{"id":29625,"date":"2015-02-21T10:05:41","date_gmt":"2015-02-21T09:05:41","guid":{"rendered":"http:\/\/www.pcvesti.com\/?p=29625"},"modified":"2015-02-21T10:05:41","modified_gmt":"2015-02-21T09:05:41","slug":"grupa-equation-glavni-igrac-sajber-spijunazi","status":"publish","type":"post","link":"https:\/\/www.pcvesti.com\/?p=29625","title":{"rendered":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei"},"content":{"rendered":"<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Kompanija Kaspersky Lab otkriva ko je prethodnik pretnjama Stuxnet i Flame \u2013 mo\u0107an prete\u0107i akter koji apsolutno dominira sajber alatima i tehnikama<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\">18. februar 2015.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg\" alt=\"\" width=\"261\" height=\"193\" \/>Globalni istra\u017eiva\u010dki i analiti\u010dki tim kompanije Kaspersky Lab godinama detaljno prati vi\u0161e od 60 naprednih prete\u0107ih aktera koji su odgovorni za sajber napade \u0161irom sveta. Tim je video skoro sve, a napadi postaju sve slo\u017eeniji, uklju\u010duje se sve vi\u0161e dr\u017eava i napada\u010di poku\u0161avaju da se naoru\u017eaju najnaprednijim alatia. Me\u0111utim, tek sad stru\u010dnjaci kompanije mogu da potvrde da su otkrili prete\u0107eg aktera koji prevazilazi sva poznata saznanja o slo\u017eenosti i sofisticiranosti tehnika, i koji je aktivan skoro dve decenije \u2013 grupa Equation.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Prema istra\u017eiva\u010dima kompanije Kaspersky Lab, grupa je jedinstvena u gotovo svakom aspektu svojih aktivnosti: koriste alate koji su veoma komplikovani i skupi za razvoj sa ciljem da zaraze \u017ertve, dobiju podatke i sakriju aktivnost na neverovatno profesionalan na\u010din, i koriste klasi\u010dne \u0161pijunske tehnike kako bi preneli zlo\u0107udne softvere \u017ertvama.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Kako bi zarazila svoje \u017ertve, grupa koristi mo\u0107ni arsenal \u201cimplanata\u201d (Trojanaca), uklju\u010duju\u0107i neke koje je imenovala kompanija Kaspersky Lab: EquationLaser, EquationDrug, DoubleFantasy, TripleFantasy, Fanny i GrayFish. Nema sumnje da \u0107e se jo\u0161 neki \u201eimplanti\u201d pojaviti.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">\u0160TA \u010cINI GRUPU EQUATION JEDINSTVENOM?<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Visok nivo upornosti i nevidljivosti<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Globalni istra\u017eiva\u010dki i analiti\u010dki tim je uspeo da povrati dva modula koji omogu\u0107avaju programiranje firmvera hard drajva na vi\u0161e desetina popularnih HDD brendova. Ovo je mo\u017eda najja\u010di alat u arsenalu grupe Equation i prvi poznati zlonamerni softver sposoban da zarazi hard drajv.<\/span><\/span><\/span><\/p>\n<p align=\"justify\">\u201e<span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Opasnost je u tome da kada se jednom zarazi hard drajv ovim zlo\u0107udnim softverom, nemogu\u0107e je skenirati njegov firmver. Da pojednostavimo: za ve\u0107inu hard drajvova postoje funkcije koje pi\u0161u u oblast firmvera na hard drajvu, ali ne postoje funkcije da se to pro\u010dita. To zna\u010di da smo prakti\u010dno slepi i da ne mo\u017eemo da otkrijemo hard drajvove koji su zara\u017eeni ovim softverom\u201d \u2013 upozorava Kostin Raju, direktor globalnog istra\u017eiva\u010dkog i analiti\u010dkog tima kompanije Kaspersky Lab.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Sposobnost pristupa podacima iz izolovanih mre\u017ea<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Crv Fanny se najvi\u0161e izdvaja od svih napada grupe Equation. Njegova glavna svrha je da mapira zatvorene mre\u017ee, tj. da razume topologiju mre\u017ee kojoj se ne mo\u017ee pristupiti i izvr\u0161i komande na ovim izolovanim sistemima. Za ovo se koristi jedinstveni mehanizam za izvr\u0161enje zahteva i kontrolu zasnovan na USB-u koji omogu\u0107ava napada\u010dima da prenose podatke iz zatvorenih mre\u017ea.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Zara\u017eeni USB stik sa skrivenim skladi\u0161tem se posebno koristi da prikupi osnovne informacije o sistemu sa ra\u010dunara koji nije priklju\u010den na Internet, i dalje ih po\u0161alje na C&amp;C kada se USB prika\u010di na ra\u010dunar zara\u017een crvom Fanny i povezanim na Internet. Ako napada\u010di \u017eele da izvr\u0161e komande na zatvorenim mre\u017eama, mogu da ih sa\u010duvaju u skrivenom delu USB stika. Kada se stik uklju\u010di u ra\u010dunar, crv Fanny prepoznaje komande i izvr\u0161ava ih.