{"id":253,"date":"2018-04-11T22:34:02","date_gmt":"2018-04-11T20:34:02","guid":{"rendered":"https:\/\/blog.nav.ro\/?p=253"},"modified":"2025-07-18T10:38:18","modified_gmt":"2025-07-18T07:38:18","slug":"exploatarea-criptografica-si-programele-malware","status":"publish","type":"post","link":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/","title":{"rendered":"Exploatarea criptografic\u0103 \u0219i programele malware"},"content":{"rendered":"<p>Numai p\u00e2n\u0103 la sf\u00e2r\u0219itul anului 2017 cercet\u0103torii din zona securit\u0103\u021bii cibernetice au descoperit campanii de spam care livreaz\u0103 \u00eenc\u0103rc\u0103ri criptografice utiliz\u00e2nd ata\u0219amentele de e-mail. \u00cen unele cazuri, un document Word descarc\u0103 \u00eenc\u0103rcarea criptografic\u0103 printr-o macrocomand\u0103 r\u0103u inten\u021bionat\u0103. Atacatorii continu\u0103, de asemenea, s\u0103 ascund\u0103 programele malware \u00een ata\u0219amentele de e-mail. Este sigur s\u0103 presupunem c\u0103 tendin\u021ba de a folosi ata\u0219amentele \u00een atacuri nu va disp\u0103rea prea cur\u00e2nd. De fapt, Raportul anual privind securitatea informatic\u0103 din 2018 (ACR) arat\u0103 c\u0103 atacatorii devin \u0219i mai buni \u00een a ascunde malware-ul \u00een ata\u0219amente pentru a evita detectarea prin tehnologii sofisticate de tip sandbox. Odat\u0103 ce aceste ata\u0219\u0103ri prin e-mail reu\u0219esc, este u\u0219or s\u0103 atrag\u0103 utilizatorii s\u0103 declan\u0219eze procesul care descarc\u0103 programul malware.<\/p>\n<p><strong>Dou\u0103 modalit\u0103\u021bi noi prin care atacatorii ascund amenin\u021b\u0103ri \u00een fi\u0219iere pentru a se sustrage tehnologiilor sandboxing<\/strong><\/p>\n<p>Cum se \u00eent\u00e2mpl\u0103 acest lucru? Exist\u0103 dou\u0103 moduri noi. Primul nu este atunci c\u00e2nd utilizatorii deschid ata\u0219amentul r\u0103u inten\u021bionat, ci atunci c\u00e2nd \u00eel \u00eenchid. Acest lucru se \u00eent\u00e2mpl\u0103 deoarece sandbox-ul nu \u00eenchide ata\u0219amentul \u00een timpul analizei \u0219i, astfel, fi\u0219ierul este considerat sigur deoarece evenimentul nu este declan\u0219at \u0219i sandbox \u00eel accept\u0103. \u00cen acest moment, utilizatorul este liber s\u0103 deschid\u0103 \u0219i eventual s\u0103 \u00eel \u00eenchid\u0103 \u00een cele din urm\u0103. C\u00e2nd este \u00eenchis, metoda de atac utilizeaz\u0103 evenimentul &#8222;document_close&#8221; pentru a furniza \u00eenc\u0103rc\u0103tura r\u0103u inten\u021bionat\u0103. Diagrama de mai jos arat\u0103 c\u0103 acest tip de atac a avut loc un atac \u00een septembrie 2017.<\/p>\n<p>\u00cen cea de a doua metod\u0103, atacatorii \u00eencorporeaz\u0103 documente r\u0103u inten\u021bionate \u00een fi\u0219iere PDF. Sandboxurile de ast\u0103zi nu reu\u0219esc s\u0103 verifice fi\u0219ierele \u00eencorporate \u00een alte fi\u0219iere. PDF-ul \u00een sine nu este r\u0103u inten\u021bionat (amenin\u021barea se afl\u0103 \u00een fi\u0219ierul \u00eencorporat), astfel c\u0103 sandbox permite accesul fi\u0219ierului. Odat\u0103 ce ajunge \u00een c\u0103su\u021ba de e-mail a unui utilizator, este probabil ca acesta s\u0103 fac\u0103 clic pe fi\u0219ierul \u00eencorporat &#8211; care declan\u0219eaz\u0103 desc\u0103rcarea programului malware. Acest tip de atac a fost predominant \u00een mai 2017 &#8211; documentele Word au fost \u00eencorporate \u00een PDF-uri.