{"id":3375,"date":"2020-11-23T08:42:12","date_gmt":"2020-11-23T07:42:12","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3375"},"modified":"2024-12-11T17:41:09","modified_gmt":"2024-12-11T16:41:09","slug":"malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/","title":{"rendered":"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX"},"content":{"rendered":"\n<p>Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy Morphisec, przest\u0119pcy wystartowali z kampani\u0105 w maju 2020 r. Od tamtej pory pojawi\u0142o si\u0119 kilka wariant\u00f3w tego oprogramowania \u2013 najnowszy jest najgro\u017aniejszy. Kampania nadal trwa, tak wi\u0119c uwa\u017cajcie.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-nowo-odkryty-malware-jupyter-niezauwazenie-wykrada-loginy-i-hasla-szykujac-droge-wiekszym-zagrozeniom\"><strong>1. Nowo odkryty malware Jupyter niezauwa\u017cenie wykrada loginy i has\u0142a, szykuj\u0105c drog\u0119 wi\u0119kszym zagro\u017ceniom<\/strong><\/h2>\n\n\n<p>Jupyter to infostealer atakuj\u0105cy popularne przegl\u0105darki internetowe &#8211; oparte na Chromium, Firefox i oczywi\u015bcie Chrome. Trojan w du\u017cej mierze atakuje g\u0142\u00f3wnie biznes i uczelnie wy\u017csze. Celem s\u0105 dane uwierzytelniaj\u0105ce user\u00f3w. Przegl\u0105darka drog\u0105 do wi\u0119kszych sekret\u00f3w? Oczywi\u015bcie. Je\u015bli przest\u0119pcy s\u0105 tylko w stanie \u2013 tworz\u0105 w podatnym systemie backdoor\u2019a. Tak na wszelki wypadek.<\/p>\n\n\n\n<p>Utworzony w systemie backdoor pozwala na uruchomienie skrypt\u00f3w PowerShell, wydawanie komend a tak\u017ce pobieranie dodatkowych komponent\u00f3w ataku, takie jak pliki .exe innych malware. Cyberprzest\u0119pcy licz\u0105 na to, \u017ce uda si\u0119 im zdoby\u0107 dodatkowe dost\u0119py m.in. do sieci, by w dalszych krokach wykra\u015b\u0107 naprawd\u0119 cenne i wra\u017cliwe dane. Mog\u0105 r\u00f3wnie\u017c sprzeda\u0107 dane uwierzytelniaj\u0105ce oraz dost\u0119p do ca\u0142ej infrastruktury innej grupie przest\u0119pczej.<\/p>\n\n\n\n<p>Plik instalacyjny Jupyter podszywa si\u0119 pod .zip, jest do tego opatrzony faviconem Microsoft Word. Przest\u0119pcy nadaj\u0105 mu te\u017c nazw\u0119, kt\u00f3ra ma sk\u0142oni\u0107 u\u017cytkownika do szybkiego otwarcia archiwum. Czyli, stare i dobre metody znane m.in. z phishingu.<\/p>\n\n\n\n<p>W momencie, kiedy instalator zostanie uruchomiony, w tle instaluj\u0105 si\u0119 legalne narz\u0119dzia \u2013 jak wida\u0107 przest\u0119pcy staraj\u0105 si\u0119 tuszowa\u0107 swoje prawdziwe intencje maksymalnie d\u0142ugo. Po zako\u0144czeniu instalacji Jupyter kradnie informacje, w tym nazwy u\u017cytkownik\u00f3w, has\u0142a, dane autouzupe\u0142niania, histori\u0119 przegl\u0105darki i pliki cookie. Finalnie trafiaj\u0105 one na serwery C&amp;C.<\/p>\n\n\n\n<p>Ciekawostka: analiza oprogramowania wykaza\u0142a, \u017ce ktokolwiek go stworzy\u0142, nieustannie pracuje nad ulepszeniem kodu, tak by by\u0107 w stanie wykrada\u0107 coraz wi\u0119cej informacji, jednocze\u015bnie utrudniaj\u0105c wykrycie samego procesu wykradania przez ofiary.