
{"id":1701,"date":"2012-02-21T10:24:33","date_gmt":"2012-02-21T13:24:33","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1701"},"modified":"2012-02-21T10:24:33","modified_gmt":"2012-02-21T13:24:33","slug":"alertan-sobre-virus-que-infecta-otros-virus","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/","title":{"rendered":"Alertan sobre virus que infecta otros virus"},"content":{"rendered":"<div>M\u00c9XICO, DF Feb .- La combinaci\u00f3n entre un troyano y un gusano es un ataque sofisticado que pone en riesgo la informaci\u00f3n confidencial de los usuarios de internet, explicaron especialistas en seguridad inform\u00e1tica.<br \/>\nLa firma de seguridad<strong>\u00a0BitDefender<\/strong>\u00a0realiz\u00f3 un an\u00e1lisis cuyo principal hallazgo fue el\u00a0<strong><span style=\"text-decoration: underline;\">h\u00edbrido Frankenmalware<\/span><\/strong>. La muestra encontrada fue la del\u00a0<em><span style=\"text-decoration: underline;\">gusano Rimecud<\/span><\/em>, el cual a su vez fue infectado por el\u00a0<strong><span style=\"text-decoration: underline;\">troyano Virtob<\/span><\/strong>.<br \/>\n&#8220;<em>Imagine estas dos piezas de malware trabajando juntas, voluntariamente o no, en el mismo sistema comprometido. Esa PC enfrenta un malware doble con el doble de servidores de comando y control para consultar instrucciones. M\u00e1s a\u00fan, hay dos puertas traseras abiertas, dos t\u00e9cnicas de ataque activas y varios m\u00e9todos de propagaci\u00f3n puestos en marcha. Donde uno falla, el otro tiene \u00e9xito<\/em>&#8220;, explic\u00f3 Loredana Botezatu, analista de BitDefender.<\/p>\n<p>Por su parte,\u00a0<strong>UNAM-CERT<\/strong>\u00a0public\u00f3 una alerta donde advierte del poder que tendr\u00edan los atacantes al combinar malware, como es el caso del Frankenmalware.<br \/>\n&#8220;<em>Los virus est\u00e1n infectando accidentalmente a gusanos en las computadoras de las v\u00edctimas, creando cepas s\u00faper potentes de software h\u00edbrido<\/em>&#8220;, se\u00f1al\u00f3 el organismo de vigilancia y seguridad con sede en la UNAM, &#8220;<em>el monstruo de malware se propaga m\u00e1s r\u00e1pido que antes, afecta a los sistemas peor que nunca y expone datos privados en formas nunca antes vistas por los escritores originales de virus<\/em>&#8220;.<\/p>\n<p>De acuerdo con Pablo Ramos, especialista de Awareness and Research en\u00a0<strong>ESET Latinoam\u00e9rica<\/strong>, los usuarios que sean infectados por Frankenmalware podr\u00edan enfrentar problemas financieros por el robo de informaci\u00f3n, suplantaci\u00f3n de identidad y ser parte de redes botnets que sirven para enviar spam.<\/p>\n<p>Por su parte, John Harrison, director de producto del \u00e1rea Product Management Security Technology de<em>Symantec<\/em>\u00a0dijo que el h\u00edbrido atacar\u00eda a los usuarios con los m\u00e9todos que utilizan las formas de ataque tradicionales.<br \/>\n&#8220;<em>El usuario podr\u00eda recibir una liga en su correo electr\u00f3nico con un archivo infectado o en las redes sociales recibir una liga sobre alguna situaci\u00f3n impactante como la muerte de alguna celebridad o los resultados de un partido de futbol, o quiz\u00e1 a trav\u00e9s de un video donde te digan que debes descargar un reproductor para verlo<\/em>&#8220;, ejemplific\u00f3 Harrison.<br \/>\nEl especialista de Symantec dijo que los usuarios deben ser m\u00e1s cuidadosos sobre el supuesto contenido que se ofrece en internet y saber que si te dicen que debes descargar un software, lo m\u00e1s probable es que se trate de malware que infecte la computadora y comprometa su informaci\u00f3n.<\/div>\n<div><\/div>\n<div>Fuente:\u00a0<a href=\"http:\/\/www.elgolfo.info\/\">www.elgolfo.info<\/a><\/div>\n<div>Visto: <a href=\"http:\/\/seguridad-informacion.blogspot.com\/\">Cryptex<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>M\u00c9XICO, DF Feb .- La combinaci\u00f3n entre un troyano y un gusano es un ataque sofisticado que pone en riesgo la informaci\u00f3n confidencial de los usuarios de internet, explicaron especialistas en seguridad inform\u00e1tica. La firma de seguridad\u00a0BitDefender\u00a0realiz\u00f3 un an\u00e1lisis cuyo principal hallazgo fue el\u00a0h\u00edbrido Frankenmalware. La muestra encontrada fue la del\u00a0gusano Rimecud, el cual a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1701","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Alertan sobre virus que infecta otros virus<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Alertan sobre virus que infecta otros virus\",\"datePublished\":\"2012-02-21T13:24:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/\"},\"wordCount\":452,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Alertan sobre virus que infecta otros virus\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2012-02-21T13:24:33+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Alertan sobre virus que infecta otros virus","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Alertan sobre virus que infecta otros virus","datePublished":"2012-02-21T13:24:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/"},"wordCount":452,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/","url":"https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Alertan sobre virus que infecta otros virus","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2012-02-21T13:24:33+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/alertan-sobre-virus-que-infecta-otros-virus\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1701"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1701\/revisions"}],"predecessor-version":[{"id":1702,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1701\/revisions\/1702"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}