{"id":6512,"date":"2026-03-13T14:13:32","date_gmt":"2026-03-13T13:13:32","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6512"},"modified":"2026-03-13T14:13:33","modified_gmt":"2026-03-13T13:13:33","slug":"iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/","title":{"rendered":"Ir\u00e1n a kybernetick\u00e9 d\u00f4sledky vojny: na \u010do by sa firmy mali pripravi\u0165"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1024x576.jpg\" alt=\"BVF Iran nahladovy obrazok\" class=\"wp-image-6513\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1024x576.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-300x169.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-768x432.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1536x864.jpg 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-370x208.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1170x658.jpg 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-972x546.jpg 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-760x428.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-270x152.jpg 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Kybernetick\u00e9 d\u00f4sledky vojny na Bl\u00edzkom v\u00fdchode \u010faleko presahuj\u00fa hranice regi\u00f3nu. Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti. Tu s\u00fa oblasti, na ktor\u00e9 by ste mali zamera\u0165 svoju pozornos\u0165.<\/em><\/p>\n\n\n\n<p>Vojna v Ir\u00e1ne trvala menej ako 24 hod\u00edn, ke\u010f do\u0161lo k historick\u00e9mu prvenstvu: \u00famyseln\u00e9mu \u00fatoku na komer\u010dn\u00e9 d\u00e1tov\u00e9 centr\u00e1. 1. marca ir\u00e1nske drony zasiahli tri <a href=\"https:\/\/health.aws.amazon.com\/health\/status\">zariadenia<\/a> Amazon Web Services (AWS) v Spojen\u00fdch arabsk\u00fdch emir\u00e1toch a Bahrajne, \u010d\u00edm naru\u0161ili k\u013e\u00fa\u010dov\u00fa cloudov\u00fa infra\u0161trukt\u00faru a vyradili z prev\u00e1dzky finan\u010dn\u00e9 aplik\u00e1cie a podnikov\u00e9 n\u00e1stroje nielen v celom Perzskom z\u00e1live, ale aj <a href=\"https:\/\/blog.cybelesoft.com\/aws-outage-march-2026-vdi-impact-oracle-cloud-alternative\/\">\u010faleko od tohto regi\u00f3nu<\/a>. \u00datoky uk\u00e1zali, \u017ee fyzick\u00e1 vzdialenos\u0165 od konfliktnej z\u00f3ny nie je z\u00e1rukou ochrany pred dopadmi kinetickej vojny.<\/p>\n\n\n\n<p>Pre v\u00e4\u010d\u0161inu organiz\u00e1ci\u00ed sa v\u0161ak bezprostrednej\u0161ie riziko prejavuje v kyberpriestore a zah\u0155\u0148a v\u0161etky druhy akt\u00e9rov hrozieb. V priebehu nieko\u013ek\u00fdch hod\u00edn po americko-izraelskej oper\u00e1cii 28. febru\u00e1ra sa vo ve\u013ekom po\u010dte zmobilizovali kyberakt\u00e9ri prepojen\u00ed s Ir\u00e1nom \u2013 <a href=\"https:\/\/unit42.paloaltonetworks.com\/iranian-cyberattacks-2026\/\">jednotka 42<\/a> spolo\u010dnosti Palo Alto Networks napo\u010d\u00edtala viac ako 60 akt\u00edvnych pro-ir\u00e1nskych hacktivistick\u00fdch skup\u00edn. Tie\u017e v priebehu nieko\u013ek\u00fdch hod\u00edn agent\u00fary pre kyberbezpe\u010dnos\u0165 vo <a href=\"https:\/\/www.ncsc.gov.uk\/news\/ncsc-advises-uk-organisations-take-action-following-conflict-in-middle-east\">Ve\u013ekej Brit\u00e1nii<\/a> a <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/cyber-threat-bulletin-iranian-cyber-threat-response-usisrael-strikes-february-2026\">Kanade<\/a> varovali pred zv\u00fd\u0161enou \u00farov\u0148ou hrozby. Netrvalo dlho a podobn\u00e9 varovania zopakovali <a href=\"https:\/\/www.euronews.com\/my-europe\/2026\/03\/06\/europol-warns-of-elevated-terrorism-threat-in-eu-amid-iran-conflict\">Europol<\/a> a <a href=\"https:\/\/abcnews.com\/US\/department-homeland-security-warns-potential-attacks-wake-iran\/story?id=130665784\">americk\u00e9 Ministerstvo vn\u00fatornej bezpe\u010dnosti<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hrozby a&nbsp;skupiny napojen\u00e9 na Ir\u00e1n<\/h2>\n\n\n\n<p>Vypuknutie fyzick\u00e9ho konfliktu \u010dasto vedie k n\u00e1rastu