{"id":325292,"date":"2024-01-24T18:10:39","date_gmt":"2024-01-24T17:10:39","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=325292"},"modified":"2024-11-23T05:45:53","modified_gmt":"2024-11-23T04:45:53","slug":"un-grupo-de-hackers-chinos-infecta-un-servicio-vpn-muy-popular","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/es\/un-grupo-de-hackers-chinos-infecta-un-servicio-vpn-muy-popular\/","title":{"rendered":"Esta VPN tiene problemas: atacada por hackers y problemas para sus usuarios"},"content":{"rendered":"\n<p>Un grupo de hackers que <strong>podr\u00edan trabajar para el Gobierno chino<\/strong> ha aprovechado dos vulnerabilidades graves en los dispositivos VPN de <strong>Ivanti<\/strong> para infectar redes de todo el mundo. Estas vulnerabilidades permitir\u00edan a los atacantes saltarse la verificaci\u00f3n en dos pasos y ejecutar c\u00f3digo malicioso en los sistemas que usan <strong>Ivanti Connect Secure<\/strong>, una <a href=\"https:\/\/www.softonic.com\/articulos\/5-vpn-preferidas-softonic-celebrar-dia-internacional-vpn\">VPN<\/a> muy popular.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/6edeb839-ad87-4a36-8a90-f8c37d491340\/3902757110\/nordvpn-icon.png\" alt=\"NordVPN\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">NordVPN<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/nordvpn.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">DESCARGAR<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/nordvpn.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>Seg\u00fan la empresa de seguridad <strong><a href=\"https:\/\/censys.com\/the-mass-exploitation-of-ivanti-connect-secure\/\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">Censys<\/a><\/strong>, <strong>al menos 492 dispositivos VPN de Ivanti estar\u00edan infectados<\/strong>, de un total de 26.000 que est\u00e1n conectados a Internet. La compa\u00f1\u00eda afirma que m\u00e1s de una cuarta parte de los dispositivos comprometidos se encuentran en los Estados Unidos.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2023\/08\/Dia-Internacional-de-la-VPN.jpg\" alt=\"\" class=\"wp-image-303081\" \/><\/figure>\n<\/div>\n\n\n<p>Ivanti <strong>todav\u00eda no ha publicado parches para solucionar estas vulnerabilidades<\/strong>, que se conocen como <strong>CVE-2023-46805<\/strong> y <strong>CVE-2024-21887<\/strong>. La empresa ha publicado una gu\u00eda de mitigaci\u00f3n y recuperaci\u00f3n que recomienda seguir a los usuarios afectados. La Agencia de Seguridad Cibern\u00e9tica e Infraestructura de los Estados Unidos ha emitido una <a href=\"https:\/\/www.cisa.gov\/news-events\/directives\/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">directiva<\/a> que <strong>obliga a todas las agencias gubernamentales civiles a tomar medidas correctivas<\/strong> para prevenir la explotaci\u00f3n de estas vulnerabilidades.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/6edeb839-ad87-4a36-8a90-f8c37d491340\/3902757110\/nordvpn-icon.png\" alt=\"NordVPN\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">NordVPN<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/nordvpn.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">DESCARGAR<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/nordvpn.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>Gracias a estas vulnerabilidades, los hackers podr\u00edan robar datos, modificar archivos, descargar archivos remotos y crear t\u00faneles inversos desde los dispositivos VPN, seg\u00fan detalla Censys. Tambi\u00e9n podr\u00edan <strong>capturar las credenciales de los usuarios<\/strong> que se conecten a la VPN.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un grupo de hackers que podr\u00edan trabajar para el Gobierno chino ha aprovechado dos vulnerabilidades graves en los dispositivos VPN de Ivanti para infectar redes de todo el mundo. Estas vulnerabilidades permitir\u00edan a los atacantes saltarse la verificaci\u00f3n en dos pasos y ejecutar c\u00f3digo malicioso en los sistemas que usan Ivanti Connect Secure, una VPN &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/es\/un-grupo-de-hackers-chinos-infecta-un-servicio-vpn-muy-popular\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Esta VPN tiene problemas: atacada por hackers y problemas para sus usuarios&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9256,"featured_media":291529,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":2},"categories":[9317],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-325292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/325292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/users\/9256"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/comments?post=325292"}],"version-history":[{"count":0,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/325292\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media\/291529"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media?parent=325292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/categories?post=325292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/tags?post=325292"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/usertag?post=325292"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/vertical?post=325292"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/content-category?post=325292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}