{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/stiri\/troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023\/","title":{"rendered":"Troienii bancari, phishing-ul \u0219i ransomware-ul continu\u0103 s\u0103 domine \u00een 2023"},"content":{"rendered":"<p>Situa\u021bia Covid-19 a accelerat procesele de transformare digital\u0103 \u0219i a formalizat telemunca, rezult\u00e2nd o cre\u0219tere a amenin\u021b\u0103rilor cibernetice la niveluri nemaiv\u0103zute \u0219i neprev\u0103zute. S\u0103 ne amintim c\u0103 Malware este o combina\u021bie a dou\u0103 cuvinte \u2013 \u201cmalicious\u201d \u0219i \u201csoftware\u201d. Acest termen se refer\u0103 la orice tip de cod mali\u021bios, indiferent de modul \u00een care afecteaz\u0103 victimele, se comport\u0103 sau cauzeaz\u0103 daune. Malware-ul cuprinde toate formele de software mali\u021bios, inclusiv cai troieni, ransomware, viru\u0219i, viermi \u0219i malware bancar. Este dificil pentru un utilizator obi\u0219nuit s\u0103 spun\u0103 care fi\u0219iere sunt malware \u0219i care nu. De aceea exist\u0103 solu\u021bii de securitate, cum ar fi baze de date vaste cu mostre mali\u021bioase v\u0103zute anterior \u0219i utilizarea mai multor tehnologii de protec\u021bie pentru a detecta cele mai recente.<\/p>\n\n\n\n<p>Autorii de malware de ast\u0103zi sunt extrem de inventivi. Pentru a evita detectarea, \u201ccrea\u021biile\u201d lor se r\u0103sp\u00e2ndesc prin vulnerabilit\u0103\u021bi \u00een sistemele nep\u0103tchuite, ocolesc m\u0103surile de securitate, se ascund \u00een memorie sau imit\u0103 aplica\u021bii legitime. Chiar \u0219i ast\u0103zi, totu\u0219i, unul dintre cei mai puternici vectori de infec\u021bie este veriga cea mai slab\u0103 din lan\u021b: oamenii. Emailurile cu ata\u0219amente mali\u021bioase s-au dovedit a fi o modalitate eficient\u0103 \u0219i cu costuri reduse de a compromite un sistem. \u0218i este nevoie doar de un clic pentru a face acest lucru.<\/p>\n\n\n\n<p>Primul pas este s\u0103 men\u021bine\u021bi toate software-urile, inclusiv sistemul de operare \u0219i toate aplica\u021biile, actualizate. Nu doar pentru a ad\u0103uga func\u021bii \u0219i \u00eembun\u0103t\u0103\u021biri, ci \u0219i pentru a remedia erorile \u0219i a aborda vulnerabilit\u0103\u021bile pe care infractorii cibernetici \u0219i codul mali\u021bios le-ar putea exploata. Acest lucru, totu\u0219i, nu acoper\u0103 toate amenin\u021b\u0103rile actuale. \u00cen plus, este necesar\u0103 o solu\u021bie de securitate fiabil\u0103 \u0219i actualizat\u0103 pentru a \u00eempiedica posibilele \u00eencerc\u0103ri de atac. Backup-urile realizate \u00een mod regulat \u0219i stocate pe un hard disk offline sunt o alt\u0103 modalitate de a combate malware-ul, permi\u021b\u00e2nd utilizatorului s\u0103 \u00eenlocuiasc\u0103 cu u\u0219urin\u021b\u0103 orice date care au fost deteriorate sau criptate de atacatorii cibernetici.<\/p>\n\n\n\n<p>S\u0103 ne amintim \u0219i s\u0103 ne reamintim pu\u021bin\u0103 istorie. