{"id":611,"date":"2022-09-15T18:13:39","date_gmt":"2022-09-15T18:13:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=611"},"modified":"2022-09-15T18:13:39","modified_gmt":"2022-09-15T18:13:39","slug":"fjarrangrepp","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cyberattacker\/fjarrangrepp\/","title":{"rendered":"Fj\u00e4rrstyrd attack"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"what-is-a-remote-attack\"><strong>Vad \u00e4r en fj\u00e4rrstyrd attack?<\/strong><\/h2>\n\n\n<p>N\u00e4r en tjuv g\u00f6r inbrott i ett hus f\u00f6r att stj\u00e4la materiella f\u00f6rem\u00e5l riskerar de att l\u00e4mna DNA-bevis eller fingeravtryck som kan leda till att de grips. Hackare som beg\u00e5r cyberbrott kan dock g\u00f6ra det utan att n\u00e5gonsin vara i n\u00e4rheten av sitt offer och l\u00f6per d\u00e4rf\u00f6r mycket mindre risk att \u00e5ka fast. Dessutom kan erfarna hackare s\u00e4tta dit oskyldiga m\u00e4nniskor genom att l\u00e4gga ut falska bevis p\u00e5 n\u00e4tet som pekar tillbaka p\u00e5 de oskyldigas digitala enheter eller konton.<\/p>\n\n\n\n<p>Eftersom erfarna hackare \u00e4r skickliga p\u00e5 att hitta svagheter i befintliga system kan inget av de f\u00f6rebyggande verktygen eller metoderna stoppa dem. Tyv\u00e4rr verkar de som ansvarar f\u00f6r att utveckla r\u00e4ttsliga \u00e5tg\u00e4rder f\u00f6r att skydda m\u00e4nniskor och f\u00f6retag fr\u00e5n hackning inte sj\u00e4lva vara riktigt kunniga eller bekymrade \u00f6ver det.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-remote-attacks\"><strong>Olika typer av fj\u00e4rrattacker<\/strong><\/h2>\n\n\n<p>Angripare kan ta kontroll \u00f6ver fj\u00e4rrstyrda system p\u00e5 olika s\u00e4tt:<\/p>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-poisoning\">DNS-f\u00f6rgiftning<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-619\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg\" alt=\"Infografik om DNS-f\u00f6rgiftningsattacker \" width=\"823\" height=\"566\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n\n\n\n<p>Varje enhet och server har en upps\u00e4ttning siffror som kallas IP-adress (Internet Protocol) och som anv\u00e4nds f\u00f6r att identifiera den vid kommunikation. Varje webbplats har ett dom\u00e4nnamn f\u00f6r att hj\u00e4lpa m\u00e4nniskor att hitta de webbplatser de vill ha (t.ex. www.domain.com). Dom\u00e4nnamnssystemet (<a href=\"https:\/\/www.javatpoint.com\/computer-network-dns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DNS<\/a>) omvandlar det anv\u00e4ndarspecificerade dom\u00e4nnamnet till r\u00e4tt IP-adress med hj\u00e4lp av DNS-servrar f\u00f6r att dirigera trafiken p\u00e5 r\u00e4tt s\u00e4tt. Allt detta sk\u00f6ts via DNS-servrar.<\/p>\n\n\n\n<p>DNS-f\u00f6rgiftning \u00e4r n\u00e4r en angripare omdirigerar trafik fr\u00e5n den avsedda webbplatsen till en falsk webbplats genom att \u00e4ndra DNS-poster. Om du till exempel f\u00f6rs\u00f6ker logga in p\u00e5 din internetbank, men ist\u00e4llet omdirigeras till en sida som ser identisk ut med bankens inloggningssida, har angriparen utf\u00f6rt en DNS-f\u00f6rgiftningsattack. Om du anger k\u00e4nslig information p\u00e5 den falska webbplatsen kan angriparen stj\u00e4la informationen till sin egen f\u00f6rdel.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"port-scanning\">Portskanning<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"564\" class=\"wp-image-626\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg\" alt=\"Infografik om TCP IP Hijacking\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/figure>\n\n\n\n<p>Portskanning \u00e4r ett s\u00e4tt att ta reda p\u00e5 vilka portar i ett n\u00e4tverk som \u00e4r \u00f6ppna. Det g\u00f6rs genom att f\u00f6rs\u00f6ka skicka och ta emot data genom varje port, ungef\u00e4r som att knacka p\u00e5 d\u00f6rren f\u00f6r att se om n\u00e5gon \u00e4r hemma. Om n\u00e5gon svarar vet man att porten \u00e4r \u00f6ppen. De k\u00f6r en portskanning mot ett n\u00e4tverk eller en server f\u00f6r att visa vilka portar som \u00e4r \u00f6ppna och lyssnar (tar emot information) och om det finns s\u00e4kerhetsenheter som brandv\u00e4ggar mellan k\u00e4llan och m\u00e5let. Portskanning kan ocks\u00e5 anv\u00e4ndas f\u00f6r att ta fingeravtryck p\u00e5 en enhet genom att titta p\u00e5 aktiviteten i enskilda portar.