{"id":1701,"date":"2022-05-19T23:53:53","date_gmt":"2022-05-19T23:53:53","guid":{"rendered":"https:\/\/avestim.com\/utilizarea-conturilor-de-whatsapp-si-evitarea-unor-atacuri-prin-metode-de-social-engineering\/"},"modified":"2022-05-23T06:12:24","modified_gmt":"2022-05-23T06:12:24","slug":"utilizarea-conturilor-de-whatsapp-si-evitarea-unor-atacuri-prin-metode-de-social-engineering","status":"publish","type":"post","link":"https:\/\/avestim.com\/ro\/utilizarea-conturilor-de-whatsapp-si-evitarea-unor-atacuri-prin-metode-de-social-engineering\/","title":{"rendered":"Utilizarea conturilor de WhatsApp \u0219i evitarea unor atacuri prin metode de social engineering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1701\" class=\"elementor elementor-1701 elementor-1547\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ebeda7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ebeda7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-efa21fb\" data-id=\"efa21fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f07cfae elementor-widget elementor-widget-text-editor\" data-id=\"f07cfae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">\u00cen ultima perioad\u0103 de timp \u00een Romania au avut loc mai multe atacuri de tip cibernetic care au vizat mailurile \u0219i mesajele prin intermediul aplica\u021biilor de comunicare. Este vorba despre \u00eencercarea atacatorilor de a ob\u021bine acces la conturile de WhatsApp ale anumitor persoane-\u021bint\u0103 prin tehnici avansate de inginerie social\u0103.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2952e7a elementor-widget elementor-widget-heading\" data-id=\"2952e7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cum func\u021bioneaz\u0103 acest tip de atac cibernetic?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-228df0c elementor-widget elementor-widget-text-editor\" data-id=\"228df0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">Pentru a utiliza aplica\u021bia de WhatsApp trebuie s\u0103 ne conect\u0103m cu num\u0103rul de telefon. \u00cen momentu conect\u0103rii pe un cont de WhatsApp deja existent, aplica\u021bia va trimite prin SMS automat o parole unic\u0103, pentru a verifica num\u0103rul de telefon.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Atacatorii profit\u0103 de acest process pentru a prelua controlul acelor conturi de WhatsApp luate \u00een vizor de ei.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Atacatorii pot lua mai multe forme, folosind identit\u0103\u021bi false (prieten apropiat, WhatsApp Suport Team, lan\u021b de magazine, etc.) pentru a protifa \u0219i a utiliza datele furate. <\/span><span style=\"font-weight: 400;\">Pentru a \u00eencerca s\u0103 induc\u0103 \u00een eroare poten\u021bialele victime \u0219i pentru o rat\u0103 de succes mai ridicat\u0103, atacatorii inten\u021bioneaz\u0103 s\u0103 utilizeze inclusiv adrese de email sau conturi de utilizator falsificate ca apar\u021bin\u00e2nd unor institu\u021bii publice sau organiza\u021bii cunoscute din Rom\u00e2nia.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">\u00cen multe cazuri, atacatorii ob\u021bin num\u0103rul de telefon al unei victime prin intermediul unui cont de WhatsApp deja compromis. Urm\u0103torul pas const\u0103 \u00eentr-o nou\u0103 instalare a aplica\u021biei pe telefonul atacatorului, \u00een cadrul c\u0103reia este furnizat num\u0103rul de telefon al victimei. Aceasta va primi prin SMS un cod de \u00eenregistrare, care este solicitat ulterior de atacatorul care joac\u0103 rolul unui prieten, ori chiar a WhatsApp Support Team. Pentru a Evita astfel de evenimente, este necesar activarea optiunii <\/span><span style=\"font-weight: 400;\">\u00a0\u201eTwo-Step Verification\u201d. Aceasta se g\u0103se\u0219te \u00een cadrul set\u0103rilor din aplica\u021bia WhatsApp.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e66dfd7 elementor-widget elementor-widget-heading\" data-id=\"e66dfd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Promo\u021bii false pe platformele de comer\u021b electronic <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dec2e9 elementor-widget elementor-widget-text-editor\" data-id=\"3dec2e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">Atacatorii folosesc conturi WhatsApp deturnate pentru a distribui mesaje de con\u021binut fals c\u0103tre platformele de comer\u021b electronic (cum ar fi ofertele speciale) c\u0103tre utilizatorii viza\u021bi. Cu aceste informa\u021bii, victimele sunt p\u0103c\u0103lite s\u0103 trimit\u0103 un \u201ecod promo\u021bional\u201d primit pe telefonul lor, care este de fapt un cod de \u00eenregistrare WhatsApp.\u00a0<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Adesea, acest cod promo\u021bional este \u00eenso\u021bit \u0219i de un link al\u0103turi de un text \u00een care este precizat faptul c\u0103 trebuie descarcat\u0103 aplica\u021bia ce se afl\u0103 pe linkul din mesaj pentru a revendica premiul ca\u0219tigat \u00een valoare de o sum\u0103 mare de bani (pute\u021bi vedea exemplul \u00een imaginea ata\u0219at\u0103 acestui articol).<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3df791a elementor-widget elementor-widget-heading\" data-id=\"3df791a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"> Accesarea conturilor de mesagerie vocal\u0103 cu parole implicit<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-756ab1d elementor-widget elementor-widget-text-editor\" data-id=\"756ab1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">Dac\u0103 utilizatorul opre\u0219te telefonul (de obicei noaptea), atacatorul ar putea introduce \u00een mod repetat codul de \u00eenregistrare WhatsApp gre\u0219it. Prin urmare, un atacator ar putea alege s\u0103 efectueze verificarea vocal\u0103, unde WhatsApp va suna telefonul utilizatorului \u0219i va trimite un cod care va citi \u201ecu voce tare\u201d \u00een mesaj. Desigur, mesajul vocal va fi redirec\u021bionat c\u0103tre mesageria vocal\u0103 a victimei, care poate fi accesat\u0103 cu u\u0219urin\u021b\u0103 dac\u0103 victima nu a schimbat parola implicit\u0103.