
{"id":465,"date":"2009-01-29T08:06:48","date_gmt":"2009-01-29T11:06:48","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=465"},"modified":"2009-01-29T08:06:48","modified_gmt":"2009-01-29T11:06:48","slug":"comienzan-los-ataques-de-malware-de-san-valentin","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/","title":{"rendered":"Comienzan los ataques de malware de San Valent\u00c3\u00adn"},"content":{"rendered":"<p><span class=\"texto-detalle\">Son un cl\u00c3\u00a1sico del malware. Desde hace ya unos a\u00c3\u00b1os cada San Valent\u00c3\u00adn las empresas de seguridad detectan decenas de ejemplares de malware que intentan infectar los computadores de los usuarios utilizando como cebo San Valent\u00c3\u00adn. El primero en atacar este a\u00c3\u00b1o ha sido el gusano Waledac.C.<\/span><\/p>\n<p><span class=\"texto-detalle\">Como suele ser habitual en este tipo de ataques, Waledac.C se distribuye a trav\u00c3\u00a9s de correo electr\u00c3\u00b3nico haci\u00c3\u00a9ndose pasar por una tarjeta rom\u00c3\u00a1ntica que alguien ha enviado al usuario con motivo del d\u00c3\u00ada de San Valent\u00c3\u00adn. Los correos electr\u00c3\u00b3nicos van acompa\u00c3\u00b1ados de un link a trav\u00c3\u00a9s del cual, supuestamente, los usuarios podr\u00c3\u00a1n descargar dicha tarjeta. Sin embargo, si pinchan en ese link y aceptan la descarga del archivo al que conduce, en realidad estar\u00c3\u00a1n introduciendo en su equipo una descarga del gusano Waledac.C.<\/p>\n<p>Estos ficheros maliciosos tienen nombres igualmente relacionados con San Valent\u00c3\u00adn y el amor como:<\/p>\n<p>youandme.exe<br \/>\nonlyyou.exe<br \/>\nyou.exe<br \/>\nmeandyou.exe<\/p>\n<p>Una vez ha infectado un equipo, este gusano utiliza el correo del usuario afectado para enviar spam. Para ello, roba todas las direcciones de correo que el usuario tenga almacenadas en su equipo y les env\u00c3\u00ada un correo electr\u00c3\u00b3nico como el anterior, con un asunto relacionado con San Valent\u00c3\u00adn y que, igualmente, conducir\u00c3\u00a1 a un descarga de este ejemplar de malware.<\/p>\n<p>\u00e2\u20ac\u0153El hecho de que a\u00c3\u00b1o tras a\u00c3\u00b1o los ciberdelincuentes utilicen este tipo de t\u00c3\u00a9cnica indica que, pese a ser conocida, el ratio de infecciones que consiguen con ella es alto, ya que en caso contrario ya la habr\u00c3\u00adan abandonado&#8221;, indica Luis Corrons, director t\u00c3\u00a9cnico de PandaLabs.<\/span><\/p>\n<p><span class=\"texto-detalle\">Fuente: DiarioTi<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Son un cl\u00c3\u00a1sico del malware. Desde hace ya unos a\u00c3\u00b1os cada San Valent\u00c3\u00adn las empresas de seguridad detectan decenas de ejemplares de malware que intentan infectar los computadores de los usuarios utilizando como cebo San Valent\u00c3\u00adn. El primero en atacar este a\u00c3\u00b1o ha sido el gusano Waledac.C. Como suele ser habitual en este tipo de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-465","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Comienzan los ataques de malware de San Valent\u00c3\u00adn<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Comienzan los ataques de malware de San Valent\u00c3\u00adn\",\"datePublished\":\"2009-01-29T11:06:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/\"},\"wordCount\":298,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Comienzan los ataques de malware de San Valent\u00c3\u00adn\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-01-29T11:06:48+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Comienzan los ataques de malware de San Valent\u00c3\u00adn","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Comienzan los ataques de malware de San Valent\u00c3\u00adn","datePublished":"2009-01-29T11:06:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/"},"wordCount":298,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/","url":"https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Comienzan los ataques de malware de San Valent\u00c3\u00adn","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-01-29T11:06:48+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/comienzan-los-ataques-de-malware-de-san-valentin\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=465"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/465\/revisions"}],"predecessor-version":[{"id":466,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/465\/revisions\/466"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}