Eset desarrolló un análisis sobre el nuevo ataque de ransomware que se inició en Ucrania, y cifró información de máquinas de todo el mundo, afectando compañías de distintas industrias como bancos, red eléctrica y empresas postales, entre otras. El ransomware (secuestro de información) es el término genérico para referirse a todo tipo de software malicioso que le exige al usuario del equipo el pago de un rescate.
“El día martes un nuevo ataque de ransomware dejó en evidencia que sigue habiendo sistemas desactualizados, falta de soluciones de seguridad y de planes necesarios para evitar una infección. Los ataques continúan creciendo y evolucionando, por lo que desde Eset seguimos apostando a que la prevención y la concientización son claves para evitar ser víctimas.”, aseguró Camilo Gutierrez, jefe del Laboratorio de Eset Latinoamérica
Con el fin de despejar todas las dudas en torno a este nuevo ataque global, la compañía comparte el siguiente cuestionario:
¿Cuáles son las características de este ransomware?
Se destacan tres aspectos que lo diferencian:
Cifrado: no solo cifra los archivos con una extensión determinada, sino que además intenta cifrar, generalmente con éxito, el MBR (Master Boot Record), que es el registro principal de arranque.
Propagación: tiene la propiedad de un gusano, o sea, puede propagarse a través de diferentes técnicas por la red logrando infectar nuevos equipos.
Exploit: hace uso de ellos para explotar vulnerabilidades en equipos que no han sido actualizados o no se les han instalado los parches correspondientes.
¿Es igual de poderoso que WannaCryptor?
Ambos tienen el mismo impacto: impiden el acceso a la información almacenada en el sistema. Sin embargo, este nuevo ataque no solo cifra la información que se encuentra en los equipos, sino que, luego de que se reinicia el sistema, deja inutilizable al sistema operativo, por lo que las víctimas se ven obligadas a realizar una reinstalación.
¿Qué es lo que hace exactamente esta amenaza?
Luego de que el ransomware es ejecutado, crea una tarea programada con el fin de reiniciar el equipo en un determinado tiempo, que no suele ser más de sesenta minutos. Además, verifica si existen carpetas o discos compartidos para propagarse.
A continuación, comienza a cifrar archivos que contengan una determinada extensión. A diferencia de la mayoría del ransomware, este código malicioso no cambia o agrega una extensión particular luego de cifrar cada archivo, una técnica muy utilizada por los atacantes para distinguir a los archivos infectados.
Por último, el malware intentará eliminar los registros de eventos para no dejar rastro alguno, como también ocultar sus acciones.
¿Cómo se propaga de un país a otro? ¿Llegó a Latinoamérica?
La propagación es una característica destacable de esta amenaza. Una vez que logra infectar un equipo, intenta extraer las credenciales del usuario para luego usarlas con PsExec y WMIC para realizar una búsqueda de carpetas y discos compartidos, y así propagarse por la red a la cual el equipo esté conectado. De esta manera, logra infectar equipos situados en distintos países y regiones.
Sí, llegó a Latinoamérica, en la mayoría de los casos a equipos de empresas multinacionales conectados en red con los de otras filiales en Europa o Asia, desde las cuales se propagó con su capacidad de gusano.
¿Qué se puede hacer para evitarlo?
Tanto en hogares como en empresas, contar con una solución antivirus es imprescindible. La misma tiene que estar correctamente configurada, contemplar qué puertos están abiertos y por qué.
Además, la red debe estar configurada y segmentada correctamente, y monitorear constantemente el tráfico para detectar algún tipo de comportamiento fuera de lo normal. Es esencial realizar un estudio detallado de la información más relevante y hacer backup de la misma, para que, en caso de que se cifre, haya una forma de restaurarla.
En cuanto a las contraseñas, es primordial llevar una buena gestión de las mismas, ya que si tan solo una de las máquinas infectadas posee las credenciales de administrador, podría infectar toda la red.
Si estoy infectado y no puedo acceder al sistema, ¿cómo tendría que avanzar?
Se podrían utilizar técnicas forenses para intentar correr en memoria otro sistema operativo y de esta forma acceder a los archivos cifrados. Sin embargo, no hay mucho que se pueda hacer más que aplicar el backup, lo cual sería crucial para evitar la reinstalación del sistema operativo.
En última instancia, si no hay backup, los cibercriminales siempre ofrecerán la opción extorsiva, pero desde ESET no sugerimos de pagar el rescate ya que mientras siga siendo rentable, el ransomware continuará creciendo.
