{"id":2431,"date":"2023-12-23T19:54:06","date_gmt":"2023-12-23T19:54:06","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2431"},"modified":"2023-12-23T20:05:06","modified_gmt":"2023-12-23T20:05:06","slug":"kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc\/","title":{"rendered":"Kh\u00e1m ph\u00e1 chuy\u00ean s\u00e2u v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i do nh\u00e0 n\u01b0\u1edbc t\u00e0i tr\u1ee3"},"content":{"rendered":"<p>S\u1ef1 vi ph\u1ea1m tinh vi c\u1ee7a Turla \u0111\u1ed1i v\u1edbi c\u00e1c ch\u00ednh ph\u1ee7 Li\u00ean minh Ch\u00e2u \u00c2u<br>L\u0129nh v\u1ef1c chi\u1ebfn tranh m\u1ea1ng \u0111\u00e3 ch\u1ee9ng ki\u1ebfn m\u1ed9t <a href=\"https:\/\/malicious.life\/episode\/episode-230\/\" target=\"_blank\" rel=\"noreferrer noopener\">s\u1ef1 ti\u1ebfn b\u1ed9 \u0111\u00e1ng k\u1ec3 v\u1edbi s\u1ef1 ra \u0111\u1eddi c\u1ee7a Turla<\/a>, m\u1ed9t nh\u00f3m hacker<br>\u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn v\u1edbi c\u00e1c ph\u01b0\u01a1ng ph\u00e1p tinh vi trong vi\u1ec7c x\u00e2m ph\u1ea1m an ninh c\u1ee7a m\u1ed9t s\u1ed1 ch\u00ednh ph\u1ee7 Li\u00ean minh Ch\u00e2u \u00c2u. \u0110i\u1ec1u n\u00e0y<br>saga b\u1eaft \u0111\u1ea7u di\u1ec5n ra v\u00e0o cu\u1ed1i n\u0103m 2016, khi m\u1ed9t cu\u1ed9c ki\u1ec3m to\u00e1n an ninh m\u1ea1ng \u1edf \u0110\u1ee9c v\u00e0o n\u0103m 2017 ti\u1ebft l\u1ed9 m\u1ed9t s\u1ef1 x\u00e2m ph\u1ea1m<br>phi\u00ean b\u1ea3n Microsoft Outlook \u0111\u01b0\u1ee3c tri\u1ec3n khai tr\u00ean nhi\u1ec1u b\u1ed9 ph\u1eadn ch\u00ednh ph\u1ee7 kh\u00e1c nhau c\u1ee7a Turla k\u1ec3 t\u1eeb \u00edt nh\u1ea5t l\u00e0<br>n\u0103m tr\u01b0\u1edbc.<\/p>\n\n\n\n<p class=\"translation-block\"><br>Cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y \u0111\u00e3 th\u1ec3 hi\u1ec7n m\u1ed9t ph\u01b0\u01a1ng ph\u00e1p t\u1ec9 m\u1ec9 v\u00e0 \u0111a l\u1edbp, b\u1eaft \u0111\u1ea7u b\u1eb1ng k\u1ef9 thu\u1eadt phishing \u2013 m\u1ed9t k\u1ef9 thu\u1eadt l\u1eeba \u0111\u1ea3o<br>\u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 khi\u1ebfn n\u1ea1n nh\u00e2n tin r\u1eb1ng h\u1ecd \u0111ang t\u01b0\u01a1ng t\u00e1c v\u1edbi m\u1ed9t th\u1ef1c th\u1ec3 \u0111\u00e1ng tin c\u1eady. Turla \u0111\u00e3 tri\u1ec3n khai m\u1ed9t c\u00e1ch c\u00f3 h\u1ec7 th\u1ed1ng<br>m\u1ed9t lo\u1ea1t trojan, m\u1ed7i b\u01b0\u1edbc cho ph\u00e9p h\u1ecd truy c\u1eadp s\u00e2u h\u01a1n v\u00e0o h\u1ec7 th\u1ed1ng v\u00e0 cu\u1ed1i c\u00f9ng khai th\u00e1c m\u1ed9t<br>l\u1ed7 h\u1ed5ng trong <a href=\"https:\/\/www.trendmicro.com\/it_it\/research\/23\/i\/examining-the-activities-of-the-turla-group.html\" target=\"_self\">Microsoft Outlook \u0111\u1ec3 ch\u1eb7n t\u1ea5t c\u1ea3 c\u00e1c email<\/a> t\u1eeb c\u00e1c m\u00e1y b\u1ecb nhi\u1ec5m.