{"id":93368,"date":"2022-08-14T11:00:08","date_gmt":"2022-08-14T08:00:09","guid":{"rendered":"https:\/\/tor-corporation.com\/netskope-hakery-primeniaut-instrymenty-seo-na-google-sites-i-microsoft-azure-dlia-fishinga\/"},"modified":"2022-08-14T11:00:08","modified_gmt":"2022-08-14T08:00:09","slug":"netskope-hakery-primeniaut-instrymenty-seo-na-google-sites-i-microsoft-azure-dlia-fishinga","status":"publish","type":"post","link":"https:\/\/tor-corporation.com\/pl\/netskope-hackery-primeniaut-instrymenty-seo-na-google-sites-i-microsoft-azure-dlia-fishinga\/","title":{"rendered":"Netskope: Hakerzy u\u017cywaj\u0105 narz\u0119dzi SEO w Witrynach Google i Microsoft Azure do phishingu"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter\" src=\"\/wp-content\/uploads\/2022\/08\/netskope-hakery-primenjajut-instrumenty-seo-na-google-sites-i-microsoft-azure-dlja-fishinga-0cd61fe.webp\" alt=\"Netskope: Hakerzy u\u017cywaj\u0105 narz\u0119dzi SEO w Witrynach Google i Microsoft Azure do phishingu\" \/><\/p>\n<p>\t        \t\t\t\tFirma Netskope zajmuj\u0105ca si\u0119 cyberbezpiecze\u0144stwem ostrzeg\u0142a w\u0142a\u015bcicieli zasob\u00f3w cyfrowych przed wzrostem liczby atak\u00f3w phishingowych zwi\u0105zanych z SEO na Witryny Google i Microsoft Azure.<\/p>\n<p>\n\t Wed\u0142ug raportu Netskope w pierwszej po\u0142owie 2022 r. nast\u0105pi\u0142a wzmo\u017cona aktywno\u015b\u0107 atakuj\u0105cych wykorzystuj\u0105cych narz\u0119dzia SEO w Witrynach Google i Microsoft Azure w celu tworzenia stron phishingowych, a nast\u0119pnie kradzie\u017cy krytycznych informacji od posiadaczy zasob\u00f3w cyfrowych. Celem atak\u00f3w haker\u00f3w stali si\u0119 przede wszystkim w\u0142a\u015bciciele portfeli MetaMask, a tak\u017ce klienci gie\u0142d Gemini, Coinbase i Kraken.\n<\/p>\n<p>\n\t Istniej\u0105 dwie najcz\u0119stsze metody kradzie\u017cy danych osobowych. Pierwsza zwi\u0105zana jest z bezpo\u015brednim pozyskiwaniem nasion portfeli u\u017cytkownik\u00f3w \u2013 oszu\u015bci proponuj\u0105 im import tych danych. Ta metoda wykorzystuje witryn\u0119 phishingow\u0105 MetaMask.\n<\/p>\n<p>\n\t Drugi spos\u00f3b wi\u0105\u017ce si\u0119 z uzyskaniem informacji o kontach u\u017cytkownik\u00f3w na dowolnej gie\u0142dzie. Gdy u\u017cytkownicy wprowadzaj\u0105 swoje dane, witryny phishingowe zg\u0142aszaj\u0105 b\u0142\u0105d i sugeruj\u0105 skontaktowanie si\u0119 z operatorem pomocy technicznej, kt\u00f3ry pr\u00f3buje uzyska\u0107 wi\u0119cej informacji, rzekomo w celu pomy\u015blnego przywr\u00f3cenia dost\u0119pu.\n<\/p>\n<p>\n\t Ponadto napastnicy wykorzystuj\u0105 blogi tematyczne w popularnych sieciach spo\u0142eczno\u015bciowych oraz narz\u0119dzia optymalizacji SEO do dystrybucji link\u00f3w do witryn phishingowych.\n<\/p>\n<p>\n\t Niedawno tw\u00f3rcy protoko\u0142u DeFi, Curve Finance, zg\u0142osili atak phishingowy, w wyniku kt\u00f3rego u\u017cytkownicy stracili ponad p\u00f3\u0142 miliona dolar\u00f3w w kryptowalutach.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Netskope \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0430\u043a\u0442\u0438\u0432\u043e\u0432 \u043e\u0431 \u0443\u0432\u0435\u043b\u0438\u0447\u0435\u043d\u0438\u0438 \u0441\u043b\u0443\u0447\u0430\u0435\u0432 \u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u0445 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":93369,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[3],"tags":[],"class_list":["post-93368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypo"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/posts\/93368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/comments?post=93368"}],"version-history":[{"count":0,"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/posts\/93368\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/media\/93369"}],"wp:attachment":[{"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/media?parent=93368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/categories?post=93368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tor-corporation.com\/pl\/wp-json\/wp\/v2\/tags?post=93368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}