{"id":35853,"date":"2024-03-05T11:59:54","date_gmt":"2024-03-05T10:59:54","guid":{"rendered":"https:\/\/quike.it\/es\/?p=35853"},"modified":"2024-03-05T11:59:55","modified_gmt":"2024-03-05T10:59:55","slug":"hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows","status":"publish","type":"post","link":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/","title":{"rendered":"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"35853\" class=\"elementor elementor-35853\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7c48ed7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c48ed7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a477663\" data-id=\"a477663\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cdf448e elementor-widget elementor-widget-text-editor\" data-id=\"cdf448e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>El grupo de pirater\u00eda inform\u00e1tica <strong>TA577<\/strong> ha modificado sus t\u00e1cticas recientemente, adoptando el uso de <a href=\"https:\/\/quike.it\/es\/phishing-no-caigas-en-la-trampa\/\" target=\"_blank\" rel=\"noopener\"><strong>correos electr\u00f3nicos de phishing<\/strong><\/a> para apropiarse de las <strong><em>cadenas de autenticaci\u00f3n<\/em><\/strong> <strong>NT LAN Manager<\/strong> (<a href=\"https:\/\/es.wikipedia.org\/wiki\/NTLM\" target=\"_blank\" rel=\"noopener\"><em><strong>NTLM<\/strong><\/em><\/a>) y llevar a cabo secuestros de cuentas.<\/p><p><strong>TA577,<\/strong> previamente asociado con <strong>Qbot<\/strong> y vinculado a infecciones de <a href=\"https:\/\/quike.it\/es\/ransomware-protegiendo-tus-datos-en-la-era-digital\/\" target=\"_blank\" rel=\"noopener\"><strong>ransomware<\/strong><\/a> <strong>Black Basta<\/strong>, es considerado un corredor de acceso inicial <strong>(IAB).<\/strong><\/p><p>La firma de seguridad de <strong>correo electr\u00f3nico Proofpoint<\/strong> se\u00f1ala que, aunque <strong>TA577<\/strong> ha mostrado preferencia por <strong>Pikabot<\/strong> en sus recientes operaciones, dos oleadas recientes de ataques revelan una t\u00e1ctica diferente.<\/p><p>Estas campa\u00f1as distintas de <strong>TA577,<\/strong> lanzadas el <strong>26<\/strong> y <strong>27 de febrero de 2024,<\/strong> enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las <strong>cadenas NTLM<\/strong> de los empleados.<\/p><p>Las <strong>cadenas NTLM<\/strong> se emplean en <strong>Windows<\/strong> para autenticaci\u00f3n y seguridad de sesi\u00f3n, pudiendo ser <strong><em>capturadas<\/em><\/strong> para llevar a cabo ataques de <strong>craqueo de contrase\u00f1as<\/strong> sin conexi\u00f3n, revelando la contrase\u00f1a en <strong>texto plano<\/strong>.<\/p><p>Adem\u00e1s, estas cadenas pueden utilizarse en ataques <strong>\u00abpass-the-hash\u00bb,<\/strong> donde los atacantes emplean la cadena tal como est\u00e1 para autenticarse en un servidor o servicio remoto, sin necesidad de <strong>craqueo.<\/strong><\/p><p>Bajo ciertas circunstancias y dependiendo de las medidas de seguridad implementadas, las <strong>cadenas robadas<\/strong> pueden permitir a los atacantes escalar privilegios, secuestrar cuentas, acceder a informaci\u00f3n confidencial, evadir productos de seguridad y moverse lateralmente dentro de una red comprometida.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b936b3 elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"3b936b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-30519\">.elementor-30519 .elementor-element.elementor-element-98493d2 .elementor-column-gap-custom .elementor-column > .elementor-element-populated{padding:2px;}.elementor-30519 .elementor-element.elementor-element-ccee508 > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){--kit-widget-spacing:1px;}.elementor-widget-image .widget-image-caption{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-80149f2 img{height:85px;object-fit:cover;object-position:center center;}.elementor-30519 .elementor-element.elementor-element-80149f2:not( .elementor-widget-image ), .elementor-30519 .elementor-element.elementor-element-80149f2.elementor-widget-image img{-webkit-mask-image:url( https:\/\/quike.it\/es\/wp-content\/plugins\/elementor\/assets\/mask-shapes\/circle.svg );-webkit-mask-size:contain;-webkit-mask-position:center center;-webkit-mask-repeat:no-repeat;}.elementor-30519 .elementor-element.elementor-element-2109b1e > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){--kit-widget-spacing:3px;}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon{width:17px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon i{font-size:17px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-icon svg{--e-icon-list-icon-size:17px;}body:not(.rtl) .elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-text{padding-left:5px;}body.rtl .elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-text{padding-right:5px;}.elementor-30519 .elementor-element.elementor-element-26a68f7 .elementor-icon-list-item{font-family:\"Work Sans\", Sans-serif;font-weight:600;text-transform:uppercase;word-spacing:0px;}.elementor-30519 .elementor-element.elementor-element-26a68f7{width:100%;max-width:100%;align-self:center;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );}.elementor-30519 .elementor-element.elementor-element-1ed9e84 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;font-weight:600;color:#000000;}.elementor-widget-icon-list .elementor-icon-list-item > .elementor-icon-list-text, .elementor-widget-icon-list .elementor-icon-list-item > a{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-icon i{color:#000000;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-icon svg{fill:#000000;transition:fill 0.3s;}.elementor-30519 .elementor-element.elementor-element-714486b{--e-icon-list-icon-size:13px;--e-icon-list-icon-align:left;--e-icon-list-icon-margin:0 calc(var(--e-icon-list-icon-size, 1em) * 0.25) 0 0;--icon-vertical-align:center;--icon-vertical-offset:0px;margin:0px 0px calc(var(--kit-widget-spacing, 0px) + 0px) 0px;padding:0px 0px 0px 0px;width:100%;max-width:100%;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-item > .elementor-icon-list-text, .elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-item > a{font-family:\"Work Sans\", Sans-serif;font-size:11px;font-weight:500;text-transform:capitalize;line-height:16px;letter-spacing:1px;}.elementor-30519 .elementor-element.elementor-element-714486b .elementor-icon-list-text{color:#333333;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-icon i{color:#000000;transition:color 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-icon svg{fill:#000000;transition:fill 0.3s;}.elementor-30519 .elementor-element.elementor-element-0a32de7{--e-icon-list-icon-size:13px;--e-icon-list-icon-align:left;--e-icon-list-icon-margin:0 calc(var(--e-icon-list-icon-size, 1em) * 0.25) 0 0;--icon-vertical-align:center;--icon-vertical-offset:0px;margin:0px 0px calc(var(--kit-widget-spacing, 0px) + 0px) 0px;padding:0px 0px 0px 0px;width:100%;max-width:100%;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-item > .elementor-icon-list-text, .elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-item > a{font-family:\"Work Sans\", Sans-serif;font-size:11px;font-weight:500;text-transform:capitalize;line-height:16px;letter-spacing:1px;}.elementor-30519 .elementor-element.elementor-element-0a32de7 .elementor-icon-list-text{color:#333333;transition:color 0.3s;}@media(min-width:768px){.elementor-30519 .elementor-element.elementor-element-ccee508{width:20%;}.elementor-30519 .elementor-element.elementor-element-2109b1e{width:79.997%;}}@media(max-width:767px){.elementor-30519 .elementor-element.elementor-element-98493d2 .elementor-column-gap-custom .elementor-column > .elementor-element-populated{padding:2px;}.elementor-30519 .elementor-element.elementor-element-ccee508{width:25%;}.elementor-30519 .elementor-element.elementor-element-2109b1e{width:75%;}.elementor-30519 .elementor-element.elementor-element-1ed9e84 .elementor-heading-title{font-size:15px;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-35319 post-35319 post type-post status-publish format-standard has-post-thumbnail hentry category-seguridad category-windows\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1120\" height=\"600\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png\" class=\"attachment-full size-full wp-image-35321\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert.png 1120w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert-300x161.png 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert-1024x549.png 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Defender_Alert-768x411.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/seguridad\/\" rel=\"tag\">Seguridad<\/a> <a href=\"https:\/\/quike.it\/es\/category\/informatica\/sistemas-operativos\/windows\/\" rel=\"tag\">Windows<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/\" target=\"_blank\">Hackers usaron una vulnerabilidad en Windows Defender para diseminar DarkMe<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">84 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">84 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/hackers-usaron-vulnerabilidad-en-windows-defender-para-propagar-darkme\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f56b183 elementor-widget elementor-widget-heading\" data-id=\"f56b183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Phishing para robar cadenas NTLM<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ce3170 elementor-widget elementor-widget-text-editor\" data-id=\"1ce3170\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La reciente campa\u00f1a se inici\u00f3 mediante <strong>correos electr\u00f3nicos de <a href=\"https:\/\/quike.it\/es\/phishing-no-caigas-en-la-trampa\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a><\/strong> que simulan ser respuestas a conversaciones previas del objetivo, empleando la t\u00e1ctica reconocida como <a href=\"https:\/\/es.wikipedia.org\/wiki\/Hijacking\" target=\"_blank\" rel=\"noopener\"><strong>secuestro de hilo<\/strong><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4409570 elementor-widget elementor-widget-image\" data-id=\"4409570\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2679.