<\/span>\r\n\r\n&nbsp;\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5ff2f8 elementor-widget elementor-widget-heading\" data-id=\"f5ff2f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sfaturi pentru securizarea contului de WhatsAapp<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48a14df elementor-widget elementor-widget-text-editor\" data-id=\"48a14df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">Pentru evitarea atacurilor descrise, este recomandat\u0103 implementarea urm\u0103toarelor m\u0103suri de securitate:<\/span>\r\n<ul>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Activarea op\u021biunii \u201eTwo-Step Verification\u201d pe WhatsApp, ce poate fi g\u0103sit\u0103 \u00een cadrul set\u0103rilor pentru aplica\u021bia WhatsApp.<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Schimbarea PIN-ului pentru mesageria vocal\u0103. Mai multe informa\u021bii \u00een acest sens pot fi ob\u021binute prin contactarea furnizorului de telefonie mobil\u0103.<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nu \u00eemp\u0103rt\u0103\u0219i\u021bi cu nimeni codurile de verificare sau \u201eone-time passwords\u201d specifice contului de WhatsApp.<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nu r\u0103spunde\u021bi mesajelor venite de la un contact sau de la un str\u0103in, prin care sunt solicitate aceste coduri.<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nu accesa\u021bi link-uri \u0219i nu oferi\u021bi date personale \u00een cadrul acestor conversa\u021bii.<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Verifica\u021bi autenticitatea mesajului prin mijloace alternative, precum apelarea contactului. Dac\u0103 mesajul provine de la un contact necunoscut, raporta\u021bi num\u0103rul c\u0103tre WhatsApp.<\/span><\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-864a5e4 elementor-widget elementor-widget-heading\" data-id=\"864a5e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ce trebuie s\u0103 face\u021bi pentru a v\u0103 recupera contul?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17c75f3 elementor-widget elementor-widget-text-editor\" data-id=\"17c75f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<b>Dac\u0103 a\u021bi fost victima unui astfel de atac<\/b><span style=\"font-weight: 400;\">, pute\u021bi s\u0103 intra\u021bi \u00een contul de WhatsApp prin intermediul num\u0103rului de telefon. Ve\u021bi primi un nou cod de \u00eenregistrare, iar atacatorul va fi delogat.<\/span>\r\n\r\n<b>Pentru cazul \u00een care atacatorul a activat autentificarea \u00een 2 pa\u0219i (2FA)<\/b><span style=\"font-weight: 400;\">, poate fi necesar s\u0103 a\u0219tepta\u021bi 7 zile pentru a accesa contul, f\u0103r\u0103 verificarea prin doi pa\u0219i. Victimele care prefer\u0103 s\u0103 \u0219tearg\u0103 \u0219i s\u0103 reinstaleze aplica\u021bia vor pierde istoricul conversa\u021biilor, \u00een cazurile \u00een care nu au la dispozi\u021bie copii de siguran\u021b\u0103 (back-up) anteriorare, care s\u0103 func\u021bioneze.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Pentru a limita riscul infect\u0103rii cu ransomware \u0219i a evita criptarea sau distrugerea datelor, este obligatorie \u0219i realizarea de copii de siguran\u021b\u0103 (backup) pentru site-uri, baze de date sau orice alt tip de date expuse \u00een mediul Internet, precum \u0219i stocarea acestor copii \u00een loca\u021bii separate.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7da3e9c elementor-widget elementor-widget-image\" data-id=\"7da3e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"604\" height=\"258\" src=\"https:\/\/avestim.com\/wp-content\/uploads\/2022\/05\/Capture9.png\" class=\"attachment-large size-large wp-image-1550\" alt=\"\" srcset=\"https:\/\/avestim.com\/wp-content\/uploads\/2022\/05\/Capture9.png 604w, https:\/\/avestim.com\/wp-content\/uploads\/2022\/05\/Capture9-300x128.png 300w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00cen ultima perioad\u0103 de timp \u00een Romania au avut loc mai multe atacuri de tip cibernetic care au vizat mailurile \u0219i mesajele prin intermediul aplica\u021biilor de comunicare. Este vorba despre \u00eencercarea atacatorilor de a ob\u021bine acces la conturile de WhatsApp ale anumitor persoane-\u021bint\u0103 prin tehnici avansate de inginerie social\u0103. Cum func\u021bioneaz\u0103 acest tip de atac [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-ro"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/posts\/1701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/comments?post=1701"}],"version-history":[{"count":1,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/posts\/1701\/revisions"}],"predecessor-version":[{"id":1702,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/posts\/1701\/revisions\/1702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/media\/1549"}],"wp:attachment":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/media?parent=1701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/categories?post=1701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/tags?post=1701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}