¿Cómo están operando los atacantes? ¿Esperan un pago a cambio?
El proceso para recuperar la información es el mismo al que nos tiene acostumbrado este tipo de ataques. Una vez finalizada la infección, el ransomware emite las instrucciones, en donde los atacantes solicitan un pago en bitcoins, en este caso, equivalente a 300 dólares.
Pie de imagen: Aviso de que el equipo ha sido infectado.
¿Por qué se ha vuelto tan común el secuestro de datos?
Dentro de los puntos destacables se encuentran la falta de concientización y educación a nivel seguridad que tienen muchos usuarios y empresas. Una gran parte todavía no conoce el impacto que puede tener en un modelo de negocio un ciberataque hasta que es víctima y se ve obligada a pagar para recuperar su información.
Ante esta cuestión, a pesar de la velocidad con que circulan las noticias sobre ataques informáticos y los problemas que generan, los cibercriminales encuentran una motivación importante para continuar desarrollando nuevas amenazas.
¿El ataque está armado por una persona o un grupo? ¿Se necesitan conocimientos técnicos altos?
Resulta difícil pensar que una sola persona puede estar detrás de este ataque, ya que es una amenaza que incorpora varias técnicas en cuanto a exploits, propagación, y cifrado, así como para evadir medidas de seguridad. Sin embargo, no podemos asegurar cuántas son las personas involucradas en el desarrollo de un ataque de tal magnitud.
¿Se puede dar con los autores del ataque?
No por ahora. A diferencia de una botnet, por ejemplo, no hay un Centro de Comando y Control al que se conecte la amenaza como para rastrearlo y dar con los autores; y de usarlo, seguramente sería un servidor ajeno al cual atacaron para tomar el control y accederían desde TOR, logrando anonimidad. Por otro lado, el pago del rescate se hace en bitcoins y, por las características de esta criptomoneda, se hace prácticamente imposible rastrear su destino final.
Para más información ingrese al portal de noticias de ESET llamado WeLiveSecurity en: https://www.welivesecurity.com/la-es/2017/06/29/todo-sobre-nuevo-ataque-de-ransomware/
En un mundo donde la competitividad es feroz y la eficiencia es clave, el mantenimiento predictivo emerge como una herramienta indispensable para las plantas industriales que buscan mantenerse a la vanguardia en un entorno en constante evolución.
Para facilitar el transporte y control de mercancía, en punto de venta y almacén, es necesario que las empresas piensen en implementar sistemas de control dentro de sus procesos de trabajo y operación.
IDC calcula que las empresas dedicarán al menos 28% de su presupuesto de TI a la contratación de servicios en la nube durante 2017, con lo que inician la transición a un modelo de consumo bajo un esquema de Opex (gasto operativo).
What is this possible This is impossible. What I got was a peerless magic weapon.Of course, they were just sparring. On this Black Soil, there are abundant resources, enough for everyone to practice.
Because the two figures were Lin Xuan and Zhao Xue, and it was Lin Xuan who asked the question.The sea of fire above the head, the mist under the feet, the ghosts with hidden weapons around, and the boundless sea of blood were all frozen at this moment.
With a wave of the beast s claw, all the strong men of the Ziyun sect burst into blood mist.Lin Xuan s eyes flickered Not only that, there are many killers around us.
A series of angry shouts sounded. Lin Xuan, on the other hand, had an ice cold expression, surrounded by lightning and black flames, and was like a god of war, unstoppable.To be honest, they were really stunned this time, which was even greater than all the previous shocks.
You dare to do something to me Hua Wufeng was furious, but when he looked at Lin Xuan Stimuli Bqhaxq Rx Cbd Gummies For Ed Comprehensive User Guide and the others carefully, his pupils shrank sharply.Master Rudder, something is wrong with Master Rudder.
And it is very strong, We can easily kill sixth rank sects, and our speed may not be as fast as him.And these three five star killers have reached their peak.
This is a gorgeous dividing line sp Not only that, but with every step, the breath of the golden lion becomes stronger, and in the end, the golden blood that fills the sky dyes the entire sky into gold color.Lin Xuan waved again, and suddenly four terrifying palms appeared, pressing down on the caps of those people s spirits.
Thinking of this, his body Netizens please remind Please pay attention to rest your eyes when reading for a long time.This is the gorgeous dividing line Is the young man in front of him a man or a ghost He is so terrifying.
