{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"2023%eb%85%84%ec%97%90-%ea%b3%84%ec%86%8d-%ec%a7%80%eb%b0%b0%ec%a0%81%ec%9d%b8-%ec%9d%80%ed%96%89-%ed%8a%b8%eb%a1%9c%ec%9d%b4%eb%aa%a9%eb%a7%88-%ed%94%bc%ec%8b%b1-%eb%b0%8f-%eb%9e%9c%ec%84%ac%ec%9b%a8","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%89%b4%ec%8a%a4\/2023%eb%85%84%ec%97%90-%ea%b3%84%ec%86%8d-%ec%a7%80%eb%b0%b0%ec%a0%81%ec%9d%b8-%ec%9d%80%ed%96%89-%ed%8a%b8%eb%a1%9c%ec%9d%b4%eb%aa%a9%eb%a7%88-%ed%94%bc%ec%8b%b1-%eb%b0%8f-%eb%9e%9c%ec%84%ac%ec%9b%a8\/","title":{"rendered":"2023\ub144\uc5d0\ub3c4 \ubc45\ud0b9 \ud2b8\ub85c\uc774\ubaa9\ub9c8, \ud53c\uc2f1, \ub79c\uc12c\uc6e8\uc5b4\uac00 \uc9c0\ubc30\uc801\uc77c \uc804\ub9dd"},"content":{"rendered":"<p>The Covid-19 situation has accelerated digital transformation processes and formalized teleworking, resulting in an increase in cyberthreats to levels never seen before and never predicted. Let\u2019s remember that Malware is a combination of two words \u2013 \u201cmalicious\u201d and \u201csoftware\u201d. This term refers to any type of malicious code, regardless of how it affects victims, behaves, or causes damage. Malware encompasses all forms of malicious software, including Trojan Horses, Ransomware, Viruses, Worms, and Banking Malware. It is difficult for a normal user to tell which files are malware and which are not. That is why security solutions exist, such as vast databases of previously seen malicious samples and the use of multiple protection technologies to detect the most recent ones.<\/p>\n\n\n\n<p>Malware authors today are extremely inventive. To avoid detection, their \u201ccreations\u201d spread through vulnerabilities in unpatched systems, bypass security measures, hide in memory, or mimic legitimate applications. Even today, however, one of the most potent vectors of infection is the weakest link in the chain: humans. Emails with malicious attachments have proven to be an effective and low-cost way to compromise a system. And it only takes one click to do so.<\/p>\n\n\n\n<p>\uccab \ubc88\uc9f8 \ub2e8\uacc4\ub294 \uc6b4\uc601 \uccb4\uc81c\uc640 \ubaa8\ub4e0 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc744 \ud3ec\ud568\ud55c \ubaa8\ub4e0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub294 \uae30\ub2a5\uacfc \uac1c\uc120 \uc0ac\ud56d\uc744 \ucd94\uac00\ud560 \ubfd0\ub9cc \uc544\ub2c8\ub77c \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\uc640 \uc545\uc131 \ucf54\ub4dc\uac00 \uc545\uc6a9\ud560 \uc218 \uc788\ub294 \ubc84\uadf8\uc640 \ucde8\uc57d\uc810\uc744 \uc218\uc815\ud558\uae30 \uc704\ud568\uc785\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\uac83\ub9cc\uc73c\ub85c\ub294 \ud604\uc7ac\uc758 \ubaa8\ub4e0 \uc704\ud611\uc744 \ub2e4\ub8f0 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc7a0\uc7ac\uc801\uc778 \uacf5\uaca9 \uc2dc\ub3c4\ub97c \uc800\uc9c0\ud558\uae30 \uc704\ud574 \uc2e0\ub8b0\ud560 \uc218 \uc788\uace0 \ucd5c\uc2e0 \uc0c1\ud0dc\uc758 \ubcf4\uc548 \uc194\ub8e8\uc158\uc774 \ud544\uc694\ud569\ub2c8\ub2e4. \uc815\uae30\uc801\uc73c\ub85c \ubc31\uc5c5\uc744 \ub9cc\ub4e4\uc5b4 \uc624\ud504\ub77c\uc778 \ud558\ub4dc \ub4dc\ub77c\uc774\ube0c\uc5d0 \uc800\uc7a5\ud558\ub294 \uac83\uc740 \uc545\uc131 \ucf54\ub4dc\ub97c \ubc29\uc5b4\ud558\ub294 \ub610 \ub2e4\ub978 \ubc29\ubc95\uc73c\ub85c, \uc0ac\uc6a9\uc790\uac00 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc790\uc5d0 \uc758\ud574 \uc190\uc0c1\ub418\uac70\ub098 \uc554\ud638\ud654\ub41c \ub370\uc774\ud130\ub97c \uc27d\uac8c \ub300\uccb4\ud560 \uc218 \uc788\uac8c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc870\uae08\uc758 \uc5ed\uc0ac\ub97c \uc0c1\uae30\ud558\uace0 \uae30\uc5b5\ud569\uc2dc\ub2e4. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">\ud30c\ud0a4\uc2a4\ud0c4 \ube0c\ub808\uc778<\/a> was the first virus to be identified in early 1986. Its goal was to be as inconspicuous as possible. It infected the boot system of 5.25\u2033 floppy disks and spread globally in a matter of weeks, which is remarkable given that it was only distributed via 5.25\u2033 floppy disks. Since then, malware has evolved in a variety of ways, and its creators are constantly coming up with new ways to infect victims. They have a powerful distribution network with the Internet, which allows them to affect potential victims much more easily. This will always be the fundamental logic of a hacker, and it is up to us to practice intelligence and counterintelligence to counteract them. Some malware families, such as WannaCryptor, spread indiscriminately by encrypting files and causing global damage. Others affect smaller groups of victims, such as companies from a specific country in the case of Diskcoder. Petya aka C. Industroyer was a recent example of targeted malware. This malware, discovered by ESET, attacks industrial control systems used in the power grid and has caused blackouts in Ukraine by abusing legitimate but unsecured protocols. It is one of the few malware families that can be compared to Stuxnet, the first cyber weapon ever used.<\/p>\n\n\n\n<p>Since the pandemic was declared, cyberattacks have increased, such as those against the Remote Desktop Protocol (RDP) and Ransomware. The world will have one billion malicious codes by 2022. However, cyberthreats have not only increased in number, but they have also become more sophisticated. For example, today we discuss \u201cFileless Malware,\u201d which does not require the user to enter any files into the system in order to run the Malware: it can be stored in the system\u2019s volatile memory. That is why monitoring and prevention technologies are critical.