{"id":16408,"date":"2025-10-27T10:56:54","date_gmt":"2025-10-27T10:56:54","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=16408"},"modified":"2025-10-27T10:58:12","modified_gmt":"2025-10-27T10:58:12","slug":"funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/","title":{"rendered":"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57-1024x536.jpg\" alt=\"Bezpe\u010dnos\u0165 iPhone n\u00e1h\u013eadov\u00fd obr\u00e1zok ESET\" class=\"wp-image-16279\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57-1024x536.jpg 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57-300x157.jpg 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57-768x402.jpg 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57-370x194.jpg 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57-760x398.jpg 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/07\/hlavny-banner-1200x628_2025_57.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-d4eab1b7119b5fd3657f6293b61bea39\">Tak\u00e9to hrozby maj\u00fa mnoho pod\u00f4b a&nbsp;neust\u00e1le sa vyv\u00edjaj\u00fa&nbsp;\u2013&nbsp;od&nbsp;napodoben\u00edn aplik\u00e1ci\u00ed na&nbsp;v\u00fdmenu spr\u00e1v cez n\u00e1stroje na&nbsp;zjednodu\u0161enie vytv\u00e1rania marketingov\u00fdch podvodov a\u017e po&nbsp;malv\u00e9r vyu\u017e\u00edvaj\u00faci popularitu hern\u00fdch aplik\u00e1ci\u00ed.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-666a9d5058e16b64ed4deaa0d31d4cde\">V&nbsp;nasleduj\u00facom \u010dl\u00e1nku sa dozviete o&nbsp;ned\u00e1vnych \u0161kodliv\u00fdch mobiln\u00fdch kampaniach objaven\u00fdch v\u00fdskumn\u00edkmi spolo\u010dnosti ESET, ktor\u00e9 sa zameriavaj\u00fa na&nbsp;opera\u010dn\u00fd syst\u00e9m Android, a&nbsp;o&nbsp;tom, ako tak\u00e9to hrozby vyzeraj\u00fa.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-24d3d964da48a5c7e01f8851f61e3689\">Ak chcete chr\u00e1ni\u0165 svoje zariadenie pred podobn\u00fdmi \u00fatokmi, vysk\u00fa\u0161ajte <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.eset.ems2.gp&amp;referrer=utm_source%3Dchristmas%2520blog%26utm_medium%3Darticle\">ESET Mobile Security<\/a>.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">\u0160pion\u00e1\u017ena kampa\u0148 StrongPity<\/h1>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-79e803883b61cdbcd7dd7253c30f42a6\">Za\u010diatkom roka&nbsp;2023 v\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/2023\/01\/10\/strongpity-espionage-campaign-targeting-android-users\/\">uverejnili \u010dl\u00e1nok<\/a> o&nbsp;malv\u00e9rovej kampani StrongPity, ktor\u00e1 \u0161\u00edrila trojanizovan\u00fa verziu ve\u013emi popul\u00e1rnej aplik\u00e1cie Telegramu pre&nbsp;Android. Bola prezentovan\u00e1 ako jedin\u00e1 aplik\u00e1cia slu\u017eby na&nbsp;video\u010dety s&nbsp;n\u00e1zvom Shagle&nbsp;\u2013&nbsp;t\u00e1 v\u0161ak nem\u00e1 \u017eiadnu ofici\u00e1lnu aplik\u00e1ciu. T\u00e1to napodobenina bola n\u00e1sledne \u0161\u00edren\u00e1 z&nbsp;podvodnej webovej str\u00e1nky vyd\u00e1vaj\u00facej sa za&nbsp;Shagle.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"565\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-2.png\" alt=\"\" class=\"wp-image-16410\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-2.png 533w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-2-283x300.png 283w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-2-370x392.png 370w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><strong>Obr\u00e1zok 1.<\/strong> Porovnanie legit\u00edmnej webovej str\u00e1nky v\u013eavo a\u00a0napodobeniny vpravo<\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"1200\" height=\"515\" src=\"https:\/\/www.youtube.com\/embed\/qTAv8IMkDjw?si=d8R5QvU92nNqRRYG\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-94d364c058005f5621976265502d60eb\">Zlo\u010dinci vyu\u017eili popularitu slu\u017eby Shagle, ktor\u00e1 m\u00e1 2,5\u00a0mili\u00f3na akt\u00edvnych pou\u017e\u00edvate\u013eov, na\u00a0\u0161\u00edrenie tohto malv\u00e9ru a\u00a0jeho rozmanit\u00fdch spyv\u00e9rov\u00fdch funkci\u00ed\u00a0\u2013\u00a0vr\u00e1tane 11\u00a0z\u00a0nich ur\u010den\u00fdch na\u00a0nahr\u00e1vanie hovorov, zhroma\u017e\u010fovanie SMS spr\u00e1v, protokolov hovorov \u010di zoznamov kontaktov. Ak obe\u0165 udel\u00ed \u0161kodlivej aplik\u00e1cii StrongPity pr\u00edstup k\u00a0<a href=\"https:\/\/developer.android.com\/guide\/topics\/ui\/accessibility\/service\">slu\u017eb\u00e1m zjednodu\u0161enia ovl\u00e1dania<\/a> na\u00a0svojom zariaden\u00ed, aplik\u00e1cia m\u00f4\u017ee monitorova\u0165 aj prich\u00e1dzaj\u00face upozornenia a\u00a0zachyt\u00e1va\u0165 komunik\u00e1ciu zo\u00a017\u00a0aplik\u00e1ci\u00ed, ako s\u00fa Viber, Skype, Gmail, Messenger alebo Tinder.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-572017dcd86751d8000708d35aead247\">Kampa\u0148 skupiny Transparent Tribe<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-c80503dde7822cb88abbae818c80a3c3\">V&nbsp;marci&nbsp;2023 v\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/07\/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials\/\">uverejnili \u010dl\u00e1nok<\/a> o&nbsp;kybernetickej \u0161pion\u00e1\u017enej kampani, ktor\u00e1 \u0161\u00edrila backdoory CapraRAT prostredn\u00edctvom trojanizovan\u00fdch a&nbsp;\u00fadajne bezpe\u010dn\u00fdch aplik\u00e1ci\u00ed na&nbsp;v\u00fdmenu spr\u00e1v pre&nbsp;Android; aplik\u00e1cie tie\u017e pristupovali k&nbsp;citliv\u00fdm inform\u00e1ci\u00e1m a&nbsp;odstra\u0148ovali ich. Obete sa pravdepodobne stali ter\u010dom romantick\u00e9ho podvodu, ke\u010f ich \u00fato\u010dn\u00edci najsk\u00f4r kontaktovali na&nbsp;jednej platforme a&nbsp;potom ich presved\u010dili, aby pre\u0161li na&nbsp;\u201ebezpe\u010dnej\u0161ie\u201c aplik\u00e1cie, ktor\u00e9 si mali nain\u0161talova\u0165.