{"id":77622,"date":"2021-08-19T10:41:16","date_gmt":"2021-08-19T08:41:16","guid":{"rendered":"https:\/\/mwtsolutions.eu\/?p=77622"},"modified":"2024-10-18T08:47:31","modified_gmt":"2024-10-18T06:47:31","slug":"a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara","status":"publish","type":"post","link":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/","title":{"rendered":"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77622\" class=\"elementor elementor-77622\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50b8454 elementor-section-boxed elementor-section-height-default elementor-section-height-default force-full-width-no\" data-id=\"50b8454\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0ab4675\" data-id=\"0ab4675\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fed170d elementor-widget elementor-widget-text-editor\" data-id=\"fed170d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>A Colonial Pipeline elleni k\u00f6zelm\u00faltbeli ransomware -t\u00e1mad\u00e1s a h\u00edrek szerint az egyik legjelent\u0151sebb kibert\u00e1mad\u00e1s az energiaszektorban, mely vil\u00e1gszerte meglepte a kiberbiztons\u00e1gi szak\u00e9rt\u0151ket.<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a03cd68 elementor-widget elementor-widget-text-editor\" data-id=\"a03cd68\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>2021. \u00e1prilis 29 -\u00e9n a DarkSide b\u0171nszervezet hackerei megt\u00e1madt\u00e1k a Colonial Pipeline v\u00e1llalatot, amely az Egyes\u00fclt \u00c1llamok legnagyobb \u00fczemanyag -vezet\u00e9k\u00e9t \u00fczemelteti, \u00e9s a keleti parton felhaszn\u00e1lt \u00fczemanyag k\u00f6r\u00fclbel\u00fcl 45% -\u00e1t sz\u00e1ll\u00edtja. Ennek eredm\u00e9nyek\u00e9nt a v\u00e1llalat ideiglenesen le\u00e1ll\u00edtotta teljes h\u00e1l\u00f3zat\u00e1t, ami s\u00falyos \u00fczemanyaghi\u00e1nyhoz \u00e9s a g\u00e1z\u00e1rak megugr\u00e1s\u00e1hoz vezetett. B\u00e1r a Colonial Pipeline a le\u00e1ll\u00e1st k\u00f6vet\u0151 k\u00e9t h\u00e9ten bel\u00fcl folytatta szolg\u00e1ltat\u00e1sait, a rosszindulat\u00fa szerepl\u0151k tov\u00e1bbra is t\u00f6nkretehetik a nemzet egyik legkritikusabb energiaforr\u00e1s\u00e1t, t\u00f6bb mint 50 milli\u00f3 lakost \u00e9rintettek, mik\u00f6zben 4,4 milli\u00f3 doll\u00e1r v\u00e1lts\u00e1gd\u00edjat kaptak cser\u00e9be (b\u00e1r a v\u00e1lts\u00e1gd\u00edj egy r\u00e9sze) az\u00f3ta <a href=\"https:\/\/www.nytimes.com\/2021\/06\/07\/us\/politics\/pipeline-attack.html\">lefoglalt\u00e1k a hat\u00f3s\u00e1gok<\/a>).<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-480a717 elementor-widget elementor-widget-text-editor\" data-id=\"480a717\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Az ehhez hasonl\u00f3 biztons\u00e1gi incidensek r\u00e1vil\u00e1g\u00edtanak arra, hogy a kibert\u00e1mad\u00e1sok \u00e9s jogs\u00e9rt\u00e9sek nemcsak a szervezetek h\u00edrnev\u00e9t \u00e9rik, hanem potenci\u00e1lisan megzavarhatj\u00e1k vagy ak\u00e1r meg is szak\u00edthatj\u00e1k a nyilv\u00e1noss\u00e1g sz\u00e1m\u00e1ra ny\u00fajtott szolg\u00e1ltat\u00e1sokat. Ez\u00e9rt itt az ideje, hogy a szervezetek, k\u00fcl\u00f6n\u00f6sen azok, amelyek a k\u00f6z \u00e9rdekeit szolg\u00e1lj\u00e1k \u00e9s fontos szerepet j\u00e1tszanak a gazdas\u00e1gban, szigor\u00edts\u00e1k kiberbiztons\u00e1gi programjukat.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9735d4 elementor-widget elementor-widget-text-editor\" data-id=\"a9735d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>A h\u00e1tt\u00e9r: Hogyan jutottak el a hackerek a v\u00e1llalat h\u00e1l\u00f3zat\u00e1hoz<\/h3>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8119580 elementor-widget elementor-widget-text-editor\" data-id=\"8119580\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Egy elhagyott, inakt\u00edv VPN -fi\u00f3k rossz jelszavas gyakorlatokkal p\u00e1rosulva, majd a Colonial Pipeline egyik alkalmazottja h\u00e1ts\u00f3 ajt\u00f3t \u00e1ll\u00edtott be a ransomware -t\u00e1mad\u00e1shoz. \u00c1prilis 29 -\u00e9n a hackerek bel\u00e9ptek a v\u00e1llalati h\u00e1l\u00f3zatba egy VPN -fi\u00f3kon kereszt\u00fcl, amely a t\u00e1mad\u00e1s idej\u00e9n m\u00e1r nem volt akt\u00edv. A fi\u00f3k jelszava el\u00e9rhet\u0151 volt a s\u00f6t\u00e9t weben a kisziv\u00e1rgott jelszavak sorozat\u00e1n bel\u00fcl, ami azt jelenti, hogy a Colonial alkalmazott ugyanazt a jelsz\u00f3t haszn\u00e1lhatta egy m\u00e1sik, kor\u00e1bban felt\u00f6rt fi\u00f3kn\u00e1l. Ami a hackerek sz\u00e1m\u00e1ra kedvez\u0151bb volt, hogy a fi\u00f3k szint\u00e9n nem haszn\u00e1lt t\u00f6bbt\u00e9nyez\u0151s hiteles\u00edt\u00e9st (MFA). Az eset t\u00f6bb mint egy h\u00e9tig \u00e9szrev\u00e9tlen maradt, eg\u00e9szen m\u00e1jus 7 -ig, amikor egy v\u00e1lts\u00e1gd\u00edj -feljegyz\u00e9s jelent meg a sz\u00e1m\u00edt\u00f3g\u00e9p k\u00e9perny\u0151j\u00e9n, kriptovalut\u00e1t k\u00f6vetelve. \u00dajabb egy h\u00e9tbe telt, am\u00edg a v\u00e1llalat meger\u0151s\u00edtette, hogy a cs\u0151vezet\u00e9k m\u0171k\u00f6d\u00e9si egys\u00e9ge nem s\u00e9r\u00fclt meg, \u00e9s a Colonial Pipeline m\u00e1jus 12 -\u00e9n folytatta szolg\u00e1ltat\u00e1sait.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b38ed0e elementor-widget elementor-widget-text-editor\" data-id=\"b38ed0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Ez azt is al\u00e1t\u00e1masztja, hogy amikor a legkritikusabb eszk\u00f6z\u00f6ket kezel\u0151 rendszerekr\u0151l van sz\u00f3, a szervezetek tov\u00e1bbra sem figyelnek az alapvet\u0151 biztons\u00e1gi szab\u00e1lyok betart\u00e1s\u00e1nak fontoss\u00e1g\u00e1ra, p\u00e9ld\u00e1ul az MFA elfogad\u00e1s\u00e1ra, az inakt\u00edv fi\u00f3kok azonos\u00edt\u00e1s\u00e1ra \u00e9s t\u00f6rl\u00e9s\u00e9re, valamint a robusztus hozz\u00e1f\u00e9r\u00e9s -szab\u00e1lyoz\u00e1sra. . Ami egyszer\u0171en megel\u0151zhet\u0151 lett volna az alapvet\u0151 vez\u00e9rl\u0151k\u00e9szlettel, kiberbiztons\u00e1gi katasztr\u00f3f\u00e1v\u00e1 n\u0151tte ki mag\u00e1t az aj\u00e1nlott biztons\u00e1gi legjobb gyakorlatok puszta figyelmen k\u00edv\u00fcl hagy\u00e1sa miatt.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5d3293 elementor-widget elementor-widget-text-editor\" data-id=\"e5d3293\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>Ahol a Colonial Pipeline biztons\u00e1gi rendszere meghib\u00e1sodott<\/h3>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-196408b elementor-widget elementor-widget-text-editor\" data-id=\"196408b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A t\u00e1vmunka n\u00f6vekv\u0151 n\u00e9pszer\u0171s\u00e9ge a glob\u00e1lis munkaer\u0151 k\u00f6r\u00e9ben a t\u00e1voli hozz\u00e1f\u00e9r\u00e9sen alapul\u00f3 t\u00e1mad\u00e1sok sz\u00e1m\u00e1nak jelent\u0151s megugr\u00e1s\u00e1hoz vezetett, \u00e9s a kiberb\u0171n\u00f6z\u0151k mindig a bizonytalan VPN-ekre \u00e9s a s\u00e9r\u00fcl\u00e9keny t\u00e1voli hozz\u00e1f\u00e9r\u00e9si utakra vad\u00e1sznak, hogy felt\u00f6rhess\u00e9k a kritikus infrastrukt\u00far\u00e1t. Egy alkalmazott vagy szervezet hanyag l\u00e9p\u00e9se v\u00e9g\u00fcl a potenci\u00e1lis, de gyakran elhanyagolt sebezhet\u0151s\u00e9gek kiakn\u00e1z\u00e1s\u00e1t eredm\u00e9nyezi.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f50444a elementor-widget elementor-widget-text-editor\" data-id=\"f50444a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A <a href=\"https:\/\/www.theverge.com\/2021\/5\/10\/22429433\/colonial-pipeline-cyber-security-ransomware-attack\">Colonial Pipeline felt\u00f6r\u00e9se katasztrof\u00e1lis<\/a> volt, de nagy val\u00f3sz\u00edn\u0171s\u00e9ggel megel\u0151zhet\u0151 is; a kritikus infrastrukt\u00fara v\u00e9delm\u00e9nek puszta hanyags\u00e1g\u00e1b\u00f3l k\u00f6vetkezett. \u00d6sszefoglalva, \u00edme a t\u00e1mad\u00e1s kataliz\u00e1tor\u00e1nak legfontosabb szempontjai:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-521e9b4 elementor-widget elementor-widget-text-editor\" data-id=\"521e9b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Ism\u00e9tl\u0151d\u0151 jelszavak haszn\u00e1lata \u00e9rz\u00e9keny fi\u00f3kok eset\u00e9n:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-440ec73 elementor-widget elementor-widget-text-editor\" data-id=\"440ec73\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Ha a szervezet felhatalmazta volna egyedi jelszavak haszn\u00e1lat\u00e1t a privilegiz\u00e1lt fi\u00f3kokhoz, akkor az alkalmazott nem v\u00e1lasztott volna kor\u00e1bban haszn\u00e1lt jelsz\u00f3t a v\u00e1llalati fi\u00f3kj\u00e1hoz. Ennek legegyszer\u0171bb m\u00f3dja egy jelsz\u00f3gener\u00e1tor haszn\u00e1lata, amely v\u00e9letlenszer\u0171en er\u0151s, \u00f6sszetett jelszavakat javasol.