<\/p>\n\n\n\n<p><br><strong>2021\ub144\uacfc 2022\ub144\uc5d0 \ub2e4\uc74c \uc720\ud615\uc758 \uc545\uc131 \ucf54\ub4dc\uac00 \ubc1c\uacac\ub418\uc5c8\uc2b5\ub2c8\ub2e4:<\/strong><\/p>\n\n\n\n<p>1) <strong>\uc545\uc131 \ud1a0\ub80c\ud2b8<\/strong>: \uc774\uc804\uc5d0 \uc54c\ub824\uc9c0\uc9c0 \uc54a\uc740 Kryptocibule \uc545\uc131 \ucf54\ub4dc \uacc4\uc5f4\uc5d0\uc11c. \uc774\ub294 \uc554\ud638\ud654\ud3d0\ub97c \ud6d4\uce58\uace0 \uc554\ud638\ud654\ud3d0 \uad00\ub828 \ud30c\uc77c\uc744 \uc554\ud638\ud654 \ub9c8\uc774\ub108\uc640 \ud074\ub9bd\ubcf4\ub4dc \ud558\uc774\uc7ac\ud0b9\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc720\ucd9c\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>2) <strong>\uc548\ub4dc\ub85c\uc774\ub4dc \uc704\ud611<\/strong>: Malware in the \u2018Hidden Apps\u2019 category has dominated for three consecutive quarters in 2022. This cyberthreat consists of deceptive apps that masquerade as games or utility apps, but after installation, they hide their icons and display full-screen ads.<\/p>\n\n\n\n<p>3)<strong> IoT \uc0ac\uc774\ubc84 \uc704\ud611<\/strong>: IoT \uc7a5\uce58\ub294 \ubcf4\uc548\uc774 \uac70\uc758 \uc5c6\uac70\ub098 \uc804\ud600 \uc124\uacc4\ub418\uc9c0 \uc54a\uc558\uae30 \ub54c\ubb38\uc5d0 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc790\uc5d0\uac8c \uc26c\uc6b4 \ud45c\uc801\uc774 \ub429\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \uc774\ub7ec\ud55c \uc7a5\uce58\ub97c \uc545\uc131 \ubd07\uc73c\ub85c \uac10\uc5fc\uc2dc\ucf1c \ub300\uaddc\ubaa8 \uacf5\uaca9\uc744 \uc704\ud55c \ubd07\ub137\uc73c\ub85c \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>4) <strong>\ub9e5\uc6a9 \uc545\uc131 \ucf54\ub4dc<\/strong>: 2021\ub144, \ub9e5 \ucef4\ud4e8\ud130\uc6a9 Kattana \uac70\ub798 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc774 \ubcf5\uc81c\ub418\uc5b4 \ud2b8\ub85c\uc774\ud654\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uacf5\uaca9\uc790\ub294 \ube0c\ub77c\uc6b0\uc800 \ucfe0\ud0a4, \uc554\ud638\ud654\ud3d0 \uc9c0\uac11 \ubc0f \uc2a4\ud06c\ub9b0\uc0f7\uacfc \uac19\uc740 \uc815\ubcf4\ub97c \ud6d4\uce58\uae30 \uc704\ud574 \uc545\uc131 \ucf54\ub4dc\ub97c \uc0ac\uc6a9\ud588\uc2b5\ub2c8\ub2e4; 2022\ub144\uae4c\uc9c0 \uc774\ub7ec\ud55c \uc720\ud615\uc758 \uc0ac\uc774\ubc84 \uc704\ud611\uc740 \uc644\uc804\ud788 \uc81c\uac70\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>5) <strong>\uc545\uc131 \uc774\uba54\uc77c<\/strong>: \uc774\uba54\uc77c\uc744 \ud1b5\ud55c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ubc30\ud3ec\uac00 2022\ub144\uc5d0 \uc99d\uac00\ud560 \uac83\uc785\ub2c8\ub2e4. Microsoft Office Exploit\uc774 2022\ub144 \uac00\uc7a5 \uc77c\ubc18\uc801\uc778 \ud0d0\uc9c0\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub79c\uc12c\uc6e8\uc5b4\ub294 \uc870\uc9c1\uc744 \uc9c0\uc18d\uc801\uc73c\ub85c \uacf5\uaca9\ud558\uace0 \uc815\ubd80, \uac74\uac15, \uc5d0\ub108\uc9c0 \uae30\uad00\uacfc \uac19\uc740 \uc911\uc694\ud55c \uc778\ud504\ub77c\ub97c \uc190\uc0c1\uc2dc\ud0a4\uba70 \uc810\uc810 \ub354 \ubcf5\uc7a1\ud574\uc9c0\ub294 \uc9c0\uc18d\uc801\uc778 \uc0ac\uc774\ubc84 \uc704\ud611\uc785\ub2c8\ub2e4. \uadf8 \ud0d0\uc9c0\uc640 \uadfc\uc808. 