{"id":42260,"date":"2021-07-28T11:02:00","date_gmt":"2021-07-28T10:02:00","guid":{"rendered":"https:\/\/www.soitron.com\/?p=42260"},"modified":"2022-03-14T11:40:03","modified_gmt":"2022-03-14T10:40:03","slug":"watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/","title":{"rendered":"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed"},"content":{"rendered":"\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Jak napadnout syst\u00e9my, vy\u0159adit z chodu d\u016fle\u017eitou infrastrukturu a \u201evyzob\u00e1vat\u201c data firem? Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to, jak kyberzlo\u010dinci tuto taktiku pou\u017eili p\u0159i pokusu otr\u00e1vit zdroj pitn\u00e9 vody pro 15 tis\u00edc obyvatel.<\/em><\/p>\n\n\n\n<p>K&nbsp;tomuto p\u0159\u00edpadu do\u0161lo ve vod\u00e1rn\u011b \u2013 m\u00edstn\u00edm hlavn\u00edm zdroji pitn\u00e9 vody \u2013&nbsp;v americk\u00e9m m\u011bst\u011b Oldsmar na Florid\u011b. Podle zji\u0161t\u011bn\u00ed byla bezpe\u010dnost vod\u00e1rny opravdu \u201ed\u011brav\u00e1\u201c. Pou\u017e\u00edvali po\u010d\u00edta\u010de s&nbsp;neaktualizovan\u00fdm opera\u010dn\u00edm syst\u00e9mem Windows 7 s&nbsp;vypnut\u00fdm firewallem, pro vzd\u00e1len\u00fd p\u0159\u00edstup p\u0159\u00edmo ke kritick\u00fdm komponent\u016fm pou\u017e\u00edvali program TeamViewer zabezpe\u010den\u00fd jenom jedn\u00edm heslem, kter\u00e9 si sd\u00edleli r\u016fzn\u00ed pracovn\u00edci. Hacke\u0159i z\u00edskali p\u0159\u00edstup k&nbsp;intern\u00edm syst\u00e9m\u016fm vod\u00e1rny pr\u00e1v\u011b p\u0159es TeamViewer. \u00datoku ale p\u0159edch\u00e1zela \u201epr\u016fzkumn\u00e1\u201c f\u00e1ze, kdy se \u00fato\u010dn\u00edci sna\u017eili svou ob\u011b\u0165 poznat a shrom\u00e1\u017edit o n\u00ed co nejv\u00edce informac\u00ed.<\/p>\n\n\n\n<p>Se z\u00edskan\u00fdmi znalostmi se p\u0159ipojili k&nbsp;\u0159\u00eddic\u00edmu syst\u00e9mu vod\u00e1rny a pokusili se ston\u00e1sobn\u011b zv\u00fd\u0161it d\u00e1vkov\u00e1n\u00ed hydroxidu sodn\u00e9ho do vody. Pokud by se jim to poda\u0159ilo, do\u0161lo by k&nbsp;otrav\u011b tis\u00edc\u016f lid\u00ed. Ne\u0161t\u011bst\u00ed &nbsp;zabr\u00e1nil oper\u00e1tor, kter\u00fd se po p\u0159\u00edchodu do pr\u00e1ce p\u0159ihl\u00e1sil k&nbsp;po\u010d\u00edta\u010di a v\u0161iml si na n\u011bm podez\u0159el\u00e9 aktivity. Zam\u011bstnanec sledoval na monitoru voln\u011b se pohybuj\u00edc\u00ed my\u0161 po\u010d\u00edta\u010de. Hacke\u0159i t\u00edmto zp\u016fsobem b\u011bhem chv\u00edle nav\u00fd\u0161ili koncentraci hydroxidu sodn\u00e9ho a zmizeli.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201ePokud by si toho pracovn\u00edk nev\u0161imnul, mohlo doj\u00edt ke katastrof\u011b. Faktem je, \u017ee podobn\u00fdch p\u0159\u00edpad\u016f je ve sv\u011bt\u011b mnoho. Akor\u00e1t se&nbsp;jimi nikdo moc nechlub\u00ed, tak\u017ee se o nich &nbsp;nedozv\u00edme,\u201c<\/em><\/p><cite>podot\u00fdk\u00e1 Martin Lohnert, \u0159editel centra kybernetick\u00e9 bezpe\u010dnosti Void SOC a IT specialista spole\u010dnosti Soitron.<\/cite><\/blockquote>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Zam\u011bstnanci nev\u011bdomky pos\u00edlali hacker\u016fm data<\/h2>\n\n\n\n<div style=\"height:13px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Jak je ale mo\u017en\u00e9, \u017ee se \u00fato\u010dn\u00edk\u016fm n\u011bco takov\u00e9ho povedlo? D\u016fle\u017eit\u00e1 infrastruktura je p\u0159ece d\u016fkladn\u011b hl\u00eddan\u00e1?