
{"id":1301,"date":"2011-03-31T08:23:04","date_gmt":"2011-03-31T11:23:04","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1301"},"modified":"2011-03-31T08:23:04","modified_gmt":"2011-03-31T11:23:04","slug":"%c2%bfcuanto-se-gana-haciendo-spam","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/","title":{"rendered":"\u00bfCu\u00e1nto se gana haciendo spam?"},"content":{"rendered":"<p>Muchas veces nos hemos preguntado por qu\u00e9 demonios hay organizaciones  que mandan spam: \u00bfQu\u00e9 ganan con eso? \u00bfAlguien cae en esos tontos avisos  de venta de Viagra?<\/p>\n<p>Chris Kanich y un equipo de la Universidad de San Diego y el <a href=\"http:\/\/www.icsi.berkeley.edu\/\">Instituto Internacional de Ciencia Computacional<\/a> decidieron averiguarlo, de modo que secuestraron un botnet y se  pusieron a investigar. El equipo infect\u00f3 intencionalmente ocho  computadores con un virus intermediario para interceptar las  instrucciones que el botmaster enviaba a los PCs zombies.<\/p>\n<p>Luego, cambiaron esas \u00f3rdenes, convirtiendo a toda la red de bots en un  zombie para la investigaci\u00f3n. En lugar de enviar el tr\u00e1fico (de los  pobres incautos que creen los avisos de Viagra) al sitio del botmaster,  los avisos del spam redirig\u00edan a un sitio armado por el equipo de  Kanich. La web parec\u00eda una farmacia en internet aut\u00e9ntica, pero en lugar  de cobrar de tarjetas de cr\u00e9dito y enviar pastillas de az\u00facar al que  cay\u00f3 en la trampa, el sitio lanzaba un error al visitante, y contaba el  n\u00famero de clicks.<\/p>\n<p><a name=\"more\"><\/a>De este modo, calcularon cu\u00e1nta gente ca\u00eda en la  trampa y segu\u00eda los links que vienen en el spam. Tomando en cuenta el  precio promedio de los productos ofrecidos y el porcentaje de gente que  hac\u00eda click para comprar, los investigadores desarrollaron una ecuaci\u00f3n  para calcular cu\u00e1nto pod\u00eda ganar un spammer, y llegaron a la conclusi\u00f3n  de que, al d\u00eda, consegu\u00edan un promedio de US$7.000.<\/p>\n<p>Esta es la ecuaci\u00f3n:<\/p>\n<div><a rel=\"lytebox\" href=\"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s1600\/spamecuacioon-595x373.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg\" border=\"0\" alt=\"\" width=\"400\" height=\"250\" \/><\/a><\/div>\n<p><strong>G<\/strong>: Ingreso diario (US$7.000)<br \/>\n<strong>E<\/strong>: N\u00famero de correos spam que un botmaster ordena enviar a los zombies (1,7 millones)<br \/>\n<strong>M<\/strong>: N\u00famero de PCs intermediarios (550)<br \/>\n<strong>D<\/strong>: Porcentaje de e-mails enviados (23,8%)<br \/>\n<strong>F<\/strong>: Porcentaje de mails que no fueron detenidos por filtros de spam (var\u00eda seg\u00fan el proveedor del servicio de correo)<br \/>\n<strong>V<\/strong>: Porcentaje de usuarios que hacen click en los links (F x V = 0,0127%)<br \/>\n<strong>B<\/strong>: Porcentaje de usuarios que compran un producto v\u00eda spam (0,266%)<br \/>\n<strong>P<\/strong>: Precio promedio de compra de un producto (US$100)<\/p>\n<p>Fuente: <a href=\"http:\/\/www.fayerwayer.com\/2011\/03\/cuanto-se-gana-haciendo-spam\/\">Fayer Wayer<\/a> y <a href=\"http:\/\/www.wired.com\/magazine\/2011\/02\/st_equation_spamprofits\/\">Wired<\/a> (en ingl\u00e9s)<\/p>\n<p>Visto:\u00a0 <a href=\"http:\/\/blog.segu-info.com.ar\">Segu-Info<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Muchas veces nos hemos preguntado por qu\u00e9 demonios hay organizaciones que mandan spam: \u00bfQu\u00e9 ganan con eso? \u00bfAlguien cae en esos tontos avisos de venta de Viagra? Chris Kanich y un equipo de la Universidad de San Diego y el Instituto Internacional de Ciencia Computacional decidieron averiguarlo, de modo que secuestraron un botnet y se [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1301","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfCu\u00e1nto se gana haciendo spam?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\u00bfcuanto-se-gana-haciendo-spam\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfCu\u00e1nto se gana haciendo spam?\",\"datePublished\":\"2011-03-31T11:23:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/\"},\"wordCount\":361,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfCu\u00e1nto se gana haciendo spam?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg\",\"datePublished\":\"2011-03-31T11:23:04+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage\",\"url\":\"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg\",\"contentUrl\":\"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfCu\u00e1nto se gana haciendo spam?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/\u00bfcuanto-se-gana-haciendo-spam\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfCu\u00e1nto se gana haciendo spam?","datePublished":"2011-03-31T11:23:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/"},"wordCount":361,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage"},"thumbnailUrl":"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/","url":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfCu\u00e1nto se gana haciendo spam?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage"},"thumbnailUrl":"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg","datePublished":"2011-03-31T11:23:04+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-se-gana-haciendo-spam\/#primaryimage","url":"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg","contentUrl":"http:\/\/1.bp.blogspot.com\/-FCa7z6u_xAA\/TZJLZZSjYMI\/AAAAAAAADCY\/Vhrl9p6QZnc\/s400\/spamecuacioon-595x373.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1301"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1301\/revisions"}],"predecessor-version":[{"id":1302,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1301\/revisions\/1302"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}