{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/nyheter\/banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023\/","title":{"rendered":"Banktrojaner, n\u00e4tfiske och ransomware forts\u00e4tter att dominera under 2023"},"content":{"rendered":"<p>Covid-19-situationen har p\u00e5skyndat digitala omvandlingsprocesser och formaliserat distansarbete, vilket har resulterat i en \u00f6kning av cyberhot till niv\u00e5er som aldrig tidigare sk\u00e5dats och aldrig f\u00f6rutsp\u00e5tts. L\u00e5t oss komma ih\u00e5g att Malware \u00e4r en kombination av tv\u00e5 ord - \"malicious\" (skadlig) och \"software\" (programvara). Termen avser alla typer av skadlig kod, oavsett hur den p\u00e5verkar offren, beter sig eller orsakar skada. Malware omfattar alla former av skadlig programvara, inklusive trojanska h\u00e4star, ransomware, virus, maskar och skadlig programvara f\u00f6r banker. Det \u00e4r sv\u00e5rt f\u00f6r en vanlig anv\u00e4ndare att avg\u00f6ra vilka filer som \u00e4r skadlig programvara och vilka som inte \u00e4r det. Det \u00e4r d\u00e4rf\u00f6r det finns s\u00e4kerhetsl\u00f6sningar, till exempel stora databaser med tidigare skadliga exempel och anv\u00e4ndning av flera olika skyddstekniker f\u00f6r att uppt\u00e4cka de senaste.<\/p>\n\n\n\n<p>Malware-f\u00f6rfattare \u00e4r idag extremt uppfinningsrika. F\u00f6r att undvika uppt\u00e4ckt sprids deras \"skapelser\" genom s\u00e5rbarheter i opatchade system, kringg\u00e5r s\u00e4kerhets\u00e5tg\u00e4rder, g\u00f6mmer sig i minnet eller efterliknar legitima applikationer. \u00c4n idag \u00e4r dock en av de mest potenta infektionsvektorerna den svagaste l\u00e4nken i kedjan: m\u00e4nniskan. E-postmeddelanden med skadliga bilagor har visat sig vara ett effektivt och billigt s\u00e4tt att kompromissa med ett system. Och det kr\u00e4vs bara ett klick f\u00f6r att g\u00f6ra det.<\/p>\n\n\n\n<p>Det f\u00f6rsta steget \u00e4r att h\u00e5lla all programvara, inklusive operativsystemet och alla applikationer, uppdaterade. Inte bara f\u00f6r att l\u00e4gga till funktioner och f\u00f6rb\u00e4ttringar, utan ocks\u00e5 f\u00f6r att fixa buggar och \u00e5tg\u00e4rda s\u00e5rbarheter som cyberbrottslingar och skadlig kod kan utnyttja. Detta t\u00e4cker dock inte alla aktuella hot. Dessutom kr\u00e4vs en tillf\u00f6rlitlig och uppdaterad s\u00e4kerhetsl\u00f6sning f\u00f6r att motverka potentiella attackf\u00f6rs\u00f6k. Regelbundna s\u00e4kerhetskopior som lagras p\u00e5 en offline-h\u00e5rddisk \u00e4r ett annat s\u00e4tt att bek\u00e4mpa skadlig kod, eftersom det g\u00f6r det m\u00f6jligt f\u00f6r anv\u00e4ndaren att enkelt ers\u00e4tta data som har skadats eller krypterats av cyberangripare.<\/p>\n\n\n\n<p>L\u00e5t oss \u00e5terkalla och minnas lite historia. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">Pakistans hj\u00e4rna<\/a> var det f\u00f6rsta viruset som identifierades i b\u00f6rjan av 1986. Dess m\u00e5l var att vara s\u00e5 oansenligt som m\u00f6jligt. Det infekterade startsystemet p\u00e5 5,25\u2033 disketter och spreds globalt p\u00e5 n\u00e5gra veckor, vilket \u00e4r anm\u00e4rkningsv\u00e4rt med tanke p\u00e5 att det bara distribuerades via 5,25\u2033 disketter. Sedan dess har skadlig kod utvecklats p\u00e5 en m\u00e4ngd olika s\u00e4tt, och dess skapare kommer st\u00e4ndigt med nya s\u00e4tt att infektera offer. De har ett kraftfullt distributionsn\u00e4tverk med Internet, vilket g\u00f6r att de kan p\u00e5verka potentiella offer mycket l\u00e4ttare. Detta kommer alltid att vara en hackares grundl\u00e4ggande logik, och det \u00e4r upp till oss att ut\u00f6va underr\u00e4ttelse- och kontraspionage f\u00f6r att motverka dem. Vissa malware-familjer, t.ex. WannaCryptor, sprids urskillningsl\u00f6st genom att kryptera filer och orsaka global skada. Andra drabbar mindre grupper av offer, t.ex. f\u00f6retag fr\u00e5n ett visst land i fallet Diskcoder. Petya alias C. Industroyer var ett f\u00e4rskt exempel p\u00e5 riktad skadlig kod. Den h\u00e4r skadliga programvaran, som uppt\u00e4cktes av ESET, angriper industriella kontrollsystem som anv\u00e4nds i eln\u00e4tet och har orsakat str\u00f6mavbrott i Ukraina genom att missbruka legitima men os\u00e4kra protokoll. Det \u00e4r en av f\u00e5 familjer av skadlig kod som kan j\u00e4mf\u00f6ras med Stuxnet, det f\u00f6rsta cybervapen som n\u00e5gonsin anv\u00e4nts.