{"id":5867,"date":"2019-09-15T19:56:27","date_gmt":"2019-09-15T22:56:27","guid":{"rendered":"https:\/\/forti1.com\/?p=5867"},"modified":"2025-02-12T19:49:58","modified_gmt":"2025-02-12T19:49:58","slug":"phishing-cuidado-nova-versao","status":"publish","type":"post","link":"https:\/\/forti1.com\/es\/phishing-care-nueva-version\/","title":{"rendered":"Phishing: nueva versi\u00f3n del malware troyano"},"content":{"rendered":"<p>Phishing: cuidado con esta nueva versi\u00f3n de malware troyano.<\/p>\n\n\n\n<p><a href=\"\/\/help.fortinet.com\/fos50hlp\/54\/Content\/FortiOS\/fortigate-security-profiles-54\/Antivirus\/Trojan%20horses.htm\">Malware troyano:<\/a> Tenga cuidado con esta nueva versi\u00f3n de malware troyano que se propaga a trav\u00e9s de documentos de Word maliciosos. <\/p>\n\n\n\n<p>Cuidado con esta nueva versi\u00f3n del malware troyano <a href=\"https:\/\/forti1.com\/es\/phishing-care-nueva-version\/\" target=\"_blank\" data-type=\"post\" data-id=\"5867\" rel=\"noreferrer noopener\">Phishing<\/a><\/p>\n\n\n\n<p>Una nueva versi\u00f3n del troyano <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" rel=\"noreferrer noopener\">Ursnif<\/a> se env\u00eda a trav\u00e9s de documentos de Word maliciosos con el objetivo de robar datos bancarios y otras credenciales.<\/p>\n\n\n\n<p>Una nueva variante de malware troyano, muy popular entre los ciberdelincuentes, se est\u00e1 propagando a trav\u00e9s de documentos de Word maliciosos con el objetivo de <a href=\"https:\/\/forti1.com\/es\/informacion-de-robo-de-malware\/\" target=\"_blank\" data-type=\"post\" data-id=\"6298\" rel=\"noreferrer noopener\">robar datos<\/a> datos bancarios y otra informaci\u00f3n personal \u00fatil.<\/p>\n\n\n\n<p>O <a href=\"https:\/\/forti1.com\/es\/informacion-de-robo-de-malware\/\">Malware<\/a> El troyano Ursnif est\u00e1 dirigido a m\u00e1quinas Windows y ha existido de una forma u otra al menos desde 2007, cuando su c\u00f3digo apareci\u00f3 por primera vez en el troyano bancario Gozi.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-1024x683.jpg\" alt=\"Protecci\u00f3n contra ransomware y phishing\" class=\"wp-image-7309\" title=\"\" srcset=\"https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-1024x683.jpg 1024w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-300x200.jpg 300w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-768x512.jpg 768w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-1536x1024.jpg 1536w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-2048x1365.jpg 2048w, https:\/\/forti1.com\/wp-content\/uploads\/2020\/02\/ransomware-protection-scaled.jpg 1619w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fortione ayuda a proteger contra la escalada de ransomware<\/figcaption><\/figure>\n\n\n\n<p>Ursnif se ha hecho incre\u00edblemente popular entre los ciberdelincuentes en los \u00faltimos a\u00f1os debido a la filtraci\u00f3n de su c\u00f3digo fuente en l\u00ednea, lo que permite a los atacantes aprovecharse de \u00e9l de forma gratuita.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-variantes-do-malware-de-trojan\">Variantes del malware troyano<\/h2>\n\n\n\n<p>Diferentes variantes de <strong>Malware troyano<\/strong> han aparecido desde que se filtr\u00f3 el c\u00f3digo. Los atacantes lo utilizan y a\u00f1aden sus propias funciones personalizadas para robar datos bancarios y otras credenciales de cuentas en l\u00ednea.<\/p>\n\n\n\n<p>Investigadores de la empresa de ciberseguridad <a href=\"https:\/\/forti1.com\/es\/category\/fortinet-news\/\" target=\"_blank\" data-type=\"category\" data-id=\"1\" rel=\"noreferrer noopener\">Fortinet<\/a>han identificado una nueva versi\u00f3n del <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document\" rel=\"noreferrer noopener\">Ursnif<\/a> en la naturaleza. Se est\u00e1 propagando a trav\u00e9s de correos electr\u00f3nicos de <a href=\"https:\/\/forti1.com\/es\/10-pasos-proteccion-ransomware\/\" data-type=\"post\" data-id=\"6290\">phishing<\/a> que contiene documentos Word con armas. <\/p>\n\n\n\n<p>Estos se\u00f1uelos infectados se nombran con el formato \"info_ [fecha] .doc\" y afirman que el documento se cre\u00f3 en una versi\u00f3n anterior de Word, lo que obliga al usuario a activar las macros para poder visualizarlo.<\/p>\n\n\n\n<p>Al activar las macros haciendo clic en el comando \"Habilitar contenido\" se libera el c\u00f3digo VBA malicioso. Inicia el proceso de lanzamiento de una versi\u00f3n del malware Ursnif que, seg\u00fan los investigadores, se compil\u00f3 recientemente, el 25 de julio. Esto indica lo reciente que es el desarrollo de esta \u00faltima encarnaci\u00f3n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-processos-executados-pelo-malware\">Procesos ejecutados por malware<\/h2>\n\n\n\n<p>Una vez instalado en un sistema, el malware ejecutar\u00e1 varios procesos \"iexplorer.exe\" que aparecen y desaparecen repetidamente.<\/p>\n\n\n\n<p>Este es Ursnif, creando las condiciones necesarias para conectarse a su servidor de comando y control. <\/p>\n\n\n\n<p>En un esfuerzo por hacer la actividad menos sospechosa, la lista de hosts del servidor de C&amp;C incluye referencias a Microsoft y a empresas de seguridad.<\/p>\n\n\n\n<p>Los investigadores advierten de que la campa\u00f1a sigue activa y han proporcionado una revisi\u00f3n de los Indicadores de Compromiso en el an\u00e1lisis del malware.<\/p>\n\n\n\n<p>Las t\u00e9cnicas de ataque desplegadas en esta \u00faltima campa\u00f1a de Ursnif pueden parecer b\u00e1sicas. Incluso los simples ataques de phishing por correo electr\u00f3nico pueden proporcionar a los hackers <strong>medios para entrar en redes o desplegar malware<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-forti-one wp-block-embed-forti-one\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/forti1.com\/ai-automacao-em-seguranca-cibernetica\/\n<\/div><\/figure>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Phishing: cuidado con esta nueva versi\u00f3n de malware troyano. Malware troyano: cuidado con esta nueva versi\u00f3n de malware [...]<\/p>","protected":false},"author":4,"featured_media":7598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":null,"ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":null,"ast-hfb-below-header-display":null,"ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":null,"ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":null,"stick-header-meta":null,"header-above-stick-meta":null,"header-main-stick-meta":null,"header-below-stick-meta":null,"astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2417],"tags":[16,790,33,791],"class_list":["post-5867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-fortinet","tag-malware","tag-seguranca-de-redes","tag-ursnif-trojan"],"_links":{"self":[{"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/posts\/5867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/comments?post=5867"}],"version-history":[{"count":0,"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/posts\/5867\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/media\/7598"}],"wp:attachment":[{"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/media?parent=5867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/categories?post=5867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forti1.com\/es\/wp-json\/wp\/v2\/tags?post=5867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}