{"id":1348,"date":"2023-02-04T16:15:36","date_gmt":"2023-02-04T16:15:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1348"},"modified":"2023-02-04T16:15:36","modified_gmt":"2023-02-04T16:15:36","slug":"trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023\/","title":{"rendered":"Trojan ng\u00e2n h\u00e0ng, l\u1eeba \u0111\u1ea3o v\u00e0 ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n ti\u1ebfp t\u1ee5c th\u1ed1ng tr\u1ecb v\u00e0o n\u0103m 2023"},"content":{"rendered":"<p>The Covid-19 situation has accelerated digital transformation processes and formalized teleworking, resulting in an increase in cyberthreats to levels never seen before and never predicted. Let\u2019s remember that Malware is a combination of two words \u2013 \u201cmalicious\u201d and \u201csoftware\u201d. This term refers to any type of malicious code, regardless of how it affects victims, behaves, or causes damage. Malware encompasses all forms of malicious software, including Trojan Horses, Ransomware, Viruses, Worms, and Banking Malware. It is difficult for a normal user to tell which files are malware and which are not. That is why security solutions exist, such as vast databases of previously seen malicious samples and the use of multiple protection technologies to detect the most recent ones.<\/p>\n\n\n\n<p>Malware authors today are extremely inventive. To avoid detection, their \u201ccreations\u201d spread through vulnerabilities in unpatched systems, bypass security measures, hide in memory, or mimic legitimate applications. Even today, however, one of the most potent vectors of infection is the weakest link in the chain: humans. Emails with malicious attachments have proven to be an effective and low-cost way to compromise a system. And it only takes one click to do so.<\/p>\n\n\n\n<p>B\u01b0\u1edbc \u0111\u1ea7u ti\u00ean l\u00e0 gi\u1eef cho t\u1ea5t c\u1ea3 ph\u1ea7n m\u1ec1m, bao g\u1ed3m h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 t\u1ea5t c\u1ea3 \u1ee9ng d\u1ee5ng, lu\u00f4n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt. Kh\u00f4ng ch\u1ec9 \u0111\u1ec3 th\u00eam t\u00ednh n\u0103ng v\u00e0 c\u1ea3i ti\u1ebfn, m\u00e0 c\u00f2n \u0111\u1ec3 s\u1eeda l\u1ed7i v\u00e0 gi\u1ea3i quy\u1ebft c\u00e1c l\u1ed7 h\u1ed5ng m\u00e0 t\u1ed9i ph\u1ea1m m\u1ea1ng v\u00e0 m\u00e3 \u0111\u1ed9c c\u00f3 th\u1ec3 khai th\u00e1c. Tuy nhi\u00ean, \u0111i\u1ec1u n\u00e0y kh\u00f4ng bao g\u1ed3m t\u1ea5t c\u1ea3 c\u00e1c m\u1ed1i \u0111e d\u1ecda hi\u1ec7n t\u1ea1i. H\u01a1n n\u1eefa, m\u1ed9t gi\u1ea3i ph\u00e1p b\u1ea3o m\u1eadt \u0111\u00e1ng tin c\u1eady v\u00e0 c\u1eadp nh\u1eadt l\u00e0 c\u1ea7n thi\u1ebft \u0111\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c n\u1ed7 l\u1ef1c t\u1ea5n c\u00f4ng ti\u1ec1m n\u0103ng. Sao l\u01b0u \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n th\u01b0\u1eddng xuy\u00ean v\u00e0 l\u01b0u tr\u1eef tr\u00ean \u1ed5 c\u1ee9ng ngo\u1ea1i tuy\u1ebfn l\u00e0 m\u1ed9t c\u00e1ch kh\u00e1c \u0111\u1ec3 ch\u1ed1ng l\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, cho ph\u00e9p ng\u01b0\u1eddi d\u00f9ng d\u1ec5 d\u00e0ng thay th\u1ebf b\u1ea5t k\u1ef3 d\u1eef li\u1ec7u n\u00e0o \u0111\u00e3 b\u1ecb h\u1ecfng ho\u1eb7c m\u00e3 h\u00f3a b\u1edfi k\u1ebb t\u1ea5n c\u00f4ng m\u1ea1ng.