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ad275f elementor-widget elementor-widget-text-editor\" data-id=\"9ad275f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>\u00c1rva, elhagyott \u00e9s inakt\u00edv privilegiz\u00e1lt fi\u00f3kok:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae964cc elementor-widget elementor-widget-text-editor\" data-id=\"ae964cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A Colonial Pipeline informatikai h\u00e1l\u00f3zat\u00e1hoz val\u00f3 hozz\u00e1f\u00e9r\u00e9shez haszn\u00e1lt fi\u00f3k nem volt akt\u00edv a t\u00e1mad\u00e1s idej\u00e9n. Sok szervezet nem k\u00f6veti nyomon az inakt\u00edv felhaszn\u00e1l\u00f3kat, valamint azokat, amelyek a volt alkalmazottakhoz tartoznak. \u00c9rintetlenek maradnak mindaddig, am\u00edg v\u00e9glegesen t\u00f6rl\u00e9sre nem ker\u00fclnek egy szab\u00e1lys\u00e9rt\u00e9s vagy biztons\u00e1gi incidens ut\u00e1n.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bffc1e elementor-widget elementor-widget-text-editor\" data-id=\"2bffc1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Nincs MFA privilegiz\u00e1lt t\u00e1voli hozz\u00e1f\u00e9r\u00e9s\u0171 fi\u00f3kokhoz:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d43d1a9 elementor-widget elementor-widget-text-editor\" data-id=\"d43d1a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Az er\u0151s hiteles\u00edt\u00e9s hi\u00e1nya lehet\u0151v\u00e9 teszi a jogosulatlan, akad\u00e1lytalan hozz\u00e1f\u00e9r\u00e9st a kritikus rendszerekhez egyetlen hiteles\u00edt\u0151 adatokkal. A t\u00e1mad\u00f3 m\u00e9g a jogos jogosults\u00e1gok birtok\u00e1ban sem kapott volna hozz\u00e1f\u00e9r\u00e9st a rendszerhez, ha ism\u00e9t kih\u00edvt\u00e1k volna \u0151ket szem\u00e9lyazonoss\u00e1guk igazol\u00e1s\u00e1ra.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26ac678 elementor-widget elementor-widget-text-editor\" data-id=\"26ac678\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Ha nincs egys\u00e9ges h\u00e1l\u00f3zati hozz\u00e1f\u00e9r\u00e9si megold\u00e1s:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e204ce3 elementor-widget elementor-widget-text-editor\" data-id=\"e204ce3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A rossz hozz\u00e1f\u00e9r\u00e9s -vez\u00e9rl\u00e9s\u0171 VPN -eket most biztons\u00e1gosnak \u00e9s t\u00e1voli hozz\u00e1f\u00e9r\u00e9s szempontj\u00e1b\u00f3l megb\u00edzhatatlannak tekintik. Az olyan kritikus szervezeteknek, mint a Colonial Pipeline, sz\u00fcks\u00e9g\u00fck van egy k\u00f6zponti konzolra, amely egyes\u00edti a v\u00e1llalati h\u00e1l\u00f3zathoz val\u00f3 \u00f6sszes hozz\u00e1f\u00e9r\u00e9st-helysz\u00edni, valamint nyilv\u00e1nos \u00e9s priv\u00e1t felh\u0151k\u00f6n kereszt\u00fcl-szigor\u00fa hozz\u00e1f\u00e9r\u00e9s-szab\u00e1lyoz\u00e1ssal \u00e9s munkamenet-figyel\u00e9ssel.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-346a54c elementor-widget elementor-widget-text-editor\" data-id=\"346a54c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>A vesz\u00e9lyek megfelel\u0151 \u00e9szlel\u00e9s\u00e9nek \u00e9s megel\u0151z\u00e9s\u00e9nek hi\u00e1nya:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d410776 elementor-widget elementor-widget-text-editor\" data-id=\"d410776\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>M\u00e9g ha egy t\u00e1mad\u00f3nak siker\u00fcl is bejutnia a v\u00e1llalati h\u00e1l\u00f3zatba, az \u00e1tfog\u00f3 h\u00e1l\u00f3zatfigyel\u0151 eszk\u00f6z\u00f6k birtok\u00e1ban id\u0151ben riaszt\u00e1sok \u00e9s figyelmeztet\u00e9sek jelenhetnek meg az \u00e9rintett fel\u00fcgyeletekn\u00e9l, hogy azonnal