{"id":809,"date":"2024-02-28T07:30:12","date_gmt":"2024-02-28T05:30:12","guid":{"rendered":"https:\/\/techlance.ddns.net\/?p=809"},"modified":"2024-02-28T07:30:19","modified_gmt":"2024-02-28T05:30:19","slug":"android-pohjaiset-pankkitroijalaiset-kuinka-ne-varastavat-salasanoja-ja-tyhjentavat-pankkitileja","status":"publish","type":"post","link":"https:\/\/techlance.ddns.net\/en\/android-pohjaiset-pankkitroijalaiset-kuinka-ne-varastavat-salasanoja-ja-tyhjentavat-pankkitileja\/","title":{"rendered":"Android-pohjaiset pankkitroijalaiset: Kuinka ne varastavat salasanoja ja tyhjent\u00e4v\u00e4t pankkitilej\u00e4"},"content":{"rendered":"<p>Maailman suosituimmalle k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4lle, joka on Android ja se ei edes ole kilpailu, on olemassa salakavala kyberuhka, joka voi tyhjent\u00e4\u00e4 henkil\u00f6n pankkitilit t\u00e4ytt\u00e4\u00e4kseen kyberrikollisten laittomat kassat.<\/p>\n\n\n\n<p>N\u00e4m\u00e4 ovat &#8221;Android-pohjaiset pankkitroijalaiset&#8221;, ja vuoden 2024 ThreatDown Malware-tilanneraportin mukaan Malwarebytes havaitsi niit\u00e4 viime vuonna h\u00e4mm\u00e4stytt\u00e4v\u00e4t 88 500 kappaletta.<\/p>\n\n\n\n<p>Vaikka vuoden 2024 ThreatDown Malware-tilanneraportti keskittyykin raskaasti t\u00e4m\u00e4n p\u00e4iv\u00e4n yritysturvallisuuden maisemaan, \u00e4lk\u00e4\u00e4 erehtyk\u00f6: Android-pohjaiset pankkitroijalaiset muodostavat vakavan uhan tavallisille k\u00e4ytt\u00e4jille. Ne on naamioitu hyvin, niit\u00e4 on vaikea havaita tavallisessa k\u00e4yt\u00f6ss\u00e4, ja ne ovat suosittu hakkerointity\u00f6kalu kyberrikollisille, jotka haluavat automatisoida verkossa olevien varojen varastamisen itselleen.<\/p>\n\n\n\n<p>For the most popular operating system in the world\u2014which is Android and it isn\u2019t even a contest\u2014there\u2019s a sneaky cyberthreat that can empty out a person\u2019s bank accounts to fill the illicit coffers of cybercriminals. These are \u201cAndroid banking trojans,\u201d and, according to our 2024 ThreatDown State of Malware report, Malwarebytes detected an astonishing 88,500 of them last year alone. While the 2024 ThreatDown State of Malware report focuses heavily on the corporate security landscape today, make no mistake: Android banking trojans pose a serious threat to everyday users. They are well-disguised, hard to detect in regular use, and are a favorite hacking tool for cybercriminals who want to automate the theft of online funds for themselves.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/android-banking-trojans-how-they-steal-passwords-and-drain-bank-accounts\">https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/android-banking-trojans-how-they-steal-passwords-and-drain-bank-accounts<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Maailman suosituimmalle k\u00e4ytt\u00f6j\u00e4rjestelm\u00e4lle, joka on Android ja se ei edes ole kilpailu, on olemassa salakavala kyberuhka, joka voi tyhjent\u00e4\u00e4 henkil\u00f6n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9],"tags":[15],"class_list":["post-809","post","type-post","status-publish","format-standard","hentry","category-security","tag-tietoturva"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts\/809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/comments?post=809"}],"version-history":[{"count":0,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts\/809\/revisions"}],"wp:attachment":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/media?parent=809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/categories?post=809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/tags?post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}