{"id":94789,"date":"2026-04-07T10:32:24","date_gmt":"2026-04-07T13:32:24","guid":{"rendered":"https:\/\/www.ecommerceupdate.com.br\/?p=94789"},"modified":"2026-04-07T10:32:44","modified_gmt":"2026-04-07T13:32:44","slug":"ransomware-cresce-com-uso-da-ia-e-agentes","status":"publish","type":"post","link":"https:\/\/www.ecommerceupdate.com.br\/lv\/ransomware-cresce-com-uso-da-ia-e-agentes\/","title":{"rendered":"Izpirkuma programmat\u016bra aug, izmantojot AI un a\u0123entus"},"content":{"rendered":"<p>No Braz\u012blijas l\u012bdz Amerikas Savienotaj\u0101m Valst\u012bm, Apvienot\u0101s Karalistes l\u012bdz Eiropas Savien\u012bbai izspied\u0113jv\u012bruss ien\u0101ca desmitgades vid\u016b k\u0101 paral\u0113la\u201c-nozieguma veids \u201d: tas organiz\u0113jas k\u0101 pakalpojums, izmanto \u0101rpakalpojumus un izmanto uz\u0146\u0113mumu un vald\u012bbu atkar\u012bbu no savienot\u0101s sist\u0113mas Jaunums nav pati \u0161ifr\u0113\u0161ana, bet gan tas, k\u0101 izspie\u0161ana apvienojas ar \u0101tr\u0101ku darb\u012bbu, ar vair\u0101k nozagtiem datiem un arvien liel\u0101ku m\u0101ksl\u012bg\u0101 intelekta izmanto\u0161anu, lai samazin\u0101tu izmaksas un palielin\u0101tu sasniedzam\u012bbu.<\/p>\n\n\n\n<p>Zi\u0146ojum\u0101 Threat Landscape 2025, ko public\u0113ja ENISA 'ES kiberdro\u0161\u012bbas a\u0123ent\u016bra OE, m\u0101ksl\u012bgais intelekts ir ierindots k\u0101 viens no pa\u0161reiz\u0113j\u0101s draudu ainavas noteico\u0161ajiem elementiem. Zi\u0146ojum\u0101 uzsv\u0113rts, ka AI atbalst\u012bt\u0101s pik\u0161\u0137er\u0113\u0161anas kampa\u0146as ir izveidoju\u0161as liel\u0101ko da\u013cu pag\u0101ju\u0161aj\u0101 gad\u0101 nov\u0113rot\u0101s soci\u0101l\u0101s in\u017eenierijas iniciat\u012bvas Praktisk\u0101 ietekme ir tie\u0161a: p\u0101rliecino\u0161\u0101ki teksti, valodas piel\u0101go\u0161ana upura profilam, pieejas testu automatiz\u0101cija un uzbrukuma darb\u012bbas izmaksu samazin\u0101\u0161ana.<\/p>\n\n\n\n<p>AI piln\u012bb\u0101 neaizst\u0101j cilv\u0113ku operatoru izspied\u0113jv\u012brusos, ta\u010du tas samazina piep\u016bli so\u013cos, kas v\u0113sturiski pras\u012bja laiku un manu\u0101las prasmes. Valodu mode\u013ci tiek izmantoti, lai izveidotu \u013coti personaliz\u0113tus e-pastus, analiz\u0113tu eksfiltr\u0113tus datus, lai identific\u0113tu sensit\u012bvu inform\u0101ciju ar liel\u0101ku spiediena potenci\u0101lu un atbalst\u012btu ievainojam\u012bbas izp\u0113ti. Nacion\u0101lais kiberdro\u0161\u012bbas centrs, Apvienot\u0101 Karaliste, jau ir br\u012bdin\u0101jis, ka AI m\u0113dz palielin\u0101t eso\u0161\u0101s taktikas efektivit\u0101ti, bie\u017eumu un m\u0113rogu, jo \u012bpa\u0161i asist\u0113taj\u0101 atpaz\u012b\u0161an\u0101 un izmanto\u0161an\u0101.<\/p>\n\n\n\n<p><strong>AI a\u0123entu loma<\/strong><\/p>\n\n\n\n<p>Tom\u0113r visjut\u012bg\u0101kais sasniegums ir uz a\u0123entiem balst\u012btu arhitekt\u016bru izmanto\u0161ana At\u0161\u0137ir\u012bb\u0101 no tikai teksta mode\u013ca a\u0123enti ir sist\u0113mas, kas sp\u0113j pl\u0101not uzdevumus, izpild\u012bt zvanus uz \u0101r\u0113jiem r\u012bkiem, mijiedarboties ar API un uztur\u0113t kontekstu vair\u0101kos posmos. Ja tos izmanto likum\u012bg\u0101 korporat\u012bvaj\u0101 vid\u0113, \u0161ie a\u0123enti automatiz\u0113 iek\u0161\u0113jos procesus, integr\u0113 sist\u0113mas un samazina darb\u012bbas berzi. No aizskaro\u0161a viedok\u013ca to pa\u0161u lo\u0123iku var izmantot, lai koordin\u0113tu sadal\u012bt\u0101s darb\u012bbas.