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">Brain pakistanez<\/a> a fost primul virus identificat la \u00eenceputul anului 1986. Scopul s\u0103u era s\u0103 fie c\u00e2t mai neobservat posibil. A infectat sistemul de boot al dischetelor de 5,25\u2033 \u0219i s-a r\u0103sp\u00e2ndit la nivel global \u00een c\u00e2teva s\u0103pt\u0103m\u00e2ni, ceea ce este remarcabil av\u00e2nd \u00een vedere c\u0103 a fost distribuit doar prin dischete de 5,25\u2033. De atunci, malware-ul a evoluat \u00een diverse moduri, iar creatorii s\u0103i vin constant cu noi modalit\u0103\u021bi de a infecta victimele. Au o re\u021bea de distribu\u021bie puternic\u0103 cu Internetul, ceea ce le permite s\u0103 afecteze mult mai u\u0219or poten\u021bialele victime. Aceasta va fi \u00eentotdeauna logica fundamental\u0103 a unui hacker \u0219i depinde de noi s\u0103 practic\u0103m inteligen\u021ba \u0219i contrainteligen\u021ba pentru a le contracara. Unele familii de malware, cum ar fi WannaCryptor, se r\u0103sp\u00e2ndesc nediscriminatoriu prin criptarea fi\u0219ierelor \u0219i cauz\u00e2nd daune globale. Altele afecteaz\u0103 grupuri mai mici de victime, cum ar fi companiile dintr-o anumit\u0103 \u021bar\u0103 \u00een cazul Diskcoder. Petya aka C. Industroyer a fost un exemplu recent de malware \u021bintit. Acest malware, descoperit de ESET, atac\u0103 sistemele de control industrial utilizate \u00een re\u021beaua electric\u0103 \u0219i a cauzat pene de curent \u00een Ucraina prin abuzul de protocoale legitime dar nesecurizate. Este una dintre pu\u021binele familii de malware care pot fi comparate cu Stuxnet, prima arm\u0103 cibernetic\u0103 folosit\u0103 vreodat\u0103.<\/p>\n\n\n\n<p>De c\u00e2nd a fost declarat\u0103 pandemia, atacurile cibernetice au crescut, cum ar fi cele \u00eempotriva Remote Desktop Protocol (RDP) \u0219i Ransomware. Lumea va avea un miliard de coduri mali\u021bioase p\u00e2n\u0103 \u00een 2022. Cu toate acestea, amenin\u021b\u0103rile cibernetice nu au crescut doar \u00een num\u0103r, ci au devenit \u0219i mai sofisticate. De exemplu, ast\u0103zi discut\u0103m despre \u201cMalware f\u0103r\u0103 fi\u0219iere\u201d, care nu necesit\u0103 ca utilizatorul s\u0103 introduc\u0103 fi\u0219iere \u00een sistem pentru a rula Malware-ul: acesta poate fi stocat \u00een memoria volatil\u0103 a sistemului. De aceea, tehnologiile de monitorizare \u0219i prevenire sunt critice.<\/p>\n\n\n\n<p><br><strong>Malware de urm\u0103toarele tipuri a fost descoperit \u00een 2021 \u0219i 2022:<\/strong><\/p>\n\n\n\n<p>1) <strong>Torrente mali\u021bioase<\/strong>: din familia de malware Kryptocibule, anterior necunoscut\u0103. Fur\u0103 criptomonede \u0219i exfiltreaz\u0103 fi\u0219iere legate de criptomonede folosind criptominere \u0219i deturnarea clipboard-ului.<\/p>\n\n\n\n<p>2) <strong>Amenin\u021b\u0103ri Android<\/strong>: Malware-ul din categoria \u2018Aplica\u021bii ascunse\u2019 a dominat timp de trei trimestre consecutive \u00een 2022. Aceast\u0103 amenin\u021bare cibernetic\u0103 const\u0103 \u00een aplica\u021bii \u00een\u0219el\u0103toare care se deghizeaz\u0103 \u00een jocuri sau aplica\u021bii utilitare, dar dup\u0103 instalare \u00ee\u0219i ascund pictogramele \u0219i afi\u0219eaz\u0103 reclame pe tot ecranul.<\/p>\n\n\n\n<p>3)<strong> Amenin\u021b\u0103ri cibernetice IoT<\/strong>: Deoarece dispozitivele IoT sunt proiectate cu pu\u021bin\u0103 sau deloc securitate, ele sunt \u021binte u\u0219oare pentru atacatorii cibernetici. Atacatorii pot infecta astfel de dispozitive cu robo\u021bi mali\u021bio\u0219i \u0219i le pot folosi \u00een botnet-uri pentru atacuri la scar\u0103 larg\u0103.