{"id":95299,"date":"2022-04-26T08:59:54","date_gmt":"2022-04-26T06:59:54","guid":{"rendered":"https:\/\/blog.wedos.cz\/?p=95299"},"modified":"2022-04-26T08:59:56","modified_gmt":"2022-04-26T06:59:56","slug":"phishingove-kampane-a-na-co-si-dat-pozor","status":"publish","type":"post","link":"https:\/\/blog.wedos.com\/cs\/phishingove-kampane-a-na-co-si-dat-pozor","title":{"rendered":"Phishingov\u00e9 kampan\u011b a na co si d\u00e1t pozor"},"content":{"rendered":"\n<p>V pr\u016fb\u011bhu b\u0159ezna jsme zaznamenali dv\u011b v\u011bt\u0161\u00ed phishingov\u00e9 kampan\u011b, kter\u00e9 sm\u011b\u0159ovaly na na\u0161e z\u00e1kazn\u00edky. C\u00edlem bylo z\u00edskat p\u0159\u00edstup do z\u00e1kaznick\u00e9 administrace a e-mailov\u00fdch schr\u00e1nek. Ob\u011b tyto kampan\u011b jsme i d\u00edky proaktivn\u00edmu p\u0159\u00edstupu z\u00e1kazn\u00edk\u016f mohli detailn\u011b monitorovat a zabr\u00e1nit zneu\u017eit\u00ed slu\u017eeb u z\u00e1kaznick\u00fdch \u00fa\u010dt\u016f, kte\u0159\u00ed kyberpodvodn\u00edk\u016fm nalet\u011bli. <\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"proc-jsou-kampane-cilene-na-zakazniky-wedos\">Pro\u010d jsou kampan\u011b c\u00edlen\u00e9 na z\u00e1kazn\u00edky WEDOS <\/h2>\n\n\n\n<p><strong>WEDOS je podle mnoha m\u011b\u0159\u00edtek nejv\u011bt\u0161\u00edm poskytovatelem hostingov\u00fdch slu\u017eeb v \u010cesku<\/strong>. T\u00e9m\u011b\u0159 ka\u017ed\u00e1 p\u00e1t\u00e1 dom\u00e9na sm\u011b\u0159uje do na\u0161ich datacenter. Z\u00e1rove\u0148 jsme jedn\u00edm z nejv\u011bt\u0161\u00edch registr\u00e1tor\u016f dom\u00e9n v \u010cesku (mo\u017en\u00e1 nejv\u011bt\u0161\u00ed, ve\u0159ejn\u00e9 statistiky pro v\u011bt\u0161inu dom\u00e9nov\u00fdch koncovek nejsou).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"694\" height=\"616\" data-src=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/obrazek.png\" alt=\"\" class=\"wp-image-95742 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/obrazek.png 694w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/obrazek-300x266.png 300w\" data-sizes=\"(max-width: 694px) 100vw, 694px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 694px; --smush-placeholder-aspect-ratio: 694\/616;\" \/><figcaption>Po\u010det hostovan\u00fdch .cz dom\u00e9n 05.04.2022 podle <a href=\"https:\/\/old-stats.nic.cz\/stats\/hosting\/?sd=hosting_type&amp;sv=1&amp;rd=2022-04-05&amp;dr=0d&amp;tp=i-1d&amp;ss=2&amp;ss=25&amp;ss=29&amp;ss=48&amp;ss=54&amp;ss=71&amp;ss=68&amp;ss=74&amp;ss=51&amp;ss=59&amp;ds=normal&amp;da=chart\" target=\"_blank\" rel=\"noopener\">ve\u0159ejn\u00fdch statistik CZ.NIC<\/a>.<\/figcaption><\/figure>\n\n\n\n<p>Kyberpodvodn\u00edk\u016fm se tak vyplat\u00ed vyu\u017e\u00edt na\u0161i zna\u010dku ve sv\u00fdch kampan\u00edch. I kdy\u017e sv\u016fj spam budou c\u00edlit &#8222;na slepo&#8220;, s po\u010dtem z\u00e1kazn\u00edk\u016f kter\u00e9 m\u00e1me, se mnohokr\u00e1t tref\u00ed. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"proc-probihaji-phishingove-kampane-prave-ted\">Pro\u010d prob\u00edhaj\u00ed phishingov\u00e9 kampan\u011b pr\u00e1v\u011b te\u010f<\/h2>\n\n\n\n<p>Fyzick\u00e1 v\u00e1lka se vede na Ukrajin\u011b, ale ta kybernetick\u00e1 po cel\u00e9m sv\u011bt\u011b. Bezpe\u010dnostn\u00ed t\u00fdmy mus\u00ed \u0159e\u0161it v\u00edce bezpe\u010dnostn\u00edch incident\u016f a jsou tak\u00e9 vl\u00e1dn\u00edmi institucemi vyz\u00fdv\u00e1ny k v\u011bt\u0161\u00edmu dohledu a pos\u00edlen\u00ed kybernetick\u00fdch ochran. Pozornost se tak p\u0159esouv\u00e1 sp\u00ed\u0161e k DDoS \u00fatok\u016fm, malware, hacknut\u00fdm web\u016fm atd. Klasick\u00e9 phishingov\u00e9 kampan\u011b ustupuj\u00ed do pozad\u00ed, \u010deho\u017e se samoz\u0159ejm\u011b kyberpodvodn\u00edci sna\u017e\u00ed vyu\u017e\u00edvat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"jak-phishingova-kampan-probiha\">Jak phishingov\u00e1 kampa\u0148 prob\u00edh\u00e1<\/h2>\n\n\n\n<p>Velk\u00e9 phishingov\u00e9 kampan\u011b pot\u0159ebuj\u00ed zdroje a ty zaji\u0161\u0165uje botnet. Co\u017e je s\u00ed\u0165 napaden\u00fdch stroj\u016f (servery, po\u010d\u00edta\u010de, mobiln\u00ed telefony, televize, ledni\u010dky, online kamery &#8230; prost\u011b cokoliv p\u0159ipojen\u00e9ho k internetu), kter\u00e9 \u00fato\u010dn\u00edci mohou na d\u00e1lku \u0159\u00eddit z takzvan\u00fdch command &amp; control server\u016f (C&amp;C).