
{"id":795,"date":"2010-10-05T08:26:02","date_gmt":"2010-10-05T11:26:02","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=795"},"modified":"2010-10-05T08:26:02","modified_gmt":"2010-10-05T11:26:02","slug":"spam-la-foto-del-milenio","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/","title":{"rendered":"SPAM: La foto del milenio"},"content":{"rendered":"<p>\u00a0El d\u00eda de hoy circula el siguiente mensaje por Facebook:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"FotodelmilenioFB\" src=\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96\" alt=\"\" width=\"460\" height=\"96\" \/><\/p>\n<blockquote><p><em>&#8220;no puedo creer que esta foto sea la mas cara del milenio y ensima ganadora del record guiness xd. la dejo para que la vean&#8230; http:\/\/apps.facebook.com\/fotodelmilenio\/&#8221;<\/em><\/p><\/blockquote>\n<p>No estoy seguro pero lo m\u00e1s probable (con un 99% de probabilidad) es que se trate de una estrateg\u00eda de ingenier\u00eda social para distribuir un virus.<\/p>\n<p><span style=\"color: #000000;\">En el campo de la <\/span><span style=\"color: #000000;\">seguridad inform\u00e1tica<\/span><span style=\"color: #000000;\">, <strong>ingenier\u00eda social<\/strong> es la pr\u00e1ctica de obtener <\/span><span style=\"color: #000000;\">informaci\u00f3n<\/span><span style=\"color: #000000;\"> confidencial a trav\u00e9s de la manipulaci\u00f3n de <\/span><span style=\"color: #000000;\">usuarios<\/span><span style=\"color: #000000;\"> leg\u00edtimos. En este caso el atacante estar\u00eda utilizando t\u00e9cnicas sociales para distribuir masivamente un c\u00f3digo, un programa pues. Dado que el mensaje nos invita a acceder a una aplicaci\u00f3n de Facebook (y no a una foto como prometen), supongo que la aplicaci\u00f3n har\u00e1 algo m\u00e1s que mostrar una foto. El siguiente gr\u00e1fico, que muestra lo que se obtiene al hacer clic en este enlace, nos pide permiso para ejecutar una aplicaci\u00f3n que acceder\u00e1 a nuestra informaci\u00f3n b\u00e1sica.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"FotodelmilenioFB1\" src=\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb11.png?w=460&amp;h=256\" alt=\"\" width=\"460\" height=\"256\" \/><\/p>\n<div><strong>\u00bfQu\u00e9 es lo que conseguir\u00e1 el atacante?<\/strong><\/div>\n<p>Lo que el autor de esa aplicaci\u00f3n obtendr\u00e1 es una lista de usuarios de Facebook con los datos b\u00e1sicos de su perfil que el usuario tenga compartidos. Y con esa informaci\u00f3n un hacker puede hacer maravillas:<\/p>\n<ul>\n<li>Puede vender esa informaci\u00f3n a terceros.<\/li>\n<li>Puede usar los datos para inferir nuestro perfil socioecon\u00f3mico.<\/li>\n<li>Puede usar los datos para inferir nuestra contrase\u00f1a.<\/li>\n<li>Puede averiguar d\u00f3nde vivimos.<\/li>\n<li>Puede saber nuestro tel\u00e9fono; una llamada le costar\u00eda saber si estamos o no en casa.<\/li>\n<li>Puede usar esa informaci\u00f3n para realizar un ataque de ingenier\u00eda social m\u00e1s personalizado.<\/li>\n<li>Todo lo que a usted se le ocurra.<\/li>\n<li>Etc\u00e9tera.<\/li>\n<\/ul>\n<h4>\u00bfQu\u00e9 hacer si ya ca\u00edmos en la trampa?<\/h4>\n<p>Hay que entrar a nuestro perfil de Facebook y en el men\u00fa \u201cCuenta\u201d seleccionar la opci\u00f3n \u201cConfiguraci\u00f3n de las aplicaciones\u201d. Al hacerlo veremos una pantalla como la que se muestra a continuaci\u00f3n:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"FotodelmilenioFB2\" src=\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb2.png?w=460&amp;h=221\" alt=\"\" width=\"460\" height=\"221\" \/><br \/>\nEn la l\u00ednea donde se lee \u201c<span style=\"text-decoration: underline;\">la fotograf\u00eda mas cara del milenio<\/span>\u201d <strong>hacer clic en la parte de editar configuracion y quitarle todos los permisos especiales<\/strong>; despues haga clic en la \u201cX\u201d para eliminar el acceso de esa aplicaci\u00f3n a nuestros datos. Un par de clics m\u00e1s para confirmar y ya estamos listos.<\/p>\n<p><strong><em>Pero no vamos a hacer nada mas? ESTO NO PUEDE SEGUIR AS\u00cd! <\/em><\/strong><br \/>\n<strong><span style=\"color: #004000; font-size: medium;\">Reportemoslo como SPAM!