{"id":2801,"date":"2020-06-29T08:16:37","date_gmt":"2020-06-29T06:16:37","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2801"},"modified":"2023-12-07T11:55:02","modified_gmt":"2023-12-07T10:55:02","slug":"glupteba-malware-is-now-armed-with-every-trick-youve-heard-of","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/","title":{"rendered":"Glupteba: malware is now armed with every trick you&#8217;ve heard of"},"content":{"rendered":"\n<p>Glupteba has been first spotted in 2018. Now after almost 2 years, malware is still a serious threat. This is not just a malware &#8211; it&#8217;s also a rootkit, security suppressor, virus, router attack tool, browser stealer, and cryptojacker\u2026<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"glupteba-a-highly-selfdefending-malware-uses-about-every-trick-youve-heard-of\"><strong>Glupteba, a highly self-defending malware uses about every trick you\u2019ve heard of<\/strong><\/h2>\n\n\n<p>Glupteba is a threat that offers an easy means of distributing other malware. But there is much more. The malware also uses the Bitcoin blockchain as a communication channel for receiving updated configuration information. Neat.<\/p>\n\n\n\n<p>Glupteba is what\u2019s known a zombie or bot (software robot) that can be controlled from afar by the cybercriminals who wrote it. A backdoor providing full access to compromised Windows PC, while adding them to a growing botnet, has developed some unusual measures for staying undetected.<\/p>\n\n\n\n<p>It\u2019s distributed through a pirated software, including cracked versions of commercial applications, as well as illegal video games. The malware is gradually dropped, bit-by-bit onto the system to avoid detection by any anti-virus software. The malware also uses the EternalBlue SMB vulnerability to help it spread across networks.<\/p>\n\n\n\n<p>Glupteba uses a number of software exploits are for privilege escalation, primarily so it can install a kernel driver the bot uses as a rootkit, and make other changes that weaken the security posture of an infected host. The rootkit renders filesystem behaviour invisible to the computer&#8217;s end-user and also protects any other file the malware decides to store in its application directory. A watcher process then monitors the rootkit and other components for any sign of failure or a crash and can reinitialize the rootkit driver or restart a buggy component. Attackers also covered up updates to command-and-control server addresses neatly. They are sent as encrypted data tied to transactions in the bitcoin blockchain.&nbsp;<\/p>\n\n\n\n<p>The way in which operators regularly fix any bugs also indicates that we are dealing with a malware-delivery-as-a-service provider, who is still growing. How users can avoid vailing victim to Glupteba? First, by ensuring all critical security updates \u2013 especially against the EternalBlue exploit. And secondly, users should be extremely wary of downloading cracked and pirated applications.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-malware-goes-to-unusual-lengths-to-cover-its-tracks\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers-use-google-analytics-to-steal-credit-cards-data\"><strong>Hackers use Google Analytics to steal credit cards data<\/strong><\/h2>\n\n\n<p>Hackers are using Google&#8217;s servers and the Google Analytics platform to steal credit card information submitted by customers of e-commerce sites.<\/p>\n\n\n\n<p>A new tactic allows to bypass a Content Security Policy (CSP) using the Google Analytics API. Attackers take advantage of the fact that many online stores which use Google&#8217;s web analytics service for tracking visitors are whitelisting Google Analytics domains in their CSP configuration.<\/p>\n\n\n\n<p><strong>Vulnerability in the core functionality of CSP<\/strong><\/p>\n\n\n\n<p>The CSP rule system isn\u2019t granular enough. Attackers inject a web skimmer script that is specifically designed to encode stolen data and deliver it to the attacker&#8217;s GA dashboard in an encrypted form. The attackers only have to use their own Account \/ Tag ID number e.g. UA-#######-#. Script once loaded allows to monitor the compromised site for user input and it will grab any entered credit card information, encrypt it, and automatically deliver it to its attackers\u2019 GA dashboard. They can decrypt stolen data using an XOR encryption key next.<\/p>\n\n\n\n<p>There is also a very similar campaign active since March 17 (info: Sansec&#8217;s Threat Research Team). Attackers are abusing the exact issue to bypass CSP on several dozen e-commerce sites. But the threat actors went a step further by making sure that all the campaign components are using Google Firebase servers. Another smart move? Yes. Typically, the Magecart Group uses dodgy servers in tax havens. Such suspicious locations reveal their nefarious intent. But when a skimming campaign runs entirely on trusted Google servers, very few security systems will flag it as 'dangerous&#8217;.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-google-analytics-to-steal-credit-cards-bypass-csp\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">Read more<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/products\/xopero-backup-restore\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg\" alt=\"\" class=\"wp-image-2705\" width=\"400\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg 580w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en-300x207.jpg 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"wastedlocker-ransomware-uses-fake-update-notifications-to-infect-new-victims\"><strong>WastedLocker Ransomware uses fake update notifications to infect new victims<\/strong><\/h2>\n\n\n<p>After the indictment of some prominent members, Evil Corp started working on a new tactic which means no more no less\u2026 new cyberthreat. The newest ransomware called WastedLocker is used in targeted attacks against businesses. The Group has been always selective in terms of the infrastructure they targeted. Typically, they hit file servers, database services, virtual machines and cloud environments.