{"id":1834,"date":"2022-12-26T16:27:21","date_gmt":"2022-12-26T16:27:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1284"},"modified":"2022-12-26T16:27:21","modified_gmt":"2022-12-26T16:27:21","slug":"ransomware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/ransomware\/","title":{"rendered":"Ransomware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi"},"content":{"rendered":"<p>Ransomware este un tip de software mali\u021bios sau malware care practic \u00ee\u021bi \u021bine datele ostatice, bloc\u00e2ndu-\u021bi computerul \u0219i amenin\u021b\u00e2nd s\u0103-l \u021bin\u0103 blocat p\u00e2n\u0103 c\u00e2nd pl\u0103te\u0219ti r\u0103scump\u0103rarea atacatorului. International Business Machines Corporation (IBM) raporteaz\u0103 c\u0103 \u00een 2021, atacurile ransomware au reprezentat 21% din toate atacurile cibernetice \u0219i au rezultat \u00eentr-o pierdere uluitoare de 20 de miliarde USD.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-ransomware\">Ce este Ransomware?<\/h2>\n\n\n<p>\u00cen trecut, atacurile ransomware vizau doar blocarea datelor sau a dispozitivului unei persoane p\u00e2n\u0103 c\u00e2nd aceasta pl\u0103tea bani pentru a-l debloca.&nbsp;<\/p>\n\n\n\n<p>Cu toate acestea, \u00een prezent, infractorii cibernetici duc lucrurile la un cu totul alt nivel. Indicele X-Force Threat Intelligence 2022 a ar\u0103tat c\u0103 aproape toate atacurile ransomware au adoptat acum strategia \"extorc\u0103rii duble\", care nu numai c\u0103 blocheaz\u0103 datele, dar a\u0219teapt\u0103 \u0219i plata unei r\u0103scump\u0103r\u0103ri pentru a preveni furtul. \u00cen plus, ace\u0219ti infractori cibernetici r\u0103u inten\u021biona\u021bi introduc o amenin\u021bare suplimentar\u0103 \u00een repertoriul lor - campaniile de extorcare tripl\u0103 care implic\u0103 atacuri de tip DDoS (Distributed Denial of Service) - \u0219i acestea devin din ce \u00een ce mai frecvente.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-malware\">Ransomware \u0219i Malware <\/h2>\n\n\n<p>Pentru a \u00een\u021belege mai bine ransomware-ul, trebuie s\u0103 analiz\u0103m mai \u00eent\u00e2i ce este malware-ul (software r\u0103u inten\u021bionat) \u0219i implica\u021biile sale.<\/p>\n\n\n\n<p>Malware - un termen care genereaz\u0103 mai multe \u00eentreb\u0103ri dec\u00e2t r\u0103spunsuri. Este un software r\u0103u inten\u021bionat sau este pur \u0219i simplu utilizat \u00een scopuri nefaste? La fel ca \u00een cazul multor aspecte ale securit\u0103\u021bii cibernetice, nu exist\u0103 un r\u0103spuns unic la aceast\u0103 \u00eentrebare; \u00een schimb, este un domeniu complicat \u0219i complex \u00een care trebuie s\u0103 lu\u0103m \u00een considerare mai mul\u021bi factori. Software-ul poate fi r\u0103u inten\u021bionat \u00een sine; cu toate acestea, omul care opereaz\u0103 acest software este responsabil \u00een ultim\u0103 instan\u021b\u0103 pentru a determina dac\u0103 \u0219i c\u00e2t de r\u0103u inten\u021bionat va fi.<\/p>\n\n\n\n<p>Amenin\u021b\u0103rile informatice sunt numeroase, de la viru\u0219i distructivi la troieni vicleni. Dar exist\u0103 o tulpin\u0103 unic\u0103 \u0219i mai periculoas\u0103 dec\u00e2t acestea - ransomware. Descoperi\u021bi misterul din spatele acestui software r\u0103u inten\u021bionat \u0219i afla\u021bi cum s\u0103 v\u0103 proteja\u021bi de el!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-ransomware-work\">Cum func\u021bioneaz\u0103 ransomware-ul?