<\/p>\n\n\n\n<p>Sedan pandemin f\u00f6rklarades har cyberattacker \u00f6kat, s\u00e5som de mot Remote Desktop Protocol (RDP) och Ransomware. V\u00e4rlden kommer att ha en miljard skadliga koder till 2022. Cyberhot har dock inte bara \u00f6kat i antal, utan de har ocks\u00e5 blivit mer sofistikerade. Till exempel diskuterar vi idag \u201cFileless Malware\u201d, som inte kr\u00e4ver att anv\u00e4ndaren matar in n\u00e5gra filer i systemet f\u00f6r att k\u00f6ra Malware: det kan lagras i systemets flyktiga minne. Det \u00e4r d\u00e4rf\u00f6r \u00f6vervaknings- och f\u00f6rebyggandeteknologier \u00e4r kritiska.<\/p>\n\n\n\n<p><br><strong>Skadlig kod av f\u00f6ljande typer uppt\u00e4cktes under 2021 och 2022:<\/strong><\/p>\n\n\n\n<p>1) <strong>Skadliga torrenter<\/strong>: fr\u00e5n den tidigare ok\u00e4nda Kryptocibule Malware-familjen. Den stj\u00e4l kryptovaluta och exfiltrerar kryptovalutarelaterade filer med hj\u00e4lp av kryptominerare och kapning av urklipp.<\/p>\n\n\n\n<p>2) <strong>Android-hot<\/strong>: Skadlig kod i kategorin \"Hidden Apps\" har dominerat tre kvartal i rad under 2022. Detta cyberhot best\u00e5r av bedr\u00e4gliga appar som maskerar sig som spel eller verktygsappar, men efter installationen d\u00f6ljer de sina ikoner och visar annonser i helsk\u00e4rm.<\/p>\n\n\n\n<p>3)<strong> IoT Cyberhot<\/strong>: Eftersom IoT-enheter \u00e4r utformade med liten eller ingen s\u00e4kerhet \u00e4r de l\u00e4tta m\u00e5l f\u00f6r cyberattacker. Angripare kan infektera s\u00e5dana enheter med skadliga bots och anv\u00e4nda dem i botn\u00e4t f\u00f6r storskaliga attacker.<\/p>\n\n\n\n<p>4) <strong>Skadlig programvara f\u00f6r Mac<\/strong>: \u00c5r 2021 kopierades och trojaniserades Kattanas handelsapplikation f\u00f6r Mac-datorer. Angriparna anv\u00e4nde skadlig programvara f\u00f6r att stj\u00e4la information som webbl\u00e4sarkakor, kryptovalutapl\u00e5nb\u00f6cker och sk\u00e4rmdumpar. 2022 hade denna typ av cyberhot helt eliminerats.<\/p>\n\n\n\n<p>5) <strong>Skadliga e-postmeddelanden<\/strong>: Distributionen av skadlig programvara via e-post kommer att \u00f6ka under 2022. En Microsoft Office Exploit \u00e4r den vanligaste uppt\u00e4ckten under 2022.<\/p>\n\n\n\n<p>Ransomware \u00e4r ett ih\u00e5llande cyberhot som ih\u00e4rdigt har attackerat organisationer, kompromissat kritiska infrastrukturer som statliga, h\u00e4lso- och energiinstitutioner, och blir alltmer komplex. Dess uppt\u00e4ckt och utrotning. \u00c5r 2020 slogs ransomware och datal\u00e4ckor samman. I <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">denna artikel<\/a>Han p\u00e5pekar att operat\u00f6rerna av olika Ransomware-familjer har lagt till en annan risk f\u00f6r denna typ av attack, eftersom de f\u00f6rutom att kapa filer nu ut\u00f6var utpressning, med cyberhotet att l\u00e4cka den komprometterade informationen. Denna modalitet anv\u00e4nder Doxing-tekniken, som inneb\u00e4r att man f\u00e5r konfidentiella uppgifter fr\u00e5n offren och hotar att offentligg\u00f6ra dem om inte utpressning betalas. Utan tvekan \u00f6kar detta trycket p\u00e5 de drabbade, eftersom det inte bara handlar om att \u00e5terst\u00e4lla den krypterade informationen utan ocks\u00e5 om att f\u00f6rhindra att de stulna uppgifterna blir offentliga.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Banktrojaner<\/a>, \u00e4ven k\u00e4nd som \"Bankers\", \u00e4r skadlig kod som anv\u00e4nds i stor utstr\u00e4ckning inom cyberbrottslighet. Deras funktion \u00e4r att stj\u00e4la bankinformation fr\u00e5n anv\u00e4ndare av denna typ av tj\u00e4nst. Dessa uppgifter finns tillg\u00e4ngliga p\u00e5 den svarta marknaden. Vissa personer skaffar dem f\u00f6r att kunna \u00e4gna sig \u00e5t kriminell verksamhet som utpressning och bedr\u00e4geri. Runt om i v\u00e4rlden har elva familjer av banktrojaner identifierats.