<\/p>\n\n\n\n<p>Det h\u00e4r programmet anv\u00e4nds inte bara av s\u00e4kerhetsadministrat\u00f6rer f\u00f6r att \u00f6vervaka n\u00e4tverket efter eventuella s\u00e5rbarheter, utan det anv\u00e4nds ocks\u00e5 ofta av hackare som en del av deras spaning n\u00e4r de letar efter svaga punkter att utnyttja.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dos-attacks\">DoS-attacker<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-628\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg\" alt=\"Dos Attack infografik \" width=\"825\" height=\"568\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--768x528.jpg 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/figure>\n\n\n\n<p>M\u00e5let med en DoS-attack \u00e4r att hindra personer som har r\u00e4tt att anv\u00e4nda en maskin eller ett n\u00e4tverk fr\u00e5n att anv\u00e4nda den. Detta g\u00f6rs genom att \u00f6versv\u00e4mma m\u00e5let med fr\u00e5gor och data som f\u00e5r systemet att krascha. Anst\u00e4llda, medlemmar och konsumenter kan inte anv\u00e4nda systemet eftersom deras legitima f\u00f6rfr\u00e5gningar \u00f6verv\u00e4ldigas av angriparens olagliga aktiviteter.<\/p>\n\n\n\n<p><a href=\"https:\/\/securitybriefing.net\/sv\/ddos\/vad-ar-en-ddos-attack\/\">DDoS-attacker<\/a> kan bli mycket kostsamma f\u00f6r dem som drabbas. Attackerna kan handla om st\u00f6ld av data eller tillg\u00e5ngar. F\u00f6retag, som banker, butiker, medief\u00f6retag och statliga institutioner, riktar ofta in sig p\u00e5 sina webbservrar i dessa attacker.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"tcp-ip-hijacking\">TCP \/IP kapning<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-624\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg\" alt=\"Infografik om TCP IP Hijacking\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Den h\u00e4r typen av attack inneb\u00e4r att en hackare tar \u00f6ver en session mellan tv\u00e5 enheter som redan kommunicerar med varandra. Angriparen m\u00e5ste befinna sig p\u00e5 samma n\u00e4tverk som offret f\u00f6r att kunna utf\u00f6ra denna attack.<\/p>\n\n\n\n<p>N\u00e4r angriparen tar \u00f6ver sessionen kan han eller hon avlyssna konversationen och \u00e4ndra de data som utbyts. Denna attack injicerar ofta skadlig kod i ett system eller stj\u00e4l k\u00e4nslig information.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smb-relay-attack\">SMB Relay-attack<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-620\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg\" alt=\"Infografik om SMB-rel\u00e4attacker\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>SMB Relay-attacker (Server Message Block) \u00e4r tyv\u00e4rr vanliga i f\u00f6retag som fortfarande anv\u00e4nder NTLM version 2-autentisering. Cyberbrottslingar kan i hemlighet vidarebefordra k\u00e4nsliga data till andra servrar utan att bli uppt\u00e4ckta genom att i hemlighet lyssna p\u00e5 n\u00e4tverkstrafiken.<\/p>\n\n\n\n<p>T\u00e4nk p\u00e5 det h\u00e4r problemet ur en exemplarisk anv\u00e4ndares och en ondskefull hackares perspektiv. Det ideala scenariot \u00e4r n\u00e4r den faktiska personen f\u00f6rs\u00f6ker logga in och autentisera sig sj\u00e4lv. N\u00e4r en hacker, i st\u00e4llet f\u00f6r en giltig anv\u00e4ndare, f\u00f6rs\u00f6ker anv\u00e4nda stulna inloggningsuppgifter genom att \u00f6vervaka n\u00e4tverkstrafiken f\u00f6r att f\u00e5 tillg\u00e5ng till dem - d\u00e5 beh\u00f6vs inget l\u00f6senord.