po\u010dtu aj spektra zapojen\u00fdch kyberakt\u00e9rov. Ako prv\u00e9 sa \u010dasto prejav\u00ed aktivita hacktivistov \u2013 hlu\u010dn\u00e1 a \u010dasto sprev\u00e1dzan\u00e1 ve\u013ek\u00fdmi re\u010dami. Oper\u00e1cie skupin pokro\u010dil\u00fdch pretrv\u00e1vaj\u00facich hrozieb (Advanced Persistent Threat &#8211; APT), ktor\u00e9 zah\u0155\u0148aj\u00fa prieskum a po\u010diato\u010dn\u00fd pr\u00edstup, prebiehaj\u00fa paralelne alebo tesne za nimi. Akon\u00e1hle s\u00fa vytvoren\u00e9 oporn\u00e9 body a zmapovan\u00e9 ciele, je pripraven\u00e1 sc\u00e9na na to, \u010do mala oper\u00e1cia skuto\u010dne dosiahnu\u0165, \u010di u\u017e ide o \u0161pion\u00e1\u017e, naru\u0161enie, sabot\u00e1\u017e alebo in\u00e9 ciele.<\/p>\n\n\n\n<p>Hranice samozrejme nie s\u00fa v\u017edy jasn\u00e9 a niektor\u00e9 taktiky sa m\u00f4\u017eu pou\u017e\u00edva\u0165 s\u00fa\u010dasne: po\u0161kodenie webovej str\u00e1nky alebo \u00fatok typu distributed denial-of-service (DDoS), ktor\u00fd vyzer\u00e1 ako hacktivistick\u00e1 oper\u00e1cia na \u00farovni ob\u0165a\u017eovania, m\u00f4\u017ee by\u0165 z\u00e1mern\u00fdm odveden\u00edm pozornosti od skuto\u010dn\u00e9ho \u00fatoku, ktor\u00fd ticho zneu\u017e\u00edva cie\u013e prostredn\u00edctvom in\u00e9ho vektora.<\/p>\n\n\n\n<p>Skupiny spojen\u00e9 s Ir\u00e1nom patria medzi najakt\u00edvnej\u0161ie a najvynaliezavej\u0161ie skupiny na svete, ktor\u00e9 s\u00fa prepojen\u00e9 so \u0161t\u00e1tom, a ich ofenz\u00edvne kybernetick\u00e9 schopnosti a n\u00e1stroje v poslednom \u010dase dozreli. Hrozba je obzvl\u00e1\u0161\u0165 ak\u00fatna pre organiz\u00e1cie, ktor\u00e9 maj\u00fa dod\u00e1vate\u013esk\u00e9 re\u0165azce na Bl\u00edzkom v\u00fdchode alebo in\u00e9 v\u00e4zby na tento regi\u00f3n, nehovoriac o t\u00fdch, ktor\u00e9 s\u00fa tam z\u00e1visl\u00e9 od cloudu.<\/p>\n\n\n\n<p>Kampa\u0148 skupiny CyberAv3ngers proti vod\u00e1rensk\u00fdm a kanaliza\u010dn\u00fdm spolo\u010dnostiam v USA a \u010fal\u0161\u00edch krajin\u00e1ch v roku 2023 uk\u00e1zala, ako sa t\u00e1to logika zameriavania na ciele uplat\u0148uje v praxi. <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-335a\">Zlovestn\u00e1 spr\u00e1va<\/a>, ktor\u00fa \u00fato\u010dn\u00edk zanechal na napadnut\u00fdch syst\u00e9moch \u2013 \u201eBoli ste hacknut\u00ed, pre\u010d s Izraelom. Ka\u017ed\u00e9 zariadenie \u201avyroben\u00e9 v Izraeli\u2018 je legit\u00edmnym cie\u013eom CyberAv3ngers\u201c \u2013 vyzerala ako v\u00fdstup hacktivistov, ale r\u00fdchlo sa zistilo, \u017ee skupina p\u00f4sob\u00ed pod veden\u00edm ir\u00e1nskeho \u0161t\u00e1tu. Toto stieranie hran\u00edc medzi identitou hacktivistov a oper\u00e1ciami podporovan\u00fdmi \u0161t\u00e1tom, ktor\u00fdch korene siahaj\u00fa a\u017e k <a href=\"https:\/\/www.cfr.org\/cyber-operations\/compromise-of-saudi-aramco-and-rasgas\">incidentu so spolo\u010dnos\u0165ou Saudi Aramco<\/a> v roku 2012, m\u00e1 tie\u017e svoje meno: \u201e<a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-11\/ENISA%20Threat%20Landscape%202025.pdf\">faketivizmus<\/a>\u201c.<\/p>\n\n\n\n<p>Opera\u010dn\u00e9 prekr\u00fdvania medzi r\u00f4znymi skupinami s\u00fa v\u0161ak e\u0161te hlb\u0161ie. V\u00fdskumn\u00edci spolo\u010dnosti ESET u\u017e <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q4-2024-q1-2025.pdf#page=13\">sk\u00f4r zdokumentovali<\/a> \u00fazke prepojenia medzi viacer\u00fdmi akt\u00e9rmi APT spojen\u00fdmi s Ir\u00e1nom. Najm\u00e4 skupina MuddyWater \u00fazko spolupracovala so skupinou Lyceum, podskupinou <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/oilrigs-outer-space-juicy-mix-same-ol-rig-new-drill-pipes\/\">OilRig<\/a>, a pravdepodobne p\u00f4sobila aj ako sprostredkovate\u013e po\u010diato\u010dn\u00e9ho pr\u00edstupu (IAB) pre in\u00e9 skupiny spojen\u00e9 s Ir\u00e1nom.