<\/p>\n\n\n\n<p>To deliver the new ransomware, Evil Corp is hacking into sites to insert malicious code that displays fake software update alerts from the SocGholish fake update framework.<\/p>\n\n\n\n<p>One of the payloads sent in these attacks is the Cobalt Strike penetration testing and post-exploitation toolkit, which Evil Corp uses to gain access to the infected device. The threat actors then use this access to compromise the network further and deploy the WastedLocker Ransomware. Once executed, the ransomware will attempt to encrypt all drives on the computer, skipping files in specific folders or containing certain extensions. Files with a size less than 10 bytes are ignored and in case of large files, the ransomware encrypts them in blocks of 64MB.<\/p>\n\n\n\n<p>For every file that is encrypted, ransomware will also create an accompanying ransom note ending with _info. What\u2019s interesting, WastedLocker does not appear to steal data before encrypting files. And the ransom? BleepingComputer reported that the ransom demands range from $500,000 to millions of dollars.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-wastedlocker-ransomware-distributed-via-fake-program-updates\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"malware-from-hell-lucifer-targets-windows-systems\"><strong>Malware from hell: Lucifer targets Windows Systems<\/strong><\/h2>\n\n\n<p>Security experts have identified a self-propagating malware, dubbed Lucifer, that targets Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks.<\/p>\n\n\n\n<p>The never-before-seen malware initially tries to infect PCs by bombarding them with exploits in hopes of&nbsp; taking advantage of an \u201cexhaustive\u201d list of unpatched vulnerabilities. While patches for all the critical and high-severity bugs exist, the various companies impacted by the malware had not applied the fixes.<\/p>\n\n\n\n<p>The vulnerabilities targeted by Lucifer include Rejetto HTTP File Server (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-6287\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-6287\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2014-6287<\/a>), Oracle Weblogic (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-10271\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-10271\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2017-10271<\/a>), ThinkPHP RCE (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-20062\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-20062\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2018-20062<\/a>), Apache Struts (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-9791\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-9791\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2017-9791<\/a>), Laravel framework&nbsp; <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9081\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9081\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2019-9081<\/a>), and Microsoft Windows (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0144\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0144\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2017-0144<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0145\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0145\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2017-0145<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-8464\"><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-8464\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">CVE-2017-8464<\/a>).<\/p>\n\n\n\n<p>After successfully exploiting these flaws, the attacker then connects to the command-and-control (C2) server and executes arbitrary commands on the vulnerable device. These commands include performing a TCP, UDP or HTTP DoS attack. Other commands allow the malware to drop an XMRig miner and launch cryptojacking attacks, as well as collecting interface info and sending the miner status to the C2. The malware is also capable of self-propagation through various methods. If the Server Message Block (SMB) protocol (a network file sharing protocol) is open, Lucifer executes several backdoors. These include the EternalBlue, EternalRomance, and DoublePulsar exploits.<\/p>\n\n\n\n<p>Lucifer has been discovered in a series of recent attacks that are still ongoing.<\/p>\n\n\n\n<p><strong>How to protect a company?<\/strong> Enterprises can protect themselves with simply security measures such as applying patches and strengthening passwords.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/self-propagating-lucifer-malware-targets-windows-systems\/156883\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"yoast-seo-link\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. 80,000 printers are exposing their IPP port online (<a href=\"https:\/\/www.zdnet.com\/article\/80000-printers-are-exposing-their-ipp-port-online\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/80000-printers-are-exposing-their-ipp-port-online\/\" target=\"_blank\">ZDNet<\/a>)<br>2. REvil ransomware scans victim&#8217;s network for Point of Sale systems (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-scans-victims-network-for-point-of-sale-systems\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-scans-victims-network-for-point-of-sale-systems\/\" target=\"_blank\">Bleeping Computer<\/a>)<br>3. BlueLeaks Exposes Police Files Dating Back 24 Years (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/blueleaks-exposes-police-files\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/blueleaks-exposes-police-files\/\" target=\"_blank\">InfoSecurity<\/a>)<br>4. XORDDoS, Kaiji DDoS Botnets Target Docker Servers (<a href=\"https:\/\/www.securityweek.com\/xorddos-kaiji-ddos-botnets-target-docker-servers\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.securityweek.com\/xorddos-kaiji-ddos-botnets-target-docker-servers\" target=\"_blank\">Security