<\/p>\n\n\n\n<p>V botnetu jsou i napaden\u00e9 weby, kter\u00e9 maj\u00ed backdoor. To je skript, v\u011bt\u0161inou dob\u0159e schovan\u00fd, p\u0159es kter\u00fd m\u016f\u017ee \u00fato\u010dn\u00edk prov\u00e1d\u011bt \u0159adu \u00fakon\u016f, mezi nimi i vytv\u00e1\u0159et webov\u00e9 str\u00e1nky. Pr\u00e1v\u011b takto m\u016f\u017ee vzniknout c\u00edlov\u00e1 webov\u00e1 str\u00e1nka, na kterou budou sm\u011b\u0159ovat odkazy z phishingov\u00fdch e-mail\u016f. Respektive des\u00edtky anebo i stovky c\u00edlov\u00fdch str\u00e1nek na r\u016fzn\u00fdch napaden\u00fdch webech.<\/p>\n\n\n\n<p>Toto nemus\u00ed b\u00fdt pravidlo. N\u011bkdy \u00fato\u010dn\u00edci pou\u017eij\u00ed \u010d\u00edsla ukraden\u00fdch kreditn\u00edch karet a prost\u011b si koup\u00ed slu\u017ebu VPS\/webhostingu v\u010detn\u011b dom\u00e9ny, kter\u00e1 je podobn\u00e1 t\u00e9, kam se z\u00e1kazn\u00edk b\u011b\u017en\u011b p\u0159ihla\u0161uje. <\/p>\n\n\n\n<p>Pak za\u010dne rozes\u00edl\u00e1n\u00ed phishingov\u00fdch e-mail\u016f. Jednotliv\u00e9 za\u0159\u00edzen\u00ed v botnetu obdr\u017e\u00ed seznamy, kam maj\u00ed pos\u00edlat spam. <\/p>\n\n\n\n<p>V dne\u0161n\u00ed dob\u011b u\u017e jsou phishingov\u00e9 e-maily \u010dasto kvalitn\u011b p\u0159elo\u017een\u00e9 do \u010de\u0161tiny. Text je nal\u00e9hav\u00fd a \u010dasto dob\u0159e odlad\u011bn\u00fd, aby bylo dosa\u017eeno, co nejv\u011bt\u0161\u00ed m\u00edry \u00fasp\u011b\u0161nosti.<\/p>\n\n\n\n<p>Pokud u\u017eivatel zad\u00e1 \u00fadaje na phishingov\u00e9 str\u00e1nce, tak jsou ihned p\u0159epos\u00edl\u00e1ny na servery ovl\u00e1daj\u00edc\u00ed kyberpodvodn\u00edky, tam vyhodnoceny a p\u0159epos\u00edl\u00e1ny d\u00e1l, aby mohlo doj\u00edt k zneu\u017eit\u00ed. U\u017eivatel si toti\u017e \u010dasto velice rychle uv\u011bdom\u00ed, \u017ee nalet\u011bl a m\u016f\u017ee prov\u00e9st opat\u0159en\u00ed ke zamezen\u00ed zneu\u017eit\u00ed \u00fa\u010dtu. P\u0159\u00edpadn\u011b kontaktuje z\u00e1kaznickou podporu, kter\u00e1 \u00fa\u010det zablokuje, ne\u017e dojde ke zm\u011bn\u011b v\u0161ech p\u0159ihla\u0161ovac\u00edch \u00fadaj\u016f. <\/p>\n\n\n\n<p><strong>Proto pokud m\u00e1te podez\u0159en\u00ed, \u017ee jste nalet\u011bli, tak \u0159e\u0161en\u00ed neodkl\u00e1dejte<\/strong>. Ka\u017ed\u00e1 vte\u0159ina se po\u010d\u00edt\u00e1.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"co-je-dobre-o-phishingu-vedet\">Co je dobr\u00e9 o phishingu v\u011bd\u011bt<\/h2>\n\n\n\n<p>Phishing je tu s n\u00e1mi dlouho a i p\u0159es zaveden\u00ed mnoha ochrann\u00fdch prvk\u016f je\u0161t\u011b bude. Neomezuje se jen na e-maily. Prob\u00edh\u00e1 i p\u0159es telefon (vishing), SMS (smishing), soci\u00e1ln\u00ed s\u00edt\u011b, koment\u00e1\u0159e v diskuz\u00edch atd. Dokonce v\u00e1m klidn\u011b m\u016f\u017ee p\u0159ij\u00edt i po\u0161tou. T\u00edm to ale nekon\u010d\u00ed. M\u016f\u017ee b\u00fdt skryt\u00fd i venku na ulici v QR k\u00f3du, prost\u011b kdekoliv. <\/p>\n\n\n\n<p>V n\u00e1sleduj\u00edc\u00edch odstavc\u00edch se pod\u00edv\u00e1me na phishing detailn\u011bji.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"co-je-v-e-mailu-s-phishingem-nebezpecneho\">Co je v e-mailu s phishingem nebezpe\u010dn\u00e9ho<\/h3>\n\n\n\n<p>Existuje v\u00edce mo\u017enost\u00ed, jak d\u011blit phishing. Pro \u00fa\u010dely tohoto \u010dl\u00e1nku si jej rozd\u011bl\u00edme na zp\u016fsoby, kter\u00fdmi v\u00e1m chce ubl\u00ed\u017eit.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"nebezpecny-odkaz\">Nebezpe\u010dn\u00fd odkaz<\/h4>\n\n\n\n<p>Jedn\u00e1 se o nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00ed druh phishingu, proto\u017ee se rozes\u00edl\u00e1 jen text (HTML), kde je n\u011bkolik odkaz\u016f. V\u011bt\u0161ina z nich nemus\u00ed b\u00fdt nebezpe\u010dn\u00e1 a m\u016f\u017ee pro vzbuzen\u00ed d\u016fv\u011bry sm\u011b\u0159ovat na ofici\u00e1ln\u00ed str\u00e1nky. Jenom\u017ee odkaz, kter\u00fd bude prov\u00e1d\u011bt d\u016fle\u017eitou a po\u017eadovanou akci, vede na phishingovou str\u00e1nku. <\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"html-odkazy\">HTML odkazy<\/h5>\n\n\n\n<p>Nen\u00ed p\u0159itom odkaz jako odkaz. D\u00edky HTML m\u016f\u017eete b\u011b\u017en\u00fd odkaz, kter\u00fd vypad\u00e1 jako p\u0159\u00edm\u00e1 URL, nasm\u011b\u0159ovat \u00fapln\u011b jinam.