<\/h2>\n\n\n<p>Ransomware-ul este conceput pentru a bloca accesul \u0219i tot con\u021binutul din computerul sau re\u021beaua \u021bint\u0103 p\u00e2n\u0103 c\u00e2nd atacatorul prime\u0219te plata. Atacurile chiar mai sofisticate pot ini\u021bia criptarea la nivel de disc cu o asemenea intensitate \u00eenc\u00e2t, f\u0103r\u0103 plata r\u0103scump\u0103r\u0103rii, ar fi imposibil\u0103 decriptarea oric\u0103ror fi\u0219iere. \u00centre 2013 \u0219i 2020, Internet Crime Complaint Center al FBI a observat o cre\u0219tere dramatic\u0103 de 243% a cazurilor raportate de ransomware.<\/p>\n\n\n\n<p>Spre deosebire de alte forme de criminalitate informatic\u0103, ransomware-ul necesit\u0103 ca victimele sale s\u0103 colaboreze cu infractorul pentru a avea succes.<\/p>\n\n\n\n<p>Dup\u0103 cum se men\u021bioneaz\u0103 pe site-ul lor, FBI avertizeaz\u0103 \u00eempotriva pl\u0103\u021bii unei r\u0103scump\u0103r\u0103ri \u00een cazul \u00een care o persoan\u0103 sau o companie este atacat\u0103 cu ransomware. Prin plata r\u0103scump\u0103r\u0103rii, nu exist\u0103 nicio garan\u021bie c\u0103 o organiza\u021bie sau o victim\u0103 \u00ee\u0219i va rec\u0103p\u0103ta accesul la date, ceea ce o face o solu\u021bie riscant\u0103 \u0219i nesigur\u0103. Din p\u0103cate, \u00een unele cazuri \u00een care victimele au pl\u0103tit r\u0103scump\u0103rarea cerut\u0103 de atacatori, acestea nu primesc niciodat\u0103 o cheie legitim\u0103 de decriptare pentru a-\u0219i debloca datele. Chiar dac\u0103 primesc una, este posibil ca nu toate fi\u0219ierele s\u0103 poat\u0103 fi recuperate. Prin plata r\u0103scump\u0103r\u0103rii, nu numai c\u0103 \u00eei stimula\u021bi pe infractori s\u0103 continue s\u0103 execute atacuri ransomware asupra organiza\u021biilor \u0219i persoanelor fizice deopotriv\u0103, dar \u00eei face\u021bi \u0219i mai atractivi pentru al\u021bi poten\u021biali infractori cibernetici.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"popular-ransomware-variations\"><strong>Varia\u021bii populare ale ransomware-ului<\/strong><\/h3>\n\n\n<p>Cu numeroase variet\u0103\u021bi de ransomware existente, nu este de mirare c\u0103 unele au mai mult succes dec\u00e2t altele. De fapt, exist\u0103 c\u00e2\u021biva selecta\u021bi care s-au ridicat deasupra celorlal\u021bi \u00een ceea ce prive\u0219te eficien\u021ba \u0219i popularitatea - f\u0103c\u00e2ndu-i s\u0103 ias\u0103 \u00een eviden\u021b\u0103 fa\u021b\u0103 de omologii lor.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"1-ryuk\"><strong>1. Ryuk<\/strong><\/h3>\n\n\n<p>Ryuk este un tip de ransomware care vizeaz\u0103 un anumit tip de utilizator. De obicei, acesta este livrat prin intermediul unui e-mail sau al informa\u021biilor de conectare ale cuiva pentru a intra \u00eentr-un sistem. Odat\u0103 ce sistemul este infectat, Ryuk cripteaz\u0103 anumite fi\u0219iere \u0219i apoi solicit\u0103 bani pentru a le da \u00eenapoi.<\/p>\n\n\n\n<p>Ryuk este cunoscut pentru faptul c\u0103 este unul dintre cele mai costisitoare tipuri de ransomware, cu cereri medii de r\u0103scump\u0103rare care dep\u0103\u0219esc $1 milioane. Din acest motiv, infractorii cibernetici lega\u021bi de Ryuk vizeaz\u0103 \u00een mod regulat \u00eentreprinderile care au acces la resurse financiare ample pentru a face fa\u021b\u0103 acestor pl\u0103\u021bi exorbitante.