With the blood power of Murong Qingcheng and Shen Jingqiu, the sect he wants to join will definitely not be inferior to Danzong.So, as long as they shot with all their strength, it wouldn t be a problem to blow away the formation above.
However, there is no such thing as destiny, it cannot be violated, even if he is lost, there is nothing he can do about it, and this immortal golden elixir is already a peerless god elixir.Even Duan Sirius and the elders of Shenniao Palace changed their expressions.
The leader of the black dragon naturally knew what this meant, it meant that the opponent had broken the formation.In the past, he needed to combine the other five kings with the Evaluating Power Cbd Gummies For Ed Ubawk Strengths And Weaknesses power of burning blood to be able to contend against Sky Youque.
Give me death The next moment , an elder of the Zhao family roared, and he rushed over like a tiger.There are many people in the VIP room, and they are all looking at Lin Xuan and others at the moment.
Lin Xuan waved his hands to silence everyone. Everyone, it s not suitable to talk about cooperation because it s the birthday party of Zhuang Xia today.
Fart, go to hell Han Kun was furious, He is a genius in Jinyu Kingdom, how Reviews On Cbd Gummies For Ed User Yeuzyn Experiences could he be a slave to others.But he was old after all, and he tried not to do anything if he could, so he didn t say anything in the face of the extremely powerful God of War Palace.
That is the truly terrifying master, I am afraid that even the city lord of Nanhuang Ancient Town will take it seriously Even if this kid survives today, he will surely die tomorrow, Ziyang said in a deep voice.Therefore, he can only intimidate the other party. However, Lin Xuan ignored these threats at Regen Cbd Gummies For Ed Evaluating Their Potential To Mxpzgwu Revitalize Sexual Health all.
The half earth level treasure was indeed extremely terrifying, and it resisted the sword net in the sky.What they have to do is to hide their strength and deceive the two seventh level venerables above.
I didn t expect to be able to stand on our side this time.As if this sword could kill all the giant swords formed by the purple lightning, all the warriors around were shocked.
He waved his palm and slapped it forward quickly. This punch was so terrifying that the sky was Blue Gummies For Ed Comprehensive Reviews And User Testimonials Blgrnj shattered by the shock of the terrifying fist.Damn, what is this Those people got up from the ground with horror on their faces.
The next moment, Alpha Xnd Xzvgm Ultra Reviews Is It Legit that huge body rushed towards Tianyouque.This is a method to increase the energy and blood of the warrior and strengthen the physique.
Moreover, Lin Xuan also has the Great Dragon Sword Soul, which can evolve and simulate everything.Rumor has it that over the years, the sword master s energy and blood have withered, and he no longer has a few years of life span.
Those fist shadows turned into red dragons, rushing out quickly.n Netizens please remind Please pay attention to rest your eyes when reading for a long time.
And with a more violent attitude, he killed the leader of the black dragon.Even if the two monsters have reached the level of nine star demon generals, they are even more terrifying than the human nine level venerable.
But soon, he denied it, because it didn t look like a formation, but more like a painting.
Qiu Yulan had noticed Hong Haotian s actions a long time ago.Looking at these two demon pills, Lin Haoming s eyes flashed purple light, and the corners of his mouth showed a slight look of surprise.
The reason why this kind of desolate beast can drive such a body depends on this thing.Only by defeating that self can we enter the Tianmo Palace.
The second stage of the trial, complete, excellent, you can get one of the following three items as rewards, please choose Along with the voice, Lin Haoming only saw three boxes appearing in front of him with a flash of light.Although Needle Shuttle didn t get the Golden Flame Grass, but beside the Golden Flame Grass, there was also a strange scarlet python.
As for Zheng Ge, he had disappeared. Seeing this scene, Zhao Keming snorted coldly and said, Friend Daoist Wei, Lin Haoming can be said to be your master killer and enemy now.After finishing this, Lin Haoming took out the golden long whip again, spent another two hours, and simply sacrificed it, so that it could be used directly in the future.
Lin Haoming didn t even bother to do it this time, and said indifferently Zhang Fengxian, take it I don t like it, but it is still a small fortune for me, and I am overjoyed to hear Lin Haoming s order.If they really make a move, it is obvious that they are at a disadvantage.
Lin Haoming didn t stay any longer, and quickly returned to his cave.That s right The Great Elder of the Purple Leaf Sect also nodded, and then said to Lu Lu You rush back to the sect immediately, and then hand this jade slip to the master nephew of the sect, and let him finish Where To Buy Cbd Hxoktufzw Gummies For Ed Reliable Sources And What To Look For the things inside.
