{"id":2569,"date":"2024-07-25T22:46:42","date_gmt":"2024-07-25T22:46:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2569"},"modified":"2024-07-25T23:18:21","modified_gmt":"2024-07-25T23:18:21","slug":"apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre\/","title":{"rendered":"Tiny Banker tr\u00f3jai: Egy rejtett kiberfenyeget\u00e9s m\u00e9lyrehat\u00f3 elemz\u00e9se"},"content":{"rendered":"<p>Az \u00f6sszes folyamatosan fejl\u0151d\u0151 kibervesz\u00e9ly k\u00f6z\u00fcl a Tiny Banker tr\u00f3jai kiemelkedik, mint az egyik legvesz\u00e9lyesebb \u00e9s legrejt\u00e9lyesebb banki tr\u00f3jai. El\u0151sz\u00f6r 2012-ben fedezt\u00e9k fel, \u00e9s sz\u00e1mos p\u00e9nz\u00fcgyi adat megs\u00e9rt\u00e9s\u00e9\u00e9rt \u00e9s jelent\u0151s p\u00e9nz\u00fcgyi vesztes\u00e9gek\u00e9rt volt felel\u0151s vil\u00e1gszerte. Ez a bejegyz\u00e9s a Tiny Banker tr\u00f3jai eredet\u00e9t, jellemz\u0151it \u00e9s ellenszereit vizsg\u00e1lja, \u00e1tfog\u00f3 meg\u00e9rt\u00e9st ny\u00fajtva err\u0151l a kibervesz\u00e9lyr\u0151l.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-tiny-banker-trojan\">Mi a Tiny Banker tr\u00f3jai?<\/h2>\n\n\n<p><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/tiny-banker-trojan-tbt-tinba\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tiny Banker tr\u00f3jai<\/a> is a banking malware used to steal sensitive information from users to steal sensitive financial information. This malware basically attacks and intercepts\/manipulates web traffic between the user and the banking websites. But, opposite to the name \u201cTiny,\u201d this Trojan is very effective and dangerous despite being small in size.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-tiny-banker-work\">Hogyan m\u0171k\u00f6dik a Tiny Banker?<\/h2>\n\n\n<p>Sz\u00e1mos kifinomult mechanizmus r\u00e9v\u00e9n a Tiny Banker a k\u00f6vetkez\u0151 m\u00f3dokon m\u0171k\u00f6dik:<\/p>\n\n\n\n<p><strong>Fert\u0151z\u00e9si vektorok<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>E-mail mell\u00e9kletek:<\/strong> <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.tinba\" target=\"_blank\" rel=\"noreferrer noopener\">A Tinba els\u0151sorban e-mailen kereszt\u00fcl terjed<\/a> mell\u00e9kletek, ahol adathal\u00e1sz e-mailek rosszindulat\u00fa mell\u00e9kleteit haszn\u00e1lj\u00e1k.<\/li>\n\n\n\n<li><strong>Rosszindulat\u00fa linkek:<\/strong> E-mailekben vagy felt\u00f6rt weboldalakon tal\u00e1lhat\u00f3 linkek vezetnek a rosszindulat\u00fa szoftverek let\u00f6lt\u00e9s\u00e9hez.<\/li>\n\n\n\n<li><strong>Drive-by let\u00f6lt\u00e9sek:<\/strong> A rosszindulat\u00fa szoftver automatikusan let\u00f6lt\u0151dik, amikor a felhaszn\u00e1l\u00f3 megl\u00e1togat egy fert\u0151z\u00f6tt weboldalt.<\/li>\n<\/ul>\n\n\n\n<p><strong>F\u0151 funkci\u00f3k<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Webes injekci\u00f3:<\/strong> A Tinba rosszindulat\u00fa k\u00f3dot injekt\u00e1l a c\u00e9lzott banki oldalak weboldalaiba. Ily m\u00f3don siker\u00fcl megszereznie a bejelentkez\u00e9si adatokat \u00e9s m\u00e1s \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat, amelyeket a felhaszn\u00e1l\u00f3 be\u00edrt.<\/li>\n\n\n\n<li><strong>B\u00f6ng\u00e9sz\u0151-k\u00f6zti t\u00e1mad\u00e1sok:<\/strong> A tr\u00f3jai k\u00f6zvet\u00edt\u0151k\u00e9nt m\u0171k\u00f6dik a b\u00f6ng\u00e9sz\u0151 \u00e9s a felhaszn\u00e1l\u00f3 k\u00f6z\u00f6tt. A kommunik\u00e1ci\u00f3k lehallgat\u00e1sa lehet\u0151v\u00e9 teszi a Tinba sz\u00e1m\u00e1ra, hogy tranzakci\u00f3kat m\u00f3dos\u00edtson, fi\u00f3kadatokat szerkesszen, \u00e9s sz\u00e1mos m\u00e1s jogosulatlan m\u0171veletet hajtson v\u00e9gre - an\u00e9lk\u00fcl, hogy a felhaszn\u00e1l\u00f3 \u00e9szrevenn\u00e9.<\/li>\n\n\n\n<li><strong>Adatlop\u00e1s:<\/strong> Captured data is then sent back to the attacker\u2019s server. Most of the time, this will include login credentials, account numbers, and other financial information.