{"id":3120,"date":"2020-09-07T08:35:00","date_gmt":"2020-09-07T06:35:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3120"},"modified":"2020-09-04T15:43:59","modified_gmt":"2020-09-04T13:43:59","slug":"kryptocibule-triple-threat-magento-flaws-jocker-is-back","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/","title":{"rendered":"KryptoCibule &#8211; triple threat \/ Magento flaws \/ Jocker is back"},"content":{"rendered":"\n<p>Welcome to the next episode of the\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>! KryptoCibule is a new, 3 in 1threat for cryptocurrency owners! It has managed to stay under the radar for almost two years! In the first article of our IT news review, we take a closer look at this malware&#8217;s evolution. Ready for more? <\/p>\n\n\n\n<!--more ReaD more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-kryptocibule-windows-malware-a-triple-threat-for-cryptocurrency-users\"><strong>New KryptoCibule Windows malware &#8211; a triple threat for cryptocurrency users<\/strong><\/h2>\n\n\n<p>Threat researchers at ESET discovered a new malware family that is fully focused on getting as much cryptocurrency as possible. Dubbed KryptoCibule is &#8222;a triple threat&#8221;. It uses a victim&#8217;s resources to mine virtual coins. Tries to hijack transactions by replacing the wallet address in the clipboard, and exfiltrates cryptocurrency-related files.<\/p>\n\n\n\n<p>KryptoCibule has managed to stay under the radar for almost two years. And with each new version extending its functionality, as shown in the below image.\u00a0<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"846\" height=\"282\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule1-1.png\" alt=\"\" class=\"wp-image-3121\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule1-1.png 846w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule1-1-300x100.png 300w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule1-1-768x256.png 768w\" sizes=\"(max-width: 846px) 100vw, 846px\" \/><figcaption>Source: <a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/02\/kryptocibule-multitasking-multicurrency-cryptostealer\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">ESET<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>Researchers note that KryptoCibule relies heavily on the Tor network to communicate with its command and control (C2) servers.<\/p>\n\n\n\n<p>It spreads via malicious torrents in archives pretending to be installers for pirated versions of popular software and games. When launching the executable, malware installation starts in the background and the expected routine for the cracked product runs in the foreground.<\/p>\n\n\n\n<p>This drill allowed the malware to avoid attention for so long. Also relevant might be a fact that it seems to target users in the Czech Republic and Slovakia. More than 85% of ESET\u2019s detections are from these countries.<\/p>\n\n\n\n<p>The latest versions of the KryptoCibule employ XMRig, an open source program designed to mine Monero using the device&#8217;s CPU. As well as kawpowminer, another open source program that mines Ethereum using the GPU. The latter is only used if a dedicated GPU is found on the host, and both programs are set up to connect to an attacker-controlled mining server over the Tor proxy.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule-2-1.png\" alt=\"\" class=\"wp-image-3122\" width=\"608\" height=\"455\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule-2-1.png 811w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule-2-1-300x224.png 300w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/09\/KryptoCibule-2-1-768x574.png 768w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><figcaption>Source: <a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/02\/kryptocibule-multitasking-multicurrency-cryptostealer\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">ESET<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>Users should remain vigilant, and the simplest way to avoid a threat like KryptoCibule is to not install pirated software.\u00a0<\/p>\n\n\n\n<p>Sources: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/kryptocibule-malware-dodges-antivirus-to-steal-cryptocurrency\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">1<\/a> | <a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/02\/kryptocibule-multitasking-multicurrency-cryptostealer\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">2<\/a> | <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/kryptocibule-uses-several-tricks-to-maximize-cryptocurrency-theft\/d\/d-id\/1338822?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">3<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"magmi-magento-plugin-flaws-allow-remote-code-execution-on-a-vulnerable-site\"><strong>MAGMI Magento plugin flaws allow remote code execution on a vulnerable site<\/strong><\/h2>\n\n\n<p>Researchers at Tenable have disclosed two flaws that could enable remote code execution attacks on the Magento Mass Import (Magmi) plugin. It is an open-source database client that imports data into Magento. A patch has only been published for one of them (CVE-2020-5777), in Magmi version 0.7.24 on Sunday, 30th of August.<\/p>\n\n\n\n<p>It is hard to say how many Magento sites are vulnerable. However, researchers were able to identify at least 1,500 websites indexed through search engines that use the Magmi plugin. But probably there are more&#8230;<\/p>\n\n\n\n<p>Researchers on Tuesday also released proof-of-concept (PoC) exploit code on GitHub for both of the flaws.