{"id":547,"date":"2018-01-10T11:48:51","date_gmt":"2018-01-10T11:48:51","guid":{"rendered":"http:\/\/newgeekweb.fightcar.webd.pl\/index.php\/2018\/01\/10\/nowy-atak-ransomware-wzywa-do-zawarcia-ugody\/"},"modified":"2018-01-10T11:48:51","modified_gmt":"2018-01-10T11:48:51","slug":"nowy-atak-ransomware-wzywa-do-zawarcia-ugody","status":"publish","type":"post","link":"https:\/\/geekweb.pl\/index.php\/2018\/01\/10\/nowy-atak-ransomware-wzywa-do-zawarcia-ugody\/","title":{"rendered":"Nowy atak ransomware wzywa do &#8220;zawarcia ugody&#8221;"},"content":{"rendered":"<img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-545\" src=\"http:\/\/newgeekweb.fightcar.webd.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456.jpg\" alt=\"\" class=\"caption\" title=\"Nowy atak ransomware wzywa do \"zawarcia ugody\"\" width=\"1600\" height=\"800\" srcset=\"https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456.jpg 1600w, https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456-600x300.jpg 600w, https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456-300x150.jpg 300w, https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456-1024x512.jpg 1024w, https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456-768x384.jpg 768w, https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/b190b9bcae39ee6b68c160e3e6f45456-1536x768.jpg 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/>\n<p>W sieci pojawi\u0142 si\u0119 &#8220;nowy&#8221; rodzaj ataku, oparty o z\u0142o\u015bliwe oprogramowanie typu <strong>ransomware<\/strong>, a sugeruj\u0105cy, \u017ce adresat wiadomo\u015bci ma jakie\u015b zwi\u0105zki z kancelari\u0105 adwokack\u0105.<\/p>\n<p><!--more--><\/p>\n<p>O nowym rodzaju ataku pisze <em>zaufanatrzeciastrona.pl<\/em>. Atak polega na rozsy\u0142aniu maili, kt\u00f3re maj\u0105 sugerowa\u0107 jaki\u015b zwi\u0105zek prowadzonej przez nas dzia\u0142alno\u015bci z kancelari\u0105 adwokack\u0105. Do tego celu wykorzystano kancelari\u0119 z Krakowa. W otrzymanym mailu jeste\u015bmy poinformowani o procedurze ugody, kt\u00f3ra rzekomo ma dotyczy\u0107 adresata wiadomo\u015bci. Do wiadomo\u015bci za\u0142\u0105czono tak\u017ce plik graficzny, kt\u00f3ry do z\u0142udzenia przypomina dokument pdf a kt\u00f3ry po klikni\u0119ciu prowadzi nas do innej witryny, a st\u0105d przekierowani jeste\u015bmy do\u00a0pliku JS, kt\u00f3ry to w interpretatorze polece\u0144 pobiera plik z\u0142o\u015bliwego oprogramowania.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-546\" src=\"http:\/\/newgeekweb.fightcar.webd.pl\/wp-content\/uploads\/2018\/01\/screenshot-580x375.png\" alt=\"\" width=\"580\" height=\"375\" srcset=\"https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/screenshot-580x375.png 580w, https:\/\/geekweb.pl\/wp-content\/uploads\/2018\/01\/screenshot-580x375-300x194.png 300w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><figcaption>Zrzut ekranu z wiadomo\u015bci, kt\u00f3r\u0105 otrzymuje ofiara ataku, \u017ar\u00f3d\u0142o: zaufanatrzeciastrona.pl<\/figcaption><\/figure>\n<p>Z\u0142o\u015bliwe oprogramowanie na kt\u00f3rym bazuje atak o znany z ubieg\u0142ego roku <strong>Vortex<\/strong>, prawdopodobnie ransomware stworzony przez Polaka. Koszt odblokowania wynosi\u0142 249 dolar\u00f3w. By\u0142a to modyfikacja og\u00f3lnodost\u0119pnego programu do szyfrowania kopii zapasowych.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>W sieci pojawi\u0142 si\u0119 &#8220;nowy&#8221; rodzaj ataku, oparty o z\u0142o\u015bliwe oprogramowanie typu ransomware, a sugeruj\u0105cy, \u017ce adresat wiadomo\u015bci ma jakie\u015b zwi\u0105zki z kancelari\u0105 adwokack\u0105.<\/p>\n","protected":false},"author":1,"featured_media":545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,14],"tags":[625,54,626,135,418,624],"class_list":["post-547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-news","tag-ata","tag-cyberbezpieczenstwo","tag-pdf","tag-ransomware","tag-ugoda","tag-vortex"],"_links":{"self":[{"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/posts\/547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/comments?post=547"}],"version-history":[{"count":0,"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/posts\/547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/media?parent=547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/categories?post=547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geekweb.pl\/index.php\/wp-json\/wp\/v2\/tags?post=547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}