<\/p>\n\n\n\n<p>4) <strong>Malware pentru Mac<\/strong>: \u00cen 2021, aplica\u021bia de tranzac\u021bionare Kattana pentru computere Mac a fost copiat\u0103 \u0219i troianizat\u0103. Atacatorii au folosit malware pentru a fura informa\u021bii precum cookie-urile browserului, portofelele de criptomonede \u0219i capturile de ecran; p\u00e2n\u0103 \u00een 2022, acest tip de amenin\u021bare cibernetic\u0103 a fost complet eliminat.<\/p>\n\n\n\n<p>5) <strong>Emailuri mali\u021bioase<\/strong>: Distribu\u021bia de software mali\u021bios prin email va cre\u0219te \u00een 2022. Un exploit Microsoft Office este cea mai comun\u0103 detec\u021bie \u00een 2022.<\/p>\n\n\n\n<p>Ransomware-ul este o amenin\u021bare cibernetic\u0103 persistent\u0103 care a atacat \u00een mod constant organiza\u021biile, compromi\u021b\u00e2nd infrastructuri critice precum institu\u021biile guvernamentale, de s\u0103n\u0103tate \u0219i energie, \u0219i devine din ce \u00een ce mai complex. Detectarea \u0219i eradicarea sa. \u00cen 2020, ransomware-ul \u0219i scurgerile de date au fost fuzionate. \u00cen <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">acest articol<\/a>, el subliniaz\u0103 c\u0103 operatorii diferitelor familii de ransomware au ad\u0103ugat un alt risc acestui tip de atac, deoarece pe l\u00e2ng\u0103 r\u0103pirea fi\u0219ierelor, acum practic\u0103 \u0219antajul, cu amenin\u021barea cibernetic\u0103 de a scurge informa\u021biile compromise. Aceast\u0103 modalitate folose\u0219te tehnica Doxing, care implic\u0103 ob\u021binerea de date confiden\u021biale de la victime \u0219i amenin\u021barea de a le face publice dac\u0103 \u0219antajul nu este pl\u0103tit. F\u0103r\u0103 \u00eendoial\u0103, acest lucru cre\u0219te presiunea asupra celor afecta\u021bi, deoarece nu este vorba doar despre recuperarea informa\u021biilor criptate, ci \u0219i despre prevenirea ca datele furate s\u0103 devin\u0103 publice.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Troieni bancari<\/a>, cunoscu\u021bi \u0219i sub numele de \u201cBankers\u201d, sunt coduri mali\u021bioase utilizate pe scar\u0103 larg\u0103 \u00een domeniul criminalit\u0103\u021bii cibernetice. Func\u021bia lor este de a fura informa\u021bii bancare de la utilizatorii acestui tip de serviciu. Aceste detalii sunt disponibile pe pia\u021ba neagr\u0103. Unii oameni le achizi\u021bioneaz\u0103 pentru a se angaja \u00een activit\u0103\u021bi criminale, cum ar fi \u0219antajul \u0219i frauda. \u00cen \u00eentreaga lume, au fost identificate unsprezece familii de troieni bancari.<\/p>\n\n\n\n<p>Aceste familii folosesc instrumente de criptare \u0219i ofuscare pentru a proteja codul de analiz\u0103 \u0219i astfel s\u0103 protejeze activitatea mali\u021bioas\u0103 pe care o desf\u0103\u0219oar\u0103 \u00een sisteme. Pentru a evita detec\u021biile, includ instruc\u021biuni \u00een programarea lor care nu au o ac\u021biune specific\u0103; sunt umplute, sunt cod de gunoi. P\u00e2n\u0103 acum, au fost identificate peste 50 de institu\u021bii financiare ca victime ale furtului de identitate pentru a \u00een\u0219ela clien\u021bii lor.<\/p>\n\n\n\n<p><strong>\u00cen ultimii trei ani, cele mai comune amenin\u021b\u0103ri cibernetice au fost:<\/strong><\/p>\n\n\n\n<p>1) <strong>ransomware<\/strong>: dezvoltatorii s\u0103i formeaz\u0103 grupuri organizate \u0219i scot la licita\u021bie datele furate de la victimele lor pe Dark Web. Au fost identificate 203 variante diferite de ransomware.<\/p>\n\n\n\n<p>2) <strong>Exploat\u0103ri<\/strong>: cod mali\u021bios care \u00eencearc\u0103 s\u0103 ob\u021bin\u0103 acces la echipamente prin exploatarea unei vulnerabilit\u0103\u021bi \u00een sisteme. