{"id":2636,"date":"2024-09-02T16:20:55","date_gmt":"2024-09-02T16:20:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2636"},"modified":"2024-09-02T16:20:58","modified_gmt":"2024-09-02T16:20:58","slug":"tinba-virus-%ec%95%85%ec%84%b1-%eb%b1%85%ed%82%b9-%ed%8a%b8%eb%a1%9c%ec%9d%b4%eb%aa%a9%eb%a7%88","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91-2\/tinba-virus-%ec%95%85%ec%84%b1-%eb%b1%85%ed%82%b9-%ed%8a%b8%eb%a1%9c%ec%9d%b4%eb%aa%a9%eb%a7%88\/","title":{"rendered":"\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4: \uc0ac\uc545\ud55c \ubc45\ud0b9 \ud2b8\ub85c\uc774 \ubaa9\ub9c8"},"content":{"rendered":"<p>The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for \u201cTiny Banker,\u201d due to its small file size, but in actuality, it has an impact far from minor. In this article, we will discuss what the Tinba virus is, how it works, some background, and what you can do to protect yourself from this cyber menace.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-tinba-virus\"><strong>\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4\ub780 \ubb34\uc5c7\uc778\uac00?<\/strong><\/h2>\n\n\n<p>\ud2f4\ubc14\ub294 \uc740\ud589 <a href=\"https:\/\/us.norton.com\/blog\/malware\/what-is-a-trojan\" target=\"_blank\" rel=\"noreferrer noopener\">\ud2b8\ub85c\uc774 \ubaa9\ub9c8 \uc545\uc131\ucf54\ub4dc<\/a> \ubbfc\uac10\ud55c \uae08\uc735 \uc815\ubcf4\ub97c \ub178\ub9bd\ub2c8\ub2e4. \uc628\ub77c\uc778 \ubc45\ud0b9 \uc790\uaca9 \uc99d\uba85\ubd80\ud130 \uc2e0\uc6a9\uce74\ub4dc \uc815\ubcf4\uae4c\uc9c0 \ubaa8\ub450 \uadf8 \ud568\uc815\uc5d0 \ube60\uc9d1\ub2c8\ub2e4. \ub610\ud55c, \ub2e4\ub978 \ubaa8\ub4e0 \uac1c\uc778 \uc815\ubcf4\ub3c4 \uc218\uc9d1\ub418\uc5b4 \ub2e4\uc591\ud55c \uae08\uc735 \uc0ac\uae30\ub97c \uc800\uc9c0\ub974\ub294 \ub370 \uc0ac\uc6a9\ub429\ub2c8\ub2e4. \ube44\ub85d \ud06c\uae30\ub294 20KB\uc5d0 \ubd88\uacfc\ud558\uc9c0\ub9cc, \ud6a8\uc728\uc801\uc774\uba74\uc11c\ub3c4 \uc704\ud5d8\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>It works by injecting itself into a user\u2019s web browser and then monitoring and intercepting the online banking sessions. As soon as Tinba detects that a user has logged onto their account, it captures the login credentials and other critical information and sends them to the attackers. Moreover, Tinba is also capable of changing what appears on the victim\u2019s screen, further enabling the attackers to carry out other types of fraud against the user.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-history-of-tinba\"><strong>\ud2f4\ubc14\uc758 \uc5ed\uc0ac<\/strong><\/h3>\n\n\n<p>\ud2f4\ubc14\ub294 2012\ub144\uc5d0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ubd84\uc57c\uc5d0 \ucc98\uc74c \ub4f1\uc7a5\ud588\uc2b5\ub2c8\ub2e4. \uadf8 \ud6a8\uc728\uc131\uacfc \ube60\ub978 \uc804\ud30c \uc18d\ub3c4\ub85c \uc545\uba85 \ub192\uc740 \uba85\uc131\uc744 \uc5bb\uc5c8\uc2b5\ub2c8\ub2e4. \ucc98\uc74c\uc5d0\ub294 \ud2b9\uc815 \uae08\uc735 \uae30\uad00\uc744 \ub300\uc0c1\uc73c\ub85c \ud55c \uacf5\uaca9\uc5d0 \uc0ac\uc6a9\ub418\uc5c8\uc73c\uba70, \uc778\ud130\ub137\uc744 \ud1b5\ud574 \ub354 \ud070 \uc601\uc5ed\uc73c\ub85c \uc801\uadf9\uc801\uc73c\ub85c \uac1c\ubc1c\ub418\uace0 \ud655\uc0b0\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uc545\uc131\ucf54\ub4dc\ub294 <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" target=\"_blank\" rel=\"noreferrer noopener\">\ud53c\uc2f1 \uc774\uba54\uc77c<\/a>, \uc545\uc131 \uc6f9\uc0ac\uc774\ud2b8, \uc2ec\uc9c0\uc5b4 \ub300\uaddc\ubaa8 \ubd07\ub137 \uc6b4\uc601\uc758 \uc77c\ubd80\ub85c \ubc30\ud3ec\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ud2f4\ubc14\uc758 \uac00\uc7a5 \uc8fc\ubaa9\ud560 \ub9cc\ud55c \uc810\uc740 \ub300\ubd80\ubd84\uc758 \uc804\ud1b5\uc801\uc778 AV\ub97c \ud53c\ud588\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uadf9\ub3c4\ub85c \uc791\uc740 \ud06c\uae30\uc640 \uc740\ubc00\ud55c \ud2b9\uc131\uc73c\ub85c \uc778\ud574 \uc545\uc131\ucf54\ub4dc\ub97c \uc2dd\ubcc4\ud558\uace0 \ubb34\ub825\ud654\ud558\ub824\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc5f0\uad6c\uc790\ub4e4\uc5d0\uac8c \uac70\uc758 \ubcf4\uc774\uc9c0 \uc54a\uc558\uc2b5\ub2c8\ub2e4. \uc2dc\uac04\uc774 \uc9c0\ub0a8\uc5d0 \ub530\ub77c \ud2f4\ubc14\ub294 \uc9c0\uc18d\uc801\uc73c\ub85c \uc9c4\ud654\ud558\uc5ec \uac01 \uc0c8\ub85c\uc6b4 \ubc84\uc804\uc774 \ub354 \ubcf5\uc7a1\ud574\uc838 \ub354 \uc624\ub798 \ud0d0\uc9c0\ub97c \ud53c\ud558\uace0 \ub354 \ub9ce\uc740 \uc0ac\uc6a9\uc790\ub97c \uac10\uc5fc\uc2dc\ud0a4\ub824 \ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-tinba-works\"><strong>\ud2f4\ubc14\uc758 \uc791\ub3d9 \ubc29\uc2dd<\/strong><\/h3>\n\n\n<p>Infections typically occur through phishing emails. These are messages designed to appear genuine, as though they were coming from a trusted source: it could be banks, service providers, or even colleagues. They generally contain a link or attachment that initiates downloading the Tinba Trojan onto the device when clicked on or opened. Once installed, Tinba works quietly in the background, passively observing the user\u2019s activity online. When the user accesses a banking site, the Trojan springs into action. It captures not only the user\u2019s login credentials but any other information entered on the site. Tinba can also perform \u201cweb injects,\u201d altering the appearance of the banking site to deceive the user into providing extra information: answers to security questions, one-time passwords, etc.<\/p>\n\n\n\n<p>\ud2f4\ubc14\ub97c \ud2b9\ud788 \uc704\ud5d8\ud558\uac8c \ub9cc\ub4dc\ub294 \uac83\uc740 \uc6f9 \uc138\uc158\uc744 \uc870\uc791\ud560 \uc218 \uc788\ub294 \ub2a5\ub825\uc785\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/all\/fake-pop-up\/7498aa68-db84-47ab-a2e7-a2e28a705d62\" target=\"_blank\" rel=\"noreferrer noopener\">\uac00\uc9dc \ud31d\uc5c5 \ucc3d<\/a> asking for additional information the user might unwittingly provide. This information is then sent directly to the attackers, who can use it to access the victim\u2019s bank account, transfer funds, or make fraudulent purchases.