<\/p>\n\n\n\n<p><strong>Jupiter, a nie Jupyter&#8230; <\/strong>&nbsp;Grafika z panelu administracyjnego malware przedstawiaj\u0105ca planet\u0119 Jupiter pochodzi z rosyjskoj\u0119zycznego forum. Nazwa pliku zawiera liter\u00f3wk\u0119, prawdopodobnie jest to efekt b\u0142\u0119dnego przek\u0142adu z rosyjskiego na j\u0119zyk angielski.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/jupyter-trojan-newly-discovered-trojan-malware-stealthily-steals-usernames-and-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u017br\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/pl\/xopero-beta-testy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-pl-1024x270.jpg\" alt=\"\" class=\"wp-image-3227\" width=\"582\" height=\"153\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-pl-1024x270.jpg 1024w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-pl-300x79.jpg 300w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-pl-768x202.jpg 768w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-pl.jpg 1048w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-zaatakowal-cie-ransomware-egregor-przygotuj-sie-na-zasyp-wydrukami-z-informacja-ze-padles-ofiara-hackerow-raczej-nie-utrzymasz-tego-w-tajemnicy\"><strong>2. Zaatakowa\u0142 ci\u0119 ransomware Egregor? Przygotuj si\u0119 na zasyp wydrukami z informacj\u0105, \u017ce pad\u0142e\u015b ofiar\u0105 hacker\u00f3w \u2013 raczej nie utrzymasz tego w tajemnicy\u2026<\/strong><\/h2>\n\n\n<p>Wiele firm ukrywa przed opini\u0105 publiczn\u0105, fakt \u017ce pad\u0142y ofiar\u0105 ataku ransomware \u2013 w szczeg\u00f3lno\u015bci przed swoimi pracownikami. Z oczywistych wzgl\u0119d\u00f3w, boj\u0105 si\u0119 \u017ce informacja rozniesie si\u0119 na zewn\u0105trz. W tym wypadku maj\u0105 jednak dodatkowo utrudnione zadanie, poniewa\u017c operatorzy Egregor w nowym ataku przejmuj\u0105 kontrol\u0119 nad wszystkimi drukarkami w firmie. W jakim celu? Po to by zasypa\u0107 ofiar\u0119 wydrukami z \u017c\u0105daniem okupu\u2026 A\u017c do ostatniej kropli tuszu lub do wyczerpania tonera. Jak kto woli.<\/p>\n\n\n\n<p><strong>Zagro\u017cenie<\/strong><\/p>\n\n\n\n<p>Egregor nale\u017cy do rodziny malware Sekhmet, kt\u00f3ra jest aktywna od po\u0142owy wrze\u015bnia 2020 r. Program dysponuje podobnymi funkcjami co <a href=\"https:\/\/xopero.com\/blog\/pl\/avast-i-avg-z-czerwona-kartka-clop-ransomware-ms-oauth-2-0-z-luka\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware Clop<\/a>.\u00a0<\/p>\n\n\n\n<p>Stosuje wiele technik dzi\u0119ki kt\u00f3rym wymyka si\u0119 narz\u0119dziom do analizy &#8211; w tym zaciemnianie kodu i pakowane payloads w archiwa. Payload korzysta r\u00f3wnie\u017c z rozwi\u0105za\u0144 utrudniaj\u0105cych debuggowanie jego kodu oraz licznych technik ukrywania obecno\u015bci. Wykorzystuje do tego m.in. API Windows. Dane payloads mog\u0105 zosta\u0107 odszyfrowane tylko za pomoc\u0105 w\u0142a\u015bciwych argument\u00f3w command line. Je\u015bli nie zna si\u0119 koniecznych parametr\u00f3w, nie b\u0119dzie si\u0119 w stanie przeanalizowa\u0107 go manualnie lub wykorzystuj\u0105c do tego sandbox.