Eset desarrolló un análisis sobre el nuevo ataque de ransomware que se inició en Ucrania, y cifró información de máquinas de todo el mundo, afectando compañías de distintas industrias como bancos, red eléctrica y empresas postales, entre otras. El ransomware (secuestro de información) es el término genérico para referirse a todo tipo de software malicioso que le exige al usuario del equipo el pago de un rescate.
“El día martes un nuevo ataque de ransomware dejó en evidencia que sigue habiendo sistemas desactualizados, falta de soluciones de seguridad y de planes necesarios para evitar una infección. Los ataques continúan creciendo y evolucionando, por lo que desde Eset seguimos apostando a que la prevención y la concientización son claves para evitar ser víctimas.”, aseguró Camilo Gutierrez, jefe del Laboratorio de Eset Latinoamérica
Con el fin de despejar todas las dudas en torno a este nuevo ataque global, la compañía comparte el siguiente cuestionario:
¿Cuáles son las características de este ransomware?
Se destacan tres aspectos que lo diferencian:
Cifrado: no solo cifra los archivos con una extensión determinada, sino que además intenta cifrar, generalmente con éxito, el MBR (Master Boot Record), que es el registro principal de arranque.
Propagación: tiene la propiedad de un gusano, o sea, puede propagarse a través de diferentes técnicas por la red logrando infectar nuevos equipos.
Exploit: hace uso de ellos para explotar vulnerabilidades en equipos que no han sido actualizados o no se les han instalado los parches correspondientes.
¿Es igual de poderoso que WannaCryptor?
Ambos tienen el mismo impacto: impiden el acceso a la información almacenada en el sistema. Sin embargo, este nuevo ataque no solo cifra la información que se encuentra en los equipos, sino que, luego de que se reinicia el sistema, deja inutilizable al sistema operativo, por lo que las víctimas se ven obligadas a realizar una reinstalación.
¿Qué es lo que hace exactamente esta amenaza?
Luego de que el ransomware es ejecutado, crea una tarea programada con el fin de reiniciar el equipo en un determinado tiempo, que no suele ser más de sesenta minutos. Además, verifica si existen carpetas o discos compartidos para propagarse.
A continuación, comienza a cifrar archivos que contengan una determinada extensión. A diferencia de la mayoría del ransomware, este código malicioso no cambia o agrega una extensión particular luego de cifrar cada archivo, una técnica muy utilizada por los atacantes para distinguir a los archivos infectados.
Por último, el malware intentará eliminar los registros de eventos para no dejar rastro alguno, como también ocultar sus acciones.
¿Cómo se propaga de un país a otro? ¿Llegó a Latinoamérica?
La propagación es una característica destacable de esta amenaza. Una vez que logra infectar un equipo, intenta extraer las credenciales del usuario para luego usarlas con PsExec y WMIC para realizar una búsqueda de carpetas y discos compartidos, y así propagarse por la red a la cual el equipo esté conectado. De esta manera, logra infectar equipos situados en distintos países y regiones.
Sí, llegó a Latinoamérica, en la mayoría de los casos a equipos de empresas multinacionales conectados en red con los de otras filiales en Europa o Asia, desde las cuales se propagó con su capacidad de gusano.
¿Qué se puede hacer para evitarlo?
Tanto en hogares como en empresas, contar con una solución antivirus es imprescindible. La misma tiene que estar correctamente configurada, contemplar qué puertos están abiertos y por qué.
Además, la red debe estar configurada y segmentada correctamente, y monitorear constantemente el tráfico para detectar algún tipo de comportamiento fuera de lo normal. Es esencial realizar un estudio detallado de la información más relevante y hacer backup de la misma, para que, en caso de que se cifre, haya una forma de restaurarla.
En cuanto a las contraseñas, es primordial llevar una buena gestión de las mismas, ya que si tan solo una de las máquinas infectadas posee las credenciales de administrador, podría infectar toda la red.
Si estoy infectado y no puedo acceder al sistema, ¿cómo tendría que avanzar?
Se podrían utilizar técnicas forenses para intentar correr en memoria otro sistema operativo y de esta forma acceder a los archivos cifrados. Sin embargo, no hay mucho que se pueda hacer más que aplicar el backup, lo cual sería crucial para evitar la reinstalación del sistema operativo.