<\/li>\n\n\n\n<li><strong>Kitart\u00e1si mechanizmusok:<\/strong> A Tinba sz\u00e1mos technik\u00e1t alkalmaz, hogy a fert\u0151z\u00f6tt rendszeren maradjon, bele\u00e9rtve a rendszerle\u00edr\u00f3 bejegyz\u00e9sek l\u00e9trehoz\u00e1s\u00e1t \u00e9s \u00f6nmaga t\u00f6bb helyre val\u00f3 m\u00e1sol\u00e1s\u00e1t.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"impact-of-tiny-banker-trojan\">A Tiny Banker tr\u00f3jai hat\u00e1sa<\/h2>\n\n\n<p>The effects of Tinba on the attacked victims may be devastating. There can be direct financial losses due to unauthorized transactions and loss of personal and financial information. For financial institutions, it causes a loss of customers\u2019 trust and can attract legal consequences for breaking data protection laws.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-detect-and-remove\">Hogyan lehet \u00e9szlelni \u00e9s elt\u00e1vol\u00edtani<\/h2>\n\n\n<p>Mind biztons\u00e1gi int\u00e9zked\u00e9sekre, mind eszk\u00f6z\u00f6kre sz\u00fcks\u00e9g van a Tiny Banker tr\u00f3jai \u00e9szlel\u00e9s\u00e9hez \u00e9s elt\u00e1vol\u00edt\u00e1s\u00e1hoz.<\/p>\n\n\n\n<p><strong>\u00c9szlel\u00e9si m\u00f3dszerek<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Viselked\u00e9selemz\u00e9s:<\/strong> Ez mag\u00e1ban foglalja az alkalmaz\u00e1s figyel\u00e9s\u00e9t b\u00e1rmilyen rendellenes viselked\u00e9sre, mint p\u00e9ld\u00e1ul v\u00e1ratlan webes injekci\u00f3k vagy jogosulatlan tranzakci\u00f3k. Friss\u00edtett biztons\u00e1gi szoftver sz\u00fcks\u00e9ges <a href=\"https:\/\/cybeready.com\/cyber-attacks\/steps-to-protect-from-tiny-banker-trojan-tinba\" target=\"_blank\" rel=\"noreferrer noopener\">a Tinba azonos\u00edt\u00e1s\u00e1hoz \u00e9s elt\u00e1vol\u00edt\u00e1s\u00e1hoz<\/a>.<\/li>\n\n\n\n<li><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>H\u00e1l\u00f3zati megfigyel\u00e9s:<\/strong>\u00a0Ez mag\u00e1ban foglalja a h\u00e1l\u00f3zati forgalom \u00e1tvizsg\u00e1l\u00e1s\u00e1t \u00e9s az inform\u00e1ci\u00f3k kisziv\u00e1rg\u00e1s\u00e1nak vagy b\u00e1rmely m\u00e1s ismert rosszindulat\u00fa IP-c\u00edm ellen\u0151rz\u00e9s\u00e9t.<\/span><\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<style>\n    .trojan-container {\n        text-align: center;\n        padding: 50px 20px;\n        background-color: #061751;\n        color: white;\n    }\n    .trojan-container h2 {\n        margin: 0;\n        font-size: 3em;\n        color: white; \/* Ensures the title is white *\/\n    }\n    .trojan-cards {\n        display: flex;\n        justify-content: center;\n        flex-wrap: wrap;\n        margin-top: 20px;\n    }\n    .trojan-card {\n        background: white;\n        width: 20%;\n        margin: 20px;\n        padding: 20px;\n        border-radius: 10px;\n        box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1);\n        text-align: center;\n    }\n    .trojan-card h3 {\n        font-size: 1.5em;\n        margin: 20px 0;\n    }\n    .trojan-card p {\n        color: #666;\n        font-size: 0.9em; \/* smaller font size *\/\n        line-height: 1.4; \/* reduced line height *\/\n    }\n    .trojan-card .trojan-number {\n        font-size: 2em;\n        background: linear-gradient(to bottom right, #00bfa5, #0288d1);\n        color: white;\n        border-radius: 50%;\n        width: 60px;\n        height: 60px;\n        line-height: 60px;\n        margin: 0 auto 20px auto;\n    }\n    .trojan-card a {\n        text-decoration: none;\n        color: #0288d1;\n        font-weight: bold;\n        display: inline-block;\n        margin-top: 20px;\n    }\n    .trojan-card a:hover {\n        text-decoration: underline;\n    }\n\n    \/* Responsive styles *\/\n    @media (max-width: 768px) {\n        .trojan-card {\n            width: 45%;\n            margin: 10px;\n        }\n    }\n\n    @media (max-width: 480px) {\n        .trojan-card {\n            width: 100%;\n            margin: 10px 0;\n        }\n    }\n<\/style>\n\n<div class=\"trojan-container\">\n    <h2>L\u00e9p\u00e9sek a Tiny Banker tr\u00f3jai elt\u00e1vol\u00edt\u00e1s\u00e1hoz<\/h2>\n    <div class=\"trojan-cards\">\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">01<\/div>\n            <h3>Eszk\u00f6z elk\u00fcl\u00f6n\u00edt\u00e9se<\/h3>\n            <p>Azonnal v\u00e1lassza le az eszk\u00f6zt az internetr\u0151l, hogy megakad\u00e1lyozza a tov\u00e1bbi adatlop\u00e1st.