<\/p>\n\n\n\n<p>Wracaj\u0105c do tematu newsa \u2013 rozszala\u0142ych drukarek w r\u0119kach przest\u0119pc\u00f3w. Mieli\u015bmy okazj\u0119 zaobserwowa\u0107 to zjawisko w akcji. Jedn\u0105 z ostatnich ofiar przest\u0119pc\u00f3w by\u0142 gigant handlu detalicznego \u2013 firma Cencosud.<\/p>\n\n\n\n<blockquote class=\"twitter-tweet\"><p lang=\"es\" dir=\"ltr\">El <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\">#ransomware<\/a> que le peg\u00f3 a Cencosud es <a href=\"https:\/\/twitter.com\/hashtag\/Egregor?src=hash&amp;ref_src=twsrc%5Etfw\">#Egregor<\/a>. La ransom note empez\u00f3 a salir en las impresoras de varios locales de Argentina y Chile <a href=\"https:\/\/t.co\/k1Ps4IDUyq\">pic.twitter.com\/k1Ps4IDUyq<\/a><\/p>\u2014 Irlenys (@Irlenys) <a href=\"https:\/\/twitter.com\/Irlenys\/status\/1327784305465188353?ref_src=twsrc%5Etfw\">November 15, 2020<\/a><\/blockquote> <script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n\n\n\n<p>Wydruki s\u0105 \u017c\u0105daniem okupu, kt\u00f3re mo\u017cna znale\u017a\u0107 na przej\u0119tych urz\u0105dzeniach. Wszystko wskazuje na to, \u017ce za t\u0119 operacj\u0119 nie odpowiada plik .exe ransomware. Specjali\u015bci s\u0105 raczej zdania, \u017ce w ko\u0144cowej fazie ataku przest\u0119pcy przesy\u0142aj\u0105 skrypt, kt\u00f3ry to umo\u017cliwia. S\u0105 to tylko podejrzenia, bo na ten moment nie uda\u0142o si\u0119 znale\u017a\u0107 na to potwierdzenia.<\/p>\n\n\n\n<p>\u0179r\u00f3d\u0142o: <a href=\"https:\/\/cybleinc.com\/2020\/10\/31\/egregor-ransomware-a-deep-dive-into-its-activities-and-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> |&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/egregor-ransomware-bombards-victims-printers-with-ransom-notes\/\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"voltpillager-czyli-jak-za-30-dolarow-wlamac-sie-do-intel-sgx\"><strong>VoltPillager, czyli jak za 30 dolar\u00f3w w\u0142ama\u0107 si\u0119 do Intel SGX<\/strong><\/h2>\n\n\n<p>Grupa sze\u015bciu naukowc\u00f3w z Uniwersytetu w Birmingham opracowa\u0142a now\u0105 technik\u0119 ataku, nazwan\u0105 VoltPillager, kt\u00f3ra mo\u017ce z\u0142ama\u0107 poufno\u015b\u0107 i integralno\u015b\u0107 enklaw Intel Software Guard Extensions (SGX), kontroluj\u0105c napi\u0119cie rdzenia procesora.<\/p>\n\n\n\n<p>Atak wykorzystuje niedrogie narz\u0119dzie (mo\u017cliwe do zbudowania ju\u017c za 30 dolar\u00f3w), kt\u00f3re s\u0142u\u017cy do wprowadzania pakiet\u00f3w Serial Voltage Identification (SVID) na magistral\u0119 Serial Voltage Identification mi\u0119dzy procesorem a regulatorem napi\u0119cia na p\u0142ycie g\u0142\u00f3wnej.<\/p>\n\n\n\n<p>Wstrzykni\u0119te pakiety pozwoli\u0142y naukowcom w pe\u0142ni kontrolowa\u0107 napi\u0119cie rdzenia procesora i wykonywa\u0107 ataki typu fault-injection.<\/p>\n\n\n\n<p>Naukowcy odkryli, \u017ce na standardowej p\u0142ycie g\u0142\u00f3wnej znajduje si\u0119 oddzielny uk\u0142ad regulatora napi\u0119cia (VR), kt\u00f3ry generuje i kontroluje napi\u0119cie procesora. Eksperci opracowali narz\u0119dzie VoltPillager do \u0142\u0105czenia si\u0119 z interfejsem chipa VR, kt\u00f3ry nie jest chroniony, co w efekcie pozwala na kontrolowanie napi\u0119cia.