<\/p>\n\n\n\n<p>Situ\u00e1ciu e\u0161te viac zamot\u00e1va fakt, \u017ee sa do boja na podporu Ir\u00e1nu <a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2026\/03\/russia-linked-hackers-appear-iran-wars-cyber-front-their-impact-murky\/412011\/\">zrejme zapojilo<\/a> nieko\u013eko prorusk\u00fdch hacktivistick\u00fdch skup\u00edn a <a href=\"https:\/\/www.cybersecuritydive.com\/news\/pro-russia-actors-support-iran-nexus-hackers\/813647\/\">existuj\u00fa spr\u00e1vy<\/a> o skupin\u00e1ch spojen\u00fdch s Ir\u00e1nom, ktor\u00e9 spolupracuj\u00fa s IAB na rusk\u00fdch f\u00f3rach venovan\u00fdch kyberkriminalite. To efekt\u00edvne roz\u0161iruje nielen dostupn\u00e9 n\u00e1stroje, ale aj \u0161k\u00e1lu dosiahnute\u013en\u00fdch cie\u013eov. Kritick\u00e1 infra\u0161trukt\u00fara je jednou z najvyh\u013ead\u00e1vanej\u0161\u00edch \u201etrofej\u00ed\u201c v\u0161etk\u00fdch druhov nepriate\u013eov a najnov\u0161ie telemetrick\u00e9 \u00fadaje spolo\u010dnosti ESET ukazuj\u00fa, \u017ee akt\u00e9ri spriaznen\u00ed s Ir\u00e1nom sa nepropor\u010dne zameriavaj\u00fa na subjekty p\u00f4sobiace v oblasti stroj\u00e1rstva a v\u00fdroby.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"942\" height=\"461\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/graf_sk_iran.png\" alt=\"\" class=\"wp-image-6515\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/graf_sk_iran.png 942w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/graf_sk_iran-300x147.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/graf_sk_iran-768x376.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/graf_sk_iran-370x181.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/graf_sk_iran-760x372.png 760w\" sizes=\"auto, (max-width: 942px) 100vw, 942px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Graf 1: Odvetvia, na ktor\u00e9 cielili APT skupiny napojen\u00e9 na Ir\u00e1n od apr\u00edla do septembra 2025 (zdroj: ESET APT Activity Report Q2 2025 <em>\u2013<\/em> Q3 2025)<\/em><\/p>\n\n\n\n<p>Okrem toho, ak je cie\u013eom odplata, m\u00e1 pred vydieran\u00edm prostredn\u00edctvom ransomv\u00e9ru zvy\u010dajne prednos\u0165 ni\u010denie. Malv\u00e9r na vymazanie d\u00e1t je be\u017enou s\u00fa\u010das\u0165ou modern\u00fdch oper\u00e1ci\u00ed s\u00favisiacich s konfliktmi. S\u00fabe\u017ene s fyzickou vojenskou agresiou tento postup opakovane demon\u0161trovali na Ukrajine <a href=\"https:\/\/www.welivesecurity.com\/2023\/02\/24\/year-wiper-attacks-ukraine\/\">skupiny napojen\u00e9 na Rusko<\/a>.<\/p>\n\n\n\n<p>Pokia\u013e ide o \u00fatoky, ktor\u00e9 \u00fato\u010dn\u00edkom prin\u00e1\u0161aj\u00fa najv\u00e4\u010d\u0161\u00ed efekt za vynalo\u017een\u00e9 prostriedky, zvy\u010dajne dominuj\u00fa \u00fatoky zameran\u00e9 na naru\u0161enie dod\u00e1vate\u013esk\u00e9ho re\u0165azca. U\u017e v roku 2022 v\u00fdskumn\u00edci spolo\u010dnosti ESET zdokumentovali, ako skupina Agrius spriaznen\u00e1 s Ir\u00e1nom nasadila de\u0161trukt\u00edvny wiper s n\u00e1zvom <a href=\"https:\/\/www.welivesecurity.com\/2022\/12\/07\/fantasy-new-agrius-wiper-supply-chain-attack\/\">Fantasy<\/a> prostredn\u00edctvom \u00fatoku na dod\u00e1vate\u013esk\u00fd re\u0165azec, ktor\u00fd zneu\u017eil izraelsk\u00e9ho v\u00fdvoj\u00e1ra softv\u00e9ru a zasiahol ciele v r\u00f4znych odvetviach aj \u010faleko za hranicami Izraela. Dosah \u00fatoku na dod\u00e1vate\u013esk\u00fd re\u0165azec m\u00f4\u017ee zasiahnu\u0165 organiz\u00e1cie, ktor\u00e9 nikdy neboli priamo ter\u010dom \u00fatoku a nemaj\u00fa \u017eiadnu zjavn\u00fa spojitos\u0165 s konfliktom.<\/p>\n\n\n\n<p>S\u00favisiace riziko sa t\u00fdka aj poskytovate\u013eov spravovan\u00fdch slu\u017eieb (MSP) a ich z\u00e1kazn\u00edkov. Taktie\u017e v roku 2022 spolo\u010dnos\u0165 ESET <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/2023\/01\/eset_apt_activity_report_t32022.pdf#page=6\">zdokumentovala kampa\u0148<\/a>, v r\u00e1mci ktorej \u00fato\u010dn\u00edk kompromitoval poskytovate\u013ea MSP s cie\u013eom z\u00edska\u0165 pr\u00edstup k svojim kone\u010dn\u00fdm cie\u013eom. \u00dato\u010dn\u00edci sa nemuseli do svojich cie\u013eov infiltrova\u0165 priamo. Namiesto toho sa inflitrovali prostredn\u00edctvom pr\u00edstupov\u00fdch ciest MSP. Kampa\u0148 zorganizovala kyber\u0161pion\u00e1\u017ena skupina MuddyWater, ktor\u00e1 je v poslednej dobe v\u00fdznamnou silou v ir\u00e1nskych APT kruhoch a pre\u0161la v\u00fdrazn\u00fdm v\u00fdvojom.