{"id":399,"date":"2017-04-25T17:27:49","date_gmt":"2017-04-25T17:27:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/turn-the-light-on-and-give-me-your-passwords\/"},"modified":"2019-05-29T12:18:56","modified_gmt":"2019-05-29T12:18:56","slug":"turn-the-light-on-and-give-me-your-passwords","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/","title":{"rendered":"Turn the light on and give me your passwords!"},"content":{"rendered":"<p class=\"wls-paragraph\">Android users were the target of another banking malware with screen locking capabilities, masquerading as a flashlight app on Google Play. Unlike other banking trojans with a static set of targeted banking apps, this trojan is able to dynamically adjust its functionality.<\/p>\n<p class=\"wls-paragraph\">Aside from delivering promised flashlight functionality, the remotely controlled trojan comes with a variety of additional functions aimed at stealing victims\u2019 banking credentials. Based on commands from its C&amp;C server, the trojan can display fake screens mimicking legitimate apps, lock infected devices to hide fraudulent activity and intercept SMS and display fake notifications in order to bypass two-factor authentication.<\/p>\n<p class=\"wls-paragraph\">The malware can affect all versions of Android. Because of its dynamic nature, there might be no limit to targeted apps \u2013 the malware obtains HTML code based on apps installed on the victim\u2019s device and uses the code to overlay the apps with fake screens after they\u2019re launched.<\/p>\n<p class=\"wls-paragraph\">The trojan, detected by ESET as <em>Trojan.Android\/Charger.B<\/em>, was uploaded to Google Play on March 30 and was installed by up to 5,000 unsuspecting users before being pulled from the store on ESET\u2019s notice on April 10.<strong>&nbsp;<\/strong><\/p>\n<div id=\"attachment_91969\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-91969\" src=\"https:\/\/ba-infohub-web01-v.hq.eset.com\/wp-content\/uploads\/2017\/04\/Figure-1.png\" sizes=\"auto, (max-width: 712px) 100vw, 712px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-1.png 712w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-1-255x300.png 255w\" alt=\"Flashlight\" width=\"712\" height=\"838\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 1 \u2013 The trojan on Google Play<\/p>\n<\/div>\n<h2><strong>How does it operate?<\/strong><\/h2>\n<p class=\"wls-paragraph\">As soon as the app is installed and launched, it requests device administrator rights. Users with Android 6.0 and above also need to manually permit usage access and drawing over other apps. With the rights and permissions granted, the app hides its icon, appearing on the device only as a widget.<\/p>\n<p class=\"wls-paragraph\">The actual payload is encrypted in the assets of the APK file installed from Google Play, evading detection of its malicious functionality. The payload is dropped, decrypted and executed when the victim runs the app.<\/p>\n<p class=\"wls-paragraph\">The trojan first registers the infected device to the attackers\u2019 server. Apart from sending device information and a list of installed applications, the malware gets up close and personal with its victims \u2013 it also attaches a picture of the device owner taken by the front camera.<\/p>\n<p class=\"wls-paragraph\">If the sent information indicates the device is located in Russia, Ukraine or Belarus, the C&amp;C commands the malware to stop its activity \u2013 most likely to avoid prosecution of the attackers in their home countries.<\/p>\n<p class=\"wls-paragraph\">Based on the apps found installed on the infected device, the C&amp;C sends corresponding fake activity in the form of a malicious HTML code. The HTML is displayed in WebView after the victim launches one of the targeted apps. Legitimate activity is then overlaid by a fake screen requesting a victim\u2019s credit card details or banking app credentials.<\/p>\n<p class=\"wls-paragraph\">However, as mentioned before, specifying what apps qualify as \u201ctargeted\u201d is tricky, as the requested HTML varies based on what apps are installed on the particular device. During our research, we\u2019ve seen fake screens for Commbank, NAB and Westpac Mobile Banking, but also for Facebook, WhatsApp, Instagram and Google Play.<\/p>\n<p class=\"wls-paragraph\">The credentials inserted into the fake forms are sent unencrypted to the attackers\u2019 C&amp;C server.<\/p>\n<p class=\"wls-paragraph\">As for the device locking, we suspect this function enters the picture when cashing out the compromised bank accounts. The attackers can remotely lock devices with a fake update lookalike screen to hide fraudulent activity from victims, as well as to ensure they can\u2019t interfere.<\/p>\n<div id=\"attachment_91970\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91970 size-full\" src=\"https:\/\/ba-infohub-web01-v.hq.eset.com\/wp-content\/uploads\/2017\/04\/Figure-2.png\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-2.png 866w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-2-113x300.png 113w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-2-768x2042.