{"id":38705,"date":"2020-12-21T18:54:30","date_gmt":"2020-12-21T17:54:30","guid":{"rendered":"https:\/\/www.soitron.com\/?p=38705"},"modified":"2022-06-22T11:47:52","modified_gmt":"2022-06-22T10:47:52","slug":"social-hacking-v-priamom-prenose","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/","title":{"rendered":"Social hacking (vishing)v priamom prenose"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Podel\u00edm sa s vami o re\u00e1lnu sk\u00fasenos\u0165. Z vlastnej iniciat\u00edvy som sa rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku mi bolo jasn\u00e9, \u017ee ide o riaden\u00fd \u201e<a href=\"https:\/\/www.soitron.sk\/slovnik-kybernetickej-bezpecnosti\/\">social hacking<\/a>\u201d. Sn\u00e1\u010f tieto riadky posl\u00fa\u017eia be\u017en\u00fdm pou\u017e\u00edvate\u013eom ako rada, aby neurobili neuv\u00e1\u017een\u00fd krok.<\/strong><\/p>\n\n\n\n<p>V ostatnej dobe som mal nieko\u013eko telefon\u00e1tov z r\u00f4znych nezn\u00e1mych \u010d\u00edsiel, zo Slovenska, USA, posledn\u00fd z Nemecka. Po zodvihnut\u00ed na m\u0148a v\u017edy prehovorila anglicky hovoriaca indka, vraj pracovn\u00ed\u010dka Microsoftu. Upozornila ma na probl\u00e9m s mojim po\u010d\u00edta\u010dom, ktor\u00fd sa im objavil v ich support centre. Prv\u00e9 telefon\u00e1ty som odbil, ale pri \u0161tvrtom som si povedal, \u017ee tomu nech\u00e1m vo\u013en\u00fd priebeh. Od za\u010diatku mi bolo jasn\u00e9, \u017ee je to cel\u00e9 \u201efake\u201c, ale chcel som vedie\u0165, kam to a\u017e z\u00e1jde&#8230;<\/p>\n\n\n\n<p>Dozvedel som sa, \u017ee m\u00f4j po\u010d\u00edta\u010d ovl\u00e1dli hackeri, \u017ee mi m\u00f4\u017eu zmaza\u0165 d\u00e1ta a \u017ee \u201eMicrosoft\u201d ma zachr\u00e1ni. Na moju ot\u00e1zku, pre\u010do ma kontaktuj\u00fa takto, som sa dozvedel, \u017ee emaily, ktor\u00e9 mi posielali, mi hackeri v mojom po\u010d\u00edta\u010di vymazali. Mnohokr\u00e1t padla z ich strany ot\u00e1zka, \u010di je to m\u00f4j s\u00fakromn\u00fd alebo firemn\u00fd po\u010d\u00edta\u010d <em>(tvrdil som, \u017ee s\u00fakromn\u00fd)<\/em>. Pre\u0161iel som cez \u201er\u00f4zne oddelenia\u201c, a\u017e som skon\u010dil u mu\u017ea \u201e\u0161pecialistu\u201d. Ten ma cez telef\u00f3n naviedol, aby som si otvoril Event Viewer a tam sa s\u00e1m presved\u010dil o tom, \u017ee ma naozaj ovl\u00e1daj\u00fa hackeri <em>(v logu je ve\u013ea Warning-ov, sem-tam nejak\u00fd Error, pre Windows opera\u010dn\u00fd syst\u00e9m je to \u00faplne norm\u00e1lne)<\/em>. Moja argument\u00e1cia, \u017ee s\u00fa to len ne\u0161kodn\u00e9 hl\u00e1\u0161ky, som dostal odpove\u010f, \u017ee to \u201ehackeri takto maskuj\u00fa\u201d. V tomto bode som mal by\u0165 dostato\u010dne presved\u010den\u00fd, \u017ee m\u00f4j po\u010d\u00edta\u010d je naozaj napadnut\u00fd. Chlap\u00edk \u201ema dostal&#8221; tam, kam chcel, a i\u0161iel rovno na vec\u2026<\/p>\n\n\n\n<p>Cez webov\u00fd prehliada\u010d ma naviedol, aby som si stiahol napr. UltraVNC, TeamViewer<em> (program, ktor\u00fd mu umo\u017en\u00ed vzdialene sa pripoji\u0165 na m\u00f4j po\u010d\u00edta\u010d)<\/em>. Na moju ot\u00e1zku, \u010di sa chce pripoji\u0165 ku mne, odpovedal, \u017ee nie. Vraj ide o \u0161peci\u00e1lny softv\u00e9r, ktor\u00fdm mi vie \u0161kody sp\u00e1chan\u00e9 hackermi odstr\u00e1ni\u0165 z po\u010d\u00edta\u010da. St\u00e1le ma presvied\u010dal, \u017ee som len oby\u010dajn\u00fd user, a preto tomu nem\u00f4\u017eem rozumie\u0165, a \u017ee on ma \u201ezachr\u00e1ni\u201c. Ke\u010f som mu vysvetlil, \u017ee \u201esa tomu rozumiem&#8221; a viem, \u010do rob\u00ed, telefon\u00e1t ve\u013emi r\u00fdchlo ukon\u010dil.