{"id":161486,"date":"2017-05-17T08:51:22","date_gmt":"2017-05-17T12:51:22","guid":{"rendered":"http:\/\/desarrollo.ip.gov.py\/ip\/?p=161486"},"modified":"2017-05-17T08:51:22","modified_gmt":"2017-05-17T12:51:22","slug":"hablan-de-nuevo-ciberataque-a-gran-escala","status":"publish","type":"post","link":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/","title":{"rendered":"Hablan de nuevo ciberataque a gran escala"},"content":{"rendered":"<p style=\"text-align: justify;\"><em><strong>Par\u00eds.-<\/strong><\/em>Un nuevo ciberataque a gran escala para robar moneda virtual afectaba a cientos de miles de ordenadores en todo el mundo este mi\u00e9rcoles, seg\u00fan expertos en seguridad cibern\u00e9tica.<!--more--><\/p>\n<p style=\"text-align: justify;\">Tras el ataque del viernes, expertos en ciberseguridad descubrieron un nuevo ataque vinculado al virus Wannacry, llamado Adylkuzz.<\/p>\n<p style=\"text-align: justify;\">\u201cUtiliza con m\u00e1s discreci\u00f3n y para diferentes prop\u00f3sitos herramientas de pirateo recientemente reveladas por la NSA y la vulnerabilidad ahora corregida en Microsoft\u201d, dijo el investigador Nicolas Godier, experto en seguridad cibern\u00e9tica de Proofpoint.<\/p>\n<p style=\"text-align: justify;\">\u201cTodav\u00eda desconocemos el alcance (del da\u00f1o), pero cientos de miles de computadoras\u201d podr\u00edan haber sido infectadas, dijo a la AFP Robert Holmes, de Proofpoint, lo que indica que el ataque es \u201cmucho mayor\u201d que WannaCry.<\/p>\n<p style=\"text-align: justify;\">Concretamente, este \u2019malware\u2019 se instala en equipos accesibles a trav\u00e9s de la misma vulnerabilidad de Windows utilizada por WannaCry, una falla ya detectada por la NSA (Agencia de Seguridad Nacional de Estados Unidos), que se filtr\u00f3 en internet en abril.<\/p>\n<p style=\"text-align: justify;\">Este malware crea, de forma invisible, unidades de una moneda virtual ilocalizable llamada Monero, comparable al Bitcoin. Los datos que permiten utilizar este dinero son extra\u00eddos y enviados a direcciones cifradas. Para los usuarios, \u201clos s\u00edntomas del ataque son sobre todo un rendimiento m\u00e1s lento del aparato\u201d, se\u00f1al\u00f3 Proofpoint en un blog.<\/p>\n<p style=\"text-align: justify;\">La firma asegura haber detectado ordenadores que pagaron el equivalente a varios miles de d\u00f3lares sin el conocimiento de sus usuarios. De acuerdo con Robert Holmes, \u201cya ha habido ataques de este tipo, con programas que crean moneda criptogr\u00e1fica, pero nunca a esta escala\u201d.<\/p>\n<p style=\"text-align: justify;\">WannaCry afect\u00f3 a m\u00e1s de 300.000 ordenadores en unos 150 pa\u00edses, seg\u00fan Tom Bossert, consejero de Seguridad Interior del presidente de Estados Unidos, Donald Trump.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Par\u00eds.-Un nuevo ciberataque a gran escala para robar moneda virtual afectaba a cientos de miles de ordenadores en todo el mundo este mi\u00e9rcoles, seg\u00fan expertos en seguridad cibern\u00e9tica.<\/p>\n","protected":false},"author":11,"featured_media":161487,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-161486","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-internacionales"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hablan de nuevo ciberataque a gran escala - .::Agencia IP::.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hablan de nuevo ciberataque a gran escala - .::Agencia IP::.\" \/>\n<meta property=\"og:description\" content=\"Par\u00eds.-Un nuevo ciberataque a gran escala para robar moneda virtual afectaba a cientos de miles de ordenadores en todo el mundo este mi\u00e9rcoles, seg\u00fan expertos en seguridad cibern\u00e9tica.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/\" \/>\n<meta property=\"og:site_name\" content=\".::Agencia IP::.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IPParaguay\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-17T12:51:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2017\/05\/Ciberataque.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"627\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"vrios\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IPParaguay\" \/>\n<meta name=\"twitter:site\" content=\"@IPParaguay\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"vrios\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/\"},\"author\":{\"name\":\"vrios\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#\\\/schema\\\/person\\\/fa3668852e893cb0423795330f919039\"},\"headline\":\"Hablan de nuevo ciberataque a gran escala\",\"datePublished\":\"2017-05-17T12:51:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/\"},\"wordCount\":304,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Ciberataque.jpg\",\"articleSection\":[\"Internacionales\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/\",\"url\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/\",\"name\":\"Hablan de nuevo ciberataque a gran escala - .::Agencia IP::.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Ciberataque.jpg\",\"datePublished\":\"2017-05-17T12:51:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Ciberataque.