{"id":7079,"date":"2022-04-11T14:00:30","date_gmt":"2022-04-11T11:00:30","guid":{"rendered":"https:\/\/cyberlevins.com\/?p=7079"},"modified":"2022-04-11T15:48:03","modified_gmt":"2022-04-11T12:48:03","slug":"phishing-ul-este-in-continuare-cel-mai-popular-tip-de-criminalitate-cibernetica","status":"publish","type":"post","link":"https:\/\/cyberlevins.com\/ro\/phishing-ul-este-in-continuare-cel-mai-popular-tip-de-criminalitate-cibernetica","title":{"rendered":"Phishing-Ul Este \u00een Continuare Cel Mai Popular Tip de Criminalitate Cibernetic\u0103"},"content":{"rendered":"<p><strong><em>Phishing-ul este o infrac\u021biune cibernetic\u0103 \u00een care \u021bintele sunt contactate prin e-mail, telefon sau mesaj text de c\u0103tre o persoan\u0103 care se prezint\u0103 ca o institu\u021bie legitim\u0103 pentru a atrage persoanele s\u0103 furnizeze date sensibile, cum ar fi informa\u021bii de identificare personal\u0103, detalii bancare \u0219i ale cardurilor de credit, precum \u0219i parole. Indiferent c\u00e2t de mult se discut\u0103 despre acest fenomen \u0219i de toate avertismentele pe aceast\u0103 tem\u0103, phishing-ul este \u00een continu\u0103 \u00eenflorire. <\/em><\/strong><\/p>\n<p><strong><em>\u00cen 2020, num\u0103rul incidentelor raportate \u00een care utilizatorii au fost \u00een\u0219ela\u021bi s\u0103 dezv\u0103luie informa\u021bii sensibile aproape s-a dublat. Ca urmare, metoda de piraterie prin phishing prevaleaz\u0103 \u0219i devine tot mai avansat\u0103 \u0219i mai sofisticat\u0103. Ne-am sf\u0103tuit \u00eempreun\u0103 cu colegii no\u0219tri de la Centrul de Opera\u021biuni de Securitate (SOC) al <\/em><\/strong><a href=\"https:\/\/cyberone.bg\/en\"><strong><em>CyberOne <\/em><\/strong><\/a><strong><em>cu privire la detalii despre cele mai frecvente tipuri de phishing, precum \u0219i despre noile tendin\u021be \u0219i, \u00een consecin\u021b\u0103, despre modalit\u0103\u021bile de prevenire pe care le pute\u021bi adopta dumneavoastr\u0103 \u0219i membrii echipei dumneavoastr\u0103. <\/em><\/strong><\/p>\n<p>Phishing-ul nu este o practic\u0103 nou\u0103, aceasta fiind prezent\u0103 de peste 20 de ani. Cu toate acestea, ea a fost dezvoltat\u0103 \u0219i adaptat\u0103 la agendele actuale. Un exemplu de atacuri cibernetice tematice care se folosesc de circumstan\u021be actuale \u00eempotriva unor persoane nevinovate sunt escrocheriile din pandemie av\u00e2nd ca scop principal sustragerea de date personale sau de bani. \u00cen ciuda u\u0219oarelor diferen\u021be, scopul principal este \u00eentotdeauna \u00eencercarea de a p\u0103rea \u0219i de a suna c\u00e2t mai credibil posibil.<\/p>\n<h4><strong>Cele mai frecvente tipuri de phishing <\/strong><\/h4>\n<p><strong>Phishing prin e-mail &#8211; <\/strong>Trimiterea unui mesaj care aparent provine de la o organiza\u021bie binecunoscut\u0103 \u0219i care v\u0103 solicit\u0103 informa\u021bii personale, cum ar fi num\u0103rul cardului de credit, num\u0103rul de asigurare social\u0103, num\u0103rul de cont sau parola.<\/p>\n<p><strong>Vishing &#8211; <\/strong>Se \u00eent\u00e2mpl\u0103 prin telefon. \u00cen fapt aceasta reprezint\u0103 utilizarea acestui canal concret \u00een \u00eencercarea de a \u00een\u0219ela utilizatorii pentru a-i determina s\u0103 dezv\u0103luie informa\u021bii de ordin privat care vor fi utilizate pentru furtul de identitate.<\/p>\n<p><strong>Whaling &#8211; <\/strong>Hackerii se prezint\u0103 ca reprezentan\u021bi ai unei organiza\u021bii mari \u0219i \u00eencearc\u0103 s\u0103 fure banii sau informa\u021biile sensibile ale unei anumite companii sau s\u0103 ob\u021bin\u0103 acces la sistemele informatice ale acesteia \u00een scopuri infrac\u021bionale.<\/p>\n<p><strong>Smishing &#8211; <\/strong>\u00cen\u0219elarea victimelor pentru a le determina s\u0103 ofere informa\u021bii private prin intermediul unui mesaj text sau SMS.<\/p>\n<p><strong>Spear Phishing &#8211; <\/strong>Trimiterea frauduloas\u0103 de e-mailuri aparent de la un expeditor cunoscut sau de \u00eencredere, cu scopul de a determina persoanele vizate s\u0103 dezv\u0103luie informa\u021bii confiden\u021biale.