{"id":300,"date":"2022-06-28T22:07:12","date_gmt":"2022-06-28T22:07:12","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=300"},"modified":"2022-06-28T22:07:12","modified_gmt":"2022-06-28T22:07:12","slug":"gta-nhom-cong-bo-ket-qua-ve-hermit-malware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/gta-nhom-cong-bo-ket-qua-ve-hermit-malware\/","title":{"rendered":"GTA Group c\u00f4ng b\u1ed1 ph\u00e1t hi\u1ec7n v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Nh\u00f3m Ph\u00e2n T\u00edch M\u1ed1i \u0110e D\u1ecda c\u1ee7a Google (TAG) g\u1ea7n \u0111\u00e2y \u0111\u00e3 c\u00f4ng b\u1ed1 nh\u1eefng ph\u00e1t hi\u1ec7n v\u1ec1 ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p r\u1ea5t tinh vi \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 Hermit. RCS Laboratories, m\u1ed9t nh\u00e0 cung c\u1ea5p ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p c\u1ee7a \u00dd, \u0111\u00e3 ph\u00e2n ph\u1ed1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y v\u1edbi s\u1ef1 tr\u1ee3 gi\u00fap c\u1ee7a m\u1ed9t s\u1ed1 Nh\u00e0 Cung C\u1ea5p D\u1ecbch V\u1ee5 Internet (ISP), ch\u1ee7 y\u1ebfu nh\u1eafm v\u00e0o \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh iOS v\u00e0 Android \u1edf Kazakhstan v\u00e0 \u00dd.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hermit Malware l\u00e0 g\u00ec?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit Malware l\u00e0 m\u1ed9t d\u1ea1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tinh vi cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng ki\u1ec3m so\u00e1t ho\u00e0n to\u00e0n thi\u1ebft b\u1ecb c\u1ee7a n\u1ea1n nh\u00e2n. Sau khi c\u00e0i \u0111\u1eb7t, n\u00f3 c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin nh\u1ea1y c\u1ea3m, nghe l\u00e9n c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n v\u00e0 theo d\u00f5i v\u1ecb tr\u00ed c\u1ee7a n\u1ea1n nh\u00e2n.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">C\u00e1c trang web l\u1eeba \u0111\u1ea3o ph\u00e1t t\u00e1n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i khai th\u00e1c l\u1ed7 h\u1ed5ng tr\u00ecnh duy\u1ec7t web tr\u00ean thi\u1ebft b\u1ecb di \u0111\u1ed9ng iOS v\u00e0 Android. K\u1ebb t\u1ea5n c\u00f4ng chuy\u1ec3n h\u01b0\u1edbng ng\u01b0\u1eddi d\u00f9ng \u0111\u1ebfn m\u1ed9t m\u00e1y ch\u1ee7 \u0111\u01b0\u1ee3c ki\u1ec3m so\u00e1t, n\u01a1i ch\u00fang t\u1ea3i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0o thi\u1ebft b\u1ecb c\u1ee7a n\u1ea1n nh\u00e2n.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Sau khi b\u1ecb nhi\u1ec5m, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit thi\u1ebft l\u1eadp k\u1ebft n\u1ed1i t\u1eeb xa \u0111\u1ebfn m\u00e1y ch\u1ee7 c\u1ee7a k\u1ebb t\u1ea5n c\u00f4ng, n\u01a1i n\u00f3 c\u00f3 th\u1ec3 nh\u1eadn l\u1ec7nh t\u1eeb ng\u01b0\u1eddi \u0111i\u1ec1u khi\u1ec3n. C\u00e1c l\u1ec7nh n\u00e0y cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng truy c\u1eadp t\u1eeb xa v\u00e0o b\u1ea5t k\u1ef3 d\u1eef li\u1ec7u n\u00e0o \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef tr\u00ean thi\u1ebft b\u1ecb c\u1ee7a n\u1ea1n nh\u00e2n, bao g\u1ed3m tin nh\u1eafn v\u0103n b\u1ea3n, email, \u1ea3nh v\u00e0 video.