<\/p>\n\n\n\n<p>Skupina MuddyWater, ktor\u00e1 bola kedysi zn\u00e1ma hlu\u010dn\u00fdmi automatizovan\u00fdmi \u00fatokmi, sa v s\u00fa\u010dasnosti <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/muddywater-snakes-riverbank\/\">\u010doraz viac orientuje<\/a> na nen\u00e1padnej\u0161ie a prepracovanej\u0161ie oper\u00e1cie zah\u0155\u0148aj\u00face priame z\u00e1sahy do cie\u013eov\u00fdch prostred\u00ed. Podobne ako niektor\u00e9 in\u00e9 skupiny napojen\u00e9 na Ir\u00e1n, aj MuddyWater pre\u0161la na osved\u010den\u00fa techniku zneu\u017eitia legit\u00edmneho softv\u00e9ru na vzdialen\u00fd monitoring a spr\u00e1vu (RMM). T\u00fdmto sp\u00f4sobom sa skupina dok\u00e1\u017ee zamaskova\u0165 v legit\u00edmnej sie\u0165ovej prev\u00e1dzke a s\u0165a\u017ei\u0165 tak svoje odhalenie.<\/p>\n\n\n\n<p>Skupina je tie\u017e zn\u00e1ma t\u00fdm, \u017ee uprednost\u0148uje <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q2-2025-q3-2025.pdf#page=12\">intern\u00fd spearphishing<\/a> z u\u017e kompromitovan\u00fdch schr\u00e1nok \u2013 e-maily z \u00fa\u010dtu kolegu namiesto extern\u00e9ho odosielate\u013ea \u2013 s vysokou mierou \u00faspe\u0161nosti, a to z pochopite\u013en\u00fdch d\u00f4vodov. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/001\/\">Pr\u00edlohy<\/a> a <a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/002\/\">odkazy<\/a> v spearphishingu s\u00fa u\u017e dlho najpopul\u00e1rnej\u0161\u00edmi technikami po\u010diato\u010dn\u00e9ho pr\u00edstupu medzi v\u00e4\u010d\u0161inou APT skup\u00edn spojen\u00fdch s Ir\u00e1nom, vr\u00e1tane <a href=\"https:\/\/attack.mitre.org\/groups\/G0049\/\">OilRig<\/a> a <a href=\"https:\/\/attack.mitre.org\/groups\/G0064\/\">APT33<\/a>. Vyu\u017e\u00edvanie zn\u00e1mych softv\u00e9rov\u00fdch zranite\u013enost\u00ed v\u0161ak tie\u017e nie je nezn\u00e1me, ako bolo vidie\u0165 v ned\u00e1vnej kampani <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/sponsor-batch-filed-whiskers-ballistic-bobcats-scan-strike-backdoor\/\">Ballistic Bobcat<\/a>.<\/p>\n\n\n\n<p>MuddyWater zost\u00e1va v roku 2026 ve\u013emi akt\u00edvna \u2013 minul\u00fd mesiac bezpe\u010dnostn\u00ed v\u00fdskumn\u00edci zo <a href=\"https:\/\/www.security.com\/threat-intelligence\/iran-cyber-threat-activity-us\">Symantec a Carbon Black<\/a> identifikovali t\u00fato skupinu v sie\u0165ach viacer\u00fdch americk\u00fdch subjektov, vr\u00e1tane letiska, banky a softv\u00e9rovej firmy s v\u00e4zbami na Izrael. Celkov\u00fd objem ofenz\u00edvnych kybernetick\u00fdch aktiv\u00edt akt\u00e9rov spojen\u00fdch s Ir\u00e1nom v\u0161ak zatia\u013e vo v\u0161eobecnosti nedosahuje \u00farove\u0148 intenzity aktiv\u00edt, ktor\u00fa <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q4-2023-q1-2024.pdf#page=11\">v\u00fdskumn\u00edci spolo\u010dnosti ESET<\/a> pozorovali po \u00fatoku na Izrael 7. okt\u00f3bra 2023. M\u00f4\u017ee to by\u0165 \u010diasto\u010dne ved\u013eaj\u0161\u00edm efektom takmer \u00fapln\u00e9ho odpojenia Ir\u00e1nu od internetu, ktor\u00e9 z&nbsp;ve\u013ekej \u010dasti t\u00e1to krajina zaviedla.<\/p>\n\n\n\n<p>V ka\u017edom pr\u00edpade, ako uviedla aj skupina Google Threat Analysis Group (TAG) vo <a href=\"https:\/\/services.google.com\/fh\/files\/misc\/tool-of-first-resort-israel-hamas-war-cyber.pdf\">svojej anal\u00fdze<\/a> kybernetickej aktivity v s\u00favislosti s vojnou medzi Izraelom a Hamasom, \u201ekybernetick\u00e9 kapacity [\u2026] s\u00fa n\u00e1strojom prvej vo\u013eby\u201c. Toto kon\u0161tatovanie plat\u00ed aj dnes \u2013 a potvrdil ho prv\u00fd ve\u013ek\u00fd kybernetick\u00fd \u00fatok od za\u010diatku vojny, ku ktor\u00e9mu do\u0161lo 12. marca. \u00datok zameran\u00fd na vymazanie d\u00e1t, ktor\u00fd uskuto\u010dnila proir\u00e1nska hacktivistick\u00e1 skupina Hamdala na americk\u00fa spolo\u010dnos\u0165 Stryker p\u00f4sobiacu v oblasti zdravotn\u00edckej technol\u00f3gie, <a href=\"https:\/\/www.zetter-zeroday.com\/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems\/\">\u00fadajne sp\u00f4sobil<\/a> celosvetov\u00e9 vypnutie syst\u00e9mov tejto spolo\u010dnosti.