e9t eredm\u00e9nyezte, amit kor\u00e1bban soha nem l\u00e1ttunk \u00e9s nem is j\u00f3soltunk. Ne feledj\u00fck, hogy a rosszindulat\u00fa szoftverek\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A banki tr\u00f3jai programok, adathal\u00e1szat \u00e9s zsarol\u00f3programok tov\u00e1bbra is domin\u00e1lnak 2023-ban<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/hirek\/a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digit\u00e1lis fenyeget\u00e9sek 2023-ban - Securitybriefing.net","description":"Ismerje meg a banki tr\u00f3jai programok, az adathal\u00e1szat \u00e9s a zsarol\u00f3programok folyamatos dominanci\u00e1j\u00e1t 2023-ban. Kapjon tippeket a v\u00e9delem \u00e9rdek\u00e9ben.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/hirek\/a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban\/","og_locale":"hu_HU","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/hu\/hirek\/a-banki-trojai-programok-adathalaszat-es-zsaroloprogramok-tovabbra-is-uraljak-a-terepet-2023-ban\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"Digit\u00e1lis fenyeget\u00e9sek 2023-ban - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"Ismerje meg a banki tr\u00f3jai programok, az adathal\u00e1szat \u00e9s a zsarol\u00f3programok folyamatos dominanci\u00e1j\u00e1t 2023-ban. Kapjon tippeket a v\u00e9delem \u00e9rdek\u00e9ben.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}