{"id":2431,"date":"2023-12-23T19:54:06","date_gmt":"2023-12-23T19:54:06","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2431"},"modified":"2023-12-23T20:05:06","modified_gmt":"2023-12-23T20:05:06","slug":"az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata\/","title":{"rendered":"\u00c1llamilag t\u00e1mogatott k\u00e1rtev\u0151k m\u00e9lyrehat\u00f3 vizsg\u00e1lata"},"content":{"rendered":"<p>Turla\u2019s Sophisticated Breach of European Union Governments<br>A kiberh\u00e1bor\u00fa ter\u00fclete tan\u00faja volt egy <a href=\"https:\/\/malicious.life\/episode\/episode-230\/\" target=\"_blank\" rel=\"noreferrer noopener\">jelent\u0151s el\u0151rel\u00e9p\u00e9snek a Turla megjelen\u00e9s\u00e9vel<\/a>, egy hacker csoport<br>, amelyet kifinomult m\u00f3dszereir\u0151l ismertek, amelyekkel t\u00f6bb eur\u00f3pai uni\u00f3s korm\u00e1ny biztons\u00e1g\u00e1t t\u00f6rt\u00e9k meg. Ez a<br>t\u00f6rt\u00e9net 2016 v\u00e9g\u00e9n kezdett kibontakozni, amikor egy 2017-es kiberbiztons\u00e1gi audit N\u00e9metorsz\u00e1gban felfedte egy kompromitt\u00e1lt<br>Microsoft Outlook verzi\u00f3 telep\u00edt\u00e9s\u00e9t k\u00fcl\u00f6nb\u00f6z\u0151 korm\u00e1nyzati oszt\u00e1lyokban, amelyet a Turla legal\u00e1bb az<br>el\u0151z\u0151 \u00e9v \u00f3ta haszn\u00e1lt.<\/p>\n\n\n\n<p class=\"translation-block\"><br>Ez a m\u0171velet egy apr\u00f3l\u00e9kos \u00e9s t\u00f6bbr\u00e9teg\u0171 megk\u00f6zel\u00edt\u00e9st mutatott be, amely adathal\u00e1szattal kezd\u0151d\u00f6tt \u2013 egy megt\u00e9veszt\u0151<br>technika, amely arra k\u00e9szteti az \u00e1ldozatokat, hogy azt higgy\u00e9k, megb\u00edzhat\u00f3 entit\u00e1ssal l\u00e9pnek kapcsolatba. A Turla szisztematikusan<br>telep\u00edtett egy sor tr\u00f3jait, amelyek mindegyike m\u00e9lyebb rendszerhozz\u00e1f\u00e9r\u00e9st biztos\u00edtott sz\u00e1mukra, v\u00e9g\u00fcl kihaszn\u00e1lva egy<br>sebezhet\u0151s\u00e9get a <a href=\"https:\/\/www.trendmicro.com\/it_it\/research\/23\/i\/examining-the-activities-of-the-turla-group.html\" target=\"_self\">Microsoft Outlookban, hogy elfogj\u00e1k az \u00f6sszes e-mailt<\/a> a fert\u0151z\u00f6tt g\u00e9pekr\u0151l.<\/p>\n\n\n\n<p class=\"translation-block\"><br>A Turla k\u00e1rtev\u0151inek \u00f6sszetetts\u00e9ge figyelemre m\u00e9lt\u00f3 volt, v\u00edrusok, tr\u00f3jaiak, rootkitek \u00e9s<br>f\u00e9rgek elemeit kombin\u00e1lva, amelyek mindegyike k\u00fcl\u00f6n c\u00e9lt szolg\u00e1lt \u2013 a g\u00e9pek megb\u00e9n\u00edt\u00e1s\u00e1t\u00f3l a rejtett m\u0171k\u00f6d\u00e9s \u00e9s<br>h\u00e1l\u00f3zati terjed\u00e9s biztos\u00edt\u00e1s\u00e1ig. Ez a k\u00fcl\u00f6nleges kihaszn\u00e1l\u00e1s a tr\u00f3jai, rootkit \u00e9s f\u00e9reg funkci\u00f3k kever\u00e9ke volt, amelyet arra terveztek,<br>hogy \u00e9szrev\u00e9tlen maradjon, mik\u00f6zben m\u00f3dszeresen behatol a h\u00e1l\u00f3zat m\u00e9ly\u00e9re. Ezenk\u00edv\u00fcl egy innovat\u00edv<br>kommunik\u00e1ci\u00f3s m\u00f3dszert alkalmazott a Turla parancsnoki k\u00f6zpontj\u00e1val, \u00e9s k\u00e9pes volt friss\u00edt\u00e9seket fogadni. Az<br>fert\u0151z\u00f6tt f\u00e1jlok elemz\u00e9se felt\u00e1rta, hogy eredet\u00fck 2009-re ny\u00falik vissza, ami egy hossz\u00fa t\u00e1v\u00fa, fejl\u0151d\u0151 fenyeget\u00e9st jelez.