{"id":300,"date":"2022-06-28T22:07:12","date_gmt":"2022-06-28T22:07:12","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=300"},"modified":"2022-06-28T22:07:12","modified_gmt":"2022-06-28T22:07:12","slug":"gta-grup-publica-descoperiri-despre-hermit-malware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/gta-grup-publica-descoperiri-despre-hermit-malware\/","title":{"rendered":"Grupul GTA public\u0103 constat\u0103ri privind malware-ul Hermit"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Google Threat Analysis Group (TAG) a publicat recent descoperiri despre un spyware extrem de sofisticat cunoscut sub numele de Hermit. RCS Laboratories, un furnizor italian de spyware, a distribuit malware-ul cu ajutorul mai multor furnizori de servicii de internet (ISP-uri), viz\u00e2nd \u00een principal smartphone-urile iOS \u0219i Android din Kazahstan \u0219i Italia.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Ce este Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit Malware este o form\u0103 sofisticat\u0103 de malware care ofer\u0103 atacatorilor controlul complet asupra dispozitivului victimei. Odat\u0103 instalat, acesta poate fura informa\u021bii sensibile, poate asculta conversa\u021biile \u0219i poate urm\u0103ri loca\u021bia victimei.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Cum func\u021bioneaz\u0103 Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Site-urile web frauduloase r\u0103sp\u00e2ndesc programe malware care exploateaz\u0103 deficien\u021bele browserului web pe dispozitivele mobile iOS \u0219i Android. Atacatorul redirec\u021bioneaz\u0103 utilizatorii c\u0103tre un server controlat, unde ace\u0219tia descarc\u0103 malware-ul \u00een dispozitivul victimei.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Odat\u0103 infectat, malware-ul Hermit stabile\u0219te o conexiune la distan\u021b\u0103 la serverul atacatorului, de unde poate primi comenzi de la operatorul s\u0103u. Aceste comenzi permit atacatorului s\u0103 acceseze de la distan\u021b\u0103 orice date stocate pe dispozitivul victimei, inclusiv mesaje text, e-mailuri, fotografii \u0219i videoclipuri.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Cine este afectat de Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hackerii au folosit malware-ul Hermit \u00een principal pentru a viza persoane din Kazahstan \u0219i Italia. Cu toate acestea, datorit\u0103 naturii sofisticate a malware-ului, este posibil ca atacatorii s\u0103 \u00eel fi folosit pentru a viza alte persoane din alte \u021b\u0103ri.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Care au fost constat\u0103rile Malware-ului Hermit?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Concluziile publicate de Google TAG ofer\u0103 o analiz\u0103 detaliat\u0103 a malware-ului Hermit \u0219i a capacit\u0103\u021bilor sale. Raportul include, de asemenea, informa\u021bii privind modul \u00een care malware-ul este distribuit \u0219i cum afecteaz\u0103 victimele.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Constat\u0103rile Google TAG privind malware-ul Hermit<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Constat\u0103rile TAG privind malware-ul Hermit se bazeaz\u0103 pe o investiga\u021bie efectuat\u0103 \u00een colaborare cu mai multe companii de securitate, inclusiv Lookout, Zimperium, ESET \u0219i Kaspersky.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Malware-ul Hermit este un malware avansat care ofer\u0103 intru\u0219ilor control complet asupra sistemului. Acesta poate trage cu urechea la conversa\u021bii \u0219i poate observa activit\u0103\u021bile victimei dup\u0103 instalare.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">De ce au fost semnificative aceste constat\u0103ri?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Constat\u0103rile Google TAG sunt esen\u021biale deoarece ofer\u0103 informa\u021bii despre capacit\u0103\u021bile malware-ului Hermit \u0219i despre modul \u00een care hackerii \u00eel folosesc pentru a viza persoane. Constat\u0103rile Google TAG pot fi utilizate pentru a ajuta la protejarea poten\u021bialelor victime \u0219i pentru a contribui la dezvoltarea de contram\u0103suri \u00eempotriva acestui tip de malware.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Cum m\u0103 pot proteja de Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Exist\u0103 c\u00e2teva lucruri pe care le pute\u021bi face pentru a v\u0103 proteja de malware-ul Hermit:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Men\u021bine\u021bi sistemul de operare \u0219i software-ul la zi: Atacatorii exploateaz\u0103 adesea vulnerabilit\u0103\u021bi care au fost deja reparate pentru a infecta dispozitivele cu programe malware. Men\u021binerea la zi a dispozitivului poate reduce \u0219ansele de a fi afectat de astfel de atacuri.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Evita\u021bi vizitele\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.webtitan.com\/blog\/how-to-identify-a-malicious-website\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">site-uri r\u0103u inten\u021bionate<\/span><\/a><span data-preserver-spaces=\"true\">: Hackerii folosesc adesea site-uri web r\u0103u inten\u021bionate pentru a distribui programe malware. Evitarea acestor site-uri poate reduce \u0219ansele de infectare a dispozitivului dumneavoastr\u0103.