{"id":35319,"date":"2024-02-14T18:55:17","date_gmt":"2024-02-14T17:55:17","guid":{"rendered":"https:\/\/quike.it\/es\/?p=35319"},"modified":"2024-02-14T18:55:17","modified_gmt":"2024-02-14T17:55:17","slug":"hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme","status":"publish","type":"post","link":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/","title":{"rendered":"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"35319\" class=\"elementor elementor-35319\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60662d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60662d7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0790593\" data-id=\"0790593\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a0d214 elementor-widget elementor-widget-text-editor\" data-id=\"2a0d214\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Microsoft<\/strong> ha lanzado una actualizaci\u00f3n que aborda una <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_d%C3%ADa_cero\" target=\"_blank\" rel=\"noopener\"><em><strong>vulnerabilidad<\/strong> <strong>zero-day<\/strong><\/em><\/a> en <strong>Windows Defender SmartScreen<\/strong>, la cual fue aprovechada en ataques reales por un grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el <a href=\"https:\/\/quike.it\/es\/troyanos-el-engano-informatico-que-se-oculta-en-las-sombras\/\" target=\"_blank\" rel=\"noopener\"><strong>troyano<\/strong><\/a> de acceso remoto conocido como <strong>DarkMe.<\/strong><\/p><p>Identificado como <em><strong>Water Hydra<\/strong><\/em> y <em><strong>DarkCasino,<\/strong><\/em> este grupo de pirater\u00eda fue descubierto utilizando el <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_d%C3%ADa_cero\" target=\"_blank\" rel=\"noopener\"><strong>zero-day<\/strong><\/a> (<em><strong>CVE-2024-21412<\/strong><\/em>) durante ataques realizados el d\u00eda de <strong>Nochevieja,<\/strong> seg\u00fan los investigadores de seguridad de <strong>Trend Micro<\/strong>.<\/p><p>En el aviso de seguridad emitido ayer, <strong>Microsoft<\/strong> explic\u00f3:<\/p><p>\u00ab<em><strong>Un atacante no autenticado podr\u00eda enviar al usuario objetivo un archivo especialmente dise\u00f1ado para eludir las verificaciones de seguridad mostradas. Sin embargo, el atacante no tendr\u00eda la capacidad de forzar al usuario a ver el contenido controlado por \u00e9l. En cambio, depender\u00eda de persuadir al usuario para que tome medidas, como hacer clic en el enlace del archivo<\/strong><\/em>\u00ab.<\/p><p><strong>Peter Girnus<\/strong>, investigador de seguridad de <strong>Trend Micro<\/strong>, quien fue acreditado por informar sobre este <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_d%C3%ADa_cero\" target=\"_blank\" rel=\"noopener\"><strong>zero-day<\/strong><\/a>, revel\u00f3 que la vulnerabilidad <strong>CVE-2024-21412<\/strong> elude otra falla de <strong>Defender SmartScreen<\/strong> (<em><strong>CVE-2023-36025<\/strong><\/em>).<\/p><p>La<em><strong> CVE-2023-36025<\/strong><\/em> fue <strong><em>parcheada<\/em><\/strong> durante el <a href=\"https:\/\/quike.it\/es\/los-martes-de-parches-de-microsoft-windows\/\" target=\"_blank\" rel=\"noopener\"><strong>Martes de Parches<\/strong><\/a> de <a href=\"https:\/\/quike.it\/es\/actualizacion-windows-11-kb5032190\/\" target=\"_blank\" rel=\"noopener\"><strong>noviembre de 2023<\/strong><\/a> y, seg\u00fan <strong>Trend Micro<\/strong>, tambi\u00e9n fue aprovechada el mes pasado para eludir las advertencias de seguridad de <strong>Windows<\/strong> al abrir archivos de <strong>URL,<\/strong> desplegando as\u00ed el <strong>malware Phemedrone,<\/strong> un ladr\u00f3n de informaci\u00f3n.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65ae14d elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"65ae14d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-30519\">.elementor-30519 .elementor-element.elementor-element-98493d2 .elementor-column-gap-custom .elementor-column > .elementor-element-populated{padding:2px;}.elementor-30519 .elementor-element.elementor-element-ccee508 > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){--kit-widget-spacing:1px;}.elementor-widget-image .widget-image-caption{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-80149f2 img{height:85px;object-fit:cover;object-position:center center;}.elementor-30519 .elementor-element.elementor-element-80149f2:not( .elementor-widget-image ), .elementor-30519 .elementor-element.elementor-element-80149f2.elementor-widget-image img{-webkit-mask-image:url( https:\/\/quike.it\/es\/wp-content\/plugins\/elementor\/assets\/mask-shapes\/circle.svg );-webkit-mask-size:contain;-webkit-mask-position:center center;-webkit-mask-repeat:no-repeat;}.elementor-30519 .elementor-element.elementor-element-2109b1e > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){--kit-widget-spacing:3px;}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon{width:17px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon i{font-size:17px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon svg{--e-icon-list-icon-size:17px;}body:not(.rtl) .elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-text{padding-left:5px;}body.rtl .elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-text{padding-right:5px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-item{font-family:\"Work Sans\", Sans-serif;font-weight:600;text-transform:uppercase;word-spacing:0px;}.elementor-30519 .elementor-element.elementor-element-26a68f7{width:100%;max-width:100%;align-self:center;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );}.elementor-30519 .elementor-element.elementor-element-1ed9e84 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;font-weight:600;color:#000000;}.elementor-widget-icon-list .elementor-icon-list-item > .elementor-icon-list-text, .elementor-widget-icon-list .elementor-icon-list-item > a{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-icon i{color:#000000;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-icon svg{fill:#000000;transition:fill 0.3s;}.elementor-30519 .elementor-element.elementor-element-714486b{--e-icon-list-icon-size:13px;--e-icon-list-icon-align:left;--e-icon-list-icon-margin:0 calc(var(--e-icon-list-icon-size, 1em) * 0.25) 0 0;--icon-vertical-align:center;--icon-vertical-offset:0px;margin:0px 0px calc(var(--kit-widget-spacing, 0px) + 0px) 0px;padding:0px 0px 0px 0px;width:100%;max-width:100%;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-item > .elementor-icon-list-text, .elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-item > a{font-family:\"Work Sans\", Sans-serif;font-size:11px;font-weight:500;text-transform:capitalize;line-height:16px;letter-spacing:1px;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-text{color:#333333;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-icon i{color:#000000;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-icon svg{fill:#000000;transition:fill 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7{--e-icon-list-icon-size:13px;--e-icon-list-icon-align:left;--e-icon-list-icon-margin:0 calc(var(--e-icon-list-icon-size, 1em) * 0.25) 0 0;--icon-vertical-align:center;--icon-vertical-offset:0px;margin:0px 0px calc(var(--kit-widget-spacing, 0px) + 0px) 0px;padding:0px 0px 0px 0px;width:100%;max-width:100%;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-item > .elementor-icon-list-text, .elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-item > a{font-family:\"Work Sans\", Sans-serif;font-size:11px;font-weight:500;text-transform:capitalize;line-height:16px;letter-spacing:1px;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-text{color:#333333;transition:color 0.3s;}@media(min-width:768px){.elementor-30519 .elementor-element.elementor-element-ccee508{width:20%;}.elementor-30519 .elementor-element.elementor-element-2109b1e{width:79.997%;}}@media(max-width:767px){.elementor-30519 .elementor-element.elementor-element-98493d2 .elementor-column-gap-custom .elementor-column > .elementor-element-populated{padding:2px;}.elementor-30519 .elementor-element.elementor-element-ccee508{width:25%;}.elementor-30519 .elementor-element.elementor-element-2109b1e{width:75%;}.elementor-30519 .elementor-element.elementor-element-1ed9e84 .elementor-heading-title{font-size:15px;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-34747 post-34747 post type-post status-publish format-standard has-post-thumbnail hentry category-chrome category-web\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/google-resuelve-primer-ataque-de-dia-cero-de-chrome-del-2024\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/10\/Googler_Chrome1.png\" class=\"attachment-full size-full wp-image-30923\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/10\/Googler_Chrome1.png 800w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/10\/Googler_Chrome1-300x225.png 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/10\/Googler_Chrome1-768x576.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/web\/navegadores\/chrome\/\" rel=\"tag\">Chrome<\/a> <a href=\"https:\/\/quike.it\/es\/category\/web\/\" rel=\"tag\">WEB<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/google-resuelve-primer-ataque-de-dia-cero-de-chrome-del-2024\/\" target=\"_blank\">Google Resuelve primer Ataque de d\u00eda Cero de Chrome del 2024<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/google-resuelve-primer-ataque-de-dia-cero-de-chrome-del-2024\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">76 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/google-resuelve-primer-ataque-de-dia-cero-de-chrome-del-2024\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/google-resuelve-primer-ataque-de-dia-cero-de-chrome-del-2024\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">76 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/google-resuelve-primer-ataque-de-dia-cero-de-chrome-del-2024\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c28d508 