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2revilnbspsodinokibi\"><strong>2. REvil (Sodinokibi)<\/strong><\/h3>\n\n\n<p>REvil (cunoscut \u0219i sub numele de Sodinokibi) este o tulpin\u0103 mali\u021bioas\u0103 de ransomware care afecteaz\u0103 predominant firmele de mari dimensiuni.<\/p>\n\n\n\n<p>Infamul ransomware REvil, operat de grupul vorbitor de limb\u0103 rus\u0103 din 2019, este una dintre cele mai cunoscute amenin\u021b\u0103ri informatice de pe internet \u00een prezent. De exemplu, ace\u0219tia au fost considera\u021bi responsabili pentru bre\u0219e semnificative precum \"Kaseya\" \u0219i \"JBS\", ceea ce \u00eei face o amenin\u021bare serioas\u0103 pentru \u00eentreprinderi din numeroase sectoare.<\/p>\n\n\n\n<p>\u00cen ultimii ani, REvil s-a confruntat cu Ryuk pentru titlul de cel mai costisitor ransomware. Au ap\u0103rut rapoarte conform c\u0103rora acest software mali\u021bios a solicitat pl\u0103\u021bi de r\u0103scump\u0103rare de p\u00e2n\u0103 la $800.000.<\/p>\n\n\n\n<p>Ini\u021bial, REvil era doar o alt\u0103 variant\u0103 tradi\u021bional\u0103 de ransomware, \u00eens\u0103 de atunci a progresat. \u00cen prezent, utilizeaz\u0103 tehnica Double Extortion - nu doar criptarea fi\u0219ierelor, ci \u0219i furtul datelor de la \u00eentreprinderi. Aceasta \u00eenseamn\u0103 c\u0103, pe l\u00e2ng\u0103 solicitarea unei r\u0103scump\u0103r\u0103ri pentru decriptarea datelor, atacatorii amenin\u021b\u0103 c\u0103 vor expune public informa\u021biile furate dac\u0103 nu se efectueaz\u0103 o plat\u0103 suplimentar\u0103.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3nbspmaze\"><strong>3. Labirint<\/strong><\/h3>\n\n\n<p>Ransomware-ul Maze \u0219i-a c\u00e2\u0219tigat notorietatea datorit\u0103 abord\u0103rii sale inovatoare a extorc\u0103rii. Acesta nu numai c\u0103 cripteaz\u0103 fi\u0219ierele, ci \u0219i fur\u0103 date sensibile din computerul victimei \u0219i amenin\u021b\u0103 c\u0103 le va face publice sau le va vinde dac\u0103 nu se pl\u0103te\u0219te r\u0103scump\u0103rarea. Aceast\u0103 strategie amenin\u021b\u0103toare pune \u021bintele \u00eentr-o situa\u021bie \u0219i mai dificil\u0103 - fie pl\u0103tesc, fie se confrunt\u0103 cu costuri mult mai mari din cauza unei \u00eenc\u0103lc\u0103ri costisitoare a securit\u0103\u021bii datelor.<\/p>\n\n\n\n<p>De\u0219i grupul ransomware Maze s-a desfiin\u021bat, acest lucru nu \u00eenseamn\u0103 c\u0103 amenin\u021b\u0103rile ransomware sunt acum dep\u0103\u0219ite. Mai multe foste filiale ale Maze au trecut la utilizarea \u00een schimb a ransomware-ului Egregor \u0219i se speculeaz\u0103 pe scar\u0103 larg\u0103 c\u0103 aceste trei variante - Sekhmet fiind a treia - au un ini\u021biator identic.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-dearcry\"><strong>4. DearCry<\/strong><\/h3>\n\n\n<p>\u00cen martie 2021, Microsoft a lansat actualiz\u0103ri critice pentru patru vulnerabilit\u0103\u021bi din serverele lor Exchange, \u00eens\u0103 \u00eenainte ca toat\u0103 lumea s\u0103 poat\u0103 aplica solu\u021biile pentru a se proteja de poten\u021biale daune; DearCry a intervenit cu o nou\u0103 variant\u0103 de ransomware special conceput\u0103 pentru a exploata aceste sl\u0103biciuni.<\/p>\n\n\n\n<p>Ransomware-ul DearCry poate bloca multe fi\u0219iere, l\u0103s\u00e2nd utilizatorii cu o not\u0103 de r\u0103scump\u0103rare pe computerele lor, care \u00eei instruie\u0219te s\u0103 contacteze operatorii s\u0103i pentru a afla cum s\u0103 restabileasc\u0103 accesul.