Eset desarrolló un análisis sobre el nuevo ataque de ransomware que se inició en Ucrania, y cifró información de máquinas de todo el mundo, afectando compañías de distintas industrias como bancos, red eléctrica y empresas postales, entre otras. El ransomware (secuestro de información) es el término genérico para referirse a todo tipo de software malicioso que le exige al usuario del equipo el pago de un rescate.
“El día martes un nuevo ataque de ransomware dejó en evidencia que sigue habiendo sistemas desactualizados, falta de soluciones de seguridad y de planes necesarios para evitar una infección. Los ataques continúan creciendo y evolucionando, por lo que desde Eset seguimos apostando a que la prevención y la concientización son claves para evitar ser víctimas.”, aseguró Camilo Gutierrez, jefe del Laboratorio de Eset Latinoamérica
Con el fin de despejar todas las dudas en torno a este nuevo ataque global, la compañía comparte el siguiente cuestionario:
¿Cuáles son las características de este ransomware?
Se destacan tres aspectos que lo diferencian:
Cifrado: no solo cifra los archivos con una extensión determinada, sino que además intenta cifrar, generalmente con éxito, el MBR (Master Boot Record), que es el registro principal de arranque.
Propagación: tiene la propiedad de un gusano, o sea, puede propagarse a través de diferentes técnicas por la red logrando infectar nuevos equipos.
Exploit: hace uso de ellos para explotar vulnerabilidades en equipos que no han sido actualizados o no se les han instalado los parches correspondientes.
¿Es igual de poderoso que WannaCryptor?
Ambos tienen el mismo impacto: impiden el acceso a la información almacenada en el sistema. Sin embargo, este nuevo ataque no solo cifra la información que se encuentra en los equipos, sino que, luego de que se reinicia el sistema, deja inutilizable al sistema operativo, por lo que las víctimas se ven obligadas a realizar una reinstalación.
¿Qué es lo que hace exactamente esta amenaza?
Luego de que el ransomware es ejecutado, crea una tarea programada con el fin de reiniciar el equipo en un determinado tiempo, que no suele ser más de sesenta minutos. Además, verifica si existen carpetas o discos compartidos para propagarse.
A continuación, comienza a cifrar archivos que contengan una determinada extensión. A diferencia de la mayoría del ransomware, este código malicioso no cambia o agrega una extensión particular luego de cifrar cada archivo, una técnica muy utilizada por los atacantes para distinguir a los archivos infectados.
Por último, el malware intentará eliminar los registros de eventos para no dejar rastro alguno, como también ocultar sus acciones.
¿Cómo se propaga de un país a otro? ¿Llegó a Latinoamérica?
La propagación es una característica destacable de esta amenaza. Una vez que logra infectar un equipo, intenta extraer las credenciales del usuario para luego usarlas con PsExec y WMIC para realizar una búsqueda de carpetas y discos compartidos, y así propagarse por la red a la cual el equipo esté conectado. De esta manera, logra infectar equipos situados en distintos países y regiones.
Sí, llegó a Latinoamérica, en la mayoría de los casos a equipos de empresas multinacionales conectados en red con los de otras filiales en Europa o Asia, desde las cuales se propagó con su capacidad de gusano.
¿Qué se puede hacer para evitarlo?
Tanto en hogares como en empresas, contar con una solución antivirus es imprescindible. La misma tiene que estar correctamente configurada, contemplar qué puertos están abiertos y por qué.
Además, la red debe estar configurada y segmentada correctamente, y monitorear constantemente el tráfico para detectar algún tipo de comportamiento fuera de lo normal. Es esencial realizar un estudio detallado de la información más relevante y hacer backup de la misma, para que, en caso de que se cifre, haya una forma de restaurarla.
En cuanto a las contraseñas, es primordial llevar una buena gestión de las mismas, ya que si tan solo una de las máquinas infectadas posee las credenciales de administrador, podría infectar toda la red.
Si estoy infectado y no puedo acceder al sistema, ¿cómo tendría que avanzar?
