{"id":5667,"date":"2017-07-27T18:45:57","date_gmt":"2017-07-27T18:45:57","guid":{"rendered":"https:\/\/xelere.com\/?p=5667"},"modified":"2017-09-29T15:48:39","modified_gmt":"2017-09-29T15:48:39","slug":"aprendizajes-desde-wannacry-ransomware-protegerse","status":"publish","type":"post","link":"https:\/\/xelere.com\/en\/aprendizajes-desde-wannacry-ransomware-protegerse\/","title":{"rendered":"Aprendizajes desde Wannacry &#8211; Ransomware y c\u00f3mo protegerse?"},"content":{"rendered":"<h4><strong>Por:<\/strong> Rolando Fern\u00e1ndez, Consultor<\/h4>\n<p>Como es de p\u00fablico conocimiento el d\u00eda viernes 12 de mayo se difundi\u00f3 un ataque de Ransomware masivo, con un alto impacto a nivel global. Actualmente, de acuerdo a las autoridades europeas, se han reportado ataques en m\u00e1s de 150 pa\u00edses que afectaron a m\u00e1s 10.000 organizaciones y 200.000 usuarios finales. Asimismo, la recaudaci\u00f3n reclamada para el recupero de la informaci\u00f3n encriptada ha superado la suma de USD 50.000.<\/p>\n<p>El ataque tiene por objetivo encriptar el contenido de los equipos afectados y solicitar el pago de una suma en Bitcoins para su desencripci\u00f3n. Particularmente, para este ataque, se maneja la hip\u00f3tesis de que el vector inicial fue una campa\u00f1a masiva de mails enga\u00f1osos (Phishing), conteniendo archivos adjuntos con el c\u00f3digo malicioso.<\/p>\n<p>El vector de ataque ha tenido \u00e9xito a partir de equipos expuestos a internet y que permiten el acceso al servicio SMB de Microsoft Windows. Dicho servicio, en su versi\u00f3n 1, posee una vulnerabilidad cr\u00edtica detallada por el proveedor en su bolet\u00edn de seguridad MS17-010 del 14 de Marzo, y para la cual ya existen exploits que fueron revelados por el grupo Shadowbrokers el 14 de abril. Por medio de dicha vulnerabilidad, es posible ejecutar c\u00f3digo en forma remota y, una vez infectado el equipo, el mismo realiza una b\u00fasqueda de otros equipos conectados a la misma red, y que posean dicha vulnerabilidad para continuar propag\u00e1ndose. Adicionalmente busca rangos de direcciones IP aleatorios, lo que le permite infectar mayor cantidad de equipos y no solo aquellos que se encuentren en la red local donde se encuentra el dispositivo infectado.<\/p>\n<p>A pesar de las contramedidas tomadas por los responsables de tecnolog\u00eda y seguridad a nivel global, se vio \u00a0un constante incremento durante el fin de semana debido a que surgieron nuevas variantes del ataque que evitan dichas contramedidas.<\/p>\n<p>Resulta importante se\u00f1alar que existen reportes informando que la aplicaci\u00f3n del parche oficial provisto por Microsoft, no asegura que la infecci\u00f3n no pueda ocurrir. Un ejemplo de ello se ha informado para la versi\u00f3n Windows 2008 R1. La gravedad de la vulnerabilidad explotada ha tomado tal envergadura, que Microsoft ha optado por proveer parches para versiones no soportadas de su sistema operativo Microsoft Windows, entre ellas XP y 2003.<\/p>\n<h1><strong>\u00bfQu\u00e9 hacer?<\/strong><\/h1>\n<p><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwareimageblog.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5693\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwareimageblog-300x157.jpg\" alt=\"\" width=\"300\" height=\"157\" srcset=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwareimageblog-300x157.jpg 300w, https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwareimageblog.jpg 475w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Verificar que todos los servidores expuestos a internet no poseen los puertos 139 y 445 publicados.<\/li>\n<li>Aplicar el parche provisto por Microsoft en su bolet\u00edn MS17-010, disponible en: <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx<\/span><\/a><\/li>\n<li>Para versiones de Microsoft Windows ya no soportadas, obtener el parche correspondiente publicado por Microsoft en: <a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4012598&amp;ranMID=24542&amp;ranEAID=TnL5HPStwNw&amp;ranSiteID=TnL5HPStwNweqqVd5WiUlPRvQkSyFcGoA&amp;tduid=(f335b124cd56cf64e96c594fceada3f9)(256380)(2459594)(TnL5HPStw%20Nw-eqqVd5WiUlPRvQkSyFcGoA)()\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\">http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4012598&amp;ranMID=24542&amp;ranEAID=TnL5HPStwNw&amp;ranSiteID=TnL5HPStwNweqqVd5WiUlPRvQkSyFcGoA&amp;tduid=(f335b124cd56cf64e96c594fceada3f9)(256380)(2459594)(TnL5HPStw Nw-eqqVd5WiUlPRvQkSyFcGoA)()<\/span><\/a><\/li>\n<li>Asegurarse que la soluci\u00f3n antivirus implementada en su compa\u00f1\u00eda posee actualizaciones para dicho Ransomware, y que las mismas se encuentren aplicadas en todas las estaciones de trabajo, verificando que se encuentren todas las protecciones activas.