<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:54% auto\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.soitron.com\/wp-content\/uploads\/2021\/07\/african-safari-wildlife-at-the-waterhole-gill-billington-2-1-900x600.jpg\" alt=\"\" class=\"wp-image-42264 size-full\" srcset=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/african-safari-wildlife-at-the-waterhole-gill-billington-2-1-900x600.jpg 900w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/african-safari-wildlife-at-the-waterhole-gill-billington-2-1-300x200.jpg 300w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/african-safari-wildlife-at-the-waterhole-gill-billington-2-1-768x512.jpg 768w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/african-safari-wildlife-at-the-waterhole-gill-billington-2-1-351x234.jpg 351w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p> <em>\u201eUk\u00e1zalo se, \u017ee v tomto p\u0159\u00edpad\u011b z\u00edskali \u00fato\u010dn\u00edci citliv\u00e9 informace i d\u00edky taktice, tzv. watering hole. P\u0159edstavte si o\u00e1zu v&nbsp;pou\u0161ti, kterou \u00fato\u010dn\u00edk obrazn\u011b \u0159e\u010deno otr\u00e1v\u00ed a pak jen \u010dek\u00e1, a\u017e se ob\u011b\u0165 p\u0159ijde osv\u011b\u017eit a nev\u011bdomky se nakaz\u00ed sama. <\/em><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>V&nbsp;kyberprostoru takovou \u201eo\u00e1zou\u201c m\u016f\u017ee b\u00fdt \u010dasto nav\u0161t\u011bvovan\u00e1 webstr\u00e1nka \u010di online diskusn\u00ed f\u00f3rum. To byl i p\u0159\u00edpad ve zmi\u0148ovan\u00e9 americk\u00e9 vod\u00e1rn\u011b,\u201c <\/em>vysv\u011btluje Martin Lohnert.&nbsp;<\/p>\n\n\n\n<p>\u00dato\u010dnici p\u0159ed \u00fatokem na Oldsmar infikovali web jin\u00e9 spole\u010dnosti \u2013 a nahr\u00e1li do n\u011bj \u0161kodliv\u00fd software. K\u00f3d se objevoval v&nbsp;z\u00e1pat\u00ed webu, kter\u00fd \u010dasto nav\u0161t\u011bvovali zam\u011bstnanci vod\u00e1ren (i t\u00e9 v&nbsp;Odsmaru.) Byl provozovan\u00fd na syst\u00e9mu WordPress. \u00dato\u010dn\u00edci prolomili ochranu webstr\u00e1nky d\u00edky jednomu z&nbsp;mnoha zraniteln\u00fdch plugin\u016f. Na n\u00ed um\u00edstili \u0161kodliv\u00fd k\u00f3d, kter\u00fd z&nbsp;PC n\u00e1v\u0161t\u011bvn\u00edk\u016f bez jejich v\u011bdom\u00ed sb\u00edral data. &nbsp;Tyto informace pak z\u0159ejm\u011b vyu\u017eili k&nbsp; namy\u0161len\u00ed a proveden\u00ed samotn\u00e9ho \u00fatoku na Oldsmar.<\/p>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Zranitelnost nult\u00e9ho dne<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>V\u00fdhodou pro hackery je, \u017ee watering hole je technika, kter\u00e1 nevy\u017eaduje osobn\u00ed \u00fa\u010dast \u00fato\u010dn\u00edka. Hacker naru\u0161\u00ed bezpe\u010dnost ob\u011bt\u00ed \u010dasto nav\u0161t\u011bvovan\u00fdch webov\u00fdch str\u00e1nek. Na web um\u00edst\u00ed \u0161kodliv\u00fd k\u00f3d nebo obsah ke sta\u017een\u00ed. <em>\u201e\u00dato\u010dn\u00edk n\u00e1sledn\u011b vy\u010dk\u00e1v\u00e1, dokud jeho ob\u011b\u0165 str\u00e1nky nenav\u0161t\u00edv\u00ed a pak provede injekt\u00e1\u017e k\u00f3du do po\u010d\u00edta\u010de n\u00e1v\u0161t\u011bvn\u00edka skrze web,\u201c<\/em> \u0159\u00edk\u00e1 Martin Lohnert.