<\/p>\n\n\n\n<p class=\"translation-block\"><br>\u0110\u1ed9 ph\u1ee9c t\u1ea1p c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u1ee7a Turla l\u00e0 \u0111\u00e1ng ch\u00fa \u00fd, k\u1ebft h\u1ee3p c\u00e1c y\u1ebfu t\u1ed1 c\u1ee7a virus, Trojan, rootkit v\u00e0<br>s\u00e2u, m\u1ed7i lo\u1ea1i c\u00f3 m\u1ee5c \u0111\u00edch ri\u00eang bi\u1ec7t \u2013 t\u1eeb vi\u1ec7c l\u00e0m cho c\u00e1c m\u00e1y t\u00ednh kh\u00f4ng th\u1ec3 ho\u1ea1t \u0111\u1ed9ng cho \u0111\u1ebfn vi\u1ec7c \u0111\u1ea3m b\u1ea3o c\u00e1c ho\u1ea1t \u0111\u1ed9ng b\u00ed m\u1eadt v\u00e0<br>lan t\u1ecfa m\u1ea1ng l\u01b0\u1edbi. L\u1ed7 h\u1ed5ng n\u00e0y l\u00e0 s\u1ef1 pha tr\u1ed9n c\u1ee7a c\u00e1c ch\u1ee9c n\u0103ng Trojan, rootkit v\u00e0 s\u00e2u, \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3<br>gi\u1eef k\u00edn \u0111\u00e1o trong khi x\u00e2m nh\u1eadp t\u1eeb t\u1eeb v\u00e0o s\u00e2u trong m\u1ea1ng. H\u01a1n n\u1eefa, n\u00f3 s\u1eed d\u1ee5ng m\u1ed9t ph\u01b0\u01a1ng ph\u00e1p giao ti\u1ebfp s\u00e1ng t\u1ea1o<br>v\u1edbi trung t\u00e2m \u0111i\u1ec1u khi\u1ec3n c\u1ee7a Turla v\u00e0 c\u00f3 kh\u1ea3 n\u0103ng nh\u1eadn c\u00e1c b\u1ea3n c\u1eadp nh\u1eadt. Ph\u00e2n t\u00edch c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m cho th\u1ea5y ngu\u1ed3n g\u1ed1c c\u1ee7a ch\u00fang c\u00f3 t\u1eeb n\u0103m 2009, ch\u1ec9 ra m\u1ed9t m\u1ed1i \u0111e d\u1ecda d\u00e0i h\u1ea1n v\u00e0 ph\u00e1t tri\u1ec3n.<\/p>\n\n\n\n<p><br>C\u1ed1t l\u00f5i c\u1ee7a khai th\u00e1c l\u00e0 vi\u1ec7c s\u1eed d\u1ee5ng ch\u1ee9c n\u0103ng plugin t\u00f9y ch\u1ec9nh c\u1ee7a Outlook. Turla \u0111\u00e3 t\u00ecm ra c\u00e1ch c\u00e0i \u0111\u1eb7t<br>plugin \u0111\u1ed9c h\u1ea1i, m\u1eb7c d\u00f9 v\u00f4 h\u00ecnh trong menu c\u1ee7a Outlook, c\u00f3 th\u1ec3 qu\u00e9t t\u1ea5t c\u1ea3 email v\u00e0 chuy\u1ec3n ti\u1ebfp th\u00f4ng tin tr\u1edf l\u1ea1i<br>c\u01a1 s\u1edf c\u1ee7a h\u1ecd. \u0110\u1ec3 v\u01b0\u1ee3t qua s\u1ef1 b\u1ea3o v\u1ec7 c\u1ee7a t\u01b0\u1eddng l\u1eeda, h\u1ecd \u0111\u00e3 s\u1eed d\u1ee5ng c\u00e1c t\u1ec7p PDF \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a \u0111\u01b0\u1ee3c g\u1eedi d\u01b0\u1edbi d\u1ea1ng t\u1ec7p \u0111\u00ednh k\u00e8m email,<br>ch\u1ee9a c\u1ea3 l\u1ec7nh v\u00e0 d\u1eef li\u1ec7u thu th\u1eadp \u0111\u01b0\u1ee3c. Nh\u1eefng t\u1eadp tin n\u00e0y, m\u1eb7c d\u00f9 c\u00f3 v\u1ebb v\u00f4 h\u1ea1i, ch\u1ec9 ch\u1ee9a 1\u00d71<br>h\u00ecnh \u1ea3nh pixel tr\u1eafng. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u0169ng khai th\u00e1c h\u1ec7 th\u1ed1ng qu\u1ea3n l\u00fd email c\u1ee7a Outlook \u0111\u1ec3 qu\u1ea3n l\u00fd l\u1ec7nh v\u00e0<br>ki\u1ec3m so\u00e1t th\u00f4ng tin li\u00ean l\u1ea1c m\u1ed9t c\u00e1ch k\u00edn \u0111\u00e1o, x\u00f3a b\u1ecf m\u1ecdi d\u1ea5u v\u1ebft v\u1ec1 s\u1ef1 t\u1ed3n t\u1ea1i c\u1ee7a n\u00f3.