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"blog_2679\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzU4NTcsInVybCI6Imh0dHBzOlwvXC9xdWlrZS5pdFwvZXNcL3dwLWNvbnRlbnRcL3VwbG9hZHNcL3NpdGVzXC8zXC8yMDI0XC8wM1wvYmxvZ18yNjc5LmpwZyJ9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1430\" height=\"763\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2679.jpg\" class=\"attachment-full size-full wp-image-35857\" alt=\"Cadenas NTLM\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2679.jpg 1430w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2679-300x160.jpg 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2679-1024x546.jpg 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2679-768x410.jpg 768w\" sizes=\"(max-width: 1430px) 100vw, 1430px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Correo electr\u00f3nico malicioso de muestra (Proofpoint)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea5cbae elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"ea5cbae\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-20764 post-20764 post type-post status-publish format-standard has-post-thumbnail hentry category-informatica category-moviles\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/que-es-el-juice-jacking\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/04\/two-pin-3509490_640.jpg\" class=\"attachment-full size-full wp-image-20775\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/04\/two-pin-3509490_640.jpg 640w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/04\/two-pin-3509490_640-300x200.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/\" rel=\"tag\">Inform\u00e1tica<\/a> <a href=\"https:\/\/quike.it\/es\/category\/moviles\/\" rel=\"tag\">M\u00f3viles<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/que-es-el-juice-jacking\/\" target=\"_blank\">\u00bfQu\u00e9 es el Juice Jacking?<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/que-es-el-juice-jacking\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">55 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/que-es-el-juice-jacking\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/que-es-el-juice-jacking\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">55 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/que-es-el-juice-jacking\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5fa0f7 elementor-widget elementor-widget-text-editor\" data-id=\"f5fa0f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Los mensajes de <strong>correo electr\u00f3nico<\/strong> incluyen <strong>archivos ZIP<\/strong> personalizados (<em>uno por v\u00edctima<\/em>) que contienen <strong>archivos HTML<\/strong> con etiquetas <strong>HTML META refresh.<\/strong><\/p><p>Estas etiquetas activan una conexi\u00f3n autom\u00e1tica a un <strong><em>archivo de texto<\/em><\/strong> en un servidor externo de <strong>Bloque de Mensajes del Servidor (SMB)<\/strong>.<\/p><p>Cuando el dispositivo <strong>Windows<\/strong> se conecta al servidor, intenta autom\u00e1ticamente llevar a cabo un <a href=\"https:\/\/es.wikipedia.org\/wiki\/NTLM#NTLMv2\" target=\"_blank\" rel=\"noopener\"><strong>Desaf\u00edo\/Respuesta NTLMv2<\/strong><\/a>, lo que permite al servidor controlado por el atacante remoto apropiarse de los <strong><em>hashes<\/em><\/strong> de autenticaci\u00f3n <strong>NTLM.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03221a6 elementor-widget elementor-widget-image\" data-id=\"03221a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2680.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"blog_2680\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzU4NTgsInVybCI6Imh0dHBzOlwvXC9xdWlrZS5pdFwvZXNcL3dwLWNvbnRlbnRcL3VwbG9hZHNcL3NpdGVzXC8zXC8yMDI0XC8wM1wvYmxvZ18yNjgwLmpwZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"374\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2680.jpg\" class=\"attachment-full size-full wp-image-35858\" alt=\"Cadenas NTLM\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2680.jpg 936w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2680-300x120.jpg 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2680-768x307.jpg 768w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">El archivo HTML malicioso (Proofpoint)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32f82e4 elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"32f82e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-35401 post-35401 post type-post status-publish format-standard has-post-thumbnail hentry category-seguridad category-wordpress\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"600\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png\" class=\"attachment-full size-full wp-image-35403\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert.png 1120w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert-300x161.png 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert-1024x549.png 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/WordPress_Alert-768x411.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/seguridad\/\" rel=\"tag\">Seguridad<\/a> <a href=\"https:\/\/quike.it\/es\/category\/web\/wordpress\/\" rel=\"tag\">WordPress<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/\" target=\"_blank\">Hackers Aprovechan Falla RCE en Bricks de WordPress<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">118 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">118 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/hackers-aprovechan-falla-rce-en-bricks-de-wordpress\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71b35e1 elementor-widget elementor-widget-text-editor\" data-id=\"71b35e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00ab<em><strong>Es relevante destacar que TA577 proporcion\u00f3 el archivo HTML malicioso dentro de un archivo ZIP para generar un archivo local en el host<\/strong><\/em>\u00ab, <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/ta577s-unusual-attack-chain-leads-ntlm-data-theft\" target=\"_blank\" rel=\"noopener\"><strong>informa Proofpoint<\/strong><\/a>.