<\/li>\n<li>Asegurar que los archivos cr\u00edticos se encuentran resguardados y que dichos resguardos no sean accesibles desde los posibles focos de infecci\u00f3n.<\/li>\n<li>Si no se cuenta con una soluci\u00f3n antivirus que posea actualizaci\u00f3n para el Ransomware, se recomienda implementar la herramienta provista por CCN-CERT en su p\u00e1gina <a href=\"https:\/\/www.ccn-cert.cni.es\/en\/updatedsecurity\/ccn-cert-statements\/4476-herramienta-para-prevenir-la-infeccion-por-el-ransomwarewannacry.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #3366ff;\">https:\/\/www.ccn-cert.cni.es\/en\/updatedsecurity\/ccn-cert-statements\/4476-herramienta-para-prevenir-la-infeccion-por-el-ransomwarewannacry.html<\/span><\/a><\/li>\n<li>Concientizar a los usuarios sobre la forma de identificar correos electr\u00f3nicos de posibles actividades de Phishing, como as\u00ed tambi\u00e9n respecto a la necesidad de evitar la apertura de cualquier archivo adjunto que no provenga da una fuente confiable.<\/li>\n<\/ul>\n<p>Estas recomendaciones, con variantes en cada caso, aplican a nuevos tipos de campa\u00f1as de ransomware que puedan aparecer.<\/p>\n<p><strong>Lo invitamos a contactarnos para conversar sobre c\u00f3mo las soluciones de IBM Security pueden ayudarlo a protegerse mejor contra este y otros tipo de ataques.\u00a0<\/strong><\/p>\n<h4 style=\"text-align: center;\"><a href='https:\/\/xelere.com\/en\/formulario-de-servicios-y-soluciones\/' class='small-button smallblue' target=\"_blank\">Cont\u00e1ctenos<\/a><\/h4>\n<h1><strong>Art\u00edculos de inter\u00e9s:<\/strong><\/h1>\n<p><strong><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/using-an-siem-solution-to-connect-the-security-dots-and-detect-ransomwarea-630x330.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5669 alignleft\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/using-an-siem-solution-to-connect-the-security-dots-and-detect-ransomwarea-630x330-300x157.jpg\" alt=\"\" width=\"300\" height=\"157\" srcset=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/using-an-siem-solution-to-connect-the-security-dots-and-detect-ransomwarea-630x330-300x157.jpg 300w, https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/using-an-siem-solution-to-connect-the-security-dots-and-detect-ransomwarea-630x330.jpg 630w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/p>\n<h3><strong>C\u00f3mo aprovechar su herramienta SIEM para\u00a0<\/strong><strong>prevenir ataques de ransomware<\/strong><\/h3>\n<a href='https:\/\/securityintelligence.com\/using-siem-solutions-to-connect-the-security-dots-and-detect-ransomware\/' class='small-button smallblue' target=\"_blank\">Ver m\u00e1s<\/a>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/monitor-your-network-for-notpetya-in-real-time-630x330-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5672 alignleft\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/monitor-your-network-for-notpetya-in-real-time-630x330-2-300x157.jpg\" alt=\"\" width=\"300\" height=\"157\" srcset=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/monitor-your-network-for-notpetya-in-real-time-630x330-2-300x157.jpg 300w, https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/monitor-your-network-for-notpetya-in-real-time-630x330-2.jpg 630w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3 style=\"text-align: left;\"><strong>C\u00f3mo monitorear la red para el malware\u00a0<\/strong><strong>NoPetya<\/strong><\/h3>\n<p style=\"text-align: left;\"><a href='https:\/\/securityintelligence.com\/monitor-your-network-for-notpetya-in-real-time' class='small-button smallblue' target=\"_blank\">Ver m\u00e1s<\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Por: Rolando Fern\u00e1ndez, Consultor Como es de p\u00fablico conocimiento el d\u00eda viernes 12 de mayo se difundi\u00f3 un ataque de Ransomware masivo, con un alto impacto a nivel global. Actualmente, de acuerdo a las autoridades europeas, se han reportado ataques en m\u00e1s de 150 pa\u00edses que afectaron a m\u00e1s 10.000 organizaciones y 200.000 usuarios finales. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5695,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[78,16],"tags":[108,106,107],"class_list":["post-5667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-novedades","tag-ciberataque","tag-ransomware","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aprendizajes desde Wannacry - Ransomware y c\u00f3mo protegerse? - Xelere<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xelere.com\/en\/aprendizajes-desde-wannacry-ransomware-protegerse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aprendizajes desde Wannacry - Ransomware y c\u00f3mo protegerse? - Xelere\" \/>\n<meta property=\"og:description\" content=\"Por: Rolando Fern\u00e1ndez, Consultor Como es de p\u00fablico conocimiento el d\u00eda viernes 12 de mayo se difundi\u00f3 un ataque de Ransomware masivo, con un alto impacto a nivel global. Actualmente, de acuerdo a las autoridades europeas, se han reportado ataques en m\u00e1s de 150 pa\u00edses que afectaron a m\u00e1s 10.000 organizaciones y 200.000 usuarios finales. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xelere.com\/en\/aprendizajes-desde-wannacry-ransomware-protegerse\/\" \/>\n<meta property=\"og:site_name\" content=\"Xelere\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XelereSA\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-27T18:45:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-29T15:48:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwarewannacryimgweb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1191\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"xelere\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Xelere\" \/>\n<meta name=\"twitter:site\" content=\"@Xelere\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"xelere\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/\"},\"author\":{\"name\":\"xelere\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\"},\"headline\":\"Aprendizajes desde Wannacry &#8211; Ransomware y c\u00f3mo protegerse?\",\"datePublished\":\"2017-07-27T18:45:57+00:00\",\"dateModified\":\"2017-09-29T15:48:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/\"},\"wordCount\":735,\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/ransomwarewannacryimgweb.jpg\",\"keywords\":[\"ciberataque\",\"ransomware\",\"wannacry\"],\"articleSection\":[\"Ciberseguridad\",\"Novedades\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/\",\"name\":\"Aprendizajes desde Wannacry - Ransomware y c\u00f3mo protegerse? - Xelere\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/ransomwarewannacryimgweb.jpg\",\"datePublished\":\"2017-07-27T18:45:57+00:00\",\"dateModified\":\"2017-09-29T15:48:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/ransomwarewannacryimgweb.jpg\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/ransomwarewannacryimgweb.jpg\",\"width\":1191,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xelere.com\\\/aprendizajes-desde-wannacry-ransomware-protegerse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xelere.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aprendizajes desde Wannacry &#8211; Ransomware y c\u00f3mo protegerse?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"name\":\"Xelere\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xelere.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\",\"name\":\"Xelere\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"width\":810,\"height\":283,\"caption\":\"Xelere\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XelereSA\\\/\",\"https:\\\/\\\/x.com\\\/Xelere\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xelere\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCq796T-Uv9WHCogZPJ8uXaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\",\"name\":\"xelere\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"caption\":\"xelere\"},\"url\":\"https:\\\/\\\/xelere.com\\\/en\\\/author\\\/lalonso\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aprendizajes desde Wannacry - Ransomware y c\u00f3mo protegerse? - Xelere","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xelere.com\/en\/aprendizajes-desde-wannacry-ransomware-protegerse\/","og_locale":"en_US","og_type":"article","og_title":"Aprendizajes desde Wannacry - Ransomware y c\u00f3mo protegerse? - Xelere","og_description":"Por: Rolando Fern\u00e1ndez, Consultor Como es de p\u00fablico conocimiento el d\u00eda viernes 12 de mayo se difundi\u00f3 un ataque de Ransomware masivo, con un alto impacto a nivel global. Actualmente, de acuerdo a las autoridades europeas, se han reportado ataques en m\u00e1s de 150 pa\u00edses que afectaron a m\u00e1s 10.000 organizaciones y 200.000 usuarios finales. [&hellip;]","og_url":"https:\/\/xelere.com\/en\/aprendizajes-desde-wannacry-ransomware-protegerse\/","og_site_name":"Xelere","article_publisher":"https:\/\/www.facebook.com\/XelereSA\/","article_published_time":"2017-07-27T18:45:57+00:00","article_modified_time":"2017-09-29T15:48:39+00:00","og_image":[{"width":1191,"height":630,"url":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwarewannacryimgweb.jpg","type":"image\/jpeg"}],"author":"xelere","twitter_card":"summary_large_image","twitter_creator":"@Xelere","twitter_site":"@Xelere","twitter_misc":{"Written by":"xelere","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#article","isPartOf":{"@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/"},"author":{"name":"xelere","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d"},"headline":"Aprendizajes desde Wannacry &#8211; Ransomware y c\u00f3mo protegerse?","datePublished":"2017-07-27T18:45:57+00:00","dateModified":"2017-09-29T15:48:39+00:00","mainEntityOfPage":{"@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/"},"wordCount":735,"publisher":{"@id":"https:\/\/xelere.com\/#organization"},"image":{"@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwarewannacryimgweb.jpg","keywords":["ciberataque","ransomware","wannacry"],"articleSection":["Ciberseguridad","Novedades"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/","url":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/","name":"Aprendizajes desde Wannacry - Ransomware y c\u00f3mo protegerse? - Xelere","isPartOf":{"@id":"https:\/\/xelere.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#primaryimage"},"image":{"@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwarewannacryimgweb.jpg","datePublished":"2017-07-27T18:45:57+00:00","dateModified":"2017-09-29T15:48:39+00:00","breadcrumb":{"@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#primaryimage","url":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwarewannacryimgweb.jpg","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2017\/07\/ransomwarewannacryimgweb.jpg","width":1191,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/xelere.com\/aprendizajes-desde-wannacry-ransomware-protegerse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xelere.com\/"},{"@type":"ListItem","position":2,"name":"Aprendizajes desde Wannacry &#8211; Ransomware y c\u00f3mo protegerse?"}]},{"@type":"WebSite","@id":"https:\/\/xelere.com\/#website","url":"https:\/\/xelere.com\/","name":"Xelere","description":"","publisher":{"@id":"https:\/\/xelere.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xelere.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xelere.com\/#organization","name":"Xelere","url":"https:\/\/xelere.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/","url":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","width":810,"height":283,"caption":"Xelere"},"image":{"@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XelereSA\/","https:\/\/x.com\/Xelere","https:\/\/www.linkedin.com\/company\/xelere","https:\/\/www.youtube.com\/channel\/UCq796T-Uv9WHCogZPJ8uXaQ"]},{"@type":"Person","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d","name":"xelere","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","caption":"xelere"},"url":"https:\/\/xelere.com\/en\/author\/lalonso\/"}]}},"_links":{"self":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/5667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/comments?post=5667"}],"version-history":[{"count":18,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/5667\/revisions"}],"predecessor-version":[{"id":5696,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/5667\/revisions\/5696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media\/5695"}],"wp:attachment":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media?parent=5667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/categories?post=5667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/tags?post=5667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}