<\/p>\n\n\n\n<p class=\"translation-block\"><br>A kihaszn\u00e1l\u00e1s k\u00f6z\u00e9ppontj\u00e1ban az Outlook egyedi b\u0151v\u00edtm\u00e9ny funkci\u00f3j\u00e1nak haszn\u00e1lata \u00e1llt. A Turla megtal\u00e1lta a m\u00f3dj\u00e1t, hogy telep\u00edtsen egy<br>k\u00e1ros b\u0151v\u00edtm\u00e9nyt, amely, b\u00e1r l\u00e1thatatlan az Outlook men\u00fciben, k\u00e9pes volt \u00e1tvizsg\u00e1lni az \u00f6sszes e-mailt \u00e9s tov\u00e1bb\u00edtani az inform\u00e1ci\u00f3kat<br>az alapjukra. A t\u0171zfal v\u00e9delmek megker\u00fcl\u00e9s\u00e9re titkos\u00edtott PDF f\u00e1jlokat haszn\u00e1ltak, amelyeket e-mail mell\u00e9kletk\u00e9nt k\u00fcldtek,<br>amelyek parancsokat \u00e9s begy\u0171jt\u00f6tt adatokat tartalmaztak. Ezek a f\u00e1jlok, b\u00e1r \u00e1rtalmatlannak t\u0171ntek, csak egy 1\u00d71<br>pixeles feh\u00e9r k\u00e9pet tartalmaztak. A k\u00e1rtev\u0151 az Outlook e-mail kezel\u0151 rendszereit is kihaszn\u00e1lta a parancs \u00e9s<br>ir\u00e1ny\u00edt\u00e1si kommunik\u00e1ci\u00f3k diszkr\u00e9t kezel\u00e9s\u00e9re, hat\u00e9konyan elt\u00fcntetve l\u00e9tez\u00e9s\u00e9nek minden nyom\u00e1t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"stuxnet-a-cyber-weapon-targeting-iran\">Stuxnet: Egy Kiberfegyver Ir\u00e1n Ellen<\/h2>\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/topics\/computer-science\/stuxnet\" target=\"_blank\" rel=\"noreferrer noopener\">A Stuxnet m\u00e9rf\u00f6ldk\u0151 a kiberh\u00e1bor\u00faban<\/a>, primarily targeting Iran\u2019s nuclear ambitions. As a worm,<br>A Stuxnetet arra tervezt\u00e9k, hogy behatoljon a Siemens ur\u00e1nd\u00fas\u00edt\u00f3 centrifug\u00e1khoz csatlakoztatott Windows rendszerekbe.<br>Az architekt\u00far\u00e1ja a kiberh\u00e1bor\u00fa csod\u00e1ja volt, amelyet arra programoztak, hogy \u00e9szrev\u00e9tlen\u00fcl terjedjen, inakt\u00edv maradjon, am\u00edg meg nem tal\u00e1lja<br>a c\u00e9lpontot, \u00e9s 2012 j\u00fanius\u00e1ra \u00f6nmag\u00e1t elt\u00e1vol\u00edtsa, hogy cs\u00f6kkentse a felder\u00edt\u00e9s kock\u00e1zat\u00e1t.<br>A Stuxnet k\u00e9zbes\u00edt\u00e9si m\u00f3dszere fert\u0151z\u00f6tt USB meghajt\u00f3kon kereszt\u00fcl t\u00f6rt\u00e9nt, amelyek n\u00e9gy kor\u00e1bban ismeretlen<br>sebezhet\u0151s\u00e9get haszn\u00e1ltak ki a Windowsban. <\/p>\n\n\n\n<p>M\u0171k\u00f6d\u00e9si strat\u00e9gi\u00e1ja finom, de puszt\u00edt\u00f3 volt: a c\u00e9lpont megtal\u00e1l\u00e1sa ut\u00e1n a Stuxnet<br>a centrifug\u00e1k meghib\u00e1sod\u00e1s\u00e1t okozta, ami fizikai pusztul\u00e1sukhoz vezetett, mik\u00f6zben egyidej\u0171leg<br>falsifying operational reports to avoid detection. The worm\u2019s discovery in 2010 led to extensive investigations<br>biztons\u00e1gi c\u00e9gek, mint a belorusz c\u00e9g \u00e9s a Kaspersky Labs, felfedt\u00e9k \u00f6sszetetts\u00e9g\u00e9t, \u00e9s azt sugallj\u00e1k, hogy<br>egy specializ\u00e1lt, esetleg \u00e1llamilag t\u00e1mogatott csapat r\u00e9szv\u00e9tele \u00e1llhat a h\u00e1tt\u00e9rben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"dugu-the-offspring-of-stuxnet\">Duqu: A Stuxnet Ut\u00f3dja<br><\/h2>\n\n\n<p class=\"translation-block\">2011-ben megjelent a Duqu, <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC8010317\/\" target=\"_blank\" rel=\"noreferrer noopener\">gyakran \u201cStuxnet fia\u201d n\u00e9ven emlegetik,<\/a> k\u00f3dol\u00e1si hasonl\u00f3s\u00e1gokat mutatott, de sz\u00e9lesebb<br>c\u00e9lz\u00e1si tartom\u00e1nnyal rendelkezett. K\u00e9pes volt k\u00fcl\u00f6nb\u00f6z\u0151 