{"id":2305,"date":"2020-03-09T08:15:00","date_gmt":"2020-03-09T07:15:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2305"},"modified":"2024-05-15T17:32:06","modified_gmt":"2024-05-15T15:32:06","slug":"pwndlocker-ppp-daemon-z-luka-lookalike-com","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/","title":{"rendered":"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com"},"content":{"rendered":"\n<p>Firmie Emisoft  uda\u0142o si\u0119 &#8222;rozbroi\u0107&#8221; ransomware PwndLocker. Przynajmniej tymczasowo&#8230; Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 &#8222;utracone&#8221; dane. W tym tygodniu tak\u017ce: numer na wygas\u0142y certyfikat, Linux zagro\u017cony przez 17-letni\u0105 podatno\u015b\u0107. Dodatkowo: rejestracja domeny <em>lookalike<\/em>, NetSupport Manager RAT oraz 670 domen Microsoft, kt\u00f3re ju\u017c do Microsoft nie nale\u017c\u0105 i mog\u0105 wpa\u015b\u0107 w niepowo\u0142ane r\u0119ce.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-certyfikat-stracil-waznosc-uwaga-na-falszywe-powiadomienia\">1. &#8222;<strong>Certyfikat straci\u0142 wa\u017cno\u015b\u0107&#8221; &#8211; uwaga na fa\u0142szywe powiadomienia!<\/strong><\/h2>\n\n\n<p>Przest\u0119pcy testuj\u0105 now\u0105 taktyk\u0119 wstrzykiwania malware. Strasz\u0105 u\u017cytkownik\u00f3w fa\u0142szywymi powiadomieniami o wygas\u0142ym certyfikacie. Oczywi\u015bcie informacja posiada bardzo du\u017cy i dobrze widoczny przycisk z dopiskiem &#8211; <em>Recommended<\/em>.<\/p>\n\n\n\n<p>Ju\u017c na pierwszy rzut oka wida\u0107, \u017ce atakuj\u0105cy licz\u0105 raczej na nie\u015bwiadomych u\u017cytkownik\u00f3w, kt\u00f3rzy nie b\u0119d\u0105 widzie\u0107 czym jest certyfikat i \u017ce to nie oni odpowiadaj\u0105 za jego utrzymanie.<\/p>\n\n\n\n<p>Specjali\u015bci z Kaspersky Lab natrafili na t\u0119 nietypow\u0105 kampani\u0119 po raz pierwszy 16 stycznia br. Powiadomienia s\u0105 dostarczane poprzez element iframe, kt\u00f3ry \u0142aduje zawarto\u015b\u0107 z zewn\u0119trznego \u017ar\u00f3d\u0142a. Wiarygodno\u015bci kampanii dodaje fakt, \u017ce w pasku URL jest widoczny adres przej\u0119tej witryny.<\/p>\n\n\n\n<p>U\u017cytkownicy, kt\u00f3rzy dadz\u0105 si\u0119 podej\u015b\u0107 i klikn\u0105 w przycisk \u201cInstall (Recommended)\u201d zainfekuj\u0105 swoje urz\u0105dzenie malware. Na ten moment atakuj\u0105cy wykorzystuj\u0105 trojana Buerak oraz backdoor\u2019a Mokes. W kolejnym tygodniach zapewne w cyberprzest\u0119pczym portfolio zadebiutuj\u0105 kolejne zagro\u017cenia.<\/p>\n\n\n\n<p>Brzmi znajomo? Oczywi\u015bcie, obecna kampania czerpie z dobrze znanych wzorc\u00f3w. Wtyczka Flash? Nieaktualne Google Chrome? Akcja z nieaktualnym certyfikatem przynosi jednak pewien powiew \u015bwie\u017co\u015bci &#8211; dlatego warto zachowa\u0107 czujno\u015b\u0107 i przestrzec mniej do\u015bwiadczonych u\u017cytkownik\u00f3w\u2026&nbsp;<\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.helpnetsecurity.com\/2020\/03\/05\/fake-alerts-about-outdated-security-certificates-lead-to-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"\u0179r\u00f3d\u0142o (opens in a new tab)\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-pwndlocker-ransomware-zostal-pwned-na-rynku-jest-dostepny-dekryptor\">2. PwndLocker Ransomware zosta\u0142 \u201ePwned\u201d \u2013 na rynku jest dost\u0119pny dekryptor<\/h2>\n\n\n<p>Ofiary ransomware PwndLocker mog\u0105 od teraz odszyfrowa\u0107 swoje dane z pomoc\u0105 dekryptora napisanego przez firm\u0119 Emisoft.