<\/p>\n\n\n\n<p>The unpatched flaw, CVE-2020-5776 is a cross-site request forgery (CSRF) vulnerability affecting Magmi up to version 0.7.24. An attacker could exploit it to perform a CSRF attack. In this specific attack, threat actors could trick a Magento Administrator into clicking on a link while they are authenticated to Magmi. The attacker could then hijack the administrator\u2019s sessions, allowing them to execute arbitrary code on the server where Magmi is hosted, researchers said.<\/p>\n\n\n\n<p>The second, now patched flaw, CVE-2020-5777 is an authentication bypass flaw in Magmi for Magento version 0.7.23 and below.\u00a0<\/p>\n\n\n\n<p>Magmi\u2019s authentication process uses HTTP Basic authentication and checks the username and password against the Magento database\u2019s <em>admin_user<\/em> table. However, if the connection to the Magento database fails, Magmi will accept default credentials, which are magmi:magmi.<\/p>\n\n\n\n<p>\u201cAs a consequence, an attacker could force the database connection to fail due to a database denial of service (DB-DoS) attack, then authenticate to Magmi using the default credentials,\u201d said researchers. \u201cThe impact of this attack is remote code execution (RCE) on the server where Magmi is hosted.\u201d<\/p>\n\n\n\n<p>How to reduce the risk in the meantime? It is recommended to disable or uninstall the plugin until the update. It is better to refrain from active web browsing while authenticated to Magmi.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/magento-sites-vulnerable-to-rce-stemming-from-magmi-plugin-flaws\/158864\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-defender-can-ironically-be-used-to-download-malware\"><strong>Microsoft Defender can ironically be used to download malware<\/strong><\/h2>\n\n\n<p>In a recent Microsoft Defender update, the command-line MpCmdRun.exe tool has been updated to&#8230; download malicious files from a remote location.<\/p>\n\n\n\n<p>With this new feature, Microsoft Defender is now part of the long list of Windows programs that can be abused by local attackers.<\/p>\n\n\n\n<p>Discovered by security researcher Mohammad Askar, a recent update to Microsoft Defender&#8217;s command-line tool now includes a new -DownloadFile command-line argument.<\/p>\n\n\n\n<p>This directive allows a local user to use the Microsoft Antimalware Service Command Line Utility (MpCmdRun.exe) to download a file from a remote location using the following command:<\/p>\n\n\n\n<p class=\"has-background has-light-gray-background-color\">MpCmdRun.exe -DownloadFile -url [url] -path [path_to_save_file]<\/p>\n\n\n\n<p>The good news is that Microsoft Defender will detect malicious files downloaded with MpCmdRun.exe, but it is unknown if other AV software will allow this program to bypass their detections.<\/p>\n\n\n\n<p>With this discovery, administrators and blue teamers now have an additional Windows executable that they need to monitor so that it is not used against them.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-defender-can-ironically-be-used-to-download-malware\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/products\/xopero-backup-restore\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg\" alt=\"Xopero Backup Solution - Protect data like a Pro and don't let a disaster stop your business\" class=\"wp-image-2705\" width=\"400\" height=\"275\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg 580w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en-300x207.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"joker-spyware-plagues-more-google-play-apps\"><strong>Joker spyware plagues more Google Play apps<\/strong><\/h2>\n\n\n<p>Google has deleted six apps from its Google Play marketplace that were infecting users with the Joker malware (a.k.a. Bread).\u00a0<\/p>\n\n\n\n<p>Together, the apps account for nearly 200,000 installs\u2026 and they are still installed on the devices. Users are urged to immediately delete the applications.<\/p>\n\n\n\n<p>The apps found with malware are: Convenient Scanner 2 (100,000 installs), Separate Doc Scanner (50,000 installs), Safety AppLock (10,000 installs), Push Message-Texting &amp; SMS (10,000 installs), Emoji Wallpaper (10,000 installs) and Fingertip GameBox (1,000).\u00a0\u00a0<\/p>\n\n\n\n<p><strong>Why so serious? <\/strong>Joker is a billing-fraud family of malware (which researchers categorize as \u201cfleeceware\u201d) that emerged in 2017. However, it began to ramp up in 2019.\u00a0<\/p>\n\n\n\n<p>It advertises itself as a legitimate app. But once installed, simulates clicks and intercepts SMS messages to subscribe victims to unwanted, paid premium services (unbeknownst to them).\u00a0<\/p>\n\n\n\n<p>Google has removed over 1,700 apps containing Joker malware from the Play Store since 2017, but the malware keeps re-emerging.<\/p>\n\n\n\n<p>Users need to leverage not only computer protection (antivirus, <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/xopero.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">backup software<\/a>) but also mobile security.  Especially in a time of remote work.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/joker-spyware-google-play-apps-2\/158895\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Evilnum hackers targeting financial firms with a new Python-based RAT (<a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/thehackernews.com\/2020\/09\/evilnum-hackers.