sz\u00e1m\u00edt\u00f3g\u00e9pekbe \u00e9s szervezetekbe be\u00fcltetni mag\u00e1t, v\u00e9gs\u0151 c\u00e9lja<br>rejt\u00e9ly maradt. A Duqu rosszindulat\u00fa Word dokumentumokon kereszt\u00fcl terjedt, kihaszn\u00e1lva egy nulladik napi<br>sebezhet\u0151s\u00e9get \u00e9s egy puffer t\u00falcsordul\u00e1st a Word bet\u0171t\u00edpusokban. Ez lehet\u0151v\u00e9 tette sz\u00e1m\u00e1ra, hogy magas szint\u0171<br>adminisztrat\u00edv jogosults\u00e1gokkal hajtson v\u00e9gre k\u00f3dot. A tr\u00f3jai kifinomult volt m\u0171k\u00f6d\u00e9s\u00e9ben, addig maradt inakt\u00edv, am\u00edg bizonyos<br>felt\u00e9telek nem teljes\u00fcltek, miel\u0151tt tov\u00e1bbi m\u0171veleteket hajtott volna v\u00e9gre.<\/p>\n\n\n<h2 class=\"wp-block-heading translation-block\" id=\"flameskywiper-pushing-the-boundaries-of-malwarecomplexity\">Flame\/Skywiper: A K\u00e1rtev\u0151k Bonyolults\u00e1g\u00e1nak Hat\u00e1rainak Kitol\u00e1sa<br><\/h2>\n\n\n<p><br>A Flame, m\u00e1s n\u00e9ven <a href=\"https:\/\/www.gdatasoftware.com\/blog\/2012\/06\/24048-flame-flamer-skywiper-most-complex-sophisticated-malware-ever-found\" target=\"_blank\" rel=\"noreferrer noopener\">Skywiper, 2012-ben fedezt\u00e9k fel<\/a>, \u00faj szintet k\u00e9pviselt a k\u00e1rtev\u0151k kifinomults\u00e1g\u00e1ban,<br>els\u0151sorban Ir\u00e1nt c\u00e9lozva. Tr\u00f3jai, f\u00e9reg \u00e9s billenty\u0171zetfigyel\u0151 k\u00e9pess\u00e9gekkel felszerelve a Flame k\u00e9pes volt r\u00f6gz\u00edteni<br>sz\u00e9les adatfajt\u00e1kat, a h\u00e1l\u00f3zati forgalomt\u00f3l a Skype besz\u00e9lget\u00e9sekig, s\u0151t Bluetooth<br>kapcsolatokba is behatolhatott adatkinyer\u00e9s c\u00e9lj\u00e1b\u00f3l. Nagy m\u00e9rete \u00e9s \u00f6sszetetts\u00e9ge az egyik legfejlettebb k\u00e1rtev\u0151v\u00e9 tette,<br>amit valaha l\u00e1ttak, jelent\u0151s befektet\u00e9st jelezve a fejleszt\u00e9s\u00e9ben.<\/p>\n\n\n<h2 class=\"wp-block-heading translation-block\" id=\"the-role-of-cryptography-and-hashing-incybersecurity\">A Kriptogr\u00e1fia \u00e9s a Hashing Szerepe a<br>Kiberbiztons\u00e1gban<br><\/h2>\n\n\n<p>M\u00edg az ilyen \u00e1llamilag t\u00e1mogatott k\u00e1rtev\u0151k k\u00f6zvetlen fenyeget\u00e9se az \u00e1tlagos felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra minim\u00e1lis, ezek az esetek r\u00e1vil\u00e1g\u00edtanak<br>a robusztus biztons\u00e1gi gyakorlatok kritikus fontoss\u00e1g\u00e1ra \u00e9s a szoftverc\u00e9gek \u00e1ltal szembes\u00fclt kih\u00edv\u00e1sokra a<br>term\u00e9kbiztons\u00e1g biztos\u00edt\u00e1sa ter\u00e9n. A sz\u00e1m\u00edt\u00e1si teljes\u00edtm\u00e9ny fejl\u0151d\u00e9se folyamatosan kih\u00edv\u00e1st jelent a<br>kriptogr\u00e1fiai algoritmusok biztons\u00e1g\u00e1ra, \u00edgy a r\u00e9gebbi szoftverek haszn\u00e1lata egyre kock\u00e1zatosabb\u00e1 v\u00e1lik.<br><\/p>\n\n\n\n<p><strong>K\u00f6vetkeztet\u00e9s<\/strong><br>Az olyan kifinomult k\u00e1rtev\u0151k m\u0171k\u00f6d\u00e9s\u00e9nek meg\u00e9rt\u00e9se, mint a Stuxnet, Duqu \u00e9s Flame, elengedhetetlen a<br>kiberbiztons\u00e1g bonyolults\u00e1g\u00e1nak \u00e9s nyom\u00e1sainak meg\u00e9rt\u00e9s\u00e9hez. Az \u00e1tlagos felhaszn\u00e1l\u00f3 sz\u00e1m\u00e1ra az els\u0151dleges kock\u00e1zatok<br>a rossz biztons\u00e1gi gyakorlatokb\u00f3l sz\u00e1rmaznak, mint p\u00e9ld\u00e1ul a jelsz\u00f3 \u00fajrafelhaszn\u00e1l\u00e1sa vagy felesleges fi\u00f3kok fenntart\u00e1sa. Az ilyen<br>magas szint\u0171 kiberfenyeget\u00e9sek tudatos\u00edt\u00e1sa hangs\u00falyozza a folyamatos \u00e9s naprak\u00e9sz biztons\u00e1g fenntart\u00e1s\u00e1nak fontoss\u00e1g\u00e1t.