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"stuxnet-a-cyber-weapon-targeting-iran\">Stuxnet: M\u1ed9t v\u0169 kh\u00ed m\u1ea1ng nh\u1eafm v\u00e0o Iran<\/h2>\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/topics\/computer-science\/stuxnet\" target=\"_blank\" rel=\"noreferrer noopener\">Stuxnet l\u00e0 m\u1ed9t d\u1ea5u m\u1ed1c trong chi\u1ebfn tranh m\u1ea1ng<\/a>, ch\u1ee7 y\u1ebfu nh\u1eafm v\u00e0o tham v\u1ecdng h\u1ea1t nh\u00e2n c\u1ee7a Iran. L\u00e0 m\u1ed9t con s\u00e2u,<br>Stuxnet \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng Windows \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi m\u00e1y ly t\u00e2m l\u00e0m gi\u00e0u uranium c\u1ee7a Siemens.<br>Ki\u1ebfn tr\u00fac c\u1ee7a n\u00f3 l\u00e0 m\u1ed9t k\u1ef3 quan c\u1ee7a chi\u1ebfn tranh m\u1ea1ng, \u0111\u01b0\u1ee3c l\u1eadp tr\u00ecnh \u0111\u1ec3 l\u00e2y lan m\u1ed9t c\u00e1ch l\u00e9n l\u00fat, v\u1eabn kh\u00f4ng ho\u1ea1t \u0111\u1ed9ng cho \u0111\u1ebfn khi x\u00e1c \u0111\u1ecbnh \u0111\u01b0\u1ee3c v\u1ecb tr\u00ed.<br>m\u1ee5c ti\u00eau v\u00e0 t\u1ef1 lo\u1ea1i b\u1ecf v\u00e0o th\u00e1ng 6 n\u0103m 2012 \u0111\u1ec3 gi\u1ea3m r\u1ee7i ro ph\u00e1t hi\u1ec7n.<br>Ph\u01b0\u01a1ng ph\u00e1p ph\u00e2n ph\u1ed1i Stunt l\u00e0 th\u00f4ng qua c\u00e1c \u1ed5 USB b\u1ecb nhi\u1ec5m, khai th\u00e1c b\u1ed1n l\u1ed7 h\u1ed5ng ch\u01b0a bi\u1ebft tr\u01b0\u1edbc \u0111\u00f3<br>l\u1ed7 h\u1ed5ng trong Windows. <\/p>\n\n\n\n<p>Chi\u1ebfn l\u01b0\u1ee3c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a n\u00f3 r\u1ea5t tinh vi nh\u01b0ng l\u1ea1i mang t\u00ednh h\u1ee7y di\u1ec7t: khi t\u00ecm th\u1ea5y m\u1ee5c ti\u00eau, Stuxnet<br>s\u1ebd khi\u1ebfn m\u00e1y ly t\u00e2m b\u1ecb tr\u1ee5c tr\u1eb7c, d\u1eabn \u0111\u1ebfn s\u1ef1 ph\u00e1 h\u1ee7y v\u1eadt l\u00fd c\u1ee7a ch\u00fang, \u0111\u1ed3ng th\u1eddi<br>l\u00e0m gi\u1ea3 b\u00e1o c\u00e1o ho\u1ea1t \u0111\u1ed9ng \u0111\u1ec3 tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n. Vi\u1ec7c ph\u00e1t hi\u1ec7n ra con s\u00e2u v\u00e0o n\u0103m 2010 \u0111\u00e3 d\u1eabn \u0111\u1ebfn c\u00e1c cu\u1ed9c \u0111i\u1ec1u tra m\u1edf r\u1ed9ng<br>b\u1edfi c\u00e1c c\u00f4ng ty b\u1ea3o m\u1eadt nh\u01b0 c\u00f4ng ty Belarus v\u00e0 Kaspersky Labs, ti\u1ebft l\u1ed9 s\u1ef1 ph\u1ee9c t\u1ea1p c\u1ee7a n\u00f3 v\u00e0 g\u1ee3i \u00fd<br>s\u1ef1 tham gia c\u1ee7a m\u1ed9t nh\u00f3m chuy\u00ean gia, c\u00f3 th\u1ec3 l\u00e0 do nh\u00e0 n\u01b0\u1edbc t\u00e0i tr\u1ee3.