{"id":3981,"date":"2021-04-19T09:08:10","date_gmt":"2021-04-19T07:08:10","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3981"},"modified":"2024-05-15T16:26:37","modified_gmt":"2024-05-15T14:26:37","slug":"bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/","title":{"rendered":"B\u0142\u0119dy w WhatsApp \/ SMASH &#8211; atak Rowhammer \/ Zatruwanie wyszukiwarek"},"content":{"rendered":"\n<p>Posiadacze Androida maj\u0105 coraz to nowsze powody do zmartwie\u0144. Tydzie\u0144 temu przybli\u017cyli\u015bmy wam przypadek aplikacji <a href=\"https:\/\/xopero.com\/blog\/pl\/flixonline-to-nie-netflix-niebezpieczne-oferty-pracy-na-linkedin-ettersilent\/#tekst-1\" target=\"_blank\" rel=\"noreferrer noopener\">FlixOnline<\/a>, kt\u00f3rej tw\u00f3rcy byli w stanie skutecznie omin\u0105\u0107 system uwierzytelniania aplikacji w sklepie Google Play. Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to dok\u0142adnie oznacza? Atakuj\u0105cy mog\u0105 manipulowa\u0107 danymi wymienianymi mi\u0119dzy aplikacj\u0105, a pami\u0119ci\u0105 zewn\u0119trzn\u0105. Szczeg\u00f3\u0142y znajdziecie poni\u017cej. <\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"dwa-bledy-whatsapp-moga-umozliwic-zdalne-zhakowanie-twojego-telefonu-i-kradziez-danych\"><strong>Dwa b\u0142\u0119dy WhatsApp mog\u0105 umo\u017cliwi\u0107 zdalne zhakowanie Twojego telefonu i kradzie\u017c danych<\/strong><\/h2>\n\n\n<p>Niedawno wykryte b\u0142\u0119dy w WhatsApp na Androida mog\u0105 zosta\u0107 wykorzystane do zdalnego wykonania kodu i eksfiltracji poufnych danych.&nbsp;<\/p>\n\n\n\n<p>Luki s\u0105 wymierzone w urz\u0105dzenia z systemem Android do wersji 9 w\u0142\u0105cznie. Przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d umo\u017cliwia atakuj\u0105cym z\u0142amanie zabezpiecze\u0144 WhatsApp poprzez manipulowanie danymi wymienianymi mi\u0119dzy aplikacj\u0105, a pami\u0119ci\u0105 zewn\u0119trzn\u0105.<\/p>\n\n\n\n<p>Luka (CVE-2021-24027) wykorzystuje wsparcie Chrome dla dostawc\u00f3w tre\u015bci w systemie Android (za po\u015brednictwem schematu adresu URL \u201econtent:\/\/\u201d) i obej\u015bcie polityki same-origin w przegl\u0105darce (CVE-2020-6516). Umo\u017cliwia to atakuj\u0105cym wys\u0142anie spreparowanego pliku HTML do ofiary przez WhatsApp, kt\u00f3ry po otwarciu w przegl\u0105darce wykonuje kod zawarty w pliku HTML.<\/p>\n\n\n\n<p>Atakuj\u0105cy musi wi\u0119c jedynie nak\u0142oni\u0107 ofiar\u0119 do otwarcia dokumentu za\u0142\u0105czonego w HTML. Nast\u0119pnie WhatsApp poprzez dostawc\u0119 tre\u015bci wyrenderuje ten za\u0142\u0105cznik w Chrome, a z\u0142o\u015bliwy kod Javascript b\u0119dzie m\u00f3g\u0142 ukra\u015b\u0107 zapisane klucze sesji TLS.<\/p>\n\n\n\n<p>Uzbrojony w klucze atakuj\u0105cy mo\u017ce nast\u0119pnie przeprowadzi\u0107 atak typu man-in-the-middle, aby zdalnie wykona\u0107 kod, a nawet wydoby\u0107 pary kluczy protoko\u0142u Noise.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"atbs-responsive-video\"><iframe loading=\"lazy\" title=\"CVE-2021-24027: Remote code execution in WhatsApp\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/KO_K0F4W36I?start=31&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<p>Co gorsza, z\u0142o\u015bliwy kod mo\u017ce s\u0142u\u017cy\u0107 do uzyskania dost\u0119pu do dowolnego zasobu przechowywanego w niezabezpieczonym obszarze pami\u0119ci zewn\u0119trznej. A nawet do ujawnienia poufnych informacji dowolnej aplikacji, kt\u00f3ra jest upowa\u017cniona do odczytu lub zapisu z pami\u0119ci zewn\u0119trznej.<\/p>\n\n\n\n<p>U\u017cytkownikom WhatsApp zaleca si\u0119 aktualizacj\u0119 do wersji 2.21.4.18, aby zminimalizowa\u0107 ryzyko zwi\u0105zane z b\u0142\u0119dami.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2021\/04\/new-whatsapp-bug-couldve-let-attackers.