<\/p>\n\n\n\n<p>Struktur\u0113t\u0101 uzbrukum\u0101 var b\u016bt iesaist\u012bts a\u0123ents, kas nodarbojas ar publiskas un iek\u0161\u0113j\u0101s inform\u0101cijas v\u0101k\u0161anu, cits, kas koncentr\u0113jas uz akredit\u0101cijas datu valid\u0101ciju un p\u0101rm\u0113r\u012bgu at\u013cauju izmanto\u0161anu, un tre\u0161\u0101 puse, kas ir atbild\u012bga par m\u0101ko\u0146pakalpojumu API darb\u012bbu, lai kart\u0113tu resursus, mar\u0137ierus un piek\u013cuves atsl\u0113gas. no s\u0101kotn\u0113j\u0101s ielau\u0161an\u0101s, automatiz\u0101cija pa\u0101trina s\u0101nu kust\u012bbu un eksfiltr\u0101ciju.&nbsp;<\/p>\n\n\n\n<p>Braz\u012blij\u0101 CTIR vald\u012bbas br\u012bdin\u0101jumi jau kop\u0161 2022. gada ir aprakst\u012bju\u0161i t\u0101du grupu k\u0101 BlackCat\/ALPHV nobrie\u0161anu, kas darbojas ar s\u0101nu kust\u012bbas metod\u0113m un piel\u0101gotu \u0161ifr\u0113\u0161anu. Tagad main\u0101s papildu vied\u0101s automatiz\u0101cijas sl\u0101nis, kas papildina pieaugo\u0161o korporat\u012bvo integr\u0101ciju ievie\u0161anu, pamatojoties uz API, pakalpojumu konti un automatiz\u0113tas pl\u016bsmas.<\/p>\n\n\n\n<p>\u0160\u012b konver\u0123ence papla\u0161ina riska virsmu Katra integr\u0101cija pievieno akredit\u0101cijas datus, \u017eetonus un at\u013caujas Katrs korporat\u012bvais a\u0123ents ar darb\u012bbas autonomiju p\u0101rst\u0101v jaunu ma\u0161\u012bnas identit\u0101ti Ja tie ir apdraud\u0113ti, \u0161ie elementi var darboties ar ac\u012bmredzamu le\u0123itimit\u0101ti vid\u0113. Izmekl\u0113\u0161ana p\u0101rst\u0101j jaut\u0101t tikai \u201cpieejams quem\u201d un s\u0101k ap\u0161aub\u012bt, \u201ckura sist\u0113ma veica noteiktu darb\u012bbu un saska\u0146\u0101 ar kuru l\u0113mumu \u0137\u0113di\u201d.<\/p>\n\n\n\n<p>No tehnisk\u0101 viedok\u013ca, rea\u0123\u0113jot uz \u0161iem jaunajiem draudiem, ir nepiecie\u0161ama arhitekt\u016bras p\u0101rskat\u012b\u0161ana.Nulles uzticam\u012bbas mode\u013ci, granul\u0113ta segment\u0101cija un stingra ma\u0161\u012bnu identit\u0101tes kontrole k\u013c\u016bst par priorit\u0101ti Privil\u0113\u0123iju p\u0101rvald\u012bbai ir j\u0101iek\u013cauj pakalpojumu konti un automatiz\u0113tas integr\u0101cijas.Ba\u013c\u0137iem j\u0101b\u016bt centraliz\u0113tiem un aizsarg\u0101tiem no manipul\u0101cij\u0101m, \u013caujot veikt uzved\u012bbas anal\u012bzi, pamatojoties uz notikumu sec\u012bb\u0101m, nevis tikai atsevi\u0161\u0137iem br\u012bdin\u0101jumiem.<\/p>\n\n\n\n<p>Nemain\u012bgas dubl\u0113jumkopijas joproj\u0101m ir galvenais pas\u0101kums pret \u0161ifr\u0113\u0161anu, ta\u010du t\u0101s nerisina nopl\u016bdes izspie\u0161anas reput\u0101cijas dimensiju. Nep\u0101rtraukta eksfiltr\u0101cijas uzraudz\u012bba un skaidra rea\u0123\u0113\u0161anas politika uz incidentiem tagad ir da\u013ca no strat\u0113\u0123isk\u0101s pl\u0101no\u0161anas.