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Ai b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Tin t\u1eb7c s\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit ch\u1ee7 y\u1ebfu \u0111\u1ec3 nh\u1eafm v\u00e0o c\u00e1c c\u00e1 nh\u00e2n \u1edf Kazakhstan v\u00e0 \u00dd. Tuy nhi\u00ean, do b\u1ea3n ch\u1ea5t tinh vi c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 \u0111\u00e3 s\u1eed d\u1ee5ng n\u00f3 \u0111\u1ec3 nh\u1eafm v\u00e0o c\u00e1c c\u00e1 nh\u00e2n kh\u00e1c \u1edf c\u00e1c qu\u1ed1c gia kh\u00e1c.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Nh\u1eefng ph\u00e1t hi\u1ec7n t\u1eeb ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit l\u00e0 g\u00ec?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Nh\u1eefng ph\u00e1t hi\u1ec7n do Google TAG c\u00f4ng b\u1ed1 cung c\u1ea5p ph\u00e2n t\u00edch chi ti\u1ebft v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit v\u00e0 kh\u1ea3 n\u0103ng c\u1ee7a n\u00f3. B\u00e1o c\u00e1o c\u0169ng bao g\u1ed3m th\u00f4ng tin v\u1ec1 c\u00e1ch ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u01b0\u1ee3c ph\u00e2n ph\u1ed1i v\u00e0 c\u00e1ch n\u00f3 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn n\u1ea1n nh\u00e2n.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Ph\u00e1t hi\u1ec7n c\u1ee7a Google TAG v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Nh\u1eefng ph\u00e1t hi\u1ec7n c\u1ee7a TAG v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit d\u1ef1a tr\u00ean cu\u1ed9c \u0111i\u1ec1u tra \u0111\u01b0\u1ee3c ti\u1ebfn h\u00e0nh v\u1edbi s\u1ef1 h\u1ee3p t\u00e1c c\u1ee7a m\u1ed9t s\u1ed1 c\u00f4ng ty b\u1ea3o m\u1eadt, bao g\u1ed3m Lookout, Zimperium, ESET v\u00e0 Kaspersky.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Hermit malware l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ti\u00ean ti\u1ebfn cho ph\u00e9p k\u1ebb x\u00e2m nh\u1eadp ki\u1ec3m so\u00e1t ho\u00e0n to\u00e0n h\u1ec7 th\u1ed1ng. N\u00f3 c\u00f3 th\u1ec3 nghe l\u00e9n c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n v\u00e0 theo d\u00f5i ho\u1ea1t \u0111\u1ed9ng c\u1ee7a n\u1ea1n nh\u00e2n sau khi c\u00e0i \u0111\u1eb7t.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">T\u1ea1i sao nh\u1eefng ph\u00e1t hi\u1ec7n n\u00e0y l\u1ea1i c\u00f3 \u00fd ngh\u0129a quan tr\u1ecdng?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Nh\u1eefng ph\u00e1t hi\u1ec7n c\u1ee7a Google TAG r\u1ea5t quan tr\u1ecdng v\u00ec ch\u00fang cung c\u1ea5p c\u00e1i nh\u00ecn s\u00e2u s\u1eafc v\u1ec1 kh\u1ea3 n\u0103ng c\u1ee7a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit v\u00e0 c\u00e1ch tin t\u1eb7c s\u1eed d\u1ee5ng n\u00f3 \u0111\u1ec3 nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1 nh\u00e2n. Nh\u1eefng ph\u00e1t hi\u1ec7n c\u1ee7a Google TAG c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 c\u00e1c n\u1ea1n nh\u00e2n ti\u1ec1m n\u0103ng v\u00e0 h\u1ed7 tr\u1ee3 ph\u00e1t tri\u1ec3n c\u00e1c bi\u1ec7n ph\u00e1p \u0111\u1ed1i ph\u00f3 v\u1edbi lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">L\u00e0m th\u1ebf n\u00e0o t\u00f4i c\u00f3 th\u1ec3 t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">C\u00f3 m\u1ed9t s\u1ed1 \u0111i\u1ec1u b\u1ea1n c\u00f3 th\u1ec3 l\u00e0m \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">- Lu\u00f4n c\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m: K\u1ebb t\u1ea5n c\u00f4ng th\u01b0\u1eddng khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng \u0111\u00e3 \u0111\u01b0\u1ee3c v\u00e1 \u0111\u1ec3 l\u00e2y nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0o thi\u1ebft b\u1ecb. Lu\u00f4n c\u1eadp nh\u1eadt thi\u1ebft b\u1ecb c\u00f3 th\u1ec3 gi\u1ea3m kh\u1ea3 n\u0103ng b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng nh\u01b0 v\u1eady.