<\/p>\n\n\n\n<p>Na celowniku PwndLocker znalaz\u0142y si\u0119 m.in. du\u017ce firmy oraz samorz\u0105dy. Dlaczego w\u0142a\u015bnie one? Przest\u0119pcy obrali sobie za cel rozbudowane infrastruktury. Haracz za dane oscylowa\u0142 w granicach 175-660 tys. dolar\u00f3w ameryka\u0144skich. Wysoko\u015b\u0107 by\u0142a uzale\u017cniona oczywi\u015bcie od wielko\u015bci firmowej sieci.<\/p>\n\n\n\n<p>W\u015br\u00f3d ofiar PwndLocker znalaz\u0142y si\u0119 m.in. Lasalle County w stanie Illinois (50 BTC, co daje w przybli\u017ceniu 442 tys. USD) oraz miasto Nowy Sad w Serbii, gdzie przest\u0119pcy zaszyfrowali ponad 50 TB danych!<\/p>\n\n\n<h6 class=\"wp-block-heading\" id=\"blad-w-kodzie-pwndlocker\"><strong>B\u0142\u0105d w kodzie<\/strong> PwndLocker <\/h6>\n\n\n<p>Fabian Woser z Emisoft analizuj\u0105c kod malware, doszuka\u0142 si\u0119 w nim podatno\u015bci\u2026 Dzi\u0119ki temu dotychczasowe ofiary s\u0105 w stanie odzyska\u0107 zaszyfrowane dane bez konieczno\u015bci p\u0142acenia przest\u0119pcom. Niestety niezb\u0119dny do tego jest plik .exe, kt\u00f3ry zainicjowa\u0142 atak. Problem w tym, \u017ce w ko\u0144cowej fazie szyfrowania danych ransomware wykasowuje swoje pliki &#8211; w tym instalator. Ofiary s\u0105 jednak w stanie odzyska\u0107 plik <em>executable<\/em> z pomoc\u0105 Shadow Explorer lub innego narz\u0119dzia do odzyskiwania plik\u00f3w. Ofiary powinny sprawdzi\u0107 zawarto\u015b\u0107 nast\u0119puj\u0105cych lokalizacji: %Temp%, C:\\User folders oraz %Appdata%.<\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pwndlocker-ransomware-gets-pwned-decryption-now-available\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"\u0179r\u00f3d\u0142o (opens in a new tab)\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/lp.xopero.com\/raport-cyberbezpieczenstwo-trendy-2020\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/01\/miniatura-raport-2020.png\" alt=\"PwndLocker, malware, ransomware. Dowiedz si\u0119 jakie s\u0105 najwi\u0119ksze zagro\u017cenia IT oraz jak sobie z nimi poradzi\u0107. Pobierz darmowy raport.\" class=\"wp-image-2133\" width=\"700\" height=\"403\"\/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-wiekszosc-dystrybucji-linux-zagrozona-17letnia-podatnoscia-w-ppp-daemon\">3. <strong>Wi\u0119kszo\u015b\u0107 dystrybucji Linux zagro\u017cona 17-letni\u0105 podatno\u015bci\u0105 w PPP Daemon<\/strong><\/h2>\n\n\n<p>PPP Daemon (pppd) stanowi sk\u0142adnik prawie wszystkich dystrybucji systemu Linux. Oprogramowanie jest implementacj\u0105 protoko\u0142u Point-to-Point (PPP), u\u017cywanego do ustanawiania internetowych po\u0142\u0105cze\u0144 za po\u015brednictwem modem\u00f3w telefonicznych, po\u0142\u0105cze\u0144 DSL oraz wielu innych rozwi\u0105za\u0144 typu <em>point-to-point links<\/em>.