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"dugu-the-offspring-of-stuxnet\">Dugu: Con ch\u00e1u c\u1ee7a Stuxnet<br><\/h2>\n\n\n<p class=\"translation-block\">Chi\u1ebfn l\u01b0\u1ee3c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a n\u00f3 l\u00e0 tinh vi nh\u01b0ng h\u1ee7y di\u1ec7t: khi t\u00ecm th\u1ea5y m\u1ee5c ti\u00eau c\u1ee7a m\u00ecnh, Stuxnet<br>s\u1ebd g\u00e2y ra s\u1ef1 c\u1ed1 cho c\u00e1c m\u00e1y ly t\u00e2m, d\u1eabn \u0111\u1ebfn s\u1ef1 ph\u00e1 h\u1ee7y v\u1eadt l\u00fd c\u1ee7a ch\u00fang, trong khi \u0111\u1ed3ng th\u1eddi<br>l\u00e0m gi\u1ea3 c\u00e1c b\u00e1o c\u00e1o ho\u1ea1t \u0111\u1ed9ng \u0111\u1ec3 tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n. Vi\u1ec7c ph\u00e1t hi\u1ec7n s\u00e2u b\u1ecd v\u00e0o n\u0103m 2010 \u0111\u00e3 d\u1eabn \u0111\u1ebfn c\u00e1c cu\u1ed9c \u0111i\u1ec1u tra s\u00e2u r\u1ed9ng<br>b\u1edfi c\u00e1c c\u00f4ng ty b\u1ea3o m\u1eadt nh\u01b0 c\u00f4ng ty Belarus v\u00e0 Kaspersky Labs, ti\u1ebft l\u1ed9 s\u1ef1 ph\u1ee9c t\u1ea1p c\u1ee7a n\u00f3 v\u00e0 g\u1ee3i \u00fd<br>s\u1ef1 tham gia c\u1ee7a m\u1ed9t \u0111\u1ed9i ng\u0169 chuy\u00ean m\u00f4n, c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c t\u00e0i tr\u1ee3 b\u1edfi nh\u00e0 n\u01b0\u1edbc.<\/p>\n\n\n<h2 class=\"wp-block-heading translation-block\" id=\"flameskywiper-pushing-the-boundaries-of-malwarecomplexity\"><br>Flame, c\u00f2n \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn v\u1edbi t\u00ean g\u1ecdi <a href=\"https:\/\/www.gdatasoftware.com\/blog\/2012\/06\/24048-flame-flamer-skywiper-most-complex-sophisticated-malware-ever-found\" target=\"_blank\" rel=\"noreferrer noopener\">Skywiper, ph\u00e1t hi\u1ec7n v\u00e0o n\u0103m 2012<\/a>, \u0111\u1ea1i di\u1ec7n cho m\u1ed9t m\u1ee9c \u0111\u1ed9 tinh vi m\u1edbi trong ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i,<br>ch\u1ee7 y\u1ebfu nh\u1eafm v\u00e0o Iran. \u0110\u01b0\u1ee3c trang b\u1ecb c\u00e1c kh\u1ea3 n\u0103ng c\u1ee7a m\u1ed9t trojan, s\u00e2u v\u00e0 keylogger, Flame c\u00f3 th\u1ec3 ghi l\u1ea1i m\u1ed9t<br>d\u1ea3i r\u1ed9ng c\u00e1c lo\u1ea1i d\u1eef li\u1ec7u, t\u1eeb l\u01b0u l\u01b0\u1ee3ng m\u1ea1ng \u0111\u1ebfn cu\u1ed9c tr\u00f2 chuy\u1ec7n Skype, v\u00e0 th\u1eadm ch\u00ed x\u00e2m nh\u1eadp c\u00e1c k\u1ebft n\u1ed1i Bluetooth<br>\u0111\u1ec3 tr\u00edch xu\u1ea5t d\u1eef li\u1ec7u. K\u00edch th\u01b0\u1edbc l\u1edbn v\u00e0 \u0111\u1ed9 ph\u1ee9c t\u1ea1p c\u1ee7a n\u00f3 \u0111\u00e1nh d\u1ea5u n\u00f3 l\u00e0 m\u1ed9t trong nh\u1eefng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ti\u00ean ti\u1ebfn nh\u1ea5t<br>t\u1eebng \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n, cho th\u1ea5y m\u1ed9t s\u1ef1 \u0111\u1ea7u t\u01b0 l\u1edbn v\u00e0o vi\u1ec7c ph\u00e1t tri\u1ec3n c\u1ee7a n\u00f3.