{"id":66873,"date":"2025-02-11T14:25:21","date_gmt":"2025-02-11T12:25:21","guid":{"rendered":"https:\/\/orheifm.live\/index.php\/2025\/02\/11\/bitdefender-avertizeaza-asupra-unei-campanii-de-atacuri-cibernetice-asociata-gruparii-lazarus-din-coreea-de-nord\/"},"modified":"2025-02-11T14:25:21","modified_gmt":"2025-02-11T12:25:21","slug":"bitdefender-avertizeaza-asupra-unei-campanii-de-atacuri-cibernetice-asociata-gruparii-lazarus-din-coreea-de-nord","status":"publish","type":"post","link":"https:\/\/orheifm.live\/index.php\/2025\/02\/11\/bitdefender-avertizeaza-asupra-unei-campanii-de-atacuri-cibernetice-asociata-gruparii-lazarus-din-coreea-de-nord\/","title":{"rendered":"Bitdefender avertizeaz\u0103 asupra unei campanii de atacuri cibernetice asociat\u0103 grup\u0103rii Lazarus din Coreea de Nord"},"content":{"rendered":"<div>\n<p><strong>Bitdefender atrage aten\u021bia asupra unei campanii active desf\u0103\u0219urate de gruparea Lazarus, asociat\u0103 Coreei de Nord, care folose\u0219te oferte false de angajare pe LinkedIn pentru a fura creden\u021biale de acces \u0219i a r\u0103sp\u00e2ndi amenin\u021b\u0103ri informatice. LinkedIn, o platform\u0103 popular\u0103 pentru profesioni\u0219ti, a devenit un teren propice pentru infractorii cibernetici care profit\u0103 de \u00eencrederea utilizatorilor pentru a lansa escrocherii.<\/strong><\/p>\n<p>Gruparea Lazarus utilizeaz\u0103 oferte de joburi atr\u0103g\u0103toare, care promit salarii mari \u0219i oportunit\u0103\u021bi flexibile, pentru a atrage victime. Odat\u0103 ce utilizatorul \u00ee\u0219i arat\u0103 interesul, atacatorii cer informa\u021bii personale, precum un CV sau un link c\u0103tre un repository GitHub. Aceste informa\u021bii sunt folosite pentru a face interac\u021biunea s\u0103 par\u0103 legitim\u0103.<\/p>\n<p>Apoi, atacatorii trimit un set de fi\u0219iere care includ un \u201eMinimum Viable Product\u201d (MVP) al unui proiect, al\u0103turi de un document cu \u00eentreb\u0103ri care pot fi rezolvate doar rul\u00e2nd un demo. La prima vedere, codul pare inofensiv, \u00eens\u0103 acesta con\u021bine un script ascuns care, la rulare, descarc\u0103 \u0219i execut\u0103 cod periculos dintr-un server extern.<\/p>\n<p>Aceast\u0103 amenin\u021bare informatic\u0103 este capabil\u0103 s\u0103 infecteze sistemele Windows, macOS \u0219i Linux, fur\u00e2nd date din portofelele de criptomonede \u0219i extensiile de browser. Dup\u0103 compromiterea ini\u021bial\u0103, malware-ul poate fura fi\u0219iere importante, \u00eenregistra ap\u0103s\u0103rile de taste \u0219i monitoriza clipboard-ul, iar \u00een final poate instala un backdoor pentru acces continuu \u0219i poate mina criptomonede.<\/p>\n<p>Gruparea Lazarus nu doar c\u0103 deruleaz\u0103 escrocherii de recrutare, ci a fost implicat\u0103 \u0219i \u00een atacuri pe infrastructuri critice, vizeaz\u0103 domenii precum avia\u021bia, ap\u0103rarea \u0219i energia nuclear\u0103.<\/p>\n<p><strong>M\u0103suri de protec\u021bie:<\/strong><\/p>\n<ul>\n<li><strong>Semnale de alarm\u0103:<\/strong> Descrierea vag\u0103 a jobului, cererea de a trimite un link GitHub sau a unui CV, gre\u0219eli gramaticale \u0219i lipsa unui canal de comunicare oficial.<\/li>\n<li><strong>Cele mai bune practici:<\/strong> Nu executa\u021bi niciodat\u0103 cod nesigur, verifica\u021bi autenticitatea ofertelor de munc\u0103, analiza\u021bi cu aten\u021bie mesajele nesolicitate \u0219i evita\u021bi s\u0103 oferi\u021bi informa\u021bii personale sensibile.<\/li>\n<\/ul>\n<p><strong>Protec\u021bie suplimentar\u0103:<\/strong><br \/>\nBitdefender ofer\u0103 solu\u021bii de securitate avansate \u0219i un serviciu numit <strong>Scamio<\/strong>, care detecteaz\u0103 fraudele online prin inteligen\u021b\u0103 artificial\u0103. Scamio poate verifica mesaje, linkuri \u0219i imagini pentru a identifica \u00een\u0219el\u0103toriile. De asemenea, Bitdefender pune la dispozi\u021bie <strong>Link Checker<\/strong>, un instrument gratuit pentru a verifica siguran\u021ba linkurilor \u0219i a proteja datele \u0219i identitatea utilizatorilor.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"391\" src=\"https:\/\/canal5.md\/wp-content\/uploads\/2025\/02\/linkedin-1-optimized.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/canal5.md\/wp-content\/uploads\/2025\/02\/linkedin-1-optimized.jpg 770w, https:\/\/canal5.md\/wp-content\/uploads\/2025\/02\/linkedin-1-300x169-optimized.jpg 300w, https:\/\/canal5.md\/wp-content\/uploads\/2025\/02\/linkedin-1-768x432-optimized.jpg 768w, https:\/\/canal5.md\/wp-content\/uploads\/2025\/02\/linkedin-1-696x391-optimized.jpg 696w\">Bitdefender atrage aten\u021bia asupra unei campanii active desf\u0103\u0219urate de gruparea Lazarus, asociat\u0103 Coreei de Nord, care folose\u0219te oferte false de angajare pe LinkedIn pentru a fura creden\u021biale de acces \u0219i a r\u0103sp\u00e2ndi amenin\u021b\u0103ri informatice. LinkedIn, o platform\u0103 popular\u0103 pentru profesioni\u0219ti, a devenit un teren propice pentru infractorii cibernetici care profit\u0103 de \u00eencrederea utilizatorilor pentru a [\u2026]<\/div>\n","protected":false},"author":1,"featured_media":66874,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":[],"jnews_primary_category":[],"jnews_social_meta":[],"jnews_override_counter":[],"footnotes":""},"categories":[29],"tags":[],"class_list":["post-66873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-externe_ro"],"_links":{"self":[{"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/posts\/66873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/comments?post=66873"}],"version-history":[{"count":0,"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/posts\/66873\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/media\/66874"}],"wp:attachment":[{"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/media?parent=66873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/categories?post=66873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orheifm.live\/index.php\/wp-json\/wp\/v2\/tags?post=66873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}