{"id":165098,"date":"2018-10-10T11:20:00","date_gmt":"2018-10-10T11:20:00","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=165098"},"modified":"2026-04-06T18:03:16","modified_gmt":"2026-04-06T18:03:16","slug":"sistemul-de-operare-microsoft-windows-tinta-unui-nou-atac-cibernetic","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=165098","title":{"rendered":"Sistemul de operare Microsoft Windows, \u0163inta unui nou atac cibernetic"},"content":{"rendered":"<p>\nInfractorii cibernetici voiau s\u0103 ob\u0163in\u0103 acces de lung\u0103 durat\u0103 \u00een sistemele victimelor, situate \u00een Orientul Mijlociu. Vulnerabilitatea a fost rezolvat\u0103 de Microsoft pe 9 octombrie.<\/p>\n<p>\nUn atac prin intermediul unei vulnerabilit\u0103\u0163i zero-day este una dintre cele mai periculoase forme de amenin\u0163\u0103ri cibernetice, pentru c\u0103 presupune exploatarea unei vulnerabilit\u0103\u0163i care nu a fost \u00eenc\u0103 detectat\u0103 \u015fi reparat\u0103, avertizeaz\u0103 reprezentan\u0163ii Kaspersky. Dac\u0103 este descoperit\u0103 mai \u00eent\u00e2i de atacatori, o vulnerabilitate zero-day poate fi folosit\u0103 pentru crearea unui exploit care le va da acces la \u00eentregul sistem. Scenariul de atac din cazul de fa\u0163\u0103 este foarte folosit de grup\u0103ri complexe, specializate \u00een atacuri APT.<\/p>\n<p>\nExploit-ul pentru Microsoft Windows a fost trimis victimelor prin intermediul unui backdoor PowerShell. Apoi a fost lansat cu scopul de a ob\u0163ine privilegiile necesare pentru a r\u0103m\u00e2ne \u00een sistem. Codul malware-ului a fost unul de calitate \u015fi a fost scris pentru a permite exploatarea c\u00e2t mai multor active Windows cu putin\u0163\u0103.<\/p>\n<p>\nAtacurile cibernetice au vizat \u00een jur de dou\u0103sprezece organiza\u0163ii diferite din Orientul Mijlociu, c\u0103tre finalul verii. Se b\u0103nuie\u015fte c\u0103 autorul atacului ar putea s\u0103 aib\u0103 leg\u0103tur\u0103 cu grupul FruityArmor \u2013 pentru c\u0103 un backdoor PowerShell a mai fost folosit de acest grup \u00een trecut. \u00cen momentul descoperirii, exper\u0163ii Kaspersky Lab au raportat imediat vulnerabilitatea c\u0103tre Microsoft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exper\u0163ii Kaspersky Lap, companie global\u0103 din domeniul securit\u0103\u0163ii cibernetice, au identificat cu ajutorul tehnologiei Kaspersky Lab Automatic Exploit Prevention, inclus\u0103 \u00een majoritatea solu\u0163iilor endpoint pentru companii, o serie de atacuri cibernetice direc\u0163ionate. Atacurile au fost \u00eencercate de un nou malware care se folosea de o vulnerabilitate zero-day necunoscut\u0103 p\u00e2n\u0103 acum, din sistemul de operare Microsoft Windows. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[363,204,12591],"class_list":["post-165098","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-atacuri","tag-tehnologie","tag-windows"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/165098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=165098"}],"version-history":[{"count":1,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/165098\/revisions"}],"predecessor-version":[{"id":165104,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/165098\/revisions\/165104"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=165098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=165098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=165098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}