<\/p>\n\n\n\n<p>Podatno\u015b\u0107 CVE-2020-8597 dotyczy przepe\u0142nienia bufora stosu. Wynika z b\u0142\u0119du logicznego w parserze pakiet\u00f3w Extensible Authentication Protocol (EAP) oprogramowania pppd. Luka mo\u017ce zosta\u0107 wykorzystana przez atakuj\u0105cych do zdalnego wykonywania dowolnego kodu na urz\u0105dzeniach pracuj\u0105cych pod jednym z zagro\u017conych z system\u00f3w. Tym samym, umo\u017cliwia stosunkowo prosto przej\u0105\u0107 kontrol\u0119 nad podatnym komputerem.<\/p>\n\n\n\n<p>Luka otrzyma\u0142a bardzo wysoki wynik na skali CVSS, bo a\u017c 9,8 punktu. Problem dotyczy wersji PPP Daemon od 2.4.2 do 2.4.8. Poni\u017cej podajemy linkowania do artyku\u0142\u00f3w opisuj\u0105cych spos\u00f3b rozwi\u0105zania problemu dla najpopularniejszych obecnie dystrybucji systemu Linux:<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\"><a href=\"https:\/\/www.debian.org\/security\/2020\/dsa-4632\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Debian<\/a> | <a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/2020\/CVE-2020-8597.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Ubuntu<\/a> | <a href=\"https:\/\/www.suse.com\/security\/cve\/CVE-2020-8597\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">SUSE Linux<\/a> | <a href=\"https:\/\/www.suse.com\/security\/cve\/CVE-2020-8597\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Fedora<\/a> | <a href=\"https:\/\/cvsweb.netbsd.org\/bsdweb.cgi\/src\/external\/bsd\/ppp\/dist\/pppd\/eap.c?only_with_tag=MAIN\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">NetBSD<\/a> | <a href=\"https:\/\/www.suse.com\/security\/cve\/CVE-2020-8597\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Red Hat Enterprise Linux<\/a><\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/99043\/hacking\/linux-rce-ppp-daemon-flaw.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"\u0179r\u00f3d\u0142o (opens in a new tab)\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"4-proste-jak-rejestracja-domeny-lookalikes\">4.  <strong>Proste jak rejestracja domeny <em>lookalikes<\/em>&#8230;<\/strong> <\/h2>\n\n\n<p>Cyberprzest\u0119pcy s\u0105 w stanie zarejestrowa\u0107 z\u0142o\u015bliwe wersje najbardziej rozpoznawalnych domen. W jaki spos\u00f3b? Dzi\u0119ki Verisign i us\u0142ugom IaaS, kt\u00f3re dopuszczaj\u0105 okre\u015blone znaki, wygl\u0105daj\u0105ce bardzo podobnie do \u0142aci\u0144skich liter.<\/p>\n\n\n\n<p><strong>Pytanie: theguardian.com czy theguardian.com?<\/strong><\/p>\n\n\n\n<p>Atakuj\u0105cy mog\u0105 zarejestrowa\u0107 domen\u0119 lub subdomen\u0119, kt\u00f3rej nazwa b\u0119dzie wygl\u0105da\u0107 identycznie, jak nazwa oryginalnego serwisu. Do tego przest\u0119pcy mog\u0105 pos\u0142u\u017cy\u0107 si\u0119 jednym z wielu dost\u0119pnych w sieci narz\u0119dzi do klonowania stron internetowych (pisali\u015bmy na ten temat m.in. <a href=\"https:\/\/xopero.com\/blog\/pl\/azorult-z-falszywym-protonvpn-wielki-wyciek-danych-w-sieci-hoteli-mgm\/#tekst-2\" target=\"_blank\" rel=\"noreferrer noopener\">tutaj<\/a>), wykorzysta\u0107 socjotechniki\u2026 i zebra\u0107 ca\u0142kiem udane \u017cniwo.<\/p>\n\n\n\n<p>W sieci istnieje ju\u017c kilkana\u015bcie homograficznych domen, kt\u00f3re imituj\u0105 rozpoznawalne podmioty finansowe, sklepy internetowe oraz firmy z listy Fortune 100. Do tego wszystkie te strony wykorzystuj\u0105 certyfikat HTTPS.