<\/p><p>\u00ab<em><strong>Si el <a href=\"https:\/\/es.wikipedia.org\/wiki\/Identificador_de_recursos_uniforme\" target=\"_blank\" rel=\"noopener\">URI<\/a> del esquema de archivo se hubiera enviado directamente en el cuerpo del correo electr\u00f3nico, el ataque no habr\u00eda funcionado en los clientes de correo Outlook parcheados desde julio de 2023<\/strong><\/em>\u00ab.<\/p><p><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/ta577s-unusual-attack-chain-leads-ntlm-data-theft\" target=\"_blank\" rel=\"noopener\"><strong>Proofpoint afirma<\/strong><\/a> que estas <strong>URL<\/strong> no distribuyeron ninguna carga de <a href=\"https:\/\/quike.it\/es\/como-eliminar-malware-de-tu-computadora\/\" target=\"_blank\" rel=\"noopener\"><strong>malware,<\/strong><\/a> lo que sugiere que su objetivo principal es la captura de las <strong>cadenas NTLM<\/strong>.<\/p><p>Adem\u00e1s, <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/ta577s-unusual-attack-chain-leads-ntlm-data-theft\" target=\"_blank\" rel=\"noopener\"><strong>Proofpoint se\u00f1ala<\/strong><\/a> artefactos espec\u00edficos presentes en los <a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/\" target=\"_blank\" rel=\"noopener\"><strong>servidores SMB<\/strong><\/a> que por lo general no son est\u00e1ndar, como la herramienta de c\u00f3digo abierto <strong>Impacket,<\/strong> lo que indica que esos servidores se utilizan en <a href=\"https:\/\/quike.it\/es\/phishing-no-caigas-en-la-trampa\/\" target=\"_blank\" rel=\"noopener\"><strong>ataques de phishing<\/strong><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd8286 elementor-widget elementor-widget-image\" data-id=\"bcd8286\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2681.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"blog_2681\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzU4NTksInVybCI6Imh0dHBzOlwvXC9xdWlrZS5pdFwvZXNcL3dwLWNvbnRlbnRcL3VwbG9hZHNcL3NpdGVzXC8zXC8yMDI0XC8wM1wvYmxvZ18yNjgxLmpwZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1302\" height=\"873\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2681.jpg\" class=\"attachment-full size-full wp-image-35859\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2681.jpg 1302w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2681-300x201.jpg 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2681-1024x687.jpg 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/03\/blog_2681-768x515.jpg 768w\" sizes=\"(max-width: 1302px) 100vw, 1302px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Paquete capturado (Proofpoint)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e5dec0 elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e5dec0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-35373 post-35373 post type-post status-publish format-standard has-post-thumbnail hentry category-seguridad category-ubuntu\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/peligro-de-malware-con-command-not-found-en-ubuntu\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"600\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/ubuntu_Alert.png\" class=\"attachment-full size-full wp-image-35375\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/ubuntu_Alert.png 1120w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/ubuntu_Alert-300x161.png 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/ubuntu_Alert-1024x549.png 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/ubuntu_Alert-768x411.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/seguridad\/\" rel=\"tag\">Seguridad<\/a> <a href=\"https:\/\/quike.it\/es\/category\/informatica\/sistemas-operativos\/linux\/ubuntu\/\" rel=\"tag\">Ubuntu<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/peligro-de-malware-con-command-not-found-en-ubuntu\/\" target=\"_blank\">Peligro de malware con &#8216;command-not-found&#8217; en Ubuntu<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/peligro-de-malware-con-command-not-found-en-ubuntu\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">72 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/peligro-de-malware-con-command-not-found-en-ubuntu\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/peligro-de-malware-con-command-not-found-en-ubuntu\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">72 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/peligro-de-malware-con-command-not-found-en-ubuntu\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ea47e7 elementor-widget elementor-widget-text-editor\" data-id=\"2ea47e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>El profesional de ciberseguridad <strong>Brian in Pittsburgh<\/strong>, destaca que para que los actores de amenazas utilicen estos <em>hashes<\/em> robados para infiltrarse en <strong>redes,<\/strong> es necesario que la autenticaci\u00f3n multifactor est\u00e9 desactivada en las cuentas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af390eb elementor-widget elementor-widget-html\" data-id=\"af390eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">There&#39;s certainly nothing novel about this technique. But it&#39;s interesting that a commodity-scale attacker would use an attack chain with a lure + zip + malicious file to merely steal NTLM hashes via SMB instead of dropping malware.