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"335\" height=\"708\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-3.png\" alt=\"\" class=\"wp-image-16411\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-3.png 335w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-3-142x300.png 142w\" sizes=\"auto, (max-width: 335px) 100vw, 335px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-c5114cb13d79f109fb08bc56c9143b1c\"><strong>Obr\u00e1zok 2.<\/strong> Distribu\u010dn\u00e1 webov\u00e1 str\u00e1nka backdoorov CapraRAT, ktor\u00e1 sa vyd\u00e1va za\u00a0MeetUp<\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"1200\" height=\"515\" src=\"https:\/\/www.youtube.com\/embed\/pgkVnScSvfA?si=Lw4zFDjQKUf-iS57\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-d6a62d1fb0ba14f7bf0f6e9ee0515385\">Po&nbsp;prihl\u00e1sen\u00ed obete do&nbsp;aplik\u00e1cie za\u010dne CapraRAT komunikova\u0165 so&nbsp;serverom, ktor\u00fd prev\u00e1dzkuje kybernetick\u00fd zlo\u010dinec, a&nbsp;odosiela\u0165 na\u0148 z\u00e1kladn\u00e9 inform\u00e1cie o&nbsp;zariaden\u00ed, pri\u010dom \u010dak\u00e1 na&nbsp;pr\u00edkazy, ktor\u00e9 m\u00e1 spusti\u0165. Na&nbsp;z\u00e1klade t\u00fdchto pr\u00edkazov dok\u00e1\u017ee CapraRAT kradn\u00fa\u0165 protokoly hovorov, zoznamy kontaktov, SMS spr\u00e1vy, nahran\u00e9 hovory \u010di nahran\u00e9 okolit\u00e9 zvuky a&nbsp;dokonca vytv\u00e1ra\u0165 sn\u00edmky obrazovky alebo fotografie.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-48bb5c1875dd63b7c2619392669cd300\">M\u00f4\u017ee tie\u017e dost\u00e1va\u0165 pr\u00edkazy na&nbsp;s\u0165ahovanie s\u00faborov, sp\u00fa\u0161\u0165a\u0165 ak\u00e9ko\u013evek nain\u0161talovan\u00e9 aplik\u00e1cie, ukon\u010di\u0165 spusten\u00e9 aplik\u00e1cie, uskuto\u010d\u0148ova\u0165 hovory, odosiela\u0165 SMS spr\u00e1vy, zachyt\u00e1va\u0165 prijat\u00e9 SMS spr\u00e1vy, ako aj s\u0165ahova\u0165 aktualiz\u00e1cie a&nbsp;\u017eiada\u0165 obe\u0165 o&nbsp;ich in\u0161tal\u00e1ciu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-dc86e1dceeb194554dfcdfc1519d6f47\">(Ne)s\u00fakromn\u00e9 vymie\u0148anie spr\u00e1v<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-8e041e4077cfe28108ae75b5ddb85658\">Za\u010diatkom roka&nbsp;2023 v\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/16\/not-so-private-messaging-trojanized-whatsapp-telegram-cryptocurrency-wallets\/\">objavili desiatky napodoben\u00edn<\/a> webov\u00fdch str\u00e1nok Telegramu a&nbsp;WhatsAppu zameran\u00fdch najm\u00e4 na&nbsp;pou\u017e\u00edvate\u013eov syst\u00e9mov Android a&nbsp;Windows s&nbsp;trojanizovan\u00fdmi verziami aplik\u00e1ci\u00ed na&nbsp;okam\u017eit\u00fa v\u00fdmenu spr\u00e1v.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"386\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-4.png\" alt=\"\" class=\"wp-image-16412\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-4.png 945w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-4-300x123.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-4-768x314.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-4-370x151.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-4-760x310.png 760w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-4f7d558bbf416c5235c323012b9f652f\"><strong>Obr\u00e1zok 3.<\/strong> Diagram distrib\u00facie trojanizovan\u00fdch aplik\u00e1ci\u00ed na\u00a0v\u00fdmenu spr\u00e1v<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-346a4836fcde348eeff57344e7e4099b\">V\u00e4\u010d\u0161ina \u0161kodliv\u00fdch aplik\u00e1ci\u00ed identifikovan\u00fdch v\u00fdskumn\u00edkmi spolo\u010dnosti ESET s\u00fa clippery, teda typ malv\u00e9ru, ktor\u00fd kradne alebo upravuje obsah schr\u00e1nky. Niektor\u00e9 z&nbsp;t\u00fdchto aplik\u00e1ci\u00ed pou\u017e\u00edvaj\u00fa optick\u00e9 rozpozn\u00e1vanie znakov (OCR) na&nbsp;odha\u013eovanie textu zo&nbsp;sn\u00edmok obrazovky ulo\u017een\u00fdch v&nbsp;napadnut\u00fdch zariadeniach. V\u0161etky sa sna\u017eili z\u00edska\u0165 finan\u010dn\u00e9 prostriedky obet\u00ed v&nbsp;kryptomen\u00e1ch, pri\u010dom viacer\u00e9 z&nbsp;nich sa zamerali na&nbsp;kryptomenov\u00e9 pe\u0148a\u017eenky.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-a1fcaa80c454e5e69f9f0c02d4780005\">Spyv\u00e9r Android Gravity RAT <\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-9509414f9fd1a79da6e4f728b84772f5\">V&nbsp;j\u00fani&nbsp;2023 v\u00fdskumn\u00edci spolo\u010dnosti ESET publikovali v\u00fdskum na&nbsp;t\u00e9mu <a href=\"https:\/\/www.welivesecurity.com\/2023\/06\/15\/android-gravityrat-goes-after-whatsapp-backups\/\">spyv\u00e9ru Android GravityRAT<\/a>. Tento malv\u00e9r bol distribuovan\u00fd prostredn\u00edctvom \u0161kodliv\u00fdch, ale funk\u010dn\u00fdch aplik\u00e1ci\u00ed na&nbsp;v\u00fdmenu spr\u00e1v BingeChat a&nbsp;Chatico, ktor\u00e9 boli zalo\u017een\u00e9 na&nbsp;aplik\u00e1cii OMEMO Instant Messenger.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"372\" height=\"785\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-5.png\" alt=\"\" class=\"wp-image-16413\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-5.png 372w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-5-142x300.png 142w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-5-370x781.png 370w\" sizes=\"auto, (max-width: 372px) 100vw, 372px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><strong>Obr\u00e1zok 4.