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tinba\"><strong>\ud2f4\ubc14\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud558\uae30<\/strong><\/h2>\n\n\n<p>\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4\uc758 \uc2ec\uac01\uc131\uc744 \uace0\ub824\ud560 \ub54c, \uc774\uc640 \uc720\uc0ac\ud55c \uc704\ud611\uc5d0 \ub300\ud55c \uc0ac\uc804 \ubc29\uc5b4\uac00 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \ubcf4\uc548\uc5d0 \ub300\ud55c \uc88b\uc740 \uc2e4\ucc9c \ubc29\ubc95\uc740 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<p><strong>\ud53c\uc2f1 \uc774\uba54\uc77c\uc5d0 \uc8fc\uc758\ud558\uc138\uc694:<\/strong> Be very careful when opening your emails, especially from unknown senders. Never click on links or download attachments if you are not sure of their safety. Verify the sender\u2019s email address and any hints that may indicate a phishing email.<\/p>\n\n\n\n<p><strong>\uac15\ub825\ud558\uace0 \uace0\uc720\ud55c \ube44\ubc00\ubc88\ud638 \uc0ac\uc6a9:<\/strong> \uac15\ub825\ud558\uace0 \uace0\uc720\ud55c \ube44\ubc00\ubc88\ud638\ub294 \ubaa8\ub4e0 \uc628\ub77c\uc778 \ubc45\ud0b9 \ubc0f \ubbfc\uac10\ud55c \uacc4\uc815\uc5d0 \ud544\uc218\uc801\uc785\ub2c8\ub2e4. \uc5ec\ub7ec \uc0ac\uc774\ud2b8\uc5d0\uc11c \ube44\ubc00\ubc88\ud638\ub97c \uc7ac\uc0ac\uc6a9\ud558\uc9c0 \ub9d0\uace0, \ube44\ubc00\ubc88\ud638 \uad00\ub9ac\uc790\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc790\uaca9 \uc99d\uba85\uc744 \uc548\uc804\ud558\uac8c \ucd94\uc801\ud558\ub294 \uac83\uc744 \uace0\ub824\ud558\uc138\uc694.<\/p>\n\n\n\n<p><strong>\uc774\uc911 \uc778\uc99d(2FA) \ud65c\uc131\ud654:<\/strong> \uac00\ub2a5\ud55c \uacbd\uc6b0, \uc628\ub77c\uc778 \uacc4\uc815\uc5d0 \ub300\ud574 \uc774\uc911 \uc778\uc99d\uc744 \ud65c\uc131\ud654\ud558\uc138\uc694. \uc774\ub294 \uacc4\uc815\uc5d0 \uc811\uadfc\ud558\uae30 \uc804\uc5d0 \uc804\ud654\ub85c \uc804\uc1a1\ub41c \ucf54\ub4dc\uc640 \uac19\uc740 \ub450 \ubc88\uc9f8 \ud615\ud0dc\uc758 \uc778\uc99d\uc744 \uc694\uad6c\ud558\uc5ec \ubcf4\uc548 \uacc4\uce35\uc744 \ucd94\uac00\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\uc138\uc694:<\/strong> \uc6b4\uc601 \uccb4\uc81c, \uc6f9 \ube0c\ub77c\uc6b0\uc800 \ubc0f <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/understanding-anti-virus-software\" target=\"_blank\" rel=\"noreferrer noopener\">\ubc14\uc774\ub7ec\uc2a4 \ubc31\uc2e0 \uc18c\ud504\ud2b8\uc6e8\uc5b4<\/a> \ub97c \uc815\uae30\uc801\uc73c\ub85c \uc5c5\ub370\uc774\ud2b8\ud558\uc138\uc694. \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\ub4e4\uc740 \uc885\uc885 \uc624\ub798\ub41c \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc758 \ucde8\uc57d\uc810\uc744 \uc545\uc6a9\ud558\ubbc0\ub85c \ubaa8\ub4e0 \uac83\uc744 \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\ub294 \uac83\uc774 \uc911\uc694\ud55c \ubc29\uc5b4\ucc45\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud2f4\ubc14\ub294 \ud0d0\uc9c0\ub97c \ud53c\ud558\ub3c4\ub85d \uc124\uacc4\ub418\uc5c8\uae30 \ub54c\ubb38\uc5d0, \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc548\ud2f0\ubc14\uc774\ub7ec\uc2a4 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc124\uce58\uac00 \uc545\uc131\ucf54\ub4dc\ub97c \uc2dd\ubcc4\ud558\uace0 \ucc28\ub2e8\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc815\uae30\uc801\uc73c\ub85c \uc2a4\uce94\uc744 \uc2e4\ud589\ud558\uc5ec \uae30\uae30\uc758 \uc7a0\uc7ac\uc801 \uc704\ud611\uc744 \uac10\uc9c0\ud558\uc138\uc694.<\/p>\n\n\n\n<p><strong>\uacc4\uc815\uc744 \uc815\uae30\uc801\uc73c\ub85c \ubaa8\ub2c8\ud130\ub9c1\ud558\uc138\uc694:<\/strong> \uc740\ud589 \uba85\uc138\uc11c\uc640 \uc628\ub77c\uc778 \uacc4\uc815\uc744 \uc815\uae30\uc801\uc73c\ub85c \ud655\uc778\ud558\uc5ec \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud65c\ub3d9\uc774 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc138\uc694. \ubb34\ub2e8 \uac70\ub798\ub97c \uc870\uae30\uc5d0 \uac10\uc9c0\ud558\uba74 \ud53c\ud574\ub97c \uc81c\ud55c\ud558\uace0 \uc2e0\uc18d\ud55c \uc870\uce58\ub97c \ucde8\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4\ub294 \ub514\uc9c0\ud138 \uc138\uacc4\uc758 \ud56d\uc0c1 \uc874\uc7ac\ud558\ub294 \uc704\ud5d8\uc744 \uc0c1\uae30\uc2dc\ucf1c \uc90d\ub2c8\ub2e4. \uc740\ud589 \ud2b8\ub85c\uc774 \ubaa9\ub9c8\ub85c\uc11c\uc758 \uc8fc\uc694 \ubaa9\ud45c\ub294 \uae08\uc735 \uc815\ubcf4\ub97c \ud6d4\uce58\uace0 \uc9c0\uac11\uc5d0 \ud070 \ud0c0\uaca9\uc744 \uc904 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud2f4\ubc14\uc758 \uc791\ub3d9 \ubc29\uc2dd\uc744 \uc774\ud574\ud558\uace0 \ubc29\uc5b4\ub97c \uc704\ud55c \uc0ac\uc804 \uc870\uce58\ub97c \ucde8\ud558\ub294 \uac83\uc740 \uc774\ubfd0\ub9cc \uc544\ub2c8\ub77c \ub2e4\ub978 \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0\ub3c4 \ube60\uc9c0\uc9c0 \uc54a\ub3c4\ub85d \ud558\ub294 \ub370 \ud070 \ub3c4\uc6c0\uc774 \ub420 \uac83\uc785\ub2c8\ub2e4. \uacbd\uacc4\ub97c \ub2a6\ucd94\uc9c0 \ub9d0\uace0, \uc815\ubcf4\ub97c \uc720\uc9c0\ud558\uba70, \uac15\ub825\ud55c \ub514\uc9c0\ud138 \ubc29\uc5b4\ub97c \uc720\uc9c0\ud558\uc138\uc694.<\/p>","protected":false},"excerpt":{"rendered":"<p>\uc0ac\uc774\ubc84 \ubcf4\uc548 \uc5c5\uacc4\ub294 \uc774\ubbf8 \uc804 \uc138\uacc4 \uc218\ubc31\ub9cc \uba85\uc758 \uc0ac\uc6a9\uc790\ub97c \uacf5\uaca9\ud55c \uc545\uba85 \ub192\uc740 \ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4\uc640 \uac19\uc774 \uc9c4\ud654\ud558\ub294 \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub9de\uc11c\uae30 \uc704\ud574 \uace0\uc591\uc774\uc640 \uc950\uc758 \uac8c\uc784\uc744 \ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ud2f4\ubc14\uc758 \uc904\uc784\ub9d0\uc740... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ec%9c%84%ed%98%91-2\/tinba-virus-%ec%95%85%ec%84%b1-%eb%b1%85%ed%82%b9-%ed%8a%b8%eb%a1%9c%ec%9d%b4%eb%aa%a9%eb%a7%88\/\"><span class=\"screen-reader-text\">\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4: \uc0ac\uc545\ud55c \ubc45\ud0b9 \ud2b8\ub85c\uc774 \ubaa9\ub9c8<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":2637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,15,21,25,26,29],"tags":[],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-cybersecurity","category-malware","category-phishing","category-scams","category-spyware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tinba Virus: A Nefarious Banking Trojan | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tinba-virus-\uc545\uc131-\ubc45\ud0b9-\ud2b8\ub85c\uc774\ubaa9\ub9c8\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; Tinba Virus: A Nefarious Banking Trojan \uacc4\uc18d \uc77d\uae30\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tinba-virus-\uc545\uc131-\ubc45\ud0b9-\ud2b8\ub85c\uc774\ubaa9\ub9c8\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T16:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T16:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tinba Virus: A Nefarious Banking Trojan\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"articleSection\":[\"Cyber Threats\",\"cybersecurity\",\"Malware\",\"Phishing\",\"scams\",\"spyware\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"name\":\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"width\":1265,\"height\":422,\"caption\":\"Tinba Virus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tinba Virus: A Nefarious Banking Trojan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4: \uc545\ub784\ud55c \ubc45\ud0b9 \ud2b8\ub85c\uc774 \ubaa9\ub9c8 | \ubcf4\uc548 \ube0c\ub9ac\ud551","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tinba-virus-\uc545\uc131-\ubc45\ud0b9-\ud2b8\ub85c\uc774\ubaa9\ub9c8\/","og_locale":"ko_KR","og_type":"article","og_title":"Tinba Virus: A Nefarious Banking Trojan | Security Briefing","og_description":"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; Tinba Virus: A Nefarious Banking Trojan \uacc4\uc18d \uc77d\uae30","og_url":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uc704\ud611-2\/tinba-virus-\uc545\uc131-\ubc45\ud0b9-\ud2b8\ub85c\uc774\ubaa9\ub9c8\/","og_site_name":"Security Briefing","article_published_time":"2024-09-02T16:20:55+00:00","article_modified_time":"2024-09-02T16:20:58+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","type":"image\/png"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tinba Virus: A Nefarious Banking Trojan","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"wordCount":849,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","articleSection":["Cyber Threats","cybersecurity","Malware","Phishing","scams","spyware"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","name":"\ud2f4\ubc14 \ubc14\uc774\ub7ec\uc2a4: \uc545\ub784\ud55c \ubc45\ud0b9 \ud2b8\ub85c\uc774 \ubaa9\ub9c8 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","width":1265,"height":422,"caption":"Tinba Virus"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tinba Virus: A Nefarious Banking Trojan"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/2637"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}