
{"id":184,"date":"2007-05-18T22:53:29","date_gmt":"2007-05-19T01:53:29","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=184"},"modified":"2007-05-18T22:53:29","modified_gmt":"2007-05-19T01:53:29","slug":"nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/","title":{"rendered":"Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian"},"content":{"rendered":"<p><a href=\"http:\/\/www.f-secure.com\/weblog\/archives\/archive-052007.html#00001194\">Tal y como cuentan en el laboratorio de F-Secure<\/a>, uno de los referentes m\u00c3\u00a1s importantes a nivel mundial en la investigaci\u00c3\u00b3n del malware en telefon\u00c3\u00ada m\u00c3\u00b3vil, los usuarios de <a href=\"http:\/\/es.wikipedia.org\/wiki\/Symbian_OS\">Symbian<\/a> tienen alguna que otra amenaza ah\u00c3\u00ad fuera esper\u00c3\u00a1ndoles.<\/p>\n<p><img decoding=\"async\" alt=\"nokia trojans\" src=\"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg\" \/><\/p>\n<p>Se han identificado tres nuevos troyanos espec\u00c3\u00adficos para Symbian S60 2nd Edition y algunos dispositivos anteriores. <a href=\"http:\/\/www.f-secure.com\/v-descs\/trojan_symbos_viver_a.shtml\">Esta familia de troyanos, bautizada como Viver<\/a>, se presenta como un conjunto de supuestas utilidades para tel\u00c3\u00a9fonos Symbian. Al parecer, estas presuntas utilidades han sido subidas a un servicio de descarga muy popular, con la esperanza de obtener la m\u00c3\u00a1s r\u00c3\u00a1pida difusi\u00c3\u00b3n posible.<\/p>\n<p>Tras la instalaci\u00c3\u00b3n, los troyanos Viver mandan mensajes SMS a n\u00c3\u00bameros de alta tarificaci\u00c3\u00b3n. Dado que los n\u00c3\u00bameros son completos, estos servicios de alta tarificaci\u00c3\u00b3n pueden ser alcanzados desde cualquier parte del mundo, incluso desde fuera de su lugar de origen, Rusia. La ganancia radica en que los ingresos de estos n\u00c3\u00bameros de tarificaci\u00c3\u00b3n especial son compartidos entre el proveedor y el cliente, en este caso, los atacantes.<\/p>\n<p>Anteriormente, otros troyanos como Wesber.A y Redbrowser hac\u00c3\u00adan cosas parecidas, pero con la salvedad de que son m\u00c3\u00a1s primitivos y requieren, para cada mensaje enviado, aceptaci\u00c3\u00b3n expresa del usuario. Adem\u00c3\u00a1s funcionan mal fuera de Rusia, dado que emplean servicios configurados muy espec\u00c3\u00adficamente.<\/p>\n<p>La familia Viver es m\u00c3\u00a1s avanzada. Puede operar en cualquier lado del planeta, y no requiere que el usuario acepte expresamente ning\u00c3\u00ban env\u00c3\u00ado. Las tres variantes son detectadas por los productos antivirus de telefon\u00c3\u00ada m\u00c3\u00b3vil de F-Secure.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/wp\/\">http:\/\/www.sahw.com\/wp\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tal y como cuentan en el laboratorio de F-Secure, uno de los referentes m\u00c3\u00a1s importantes a nivel mundial en la investigaci\u00c3\u00b3n del malware en telefon\u00c3\u00ada m\u00c3\u00b3vil, los usuarios de Symbian tienen alguna que otra amenaza ah\u00c3\u00ad fuera esper\u00c3\u00a1ndoles. Se han identificado tres nuevos troyanos espec\u00c3\u00adficos para Symbian S60 2nd Edition y algunos dispositivos anteriores. Esta [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-184","post","type-post","status-publish","format-standard","hentry","category-noticias","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian\",\"datePublished\":\"2007-05-19T01:53:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/\"},\"wordCount\":290,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg\",\"articleSection\":[\"Noticias\",\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg\",\"datePublished\":\"2007-05-19T01:53:29+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage\",\"url\":\"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg\",\"contentUrl\":\"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian","datePublished":"2007-05-19T01:53:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/"},"wordCount":290,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage"},"thumbnailUrl":"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg","articleSection":["Noticias","Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/","url":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva familia de troyanos para tel\u00c3\u00a9fonos m\u00c3\u00b3viles basados en Symbian","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage"},"thumbnailUrl":"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg","datePublished":"2007-05-19T01:53:29+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/nueva-familia-de-troyanos-para-telefonos-moviles-basados-en-symbian\/#primaryimage","url":"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg","contentUrl":"http:\/\/www.f-secure.com\/weblog\/archives\/viver_b_2.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}