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Instala\u021bi un software de securitate de \u00eencredere: Software-ul de securitate v\u0103 poate ajuta s\u0103 v\u0103 proteja\u021bi dispozitivul de programe malware. Asigura\u021bi-v\u0103 c\u0103 instala\u021bi o solu\u021bie de securitate de \u00eencredere \u0219i c\u0103 o men\u021bine\u021bi actualizat\u0103.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Instala\u021bi plugin-uri sau extensii de securitate care ruleaz\u0103 scan\u0103ri constante pentru a preveni atacurile malware asupra computerului dumneavoastr\u0103.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Urm\u00e2nd aceste sfaturi, pute\u021bi s\u0103 v\u0103 proteja\u021bi de malware-ul Hermit \u0219i de alte amenin\u021b\u0103ri similare. Cu toate acestea, este esen\u021bial s\u0103 v\u0103 aminti\u021bi c\u0103 nicio m\u0103sur\u0103 unic\u0103 nu este 100% eficient\u0103 \u0219i c\u0103 este \u00eentotdeauna recomandat s\u0103 ave\u021bi mai multe straturi de securitate.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">\u00cen concluzie<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit este un tip sofisticat de malware care ofer\u0103 atacatorilor control complet asupra dispozitivului victimei. Atacatorii \u00eel pot utiliza pentru a fura date sensibile, a asculta conversa\u021biile \u0219i a urm\u0103ri mi\u0219c\u0103rile victimei. Pute\u021bi s\u0103 v\u0103 proteja\u021bi de acest pericol prin utilizarea unor strategii simple. Cu toate acestea, este esen\u021bial s\u0103 re\u021bine\u021bi c\u0103 nicio m\u0103sur\u0103 nu este perfect\u0103 \u0219i c\u0103 exper\u021bii recomand\u0103 \u00eentotdeauna s\u0103 ave\u021bi mai multe straturi de securitate \u00een dispozitivele dvs.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Grupul Google de analiz\u0103 a amenin\u021b\u0103rilor (TAG) a publicat recent constat\u0103ri privind un spyware extrem de sofisticat cunoscut sub numele de Hermit. RCS Laboratories, un furnizor italian de spyware, a distribuit malware-ul cu ajutorul mai multor... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/gta-grup-publica-descoperiri-despre-hermit-malware\/\">Continue reading <span class=\"screen-reader-text\">Grupul GTA public\u0103 constat\u0103ri privind malware-ul Hermit<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GTA Group Publishes Findings on Hermit Malware | Security Briefing<\/title>\n<meta name=\"description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/gta-grup-publica-descoperiri-despre-hermit-malware\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/gta-grup-publica-descoperiri-despre-hermit-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T22:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"GTA Group Publishes Findings on Hermit Malware\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"name\":\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"description\":\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"width\":1000,\"height\":795,\"caption\":\"GTA-Group-Publishes-Findings-on-Hermit-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GTA Group Publishes Findings on Hermit Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GTA Group public\u0103 descoperiri despre malware-ul Hermit | Informare de securitate","description":"Cele mai recente constat\u0103ri privind malware-ul sofisticat Hermit, despre care s-a descoperit c\u0103 a fost distribuit de RCS Laboratories.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/gta-grup-publica-descoperiri-despre-hermit-malware\/","og_locale":"ro_RO","og_type":"article","og_title":"GTA Group Publishes Findings on Hermit Malware | Security Briefing","og_description":"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.","og_url":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/gta-grup-publica-descoperiri-despre-hermit-malware\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T22:07:12+00:00","og_image":[{"width":1000,"height":795,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"GTA Group Publishes Findings on Hermit Malware","datePublished":"2022-06-28T22:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"wordCount":610,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","name":"GTA Group public\u0103 descoperiri despre malware-ul Hermit | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","datePublished":"2022-06-28T22:07:12+00:00","description":"Cele mai recente constat\u0103ri privind malware-ul sofisticat Hermit, despre care s-a descoperit c\u0103 a fost distribuit de RCS Laboratories.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","width":1000,"height":795,"caption":"GTA-Group-Publishes-Findings-on-Hermit-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"GTA Group Publishes Findings on Hermit Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}