<\/span><\/span><\/span>\n<\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Klasi\u010dne \u0161pijunske metode za preno\u0161enje zlo\u0107udnih softvera<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Napada\u010di koriste univerzalne metode da zaraze mete: ne samo preko Interneta, ve\u0107 i u fizi\u010dkom svetu. Za to koriste tehniku presretanja \u2013 presre\u0107u fizi\u010dka dobra i zamenjuju ih verzijama sa Trojancima. Jedan primer toga je kao metu imao u\u010desnike nau\u010dne konferencije u Hjustonu: pri povratku ku\u0107i, neki od u\u010desnika su dobili kopiju materijala sa konferencije na CD-ovima koji su iskori\u0161\u0107eni kako bi se instalirao implant DoubleFantasy grupe na ciljane ma\u0161ine. Jo\u0161 uvek nije poznato kako su uspeli da presretnu ove diskove.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">ZLOGLASNI PRIJATELJI: STUXNET I FLAME<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Postoje \u010dvrsti dokazi da je grupa Equation sara\u0111ivala sa drugim mo\u0107nim grupama, kao \u0161to su operateri pretnji Stuxnet i Flame \u2013 i to uglavnom sa superiorne pozicije. Grupa Equation je imala pristup potpuno novim pretnjama pre nego \u0161to su ih koristili Stuxnet i Flame, i u nekom trenutku su po\u010deli da dele plen sa ostalima.<\/span><\/span><\/span>\n<\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Na primer, crv Fanny je 2008. godine koristio dve potpuno nove pretnje koje su uvedene u Stuxnet u junu 2009. i martu 2010. godine. Jedna od ovih pretnji je zapravo bio oblik pretnje Flame koji koristi istu ranjivost i koji je preuzet direktno sa platforme Flame i ugra\u0111en u Stuxnet.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">MO\u0106NA I GEOGRAFSKI RA\u0160IRENA INFRASTRUKTURA<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Grupa Equation koristi \u0161iroku C&amp;C infrastrukturu od vi\u0161e od 300 domena i vi\u0161e od 100 servera. Serveri se nalaze u brojnim zemljama, uklju\u010duju\u0107i SAD, UK, Italiju, Nema\u010dku, Holandiju, Panamu, Kosta Riku, Maleziju, Kolumbiju i \u010ce\u0161ku republiku. Kompanija Kaspersky Lab trenutno otkriva nekoliko desetina od 300 C&amp;C servera.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">NA HILJADE \u017dRTAVA VISOKOG PROFILA NA SVETSKOM NIVOU<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Od 2001. godine, grupa Equation je uspela da zarazi hiljade, ako ne i desetine hiljada \u017ertava u vi\u0161e od 30 zemalja, i to u sektorima: vladine i diplomatske institucije, telekomunikacije, vazdu\u0161ni prostor, energija, nuklearna istra\u017eivanja, nafta i gas, vojska, nanotehnologija, islamski aktivisti i nau\u010dnici, masovni mediji, saobra\u0107aj, finansijske institucije i kompanije za razvijanje tehnologije za enkripciju.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">OTKRIVANJE<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Kompanija Kaspersky Lab je posmatrala sedam napada koji grupa Equation koristi u svom zlo\u0107udnom softveru. Bar \u010detiri su kori\u0161\u0107ena kao potpuno nove pretnje. Tako\u0111e, pra\u0107eni su i nepoznati napadi na pretra\u017eiva\u010d Firefox 17, mogu\u0107e potpuno nove pretnje, kako su kori\u0161\u0107ene u pretra\u017eiva\u010du Tor.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Tokom faze zaraze, grupa mo\u017ee da koristi deset lan\u010dano povezanih napada. Me\u0111utim, stru\u010dnjaci kompanije Kaspersky Lab su primetili da se ne koristi vi\u0161e od tri: ako prvi nije uspe\u0161an, poku\u0161ava se sa drugim, a zatim sa tre\u0107im. Ako su sva tri napada neuspe\u0161na, sistem ne\u0107e biti zara\u017een. <\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Proizvodi kompanije Kaspersky Lab su otkrili brojne napade na svoje korisnike. Ve\u0107ina ovih napada nisu bili uspe\u0161ni zbog tehnologije automatskog spre\u010davanja pretnji koja generi\u010dki otkriva i blokira zloupotrebu nepoznatih ranjivosti. Crv Fanny, za koga se smatra da je napravljen u julu 2008. godine, prvi put je otkriven i stavljen na crnu listu na\u0161ih automatskih sistema u decembru 2008. godine.