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"przejete-serwery-microsoft-exchange-przeksztalcono-w-hosty-dla-crypto-koparek\"><strong>Przej\u0119te serwery Microsoft Exchange przekszta\u0142cono w hosty dla crypto koparek<\/strong><\/h2>\n\n\n<p>Cryptojacking mo\u017cna ju\u017c oficjalnie doda\u0107 do listy zagro\u017ce\u0144, kt\u00f3re czyhaj\u0105 na serwery Microsoft Exchange ci\u0105gle podatne na <a href=\"https:\/\/xopero.com\/blog\/pl\/malware-z0miner-ransomware-dearcry-i-exploity-proxylogon-phishing-na-recaptcha\/\">exploity<\/a><a href=\"https:\/\/xopero.com\/blog\/pl\/malware-z0miner-ransomware-dearcry-i-exploity-proxylogon-phishing-na-recaptcha\/#tekst-3\" target=\"_blank\" rel=\"noreferrer noopener\"> ProxyLogon<\/a>. Ponad 92 procent dotkni\u0119tych urz\u0105dze\u0144 jest za\u0142atanych, ale szkody zosta\u0142y ju\u017c wyrz\u0105dzone.<\/p>\n\n\n\n<p>Specjali\u015bci z Sophos natrafili na \u015blad nieznanego napastnika, kt\u00f3ry wykorzystuje&nbsp; zainfekowane wcze\u015bniej serwery Microsoft Exchange do wydobywania Monero. Z uwagi na to, \u017ce cryptominer jest hostowany na serwerze Exchange, atakuj\u0105cy mo\u017ce du\u017co \u0142atwiej dostarczy\u0107 payload innym zagro\u017conym celom. Dlaczego tak si\u0119 dzieje? Poniewa\u017c zapory ogniowe rzadziej blokuj\u0105 ruch mi\u0119dzy serwerami Exchange.<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\">Pliki executable powi\u0105zane z tym konkretnym atakiem: <strong>Mal\/Inject-GV<\/strong> oraz <strong>XMR-Stak Miner (PUA)<\/strong>.<\/p>\n\n\n\n<p><strong>Niecodzienny atak<\/strong><\/p>\n\n\n\n<p>Atak inicjuje polecenie programu PowerShell, kt\u00f3re umo\u017cliwia pobranie pliku o nazwie win_r.zip z innego zainfekowanego serwera Outlook Web Access \u2013 a dok\u0142adnie ze \u015bcie\u017cki logowania \/owa\/auth. Plik .zip nie jest jednak skompresowanym archiwum, ale skryptem batch, kt\u00f3ry wywo\u0142uje program certutil.exe w celu pobrania dw\u00f3ch dodatkowych plik\u00f3w, win_s.zip i win_d.zip, kt\u00f3re r\u00f3wnie\u017c archiwami.<\/p>\n\n\n\n<p>Skrypt batch nast\u0119pnie uruchamia kolejn\u0105 polecenie, kt\u00f3re wyprowadza zdekodowany plik wykonywalny do tego katalogu. Po zdekodowaniu skrypt batch uruchamia plik wykonywalny, kt\u00f3ry wyodr\u0119bnia koparki i tymczasowe dane konfiguracyjne z pliku QuickCPU.dat. Nast\u0119pnie wstrzykuje je do procesu systemowego \u2013 a kiedy ta operacja ko\u0144czy si\u0119 sukcesem, usuwa wszelkie dowody swojej dzia\u0142alno\u015bci.<\/p>\n\n\n\n<p>Zagro\u017cenie r\u00f3wnie\u017c rozsy\u0142a si\u0119 dalej\u2026<\/p>\n\n\n\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/13\/compromised-exchange-server-hosting-cryptojacker-targeting-other-exchange-servers\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/resources\/git-backup-guide\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2021\/04\/git-guide-pl.png\" alt=\"\" class=\"wp-image-3947\" width=\"604\" height=\"302\"\/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"smash-czyli-karty-ddr4-znow-podatne-na-ataki-rowhammer\"><strong>SMASH, czyli karty DDR4 zn\u00f3w podatne na ataki Rowhammer<\/strong><\/h2>\n\n\n<p>Rowhammer to og\u00f3lny termin odnosz\u0105cy si\u0119 do klasy exploit\u00f3w, kt\u00f3re wykorzystuj\u0105 problematyczny design system\u00f3w DDR4. SMASH to najnowszy wariant tego ataku, kt\u00f3ry uruchamia z\u0142o\u015bliwy kod JavaScript na nowych modelach kartach pami\u0119ci DDR4 RAM, pomimo wprowadzenia przez producent\u00f3w \u015brodk\u00f3w zaradczych prawie 5 lat temu.