<\/p>\n\n\n\n<p>H\u00e3y c\u00f9ng nh\u1edb l\u1ea1i v\u00e0 ghi nh\u1edb m\u1ed9t ch\u00fat l\u1ecbch s\u1eed. <a href=\"https:\/\/www.trtworld.com\/magazine\/the-making-of-the-first-computer-virus-the-pakistani-brain-32296\" target=\"_blank\" rel=\"noreferrer noopener\">B\u1ed9 n\u00e3o Pakistan<\/a> was the first virus to be identified in early 1986. Its goal was to be as inconspicuous as possible. It infected the boot system of 5.25\u2033 floppy disks and spread globally in a matter of weeks, which is remarkable given that it was only distributed via 5.25\u2033 floppy disks. Since then, malware has evolved in a variety of ways, and its creators are constantly coming up with new ways to infect victims. They have a powerful distribution network with the Internet, which allows them to affect potential victims much more easily. This will always be the fundamental logic of a hacker, and it is up to us to practice intelligence and counterintelligence to counteract them. Some malware families, such as WannaCryptor, spread indiscriminately by encrypting files and causing global damage. Others affect smaller groups of victims, such as companies from a specific country in the case of Diskcoder. Petya aka C. Industroyer was a recent example of targeted malware. This malware, discovered by ESET, attacks industrial control systems used in the power grid and has caused blackouts in Ukraine by abusing legitimate but unsecured protocols. It is one of the few malware families that can be compared to Stuxnet, the first cyber weapon ever used.<\/p>\n\n\n\n<p>Since the pandemic was declared, cyberattacks have increased, such as those against the Remote Desktop Protocol (RDP) and Ransomware. The world will have one billion malicious codes by 2022. However, cyberthreats have not only increased in number, but they have also become more sophisticated. For example, today we discuss \u201cFileless Malware,\u201d which does not require the user to enter any files into the system in order to run the Malware: it can be stored in the system\u2019s volatile memory. That is why monitoring and prevention technologies are critical.<\/p>\n\n\n\n<p><br><strong>Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i thu\u1ed9c c\u00e1c lo\u1ea1i sau \u0111\u00e3 \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n v\u00e0o n\u0103m 2021 v\u00e0 2022:<\/strong><\/p>\n\n\n\n<p>1) <strong>Torrent \u0111\u1ed9c h\u1ea1i<\/strong>: t\u1eeb gia \u0111\u00ecnh ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Kryptocibule ch\u01b0a \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn tr\u01b0\u1edbc \u0111\u00e2y. N\u00f3 \u0111\u00e1nh c\u1eafp ti\u1ec1n \u0111i\u1ec7n t\u1eed v\u00e0 tr\u00edch xu\u1ea5t c\u00e1c t\u1ec7p li\u00ean quan \u0111\u1ebfn ti\u1ec1n \u0111i\u1ec7n t\u1eed b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng cryptominers v\u00e0 chi\u1ebfm \u0111o\u1ea1t clipboard.<\/p>\n\n\n\n<p>2) <strong>M\u1ed1i \u0111e d\u1ecda Android<\/strong>: Malware in the \u2018Hidden Apps\u2019 category has dominated for three consecutive quarters in 2022. This cyberthreat consists of deceptive apps that masquerade as games or utility apps, but after installation, they hide their icons and display full-screen ads.<\/p>\n\n\n\n<p>3)<strong> M\u1ed1i \u0111e d\u1ecda m\u1ea1ng IoT<\/strong>: V\u00ec c\u00e1c thi\u1ebft b\u1ecb IoT \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf v\u1edbi r\u1ea5t \u00edt ho\u1eb7c kh\u00f4ng c\u00f3 b\u1ea3o m\u1eadt, ch\u00fang l\u00e0 m\u1ee5c ti\u00eau d\u1ec5 d\u00e0ng cho k\u1ebb t\u1ea5n c\u00f4ng m\u1ea1ng. K\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m c\u00e1c thi\u1ebft b\u1ecb n\u00e0y b\u1eb1ng bot \u0111\u1ed9c h\u1ea1i v\u00e0 s\u1eed d\u1ee5ng ch\u00fang trong m\u1ea1ng botnet cho c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng quy m\u00f4 l\u1edbn.