fejezz\u00e9k be a gyan\u00fas munkameneteket. A behatol\u00e1sjelz\u0151 rendszerek, a behatol\u00e1smegel\u0151z\u0151 rendszerek, az AI- \u00e9s ML-alap\u00fa elemz\u0151eszk\u00f6z\u00f6k, valamint a SIEM-megold\u00e1sok folyamatosan figyelhetik a h\u00e1l\u00f3zatot, r\u00f6gz\u00edthetnek minden inform\u00e1ci\u00f3t a lehets\u00e9ges fenyeget\u00e9sekr\u0151l \u00e9s rosszindulat\u00fa programokr\u00f3l, \u00e9s jelenthetik azokat a rendszergazd\u00e1knak a megel\u0151z\u0151 int\u00e9zked\u00e9sek \u00e9rdek\u00e9ben. Itt az ideje, hogy a modern szervezetek fejlett technol\u00f3gi\u00e1kat alkalmazzanak, hogy \u00e9rdemi betekint\u00e9st nyerjenek \u00e9s megf\u00e9kezz\u00e9k a kibert\u00e1mad\u00e1sokat.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-673b699 elementor-widget elementor-widget-text-editor\" data-id=\"673b699\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>K\u00e9ptelens\u00e9g azonnal nyomon k\u00f6vetni minden tev\u00e9kenys\u00e9get:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e82b3ae elementor-widget elementor-widget-text-editor\" data-id=\"e82b3ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>T\u00f6bb mint egy h\u00e9tbe telt, am\u00edg a nyomoz\u00f3k megvizsg\u00e1lt\u00e1k a teljes h\u00e1l\u00f3zatot a tov\u00e1bbi sebezhet\u0151s\u00e9gek tekintet\u00e9ben. A t\u00e1mad\u00e1s sor\u00e1n lezajlott esem\u00e9nyek \u00e1tfog\u00f3 ellen\u0151rz\u00e9si nyomvonala, valamint a manipul\u00e1ci\u00f3biztos \u00fcl\u00e9sfelv\u00e9telek felgyors\u00edthatt\u00e1k volna az ellen\u0151rz\u00e9si folyamatot.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ede173 elementor-widget elementor-widget-text-editor\" data-id=\"1ede173\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Rossz h\u00e1l\u00f3zati szegment\u00e1ci\u00f3:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e39621 elementor-widget elementor-widget-text-editor\" data-id=\"2e39621\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A t\u00e1mad\u00e1s a Colonial Pipeline informatikai rendszereit c\u00e9lozta meg, de mivel ezek kapcsol\u00f3dtak az operat\u00edv egys\u00e9ghez, a v\u00e1llalatnak azonnal le kellett \u00e1ll\u00edtania az eg\u00e9sz vezet\u00e9ket. A Colonial Pipeline kudarca volt abban, hogy szegment\u00e1lva tartsa h\u00e1l\u00f3zat\u00e1t &#8211; hogy ne lehessen k\u00f6nnyen \u00e1tl\u00e9pni az egyik v\u00e1llalati r\u00e9szlegr\u0151l a m\u00e1sikra &#8211; kulcsfontoss\u00e1g\u00fa volt a t\u00e1mad\u00e1s siker\u00e9hez, kiemelve a megfelel\u0151 kiberhigi\u00e9nia hi\u00e1ny\u00e1t.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a53e56 elementor-widget elementor-widget-text-editor\" data-id=\"0a53e56\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>Hogyan \u00e9p\u00edts\u00fcnk ki egy holisztikus biztons\u00e1gi rendszert a ransomware t\u00e1mad\u00e1sok kiz\u00e1r\u00e1s\u00e1hoz<\/h3>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d76610 elementor-widget elementor-widget-text-editor\" data-id=\"6d76610\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A ransomware t\u00e1mad\u00e1sokkal szembeni teljes v\u00e9delem el\u00e9r\u00e9s\u00e9hez a szervezeteknek t\u00f6bb v\u00e9delmi r\u00e9tegre van sz\u00fcks\u00e9g\u00fck. Az \u00e9rett, rugalmas kiberbiztons\u00e1gi rendszer egyes\u00edti az informatikai biztons\u00e1gi megold\u00e1sok sz\u00e9les sk\u00e1l\u00e1j\u00e1t, amelyek integr\u00e1ltan m\u0171k\u00f6dnek a fenyeget\u00e9sek ellen. \u00cdme n\u00e9h\u00e1ny szak\u00e9rt\u0151i tipp, hogy fokozza a v\u00e9delmet a ransomware ellen.