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29\" target=\"_blank\" rel=\"noreferrer noopener\">The Hacker News<\/a>)<br>2. Norway\u2018s Parliament, Stortinget, discloses a security breach (<a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/cyberattack-on-norwegian\/\" target=\"_blank\" rel=\"noreferrer noopener\">Infosecurity<\/a>)<br>3. Epic Fail: Emotet malware uses fake \u2018Windows 10 Mobile\u2019 attachments (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/epic-fail-emotet-malware-uses-fake-windows-10-mobile-attachments\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>4. Security flaw allows bypassing PIN verification on Visa contactless payments (<a href=\"https:\/\/www.welivesecurity.com\/2020\/08\/31\/security-flaw-allows-bypassing-pin-verification-visa-contactless-cards\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">We Live Security<\/a>)<br>5. Google removes Android app that was used to spy on Belarusian protesters (<a href=\"https:\/\/www.zdnet.com\/article\/google-removes-android-app-that-was-used-to-spy-on-belarusian-protesters\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>6. New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data (<a href=\"https:\/\/thehackernews.com\/2020\/09\/credit-card-telegram-hackers.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">The Hacker News<\/a>)<br>7. Cisco fixes critical code execution bug in Jabber for Windows (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-fixes-critical-code-execution-bug-in-jabber-for-windows\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>8. Phishing scam uses Sharepoint and One Note to go after passwords (<a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/09\/02\/phishing-scam-uses-sharepoint-and-one-note-to-go-after-passwords\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Naked Security<\/a>)<br>9. AlphaBay dark web marketplace moderator gets 11 years in prison (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/alphabay-dark-web-marketplace-moderator-gets-11-years-in-prison\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>10. Tor launches membership program to secure finance, boost integration (<a href=\"https:\/\/www.zdnet.com\/article\/tor-launches-membership-program-to-secure-finance-boost-integration\/#ftag=RSSbaffb68\">Z<\/a><a href=\"https:\/\/www.zdnet.com\/article\/tor-launches-membership-program-to-secure-finance-boost-integration\/#ftag=RSSbaffb68\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">D<\/a><a href=\"https:\/\/www.zdnet.com\/article\/tor-launches-membership-program-to-secure-finance-boost-integration\/#ftag=RSSbaffb68\">Net<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the\u00a0Xopero Security Center! KryptoCibule is a new, 3 in 1threat for cryptocurrency owners! It has managed to stay under the radar for almost two years! In the first article of our IT news review, we take a closer look at this malware&#8217;s evolution. Ready for more?<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KryptoCibule - triple threat \/ Magento flaws \/ Jocker is back - Xopero Blog<\/title>\n<meta name=\"description\" content=\"KryptoCibule is a new, 3 in 1threat for cryptocurrency owners, which has managed to stay under the radar for almost two years!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KryptoCibule - triple threat \/ Magento flaws \/ Jocker is back - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"KryptoCibule is a new, 3 in 1threat for cryptocurrency owners, which has managed to stay under the radar for almost two years!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-07T06:35:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"KryptoCibule &#8211; triple threat \\\/ Magento flaws \\\/ Jocker is back\",\"datePublished\":\"2020-09-07T06:35:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/\"},\"wordCount\":1144,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/\",\"name\":\"KryptoCibule - triple threat \\\/ Magento flaws \\\/ Jocker is back - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-09-07T06:35:00+00:00\",\"description\":\"KryptoCibule is a new, 3 in 1threat for cryptocurrency owners, which has managed to stay under the radar for almost two years!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KryptoCibule &#8211; triple threat \\\/ Magento flaws \\\/ Jocker is back\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KryptoCibule - triple threat \/ Magento flaws \/ Jocker is back - Xopero Blog","description":"KryptoCibule is a new, 3 in 1threat for cryptocurrency owners, which has managed to stay under the radar for almost two years!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/","og_locale":"pl_PL","og_type":"article","og_title":"KryptoCibule - triple threat \/ Magento flaws \/ Jocker is back - Xopero Blog","og_description":"KryptoCibule is a new, 3 in 1threat for cryptocurrency owners, which has managed to stay under the radar for almost two years!","og_url":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-09-07T06:35:00+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"KryptoCibule &#8211; triple threat \/ Magento flaws \/ Jocker is back","datePublished":"2020-09-07T06:35:00+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/"},"wordCount":1144,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/","url":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/","name":"KryptoCibule - triple threat \/ Magento flaws \/ Jocker is back - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-09-07T06:35:00+00:00","description":"KryptoCibule is a new, 3 in 1threat for cryptocurrency owners, which has managed to stay under the radar for almost two years!","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/kryptocibule-triple-threat-magento-flaws-jocker-is-back\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"KryptoCibule &#8211; triple threat \/ Magento flaws \/ Jocker is back"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3120"}],"version-history":[{"count":2,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3120\/revisions"}],"predecessor-version":[{"id":3127,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3120\/revisions\/3127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}