En última instancia, si no hay backup, los cibercriminales siempre ofrecerán la opción extorsiva, pero desde ESET no sugerimos de pagar el rescate ya que mientras siga siendo rentable, el ransomware continuará creciendo.
¿Cómo están operando los atacantes? ¿Esperan un pago a cambio?
El proceso para recuperar la información es el mismo al que nos tiene acostumbrado este tipo de ataques. Una vez finalizada la infección, el ransomware emite las instrucciones, en donde los atacantes solicitan un pago en bitcoins, en este caso, equivalente a 300 dólares.
Pie de imagen: Aviso de que el equipo ha sido infectado.
¿Por qué se ha vuelto tan común el secuestro de datos?
Dentro de los puntos destacables se encuentran la falta de concientización y educación a nivel seguridad que tienen muchos usuarios y empresas. Una gran parte todavía no conoce el impacto que puede tener en un modelo de negocio un ciberataque hasta que es víctima y se ve obligada a pagar para recuperar su información.
Ante esta cuestión, a pesar de la velocidad con que circulan las noticias sobre ataques informáticos y los problemas que generan, los cibercriminales encuentran una motivación importante para continuar desarrollando nuevas amenazas.
¿El ataque está armado por una persona o un grupo? ¿Se necesitan conocimientos técnicos altos?
Resulta difícil pensar que una sola persona puede estar detrás de este ataque, ya que es una amenaza que incorpora varias técnicas en cuanto a exploits, propagación, y cifrado, así como para evadir medidas de seguridad. Sin embargo, no podemos asegurar cuántas son las personas involucradas en el desarrollo de un ataque de tal magnitud.
¿Se puede dar con los autores del ataque?
No por ahora. A diferencia de una botnet, por ejemplo, no hay un Centro de Comando y Control al que se conecte la amenaza como para rastrearlo y dar con los autores; y de usarlo, seguramente sería un servidor ajeno al cual atacaron para tomar el control y accederían desde TOR, logrando anonimidad. Por otro lado, el pago del rescate se hace en bitcoins y, por las características de esta criptomoneda, se hace prácticamente imposible rastrear su destino final.
Para más información ingrese al portal de noticias de ESET llamado WeLiveSecurity en: https://www.welivesecurity.com/la-es/2017/06/29/todo-sobre-nuevo-ataque-de-ransomware/
Mayor automatización se traduce en crecimiento financiero y promete mayor productividad. Las compañías altamente automatizadas son 6 veces más propensas a incrementar sus ingresos.
Centinel-5 Precursor suministrará al programa Copernicus información esencial sobre la composición química de la atmósfera antes de que, en 2021, entre en funcionamiento el instrumento Sentinel-5.
Piñatas Aldi y UPS México trabajan para enfrentar juntos los desafíos logísticos y continuar llevando alegría a través de sus piñatas a otros mercados desde su página de internet www.aldimyshop.com
I haven t experienced this kind of youthful life for a long time in my previous life.This arc was even smaller than the one on the palm of his hand, let alone a high speed camera.
He would try whatever Uncovering the Excellence of UrCove by Hyatt Futian CBD Reviews: A Comprehensive Analysis (FARGG)
came to his mind first. With all his strength, he ran quickly into the sea.If the Shenzhao Kingdom is not handled properly, I am afraid that the first thing several big countries will consider is nuclear transfer to level the territory of the Shenzhao Kingdom Solve the fundamental problem of this volcanic eruption crisis Directly strike the volcano itself and use nuclear bombs to fill it before it erupts.
And the family living in this house is not an ordinary family, but a martial arts family Roar Ha
Violent shouts kept coming from the inner courtyard.It would be nice if the phone wasn t broken. Lin Beichen once again felt that the phone could be used without it, but it couldn t be used without it.
It s the scene from another dimension that has been confused and brought to our dimension.Even if he has realized the core essence of these martial arts with his incredible understanding, and seems to have learned the martial arts, Dr Gundry CBD Gummies Reviews: Benefits, Effectiveness and User Feedback
it is only in the martial arts.