<br>Probably says something about 2FA\/MFA adoption. <a href=\"https:\/\/t.co\/aSOXnrRhYM\">https:\/\/t.co\/aSOXnrRhYM<\/a><\/p>&mdash; Brian in Pittsburgh (@arekfurt) <a href=\"https:\/\/twitter.com\/arekfurt\/status\/1764663843785957773?ref_src=twsrc%5Etfw\">March 4, 2024<\/a><\/blockquote> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06a4cad elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"06a4cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-35067 post-35067 post type-post status-publish format-standard has-post-thumbnail hentry category-informatica category-seguridad\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/peligros-de-utilizar-activadores-kms-riesgos-y-consecuencias\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"761\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/security-5043368_1280.jpg\" class=\"attachment-full size-full wp-image-35077\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/security-5043368_1280.jpg 1280w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/security-5043368_1280-300x178.jpg 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/security-5043368_1280-1024x609.jpg 1024w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/security-5043368_1280-768x457.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/\" rel=\"tag\">Inform\u00e1tica<\/a> <a href=\"https:\/\/quike.it\/es\/category\/informatica\/seguridad\/\" rel=\"tag\">Seguridad<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/peligros-de-utilizar-activadores-kms-riesgos-y-consecuencias\/\" target=\"_blank\">Peligros de Utilizar Activadores KMS: Riesgos y Consecuencias<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/peligros-de-utilizar-activadores-kms-riesgos-y-consecuencias\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">594 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/peligros-de-utilizar-activadores-kms-riesgos-y-consecuencias\/#comments\">2 comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/peligros-de-utilizar-activadores-kms-riesgos-y-consecuencias\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">594 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/peligros-de-utilizar-activadores-kms-riesgos-y-consecuencias\/#comments\">2 <\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-824783b elementor-widget elementor-widget-text-editor\" data-id=\"824783b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>El investigador de vulnerabilidades <strong>Will Dormann<\/strong> sugiere que los <em>hashes<\/em> podr\u00edan no estar siendo robados para infiltrarse en redes, sino como una forma de reconocimiento para identificar objetivos valiosos.<\/p><p><strong>Dormann<\/strong> <em>tuite\u00f3:<\/em> \u00ab<strong><em>\u00bfSe podr\u00eda imaginar que la combinaci\u00f3n de nombre de dominio, nombre de usuario y nombre de host podr\u00eda revelar algunos objetivos jugosos?<\/em><\/strong>\u00ab<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-946934c elementor-widget elementor-widget-html\" data-id=\"946934c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<blockquote class=\"twitter-tweet\"><p lang=\"en\" dir=\"ltr\">It also seems plausible that the info collected may also have been used simply as reconnaissance for which hosts to poke further at in future attacks.<br>I could imagine that the combination of domain name, user name, and host name could tease out some juicy targets? \ud83e\udd37\u200d\u2642\ufe0f <a href=\"https:\/\/t.co\/TP9MCpDRJR\">pic.twitter.com\/TP9MCpDRJR<\/a><\/p>&mdash; Will Dormann (@wdormann) <a href=\"https:\/\/twitter.com\/wdormann\/status\/1764665522019242159?ref_src=twsrc%5Etfw\">March 4, 2024<\/a><\/blockquote> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17fff2c elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"17fff2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-23208 post-23208 post type-post status-publish format-standard has-post-thumbnail hentry category-informatica\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/05\/hacking-gb0b267c48_640.jpg\" class=\"attachment-full size-full wp-image-21856\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/05\/hacking-gb0b267c48_640.jpg 640w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/05\/hacking-gb0b267c48_640-300x169.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/informatica\/\" rel=\"tag\">Inform\u00e1tica<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\" target=\"_blank\">Los Hackers m\u00e1s all\u00e1 de los estereotipos<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">73 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">73 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/los-hackers-mas-alla-de-los-estereotipos\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-914bab0 elementor-widget elementor-widget-text-editor\" data-id=\"914bab0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Proofpoint<\/strong> indica que restringir el acceso de invitados a los <strong>servidores SMB<\/strong> por s\u00ed solo no mitiga el ataque de <strong>TA577,<\/strong> ya que aprovecha la autenticaci\u00f3n autom\u00e1tica al servidor externo, evitando la necesidad de acceso de invitados.