<\/p>\n\n\n\n<p>4) <strong>Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i cho Mac<\/strong>: N\u0103m 2021, \u1ee9ng d\u1ee5ng giao d\u1ecbch Kattana cho m\u00e1y t\u00ednh Mac \u0111\u00e3 b\u1ecb sao ch\u00e9p v\u00e0 trojan h\u00f3a. K\u1ebb t\u1ea5n c\u00f4ng \u0111\u00e3 s\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u01b0 cookie tr\u00ecnh duy\u1ec7t, v\u00ed ti\u1ec1n \u0111i\u1ec7n t\u1eed v\u00e0 \u1ea3nh ch\u1ee5p m\u00e0n h\u00ecnh; \u0111\u1ebfn n\u0103m 2022, lo\u1ea1i m\u1ed1i \u0111e d\u1ecda m\u1ea1ng n\u00e0y \u0111\u00e3 b\u1ecb lo\u1ea1i b\u1ecf ho\u00e0n to\u00e0n.<\/p>\n\n\n\n<p>5) <strong>Email \u0111\u1ed9c h\u1ea1i<\/strong>: Vi\u1ec7c ph\u00e2n ph\u1ed1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i qua email s\u1ebd t\u0103ng v\u00e0o n\u0103m 2022. M\u1ed9t khai th\u00e1c Microsoft Office l\u00e0 ph\u00e1t hi\u1ec7n ph\u1ed5 bi\u1ebfn nh\u1ea5t v\u00e0o n\u0103m 2022.<\/p>\n\n\n\n<p>Ransomware l\u00e0 m\u1ed9t m\u1ed1i \u0111e d\u1ecda m\u1ea1ng dai d\u1eb3ng \u0111\u00e3 li\u00ean t\u1ee5c t\u1ea5n c\u00f4ng c\u00e1c t\u1ed5 ch\u1ee9c, l\u00e0m t\u1ed5n h\u1ea1i c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng quan tr\u1ecdng nh\u01b0 ch\u00ednh ph\u1ee7, y t\u1ebf v\u00e0 c\u00e1c t\u1ed5 ch\u1ee9c n\u0103ng l\u01b0\u1ee3ng, v\u00e0 ng\u00e0y c\u00e0ng tr\u1edf n\u00ean ph\u1ee9c t\u1ea1p. Vi\u1ec7c ph\u00e1t hi\u1ec7n v\u00e0 lo\u1ea1i b\u1ecf n\u00f3. N\u0103m 2020, ransomware v\u00e0 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u \u0111\u00e3 \u0111\u01b0\u1ee3c h\u1ee3p nh\u1ea5t. Trong <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">b\u00e0i vi\u1ebft n\u00e0y<\/a>, \u00f4ng ch\u1ec9 ra r\u1eb1ng c\u00e1c nh\u00e0 \u0111i\u1ec1u h\u00e0nh c\u1ee7a c\u00e1c gia \u0111\u00ecnh Ransomware kh\u00e1c nhau \u0111\u00e3 th\u00eam m\u1ed9t r\u1ee7i ro kh\u00e1c v\u00e0o lo\u1ea1i t\u1ea5n c\u00f4ng n\u00e0y, v\u00ec ngo\u00e0i vi\u1ec7c chi\u1ebfm \u0111o\u1ea1t t\u1ec7p, h\u1ecd c\u00f2n th\u1ef1c h\u00e0nh t\u1ed1ng ti\u1ec1n, v\u1edbi m\u1ed1i \u0111e d\u1ecda m\u1ea1ng v\u1ec1 vi\u1ec7c r\u00f2 r\u1ec9 th\u00f4ng tin b\u1ecb x\u00e2m ph\u1ea1m. Ph\u01b0\u01a1ng th\u1ee9c n\u00e0y s\u1eed d\u1ee5ng k\u1ef9 thu\u1eadt Doxing, bao g\u1ed3m vi\u1ec7c l\u1ea5y d\u1eef li\u1ec7u b\u00ed m\u1eadt t\u1eeb n\u1ea1n nh\u00e2n v\u00e0 \u0111e d\u1ecda c\u00f4ng khai tr\u1eeb khi ti\u1ec1n t\u1ed1ng ti\u1ec1n \u0111\u01b0\u1ee3c tr\u1ea3. Kh\u00f4ng nghi ng\u1edd g\u00ec, \u0111i\u1ec1u n\u00e0y l\u00e0m t\u0103ng \u00e1p l\u1ef1c l\u00ean nh\u1eefng ng\u01b0\u1eddi b\u1ecb \u1ea3nh h\u01b0\u1edfng, v\u00ec kh\u00f4ng ch\u1ec9 l\u00e0 vi\u1ec7c kh\u00f4i ph\u1ee5c th\u00f4ng tin b\u1ecb m\u00e3 h\u00f3a, m\u00e0 c\u00f2n l\u00e0 vi\u1ec7c ng\u0103n ch\u1eb7n d\u1eef li\u1ec7u b\u1ecb \u0111\u00e1nh c\u1eafp tr\u1edf th\u00e0nh c\u00f4ng khai.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-are-banking-trojans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trojan ng\u00e2n h\u00e0ng<\/a>, also known as \u201cBankers,\u201d are malicious code that is widely used in the field of cybercrime. Their function is to steal banking information from users of this type of service. These details are available on the black market. Some people acquire them in order to engage in criminal activities such as extortion and fraud. Around the world, eleven banking Trojan families have been identified.