<\/strong> Distribu\u010dn\u00e1 webov\u00e1 str\u00e1nka \u0161kodlivej aplik\u00e1cie na\u00a0v\u00fdmenu spr\u00e1v BingeChat<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-a032994542ad009231f069f1aed16552\">Tento spyv\u00e9r dok\u00e1\u017ee kradn\u00fa\u0165 protokoly hovorov, zoznamy kontaktov, SMS&nbsp;spr\u00e1vy, polohu zariadenia, z\u00e1kladn\u00e9 inform\u00e1cie o&nbsp;zariaden\u00ed a&nbsp;s\u00fabory so&nbsp;\u0161pecifick\u00fdmi pr\u00edponami ako jpg, PNG, txt, pdf a&nbsp;podobne. GravityRAT m\u00f4\u017ee tie\u017e pristupova\u0165 k&nbsp;z\u00e1loh\u00e1m aplik\u00e1cie WhatsApp a&nbsp;odcudzi\u0165 ich, ako aj prij\u00edma\u0165 pr\u00edkazy na&nbsp;vymaz\u00e1vanie s\u00faborov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-a559cb069e64c533afc36d22ff79fabe\">SpinOk <\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-32ee076680a8656f9969450c31c5dbe4\">V&nbsp;druhej polovici roka&nbsp;2023&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2023\/\">telemetria spolo\u010dnosti ESET zaznamenala<\/a> 89&nbsp;% n\u00e1rast v&nbsp;po\u010dte detekci\u00ed malv\u00e9ru na&nbsp;Androide, a&nbsp;to najm\u00e4 z&nbsp;d\u00f4vodu pou\u017e\u00edvania marketingov\u00e9ho SDK n\u00e1stroja, ktor\u00fd ESET identifikoval ako spyv\u00e9r SpinOk. Tento n\u00e1stroj bol pon\u00fakan\u00fd ako hern\u00e1 platforma a&nbsp;vyu\u017eit\u00fd v&nbsp;mnoh\u00fdch leg\u00e1lnych aplik\u00e1ci\u00e1ch pre&nbsp;Android vr\u00e1tane t\u00fdch, ktor\u00e9 s\u00fa dostupn\u00e9 na&nbsp;ofici\u00e1lnych trhovisk\u00e1ch s&nbsp;aplik\u00e1ciami.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"435\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-6.png\" alt=\"\" class=\"wp-image-16414\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-6.png 945w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-6-300x138.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-6-768x354.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-6-370x170.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-6-760x350.png 760w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-6c777225d0579709bad7c847228d156b\"><strong>Obr\u00e1zok 5. <\/strong>Trend de<em>tekcie spyv\u00e9ru SpinOk na\u00a0Androide v\u00a0druhom polroku\u00a02023, sedemd\u0148ov\u00fd k\u013azav\u00fd priemer<\/em><\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-40247d229e2128005b650b52cc70c457\">Po&nbsp;nain\u0161talovan\u00ed aplik\u00e1cie so&nbsp;SpinOK tento n\u00e1stroj funguje ako spyv\u00e9r, ktor\u00fd sa prip\u00e1ja k&nbsp;C&amp;C serveru \u00fato\u010dn\u00edka a&nbsp;kradne zo&nbsp;zariadenia cel\u00fd rad \u00fadajov vr\u00e1tane potenci\u00e1lne citliv\u00e9ho obsahu schr\u00e1nky (kr\u00e1tkodob\u00e9ho \u00falo\u017eiska).<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-5846c4132a8436298279466ee3f4f619\">Telekopye<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-8af326d423ae86d505deff1560ecac08\">V&nbsp;roku&nbsp;2023 <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/telekopye-hunting-mammoths-using-telegram-bot\/\">v\u00fdskumn\u00edci spolo\u010dnosti ESET objavili zdrojov\u00fd k\u00f3d<\/a> s\u00faboru n\u00e1strojov, ktor\u00fd pom\u00e1ha <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/telekopye-chamber-neanderthals-secrets\/\">dobre organizovan\u00fdm skupin\u00e1m<\/a> podvodn\u00edkov vykon\u00e1va\u0165 podvody s&nbsp;online n\u00e1kupmi bez toho, aby boli obzvl\u00e1\u0161\u0165 zbehl\u00ed v&nbsp;IT sf\u00e9re. S\u00fabor n\u00e1strojov, ktor\u00fd v\u00fdskumn\u00edci spolo\u010dnosti ESET nazvali Telekopye, vytv\u00e1ra phishingov\u00e9 webov\u00e9 str\u00e1nky z&nbsp;preddefinovan\u00fdch \u0161abl\u00f3n, generuje podvodn\u00e9 e-maily a&nbsp;SMS spr\u00e1vy a&nbsp;odosiela ich vybran\u00fdm pou\u017e\u00edvate\u013eom.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"655\" height=\"576\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-7.png\" alt=\"\" class=\"wp-image-16415\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-7.png 655w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-7-300x264.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-7-370x325.png 370w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-d04c65226c6b3ea528de08771f739819\"><strong>Obr\u00e1zok 6.<\/strong> Vygenerovan\u00e1 falo\u0161n\u00e1 sn\u00edmka obrazovky (\u0161abl\u00f3na v\u013eavo, \u0161abl\u00f3na vyplnen\u00e1 vzorov\u00fdm textom vpravo)<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-fc8a1a2f9a7518c724d7c50760b36b73\">\u00dato\u010dn\u00edci si najprv n\u00e1jdu svoje obete a&nbsp;potom sa sna\u017eia z\u00edska\u0165 ich d\u00f4veru, aby naleteli na&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/telekopye-chamber-neanderthals-secrets\/\">podvod s&nbsp;n\u00e1kupom, predajom alebo vr\u00e1ten\u00edm pe\u0148az\u00ed<\/a>. Ke\u010f si \u00fato\u010dn\u00edci myslia, \u017ee im obe\u0165 dostato\u010dne d\u00f4veruje, pomocou Telekopye vytvoria podvodn\u00fa webov\u00fa str\u00e1nku z&nbsp;vopred pripravenej \u0161abl\u00f3ny a&nbsp;potom jej po\u0161l\u00fa URL adresu. \u00dato\u010dn\u00edci napr\u00edklad nal\u00e1kaj\u00fa obe\u0165 na&nbsp;k\u00fapu neexistuj\u00faceho tovaru a&nbsp;potom jej po\u0161l\u00fa odkaz na&nbsp;phishingov\u00fa webov\u00fa str\u00e1nku, ktor\u00e1 sa podob\u00e1 platobnej str\u00e1nke legit\u00edmneho internetov\u00e9ho trhoviska, na&nbsp;ktorej je tento tovar pred\u00e1van\u00fd.