
{"id":398,"date":"2008-09-28T18:19:46","date_gmt":"2008-09-28T21:19:46","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=398"},"modified":"2008-09-28T18:19:46","modified_gmt":"2008-09-28T21:19:46","slug":"amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/","title":{"rendered":"Amenazas basadas en la Web encabezan el ranking de malware"},"content":{"rendered":"<p> Seg\u00c3\u00ban analistas de BitDefender, la lista incluye tres variantes del programa de descarga troyano Wimad, programa de descarga de c\u00c3\u00b3decs falso que suele encontrarse en sitios Web malintencionados. El troyano de publicidad muy com\u00c3\u00ban, Clicker.CM, encabeza una vez m\u00c3\u00a1s la lista.<br \/>\nEn la lista se encuentra tambi\u00c3\u00a9n el troyano Qhost.AKR, variedad de malware dirigida a usuarios de BitDefender que intenta desactivar la caracter\u00c3\u00adstica de actualizaci\u00c3\u00b3n del antivirus, dejando al host vulnerable como consecuencia. Una detecci\u00c3\u00b3n gen\u00c3\u00a9rica de una vulnerabilidad de Flash (que utilizan m\u00c3\u00baltiples variedades de malware) se puede encontrar en el sexto lugar, mientras que el troyano Trojan.Swizzor.1, otra amenaza basada en la Web muy antigua y muy com\u00c3\u00ban.<\/p>\n<p>En el n\u00c3\u00bamero ocho se sit\u00c3\u00baa una vulnerabilidad de ActiveX que se utiliza para enga\u00c3\u00b1ar a un navegador para que descargue e instale malware. La vulnerabilidad se centra en un control ActiveX llamado Sina DLoader, que se puede encontrar en sitios Web chinos leg\u00c3\u00adtimos. Los sistemas de los usuarios que lo han ejecutado est\u00c3\u00a1n en riesgo, pero rara vez ocurre fuera de China.<\/p>\n<p>Un troyano que se dispersa a trav\u00c3\u00a9s de la acci\u00c3\u00b3n de compartir archivos en el formato P2P se puede encontrar en el noveno puesto, mientras que el d\u00c3\u00a9cimo lugar est\u00c3\u00a1 ocupado por una amenaza del pasado, un programa de descarga del paquete antivirus falso \u00e2\u20ac\u0153XP Antivirus&#8221;.<\/p>\n<p>1 Trojan.Clicker.CM 7.38 %<br \/>\n2 Trojan.Downloader.Wimad.A 5.35 %<br \/>\n3 Trojan.Downloader.WMA.Wimad.N 3.89 %<br \/>\n4 Trojan.Downloader.WMA.Wimad.S 2.87 %<br \/>\n5 Trojan.Qhost.AKR 2.58 %<br \/>\n6 Exploit.SWF.Gen 2.56 %<br \/>\n7 Trojan.Swizzor.1 2.51 %<br \/>\n8 Exploit.SinaDLoader.A 2.38 %<br \/>\n9 Trojan.Autorun.TE 2.06 %<br \/>\n10 Trojan.FakeAlert.Gen.1 1.88 %<br \/>\nOTROS 66.55 %<\/p>\n<p>Fuente: DiarioTi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00c3\u00ban analistas de BitDefender, la lista incluye tres variantes del programa de descarga troyano Wimad, programa de descarga de c\u00c3\u00b3decs falso que suele encontrarse en sitios Web malintencionados. El troyano de publicidad muy com\u00c3\u00ban, Clicker.CM, encabeza una vez m\u00c3\u00a1s la lista. En la lista se encuentra tambi\u00c3\u00a9n el troyano Qhost.AKR, variedad de malware dirigida a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-398","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Amenazas basadas en la Web encabezan el ranking de malware<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Amenazas basadas en la Web encabezan el ranking de malware\",\"datePublished\":\"2008-09-28T21:19:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/\"},\"wordCount\":289,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Amenazas basadas en la Web encabezan el ranking de malware\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-09-28T21:19:46+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Amenazas basadas en la Web encabezan el ranking de malware","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Amenazas basadas en la Web encabezan el ranking de malware","datePublished":"2008-09-28T21:19:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/"},"wordCount":289,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/","url":"https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Amenazas basadas en la Web encabezan el ranking de malware","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-09-28T21:19:46+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/amenazas-basadas-en-la-web-encabezan-el-ranking-de-malware\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=398"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/398\/revisions"}],"predecessor-version":[{"id":399,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/398\/revisions\/399"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}