<\/p><p>Una medida potencialmente efectiva podr\u00eda ser <strong>configurar un firewall<\/strong> para bloquear todas las <strong>conexiones SMB<\/strong> salientes (<em>generalmente en los puertos <strong>445<\/strong> y <strong>139<\/strong><\/em><strong>),<\/strong> deteniendo el env\u00edo de <em>hashes<\/em> <strong>NTLM.<\/strong><\/p><p>Otra medida de protecci\u00f3n ser\u00eda implementar un <strong><em>filtro de correo electr\u00f3nico<\/em><\/strong> que bloquee los mensajes que contienen <strong>archivos HTML<\/strong> comprimidos, ya que estos pueden desencadenar conexiones a puntos finales inseguros al abrirlos.<\/p><p>Tambi\u00e9n es posible configurar la directiva de grupo de <strong>Windows<\/strong> &#8216;<strong><em>Seguridad de red: Restringir NTLM: Tr\u00e1fico NTLM saliente a servidores remotos<\/em><\/strong>&#8216; para evitar el env\u00edo de <em>hashes<\/em> <strong>NTLM.<\/strong><\/p><p>Sin embargo, esto podr\u00eda generar problemas de autenticaci\u00f3n contra servidores leg\u00edtimos.<\/p><p>Para las organizaciones que utilizan <strong>Windows 11<\/strong>, <strong>Microsoft<\/strong> introdujo una <a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/\" target=\"_blank\" rel=\"noopener\"><strong>funci\u00f3n de seguridad adicional<\/strong><\/a> para bloquear los <strong>ataques basados en NTLM<\/strong> sobre <strong>SMB,<\/strong> lo que ser\u00eda una soluci\u00f3n efectiva.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ccccd elementor-grid-1 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"84ccccd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:&quot;30519&quot;,&quot;columns&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"30519\" class=\"elementor elementor-30519 e-loop-item e-loop-item-32034 post-32034 post type-post status-publish format-standard has-post-thumbnail hentry category-noticias category-windows-11\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98493d2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"98493d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ccee508\" data-id=\"ccee508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80149f2 elementor-widget elementor-widget-image\" data-id=\"80149f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/07\/Firewall-81.png\" class=\"attachment-full size-full wp-image-26143\" alt=\"\" srcset=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/07\/Firewall-81.png 800w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/07\/Firewall-81-300x225.png 300w, https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2023\/07\/Firewall-81-768x576.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2109b1e\" data-id=\"2109b1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a68f7 elementor-align-left elementor-widget__width-inherit elementor-widget elementor-widget-post-info\" data-id=\"26a68f7\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"categorias-post\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-dfd774d elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/category\/general\/noticias\/\" rel=\"tag\">Noticias<\/a> <a href=\"https:\/\/quike.it\/es\/category\/informatica\/sistemas-operativos\/windows\/windows-11\/\" rel=\"tag\">Windows 11<\/a>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ed9e84 elementor-widget elementor-widget-heading\" data-id=\"1ed9e84\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"top-post\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/\" target=\"_blank\">Se Suprimen Reglas de SMB1 en el Firewall de Windows 11<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714486b elementor-icon-list--layout-inline elementor-align-start elementor-hidden-tablet elementor-hidden-mobile elementor-widget__width-inherit elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"714486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">87 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/#respond\">sin comentarios<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32de7 elementor-icon-list--layout-inline elementor-align-start elementor-widget__width-inherit elementor-hidden-desktop elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0a32de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book-reader\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M352 96c0-53.02-42.98-96-96-96s-96 42.98-96 96 42.98 96 96 96 96-42.98 96-96zM233.59 241.1c-59.33-36.32-155.43-46.3-203.79-49.05C13.55 191.13 0 203.51 0 219.14v222.8c0 14.33 11.59 26.28 26.49 27.05 43.66 2.29 131.99 10.68 193.04 41.43 9.37 4.72 20.48-1.71 20.48-11.87V252.56c-.01-4.67-2.32-8.95-6.42-11.46zm248.61-49.05c-48.35 2.74-144.46 12.73-203.78 49.05-4.1 2.51-6.41 6.96-6.41 11.63v245.79c0 10.19 11.14 16.63 20.54 11.9 61.04-30.72 149.32-39.11 192.97-41.4 14.9-.78 26.49-12.73 26.49-27.06V219.14c-.01-15.63-13.56-28.01-29.81-27.09z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">87 lecturas<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-comments\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 192c0-88.4-93.1-160-208-160S0 103.6 0 192c0 34.3 14.1 65.9 38 92-13.4 30.2-35.5 54.2-35.8 54.5-2.2 2.3-2.8 5.7-1.5 8.7S4.8 352 8 352c36.6 0 66.9-12.3 88.7-25 32.2 15.7 70.3 25 111.3 25 114.9 0 208-71.6 208-160zm122 220c23.9-26 38-57.7 38-92 0-66.9-53.5-124.2-129.3-148.1.9 6.6 1.3 13.3 1.3 20.1 0 105.9-107.7 192-240 192-10.8 0-21.3-.8-31.7-1.9C207.8 439.6 281.8 480 368 480c41 0 79.1-9.2 