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3e362e06951509f91350c2b2168f5dba\">Ke\u010f obe\u0165 na&nbsp;tejto str\u00e1nke zad\u00e1 \u00fadaje o&nbsp;karte, \u00fato\u010dn\u00edci ich pou\u017eij\u00fa na&nbsp;kr\u00e1de\u017e pe\u0148az\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-2a06be9051344e794946f5b9a3d91f14\">Kamran <\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-7e812ee47f60d1b49e6ceb68f3759edd\">Koncom roka&nbsp;2023 v\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/unlucky-kamran-android-malware-spying-urdu-speaking-residents-gilgit-baltistan\/\">identifikovali mo\u017en\u00fd \u00fatok uplat\u0148uj\u00faci techniku Watering Hole<\/a> na&nbsp;region\u00e1lnej spravodajskej str\u00e1nke, ktor\u00e1 prin\u00e1\u0161a spr\u00e1vy o&nbsp;spornom regi\u00f3ne Gilgit-Baltistan spravovanom Pakistanom. Po&nbsp;otvoren\u00ed na&nbsp;mobilnom zariaden\u00ed pon\u00fakala urdsk\u00e1 verzia webovej str\u00e1nky Hunza News \u010ditate\u013eom mo\u017enos\u0165 stiahnu\u0165 si priamo z&nbsp;webovej str\u00e1nky aplik\u00e1ciu Hunza News pre&nbsp;syst\u00e9m Android, ktor\u00e1 v\u0161ak obsahovala \u0161kodliv\u00e9 \u0161pion\u00e1\u017ene funkcie.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-1f8f668afe4f1e44314a16da8a794108\">Spyv\u00e9r Kamran zobrazoval obsah webovej str\u00e1nky Hunza News s&nbsp;vlastn\u00fdm \u0161kodliv\u00fdm k\u00f3dom. Po&nbsp;spusten\u00ed Kamran vyzve pou\u017e\u00edvate\u013ea, aby udelil povolenia na&nbsp;pr\u00edstup k&nbsp;r\u00f4znym \u00fadajom ulo\u017een\u00fdm v&nbsp;zariaden\u00ed obete. N\u00e1sledne dok\u00e1\u017ee automaticky zhroma\u017e\u010fova\u0165 citliv\u00e9 \u00fadaje pou\u017e\u00edvate\u013ea vr\u00e1tane SMS spr\u00e1v, zoznamu kontaktov, protokolov hovorov, udalost\u00ed kalend\u00e1ra, polohy zariadenia, zoznamu nain\u0161talovan\u00fdch aplik\u00e1ci\u00ed, prijat\u00fdch SMS spr\u00e1v, inform\u00e1ci\u00ed o&nbsp;zariaden\u00ed a&nbsp;obr\u00e1zkov.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"771\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-8.png\" alt=\"\" class=\"wp-image-16416\" style=\"width:734px;height:auto\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-8.png 734w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-8-286x300.png 286w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-8-370x389.png 370w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-a01f08568f63f303b4a2436c173dda94\"><strong>Obr\u00e1zok 7.<\/strong> Anglick\u00e1 verzia (v\u013eavo) a\u00a0urdsk\u00e1 verzia (vpravo) Hunza News na\u00a0mobilnom zariaden\u00ed<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-94ae5b951d768114d85933b85d4d451f\">EvilVideo<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-d0b84ea2dad63c64718f5f55faa28b82\">V\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/cursed-tapes-exploiting-evilvideo-vulnerability-telegram-android\/\">objavili zero\u2011day exploit<\/a> zameran\u00fd na&nbsp;Telegram pre&nbsp;Android, ktor\u00fd bol v&nbsp;pr\u00edspevku na&nbsp;neleg\u00e1lnom f\u00f3re zo&nbsp;6.&nbsp;j\u00fana&nbsp;2024 pon\u00faknut\u00fd na&nbsp;predaj za&nbsp;bli\u017e\u0161ie ne\u0161pecifikovan\u00fa cenu. Prostredn\u00edctvom exploitu na&nbsp;zneu\u017eitie softv\u00e9rovej zranite\u013enosti, ktor\u00fd v\u00fdskumn\u00edci nazvali EvilVideo, mohli \u00fato\u010dn\u00edci zdie\u013ea\u0165 \u0161kodliv\u00fd obsah na&nbsp;Androide cez kan\u00e1ly, skupiny a&nbsp;\u010dety na&nbsp;Telegrame v&nbsp;podobe multimedi\u00e1lnych s\u00faborov. Tento exploit funguje len na&nbsp;Telegrame pre Android vo&nbsp;verzi\u00e1ch 10.14.4 a&nbsp;star\u0161\u00edch. Po&nbsp;tom, \u010do v\u00fdskumn\u00edci spolo\u010dnosti ESET oslovili Telegram, probl\u00e9m bol odstr\u00e1nen\u00fd.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3c7c27f224f09e7effabe862aee75026\">Exploit sa pravdepodobne opiera o&nbsp;to, \u017ee \u00fato\u010dn\u00edk dok\u00e1\u017ee vytvori\u0165 \u0161kodliv\u00fd obsah, ktor\u00fd zobraz\u00ed Android aplik\u00e1ciu ako multimedi\u00e1lny s\u00fabor. Po&nbsp;zdie\u013ean\u00ed v&nbsp;\u010dete sa obsah zobraz\u00ed ako 30-sekundov\u00e9 video. Ke\u010f\u017ee medi\u00e1lne s\u00fabory prijat\u00e9 cez Telegram s\u00fa predvolene nastaven\u00e9 na&nbsp;automatick\u00e9 s\u0165ahovanie, znamen\u00e1 to, \u017ee pou\u017e\u00edvatelia, ktor\u00ed maj\u00fa t\u00fato mo\u017enos\u0165 zapnut\u00fa, si po&nbsp;otvoren\u00ed danej konverz\u00e1cie ihne\u010f stiahnu \u0161kodliv\u00fd obsah. Toto nastavenie je mo\u017en\u00e9 vypn\u00fa\u0165 manu\u00e1lne; v&nbsp;takom pr\u00edpade sa d\u00e1 obsah stiahnu\u0165 \u0165uknut\u00edm na&nbsp;tla\u010didlo s\u0165ahovania v&nbsp;\u013eavom hornom rohu zdie\u013ean\u00e9ho \u201evidea\u201c.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-94765aa683e82eac147b5f07c8efadd9\">Hrozby zameran\u00e9 na\u00a0hr\u00e1\u010dov hry Hamster Kombat <\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-e4fc85e652a0c66f5c7ee900e3289412\">V&nbsp;polovici roka&nbsp;2024 v\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/tap-estry-threats-targeting-hamster-kombat-players\/\">objavili a&nbsp;analyzovali<\/a> dve hrozby zneu\u017e\u00edvaj\u00face \u00faspech hry Hamster Kombat, klikacej hry na&nbsp;Telegrame, v&nbsp;ktorej hr\u00e1\u010di z\u00edskavaj\u00fa fikt\u00edvnu menu plnen\u00edm jednoduch\u00fdch \u00faloh a&nbsp;podnetov na&nbsp;ka\u017edodenn\u00e9 prihlasovanie sa do&nbsp;hry.