{"id":24476,"date":"2020-08-10T14:53:16","date_gmt":"2020-08-10T20:53:16","guid":{"rendered":"https:\/\/goldenti.com\/site\/?p=24476"},"modified":"2020-08-10T14:53:18","modified_gmt":"2020-08-10T20:53:18","slug":"hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos","status":"publish","type":"post","link":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/","title":{"rendered":"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos"},"content":{"rendered":"\n<p>Casi un tercio (30%) de los ciberataques investigados por el equipo de&nbsp;<em>Kaspersky Global Emergency Response<\/em>&nbsp;en 2019, involucr\u00f3 herramientas leg\u00edtimas de control y administraci\u00f3n a distancia. De esta forma, los atacantes pudieron permanecer, sin ser detectados, durante un per\u00edodo de tiempo m\u00e1s largo, espiando o realizando robo de datos confidenciales, con un promedio de duraci\u00f3n de 122 d\u00edas, seg\u00fan el reciente Informe de&nbsp;an\u00e1lisis de respuesta a incidentes&nbsp;de Kaspersky.<\/p>\n\n\n\n<p>El software de monitoreo y administraci\u00f3n ayuda a los administradores de TI y de redes a realizar sus tareas cotidianas, como son resolver problemas y brindar a los empleados asistencia t\u00e9cnica. Sin embargo, los ciberdelincuentes tambi\u00e9n pueden aprovechar estas&nbsp;herramientas leg\u00edtimas&nbsp;durante los ciberataques. Una vez dentro de la infraestructura de una empresa, los cibercriminales utilizan este software para acceder y extraer informaci\u00f3n confidencial de manera sigilosa, evitando los controles de seguridad destinados a detectar malware.<\/p>\n\n\n\n<p>En total, el an\u00e1lisis de datos an\u00f3nimos de casos de respuesta a incidentes (IR, por sus siglas en ingl\u00e9s) mostr\u00f3 que 18 herramientas leg\u00edtimas fueron utilizadas indebidamente para fines maliciosos. Entre estas, la m\u00e1s utilizada fue PowerShell, que apareci\u00f3 en el 25% de los casos y puede ser utilizada para muchos prop\u00f3sitos, desde recopilar informaci\u00f3n hasta la ejecuci\u00f3n de malware. En segundo lugar aparece&nbsp;PsExec, una aplicaci\u00f3n de consola dise\u00f1ada para la ejecuci\u00f3n de procesos en e<em>ndpoints&nbsp;<\/em>remotos, aprovechada en el 22% de los ataques. Le sigui\u00f3&nbsp;SoftPerfect Network Scanner, cuya funci\u00f3n es recuperar informaci\u00f3n sobre entornos de redes, utilizada en el 14% de incidentes.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>La ejecuci\u00f3n de ataques por medio de herramientas legitimas dificulta la detecci\u00f3n de amenazas para las soluciones de seguridad, pues las acciones relacionadas pueden ser parte de una actividad cibercriminal planificada como de una tarea regular del administrador del sistema.<\/p><\/blockquote>\n\n\n\n<p>Por ejemplo, en el segmento de ataques que dur\u00f3 m\u00e1s de un mes, el tiempo promedio de los ciberincidentes fue de 122 d\u00edas. Como no fueron detectados, los ciberdelincuentes pudieron recopilar, de manera sigilosa, datos confidenciales de las v\u00edctimas.<\/p>\n\n\n\n<p>Sin embargo, los expertos de Kaspersky se\u00f1alan que a veces las acciones maliciosas con software leg\u00edtimo se descubren con bastante rapidez, como en los ataques de ransomware, donde los da\u00f1os son percibidos inmediatamente. En estos casos, el tiempo medio de duraci\u00f3n fue de un d\u00eda.<\/p>\n\n\n\n<p>Para detectar y reaccionar a estos ataques r\u00e1pidamente, las organizaciones deben, entre otras medidas, implementar una soluci\u00f3n de detecci\u00f3n y respuesta (EDR) en&nbsp;<em>endpoints&nbsp;<\/em>con un servicio de gerenciamiento de detecci\u00f3n y respuesta (MDR-&nbsp;<em>Managed Detection and Response<\/em>).<\/p>\n\n\n\n<p>Para minimizar las posibilidades de que un software de administraci\u00f3n a distancia se utilice para penetrar en una infraestructura, Kaspersky tambi\u00e9n recomienda las siguientes medidas:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Limita el acceso a herramientas de administraci\u00f3n a distancia desde direcciones IP externas. Aseg\u00farate de que s\u00f3lo se puedas acceder a las interfaces de control remoto desde un n\u00famero limitado de\u00a0<em>endpoints<\/em><\/li><li>Aplica una estricta pol\u00edtica de contrase\u00f1as para todos los sistemas de TI e implementa la autenticaci\u00f3n de varios factores<\/li><li>Ofrece privilegios limitados al personal y otorga cuentas con privilegios elevados solo a aquellos que lo necesiten para realizar su trabajo<\/li><\/ul>\n\n\n\n<p>Fuente: cio.com.mx<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Casi un tercio (30%) de los ciberataques investigados por el equipo de&nbsp;Kaspersky Global Emergency Response&nbsp;en 2019, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":24477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-24476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos -\" \/>\n<meta property=\"og:description\" content=\"Casi un tercio (30%) de los ciberataques investigados por el equipo de&nbsp;Kaspersky Global Emergency Response&nbsp;en 2019, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T20:53:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-10T20:53:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"544\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Iris Esparza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Iris Esparza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\"},\"author\":{\"name\":\"Iris Esparza\",\"@id\":\"https:\/\/goldenti.com\/site\/#\/schema\/person\/8190e0425b54b5461126268d75de9409\"},\"headline\":\"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos\",\"datePublished\":\"2020-08-10T20:53:16+00:00\",\"dateModified\":\"2020-08-10T20:53:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\"},\"wordCount\":577,\"image\":{\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg\",\"articleSection\":[\"Noticas\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\",\"url\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\",\"name\":\"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos -\",\"isPartOf\":{\"@id\":\"https:\/\/goldenti.