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-2-385x1024.png 385w\" alt=\"Flashlight\" width=\"866\" height=\"2303\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 2 \u2013 Fake screens mimicking apps found on infected device<\/p>\n<\/div>\n<div id=\"attachment_91971\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91971\" src=\"https:\/\/ba-infohub-web01-v.hq.eset.com\/wp-content\/uploads\/2017\/04\/Figure-3.png\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-3.png 488w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-3-169x300.png 169w\" alt=\"Flashlight\" width=\"400\" height=\"710\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 3 \u2013 Fake system screen used to lock infected device<\/p>\n<\/div>\n<p class=\"wls-paragraph\">To communicate with C&amp;C, the trojan misuses Firebase Cloud Messages (FCM), which is the first time we\u2019ve seen Android malware using this communication channel.<\/p>\n<p class=\"wls-paragraph\">Based on our research, the app is a modified version of <em>Android\/Charger<\/em>, first discovered by Check Point researchers <a href=\"http:\/\/blog.checkpoint.com\/2017\/01\/24\/charger-malware\/\">in January 2017<\/a>. Unlike the first version that primarily extorted victims by locking their devices and demanding a ransom, the attackers behind Charger are now trying their luck with phishing for banking credentials \u2013 an evolution rather rare in the world of Android malware.<\/p>\n<p class=\"wls-paragraph\">With its fake login screens and locking capabilities, <em>Android\/Charger.B <\/em>also bears some resemblance to the <a href=\"https:\/\/www.welivesecurity.com\/2017\/02\/22\/sunny-chance-stolen-credentials-malicious-weather-app-found-google-play\/\">banking malware<\/a> we discovered and analyzed in February. What makes this latest discovery more dangerous, however, is the fact that its target can be dynamically updated, as opposed to being hardcoded in the malware \u2013 opening unlimited options for future misuse.<\/p>\n<h2><strong>Has my device been infected? How do I clean it?<\/strong><\/h2>\n<p class=\"wls-paragraph\">If you\u2019ve recently downloaded a Flashlight app from Google Play, you might want to check if you haven\u2019t accidentally reached for this trojan.<\/p>\n<p class=\"wls-paragraph\">The malicious app can be found in Setting &gt; Application Manager\/Apps &gt; Flashlight Widget.<\/p>\n<div id=\"attachment_91972\" class=\"wp-caption aligncenter\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-91972\" src=\"https:\/\/ba-infohub-web01-v.hq.eset.com\/wp-content\/uploads\/2017\/04\/Figure-4-576x1024.png\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-4-576x1024.png 576w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-4-169x300.png 169w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/04\/Figure-4.png 585w\" alt=\"Flashlight\" width=\"400\" height=\"711\"><\/p>\n<p class=\"wp-caption-text wls-paragraph\">Figure 4 \u2013 The malicious app in Application manager<\/p>\n<\/div>\n<p class=\"wls-paragraph\">While locating the app is simple, uninstalling it is not. The trojan tries to prevent this by not allowing victims to turn off the active device administrator \u2013 a necessary step for removing the app. When trying to deactivate the rights, the pop-up screen doesn\u2019t go away until you change your mind and click \u201cactivate\u201d again.<\/p>\n<p class=\"wls-paragraph\">In such a case, the app can be uninstalled by booting your device into Safe mode, which will enable you to go through the following two steps to remove the malicious app.<\/p>\n<p class=\"wls-paragraph\">See video below for instructions:<\/p>\n<p class=\"wls-paragraph\"><iframe loading=\"lazy\" id=\"widget2\" src=\"https:\/\/www.youtube.com\/embed\/N9eK-Sw_-sI?enablejsapi=1\" width=\"600\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<h2><strong>How to stay safe<\/strong><\/h2>\n<p class=\"wls-paragraph\">To avoid dealing with the consequences of mobile malware, prevention is always the key.<\/p>\n<p class=\"wls-paragraph\">Whenever possible, opt for official app stores when downloading apps. Although not flawless, Google Play does employ advanced security mechanisms to keep malware out, which isn\u2019t necessarily the case with alternative stores.<\/p>\n<p class=\"wls-paragraph\">When in doubt about installing an app, check its popularity by the number of installs, its ratings, and, most importantly, the content of reviews.<\/p>\n<p class=\"wls-paragraph\">After running anything you\u2019ve installed on your mobile device, pay attention to what permissions and rights it requests. If an app asks for permissions that don\u2019t seem adequate to its function \u2013 like device administrator rights for a Flashlight app \u2013 you might want to rethink your choice.