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-519200a5959322372b8a24fe17c3b2fd\">Prvou hrozbou je falo\u0161n\u00e1, nefunk\u010dn\u00e1 a&nbsp;\u0161kodliv\u00e1 aplik\u00e1cia pripom\u00ednaj\u00faca aplik\u00e1ciu Hamster Kombat, ktor\u00e1 obsahuje spyv\u00e9r Ratel Android schopn\u00fd kradn\u00fa\u0165 notifik\u00e1cie a&nbsp;odosiela\u0165 SMS spr\u00e1vy. Prev\u00e1dzkovatelia malv\u00e9ru vyu\u017e\u00edvaj\u00fa t\u00fato funkciu na&nbsp;platenie za&nbsp;predplatn\u00e9 a&nbsp;slu\u017eby z&nbsp;prostriedkov obete bez toho, aby si to v\u0161imla.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"747\" height=\"791\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-9.png\" alt=\"\" class=\"wp-image-16417\" style=\"width:752px;height:auto\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-9.png 747w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-9-283x300.png 283w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-9-370x392.png 370w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-d83b29f0f3d8db8cf6b896116a2717cb\"><strong>Obr\u00e1zok 8.<\/strong> \u0160kodliv\u00e9 \u017eiadosti o\u00a0pr\u00edstup pre\u00a0hru Hamster Kombat<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-840659bdc83f71e90b2bb4a2cab7e7de\">Druhou hrozbou je s\u00fabor falo\u0161n\u00fdch webov\u00fdch str\u00e1nok, ktor\u00e9 imituj\u00fa obchody s&nbsp;aplik\u00e1ciami a&nbsp;tvrdia, \u017ee je na&nbsp;nich k&nbsp;dispoz\u00edcii na&nbsp;stiahnutie hra Hamster Kombat. \u0164uknut\u00edm na&nbsp;tla\u010didl\u00e1 in\u0161tal\u00e1cie \u010di otvorenia sa v\u0161ak pou\u017e\u00edvate\u013e dostane len k&nbsp;ne\u017eelan\u00fdm reklam\u00e1m.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing v\u00a0PWA aplik\u00e1ci\u00e1ch<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-346f40e8d3b0bedbdb173133cf522aa0\">V&nbsp;polovici roka&nbsp;2024 v\u00fdskumn\u00edci spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/be-careful-what-you-pwish-for-phishing-in-pwa-applications\/\">uverejnili \u010dl\u00e1nok<\/a> o&nbsp;nezvy\u010dajnom type phishingovej kampane zameranej na&nbsp;mobiln\u00fdch pou\u017e\u00edvate\u013eov, ktor\u00ed s\u00fa klientmi zn\u00e1mej \u010deskej banky. T\u00e1to technika zneu\u017e\u00edva progres\u00edvne webov\u00e9 aplik\u00e1cie (PWA), ktor\u00e9 umo\u017e\u0148uj\u00fa in\u0161tal\u00e1ciu phishingovej aplik\u00e1cie z&nbsp;webovej lokality tretej strany bez toho, aby pou\u017e\u00edvate\u013e musel povoli\u0165 in\u0161tal\u00e1ciu aplik\u00e1ci\u00ed tret\u00edch str\u00e1n.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-6db16996c3c970c6b80c88101de045bd\">Prvotn\u00e9 zdroje tejto kampane zah\u0155\u0148ali automatizovan\u00e9 hlasov\u00e9 hovory, SMS spr\u00e1vy a&nbsp;\u0161kodliv\u00e9 reklamy na&nbsp;soci\u00e1lnych sie\u0165ach, ktor\u00e9 nab\u00e1dali obete, aby otvorili podvodn\u00fa URL adresu ved\u00facu na&nbsp;falo\u0161n\u00fa str\u00e1nku obchodu Google Play s&nbsp;danou bankovou aplik\u00e1ciou alebo priamo na&nbsp;napodobeninu webovej str\u00e1nky aplik\u00e1cie.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"647\" height=\"599\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-10.png\" alt=\"\" class=\"wp-image-16418\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-10.png 647w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-10-300x278.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-10-370x343.png 370w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-abfb99412f36f648acc68ed5a6070879\">Obr\u00e1zok 9. Pr\u00edklad \u0161kodlivej reklamy pou\u017e\u00edvanej v\u00a0t\u00fdchto kampaniach<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-c36d276bf0f2e77a19d7c00efee58bc5\">Po&nbsp;n\u00e1v\u0161teve podvodn\u00fdch webov\u00fdch str\u00e1nok sa pou\u017e\u00edvate\u013eom Androidu zobrazila automaticky otv\u00e1ran\u00e1 reklama, ktor\u00e1 ich l\u00e1kala na&nbsp;in\u0161tal\u00e1ciu \u0161kodlivej aplik\u00e1cie pripom\u00ednaj\u00facej legit\u00edmny bankov\u00fd softv\u00e9r. Aplik\u00e1cia bola v&nbsp;skuto\u010dnosti vytvoren\u00e1 pomocou technol\u00f3gie WebAPK umo\u017e\u0148uj\u00facej tvorbu webov\u00fdch aplik\u00e1ci\u00ed, ktor\u00e9 mo\u017eno in\u0161talova\u0165 do&nbsp;Android zariaden\u00ed ako legit\u00edmny a&nbsp;nat\u00edvny softv\u00e9r. \u013dudia si tak in\u0161talovali aplik\u00e1cie PWA na&nbsp;domovsk\u00fa obrazovku Android zariaden\u00ed bez toho, aby pou\u017eili obchod Google Play.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-1f9370c5be77d057a2b8d21bef1d1796\">NGate<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-a2aeff84613ed78071a58ed659492edd\">Po\u010das monitorovania <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/be-careful-what-you-pwish-for-phishing-in-pwa-applications\/\">\u0161kodlivej kampane<\/a> zneu\u017e\u00edvaj\u00facej aplik\u00e1ciu PWA na&nbsp;kr\u00e1de\u017e prihlasovac\u00edch \u00fadajov do&nbsp;online bankovn\u00edctva od&nbsp;cie\u013eov v&nbsp;\u010cesku v\u00fdskumn\u00edci spolo\u010dnosti ESET odhalili nov\u00fd \u00fatok, ktor\u00fd s\u00favis\u00ed s&nbsp;vy\u0161\u0161ie spom\u00ednanou kampa\u0148ou. V&nbsp;auguste&nbsp;2024 spolo\u010dnos\u0165 ESET <a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/research\/eset-research-discovers-ngate-android-malware-which-relays-nfc-traffic-to-steal-victims-cash-from-atms-1\/\">uverejnila pr\u00edspevok<\/a> o&nbsp;rovnakej zlo\u010dineckej skupine, ktor\u00e1 zdokonalila svoje techniky tak, aby dok\u00e1zala vykon\u00e1va\u0165 neopr\u00e1vnen\u00e9 v\u00fdbery z&nbsp;bankomatov so&nbsp;zameran\u00edm na&nbsp;bankov\u00e9 \u00fa\u010dty klientov troch \u010desk\u00fdch b\u00e1nk.