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Ciberataque.jpg\",\"width\":627,\"height\":627,\"caption\":\"Microsoft Insider\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/2017\\\/05\\\/17\\\/hablan-de-nuevo-ciberataque-a-gran-escala\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hablan de nuevo ciberataque a gran escala\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#website\",\"url\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/\",\"name\":\".::Agencia IP::.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#organization\",\"name\":\"Agencia IP\",\"url\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Agencia-IP.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/Agencia-IP.jpg\",\"width\":150,\"height\":150,\"caption\":\"Agencia IP\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/IPParaguay\\\/\",\"https:\\\/\\\/x.com\\\/IPParaguay\",\"https:\\\/\\\/www.instagram.com\\\/IPParaguay\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/#\\\/schema\\\/person\\\/fa3668852e893cb0423795330f919039\",\"name\":\"vrios\",\"url\":\"https:\\\/\\\/www.ip.gov.py\\\/ip\\\/author\\\/vrios\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hablan de nuevo ciberataque a gran escala - .::Agencia IP::.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/","og_locale":"es_ES","og_type":"article","og_title":"Hablan de nuevo ciberataque a gran escala - .::Agencia IP::.","og_description":"Par\u00eds.-Un nuevo ciberataque a gran escala para robar moneda virtual afectaba a cientos de miles de ordenadores en todo el mundo este mi\u00e9rcoles, seg\u00fan expertos en seguridad cibern\u00e9tica.","og_url":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/","og_site_name":".::Agencia IP::.","article_publisher":"https:\/\/www.facebook.com\/IPParaguay\/","article_published_time":"2017-05-17T12:51:22+00:00","og_image":[{"width":627,"height":627,"url":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2017\/05\/Ciberataque.jpg","type":"image\/jpeg"}],"author":"vrios","twitter_card":"summary_large_image","twitter_creator":"@IPParaguay","twitter_site":"@IPParaguay","twitter_misc":{"Escrito por":"vrios","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#article","isPartOf":{"@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/"},"author":{"name":"vrios","@id":"https:\/\/www.ip.gov.py\/ip\/#\/schema\/person\/fa3668852e893cb0423795330f919039"},"headline":"Hablan de nuevo ciberataque a gran escala","datePublished":"2017-05-17T12:51:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/"},"wordCount":304,"publisher":{"@id":"https:\/\/www.ip.gov.py\/ip\/#organization"},"image":{"@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2017\/05\/Ciberataque.jpg","articleSection":["Internacionales"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/","url":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/","name":"Hablan de nuevo ciberataque a gran escala - .::Agencia IP::.","isPartOf":{"@id":"https:\/\/www.ip.gov.py\/ip\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#primaryimage"},"image":{"@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2017\/05\/Ciberataque.jpg","datePublished":"2017-05-17T12:51:22+00:00","breadcrumb":{"@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#primaryimage","url":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2017\/05\/Ciberataque.jpg","contentUrl":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2017\/05\/Ciberataque.jpg","width":627,"height":627,"caption":"Microsoft Insider"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ip.gov.py\/ip\/2017\/05\/17\/hablan-de-nuevo-ciberataque-a-gran-escala\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ip.gov.py\/ip\/"},{"@type":"ListItem","position":2,"name":"Hablan de nuevo ciberataque a gran escala"}]},{"@type":"WebSite","@id":"https:\/\/www.ip.gov.py\/ip\/#website","url":"https:\/\/www.ip.gov.py\/ip\/","name":".::Agencia IP::.","description":"","publisher":{"@id":"https:\/\/www.ip.gov.py\/ip\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ip.gov.py\/ip\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.ip.gov.py\/ip\/#organization","name":"Agencia IP","url":"https:\/\/www.ip.gov.py\/ip\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.ip.gov.py\/ip\/#\/schema\/logo\/image\/","url":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2018\/01\/Agencia-IP.jpg","contentUrl":"https:\/\/www.ip.gov.py\/ip\/wp-content\/uploads\/2018\/01\/Agencia-IP.jpg","width":150,"height":150,"caption":"Agencia IP"},"image":{"@id":"https:\/\/www.ip.gov.py\/ip\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IPParaguay\/","https:\/\/x.com\/IPParaguay","https:\/\/www.instagram.com\/IPParaguay"]},{"@type":"Person","@id":"https:\/\/www.ip.gov.py\/ip\/#\/schema\/person\/fa3668852e893cb0423795330f919039","name":"vrios","url":"https:\/\/www.ip.gov.py\/ip\/author\/vrios\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/posts\/161486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/comments?post=161486"}],"version-history":[{"count":0,"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/posts\/161486\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/media\/161487"}],"wp:attachment":[{"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/media?parent=161486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/categories?post=161486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ip.gov.py\/ip\/wp-json\/wp\/v2\/tags?post=161486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}