2020\ub144\uc5d0\ub294 \ub79c\uc12c\uc6e8\uc5b4\uc640 \ub370\uc774\ud130 \ub204\ucd9c\uc774 \uacb0\ud569\ub418\uc5c8\uc2b5\ub2c8\ub2e4. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">\uc774 \uae30\uc0ac\uc5d0\uc11c<\/a>, \uadf8\ub294 \ub2e4\uc591\ud55c \ub79c\uc12c\uc6e8\uc5b4 \uacc4\uc5f4\uc758 \uc6b4\uc601\uc790\ub4e4\uc774 \uc774 \uc720\ud615\uc758 \uacf5\uaca9\uc5d0 \ub610 \ub2e4\ub978 \uc704\ud5d8\uc744 \ucd94\uac00\ud588\ub2e4\uace0 \uc9c0\uc801\ud569\ub2c8\ub2e4. \ud30c\uc77c\uc744 \ub0a9\uce58\ud558\ub294 \uac83 \uc678\uc5d0\ub3c4 \uc774\uc81c\ub294 \ud611\ubc15\uc744 \ud1b5\ud574 \uc190\uc0c1\ub41c \uc815\ubcf4\ub97c \uc720\ucd9c\ud558\ub294 \uc0ac\uc774\ubc84 \uc704\ud611\uc744 \uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \ubc29\uc2dd\uc740 \ud53c\ud574\uc790\uc758 \uae30\ubc00 \ub370\uc774\ud130\ub97c \uc5bb\uace0 \ud611\ubc15\uae08\uc744 \uc9c0\ubd88\ud558\uc9c0 \uc54a\uc73c\uba74 \uc774\ub97c \uacf5\uac1c\ud558\uaca0\ub2e4\uace0 \uc704\ud611\ud558\ub294 \ub3c4\uc2f1 \uae30\ubc95\uc744 \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uc758\uc2ec\ud560 \uc5ec\uc9c0 \uc5c6\uc774, \uc774\ub294 \uc601\ud5a5\uc744 \ubc1b\uc740 \uc0ac\ub78c\ub4e4\uc5d0\uac8c \uc555\ubc15\uc744 \uac00\uc911\uc2dc\ud0b5\ub2c8\ub2e4. \uc774\ub294 \uc554\ud638\ud654\ub41c \uc815\ubcf4\ub97c \ubcf5\uad6c\ud558\ub294 \uac83\ubfd0\ub9cc \uc544\ub2c8\ub77c \ub3c4\ub09c\ub2f9\ud55c \ub370\uc774\ud130\uac00 \uacf5\uac1c\ub418\uc9c0 \uc54a\ub3c4\ub85d \ubc29\uc9c0\ud558\ub294 \ubb38\uc81c\uc774\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">\ubc45\ud0b9 \ud2b8\ub85c\uc774\ubaa9\ub9c8<\/a>, also known as \u201cBankers,\u201d are malicious code that is widely used in the field of cybercrime. Their function is to steal banking information from users of this type of service. These details are available on the black market. Some people acquire them in order to engage in criminal activities such as extortion and fraud. Around the world, eleven banking Trojan families have been identified.