
{"id":490,"date":"2009-03-03T07:48:20","date_gmt":"2009-03-03T10:48:20","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=490"},"modified":"2009-03-03T07:48:20","modified_gmt":"2009-03-03T10:48:20","slug":"ataque-de-phishing-vulnera-la-seguridad-de-gmail","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/","title":{"rendered":"Ataque de phishing vulnera la seguridad de Gmail"},"content":{"rendered":"<p><span class=\"texto-detalle\">El pasado martes, durante cerca de cuatro horas, el servicio de correo electr\u00c3\u00b3nico de Google, Gmail, dej\u00c3\u00b3 de funcionar. Pese a no haber hecho p\u00c3\u00bablico el n\u00c3\u00bamero de personas a las que afect\u00c3\u00b3 este apag\u00c3\u00b3n, la compa\u00c3\u00b1\u00c3\u00ada si ha explicado las causas de la ca\u00c3\u00adda de su p\u00c3\u00a1gina de correo electr\u00c3\u00b3nico.<\/p>\n<p>As\u00c3\u00ad, la empresa de Internet ha notificado a trav\u00c3\u00a9s de un comunicado que el problema comenz\u00c3\u00b3 durante un servicio de mantenimiento rutinario de un centro de datos europeo, lo que coincidi\u00c3\u00b3 con la introducci\u00c3\u00b3n de un nuevo c\u00c3\u00b3digo para dar m\u00c3\u00a1s proximidad al servicio. El fallo de un servidor provoc\u00c3\u00b3 la sobrecarga de otro centro de datos, lo que llev\u00c3\u00b3 a un efecto cascada que termin\u00c3\u00b3 afectando a diversos centros.<\/p>\n<p>Aunque con este comunicado, Google desmiente que la ca\u00c3\u00adda del servicio se haya debido a un ataque externo, lo cierto es que, recientemente, la seguridad de su sistema de correo ha quedado en entredicho tras descubrirse una amenaza de phishing contra el sistema de mensajer\u00c3\u00ada instant\u00c3\u00a1nea de Gmail.<\/p>\n<p>A este respecto, Sophos advierte a los usuarios de Gmail de estar alerta sobre estos ataques de phishing, tras la noticia de que el sistema de correo electr\u00c3\u00b3nico de Google ha sido objeto de una campa\u00c3\u00b1a de robo de identidad, ataque que se extendi\u00c3\u00b3 a trav\u00c3\u00a9s de su sistema de mensajer\u00c3\u00ada instant\u00c3\u00a1nea (Google Talk).<\/p>\n<p>Los ejemplos analizados por el laboratorio de Sophos revelan la aparici\u00c3\u00b3n de mensajes instant\u00c3\u00a1neos no solicitados en la pantalla de los usuarios, que con el anuncio: \u00e2\u20ac\u0153check out this video&#8221; (comprueba este v\u00c3\u00addeo), instan a \u00c3\u00a9stos a pinchar sobre un link v\u00c3\u00ada el servicio de TinyURL. El enlace, sin embargo, redirecciona a los usuarios a un sitio web denominado WiddyHo, donde se les requiere su nombre de usuario de Gmail y su contrase\u00c3\u00b1a. En este sentido, los expertos de Sophos advierten que los hackers que est\u00c3\u00a1n detr\u00c3\u00a1s de WiddyHo podr\u00c3\u00adan utilizar la informaci\u00c3\u00b3n sustra\u00c3\u00adda para entrar en las cuentas personales, hacerse con datos claves y, en definitiva, cometer robo de identidad.<\/p>\n<p>\u00e2\u20ac\u0153Todos recibimos informaci\u00c3\u00b3n sospechosa a trav\u00c3\u00a9s del correo electr\u00c3\u00b3nico. Sin embargo, en esta ocasi\u00c3\u00b3n, estos ataques han sido realizados a trav\u00c3\u00a9s del sistema de mensajer\u00c3\u00ada instant\u00c3\u00a1nea de Gmail, lo que entra\u00c3\u00b1a que muchos usuarios, que se creen seguros, puedan caer en la trampa sin ser conscientes de ello&#8221;, afirma Graham Cluley, consultor de tecnolog\u00c3\u00ada de Sophos.<\/p>\n<p>Aunque TinyURL ya ha puesto el sitio en la lista negra -lo que quiere decir que el link no funcionar\u00c3\u00a1-, esta acci\u00c3\u00b3n no frenar\u00c3\u00a1 la habilidad de los hackers que utilizar\u00c3\u00a1n otros sitios de rediccionamiento URL o preparar\u00c3\u00a1n alojamientos alternativos de phishing para intentar robar a los incautos.<\/span><\/p>\n<p><span class=\"texto-detalle\">Fuente: DiarioTi<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El pasado martes, durante cerca de cuatro horas, el servicio de correo electr\u00c3\u00b3nico de Google, Gmail, dej\u00c3\u00b3 de funcionar. Pese a no haber hecho p\u00c3\u00bablico el n\u00c3\u00bamero de personas a las que afect\u00c3\u00b3 este apag\u00c3\u00b3n, la compa\u00c3\u00b1\u00c3\u00ada si ha explicado las causas de la ca\u00c3\u00adda de su p\u00c3\u00a1gina de correo electr\u00c3\u00b3nico. As\u00c3\u00ad, la empresa de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-490","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Ataque de phishing vulnera la seguridad de Gmail<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Ataque de phishing vulnera la seguridad de Gmail\",\"datePublished\":\"2009-03-03T10:48:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/\"},\"wordCount\":491,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Ataque de phishing vulnera la seguridad de Gmail\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-03-03T10:48:20+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Ataque de phishing vulnera la seguridad de Gmail","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Ataque de phishing vulnera la seguridad de Gmail","datePublished":"2009-03-03T10:48:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/"},"wordCount":491,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/","url":"https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Ataque de phishing vulnera la seguridad de Gmail","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-03-03T10:48:20+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/ataque-de-phishing-vulnera-la-seguridad-de-gmail\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=490"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/490\/revisions"}],"predecessor-version":[{"id":491,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/490\/revisions\/491"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}