<\/h2>\n\n\n<p><br>Ng\u1ecdn l\u1eeda, c\u00f2n \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 <a href=\"https:\/\/www.gdatasoftware.com\/blog\/2012\/06\/24048-flame-flamer-skywiper-most-complex-sophisticated-malware-ever-found\" target=\"_blank\" rel=\"noreferrer noopener\">Skywiper, \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n v\u00e0o n\u0103m 2012<\/a>, \u0111\u1ea1i di\u1ec7n cho m\u1ed9t c\u1ea5p \u0111\u1ed9 tinh vi m\u1edbi c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i,<br>ch\u1ee7 y\u1ebfu nh\u1eafm v\u00e0o Iran. \u0110\u01b0\u1ee3c trang b\u1ecb kh\u1ea3 n\u0103ng c\u1ee7a m\u1ed9t trojan, s\u00e2u v\u00e0 keylogger, Flame c\u00f3 th\u1ec3 ghi l\u1ea1i<br>nhi\u1ec1u lo\u1ea1i d\u1eef li\u1ec7u, t\u1eeb l\u01b0u l\u01b0\u1ee3ng m\u1ea1ng \u0111\u1ebfn c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n tr\u00ean Skype v\u00e0 th\u1eadm ch\u00ed x\u00e2m nh\u1eadp Bluetooth<br>k\u1ebft n\u1ed1i \u0111\u1ec3 tr\u00edch xu\u1ea5t d\u1eef li\u1ec7u. K\u00edch th\u01b0\u1edbc l\u1edbn v\u00e0 \u0111\u1ed9 ph\u1ee9c t\u1ea1p c\u1ee7a n\u00f3 \u0111\u00e3 \u0111\u00e1nh d\u1ea5u n\u00f3 l\u00e0 m\u1ed9t trong nh\u1eefng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ti\u00ean ti\u1ebfn nh\u1ea5t<br>t\u1eebng th\u1ea5y, cho th\u1ea5y s\u1ef1 \u0111\u1ea7u t\u01b0 \u0111\u00e1ng k\u1ec3 v\u00e0o qu\u00e1 tr\u00ecnh ph\u00e1t tri\u1ec3n.<\/p>\n\n\n<h2 class=\"wp-block-heading translation-block\" id=\"the-role-of-cryptography-and-hashing-incybersecurity\">Vai tr\u00f2 c\u1ee7a M\u00e3 h\u00f3a v\u00e0 Hashing trong<br>an ninh m\u1ea1ng<br><\/h2>\n\n\n<p>M\u1eb7c d\u00f9 m\u1ed1i \u0111e d\u1ecda tr\u1ef1c ti\u1ebfp c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i do nh\u00e0 n\u01b0\u1edbc t\u00e0i tr\u1ee3 \u0111\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng th\u00f4ng th\u01b0\u1eddng l\u00e0 r\u1ea5t nh\u1ecf, nh\u01b0ng nh\u1eefng s\u1ef1 c\u1ed1 n\u00e0y l\u00e0m n\u1ed5i b\u1eadt<br>t\u1ea7m quan tr\u1ecdng c\u1ee7a c\u00e1c ho\u1ea1t \u0111\u1ed9ng b\u1ea3o m\u1eadt m\u1ea1nh m\u1ebd v\u00e0 nh\u1eefng th\u00e1ch th\u1ee9c m\u00e0 c\u00e1c c\u00f4ng ty ph\u1ea7n m\u1ec1m ph\u1ea3i \u0111\u1ed1i m\u1eb7t trong<br>\u0111\u1ea3m b\u1ea3o an ninh s\u1ea3n ph\u1ea9m. S\u1ef1 ti\u1ebfn b\u1ed9 c\u1ee7a s\u1ee9c m\u1ea1nh t\u00ednh to\u00e1n li\u00ean t\u1ee5c th\u00e1ch th\u1ee9c an ninh c\u1ee7a<br>thu\u1eadt to\u00e1n m\u00e3 h\u00f3a, khi\u1ebfn vi\u1ec7c s\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m c\u0169 ng\u00e0y c\u00e0ng tr\u1edf n\u00ean r\u1ee7i ro.