
{"id":685,"date":"2010-03-02T08:25:06","date_gmt":"2010-03-02T11:25:06","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=685"},"modified":"2010-03-02T08:25:06","modified_gmt":"2010-03-02T11:25:06","slug":"%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/","title":{"rendered":"\u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?"},"content":{"rendered":"<p>Las t\u00e9cnicas de fraude tradicionales (phishing) basadas en ingenier\u00eda social han evolucionado, haciendo uso del malware, y en concreto de los troyanos. \u00c9stos han sido dise\u00f1ados con el objetivo de conseguir beneficios econ\u00f3micos mediante fraudes bancarios.<br \/>\n<a href=\"http:\/\/www.inteco.es\/\">INTECO<\/a> ha publicado un <a href=\"http:\/\/www.inteco.es\/file\/0XeHwoeQuhnBvxrQ2_8F-g\">documento<\/a> para que los usuarios conozcan un poco m\u00e1s de cerca qu\u00e9 son los troyanos bancarios, qu\u00e9 vectores de infecci\u00f3n explotan y c\u00f3mo consiguen interceptar las credenciales de las entidades financieras.<\/p>\n<div>En este documento nos comentan c\u00f3mo se han depurado las t\u00e9cnicas de captura de usuarios y contrase\u00f1as y las de monitorizaci\u00f3n. Peque\u00f1os trucos en los que por ejemplo, avisan que observar la presencia del candado de seguridad en la p\u00e1gina de la entidad bancaria y comprobar la autenticidad del certificado de seguridad son insuficientes, <a href=\"http:\/\/www.securitybydefault.com\/2009\/06\/fraude-online-con-firma-digital-y-ssl.html\">como ya demostramos en el blog<\/a>.<\/p>\n<p>La lectura es recomendable para cualquier usuario de Internet, con el que aprender\u00e1 las t\u00e9cnicas que emplean los troyanos para monitorizar las visitas a p\u00e1ginas bancarias o cu\u00e1les son los m\u00e9todos utilizados para el robo de sus credenciales, entre ellos:<\/p><\/div>\n<ul>\n<li><a href=\"http:\/\/es.wikipedia.org\/wiki\/Keylogger\">Registro de teclas pulsadas<\/a><\/li>\n<li>Captura de formularios<\/li>\n<li>Capturas de pantalla y grabaci\u00f3n de v\u00eddeo<\/li>\n<li>Inyecci\u00f3n de campos de formulario fraudulentos<\/li>\n<li>Inyecci\u00f3n de p\u00e1ginas fraudulentas<\/li>\n<li>Redirecci\u00f3n de p\u00e1ginas bancarias<\/li>\n<li><a href=\"http:\/\/es.wikipedia.org\/wiki\/Ataque_Man-in-the-middle\">Man-in-the-middle<\/a><\/li>\n<\/ul>\n<p>Adem\u00e1s podremos ver qu\u00e9 sucede con los datos robados y c\u00f3mo se materializa finalmente el robo.<\/p>\n<p>Fuente: Security\u00a0 By Default<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las t\u00e9cnicas de fraude tradicionales (phishing) basadas en ingenier\u00eda social han evolucionado, haciendo uso del malware, y en concreto de los troyanos. \u00c9stos han sido dise\u00f1ados con el objetivo de conseguir beneficios econ\u00f3micos mediante fraudes bancarios. INTECO ha publicado un documento para que los usuarios conozcan un poco m\u00e1s de cerca qu\u00e9 son los troyanos [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-685","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\u00bfque-son-y-como-funcionan-los-troyanos-bancarios\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?\",\"datePublished\":\"2010-03-02T11:25:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/\"},\"wordCount\":255,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2010-03-02T11:25:06+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/\u00bfque-son-y-como-funcionan-los-troyanos-bancarios\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?","datePublished":"2010-03-02T11:25:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/"},"wordCount":255,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/","url":"https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQu\u00e9 son y c\u00f3mo funcionan los troyanos bancarios?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2010-03-02T11:25:06+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/%c2%bfque-son-y-como-funcionan-los-troyanos-bancarios\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=685"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/685\/revisions"}],"predecessor-version":[{"id":686,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/685\/revisions\/686"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}