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"515\" height=\"428\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-11.png\" alt=\"\" class=\"wp-image-16419\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-11.png 515w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-11-300x249.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-11-370x307.png 370w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-89782db91fca1f4f0be18fe06e22fbf3\"><strong>Obr\u00e1zok 10.<\/strong> Architekt\u00fara NFCGate (zdroj: https:\/\/github.com\/nfcgate\/nfcgate\/wiki)<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-c2bd8081f0070d00d35dd69e81b9c092\">Kybernetick\u00ed zlo\u010dinci najprv oklamali obete, \u017ee komunikuj\u00fa so&nbsp;svojou bankou, a&nbsp;potom ich naviedli na&nbsp;stiahnutie a&nbsp;in\u0161tal\u00e1ciu falo\u0161nej bankovej aplik\u00e1cie s&nbsp;jedine\u010dn\u00fdm malv\u00e9rom, ktor\u00fd ESET pomenoval NGate. \u0160kodliv\u00fd softv\u00e9r potom pomocou NGate klonoval \u00fadaje z&nbsp;platobn\u00fdch kariet obet\u00ed zneu\u017eit\u00edm technol\u00f3gie NFC a&nbsp;odosielal ich do&nbsp;zariadenia \u00fato\u010dn\u00edka. Zariadenie n\u00e1sledne dok\u00e1zalo napodobni\u0165 p\u00f4vodn\u00fa kartu a&nbsp;vybera\u0165 peniaze z&nbsp;bankomatu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-45ea7e9a53ab4f786d091552cc174e30\">Nomani<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-e5de69882139ed612f4fea75150c2f89\">V&nbsp;roku&nbsp;2024 soci\u00e1lne siete za\u017eili z\u00e1plavu nov\u00fdch podvodn\u00fdch rekl\u00e1m propaguj\u00facich \u201etajn\u00e9\u201c investi\u010dn\u00e9 pr\u00edle\u017eitosti, z\u00e1zra\u010dn\u00e9 v\u00fd\u017eivov\u00e9 doplnky \u010di pr\u00e1vnu pomoc.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3a35a815cb188a5283b9243ac11b6243\">Aby tieto ponuky vyzerali d\u00f4veryhodne, \u00fato\u010dn\u00edci zneu\u017e\u00edvaj\u00fa zna\u010dky miestnych a&nbsp;svetov\u00fdch firiem alebo pou\u017e\u00edvaj\u00fa deepfake vide\u00e1 generovan\u00e9 umelou inteligenciou, v&nbsp;ktor\u00fdch vystupuj\u00fa zn\u00e1me osobnosti, \u010do m\u00e1 zdanlivo zaru\u010dova\u0165 legit\u00edmnos\u0165 inzerovan\u00fdch produktov. Hlavn\u00fdm cie\u013eom podvodn\u00edkov je navies\u0165 obete na&nbsp;phishingov\u00e9 webov\u00e9 str\u00e1nky a&nbsp;formul\u00e1re, ktor\u00e9 zhroma\u017e\u010fuj\u00fa ich osobn\u00e9 \u00fadaje.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-396d58ed216ae5c3964a8f91054079ed\">Ghost Tap<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-0b685e87a27f7a89b6cd72f5a855787c\">Kr\u00e1tko po&nbsp;tom, \u010do v\u00fdskumn\u00edci spolo\u010dnosti ESET objavili <a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/research\/eset-research-discovers-ngate-android-malware-which-relays-nfc-traffic-to-steal-victims-cash-from-atms-1\/\">nov\u00fa met\u00f3du \u00fatoku&nbsp;\u2013&nbsp;NGate<\/a> kradn\u00faci \u00fadaje z&nbsp;platobn\u00fdch kariet obet\u00ed zneu\u017eit\u00edm technol\u00f3gie NFC, kybernetick\u00ed zlo\u010dinci t\u00fato techniku vylep\u0161ili.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-1fee5b3130aeea8737407d85877fdba6\">Podvodn\u00edci pomocou r\u00f4znych phishingov\u00fdch trikov presvied\u010daj\u00fa obete, aby im prezradili \u00fadaje o&nbsp;platobnej karte spolu s&nbsp;jednorazov\u00fdm k\u00f3dom na&nbsp;pridanie karty do&nbsp;digit\u00e1lnej pe\u0148a\u017eenky. Potom \u00fato\u010dn\u00edci zaregistruj\u00fa ukradnut\u00e9 \u00fadaje do&nbsp;vlastn\u00fdch pe\u0148a\u017eeniek Apple alebo Google, prenes\u00fa tieto na\u010d\u00edtan\u00e9 pe\u0148a\u017eenky do&nbsp;in\u00fdch zariaden\u00ed a&nbsp;m\u00f4\u017eu vykon\u00e1va\u0165 podvodn\u00e9 bezkontaktn\u00e9 platby kdeko\u013evek na&nbsp;svete.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"398\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-12.png\" alt=\"\" class=\"wp-image-16420\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-12.png 732w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-12-300x163.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/10\/image-12-370x201.png 370w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-text-dark-color has-text-color has-link-color wp-elements-28624406f7425b6344c088a8a4b78cd5\">Obr\u00e1zok 11. Geografick\u00e1 distrib\u00facia malv\u00e9ru a\u00a0podvodov s\u00favisiacich s\u00a0NFC na\u00a0syst\u00e9me Android v\u00a0prvom polroku\u00a02025<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-2ba49d3baea19b389b2627f7167980bc\">Z\u00e1ver<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-53ca8dd90d2c88861250fc42935e7b33\">Z&nbsp;t\u00fdchto pr\u00edpadov vypl\u00fdvaj\u00fa dve hlavn\u00e9 my\u0161lienky:<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-e41aa0d5c0fda3387493e0480e3165b3\">Po&nbsp;prv\u00e9, niektor\u00e9 z&nbsp;t\u00fdchto kybernetick\u00fdch \u00fatokov a&nbsp;podvodov mo\u017eno odhali\u0165 hne\u010f, ak im pou\u017e\u00edvatelia venuj\u00fa dostato\u010dn\u00fa pozornos\u0165 a&nbsp;maj\u00fa ur\u010dit\u00e9 znalosti o&nbsp;zabezpe\u010den\u00ed. \u010cl\u00e1nky o&nbsp;v\u00fdskumoch, ako napr\u00edklad tie, ktor\u00e9 sme spomenuli, m\u00f4\u017eu sl\u00fa\u017ei\u0165 ako cenn\u00e9 zdroje. Pou\u017e\u00edvatelia Androidu, ktor\u00ed sa pravidelne informuj\u00fa o&nbsp;nov\u00fdch malv\u00e9rov\u00fdch hrozb\u00e1ch a&nbsp;podvodoch, zvy\u0161uj\u00fa svoje \u0161ance na&nbsp;odhalenie riz\u00edk a&nbsp;m\u00f4\u017eu sa lep\u0161ie chr\u00e1ni\u0165 pred bud\u00facimi online hrozbami.