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.pojisteni.cz\/kyber\" target=\"_blank\" rel=\"noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">https:\/\/client.wedos.com\/<\/mark><\/a><\/p>\n\n\n\n<p>Sm\u011b\u0159uje v\u00fd\u0161e uveden\u00fd odkaz do na\u0161\u00ed z\u00e1kaznick\u00e9 administrace? Pokud jej ozna\u010d\u00edte a p\u0159ekop\u00edrujete do adresn\u00edho \u0159\u00e1dku prohl\u00ed\u017ee\u010de, tak ano. Jenom\u017ee kdy\u017e na n\u011bj kliknete, tak se dostanete \u00fapln\u011b jinam.<\/p>\n\n\n\n<p>Kam odkaz skute\u010dn\u011b sm\u011b\u0159uje, se m\u016f\u017eete dozv\u011bd\u011bt ze zdrojov\u00e9ho k\u00f3du e-mailu. Z\u00e1le\u017e\u00ed jak\u00e9ho e-mailov\u00e9ho klienta pou\u017e\u00edv\u00e1te. Nap\u0159\u00edklad v Thunderbird otev\u0159ete zdrojov\u00fd k\u00f3d p\u0159es  CTRL+U. <\/p>\n\n\n\n<p>Mnoho lid\u00ed si mysl\u00ed, \u017ee pokud najedou na odkaz my\u0161\u00ed, tak vid\u00ed kam skute\u010dn\u011b sm\u011b\u0159uje. Ov\u0161em ani to nemus\u00ed b\u00fdt pravda, proto\u017ee v\u0161e se d\u00e1 ovlivnit nap\u0159\u00edklad p\u0159es JavaScript. V e-mailu se s t\u00edm z\u0159ejm\u011b nesetk\u00e1te, ale na webu m\u016f\u017eete. <\/p>\n\n\n\n<p><strong>D\u016fle\u017eit\u00e9 je v\u011bd\u011bt, \u017ee odkazy mohou sm\u011b\u0159ovat jinam, ne\u017e se zdaj\u00ed<\/strong>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/wedos-phishing-1.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"1024\" height=\"626\" data-src=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/wedos-phishing-1-1024x626.png\" alt=\"\" class=\"wp-image-95918 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/wedos-phishing-1-1024x626.png 1024w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/wedos-phishing-1-300x183.png 300w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/wedos-phishing-1-768x470.png 768w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/wedos-phishing-1.png 1395w\" data-sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/626;\" \/><\/a><figcaption>P\u0159\u00edklad e-mailu, kde odkaz na podvodnou str\u00e1nku je vytvo\u0159en v HTML.<\/figcaption><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"zkracovace-url\">Zkracova\u010de URL<\/h5>\n\n\n\n<p>V p\u0159\u00edpad\u011b, \u017ee \u00fato\u010dn\u00edk nem\u016f\u017ee anebo nechce pou\u017e\u00edt HTML, tak v\u011bt\u0161inou odkazy maskuje p\u0159es takzvan\u00e9 zkracova\u010de. Nejzn\u00e1m\u011bj\u0161\u00edm je byt.ly. Pou\u017e\u00edvaj\u00ed jej ale i soci\u00e1ln\u00ed s\u00edt\u011b (fb.me, t.co atd.) Jedn\u00e1 se o kr\u00e1tk\u00fd a snadno p\u0159enositeln\u00fd odkaz (URL), na kter\u00fd kdy\u017e kliknete, tak dojde k p\u0159esm\u011brov\u00e1n\u00ed na jinou URL.<\/p>\n\n\n\n<p>P\u0159\u00edklad jak m\u016f\u017ee zkr\u00e1cen\u00e1 URL vypadat:<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">https:\/\/zkr.url\/hAe71<\/span> p\u0159\u00edpadn\u011b <span style=\"text-decoration: underline;\">https:\/\/zkr.url\/WEDOS<\/span><\/p>\n\n\n\n<p><strong>V e-mailu na zkracova\u010de nikdy neklikejte<\/strong>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/wedos-phishing-2.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"596\" height=\"673\" data-src=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/wedos-phishing-2.png\" alt=\"\" class=\"wp-image-95925 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/wedos-phishing-2.png 596w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/wedos-phishing-2-266x300.png 266w\" data-sizes=\"(max-width: 596px) 100vw, 596px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 596px; --smush-placeholder-aspect-ratio: 596\/673;\" \/><\/a><figcaption>Dal\u0161\u00ed uk\u00e1zka podvodn\u00e9ho e-mailu. Odkaz byl maskov\u00e1n zkracova\u010dem.