{"id":685024,"date":"2026-04-01T08:36:04","date_gmt":"2026-04-01T08:36:04","guid":{"rendered":"https:\/\/microscopemedia.com\/?p=685024"},"modified":"2026-04-01T08:36:04","modified_gmt":"2026-04-01T08:36:04","slug":"furt-de-criptomonede-coreea-de-nord-suspectata-intr-un-atac-asupra-unui-software-folosit-de-mii-de-companii","status":"publish","type":"post","link":"https:\/\/microscopemedia.com\/?p=685024","title":{"rendered":"Furt de criptomonede? Coreea de Nord suspectat\u0103 \u00eentr-un atac asupra unui software folosit de mii de companii"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/microscopemedia.com\/wp-content\/uploads\/2026\/04\/furt-de-criptomonede-coreea-de-nord-suspectata-intr-un-atac-asupra-unui-software-folosit-de-mii-de-companii.png\" class=\"ff-og-image-inserted\"><\/div>\n<p id=\"p-0\">Potrivit exper\u021bilor cita\u021bi de <a href=\"https:\/\/edition.cnn.com\/2026\/03\/31\/politics\/north-korea-hacking-crypto\" target=\"_blank\" rel=\"noopener\">CNN<\/a>, atacatorii au reu\u0219it s\u0103 ob\u021bin\u0103 pentru aproximativ trei ore acces la contul unui dezvoltator care administreaz\u0103 software-ul open-source Axios. Softul este utilizat de numeroase companii pentru dezvoltarea \u0219i gestionarea aplica\u021biilor web. \u00cen acest timp, hackerii au distribuit actualiz\u0103ri mali\u021bioase c\u0103tre organiza\u021biile care au desc\u0103rcat software-ul. Ei au reu\u0219it s\u0103 introduc\u0103 un cod capabil s\u0103 compromit\u0103 sistemele afectate. Axios este utilizat de companii din multiple sectoare, inclusiv s\u0103n\u0103tate, finan\u021be \u0219i tehnologie. Unele firme din industria criptomonedelor folosesc acest software \u00een infrastructura lor digital\u0103.<\/p>\n<h2 id=\"chapter-0\">Posibil\u0103 campanie de furt de criptomonede<\/h2>\n<p id=\"p-1\">Speciali\u0219tii de la firma de securitate cibernetic\u0103 Mandiant, de\u021binut\u0103 de Google, au declarat c\u0103 atacul este probabil opera unui grup de hackeri afiliat Coreei de Nord. Potrivit lui Charles Carmakal, director tehnologic al companiei, atacatorii ar putea \u00eencerca s\u0103 foloseasc\u0103 accesul ob\u021binut pentru a p\u0103trunde \u00een sistemele companiilor \u0219i pentru a fura criptomonede. \u201eNe a\u0219tept\u0103m ca hackerii s\u0103 foloseasc\u0103 acredit\u0103rile \u0219i accesul ob\u021binut \u00een acest atac asupra lan\u021bului de aprovizionare software pentru a viza \u0219i a fura criptomonede de la companii\u201d, a spus Carmakal, ad\u0103ug\u00e2nd c\u0103 impactul complet al incidentului ar putea deveni clar abia peste c\u00e2teva luni.<\/p>\n<p id=\"p-2\">Firma de securitate Huntress a identificat p\u00e2n\u0103 acum aproximativ 135 de dispozitive compromise apar\u021bin\u00e2nd unui num\u0103r de circa 12 companii. Exper\u021bii avertizeaz\u0103 \u00eens\u0103 c\u0103 acest num\u0103r ar putea cre\u0219te semnificativ pe m\u0103sur\u0103 ce alte organiza\u021bii \u00ee\u0219i analizeaz\u0103 sistemele \u0219i descoper\u0103 eventuale bre\u0219e. Atacurile asupra lan\u021bului de aprovizionare software sunt considerate printre cele mai periculoase tipuri de opera\u021biuni cibernetice. Motivul este c\u0103 aceste ac\u021biuni pot afecta simultan numeroase organiza\u021bii care utilizeaz\u0103 acela\u0219i produs software.<\/p>\n<h2 id=\"chapter-1\">Hackerii nord-coreeni, o surs\u0103 major\u0103 de finan\u021bare pentru regim<\/h2>\n<p id=\"p-3\">Opera\u021biunile cibernetice ale Coreei de Nord au devenit \u00een ultimii ani o component\u0103 important\u0103 a strategiei economice a regimului, afectat de sanc\u021biuni interna\u021bionale. Potrivit rapoartelor ONU \u0219i firmelor private de securitate, hackerii nord-coreeni au furat miliarde de dolari din b\u0103nci \u0219i platforme de criptomonede. Oficiali americani au declarat \u00een trecut c\u0103 o parte semnificativ\u0103 a programului nuclear \u0219i de rachete al Coreei de Nord este finan\u021bat\u0103 prin astfel de <a href=\"https:\/\/www.mediafax.ro\/social\/diicot-retea-internationala-de-criminalitate-informatica-destructurata-servere-dezactivate-in-7-tari-peste-369-000-de-routere-compromis-23701937\" target=\"_blank\" rel=\"noopener\">atacuri digitale<\/a>.<\/p>\n<p id=\"p-4\">Exper\u021bii spun c\u0103 atacul eviden\u021biaz\u0103 vulnerabilit\u0103\u021bile tot mai mari din lan\u021burile de dezvoltare software, \u00een special \u00een cazul proiectelor open-source. Potrivit cercet\u0103torului John Hammond, adoptarea rapid\u0103 a instrumentelor automate \u0219i a inteligen\u021bei artificiale \u00een dezvoltarea software a dus la o situa\u021bie \u00een care actualiz\u0103rile sunt uneori implementate f\u0103r\u0103 verific\u0103ri suficiente. \u201eCea mai mare sl\u0103biciune a lan\u021bului de aprovizionare software este c\u0103 prea pu\u021bini oameni verific\u0103 atent ce cod ajunge efectiv \u00een sistemele lor\u201d, a spus Hammond. Autorit\u0103\u021bile \u0219i companiile de securitate cibernetic\u0103 continu\u0103 acum evaluarea impactului atacului \u0219i \u00eencearc\u0103 s\u0103 identifice toate organiza\u021biile afectate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Potrivit exper\u021bilor cita\u021bi de CNN, atacatorii au reu\u0219it s\u0103 ob\u021bin\u0103 pentru aproximativ trei ore acces la contul unui dezvoltator care administreaz\u0103 software-ul open-source Axios. Softul este utilizat de numeroase companii &hellip; <a href=\"https:\/\/microscopemedia.com\/?p=685024\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":685025,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts\/685024"}],"collection":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=685024"}],"version-history":[{"count":0,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts\/685024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/media\/685025"}],"wp:attachment":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=685024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=685024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=685024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}