{"id":300,"date":"2022-06-28T22:07:12","date_gmt":"2022-06-28T22:07:12","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=300"},"modified":"2022-06-28T22:07:12","modified_gmt":"2022-06-28T22:07:12","slug":"a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait\/","title":{"rendered":"A GTA csoport k\u00f6zz\u00e9teszi a Hermit rosszindulat\u00fa szoftverrel kapcsolatos eredm\u00e9nyeit"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">A Google Fenyeget\u00e9s Elemz\u0151 Csoport (TAG) nemr\u00e9giben k\u00f6zz\u00e9tette a Hermit n\u00e9ven ismert, rendk\u00edv\u00fcl kifinomult k\u00e9mprogrammal kapcsolatos meg\u00e1llap\u00edt\u00e1sait. Az olasz RCS Laboratories k\u00e9mprogram-gy\u00e1rt\u00f3 t\u00f6bb internetszolg\u00e1ltat\u00f3 (ISP) seg\u00edts\u00e9g\u00e9vel terjesztette a rosszindulat\u00fa programot, els\u0151sorban Kazahszt\u00e1nban \u00e9s Olaszorsz\u00e1gban l\u00e9v\u0151 iOS \u00e9s Android okostelefonokat c\u00e9lozva.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Mi az a Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A Hermit Malware egy kifinomult rosszindulat\u00fa program, amely teljes ellen\u0151rz\u00e9st biztos\u00edt a t\u00e1mad\u00f3knak az \u00e1ldozat eszk\u00f6ze felett. Telep\u00edt\u00e9s ut\u00e1n k\u00e9pes \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat ellopni, lehallgatni a besz\u00e9lget\u00e9seket, \u00e9s nyomon k\u00f6vetni az \u00e1ldozat helyzet\u00e9t.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hogyan m\u0171k\u00f6dik a Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Csal\u00f3 weboldalak terjesztik a rosszindulat\u00fa programot, amely a web b\u00f6ng\u00e9sz\u0151k hib\u00e1it haszn\u00e1lja ki iOS \u00e9s Android mobil eszk\u00f6z\u00f6k\u00f6n. A t\u00e1mad\u00f3 \u00e1tir\u00e1ny\u00edtja a felhaszn\u00e1l\u00f3kat egy ellen\u0151rz\u00f6tt szerverre, ahol let\u00f6ltik a rosszindulat\u00fa programot az \u00e1ldozat eszk\u00f6z\u00e9re.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Miut\u00e1n megfert\u0151z\u0151d\u00f6tt, a Hermit malware t\u00e1voli kapcsolatot l\u00e9tes\u00edt a t\u00e1mad\u00f3 szerver\u00e9vel, ahol parancsokat kaphat az oper\u00e1tort\u00f3l. Ezek a parancsok lehet\u0151v\u00e9 teszik a t\u00e1mad\u00f3nak, hogy t\u00e1volr\u00f3l hozz\u00e1f\u00e9rjen az \u00e1ldozat eszk\u00f6z\u00e9n t\u00e1rolt b\u00e1rmilyen adathoz, bele\u00e9rtve a sz\u00f6veges \u00fczeneteket, e-maileket, f\u00e9nyk\u00e9peket \u00e9s vide\u00f3kat.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Kik \u00e9rintettek a Hermit Malware \u00e1ltal?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A hackerek els\u0151sorban Kazahszt\u00e1nban \u00e9s Olaszorsz\u00e1gban \u00e9l\u0151 egy\u00e9neket c\u00e9loztak meg a Hermit malware-rel. Azonban a rosszindulat\u00fa program kifinomult jellege miatt a t\u00e1mad\u00f3k m\u00e1s orsz\u00e1gokban \u00e9l\u0151 egy\u00e9neket is megc\u00e9lozhattak.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Mik voltak a Hermit Malware meg\u00e1llap\u00edt\u00e1sai?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A Google TAG \u00e1ltal k\u00f6zz\u00e9tett meg\u00e1llap\u00edt\u00e1sok r\u00e9szletes elemz\u00e9st ny\u00fajtanak a Hermit malware-r\u0151l \u00e9s annak k\u00e9pess\u00e9geir\u0151l. A jelent\u00e9s tartalmazza azt is, hogyan terjesztik a rosszindulat\u00fa programot \u00e9s hogyan hat az \u00e1ldozatokra.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">A Google TAG meg\u00e1llap\u00edt\u00e1sai a Hermit Malware-r\u0151l<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A TAG meg\u00e1llap\u00edt\u00e1sai a Hermit malware-r\u0151l t\u00f6bb biztons\u00e1gi c\u00e9ggel, k\u00f6zt\u00fck a Lookout, Zimperium, ESET \u00e9s Kaspersky k\u00f6zrem\u0171k\u00f6d\u00e9s\u00e9vel v\u00e9gzett vizsg\u00e1laton alapulnak.