<\/figcaption><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"povedomy-odkaz-v-url\">Pov\u011bdom\u00fd odkaz v URL<\/h5>\n\n\n\n<p>Dal\u0161\u00edm zp\u016fsobem jak vytvo\u0159it &#8222;d\u016fv\u011bryhodn\u00fd&#8220; odkaz je pou\u017e\u00edt ofici\u00e1ln\u00ed kus URL do subdom\u00e9ny. Nap\u0159\u00edklad:<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">https:\/\/<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">client.wedos.com<\/mark>.<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">n\u011bco.cz<\/mark>\/login\/<\/span><\/p>\n\n\n\n<p>Stejn\u011b tak jde d\u00e1t i do n\u00e1zvu cesty, co\u017e je podobn\u00fd p\u0159\u00edpad jako u zkracova\u010de.<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">https:\/\/<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">n\u011bco.cz<\/mark>\/<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">client.wedos.com<\/mark>\/login\/<\/span><\/p>\n\n\n\n<p>O tom co se zobraz\u00ed na c\u00edlov\u00e9m odkazu rozhoduje pouze majitel dom\u00e9ny <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">n\u011bco.cz<\/mark>.<\/p>\n\n\n\n<p>A ochrana proti tomu? <strong>M\u011bjte v prohl\u00ed\u017ee\u010di ulo\u017een\u00e9 odkazy v\u0161eho pot\u0159ebn\u00e9ho (administrace, webmail klient, str\u00e1nky webu atd.)<\/strong>. Pak na n\u011b nemus\u00edte klikat v e-mailu.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"idn-domeny\">IDN dom\u00e9ny<\/h5>\n\n\n\n<p>IDN (Internationalized Domain Names) jsou dom\u00e9ny, kter\u00e9 mohou obsahovat i znaky jin\u00e9 abecedy, ne\u017e je latinka. V n\u011bkter\u00fdch p\u0159\u00edpadech dokonce i emoji. M\u016f\u017eete tedy zvolit jinou abecedu, kter\u00e1 je podobn\u00e1 latince a vytvo\u0159it na dom\u00e9n\u011b s podporou IDN a dan\u00e9 znakov\u00e9 sady, dom\u00e9nu vizu\u00e1ln\u011b podobnou. Na prvn\u00ed pohled to laik nen\u00ed schopen rozeznat.<\/p>\n\n\n\n<p>P\u0159\u00edklad:<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">https:\/\/client.w\u0435d\u043e\u0455.com<\/span><\/p>\n\n\n\n<p>Samotn\u00e1 dom\u00e9na je mixem latinky a cyrilice. Konkr\u00e9tn\u011b obsahuje z latinky W a D, z cyrilice pak \u0415, \u041e, \u0405.<\/p>\n\n\n\n<p>Internetov\u00fd prohl\u00ed\u017ee\u010d IDN dom\u00e9nu p\u0159evede na takzvan\u00fd punycode. Tak\u017ee v adresn\u00edm \u0159\u00e1dku uvid\u00edme:<\/p>\n\n\n\n<p><span style=\"text-decoration: underline;\">https:\/\/client.<strong>xn--wd-nlc1byh<\/strong>.com\/<\/span><\/p>\n\n\n\n<p>Samoz\u0159ejm\u011b pokud v\u00e1\u0161 prohl\u00ed\u017ee\u010d n\u00e1zev nep\u0159elo\u017e\u00ed do punycode, tak to jen st\u011b\u017e\u00ed pozn\u00e1te.<\/p>\n\n\n\n<p>Teoreticky lze pou\u017e\u00edt p\u0159eklada\u010d \u0159et\u011bzc\u016f do ASCII. Velk\u00e1 p\u00edsmena latinky za\u010d\u00ednaj\u00ed 41 a kon\u010d\u00ed 90, mal\u00e1 za\u010d\u00ednaj\u00ed 61 a kon\u010d\u00ed 122, \u010d\u00edsla jsou od 48 do 57. Tak\u017ee pokud pou\u017eijete konvertor textov\u00e9ho \u0159et\u011bzce do ASCII, tak by v\u00e1m u latinky nem\u011blo nikdy vyj\u00edt v\u00edce ne\u017e 122. <\/p>\n\n\n\n<p>P\u0159\u00edklad:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td>\u0158et\u011bzec<\/td><td>Jednotliv\u00e9 znaky podle ASCII<\/td><\/tr><tr><td><mark style=\"background-color:#00d084\" class=\"has-inline-color\">wedos<\/mark><\/td><td><mark style=\"background-color:#00d084\" class=\"has-inline-color\">119<\/mark> <mark style=\"background-color:#00d084\" class=\"has-inline-color\">101<\/mark> <mark style=\"background-color:#00d084\" class=\"has-inline-color\">100<\/mark> <mark style=\"background-color:#00d084\" class=\"has-inline-color\">111<\/mark> <mark style=\"background-color:#00d084\" class=\"has-inline-color\">115<\/mark><\/td><\/tr><tr><td><mark style=\"background-color:#00d084\" class=\"has-inline-color\">w<\/mark><mark style=\"background-color:#cf2e2e\" class=\"has-inline-color\">\u0435<\/mark><mark style=\"background-color:#00d084\" class=\"has-inline-color\">d<\/mark><mark style=\"background-color:#cf2e2e\" class=\"has-inline-color\">\u043e\u0455<\/mark><\/td><td><mark style=\"background-color:#00d084\" class=\"has-inline-color\">119<\/mark> <mark style=\"background-color:#cf2e2e\" class=\"has-inline-color\">1077<\/mark> <mark style=\"background-color:#00d084\" class=\"has-inline-color\">100<\/mark> <mark style=\"background-color:#cf2e2e\" class=\"has-inline-color\">1086<\/mark> <mark style=\"background-color:#cf2e2e\" class=\"has-inline-color\">1109<\/mark><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Ujist\u011bte se, \u017ee prohl\u00ed\u017ee\u010d, kde otv\u00edr\u00e1te odkazy z e-mailu p\u0159ekl\u00e1d\u00e1 IDN dom\u00e9ny do punycode.