<\/p>\n\n\n\n<p><strong>Karty RAM i ich design \u2013 czyli pies pogrzebany<\/strong><\/p>\n\n\n\n<p>Karty pami\u0119ci RAM przechowuj\u0105 dane w tak zwanych kom\u00f3rkach pami\u0119ci (ka\u017cda sk\u0142ada si\u0119 z kondensatora i tranzystora), kt\u00f3re s\u0105 u\u0142o\u017cone w formie macierzy. Kom\u00f3rki pami\u0119ci maj\u0105 jednak tendencj\u0119 do tracenia swojego stanu wraz z up\u0142ywem czasu i dlatego wymagaj\u0105 okresowego odczytu i przepisania ka\u017cdej z nich w celu przywr\u00f3cenia \u0142adunku na kondensatorze do pierwotnego poziomu.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"atbs-responsive-video\"><iframe loading=\"lazy\" title=\"SMASH\" width=\"1200\" height=\"900\" src=\"https:\/\/www.youtube.com\/embed\/k2D4D-kF-ic?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<p>Aby omin\u0105\u0107 ograniczenia TRR (Target Row Refresh), SMASH starannie planuje trafienia catch (i awarie), aby aktywowa\u0107 wieloaspektowy bit Rowhammer. Nast\u0119pnie SMASH umo\u017cliwia atakuj\u0105cym dowolny odczyt\/zapis prymitywny w przegl\u0105darce:<\/p>\n\n\n\n<p>\u0141a\u0144cuch exploit\u00f3w jest inicjowany, gdy ofiara trafia na z\u0142o\u015bliw\u0105 lub przej\u0119t\u0105 witryn\u0119 internetow\u0105. Punkt zapalny mo\u017ce r\u00f3wnie\u017c wizyta w normalnym, \u2018zdrowym\u2019 serwisie, kt\u00f3ry jednak wy\u015bwietla z\u0142o\u015bliwe reklamy banerowe. W tym momencie SMASH wykorzystuj\u0105c przerzuty bit\u00f3w Rowhammer\u2019a uruchamiane z poziomu sandbox JavaScript. W efekcie przejmuje kontrol\u0119 nad przegl\u0105dark\u0105 ofiary. kontroli nad przegl\u0105dark\u0105 ofiary.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.exploitone.com\/vulnerabilities\/smash-the-new-variant-of-the-rowhammer-attack-that-puts-millions-of-users-at-risk\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hakerzy-z-solarmarker-zalewaja-siec-100-tys-witryn-oferujacych-zlosliwe-pliki-pdf\"><strong>Hakerzy z SolarMarker zalewaj\u0105 sie\u0107 100 tys. witryn oferuj\u0105cych z\u0142o\u015bliwe pliki PDF<\/strong><\/h2>\n\n\n<p>Cyberprzest\u0119pcy uciekaj\u0105 si\u0119 do technik zatruwania wyszukiwarek, aby zwabi\u0107 profesjonalist\u00f3w na pozornie legalne strony Google. Ich celem jest zainstalowanie trojana zdalnego dost\u0119pu (RAT) i przeprowadzenie szerokiego zakresu atak\u00f3w.<\/p>\n\n\n\n<p>Atakuj\u0105cy wykorzystuj\u0105 wyszukiwania popularnych wzor\u00f3w formularzy, takich jak faktury, szablony, kwestionariusze, pokwitowania do infiltracji system\u00f3w ofiar. Gdy u\u017cytkownik pr\u00f3buje pobra\u0107 rzekomy szablon dokumentu w PDF, zostaje nie\u015bwiadomie przekierowany na z\u0142o\u015bliw\u0105 witryn\u0119 internetow\u0105, na kt\u00f3rej znajduje si\u0119 RAT (trojan zdalnego dost\u0119pu).&nbsp;<\/p>\n\n\n\n<p>Wed\u0142ug specjalist\u00f3w z eSentire, gdy RAT zostanie aktywowany na komputerze ofiary, atakuj\u0105cy mog\u0105 wysy\u0142a\u0107 polecenia i przesy\u0142a\u0107 dodatkowe z\u0142o\u015bliwe oprogramowanie. Jakie dok\u0142adnie? Ransomware, credential stealer czy trojan bankowy lub po prostu u\u017cy\u0107 RAT o nazwie SolarMarker (inaczej Yellow Cockatoo, Jupyter i Polazert) jako punkt zaczepienia w sieci ofiary.<\/p>\n\n\n\n<p>Firma twierdzi, \u017ce odkry\u0142a ponad 100 tysi\u0119cy unikalnych stron internetowych, kt\u00f3re zawieraj\u0105 popularne terminy biznesowe lub s\u0142owa kluczowe, takie jak szablon, faktura, kwestionariusz, CV i potwierdzenie zap\u0142aty. Grupa SolarMarker wykorzystuje techniki SEO, aby strony zajmowa\u0142y wysokie pozycje w wynikach wyszukiwania i tym samym zwi\u0119kszy\u0142y prawdopodobie\u0144stwo powodzenia kampanii.&nbsp;<\/p>\n\n\n\n<p>Je\u015bli wi\u0119c szukasz jakichkolwiek szablon\u00f3w dokument\u00f3w finansowych, dla pewno\u015bci korzystaj tylko z oficjalnych, dobrze znanych stron internetowych.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2021\/04\/yikes-cybercriminals-flood-intrenet.