
{"id":1280,"date":"2011-03-10T08:47:25","date_gmt":"2011-03-10T11:47:25","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1280"},"modified":"2011-03-10T08:47:25","modified_gmt":"2011-03-10T11:47:25","slug":"archivos-pdf-como-vector-de-ataque-messagelabs","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/","title":{"rendered":"Archivos PDF como vector de ataque (MessageLabs)"},"content":{"rendered":"<p>Los archivos PDF maliciosos se han convertido en vector de ataque de elecci\u00f3n por parte de los atacantes, seg\u00fan un <a href=\"http:\/\/www.messagelabs.com\/mlireport\/MLI_2011_02_February_FINAL-en.PDF\">informe publicado por MessageLabs de Symantec<\/a>.<\/p>\n<p>Seg\u00fan el informe los archivos PDF son incluso m\u00e1s peligrosos que los   .EXE porque es mucho m\u00e1s f\u00e1cil ocultar contenido malicioso en archivos   PDF y gozan de cierta popularidad y de relativa confiabilidad.<\/p>\n<p>Los archivos PDF maliciosos ahora superan a los archivos multimedia,   archivos de ayuda, HTMLs y ejecutables en la distribuci\u00f3n de adjuntos   maliciosos utilizados en los ataques dirigidos.<\/p>\n<p>Sin embargo, cabe se\u00f1alar que los formatos de archivo de oficina son   todav\u00eda una opci\u00f3n popular y eficaz utilizados en algunos ataques   dirigidos. En 2009, aproximadamente el 52,6% de los ataques dirigidos   utilizan exploits PDF, en comparaci\u00f3n con el 65,0% en 2010, un aumento   del 12,4%. Si la tendencia se mantuviera al mismo ritmo que lo ha hecho   durante el \u00faltimo a\u00f1o, a mediados de 2011, el 76% del malware dirigido   podr\u00eda ser utilizado para ataques basados en PDF.<\/p>\n<p>Como resumen, el informe se\u00f1ala que los ataques dirigidos basados en   PDF est\u00e1 aqu\u00ed para quedarse, y se prev\u00e9 que empeore a medida que los   autores de malware sigan innovando en la entrega, la construcci\u00f3n y la   ofuscaci\u00f3n de las t\u00e9cnicas necesarias para este tipo de malware.<\/p>\n<p>Como siempre, el medio m\u00e1s eficaz de protecci\u00f3n es ser consciente de   los riesgos y tener precauci\u00f3n cuando se trata de cualquier contenido   adjunto en un mensaje de correo electr\u00f3nico.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.blogantivirus.com\/archivos-pdf-maliciosos-se-convierten-en-el-vector-de-ataque-de-eleccion-segun-informe?\">Blog Antivirus<\/a><\/p>\n<p>Visto\u00a0 en:<a href=\"http:\/\/blog.segu-info.com.ar\"> Segu-Info<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los archivos PDF maliciosos se han convertido en vector de ataque de elecci\u00f3n por parte de los atacantes, seg\u00fan un informe publicado por MessageLabs de Symantec. Seg\u00fan el informe los archivos PDF son incluso m\u00e1s peligrosos que los .EXE porque es mucho m\u00e1s f\u00e1cil ocultar contenido malicioso en archivos PDF y gozan de cierta popularidad [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1280","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Archivos PDF como vector de ataque (MessageLabs)<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Archivos PDF como vector de ataque (MessageLabs)\",\"datePublished\":\"2011-03-10T11:47:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/\"},\"wordCount\":269,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Archivos PDF como vector de ataque (MessageLabs)\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2011-03-10T11:47:25+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Archivos PDF como vector de ataque (MessageLabs)","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Archivos PDF como vector de ataque (MessageLabs)","datePublished":"2011-03-10T11:47:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/"},"wordCount":269,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/","url":"https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Archivos PDF como vector de ataque (MessageLabs)","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2011-03-10T11:47:25+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/archivos-pdf-como-vector-de-ataque-messagelabs\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1280"}],"version-history":[{"count":2,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1280\/revisions"}],"predecessor-version":[{"id":1282,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1280\/revisions\/1282"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}