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-lapsus\"><strong>5. Lapsus$<\/strong><\/h3>\n\n\n<p>Banda sud-american\u0103 de ransomware, Lapsus$, a fost legat\u0103 de atacuri cibernetice asupra unor \u021binte importante din \u00eentreaga lume. Cu ajutorul intimid\u0103rii \u0219i al poten\u021bialului de expunere a datelor sensibile, banda cibernetic\u0103 \u0219i-a f\u0103cut un nume extorc\u00e2ndu-\u0219i victimele p\u00e2n\u0103 c\u00e2nd cererile lor nu sunt \u00eendeplinite. Ei s-au l\u0103udat c\u0103 au penetrat Nvidia, Samsung \u0219i Ubisoft, printre alte organiza\u021bii globale. Acest grup utilizeaz\u0103 codul surs\u0103 furat pentru a face ca fi\u0219ierele mali\u021bioase s\u0103 par\u0103 software legitim.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"6-lockbit\"><strong>6. Lockbit<\/strong><\/h3>\n\n\n<p>LockBit este un software care a fost creat pentru a \u00eempiedica oamenii s\u0103 poat\u0103 accesa date. Acesta exist\u0103 din septembrie 2019. Recent, a devenit un Ransomware-as-a-Service (RaaS). Acest lucru \u00eenseamn\u0103 c\u0103 oamenii pot pl\u0103ti pentru a-l utiliza pentru a \u00eempiedica alte persoane s\u0103 le acceseze datele.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-costly-consequencesnbsp\">Ransomware consecin\u021be costisitoare <\/h2>\n\n\n<p>Persoanele care se confrunt\u0103 cu ransomware sunt adesea reticente \u00een a recunoa\u0219te suma r\u0103scump\u0103r\u0103rii pe care au pl\u0103tit-o. Dup\u0103 cum se subliniaz\u0103 \u00een raportul Definitive Guide to Ransomware 2022, cererile de r\u0103scump\u0103rare au crescut drastic; ceea ce \u00eenainte includea doar pl\u0103\u021bi cu o singur\u0103 cifr\u0103 s-a extins \u00een prezent la cifre de \u0219apte \u0219i opt cifre. \u00cen cazurile cele mai extreme, este posibil ca \u00eentreprinderile s\u0103 fie nevoite s\u0103 pl\u0103teasc\u0103 o r\u0103scump\u0103rare considerabil\u0103, de 40-80 de milioane USD, pentru ca datele lor s\u0103 fie returnate. Totu\u0219i, aceste pl\u0103\u021bi nu sunt singurul cost asociat atacurilor ransomware; alte costuri directe \u0219i indirecte pot agrava povara financiar\u0103 a unei organiza\u021bii. Dup\u0103 cum se arat\u0103 \u00een studiul IBM Cost of Data Breach 2021, costul standard al atacurilor ransomware, f\u0103r\u0103 a include plata r\u0103scump\u0103r\u0103rii, s-a ridicat \u00een medie la suma uluitoare de 4,62 milioane USD.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-dch-hospitals-case\">Cazul DCH Hospitals<\/h3>\n\n\n<p>DCH este un centru medical regional din Tuscaloosa, Alabama, care func\u021bioneaz\u0103 din 1923.<\/p>\n\n\n\n<p>Pe 1 octombrie 2019, spitalele DCH au fost atacate de un ransomware. Tot ce era electronic era c\u0103zut. Nu au putut primi niciun pacient nou \u0219i au fost nevoi\u021bi s\u0103 foloseasc\u0103 numai h\u00e2rtie pentru orice.<\/p>\n\n\n\n<p>Un reprezentant al DCH a dezv\u0103luit c\u0103 sistemul a fost compromis atunci c\u00e2nd cineva a deschis \u0219i a interac\u021bionat cu un ata\u0219ament de e-mail corupt. Din fericire, nicio informa\u021bie despre pacien\u021bi nu a fost periclitat\u0103.<\/p>\n\n\n\n<p>Sistemul spitalicesc DCH se m\u00e2ndre\u0219te cu trei spitale importante - DCH Regional Medical Center, Northport Medical Center \u0219i Fayette Medical Center - care deservesc o mare parte din Alabama de Vest. Aceste trei unit\u0103\u021bi medicale ofer\u0103 peste 850 de paturi \u0219i primesc mai mult de 32 000 de pacien\u021bi anual.