{"id":3421,"date":"2022-04-12T20:38:37","date_gmt":"2022-04-12T19:38:37","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=3421"},"modified":"2023-01-14T23:34:32","modified_gmt":"2023-01-14T22:34:32","slug":"business-email-compromise-bec","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/04\/12\/business-email-compromise-bec\/","title":{"rendered":"Business email compromise (BEC)"},"content":{"rendered":"<p data-original-attrs=\"{&quot;style&quot;:&quot;text-justify: inter-ideograph;&quot;}\"><span style=\"font-size: 14pt;\"><strong><em>Business email compromise<\/em><\/strong><strong> (<em>BEC<\/em>) &#8211; <\/strong>kompromitovanje poslovne elektronske po\u0161te je vrsta napad gdje su mete klju\u010dne osobe unutar organizacije. Cilj je da se opona\u0161anjem osoba koje odobravaju isplate, prevari primalac i misle\u0107i da postupa po nalogu nadre\u0111enog izvr\u0161i isplatu na ra\u010dun napada\u010da. Obi\u010dno napada\u010d dobija pristup elektronskoj po\u0161ti osobe koja odobravaju isplate kori\u0161tenjem ve\u0107 uba\u010denog zlonamjernog softvera ili preko <em><a href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/23\/spear-phishing\/\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a><\/em> napada. Kada dobije pristup, napada\u010d \u010deka i posmatra svu aktivnost elektronske po\u0161te jedan du\u017ei period vremena, kako bi nau\u010dio procese, procedure i na\u010dine komunikacije. Stvarni napad po\u010dinje slanjem la\u017ene elektronske po\u0161te sa kompromitovanog naloga osobe koja odobravaju isplate sa podacima da se uplata izvr\u0161i nekome sa kim se redovno odvijaju finansijske transakcije. Navedena elektronska po\u0161ta je u tonu velike va\u017enosti i hitnosti sa zahtjevom da se sredstva prebace na neki novi transakcijski ra\u010dun. Na kraju novac obi\u010dno zavr\u0161i kod napada\u010da.<\/span><\/p>\n<div id=\"attachment_3422\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3422\" class=\"size-full wp-image-3422\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/bec-v2-copy.jpg\" alt=\"BEC\" width=\"1024\" height=\"298\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/bec-v2-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/bec-v2-copy-300x87.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/bec-v2-copy-768x224.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/bec-v2-copy-18x5.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3422\" class=\"wp-caption-text\"><em>Business email compromise<\/em> (<em>BEC<\/em>)<\/p><\/div>\n<p><span style=\"font-size: x-large;\" data-keep-original-tag=\"false\" data-original-attrs=\"{&quot;style&quot;:&quot;&quot;}\"><span style=\"font-family: inherit;\" data-keep-original-tag=\"false\" data-original-attrs=\"{&quot;style&quot;:&quot;&quot;}\"><span data-keep-original-tag=\"false\">\u00a0<\/span><\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Business email compromise (BEC) &#8211; kompromitovanje poslovne elektronske po\u0161te je vrsta napad gdje su mete klju\u010dne osobe unutar organizacije. Cilj je da se opona\u0161anjem osoba koje odobravaju isplate, prevari primalac i misle\u0107i da postupa&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3422,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[112,111],"class_list":["post-3421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leksikon","tag-bec","tag-business-email-compromise"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3421"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3421\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3422"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}