<br><\/p>\n\n\n\n<p><strong>K\u1ebft lu\u1eadn<\/strong><br>Vi\u1ec7c hi\u1ec3u \u0111\u01b0\u1ee3c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tinh vi nh\u01b0 Stunt, Duqu v\u00e0 Flame l\u00e0 r\u1ea5t quan tr\u1ecdng \u0111\u1ec3 n\u1eafm b\u1eaft<br>s\u1ef1 ph\u1ee9c t\u1ea1p v\u00e0 \u00e1p l\u1ef1c trong l\u0129nh v\u1ef1c an ninh m\u1ea1ng. \u0110\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng trung b\u00ecnh, r\u1ee7i ro ch\u00ednh b\u1eaft ngu\u1ed3n t\u1eeb<br>c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt k\u00e9m nh\u01b0 s\u1eed d\u1ee5ng l\u1ea1i m\u1eadt kh\u1ea9u ho\u1eb7c duy tr\u00ec c\u00e1c t\u00e0i kho\u1ea3n kh\u00f4ng c\u1ea7n thi\u1ebft. Nh\u1eadn th\u1ee9c v\u1ec1 nh\u1eefng \u0111i\u1ec1u n\u00e0y<br>C\u00e1c m\u1ed1i \u0111e d\u1ecda an ninh m\u1ea1ng nghi\u00eam tr\u1ecdng nh\u1ea5n m\u1ea1nh t\u1ea7m quan tr\u1ecdng c\u1ee7a vi\u1ec7c duy tr\u00ec an ninh c\u1ea3nh gi\u00e1c v\u00e0 c\u1eadp nh\u1eadt.<br>c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng ti\u1ec1m \u1ea9n. B\u1ed1i c\u1ea3nh \u0111ang thay \u0111\u1ed5i<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>\u0110\u1ecdc th\u00eam v\u00e0 T\u00e0i nguy\u00ean<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"translation-block\">TechCrunch: <a href=\"https:\/\/consent.yahoo.com\/v2\/collectConsent?sessionId=3_cc-session_fac35bff-7518-489d-8042-052e65ec76a0\" target=\"_blank\" rel=\"noreferrer noopener\">C\u00e1ch M\u1ef9 th\u00e1o d\u1ee1 m\u1ed9t m\u1ea1ng l\u01b0\u1edbi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u01b0\u1ee3c c\u00e1c \u0111i\u1ec7p vi\u00ean Nga s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u00e1nh c\u1eafp b\u00ed m\u1eadt ch\u00ednh ph\u1ee7<\/a> \u2013 B\u00e0i vi\u1ebft n\u00e0y<br>th\u1ea3o lu\u1eadn v\u1ec1 c\u00e1ch ch\u00ednh ph\u1ee7 M\u1ef9 \u0111\u00e3 l\u00e0m gi\u00e1n \u0111o\u1ea1n m\u1ed9t chi\u1ebfn d\u1ecbch gi\u00e1n \u0111i\u1ec7p m\u1ea1ng d\u00e0i h\u1ea1n c\u1ee7a Nga do Turla th\u1ef1c hi\u1ec7n, \u0111\u00e3<br>\u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u1ea1y c\u1ea3m t\u1eeb c\u00e1c ch\u00ednh ph\u1ee7 M\u1ef9 v\u00e0 NATO.<\/li>\n\n\n\n<li>Kaspersky: Cu\u1ed9c t\u1ea5n c\u00f4ng ho\u00e0nh tr\u00e1ng c\u1ee7a Turla (r\u1eafn\/Uroburos) \u2013 <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/epic-turla-snake-malware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">Kaspersky cung c\u1ea5p t\u1ed5ng quan v\u1ec1 Turla<\/a>, c\u00f2n \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 R\u1eafn ho\u1eb7c<br>Uroburos, m\u00f4 t\u1ea3 n\u00f3 nh\u01b0 m\u1ed9t trong nh\u1eefng chi\u1ebfn d\u1ecbch gi\u00e1n \u0111i\u1ec7p m\u1ea1ng \u0111ang di\u1ec5n ra tinh vi nh\u1ea5t. B\u00e0i vi\u1ebft c\u0169ng \u0111\u01b0a ra c\u00e1c m\u1eb9o v\u1ec1 c\u00e1ch<br>\u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea1n kh\u1ecfi nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng nh\u01b0 v\u1eady.