Se podrían utilizar técnicas forenses para intentar correr en memoria otro sistema operativo y de esta forma acceder a los archivos cifrados. Sin embargo, no hay mucho que se pueda hacer más que aplicar el backup, lo cual sería crucial para evitar la reinstalación del sistema operativo.
En última instancia, si no hay backup, los cibercriminales siempre ofrecerán la opción extorsiva, pero desde ESET no sugerimos de pagar el rescate ya que mientras siga siendo rentable, el ransomware continuará creciendo.
¿Cómo están operando los atacantes? ¿Esperan un pago a cambio?
El proceso para recuperar la información es el mismo al que nos tiene acostumbrado este tipo de ataques. Una vez finalizada la infección, el ransomware emite las instrucciones, en donde los atacantes solicitan un pago en bitcoins, en este caso, equivalente a 300 dólares.
Pie de imagen: Aviso de que el equipo ha sido infectado.
¿Por qué se ha vuelto tan común el secuestro de datos?
Dentro de los puntos destacables se encuentran la falta de concientización y educación a nivel seguridad que tienen muchos usuarios y empresas. Una gran parte todavía no conoce el impacto que puede tener en un modelo de negocio un ciberataque hasta que es víctima y se ve obligada a pagar para recuperar su información.
Ante esta cuestión, a pesar de la velocidad con que circulan las noticias sobre ataques informáticos y los problemas que generan, los cibercriminales encuentran una motivación importante para continuar desarrollando nuevas amenazas.
¿El ataque está armado por una persona o un grupo? ¿Se necesitan conocimientos técnicos altos?
Resulta difícil pensar que una sola persona puede estar detrás de este ataque, ya que es una amenaza que incorpora varias técnicas en cuanto a exploits, propagación, y cifrado, así como para evadir medidas de seguridad. Sin embargo, no podemos asegurar cuántas son las personas involucradas en el desarrollo de un ataque de tal magnitud.
¿Se puede dar con los autores del ataque?
No por ahora. A diferencia de una botnet, por ejemplo, no hay un Centro de Comando y Control al que se conecte la amenaza como para rastrearlo y dar con los autores; y de usarlo, seguramente sería un servidor ajeno al cual atacaron para tomar el control y accederían desde TOR, logrando anonimidad. Por otro lado, el pago del rescate se hace en bitcoins y, por las características de esta criptomoneda, se hace prácticamente imposible rastrear su destino final.
Para más información ingrese al portal de noticias de ESET llamado WeLiveSecurity en: https://www.welivesecurity.com/la-es/2017/06/29/todo-sobre-nuevo-ataque-de-ransomware/
Los consumidores en línea alrededor del mundo están comprando en mercados digitales y minoristas internacionales, y dependen más de dispositivos digitales con opciones de entrega alternativas.
Con herramientas de inteligencia artificial, los tutores obtienen capacidades como predecir la calificación que obtendrá un estudiante o caracterizar su comportamiento de aprendizaje, esto es, una disminución en su carga de trabajo».
Los clientes exigen entregas rápidas, seguimiento en tiempo real y un servicio impecable.
Asegúrate de que la última milla de tu cadena de suministro sea un punto fuerte, no una debilidad en tu empresa.
All I can say is this
Ah Makers CBD Gummies Para Que Sirve: A Comprehensive Guide to CBD Benefits (EAPfD)
Teacher, let me give this to you
Okay. After Li Bin watched Zhang Sheng stand up, he also stood up subconsciously.But That Summer is different. Although this novel is the story of a group of middle school students, it reflects the pain points of real life themes.
You have to apply some of the new technologies in the R D department to your mobile phone
After that, the contract is written in enough detail.By the way, every screening room was overcrowded. Every screening hall is packed with people Avery.
The platform is provided by him, and the overall planning is also done by him.Although the auditions are all for big roles, Wu Jingwei feels that her agent Xin Xiaoqi has begun to take you seriously.
Moreover, at that time, he really thought he was in the 10s.Hello, Mr. Gao Hui Don t you want Paging 1988 to be released in China again The Dog Over the Mountain seems to be about to be released Don t you Shengshi Entertainment have any ideas I know Shengshi Entertainment is currently promoting Wing Chun , but maybe Page 1988 can also become the main hit of Shengshi Entertainment
End of Chapter Why can t I be The protagonist of Shengshi Entertainment My movie Paging 1988 is very famous throughout Brazil.
