{"id":2636,"date":"2024-09-02T16:20:55","date_gmt":"2024-09-02T16:20:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2636"},"modified":"2024-09-02T16:20:58","modified_gmt":"2024-09-02T16:20:58","slug":"tinba-virus-egy-aljas-banki-trojai","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/tinba-virus-egy-aljas-banki-trojai\/","title":{"rendered":"Tinba v\u00edrus: Egy aljas banki tr\u00f3jai"},"content":{"rendered":"<p>A kiberbiztons\u00e1gi vil\u00e1g macska-eg\u00e9r j\u00e1t\u00e9kot j\u00e1tszik, hogy t\u00falj\u00e1rjon a fejl\u0151d\u0151 kibervesz\u00e9lyek esz\u00e9n, k\u00f6zt\u00fck a h\u00edrhedt Tinba v\u00edrussal, amely m\u00e1r vil\u00e1gszerte t\u00f6bb milli\u00f3 felhaszn\u00e1l\u00f3t t\u00e1madott meg. A Tinba, a \u201cTiny Banker\u201d r\u00f6vid\u00edt\u00e9se, kis f\u00e1jlm\u00e9rete miatt, de val\u00f3j\u00e1ban hat\u00e1sa messze nem elhanyagolhat\u00f3. Ebben a cikkben megvitatjuk, mi is a Tinba v\u00edrus, hogyan m\u0171k\u00f6dik, n\u00e9mi h\u00e1tt\u00e9rinform\u00e1ci\u00f3t, \u00e9s mit tehet annak \u00e9rdek\u00e9ben, hogy megv\u00e9dje mag\u00e1t ett\u0151l a kiberfenyeget\u00e9st\u0151l.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-tinba-virus\"><strong>Mi a Tinba v\u00edrus?<\/strong><\/h2>\n\n\n<p>A Tinba egy banki <a href=\"https:\/\/us.norton.com\/blog\/malware\/what-is-a-trojan\" target=\"_blank\" rel=\"noreferrer noopener\">tr\u00f3jai malware<\/a> amely \u00e9rz\u00e9keny p\u00e9nz\u00fcgyi inform\u00e1ci\u00f3kat c\u00e9loz meg. Az online banki hiteles\u00edt\u0151 adatokt\u00f3l kezdve a hitelk\u00e1rtya-adatokig minden csapd\u00e1j\u00e1ba esik. Ezenk\u00edv\u00fcl minden m\u00e1s szem\u00e9lyes inform\u00e1ci\u00f3t is \u00f6sszegy\u0171jt, \u00e9s k\u00fcl\u00f6nf\u00e9le p\u00e9nz\u00fcgyi csal\u00e1sok elk\u00f6vet\u00e9s\u00e9re haszn\u00e1lja fel. B\u00e1r csak 20KB, hat\u00e9kony \u00e9s vesz\u00e9lyes is.<\/p>\n\n\n\n<p>\u00dagy m\u0171k\u00f6dik, hogy beilleszti mag\u00e1t a felhaszn\u00e1l\u00f3 webb\u00f6ng\u00e9sz\u0151j\u00e9be, majd figyeli \u00e9s elfogja az online banki munkameneteket. Amint a Tinba \u00e9szleli, hogy egy felhaszn\u00e1l\u00f3 bejelentkezett a fi\u00f3kj\u00e1ba, r\u00f6gz\u00edti a bejelentkez\u00e9si adatokat \u00e9s m\u00e1s kritikus inform\u00e1ci\u00f3kat, majd elk\u00fcldi azokat a t\u00e1mad\u00f3knak. R\u00e1ad\u00e1sul a Tinba k\u00e9pes megv\u00e1ltoztatni azt is, ami az \u00e1ldozat k\u00e9perny\u0151j\u00e9n megjelenik, tov\u00e1bb lehet\u0151v\u00e9 t\u00e9ve a t\u00e1mad\u00f3k sz\u00e1m\u00e1ra, hogy m\u00e1s t\u00edpus\u00fa csal\u00e1sokat hajtsanak v\u00e9gre a felhaszn\u00e1l\u00f3 ellen.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-history-of-tinba\"><strong>A Tinba t\u00f6rt\u00e9nete<\/strong><\/h3>\n\n\n<p>A Tinba el\u0151sz\u00f6r 2012-ben jelent meg a kiberbiztons\u00e1gi sz\u00ednt\u00e9ren. H\u00edrhedt h\u00edrnevet szerzett hat\u00e9konys\u00e1ga \u00e9s terjed\u00e9si sebess\u00e9ge miatt. Kezdetben a Tinb\u00e1t c\u00e9lzott t\u00e1mad\u00e1sokra haszn\u00e1lt\u00e1k meghat\u00e1rozott p\u00e9nz\u00fcgyi szervezetek ellen, \u00e9s akt\u00edvan fejl\u0151d\u00f6tt \u00e9s terjedt nagyobb k\u00f6r\u00f6kbe az interneten kereszt\u00fcl. A malware-t <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" target=\"_blank\" rel=\"noreferrer noopener\">adathal\u00e1sz e-mailek<\/a>, rosszindulat\u00fa weboldalak \u00e9s m\u00e9g nagy botnet m\u0171veletek r\u00e9szek\u00e9nt is terjesztett\u00e9k. A Tinba legfigyelemrem\u00e9lt\u00f3bb tulajdons\u00e1ga az volt, hogy elker\u00fclte a legt\u00f6bb hagyom\u00e1nyos AV \u00e9szlel\u00e9s\u00e9t. Rendk\u00edv\u00fcl kompakt m\u00e9rete \u00e9s lopakod\u00f3 term\u00e9szete szinte l\u00e1thatatlann\u00e1 tette a kiberbiztons\u00e1gi kutat\u00f3k sz\u00e1m\u00e1ra, akik a malware azonos\u00edt\u00e1s\u00e1n \u00e9s semleges\u00edt\u00e9s\u00e9n dolgoztak. Az id\u0151 m\u00fal\u00e1s\u00e1val a Tinba folyamatosan fejl\u0151d\u00f6tt, minden \u00faj verzi\u00f3 egyre \u00f6sszetettebb\u00e9 v\u00e1lt, hogy m\u00e9g hosszabb ideig \u00e9szrev\u00e9tlen maradjon, \u00e9s t\u00f6bb felhaszn\u00e1l\u00f3t fert\u0151zz\u00f6n meg.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-tinba-works\"><strong>Hogyan m\u0171k\u00f6dik a Tinba<\/strong><\/h3>\n\n\n<p>A fert\u0151z\u00e9sek tipikusan adathal\u00e1sz e-maileken kereszt\u00fcl t\u00f6rt\u00e9nnek. Ezek az \u00fczenetek \u00fagy vannak megtervezve, hogy val\u00f3dinak t\u0171njenek, mintha megb\u00edzhat\u00f3 forr\u00e1sb\u00f3l \u00e9rkezn\u00e9nek: lehetnek bankok, szolg\u00e1ltat\u00f3k vagy ak\u00e1r koll\u00e9g\u00e1k. \u00c1ltal\u00e1ban tartalmaznak egy linket vagy mell\u00e9kletet, amely a Tinba tr\u00f3jai let\u00f6lt\u00e9s\u00e9t ind\u00edtja el az eszk\u00f6zre, ha r\u00e1kattintanak vagy megnyitj\u00e1k. Miut\u00e1n telep\u00edtett\u00e9k, a Tinba csendben a h\u00e1tt\u00e9rben m\u0171k\u00f6dik, passz\u00edvan figyelve a felhaszn\u00e1l\u00f3 online tev\u00e9kenys\u00e9g\u00e9t. Amikor a felhaszn\u00e1l\u00f3 hozz\u00e1f\u00e9r egy banki oldalhoz, a tr\u00f3jai akci\u00f3ba l\u00e9p. Nemcsak a felhaszn\u00e1l\u00f3 bejelentkez\u00e9si adatait r\u00f6gz\u00edti, hanem minden m\u00e1s inform\u00e1ci\u00f3t is, amit az oldalon megad. A Tinba \u201cweb injekci\u00f3kat\u201d is v\u00e9grehajthat, megv\u00e1ltoztatva a banki oldal megjelen\u00e9s\u00e9t, hogy megt\u00e9vessze a felhaszn\u00e1l\u00f3t tov\u00e1bbi inform\u00e1ci\u00f3k megad\u00e1s\u00e1ra: v\u00e1laszok biztons\u00e1gi k\u00e9rd\u00e9sekre, egyszeri jelszavak stb.<\/p>\n\n\n\n<p>Ami igaz\u00e1n k\u00fcl\u00f6n\u00f6sen vesz\u00e9lyess\u00e9 teszi a Tinb\u00e1t, az az, hogy k\u00e9pes manipul\u00e1lni a webes munkameneteket\u2014p\u00e9ld\u00e1ul <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/all\/fake-pop-up\/7498aa68-db84-47ab-a2e7-a2e28a705d62\" target=\"_blank\" rel=\"noreferrer noopener\">hamis felugr\u00f3 ablakokat<\/a> gener\u00e1l, amelyek tov\u00e1bbi inform\u00e1ci\u00f3kat k\u00e9rnek, amelyeket a felhaszn\u00e1l\u00f3 akaratlanul is megadhat. Ezeket az inform\u00e1ci\u00f3kat k\u00f6zvetlen\u00fcl a t\u00e1mad\u00f3knak k\u00fcldik, akik felhaszn\u00e1lhatj\u00e1k azokat az \u00e1ldozat banksz\u00e1ml\u00e1j\u00e1nak el\u00e9r\u00e9s\u00e9re, p\u00e9nz\u00e1tutal\u00e1sra vagy csal\u00e1rd v\u00e1s\u00e1rl\u00e1sokra.