{"id":2636,"date":"2024-09-02T16:20:55","date_gmt":"2024-09-02T16:20:55","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2636"},"modified":"2024-09-02T16:20:58","modified_gmt":"2024-09-02T16:20:58","slug":"tinba-virus-trojan-ngan-hang-doc-hai","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/tinba-virus-trojan-ngan-hang-doc-hai\/","title":{"rendered":"Virus Tinba: M\u1ed9t Trojan ng\u00e2n h\u00e0ng \u0111\u1ed9c h\u1ea1i"},"content":{"rendered":"<p>Th\u1ebf gi\u1edbi an ninh m\u1ea1ng \u0111ang ch\u01a1i tr\u00f2 m\u00e8o v\u1eddn chu\u1ed9t \u0111\u1ec3 c\u1ed1 g\u1eafng v\u01b0\u1ee3t qua c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng \u0111ang ph\u00e1t tri\u1ec3n, trong \u0111\u00f3 c\u00f3 virus Tinba kh\u00e9t ti\u1ebfng \u0111\u00e3 t\u1ea5n c\u00f4ng h\u00e0ng tri\u1ec7u ng\u01b0\u1eddi d\u00f9ng tr\u00ean to\u00e0n th\u1ebf gi\u1edbi. Tinba, vi\u1ebft t\u1eaft c\u1ee7a \u201cTiny Banker,\u201d do k\u00edch th\u01b0\u1edbc t\u1ec7p nh\u1ecf, nh\u01b0ng th\u1ef1c t\u1ebf, n\u00f3 c\u00f3 t\u00e1c \u0111\u1ed9ng kh\u00f4ng h\u1ec1 nh\u1ecf. Trong b\u00e0i vi\u1ebft n\u00e0y, ch\u00fang ta s\u1ebd th\u1ea3o lu\u1eadn v\u1ec1 virus Tinba l\u00e0 g\u00ec, c\u00e1ch n\u00f3 ho\u1ea1t \u0111\u1ed9ng, m\u1ed9t s\u1ed1 th\u00f4ng tin n\u1ec1n v\u00e0 nh\u1eefng g\u00ec b\u1ea1n c\u00f3 th\u1ec3 l\u00e0m \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi m\u1ed1i \u0111e d\u1ecda m\u1ea1ng n\u00e0y.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-tinba-virus\"><strong>Virus Tinba l\u00e0 g\u00ec?<\/strong><\/h2>\n\n\n<p>Tinba l\u00e0 m\u1ed9t lo\u1ea1i <a href=\"https:\/\/us.norton.com\/blog\/malware\/what-is-a-trojan\" target=\"_blank\" rel=\"noreferrer noopener\">ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Trojan<\/a> nh\u1eafm v\u00e0o th\u00f4ng tin t\u00e0i ch\u00ednh nh\u1ea1y c\u1ea3m. M\u1ecdi th\u1ee9 t\u1eeb th\u00f4ng tin \u0111\u0103ng nh\u1eadp ng\u00e2n h\u00e0ng tr\u1ef1c tuy\u1ebfn \u0111\u1ebfn chi ti\u1ebft th\u1ebb t\u00edn d\u1ee5ng \u0111\u1ec1u r\u01a1i v\u00e0o b\u1eaby c\u1ee7a n\u00f3. Ngo\u00e0i ra, t\u1ea5t c\u1ea3 th\u00f4ng tin c\u00e1 nh\u00e2n kh\u00e1c c\u0169ng \u0111\u01b0\u1ee3c thu th\u1eadp v\u00e0 s\u1eed d\u1ee5ng \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c h\u00e0nh vi gian l\u1eadn t\u00e0i ch\u00ednh kh\u00e1c nhau. M\u1eb7c d\u00f9 ch\u1ec9 c\u00f3 20KB, n\u00f3 v\u1eeba hi\u1ec7u qu\u1ea3 v\u1eeba nguy hi\u1ec3m.<\/p>\n\n\n\n<p>N\u00f3 ho\u1ea1t \u0111\u1ed9ng b\u1eb1ng c\u00e1ch t\u1ef1 ti\u00eam v\u00e0o tr\u00ecnh duy\u1ec7t web c\u1ee7a ng\u01b0\u1eddi d\u00f9ng v\u00e0 sau \u0111\u00f3 gi\u00e1m s\u00e1t v\u00e0 ch\u1eb7n c\u00e1c phi\u00ean ng\u00e2n h\u00e0ng tr\u1ef1c tuy\u1ebfn. Ngay khi Tinba ph\u00e1t hi\u1ec7n ng\u01b0\u1eddi d\u00f9ng \u0111\u00e3 \u0111\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n c\u1ee7a h\u1ecd, n\u00f3 s\u1ebd thu th\u1eadp th\u00f4ng tin \u0111\u0103ng nh\u1eadp v\u00e0 c\u00e1c th\u00f4ng tin quan tr\u1ecdng kh\u00e1c v\u00e0 g\u1eedi ch\u00fang cho k\u1ebb t\u1ea5n