
{"id":786,"date":"2010-10-01T08:11:56","date_gmt":"2010-10-01T11:11:56","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=786"},"modified":"2010-10-01T08:11:56","modified_gmt":"2010-10-01T11:11:56","slug":"zitmo-el-troyano-zeus-en-el-movil","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/","title":{"rendered":"Zitmo: el troyano Zeus en el m\u00f3vil"},"content":{"rendered":"<p>Fortinet est\u00e1 alertando sobre un nuevo malware para m\u00f3viles destinado a interceptar SMS de confirmaci\u00f3n enviados por los bancos a sus clientes. El malware es una versi\u00f3n del conocido troyano Zeus, que tanto da\u00f1o ha causado a los usuarios de banca online. Precisamente fue bautizado como Zitmo (Zeus In The Mobile) en referencia al tipo de ataque \u2018Man in the Middle\u2019 (an\u00e1lisis en Virustotal).<\/p>\n<p>Cuando se realiza una transacci\u00f3n por medio de la banca online, algunos bancos env\u00edan un c\u00f3digo al tel\u00e9fono m\u00f3vil por medio de un SMS. Dicho c\u00f3digo tiene que ser ingresado por el usuario en la web del banco para confirmar la transacci\u00f3n. Seg\u00fan Fortinet, es en ese momento cuando se produce el ataque.<\/p>\n<p>Zitmo intercepta el SMS y puede confirmar las transacciones bancarias iniciadas por el Troyano Zeus en el ordenador de la v\u00edctima, sin que \u00e9ste se entere y vaciar completamente sus cuentas bancarias.<\/p>\n<p>Axelle Apvrille, analista senior de antivirus para m\u00f3viles e investigador del Laboratorio FortiGuard de Fortinet, da los siguientes detalles sobre el funcionamiento de este ataque:<\/p>\n<p>    * El Troyano Zeus detecta el nombre de usuario y la clave del cliente en su PC;<br \/>\n    * El Troyano Zeus consigue el n\u00famero de m\u00f3vil del usuario a trav\u00e9s de un formulario malicioso introducido en el navegador del usuario;<br \/>\n    * Se env\u00eda un SMS, ofreciendo un link a una \u201ccertificaci\u00f3n\u201d pidiendo que sea instalada. Este paquete descargable contiene a Zitmo (la parte \u201cm\u00f3vil\u201d del Troyano Zeus);<br \/>\n    * Una vez realizada la instalaci\u00f3n, la operaci\u00f3n de malware se ha completado. Los cibercriminales, que controlan el Troyano Zeus, pueden iniciar transferencias desde la cuenta bancaria online del usuario y confirmarlas interceptando los SMS que el banco env\u00eda al m\u00f3vil del usuario.<\/p>\n<p>M\u00e1s informaci\u00f3n en el Informe de Fortinet y S21Sec (I, II y III)<\/p>\n<p>Fuente: Blog Antivirus y Segu-Info<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet est\u00e1 alertando sobre un nuevo malware para m\u00f3viles destinado a interceptar SMS de confirmaci\u00f3n enviados por los bancos a sus clientes. El malware es una versi\u00f3n del conocido troyano Zeus, que tanto da\u00f1o ha causado a los usuarios de banca online. Precisamente fue bautizado como Zitmo (Zeus In The Mobile) en referencia al tipo [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-786","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Zitmo: el troyano Zeus en el m\u00f3vil<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Zitmo: el troyano Zeus en el m\u00f3vil\",\"datePublished\":\"2010-10-01T11:11:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/\"},\"wordCount\":334,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Zitmo: el troyano Zeus en el m\u00f3vil\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2010-10-01T11:11:56+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Zitmo: el troyano Zeus en el m\u00f3vil","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Zitmo: el troyano Zeus en el m\u00f3vil","datePublished":"2010-10-01T11:11:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/"},"wordCount":334,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/","url":"https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Zitmo: el troyano Zeus en el m\u00f3vil","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2010-10-01T11:11:56+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/zitmo-el-troyano-zeus-en-el-movil\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=786"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/786\/revisions"}],"predecessor-version":[{"id":787,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/786\/revisions\/787"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}