
{"id":627,"date":"2009-10-15T08:14:07","date_gmt":"2009-10-15T11:14:07","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=627"},"modified":"2009-10-15T08:14:07","modified_gmt":"2009-10-15T11:14:07","slug":"ddbot-dark-dimension-botnet","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/","title":{"rendered":"DDBot (Dark Dimension Botnet)"},"content":{"rendered":"<div style=\"text-align: justify;\">Si bien estamos acostumbrados a que el desarrollo de aplicaciones destinadas al control y administraci\u00f3n de <span style=\"font-weight: bold;\">botnets<\/span> tengan su punto de partida en Europa del Este (sobre todo en Rusia), <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/08\/los-precios-del-crimeware-ruso-parte-2.html\">el negocio<\/a> que representan las redes <span style=\"font-weight: bold;\">zombis<\/span> para muchos personajes que mueven cotidianamente sus ejes, no tiene frontera ni limitaciones.<\/p>\n<p>En consecuencia, comienzan a emerger desde otros lugares del planeta diferentes alternativas cuyos ejes principales tambi\u00e9n est\u00e1n destinados a facilitar las maniobras delictivas de los botmasters. Ya hab\u00edamos dado cuenta de botnets, en este caso, <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/08\/desarrollo-de-crimeware-open-source.html\">Open Source escritas en Perl<\/a> y ahora le toca el turno a <span style=\"font-weight: bold;\">DDBot<\/span> (<span style=\"font-weight: bold;\">Dark Dimension Botnet<\/span>).<\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s1600-h\/mipistus-bot-status.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5392278765719465970\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 234px;\" src=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png\" border=\"0\" alt=\"\" \/><\/a>Bajo el slogan <span style=\"font-style: italic;\">&#8220;botmasters your dreams come true!&#8221;<\/span>, DDBot promete funcionalidades diferenciadoras con respecto a sus pares, y si bien tiene una manera m\u00e1s &#8220;elegante&#8221; de presentar la informaci\u00f3n, no cambia en cuanto a sus caracter\u00edsticas y a las alternativas de ataque incorporadas en cualquier otra aplicaci\u00f3n de este estilo.<\/div>\n<div style=\"text-align: justify;\">Entre sus caracter\u00edsticas, esta aplicaci\u00f3n crimeware se compone de siete m\u00f3dulos que est\u00e1n disponibles en funci\u00f3n del dinero que se invierta en su compra. Estos m\u00f3dulos son:<\/div>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: bold;\">Webpanel\/IRC<\/span>. Es el framework que permite la gesti\u00f3n de las zombis y <span style=\"font-weight: bold;\">C&amp;C<\/span> a trav\u00e9s de comando IRC. Esto permite controlar las zombis de forma convencional a trav\u00e9s de canales IRC o utilizar cualquier navegador para acceder al Panel Web de control desde el cual tambi\u00e9n se env\u00edan comandos IRC pero a trav\u00e9s del protocolo http. Por defecto se conecta al ircd.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: bold;\">Load &amp; Execute<\/span>. Es el modulo que permite cargar y ejecutar los binarios que se propagen a trav\u00e9s del Panel Web.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: bold;\">Passwords Stealer<\/span>. Es el modulo encargado de almacenar las contrase\u00f1as. Posse rutinas que le permiten obtener este tipo de informaci\u00f3n privada de los usuarios que hacen uso de las siguientes aplicaciones: MSN, Outlook, Filezilla, Firefox, Windows.PStore, Trillian, Icq6 y NoIp.Duk. Las rutinas son actualizadas peri\u00f3dicamente con lo cual se estima que se ir\u00e1n agregando posibilidades de obtener contrase\u00f1as de otros servicios.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><a href=\"http:\/\/1.bp.blogspot.com\/_Ppq0fEGkHo4\/StU5xgr3OPI\/AAAAAAAAB2Q\/FChOa4ubpWM\/s1600-h\/mipistus-pass-stealer.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5392279651596318962\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 168px;\" src=\"http:\/\/1.bp.blogspot.com\/_Ppq0fEGkHo4\/StU5xgr3OPI\/AAAAAAAAB2Q\/FChOa4ubpWM\/s400\/mipistus-pass-stealer.png\" border=\"0\" alt=\"\" \/><\/a><span style=\"font-weight: bold;\">DDos<\/span>. El modulo de ataque de <span style=\"font-weight: bold;\">Denegaci\u00f3n de Servicio Distribuida<\/span>. El ataque puede ser configurado a trav\u00e9s del Panel Web a trav\u00e9s de comandos IRC.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: bold;\">reverseSocks<\/span>. Incorpora la posibilidad de poder ejecutar todas sus funcionalidades, incluso cuando los equipos se encuentran detr\u00e1s de un router o protegido con firewall.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><a href=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/StU5_dDW3lI\/AAAAAAAAB2Y\/Rbhsbi1zSGs\/s1600-h\/mipistus-reversesocks.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5392279891139288658\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 195px;\" src=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/StU5_dDW3lI\/AAAAAAAAB2Y\/Rbhsbi1zSGs\/s400\/mipistus-reversesocks.png\" border=\"0\" alt=\"\" \/><\/a><span style=\"font-weight: bold;\">SpamMail<\/span>. Este m\u00f3dulo incorpora un SMTP que le permite a los spammers operar la botnet con este fin particular. Los correos son personalizados desde el Panel Web de forma muy sencilla.<\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-weight: bold;\">Statistics<\/span>. Es el modulo que permite analizar informaci\u00f3n estad\u00edstica (<a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/09\/cybint-en-el-negocio-de-los-ciber.html\">hacer inteligencia<\/a>) sobre las zombis activas, los pa\u00edses en los que se encuentran y dem\u00e1s, representando la informaci\u00f3n de una forma poco habitual.<\/li>\n<\/ul>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/4.bp.blogspot.com\/_Ppq0fEGkHo4\/StU5C7YhuqI\/AAAAAAAAB2I\/2gMZAW_8tAM\/s1600-h\/mipistus-country-stats.