elementor-widget elementor-widget-heading\" data-id=\"c28d508\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vulnerabilidad reci\u00e9n descubierta empleada en ataques dirigidos contra operadores del mercado financiero<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ba5226 elementor-widget elementor-widget-text-editor\" data-id=\"8ba5226\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_d%C3%ADa_cero\" target=\"_blank\" rel=\"noopener\"><strong>vulnerabilidad zero-day<\/strong><\/a>, la cual <strong>Microsoft<\/strong> abord\u00f3 en su \u00faltimo parche, fue empleada en ataques espec\u00edficos dirigidos a \u00ab<strong><em>traders de divisas que participan en el mercado de comercio de divisas de alto riesgo<\/em><\/strong>\u00ab, con la aparente finalidad de llevar a cabo el robo de datos o, posiblemente, desplegar <a href=\"https:\/\/quike.it\/es\/ransomware-protegiendo-tus-datos-en-la-era-digital\/\" target=\"_blank\" rel=\"noopener\"><strong>ransomware<\/strong><\/a> en etapas posteriores.<\/p><p><strong>Trend Micro<\/strong> explic\u00f3 que a fines de <strong>diciembre de 2023<\/strong>, detectaron una campa\u00f1a del grupo <strong>Water Hydra<\/strong> que presentaba herramientas, t\u00e1cticas y procedimientos <em><strong>(TTP)<\/strong><\/em> similares, involucrando el abuso de accesos directos de internet <em><strong>(.URL)<\/strong><\/em> y componentes de <em><strong>Web-based<\/strong> <strong>Distributed Authoring<\/strong> <strong>and Versioning (WebDAV)<\/strong><\/em>.<\/p><p>La conclusi\u00f3n fue que llamar a un acceso directo dentro de otro acceso directo era suficiente para eludir <strong>SmartScreen,<\/strong> ya que no aplicaba correctamente la <em><strong>Marca de la Web (MotW)<\/strong><\/em>, un componente cr\u00edtico de <strong>Windows<\/strong> que alerta a los usuarios al abrir o ejecutar archivos desde fuentes no confiables.<\/p><p><strong>Water Hydra<\/strong> aprovech\u00f3 la <strong>CVE-2024-21412<\/strong> para llevar a cabo ataques de <em><strong>spearphishing<\/strong><\/em> en foros de comercio de divisas y canales de <strong>Telegram<\/strong> de comercio de acciones.<\/p><p>Utilizaron un gr\u00e1fico de acciones malicioso vinculado a un sitio de informaci\u00f3n de comercio comprometido en Rusia (<em><strong>fxbulls[.]ru<\/strong><\/em>), haci\u00e9ndose pasar por una plataforma de corredor de divisas (<em><strong>fxbulls[.]com<\/strong><\/em>).<\/p><p>El objetivo principal de los atacantes era enga\u00f1ar a <em><strong>traders<\/strong><\/em> espec\u00edficos para que instalaran el <strong>malware DarkMe<\/strong> mediante t\u00e1cticas de ingenier\u00eda social.<\/p><p>Para lograrlo, utilizaron t\u00e1cticas como publicar mensajes en ingl\u00e9s y ruso solicitando u ofreciendo orientaci\u00f3n comercial, as\u00ed como difundir herramientas falsas relacionadas con acciones y finanzas, centradas en el an\u00e1lisis t\u00e9cnico de gr\u00e1ficos y herramientas de indicadores de gr\u00e1ficos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd0cccd elementor-widget elementor-widget-video\" data-id=\"cd0cccd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/U7R8YgZruEc&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d95fb87 elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"d95fb87\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-23208 post-23208 post type-post status-publish format-standard has-post-thumbnail hentry category-informatica\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/05\/hacking-gb0b267c48_640.jpg\" class=\"attachment-full size-full wp-image-21856\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/05\/hacking-gb0b267c48_640.jpg 640w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/05\/hacking-gb0b267c48_640-300x169.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/\" rel=\"tag\">Inform\u00e1tica<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\" target=\"_blank\">Los Hackers m\u00e1s all\u00e1 de los estereotipos<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">74 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">74 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ae17c1 elementor-widget elementor-widget-text-editor\" data-id=\"6ae17c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Una compilaci\u00f3n completa de <em><strong>Indicadores de Compromiso (IoCs)<\/strong><\/em> para la reciente campa\u00f1a de <strong>malware DarkMe<\/strong> ha sido detallada y est\u00e1 disponible <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/24\/b\/cve202421412-water-hydra-targets-traders-with-windows-defender-smartscreen-zero-day\/ioc-water-hydra-cve-2024-21412.txt\" target=\"_blank\" rel=\"noopener\"><strong>en este enlace<\/strong><\/a>.<\/p><p>En anteriores instancias, los <a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\" target=\"_blank\" rel=\"noopener\"><strong><em>hackers<\/em><\/strong><\/a> de <strong>Water Hydra<\/strong> han aprovechado <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_d%C3%ADa_cero\" target=\"_blank\" rel=\"noopener\"><strong>vulnerabilidades de d\u00eda cero<\/strong><\/a>.