<\/p>\n\n\n\n<p>Eksperci byli w stanie przeprowadzi\u0107 ataki polegaj\u0105ce na wstrzykiwaniu b\u0142\u0119d\u00f3w, kt\u00f3re naruszaj\u0105 poufno\u015b\u0107 i integralno\u015b\u0107 enklaw Intel SGX. Zaprezentowali r\u00f3wnie\u017c proof-of-concept atak\u00f3w przeciwko algorytmom kryptograficznym dzia\u0142aj\u0105cym wewn\u0105trz SGX i prowadz\u0105cym do odzyskiwania klucza.&nbsp;<\/p>\n\n\n\n<p>W grudniu rok temu pisali\u015bmy o luce <a href=\"https:\/\/xopero.com\/blog\/pl\/ryuk-uszkadza-pliki-revil-grozi-niepokornym-ofiarom\/#tekst-4\" target=\"_blank\" rel=\"noreferrer noopener\">Plundervolt <\/a>(CVE-2019-11157), kt\u00f3ra umo\u017cliwia\u0142a wydobywanie poufnych danych z pami\u0119ci Intel SGX, w tym kluczy szyfrowania RSA r\u00f3wnie\u017c za pomoc\u0105 manipulacji napi\u0119ciem procesor\u00f3w. Wydana \u0142atka nie chroni jednak urz\u0105dze\u0144 przed atakiem VoltPillagerponiewa\u017c dotyczy on interfejsu sprz\u0119towego, a nie programowego.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/111033\/hacking\/voltpillager-attack-intel-sgx.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"uwaga-cardskimming-malware-grelos-na-wolnosci\"><strong>Uwaga &#8211; card-skimming malware Grelos na wolno\u015bci<\/strong><\/h2>\n\n\n<p>Specjali\u015bci z RiskIQ, trafili na now\u0105 ga\u0142\u0105\u017a z\u0142o\u015bliwego oprogramowania typu card-skimming.Grelos, bo o nim mowa, to jeden z wariant\u00f3w popularnego Magecart.<\/p>\n\n\n\n<p>Ten szczep wygl\u0105da na przer\u00f3bk\u0119 oryginalnego kodu rodem z lat 2015-16, zawieraj\u0105cego modu\u0142y loader i skimmer, z kt\u00f3rych oba zosta\u0142y pi\u0119ciokrotnie zencodowane w base64 w celu utrudnienia wykrycia.&nbsp;<\/p>\n\n\n\n<p>Zagro\u017cenie zosta\u0142o zauwa\u017cone w wyniku wycieku danych ameryka\u0144skiego operatora mobilnego Boom! na pocz\u0105tku tego roku. Grelos szybko zosta\u0142 powi\u0105zany z ekip\u0105 hakersk\u0105 Fullz House, kt\u00f3ra \u0142\u0105czy umiej\u0119tno\u015bci dw\u00f3ch gang\u00f3w specjalizuj\u0105cych si\u0119 w phishingu i skimmingu.&nbsp;<\/p>\n\n\n\n<p>Grelos powi\u0105zany z Magecart z 2018 r. dzia\u0142a w podobny spos\u00f3b: w istocie jest to skimmer u\u017cywany do kradzie\u017cy danych kart kredytowych klient\u00f3w sklep\u00f3w internetowych.<\/p>\n\n\n\n<p>R\u00f3\u017cne odmiany skimmer\u00f3w zwi\u0105zanych z Grelos wykorzystywa\u0142y t\u0119 sam\u0105 infrastruktur\u0119,&nbsp; rekordy WHOIS, phishing lub malware. Ten wydaje si\u0119 by\u0107 powi\u0105zany z najstarszymi znanymi operatorami Magecart, zidentyfikowanymi jako Grupy 1 i 2.&nbsp;<\/p>\n\n\n\n<p>Magecart to nieod\u0142\u0105czny problem bran\u017cy e-commerce. Wyst\u0119puje poniewa\u017c firmy nie dbaj\u0105 o to, w jakich miejscach umieszczaj\u0105 Javascript na stronie. Problem ten dotyczy nie tylko ma\u0142ych sklep\u00f3w, ale i wielkich marek, co pokaza\u0142y nam przyk\u0142ady British Airways czy Ticketmaster.&nbsp;<\/p>\n\n\n\n<p>Szacuje si\u0119, \u017ce oprogramowanie obs\u0142ugiwane jest przez co najmniej dwana\u015bcie r\u00f3\u017cnych grup przest\u0119pczych.