<\/p>\n<p><strong>Modul \u00een care Cisco Email Security \u0219i Threat Grid v\u0103 aduc cu un pas \u00eenainte fa\u021b\u0103 de atacurile criptominative sau de malware<\/strong><\/p>\n<p>Acum, ajungem la cel mai important subiect &#8211; cum s\u0103 ne protej\u0103m \u00eempotriva ata\u0219amentelor de e-mail care sunt folosite \u00een criptominare sau programe malware f\u0103cute \u00een a\u0219a fel \u00eenc\u00e2t s\u0103 evite detectarea. Ave\u021bi posibilitatea s\u0103 utiliza\u021bi serviciul Cisco Email Security, care include Advanced Malware Protection (AMP) \u0219i Threat Grid. Atunci c\u00e2nd vine un e-mail cu ata\u0219ament, AMP analizeaz\u0103 reputa\u021bia fi\u0219ierului \u0219i determin\u0103 dispunerea acestuia &#8211; curat\u0103, r\u0103u inten\u021bionat\u0103 sau necunoscut\u0103. At\u00e2t fi\u0219ierele mali\u021bioase c\u00e2t \u0219i cele curate nu necesit\u0103 investiga\u021bii suplimentare; cu toate acestea, fi\u0219ierele necunoscute sunt \u00eenc\u0103rcate \u00een serviciul de analiz\u0103 a fi\u0219ierelor &#8211; Threat Grid. Acesta este o tehnologie puternic\u0103 care aplic\u0103 tehnici de analiz\u0103 static\u0103 \u0219i dinamic\u0103. Ajut\u0103 la analizarea, detectarea \u0219i \u00een\u021belegerea activit\u0103\u021bii miniere sau a malware-ului, ce face acesta, c\u00e2t de mare este amenin\u021barea \u0219i c\u00e2t de bine se poate ap\u0103ra \u00eempotriva acesteia. Analiza dureaz\u0103 \u00eentre 7-15 minute. Odat\u0103 finalizat, Threat Grid furnizeaz\u0103 un raport de analiz\u0103 \u00eempreun\u0103 cu un scor de amenin\u021bare pe care \u00eel folose\u0219te Advanced Anti-Malware Protection (AMP) la clasificarea fi\u0219ierului. Odat\u0103 ce un fi\u0219ier este clasificat ca fiind mali\u021bios, este blocat \u0219i e-mailul cu acest fi\u0219ier \u00een ata\u0219ament nu este livrat utilizatorului. Acest sistem de analiz\u0103 bazat pe cloud \u0219i pe sistemul de informa\u021bii despre amenin\u021b\u0103ri identific\u0103 tipul de comportament men\u021bionat \u00een cele dou\u0103 tehnici noi pe care atacatorii le folosesc pentru a evita detectarea sandbox-urilor. Folosind func\u021biile &#8222;content-aware&#8221;, Threat Grid se asigur\u0103 c\u0103 aceste tipuri de atacuri nu evit\u0103 analiza sandbox-urilor pentru a opri desc\u0103rcarea fi\u0219ierelor r\u0103u inten\u021bionate \u00een inbox-ul utilizatorilor. Threat Grid are, de asemenea, indicatori pentru a detecta dac\u0103 activitatea minier\u0103 este prezent\u0103. Pentru o \u00een\u021belegere mai profund\u0103 a modului \u00een care AMP \u0219i Threat Grid func\u021bioneaz\u0103 \u00een cadrul Cisco Email Security, citi\u021bi blogul detaliat pe aceast\u0103 tem\u0103. Pute\u021bi, de asemenea, s\u0103 citi\u021bi pe blog despre noua interfa\u021b\u0103 de re\u021bea Threat Grid UI pentru a afla cum toate modific\u0103rile intermediare v\u0103 vor ajuta s\u0103 ob\u021bine\u021bi mai rapid informa\u021bii relevante.<\/p>\n<p>O solu\u021bie puternic\u0103 de securitate prin e-mail este o parte esen\u021bial\u0103 a strategiei dvs. de securitate deoarece majoritatea bre\u0219elor \u00een securitate \u00eencep prin e-mail.Cisco Email Security utilizeaz\u0103 puterea Cisco Talos, una dintre cele mai mari echipe de cercetare a amenin\u021b\u0103rilor din lume, pe l\u00e2ng\u0103 Threat Grid. Cu o astfel de inteligen\u021b\u0103 robust\u0103 a amenin\u021b\u0103rilor, clien\u021bii Cisco Email Security blocheaz\u0103 tot mai multe amenin\u021b\u0103ri. \u0218i AMP care este parte a Cisco Email Security \u00eei ajut\u0103 pe clien\u021bi s\u0103 vad\u0103 mai multe amenin\u021b\u0103ri \u00een mai multe locuri prin intermediul arhitecturii acesteia. AMP i\u0219i \u00eemp\u0103rt\u0103\u0219e\u0219te analizele \u0219i verdictele la nivel global pentru \u00eembun\u0103t\u0103\u021birea eficacit\u0103\u021bii amenin\u021b\u0103rii pentru to\u021bi clien\u021bii. Cu ajutorul acestui trio puternic &#8211; Talos, AMP \u0219i Threat Grid &#8211; Cisco Email Security protejeaz\u0103 mii de organiza\u021bii la nivel mondial, de peste un deceniu, \u00eempotriva amenin\u021b\u0103rilor vechi \u0219i noi deopotriv\u0103.