<\/p>\n\n\n\n<p>S\u00e2mb\u0103t\u0103, 5 octombrie, pentru a rec\u00e2\u0219tiga rapid accesul la sistemele lor, spitalele DCH au optat s\u0103 pl\u0103teasc\u0103 r\u0103scump\u0103rarea \u0219i s\u0103 ob\u021bin\u0103 o cheie de decriptare de la atacatori. Cu toate acestea, au decis s\u0103 nu dezv\u0103luie c\u00e2t au pl\u0103tit. Deoarece sistemele de s\u0103n\u0103tate sunt critice \u0219i sensibile, ele devin \u021binte u\u0219oare pentru atacurile ransomware. Adesea, aceste organiza\u021bii consider\u0103 c\u0103 plata r\u0103scump\u0103r\u0103rii este mai benefic\u0103 dec\u00e2t confruntarea cu pierderea poten\u021bial\u0103 de date sau \u00eentreruperile. Informa\u021biile confiden\u021biale stocate \u00een sistemele lor sunt prea valoroase pentru a fi pierdute. Ransomware-ul mali\u021bios utilizat pentru a \u00eenc\u0103lca securitatea spitalului DCH a fost facilitat f\u0103r\u0103 s\u0103 se \u0219tie de un angajat care a deschis un email de phishing con\u021bin\u00e2nd un ata\u0219ament contaminat. Acest lucru a permis malware-ului s\u0103 ob\u021bin\u0103 acces \u0219i ulterior s\u0103 infecteze re\u021beaua lor de calculatoare.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"5-steps-to-prevent-becoming-a-ransomware-victim\">5 pa\u0219i pentru a nu deveni o victim\u0103 a ransomware-ului<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"1-train-your-employees-about-cybersecurity-threatsnbsp\">1. Forma\u021bi-v\u0103 angaja\u021bii cu privire la amenin\u021b\u0103rile la adresa securit\u0103\u021bii cibernetice. <\/h3>\n\n\n<p>Pentru a ne proteja de atacurile cibernetice \u0219i pentru a putea identifica apari\u021bia acestora la locul de munc\u0103, trebuie s\u0103 ne recunoa\u0219tem responsabilitatea individual\u0103 pentru securitatea cibernetic\u0103. Fiecare angajat ar trebui s\u0103 primeasc\u0103 formare specializat\u0103 privind identificarea \u0219i prevenirea amenin\u021b\u0103rilor din spa\u021biul cibernetic. Dar, \u00een cele din urm\u0103, depinde de fiecare individ s\u0103 foloseasc\u0103 informa\u021biile pe care le-a primit pentru a evalua cu exactitate riscurile poten\u021biale din cadrul vie\u021bii sale de zi cu zi. Incidentul de la DCH Hospitals este un exemplu important al c\u00e2t de valoros poate fi s\u0103 ai o \u00een\u021belegere personal\u0103 a securit\u0103\u021bii cibernetice.<\/p>\n\n\n\n<p>Compania trebuie s\u0103 informeze angajatul cu privire la riscurile poten\u021biale ale deschiderii ata\u0219amentelor de e-mail de la expeditori necunoscu\u021bi, \u00een special \u00eentr-un mediu de lucru. \u00cen caz de \u00eendoial\u0103, este \u00eentotdeauna mai bine s\u0103 consulta\u021bi o persoan\u0103 cu experien\u021b\u0103 \u00eenainte de a deschide orice mesaj, link sau ata\u0219ament. Multe \u00eentreprinderi au un departament IT intern care va prelua orice raport privind o tentativ\u0103 de phishing pentru a confirma dac\u0103 este legitim pentru angajat. Dac\u0103 mesajul provine de la o surs\u0103 de \u00eencredere, cum ar fi furnizorul contului bancar sau cuno\u0219tin\u021be pe care le cunoa\u0219te\u021bi personal, contacta\u021bi-i direct \u0219i confirma\u021bi c\u0103 ei au trimis mesajul \u0219i con\u021binutul acestuia \u00eenainte de a da clic pe orice link furnizat. \u00cen acest fel, v\u0103 pute\u021bi proteja de poten\u021biale atacuri cibernetice.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2-back-up-your-files\">2. Face\u021bi o copie de rezerv\u0103 a fi\u0219ierelor dvs.