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">O \u010dom bolo toto cel\u00e9?<\/h2>\n\n\n\n<p>Ide o re\u00e1lny pr\u00edklad <strong>\u201esocial hackingu&#8221;<\/strong>, kde <strong>sa \u00fato\u010dn\u00edk sna\u017e\u00ed presved\u010di\u0165 ni\u010d netu\u0161iaceho pou\u017e\u00edvate\u013ea, aby \u201eho pustil&#8221; do svojho po\u010d\u00edta\u010da<\/strong>. T\u00fdm by \u00fato\u010dn\u00edk prevzal kontrolu nad jeho vlastn\u00fdm po\u010d\u00edta\u010dom, d\u00e1tami, \u00fa\u010dtami a \u010fal\u0161\u00edmi citliv\u00fdmi \u00fadajmi.<\/p>\n\n\n\n<p>Treba si uvedomi\u0165, \u017ee dne\u0161n\u00e9 \u201epo\u010d\u00edta\u010de&#8221; s\u00fa relat\u00edvne dobre zabezpe\u010den\u00e9, pokia\u013e s\u00fa ich opera\u010dn\u00e9 syst\u00e9my pravidelne aktualizovan\u00e9. <strong>Ove\u013ea v\u00e4\u010d\u0161\u00edm bezpe\u010dnostn\u00fdm rizikom je \u010dlovek za kl\u00e1vesnicou.<\/strong> Ten \u201eklikan\u00edm&#8221; na podvodn\u00e9 odkazy, in\u0161tal\u00e1ciou neoveren\u00fdch programov, odovzd\u00e1van\u00edm vlastn\u00fdch hesiel a in\u00fdmi neuv\u00e1\u017een\u00fdmi \u00fakonmi otv\u00e1ra dvere do vlastn\u00e9ho po\u010d\u00edta\u010da. Inak povedan\u00e9, najlep\u0161\u00edm \u201eantiv\u00edrakom&#8221; je s\u00e1m u\u017e\u00edvate\u013e. Treba len trochu zdrav\u00e9ho rozumu.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Podel\u00edm sa s vami o re\u00e1lnu sk\u00fasenos\u0165. Z vlastnej iniciat\u00edvy som sa rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku mi bolo jasn\u00e9, \u017ee ide o riaden\u00fd \u201esocial hacking\u201d. Sn\u00e1\u010f tieto riadky posl\u00fa\u017eia be\u017en\u00fdm pou\u017e\u00edvate\u013eom ako rada, aby neurobili neuv\u00e1\u017een\u00fd krok. V ostatnej dobe som mal nieko\u013eko telefon\u00e1tov z r\u00f4znych nezn\u00e1mych \u010d\u00edsiel, zo Slovenska, USA, posledn\u00fd [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":38712,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33],"tags":[],"news_categories":[370],"class_list":["post-38705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","news_categories-bezpecnost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social hacking (vishing)v priamom prenose - Soitron<\/title>\n<meta name=\"description\" content=\"N\u00e1\u0161 kolega rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku vedel, \u017ee ide o riaden\u00fd \u201esocial hacking\u201d. Pre\u010d\u00edtajte si, ako postupoval.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social hacking (vishing)v priamom prenose - Soitron\" \/>\n<meta property=\"og:description\" content=\"N\u00e1\u0161 kolega rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku vedel, \u017ee ide o riaden\u00fd \u201esocial hacking\u201d. Pre\u010d\u00edtajte si, ako postupoval.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T17:54:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-22T10:47:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1051\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jana Skalska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jana Skalska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min\u00faty\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social hacking (vishing)v priamom prenose - Soitron","description":"N\u00e1\u0161 kolega rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku vedel, \u017ee ide o riaden\u00fd \u201esocial hacking\u201d. Pre\u010d\u00edtajte si, ako postupoval.