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Tr\u00e1nh \u0111\u1ebfn th\u0103m\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.webtitan.com\/blog\/how-to-identify-a-malicious-website\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">c\u00e1c trang web \u0111\u1ed9c h\u1ea1i<\/span><\/a><span data-preserver-spaces=\"true\">: Tin t\u1eb7c th\u01b0\u1eddng s\u1eed d\u1ee5ng c\u00e1c trang web \u0111\u1ed9c h\u1ea1i \u0111\u1ec3 ph\u00e1t t\u00e1n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i. Tr\u00e1nh c\u00e1c trang web n\u00e0y c\u00f3 th\u1ec3 l\u00e0m gi\u1ea3m nguy c\u01a1 l\u00e2y nhi\u1ec5m v\u00e0o thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-C\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt uy t\u00edn: Ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt c\u00f3 th\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n kh\u1ecfi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i. H\u00e3y \u0111\u1ea3m b\u1ea3o c\u00e0i \u0111\u1eb7t gi\u1ea3i ph\u00e1p b\u1ea3o m\u1eadt uy t\u00edn v\u00e0 lu\u00f4n c\u1eadp nh\u1eadt.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-C\u00e0i \u0111\u1eb7t c\u00e1c plugin ho\u1eb7c ti\u1ec7n \u00edch m\u1edf r\u1ed9ng b\u1ea3o m\u1eadt ch\u1ea1y qu\u00e9t li\u00ean t\u1ee5c \u0111\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">B\u1eb1ng c\u00e1ch l\u00e0m theo nh\u1eefng m\u1eb9o n\u00e0y, b\u1ea1n c\u00f3 th\u1ec3 t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit v\u00e0 c\u00e1c m\u1ed1i \u0111e d\u1ecda t\u01b0\u01a1ng t\u1ef1 kh\u00e1c. Tuy nhi\u00ean, \u0111i\u1ec1u quan tr\u1ecdng c\u1ea7n nh\u1edb l\u00e0 kh\u00f4ng c\u00f3 bi\u1ec7n ph\u00e1p \u0111\u01a1n l\u1ebb n\u00e0o c\u00f3 hi\u1ec7u qu\u1ea3 100% v\u00e0 lu\u00f4n khuy\u1ebfn ngh\u1ecb n\u00ean c\u00f3 nhi\u1ec1u l\u1edbp b\u1ea3o m\u1eadt.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">K\u1ebft lu\u1eadn<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tinh vi cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng ki\u1ec3m so\u00e1t ho\u00e0n to\u00e0n thi\u1ebft b\u1ecb c\u1ee7a n\u1ea1n nh\u00e2n. K\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng n\u00f3 \u0111\u1ec3 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m, nghe l\u00e9n c\u00e1c cu\u1ed9c tr\u00f2 chuy\u1ec7n v\u00e0 theo d\u00f5i chuy\u1ec3n \u0111\u1ed9ng c\u1ee7a n\u1ea1n nh\u00e2n. B\u1ea1n c\u00f3 th\u1ec3 t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi m\u1ed1i nguy hi\u1ec3m n\u00e0y b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng m\u1ed9t s\u1ed1 chi\u1ebfn l\u01b0\u1ee3c \u0111\u01a1n gi\u1ea3n. Tuy nhi\u00ean, \u0111i\u1ec1u quan tr\u1ecdng c\u1ea7n nh\u1edb l\u00e0 kh\u00f4ng c\u00f3 bi\u1ec7n ph\u00e1p n\u00e0o l\u00e0 ho\u00e0n h\u1ea3o v\u00e0 c\u00e1c chuy\u00ean gia lu\u00f4n khuy\u00ean b\u1ea1n n\u00ean c\u00f3 nhi\u1ec1u l\u1edbp b\u1ea3o m\u1eadt trong thi\u1ebft b\u1ecb c\u1ee7a m\u00ecnh.