<\/p>\n\n\n\n<p>C\u00e1c gia \u0111\u00ecnh n\u00e0y s\u1eed d\u1ee5ng c\u00f4ng c\u1ee5 m\u00e3 h\u00f3a v\u00e0 l\u00e0m m\u1edd \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00e3 kh\u1ecfi ph\u00e2n t\u00edch v\u00e0 do \u0111\u00f3 b\u1ea3o v\u1ec7 ho\u1ea1t \u0111\u1ed9ng \u0111\u1ed9c h\u1ea1i m\u00e0 ch\u00fang th\u1ef1c hi\u1ec7n trong h\u1ec7 th\u1ed1ng. \u0110\u1ec3 tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n, ch\u00fang bao g\u1ed3m c\u00e1c h\u01b0\u1edbng d\u1eabn trong l\u1eadp tr\u00ecnh c\u1ee7a m\u00ecnh m\u00e0 kh\u00f4ng c\u00f3 h\u00e0nh \u0111\u1ed9ng c\u1ee5 th\u1ec3; ch\u00fang \u0111\u01b0\u1ee3c \u0111i\u1ec1n \u0111\u1ea7y, ch\u00fang l\u00e0 m\u00e3 r\u00e1c. Cho \u0111\u1ebfn nay, h\u01a1n 50 t\u1ed5 ch\u1ee9c t\u00e0i ch\u00ednh \u0111\u00e3 \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh l\u00e0 n\u1ea1n nh\u00e2n c\u1ee7a h\u00e0nh vi tr\u1ed9m c\u1eafp danh t\u00ednh \u0111\u1ec3 l\u1eeba d\u1ed1i kh\u00e1ch h\u00e0ng c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p><strong>Trong ba n\u0103m qua, c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t l\u00e0:<\/strong><\/p>\n\n\n\n<p>1) <strong>Ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n<\/strong>: c\u00e1c nh\u00e0 ph\u00e1t tri\u1ec3n c\u1ee7a n\u00f3 h\u00ecnh th\u00e0nh c\u00e1c nh\u00f3m t\u1ed5 ch\u1ee9c v\u00e0 b\u00e1n \u0111\u1ea5u gi\u00e1 d\u1eef li\u1ec7u b\u1ecb \u0111\u00e1nh c\u1eafp t\u1eeb n\u1ea1n nh\u00e2n c\u1ee7a h\u1ecd tr\u00ean Dark Web. \u0110\u00e3 c\u00f3 203 bi\u1ebfn th\u1ec3 Ransomware kh\u00e1c nhau \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh.<\/p>\n\n\n\n<p>2) <strong>Khai th\u00e1c<\/strong>: m\u00e3 \u0111\u1ed9c c\u1ed1 g\u1eafng truy c\u1eadp v\u00e0o thi\u1ebft b\u1ecb b\u1eb1ng c\u00e1ch khai th\u00e1c m\u1ed9t l\u1ed7 h\u1ed5ng trong h\u1ec7 th\u1ed1ng. <a href=\"https:\/\/research.checkpoint.com\/2017\/eternalblue-everything-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">EternalBlue<\/a> (m\u00e0 virus WannaCry thu\u1ed9c v\u1ec1) v\u00e0 BlueKeep l\u00e0 hai gia \u0111\u00ecnh ph\u1ed5 bi\u1ebfn h\u01a1n (l\u1ed7 h\u1ed5ng m\u00e1y t\u00ednh t\u1eeb xa, \u0111i\u1ec1u g\u00ec \u0111\u00f3 tr\u1edf n\u00ean quan tr\u1ecdng v\u00e0o n\u0103m 2022 do xu h\u01b0\u1edbng l\u00e0m vi\u1ec7c t\u1eeb xa).<\/p>\n\n\n\n<p>3) <strong>Ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p<\/strong>: \u201cclassic tools\u201d of cybercriminals. It is still critical for them to have a broad reach in propagation. Since 2020, the HoudRat Trojan has been at the top of the list.<\/p>\n\n\n\n<p>4) <strong>L\u1eeba \u0111\u1ea3o<\/strong>: N\u0103m 2020, s\u1ed1 l\u01b0\u1ee3ng ph\u00e1t hi\u1ec7n c\u00e1c t\u1ec7p li\u00ean quan \u0111\u1ebfn c\u00e1c chi\u1ebfn d\u1ecbch Phishing t\u0103ng 27%, t\u0103ng l\u00ean 53% v\u00e0o n\u0103m 2022. N\u00f3 \u0111\u1ea1i di\u1ec7n cho m\u1ed9t s\u1ef1 gia t\u0103ng \u0111\u00e1ng k\u1ec3, v\u00ec c\u00e1c ph\u00e1t hi\u1ec7n n\u00e0y l\u00e0 15% v\u00e0o n\u0103m 2019.<\/p>\n\n\n\n<p>The cost of financial cybercrime has surpassed $600 billion. As if that weren\u2019t enough, there is a shortage of specialists due to changes in the cyberthreat landscape and the variety of new Malware developments, which have highlighted the shortage of professionals in the field of cybersecurity. According to various studies published at the end of 2019, 4.07 million Cybersecurity professionals were required.