<\/span><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Arial,sans-serif;\"><span style=\"font-size: small;\"><span lang=\"en-US\">Vi\u0161e informacija o grupi Equation mo\u017eete da saznate na blogu sajta Securelist.com.<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kompanija Kaspersky Lab otkriva ko je prethodnik pretnjama Stuxnet i Flame \u2013 mo\u0107an prete\u0107i akter koji apsolutno dominira sajber alatima i tehnikama 18. februar 2015. Globalni istra\u017eiva\u010dki i analiti\u010dki tim kompanije Kaspersky Lab godinama detaljno prati vi\u0161e od 60 naprednih prete\u0107ih aktera koji su odgovorni za sajber napade \u0161irom sveta. Tim je video skoro sve, a napadi postaju sve slo\u017eeniji, uklju\u010duje se sve vi\u0161e dr\u017eava i napada\u010di poku\u0161avaju da se naoru\u017eaju najnaprednijim&#8230; <\/p>\n<div class=\"more-container\"><a class=\"more-link\" href=\"https:\/\/www.pcvesti.com\/?p=29625\" itemprop=\"url\">Continue reading<\/a><\/div>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"seo_booster_metabox":"","ngg_post_thumbnail":0,"slim_seo":{"title":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti","description":"Kompanija Kaspersky Lab otkriva ko je prethodnik pretnjama Stuxnet i Flame \u2013 mo\u0107an prete\u0107i akter koji apsolutno dominira sajber alatima i tehnikama 18. februar"},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-29625","post","type-post","status-publish","format-standard","hentry","category-pc-vesti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcvesti.com\/?p=29625\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti\" \/>\n<meta property=\"og:description\" content=\"Kompanija Kaspersky Lab otkriva ko je prethodnik pretnjama Stuxnet i Flame \u2013 mo\u0107an prete\u0107i akter koji apsolutno dominira sajber alatima i tehnikama 18. februar 2015. Globalni istra\u017eiva\u010dki i analiti\u010dki tim kompanije Kaspersky Lab godinama detaljno prati vi\u0161e od 60 naprednih prete\u0107ih aktera koji su odgovorni za sajber napade \u0161irom sveta. Tim je video skoro sve, a napadi postaju sve slo\u017eeniji, uklju\u010duje se sve vi\u0161e dr\u017eava i napada\u010di poku\u0161avaju da se naoru\u017eaju najnaprednijim... Continue reading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcvesti.com\/?p=29625\" \/>\n<meta property=\"og:site_name\" content=\"PCVesti\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-21T09:05:41+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg\" \/>\n<meta name=\"author\" content=\"newsmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"newsmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625\"},\"author\":{\"name\":\"newsmaster\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#\\\/schema\\\/person\\\/d1e384f7c138a1fcda7af7425e55a6b2\"},\"headline\":\"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei\",\"datePublished\":\"2015-02-21T09:05:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625\"},\"wordCount\":1052,\"image\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/gallery\\\/logos_comp_pcv\\\/kaspersky_lab.jpeg\",\"articleSection\":[\"PC Vesti\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625\",\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625\",\"name\":\"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/gallery\\\/logos_comp_pcv\\\/kaspersky_lab.jpeg\",\"datePublished\":\"2015-02-21T09:05:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#\\\/schema\\\/person\\\/d1e384f7c138a1fcda7af7425e55a6b2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#primaryimage\",\"url\":\"http:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/gallery\\\/logos_comp_pcv\\\/kaspersky_lab.jpeg\",\"contentUrl\":\"http:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/gallery\\\/logos_comp_pcv\\\/kaspersky_lab.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/?p=29625#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcvesti.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#website\",\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/\",\"name\":\"PCVesti\",\"description\":\"www.pcvesti.com\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcvesti.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/#\\\/schema\\\/person\\\/d1e384f7c138a1fcda7af7425e55a6b2\",\"name\":\"newsmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/avatar_user_5_1537115954-96x96.jpeg\",\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/avatar_user_5_1537115954-96x96.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.pcvesti.