{"id":2569,"date":"2024-07-25T22:46:42","date_gmt":"2024-07-25T22:46:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2569"},"modified":"2024-07-25T23:18:21","modified_gmt":"2024-07-25T23:18:21","slug":"tiny-banker-trojan-%ec%9d%80%eb%b0%80%ed%95%9c-%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91%ec%97%90-%eb%8c%80%ed%95%9c-%ec%8b%ac%ec%b8%b5-%eb%b6%84%ec%84%9d","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91-2\/tiny-banker-trojan-%ec%9d%80%eb%b0%80%ed%95%9c-%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91%ec%97%90-%eb%8c%80%ed%95%9c-%ec%8b%ac%ec%b8%b5-%eb%b6%84%ec%84%9d\/","title":{"rendered":"\uc791\uc740 \uc740\ud589\uc6d0 \ud2b8\ub85c\uc774 \ubaa9\ub9c8: \uc740\ubc00\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud55c \uc2ec\uce35 \ubd84\uc11d"},"content":{"rendered":"<p>\uc9c0\uc18d\uc801\uc73c\ub85c \uc9c4\ud654\ud558\ub294 \ubaa8\ub4e0 \uc0ac\uc774\ubc84 \uc704\ud611 \uc911\uc5d0\uc11c, Tiny Banker \ud2b8\ub85c\uc794\uc740 \uac00\uc7a5 \uc704\ud5d8\ud558\uace0 \ucc3e\uae30 \uc5b4\ub824\uc6b4 \uc740\ud589 \ud2b8\ub85c\uc794 \uc911 \ud558\ub098\ub85c \ub450\ub4dc\ub7ec\uc9d1\ub2c8\ub2e4. 2012\ub144\uc5d0 \ucc98\uc74c \ubc1c\uacac\ub418\uc5b4 \uc804 \uc138\uacc4\uc801\uc73c\ub85c \uc5ec\ub7ec \uae08\uc735 \ub370\uc774\ud130 \uc720\ucd9c\uacfc \uc8fc\uc694 \uae08\uc735 \uc190\uc2e4\uc744 \ucd08\ub798\ud588\uc2b5\ub2c8\ub2e4. \uc774 \uac8c\uc2dc\ubb3c\uc740 Tiny Banker \ud2b8\ub85c\uc794\uc758 \uae30\uc6d0, \ud2b9\uc9d5 \ubc0f \ub300\uc751\ucc45\uc744 \ud0d0\uad6c\ud558\uc5ec \uc774 \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud55c \ud3ec\uad04\uc801\uc778 \uc774\ud574\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-tiny-banker-trojan\">Tiny Banker \ud2b8\ub85c\uc794\uc774\ub780 \ubb34\uc5c7\uc785\ub2c8\uae4c?<\/h2>\n\n\n<p><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/tiny-banker-trojan-tbt-tinba\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tiny Banker \ud2b8\ub85c\uc794<\/a> is a banking malware used to steal sensitive information from users to steal sensitive financial information. This malware basically attacks and intercepts\/manipulates web traffic between the user and the banking websites. But, opposite to the name \u201cTiny,\u201d this Trojan is very effective and dangerous despite being small in size.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-tiny-banker-work\">Tiny Banker\ub294 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud569\ub2c8\uae4c?<\/h2>\n\n\n<p>\uc5ec\ub7ec \uc815\uad50\ud55c \uba54\ucee4\ub2c8\uc998\uc744 \ud1b5\ud574 Tiny Banker\ub294 \ub2e4\uc74c\uacfc \uac19\uc740 \ubc29\ubc95\uc73c\ub85c \uc791\ub3d9\ud569\ub2c8\ub2e4:<\/p>\n\n\n\n<p><strong>\uac10\uc5fc \ubca1\ud130<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc774\uba54\uc77c \ucca8\ubd80 \ud30c\uc77c:<\/strong> <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.tinba\" target=\"_blank\" rel=\"noreferrer noopener\">Tinba\ub294 \uc8fc\ub85c \uc774\uba54\uc77c\uc744 \ud1b5\ud574 \ubc30\ud3ec\ub429\ub2c8\ub2e4<\/a> \ud53c\uc2f1 \uc774\uba54\uc77c\uc758 \uc545\uc131 \ucca8\ubd80 \ud30c\uc77c\uc774 \uc0ac\uc6a9\ub429\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\uc545\uc131 \ub9c1\ud06c:<\/strong> \uc774\uba54\uc77c \ub610\ub294 \uc190\uc0c1\ub41c \uc6f9\uc0ac\uc774\ud2b8\uc758 \ub9c1\ud06c\uac00 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \ub2e4\uc6b4\ub85c\ub4dc\ub85c \uc774\uc5b4\uc9d1\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ub4dc\ub77c\uc774\ube0c \ubc14\uc774 \ub2e4\uc6b4\ub85c\ub4dc:<\/strong> \uc0ac\uc6a9\uc790\uac00 \uac10\uc5fc\ub41c \uc6f9\uc0ac\uc774\ud2b8\ub97c \ubc29\ubb38\ud560 \ub54c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \uc790\ub3d9\uc73c\ub85c \ub2e4\uc6b4\ub85c\ub4dc\ub429\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><strong>\uc8fc\uc694 \uae30\ub2a5<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc6f9 \uc778\uc81d\uc158:<\/strong> Tinba\ub294 \ud0c0\uac9f \uc740\ud589 \uc0ac\uc774\ud2b8\uc758 \uc6f9 \ud398\uc774\uc9c0\uc5d0 \uc545\uc131 \ucf54\ub4dc\ub97c \uc8fc\uc785\ud569\ub2c8\ub2e4. \uc774 \ubc29\ubc95\uc73c\ub85c \uc0ac\uc6a9\uc790\uac00 \uc785\ub825\ud55c \ub85c\uadf8\uc778 \uc790\uaca9 \uc99d\uba85 \ubc0f \uae30\ud0c0 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \uc218\uc9d1\ud558\ub294 \ub370 \uc131\uacf5\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ube0c\ub77c\uc6b0\uc800 \ub0b4 \uacf5\uaca9:<\/strong> \ud2b8\ub85c\uc794\uc740 \ube0c\ub77c\uc6b0\uc800\uc640 \uc0ac\uc6a9\uc790 \uc0ac\uc774\uc758 \uc911\uac1c\uc790\ub85c \uc791\ub3d9\ud569\ub2c8\ub2e4. \ud1b5\uc2e0\uc5d0\uc11c\uc758 \uac00\ub85c\ucc44\uae30\ub294 Tinba\uac00 \uac70\ub798\ub97c \ubcc0\uacbd\ud558\uace0 \uacc4\uc815 \uc138\ubd80 \uc815\ubcf4\ub97c \ud3b8\uc9d1\ud558\uba70 \ub2e4\ub978 \uc5ec\ub7ec \uc2b9\uc778\ub418\uc9c0 \uc54a\uc740 \uc791\uc5c5\uc744 \uc218\ud589\ud560 \uc218 \uc788\uac8c \ud569\ub2c8\ub2e4\u2014\uc0ac\uc6a9\uc790\uac00 \uc54c\uc544\ucc28\ub9ac\uc9c0 \ubabb\ud55c \ucc44\ub85c.<\/li>\n\n\n\n<li><strong>\ub370\uc774\ud130 \uc720\ucd9c:<\/strong> Captured data is then sent back to the attacker\u2019s server. Most of the time, this will include login credentials, account numbers, and other financial information.<\/li>\n\n\n\n<li><strong>\uc9c0\uc18d\uc131 \uba54\ucee4\ub2c8\uc998:<\/strong> Tinba\ub294 \ub808\uc9c0\uc2a4\ud2b8\ub9ac \ud56d\ubaa9\uc744 \ub9cc\ub4e4\uace0 \uc5ec\ub7ec \uc704\uce58\uc5d0 \uc790\uc2e0\uc744 \ubcf5\uc0ac\ud558\ub294 \uac83\uc744 \ud3ec\ud568\ud558\uc5ec \uac10\uc5fc\ub41c \uc2dc\uc2a4\ud15c\uc5d0 \uba38\ubb34\ub974\uae30 \uc704\ud574 \uc5ec\ub7ec \uae30\uc220\uc744 \ubc30\ud3ec\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"impact-of-tiny-banker-trojan\">Tiny Banker \ud2b8\ub85c\uc794\uc758 \uc601\ud5a5<\/h2>\n\n\n<p>The effects of Tinba on the attacked victims may be devastating. There can be direct financial losses due to unauthorized transactions and loss of personal and financial information. For financial institutions, it causes a loss of customers\u2019 trust and can attract legal consequences for breaking data protection laws.