<\/p>","protected":false},"excerpt":{"rendered":"<p>T\u00ecnh h\u00ecnh Covid-19 \u0111\u00e3 \u0111\u1ea9y nhanh qu\u00e1 tr\u00ecnh chuy\u1ec3n \u0111\u1ed5i s\u1ed1 v\u00e0 ch\u00ednh th\u1ee9c h\u00f3a h\u00ecnh th\u1ee9c l\u00e0m vi\u1ec7c t\u1eeb xa, d\u1eabn \u0111\u1ebfn s\u1ef1 gia t\u0103ng c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng l\u00ean m\u1ee9c ch\u01b0a t\u1eebng th\u1ea5y v\u00e0 ch\u01b0a t\u1eebng d\u1ef1 \u0111o\u00e1n tr\u01b0\u1edbc \u0111\u00e2y. H\u00e3y nh\u1edb r\u1eb1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e0\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Trojan ng\u00e2n h\u00e0ng, l\u1eeba \u0111\u1ea3o v\u00e0 ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n ti\u1ebfp t\u1ee5c th\u1ed1ng tr\u1ecb v\u00e0o n\u0103m 2023<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Threats in 2023 - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Threats in 2023 - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\",\"name\":\"Digital Threats in 2023 - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"datePublished\":\"2023-02-04T16:15:36+00:00\",\"description\":\"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00e1c m\u1ed1i \u0111e d\u1ecda k\u1ef9 thu\u1eadt s\u1ed1 n\u0103m 2023 - Securitybriefing.net","description":"T\u00ecm hi\u1ec3u v\u1ec1 s\u1ef1 th\u1ed1ng tr\u1ecb li\u00ean t\u1ee5c c\u1ee7a Trojan ng\u00e2n h\u00e0ng, l\u1eeba \u0111\u1ea3o v\u00e0 ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n v\u00e0o n\u0103m 2023. Nh\u1eadn m\u1eb9o v\u1ec1 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023\/","og_locale":"vi_VN","og_type":"article","og_title":"Digital Threats in 2023 - Securitybriefing.net","og_description":"Learn about the ongoing dominance of banking Trojans, phishing, and ransomware in 2023. Get tips on how to stay protected.","og_url":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/trojan-ngan-hang-phishing-va-ransomware-tiep-tuc-chiem-uu-the-nam-2023\/","og_site_name":"Security Briefing","article_published_time":"2023-02-04T16:15:36+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"6 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023","datePublished":"2023-02-04T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","articleSection":["News"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","url":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/","name":"C\u00e1c m\u1ed1i \u0111e d\u1ecda k\u1ef9 thu\u1eadt s\u1ed1 n\u0103m 2023 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","datePublished":"2023-02-04T16:15:36+00:00","description":"T\u00ecm hi\u1ec3u v\u1ec1 s\u1ef1 th\u1ed1ng tr\u1ecb li\u00ean t\u1ee5c c\u1ee7a Trojan ng\u00e2n h\u00e0ng, l\u1eeba \u0111\u1ea3o v\u00e0 ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n v\u00e0o n\u0103m 2023. Nh\u1eadn m\u1eb9o v\u1ec1 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Banking-Trojans-Phishing-and-Ransomware-Continue-to-Dominate-in-2023-1.jpg","width":662,"height":327,"caption":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/banking-trojans-phishing-and-ransomware-continue-to-dominate-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Banking Trojans, Phishing, and Ransomware Continue to Dominate in 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1351"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}