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5392278851309124258\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 238px;\" src=\"http:\/\/4.bp.blogspot.com\/_Ppq0fEGkHo4\/StU5C7YhuqI\/AAAAAAAAB2I\/2gMZAW_8tAM\/s400\/mipistus-country-stats.png\" border=\"0\" alt=\"\" \/><\/a>Si bien todas las funcionalidades pretenden ofrecer un &#8220;producto&#8221; lo m\u00e1s autom\u00e1tico posible, ya que no necesita demasiadas configuraciones ni demasiados conocimientos para comenzar a operarla; por ejemplo, se puede enviar spam tan solo agregando dos par\u00e1metros (b\u00e1sicamente receptor y mensaje), constituye una buena oferta para los <span style=\"font-style: italic;\">script kiddies<\/span> que se aventuran en la carrera de ciberdelincuentes profesionales.<\/div>\n<div style=\"text-align: justify;\">En cuanto a los costos con los que DDBot se ha insertado en el mercado de <span style=\"font-weight: bold;\">crimeware,<\/span> se encuentran tres paquetes cuyos precios var\u00edan seg\u00fan el cual se trate. El primero de los paquetes posee los m\u00f3dulos de ataque <span style=\"font-weight: bold;\">DDoS<\/span>, <span style=\"font-weight: bold;\">Password Stealer<\/span>, <span style=\"font-weight: bold;\">Load &amp; Execute<\/span>, <span style=\"font-weight: bold;\">Statistics<\/span> y el <span style=\"font-weight: bold;\">Panel Web<\/span>. Su valor es de <span style=\"font-weight: bold;\">100 Euros<\/span>.<\/div>\n<div style=\"text-align: justify;\">La segunda opci\u00f3n, adem\u00e1s de las opciones del primer paquete, incorpora el m\u00f3dulo <span style=\"font-weight: bold;\">reverseSocks<\/span> y su valor es de <span style=\"font-weight: bold;\">150 Euros<\/span>. El tercer paquete, con un costo de <span style=\"font-weight: bold;\">250 Euros<\/span>, incorpora adem\u00e1s el m\u00f3dulo que permite el env\u00edo de spam (<span style=\"font-weight: bold;\">SpamMail<\/span>).<\/p>\n<p>El ciclo de comercializaci\u00f3n concluye cuando el &#8220;comprador&#8221; deposita el dinero a trav\u00e9s de <span style=\"font-style: italic;\">WebMoney<\/span> o <span style=\"font-style: italic;\">paysafecard<\/span>.<\/div>\n<div style=\"text-align: justify;\">Por otro lado, si bien no se conoce fehacientemente el origen de desarrollo de este crimeware, hay indicios que hacen suponer que tambi\u00e9n tiene su origen en Rusia.<\/div>\n<div style=\"text-align: justify;\">Como ver\u00e1n, el comercio de crimeware no para, y seguramente durante el 2010 sigan apareciendo m\u00e1s alternativas que, obviamente, aumentar\u00e1n su grado de complejidad a medida que las investigaciones revelen a todas luces sus funcionalidades, procesos de comercializaci\u00f3n y detecci\u00f3n de sus mecanismos maliciosos.<\/div>\n<p><span style=\"font-weight: bold;\">Informaci\u00f3n relacionada<\/span><br \/>\n<a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/09\/phoenix-exploits-kit-otra-alternativa.html\">Phoenix Exploit\u2019s Kit. Otra alternativa para el control de botnets<\/a><br \/>\n<a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/09\/infloader-control-de-botnets-marihuana.html\">iNF`[LOADER]. Control de botnets, marihuana y propagaci\u00f3n de malware<\/a><br \/>\n<a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/08\/liberty-exploit-system-otra-alternativa.html\">Liberty Exploit System. Otra alternativa crimeware para el control de botnets<\/a><br \/>\n<a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/08\/eleonore-exploits-pack-nueva-crimeware.html\">Eleonore Exploits Pack. Nuevo crimeware In-the-Wild<\/a><\/p>\n<p>Jorge Mieres by Pistus<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si bien estamos acostumbrados a que el desarrollo de aplicaciones destinadas al control y administraci\u00f3n de botnets tengan su punto de partida en Europa del Este (sobre todo en Rusia), el negocio que representan las redes zombis para muchos personajes que mueven cotidianamente sus ejes, no tiene frontera ni limitaciones. En consecuencia, comienzan a emerger [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-627","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - DDBot (Dark Dimension Botnet)<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"DDBot (Dark Dimension Botnet)\",\"datePublished\":\"2009-10-15T11:14:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - DDBot (Dark Dimension Botnet)\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png\",\"datePublished\":\"2009-10-15T11:14:07+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage\",\"url\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png\",\"contentUrl\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - DDBot (Dark Dimension Botnet)","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"DDBot (Dark Dimension Botnet)","datePublished":"2009-10-15T11:14:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/"},"wordCount":786,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage"},"thumbnailUrl":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/","url":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - DDBot (Dark Dimension Botnet)","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage"},"thumbnailUrl":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png","datePublished":"2009-10-15T11:14:07+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/ddbot-dark-dimension-botnet\/#primaryimage","url":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png","contentUrl":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/StU498iXL_I\/AAAAAAAAB2A\/-pRrGSflY3c\/s400\/mipistus-bot-status.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=627"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/627\/revisions"}],"predecessor-version":[{"id":628,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/627\/revisions\/628"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}