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-detect-and-remove\">\ud0d0\uc9c0 \ubc0f \uc81c\uac70 \ubc29\ubc95<\/h2>\n\n\n<p>Tiny Banker \ud2b8\ub85c\uc794\uc744 \ud0d0\uc9c0\ud558\uace0 \uc81c\uac70\ud558\uae30 \uc704\ud574 \ubcf4\uc548 \uc870\uce58\uc640 \ub3c4\uad6c\uac00 \ud544\uc694\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\ud0d0\uc9c0 \ubc29\ubc95<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ud589\ub3d9 \ubd84\uc11d:<\/strong> \uc774\ub294 \uc608\uc0c1\uce58 \ubabb\ud55c \uc6f9 \uc778\uc81d\uc158\uc774\ub098 \uc2b9\uc778\ub418\uc9c0 \uc54a\uc740 \uac70\ub798\uc640 \uac19\uc740 \ube44\uc815\uc0c1\uc801\uc778 \ud589\ub3d9\uc744 \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc5d0\uc11c \ubaa8\ub2c8\ud130\ub9c1\ud558\ub294 \uac83\uc744 \ud3ec\ud568\ud569\ub2c8\ub2e4. \ucd5c\uc2e0 \ubcf4\uc548 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \ud544\uc694\ud569\ub2c8\ub2e4 <a href=\"https:\/\/cybeready.com\/cyber-attacks\/steps-to-protect-from-tiny-banker-trojan-tinba\" target=\"_blank\" rel=\"noreferrer noopener\">Tinba\ub97c \uc2dd\ubcc4\ud558\uace0 \uc81c\uac70\ud558\uae30 \uc704\ud574<\/a>.<\/li>\n\n\n\n<li><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>\ub124\ud2b8\uc6cc\ud06c \ubaa8\ub2c8\ud130\ub9c1:<\/strong>\u00a0\uc815\ubcf4 \uc720\ucd9c \ub610\ub294 \ub2e4\ub978 \uc54c\ub824\uc9c4 \uc545\uc131 IP \uc8fc\uc18c\ub97c \ud655\uc778\ud558\uae30 \uc704\ud574 \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc744 \uc2a4\uce94\ud558\ub294 \uac83\uc744 \ud3ec\ud568\ud569\ub2c8\ub2e4.<\/span><\/li>\n<\/ul>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<style>\n    .trojan-container {\n        text-align: center;\n        padding: 50px 20px;\n        background-color: #061751;\n        color: white;\n    }\n    .trojan-container h2 {\n        margin: 0;\n        font-size: 3em;\n        color: white; \/* Ensures the title is white *\/\n    }\n    .trojan-cards {\n        display: flex;\n        justify-content: center;\n        flex-wrap: wrap;\n        margin-top: 20px;\n    }\n    .trojan-card {\n        background: white;\n        width: 20%;\n        margin: 20px;\n        padding: 20px;\n        border-radius: 10px;\n        box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1);\n        text-align: center;\n    }\n    .trojan-card h3 {\n        font-size: 1.5em;\n        margin: 20px 0;\n    }\n    .trojan-card p {\n        color: #666;\n        font-size: 0.9em; \/* smaller font size *\/\n        line-height: 1.4; \/* reduced line height *\/\n    }\n    .trojan-card .trojan-number {\n        font-size: 2em;\n        background: linear-gradient(to bottom right, #00bfa5, #0288d1);\n        color: white;\n        border-radius: 50%;\n        width: 60px;\n        height: 60px;\n        line-height: 60px;\n        margin: 0 auto 20px auto;\n    }\n    .trojan-card a {\n        text-decoration: none;\n        color: #0288d1;\n        font-weight: bold;\n        display: inline-block;\n        margin-top: 20px;\n    }\n    .trojan-card a:hover {\n        text-decoration: underline;\n    }\n\n    \/* Responsive styles *\/\n    @media (max-width: 768px) {\n        .trojan-card {\n            width: 45%;\n            margin: 10px;\n        }\n    }\n\n    @media (max-width: 480px) {\n        .trojan-card {\n            width: 100%;\n            margin: 10px 0;\n        }\n    }\n<\/style>\n\n<div class=\"trojan-container\">\n    <h2>Tiny Banker \ud2b8\ub85c\uc794 \uc81c\uac70 \ub2e8\uacc4<\/h2>\n    <div class=\"trojan-cards\">\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">01<\/div>\n            <h3>\uc7a5\uce58 \uaca9\ub9ac<\/h3>\n            <p>\ucd94\uac00 \ub370\uc774\ud130 \uc720\ucd9c\uc744 \ubc29\uc9c0\ud558\uae30 \uc704\ud574 \uc989\uc2dc \uc7a5\uce58\ub97c \uc778\ud130\ub137\uc5d0\uc11c \uaca9\ub9ac\ud558\uc2ed\uc2dc\uc624.