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-731e0d6 elementor-widget elementor-widget-text-editor\" data-id=\"731e0d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>V\u00e9dje meg e -mail platformj\u00e1t, \u00e9s oktassa az alkalmazottakat az adathal\u00e1szatr\u00f3l:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba5d38 elementor-widget elementor-widget-text-editor\" data-id=\"7ba5d38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A legt\u00f6bb ransomware -t\u00e1mad\u00e1s forr\u00e1sa az e -mail, amelyet a kiberb\u0171n\u00f6z\u0151k gyakran kihaszn\u00e1lnak arra, hogy hiteles\u00edt\u0151 adatokat hamis\u00edtsanak a t\u00f6rv\u00e9nytelen h\u00e1l\u00f3zati hozz\u00e1f\u00e9r\u00e9s\u00e9rt, vagy k\u00f6zvetlen\u00fcl terjessz\u00e9k a rosszindulat\u00fa programokat. Adjon hozz\u00e1 fejlett adathal\u00e1sz \u00e9s k\u00e1rtev\u0151 -v\u00e9delmi k\u00e9pess\u00e9geket a levelez\u0151szerverhez a bej\u00f6v\u0151 e -mailek szkennel\u00e9s\u00e9hez \u00e9s elk\u00fcl\u00f6n\u00edt\u00e9s\u00e9hez, a rendellenes mell\u00e9kletek blokkol\u00e1s\u00e1hoz \u00e9s a bej\u00f6v\u0151 adathal\u00e1sz e -mailek elleni v\u00e9delemhez.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9ccb32 elementor-widget elementor-widget-text-editor\" data-id=\"e9ccb32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Oktassa az alkalmazottakat az alapvet\u0151 biztons\u00e1gi int\u00e9zked\u00e9sek betart\u00e1s\u00e1nak fontoss\u00e1g\u00e1ra, p\u00e9ld\u00e1ul ne tegye k\u00f6zz\u00e9 szem\u00e9lyes adatait e -mail, telefonh\u00edv\u00e1s vagy sz\u00f6veges \u00fczenet megv\u00e1laszol\u00e1sakor; tudat\u00e1ban annak, hogy a csal\u00e1rd e -mailek \u00e9s mell\u00e9kletek hogyan n\u00e9znek ki; \u00e9s felveszi a kapcsolatot az informatikai r\u00e9szleggel, miut\u00e1n gyan\u00fas h\u00edv\u00e1sokat vagy e -maileket kapott.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bd2ae6 elementor-widget elementor-widget-text-editor\" data-id=\"8bd2ae6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Fektessen be v\u00edruskeres\u0151 szoftverekbe \u00e9s t\u0171zfalakba:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95110c7 elementor-widget elementor-widget-text-editor\" data-id=\"95110c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Telep\u00edtsen v\u00edruskeres\u0151 szoftvert minden eszk\u00f6zre, \u00e9s rendszeresen friss\u00edtse azokat biztons\u00e1gi jav\u00edt\u00e1sokkal. Telep\u00edtsen egy t\u0171zfalat is, \u00e9s \u00e1ll\u00edtsa be \u00fagy, hogy csak a sz\u00fcks\u00e9ges portokra \u00e9s IP -c\u00edmekre korl\u00e1tozza a h\u00e1l\u00f3zat forgalm\u00e1t.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-659f0b1 elementor-widget elementor-widget-text-editor\" data-id=\"659f0b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Rendszeresen jav\u00edtsa rendszereit:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1733143 elementor-widget elementor-widget-text-editor\" data-id=\"1733143\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Fontos, hogy minden rendszert naprak\u00e9szen tartsunk a jav\u00edt\u00e1sokon, hogy megv\u00e9dj\u00fck a ransomware-t\u0151l, mivel a t\u00e1mad\u00f3k gyakran kihaszn\u00e1lj\u00e1k a biztons\u00e1gi r\u00e9seket \u00e9s hib\u00e1kat a szoftverekben vagy az oper\u00e1ci\u00f3s rendszerekben a rosszindulat\u00fa programok terjeszt\u00e9se ut\u00e1n.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee31b4 elementor-widget elementor-widget-text-editor\" data-id=\"4ee31b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Rendszeresen v\u00e9gezzen kock\u00e1zat\u00e9rt\u00e9kel\u00e9st:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb937a4 elementor-widget elementor-widget-text-editor\" data-id=\"eb937a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Id\u0151nk\u00e9nt \u00e9rt\u00e9kelje a biztons\u00e1gi kock\u00e1zatokat, hogy proakt\u00edv m\u00f3don cs\u00f6kkentse a lehets\u00e9ges kock\u00e1zatokat az\u00e1ltal, hogy azonos\u00edtja a biztons\u00e1gi r\u00e9seket \u00e9s hi\u00e1nyoss\u00e1gokat a teljes v\u00e1llalati h\u00e1l\u00f3zatban.