<\/p>\n\n\n\n<p>Watering hole prov\u00e1d\u011bj\u00ed elitn\u00ed hacke\u0159i a st\u00e1ty sponzorovan\u00e9 skupiny. \u010casto vyu\u017e\u00edvaj\u00ed takzvanou zranitelnost nult\u00e9ho dne. V&nbsp;informatice se tak ozna\u010duje \u00fatok, kter\u00fd se v&nbsp;po\u010d\u00edta\u010di sna\u017e\u00ed vyu\u017e\u00edt zranitelnosti pou\u017e\u00edvan\u00e9ho softwaru, kter\u00e1 nen\u00ed je\u0161t\u011b obecn\u011b zn\u00e1m\u00e1 a neexistuje proti n\u00ed obrana prost\u0159ednictv\u00edm konkr\u00e9tn\u00edho softwaru \u010di po\u010d\u00edta\u010dov\u00e9ho syst\u00e9mu. D\u00edky tomu je schopen n\u011bkter\u00e9 ochrann\u00e9 \u0159e\u0161en\u00ed obej\u00edt.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201eHacke\u0159i pokra\u010duj\u00ed v osv\u011bd\u010den\u00fdch tric\u00edch, \u0161\u00ed\u0159\u00ed vyd\u011bra\u010dsk\u00e9 a jinak \u0161kodliv\u00e9 viry. Je d\u016fle\u017eit\u00e9 tyto, v&nbsp;uvozovk\u00e1ch popul\u00e1rn\u00ed n\u00e1stroje, aby u\u017eivatel\u00e9 v\u011bd\u011bli, jak se chr\u00e1nit,\u201c<\/em><\/p><cite>doporu\u010duje z\u00e1v\u011brem Martin Lohnert.<\/cite><\/blockquote>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Jak se tak sofistikovan\u00fdm \u00fatok\u016fm br\u00e1nit?<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Firmy mus\u00ed b\u00fdt v&nbsp;r\u00e1mci ochrany sv\u00fdch syst\u00e9m\u016f velmi aktivn\u00ed. D\u016fle\u017eit\u00e9 je nastaven\u00ed a pravideln\u00e9 kontrolov\u00e1n\u00ed proces\u016f zam\u011b\u0159en\u00fdch na zji\u0161t\u011bn\u00ed kybernetick\u00e9 bezpe\u010dnost\u00ed v&nbsp;dan\u00e9 firm\u011b. Podstatn\u00fd je i reak\u010dn\u00ed \u010das, pokud monitoring kybernetick\u00e9 bezpe\u010dnosti zachyt\u00ed pr\u016fnik do syst\u00e9m\u016f firmy. \u201e<em>Ne ka\u017ed\u00fd incident mus\u00ed m\u00edt \u0161patn\u00fd konec, kdy\u017e se za\u010dne situace \u0159e\u0161it okam\u017eit\u011b minimalizujete \u0161kody, nap\u0159. &nbsp;odpojen\u00edm napaden\u00e9ho za\u0159\u00edzen\u00ed v&nbsp;provozu,\u201c <\/em>\u0159\u00edk\u00e1 z\u00e1v\u011brem Martin Lohnert. Odpov\u011bdi na ot\u00e1zky, co d\u011blat p\u0159ed \u00fatokem a po \u00fatoku, jsou podrobn\u011b pops\u00e1ny ve \u010dl\u00e1nku: <strong><a href=\"https:\/\/www.soitron.cz\/pandemie-ransomware-v-cesku-vite-na-co-se-ptat-pokud-jste-obeti-kyberutoku\/\" target=\"_blank\" rel=\"noreferrer noopener\">V\u00edte, na co se pt\u00e1t, pokud jste ob\u011bt\u00ed kyber\u00fatoku?<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jak napadnout syst\u00e9my, vy\u0159adit z chodu d\u016fle\u017eitou infrastrukturu a \u201evyzob\u00e1vat\u201c data firem? Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to, jak kyberzlo\u010dinci tuto taktiku pou\u017eili p\u0159i pokusu otr\u00e1vit zdroj pitn\u00e9 vody pro 15 tis\u00edc obyvatel. K&nbsp;tomuto p\u0159\u00edpadu do\u0161lo ve vod\u00e1rn\u011b \u2013 m\u00edstn\u00edm hlavn\u00edm zdroji pitn\u00e9 [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":42283,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[266],"tags":[313],"news_categories":[371],"class_list":["post-42260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tiskove-spravy","tag-kyberneticka-bezpecnost-cs","news_categories-bezpecnost-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed - Soitron<\/title>\n<meta name=\"description\" content=\"Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to jich taktiku.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed - Soitron\" \/>\n<meta property=\"og:description\" content=\"Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to jich taktiku.