<br>int\u00e9zked\u00e9sek a potenci\u00e1lis kiberfenyeget\u00e9sek elleni v\u00e9delem \u00e9rdek\u00e9ben. Az alakul\u00f3 t\u00e1j<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Tov\u00e1bbi Olvasm\u00e1nyok \u00e9s Forr\u00e1sok<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"translation-block\">TechCrunch: <a href=\"https:\/\/consent.yahoo.com\/v2\/collectConsent?sessionId=3_cc-session_fac35bff-7518-489d-8042-052e65ec76a0\" target=\"_blank\" rel=\"noreferrer noopener\">Hogyan bontotta le az USA az orosz k\u00e9mek \u00e1ltal haszn\u00e1lt k\u00e1rtev\u0151 h\u00e1l\u00f3zatot, amely korm\u00e1nyzati titkokat lopott<\/a> \u2013 Ez a cikk<br>arr\u00f3l sz\u00f3l, hogyan zavarta meg az amerikai korm\u00e1ny a Turla \u00e1ltal v\u00e9grehajtott, hossz\u00fa t\u00e1v\u00fa orosz kiberk\u00e9mked\u00e9si kamp\u00e1nyt, amely<br>\u00e9rz\u00e9keny inform\u00e1ci\u00f3kat lopott az USA \u00e9s a NATO korm\u00e1nyait\u00f3l.<\/li>\n\n\n\n<li>Kaspersky: The Epic Turla (snake\/Uroburos) attacks \u2013 <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/epic-turla-snake-malware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">A Kaspersky \u00e1ttekint\u00e9st ny\u00fajt a Turl\u00e1r\u00f3l<\/a>, m\u00e1s n\u00e9ven Snake vagy<br>Uroburos, amelyet az egyik legkifinomultabb folyamatban l\u00e9v\u0151 kiberk\u00e9mked\u00e9si kamp\u00e1nyk\u00e9nt \u00edr le. A cikk tippeket is ad arra vonatkoz\u00f3an, hogyan<br>v\u00e9dekezhet\u00fcnk az ilyen t\u00e1mad\u00e1sok ellen.<\/li>\n\n\n\n<li>A Hacker H\u00edrek: <a href=\"https:\/\/thehackernews.com\/2023\/05\/us-government-neutralizes-russias-most.html\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Government Neutralizes Russia\u2019s Most Sophisticated Snake Cyber Espionage Tool<\/a> \u2013 This article details<br>the U.S. government\u2019s efforts in neutralizing the Snake malware, a sophisticated cyber espionage tool used by Turla, which had<br>\u00e9rz\u00e9keny dokumentumokat lopott sz\u00e1mos sz\u00e1m\u00edt\u00f3g\u00e9pes rendszerb\u0151l k\u00fcl\u00f6nb\u00f6z\u0151 orsz\u00e1gokban.<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>Turla kifinomult bet\u00f6r\u00e9se az Eur\u00f3pai Uni\u00f3 korm\u00e1nyaiba A kiberhadvisel\u00e9s ter\u00fclet\u00e9n jelent\u0151s el\u0151rel\u00e9p\u00e9s t\u00f6rt\u00e9nt a Turla megjelen\u00e9s\u00e9vel, amely egy hacker csoport, amely ismert a kifinomult m\u00f3dszereir\u0151l a bet\u00f6r\u00e9sek sor\u00e1n\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata\/\">Folytat\u00e1s <span class=\"screen-reader-text\">\u00c1llamilag t\u00e1mogatott k\u00e1rtev\u0151k m\u00e9lyrehat\u00f3 vizsg\u00e1lata<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2434,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2431","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In-Depth Exploration of State Sponsored Malware | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In-Depth Exploration of State Sponsored Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Turla&#8217;s Sophisticated Breach of European Union GovernmentsThe realm of cyber warfare witnessed a significant advancement with the advent of Turla, a hacker groupknown