[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.torfin.cz\/crimeware\/#Article","mainEntityOfPage":"https:\/\/www.torfin.cz\/crimeware\/","headline":"Crimeware","name":"Crimeware","description":"Crimeware je druh programu, kter\u00fd je ur\u010den\u00fd k vykon\u00e1v\u00e1n\u00ed trestn\u00e9 \u010dinnosti na internetu. Mezi nej\u010dast\u011bj\u0161\u00ed krimin\u00e1ln\u00ed \u010dinnosti pat\u0159\u00ed kr\u00e1de\u017ee identity prost\u0159ednictv\u00edm soci\u00e1ln\u00edch s\u00edt\u00ed a loud\u011bn\u00ed","datePublished":"2020-02-13","dateModified":"2020-02-13","author":{"@type":"Person","@id":"https:\/\/www.torfin.cz\/author\/#Person","name":"","url":"https:\/\/www.torfin.cz\/author\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/87007d43bbcef3c87926bba9082d96a1a8da6f7ae55b1546f5f58a5e10d8ed12?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/87007d43bbcef3c87926bba9082d96a1a8da6f7ae55b1546f5f58a5e10d8ed12?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"torfin.cz","logo":{"@type":"ImageObject","@id":"\/logo.png","url":"\/logo.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.torfin.cz\/wp-content\/uploads\/img_a371111_w3293_t1582700308.jpg","url":"https:\/\/www.torfin.cz\/wp-content\/uploads\/img_a371111_w3293_t1582700308.jpg","height":0,"width":0},"url":"https:\/\/www.torfin.cz\/crimeware\/","about":["Www"],"wordCount":502,"articleBody":" Crimeware je druh programu, kter\u00fd je ur\u010den\u00fd k vykon\u00e1v\u00e1n\u00ed trestn\u00e9 \u010dinnosti na internetu. Mezi nej\u010dast\u011bj\u0161\u00ed krimin\u00e1ln\u00ed \u010dinnosti pat\u0159\u00ed kr\u00e1de\u017ee identity prost\u0159ednictv\u00edm soci\u00e1ln\u00edch s\u00edt\u00ed a loud\u011bn\u00ed p\u0159\u00edstupu k bankovn\u00edm \u00fa\u010dt\u016fm. Pred\u00e1tor\u016fm jde p\u0159edev\u0161\u00edm o to, aby z po\u0161kozen\u00fdch jak\u00fdmkoliv zp\u016fsobem dostali p\u0159\u00edstup k bankovn\u00edmu \u00fa\u010dtu a prov\u00e1d\u011bli neopr\u00e1vn\u011bn\u00e9 transakce a k obohacen\u00ed samotn\u00e9ho \u00fato\u010dn\u00edka. Ka\u017ed\u00fdm rokem kriminalita na internetu roste, a proto bychom nem\u011bli sv\u00e9 intimn\u00ed a citliv\u00e9 informace \u2013 jako jsou hesla, telefonn\u00ed \u010d\u00edslo, rodn\u00e9 \u010d\u00edslo, \u010d\u00edslo bankovn\u00edho \u00fa\u010dtu apod. \u2013 ve\u0159ejn\u011b publikovat. Za crimeware pova\u017eujeme v\u0161echny softwarov\u00e9 syst\u00e9my, kter\u00e9 jsou pou\u017e\u00edv\u00e1ny ke kyberzlo\u010dinu. P\u0159\u00edklady metod Instalace keylogger\u016f, co\u017e je software kter\u00fd sn\u00edm\u00e1 stisky jednotliv\u00fdch kl\u00e1ves a tak \u00fato\u010dn\u00edci sb\u00edraj\u00ed informace, nap\u0159\u00edklad ve form\u011b hesel a p\u0159ihla\u0161ovac\u00edch jmen. Tak\u00e9 je velmi \u010dast\u00e9 p\u0159esm\u011brov\u00e1n\u00ed po\u0161kozen\u00e9 osoby z ofici\u00e1ln\u00edch webov\u00fdch