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"527\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image.png\" alt=\"\" class=\"wp-image-6514\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image.png 943w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image-300x168.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image-768x429.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image-370x207.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image-760x425.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/image-270x152.png 270w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok 1: Pozadie pracovnej plochy nastaven\u00e9 wiperom CyberToufan, ktor\u00fd v janu\u00e1ri 2025 za\u00fato\u010dil na 50 organiz\u00e1ci\u00ed v Izraeli (zdroj: ESET APT Activity Report Q4 2024 \u2013 Q1 2025)<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako zosta\u0165 odoln\u00fd: na \u010do sa zamera\u0165<\/h2>\n\n\n\n<p>Hrozby siahaj\u00fa od pr\u00edle\u017eitostn\u00fdch DDoS \u00fatokov a kampan\u00ed zameran\u00fdch na po\u0161kodenie webov\u00fdch str\u00e1nok cez cielen\u00e9 \u00fatoky na vymazanie d\u00e1t a kyber\u0161pion\u00e1\u017e s dlh\u00fdm zotrv\u00e1van\u00edm v syst\u00e9me a\u017e po po\u0161kodenie dod\u00e1vate\u013esk\u00e9ho re\u0165azca, ktor\u00e9 ne\u0161etr\u00ed ani organiz\u00e1cie bez priameho prepojenia s konfliktom. Opatrenia uveden\u00e9 ni\u017e\u0161ie bud\u00fa v\u00e4\u010d\u0161ine bezpe\u010dnostn\u00fdch t\u00edmov zn\u00e1me. Zameriavame sa na miesta, kde akt\u00e9ri spriaznen\u00ed s Ir\u00e1nom v minulosti nach\u00e1dzali slab\u00e9 miesta.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zistite, \u010do je vystaven\u00e9 riziku<\/h3>\n\n\n\n<p>Za\u010dnite identifik\u00e1ciou a zabezpe\u010den\u00edm v\u0161etk\u00e9ho, \u010do je vystaven\u00e9 internetu: vzdialen\u00fd pr\u00edstup, webov\u00e9 aplik\u00e1cie, br\u00e1ny VPN a zariadenia OT\/ICS pripojen\u00e9 k internetu, ak va\u0161a organiz\u00e1cia prev\u00e1dzkuje tak\u00e9to syst\u00e9my. Predvolen\u00e9 prihlasovacie \u00fadaje by sa mali zmeni\u0165 na v\u0161etk\u00fdch zariadeniach. Ak zariadenie nepodporuje siln\u00fa autentiz\u00e1ciu, zv\u00e1\u017ete, \u010di by malo by\u0165 v\u00f4bec pripojen\u00e9 k verejn\u00e9mu internetu.<\/p>\n\n\n\n<p>Kampa\u0148 CyberAv3ngers v roku 2023 bola zameran\u00e1 na programovate\u013en\u00e9 logick\u00e9 kontrol\u00e9ry (PLC), ktor\u00e9 st\u00e1le mali predvolen\u00e9 hesl\u00e1 z v\u00fdroby. <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-335a\">Odpor\u00fa\u010danie CISA<\/a> rozober\u00e1 konkr\u00e9tne pou\u017eit\u00e9 techniky a stoj\u00ed za to si ho podrobne pre\u010d\u00edta\u0165, ak va\u0161a organiz\u00e1cia prev\u00e1dzkuje priemyseln\u00e9 riadiace syst\u00e9my.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Obmedzte \u00fato\u010dn\u00fa plochu<\/h3>\n\n\n\n<p>Prostredia OT\/ICS predstavuj\u00fa \u0161pecifick\u00fa v\u00fdzvu: zariadenia nasaden\u00e9 pred desiatkami rokov bez oh\u013eadu na bezpe\u010dnostn\u00e9 po\u017eiadavky, ktor\u00e9 sa zriedka inventarizuj\u00fa. Najvidite\u013enej\u0161\u00edmi probl\u00e9mami s\u00fa predvolen\u00e9 prihlasovacie \u00fadaje a vystavenie internetu, \u0161ir\u0161\u00edm probl\u00e9mom v\u0161ak je, \u017ee mnoh\u00e9 z t\u00fdchto syst\u00e9mov neboli nikdy navrhnut\u00e9 tak, aby boli po nasaden\u00ed zabezpe\u010den\u00e9.