<\/li>\n\n\n\n<li>Tin t\u1ee9c Hacker: <a href=\"https:\/\/thehackernews.com\/2023\/05\/us-government-neutralizes-russias-most.html\" target=\"_blank\" rel=\"noreferrer noopener\">Ch\u00ednh ph\u1ee7 Hoa K\u1ef3 v\u00f4 hi\u1ec7u h\u00f3a c\u00f4ng c\u1ee5 gi\u00e1n \u0111i\u1ec7p m\u1ea1ng tinh vi nh\u1ea5t c\u1ee7a Nga<\/a> \u2013 B\u00e0i vi\u1ebft n\u00e0y n\u00eau chi ti\u1ebft<br>nh\u1eefng n\u1ed7 l\u1ef1c c\u1ee7a ch\u00ednh ph\u1ee7 Hoa K\u1ef3 trong vi\u1ec7c v\u00f4 hi\u1ec7u h\u00f3a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Snake, m\u1ed9t c\u00f4ng c\u1ee5 gi\u00e1n \u0111i\u1ec7p m\u1ea1ng tinh vi \u0111\u01b0\u1ee3c Turla s\u1eed d\u1ee5ng, \u0111\u00e3<br>\u0111\u00e3 \u0111\u00e1nh c\u1eafp c\u00e1c t\u00e0i li\u1ec7u nh\u1ea1y c\u1ea3m t\u1eeb nhi\u1ec1u h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh \u1edf nhi\u1ec1u qu\u1ed1c gia.<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>V\u1ee5 x\u00e2m ph\u1ea1m tinh vi c\u1ee7a Turla v\u00e0o c\u00e1c ch\u00ednh ph\u1ee7 Li\u00ean minh Ch\u00e2u \u00c2uL\u0129nh v\u1ef1c chi\u1ebfn tranh m\u1ea1ng \u0111\u00e3 ch\u1ee9ng ki\u1ebfn s\u1ef1 ti\u1ebfn b\u1ed9 \u0111\u00e1ng k\u1ec3 v\u1edbi s\u1ef1 ra \u0111\u1eddi c\u1ee7a Turla, m\u1ed9t nh\u00f3m tin t\u1eb7c n\u1ed5i ti\u1ebfng v\u1edbi c\u00e1c ph\u01b0\u01a1ng ph\u00e1p x\u00e2m nh\u1eadp tinh vi\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Kh\u00e1m ph\u00e1 chuy\u00ean s\u00e2u v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i do nh\u00e0 n\u01b0\u1edbc t\u00e0i tr\u1ee3<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2434,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2431","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In-Depth Exploration of State Sponsored Malware | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In-Depth Exploration of State Sponsored Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Turla&#8217;s Sophisticated Breach of European Union GovernmentsThe realm of cyber warfare witnessed a significant advancement with the advent of Turla, a hacker groupknown for its sophisticated methods in breaching the&hellip; Continue reading In-Depth Exploration of State Sponsored Malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-23T19:54:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-23T20:05:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"956\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"In-Depth Exploration of State Sponsored Malware\",\"datePublished\":\"2023-12-23T19:54:06+00:00\",\"dateModified\":\"2023-12-23T20:05:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\"},\"wordCount\":864,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\",\"name\":\"In-Depth Exploration of State Sponsored Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"datePublished\":\"2023-12-23T19:54:06+00:00\",\"dateModified\":\"2023-12-23T20:05:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg\",\"width\":956,\"height\":515,\"caption\":\"In-Depth