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0272b7a elementor-widget elementor-widget-text-editor\" data-id=\"0272b7a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Rendszeresen k\u00e9sz\u00edtsen biztons\u00e1gi m\u00e1solatot rendszereir\u0151l:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7171a4d elementor-widget elementor-widget-text-editor\" data-id=\"7171a4d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Ismerje meg az alapokat: A v\u00e1lts\u00e1gd\u00edjak elker\u00fcl\u00e9s\u00e9nek kulcsa az, hogy megb\u00edzhat\u00f3 biztons\u00e1gi ment\u00e9seket k\u00e9sz\u00edtsen. Rendszeresen k\u00e9sz\u00edtsen biztons\u00e1gi m\u00e1solatot az adatokr\u00f3l &#8211; helyben \u00e9s a felh\u0151ben &#8211; er\u0151s titkos\u00edt\u00e1ssal \u00e9s ellen\u0151rz\u00f6tt hozz\u00e1f\u00e9r\u00e9ssel, hogy a v\u00e1llalati adatok biztons\u00e1gban legyenek. A biztons\u00e1gi szak\u00e9rt\u0151k azt javasolj\u00e1k, hogy a v\u00e1llalat adatainak legal\u00e1bb h\u00e1rom p\u00e9ld\u00e1ny\u00e1t \u0151rizze meg k\u00fcl\u00f6nb\u00f6z\u0151 eszk\u00f6z\u00f6k\u00f6n vagy adathordoz\u00f3n, \u00e9s az egyiket tartsa teljesen offline \u00e1llapotban, fizikailag is elhat\u00e1rolva.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccadc87 elementor-widget elementor-widget-text-editor\" data-id=\"ccadc87\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Fektessen be egy er\u0151s hozz\u00e1f\u00e9r\u00e9s -kezel\u00e9si megold\u00e1sba:<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5113d04 elementor-widget elementor-widget-text-editor\" data-id=\"5113d04\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>B\u00e1r igaz, hogy a t\u00e1mad\u00f3k manaps\u00e1g kifinomult m\u00f3dszereket \u00e9s eszk\u00f6z\u00f6ket alkalmaznak, gyakrabban a ny\u00edlt adminisztr\u00e1tori jogosults\u00e1gok \u00e9s a s\u00e9r\u00fclt hiteles\u00edt\u0151 adatok teszik lehet\u0151v\u00e9 sz\u00e1mukra a kezdeti hozz\u00e1f\u00e9r\u00e9st a kritikus infrastrukt\u00far\u00e1hoz. M\u00e9g a k\u00f6zelm\u00faltbeli floridai v\u00edztiszt\u00edt\u00f3 telep elleni t\u00e1mad\u00e1shoz is csup\u00e1n egy v\u00e9dtelen jelsz\u00f3ra volt sz\u00fcks\u00e9g ahhoz, hogy az azonos\u00edtatlan elk\u00f6vet\u0151 t\u00e1volr\u00f3l el\u00e9rhesse \u00e9s kezelhesse a vez\u00e9rl\u0151rendszereket. Ennek ellen\u00e9re kulcsfontoss\u00e1g\u00fa, hogy a szervezetek biztos\u00edts\u00e1k a teljes privilegiz\u00e1lt fi\u00f3kkezel\u00e9st, kezelj\u00e9k a kritikus rendszerekhez val\u00f3 hozz\u00e1f\u00e9r\u00e9st, \u00e9s val\u00f3s id\u0151ben figyelj\u00e9k a privilegiz\u00e1lt t\u00e1voli munkameneteket, \u00e1tfog\u00f3 ellen\u0151rz\u00e9ssel \u00e9s jelent\u00e9sekkel. R\u00f6viden, egy robusztus hozz\u00e1f\u00e9r\u00e9s -kezel\u00e9s (PAM) megold\u00e1s bizonyulhat az ide\u00e1lis els\u0151 v\u00e9delmi vonalnak a v\u00e1llalkoz\u00e1sok sz\u00e1m\u00e1ra.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9a00ad elementor-widget elementor-widget-text-editor\" data-id=\"d9a00ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A ManageEngine <a href=\"https:\/\/i.mwtsolutions.eu\/hu\/termekek\/security-it\/pam360\/\">PAM360<\/a> egy v\u00e1llalati szint\u0171 PAM megold\u00e1s, amely hat\u00e9kony privilegiz\u00e1lt hozz\u00e1f\u00e9r\u00e9s-ir\u00e1ny\u00edt\u00e1ssal, z\u00f6kken\u0151mentes munkafolyamat-automatiz\u00e1l\u00e1ssal \u00e9s fejlett elemz\u00e9sekkel v\u00e9di a v\u00e1llalatokat a sz\u00e1m\u00edt\u00f3g\u00e9pes b\u0171n\u00f6z\u00e9sekt\u0151l. A PAM360 k\u00f6nnyen integr\u00e1lhat\u00f3 k\u00fcl\u00f6nf\u00e9le informatikai biztons\u00e1gi eszk\u00f6z\u00f6kkel, mint p\u00e9ld\u00e1ul a SIEM, AI- \u00e9s ML-alap\u00fa fenyeget\u00e9sanalitika, valamint a sebezhet\u0151s\u00e9gi szkennerek, amelyek lehet\u0151v\u00e9 teszik a rendszergazd\u00e1k sz\u00e1m\u00e1ra, hogy teljes k\u00f6r\u0171 ellen\u0151rz\u00e9st \u00e9rjenek el a v\u00e1llalati h\u00e1l\u00f3zat minden kiv\u00e1lts\u00e1gos tev\u00e9kenys\u00e9ge felett.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48b11b0 elementor-widget elementor-widget-text-editor\" data-id=\"48b11b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Forr\u00e1s: <a href=\"https:\/\/blogs.manageengine.com\/corporate\/manageengine\/pam360\/2021\/06\/15\/the-colonial-pipeline-ransomware-attack-lessons-for-cybersecurity-teams.html\">https:\/\/blogs.manageengine.com\/corporate\/manageengine\/pam360\/2021\/06\/15\/the-colonial-pipeline-ransomware-attack-lessons-for-cybersecurity-teams.html\u00a0<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A Colonial Pipeline elleni k\u00f6zelm\u00faltbeli