{"id":108698,"date":"2014-07-01T11:13:52","date_gmt":"2014-07-01T11:13:52","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=108698"},"modified":"2014-07-01T11:13:52","modified_gmt":"2014-07-01T11:13:52","slug":"sute-de-grupuri-energetice-americane-si-europene-infectate-din-2011-cu-virusul-dragonfly","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=108698","title":{"rendered":"Sute de grupuri energetice americane \u015fi europene, infectate din 2011 cu virusul Dragonfly"},"content":{"rendered":"<p>\nIdentificat sub numele de Dragonfly, acest virus &#8211; finan\u0163at probabil de c\u0103tre un stat &#8211; ia ca \u0163int\u0103 sistemele informatice ale grupurilor instalate pe teritoriile Statelor Unite, Fran\u0163ei, Spaniei, Germaniei, Italiei, Turciei \u015fi Poloniei, precizeaz\u0103 societatea pe blog.<\/p>\n<p>\n<strong>&#8220;Dac\u0103 hackerii (&#8230;) ar fi utilizat capacit\u0103\u0163ile de sabotaj pe care le aveau la \u00eendem\u00e2n\u0103, ei ar fi putut s\u0103 cauzeze pagube sau perturb\u0103ri \u00een alimentarea cu energie a acestor \u0163\u0103ri&#8221;, d\u0103 asigur\u0103ri Symantec.<\/strong><\/p>\n<p>\nPotrivit firmei, acest ultim virus informatic seam\u0103n\u0103 cu Stuxnet, alt virus informatic care a fost dezvoltat de c\u0103tre Statele Unite cu scopul de a perturba sistemele informatice din Iran.<\/p>\n<p>\n&#8220;Dragonfly are toate aspectele unei opera\u0163iuni finan\u0163ate de c\u0103tre un stat, tr\u0103d\u00e2nd capacit\u0103\u0163i tehnce avansate&#8221;, subliniaz\u0103 Symantec, care adaug\u0103 c\u0103 &#8220;obiectivul principal (al virusului) pare s\u0103 fie spionajul cibernetic, poten\u0163ialul de sabotaj reprezent\u00e2nd o capacitate secundar\u0103&#8221;.<\/p>\n<p>\nDragonfly, cunoscut \u015fi sub numele de Energetic Bear (ursul energetic), pare c\u0103 vine din Europa de Est, av\u00e2nd \u00een vedere orarele activit\u0103\u0163ii celor care-l controleaz\u0103, apreciaz\u0103 societatea de securitate informatic\u0103.<\/p>\n<p>\nGruparea care se afl\u0103 \u00een spatele Dragonfly a utilizat diverse forme de infectare, \u015fi anume e-mailuri nesolicitate \u00een care sunt ata\u015fate fi\u015fiere infectate \u015fi instrumente de navigare care pot instala programe de tip malware, potrivit Symantec.<\/p>\n<p>\n&#8220;Odat\u0103 instalat \u00een calculatorul victimei, virusul colecteaz\u0103 toate informa\u0163iile sistemului \u015fi poate extrage at\u00e2t date din fi\u015fierul de adrese de pe calculator, c\u00e2t \u015fi orice alt\u0103 list\u0103 de nume&#8221;, adaug\u0103 aceea\u015fi surs\u0103.<\/p>\n<p>\nSocietatea afirm\u0103 c\u0103 a informat victimele acestor atacuri \u015fi diverse autorit\u0103\u0163i din statele vizate.<\/p>\n<p>\nGrupuri energetice occidentale contactate de AFP luni, ca cele franceze GDF Suez \u015fi EDF sau cel german RWE, au declarat c\u0103 nu sunt la curent cu aceste atacuri informatice.<\/p>\n<p>\nAltele, ca Total sau EON nu au putut s\u0103 fie contactate imediat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sute de mari grupuri energetice americane \u015fi europenne sunt infectate din 2011 cu un virus informatic capabil s\u0103 perturbe distribu\u0163ia electricit\u0103\u0163ii, a anun\u0163at luni societatea de securitate informatic\u0103 Symantec.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[37276,150,219],"class_list":["post-108698","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-dragonfly","tag-energie","tag-securitate"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/108698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=108698"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/108698\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=108698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=108698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=108698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}