
{"id":471,"date":"2009-02-09T08:09:04","date_gmt":"2009-02-09T11:09:04","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=471"},"modified":"2009-02-09T08:09:04","modified_gmt":"2009-02-09T11:09:04","slug":"telefonos-moviles-en-la-mira-de-los-cibercriminales","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/","title":{"rendered":"Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales"},"content":{"rendered":"<p><span class=\"texto-detalle\">Kaspersky Lab ha detectado un nuevo programa malicioso para tel\u00c3\u00a9fonos m\u00c3\u00b3viles con Symbian cuyo objetivo es el robo de dinero.<\/span><\/p>\n<p><span class=\"texto-detalle\">En el pasado, la amenaza a los tel\u00c3\u00a9fonos m\u00c3\u00b3viles hab\u00c3\u00ada sido principalmente un problema para los usuarios rusos, pero no para el resto del mundo. Sin embargo, la semana pasada los expertos de Kaspersky Lab detectaron un nuevo programa malicioso para Symbian, uno de los sistemas operativos para m\u00c3\u00b3viles m\u00c3\u00a1s comunes en todo el mundo, dirigido a los clientes de un operador m\u00c3\u00b3vil indonesio.<\/p>\n<p>El troyano, escrito en el lenguaje de script Python, env\u00c3\u00ada mensajes de texto a un n\u00c3\u00bamero especial, sin que el usuario sea consciente de ello, con instrucciones para transferir una cantidad de dinero de la cuenta de la v\u00c3\u00adctima a otra que pertenece a los criminales. De momento, las modificaciones que se han detectado s\u00c3\u00b3lo se dirigen a los usuarios del citado operador m\u00c3\u00b3vil de Indonesia, pero si los servicios de transferencia de dinero de tel\u00c3\u00a9fono a tel\u00c3\u00a9fono fueran ofrecidos por operadores m\u00c3\u00b3viles de otros pa\u00c3\u00adses utilizando m\u00c3\u00a9todos similares (un simple SMS), la amenaza podr\u00c3\u00ada generalizarse a todo el mundo.<\/p>\n<p>\u00e2\u20ac\u0153Obviamente, los cibercriminales que distribuyen el troyano quieren ganar dinero&#8221;, se\u00c3\u00b1ala Denis Maslennikov, analista de malware senior de Kaspersky Lab. \u00e2\u20ac\u0153Hasta hace poco tiempo, mucha gente pensaba que los programas maliciosos enviados por SMS sin el conocimiento del usuario eran fen\u00c3\u00b3menos exclusivamente rusos. Ahora, podemos observar c\u00c3\u00b3mo el problema ya no afecta s\u00c3\u00b3lo a los usuarios de este pa\u00c3\u00ads, sino que se est\u00c3\u00a1 convirtiendo en una cuesti\u00c3\u00b3n internacional&#8221;.<\/p>\n<p>Existen cinco variantes conocidas de Trojan-SMS.Python.Flocker, desde .ab hasta .af. Las cantidades transferidas oscilan entre 0,45 y 0,90 d\u00c3\u00b3lares americanos. Por lo tanto, si los cibercriminales que se encuentran tras el troyano consiguen infectar una gran cantidad de tel\u00c3\u00a9fonos, la cantidad total transferida a su cuenta de tel\u00c3\u00a9fono m\u00c3\u00b3vil podr\u00c3\u00ada llegar a ser bastante sustanciosa.<\/span><\/p>\n<p><span class=\"texto-detalle\">Fuente: DiarioTi<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab ha detectado un nuevo programa malicioso para tel\u00c3\u00a9fonos m\u00c3\u00b3viles con Symbian cuyo objetivo es el robo de dinero. En el pasado, la amenaza a los tel\u00c3\u00a9fonos m\u00c3\u00b3viles hab\u00c3\u00ada sido principalmente un problema para los usuarios rusos, pero no para el resto del mundo. Sin embargo, la semana pasada los expertos de Kaspersky Lab [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-471","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales\",\"datePublished\":\"2009-02-09T11:09:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\"},\"wordCount\":349,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-02-09T11:09:04+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales","datePublished":"2009-02-09T11:09:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/"},"wordCount":349,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/","url":"https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tel\u00c3\u00a9fonos m\u00c3\u00b3viles en la mira de los cibercriminales","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-02-09T11:09:04+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=471"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/471\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}