<\/h3>\n\n\n<p>Dac\u0103 sunte\u021bi vreodat\u0103 \u021binta unui ransomware sau dac\u0103 a\u021bi pierdut unele date \u00een urma unui atac \u0219i nu dori\u021bi s\u0103 pl\u0103ti\u021bi r\u0103scump\u0103rarea, este esen\u021bial s\u0103 ave\u021bi o copie de rezerv\u0103 sigur\u0103 a celor mai valoroase informa\u021bii.<\/p>\n\n\n\n<p>Pentru a minimiza consecin\u021bele unui atac mali\u021bios, spitalele DCH ar fi trebuit s\u0103 ia m\u0103suri preventive \u0219i s\u0103 \u00ee\u0219i salveze fi\u0219ierele esen\u021biale \u00eenainte de incident. O copie de rezerv\u0103 le-ar fi permis s\u0103 r\u0103m\u00e2n\u0103 deschise \u0219i s\u0103 continue opera\u021biunile f\u0103r\u0103 \u00eentreruperi din cauza ransomware-ului.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3-keep-your-software-updated\">3. P\u0103stra\u021bi software-ul actualizat.<\/h3>\n\n\n<p>Infractorii cibernetici profit\u0103 frecvent de punctele slabe existente pentru a introduce software d\u0103un\u0103tor \u00eentr-un dispozitiv sau sistem. Vulnerabilit\u0103\u021bile de securitate nerezolvate sau de tip \"zero-day\" pot fi periculoase, deoarece fie nu sunt cunoscute de industria securit\u0103\u021bii digitale, fie au fost identificate \u0219i \u00eenc\u0103 nu au fost rezolvate. Anumite grupuri de ransomware au fost observate cum achizi\u021bioneaz\u0103 informa\u021bii despre vulnerabilit\u0103\u021bile zero-day de la infractorii cibernetici, pe care le folosesc pentru opera\u021biunile lor mali\u021bioase. De asemenea, se \u0219tie c\u0103 hackerii pot utiliza defectele de securitate remediate pentru a intra \u00een sisteme \u0219i a lansa atacuri.&nbsp;<\/p>\n\n\n\n<p>Este esen\u021bial s\u0103 aplica\u021bi \u00een mod regulat patch-uri pentru a v\u0103 proteja \u00eempotriva atacurilor ransomware care vizeaz\u0103 vulnerabilit\u0103\u021bile software \u0219i ale sistemului de operare.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-install-and-update-cybersecurity-tools\">4. Instalarea \u0219i actualizarea instrumentelor de securitate cibernetic\u0103<\/h3>\n\n\n<p>Este esen\u021bial s\u0103 se actualizeze instrumentele de securitate cibernetic\u0103 - software anti-malware \u0219i antivirus, firewall-uri, gateway-uri web securizate, precum \u0219i solu\u021bii pentru \u00eentreprinderi, cum ar fi detectarea \u0219i r\u0103spunsul la puncte terminale (EDR), detectarea \u0219i r\u0103spunsul extins (XDR), care pot ajuta echipele de securitate s\u0103 detecteze activit\u0103\u021bile r\u0103u inten\u021bionate \u00een timp real.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-implement-access-control-policies\">5. Implementarea politicilor de control al accesului<\/h3>\n\n\n<p>Organiza\u021biile ar trebui s\u0103 implementeze autentificarea multifactorial\u0103, arhitectura de \u00eencredere zero, segmentarea re\u021belei \u0219i alte m\u0103suri de protec\u021bie conexe pentru a proteja datele vulnerabile \u0219i pentru a \u00eempiedica trecerea viermilor criptografici c\u0103tre alte ma\u0219ini din re\u021bea.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-targets-individuals-as-well\">Ransomware-ul vizeaz\u0103 \u0219i persoanele fizice.