c\u00f4ng. H\u01a1n n\u1eefa, Tinba c\u0169ng c\u00f3 kh\u1ea3 n\u0103ng thay \u0111\u1ed5i nh\u1eefng g\u00ec xu\u1ea5t hi\u1ec7n tr\u00ean m\u00e0n h\u00ecnh c\u1ee7a n\u1ea1n nh\u00e2n, cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng th\u1ef1c hi\u1ec7n c\u00e1c lo\u1ea1i gian l\u1eadn kh\u00e1c \u0111\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-history-of-tinba\"><strong>L\u1ecbch s\u1eed c\u1ee7a Tinba<\/strong><\/h3>\n\n\n<p>Tinba l\u1ea7n \u0111\u1ea7u ti\u00ean xu\u1ea5t hi\u1ec7n trong b\u1ed1i c\u1ea3nh an ninh m\u1ea1ng v\u00e0o n\u0103m 2012. N\u00f3 \u0111\u00e3 ki\u1ebfm \u0111\u01b0\u1ee3c danh ti\u1ebfng kh\u00e9t ti\u1ebfng nh\u1edd hi\u1ec7u qu\u1ea3 v\u00e0 t\u1ed1c \u0111\u1ed9 lan truy\u1ec1n c\u1ee7a n\u00f3. Ban \u0111\u1ea7u, Tinba \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng cho c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 m\u1ee5c ti\u00eau v\u00e0o c\u00e1c t\u1ed5 ch\u1ee9c t\u00e0i ch\u00ednh c\u1ee5 th\u1ec3 v\u00e0 ti\u1ebfp t\u1ee5c ph\u00e1t tri\u1ec3n v\u00e0 lan r\u1ed9ng v\u00e0o c\u00e1c l\u0129nh v\u1ef1c l\u1edbn h\u01a1n th\u00f4ng qua Internet. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u01b0\u1ee3c ph\u00e2n ph\u1ed1i qua <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" target=\"_blank\" rel=\"noreferrer noopener\">email l\u1eeba \u0111\u1ea3o<\/a>, c\u00e1c trang web \u0111\u1ed9c h\u1ea1i, v\u00e0 th\u1eadm ch\u00ed l\u00e0 m\u1ed9t ph\u1ea7n c\u1ee7a c\u00e1c ho\u1ea1t \u0111\u1ed9ng botnet l\u1edbn. \u0110i\u1ec1u \u0111\u00e1ng ch\u00fa \u00fd nh\u1ea5t v\u1ec1 Tinba l\u00e0 n\u00f3 \u0111\u00e3 tr\u00e1nh \u0111\u01b0\u1ee3c s\u1ef1 ph\u00e1t hi\u1ec7n c\u1ee7a h\u1ea7u h\u1ebft c\u00e1c ph\u1ea7n m\u1ec1m AV truy\u1ec1n th\u1ed1ng. K\u00edch th\u01b0\u1edbc c\u1ef1c k\u1ef3 nh\u1ecf g\u1ecdn v\u00e0 t\u00ednh ch\u1ea5t l\u00e9n l\u00fat c\u1ee7a n\u00f3 khi\u1ebfn n\u00f3 g\u1ea7n nh\u01b0 v\u00f4 h\u00ecnh \u0111\u1ed1i v\u1edbi c\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u an ninh m\u1ea1ng \u0111ang n\u1ed7 l\u1ef1c x\u00e1c \u0111\u1ecbnh v\u00e0 v\u00f4 hi\u1ec7u h\u00f3a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i. Theo th\u1eddi gian, Tinba li\u00ean t\u1ee5c ph\u00e1t tri\u1ec3n, v\u1edbi m\u1ed7i phi\u00ean b\u1ea3n m\u1edbi tr\u1edf n\u00ean ph\u1ee9c t\u1ea1p h\u01a1n nh\u1eb1m tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n l\u00e2u h\u01a1n v\u00e0 l\u00e2y nhi\u1ec5m nhi\u1ec1u ng\u01b0\u1eddi d\u00f9ng h\u01a1n.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-tinba-works\"><strong>C\u00e1ch Tinba Ho\u1ea1t \u0110\u1ed9ng<\/strong><\/h3>\n\n\n<p>Nhi\u1ec5m tr\u00f9ng th\u01b0\u1eddng x\u1ea3y ra th\u00f4ng qua email l\u1eeba \u0111\u1ea3o. \u0110\u00e2y l\u00e0 nh\u1eefng tin nh\u1eafn \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 tr\u00f4ng c\u00f3 v\u1ebb ch\u00e2n th\u1eadt, nh\u01b0 th\u1ec3 ch\u00fang \u0111\u1ebfn t\u1eeb m\u1ed9t ngu\u1ed3n \u0111\u00e1ng tin c\u1eady: c\u00f3 th\u1ec3 l\u00e0 ng\u00e2n