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tinba\"><strong>V\u00e9dekez\u00e9s a Tinba ellen<\/strong><\/h2>\n\n\n<p>Tekintettel a Tinba v\u00edrus s\u00falyoss\u00e1g\u00e1ra, elengedhetetlen a proakt\u00edv v\u00e9dekez\u00e9s ez \u00e9s hasonl\u00f3 fenyeget\u00e9sek ellen. A biztons\u00e1gos gyakorlatok k\u00f6z\u00e9 tartozik:<\/p>\n\n\n\n<p><strong>Legyen \u00f3vatos az adathal\u00e1sz e-mailekkel:<\/strong> Legyen nagyon \u00f3vatos az e-mailek megnyit\u00e1sakor, k\u00fcl\u00f6n\u00f6sen ismeretlen felad\u00f3kt\u00f3l. Soha ne kattintson linkekre vagy t\u00f6lts\u00f6n le mell\u00e9kleteket, ha nem biztos azok biztons\u00e1g\u00e1ban. Ellen\u0151rizze a felad\u00f3 e-mail c\u00edm\u00e9t \u00e9s minden olyan jelet, amely adathal\u00e1sz e-mailre utalhat.<\/p>\n\n\n\n<p><strong>Haszn\u00e1ljon er\u0151s, egyedi jelszavakat:<\/strong> Az er\u0151s \u00e9s egyedi jelszavak elengedhetetlenek minden online banki \u00e9s \u00e9rz\u00e9keny fi\u00f3kj\u00e1hoz. Soha ne haszn\u00e1ljon \u00fajra jelszavakat t\u00f6bb oldalon, \u00e9s fontolja meg egy jelsz\u00f3kezel\u0151 alkalmaz\u00e1s\u00e1t, hogy biztons\u00e1gosan nyomon k\u00f6vesse hiteles\u00edt\u0151 adatait.<\/p>\n\n\n\n<p><strong>Enged\u00e9lyezze a k\u00e9tfaktoros hiteles\u00edt\u00e9st (2FA):<\/strong> Ha lehets\u00e9ges, enged\u00e9lyezze a k\u00e9tfaktoros hiteles\u00edt\u00e9st online fi\u00f3kjaihoz. Ez egy extra biztons\u00e1gi r\u00e9teget ad hozz\u00e1, mivel egy m\u00e1sodik ellen\u0151rz\u00e9si form\u00e1t ig\u00e9nyel, p\u00e9ld\u00e1ul egy telefonra k\u00fcld\u00f6tt k\u00f3dot, miel\u0151tt hozz\u00e1f\u00e9rne a fi\u00f3kj\u00e1hoz.<\/p>\n\n\n\n<p><strong>Tartsa naprak\u00e9szen a szoftvereit:<\/strong> Gy\u0151z\u0151dj\u00f6n meg r\u00f3la, hogy oper\u00e1ci\u00f3s rendszere, webb\u00f6ng\u00e9sz\u0151je \u00e9s <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/understanding-anti-virus-software\" target=\"_blank\" rel=\"noreferrer noopener\">v\u00edrusirt\u00f3 szoftver<\/a> rendszeresen friss\u00edtve van. A kiberb\u0171n\u00f6z\u0151k gyakran kihaszn\u00e1lj\u00e1k az elavult szoftverek sebezhet\u0151s\u00e9geit, ez\u00e9rt mindent naprak\u00e9szen tartani kritikus v\u00e9dekez\u00e9s.<\/p>\n\n\n\n<p>Mivel a Tinb\u00e1t \u00fagy tervezt\u00e9k, hogy elker\u00fclje az \u00e9szlel\u00e9st, megb\u00edzhat\u00f3 antiv\u00edrus szoftver telep\u00edt\u00e9se seg\u00edthet a malware azonos\u00edt\u00e1s\u00e1ban \u00e9s blokkol\u00e1s\u00e1ban. Futtasson rendszeres vizsg\u00e1latokat, hogy \u00e9szlelje az esetleges fenyeget\u00e9seket az eszk\u00f6z\u00e9n.<\/p>\n\n\n\n<p><strong>Rendszeresen ellen\u0151rizze fi\u00f3kjait:<\/strong> Rendszeresen ellen\u0151rizze banksz\u00e1mlakivonatait \u00e9s online fi\u00f3kjait b\u00e1rmilyen gyan\u00fas tev\u00e9kenys\u00e9gre. Az illet\u00e9ktelen tranzakci\u00f3k korai \u00e9szlel\u00e9se korl\u00e1tozhatja a k\u00e1rokat, \u00e9s seg\u00edthet gyors int\u00e9zked\u00e9seket tenni.<\/p>\n\n\n\n<p>A Tinba v\u00edrus er\u0151teljes eml\u00e9keztet\u0151 a digit\u00e1lis vil\u00e1gban mindig jelen l\u00e9v\u0151 kock\u00e1zatokra. Mint banki tr\u00f3jai, f\u0151 c\u00e9lja, hogy ellopja p\u00e9nz\u00fcgyi adatait, \u00e9s esetleg nagy csap\u00e1st m\u00e9rjen a p\u00e9nzt\u00e1rc\u00e1j\u00e1ra. Meg\u00e9rteni, hogyan m\u0171k\u00f6dik a Tinba, \u00e9s proakt\u00edv l\u00e9p\u00e9seket tenni a v\u00e9dekez\u00e9s \u00e9rdek\u00e9ben, nagyban cs\u00f6kkentheti annak val\u00f3sz\u00edn\u0171s\u00e9g\u00e9t, hogy \u00e1ldozatul essen nemcsak ennek, hanem m\u00e1s kiberfenyeget\u00e9seknek is. Legyen \u00e9ber, maradjon t\u00e1j\u00e9kozott, \u00e9s tartsa fenn az er\u0151s digit\u00e1lis v\u00e9delmet.