
{"id":390,"date":"2008-09-04T08:31:46","date_gmt":"2008-09-04T11:31:46","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=390"},"modified":"2008-09-04T08:31:46","modified_gmt":"2008-09-04T11:31:46","slug":"incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/","title":{"rendered":"Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets"},"content":{"rendered":"<p><a href=\"http:\/\/isc.sans.org\/diary.html?storyid=4963\">Comentan en SANS<\/a> que el n\u00c3\u00bamero de m\u00c3\u00a1quinas zombie integradas en botnets se ha multiplicado por cuatro en los \u00c3\u00baltimos 90 d\u00c3\u00adas. Las m\u00c3\u00a1quinas zombie son aquellas que pasan a formar parte de una red gobernada (botnet) por usuarios maliciosos (botmasters), sin el conocimiento del propietario de la m\u00c3\u00a1quina. La integraci\u00c3\u00b3n suele basarse en la instalaci\u00c3\u00b3n de componentes maliciosos para el control remoto, principalmente a trav\u00c3\u00a9s de malware, lo que permite a los botmasters disponer de miles de m\u00c3\u00a1quinas para todo tipo de actividades delictivas y fraudulentas: env\u00c3\u00ado masivo de spam y scams, as\u00c3\u00ad como ataques distribuidos de denegaci\u00c3\u00b3n de servicio, como ejemplos m\u00c3\u00a1s representativos.<\/p>\n<p>Que se hayan cuadruplicado el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en estas redes es preocupante. Por s\u00c3\u00ad mismo, es un dato que indica que las m\u00c3\u00a1quinas vulnerables han crecido mucho (ya que de otro modo, no estar\u00c3\u00adan integradas en estas redes) y por otro lado indica que los botmasters est\u00c3\u00a1n, tras un per\u00c3\u00adodo m\u00c3\u00a1s o menos estable, incrementando su actividad, ya que \u00c3\u00baltimamente se hab\u00c3\u00adan censado del orden de 150.000 m\u00c3\u00a1quinas por bot de media, con picos cercanos a 200.000, y durante los \u00c3\u00baltimos 90 d\u00c3\u00adas la cuenta ha ascendido a pr\u00c3\u00a1cticamente 500.000 m\u00c3\u00a1quinas integradas.<\/p>\n<p>\u00c2\u00bfQui\u00c3\u00a9n o qu\u00c3\u00a9 es responsable de este aumento? Sin duda, los culpables son los amigos de lo ajeno, ya que, aunque todas las m\u00c3\u00a1quinas del mundo fueran vulnerables, si no existieran redes de delitos tecnol\u00c3\u00b3gicos organizadas ni usuarios malintencionados, no pasar\u00c3\u00ada nada. Tampoco pasar\u00c3\u00ada nada (o casi nada) si los usuarios fueran r\u00c3\u00a1pidos y diligentes gestionando la seguridad de sus m\u00c3\u00a1quinas, pero esto es entrar en un terreno ut\u00c3\u00b3pico que a nada nos conduce.<\/p>\n<p>Dejando a un lado a los principales responsables, se hace necesario investigar qu\u00c3\u00a9 productos y\/o plataformas han posibilitado, mediante las vulnerabilidades no corregidas y\/o no advertidas, que los atacantes saquen tajada. En SANS ejemplifican este punto hablando de los incrementos en ataques de inyecci\u00c3\u00b3n SQL en servidores, pero a buen seguro, hay muchos m\u00c3\u00a1s problemas de seguridad a los que podemos responsabilizar del aumento de m\u00c3\u00a1quinas zombie. La lista es demasiado larga para detallarla al completo, me temo.<\/p>\n<p>Los datos que ha empleado SANS proceden de un estudio de <a href=\"http:\/\/www.shadowserver.org\/wiki\/pmwiki.php?n=Stats.BotCount90-Days\">Shadowserver Foundation<\/a>. En la p\u00c3\u00a1gina de la fundaci\u00c3\u00b3n hay estad\u00c3\u00adsticas y gr\u00c3\u00a1ficos ampliados.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\">http:\/\/www.sahw.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comentan en SANS que el n\u00c3\u00bamero de m\u00c3\u00a1quinas zombie integradas en botnets se ha multiplicado por cuatro en los \u00c3\u00baltimos 90 d\u00c3\u00adas. Las m\u00c3\u00a1quinas zombie son aquellas que pasan a formar parte de una red gobernada (botnet) por usuarios maliciosos (botmasters), sin el conocimiento del propietario de la m\u00c3\u00a1quina. La integraci\u00c3\u00b3n suele basarse en la [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-390","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets\",\"datePublished\":\"2008-09-04T11:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/\"},\"wordCount\":428,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-09-04T11:31:46+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets","datePublished":"2008-09-04T11:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/"},"wordCount":428,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/","url":"https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Incrementos notorios en el n\u00c3\u00bamero de m\u00c3\u00a1quinas integradas en botnets","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-09-04T11:31:46+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/incrementos-notorios-en-el-numero-de-maquinas-integradas-en-botnets\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/390\/revisions\/391"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}