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Numai p\u00e2n\u0103 la sf\u00e2r\u0219itul anului 2017 cercet\u0103torii din zona securit\u0103\u021bii cibernetice au descoperit campanii de spam care livreaz\u0103 \u00eenc\u0103rc\u0103ri criptografice utiliz\u00e2nd ata\u0219amentele de e-mail. \u00cen unele cazuri, un document Word descarc\u0103 \u00eenc\u0103rcarea criptografic\u0103 printr-o macrocomand\u0103 r\u0103u inten\u021bionat\u0103. Atacatorii continu\u0103, de asemenea, s\u0103 ascund\u0103 programele malware \u00een ata\u0219amentele de e-mail. Este sigur s\u0103 presupunem c\u0103 tendin\u021ba<\/p>\n","protected":false},"author":1,"featured_media":1214,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[151],"tags":[121,48],"class_list":["post-253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noutati","tag-hacking","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploatarea criptografic\u0103 \u0219i programele malware - NAV.RO Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploatarea criptografic\u0103 \u0219i programele malware - NAV.RO Blog\" \/>\n<meta property=\"og:description\" content=\"Numai p\u00e2n\u0103 la sf\u00e2r\u0219itul anului 2017 cercet\u0103torii din zona securit\u0103\u021bii cibernetice au descoperit campanii de spam care livreaz\u0103 \u00eenc\u0103rc\u0103ri criptografice utiliz\u00e2nd ata\u0219amentele de e-mail. \u00cen unele cazuri, un document Word descarc\u0103 \u00eenc\u0103rcarea criptografic\u0103 printr-o macrocomand\u0103 r\u0103u inten\u021bionat\u0103. Atacatorii continu\u0103, de asemenea, s\u0103 ascund\u0103 programele malware \u00een ata\u0219amentele de e-mail. Este sigur s\u0103 presupunem c\u0103 tendin\u021ba\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"NAV.RO Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nav6718\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-11T20:34:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T07:38:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"268\" \/>\n\t<meta property=\"og:image:height\" content=\"201\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAV.RO\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nav6718\" \/>\n<meta name=\"twitter:site\" content=\"@nav6718\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAV.RO\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\"},\"author\":{\"name\":\"NAV.RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\"},\"headline\":\"Exploatarea criptografic\u0103 \u0219i programele malware\",\"datePublished\":\"2018-04-11T20:34:02+00:00\",\"dateModified\":\"2025-07-18T07:38:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\"},\"wordCount\":938,\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg\",\"keywords\":[\"Hacking\",\"ransomware\"],\"articleSection\":[\"NOUT\u0102\u021aI\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\",\"name\":\"Exploatarea criptografic\u0103 \u0219i programele malware - NAV.RO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg\",\"datePublished\":\"2018-04-11T20:34:02+00:00\",\"dateModified\":\"2025-07-18T07:38:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg\",\"width\":268,\"height\":201},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\/\/www.nav.ro\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploatarea criptografic\u0103 \u0219i programele malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"name\":\"NAV.RO Blog\",\"description\":\"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO\",\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nav.ro\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\",\"name\":\"NAV Communications\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"width\":1120,\"height\":800,\"caption\":\"NAV Communications\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nav6718\",\"https:\/\/x.com\/nav6718\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\",\"name\":\"NAV.RO\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"caption\":\"NAV.RO\"},\"sameAs\":[\"https:\/\/www.nav.ro\"],\"url\":\"https:\/\/www.nav.ro\/blog\/author\/useradmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploatarea criptografic\u0103 \u0219i programele malware - NAV.RO Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/","og_locale":"ro_RO","og_type":"article","og_title":"Exploatarea criptografic\u0103 \u0219i programele malware - NAV.RO Blog","og_description":"Numai p\u00e2n\u0103 la sf\u00e2r\u0219itul anului 2017 cercet\u0103torii din zona securit\u0103\u021bii cibernetice au descoperit campanii de spam care livreaz\u0103 \u00eenc\u0103rc\u0103ri criptografice utiliz\u00e2nd ata\u0219amentele de e-mail. \u00cen unele cazuri, un document Word descarc\u0103 \u00eenc\u0103rcarea criptografic\u0103 printr-o macrocomand\u0103 r\u0103u inten\u021bionat\u0103. Atacatorii continu\u0103, de asemenea, s\u0103 ascund\u0103 programele malware \u00een ata\u0219amentele de e-mail. Este sigur s\u0103 presupunem c\u0103 tendin\u021ba","og_url":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/","og_site_name":"NAV.RO Blog","article_publisher":"https:\/\/www.facebook.com\/nav6718","article_published_time":"2018-04-11T20:34:02+00:00","article_modified_time":"2025-07-18T07:38:18+00:00","og_image":[{"width":268,"height":201,"url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg","type":"image\/jpeg"}],"author":"NAV.RO","twitter_card":"summary_large_image","twitter_creator":"@nav6718","twitter_site":"@nav6718","twitter_misc":{"Scris de":"NAV.RO","Timp estimat pentru citire":"5 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#article","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/"},"author":{"name":"NAV.RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e"},"headline":"Exploatarea criptografic\u0103 \u0219i programele malware","datePublished":"2018-04-11T20:34:02+00:00","dateModified":"2025-07-18T07:38:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/"},"wordCount":938,"publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg","keywords":["Hacking","ransomware"],"articleSection":["NOUT\u0102\u021aI"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/","url":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/","name":"Exploatarea criptografic\u0103 \u0219i programele malware - NAV.RO Blog","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg","datePublished":"2018-04-11T20:34:02+00:00","dateModified":"2025-07-18T07:38:18+00:00","breadcrumb":{"@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#primaryimage","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/exploatare_criptografica_programe_malware.jpg","width":268,"height":201},{"@type":"BreadcrumbList","@id":"https:\/\/www.nav.ro\/blog\/exploatarea-criptografica-si-programele-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/www.nav.ro\/blog\/"},{"@type":"ListItem","position":2,"name":"Exploatarea criptografic\u0103 \u0219i programele malware"}]},{"@type":"WebSite","@id":"https:\/\/www.nav.ro\/blog\/#website","url":"https:\/\/www.nav.ro\/blog\/","name":"NAV.RO Blog","description":"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO","publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nav.ro\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.nav.ro\/blog\/#organization","name":"NAV Communications","url":"https:\/\/www.nav.ro\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","width":1120,"height":800,"caption":"NAV Communications"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nav6718","https:\/\/x.com\/nav6718"]},{"@type":"Person","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e","name":"NAV.RO","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","caption":"NAV.RO"},"sameAs":["https:\/\/www.nav.ro"],"url":"https:\/\/www.nav.ro\/blog\/author\/useradmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":2,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":4003,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/253\/revisions\/4003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media\/1214"}],"wp:attachment":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}