<\/p>","protected":false},"excerpt":{"rendered":"<p>The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/tinba-virus-egy-aljas-banki-trojai\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Tinba v\u00edrus: Egy aljas banki tr\u00f3jai<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,15,21,25,26,29],"tags":[],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-cybersecurity","category-malware","category-phishing","category-scams","category-spyware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tinba Virus: A Nefarious Banking Trojan | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/tinba-virus-egy-aljas-banki-trojai\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; Continue reading Tinba Virus: A Nefarious Banking Trojan\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/tinba-virus-egy-aljas-banki-trojai\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T16:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T16:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tinba Virus: A Nefarious Banking Trojan\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"articleSection\":[\"Cyber Threats\",\"cybersecurity\",\"Malware\",\"Phishing\",\"scams\",\"spyware\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"name\":\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"width\":1265,\"height\":422,\"caption\":\"Tinba Virus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tinba Virus: A Nefarious Banking Trojan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tinba v\u00edrus: Egy aljas banki tr\u00f3jai | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/tinba-virus-egy-aljas-banki-trojai\/","og_locale":"hu_HU","og_type":"article","og_title":"Tinba Virus: A Nefarious Banking Trojan | Security Briefing","og_description":"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; Continue reading Tinba Virus: A Nefarious Banking Trojan","og_url":"https:\/\/securitybriefing.net\/hu\/kiberfenyegetesek\/tinba-virus-egy-aljas-banki-trojai\/","og_site_name":"Security Briefing","article_published_time":"2024-09-02T16:20:55+00:00","article_modified_time":"2024-09-02T16:20:58+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","type":"image\/png"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"4 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tinba Virus: A Nefarious Banking Trojan","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"wordCount":849,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","articleSection":["Cyber Threats","cybersecurity","Malware","Phishing","scams","spyware"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","name":"Tinba v\u00edrus: Egy aljas banki tr\u00f3jai | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","width":1265,"height":422,"caption":"Tinba Virus"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tinba Virus: A Nefarious Banking Trojan"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/2637"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}