Week<\/a>)<br>5. Scam uses Elon Musk\u2019s name to trick people out of US$2 million in bitcoin (<a href=\"https:\/\/www.welivesecurity.com\/2020\/06\/22\/scam-uses-elon-musk-name-trick-people-us2million-bitcoin\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.welivesecurity.com\/2020\/06\/22\/scam-uses-elon-musk-name-trick-people-us2million-bitcoin\/\" target=\"_blank\">WeLiveSecurity<\/a>)<br>6. <a href=\"https:\/\/xopero.com\/blog\/en\/microsoft-office-365-applications-overview\/\">Office 365<\/a> now checks docs for known threats before editing (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/office-365-now-checks-docs-for-known-threats-before-editing\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/office-365-now-checks-docs-for-known-threats-before-editing\/\" target=\"_blank\">Bleeping Computer<\/a>)<br>7. IndigoDrop spreads via military-themed lures to deliver Cobalt Strike (<a href=\"https:\/\/blog.talosintelligence.com\/2020\/06\/indigodrop-maldocs-cobalt-strike.html\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/blog.talosintelligence.com\/2020\/06\/indigodrop-maldocs-cobalt-strike.html\" target=\"_blank\">Talos Intelligence<\/a>)\u00a0<br>8. European victims refuse to bow to Thanos ransomware (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-victims-refuse-to-bow-to-thanos-ransomware\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/european-victims-refuse-to-bow-to-thanos-ransomware\/\" target=\"_blank\">Bleeping Computer<\/a>)<strong>.\u00a0<\/strong><br>9. Three words do you not want to hear regarding a 'secure browser&#8217; called SafePay: Remote. Code. Execution (<a href=\"https:\/\/www.theregister.com\/2020\/06\/24\/bitdefender_security_hole\/\"><\/a><a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" rel=\"noreferrer noopener\" href=\"https:\/\/www.theregister.com\/2020\/06\/24\/bitdefender_security_hole\/\" target=\"_blank\">The Register<\/a>)<br>10. NVIDIA warns Windows Gamers of serious graphic bugs (<a aria-label=\"undefined (opens in a new tab)\" class=\"yoast-seo-link\" href=\"https:\/\/threatpost.com\/nvidia-windows-gamers-graphics-driver-bugs\/156911\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glupteba has been first spotted in 2018. Now after almost 2 years, malware is still a serious threat. This is not just a malware &#8211; it&#8217;s also a rootkit, security suppressor, virus, router attack tool, browser stealer, and cryptojacker\u2026<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-2801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Glupteba: malware is now armed with every trick you&#039;ve heard of<\/title>\n<meta name=\"description\" content=\"Glupteba has been first spotted in 2014. Now after almost 6 years, malware is still a serious threat. This is not just a malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Glupteba: malware is now armed with every trick you&#039;ve heard of\" \/>\n<meta property=\"og:description\" content=\"Glupteba has been first spotted in 2014. Now after almost 6 years, malware is still a serious threat. This is not just a malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-29T06:16:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T10:55:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Glupteba: malware is now armed with every trick you&#8217;ve heard of\",\"datePublished\":\"2020-06-29T06:16:37+00:00\",\"dateModified\":\"2023-12-07T10:55:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/\"},\"wordCount\":1241,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/\",\"name\":\"Glupteba: malware is now armed with every trick you've heard of\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-06-29T06:16:37+00:00\",\"dateModified\":\"2023-12-07T10:55:02+00:00\",\"description\":\"Glupteba has been first spotted in 2014. Now after almost 6 years, malware is still a serious threat. This is not just a malware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glupteba: malware is now armed with every trick you&#8217;ve heard of\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Glupteba: malware is now armed with every trick you've heard of","description":"Glupteba has been first spotted in 2014. Now after almost 6 years, malware is still a serious threat. This is not just a malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/","og_locale":"pl_PL","og_type":"article","og_title":"Glupteba: malware is now armed with every trick you've heard of","og_description":"Glupteba has been first spotted in 2014. Now after almost 6 years, malware is still a serious threat. This is not just a malware.","og_url":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-06-29T06:16:37+00:00","article_modified_time":"2023-12-07T10:55:02+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Glupteba: malware is now armed with every trick you&#8217;ve heard of","datePublished":"2020-06-29T06:16:37+00:00","dateModified":"2023-12-07T10:55:02+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/"},"wordCount":1241,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/","url":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/","name":"Glupteba: malware is now armed with every trick you've heard of","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-06-29T06:16:37+00:00","dateModified":"2023-12-07T10:55:02+00:00","description":"Glupteba has been first spotted in 2014. Now after almost 6 years, malware is still a serious threat. This is not just a malware.","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/glupteba-malware-is-now-armed-with-every-trick-youve-heard-of\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Glupteba: malware is now armed with every trick you&#8217;ve heard of"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2801"}],"version-history":[{"count":15,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2801\/revisions"}],"predecessor-version":[{"id":5371,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2801\/revisions\/5371"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}