<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"nebezpecny-text\">Nebezpe\u010dn\u00fd text<\/h4>\n\n\n\n<p>Nej\u010dast\u011bji se setk\u00e1te s phishingov\u00fdmi e-maily, kter\u00e9 podstatnou \u010d\u00e1st podvodu maj\u00ed automatizovanou. Tedy je v nich odkaz na n\u011bjak\u00fd formul\u00e1\u0159, kam m\u00e1te vyplnit p\u0159ihla\u0161ovac\u00ed \u00fadaje, osobn\u00ed \u00fadaje anebo dal\u0161\u00ed zneu\u017eiteln\u00e9 \u00fadaje. Existuje v\u0161ak \u0159ada podvod\u016f, kde je sou\u010d\u00e1st\u00ed lidsk\u00e1 interakce. <\/p>\n\n\n\n<p>Nejzn\u00e1m\u011bj\u0161\u00ed jsou takzvan\u00e9 <em>Nigerijsk\u00e9 dopisy<\/em> (<em>Scam419<\/em>), kdy v\u00e1m n\u011bkdo zcela nezn\u00e1m\u00ed nap\u00ed\u0161e, \u017ee jste zd\u011bdili, vyhr\u00e1li anebo jinak p\u0159i\u0161li k n\u011bjak\u00e9mu velk\u00e9mu jm\u011bn\u00ed. Sta\u010d\u00ed kdy\u017e odpov\u00edte a domluv\u00edte se na detailech. Co\u017e vede k dal\u0161\u00ed komunikaci, zavr\u0161en\u00e9 \u017e\u00e1dost\u00ed o mal\u00fd administrativn\u00ed poplatek. Kdy\u017e jej uhrad\u00edte, tak p\u0159ijde dal\u0161\u00ed komunikace a \u017e\u00e1dost o v\u011bt\u0161\u00ed poplatek. To se opakuje dokud ob\u011b\u0165 podvodu plat\u00ed. <\/p>\n\n\n\n<p>Zat\u00edmco v\u00fd\u0161e uveden\u00e9 podvody maj\u00ed pom\u011brn\u011b pr\u016fhledn\u00fd sc\u00e9n\u00e1\u0159 a jsou u\u017e celkem zn\u00e1m\u00e9, tak zvl\u00e1\u0161t\u011b na firmy mohou sm\u011b\u0159ovat c\u00edlen\u00e9 a o dost komplikovan\u011bj\u0161\u00ed podvody.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"bec-business-email-compromise\">BEC (Business Email Compromise)<\/h5>\n\n\n\n<p>Jedn\u00e1 se o zvl\u00e1\u0161tn\u00ed formu phishingov\u00e9ho \u00fatoku, kter\u00e1 c\u00edl\u00ed na zam\u011bstnance firem. \u00dato\u010dn\u00edk se \u010dasto vyd\u00e1v\u00e1 za veden\u00ed firmy a sna\u017e\u00ed se p\u0159im\u011bt nepozorn\u00e9 zam\u011bstnance, z\u00e1kazn\u00edky anebo obchodn\u00ed partnery, aby uhradili objedn\u00e1vku na jin\u00fd \u00fa\u010det.<\/p>\n\n\n\n<p>Tento druh \u00fatok\u016f nen\u00ed radno podce\u0148ovat. U n\u00e1s zat\u00edm nen\u00ed tak moc roz\u0161\u00ed\u0159en\u00fd, ale v USA se v\u00fdznamnou m\u011brou pod\u00edl\u00ed na ztr\u00e1t\u00e1ch spole\u010dnost\u00ed zp\u016fsoben\u00fdch kybernetick\u00fdmi hrozbami. Je jen ot\u00e1zkou, kdy se u n\u00e1s opravdu roz\u0161\u00ed\u0159\u00ed. <\/p>\n\n\n\n<p>Je dobr\u00e9 pro\u0161kolit zam\u011bstnance, zvl\u00e1\u0161t\u011b ty, kte\u0159\u00ed mohou n\u011bco uhradit, \u017ee toto nebezpe\u010d\u00ed opravdu hroz\u00ed. M\u016f\u017ee jim napsat n\u011bkdo, kdo se bude vyd\u00e1vat za veden\u00ed spole\u010dnosti a po\u017eadovat okam\u017eit\u00e9 uhrazen\u00ed pen\u011bz d\u016fle\u017eit\u00e9mu dodavateli. E-mail od nich p\u0159itom m\u016f\u017ee vypadat opravdu re\u00e1ln\u011b. Pou\u017eit\u00e1 je stejn\u00e1 \u0161ablona, sed\u00ed jm\u00e9na, loga atd.<\/p>\n\n\n\n<p>Jak se br\u00e1nit?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/kb.wedos.com\/cs\/webhosting\/e-maily\/e-maily-nastaveni-spf-zaznamu\/\" target=\"_blank\" rel=\"noopener\">SPF je naprost\u00e1 nutnost<\/a> &#8211; bez t\u00e9to technologie a jej\u00ed d\u016fsledn\u00e9 kontroly v e-mailov\u00e9m klientu je mo\u017en\u00e9 podvrhnout e-mailovou adresu odes\u00edlatele. <\/li><li>Ulo\u017ete si v\u0161echny d\u016fle\u017eit\u00e9 e-maily do adres\u00e1\u0159e kontakt\u016f a nechte e-mailov\u00e9ho klienta, a\u0165 v\u00e1s upozorn\u00ed pokud p\u00ed\u0161ete na e-mail, kter\u00fd v adres\u00e1\u0159i kontakt\u016f nen\u00ed. Pokud budete odpov\u00eddat na podvodn\u00fd e-mail z jin\u00e9 dom\u00e9ny, tak v\u00e1s prohl\u00ed\u017ee\u010d upozorn\u00ed.