I m afraid these traffickers were struck by lightning.Think about it, if there is such a thing as cultivation method, how come it has not been spread for thousands of years since ancient times How can the country not know about it I He has a heaven defying understanding and has conditions that his ancestors did not have
After 7 Ways Blue Vibe CBD Gummies for ED Can Help You Stop Smoking in 2025
all, I am the only one who can do it alone. Lin Beichen sighed in his heart, but he was actually more disappointed.
At the same time, you will be as far away from the answer to the question as a galaxy.Can any of you tell me
where is the lightning that you said was chasing Finding the Best Source for Blue Vibe CBD Gummies: A Comprehensive Guide
you Sun Chao and the other four subconsciously opened their eyes.
There will be no heavenly restrictions and Punishment.about
just do the exercises for a week, and I ll take a look.
The pollen was too thick and he suddenly turned his head and sneezed, sending large Experts Agree: Simply Lean Keto Transforms Modern Dieting Approaches
petals flying.Shen Huaixi spread out the blood shadow with all his strength, and the blood shadow let out a shrill scream and was almost burned to ashes by the Phoenix True Fire.
The third pair of leaves has grown in the sea of consciousness.Bai Jiuyou took a bite of the popsicle and said to the remains of the nine headed dragon, Quickly, collect the blood of the dragon while it s hot.
What is this In the sea of consciousness, Jiang Yuebai s white haired and white eyed divine baby jumped up, parted the gray fog and approached the golden light.Jiang Yuebai told Lu Nazhi briefly about the matter, and Understanding the Benefits of CBD Gummies 1000mg: A Comprehensive Guide
Lu Nazhi took the condenser to help check.
The floor of the The Price of CBD Gummies: A Comprehensive Guide to Finding the Best Products
hall is still the kind of marble that can be seen by people.She used both the Vortex technique and the methods in the Chaos Swallowing Heaven Technique , but she still felt that something was not flowing smoothly, and no one could ask.
Okay, I ll take another look. Wen Jian sat cross legged on the ground.To deal with someone like her, we have to fight quickly
Yun Shang nodded, Xiao Bai is so awesome Xie Jingshan almost knelt down.
The veins of a leaf quickly appeared, and the veins expanded into a leaf.Now I ll see how you struggle The puppet clone held down the immobile little green, picked up the pen and dipped it in ink, and started drawing.
We now have Yu Qing er in hand, and we can go to the Monster Clan through her.In the story, the man in the story was kicked out of the underworld after traveling around a circle because his life span was not over, and returned safely.
Crabs spitting bubbles passed by everyone s feet. In the distance, coconut trees were covered with coconuts the size of human heads.The cold wind was howling and the Enhancing Intimacy with Love High Sex Gummies THC: A Comprehensive Guide (mCcac)
various auras were mixed, making it impossible for Jiang Yuebai and the three of them to distinguish their direction
Thunder suddenly flashed out of thin air from behind, and Jiang Yuebai watched helplessly as the gray mist was split into a black crack, just like the void Wen Miao had just broken, and a strong suction force suddenly came out from the crack.
When Tom heard this sentence, his originally frightened and uneasy mood suddenly became excited, and he nodded quickly , and then left the office.The driver looked anxious, glanced at the hospital bed, and hesitated for a moment.
Although there are many people and sophistication, at least I can stay here comfortably.This is pushing yourself to the forefront He lowered his head subconsciously and wanted to leave.
Ever since Zhang Panpan refused to purchase the copyright from Zhang Panpan s company, Zhang Panpan had not contacted her for almost four days.Zhang Sheng looked at the white sky in the distance.
Although he made a lot of money, it was not much compared to those commercial frauds.It seemed like he was talking to Mei Zhenjing, but it seemed like he was telling me about the evening in Yanjing.
noon. Xu Shengnan finally took a breath and lay on the sofa for a while.Continue to go to the last house to talk about the joint name
Standing in the way of people s money is the same as killing people and setting fires Low one
I seem to be watching a horse and walking through my life
Zhang Sheng gritted his teeth and clucked. ring Zhang Gui saw the lights outside the village turn on one How Long Does a CBD Gummy Last: Understanding the Effects and Duration
after another.
Xin Xiaoqi graduated from the Performance Department in 2009 and is a native of Yanjing.He looked at Avery Tashi s kind smile and chatted with him about movies
He and Avery Tashi. Tashi can communicate completely, and there is no vague generation gap between the two.