ransomware -t\u00e1mad\u00e1s a h\u00edrek szerint az egyik legjelent\u0151sebb kibert\u00e1mad\u00e1s az energiaszektorban, mely vil\u00e1gszerte meglepte a kiberbiztons\u00e1gi szak\u00e9rt\u0151ket. 2021. \u00e1prilis 29 -\u00e9n a DarkSide b\u0171nszervezet hackerei megt\u00e1madt\u00e1k a Colonial Pipeline v\u00e1llalatot, amely az Egyes\u00fclt \u00c1llamok legnagyobb \u00fczemanyag -vezet\u00e9k\u00e9t \u00fczemelteti, \u00e9s a keleti parton felhaszn\u00e1lt \u00fczemanyag k\u00f6r\u00fclbel\u00fcl 45% -\u00e1t sz\u00e1ll\u00edtja. Ennek eredm\u00e9nyek\u00e9nt [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":77624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[275,299],"tags":[435,452,455],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra - MWT Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra - MWT Solutions\" \/>\n<meta property=\"og:description\" content=\"A Colonial Pipeline elleni k\u00f6zelm\u00faltbeli ransomware -t\u00e1mad\u00e1s a h\u00edrek szerint az egyik legjelent\u0151sebb kibert\u00e1mad\u00e1s az energiaszektorban, mely vil\u00e1gszerte meglepte a kiberbiztons\u00e1gi szak\u00e9rt\u0151ket. 2021. \u00e1prilis 29 -\u00e9n a DarkSide b\u0171nszervezet hackerei megt\u00e1madt\u00e1k a Colonial Pipeline v\u00e1llalatot, amely az Egyes\u00fclt \u00c1llamok legnagyobb \u00fczemanyag -vezet\u00e9k\u00e9t \u00fczemelteti, \u00e9s a keleti parton felhaszn\u00e1lt \u00fczemanyag k\u00f6r\u00fclbel\u00fcl 45% -\u00e1t sz\u00e1ll\u00edtja. Ennek eredm\u00e9nyek\u00e9nt [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\" \/>\n<meta property=\"og:site_name\" content=\"MWT Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-19T08:41:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-18T06:47:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/08\/Colonial-Pipeline-ransomware-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1153\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marketing@mwtsolutions.eu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing@mwtsolutions.eu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\"},\"author\":{\"name\":\"marketing@mwtsolutions.eu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\"},\"headline\":\"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra\",\"datePublished\":\"2021-08-19T08:41:16+00:00\",\"dateModified\":\"2024-10-18T06:47:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\"},\"wordCount\":2251,\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"keywords\":[\"ITSecurity\",\"Manage Engine\",\"PAM360\"],\"articleSection\":[\"Cikk\",\"H\u00edrek\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\",\"name\":\"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra - MWT Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\"},\"datePublished\":\"2021-08-19T08:41:16+00:00\",\"dateModified\":\"2024-10-18T06:47:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i.mwtsolutions.eu\/hu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"name\":\"MWT Solutions\",\"description\":\"Wy\u0142\u0105czny dystrybutor ManageEngine w Polsce\",\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\",\"name\":\"MWT Solutions\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"contentUrl\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"width\":2825,\"height\":850,\"caption\":\"MWT Solutions\"},\"image\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/mwt-solutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\",\"name\":\"marketing@mwtsolutions.eu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"caption\":\"marketing@mwtsolutions.eu\"},\"url\":\"https:\/\/i.mwtsolutions.eu\/hu\/author\/marketingmwtsolutions-eu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra - MWT Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/","og_locale":"hu_HU","og_type":"article","og_title":"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra - MWT Solutions","og_description":"A Colonial Pipeline elleni k\u00f6zelm\u00faltbeli ransomware -t\u00e1mad\u00e1s a h\u00edrek szerint az egyik legjelent\u0151sebb kibert\u00e1mad\u00e1s