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"sk_SK","og_type":"article","og_title":"Social hacking (vishing)v priamom prenose - Soitron","og_description":"N\u00e1\u0161 kolega rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku vedel, \u017ee ide o riaden\u00fd \u201esocial hacking\u201d. Pre\u010d\u00edtajte si, ako postupoval.","og_url":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/","og_site_name":"Soitron","article_published_time":"2020-12-21T17:54:30+00:00","article_modified_time":"2022-06-22T10:47:52+00:00","og_image":[{"width":1051,"height":788,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788.jpg","type":"image\/jpeg"}],"author":"Jana Skalska","twitter_card":"summary_large_image","twitter_misc":{"Autor":"Jana Skalska","Predpokladan\u00fd \u010das \u010d\u00edtania":"2 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/"},"author":{"name":"Jana Skalska","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/70724a93c7b9106bcdf018c2b66c2b0b"},"headline":"Social hacking (vishing)v priamom prenose","datePublished":"2020-12-21T17:54:30+00:00","dateModified":"2022-06-22T10:47:52+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/"},"wordCount":585,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788.jpg","articleSection":["\u010cl\u00e1nky"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/","url":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/","name":"Social hacking (vishing)v priamom prenose - Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788.jpg","datePublished":"2020-12-21T17:54:30+00:00","dateModified":"2022-06-22T10:47:52+00:00","description":"N\u00e1\u0161 kolega rozhodol podst\u00fapi\u0165 mal\u00fd experiment, pri\u010dom od za\u010diatku vedel, \u017ee ide o riaden\u00fd \u201esocial hacking\u201d. Pre\u010d\u00edtajte si, ako postupoval.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788.jpg","width":1051,"height":788,"caption":"anonymous person in the hood sitting in front of computer working with laptop and mobile phone"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/sk\/social-hacking-v-priamom-prenose\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Social hacking (vishing)v priamom prenose"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s viac ako 30 ro\u010dnou trad\u00edciou.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/70724a93c7b9106bcdf018c2b66c2b0b","name":"Jana Skalska","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47ab9fce582b442842aa803334d9c66d8790ee1a9fe8d33044a172f9a1b2716b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47ab9fce582b442842aa803334d9c66d8790ee1a9fe8d33044a172f9a1b2716b?s=96&d=mm&r=g","caption":"Jana Skalska"},"sameAs":["https:\/\/www.soitron.com"],"url":"https:\/\/new.soitron.com\/sk\/author\/skalska\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/38705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/comments?post=38705"}],"version-history":[{"count":0,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/38705\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media\/38712"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media?parent=38705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/categories?post=38705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/tags?post=38705"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/news_categories?post=38705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}