<\/p>\n\n\n\n<p>M\u0101ksl\u012bg\u0101 intelekta ievie\u0161ana uz\u0146\u0113mumos pati par sevi nav probl\u0113ma Glu\u017ei pret\u0113ji, t\u0101 var stiprin\u0101t atkl\u0101\u0161anu un rea\u0123\u0113\u0161anu, ja to piem\u0113ro struktur\u0113t\u0101 veid\u0101 Risks rodas, ja a\u0123enti darbojas ar p\u0101rm\u0113r\u012bg\u0101m at\u013cauj\u0101m, integr\u0101cijas tiek \u012bstenotas bez atbilsto\u0161as inventariz\u0101cijas un automatiz\u0113tiem l\u0113mumiem nav audit\u0113jamas trases.<\/p>\n\n\n\n<p>Izpirkuma programmat\u016bra ir att\u012bst\u012bjusies no tehniska uzbrukuma uz struktur\u0113tu ekonomisko modeli. AI un autonomo a\u0123entu iek\u013cau\u0161ana pa\u0101trina \u0161o lo\u0123iku, samazina noziedznieku izmaksas un palielina sare\u017e\u0123\u012bt\u012bbu uz\u0146\u0113mumiem, kuriem ir j\u0101atjaunina savas aizsardz\u012bbas strat\u0113\u0123ijas. Strat\u0113\u0123isk\u0101 priorit\u0101te ir p\u0101rvald\u012bt identit\u0101tes, API un algoritmus ar t\u0101du pa\u0161u stingr\u012bbu, ko piem\u0113ro fiziskajiem un finan\u0161u akt\u012bviem.<\/p>\n\n\n\n<p>Uz\u0146\u0113mumi, kas a\u0123entus un automatiz\u0101ciju uzskata par riska arhitekt\u016bras centr\u0101lo da\u013cu, b\u016bs lab\u0101k pozicion\u0113ti, lai c\u012bn\u012btos pret n\u0101kamo vilni. Tie, kas AI uzskata tikai par produktivit\u0101tes r\u012bku, var p\u0101r\u0101k v\u0113lu atkl\u0101t, ka nekontrol\u0113ta autonomija klusi, bet izl\u0113m\u012bgi papla\u0161ina iedarb\u012bbu.&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>De Brasil a Estados Unidos, do Reino Unido \u00e0 Uni\u00e3o Europeia, o&nbsp;ransomware&nbsp;entrou no meio da d\u00e9cada como um tipo de \u201ceconomia paralela\u201d da criminalidade digital: organiza-se como servi\u00e7o, terceiriza etapas e explora a depend\u00eancia de empresas e governos de sistemas conectados. A novidade n\u00e3o \u00e9 a criptografia em si, mas sim&nbsp;como a extors\u00e3o se combina [&hellip;]<\/p>\n","protected":false},"author":257,"featured_media":8697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35,37],"tags":[47,43,48],"class_list":{"0":"post-94789","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artigos","8":"category-tendencias","9":"tag-artigos","10":"tag-e-commerce","11":"tag-tendencias"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/posts\/94789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/users\/257"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/comments?post=94789"}],"version-history":[{"count":0,"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/posts\/94789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/media\/8697"}],"wp:attachment":[{"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/media?parent=94789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/categories?post=94789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecommerceupdate.com.br\/lv\/wp-json\/wp\/v2\/tags?post=94789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}