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">02<\/div>\n            <h3>Rendszerellen\u0151rz\u00e9s<\/h3>\n            <p>Futtasson teljes rendszerellen\u0151rz\u00e9st b\u00e1rmilyen anom\u00e1lia \u00e9szlel\u00e9s\u00e9re megb\u00edzhat\u00f3 k\u00e1rtev\u0151irt\u00f3 szoftverrel, \u00e9s t\u00e1vol\u00edtsa el a tr\u00f3jai b\u00e1rmely \u00e9szlelt p\u00e9ld\u00e1ny\u00e1t.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">03<\/div>\n            <h3>Vissza\u00e1ll\u00edt\u00e1s biztons\u00e1gi ment\u00e9sb\u0151l<\/h3>\n            <p>Ha lehets\u00e9ges, \u00e1ll\u00edtsa vissza a rendszert egy tiszta biztons\u00e1gi ment\u00e9sb\u0151l, amely a fert\u0151z\u00e9s el\u0151tti id\u0151pontb\u00f3l sz\u00e1rmazik.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">04<\/div>\n            <h3>Jelszavak megv\u00e1ltoztat\u00e1sa<\/h3>\n            <p>M\u00f3dos\u00edtsa az \u00f6sszes jelsz\u00f3t, amelyet p\u00e9nz\u00fcgyi oldalak \u00e9s m\u00e1s \u00e9rz\u00e9keny fi\u00f3kok el\u00e9r\u00e9s\u00e9hez haszn\u00e1lt.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">05<\/div>\n            <h3>Fi\u00f3kok figyel\u00e9se<\/h3>\n            <p>Figyelje az \u00f6sszes p\u00e9nz\u00fcgyi fi\u00f3kot gyan\u00fas tranzakci\u00f3k miatt. Ha b\u00e1rmilyen szokatlan tev\u00e9kenys\u00e9get \u00e9szlel, l\u00e9pjen kapcsolatba p\u00e9nzint\u00e9zet\u00e9vel.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Megel\u0151z\u00e9si strat\u00e9gi\u00e1k<\/strong><\/p>\n\n\n\n<p>Robusztus biztons\u00e1gi gyakorlatok elengedhetetlenek a Tiny Banker tr\u00f3jai elleni v\u00e9delemhez. A legfontosabb elem az oktat\u00e1s \u00e9s a felhaszn\u00e1l\u00f3k figyelm\u00e9nek felkelt\u00e9se az adathal\u00e1sz t\u00e1mad\u00e1sokkal kapcsolatban, valamint az, hogy ne kattintsanak gyan\u00fas linkekre vagy t\u00f6ltsenek le ismeretlen mell\u00e9kleteket.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rendszeres szoftverfriss\u00edt\u00e9sek:<\/strong> Minden szoftver - k\u00fcl\u00f6n\u00f6sen a b\u00f6ng\u00e9sz\u0151 \u00e9s a biztons\u00e1gi szoftver - friss\u00edt\u00e9se a leg\u00fajabb verzi\u00f3ra.<\/li>\n\n\n\n<li><strong>Er\u0151s, egyedi jelszavak:<\/strong> Haszn\u00e1ljon er\u0151s, egyedi jelszavakat k\u00fcl\u00f6nb\u00f6z\u0151 fi\u00f3kokhoz, \u00e9s rendszeresen v\u00e1ltoztassa meg \u0151ket.<\/li>\n\n\n\n<li><strong>K\u00e9tfaktoros hiteles\u00edt\u00e9s:<\/strong> Enged\u00e9lyezze ezt a funkci\u00f3t az online banki szolg\u00e1ltat\u00e1sokhoz \u00e9s minden m\u00e1s fontos fi\u00f3khoz.<\/li>\n\n\n\n<li><strong>E-mail sz\u0171r\u00e9s:<\/strong> Val\u00f3s\u00edtson meg agressz\u00edv megold\u00e1st az adathal\u00e1sz e-mailek \u00e9s mell\u00e9kletek sz\u0171r\u00e9s\u00e9re.<\/li>\n\n\n\n<li><strong>Rendszeres biztons\u00e1gi ment\u00e9sek:<\/strong> Kritikus adatokr\u00f3l, hogy seg\u00edtsenek azok vissza\u00e1ll\u00edt\u00e1s\u00e1ban, ha fert\u0151z\u00f6ttek lesznek.