<\/h2>\n\n\n<p>\u00cen general, pove\u0219tile despre ransomware se concentreaz\u0103 pe consecin\u021bele hackerilor de sisteme corporative sau medicale; cu toate acestea, este esen\u021bial s\u0103 recunoa\u0219tem c\u0103 persoanele fizice nu sunt imune la aceste atacuri. De fapt, acestea apar mai des dec\u00e2t s-ar putea crede. Persoanele fizice trebuie s\u0103 fie con\u0219tiente de pericolul real al ransomware-ului atunci c\u00e2nd utilizeaz\u0103 internetul, deoarece acesta le poate pune \u00een pericol siguran\u021ba \u0219i securitatea.<\/p>\n\n\n\n<p>Infractorii cibernetici folosesc dou\u0103 metode principale atunci c\u00e2nd implementeaz\u0103 ransomware: criptarea \u0219i ecranul de blocare.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"encryption-ransomware\">Criptare ransomware<\/h3>\n\n\n<p>Infractorii cibernetici vizeaz\u0103 \u00een principal anumite fi\u0219iere salvate local pe dispozitive prin intermediul ransomware-ului de criptare. Pentru a selecta aceste documente, atacatorul folose\u0219te trucuri de phishing sau alte forme de software r\u0103u inten\u021bionat pentru a-\u0219i investiga \u021binta. Odat\u0103 ce fi\u0219ierele sunt criptate, victima va solicita o r\u0103scump\u0103rare pentru a primi cheia de decriptare necesar\u0103 pentru accesarea datelor sale. Hackerii folosesc de obicei aceast\u0103 strategie pentru a accesa informa\u021bii confiden\u021biale sau sensibile pe care companiile \u00eencearc\u0103 din r\u0103sputeri s\u0103 le protejeze. Aceast\u0103 abordare a devenit popular\u0103 \u00een r\u00e2ndul p\u0103r\u021bilor r\u0103u inten\u021bionate, f\u0103c\u00e2nd din \u00eentreprinderi \u0219i organiza\u021bii o \u021bint\u0103 obi\u0219nuit\u0103.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lock-screen-ransomware\">ransomware pentru ecranul de blocare<\/h3>\n\n\n<p>\u00cen schimb, ransomware-ul de blocare a ecranului cripteaz\u0103 anumite fi\u0219iere \u0219i face dispozitivul utilizatorului complet inutilizabil. Ransomware-ul cu ecran de blocare v\u0103 va bloca dispozitivul \u0219i va afi\u0219a un mesaj pe tot ecranul, care nu poate fi mutat \u0219i minimizat. Vi se va cere s\u0103 pl\u0103ti\u021bi o r\u0103scump\u0103rare pentru a debloca sistemul sau pentru a recupera datele sau fi\u0219ierele pierdute.<\/p>\n\n\n\n<p>Aceste programe folosesc adesea tactici de intimidare pentru a v\u0103 for\u021ba s\u0103 efectua\u021bi pl\u0103\u021bi, cum ar fi un ceas care v\u0103 avertizeaz\u0103 c\u0103 v\u0103 va \u0219terge toate fi\u0219ierele dac\u0103 timpul expir\u0103. Atacatorii cibernetici \u00eencearc\u0103 adesea s\u0103 intimideze persoanele prin inventarea unor pove\u0219ti conform c\u0103rora dispozitivele lor sunt legate de activit\u0103\u021bi ilegale sau materiale nepotrivite \u0219i prin amenin\u021barea c\u0103 le vor raporta autorit\u0103\u021bilor dac\u0103 victima nu pl\u0103te\u0219te. Pentru a constr\u00e2nge \u0219i mai mult victimele s\u0103 pl\u0103teasc\u0103 r\u0103scump\u0103rarea, unii dezvoltatori de ransomware folosesc imagini pornografice \u0219i amenin\u021b\u0103 victima c\u0103 nu le poate elimina f\u0103r\u0103 plat\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ultimately\">\u00cen cele din urm\u0103<\/h2>\n\n\n<p>Implementarea unor m\u0103suri eficiente de securitate cibernetic\u0103, cum ar fi actualizarea periodic\u0103 a software-ului \u0219i a instrumentelor de securitate, aplicarea politicilor de control al accesului \u0219i cunoa\u0219terea diverselor tactici utilizate de aceste programe r\u0103u inten\u021bionate pentru a v\u0103 proteja \u00eentreprinderea \u00eempotriva atacurilor ransomware. \u00cen plus, persoanele fizice ar trebui s\u0103 ia m\u0103suri proactive pentru a-\u0219i proteja dispozitivele de atacurile ransomware - inclusiv s\u0103 fie prudente atunci c\u00e2nd deschid e-mailuri sau dau clic pe linkuri din surse necunoscute. Prin con\u0219tientizare \u0219i practici prudente, putem contribui cu to\u021bii la reducerea amenin\u021b\u0103rii ransomware \u00een lumea noastr\u0103 digital\u0103.