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Posiadacze Androida maj\u0105 coraz to nowsze powody do zmartwie\u0144. Tydzie\u0144 temu przybli\u017cyli\u015bmy wam przypadek aplikacji FlixOnline, kt\u00f3rej tw\u00f3rcy byli w stanie skutecznie omin\u0105\u0107 system uwierzytelniania aplikacji w sklepie Google Play. Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to dok\u0142adnie oznacza? Atakuj\u0105cy mog\u0105 manipulowa\u0107 danymi wymienianymi mi\u0119dzy aplikacj\u0105, a pami\u0119ci\u0105 zewn\u0119trzn\u0105. Szczeg\u00f3\u0142y znajdziecie poni\u017cej.<\/p>\n","protected":false},"author":1,"featured_media":1597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[436],"tags":[],"class_list":["post-3981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news-pl","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>B\u0142\u0119dy w WhatsApp \/ SMASH - atak Rowhammer - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"B\u0142\u0119dy w WhatsApp \/ SMASH - atak Rowhammer - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-19T07:08:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T14:26:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"B\u0142\u0119dy w WhatsApp \\\/ SMASH &#8211; atak Rowhammer \\\/ Zatruwanie wyszukiwarek\",\"datePublished\":\"2021-04-19T07:08:10+00:00\",\"dateModified\":\"2024-05-15T14:26:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/\"},\"wordCount\":1119,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/\",\"name\":\"B\u0142\u0119dy w WhatsApp \\\/ SMASH - atak Rowhammer - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"datePublished\":\"2021-04-19T07:08:10+00:00\",\"dateModified\":\"2024-05-15T14:26:37+00:00\",\"description\":\"Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"B\u0142\u0119dy w WhatsApp \\\/ SMASH &#8211; atak Rowhammer \\\/ Zatruwanie wyszukiwarek\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"B\u0142\u0119dy w WhatsApp \/ SMASH - atak Rowhammer - Xopero Blog","description":"Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/","og_locale":"pl_PL","og_type":"article","og_title":"B\u0142\u0119dy w WhatsApp \/ SMASH - atak Rowhammer - Xopero Blog","og_description":"Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to...","og_url":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-04-19T07:08:10+00:00","article_modified_time":"2024-05-15T14:26:37+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"B\u0142\u0119dy w WhatsApp \/ SMASH &#8211; atak Rowhammer \/ Zatruwanie wyszukiwarek","datePublished":"2021-04-19T07:08:10+00:00","dateModified":"2024-05-15T14:26:37+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/"},"wordCount":1119,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/","url":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/","name":"B\u0142\u0119dy w WhatsApp \/ SMASH - atak Rowhammer - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","datePublished":"2021-04-19T07:08:10+00:00","dateModified":"2024-05-15T14:26:37+00:00","description":"Tym razem opisujemy dwa powa\u017cne b\u0142\u0119dy wykryte w WhatsApp. Umo\u017cliwiaj\u0105 one przeprowadzenie tzw. ataku typu \u201eman-in-the-disk\u201d. Co to...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/pl\/bledy-w-whatsapp-smash-atak-rowhammer-zatruwanie-wyszukiwarek\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"B\u0142\u0119dy w WhatsApp \/ SMASH &#8211; atak Rowhammer \/ Zatruwanie wyszukiwarek"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3981"}],"version-history":[{"count":12,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3981\/revisions"}],"predecessor-version":[{"id":5884,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3981\/revisions\/5884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/1597"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}