{"id":125790,"date":"2015-08-17T14:18:16","date_gmt":"2015-08-17T14:18:16","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=125790"},"modified":"2015-08-17T14:18:16","modified_gmt":"2015-08-17T14:18:16","slug":"bitdefender-clientii-serviciilor-de-online-banking-din-romania-vizati-de-un-nou-val-de-mesaje-spam-ce-recomanda-specialistii","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=125790","title":{"rendered":"Bitdefender: Clien\u0163ii serviciilor de online banking din Rom\u00e2nia, viza\u0163i de un nou val de mesaje spam. Ce recomand\u0103 speciali\u015ftii"},"content":{"rendered":"<p>\nAnun\u0163ul Bitdefender se refer\u0103 la o versiune nou\u0103 a virusului Dridex, special creat\u0103 pentru clien\u0163ii a dou\u0103 b\u0103nci rom\u00e2ne\u015fti.<\/p>\n<p>\n&#8220;Campania reprezint\u0103 unul dintre cele mai complexe eforturi ale hackerilor de a instala troianul Dridex \u015fi a fura datele de autentificare ale victimelor din Rom\u00e2nia&#8221;, se arat\u0103 \u00eentr-un comunicat al produc\u0103torului de solu\u0163ii de securitate.<\/p>\n<p>\n<strong>Virusul se propag\u0103 fie printr-un fi\u015fier executabil ata\u015fat la mesaje spam, fie prin link-uri care descarc\u0103 automat virusul odat\u0103 ce sunt accesate. Noua campanie folose\u015fte fi\u015fiere Word \u015fi Excel care includ cod de tip macro. Acestea instaleaz\u0103 un downloader generic pentru a desc\u0103rca \u015fi executa Dridex.<\/strong><\/p>\n<p>\n&#8220;Mesajele, trimise \u00een perioada 10-17 august 2015, par s\u0103 fie trimise de la companii rom\u00e2ne\u015fti \u015fi pretind s\u0103 con\u0163in\u0103 documente financiare importante pentru utilizator. Dac\u0103 utilizatorul deschide fi\u015fierul Word \u015fi activeaz\u0103 func\u0163ionalitatea macro (dezactivat\u0103 automat de programul Word pentru a evita riscurile de securitate), aplica\u0163ia Word va lansa automat procesul de desc\u0103rcare a virusului. Troianul Dridex e un fi\u015fier DLL care se injecteaz\u0103 \u00een procesul explorer.exe, de unde va monitoriza activitatea bancar\u0103 \u015fi de navigare a utilizatorului, indiferent de browserul folosit: Firefox, Google Chrome sau Internet Explorer&#8221;, arat\u0103 Bitdefender.<\/p>\n<p>\nTroianul Dridex este configurat s\u0103 atace dou\u0103 b\u0103nci rom\u00e2ne\u015fti. Pentru a captura datele de autentificare, acesta folose\u015fte diferite module. Pentru banca care folose\u015fte tastatura virtual\u0103 la introducerea parolei, troianul face capturi de ecran la fiecare click de mouse. Pentru cealalt\u0103 banc\u0103, Troianul folose\u015fte un modul care injecteaz\u0103 cod \u00een pagina de autentificare.<\/p>\n<p>\n<strong>Pentru a preveni infec\u0163ia, Bitdefender le recomand\u0103 utilizatorilor s\u0103 foloseasc\u0103 o solu\u0163ie de securitate performant\u0103 \u015fi actualizat\u0103 la zi \u015fi s\u0103 evite s\u0103 dea click pe linkuri provenite din emailuri de la expeditori necunoscu\u0163i.<\/strong><\/p>\n<p>\nLa r\u00e2ndul s\u0103u, IBM a descoperit o versiune de malware Tinba v3 configurat\u0103 pentru a ataca exclusiv 12 b\u0103nci din Rom\u00e2nia, iar un expert \u00een cyber intelligence al companiei americane a recomandat s\u0103pt\u0103m\u00e2na trecut\u0103 institu\u0163iilor de credit s\u0103-\u015fi informeze clien\u0163ii \u015fi s\u0103 colaboreze c\u00e2t mai bine cu furnizorii de securitate antifraud\u0103.<\/p>\n<p>\n<strong>Noul program are poten\u0163ialul de a deveni cel mai prolific troian care atac\u0103 b\u0103nci \u00een Rom\u00e2nia, detron\u00e2nd Dridex, responsabil de peste 80% din atacurile din acest an, avertizeaz\u0103 specialistul IBM.<\/strong><\/p>\n<p>\nCercet\u0103torii IBM Security X-Force au analizat la sf\u00e2r\u015fitul lunii iulie o nou\u0103 variant\u0103 a Tinba v3 Trojan, iar aceasta este, potrivit datelor companiei americane, prima de acest fel dedicat\u0103 b\u0103ncilor din Rom\u00e2nia, scria pe blogul securityintelligence Limor Kessem, unul dintre exper\u0163ii IBM.<\/p>\n<p>\nRom\u00e2nia este recunoscut\u0103 ca fiind o surs\u0103 de atacuri \u015fi este rareori o \u0163int\u0103, afirm\u0103 Kessem.<\/p>\n<p>\nPurt\u0103torul de cuv\u00e2nt al SRI, Sorin Sava, a declarat pentru MEDIAFAX c\u0103 Tinba v3 este \u00een aten\u0163ia SRI, \u00eens\u0103 virusul nu a f\u0103cut victime p\u00e2n\u0103 \u00een prezent.<\/p>\n<p>\n<a name=\"14673337!\"><\/a><\/p>\n<p>\n<a name=\"14674745!\"><\/a><\/p>\n<p>\n<a name=\"14566996!\"><\/a><\/p>\n<p>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Utilizatorii serviciilor online furnizate de dou\u0103 b\u0103nci din Rom\u00e2nia sunt \u0163inta exclusiv\u0103 a unui val de mesaje spam trimise \u00een ultimele zile prin virusul Dridex, aten\u0163ioneaz\u0103 Bitdefender, anun\u0163ul venind dup\u0103 ce IBM a descoperit o versiune Tinba v3 configurat\u0103 tot pentru a ataca doar b\u0103nci locale.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[8039,41373,25136,11605],"class_list":["post-125790","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-bitdefender","tag-mesaje-spam","tag-online-banking","tag-virus"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/125790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=125790"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/125790\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=125790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=125790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=125790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}