h\u00e0ng, nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5, ho\u1eb7c th\u1eadm ch\u00ed l\u00e0 \u0111\u1ed3ng nghi\u1ec7p. Ch\u00fang th\u01b0\u1eddng ch\u1ee9a m\u1ed9t li\u00ean k\u1ebft ho\u1eb7c t\u1ec7p \u0111\u00ednh k\u00e8m b\u1eaft \u0111\u1ea7u t\u1ea3i xu\u1ed1ng Trojan Tinba v\u00e0o thi\u1ebft b\u1ecb khi nh\u1ea5p v\u00e0o ho\u1eb7c m\u1edf. Sau khi c\u00e0i \u0111\u1eb7t, Tinba ho\u1ea1t \u0111\u1ed9ng l\u1eb7ng l\u1ebd trong n\u1ec1n, quan s\u00e1t th\u1ee5 \u0111\u1ed9ng ho\u1ea1t \u0111\u1ed9ng c\u1ee7a ng\u01b0\u1eddi d\u00f9ng tr\u1ef1c tuy\u1ebfn. Khi ng\u01b0\u1eddi d\u00f9ng truy c\u1eadp v\u00e0o m\u1ed9t trang web ng\u00e2n h\u00e0ng, Trojan s\u1ebd ho\u1ea1t \u0111\u1ed9ng. N\u00f3 kh\u00f4ng ch\u1ec9 thu th\u1eadp th\u00f4ng tin \u0111\u0103ng nh\u1eadp c\u1ee7a ng\u01b0\u1eddi d\u00f9ng m\u00e0 c\u00f2n b\u1ea5t k\u1ef3 th\u00f4ng tin n\u00e0o kh\u00e1c \u0111\u01b0\u1ee3c nh\u1eadp tr\u00ean trang web. Tinba c\u0169ng c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n \u201cweb injects,\u201d thay \u0111\u1ed5i giao di\u1ec7n c\u1ee7a trang web ng\u00e2n h\u00e0ng \u0111\u1ec3 l\u1eeba ng\u01b0\u1eddi d\u00f9ng cung c\u1ea5p th\u00eam th\u00f4ng tin: c\u00e2u tr\u1ea3 l\u1eddi cho c\u00e2u h\u1ecfi b\u1ea3o m\u1eadt, m\u1eadt kh\u1ea9u m\u1ed9t l\u1ea7n, v.v.<\/p>\n\n\n\n<p>\u0110i\u1ec1u th\u1ef1c s\u1ef1 l\u00e0m cho Tinba \u0111\u1eb7c bi\u1ec7t nguy hi\u1ec3m l\u00e0 c\u00e1ch n\u00f3 c\u00f3 th\u1ec3 thao t\u00fang c\u00e1c phi\u00ean web\u2014v\u00ed d\u1ee5, t\u1ea1o ra <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/all\/fake-pop-up\/7498aa68-db84-47ab-a2e7-a2e28a705d62\" target=\"_blank\" rel=\"noreferrer noopener\">c\u1eeda s\u1ed5 pop-up gi\u1ea3<\/a> y\u00eau c\u1ea7u th\u00eam th\u00f4ng tin m\u00e0 ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 v\u00f4 t\u00ecnh cung c\u1ea5p. Th\u00f4ng tin n\u00e0y sau \u0111\u00f3 \u0111\u01b0\u1ee3c g\u1eedi tr\u1ef1c ti\u1ebfp \u0111\u1ebfn k\u1ebb t\u1ea5n c\u00f4ng, ng\u01b0\u1eddi c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng n\u00f3 \u0111\u1ec3 truy c\u1eadp v\u00e0o t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng c\u1ee7a n\u1ea1n nh\u00e2n, chuy\u1ec3n ti\u1ec1n ho\u1eb7c th\u1ef1c hi\u1ec7n c\u00e1c giao d\u1ecbch mua gian l\u1eadn.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tinba\"><strong>B\u1ea3o V\u1ec7 B\u1ea3n Th\u00e2n Kh\u1ecfi Tinba<\/strong><\/h2>\n\n\n<p>Tr\u01b0\u1edbc m\u1ee9c \u0111\u1ed9 nghi\u00eam tr\u1ecdng c\u1ee7a virus Tinba, ph\u00f2ng th\u1ee7 ch\u1ee7 \u0111\u1ed9ng ch\u1ed1ng l\u1ea1i m\u1ed1i \u0111e d\u1ecda n\u00e0y v\u00e0 c\u00e1c m\u1ed1i \u0111e d\u1ecda t\u01b0\u01a1ng t\u1ef1 l\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft. C\u00e1c th\u1ef1c h\u00e0nh t\u1ed1t cho an ninh bao g\u1ed3m:<\/p>\n\n\n\n<p><strong>C\u1ea9n Th\u1eadn V\u1edbi Email L\u1eeba \u0110\u1ea3o:<\/strong> H\u00e3y r\u1ea5t c\u1ea9n th\u1eadn khi m\u1edf email c\u1ee7a b\u1ea1n, \u0111\u1eb7c bi\u1ec7t l\u00e0 t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng r\u00f5. Kh\u00f4ng bao gi\u1edd nh\u1ea5p v\u00e0o li\u00ean k\u1ebft ho\u1eb7c t\u1ea3i xu\u1ed1ng t\u1ec7p \u0111\u00ednh k\u00e8m n\u1ebfu b\u1ea1n kh\u00f4ng ch\u1eafc ch\u1eafn v\u1ec1 \u0111\u1ed9 an to\u00e0n c\u1ee7a ch\u00fang. X\u00e1c minh \u0111\u1ecba ch\u1ec9 email c\u1ee7a ng\u01b0\u1eddi g\u1eedi v\u00e0 b\u1ea5t k\u1ef3 d\u1ea5u hi\u1ec7u n\u00e0o c\u00f3 th\u1ec3 ch\u1ec9 ra m\u1ed9t email l\u1eeba \u0111\u1ea3o.