az energiaszektorban, mely vil\u00e1gszerte meglepte a kiberbiztons\u00e1gi szak\u00e9rt\u0151ket. 2021. \u00e1prilis 29 -\u00e9n a DarkSide b\u0171nszervezet hackerei megt\u00e1madt\u00e1k a Colonial Pipeline v\u00e1llalatot, amely az Egyes\u00fclt \u00c1llamok legnagyobb \u00fczemanyag -vezet\u00e9k\u00e9t \u00fczemelteti, \u00e9s a keleti parton felhaszn\u00e1lt \u00fczemanyag k\u00f6r\u00fclbel\u00fcl 45% -\u00e1t sz\u00e1ll\u00edtja. Ennek eredm\u00e9nyek\u00e9nt [&hellip;]","og_url":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/","og_site_name":"MWT Solutions","article_published_time":"2021-08-19T08:41:16+00:00","article_modified_time":"2024-10-18T06:47:31+00:00","og_image":[{"width":1153,"height":604,"url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/08\/Colonial-Pipeline-ransomware-attack.png","type":"image\/png"}],"author":"marketing@mwtsolutions.eu","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"marketing@mwtsolutions.eu","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/#article","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/"},"author":{"name":"marketing@mwtsolutions.eu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe"},"headline":"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra","datePublished":"2021-08-19T08:41:16+00:00","dateModified":"2024-10-18T06:47:31+00:00","mainEntityOfPage":{"@id":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/"},"wordCount":2251,"publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"keywords":["ITSecurity","Manage Engine","PAM360"],"articleSection":["Cikk","H\u00edrek"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/","url":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/","name":"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra - MWT Solutions","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/#website"},"datePublished":"2021-08-19T08:41:16+00:00","dateModified":"2024-10-18T06:47:31+00:00","breadcrumb":{"@id":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/i.mwtsolutions.eu\/hu\/cikk\/a-colonial-pipeline-ransomware-tamadas-leckek-a-kiberbiztonsagi-csapatok-szamara\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i.mwtsolutions.eu\/hu\/"},{"@type":"ListItem","position":2,"name":"A Colonial Pipeline ransomware t\u00e1mad\u00e1s: leck\u00e9k a kiberbiztons\u00e1gi csapatok sz\u00e1m\u00e1ra"}]},{"@type":"WebSite","@id":"https:\/\/i.mwtsolutions.eu\/#website","url":"https:\/\/i.mwtsolutions.eu\/","name":"MWT Solutions","description":"Wy\u0142\u0105czny dystrybutor ManageEngine w Polsce","publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/i.mwtsolutions.eu\/#organization","name":"MWT Solutions","url":"https:\/\/i.mwtsolutions.eu\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/","url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","contentUrl":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","width":2825,"height":850,"caption":"MWT Solutions"},"image":{"@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/mwt-solutions"]},{"@type":"Person","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe","name":"marketing@mwtsolutions.eu","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","caption":"marketing@mwtsolutions.eu"},"url":"https:\/\/i.mwtsolutions.eu\/hu\/author\/marketingmwtsolutions-eu\/"}]}},"_links":{"self":[{"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/posts\/77622"}],"collection":[{"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/comments?post=77622"}],"version-history":[{"count":9,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/posts\/77622\/revisions"}],"predecessor-version":[{"id":77641,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/posts\/77622\/revisions\/77641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/media\/77624"}],"wp:attachment":[{"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/media?parent=77622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/categories?post=77622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/hu\/wp-json\/wp\/v2\/tags?post=77622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}