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-c0ea5924d5528a651f52e8a7780fb6c4\">Po&nbsp;druh\u00e9, niektor\u00e9 \u0161kodliv\u00e9 kampane s\u00fa sofistikovanej\u0161ie a&nbsp;je n\u00e1ro\u010dn\u00e9 ich odhali\u0165. Kybernetick\u00ed zlo\u010dinci sa navy\u0161e \u010dasto zameriavaj\u00fa na&nbsp;zranite\u013en\u00e9 skupiny vr\u00e1tane det\u00ed a&nbsp;star\u0161\u00edch \u013eud\u00ed, ktor\u00ed nemusia by\u0165 \u00faplne pripraven\u00ed \u010deli\u0165 tak\u00fdmto nebezpe\u010denstv\u00e1m. V&nbsp;ka\u017edom pr\u00edpade je v\u017edy dobr\u00e9 ma\u0165 spo\u013eahliv\u00e9 bezpe\u010dnostn\u00e9 rie\u0161enie, ako je napr\u00edklad <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.eset.ems2.gp&amp;hl=sk\">ESET Mobile Security<\/a>, ktor\u00e9 dok\u00e1\u017ee tieto hrozby odhali\u0165 a&nbsp;neutralizova\u0165&nbsp;\u2013&nbsp;ide\u00e1lne sk\u00f4r, ne\u017e d\u00f4jde k&nbsp;po\u0161kodeniu zariadenia alebo \u00fadajov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-41ea03d1c2e484231b347f85d10f88cf\">Zosta\u0148te v\u00a0bezpe\u010d\u00ed s\u00a0ESET Mobile Security<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-1f0344a74f4b94dd4765a6b0b8776ab2\">ESET Mobile Security dok\u00e1\u017ee pou\u017e\u00edvate\u013eov ochr\u00e1ni\u0165 pred \u0161irok\u00fdm spektrom mobiln\u00fdch hrozieb vr\u00e1tane \u0161kodliv\u00fdch aplik\u00e1ci\u00ed (z&nbsp;ofici\u00e1lnych obchodov s&nbsp;aplik\u00e1ciami, ako aj od&nbsp;tret\u00edch str\u00e1n), in\u00e9ho malv\u00e9ru, skryt\u00fdch hrozieb v&nbsp;s\u00faboroch, phishingov\u00fdch odkazov a&nbsp;fyzickej kr\u00e1de\u017ee.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-036e3c72cd1d1614bedc1bfac8493f7a\">ESET Mobile Security blokuje:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-a487e48398e984a221c8e97009ca0eff\">\n<li><strong>Tr\u00f3jske kone<\/strong>, ktor\u00e9 sa maskuj\u00fa za\u00a0ne\u0161kodn\u00e9 aplik\u00e1cie.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-93015b669c2a89cbc8c9ed131eb9c399\">\n<li><strong>Spyv\u00e9r<\/strong>, ktor\u00fdtajne monitoruje va\u0161u aktivitu alebo polohu.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-5627070b3e12fad6c47464448bc7b2d5\">\n<li><strong>Ransomv\u00e9r<\/strong>, ktor\u00fd blokuje va\u0161e s\u00fabory a\u00a0vy\u017eaduje od\u00a0v\u00e1s platbu.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-9c07aaebdb11fda62cddea3d95b29632\">\n<li><strong>Adv\u00e9r<\/strong>, ktor\u00fd v\u00e1s otravuje dotierav\u00fdmi vyskakovac\u00edmi oknami.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-0b56f69cb3e71378a440ef79f0186afe\">\n<li><strong>Phishing, smishing a\u00a0podvodn\u00e9 odkazy poch\u00e1dzaj\u00face z\u00a0upozornen\u00ed a\u00a0aplik\u00e1ci\u00ed soci\u00e1lnych siet\u00ed<\/strong>, ktor\u00e9 sa sna\u017eia ukradn\u00fa\u0165 va\u0161e citliv\u00e9 \u00fadaje.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-05cb466a7c99966ab7b7b2e99501b8da\">\n<li><strong>Potenci\u00e1lne nechcen\u00e9 aplik\u00e1cie (PUA)<\/strong>, ktor\u00e9 m\u00f4\u017eu ohrozi\u0165 va\u0161e s\u00fakromie alebo v\u00fdkon zariadenia.<\/li>\n<\/ul>\n\n\n\n<p>A&nbsp;je toho viac\u2026<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-ebfd8c8beaa8dd6fca3c6a8b180496d2\">\n<li><strong>Funkcia Ochrana platieb<\/strong><\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-abc1301a16e4262c9dc3f28a9c0ded5b\">T\u00e1to funkcia dod\u00e1va aplik\u00e1ci\u00e1m, ako je Google Pay alebo aplik\u00e1cie mobiln\u00e9ho bankovn\u00edctva, \u010fal\u0161iu \u00farove\u0148 zabezpe\u010denia. Aktivovan\u00e1 Ochrana platieb zabra\u0148uje \u0161kodliv\u00fdm aplik\u00e1ci\u00e1m \u010d\u00edta\u0165, upravova\u0165 alebo prekr\u00fdva\u0165 obsah chr\u00e1nen\u00fdch aplik\u00e1ci\u00ed, \u010d\u00edm napom\u00e1ha zabr\u00e1ni\u0165 pokusom o&nbsp;phishing a&nbsp;kr\u00e1de\u017e \u00fadajov.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tak\u00e9to hrozby maj\u00fa mnoho pod\u00f4b a&nbsp;neust\u00e1le sa vyv\u00edjaj\u00fa&nbsp;\u2013&nbsp;od&nbsp;napodoben\u00edn aplik\u00e1ci\u00ed na&nbsp;v\u00fdmenu spr\u00e1v cez n\u00e1stroje na&nbsp;zjednodu\u0161enie vytv\u00e1rania marketingov\u00fdch podvodov a\u017e po&nbsp;malv\u00e9r vyu\u017e\u00edvaj\u00faci popularitu hern\u00fdch aplik\u00e1ci\u00ed. V&nbsp;nasleduj\u00facom \u010dl\u00e1nku sa dozviete o&nbsp;ned\u00e1vnych \u0161kodliv\u00fdch mobiln\u00fdch kampaniach objaven\u00fdch v\u00fdskumn\u00edkmi spolo\u010dnosti ESET, ktor\u00e9 sa zameriavaj\u00fa na&nbsp;opera\u010dn\u00fd syst\u00e9m Android, a&nbsp;o&nbsp;tom, ako tak\u00e9to hrozby vyzeraj\u00fa. Ak chcete chr\u00e1ni\u0165 svoje zariadenie pred podobn\u00fdmi \u00fatokmi, vysk\u00fa\u0161ajte ESET Mobile Security.