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/obrazek-1.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"546\" height=\"109\" data-src=\"https:\/\/blog.wedos.cz\/wp-content\/uploads\/2022\/04\/obrazek-1.png\" alt=\"\" class=\"wp-image-95932 lazyload\" data-srcset=\"https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/obrazek-1.png 546w, https:\/\/blog.wedos.com\/wp-content\/uploads\/2022\/04\/obrazek-1-300x60.png 300w\" data-sizes=\"(max-width: 546px) 100vw, 546px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 546px; --smush-placeholder-aspect-ratio: 546\/109;\" \/><\/a><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Pokud je n\u011bco nal\u00e9hav\u00e9ho, tak tomu v\u011bnujte zvl\u00e1\u0161tn\u00ed pozornost. Pokud podvodn\u00edk nem\u00e1 p\u0159\u00edstup k intern\u00ed komunikaci, \u010dasto jsou v textu nep\u0159esnosti a chyby. K ov\u011b\u0159en\u00ed pravosti vyu\u017eijte dal\u0161\u00ed komunika\u010dn\u00ed kan\u00e1ly v r\u00e1mci firemn\u00ed komunikace (telefon, intern\u00ed chat).<\/li><li>Obzvl\u00e1\u0161\u0165 si d\u00e1vejte pozor na vy\u0159izov\u00e1n\u00ed takov\u00fdch e-mail\u016f na mobiln\u00edm telefonu. <\/li><li>Zam\u011bstnance je t\u0159eba pravideln\u011b \u0161kolit a p\u0159ipom\u00ednat jim existenci rizik. Neu\u0161kod\u00ed, kdy\u017e n\u011bjak\u00fd phishing p\u0159ijde, tak ud\u011blat screenshot a pro v\u00fdstrahu jej poslat cel\u00e9 firm\u011b. <\/li><li>V r\u00e1mci intern\u00edch syst\u00e9mu byste m\u011bli monitorovat, kdo se odkud p\u0159ipojuje. V p\u0159\u00edpad\u011b neobvykl\u00e9 aktivity to prov\u011b\u0159it. Nejnebezpe\u010dn\u011bj\u0161\u00ed je, pokud n\u011bkdo p\u0159ijde o p\u0159ihla\u0161ovac\u00ed \u00fadaje k e-mailu a n\u011bkdo roze\u0161le phishing z ofici\u00e1ln\u00ed adresy. <\/li><\/ul>\n\n\n\n<p>Zvl\u00e1\u0161tn\u00ed formou jsou takzvan\u00e9 <strong>clone phishing<\/strong>. Jedn\u00e1 se o e-maily, kter\u00e9 kop\u00edruj\u00ed ofici\u00e1ln\u00ed \u0161ablonu a m\u011bn\u00ed se pouze kam zaplatit. P\u0159\u00edpadn\u011b dopl\u0148uj\u00edc\u00ed informaci, \u017ee v p\u0159edchoz\u00edm e-mailu je star\u00e9 \u010d\u00edslo \u00fa\u010dtu. Podvodn\u00edci je rozes\u00edlaj\u00ed t\u011bsn\u011b potom, co odejde ofici\u00e1ln\u00ed e-mail. C\u00edl si tak p\u0159e\u010dte jak prvn\u00ed, tak i druh\u00fd e-mail. Pokud v\u00fdzvu k \u00fahrad\u011b o\u010dek\u00e1v\u00e1 a p\u0159ijde mu jeden prav\u00fd a jeden podvodn\u00fd, tak nemus\u00ed b\u00fdt ve st\u0159ehu. Snadno nalet\u00ed. Tento druh podvodu lze d\u011blat zvl\u00e1\u0161t\u011b pokud pos\u00edl\u00e1te e-maily s v\u00fdzvou v pravideln\u00fdch intervalech v\u0161em.<\/p>\n\n\n\n<p>Odkazy pro okam\u017eitou platbu v e-mailu jsou pohodln\u00e9, ale pokud chcete m\u00edt jistotu, tak si sta\u010d\u00ed ulo\u017eit v prohl\u00ed\u017ee\u010di adresu s objedn\u00e1vkami ze z\u00e1kaznick\u00e9 administrace. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/client.wedos.com\/invoicing\/orders-list.html\" target=\"_blank\" rel=\"noopener\">https:\/\/client.wedos.com\/invoicing\/orders-list.html<\/a><\/li><\/ul>\n\n\n\n<p>Na t\u00e9to str\u00e1nce najdete seznam v\u00fdzev k \u00fahrad\u011b i jejich stav. Prokliknete \u010d\u00edslo v\u00fdzvy a kliknete na <strong>prov\u00e9st platbu<\/strong>  anebo <strong>uhradit ze z\u00e1lohov\u00e9ho \u00fa\u010dtu<\/strong>.<\/p>\n\n\n\n<p>Dal\u0161\u00ed zvl\u00e1\u0161tn\u00ed formou je <strong>spear phishing<\/strong>. Zde se ne\u00fato\u010d\u00ed n\u00e1hodn\u011b, ale c\u00edlen\u011b. \u00dato\u010dn\u00edk m\u00e1 znalosti o c\u00edlov\u00e9 organizaci anebo i jednotlivci, kter\u00fd e-mail obdr\u017e\u00ed a bude vy\u0159izovat. Tyto \u010dasto osobn\u00ed informace bude cht\u00edt vyu\u017e\u00edt k zv\u00fd\u0161en\u00ed d\u016fv\u011bryhodnosti, n\u00e1tlaku atd. C\u00edlem spear phishingu b\u00fdv\u00e1 hlavn\u011b veden\u00ed spole\u010dnosti a pracovn\u00edci faktura\u010dn\u00edho odd\u011blen\u00ed. T\u011bmto skupin\u00e1m je t\u0159eba p\u0159i \u0161kolen\u00ed v\u011bnovat zvl\u00e1\u0161tn\u00ed pozornost. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"nebezpecna-priloha\">Nebezpe\u010dn\u00e1 p\u0159\u00edloha<\/h4>\n\n\n\n<p>Zde u\u017e se od klasick\u00e9ho phishingu dost\u00e1v\u00e1me trochu d\u00e1l. Pokud zrovna botnet neprov\u00e1d\u00ed n\u011bjak\u00fd \u00fatok, tak se sna\u017e\u00ed zv\u011bt\u0161ovat po\u010det napaden\u00fdch stroj\u016f. K tomu se \u010dasto pou\u017e\u00edv\u00e1 rozes\u00edl\u00e1n\u00ed e-mailu s nebezpe\u010dnou p\u0159\u00edlohou, kter\u00fd do va\u0161eho po\u010d\u00edta\u010de dostane malware.<\/p>\n\n\n\n<p>Technicky nen\u00ed nebezpe\u010dn\u00e1 samotn\u00e1 p\u0159\u00edloha, ale program, kter\u00fd j\u00ed otev\u0159e. Proto\u017ee ten na z\u00e1klad\u011b informac\u00ed v p\u0159\u00edloze m\u016f\u017ee prov\u00e9st akci, kter\u00e1 povede k infekci po\u010d\u00edta\u010de. Je tak t\u0159eba aby programy, v kter\u00fdch se p\u0159\u00edlohy budou otv\u00edrat, byly bezpe\u010dn\u00e9, p\u0159\u00edpadn\u011b m\u011bly jen omezen\u00e1 pr\u00e1va.<\/p>\n\n\n\n<p>V\u00fdrazn\u011b zvedne zabezpe\u010den\u00ed bezpe\u010dnostn\u00ed bal\u00ed\u010dek (antivir, firewall). Ten m\u016f\u017ee automaticky detekovat hrozbu a bu\u010f ji eliminovat anebo pozastavit. Na ka\u017ed\u00e9m po\u010d\u00edta\u010di by tak nem\u011bl chyb\u011bt. Mus\u00ed v\u0161ak m\u00edt opr\u00e1vn\u011bn\u00ed vid\u011bt do komunikace a p\u0159\u00edpadn\u011b do n\u00ed zasahovat.<\/p>\n\n\n\n<p>Jak mohou b\u00fdt jednotliv\u00e9 p\u0159\u00edlohy nebezpe\u010dn\u00e9:<\/p>\n\n\n\n<p>ALZ, ARJ, RAR, TAR, ZIP &#8211; Jedn\u00e1 se o komprimovan\u00fd soubor, m\u016f\u017ee obsahovat spustiteln\u00fd soubor. Ob\u010das b\u00fdv\u00e1 zaheslovan\u00fd (heslo je v textu e-mailu), t\u00edm je tak\u00e9 za\u0161ifrovan\u00fd a antivir v n\u011bm nem\u016f\u017ee naj\u00edt \u0161kodliv\u00fd k\u00f3d.<\/p>\n\n\n\n<p>BAT &#8211; Soubor s p\u0159\u00edkazy pro Windows, kter\u00e9 m\u00e1 vykonat. <\/p>\n\n\n\n<p>DOC, DOCX, XLS, XLSM, XLSX &#8211; Soubor kancel\u00e1\u0159sk\u00e9ho bal\u00ed\u010dku m\u016f\u017ee obsahovat makra, kter\u00e1 pomohou dostat do va\u0161eho po\u010d\u00edta\u010de malware. Spou\u0161t\u011bn\u00ed maker by m\u011blo b\u00fdt v kancel\u00e1\u0159sk\u00e9m bal\u00ed\u010dku zak\u00e1zan\u00e9. <\/p>\n\n\n\n<p>COM, EXE &#8211; Spustiteln\u00fd soubor, kter\u00fd p\u0159\u00edmo m\u016f\u017ee obsahovat malware.<\/p>\n\n\n\n<p>HTML\/HTM &#8211; Soubor webov\u00e9 str\u00e1nky, m\u016f\u017ee obsahovat JavaScript, kter\u00fd se pokus\u00ed zavolat nebezpe\u010dn\u00fd k\u00f3d.<\/p>\n\n\n\n<p>JNLP &#8211; Obsahuje informaci pro sta\u017een\u00ed souboru JAR, co\u017e je program v Java. <\/p>\n\n\n\n<p>PDF &#8211; Soubory PDF pou\u017e\u00edv\u00e1me denn\u011b. V\u011bt\u0161inou v nich jsou dokumenty, kter\u00e9 si m\u016f\u017eeme pohodln\u011b p\u0159e\u010d\u00edst na kter\u00e9mkoliv po\u010d\u00edta\u010di. Probl\u00e9m je, \u017ee mohou obsahovat nebezpe\u010dn\u00fd k\u00f3d (\u010derva), kter\u00fd m\u016f\u017ee propa\u0161ovat do syst\u00e9mu malware. Ka\u017ed\u00e9 PDF by m\u011bl proj\u00edt v\u00e1\u0161 antivirus. Pokud otv\u00edr\u00e1te PDF v po\u010d\u00edta\u010di, \u010dte\u010dka by m\u011bla m\u00edt vypnut\u00e1 v\u0161echna roz\u0161\u00ed\u0159en\u00ed t\u0159et\u00edch stran a z\u00e1kaz spou\u0161t\u011bn\u00ed JavaScript.  Samoz\u0159ejm\u011b chce to m\u00edt \u010dte\u010dku PDF v\u017edy aktualizovanou. Extr\u00e9mn\u00ed pozor si dejte na PDF, kter\u00e9 jsou zabalen\u00e9 v archivu (ZIP, RAR atd.) a \u0161ifrovan\u00e9. <\/p>\n\n\n\n<p>Tento seznam nen\u00ed kompletn\u00ed a slou\u017e\u00ed pouze pro ilustraci.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"jak-se-phishingu-branit\">Jak se phishingu br\u00e1nit<\/h2>\n\n\n\n<p>Z\u00e1kladem je nikomu nev\u011b\u0159it a p\u0159ipravit se, \u017ee v\u0161echno m\u016f\u017ee b\u00fdt podvod. Kyberpodvodn\u00edci ka\u017ed\u00fd den vym\u00fd\u0161l\u00ed lep\u0161\u00ed a lep\u0161\u00ed metody, jak v\u00e1s podv\u00e9st. N\u011bkter\u00e9 jsou zcela nemysliteln\u00e9, tak\u017ee v\u016f\u010di v\u00e1m budou v\u017edy o krok nap\u0159ed. Neu\u0161kod\u00ed tak b\u00fdt p\u0159ehnan\u011b opatrn\u00fd.