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-28T10:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-14T10:40:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/jong-marshes-79mNMAvSORg-unsplash-1920x1440.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leona Dundrova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leona Dundrova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed - Soitron","description":"Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to jich taktiku.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed - Soitron","og_description":"Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to jich taktiku.","og_url":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/","og_site_name":"Soitron","article_published_time":"2021-07-28T10:02:00+00:00","article_modified_time":"2022-03-14T10:40:03+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/jong-marshes-79mNMAvSORg-unsplash-1920x1440.jpg","type":"image\/jpeg"}],"author":"Leona Dundrova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leona Dundrova","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/"},"author":{"name":"Leona Dundrova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238"},"headline":"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed","datePublished":"2021-07-28T10:02:00+00:00","dateModified":"2022-03-14T10:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/"},"wordCount":972,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/jong-marshes-79mNMAvSORg-unsplash-1920x1440.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["Tiskov\u00e9 zpr\u00e1vy"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/","url":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/","name":"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed - Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/jong-marshes-79mNMAvSORg-unsplash-1920x1440.jpg","datePublished":"2021-07-28T10:02:00+00:00","dateModified":"2022-03-14T10:40:03+00:00","description":"Hacke\u0159i jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Aktu\u00e1ln\u011b se zam\u011b\u0159uj\u00ed na \u00fatoky ozna\u010dovan\u00e9 jako watering hole. Poj\u010fme se pod\u00edvat na to jich taktiku.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/jong-marshes-79mNMAvSORg-unsplash-1920x1440.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/07\/jong-marshes-79mNMAvSORg-unsplash-1920x1440.jpg","width":1920,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/cs\/watering-hole-oaza-plna-hackeru-desi-firmy-i-spravce-siti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Watering hole. O\u00e1za pln\u00e1 hacker\u016f d\u011bs\u00ed firmy i spr\u00e1vce s\u00edt\u00ed"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238","name":"Leona Dundrova","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","caption":"Leona Dundrova"},"url":"https:\/\/new.soitron.com\/cs\/author\/leona\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/42260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=42260"}],"version-history":[{"count":0,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/42260\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/42283"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=42260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=42260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=42260"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=42260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}