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A Hermit malware egy fejlett rosszindulat\u00fa program, amely teljes ellen\u0151rz\u00e9st biztos\u00edt a betolakod\u00f3nak a rendszer felett. Telep\u00edt\u00e9s ut\u00e1n lehallgathatja a besz\u00e9lget\u00e9seket \u00e9s megfigyelheti az \u00e1ldozat tev\u00e9kenys\u00e9geit.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Mi\u00e9rt voltak ezek a meg\u00e1llap\u00edt\u00e1sok jelent\u0151sek?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A Google TAG meg\u00e1llap\u00edt\u00e1sai az\u00e9rt l\u00e9tfontoss\u00e1g\u00faak, mert betekint\u00e9st ny\u00fajtanak a Hermit malware k\u00e9pess\u00e9geibe \u00e9s abba, hogyan haszn\u00e1lj\u00e1k a hackerek az egy\u00e9nek megc\u00e9lz\u00e1s\u00e1ra. A Google TAG meg\u00e1llap\u00edt\u00e1sai seg\u00edthetnek a potenci\u00e1lis \u00e1ldozatok v\u00e9delm\u00e9ben \u00e9s az ilyen t\u00edpus\u00fa rosszindulat\u00fa programok elleni ellenint\u00e9zked\u00e9sek kidolgoz\u00e1s\u00e1ban.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hogyan v\u00e9dhetem meg magam a Hermit Malware-t\u0151l?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Van n\u00e9h\u00e1ny dolog, amit megtehetsz, hogy megv\u00e9dd magad a Hermit malware-t\u0151l:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Tartsd naprak\u00e9szen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket: A t\u00e1mad\u00f3k gyakran kihaszn\u00e1lj\u00e1k azokat a sebezhet\u0151s\u00e9geket, amelyeket m\u00e1r kijav\u00edtottak, hogy rosszindulat\u00fa programokkal fert\u0151zz\u00e9k meg az eszk\u00f6z\u00f6ket. Az eszk\u00f6z\u00f6d naprak\u00e9szen tart\u00e1sa cs\u00f6kkentheti az ilyen t\u00e1mad\u00e1sok \u00e1ldozat\u00e1v\u00e1 v\u00e1l\u00e1s es\u00e9ly\u00e9t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Ker\u00fcld el a\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.webtitan.com\/blog\/how-to-identify-a-malicious-website\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">rosszindulat\u00fa weboldalakat<\/span><\/a><span data-preserver-spaces=\"true\">: A hackerek gyakran haszn\u00e1lnak rosszindulat\u00fa weboldalakat a rosszindulat\u00fa programok terjeszt\u00e9s\u00e9re. Ezeknek a webhelyeknek az elker\u00fcl\u00e9se cs\u00f6kkentheti az eszk\u00f6z\u00f6d megfert\u0151z\u0151d\u00e9s\u00e9nek es\u00e9ly\u00e9t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Telep\u00edts megb\u00edzhat\u00f3 biztons\u00e1gi szoftvert: A biztons\u00e1gi szoftverek seg\u00edthetnek megv\u00e9deni az eszk\u00f6z\u00f6det a rosszindulat\u00fa programokt\u00f3l. \u00dcgyelj arra, hogy megb\u00edzhat\u00f3 biztons\u00e1gi megold\u00e1st telep\u00edts \u00e9s tartsd naprak\u00e9szen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Telep\u00edts biztons\u00e1gi b\u0151v\u00edtm\u00e9nyeket vagy kieg\u00e9sz\u00edt\u0151ket, amelyek folyamatosan vizsg\u00e1lj\u00e1k a sz\u00e1m\u00edt\u00f3g\u00e9pedet a rosszindulat\u00fa t\u00e1mad\u00e1sok megel\u0151z\u00e9se \u00e9rdek\u00e9ben.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ezen tippek k\u00f6vet\u00e9s\u00e9vel seg\u00edthetsz megv\u00e9deni magad a Hermit malware-t\u0151l \u00e9s m\u00e1s hasonl\u00f3 fenyeget\u00e9sekt\u0151l. Azonban fontos megjegyezni, hogy egyetlen int\u00e9zked\u00e9s sem 100%-ban hat\u00e9kony, \u00e9s mindig aj\u00e1nlott t\u00f6bb biztons\u00e1gi r\u00e9teggel rendelkezni.