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ransomware este un tip de software mali\u021bios sau malware care v\u0103 \u021bine practic datele ostatice, bloc\u00e2ndu-v\u0103 computerul \u0219i amenin\u021b\u00e2ndu-v\u0103 c\u0103 \u00eel va \u021bine blocat p\u00e2n\u0103 c\u00e2nd ve\u021bi pl\u0103ti... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/ransomware\/\">Continue reading <span class=\"screen-reader-text\">Ransomware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: What it is And How To Protect Yourself<\/title>\n<meta name=\"description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: What it is And How To Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-26T16:27:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Ransomware: What it is And How To Protect Yourself\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"wordCount\":2305,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"name\":\"Ransomware: What it is And How To Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"description\":\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"width\":1000,\"height\":626,\"caption\":\"Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: What it is And How To Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi","description":"Afla\u021bi tot ce trebuie s\u0103 \u0219ti\u021bi despre ransomware, cum s\u0103 v\u0103 proteja\u021bi de acesta \u0219i ce s\u0103 face\u021bi dac\u0103 deveni\u021bi o victim\u0103.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/ransomware\/","og_locale":"ro_RO","og_type":"article","og_title":"Ransomware: What it is And How To Protect Yourself","og_description":"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.","og_url":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/ransomware\/","og_site_name":"Security Briefing","article_published_time":"2022-12-26T16:27:21+00:00","og_image":[{"width":1000,"height":626,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"11 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Ransomware: What it is And How To Protect Yourself","datePublished":"2022-12-26T16:27:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"wordCount":2305,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","articleSection":["Cyber Attacks"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","name":"Ransomware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","datePublished":"2022-12-26T16:27:21+00:00","description":"Afla\u021bi tot ce trebuie s\u0103 \u0219ti\u021bi despre ransomware, cum s\u0103 v\u0103 proteja\u021bi de acesta \u0219i ce s\u0103 face\u021bi dac\u0103 deveni\u021bi o victim\u0103.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","width":1000,"height":626,"caption":"Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Ransomware: What it is And How To Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1834"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1286"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}