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">02<\/div>\n            <h3>\uc2dc\uc2a4\ud15c \uc2a4\uce94<\/h3>\n            <p>\ud3c9\ud310\uc774 \uc88b\uc740 \uc548\ud2f0\uba40\uc6e8\uc5b4 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub85c \uc2dc\uc2a4\ud15c \uc804\uccb4 \uc2a4\uce94\uc744 \uc2e4\ud589\ud558\uc5ec \ud2b8\ub85c\uc794\uc758 \ud0d0\uc9c0\ub41c \uc778\uc2a4\ud134\uc2a4\ub97c \uc81c\uac70\ud558\uc2ed\uc2dc\uc624.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">03<\/div>\n            <h3>\ubc31\uc5c5\uc5d0\uc11c \ubcf5\uc6d0<\/h3>\n            <p>\uac00\ub2a5\ud558\ub2e4\uba74, \uac10\uc5fc\ub418\uae30 \uc804\uc758 \uae68\ub057\ud55c \ubc31\uc5c5\uc5d0\uc11c \uc2dc\uc2a4\ud15c\uc744 \ub864\ubc31\ud558\uc2ed\uc2dc\uc624.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">04<\/div>\n            <h3>\ube44\ubc00\ubc88\ud638 \ubcc0\uacbd<\/h3>\n            <p>\uae08\uc735 \uc0ac\uc774\ud2b8 \ubc0f \uae30\ud0c0 \ubbfc\uac10\ud55c \uacc4\uc815\uc5d0 \uc0ac\uc6a9\ub41c \ubaa8\ub4e0 \ube44\ubc00\ubc88\ud638\ub97c \ubcc0\uacbd\ud558\uc2ed\uc2dc\uc624.<\/p>\n        <\/div>\n        <div class=\"trojan-card\">\n            <div class=\"trojan-number\">05<\/div>\n            <h3>\uacc4\uc815 \ubaa8\ub2c8\ud130\ub9c1<\/h3>\n            <p>\ubaa8\ub4e0 \uae08\uc735 \uacc4\uc815\uc744 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \uac70\ub798\uc5d0 \ub300\ud574 \ubaa8\ub2c8\ud130\ub9c1\ud558\uc2ed\uc2dc\uc624. \uc774\uc0c1\ud55c \ud65c\ub3d9\uc774 \ubc1c\uacac\ub418\uba74 \uae08\uc735 \uae30\uad00\uc5d0 \uc5f0\ub77d\ud558\uc2ed\uc2dc\uc624.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>\uc608\ubc29 \uc804\ub7b5<\/strong><\/p>\n\n\n\n<p>Tiny Banker \ud2b8\ub85c\uc794\uc5d0 \ub300\ud55c \ubcf4\ud638\ub97c \uc704\ud574 \uac15\ub825\ud55c \ubcf4\uc548 \uad00\ud589\uc774 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uac00\uc7a5 \uc911\uc694\ud55c \uc694\uc18c\ub294 \ud53c\uc2f1 \uacf5\uaca9\uc5d0 \ub300\ud55c \uc0ac\uc6a9\uc790 \uad50\uc721\uacfc \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ub9c1\ud06c\ub97c \ud074\ub9ad\ud558\uac70\ub098 \uc54c \uc218 \uc5c6\ub294 \ucca8\ubd80 \ud30c\uc77c\uc744 \ub2e4\uc6b4\ub85c\ub4dc\ud558\uc9c0 \uc54a\ub3c4\ub85d \uc778\uc2dd\ud558\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc815\uae30\uc801\uc778 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5c5\ub370\uc774\ud2b8:<\/strong> \ubaa8\ub4e0 \uc18c\ud504\ud2b8\uc6e8\uc5b4\u2014\ud2b9\ud788 \ube0c\ub77c\uc6b0\uc800\uc640 \ubcf4\uc548 \uc18c\ud504\ud2b8\uc6e8\uc5b4\u2014\ub97c \ucd5c\uc2e0 \ubc84\uc804\uc73c\ub85c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624.<\/li>\n\n\n\n<li><strong>\uac15\ub825\ud558\uace0 \uace0\uc720\ud55c \ube44\ubc00\ubc88\ud638:<\/strong> \ub2e4\uc591\ud55c \uacc4\uc815\uc5d0 \ub300\ud574 \uac15\ub825\ud558\uace0 \uace0\uc720\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc0ac\uc6a9\ud558\uace0 \uc815\uae30\uc801\uc73c\ub85c \ubcc0\uacbd\ud558\uc2ed\uc2dc\uc624.