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">K\u00f6vetkeztet\u00e9s<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">A Hermit egy kifinomult t\u00edpus\u00fa rosszindulat\u00fa program, amely teljes ellen\u0151rz\u00e9st biztos\u00edt a t\u00e1mad\u00f3knak az \u00e1ldozat eszk\u00f6ze felett. A t\u00e1mad\u00f3k haszn\u00e1lhatj\u00e1k \u00e9rz\u00e9keny adatok ellop\u00e1s\u00e1ra, besz\u00e9lget\u00e9sek lehallgat\u00e1s\u00e1ra \u00e9s az \u00e1ldozat mozg\u00e1s\u00e1nak nyomon k\u00f6vet\u00e9s\u00e9re. N\u00e9h\u00e1ny egyszer\u0171 strat\u00e9gia alkalmaz\u00e1s\u00e1val seg\u00edthetsz megv\u00e9deni magad ett\u0151l a vesz\u00e9lyt\u0151l. Azonban fontos megjegyezni, hogy egyetlen int\u00e9zked\u00e9s sem t\u00f6k\u00e9letes, \u00e9s a szak\u00e9rt\u0151k mindig azt tan\u00e1csolj\u00e1k, hogy t\u00f6bb biztons\u00e1gi r\u00e9teggel rendelkezz az eszk\u00f6zeiden.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Google Threat Analysis Group (TAG) has recently published findings on highly sophisticated spyware known as Hermit. RCS Laboratories, an Italian spyware vendor, distributed the malware with the help of several\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A GTA csoport k\u00f6zz\u00e9teszi a Hermit rosszindulat\u00fa szoftverrel kapcsolatos eredm\u00e9nyeit<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GTA Group Publishes Findings on Hermit Malware | Security Briefing<\/title>\n<meta name=\"description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T22:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"GTA Group Publishes Findings on Hermit Malware\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"name\":\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"description\":\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"width\":1000,\"height\":795,\"caption\":\"GTA-Group-Publishes-Findings-on-Hermit-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GTA Group Publishes Findings on Hermit Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A GTA Csoport k\u00f6zz\u00e9teszi a Hermit Malware-r\u0151l sz\u00f3l\u00f3 eredm\u00e9nyeket | Biztons\u00e1gi T\u00e1j\u00e9koztat\u00f3","description":"A leg\u00fajabb eredm\u00e9nyek a kifinomult Hermit k\u00e1rtev\u0151r\u0151l, amelyr\u0151l kider\u00fclt, hogy az RCS Laboratories terjesztette.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait\/","og_locale":"hu_HU","og_type":"article","og_title":"GTA Group Publishes Findings on Hermit Malware | Security Briefing","og_description":"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.","og_url":"https:\/\/securitybriefing.net\/hu\/kibertamadasok\/a-gta-csoport-kozzeteszi-a-remete-malware-rol-szolo-megallapitasait\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T22:07:12+00:00","og_image":[{"width":1000,"height":795,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"3 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"GTA Group Publishes Findings on Hermit Malware","datePublished":"2022-06-28T22:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"wordCount":610,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","name":"A GTA Csoport k\u00f6zz\u00e9teszi a Hermit Malware-r\u0151l sz\u00f3l\u00f3 eredm\u00e9nyeket | Biztons\u00e1gi T\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","datePublished":"2022-06-28T22:07:12+00:00","description":"A leg\u00fajabb eredm\u00e9nyek a kifinomult Hermit k\u00e1rtev\u0151r\u0151l, amelyr\u0151l kider\u00fclt, hogy az RCS Laboratories terjesztette.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","width":1000,"height":795,"caption":"GTA-Group-Publishes-Findings-on-Hermit-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"GTA Group Publishes Findings on Hermit Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}