<\/p>\n\n\n\n<p>Dessa familjer anv\u00e4nder krypterings- och f\u00f6rdunklingsverktyg f\u00f6r att skydda koden fr\u00e5n analys och d\u00e4rmed skydda den skadliga aktivitet som de utf\u00f6r i systemen. F\u00f6r att undvika uppt\u00e4ckt inkluderar de instruktioner i sin programmering som inte har n\u00e5gon specifik \u00e5tg\u00e4rd; de \u00e4r fyllda, de \u00e4r skr\u00e4pkod. Hittills har mer \u00e4n 50 finansinstitut identifierats som offer f\u00f6r identitetsst\u00f6lder i syfte att lura sina kunder.<\/p>\n\n\n\n<p><strong>Under de senaste tre \u00e5ren har de vanligaste cyberhoten varit:<\/strong><\/p>\n\n\n\n<p>1) <strong>Utpressningsprogram<\/strong>: dess utvecklare bildar organiserade grupper och auktionerar ut stulna data fr\u00e5n sina offer p\u00e5 Dark Web. Det har identifierats 203 olika Ransomware-varianter.<\/p>\n\n\n\n<p>2) <strong>Exploaterar<\/strong>: skadlig kod som f\u00f6rs\u00f6ker f\u00e5 tillg\u00e5ng till utrustning genom att utnyttja en s\u00e5rbarhet i systemen. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">EternalBlue<\/a> (som WannaCry-viruset tillh\u00f6r) och BlueKeep \u00e4r tv\u00e5 mer utbredda familjer (s\u00e5rbarhet f\u00f6r fj\u00e4rrskrivbord, n\u00e5got som blir relevant 2022 p\u00e5 grund av trenden med distansarbete).<\/p>\n\n\n\n<p>3) <strong>Spionprogram<\/strong>: \"klassiska verktyg\" f\u00f6r cyberbrottslingar. Det \u00e4r fortfarande viktigt f\u00f6r dem att ha en bred r\u00e4ckvidd i f\u00f6r\u00f6kningen. Sedan 2020 har HoudRat Trojan varit h\u00f6gst upp p\u00e5 listan.<\/p>\n\n\n\n<p>4) <strong>N\u00e4tfiske<\/strong>: Under 2020 \u00f6kade antalet uppt\u00e4ckta filer kopplade till n\u00e4tfiskekampanjer med 27% och steg till 53% under 2022. Det \u00e4r en betydande \u00f6kning, eftersom dessa uppt\u00e4ckter var 15% under 2019.<\/p>\n\n\n\n<p>Kostnaden f\u00f6r finansiell cyberbrottslighet har \u00f6verstigit $600 miljarder. Som om inte det vore nog finns det en brist p\u00e5 specialister p\u00e5 grund av f\u00f6r\u00e4ndringar i cyberhotlandskapet och m\u00e5ngfalden av nya Malware-utvecklingar, vilket har belyst bristen p\u00e5 yrkesverksamma inom cybers\u00e4kerhetsomr\u00e5det. Enligt olika studier som publicerades i slutet av 2019 beh\u00f6vdes 4,07 miljoner yrkesverksamma inom cybers\u00e4kerhet.<\/p>","protected":false},"excerpt":{"rendered":"<p>Covid-19-situationen har p\u00e5skyndat digitala omvandlingsprocesser och formaliserat distansarbete, vilket har resulterat i en \u00f6kning av cyberhot till niv\u00e5er som aldrig tidigare sk\u00e5dats och aldrig f\u00f6rutsp\u00e5tts. L\u00e5t oss komma ih\u00e5g att skadlig kod \u00e4r... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/nyheter\/banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023\/\">Continue reading <span class=\"screen-reader-text\">Banktrojaner, n\u00e4tfiske och ransomware forts\u00e4tter att dominera under 2023<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/nyheter\/banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/nyheter\/banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digitala hot \u00e5r 2023 - Securitybriefing.net","description":"L\u00e4r dig mer om den fortsatta dominansen av banktrojaner, n\u00e4tfiske och utpressningstrojaner under 2023. F\u00e5 tips om hur du h\u00e5ller dig skyddad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/nyheter\/banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023\/","og_locale":"sv_SE","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/sv\/nyheter\/banktrojaner-phishing-och-ransomware-fortsatter-dominera-under-2023\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"6 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"Digitala hot \u00e5r 2023 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"L\u00e4r dig mer om den fortsatta dominansen av banktrojaner, n\u00e4tfiske och utpressningstrojaner under 2023. F\u00e5 tips om hur du h\u00e5ller dig skyddad.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}