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">EternalBlue<\/a> (la care apar\u021bine virusul WannaCry) \u0219i BlueKeep sunt dou\u0103 familii mai r\u0103sp\u00e2ndite (vulnerabilitate la desktopul la distan\u021b\u0103, ceva care devine relevant \u00een 2022 datorit\u0103 tendin\u021bei de telemunc\u0103).<\/p>\n\n\n\n<p>3) <strong>Spyware<\/strong>: \u201cinstrumente clasice\u201d ale infractorilor cibernetici. Este \u00eenc\u0103 critic pentru ei s\u0103 aib\u0103 o acoperire larg\u0103 \u00een propagare. Din 2020, troianul HoudRat a fost \u00een fruntea listei.<\/p>\n\n\n\n<p>4) <strong>phishing<\/strong>: \u00cen 2020, num\u0103rul de detec\u021bii ale fi\u0219ierelor legate de campaniile de phishing a crescut cu 27%, ajung\u00e2nd la 53% \u00een 2022. Reprezint\u0103 o cre\u0219tere semnificativ\u0103, deoarece aceste detec\u021bii au fost de 15% \u00een 2019.<\/p>\n\n\n\n<p>Costul criminalit\u0103\u021bii cibernetice financiare a dep\u0103\u0219it 600 de miliarde de dolari. Ca \u0219i cum nu ar fi fost suficient, exist\u0103 o lips\u0103 de speciali\u0219ti din cauza schimb\u0103rilor \u00een peisajul amenin\u021b\u0103rilor cibernetice \u0219i a variet\u0103\u021bii de noi dezvolt\u0103ri de malware, care au eviden\u021biat lipsa de profesioni\u0219ti \u00een domeniul securit\u0103\u021bii cibernetice. Conform diverselor studii publicate la sf\u00e2r\u0219itul anului 2019, erau necesari 4,07 milioane de profesioni\u0219ti \u00een securitate cibernetic\u0103.<\/p>","protected":false},"excerpt":{"rendered":"<p>Situa\u021bia Covid-19 a accelerat procesele de transformare digital\u0103 \u0219i a formalizat munca la distan\u021b\u0103, rezult\u00e2nd o cre\u0219tere a amenin\u021b\u0103rilor cibernetice la niveluri nemaiv\u0103zute \u0219i nemaiprev\u0103zute. S\u0103 ne amintim c\u0103 Malware-ul este... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/stiri\/troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023\/\">Continue reading <span class=\"screen-reader-text\">Troienii bancari, phishing-ul \u0219i ransomware-ul continu\u0103 s\u0103 domine \u00een 2023<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/stiri\/troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/stiri\/troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amenin\u021b\u0103ri digitale \u00een 2023 - Securitybriefing.net","description":"Afla\u021bi despre domina\u021bia continu\u0103 a troienilor bancari, phishingului \u0219i ransomware-ului \u00een 2023. Ob\u021bine\u021bi sfaturi despre cum s\u0103 r\u0103m\u00e2ne\u021bi protejat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/stiri\/troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023\/","og_locale":"ro_RO","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/ro\/stiri\/troieni-bancari-phishing-si-ransomware-continua-sa-domine-in-2023\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"6 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"Amenin\u021b\u0103ri digitale \u00een 2023 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"Afla\u021bi despre domina\u021bia continu\u0103 a troienilor bancari, phishingului \u0219i ransomware-ului \u00een 2023. Ob\u021bine\u021bi sfaturi despre cum s\u0103 r\u0103m\u00e2ne\u021bi protejat.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}