<\/p>\n\n\n\n<p><strong>S\u1eed D\u1ee5ng M\u1eadt Kh\u1ea9u M\u1ea1nh, \u0110\u1ed9c Nh\u1ea5t:<\/strong> M\u1eadt kh\u1ea9u m\u1ea1nh v\u00e0 \u0111\u1ed9c nh\u1ea5t l\u00e0 r\u1ea5t quan tr\u1ecdng cho t\u1ea5t c\u1ea3 c\u00e1c t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng tr\u1ef1c tuy\u1ebfn v\u00e0 nh\u1ea1y c\u1ea3m c\u1ee7a b\u1ea1n. Kh\u00f4ng bao gi\u1edd s\u1eed d\u1ee5ng l\u1ea1i m\u1eadt kh\u1ea9u t\u1ea1i nhi\u1ec1u trang web, v\u00e0 h\u00e3y c\u00e2n nh\u1eafc s\u1eed d\u1ee5ng m\u1ed9t tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u \u0111\u1ec3 theo d\u00f5i an to\u00e0n th\u00f4ng tin \u0111\u0103ng nh\u1eadp c\u1ee7a b\u1ea1n.<\/p>\n\n\n\n<p><strong>K\u00edch Ho\u1ea1t X\u00e1c Th\u1ef1c Hai Y\u1ebfu T\u1ed1 (2FA):<\/strong> N\u1ebfu c\u00f3 th\u1ec3, h\u00e3y k\u00edch ho\u1ea1t x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 cho c\u00e1c t\u00e0i kho\u1ea3n tr\u1ef1c tuy\u1ebfn c\u1ee7a b\u1ea1n. \u0110i\u1ec1u n\u00e0y th\u00eam m\u1ed9t l\u1edbp b\u1ea3o m\u1eadt b\u1ed5 sung b\u1eb1ng c\u00e1ch y\u00eau c\u1ea7u m\u1ed9t h\u00ecnh th\u1ee9c x\u00e1c minh th\u1ee9 hai, ch\u1eb3ng h\u1ea1n nh\u01b0 m\u00e3 \u0111\u01b0\u1ee3c g\u1eedi \u0111\u1ebfn \u0111i\u1ec7n tho\u1ea1i c\u1ee7a b\u1ea1n, tr\u01b0\u1edbc khi truy c\u1eadp v\u00e0o t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n.<\/p>\n\n\n\n<p><strong>Gi\u1eef Ph\u1ea7n M\u1ec1m C\u1ee7a B\u1ea1n Lu\u00f4n C\u1eadp Nh\u1eadt:<\/strong> \u0110\u1ea3m b\u1ea3o r\u1eb1ng h\u1ec7 \u0111i\u1ec1u h\u00e0nh, tr\u00ecnh duy\u1ec7t web c\u1ee7a b\u1ea1n v\u00e0 <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/understanding-anti-virus-software\" target=\"_blank\" rel=\"noreferrer noopener\">ph\u1ea7n m\u1ec1m di\u1ec7t virus<\/a> \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt th\u01b0\u1eddng xuy\u00ean. T\u1ed9i ph\u1ea1m m\u1ea1ng th\u01b0\u1eddng l\u1ee3i d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng trong ph\u1ea7n m\u1ec1m l\u1ed7i th\u1eddi, v\u00ec v\u1eady gi\u1eef cho m\u1ecdi th\u1ee9 lu\u00f4n hi\u1ec7n h\u00e0nh l\u00e0 m\u1ed9t ph\u00f2ng th\u1ee7 quan tr\u1ecdng.<\/p>\n\n\n\n<p>V\u00ec Tinba \u0111\u00e3 \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 tr\u00e1nh b\u1ecb ph\u00e1t hi\u1ec7n, c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m di\u1ec7t virus \u0111\u00e1ng tin c\u1eady c\u00f3 th\u1ec3 gi\u00fap x\u00e1c \u0111\u1ecbnh ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 ch\u1eb7n n\u00f3. Ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 ph\u00e1t hi\u1ec7n b\u1ea5t k\u1ef3 m\u1ed1i \u0111e d\u1ecda ti\u1ec1m \u1ea9n n\u00e0o tr\u00ean thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n.