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg\",\"datePublished\":\"2020-08-10T20:53:16+00:00\",\"dateModified\":\"2020-08-10T20:53:18+00:00\",\"author\":{\"@id\":\"https:\/\/goldenti.com\/site\/#\/schema\/person\/8190e0425b54b5461126268d75de9409\"},\"breadcrumb\":{\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage\",\"url\":\"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg\",\"contentUrl\":\"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg\",\"width\":815,\"height\":544},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/goldenti.com\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/goldenti.com\/site\/#website\",\"url\":\"https:\/\/goldenti.com\/site\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/goldenti.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/goldenti.com\/site\/#\/schema\/person\/8190e0425b54b5461126268d75de9409\",\"name\":\"Iris Esparza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/goldenti.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ec9f40c0dfa9dc199516d80ef8aac218e84ffeb18d9f3b54b46c273173c12ceb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ec9f40c0dfa9dc199516d80ef8aac218e84ffeb18d9f3b54b46c273173c12ceb?s=96&d=mm&r=g\",\"caption\":\"Iris Esparza\"},\"url\":\"https:\/\/goldenti.com\/site\/author\/irisesparza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos -","og_description":"Casi un tercio (30%) de los ciberataques investigados por el equipo de&nbsp;Kaspersky Global Emergency Response&nbsp;en 2019, [&hellip;]","og_url":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/","article_published_time":"2020-08-10T20:53:16+00:00","article_modified_time":"2020-08-10T20:53:18+00:00","og_image":[{"width":815,"height":544,"url":"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg","type":"image\/jpeg"}],"author":"Iris Esparza","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Iris Esparza","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#article","isPartOf":{"@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/"},"author":{"name":"Iris Esparza","@id":"https:\/\/goldenti.com\/site\/#\/schema\/person\/8190e0425b54b5461126268d75de9409"},"headline":"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos","datePublished":"2020-08-10T20:53:16+00:00","dateModified":"2020-08-10T20:53:18+00:00","mainEntityOfPage":{"@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/"},"wordCount":577,"image":{"@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage"},"thumbnailUrl":"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg","articleSection":["Noticas"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/","url":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/","name":"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos -","isPartOf":{"@id":"https:\/\/goldenti.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage"},"image":{"@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage"},"thumbnailUrl":"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg","datePublished":"2020-08-10T20:53:16+00:00","dateModified":"2020-08-10T20:53:18+00:00","author":{"@id":"https:\/\/goldenti.com\/site\/#\/schema\/person\/8190e0425b54b5461126268d75de9409"},"breadcrumb":{"@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#primaryimage","url":"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg","contentUrl":"https:\/\/goldenti.com\/site\/wp-content\/uploads\/2020\/08\/compu.jpg","width":815,"height":544},{"@type":"BreadcrumbList","@id":"https:\/\/goldenti.com\/site\/hackers-aprovechan-herramientas-legitimas-para-tener-ciberataques-exitosos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/goldenti.com\/site\/"},{"@type":"ListItem","position":2,"name":"Hackers aprovechan herramientas leg\u00edtimas para tener ciberataques exitosos"}]},{"@type":"WebSite","@id":"https:\/\/goldenti.com\/site\/#website","url":"https:\/\/goldenti.com\/site\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/goldenti.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/goldenti.com\/site\/#\/schema\/person\/8190e0425b54b5461126268d75de9409","name":"Iris Esparza","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/goldenti.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ec9f40c0dfa9dc199516d80ef8aac218e84ffeb18d9f3b54b46c273173c12ceb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ec9f40c0dfa9dc199516d80ef8aac218e84ffeb18d9f3b54b46c273173c12ceb?s=96&d=mm&r=g","caption":"Iris Esparza"},"url":"https:\/\/goldenti.com\/site\/author\/irisesparza\/"}]}},"_links":{"self":[{"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/posts\/24476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/comments?post=24476"}],"version-history":[{"count":1,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/posts\/24476\/revisions"}],"predecessor-version":[{"id":24478,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/posts\/24476\/revisions\/24478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/media\/24477"}],"wp:attachment":[{"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/media?parent=24476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/categories?post=24476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goldenti.com\/site\/wp-json\/wp\/v2\/tags?post=24476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}