<\/p>\n<p class=\"wls-paragraph\">Last but not least, use a reputable mobile security solution to protect your device from latest threats.<\/p>\n<h2><strong>Analyzed sample<\/strong><\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"156\"><strong>Package Name<\/strong><\/td>\n<td width=\"156\"><strong>Hash<\/strong><\/td>\n<td width=\"156\"><strong>Detection<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"156\">com.flashscary.widget<\/td>\n<td width=\"156\">CA04233F2D896A59B718E19B13E3510017420A6D<\/td>\n<td width=\"156\">Android\/Charger.B<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/04\/19\/turn-light-give-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Android users were the target of another banking malware with screen locking capabilities, masquerading as a flashlight app on Google Play. Unlike other banking trojans with a static set of targeted banking apps, this trojan is able to dynamically adjust its functionality. Aside from delivering promised flashlight functionality, the remotely controlled trojan comes with a<\/p>\n","protected":false},"author":5,"featured_media":1798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,160],"tags":[],"class_list":["post-399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Turn the light on and give me your passwords! - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Turn the light on and give me your passwords!\" \/>\n<meta property=\"og:description\" content=\"Android users were the target of another banking malware with screen locking capabilities, masquerading as a flashlight app on Google Play. Unlike other banking trojans with a static set of targeted banking apps, this trojan is able to dynamically adjust its functionality. Aside from delivering promised flashlight functionality, the remotely controlled trojan comes with a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-25T17:27:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:18:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_313785935-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Turn the light on and give me your passwords!\",\"datePublished\":\"2017-04-25T17:27:49+00:00\",\"dateModified\":\"2019-05-29T12:18:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/\"},\"wordCount\":1031,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_313785935-623x410.jpg\",\"articleSection\":[\"cybercrime\",\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/\",\"name\":\"Turn the light on and give me your passwords! - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_313785935-623x410.jpg\",\"datePublished\":\"2017-04-25T17:27:49+00:00\",\"dateModified\":\"2019-05-29T12:18:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_313785935-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_313785935-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Turn the light on and give me your passwords!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/turn-the-light-on-and-give-me-your-passwords\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Turn the light on and give me your passwords! - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Turn the light on and give me your passwords!","og_description":"Android users were the target of another banking malware with screen locking capabilities, masquerading as a flashlight app on Google Play. Unlike other banking trojans with a static set of targeted banking apps, this trojan is able to dynamically adjust its functionality. Aside from delivering promised flashlight functionality, the remotely controlled trojan comes with a","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-04-25T17:27:49+00:00","article_modified_time":"2019-05-29T12:18:56+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_313785935-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Turn the light on and give me your passwords!","datePublished":"2017-04-25T17:27:49+00:00","dateModified":"2019-05-29T12:18:56+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/"},"wordCount":1031,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_313785935-623x410.jpg","articleSection":["cybercrime","malware"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/","name":"Turn the light on and give me your passwords! - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_313785935-623x410.jpg","datePublished":"2017-04-25T17:27:49+00:00","dateModified":"2019-05-29T12:18:56+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_313785935-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_313785935-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Turn the light on and give me your passwords!"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/turn-the-light-on-and-give-me-your-passwords\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=399"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/399\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1798"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}