<\/p><p>Un ejemplo es la explotaci\u00f3n de una vulnerabilidad de gravedad elevada (<strong><em>CVE-2023-38831<\/em><\/strong>) en el software <strong>WinRAR,<\/strong> utilizado por m\u00e1s de 500 millones de usuarios.<\/p><p>Este incidente les permiti\u00f3 comprometer cuentas de trading meses antes de que se lanzara un parche para corregir dicha vulnerabilidad.<\/p><p>Subsiguientemente, varios proveedores relacionaron la explotaci\u00f3n de <em><strong>CVE-2023-38831<\/strong><\/em> con diversos grupos de <strong>hacking<\/strong> respaldados por gobiernos, incluyendo a <strong>Sandworm, APT28, APT40,<\/strong> <strong>DarkPink (NSFOCUS)<\/strong> y <strong>Konni (Knownsec)<\/strong> de Rusia, China y Corea del Norte.<\/p><p>En la jornada actual, <strong>Microsoft<\/strong> ha implementado una segunda actualizaci\u00f3n para un <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ataque_de_d%C3%ADa_cero\" target=\"_blank\" rel=\"noopener\"><strong>zero-day<\/strong><\/a> en <em><strong>Windows SmartScreen (CVE-2024-21351)<\/strong><\/em>.<\/p><p>Este <em><strong>exploit<\/strong><\/em> estaba siendo utilizado en situaciones del mundo real y ten\u00eda la capacidad de permitir a los atacantes inyectar c\u00f3digo en <em><strong>SmartScreen,<\/strong><\/em> logrando as\u00ed ejecuci\u00f3n de c\u00f3digo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Microsoft ha lanzado una actualizaci\u00f3n que aborda una vulnerabilidad zero-day en Windows Defender SmartScreen, la cual fue aprovechada en ataques reales por un grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe. Identificado como Water Hydra y DarkCasino, este grupo de pirater\u00eda fue descubierto utilizando [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":35321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[89,28],"tags":[],"class_list":["post-35319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","category-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe<\/title>\n<meta name=\"description\" content=\"...grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe\" \/>\n<meta property=\"og:description\" content=\"...grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/\" \/>\n<meta property=\"og:site_name\" content=\"El BLOG de Enrique V\u00e1squez B.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/zeven.sa.1\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/zeven.sa.1\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T17:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enrique V\u00e1squez B.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@quike1974\" \/>\n<meta name=\"twitter:site\" content=\"@quike1974\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enrique V\u00e1squez B.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/\"},\"author\":{\"name\":\"Enrique V\u00e1squez B.\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"headline\":\"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe\",\"datePublished\":\"2024-02-14T17:55:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/\"},\"wordCount\":709,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"image\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Defender_Alert.png\",\"articleSection\":[\"Seguridad\",\"Windows\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/\",\"name\":\"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Defender_Alert.png\",\"datePublished\":\"2024-02-14T17:55:17+00:00\",\"description\":\"...grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Defender_Alert.png\",\"contentUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Defender_Alert.png\",\"width\":1120,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inform\u00e1tica\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seguridad\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/\",\"name\":\"El BLOG de Enrique V\u00e1squez B.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quike.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\",\"name\":\"Enrique V\u00e1squez B.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"contentUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"width\":512,\"height\":512,\"caption\":\"Enrique V\u00e1squez B.\"},\"logo\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\"},\"description\":\"Programador desde 1988, con pasi\u00f3n por escribir art\u00edculos de todo tipo. Actualmente desarrolla para ZEVEN S.A. el Sistema de Facturaci\u00f3n Electr\u00f3nica. Ecuatoriano de nacimiento e italiano de residencia, escribe desde G\u00e9nova, ciudad que ha llegado a amar tanto como su natal Guayaquil. Padre de dos hijos que son su orgullo y esposo de una mujer excepcional.