
{"id":1845,"date":"2012-07-13T14:23:41","date_gmt":"2012-07-13T17:23:41","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1845"},"modified":"2012-07-13T14:23:41","modified_gmt":"2012-07-13T17:23:41","slug":"las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/","title":{"rendered":"Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?"},"content":{"rendered":"<p>Ayer el\u00a0<a href=\"http:\/\/www.zdnet.com\/450000-user-passwords-leaked-in-yahoo-breach-7000000772\/\">grupo hacker D33ds Company reclam\u00f3 la responsabilidad por atacar un servicio de Yahoo y exponer 453.492 credenciales de ingreso en texto sin cifrar<\/a>. Yahoo hoy confirm\u00f3<a href=\"http:\/\/www.zdnet.com\/yahoo-confirms-400000-accounts-hacked-less-than-5-valid-7000000812\/\">400.000 de sus cuentas fueron hackeadas, aunque enfatiz\u00f3 que\u00a0<strong>menos del 5 por ciento<\/strong>\u00a0de las credenciales son v\u00e1lidas<\/a>. Puede verificar si su cuenta fue comprometida aqu\u00ed:\u00a0<a href=\"http:\/\/labs.sucuri.net\/?yahooleak\">Sucuri<\/a>.<\/p>\n<p>Cuando uno tiene 450.000 contrase\u00f1as, se puede hacer un poco de an\u00e1lisis.\u00a0<a href=\"http:\/\/blog.eset.se\/statistics-about-yahoo-leak-of-450-000-plain-text-accounts\/\">ESET<\/a>\u00a0uso el analizador de contrase\u00f1as\u00a0<a href=\"http:\/\/www.digininja.org\/projects\/pipal.php\">Pipal<\/a>\u00a0para compilar algunas estad\u00edsticas (el volcado completo de informaci\u00f3n est\u00e1 disponible en\u00a0<a href=\"http:\/\/pastebin.com\/2D6bHGTa\">Pastebin<\/a>).<\/p>\n<p>Para empezar, hab\u00edan aparentemente solo 442.773 contrase\u00f1as, contrariamente a la cifra mencionada m\u00e1s arriba. Segundo, 342.478 de ellas son \u00fanicas, lo que significa que 100.295 o sea el 22,65 % del total, fueron usadas por m\u00e1s de una persona.<\/p>\n<p>Aqui est\u00e1n la 10 contrase\u00f1as mas usadas del ataque a Yahoo:<\/p>\n<ol>\n<li>123456 = 1666 (0.38%)<\/li>\n<li>password = 780 (0.18%)<\/li>\n<li>welcome = 436 (0.1%)<\/li>\n<li>ninja = 333 (0.08%)<\/li>\n<li>abc123 = 250 (0.06%)<\/li>\n<li>123456789 = 222 (0.05%)<\/li>\n<li>12345678 = 208 (0.05%)<\/li>\n<li>sunshine = 205 (0.05%)<\/li>\n<li>princess = 202 (0.05%)<\/li>\n<li>qwerty = 172 (0.04%)<\/li>\n<\/ol>\n<p>Aqu\u00ed est\u00e1n las 10 principales palabras base del ataque a Yahoo:<\/p>\n<ol>\n<li>password = 1373 (0.31%)<\/li>\n<li>welcome = 534 (0.12%)<\/li>\n<li>qwerty = 464 (0.1%)<\/li>\n<li>monkey = 430 (0.1%)<\/li>\n<li>jesus = 429 (0.1%)<\/li>\n<li>love = 421 (0.1%)<\/li>\n<li>money = 407 (0.09%)<\/li>\n<li>freedom = 385 (0.09%)<\/li>\n<li>ninja = 380 (0.09%)<\/li>\n<li>writer = 367 (0.08%)<\/li>\n<\/ol>\n<p>Aqu\u00ed est\u00e1n los 10 dominios principales de las direcciones de e-mail:<\/p>\n<ol>\n<li>yahoo.com (31.07%)<\/li>\n<li>gmail.com (24.14%)<\/li>\n<li>hotmail.com (12.45%)<\/li>\n<li>aol.com (5.76%)<\/li>\n<li>comcast.net (1.93%)<\/li>\n<li>msn.com (1.44%)<\/li>\n<li>sbcglobal.net (1.17%)<\/li>\n<li>live.com (0.97%)<\/li>\n<li>verizon.net (0.68%)<\/li>\n<li>bellsouth.net (0.64%)<\/li>\n<\/ol>\n<p>Su tiene una cuenta Yahoo, deber\u00eda cambiar la contrase\u00f1a, solo para estar seguro. Adem\u00e1s, si usa la misma combinaci\u00f3n de direcci\u00f3n de correo y contrase\u00f1a en cualquier otra parte deber\u00eda tambi\u00e9n cambiarla.<\/p>\n<p><strong>Traducci\u00f3n: Ra\u00fal Batista &#8211;\u00a0<a href=\"http:\/\/www.segu-info.com.ar\/\">Segu-Info<\/a><\/strong><br \/>\nAutor:\u00a0<strong>Emil Protalinski<\/strong><br \/>\nFuente:\u00a0<a href=\"http:\/\/www.zdnet.com\/the-top-10-passwords-from-the-yahoo-hack-is-yours-one-of-them-7000000815\/\"><strong>ZDNet Blog &#8211; Zero Day<\/strong><\/a><\/p>\n<div><\/div>\n<p><a href=\"http:\/\/blog.segu-info.com.ar\/\" rel=\"cc:attributionURL\"><img decoding=\"async\" src=\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\" alt=\"Creative Commons License\" \/><\/a><br \/>\n<a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.5\/ar\/\" rel=\"license\">Creative Commons Atribuci\u00f3n-No Comercial-Compartir Obras Derivadas Igual 2.5<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ayer el\u00a0grupo hacker D33ds Company reclam\u00f3 la responsabilidad por atacar un servicio de Yahoo y exponer 453.492 credenciales de ingreso en texto sin cifrar. Yahoo hoy confirm\u00f3400.000 de sus cuentas fueron hackeadas, aunque enfatiz\u00f3 que\u00a0menos del 5 por ciento\u00a0de las credenciales son v\u00e1lidas. Puede verificar si su cuenta fue comprometida aqu\u00ed:\u00a0Sucuri. Cuando uno tiene 450.000 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1845","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?\",\"datePublished\":\"2012-07-13T17:23:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/\"},\"wordCount\":280,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"datePublished\":\"2012-07-13T17:23:41+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage\",\"url\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"contentUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?","datePublished":"2012-07-13T17:23:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/"},"wordCount":280,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/","url":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Las 10 contrase\u00f1as m\u00e1s usadas del ataque a Yahoo:\u00bfla tuya es una de esas?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","datePublished":"2012-07-13T17:23:41+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/las-10-contrasenas-mas-usadas-del-ataque-a-yahoola-tuya-es-una-de-esas\/#primaryimage","url":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","contentUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1845"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1845\/revisions"}],"predecessor-version":[{"id":1847,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1845\/revisions\/1847"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}