<\/p>\n\n\n\n<p>Odpojte zariadenia OT\/ICS od verejn\u00e9ho internetu, kdeko\u013evek je to prev\u00e1dzkovo mo\u017en\u00e9. Kdeko\u013evek je to mo\u017en\u00e9, nain\u0161talujte v\u0161etky dostupn\u00e9 opravy, preto\u017ee zranite\u013en\u00e9 zariadenia pripojen\u00e9 k internetu zost\u00e1vaj\u00fa jedn\u00fdm z najspo\u013eahlivej\u0161\u00edch vstupn\u00fdch bodov pre \u00fato\u010dn\u00edkov. Ak to nie je mo\u017en\u00e9, vyn\u00fa\u0165te segment\u00e1ciu siete medzi prostred\u00edm IT a OT a stanovte referen\u010dn\u00e9 hodnoty spr\u00e1vania pre priemyseln\u00e9 protokoly, aby mohla abnorm\u00e1lna prev\u00e1dzka sp\u00fa\u0161\u0165a\u0165 v\u00fdstrahy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Odstr\u00e1\u0148te slab\u00e9 miesta<\/h3>\n\n\n\n<p>V\u00e4\u010d\u0161ina ir\u00e1nskych skup\u00edn podporovan\u00fdch \u0161t\u00e1tom sa s\u00fastavne zameriava na kompromit\u00e1ciu ident\u00edt. <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-290a\">Spolo\u010dn\u00e9 varovanie<\/a> agent\u00far CISA, FBI a NSA z okt\u00f3bra 2024 zdokumentovalo ro\u010dn\u00fa kampa\u0148, v r\u00e1mci ktorej ir\u00e1nski akt\u00e9ri vyu\u017e\u00edvali met\u00f3du \u201epassword spraying\u201c a \u201epush-bombing\u201c pri viacfaktorovej autentifik\u00e1cii (MFA) (zaplavovanie pou\u017e\u00edvate\u013eov \u017eiados\u0165ami o prihl\u00e1senie, k\u00fdm niekto jednu neschv\u00e1li), aby prenikli do organiz\u00e1ci\u00ed v oblasti zdravotn\u00edctva, \u0161t\u00e1tnej spr\u00e1vy, energetiky a IT. Po preniknut\u00ed dovn\u00fatra upravili registr\u00e1ciu MFA, aby si zaistili trval\u00fd pr\u00edstup, a z\u00edskan\u00e9 prihlasovacie \u00fadaje predali na krimin\u00e1lnych f\u00f3rach.<\/p>\n\n\n\n<p>Na boj proti tejto hrozbe zav\u00e1dzajte MFA odoln\u00fa vo\u010di phishingu vo v\u0161etk\u00fdch syst\u00e9moch s extern\u00fdm pr\u00edstupom a skontrolujte existuj\u00face konfigur\u00e1cie MFA, \u010di neobsahuj\u00fa neautorizovan\u00e9 registr\u00e1cie.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Skontrolujte svoj dod\u00e1vate\u013esk\u00fd re\u0165azec a pr\u00edstup tret\u00edch str\u00e1n<\/h3>\n\n\n\n<p>Skontrolujte v\u0161etky cesty pr\u00edstupu <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/10-najvacsich-hrozieb\/5-utoky-na-dodavatelsky-retazec-zasah-cez-partnerov\/\">tret\u00edch str\u00e1n<\/a> a in\u00e9 cesty vzdialen\u00e9ho pr\u00edstupu. Vzh\u013eadom na to, \u017ee skupiny ako CyberAv3ngers sa \u0161pecializuj\u00fa na izraelsk\u00e9 zariadenia OT, skontrolujte, \u010di niektor\u00e9 z va\u0161ich zariaden\u00ed nepatr\u00ed do tejto kateg\u00f3rie.<\/p>\n\n\n\n<p>Ak vyu\u017e\u00edvate slu\u017eby MSP, informujte sa, ako zabezpe\u010duj\u00fa svoje n\u00e1stroje na vzdialen\u00fd pr\u00edstup a \u010di v s\u00favislosti s konfliktom prehodnotili svoje vlastn\u00e9 rizik\u00e1. Vyu\u017eitie n\u00e1stroja SimpleHelp skupinou MuddyWater u MSP uk\u00e1zalo, \u017ee bezpe\u010dnostn\u00e1 situ\u00e1cia v\u00e1\u0161ho poskytovate\u013ea je v podstate s\u00fa\u010das\u0165ou va\u0161ej \u00fato\u010dnej plochy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">D\u00e1vajte si pozor na phishing<\/h3>\n\n\n\n<p>Ke\u010f\u017ee MuddyWater a \u010fal\u0161ie skupiny \u010dasto vyu\u017e\u00edvaj\u00fa pr\u00edstupy zameran\u00e9 na \u013eud\u00ed, najm\u00e4 spearphishingov\u00e9 spr\u00e1vy od napadnut\u00fdch intern\u00fdch \u00fa\u010dtov, zamestnanci musia overova\u0165 v\u0161etky po\u017eiadavky prostredn\u00edctvom samostatn\u00fdch kan\u00e1lov, najm\u00e4 tie, ktor\u00e9 sa t\u00fdkaj\u00fa prihlasovac\u00edch \u00fadajov, zmien pr\u00edstupov\u00fdch pr\u00e1v, naliehav\u00fdch \u201ebezpe\u010dnostn\u00fdch aktualiz\u00e1ci\u00ed\u201c a \u010dohoko\u013evek, \u010do s\u00favis\u00ed so s\u00fa\u010dasn\u00fdm konfliktom.