{"id":6405,"date":"2020-12-10T09:14:47","date_gmt":"2020-12-10T08:14:47","guid":{"rendered":"https:\/\/webhosting.de\/?p=6405"},"modified":"2020-12-10T09:14:49","modified_gmt":"2020-12-10T08:14:49","slug":"herramientas-de-hacking-la-seguridad-empresa-fuego-robado","status":"publish","type":"post","link":"https:\/\/webhosting.de\/es\/hacking-werkzeuge-des-security-unternehmens-fireeye-gestohlen\/","title":{"rendered":"Herramientas de hacking robadas de la compa\u00f1\u00eda de seguridad Fireeye"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Seg\u00fan un comunicado de prensa de <a href=\"https:\/\/www.fireeye.com\/blog\/products-and-services\/2020\/12\/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fireeye<\/a> Hackers desconocidos robaron recientemente herramientas de la compa\u00f1\u00eda de seguridad que Fireeye usa para probar las defensas de sus clientes. Entre los clientes de la empresa se encuentran agencias del gobierno de EE.UU. y otras empresas que han sido objeto de ataques inform\u00e1ticos o que quieren mejorar su protecci\u00f3n.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Fireeye explica que hasta ahora no hay pruebas de que las herramientas robadas se hayan utilizado para otros ataques de hackers. Para poder tomar contramedidas lo m\u00e1s r\u00e1pido posible, Fireeye quiere proporcionar informaci\u00f3n transparente sobre las herramientas de hacking y los agujeros de seguridad utilizados, seg\u00fan la empresa. Esto deber\u00eda facilitar la aplicaci\u00f3n de contramedidas directas. Con el <a href=\"https:\/\/webhosting.de\/es\/alojamiento-en-la-nube\/\">Alojamiento en la nube<\/a>-plataforma <a href=\"https:\/\/github.com\/fireeye\/red_team_tool_countermeasures\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub<\/a> Fireeye ya ha publicado las reglas correspondientes para las herramientas de seguridad como ClamAV, Yara y Snort.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ziel-der-hacker-kundendaten-von-fireeye\">Objetivo de los hackers: los datos de los clientes de Fireeye<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Adem\u00e1s de las herramientas de hacking, los hackers tambi\u00e9n intentaron copiar los datos de los clientes, seg\u00fan los registros de Fireeye. Estaban particularmente interesados en los clientes gubernamentales de la compa\u00f1\u00eda. Seg\u00fan el director general de Fireeye, Kevin Mandia, a\u00fan no se supone que los atacantes hayan robado con \u00e9xito los datos de los clientes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El alto profesionalismo del ataque y la selecci\u00f3n de <a href=\"https:\/\/webhosting.de\/es\/personenbezogene-daten-sozialen-netzwerken\/\">Datos<\/a> Fireeye dice que apunta a los hackers del gobierno. El FBI lo sospecha, y ha comenzado a investigarlo.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-hacker-aus-russland\">\u00bfHackers de Rusia?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">\u00bfC\u00f3mo el <a href=\"https:\/\/www.wsj.com\/articles\/u-s-cyber-firm-fireeye-says-it-was-breached-by-nation-state-hackers-11607461408\" target=\"_blank\" rel=\"noopener\">El Wall Street Journal<\/a> (WSJ) informa que las autoridades investigadoras consideran probable que los hackers cercanos al servicio secreto ruso. Las habilidades t\u00e9cnicas de los atacantes son un indicio de que el ataque puede haber sido realizado por el grupo que rob\u00f3 los correos electr\u00f3nicos de Hillary Clinton en la campa\u00f1a electoral de EE.UU. de 2016 para perjudicar al candidato del Partido Dem\u00f3crata. Como raz\u00f3n de esta suposici\u00f3n, los investigadores citan una inusual combinaci\u00f3n de herramientas de hacking que ya se utilizaron en el ataque de 2016.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"Los asaltantes han adaptado sus capacidades de clase mundial espec\u00edficamente para atacar a Fireeye\".<\/p><cite>Mandia<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keine-zeroday-exploits-enthalten\">No se incluyen las haza\u00f1as del d\u00eda cero<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Los exploits del d\u00eda cero no est\u00e1n incluidos en las herramientas de hacking robadas, seg\u00fan la declaraci\u00f3n de la compa\u00f1\u00eda. Una lista de los <a href=\"https:\/\/github.com\/fireeye\/red_team_tool_countermeasures\/blob\/master\/CVEs_red_team_tools.md\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Las vulnerabilidades, incluyendo los n\u00fameros de CVE<\/a> han sido publicados por Fireeye mientras tanto. Se trata principalmente de tecnolog\u00eda de red de Cisco y productos empresariales como VPN, Confluence, as\u00ed como herramientas de Microsoft como Exchange, Active Directory, Outlook y Windows. Para asegurar los vectores de ataque robados, ahora se priorizan las siguientes vulnerabilidades <a href=\"https:\/\/webhosting.de\/es\/taegliche-updates-auf-facebook\/\">Actualizaciones<\/a> bien ensayado.<\/p>","protected":false},"excerpt":{"rendered":"<p>Los hackers han robado herramientas de la compa\u00f1\u00eda de seguridad Fireeye que podr\u00edan ser utilizadas para futuros ataques.<\/p>","protected":false},"author":2,"featured_media":6406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[685],"tags":[950,951],"class_list":["post-6405","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","tag-fireeye","tag-hacker"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"685","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":"685","rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1607958918:2","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1607588098","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1607588090","rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4346","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"hacking-tools-of-security-company-fireeye-stolen","_trp_automatically_translated_slug_lv":"hacking-tools-of-security-company-fireeye-stolen","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"hacking-tools-of-security-company-fireeye-stolen","_trp_automatically_translated_slug_ja":"%e3%83%8f%e3%83%83%e3%82%ad%e3%83%b3%e3%82%b0%e3%83%84%e3%83%bc%e3%83%ab%e3%80%81%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e4%bc%81%e6%a5%ad%e3%81%ae%e3%83%95%e3%82%a1%e3%82%a4%e3%82%a2","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":null,"_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1607588090","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":"2020-12-09","_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"503","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":[],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"Hacker haben beim Security-Unternehmen Fireeye Tools entwendet, die f\u00fcr weitere Angriffe verwendet werden k\u00f6nnten.","_yoast_wpseo_content_score":"30","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_keywordsynonyms":"[\"\"]","_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":"Hacker haben beim Security-Unternehmen Fireeye Tools entwendet, die f\u00fcr weitere Angriffe verwendet werden k\u00f6nnten.","surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"6406","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/6405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/comments?post=6405"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/6405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media\/6406"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media?parent=6405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/categories?post=6405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/tags?post=6405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}