
{"id":347,"date":"2008-05-29T08:28:04","date_gmt":"2008-05-29T11:28:04","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=347"},"modified":"2008-05-29T08:28:04","modified_gmt":"2008-05-29T11:28:04","slug":"incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/","title":{"rendered":"Incrementa el tiempo de actividad de los sites de phishing"},"content":{"rendered":"<p>Trend Micro informa que detr\u00c3\u00a1s de las avalanchas de phishing se encuentra la creciente popularidad de una t\u00c3\u00a9cnica espec\u00c3\u00adfica y una serie de herramientas conocidas como \u00e2\u20ac\u0153Rock Phish&#8221;.<br \/>\nLos creadores de Rock Phish tienen la seria intenci\u00c3\u00b3n de defraudar a la gente y de ocultar los sites de phishing utilizando un \u00e2\u20ac\u0153flujo r\u00c3\u00a1pido&#8221; para mantener estos websites de phishing activos durante un per\u00c3\u00adodo m\u00c3\u00a1s largo de tiempo. El flujo r\u00c3\u00a1pido es una t\u00c3\u00a9cnica de cambio de DNS empleado para ocultar los sitios detr\u00c3\u00a1s de una red de ordenadores comprometidos y en constante cambio que act\u00c3\u00baan como proxies.<br \/>\nDurante la \u00e2\u20ac\u0153Cumbre de Investigadores de Crimen Electr\u00c3\u00b3nico&#8221;, el Anti-Phishing Work Group (APWG) comunic\u00c3\u00b3 que el Rock Phishing est\u00c3\u00a1 presente en casi la mitad de los intentos de phishing registrados. El APWG sugiere que si este grupo est\u00c3\u00a1 utilizando realmente la t\u00c3\u00a9cnica del flujo r\u00c3\u00a1pido, los sitios de phishing probablemente permanezcan activos durante per\u00c3\u00adodos m\u00c3\u00a1s largos para atraer a m\u00c3\u00a1s v\u00c3\u00adctimas. <\/p>\n<p>De acuerdo con Jamz Yaneza, Gerente del Proyecto de Investigaci\u00c3\u00b3n de Amenazas de Trend Micro, \u00e2\u20ac\u0153un sitio de Rock Phish podr\u00c3\u00ada estar hospedado en Ucrania, con un proveedor de servicios de Internet en Rusia, y los controladores ubicados en Estonia. Los profesionales de la seguridad y las autoridades no pueden eliminar estos sites con la suficiente rapidez provocando con esto que m\u00c3\u00a1s gente pueda recibir los correos electr\u00c3\u00b3nicos de phishing y, por tanto, que las visitas al sitio de phishing se incrementen elevando la efectividad de la campa\u00c3\u00b1a&#8221;.<br \/>\nEl Content Security Web Blocking Team de Trend Micro estima que la media diaria de URLs de Rock Phishing oscila entre las 20.000 y 60.000, y su n\u00c3\u00bamero sigue creciendo. La mayor\u00c3\u00ada de estas URLs est\u00c3\u00a1n hospedadas en las mismas direcciones IP. <\/p>\n<p>Fuente: DiarioTi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro informa que detr\u00c3\u00a1s de las avalanchas de phishing se encuentra la creciente popularidad de una t\u00c3\u00a9cnica espec\u00c3\u00adfica y una serie de herramientas conocidas como \u00e2\u20ac\u0153Rock Phish&#8221;. Los creadores de Rock Phish tienen la seria intenci\u00c3\u00b3n de defraudar a la gente y de ocultar los sites de phishing utilizando un \u00e2\u20ac\u0153flujo r\u00c3\u00a1pido&#8221; para mantener [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-347","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementa el tiempo de actividad de los sites de phishing<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Incrementa el tiempo de actividad de los sites de phishing\",\"datePublished\":\"2008-05-29T11:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/\"},\"wordCount\":324,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementa el tiempo de actividad de los sites de phishing\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-05-29T11:28:04+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementa el tiempo de actividad de los sites de phishing","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Incrementa el tiempo de actividad de los sites de phishing","datePublished":"2008-05-29T11:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/"},"wordCount":324,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/","url":"https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementa el tiempo de actividad de los sites de phishing","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-05-29T11:28:04+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/incrementa-el-tiempo-de-actividad-de-los-sites-de-phishing\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/347\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}