<\/p>\n\n\n\n<p><strong>Theo D\u00f5i T\u00e0i Kho\u1ea3n C\u1ee7a B\u1ea1n Th\u01b0\u1eddng Xuy\u00ean:<\/strong> Th\u01b0\u1eddng xuy\u00ean ki\u1ec3m tra sao k\u00ea ng\u00e2n h\u00e0ng v\u00e0 c\u00e1c t\u00e0i kho\u1ea3n tr\u1ef1c tuy\u1ebfn c\u1ee7a b\u1ea1n \u0111\u1ec3 ph\u00e1t hi\u1ec7n b\u1ea5t k\u1ef3 ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd n\u00e0o. Ph\u00e1t hi\u1ec7n s\u1edbm c\u00e1c giao d\u1ecbch kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p c\u00f3 th\u1ec3 h\u1ea1n ch\u1ebf thi\u1ec7t h\u1ea1i v\u00e0 gi\u00fap b\u1ea1n h\u00e0nh \u0111\u1ed9ng nhanh ch\u00f3ng.<\/p>\n\n\n\n<p>Virus Tinba l\u00e0 m\u1ed9t l\u1eddi nh\u1eafc nh\u1edf m\u1ea1nh m\u1ebd v\u1ec1 nh\u1eefng r\u1ee7i ro lu\u00f4n hi\u1ec7n h\u1eefu trong th\u1ebf gi\u1edbi k\u1ef9 thu\u1eadt s\u1ed1. L\u00e0 m\u1ed9t Trojan ng\u00e2n h\u00e0ng, m\u1ee5c ti\u00eau ch\u00ednh c\u1ee7a n\u00f3 l\u00e0 \u0111\u00e1nh c\u1eafp th\u00f4ng tin t\u00e0i ch\u00ednh c\u1ee7a b\u1ea1n v\u00e0 c\u00f3 th\u1ec3 g\u00e2y ra m\u1ed9t t\u1ed5n th\u1ea5t l\u1edbn trong t\u00fai ti\u1ec1n c\u1ee7a b\u1ea1n. Hi\u1ec3u c\u00e1ch Tinba ho\u1ea1t \u0111\u1ed9ng v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p ch\u1ee7 \u0111\u1ed9ng \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n s\u1ebd gi\u00fap gi\u1ea3m \u0111\u00e1ng k\u1ec3 kh\u1ea3 n\u0103ng b\u1ea1n tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n kh\u00f4ng ch\u1ec9 c\u1ee7a m\u1ed1i \u0111e d\u1ecda n\u00e0y m\u00e0 c\u00f2n c\u1ee7a c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng kh\u00e1c. H\u00e3y c\u1ea3nh gi\u00e1c, lu\u00f4n c\u1eadp nh\u1eadt th\u00f4ng tin v\u00e0 duy tr\u00ec nh\u1eefng bi\u1ec7n ph\u00e1p ph\u00f2ng th\u1ee7 k\u1ef9 thu\u1eadt s\u1ed1 m\u1ea1nh m\u1ebd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Th\u1ebf gi\u1edbi an ninh m\u1ea1ng ch\u01a1i m\u1ed9t tr\u00f2 ch\u01a1i m\u00e8o v\u1eddn chu\u1ed9t c\u1ed1 g\u1eafng v\u01b0\u1ee3t qua c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng \u0111ang ph\u00e1t tri\u1ec3n, trong \u0111\u00f3 c\u00f3 virus Tinba n\u1ed5i ti\u1ebfng \u0111\u00e3 t\u1ea5n c\u00f4ng h\u00e0ng tri\u1ec7u ng\u01b0\u1eddi d\u00f9ng tr\u00ean to\u00e0n c\u1ea7u. Tinba, vi\u1ebft t\u1eaft c\u1ee7a... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/tinba-virus-trojan-ngan-hang-doc-hai\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Virus Tinba: M\u1ed9t Trojan ng\u00e2n h\u00e0ng \u0111\u1ed9c h\u1ea1i<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,15,21,25,26,29],"tags":[],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-cybersecurity","category-malware","category-phishing","category-scams","category-spyware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tinba Virus: A Nefarious Banking Trojan | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/tinba-virus-trojan-ngan-hang-doc-hai\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; Continue reading Tinba Virus: A Nefarious