
{"id":239,"date":"2007-08-14T08:29:21","date_gmt":"2007-08-14T11:29:21","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=239"},"modified":"2007-08-14T08:29:21","modified_gmt":"2007-08-14T11:29:21","slug":"gigantesca-red-zombi-esta-lista-para-atacar","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/","title":{"rendered":"Gigantesca red zombi est\u00c3\u00a1 lista para atacar"},"content":{"rendered":"<p><img decoding=\"async\" vspace=\"0\" hspace=\"5\" border=\"1\" align=\"left\" src=\"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif\" \/> <span class=\"fecha-detalle\" \/><span class=\"titulo-head\"><\/p>\n<p>La red zombi m\u00c3\u00a1s grande del mundo est\u00c3\u00a1 compuesta por 1,7 millones de computadoras, que esperan un comando de activaci\u00c3\u00b3n para iniciar el ataque en l\u00c3\u00adnea m\u00c3\u00a1s grande de la historia.<\/span> <span class=\"texto-detalle\"><\/p>\n<p>Diario Ti: En alg\u00c3\u00ban lugar del mundo hay una persona con su dedo puesto sobre el bot\u00c3\u00b3n rojo que activar\u00c3\u00a1 el mayor ataque DDos (Distributed Denial of Service) visto hasta ahora. Normalmente, el primer paso para realizar un ataque de este tipo consiste en asumir el control de un gran n\u00c3\u00bamero de computadoras, que son convertidas en &#8220;zombis&#8221; sin voluntad, o &#8220;bots&#8221;, que pueden ser controlados a distancia por intrusos. Si todas las computadoras son activadas simult\u00c3\u00a1neamente para bombardear un sitio web o servidor simult\u00c3\u00a1neamente, el acceso al sitio es bloqueado totalmente. En el peor de los casos, un ataque de tales caracter\u00c3\u00adsticas puede afectar a un pa\u00c3\u00ads completo, como ocurri\u00c3\u00b3 en un ataque realizado contra Estonia hace algunos meses (ver art\u00c3\u00adculo de referencia).<\/span><\/p>\n<p><span class=\"texto-detalle\">Normalmente, una red zombi incluye 10-20.000 computadoras infectadas, que pueden ser controladas remotamente y ser usadas, por ejemplo, para extorsionar a propietarios de sitios web.<\/p>\n<p>Sin embargo, la red Storm Worm parece ser diferente. El gusano ha tenido una enorme propagaci\u00c3\u00b3n durante el \u00c3\u00baltimo semestre, parcialmente como archivo adjunto a correo electr\u00c3\u00b3nico y parcialmente induciendo a usuarios descuidados a hacer en clic en enlaces hacia sitios malignos. Storm Worm se propaga, por ejemplo, mediante correo electr\u00c3\u00b3nico con el texto &#8220;Your system is infected, please click on this link&#8221; (su sistema est\u00c3\u00a1 infectado, por favor haga clic en este enlace).<\/p>\n<p>Solo durante las \u00c3\u00baltimas dos semanas de julio se han registrado m\u00c3\u00a1s de 415 millones de correo spam con el gusano Storm Worm. Si el sistema es infectado se instala en este un rootkit que es muy dif\u00c3\u00adcil de detectar y eliminar. El rootkit escucha en Internet, a la espera de un comando que lo haga entrar en acci\u00c3\u00b3n.<\/p>\n<p>Sin embargo, lo curioso con Storm Worm es que el comando en cuesti\u00c3\u00b3n no ha sido enviado. Seg\u00c3\u00ban Future Zone, actualmente habr\u00c3\u00ada 1,7 millones de PC infectados con Storm Worm en todo el planeta, esperando el comando que les activar\u00c3\u00a1 como zombies. Seg\u00c3\u00ban la fuente, una peque\u00c3\u00b1a parte del \u00e2\u20ac\u0153ej\u00c3\u00a9rcito de zombis&#8221; est\u00c3\u00a1 siendo usado para propagar el gusano, en tanto que otra parte, igual de reducida, realiza ataques de prueba contra sitios anti-spam. Todo indica que se trata de ensayos previos a un inminente gran ataque.<\/p>\n<p>Por ahora se desconoce qui\u00c3\u00a9n controla la gigantesca red de zombis, ni cual es su objetivo. Sin embargo, si las 1,7 millones de computadoras son activadas para un ataque simult\u00c3\u00a1neo, se tratar\u00c3\u00ada del mayor acto de sabotaje cibern\u00c3\u00a9tico visto hasta ahora.<\/p>\n<p>Fuente: Futurezone.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La red zombi m\u00c3\u00a1s grande del mundo est\u00c3\u00a1 compuesta por 1,7 millones de computadoras, que esperan un comando de activaci\u00c3\u00b3n para iniciar el ataque en l\u00c3\u00adnea m\u00c3\u00a1s grande de la historia. Diario Ti: En alg\u00c3\u00ban lugar del mundo hay una persona con su dedo puesto sobre el bot\u00c3\u00b3n rojo que activar\u00c3\u00a1 el mayor ataque DDos [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-239","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Gigantesca red zombi est\u00c3\u00a1 lista para atacar<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Gigantesca red zombi est\u00c3\u00a1 lista para atacar\",\"datePublished\":\"2007-08-14T11:29:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/\"},\"wordCount\":474,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gigantesca red zombi est\u00c3\u00a1 lista para atacar\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif\",\"datePublished\":\"2007-08-14T11:29:21+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage\",\"url\":\"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif\",\"contentUrl\":\"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gigantesca red zombi est\u00c3\u00a1 lista para atacar","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Gigantesca red zombi est\u00c3\u00a1 lista para atacar","datePublished":"2007-08-14T11:29:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/"},"wordCount":474,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/","url":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gigantesca red zombi est\u00c3\u00a1 lista para atacar","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif","datePublished":"2007-08-14T11:29:21+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/gigantesca-red-zombi-esta-lista-para-atacar\/#primaryimage","url":"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif","contentUrl":"http:\/\/www.diarioti.com\/sisimg\/14929b_hackerobscuro.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/239\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}