<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Reportar una aplicacion Facebook\" src=\"http:\/\/lh3.ggpht.com\/_oaZnRgPpCAU\/TKpsgKyoJ9I\/AAAAAAAAABk\/Z_ihMtT0EqM\/1%5B9%5D.jpg?imgmax=800\" border=\"0\" alt=\"Reportar una aplicacion Facebook\" width=\"455\" height=\"394\" \/><\/p>\n<p>La aplicacion la encontramos aqui: <a title=\"http:\/\/www.facebook.com\/apps\/application.php?id=67638337969\" href=\"http:\/\/www.facebook.com\/apps\/application.php?id=67638337969\" target=\"_blank\">http:\/\/www.facebook.com\/apps\/application.php?id=67638337969<\/a> y vemos su desarrollador: <a title=\"http:\/\/www.facebook.com\/iaariittaahcyrus\" href=\"http:\/\/www.facebook.com\/iaariittaahcyrus\" target=\"_blank\">http:\/\/www.facebook.com\/iaariittaahcyrus<\/a>\u00a0<\/p>\n<p><em>Fuente: <\/em><a href=\"http:\/\/masfb.blogspot.com\/2010\/10\/spam-la-foto-del-milenio.html\"><em>http:\/\/masfb.blogspot.com\/2010\/10\/spam-la-foto-del-milenio.html<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0El d\u00eda de hoy circula el siguiente mensaje por Facebook: &#8220;no puedo creer que esta foto sea la mas cara del milenio y ensima ganadora del record guiness xd. la dejo para que la vean&#8230; http:\/\/apps.facebook.com\/fotodelmilenio\/&#8221; No estoy seguro pero lo m\u00e1s probable (con un 99% de probabilidad) es que se trate de una estrateg\u00eda [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-795","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - SPAM: La foto del milenio<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Santiago Trigo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/\"},\"author\":{\"name\":\"Santiago Trigo\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\"},\"headline\":\"SPAM: La foto del milenio\",\"datePublished\":\"2010-10-05T11:26:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/\"},\"wordCount\":456,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96\",\"articleSection\":[\"Noticias\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - SPAM: La foto del milenio\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96\",\"datePublished\":\"2010-10-05T11:26:02+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage\",\"url\":\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96\",\"contentUrl\":\"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\",\"name\":\"Santiago Trigo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"caption\":\"Santiago Trigo\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - SPAM: La foto del milenio","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/","twitter_misc":{"Written by":"Santiago Trigo","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/"},"author":{"name":"Santiago Trigo","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3"},"headline":"SPAM: La foto del milenio","datePublished":"2010-10-05T11:26:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/"},"wordCount":456,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage"},"thumbnailUrl":"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96","articleSection":["Noticias"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/","url":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - SPAM: La foto del milenio","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage"},"thumbnailUrl":"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96","datePublished":"2010-10-05T11:26:02+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/spam-la-foto-del-milenio\/#primaryimage","url":"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96","contentUrl":"http:\/\/infoaleph.files.wordpress.com\/2010\/10\/fotodelmileniofb.png?w=460&amp;h=96"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3","name":"Santiago Trigo","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","caption":"Santiago Trigo"},"sameAs":["http:\/\/www.talsoft.com.ar"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=795"}],"version-history":[{"count":4,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/795\/revisions"}],"predecessor-version":[{"id":799,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/795\/revisions\/799"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}