Banking Trojan\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/tinba-virus-trojan-ngan-hang-doc-hai\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T16:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T16:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\"},\"headline\":\"Tinba Virus: A Nefarious Banking Trojan\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"articleSection\":[\"Cyber Threats\",\"cybersecurity\",\"Malware\",\"Phishing\",\"scams\",\"spyware\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\",\"name\":\"Tinba Virus: A Nefarious Banking Trojan | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"datePublished\":\"2024-09-02T16:20:55+00:00\",\"dateModified\":\"2024-09-02T16:20:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png\",\"width\":1265,\"height\":422,\"caption\":\"Tinba Virus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tinba Virus: A Nefarious Banking Trojan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virus Tinba: M\u1ed9t Trojan Ng\u00e2n H\u00e0ng \u0110\u1ed9c \u00c1c | T\u00f3m T\u1eaft An Ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/tinba-virus-trojan-ngan-hang-doc-hai\/","og_locale":"vi_VN","og_type":"article","og_title":"Tinba Virus: A Nefarious Banking Trojan | Security Briefing","og_description":"The cybersecurity world plays a cat-and-mouse game trying to outsmart evolving cyber threats, among them the notorious Tinba virus that has already attacked several million users worldwide. Tinba, short for&hellip; Continue reading Tinba Virus: A Nefarious Banking Trojan","og_url":"https:\/\/securitybriefing.net\/vi\/moi-de-doa-mang\/tinba-virus-trojan-ngan-hang-doc-hai\/","og_site_name":"Security Briefing","article_published_time":"2024-09-02T16:20:55+00:00","article_modified_time":"2024-09-02T16:20:58+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","type":"image\/png"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"4 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44"},"headline":"Tinba Virus: A Nefarious Banking Trojan","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"},"wordCount":849,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","articleSection":["Cyber Threats","cybersecurity","Malware","Phishing","scams","spyware"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","url":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/","name":"Virus Tinba: M\u1ed9t Trojan Ng\u00e2n H\u00e0ng \u0110\u1ed9c \u00c1c | T\u00f3m T\u1eaft An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","datePublished":"2024-09-02T16:20:55+00:00","dateModified":"2024-09-02T16:20:58+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/09\/Diseno-sin-titulo-47.png","width":1265,"height":422,"caption":"Tinba Virus"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-threats\/tinba-virus-a-nefarious-banking-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tinba Virus: A Nefarious Banking Trojan"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/2637"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}