<\/p>\n\n\n\n<p>Bezpe\u010dnostn\u00ed bal\u00ed\u010dky obsahuj\u00edc\u00ed antivirus, firewall a dal\u0161\u00ed pom\u016fcky mohou pomoct. Jednak p\u0159\u00edmo odhal\u00ed nap\u0159\u00edklad nebezpe\u010dnou p\u0159\u00edlohu, a tak\u00e9 mohou pracovat s blacklisty dom\u00e9n, URL, IP adres atd. Kdy\u017e u\u017e v\u00e1m n\u011bco p\u0159ijde, mohou to rovnou smazat anebo v\u00e1m zabr\u00e1n\u00ed nav\u0161t\u00edvit podvodnou str\u00e1nku. To v\u0161ak funguje jen u zn\u00e1m\u00fdch a hromadn\u011b c\u00edlen\u00fdch hrozeb. <\/p>\n\n\n\n<p>Pravideln\u011b aktualizujte v\u0161echen pou\u017e\u00edvan\u00fd software. Nejen opera\u010dn\u00ed syst\u00e9m, ale i prohl\u00ed\u017ee\u010de, e-mailov\u00e9ho klienta, programy s kter\u00fdmi pracujete. <\/p>\n\n\n\n<p>V\u0161echno zneu\u017eiteln\u00e9 byste m\u011bli m\u00edt odd\u011blen\u00e9 a pou\u017e\u00edvat bez nutnosti klikat na odkazy v e-mailu. Ulo\u017ete si v prohl\u00ed\u017ee\u010di do z\u00e1lo\u017eek internetov\u00e9 bankovnictv\u00ed, na\u0161i z\u00e1kaznickou administraci atd.<\/p>\n\n\n\n<p>Kde to jde tak pou\u017e\u00edvejte <a href=\"https:\/\/kb.wedos.com\/cs\/zakaznicke-centrum\/dvou-faktorova-otp-autentizace\/\" target=\"_blank\" rel=\"noopener\">dvoufaktorov\u00e9 ov\u011b\u0159en\u00ed (OTP)<\/a>. Kdy\u017e u\u017e kyberpodvodn\u00edci z\u00edskaj\u00ed p\u0159\u00edstupov\u00e9 \u00fadaje, tak bez druh\u00e9ho za\u0159\u00edzen\u00ed, na kter\u00e9 p\u0159ijde ov\u011b\u0159en\u00ed jim to bude k ni\u010demu. <\/p>\n\n\n\n<p>Ne ka\u017ed\u00fd m\u00e1 p\u0159ehled o kybernetick\u00fdch hrozb\u00e1ch sou\u010dasnosti. Pokud jste v\u00fdjimkou, tak se pod\u011blte s ostatn\u00edmi. Uspo\u0159\u00e1dejte ve firm\u011b s kolegy \u0161kolen\u00ed. Uka\u017ete jim p\u0159\u00edklady. Vyplat\u00ed se tak\u00e9 pos\u00edlat screenshoty s uk\u00e1zkami. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"zaver\">Z\u00e1v\u011br<\/h2>\n\n\n\n<p>D\u016fle\u017eit\u00e9 je ale v p\u0159\u00edpad\u011b, \u017ee se stanete c\u00edlem phishingov\u00e9 kampan\u011b, kter\u00e1 zneu\u017e\u00edv\u00e1 zna\u010dku, to nahl\u00e1sit. Nespol\u00e9hejte na to, \u017ee to ud\u011bl\u00e1 n\u011bkdo jin\u00fd. Poslat screenshot anebo zdrojov\u00fd k\u00f3d je ot\u00e1zkou minutky a spoustu lid\u00ed t\u00edm m\u016f\u017eete zachr\u00e1nit. Spole\u010dnosti maj\u00ed intern\u00ed procesy, jak se s t\u011bmito hrozbami poprat. Od monitorov\u00e1n\u00ed situace, zv\u00fd\u0161en\u00e9ho dohledu, p\u0159es aktivn\u00ed varov\u00e1n\u00ed z\u00e1kazn\u00edk\u016f a\u017e po zaveden\u00ed mimo\u0159\u00e1dn\u00fdch opat\u0159en\u00ed. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>V pr\u016fb\u011bhu b\u0159ezna jsme zaznamenali dv\u011b v\u011bt\u0161\u00ed phishingov\u00e9 kampan\u011b, kter\u00e9 sm\u011b\u0159ovaly na na\u0161e z\u00e1kazn\u00edky. C\u00edlem bylo z\u00edskat p\u0159\u00edstup do z\u00e1kaznick\u00e9 administrace a e-mailov\u00fdch schr\u00e1nek. Ob\u011b tyto kampan\u011b jsme i d\u00edky proaktivn\u00edmu p\u0159\u00edstupu z\u00e1kazn\u00edk\u016f mohli detailn\u011b monitorovat a zabr\u00e1nit zneu\u017eit\u00ed slu\u017eeb u z\u00e1kaznick\u00fdch \u00fa\u010dt\u016f, kte\u0159\u00ed kyberpodvodn\u00edk\u016fm nalet\u011bli.<\/p>\n","protected":false},"author":9,"featured_media":88778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[112],"tags":[187,184],"class_list":["post-95299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezpecnost","tag-e-mail","tag-phishing"],"_links":{"self":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts\/95299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/comments?post=95299"}],"version-history":[{"count":9,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts\/95299\/revisions"}],"predecessor-version":[{"id":97619,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/posts\/95299\/revisions\/97619"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/media\/88778"}],"wp:attachment":[{"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/media?parent=95299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/categories?post=95299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wedos.com\/cs\/wp-json\/wp\/v2\/tags?post=95299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}