<\/p>\n\n\n\n<p>\uc774\ub7ec\ud55c \uacc4\uc5f4\uc740 \ucf54\ub4dc\ub97c \ubd84\uc11d\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uace0 \uc2dc\uc2a4\ud15c\uc5d0\uc11c \uc218\ud589\ud558\ub294 \uc545\uc131 \ud65c\ub3d9\uc744 \ubcf4\ud638\ud558\uae30 \uc704\ud574 \uc554\ud638\ud654 \ubc0f \ub09c\ub3c5\ud654 \ub3c4\uad6c\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \ud0d0\uc9c0\ub97c \ud53c\ud558\uae30 \uc704\ud574 \ud2b9\uc815 \uc791\uc5c5\uc774 \uc5c6\ub294 \uba85\ub839\uc744 \ud504\ub85c\uadf8\ub798\ubc0d\uc5d0 \ud3ec\ud568\ud569\ub2c8\ub2e4; \uc774\ub294 \ucc44\uc6cc\uc9c0\uace0, \uc4f0\ub808\uae30 \ucf54\ub4dc\uc785\ub2c8\ub2e4. \ud604\uc7ac\uae4c\uc9c0 50\uac1c \uc774\uc0c1\uc758 \uae08\uc735 \uae30\uad00\uc774 \uace0\uac1d\uc744 \uc18d\uc774\uae30 \uc704\ud55c \uc2e0\uc6d0 \ub3c4\uc6a9\uc758 \ud53c\ud574\uc790\ub85c \ud655\uc778\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\uc9c0\ub09c 3\ub144 \ub3d9\uc548 \uac00\uc7a5 \ud754\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc740:<\/strong><\/p>\n\n\n\n<p>1) <strong>\ub79c\uc12c\uc6e8\uc5b4<\/strong>: \uac1c\ubc1c\uc790\ub4e4\uc774 \uc870\uc9c1\ub41c \uadf8\ub8f9\uc744 \ud615\uc131\ud558\uace0 \ub2e4\ud06c \uc6f9\uc5d0\uc11c \ud53c\ud574\uc790\ub85c\ubd80\ud130 \ub3c4\ub09c\ub2f9\ud55c \ub370\uc774\ud130\ub97c \uacbd\ub9e4\uc5d0 \ubd80\uce69\ub2c8\ub2e4. 203\uac1c\uc758 \ub2e4\ub978 \ub79c\uc12c\uc6e8\uc5b4 \ubcc0\ud615\uc774 \ud655\uc778\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>2) <strong>\uc775\uc2a4\ud50c\ub85c\uc787<\/strong>: \uc2dc\uc2a4\ud15c\uc758 \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud558\uc5ec \uc7a5\ube44\uc5d0 \uc811\uadfc\ud558\ub824\ub294 \uc545\uc131 \ucf54\ub4dc\uc785\ub2c8\ub2e4. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc774\ud130\ub110\ube14\ub8e8<\/a> (WannaCry \ubc14\uc774\ub7ec\uc2a4\uac00 \uc18d\ud55c) \ubc0f BlueKeep\uc740 \ub354 \ub110\ub9ac \ud37c\uc9c4 \uacc4\uc5f4\uc785\ub2c8\ub2e4 (\uc6d0\uaca9 \ub370\uc2a4\ud06c\ud1b1 \ucde8\uc57d\uc810, 2022\ub144\uc5d0 \uc6d0\uaca9 \uadfc\ubb34 \ucd94\uc138\ub85c \uc778\ud574 \uad00\ub828\uc131\uc774 \ub192\uc544\uc9d0).<\/p>\n\n\n\n<p>3) <strong>\uc2a4\ud30c\uc774\uc6e8\uc5b4<\/strong>: \u201cclassic tools\u201d of cybercriminals. It is still critical for them to have a broad reach in propagation. Since 2020, the HoudRat Trojan has been at the top of the list.<\/p>\n\n\n\n<p>4) <strong>\ud53c\uc2f1<\/strong>: 2020\ub144\uc5d0\ub294 \ud53c\uc2f1 \ucea0\ud398\uc778\uacfc \uad00\ub828\ub41c \ud30c\uc77c \ud0d0\uc9c0\uac00 27% \uc99d\uac00\ud558\uc5ec 2022\ub144\uc5d0\ub294 53%\ub85c \uc99d\uac00\ud588\uc2b5\ub2c8\ub2e4. \uc774\ub294 2019\ub144\uc5d0 15%\uc600\ub358 \ud0d0\uc9c0\uc5d0 \ube44\ud574 \uc0c1\ub2f9\ud55c \uc99d\uac00\ub97c \ub098\ud0c0\ub0c5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>The cost of financial cybercrime has surpassed $600 billion. As if that weren\u2019t enough, there is a shortage of specialists due to changes in the cyberthreat landscape and the variety of new Malware developments, which have highlighted the shortage of professionals in the field of cybersecurity. According to various studies published at the end of 2019, 4.07 million Cybersecurity professionals were required.