&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/theregister.com\/2020\/11\/18\/magecart_grelos_research\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy Morphisec, przest\u0119pcy wystartowali z kampani\u0105 w maju 2020 r. Od tamtej pory pojawi\u0142o si\u0119 kilka wariant\u00f3w tego oprogramowania \u2013 najnowszy jest najgro\u017aniejszy. Kampania nadal trwa, tak wi\u0119c uwa\u017cajcie.<\/p>\n","protected":false},"author":1,"featured_media":1597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[436],"tags":[],"class_list":["post-3375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news-pl","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-23T07:42:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T16:41:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Malware Jupyter \\\/ Ransomware Egregor \\\/ VoltPillager w\u0142amuje si\u0119 do Intel SGX\",\"datePublished\":\"2020-11-23T07:42:12+00:00\",\"dateModified\":\"2024-12-11T16:41:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/\"},\"wordCount\":1267,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/\",\"name\":\"Malware Jupyter \\\/ Ransomware Egregor \\\/ VoltPillager w\u0142amuje si\u0119 do Intel SGX - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"datePublished\":\"2020-11-23T07:42:12+00:00\",\"dateModified\":\"2024-12-11T16:41:09+00:00\",\"description\":\"Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Jupyter \\\/ Ransomware Egregor \\\/ VoltPillager w\u0142amuje si\u0119 do Intel SGX\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX - Xopero Blog","description":"Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/","og_locale":"pl_PL","og_type":"article","og_title":"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX - Xopero Blog","og_description":"Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy...","og_url":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-11-23T07:42:12+00:00","article_modified_time":"2024-12-11T16:41:09+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX","datePublished":"2020-11-23T07:42:12+00:00","dateModified":"2024-12-11T16:41:09+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/"},"wordCount":1267,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/","url":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/","name":"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","datePublished":"2020-11-23T07:42:12+00:00","dateModified":"2024-12-11T16:41:09+00:00","description":"Malware Jupyter to najnowszy trojan i info stealer w jednym, posiadaj\u0105cy dodatkowo pe\u0142n\u0105 funkcjonalno\u015b\u0107 backdoor\u2019a. Wed\u0142ug specjalist\u00f3w z firmy...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/pl\/malware-jupyter-ransomware-egregor-voltpillager-wlamuje-sie-do-intel-sgx\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Malware Jupyter \/ Ransomware Egregor \/ VoltPillager w\u0142amuje si\u0119 do Intel SGX"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3375"}],"version-history":[{"count":12,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3375\/revisions"}],"predecessor-version":[{"id":6411,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3375\/revisions\/6411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/1597"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}