
{"id":1822,"date":"2012-06-06T12:16:59","date_gmt":"2012-06-06T15:16:59","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1822"},"modified":"2012-06-06T12:16:59","modified_gmt":"2012-06-06T15:16:59","slug":"hashes-de-contrasenas-de-linkedin-publicadas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/","title":{"rendered":"Hashes de contrase\u00f1as de Linkedin publicadas"},"content":{"rendered":"<p><a href=\"https:\/\/www.securityweek.com\/rumor-linkedin-hacked-password-hashes-dumped-russian-forum\">Seg\u00fan varias fuentes<\/a>, una lista de contrase\u00f1a de Linkedin hashedas con SHA1 (sin SALT) han sido publicadas en un foro ruso.\u00a0<a href=\"https:\/\/disk.yandex.net\/disk\/public\/?hash=pCAcIfV7wxXCL\/YPhObEEH5u5PKPlp%2BmuGtgOEptAS4%3D\">Esta lista<\/a>, que no se ha confirmado si es de la red social,\u00a0<a href=\"http:\/\/www.theverge.com\/2012\/6\/6\/3067523\/linkedin-password-leak-online\">contiene alrededor de 6,46 millones de registros<\/a>\u00a0y se habr\u00eda subido a un foro de Rusia a principios de esta semana.<\/p>\n<p>Un experto consultado dice que hay indicios de que las contrase\u00f1as podr\u00edan ser de la empresa. La historia apareci\u00f3 el mi\u00e9rcoles en<a href=\"http:\/\/www.dagensit.no\/article2411857.ece\">Dangens TI<\/a>\u00a0y de acuerdo a\u00a0<a href=\"https:\/\/twitter.com\/thorsheim\/status\/210362042824130560\">varias personas<\/a>\u00a0que han trabajado con la lista, unas 300.000 contrase\u00f1as ya han sido crackeadas y un examen de los hashes que ha sido\u00a0<a href=\"http:\/\/forum.insidepro.com\/viewtopic.php?t=14909\">publicados en foros InsidePro<\/a>, muestra que las claves utilizan &#8220;LinkedIn&#8221; de alguna manera.<\/p>\n<p>Vale la pena repetir que, aparte de esto, no hay pruebas para confirmar que la red social haya sufrido alg\u00fan tipo de incidente de seguridad. Hasta el momento s\u00f3lo se han publicado los hashes de las contrase\u00f1as, sin nombres de usuario, pero se desconoce si los autores de la lista simplemente eliminaron los nombres de usuario al publicar la lista o si no los tienen.<\/p>\n<p>Hasta el momento Linkedin no ha confirmado los datos y dice que se encuentra investigando el caso.<\/p>\n<p><strong>Algunas preguntas que se podr\u00edan hacer:<\/strong>\u00a0\u00bfpor qu\u00e9 Linkedin todav\u00eda usa SHA1? \u00bfpor qu\u00e9 usa SHA1 sin saltear? \u00bfpara qu\u00e9 cambiar la contrase\u00f1a si quiz\u00e1s existe una brecha y los delincuentes podr\u00edan robar la base de datos de nuevo? \u00bfcu\u00e1nto falta para que comience a llegar spam con falsos anuncios de Linkedin?<\/p>\n<p><strong>Recomendaci\u00f3n: por ahora cambie su contrase\u00f1a de Linkedin y en todos los lugares donde use la misma.<\/strong><\/p>\n<p><strong>Cristian de la Redacci\u00f3n de\u00a0<a href=\"http:\/\/www.segu-info.com.ar\/\">Segu-Info<\/a><\/strong><\/p>\n<p><a href=\"http:\/\/blog.segu-info.com.ar\/\" rel=\"cc:attributionURL\"><img decoding=\"async\" src=\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\" alt=\"Creative Commons License\" \/><\/a><br \/>\n<a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.5\/ar\/\" rel=\"license\">Creative Commons Atribuci\u00f3n-No Comercial-Compartir Obras Derivadas Igual 2.5<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00fan varias fuentes, una lista de contrase\u00f1a de Linkedin hashedas con SHA1 (sin SALT) han sido publicadas en un foro ruso.\u00a0Esta lista, que no se ha confirmado si es de la red social,\u00a0contiene alrededor de 6,46 millones de registros\u00a0y se habr\u00eda subido a un foro de Rusia a principios de esta semana. Un experto consultado [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1822","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Hashes de contrase\u00f1as de Linkedin publicadas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Hashes de contrase\u00f1as de Linkedin publicadas\",\"datePublished\":\"2012-06-06T15:16:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/\"},\"wordCount\":308,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hashes de contrase\u00f1as de Linkedin publicadas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"datePublished\":\"2012-06-06T15:16:59+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage\",\"url\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"contentUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hashes de contrase\u00f1as de Linkedin publicadas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Hashes de contrase\u00f1as de Linkedin publicadas","datePublished":"2012-06-06T15:16:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/"},"wordCount":308,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/","url":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hashes de contrase\u00f1as de Linkedin publicadas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","datePublished":"2012-06-06T15:16:59+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/hashes-de-contrasenas-de-linkedin-publicadas\/#primaryimage","url":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","contentUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1822"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1822\/revisions"}],"predecessor-version":[{"id":1824,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1822\/revisions\/1824"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}