
{"id":851,"date":"2010-11-17T08:23:31","date_gmt":"2010-11-17T11:23:31","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=851"},"modified":"2010-11-17T08:23:31","modified_gmt":"2010-11-17T11:23:31","slug":"defacement-y-phishing-al-bancolombia","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/","title":{"rendered":"Defacement y Phishing al BanColombia"},"content":{"rendered":"<div>\n<div>En  el d\u00eda de hoy nos han reportado un caso de Phishing a BanColombia que  se caracteriza por el cl\u00e1sico robo de datos a la entidad afectada y  adem\u00e1s se ha realizado un defacement a uno de los sitios utilizados para  montar la p\u00e1gina falsa.<\/p>\n<p>El enga\u00f1o comienza como siempre con un correo electr\u00f3nico masivo, que luce as\u00ed:<\/p>\n<div><a href=\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s1600\/bancolombia.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png\" border=\"0\" alt=\"\" width=\"320\" height=\"297\" \/><\/a><\/div>\n<p>Como puede verse el enlace conduce a un sitio que no coincide con el  banco y que ha sido vulnerado para ser utilizado como pasarela hacia  otro sitio. En la siguiente consulta se puede ver la redirecci\u00f3n desde  el sitio<br \/>\n<em>http:\/\/[ELIMINADO]films.com:80\/https\/www.bancolombia.com.php<\/em> hacia <em>http:\/\/www.[ELIMINADO]shop.cz:80\/cache\/https\/bancolombia.olb.todo1.com\/olb\/Init.php<\/em><\/p>\n<div><a href=\"http:\/\/1.bp.blogspot.com\/_sdv3yhG5CB4\/TOLdFXnWreI\/AAAAAAAAEEU\/jEUgRxpTCWg\/s1600\/bancolombia3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/1.bp.blogspot.com\/_sdv3yhG5CB4\/TOLdFXnWreI\/AAAAAAAAEEU\/jEUgRxpTCWg\/s320\/bancolombia3.png\" border=\"0\" alt=\"\" width=\"320\" height=\"100\" \/><\/a><\/div>\n<p>Al ingresar al sitio, se solicitan los datos de acceso, que posteriormente son enviados al delincuente:<\/p>\n<div><a href=\"http:\/\/2.bp.blogspot.com\/_sdv3yhG5CB4\/TOLdPMJprsI\/AAAAAAAAEEY\/QYX8Gffm8-A\/s1600\/bancolombia2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/2.bp.blogspot.com\/_sdv3yhG5CB4\/TOLdPMJprsI\/AAAAAAAAEEY\/QYX8Gffm8-A\/s320\/bancolombia2.png\" border=\"0\" alt=\"\" width=\"320\" height=\"222\" \/><\/a><\/div>\n<p>Una vez que se han robado las credenciales, el usuario es redirigido al sitio real del banco afectado.<br \/>\nCon respecto al defacement, el \u00faltimo sitio mencionado ha sido  modificado por quiz\u00e1s otros delincuentes que han encontrado el sitio  vulnerables. Han modificado la p\u00e1gina inicial con el siguiente mensaje  pol\u00edtico:<\/p>\n<div><a href=\"http:\/\/2.bp.blogspot.com\/_sdv3yhG5CB4\/TOLd33ayw3I\/AAAAAAAAEEc\/G4e9Sa0uzqw\/s1600\/teammosta.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/2.bp.blogspot.com\/_sdv3yhG5CB4\/TOLd33ayw3I\/AAAAAAAAEEc\/G4e9Sa0uzqw\/s320\/teammosta.png\" border=\"0\" alt=\"\" width=\"320\" height=\"285\" \/><\/a><\/div>\n<p>Los casos de phishing ya han sido denunciados a los navegadores y a Phishtank para que se proceda a su bloqueo.<\/p>\n<p><em><strong>Fuente: <a href=\"http:\/\/blog.segu-info.com.ar\/2010\/11\/defacement-y-phishing-al-bancolombia.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+NoticiasSeguridadInformatica+%28Noticias+de+Seguridad+Inform%C3%A1tica%29#axzz15XMpMmr7\" target=\"_blank\">Segu-Info<\/a><\/strong><\/em><br \/>\n<a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\"><br \/>\n<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>En el d\u00eda de hoy nos han reportado un caso de Phishing a BanColombia que se caracteriza por el cl\u00e1sico robo de datos a la entidad afectada y adem\u00e1s se ha realizado un defacement a uno de los sitios utilizados para montar la p\u00e1gina falsa. El enga\u00f1o comienza como siempre con un correo electr\u00f3nico masivo, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-851","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Defacement y Phishing al BanColombia<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Santiago Trigo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/\"},\"author\":{\"name\":\"Santiago Trigo\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\"},\"headline\":\"Defacement y Phishing al BanColombia\",\"datePublished\":\"2010-11-17T11:23:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/\"},\"wordCount\":225,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Defacement y Phishing al BanColombia\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png\",\"datePublished\":\"2010-11-17T11:23:31+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage\",\"url\":\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png\",\"contentUrl\":\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\",\"name\":\"Santiago Trigo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"caption\":\"Santiago Trigo\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Defacement y Phishing al BanColombia","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/","twitter_misc":{"Written by":"Santiago Trigo","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/"},"author":{"name":"Santiago Trigo","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3"},"headline":"Defacement y Phishing al BanColombia","datePublished":"2010-11-17T11:23:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/"},"wordCount":225,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/","url":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Defacement y Phishing al BanColombia","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png","datePublished":"2010-11-17T11:23:31+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/defacement-y-phishing-al-bancolombia\/#primaryimage","url":"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png","contentUrl":"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TOLc_eRcTBI\/AAAAAAAAEEQ\/AHR9QY4hNBs\/s320\/bancolombia.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3","name":"Santiago Trigo","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","caption":"Santiago Trigo"},"sameAs":["http:\/\/www.talsoft.com.ar"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=851"}],"version-history":[{"count":2,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/851\/revisions"}],"predecessor-version":[{"id":853,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/851\/revisions\/853"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}