111.3-25 21.8 12.7 52.1 25 88.7 25 3.2 0 6.1-1.9 7.3-4.8 1.3-2.9.7-6.3-1.5-8.7-.3-.3-22.4-24.2-35.8-54.5z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/quike.it\/es\/se-suprimen-reglas-de-smb1-en-el-firewall-de-windows-11\/#respond\">0<\/a><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>El grupo de pirater\u00eda inform\u00e1tica TA577 ha modificado sus t\u00e1cticas recientemente, adoptando el uso de correos electr\u00f3nicos de phishing para apropiarse de las cadenas de autenticaci\u00f3n NT LAN Manager (NTLM) y llevar a cabo secuestros de cuentas. TA577, previamente asociado con Qbot y vinculado a infecciones de ransomware Black Basta, es considerado un corredor de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":35359,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[89,28,41],"tags":[],"class_list":["post-35853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","category-windows","category-windows-11"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers utilizan Phishing para Robar Cadenas NTLM en Windows<\/title>\n<meta name=\"description\" content=\"..el 26 y 27 de febrero de 2024, enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las cadenas NTLM de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows\" \/>\n<meta property=\"og:description\" content=\"..el 26 y 27 de febrero de 2024, enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las cadenas NTLM de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"El BLOG de Enrique V\u00e1squez B.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/zeven.sa.1\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/zeven.sa.1\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-05T10:59:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T10:59:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Windows-11_Alert-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enrique V\u00e1squez B.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@quike1974\" \/>\n<meta name=\"twitter:site\" content=\"@quike1974\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enrique V\u00e1squez B.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/\"},\"author\":{\"name\":\"Enrique V\u00e1squez B.\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"headline\":\"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows\",\"datePublished\":\"2024-03-05T10:59:54+00:00\",\"dateModified\":\"2024-03-05T10:59:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/\"},\"wordCount\":887,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"image\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Windows-11_Alert-2.png\",\"articleSection\":[\"Seguridad\",\"Windows\",\"Windows 11\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/\",\"name\":\"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Windows-11_Alert-2.png\",\"datePublished\":\"2024-03-05T10:59:54+00:00\",\"dateModified\":\"2024-03-05T10:59:55+00:00\",\"description\":\"..el 26 y 27 de febrero de 2024, enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las cadenas NTLM de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Windows-11_Alert-2.png\",\"contentUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/02\\\/Windows-11_Alert-2.png\",\"width\":1120,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inform\u00e1tica\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sistemas Operativos\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/sistemas-operativos\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Windows\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/sistemas-operativos\\\/windows\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Windows 11\",\"item\":\"https:\\\/\\\/quike.it\\\/es\\\/category\\\/informatica\\\/sistemas-operativos\\\/windows\\\/windows-11\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/\",\"name\":\"El BLOG de Enrique V\u00e1squez B.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quike.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/#\\\/schema\\\/person\\\/e53c62e8ab2e3f878e77d3a617483cc8\",\"name\":\"Enrique V\u00e1squez B.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"contentUrl\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\",\"width\":512,\"height\":512,\"caption\":\"Enrique V\u00e1squez B.\"},\"logo\":{\"@id\":\"https:\\\/\\\/quike.it\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/02\\\/me.png\"},\"description\":\"Programador desde 1988, con pasi\u00f3n por escribir art\u00edculos de todo tipo. Actualmente desarrolla para ZEVEN S.A. el Sistema de Facturaci\u00f3n Electr\u00f3nica. Ecuatoriano de nacimiento e italiano de residencia, escribe desde G\u00e9nova, ciudad que ha llegado a amar tanto como su natal Guayaquil. Padre de dos hijos que son su orgullo y esposo de una mujer excepcional.