<\/li>\n\n\n\n<li><strong>\uc774\uc911 \uc778\uc99d:<\/strong> \uc628\ub77c\uc778 \ubc45\ud0b9 \ubc0f \uac00\uc7a5 \uc911\uc694\ud55c \ubaa8\ub4e0 \uacc4\uc815\uc5d0 \ub300\ud574 \uc774 \uae30\ub2a5\uc744 \ud65c\uc131\ud654\ud558\uc2ed\uc2dc\uc624.<\/li>\n\n\n\n<li><strong>\uc774\uba54\uc77c \ud544\ud130\ub9c1:<\/strong> \ud53c\uc2f1 \uc774\uba54\uc77c \ubc0f \ucca8\ubd80 \ud30c\uc77c\uc744 \ud544\ud130\ub9c1\ud558\uae30 \uc704\ud55c \uac15\ub825\ud55c \uc194\ub8e8\uc158\uc744 \uad6c\ud604\ud558\uc2ed\uc2dc\uc624.<\/li>\n\n\n\n<li><strong>\uc815\uae30\uc801\uc778 \ubc31\uc5c5:<\/strong> \uc911\uc694\ud55c \ub370\uc774\ud130\ub97c \ubc31\uc5c5\ud558\uc5ec \uac10\uc5fc\ub420 \uacbd\uc6b0 \ubcf5\uc6d0\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">\uacb0\ub860\uc801\uc73c\ub85c<\/h2>\n\n\n<p>Tiny Banker \ud2b8\ub85c\uc794\uc740 \uc628\ub77c\uc778 \ubc45\ud0b9 \ubcf4\uc548\uc5d0 \ub300\ud55c \ub9e4\uc6b0 \uc704\ud5d8\ud55c \uc81c\uc548\uc785\ub2c8\ub2e4. \uc774\ub294 \ubbfc\uac10\ud55c \uae08\uc735 \uc815\ubcf4\ub97c \ud6d4\uce58\uace0 \uc2b9\uc778\ub418\uc9c0 \uc54a\uc740 \uac70\ub798\ub97c \uc218\ud589\ud558\uae30 \uc704\ud574 \uc815\uad50\ud55c \uae30\uc220\uc744 \uc0ac\uc6a9\ud569\ub2c8\ub2e4. <\/p>\n\n\n\n<p>\uadf8 \ub0b4\ubd80 \uba54\ucee4\ub2c8\uc998\uc744 \uc774\ud574\ud558\uace0 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ud0d0\uc9c0, \uc81c\uac70 \ubc0f \uc608\ubc29 \uc804\ub7b5\uc744 \uad6c\ud604\ud568\uc73c\ub85c\uc368 \uc774 \uad50\ud65c\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc774 \uc0ac\uc6a9\uc790\uc640 \uc870\uc9c1\uc5d0 \uac00\ud558\ub294 \uc704\ud5d8\uc744 \uc904\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0\uc11c \uac15\ub825\ud55c \uad00\ud589\uc744 \ub530\ub974\uace0, \uacbd\uacc4\ub97c \uc720\uc9c0\ud558\uba70, \uc0ac\uc6a9\uc790\ub97c \uad50\uc721\ud558\ub294 \uac83\uc740 Tiny Banker \ud2b8\ub85c\uc794 \ubc0f \uae30\ud0c0 \uc720\uc0ac\ud55c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub85c\ubd80\ud130 \ubcf4\ud638\ud558\uae30 \uc704\ud55c \uc911\uc694\ud55c \uc870\uce58 \uc911 \uc77c\ubd80\uc785\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>Of all the cyber threats in continuous evolution, the Tiny Banker Trojan stands out as one of the most dangerous and elusive banking Trojans. First discovered in 2012, it accounted\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91-2\/tiny-banker-trojan-%ec%9d%80%eb%b0%80%ed%95%9c-%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91%ec%97%90-%eb%8c%80%ed%95%9c-%ec%8b%ac%ec%b8%b5-%eb%b6%84%ec%84%9d\/\"><span class=\"screen-reader-text\">\uc791\uc740 \uc740\ud589\uc6d0 \ud2b8\ub85c\uc774 \ubaa9\ub9c8: \uc740\ubc00\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud55c \uc2ec\uce35 \ubd84\uc11d<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":2590,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[],"class_list":["post-2569","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tiny-banker-trojan-\uc740\ubc00\ud55c-\uc0ac\uc774\ubc84-\uc704\ud611\uc5d0-\ub300\ud55c-\uc2ec\uce35-\ubd84\uc11d\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Of all the cyber threats in continuous evolution, the Tiny Banker Trojan stands out as one of the most dangerous and elusive banking Trojans. First discovered in 2012, it accounted&hellip; Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat \uacc4\uc18d \uc77d\uae30\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tiny-banker-trojan-\uc740\ubc00\ud55c-\uc0ac\uc774\ubc84-\uc704\ud611\uc5d0-\ub300\ud55c-\uc2ec\uce35-\ubd84\uc11d\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-25T22:46:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T23:18:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\",\"datePublished\":\"2024-07-25T22:46:42+00:00\",\"dateModified\":\"2024-07-25T23:18:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\",\"name\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"datePublished\":\"2024-07-25T22:46:42+00:00\",\"dateModified\":\"2024-07-25T23:18:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc791\uc740 \ubc45\ucee4 \ud2b8\ub85c\uc794: \uc740\ubc00\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud55c \uc2ec\uce35 \ubd84\uc11d | \ubcf4\uc548 \ube0c\ub9ac\ud551","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tiny-banker-trojan-\uc740\ubc00\ud55c-\uc0ac\uc774\ubc84-\uc704\ud611\uc5d0-\ub300\ud55c-\uc2ec\uce35-\ubd84\uc11d\/","og_locale":"ko_KR","og_type":"article","og_title":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat | Security Briefing","og_description":"Of all the cyber threats in continuous evolution, the Tiny Banker Trojan stands out as one of the most dangerous and elusive banking Trojans. First discovered in 2012, it accounted&hellip; Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat \uacc4\uc18d \uc77d\uae30","og_url":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tiny-banker-trojan-\uc740\ubc00\ud55c-\uc0ac\uc774\ubc84-\uc704\ud611\uc5d0-\ub300\ud55c-\uc2ec\uce35-\ubd84\uc11d\/","og_site_name":"Security Briefing","article_published_time":"2024-07-25T22:46:42+00:00","article_modified_time":"2024-07-25T23:18:21+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat","datePublished":"2024-07-25T22:46:42+00:00","dateModified":"2024-07-25T23:18:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/"},"wordCount":730,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","articleSection":["Cyber Attacks","Cyber Threats"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/","name":"\uc791\uc740 \ubc45\ucee4 \ud2b8\ub85c\uc794: \uc740\ubc00\ud55c \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud55c \uc2ec\uce35 \ubd84\uc11d | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","datePublished":"2024-07-25T22:46:42+00:00","dateModified":"2024-07-25T23:18:21+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Add-a-heading.jpg","width":1265,"height":422,"caption":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tiny-banker-trojan-an-in-depth-look-at-a-stealthy-cyber-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tiny Banker Trojan: An In-Depth Look at a Stealthy Cyber Threat"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/2569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=2569"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/2569\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/2590"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=2569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=2569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=2569"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}