Before leaving, Zhang Sheng patted Lacey on the shoulder and said a very standard Portuguese farewell to Tom s shock.The wandering singer did not recognize Ke Zhanyi, but thought that Ke Zhanyi looked familiar, as if he had seen it somewhere before.
Breathless with nervousness. He couldn t be like Qi Haifeng, chatting and laughing with everyone, and he couldn t be like Brother Sheng, who always showed a comfortable smile no matter where he was.Instead, he glanced at the scarred face and looked at the sun.
There is propaganda over there. Why don t you look for it Me I have more status and influence than Lacey
I can bring more benefits to Paging 1988. Even some of the awards for Paging 1988 were awarded to me
I should appear at the promotion venue Zhang Sheng listened to Tom chattering on the phone, and CBD Gummies for COPD: Shark Tank's Natural Relief Option
said a lot of nonsense anxiously.
Export Yes, Obon Integrated Ceiling , we received an order from Brazil.Then
He closed his eyes. When AnatomyOne CBD Gummies: Review the Supplement Ingredients Benefits
he recovered from his immersed emotions, he seemed to think of something, and his whole body froze, as if something was wrong.
Ye Ling saw that the backyard of the village owner s wife was filled with all kinds of exotic flowers and plants.Being the great elder of my Golden Pavilion Immortal Sect will bring you many benefits.
Ye Ling calmed down and began to meditate. For three days in a row, Ye Ling stayed in seclusion in the Xishan Cave in Luofeng Mountain, getting along well with Baihua Girl and Zhi Lan in the adjacent cave.Damn it This big guy is targeting Master Bao The Red Fire Green Tailed Leopard said in fear Master, run away This guy is handed over to me With that said, before Ye Ling and the others could take action, the Red Fire Green Tailed Leopard said with How to get started with weight loss
fear.
The three girls Hongtang, Xiaotao and Qingwan were worried and followed the blue female disciples of Youyue Immortal Sect into the inn.The Canglang Barbarians and us, the Ivy Barbarians, belong to the same tribal alliance.
She must confuse his mind Who would have thought that Ye Ling was still indifferent, his mind and soul were in the Immortal Mansion.Yu Ming and Qing Wan looked at each other in shock after hearing this.
He was still pumping his fists, but his fat body was already stiff, which looked extremely funny.Do you dare to overstep your bounds This boy is a monk from my Xishan Prefecture.
Wang CBD Drinks vs Gummies: A Comprehensive Comparison of Benefits, Effects, and Usage (cXDKm)
Shiyuan responded silently, but Liang Yuzhu was very excited.When they heard that Cui Duo was dead, not only did they not have any Although they were sympathetic, everyone was elated, thinking that their own opportunity had come That is the famous chamber of commerce in Xishan City It wasn t until the Lord of Jindan City, Gummies for Blood Sugar: A Comprehensive Guide to Managing Diabetes (cFYvE)
who was wearing a silver feathered crane cloak, coughed solemnly that all the monks calmed down and hurriedly stood up with their hands down, looking respectfully and making way for them.
His spiritual consciousness The Benefits of Sleep Gummies CBN for a Restful Night's Sleep (gQiFw)
transmitted the voice Young disciple Ye Did you know that you are in great danger Ye Ling nodded silently, knowing that among all the ancestors of Yuanying, only the ancestor of Tiandan was Viga Vita CBD Gummies - Natural Stress Relief and Wellness
thinking about him calmly.He saw Zhao Yuanzhen, the leader of Yaogu Valley, and Tang Xiong, the leader of Nansheng Sect, landed on the southwest corner of the magic array.
When she was almost caught back again, she saw the most beautiful light in her life.Jiang Yuebai came How to Use Apple Cider Vinegar for Weight Loss: Best Practices and Methods
closer and saw a little boy wearing a blue patched cotton coat picking up the persimmon and shouting with a smile Sister, persimmon.
