{"id":38447,"date":"2017-06-28T20:03:23","date_gmt":"2017-06-29T01:03:23","guid":{"rendered":"http:\/\/webirix.com\/?p=38447"},"modified":"2017-06-28T20:04:10","modified_gmt":"2017-06-29T01:04:10","slug":"alerta-de-ciberseguridad","status":"publish","type":"post","link":"https:\/\/webirix.com\/en\/alerta-de-ciberseguridad\/","title":{"rendered":"Petya ser\u00e1 otro incidente mundial gracias a que las organizaciones no han parcheado&#8221;, dice el experto en ciberseguridad Kevin Beaumont"},"content":{"rendered":"<h1 id=\"articulo-titulo\" class=\"articulo-titulo\">New &#039;ransomware&#039; attack uses the same vulnerability as WannaCry<\/h1>\n<div class=\"articulo-subtitulos\">\n<h2 class=\"articulo-subtitulo\">This new cyberattack uses a weakness in the protocol of Windows operating systems for network sharing<\/h2>\n<\/div>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/tecnologia.elpais.com\/tecnologia\/imagenes\/2017\/06\/27\/actualidad\/1498580805_974901_1498581440_noticia_grande.jpg\" \/><\/p>\n<p>A\u00a0<a href=\"http:\/\/internacional.elpais.com\/internacional\/2017\/06\/27\/actualidad\/1498568187_011218.html\">new computer virus<\/a>\u00a0it is spreading threatening thousands of organizations and companies around the world. The systems of the Central Bank of Ukraine or the Russian oil company Rosneft have been compromised, as have several multinationals with a presence in Spain such as the pharmaceutical company MSD or the food company Mondelez.<\/p>\n<p>The highest number of infections with 60% and 30% from computers globally affected by the cyberattack is concentrated in Ukraine and Russia, according to preliminary analyzes shared by Costin Raiu, director of the analysis and research team at Kaspersky Lab, a multinational company specialized in Informatic security.<\/p>\n<p>&nbsp;<\/p>\n<p>Petya ser\u00e1 otro incidente mundial gracias a que las organizaciones no han parcheado&#8221;, dice el experto en ciberseguridad Kevin Beaumont<\/p>\n<p>This new cyber attack, which according to several sources of a variant of the virus known as Petya, replicates the modus operandi of\u00a0<a href=\"http:\/\/tecnologia.elpais.com\/tecnologia\/2017\/05\/12\/actualidad\/1494586960_025438.html\">WannaCry<\/a>\u00a0by exploiting a vulnerability in the network sharing protocol of Windows operating systems called EternalBlue, analysts at the computer security company Symantec have confirmed. However, preliminary analysis by Kaspersky indicates that it is a\u00a0<em>ransomware<\/em>unknown until now.\u00a0<a href=\"https:\/\/twitter.com\/kaspersky\/status\/879749175570817024\">They have decided to call it NotPetya.<\/a><\/p>\n<p>Microsoft lanz\u00f3 un parche de seguridad &#8220;cr\u00edtico&#8221; el 14 de marzo, antes de que el grupo ShadowBrokers filtrara esta vulnerabilidad, usada en secreto por la Agencia Nacional de Seguridad de los Estados Unidos para obtener informaci\u00f3n. Pero\u00a0<a href=\"http:\/\/tecnologia.elpais.com\/tecnologia\/2017\/05\/13\/actualidad\/1494661227_809039.html\">affected organizations had not yet applied it<\/a>\u00a0although the virus spread two months later. In some cases, quick patching is a\u00a0<a href=\"http:\/\/tecnologia.elpais.com\/tecnologia\/2017\/05\/18\/actualidad\/1495108825_274656.html\">very expensive task<\/a>\u00a0for the companies.<\/p>\n<p>The Spanish National Cryptological Center\u00a0<a href=\"https:\/\/www.ccn-cert.cni.es\/seguridad-al-dia\/comunicados-ccn-cert\/4673-identificado-ataque-de-ransomware-contra-varias-multinacionales-con-sede-en-espana.html\">has confirmed that the cyberattack has affected several companies in Spain<\/a>\u00a0and recommends as prevention and mitigation measures updating the operating system and security solutions, restricting access from outside the organization, unless using secure protocols, and disabling macro functions in Microsoft Office documents.<\/p>\n<p>&#8220;Es como si al ej\u00e9rcito de Estados Unidos le robaran misiles Tomahawk&#8221;, dijo Brad Smith, presidente de Microsoft en relaci\u00f3n con la filtraci\u00f3n de herramientas inform\u00e1ticas de ofensa almacenadas por naciones.<\/p>\n<p>&nbsp;<\/p>\n<p>Petya ser\u00e1 otro incidente mundial gracias a que las organizaciones no han parcheado&#8221;, dice el experto en ciberseguridad Kevin Beaumont.<\/p>\n<p>La propagaci\u00f3n de WannaCry se detuvo gracias al ingenio de dos j\u00f3venes expertos y un simple dominio web valorado 10 euros. Pero Petya es diferente. &#8220;Por cierto, no podemos parar esto, no hay interruptor de la muerte&#8221;, ha dicho el experto en seguridad &#8220;2sec4u&#8221;.<\/p>\n<p>The dangerous of\u00a0<em>ransomware<\/em>\u00a0It was not the code that encrypts the files and asks for a ransom, but the worm that spreads it and uses the EternalBlue vulnerability. Petya is also divided into two parts: the one that asks for the ransom and the one that makes it spread through local networks.<\/p>\n<p>Instead of encrypting files one by one like WannaCry, Petya reboots the victim&#039;s computer and encrypts the master file table on the hard drive and renders the partition in charge of booting the system unusable by replacing it with a code that displays the warning. of the rescue.<\/p>","protected":false},"excerpt":{"rendered":"<p>The new &#039;ransomware&#039; attack uses the same vulnerability as WannaCry This new cyberattack uses a weakness in the protocol of Windows operating systems for network sharing A new computer virus spreads threatening thousands of organizations and companies around the world. The systems of the Central Bank of Ukraine or the oil company ...<\/p>","protected":false},"author":24,"featured_media":38448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2145],"tags":[],"class_list":["post-38447","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows"],"jetpack_featured_media_url":"https:\/\/webirix.com\/wp-content\/uploads\/2017\/06\/WhatsApp-Image-2017-06-28-at-7.44.42-PM.jpeg","_links":{"self":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/38447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/comments?post=38447"}],"version-history":[{"count":2,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/38447\/revisions"}],"predecessor-version":[{"id":38450,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/38447\/revisions\/38450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media\/38448"}],"wp:attachment":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media?parent=38447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/categories?post=38447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/tags?post=38447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}