<\/p>\n\n\n\n<p>Matt Hamilton &#8211; kt\u00f3ry trafi\u0142 na \u015blad tego procederu &#8211; poinformowa\u0142 o swoim odkryciu Verisign (kt\u00f3re nadzoruje domeny .com i .net), Google, Amazon, Wasabi oraz DigitalOcean (IaaS provider). Mia\u0142o to miejsce pod koniec 2019 r. Jak dot\u0105d tylko Amazon oraz Versign wprowadzi\u0142o (lub jest w trakcie) konieczne zmiany. Amazon zmieni\u0142 zasady walidacji nazw segment\u00f3w S3, aby uniemo\u017cliwi\u0107 rejestracj\u0119 nazw rozpoczynaj\u0105cych si\u0119 od prefiksu punycode \u201exn\u2014\u201e. W ten spos\u00f3b wykluczy\u0142 korzystanie ze wszystkich znanych symboli <em>unicode homoglyphs<\/em>.<\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.helpnetsecurity.com\/2020\/03\/05\/register-malicious-domains\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"\u0179r\u00f3d\u0142o (opens in a new tab)\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"5-hackerzy-po-raz-kolejny-siegaja-po-pliki-word-makra-i-sa-ofiary\">5. <strong>Hackerzy po raz kolejny si\u0119gaj\u0105 po pliki Word, makra\u2026 i s\u0105 ofiary<\/strong><\/h2>\n\n\n<p>Na pocz\u0105tku by\u0142 phishing, kt\u00f3ry przy ca\u0142ej swojej prostocie daje zadziwiaj\u0105co dobre efekty. Nast\u0119pnie do naszego \u201er\u00f3wnania\u201d dodajemy NetSupport &#8211; rozwi\u0105zanie po kt\u00f3re administratorzy si\u0119gaj\u0105 w celu zarz\u0105dzania sieci\u0105. Jak si\u0119 jednak okazuje, nie tylko oni.<\/p>\n\n\n\n<p>Kampania o kt\u00f3rej dzi\u015b wam donosimy wystartowa\u0142a w listopadzie 2019 i by\u0142a jeszcze aktywna w styczniu 2020. Co ciekawe, przest\u0119pcy targetowali drukarnie oraz\u2026 przemys\u0142 filmowy.<\/p>\n\n\n\n<p><strong>Atak<\/strong><\/p>\n\n\n\n<p>Przest\u0119pcy rozes\u0142ali wiadomo\u015b\u0107 email zawieraj\u0105c\u0105 z\u0142o\u015bliwy za\u0142\u0105cznik Word z krytycznymi informacjami dodatkowo zabezpieczonymi has\u0142em. Jednak aby je wpisa\u0107, odbiorca wiadomo\u015bci by\u0142 zmuszony uruchomi\u0107 makra\u2026 Je\u015bli u\u017cytkownik da\u0142 si\u0119 z\u0142apa\u0107 na \u201emakra\u201d na urz\u0105dzeniu instalowa\u0142 si\u0119 malware. Co ciekawe, program weryfikowa\u0142, czy na komputerze by\u0142 zainstalowany antywirus&#8230; AVG lub Avast (i \u017caden inny). W kolejnym kroku nast\u0119powa\u0142a instalacja NetSupport Manager RAT. Na sam koniec, malware przysy\u0142a\u0142 lokalizacj\u0119 zainfekowanego urz\u0105dzenia na adres \u201c\u2018geo.netsupportsoftware[.]com\u201d. Atak ko\u0144czy\u0142 si\u0119 nawi\u0105zaniem sta\u0142ego po\u0142\u0105czenia z urz\u0105dzeniem.<\/p>\n\n\n\n<p><strong>Ciekawostka.<\/strong> Badacze uwa\u017caj\u0105, \u017ce maile zosta\u0142y rozes\u0142ane z przypadkowych adres\u00f3w @protonmail[.]com i zawiera\u0142y w tytule: <em>Refund status<\/em> lub <em>Unauthorized credit card transactions<\/em>.<\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.hackread.com\/hackers-using-word-documents-to-drop-netsupport-manager-rat\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"\u0179r\u00f3d\u0142o (opens in a new tab)\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-6\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"6-670-subdomen-microsoft-moze-bez-problemu-trafic-w-rece-cyberprzestepcow\">6. <strong>670 subdomen Microsoft mo\u017ce bez problemu trafi\u0107 w r\u0119ce cyberprzest\u0119pc\u00f3w<\/strong><\/h2>\n\n\n<p>Specjali\u015bci z Vullnerability.com namierzyli ponad 670 subdomen, kt\u00f3re wcze\u015bniej by\u0142y wykorzystywane przez Microsoft &#8211; tyle, \u017ce w mi\u0119dzyczasie kto\u015b o nich zapomnia\u0142. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>identityhelp.microsoft.com<\/li><li>mybrowser.microsoft.com<\/li><li>web.visualstudio.com \/ webeditor.visualstudio.com<\/li><li>data.teams.microsoft.com<\/li><li>sxt.cdn.skype.com<\/li><li>download.collaborate.microsoft.com<\/li><li>incidentgraph.microsoft.com<\/li><li>admin.recognition.microsoft.com<\/li><li>oraz wiele innych.<\/li><\/ul>\n\n\n\n<p>Wszystkie adresy prezentuj\u0105 si\u0119 bardzo wiarygodnie. Maj\u0105 w\u0142a\u015bciw\u0105 struktur\u0119 oraz zaufan\u0105 i rozpoznawaln\u0105 mark\u0119 w nazwie. Idealne rozwi\u0105zanie dla przest\u0119pc\u00f3w prowadz\u0105cych dzia\u0142ania skupione wok\u00f3\u0142 kampanii phishingowych. Jak \u0142atwo by\u0142oby z ich pomoc\u0105 sk\u0142oni\u0107 u\u017cytkownika do instalacji wtyczki szpieguj\u0105cej lub udost\u0119pnienia wra\u017cliwych danych dla data.teams.microsoft.com z pomoc\u0105 Teams App?<\/p>\n\n\n\n<p><strong>Przest\u0119pca na tropie\u2026 404<\/strong><\/p>\n\n\n\n<p>Jak najpro\u015bciej wyszuka\u0107 osierocon\u0105 subdomen\u0119? Mo\u017cna pos\u0142u\u017cy\u0107 si\u0119 jednym ze skaner\u00f3w dost\u0119pnych w sieci. Odpowied\u017a o b\u0142\u0119dzie 404 jest jednoznaczna ze znalezieniem pierwszego kandydata. Co dzieje si\u0119 dalej? Prawdopodobnie przest\u0119pcy b\u0119d\u0105 pr\u00f3bowa\u0107 przej\u0105\u0107 rekord DNS. Jednak je\u015bli jest to niemo\u017cliwe &#8211; Microsoft &#8211; w kolejnym kroku sprawdz\u0105 czy subdomena nie by\u0142a aliasem innej domeny. Oczywi\u015bcie je\u015bli jej prawo w\u0142asno\u015bci wygas\u0142o, mog\u0105 j\u0105 wykupi\u0107 i wykorzysta\u0107 do rozprzestrzeniania malware oraz wielu innych zagro\u017ce\u0144.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:14px\"><a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/03\/06\/researcher-finds-670-microsoft-subdomains-vulnerable-to-takeover\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"\u0179r\u00f3d\u0142o (opens in a new tab)\">\u0179r\u00f3d\u0142o<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firmie Emisoft uda\u0142o si\u0119 &#8222;rozbroi\u0107&#8221; ransomware PwndLocker. Przynajmniej tymczasowo&#8230; Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 &#8222;utracone&#8221; dane. W tym tygodniu tak\u017ce: numer na wygas\u0142y certyfikat, Linux zagro\u017cony przez 17-letni\u0105 podatno\u015b\u0107. Dodatkowo: rejestracja domeny lookalike, NetSupport Manager RAT oraz 670 domen Microsoft, kt\u00f3re ju\u017c do Microsoft nie nale\u017c\u0105 i mog\u0105 wpa\u015b\u0107 w niepowo\u0142ane r\u0119ce.<\/p>\n","protected":false},"author":1,"featured_media":1597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[436],"tags":[],"class_list":["post-2305","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news-pl","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Firmie Emisoft uda\u0142o si\u0119 &quot;rozbroi\u0107&quot; ransomware PwndLocker. Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 &quot;utracone&quot; dane...