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">K\u00f6vetkeztet\u00e9s<\/h2>\n\n\n<p>A Tiny Banker tr\u00f3jai nagyon vesz\u00e9lyes fenyeget\u00e9st jelent az online banki biztons\u00e1gra, mivel kifinomult technik\u00e1kat alkalmaz \u00e9rz\u00e9keny p\u00e9nz\u00fcgyi inform\u00e1ci\u00f3k ellop\u00e1s\u00e1ra \u00e9s jogosulatlan tranzakci\u00f3k v\u00e9grehajt\u00e1s\u00e1ra. <\/p>\n\n\n\n<p>Az\u00e1ltal, hogy meg\u00e9rtj\u00fck bels\u0151 m\u0171k\u00f6d\u00e9s\u00e9t \u00e9s megb\u00edzhat\u00f3 \u00e9szlel\u00e9si, elt\u00e1vol\u00edt\u00e1si \u00e9s megel\u0151z\u00e9si strat\u00e9gi\u00e1kat alkalmazunk, lehet\u0151s\u00e9g ny\u00edlik cs\u00f6kkenteni a felhaszn\u00e1l\u00f3kra \u00e9s szervezetekre leselked\u0151 kock\u00e1zatokat. A kiberbiztons\u00e1gban alkalmazott robusztus gyakorlatok k\u00f6vet\u00e9se, \u00e9bers\u00e9g fenntart\u00e1sa \u00e9s a felhaszn\u00e1l\u00f3k oktat\u00e1sa n\u00e9h\u00e1ny fontos int\u00e9zked\u00e9s a Tiny Banker tr\u00f3jai \u00e9s m\u00e1s hasonl\u00f3 rosszindulat\u00fa szoftverek elleni v\u00e9dekez\u00e9sben.<\/p>","protected":false},"excerpt":{"rendered":"<p>Of all the cyber threats in continuous evolution, the Tiny Banker Trojan stands out as one of the most dangerous and elusive banking Trojans. First discovered in 2012, it accounted\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Tiny Banker tr\u00f3jai: Egy rejtett kiberfenyeget\u00e9s m\u00e9lyrehat\u00f3 elemz\u00e9se<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2590,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[],"class_list":["post-2569","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Of all the cyber threats in continuous evolution, the Tiny Banker Trojan stands out as one of the most dangerous and elusive banking Trojans. First discovered in 2012, it accounted&hellip; Continue reading Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-25T22:46:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T23:18:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\",\"datePublished\":\"2024-07-25T22:46:42+00:00\",\"dateModified\":\"2024-07-25T23:18:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\",\"name\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"datePublished\":\"2024-07-25T22:46:42+00:00\",\"dateModified\":\"2024-07-25T23:18:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tiny Banker tr\u00f3jai: Egy alapos pillant\u00e1s egy lopakod\u00f3 kiberfenyeget\u00e9sre | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre\/","og_locale":"hu_HU","og_type":"article","og_title":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing","og_description":"Of all the cyber threats in continuous evolution, the Tiny Banker Trojan stands out as one of the most dangerous and elusive banking Trojans. First discovered in 2012, it accounted&hellip; Continue reading Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat","og_url":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/apro-banki-trojai-melyrehato-pillantas-egy-lopakodo-kiberfenyegetesre\/","og_site_name":"Security Briefing","article_published_time":"2024-07-25T22:46:42+00:00","article_modified_time":"2024-07-25T23:18:21+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"4 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat","datePublished":"2024-07-25T22:46:42+00:00","dateModified":"2024-07-25T23:18:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/"},"wordCount":730,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","articleSection":["Cyber Attacks","Cyber Threats"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/","name":"Tiny Banker tr\u00f3jai: Egy alapos pillant\u00e1s egy lopakod\u00f3 kiberfenyeget\u00e9sre | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","datePublished":"2024-07-25T22:46:42+00:00","dateModified":"2024-07-25T23:18:21+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","width":1265,"height":422,"caption":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=2569"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2569\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/2590"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=2569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=2569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=2569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}