&nbsp; \u0160pion\u00e1\u017ena kampa\u0148 StrongPity Za\u010diatkom&hellip;<\/p>\n","protected":false},"author":5,"featured_media":16280,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[274,165],"tags":[],"class_list":["post-16408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuality","category-cybernews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0 - Bezpe\u010dne na nete | ESET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0 - Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"og:description\" content=\"Tak\u00e9to hrozby maj\u00fa mnoho pod\u00f4b a&nbsp;neust\u00e1le sa vyv\u00edjaj\u00fa&nbsp;\u2013&nbsp;od&nbsp;napodoben\u00edn aplik\u00e1ci\u00ed na&nbsp;v\u00fdmenu spr\u00e1v cez n\u00e1stroje na&nbsp;zjednodu\u0161enie vytv\u00e1rania marketingov\u00fdch podvodov a\u017e po&nbsp;malv\u00e9r vyu\u017e\u00edvaj\u00faci popularitu hern\u00fdch aplik\u00e1ci\u00ed. V&nbsp;nasleduj\u00facom \u010dl\u00e1nku sa dozviete o&nbsp;ned\u00e1vnych \u0161kodliv\u00fdch mobiln\u00fdch kampaniach objaven\u00fdch v\u00fdskumn\u00edkmi spolo\u010dnosti ESET, ktor\u00e9 sa zameriavaj\u00fa na&nbsp;opera\u010dn\u00fd syst\u00e9m Android, a&nbsp;o&nbsp;tom, ako tak\u00e9to hrozby vyzeraj\u00fa. Ak chcete chr\u00e1ni\u0165 svoje zariadenie pred podobn\u00fdmi \u00fatokmi, vysk\u00fa\u0161ajte ESET Mobile Security.&nbsp; \u0160pion\u00e1\u017ena kampa\u0148 StrongPity Za\u010diatkom&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-27T10:56:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-27T10:58:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_57.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0\",\"datePublished\":\"2025-10-27T10:56:54+00:00\",\"dateModified\":\"2025-10-27T10:58:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/\"},\"wordCount\":3081,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_57.jpg\",\"articleSection\":[\"Aktuality\",\"Cybernews\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/\",\"name\":\"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0 - Bezpe\u010dne na nete | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_57.jpg\",\"datePublished\":\"2025-10-27T10:56:54+00:00\",\"dateModified\":\"2025-10-27T10:58:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_57.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_57.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Bezpe\u010dnos\u0165 iPhone ilustra\u010dn\u00fd obr\u00e1zok ESET\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0 - Bezpe\u010dne na nete | ESET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/","og_locale":"sk_SK","og_type":"article","og_title":"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0 - Bezpe\u010dne na nete | ESET","og_description":"Tak\u00e9to hrozby maj\u00fa mnoho pod\u00f4b a&nbsp;neust\u00e1le sa vyv\u00edjaj\u00fa&nbsp;\u2013&nbsp;od&nbsp;napodoben\u00edn aplik\u00e1ci\u00ed na&nbsp;v\u00fdmenu spr\u00e1v cez n\u00e1stroje na&nbsp;zjednodu\u0161enie vytv\u00e1rania marketingov\u00fdch podvodov a\u017e po&nbsp;malv\u00e9r vyu\u017e\u00edvaj\u00faci popularitu hern\u00fdch aplik\u00e1ci\u00ed. V&nbsp;nasleduj\u00facom \u010dl\u00e1nku sa dozviete o&nbsp;ned\u00e1vnych \u0161kodliv\u00fdch mobiln\u00fdch kampaniach objaven\u00fdch v\u00fdskumn\u00edkmi spolo\u010dnosti ESET, ktor\u00e9 sa zameriavaj\u00fa na&nbsp;opera\u010dn\u00fd syst\u00e9m Android, a&nbsp;o&nbsp;tom, ako tak\u00e9to hrozby vyzeraj\u00fa. Ak chcete chr\u00e1ni\u0165 svoje zariadenie pred podobn\u00fdmi \u00fatokmi, vysk\u00fa\u0161ajte ESET Mobile Security.&nbsp; \u0160pion\u00e1\u017ena kampa\u0148 StrongPity Za\u010diatkom&hellip;","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2025-10-27T10:56:54+00:00","article_modified_time":"2025-10-27T10:58:12+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_57.jpg","type":"image\/jpeg"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"14 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0","datePublished":"2025-10-27T10:56:54+00:00","dateModified":"2025-10-27T10:58:12+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/"},"wordCount":3081,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_57.jpg","articleSection":["Aktuality","Cybernews"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/","name":"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0 - Bezpe\u010dne na nete | ESET","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_57.jpg","datePublished":"2025-10-27T10:56:54+00:00","dateModified":"2025-10-27T10:58:12+00:00","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_57.jpg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_57.jpg","width":1200,"height":628,"caption":"Bezpe\u010dnos\u0165 iPhone ilustra\u010dn\u00fd obr\u00e1zok ESET"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/funkcne-no-skodlive-aplikacie-ci-klonovane-platobne-karty-kyberneticki-zlocinci-cieliaci-na-android-su-coraz-kreativnejsi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Funk\u010dn\u00e9, no \u0161kodliv\u00e9 aplik\u00e1cie \u010di klonovan\u00e9 platobn\u00e9 karty\u00a0\u2013 kybernetick\u00ed zlo\u010dinci cieliaci na\u00a0Android s\u00fa \u010doraz kreat\u00edvnej\u0161\u00ed\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=16408"}],"version-history":[{"count":3,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16408\/revisions"}],"predecessor-version":[{"id":16424,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16408\/revisions\/16424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/16280"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=16408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=16408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=16408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}