for its sophisticated methods in breaching the&hellip; Continue reading In-Depth Exploration of State Sponsored Malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-23T19:54:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-23T20:05:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"956\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"In-Depth Exploration of State Sponsored Malware\",\"datePublished\":\"2023-12-23T19:54:06+00:00\",\"dateModified\":\"2023-12-23T20:05:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\"},\"wordCount\":864,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\",\"name\":\"In-Depth Exploration of State Sponsored Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"datePublished\":\"2023-12-23T19:54:06+00:00\",\"dateModified\":\"2023-12-23T20:05:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"width\":956,\"height\":515,\"caption\":\"In-Depth Exploration of State Sponsored Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In-Depth Exploration of State Sponsored Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Az \u00e1llamilag t\u00e1mogatott rosszindulat\u00fa szoftverek m\u00e9lyrehat\u00f3 vizsg\u00e1lata | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata\/","og_locale":"hu_HU","og_type":"article","og_title":"In-Depth Exploration of State Sponsored Malware | Security Briefing","og_description":"Turla&#8217;s Sophisticated Breach of European Union GovernmentsThe realm of cyber warfare witnessed a significant advancement with the advent of Turla, a hacker groupknown for its sophisticated methods in breaching the&hellip; Continue reading In-Depth Exploration of State Sponsored Malware","og_url":"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/az-allamilag-tamogatott-kartevok-melyrehato-vizsgalata\/","og_site_name":"Security Briefing","article_published_time":"2023-12-23T19:54:06+00:00","article_modified_time":"2023-12-23T20:05:06+00:00","og_image":[{"width":956,"height":515,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"4 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"In-Depth Exploration of State Sponsored Malware","datePublished":"2023-12-23T19:54:06+00:00","dateModified":"2023-12-23T20:05:06+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/"},"wordCount":864,"commentCount":0,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","articleSection":["Malware"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/","url":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/","name":"Az \u00e1llamilag t\u00e1mogatott rosszindulat\u00fa szoftverek m\u00e9lyrehat\u00f3 vizsg\u00e1lata | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","datePublished":"2023-12-23T19:54:06+00:00","dateModified":"2023-12-23T20:05:06+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","width":956,"height":515,"caption":"In-Depth Exploration of State Sponsored Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"In-Depth Exploration of State Sponsored Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=2431"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2431\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/2434"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=2431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=2431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=2431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}