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-advancements-in-hacking-technology\"><strong>Nya framsteg inom hackningsteknik<\/strong><\/h2>\n\n\n<p>Hackare hittar st\u00e4ndigt nya s\u00e4tt att komma \u00e5t sekretessbelagd information, vilket g\u00f6r det uppenbart att Computer Fraud and Abuse Act beh\u00f6ver uppdateras. Denna lag skapades p\u00e5 1980-talet men har inte \u00e4ndrats sedan 2011, vilket inneb\u00e4r att den inte \u00e4r anpassad till de senaste tekniska framstegen. CFAA m\u00e5ste ligga steget f\u00f6re hackarna genom att uppdateras regelbundet.<\/p>\n\n\n\n<p>Att ljuga i en dejtingprofil kanske inte verkar viktigt, men om webbplatsens anv\u00e4ndarvillkor bryts kan du \u00e5talas f\u00f6r hackning enligt <a href=\"https:\/\/www.nacdl.org\/Landing\/ComputerFraudandAbuseAct\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CFAA<\/a>. Detta mindre brott ger ett \u00e5rs f\u00e4ngelse eller $100.000 i b\u00f6ter.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"bypassing-captcha-test\">Omkoppling av CAPTCHA-test<\/h3>\n\n\n<p>CAPTCHA-testet avg\u00f6r om en anv\u00e4ndare \u00e4r en m\u00e4nniska eller en robot. Det anv\u00e4nds ofta f\u00f6r s\u00e4kerhets\u00e4ndam\u00e5l, som att logga in p\u00e5 ditt bankkonto. Om du ertappas med att f\u00f6rs\u00f6ka kringg\u00e5 CAPTCHA kan du \u00e5talas f\u00f6r hackning och riskera upp till 8 \u00e5rs f\u00e4ngelse.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.captcha.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CAPTCHA <\/a>\u00e4r en s\u00e4kerhets\u00e5tg\u00e4rd p\u00e5 en webbplats f\u00f6r att f\u00f6rhindra att robotar f\u00e5r tillg\u00e5ng till den. Den visar en bild som \u00e4r sv\u00e5r att tyda och f\u00f6r att f\u00e5 \u00e5tkomst m\u00e5ste du ange de bokst\u00e4ver och siffror som visas i en ruta under bilden. Hackare blev dock s\u00e5 skickliga p\u00e5 att hacka CAPTCHA att de blev tvungna att bli mer komplexa, vilket ledde till att de l\u00f6stes oftare \u00e4n m\u00e4nniskor. F\u00f6r att bek\u00e4mpa detta, <strong><a href=\"https:\/\/cloud.google.com\/recaptcha-enterprise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reCAPTCHA <\/a><\/strong>utvecklades och gick ut p\u00e5 att titta p\u00e5 sm\u00e5 rutor och markera dem med en brandpost, buss eller ett \u00f6verg\u00e5ngsst\u00e4lle.<\/p>\n\n\n\n<p>F\u00f6r tillf\u00e4llet, <strong>reCAPTCHA<\/strong> \u00e4r fortfarande aktivt. Det kommer dock inte att dr\u00f6ja l\u00e4nge innan automatiserade maskininl\u00e4rningstekniker kan uppt\u00e4ckas f\u00f6r att kringg\u00e5 den.<\/p>\n\n\n\n<p>B\u00e5de reCAPTCHA och CAPTCHA bygger p\u00e5 tanken att det \u00e4r m\u00f6jligt att identifiera m\u00e4nniskor fr\u00e5n datorer p\u00e5 n\u00e4tet p\u00e5 ett billigt, anv\u00e4ndarv\u00e4nligt och snabbt s\u00e4tt. Dessa fr\u00e5gor tvingar oss att fundera \u00f6ver vad som g\u00f6r oss till m\u00e4nniskor och om maskiner kan kopiera den aspekten. Det sj\u00e4lvklara svaret \u00e4r att vi inte vet eftersom vi nu har hoppat ner i den filosofiska dammens djupa \u00e4nde.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"so-how-do-you-stay-ahead-of-the-curve-and-ensure-your-business-or-website-is-not-hacked\"><strong>S\u00e5 hur h\u00e5ller du dig f\u00f6re kurvan och ser till att ditt f\u00f6retag eller din webbplats inte hackas?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"keep-your-software-up-to-date\">H\u00e5ll din programvara uppdaterad<\/h3>\n\n\n<p>Det viktigaste \u00e4r att h\u00e5lla programvaran uppdaterad. Detta inkluderar operativsystemet, alla applikationer och plugins. F\u00f6r\u00e5ldrad programvara \u00e4r ett av de vanligaste s\u00e4tten f\u00f6r hackare att f\u00e5 tillg\u00e5ng till ett system.