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/avatar_user_5_1537115954-96x96.jpeg\",\"caption\":\"newsmaster\"},\"url\":\"https:\\\/\\\/www.pcvesti.com\\\/?author=5\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcvesti.com\/?p=29625","og_locale":"en_US","og_type":"article","og_title":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti","og_description":"Kompanija Kaspersky Lab otkriva ko je prethodnik pretnjama Stuxnet i Flame \u2013 mo\u0107an prete\u0107i akter koji apsolutno dominira sajber alatima i tehnikama 18. februar 2015. Globalni istra\u017eiva\u010dki i analiti\u010dki tim kompanije Kaspersky Lab godinama detaljno prati vi\u0161e od 60 naprednih prete\u0107ih aktera koji su odgovorni za sajber napade \u0161irom sveta. Tim je video skoro sve, a napadi postaju sve slo\u017eeniji, uklju\u010duje se sve vi\u0161e dr\u017eava i napada\u010di poku\u0161avaju da se naoru\u017eaju najnaprednijim... Continue reading","og_url":"https:\/\/www.pcvesti.com\/?p=29625","og_site_name":"PCVesti","article_published_time":"2015-02-21T09:05:41+00:00","og_image":[{"url":"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg","type":"","width":"","height":""}],"author":"newsmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"newsmaster","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcvesti.com\/?p=29625#article","isPartOf":{"@id":"https:\/\/www.pcvesti.com\/?p=29625"},"author":{"name":"newsmaster","@id":"https:\/\/www.pcvesti.com\/#\/schema\/person\/d1e384f7c138a1fcda7af7425e55a6b2"},"headline":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei","datePublished":"2015-02-21T09:05:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcvesti.com\/?p=29625"},"wordCount":1052,"image":{"@id":"https:\/\/www.pcvesti.com\/?p=29625#primaryimage"},"thumbnailUrl":"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg","articleSection":["PC Vesti"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pcvesti.com\/?p=29625","url":"https:\/\/www.pcvesti.com\/?p=29625","name":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei - PCVesti","isPartOf":{"@id":"https:\/\/www.pcvesti.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcvesti.com\/?p=29625#primaryimage"},"image":{"@id":"https:\/\/www.pcvesti.com\/?p=29625#primaryimage"},"thumbnailUrl":"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg","datePublished":"2015-02-21T09:05:41+00:00","author":{"@id":"https:\/\/www.pcvesti.com\/#\/schema\/person\/d1e384f7c138a1fcda7af7425e55a6b2"},"breadcrumb":{"@id":"https:\/\/www.pcvesti.com\/?p=29625#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcvesti.com\/?p=29625"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcvesti.com\/?p=29625#primaryimage","url":"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg","contentUrl":"http:\/\/www.pcvesti.com\/wp-content\/gallery\/logos_comp_pcv\/kaspersky_lab.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcvesti.com\/?p=29625#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcvesti.com\/"},{"@type":"ListItem","position":2,"name":"Grupa Equation: glavni igra\u010d u sajber \u0161pijuna\u017ei"}]},{"@type":"WebSite","@id":"https:\/\/www.pcvesti.com\/#website","url":"https:\/\/www.pcvesti.com\/","name":"PCVesti","description":"www.pcvesti.com","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcvesti.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.pcvesti.com\/#\/schema\/person\/d1e384f7c138a1fcda7af7425e55a6b2","name":"newsmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcvesti.com\/wp-content\/uploads\/2018\/09\/avatar_user_5_1537115954-96x96.jpeg","url":"https:\/\/www.pcvesti.com\/wp-content\/uploads\/2018\/09\/avatar_user_5_1537115954-96x96.jpeg","contentUrl":"https:\/\/www.pcvesti.com\/wp-content\/uploads\/2018\/09\/avatar_user_5_1537115954-96x96.jpeg","caption":"newsmaster"},"url":"https:\/\/www.pcvesti.com\/?author=5"}]}},"_links":{"self":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/posts\/29625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=29625"}],"version-history":[{"count":0,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=\/wp\/v2\/posts\/29625\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=29625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=29625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcvesti.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=29625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}