Seeing Lin Haoming taking a break, he deliberately kept silent, and even went out of his way to chat with a few friends, pretending that he had forgotten the time.Each giant Cbd For Ed Gummies A Closer Look At Wpdgiw Specific Formulas clam is engraved with a Buddhist seal, which seems quite sacred.
Lin Haoming couldn t help but think about the fastest update.Not long after, Lin Haoming even saw the cliff not far away and stepped on the ground again.
The puppet army obviously didn t expect the devils to kill them painfully.Be sure to destroy all the enemy tanks before they meet our tanks Yes Yoshio Shinozuka responded.
Regardless of these, most of the ghost soldiers who were sent to China to fight and commit numerous crimes came from the common people rather than the so Stimuli Rx Cbd Gummies For Ed A Closer Look Djsoy At Cannabidiols Effect On Ed called ruling class.The intelligence personnel and underground workers of the Eighth Route Army are everywhere, and there are many in Zhongtiao Mountain, and many of them are capable of guerrilla warfare.
Because of being poor, pork has become rare. What s more important is that both the soldiers and the civilians have a high degree of self consciousness.At this time, Mao Xiong can only contact the recalcitrant army according to the agreement on the Little Blue Xpszmy Gummies For Ed Reviews Real User Feedback cooperation and resistance to the Huaxia strategy.
If these machine guns are still kept, there is no way to fight mountain warfare.Therefore, it can Serenity Farms Cbd Oftkq Male Enhancement Gummies Review be estimated that for a long time in the future, the recalcitrant army will The aid that can be obtained will be greatly reduced Li Yunlong was happy when he heard this Chief, this is a good thing Anyway, we can t get Ed Gummies On Shark Vdnci Tank Popular Products And Reviews a hair of these aids, if there is less, there will be less Ding Wei Cut He said I said, Lao Li, you don t have to think about it, if the stubborn army can t sustain it because of the sharp drop in aid, how can we get through it Li Yunlong replied with a hehe Ed Gummies Shark Tank User Lxzutsurg Reviews And Effectiveness Analysis smile Old Ding, you just said that, as if the recalcitrant army could hold on with assistance If he could hold on, why would Zhongtiao Mountain let the three divisions of the Devils Lay it down Ding Wei was speechless after being told by Li Yunlong.
But this plan was quickly overturned by the chief himself.It would only cause the Huaxia Army to suffer even greater loss.
He took a look at the guns and asked suspiciously Captain Li, this is the official Citigroup, and it s brand new.At three o clock in the morning, the Eighth Route Army actually chose to attack in the dark, which surprised him Power Cbd Gummies Fnnwq For Ed Reviews Analyzing User Experiences And Benefits unexpected.
This made it impossible for Maoduzi to use many hunting skills.Sun Erwei didn t feel relieved until all the ammunition was emptied, and then rushed to the three stores in a satchel accompanied by an interpreter.
Some of these rockets were incendiary bombs, and most of the houses in Yuncheng were wooden houses at this time, which immediately caused Bio Lyfe Cbd Ykdty Gummies For Ed Reviews User Feedback a raging fire in the city.I ll try to apply Sun Erwei nodded and said, However, there s no guarantee of success End of this chapter Sun Erwei answered very conservatively, but Yingjiang agreed very simply.
In contrast, Skinner s bazooka was really an iron barrel at this time, an iron barrel that didn t even have time to install the sights.The reason for the line of the back attacking line all over again.
Let the devil surrender. We Guarantee their safety Otherwise, shoot to kill Yes Li Dachui answered and went up with a small speaker that could speak devilish words.As long as there is enough time or enough temptations, Chongqing will agree.
For example, the muscles of some older veterans Vhyiixipw Best Sex Gummies Enhance Your Intimate Moments have been severely solidified into conditioned reflexes.For another example, Wang Xuexin made the bazooka ahead of time and sold it to Mao Xiong, which made Mao Xiong stabilize his position in advance.
Parallel machine guns fired at the fortifications built with sandbags, overwhelming the devils to lift their heads.Among them, Squadron Leader Murayama was fiddling with radio stations on the ground with several communication soldiers
He tried to use the radio to contact the headquarters to inquire about the situation and next instructions.
Its pilots have combat experience There are many ways to avoid or even destroy anti aircraft fire.If you are not prepared to stare in this direction, you will not be able to find the position of the enemy s artillery.