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Google Threat Analysis Group (TAG) g\u1ea7n \u0111\u00e2y \u0111\u00e3 c\u00f4ng b\u1ed1 nh\u1eefng ph\u00e1t hi\u1ec7n v\u1ec1 ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p c\u1ef1c k\u1ef3 tinh vi \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 Hermit. RCS Laboratories, m\u1ed9t nh\u00e0 cung c\u1ea5p ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p c\u1ee7a \u00dd, \u0111\u00e3 ph\u00e2n ph\u1ed1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y v\u1edbi s\u1ef1 tr\u1ee3 gi\u00fap c\u1ee7a m\u1ed9t s\u1ed1\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/gta-nhom-cong-bo-ket-qua-ve-hermit-malware\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">GTA Group c\u00f4ng b\u1ed1 ph\u00e1t hi\u1ec7n v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i Hermit<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GTA Group Publishes Findings on Hermit Malware | Security Briefing<\/title>\n<meta name=\"description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/gta-nhom-cong-bo-ket-qua-ve-hermit-malware\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/gta-nhom-cong-bo-ket-qua-ve-hermit-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T22:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"GTA Group Publishes Findings on Hermit Malware\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"name\":\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"description\":\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"width\":1000,\"height\":795,\"caption\":\"GTA-Group-Publishes-Findings-on-Hermit-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GTA Group Publishes Findings on Hermit Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nh\u00f3m GTA C\u00f4ng B\u1ed1 Nh\u1eefng Ph\u00e1t Hi\u1ec7n V\u1ec1 Ph\u1ea7n M\u1ec1m \u0110\u1ed9c H\u1ea1i Hermit | B\u00e1o C\u00e1o An Ninh","description":"Nh\u1eefng ph\u00e1t hi\u1ec7n m\u1edbi nh\u1ea5t v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tinh vi Hermit \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n do Ph\u00f2ng th\u00ed nghi\u1ec7m RCS ph\u00e2n ph\u1ed1i.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/gta-nhom-cong-bo-ket-qua-ve-hermit-malware\/","og_locale":"vi_VN","og_type":"article","og_title":"GTA Group Publishes Findings on Hermit Malware | Security Briefing","og_description":"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.","og_url":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/gta-nhom-cong-bo-ket-qua-ve-hermit-malware\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T22:07:12+00:00","og_image":[{"width":1000,"height":795,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"3 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"GTA Group Publishes Findings on Hermit Malware","datePublished":"2022-06-28T22:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"wordCount":610,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","name":"Nh\u00f3m GTA C\u00f4ng B\u1ed1 Nh\u1eefng Ph\u00e1t Hi\u1ec7n V\u1ec1 Ph\u1ea7n M\u1ec1m \u0110\u1ed9c H\u1ea1i Hermit | B\u00e1o C\u00e1o An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","datePublished":"2022-06-28T22:07:12+00:00","description":"Nh\u1eefng ph\u00e1t hi\u1ec7n m\u1edbi nh\u1ea5t v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i tinh vi Hermit \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n do Ph\u00f2ng th\u00ed nghi\u1ec7m RCS ph\u00e2n ph\u1ed1i.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","width":1000,"height":795,"caption":"GTA-Group-Publishes-Findings-on-Hermit-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"GTA Group Publishes Findings on Hermit Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}