Exploration of State Sponsored Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In-Depth Exploration of State Sponsored Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kh\u00e1m Ph\u00e1 S\u00e2u V\u1ec1 Ph\u1ea7n M\u1ec1m \u0110\u1ed9c H\u1ea1i Do Nh\u00e0 N\u01b0\u1edbc T\u00e0i Tr\u1ee3 | B\u00e1o C\u00e1o An Ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc\/","og_locale":"vi_VN","og_type":"article","og_title":"In-Depth Exploration of State Sponsored Malware | Security Briefing","og_description":"Turla&#8217;s Sophisticated Breach of European Union GovernmentsThe realm of cyber warfare witnessed a significant advancement with the advent of Turla, a hacker groupknown for its sophisticated methods in breaching the&hellip; Continue reading In-Depth Exploration of State Sponsored Malware","og_url":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/kham-pha-sau-ve-malware-duoc-tai-tro-boi-nha-nuoc\/","og_site_name":"Security Briefing","article_published_time":"2023-12-23T19:54:06+00:00","article_modified_time":"2023-12-23T20:05:06+00:00","og_image":[{"width":956,"height":515,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"4 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"In-Depth Exploration of State Sponsored Malware","datePublished":"2023-12-23T19:54:06+00:00","dateModified":"2023-12-23T20:05:06+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/"},"wordCount":864,"commentCount":0,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","articleSection":["Malware"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/","url":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/","name":"Kh\u00e1m Ph\u00e1 S\u00e2u V\u1ec1 Ph\u1ea7n M\u1ec1m \u0110\u1ed9c H\u1ea1i Do Nh\u00e0 N\u01b0\u1edbc T\u00e0i Tr\u1ee3 | B\u00e1o C\u00e1o An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","datePublished":"2023-12-23T19:54:06+00:00","dateModified":"2023-12-23T20:05:06+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/12\/In-Depth-Exploration-of-State-Sponsored-Malware.jpg","width":956,"height":515,"caption":"In-Depth Exploration of State Sponsored Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/in-depth-exploration-of-state-sponsored-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"In-Depth Exploration of State Sponsored Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=2431"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2431\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/2434"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=2431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=2431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=2431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}