<\/p>\n\n\n\n<p>Ett annat s\u00e4tt att skydda dig \u00e4r att \u00e4ndra ditt standardanv\u00e4ndarnamn och l\u00f6senord f\u00f6r alla enheter eller konton. M\u00e5nga m\u00e4nniskor inser inte att standardanv\u00e4ndarnamnet och l\u00f6senordet \u00e4r l\u00e4tt att hitta online. Hackare vet detta och f\u00f6rs\u00f6ker dessa referenser innan de g\u00e5r vidare till mer komplexa metoder.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-twofactor-authentication\">Anv\u00e4nd tv\u00e5faktorsautentisering<\/h3>\n\n\n<p>Att anv\u00e4nda tv\u00e5faktorsautentisering (2FA) \u00e4r ett av de b\u00e4sta s\u00e4tten att skydda dina konton fr\u00e5n att bli hackade. 2FA l\u00e4gger till ett extra s\u00e4kerhetslager genom att kr\u00e4va att du anger b\u00e5de ett l\u00f6senord och en kod som skickas till din telefon. Det g\u00f6r det mycket sv\u00e5rare f\u00f6r hackare att komma \u00e5t ditt konto \u00e4ven om de har ditt l\u00f6senord.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"disable-anonymous-system-access\">Inaktivera anonym \u00e5tkomst till systemet<\/h3>\n\n\n<p>Attacker mot fj\u00e4rr\u00e5tkomst \u00f6kar och det \u00e4r viktigt att vidta \u00e5tg\u00e4rder f\u00f6r att skydda sig sj\u00e4lv. Cyberbrottslingarna blir allt mer sofistikerade, s\u00e5 det g\u00e4ller att ligga steget f\u00f6re. Att h\u00e5lla programvaran uppdaterad, anv\u00e4nda tv\u00e5faktorsautentisering och inaktivera anonym \u00e5tkomst \u00e4r alla effektiva s\u00e4tt att skydda sig sj\u00e4lv. I takt med att tekniken utvecklas kommer vi att beh\u00f6va utveckla nya s\u00e4tt att ligga steget f\u00f6re hackarna i denna katt-och-r\u00e5tta-lek.<\/p>","protected":false},"excerpt":{"rendered":"<p>Vad \u00e4r en fj\u00e4rrstyrd attack? N\u00e4r en tjuv r\u00e5nar ett hus f\u00f6r materiella f\u00f6rem\u00e5l riskerar de att l\u00e4mna DNA-bevis eller fingeravtryck som kan leda till att de arresteras. Men hackare som ... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/fjarrangrepp\/\">Continue reading <span class=\"screen-reader-text\">Fj\u00e4rrstyrd attack<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Attack | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/fjarrangrepp\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Attack | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Forts\u00e4tt l\u00e4sa Remote Attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/fjarrangrepp\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T18:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Remote Attack\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"name\":\"Remote Attack | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"width\":558,\"height\":500,\"caption\":\"What is a Remote Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fj\u00e4rrangrepp | S\u00e4kerhetsgenomg\u00e5ng","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cyberattacker\/fjarrangrepp\/","og_locale":"sv_SE","og_type":"article","og_title":"Remote Attack | Security Briefing","og_description":"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Forts\u00e4tt l\u00e4sa Remote Attack","og_url":"https:\/\/securitybriefing.net\/sv\/cyberattacker\/fjarrangrepp\/","og_site_name":"Security Briefing","article_published_time":"2022-09-15T18:13:39+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","type":"image\/png"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"6 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Remote Attack","datePublished":"2022-09-15T18:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","articleSection":["Cyber Attacks"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","name":"Fj\u00e4rrangrepp | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","datePublished":"2022-09-15T18:13:39+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","width":558,"height":500,"caption":"What is a Remote Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Remote Attack"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}