He cannot be a pure tool. Being clever is not a bad thing.Even if you succeed, you will give up. You will learn anything you can learn in front of the curtain.
He suppressed this emotion. Mr. Zhang, please come this way Okay The host of Struggle is named Zhang Lan.Come to the Student Union, he will graduate in Yanjing There are great benefits to finding a job, and I believe he won t refuse.
Although it only lasted for more than ten minutes and was quickly crowded out by Lose 10 Pounds in a Month with These Apple Cider Vinegar Drink Recipes in 2025!
various entertainment gossips, the story of Meng Shurong and Oubang International gradually spread to a small area.A few hours later, the context in Xu Bowen s mind became extremely clear.
I accidentally Best 15-Minute Exercises to Lose Weight Fast for Beginners
heard a burst of ridicule as an assistant director, but someone regarded me as the assistant director of This Is the Summer The phone call was from Starlight Future.But
she still can t compare with Gao Yuan. Gao Yuan is considered her senior, and he debuted very early.
They used a small video software they made to cast the live broadcast to the merchant s TV through the Internet.Not only is she more mature than before, but she is also more sophisticated in talking about customers.
Most people can t hold it. Then collapsed. It s ruined. Li Bin also felt that he was gradually reaching his limit and was about to be unable to hold on any longer.Especially after getting into the taxi, he saw Lacey and Clete looking around and shook his head immediately.
Looking southward, it was almost a flat plain United Farms CBD Reviews: A Comprehensive Analysis of Efficacy and Legitimacy (VVUve)
Go back No need to send you far away, farewell Ye Ling sent away the Moon Man Saint and walked away.Ye Ling was still meditating with his eyes closed. Now that he was in the Talisman Formation and Shadow Formation, even if Zhou Mingzhao led all the Xuanxian Sect disciples to come, they could no longer threaten him While meditating Exploring the Benefits and Usage of EarthMed CBD Gummies
here, Ye Ling clearly felt that spiritual energy entered his body, which was of great benefit to his improvement of cultivation.
Whoever could pick as much of the spiritual grass in the fantasy world got the most.At full speed, they flew hundreds of miles away in the Premium Jane CBD Gummies - Reviews, Benefits, and Expert Opinions
blink of an eye The four of them rushed out of the fog, and their eyes suddenly lit up.
Young Master The Top 8 Workouts for Women Over 40 to Torch Fat and Tone Up Fast
Canglang s soul blood was still in Ye Ling s hands, so he had to go with Ye Ling.Garden. Ye Ling was excited Ever since the jade pendant dropped from the sky, he had seen the name Donghuang Taiyi floating on it.
Isn t it more convenient than at the foot of Beishan Mountain How much Ye Ling said Now, time is running out, I still have plans Senior brother, you find the second senior sister and wait for me on Beishan in the north of the city Hongtang, Xiaotao, Qingwan, you three, get as much as you can For the refining materials, temporarily leave the Huixing Improving Sleep Quality with Sleep Gummies NZ: A Comprehensive Guide (Ygpfm)
Pavilion to the care of Shopkeeper Cui, and come with me to Beishan Tang Die and Siko Tingyan will come back in the evening.
After this battle, the sea conquering vanguard army of thousands of people was reduced to less than 800 people.As for Xu Mingsheng, he had some credit, but he did not receive the treatment that Ye Ling received.
As Ye Ling spoke, he drove his sword light straight to the southwest corner of the illusion formation.but Are CBD Gummies Healthy: Benefits, Risks, and Expert Opinions
it is obvious that they are unwilling to deal with these overbearing female cultivators from the Youyue Immortal Sect.
He drove the sixth order demon dragon straight up to Qingxu Peak.Ye Ling was puzzled. This was the fourth level of the Moyun Village.
In less than ten breaths, the Shura Demon Sword The sword merged with the fire marrow, and it was suddenly upgraded to the Discover the Benefits of CBD Gummies 5 mg - Ultimate Guide 2025
sixth level of the best magic sword The whole body was flowing with red brilliance, which was shocking to look at, and the evil aura was overwhelming Finally successful Ye Ling was so excited that he slashed out the Shura Demonic Sword, and the red light flashed, and then flashed again The rocks at the entrance of the cave suddenly exploded Now, all of Ye Ling s inherited spiritual treasures have been upgraded to the sixth level.