\",\"sameAs\":[\"https:\\\/\\\/quike.it\",\"https:\\\/\\\/www.facebook.com\\\/zeven.sa.1\",\"https:\\\/\\\/www.instagram.com\\\/quikev1974\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/carlos-enrique-vasquez-bautista-074893b\\\/\",\"https:\\\/\\\/x.com\\\/quike1974\"],\"url\":\"https:\\\/\\\/quike.it\\\/es\\\/author\\\/quike\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows","description":"..el 26 y 27 de febrero de 2024, enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las cadenas NTLM de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows","og_description":"..el 26 y 27 de febrero de 2024, enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las cadenas NTLM de","og_url":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/","og_site_name":"El BLOG de Enrique V\u00e1squez B.","article_publisher":"https:\/\/www.facebook.com\/zeven.sa.1","article_author":"https:\/\/www.facebook.com\/zeven.sa.1","article_published_time":"2024-03-05T10:59:54+00:00","article_modified_time":"2024-03-05T10:59:55+00:00","og_image":[{"width":1120,"height":600,"url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Windows-11_Alert-2.png","type":"image\/png"}],"author":"Enrique V\u00e1squez B.","twitter_card":"summary_large_image","twitter_creator":"@quike1974","twitter_site":"@quike1974","twitter_misc":{"Escrito por":"Enrique V\u00e1squez B.","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#article","isPartOf":{"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/"},"author":{"name":"Enrique V\u00e1squez B.","@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"headline":"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows","datePublished":"2024-03-05T10:59:54+00:00","dateModified":"2024-03-05T10:59:55+00:00","mainEntityOfPage":{"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/"},"wordCount":887,"commentCount":0,"publisher":{"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"image":{"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Windows-11_Alert-2.png","articleSection":["Seguridad","Windows","Windows 11"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/","url":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/","name":"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows","isPartOf":{"@id":"https:\/\/quike.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#primaryimage"},"image":{"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Windows-11_Alert-2.png","datePublished":"2024-03-05T10:59:54+00:00","dateModified":"2024-03-05T10:59:55+00:00","description":"..el 26 y 27 de febrero de 2024, enviaron miles de mensajes a cientos de organizaciones en todo el mundo, focaliz\u00e1ndose en las cadenas NTLM de","breadcrumb":{"@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#primaryimage","url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Windows-11_Alert-2.png","contentUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2024\/02\/Windows-11_Alert-2.png","width":1120,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/quike.it\/es\/hackers-utilizan-phishing-para-robar-cadenas-ntlm-en-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/quike.it\/es\/"},{"@type":"ListItem","position":2,"name":"Inform\u00e1tica","item":"https:\/\/quike.it\/es\/category\/informatica\/"},{"@type":"ListItem","position":3,"name":"Sistemas Operativos","item":"https:\/\/quike.it\/es\/category\/informatica\/sistemas-operativos\/"},{"@type":"ListItem","position":4,"name":"Windows","item":"https:\/\/quike.it\/es\/category\/informatica\/sistemas-operativos\/windows\/"},{"@type":"ListItem","position":5,"name":"Windows 11","item":"https:\/\/quike.it\/es\/category\/informatica\/sistemas-operativos\/windows\/windows-11\/"},{"@type":"ListItem","position":6,"name":"Hackers utilizan Phishing para Robar Cadenas NTLM en Windows"}]},{"@type":"WebSite","@id":"https:\/\/quike.it\/es\/#website","url":"https:\/\/quike.it\/es\/","name":"El BLOG de Enrique V\u00e1squez B.","description":"","publisher":{"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quike.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Person","Organization"],"@id":"https:\/\/quike.it\/es\/#\/schema\/person\/e53c62e8ab2e3f878e77d3a617483cc8","name":"Enrique V\u00e1squez B.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","url":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","contentUrl":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png","width":512,"height":512,"caption":"Enrique V\u00e1squez B."},"logo":{"@id":"https:\/\/quike.it\/es\/wp-content\/uploads\/sites\/3\/2021\/02\/me.png"},"description":"Programador desde 1988, con pasi\u00f3n por escribir art\u00edculos de todo tipo. Actualmente desarrolla para ZEVEN S.A. el Sistema de Facturaci\u00f3n Electr\u00f3nica. Ecuatoriano de nacimiento e italiano de residencia, escribe desde G\u00e9nova, ciudad que ha llegado a amar tanto como su natal Guayaquil. Padre de dos hijos que son su orgullo y esposo de una mujer excepcional.","sameAs":["https:\/\/quike.it","https:\/\/www.facebook.com\/zeven.sa.1","https:\/\/www.instagram.com\/quikev1974","https:\/\/www.linkedin.com\/in\/carlos-enrique-vasquez-bautista-074893b\/","https:\/\/x.com\/quike1974"],"url":"https:\/\/quike.it\/es\/author\/quike\/"}]}},"_links":{"self":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/comments?post=35853"}],"version-history":[{"count":8,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35853\/revisions"}],"predecessor-version":[{"id":35865,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/posts\/35853\/revisions\/35865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/media\/35359"}],"wp:attachment":[{"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/media?parent=35853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/categories?post=35853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quike.it\/es\/wp-json\/wp\/v2\/tags?post=35853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}