str\u00e1nek na pad\u011blan\u00e9, a to bez jak\u00e9hokoliv v\u011bdom\u00ed posti\u017een\u00e9 osoby. \u00dato\u010dn\u00edci tento zp\u016fsob prov\u00e1d\u011bj\u00ed tak, \u017ee \u010dlov\u011bk nen\u00ed schopen rozeznat ofici\u00e1ln\u00ed dom\u00e9nu od t\u00e9 neofici\u00e1ln\u00ed. Snad nej\u010dast\u011bj\u0161\u00ed chybou u\u017eivatel\u016f je automatick\u00e9 ukl\u00e1d\u00e1n\u00ed hesel, \u010deho\u017e zlod\u011bji velmi \u010dasto vyu\u017e\u00edvaj\u00ed a dostat jak\u00e9koliv heslo z mezipam\u011bti prohl\u00ed\u017ee\u010de pro n\u011b nen\u00ed \u017e\u00e1dn\u00fd probl\u00e9m. S t\u00edm souvis\u00ed i napaden\u00ed relace mezi bankou a klientem a vy\u010derp\u00e1n\u00ed finan\u010dn\u00ed \u010d\u00e1stky bez klientova v\u011bdom\u00ed. Samostatn\u00e1 kapitola jsou mobiln\u00ed telefony s nespo\u010dtem aplikac\u00ed, kter\u00e9 b\u00fdvaj\u00ed mezi sebou propojeny, nebo maj\u00ed p\u0159\u00edstup k dat\u016fm, jako jsou kontakty a galerie. \u00dato\u010dn\u00edci tyto aplikace napadaj\u00ed, nebo je sami vytv\u00e1\u0159\u00ed, a tyto informace z nich \u010derpaj\u00ed, n\u00e1sledn\u011b je vyu\u017e\u00edvaj\u00ed k vlastn\u00edm pot\u0159eb\u00e1m. Nap\u0159\u00edklad kr\u00e1de\u017e identity, vyd\u00edr\u00e1n\u00ed, nebo je prod\u00e1vaj\u00ed na zak\u00e1zan\u00fdch webech. \u0160\u00ed\u0159en\u00ed Na po\u010d\u00edta\u010d ob\u011bti m\u016f\u017ee b\u00fdt crimeware nainstalov\u00e1n v\u00edce zp\u016fsoby. Nap\u0159\u00edklad spolu s aplikacemi, ve kter\u00fdch je zabudov\u00e1n vir. Nejzn\u00e1m\u011bj\u0161\u00ed je Trojsk\u00fd k\u016f\u0148 Bankash G., kter\u00fd se vyu\u017eil v aplikaci Internet Explorer, ve kter\u00e9m \u00fato\u010dn\u00edci na\u0161li chybu. T\u00edm pak mohli sledovat pohyb u\u017eivatel\u016f a z\u00edsk\u00e1vat p\u0159\u00edstup k jejich hesl\u016fm a u\u017eivatelsk\u00fdm \u00fa\u010dt\u016fm. \u0160\u00ed\u0159\u00ed se taky prost\u0159ednictv\u00edm SMTP, co\u017e je protokol, kter\u00fd je ur\u010den\u00fd k p\u0159epos\u00edl\u00e1n\u00ed elektronick\u00e9 po\u0161ty (e-mail) mezi p\u0159epravci MTA. Tyto hrozby se objevuj\u00ed jako, na prvn\u00ed pohled ne\u0161kodn\u00e9 mailov\u00e9 zpr\u00e1vy, kde v\u00e1s \u00fato\u010dn\u00edci zmanipuluj\u00ed k otev\u0159en\u00ed p\u0159\u00edlohy, ve kter\u00e9 je vir. Nedoporu\u010duje se takov\u00e9to zpr\u00e1vy v\u016fbec otev\u00edrat.                                                                                                                                                                                                                                                                                                                                                                                                 "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Crimeware","item":"https:\/\/www.torfin.cz\/crimeware\/#breadcrumbitem"}]}]