<\/p>\n\n\n\n<p>\u00dato\u010dn\u00edci pou\u017e\u00edvaj\u00fa <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/distillation-experimentation-integration-ai-adversarial-use\">be\u017en\u00e9 n\u00e1stroje umelej inteligencie<\/a> nielen na generovanie sofistikovan\u00fdch phishingov\u00fdch n\u00e1vnad, ale aj na \u010fal\u0161ie kroky v priebehu cel\u00e9ho \u017eivotn\u00e9ho cyklu \u00fatoku, vr\u00e1tane vyh\u013ead\u00e1vania zranite\u013enost\u00ed a podpory v\u00fdvoja malv\u00e9ru.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zmapujte si svoje z\u00e1vislosti v cloude<\/h3>\n\n\n\n<p>Zistite, na ktor\u00fdch poskytovate\u013eov softv\u00e9ru ako slu\u017eby (SaaS) ste z\u00e1visl\u00ed, a zistite, kde je ich infra\u0161trukt\u00fara umiestnen\u00e1. Aj ke\u010f vy sami neprev\u00e1dzkujete cloudov\u00e9 prostredia na Bl\u00edzkom v\u00fdchode, va\u0161i poskytovatelia ich tam m\u00f4\u017eu prev\u00e1dzkova\u0165. Po v\u00fdpadkoch AWS vydalo viacero dod\u00e1vate\u013eov, vr\u00e1tane Snowflake a Red Hat, odpor\u00fa\u010dania t\u00fdkaj\u00face sa prechodu na z\u00e1lo\u017en\u00fd syst\u00e9m, \u010d\u00edm efekt\u00edvne pripomenuli svojim z\u00e1kazn\u00edkom, \u017ee region\u00e1lne v\u00fdpadky cloudu sa \u0161\u00edria cez dod\u00e1vate\u013esk\u00fd re\u0165azec sp\u00f4sobmi, ktor\u00e9 nie s\u00fa v\u017edy vidite\u013en\u00e9, k\u00fdm nie\u010do neprestane fungova\u0165. AWS napr\u00edklad v\u00fdslovne odporu\u010dil z\u00e1kazn\u00edkom s&nbsp;cloudov\u00fdmi workloadmi na Bl\u00edzkom v\u00fdchode, aby ich migrovali.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pripravte sa na zni\u010denie, nielen na kr\u00e1de\u017e<\/h3>\n\n\n\n<p>Po\u010das oper\u00e1ci\u00ed v bl\u00edzkosti konfliktov maj\u00fa akt\u00e9ri spriaznen\u00ed so \u0161t\u00e1tom tendenciu uprednost\u0148ova\u0165 programy na vymazanie d\u00e1t pred ransomv\u00e9rom. V ka\u017edom pr\u00edpade sa uistite, \u017ee aspo\u0148 jedna k\u00f3pia kritick\u00fdch z\u00e1loh je offline a izolovan\u00e1, a nie len replikovan\u00e1 do inej cloudovej oblasti, ktor\u00e1 m\u00f4\u017ee zdie\u013ea\u0165 rovnak\u00e9 z\u00e1kladn\u00e9 z\u00e1vislosti.<\/p>\n\n\n\n<p>Otestujte, \u010di v\u00e1\u0161 pl\u00e1n obnovy po hav\u00e1rii pokr\u00fdva v\u00fdpadok cloudu v celej oblasti, preto\u017ee v\u00e4\u010d\u0161ina pl\u00e1nov je postaven\u00e1 na zlyhan\u00ed jednej z\u00f3ny. D\u00f4le\u017eit\u00e9 je overi\u0165, \u010di sa va\u0161e z\u00e1lohy skuto\u010dne obnovia, preto\u017ee wiper a in\u00fd \u0161kodliv\u00fd softv\u00e9r sa niekedy zameriavaj\u00fa konkr\u00e9tne na z\u00e1lohovacie syst\u00e9my.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">V\u0161etko je dovolen\u00e9<\/h3>\n\n\n\n<p>Situ\u00e1cia v oblasti hrozieb sa bude s v\u00fdvojom konfliktu na\u010falej meni\u0165. Hluk zo strany hacktivistov sa m\u00f4\u017ee zintenz\u00edvni\u0165 alebo ut\u00edchnu\u0165, zatia\u013e \u010do oper\u00e1cie typu APT sa zvy\u010dajne vyv\u00edjaj\u00fa pomal\u0161ie a na povrch vypl\u00e1vaj\u00fa nesk\u00f4r. V tomto prostred\u00ed si najlep\u0161ie ved\u00fa spravidla tie organiz\u00e1cie, ktor\u00e9 u\u017e predt\u00fdm, ako sa hrozba stala ak\u00fatnou, odstr\u00e1nili z\u00e1kladn\u00e9 nedostatky. Ak e\u0161te nie s\u00fa hotov\u00e9 z\u00e1kladn\u00e9 \u00falohy (napr\u00edklad inventariz\u00e1cia akt\u00edv), s\u00fa\u010dasn\u00e1 situ\u00e1cia je dostato\u010dn\u00fdm d\u00f4vodom na ich ur\u00fdchlenie.<\/p>\n\n\n\n<p>Nakoniec, ak m\u00e1 va\u0161a organiz\u00e1cia pr\u00edstup ku kvalitn\u00fdm <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/threat-intelligence\/\">inform\u00e1ci\u00e1m a v\u00fdskumu v oblasti hrozieb<\/a>, teraz je \u010das venova\u0165 im zv\u00fd\u0161en\u00fa pozornos\u0165.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kybernetick\u00e9 d\u00f4sledky vojny na Bl\u00edzkom v\u00fdchode \u010faleko presahuj\u00fa hranice regi\u00f3nu. Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti. Tu s\u00fa oblasti, na ktor\u00e9 by ste mali zamera\u0165 svoju pozornos\u0165. Vojna v Ir\u00e1ne trvala menej ako 24 hod\u00edn, ke\u010f do\u0161lo k historick\u00e9mu prvenstvu: \u00famyseln\u00e9mu \u00fatoku na komer\u010dn\u00e9 d\u00e1tov\u00e9 centr\u00e1. 1. marca ir\u00e1nske drony zasiahli&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-6512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ir\u00e1n: ak\u00e9 kybernetick\u00e9 d\u00f4sledky m\u00e1 vojna pre firmy | ESET<\/title>\n<meta name=\"description\" content=\"Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ir\u00e1n: ak\u00e9 kybernetick\u00e9 d\u00f4sledky m\u00e1 vojna pre firmy | ESET\" \/>\n<meta property=\"og:description\" content=\"Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-13T13:13:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T13:13:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Ir\u00e1n a kybernetick\u00e9 d\u00f4sledky vojny: na \u010do by sa firmy mali pripravi\u0165\",\"datePublished\":\"2026-03-13T13:13:32+00:00\",\"dateModified\":\"2026-03-13T13:13:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/\"},\"wordCount\":2733,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/Iran-cyber-fallout-1.jpg\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/\",\"name\":\"Ir\u00e1n: ak\u00e9 kybernetick\u00e9 d\u00f4sledky m\u00e1 vojna pre firmy | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/Iran-cyber-fallout-1.jpg\",\"datePublished\":\"2026-03-13T13:13:32+00:00\",\"dateModified\":\"2026-03-13T13:13:33+00:00\",\"description\":\"Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/Iran-cyber-fallout-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/Iran-cyber-fallout-1.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"BVF Iran ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ir\u00e1n a kybernetick\u00e9 d\u00f4sledky vojny: na \u010do by sa firmy mali pripravi\u0165\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ir\u00e1n: ak\u00e9 kybernetick\u00e9 d\u00f4sledky m\u00e1 vojna pre firmy | ESET","description":"Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/","og_locale":"sk_SK","og_type":"article","og_title":"Ir\u00e1n: ak\u00e9 kybernetick\u00e9 d\u00f4sledky m\u00e1 vojna pre firmy | ESET","og_description":"Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2026-03-13T13:13:32+00:00","article_modified_time":"2026-03-13T13:13:33+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"12 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Ir\u00e1n a kybernetick\u00e9 d\u00f4sledky vojny: na \u010do by sa firmy mali pripravi\u0165","datePublished":"2026-03-13T13:13:32+00:00","dateModified":"2026-03-13T13:13:33+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/"},"wordCount":2733,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1.jpg","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/","name":"Ir\u00e1n: ak\u00e9 kybernetick\u00e9 d\u00f4sledky m\u00e1 vojna pre firmy | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1.jpg","datePublished":"2026-03-13T13:13:32+00:00","dateModified":"2026-03-13T13:13:33+00:00","description":"Hackersk\u00e9 skupiny napojen\u00e9 na Ir\u00e1n a \u0161ir\u0161ie dopady konfliktu zvy\u0161uj\u00fa riziko pre organiz\u00e1cie aj mimo zasiahnutej oblasti.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/Iran-cyber-fallout-1.jpg","width":1920,"height":1080,"caption":"BVF Iran ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/iran-a-kyberneticke-dosledky-vojny-na-co-by-sa-firmy-mali-pripravit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ir\u00e1n a kybernetick\u00e9 d\u00f4sledky vojny: na \u010do by sa firmy mali pripravi\u0165"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6512"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6512\/revisions"}],"predecessor-version":[{"id":6517,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6512\/revisions\/6517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6516"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}