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Firmie Emisoft uda\u0142o si\u0119 &quot;rozbroi\u0107&quot; ransomware PwndLocker. Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 &quot;utracone&quot; dane...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-09T07:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T15:32:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"PwndLocker \\\/ PPP Daemon z luk\u0105 \\\/ Lookalike.com\",\"datePublished\":\"2020-03-09T07:15:00+00:00\",\"dateModified\":\"2024-05-15T15:32:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/\"},\"wordCount\":1343,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/\",\"name\":\"PwndLocker \\\/ PPP Daemon z luk\u0105 \\\/ Lookalike.com - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"datePublished\":\"2020-03-09T07:15:00+00:00\",\"dateModified\":\"2024-05-15T15:32:06+00:00\",\"description\":\"Firmie Emisoft uda\u0142o si\u0119 \\\"rozbroi\u0107\\\" ransomware PwndLocker. Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 \\\"utracone\\\" dane...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/pwndlocker-ppp-daemon-z-luka-lookalike-com\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PwndLocker \\\/ PPP Daemon z luk\u0105 \\\/ Lookalike.com\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com - Xopero Blog","description":"Firmie Emisoft uda\u0142o si\u0119 \"rozbroi\u0107\" ransomware PwndLocker. Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 \"utracone\" dane...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/","og_locale":"pl_PL","og_type":"article","og_title":"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com - Xopero Blog","og_description":"Firmie Emisoft uda\u0142o si\u0119 \"rozbroi\u0107\" ransomware PwndLocker. Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 \"utracone\" dane...","og_url":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-03-09T07:15:00+00:00","article_modified_time":"2024-05-15T15:32:06+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com","datePublished":"2020-03-09T07:15:00+00:00","dateModified":"2024-05-15T15:32:06+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/"},"wordCount":1343,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/","url":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/","name":"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","datePublished":"2020-03-09T07:15:00+00:00","dateModified":"2024-05-15T15:32:06+00:00","description":"Firmie Emisoft uda\u0142o si\u0119 \"rozbroi\u0107\" ransomware PwndLocker. Specjali\u015bci opracowali dekryptor, kt\u00f3ry jest w stanie odszyfrowa\u0107 \"utracone\" dane...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/pl\/pwndlocker-ppp-daemon-z-luka-lookalike-com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"PwndLocker \/ PPP Daemon z luk\u0105 \/ Lookalike.com"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2305"}],"version-history":[{"count":17,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2305\/revisions"}],"predecessor-version":[{"id":5984,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2305\/revisions\/5984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/1597"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}