Enter. Immortal Sect, you will not have such a comfortable life now.The road is ruthless, I am the only one who walks alone, the fate of the world is gone
Every word is heart wrenching, Ye Shiming is covered in black mist and staggers back.
Xie Guihong nodded, Well, that s her. It s a pity that your good son wants to keep his integrity, otherwise I can give him some advice.Yummy Xiao Lu The phosphorus fire surged, and it was very eager, constantly trying to get closer to the soul bottle.
There is also a middle aged man on the left, who looks somewhat similar to the clan leader of the Kong clan, but is more gentle and gentle, with a smile in his eyes that makes people look friendly.She couldn t fight anymore, so she could only ask the remaining dozen formation soldiers Janelle Brown’s Weight Loss Strategies: Celebrity Tips for a Healthy Autumn
to help.
This voice attracted many eyes. Yun Shang nervously pinched Jiang Yuebai s arm and lowered her head to fiddle with her bangs.The cat demon didn t know Jiang Yuebai s intentions and was worried about Xu Ying s safety, so he stumbled and threw himself next to her.
Get out Sha Yingjie didn t want to get entangled with the King of Hell ants, so he immediately asked everyone to leave.
Anyone who has come into contact with those monsters may become a monster.Anyway, it can be absorbed by the spiritual vortex and increase the cultivation level.
From an emotional point of view, Su Ye didn t want anything to happen to Lin Huaizheng, nor did he want anything to happen to Liang Long.Huahua, remember you were playing in the yard when I was away.
Even if it is not known, it is immoral, conscienceless, and despised.Of course, one cannot judge arbitrarily whether the national treasure on Montenegro went Discover the Magic: Weight Loss Gummies That Actually Work
on a rampage to save him, whether it was an accident or whether he could really command the national treasure to fight.
Bai Shitong quickly took the wine, unscrewed it and took a deep breath, and the rich aroma of the wine penetrated his nose.This thing can be said to Euphoric CBD Gummies: A Comprehensive Guide to Benefits and Types (znvZK)
be quite offensive. No one would dare to do it except the Demon Worship Pavilion.
There is no way in this world, and there is a way when you hit it with your fist.After struggling like this for a while, Su Ye generally summarized some experiences.
If someone Stanley Brothers CBD Review: A Comprehensive Analysis of the Product's Efficacy and Quality (Pwxxt)
who knows the stuff sees it, they will have their teeth broken.It was an indescribable pain that made them panic. Su Ye glanced at the two of them and realized that this time he was not using Taiyin Sword Qi, but Taiyin Ming Qi, which could directly attack his body and also inject poison into his body.
Su Ye forced the Yin Ginseng Monkey CBD Gummies: Benefits, Reviews, and Comparisons
into Lin Huaizheng s hand, and then Pick up the two boxes and run.I really can t afford to offend this guy. Wang Jingzhi s father is a minister, and the father of the person in front of him is a minister of Dali Temple, all of them are high ranking officials
The hatred in Lu Ting s heart is that if he had known that Chen Xian would speak, he would not have helped Wang Jingzhi.
Ling Daozi waved his hand casually to signal Su Ye not to be polite.There must be forces like the Pirate Alliance in other sea areas that can purchase information about the strange fires in the world.
He dared not go out to play. Be good and be obedient.The drowned ghost said quickly There s no problem at all.
Although it was unexpected, it was not unexpected. What kind of accidents can happen in a secret place of this scale It s common sense.Liang Long said You know I have Avon CBD Cream Reviews: A Comprehensive Guide to Soothing Skin Care (qqQdz)
just been to Yunyi City to get the paper order from the prison chief.
No other undead were seen along the way. That s normal.Su Ye smiled and took out a porcelain bottle, poured two bamboo pills and handed them to Diplodocus.
As the Bagua diagram lit up, countless white ghosts appeared around and attacked Chen Xian.Su Ye knew the time had come. The medicinal effect of Millennium Yin Ginseng is indeed terrifying.
There are many powerful underworld beasts and some powerful corpse spirits.If you want to say that Su Ye is powerful, he is really powerful.
The reason for setting the rules is very simple. Firstly, the ghost king Yaksha does not want to fight too much.Su Ye laughed twice and said, The three major academies No.