<\/p>","protected":false},"excerpt":{"rendered":"<p>\ucf54\ub85c\ub09819 \uc0c1\ud669\uc740 \ub514\uc9c0\ud138 \uc804\ud658 \uacfc\uc815\uc744 \uac00\uc18d\ud654\ud558\uace0 \uc6d0\uaca9 \uadfc\ubb34\ub97c \uacf5\uc2dd\ud654\ud558\uc5ec \uc0ac\uc774\ubc84 \uc704\ud611\uc774 \uc774\uc804\uc5d0 \ubcf8 \uc801 \uc5c6\uace0 \uc608\uce21\ud558\uc9c0 \ubabb\ud55c \uc218\uc900\uc73c\ub85c \uc99d\uac00\ud558\uac8c \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4. \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4(Malware)\ub294\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%89%b4%ec%8a%a4\/2023%eb%85%84%ec%97%90-%ea%b3%84%ec%86%8d-%ec%a7%80%eb%b0%b0%ec%a0%81%ec%9d%b8-%ec%9d%80%ed%96%89-%ed%8a%b8%eb%a1%9c%ec%9d%b4%eb%aa%a9%eb%a7%88-%ed%94%bc%ec%8b%b1-%eb%b0%8f-%eb%9e%9c%ec%84%ac%ec%9b%a8\/\"><span class=\"screen-reader-text\">2023\ub144\uc5d0\ub3c4 \ubc45\ud0b9 \ud2b8\ub85c\uc774\ubaa9\ub9c8, \ud53c\uc2f1, \ub79c\uc12c\uc6e8\uc5b4\uac00 \uc9c0\ubc30\uc801\uc77c \uc804\ub9dd<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/2023\ub144\uc5d0-\uacc4\uc18d-\uc9c0\ubc30\uc801\uc778-\uc740\ud589-\ud2b8\ub85c\uc774\ubaa9\ub9c8-\ud53c\uc2f1-\ubc0f-\ub79c\uc12c\uc6e8\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/2023\ub144\uc5d0-\uacc4\uc18d-\uc9c0\ubc30\uc801\uc778-\uc740\ud589-\ud2b8\ub85c\uc774\ubaa9\ub9c8-\ud53c\uc2f1-\ubc0f-\ub79c\uc12c\uc6e8\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2023\ub144\uc758 \ub514\uc9c0\ud138 \uc704\ud611 - Securitybriefing.net","description":"2023\ub144 \uc740\ud589 \ud2b8\ub85c\uc774 \ubaa9\ub9c8, \ud53c\uc2f1 \ubc0f \ub79c\uc12c\uc6e8\uc5b4\uc758 \uc9c0\uc18d\uc801\uc778 \uc9c0\ubc30\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694. \ubcf4\ud638\ub97c \uc720\uc9c0\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud55c \ud301\uc744 \uc5bb\uc73c\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/2023\ub144\uc5d0-\uacc4\uc18d-\uc9c0\ubc30\uc801\uc778-\uc740\ud589-\ud2b8\ub85c\uc774\ubaa9\ub9c8-\ud53c\uc2f1-\ubc0f-\ub79c\uc12c\uc6e8\/","og_locale":"ko_KR","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/ko\/\ub274\uc2a4\/2023\ub144\uc5d0-\uacc4\uc18d-\uc9c0\ubc30\uc801\uc778-\uc740\ud589-\ud2b8\ub85c\uc774\ubaa9\ub9c8-\ud53c\uc2f1-\ubc0f-\ub79c\uc12c\uc6e8\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"2023\ub144\uc758 \ub514\uc9c0\ud138 \uc704\ud611 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"2023\ub144 \uc740\ud589 \ud2b8\ub85c\uc774 \ubaa9\ub9c8, \ud53c\uc2f1 \ubc0f \ub79c\uc12c\uc6e8\uc5b4\uc758 \uc9c0\uc18d\uc801\uc778 \uc9c0\ubc30\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694. \ubcf4\ud638\ub97c \uc720\uc9c0\ud558\ub294 \ubc29\ubc95\uc5d0 \ub300\ud55c \ud301\uc744 \uc5bb\uc73c\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}