\",\"sameAs\":[\"https:\\\/\\\/quike.it\",\"https:\\\/\\\/www.facebook.com\\\/zeven.sa.1\",\"https:\\\/\\\/www.instagram.com\\\/quikev1974\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/carlos-enrique-vasquez-bautista-074893b\\\/\",\"https:\\\/\\\/x.com\\\/quike1974\"],\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/author\\\/quike\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe","description":"...grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe","og_description":"...grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe.","og_url":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/","og_site_name":"El BLOG de Enrique V\u00e1squez B.","article_publisher":"https:\/\/www.facebook.com\/zeven.sa.1","article_author":"https:\/\/www.facebook.com\/zeven.sa.1","article_published_time":"2024-02-14T17:55:17+00:00","og_image":[{"width":1120,"height":600,"url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png","type":"image\/png"}],"author":"Enrique V\u00e1squez B.","twitter_card":"summary_large_image","twitter_creator":"@quike1974","twitter_site":"@quike1974","twitter_misc":{"Escrito por":"Enrique V\u00e1squez B.","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#article","isPartOf":{"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/"},"author":{"name":"Enrique V\u00e1squez B.","@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"headline":"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe","datePublished":"2024-02-14T17:55:17+00:00","mainEntityOfPage":{"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/"},"wordCount":709,"commentCount":0,"publisher":{"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"image":{"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#primaryimage"},"thumbnailUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png","articleSection":["Seguridad","Windows"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/","url":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/","name":"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe","isPartOf":{"@id":"https:\/\/quike.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#primaryimage"},"image":{"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#primaryimage"},"thumbnailUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png","datePublished":"2024-02-14T17:55:17+00:00","description":"...grupo de amenazas con motivaciones financieras, con el objetivo de desplegar el troyano de acceso remoto conocido como DarkMe.","breadcrumb":{"@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#primaryimage","url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png","contentUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png","width":1120,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/quike.it\/es\/"},{"@type":"ListItem","position":2,"name":"Inform\u00e1tica","item":"https:\/\/quike.it\/es\/category\/informatica\/"},{"@type":"ListItem","position":3,"name":"Seguridad","item":"https:\/\/quike.it\/es\/category\/informatica\/seguridad\/"},{"@type":"ListItem","position":4,"name":"Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe"}]},{"@type":"WebSite","@id":"https:\/\/quike.it\/es\/#website","url":"https:\/\/quike.it\/es\/","name":"El BLOG de Enrique V\u00e1squez B.","description":"","publisher":{"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quike.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Person","Organization"],"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8","name":"Enrique V\u00e1squez B.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","contentUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","width":512,"height":512,"caption":"Enrique V\u00e1squez B."},"logo":{"@id":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png"},"description":"Programador desde 1988, con pasi\u00f3n por escribir art\u00edculos de todo tipo. Actualmente desarrolla para ZEVEN S.A. el Sistema de Facturaci\u00f3n Electr\u00f3nica. Ecuatoriano de nacimiento e italiano de residencia, escribe desde G\u00e9nova, ciudad que ha llegado a amar tanto como su natal Guayaquil. Padre de dos hijos que son su orgullo y esposo de una mujer excepcional.","sameAs":["https:\/\/quike.it","https:\/\/www.facebook.com\/zeven.sa.1","https:\/\/www.instagram.com\/quikev1974","https:\/\/www.linkedin.com\/in\/carlos-enrique-vasquez-bautista-074893b\/","https:\/\/x.com\/quike1974"],"url":"https:\/\/quike.it\/es\/author\/quike\/"}]}},"_links":{"self":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/comments?post=35319"}],"version-history":[{"count":8,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35319\/revisions"}],"predecessor-version":[{"id":35329,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35319\/revisions\/35329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/media\/35321"}],"wp:attachment":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/media?parent=35319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/categories?post=35319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/tags?post=35319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}