<\/p>\n<h4><strong>Ce este nou? <\/strong><\/h4>\n<p>Ultima tendin\u021b\u0103 \u00een domeniul phishing-ului este utilizarea unor servicii reale, renumite la scar\u0103 larg\u0103, pentru a introduce con\u021binut d\u0103un\u0103tor. De exemplu, hackerii folosesc <em>formulare Google <\/em>\u0219i robo\u021bi <em>Telegram <\/em>pentru a-\u0219i gestiona atacurile. Potrivit unui studiu al companiei de informa\u021bii cibernetice <em>Group-IB<\/em>, infractorii cibernetici vizeaz\u0103 \u00een principal serviciile online pentru vizualizarea de documente, cump\u0103r\u0103turi online \u0219i streaming, astfel de atacuri reprezent\u00e2nd 30,7% din activit\u0103\u021bile r\u0103u inten\u021bionate. Prin vizarea conturilor online, hackerii reu\u0219esc s\u0103 fure conturile bancare legate de acestea.<\/p>\n<p>Speciali\u0219tii \u00een securitate cibernetic\u0103 de la CyberOne au observat, de asemenea, c\u0103 infractorii cibernetici mizeaz\u0103 acum pe automatizare. Tehnica de automatizare le permite s\u0103 \u00eenlocuiasc\u0103 site-urile de phishing blocate \u0219i, prin urmare, s\u0103 desf\u0103\u0219oare atacuri de phishing complexe \u0219i la scar\u0103 larg\u0103. Noua tactic\u0103 face ca metodele tradi\u021bionale de blocare a atacurilor de phishing s\u0103 fie mai pu\u021bin eficiente.<\/p>\n<p>Din fericire, tehnologiile de evitare \u0219i restric\u021bionare a atacurilor de phishing progreseaz\u0103 \u0219i ele. Cele mai recente servicii de filtrare inspecteaz\u0103 coresponden\u021ba de intrare \u0219i de ie\u0219ire, plas\u00e2nd-o \u00eentr-o ma\u0219in\u0103 virtual\u0103 \u00eenainte de a proceda la trimiterea ei la destina\u021bia final\u0103.<\/p>\n<h4><strong>Fi\u021bi creativi \u00een abordarea amenin\u021b\u0103rii de phishing <\/strong><\/h4>\n<p>Comunicarea este, p\u00e2n\u0103 \u00een prezent, cea mai func\u021bional\u0103 strategie de \u00eenfr\u00e2ngere a atacatorilor cibernetici. T\u0103cerea nu v\u0103 va face nici dumneavoastr\u0103, nici companiei dumneavoastr\u0103 un serviciu. Cea mai bun\u0103 atitudine pe care trebuie s\u0103 o adopta\u021bi este s\u0103 riposta\u021bi \u00een mod activ \u0219i s\u0103 lua\u021bi m\u0103suri, dar \u0219i s\u0103 acomoda\u021bi un mediu \u00een care colegii dumneavoastr\u0103 sunt \u00eencuraja\u021bi s\u0103 raporteze incidentele.<\/p>\n<p>Exist\u0103 un stigmat \u00een jurul \u00een\u021belegerii faptului c\u0103, odat\u0103 ce angaja\u021bii fac clic pe o conexiune mali\u021bioas\u0103, ei devin imediat atacatori. Realitatea este c\u0103 oricine poate e\u0219ua \u00een a se proteja. Cu toate acestea, con\u0219tientizarea \u0219i valorificarea unei combina\u021bii de instrumente tehnologice de prevenire \u0219i de o poli\u021b\u0103 de asigurare cibernetic\u0103 v\u0103 vor oferi un nivel de securitate decent \u0219i confortabil.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing-ul este o infrac\u021biune cibernetic\u0103 \u00een care \u021bintele sunt contactate prin e-mail, telefon sau mesaj text de c\u0103tre o persoan\u0103 care se prezint\u0103 ca o institu\u021bie legitim\u0103 pentru a atrage persoanele s\u0103 furnizeze date sensibile, cum ar fi informa\u021bii de identificare personal\u0103, detalii bancare \u0219i ale cardurilor de credit, precum \u0219i parole. Indiferent c\u00e2t de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[85],"tags":[123,122],"class_list":["post-7079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tendinte","tag-email-ro","tag-phishing-ro"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts\/7079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/comments?post=7079"}],"version-history":[{"count":2,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts\/7079\/revisions"}],"predecessor-version":[{"id":7087,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts\/7079\/revisions\/7087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/media\/4020"}],"wp:attachment":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/media?parent=7079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/categories?post=7079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/tags?post=7079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}