{"id":335671,"date":"2024-07-09T13:57:27","date_gmt":"2024-07-09T11:57:27","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=335671"},"modified":"2025-06-12T16:43:53","modified_gmt":"2025-06-12T14:43:53","slug":"twitter-acaba-de-sufrir-la-mayor-filtracion-de-datos-de-usuarios-de-su-historia-asi-te-afecta","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/es\/twitter-acaba-de-sufrir-la-mayor-filtracion-de-datos-de-usuarios-de-su-historia-asi-te-afecta\/","title":{"rendered":"Twitter acaba de sufrir la mayor filtraci\u00f3n de datos de usuarios de su historia: as\u00ed te afecta"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Un grupo de investigadores de <strong>Cyber Press<\/strong> ha descubierto una filtraci\u00f3n masiva de datos de usuarios de <strong>Twitter<\/strong>, con un total de 9,4 GB de informaci\u00f3n expuesta. La base de datos, que contiene <strong>cerca de 200 millones de registros<\/strong>, representa una de las mayores exposiciones de datos de usuarios en tiempos recientes. Esta <a href=\"https:\/\/www.softonic.com\/articulos\/contrasenas-datos-filtrado-internet\">filtraci\u00f3n<\/a> incluye direcciones de correo electr\u00f3nico, nombres y detalles de cuentas de Twitter, lo que deja a los usuarios vulnerables a <strong>ataques de phishing, robo de identidad y ardides de ingenier\u00eda social<\/strong>.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/dc4321da-9b2e-11e6-b8c8-00163ed833e7\/107793415\/twitter-logo\" alt=\"Twitter\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Twitter<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/twitter.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">DESCARGAR<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/twitter.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Un usuario bajo el alias &#8220;michupa&#8221; dio a conocer esta base de datos en un foro de hacking el pasado 7 de julio de 2024. La filtraci\u00f3n est\u00e1 organizada en 10 archivos de 1 GB cada uno, disponibles p\u00fablicamente para su descarga. El equipo de <a href=\"https:\/\/cyberpress.org\/9-4gb-twitter-data-leaked-online\/\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">Cyber Press<\/a> ha verificado la precisi\u00f3n de algunas direcciones de correo electr\u00f3nico de los perfiles incluidos, aunque <strong>a\u00fan no se ha confirmado la integridad completa de los datos<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Las investigaciones indican que los archivos filtrados llevan los siguientes nombres:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.001<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.002<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.003<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.004<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.005<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_b1nd.net.7z.006<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.007<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.7z.008<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8211; Twitter_Full_b1nd.net.009<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"453\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/2\/2024\/07\/Twitter-data-leak-Cyber-Press-1024x453.jpg\" alt=\"\" class=\"wp-image-335677\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2024\/07\/Twitter-data-leak-Cyber-Press-1024x453.jpg 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2024\/07\/Twitter-data-leak-Cyber-Press-300x133.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2024\/07\/Twitter-data-leak-Cyber-Press-768x340.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2024\/07\/Twitter-data-leak-Cyber-Press.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Ante esta situaci\u00f3n, Cyber Press insta a los usuarios y organizaciones a <strong>tomar medidas inmediatas para proteger sus cuentas y datos<\/strong>. Las recomendaciones incluyen cambiar las contrase\u00f1as, activar la verificaci\u00f3n en dos pasos (2FA) y estar alerta ante correos electr\u00f3nicos sospechosos. Tambi\u00e9n aconseja supervisar las cuentas para detectar actividades inusuales, informar sobre incidentes al soporte de Twitter y revisar las medidas de seguridad.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El equipo de Cyber Press se comunic\u00f3 con Twitter para informarles sobre la filtraci\u00f3n, aunque a\u00fan no ha recibido ninguna respuesta. Esta filtraci\u00f3n se produce tan solo 3 d\u00edas despu\u00e9s de que se difundiera <a href=\"https:\/\/www.softonic.com\/articulos\/ha-tenido-lugar-la-mayor-filtracion-de-contrasenas-de-la-historia-esto-es-lo-que-se-sabe\"><strong>\u201cRockYou2024\u201d<\/strong>, la mayor filtraci\u00f3n de contrase\u00f1as de la historia<\/a>, con 9.948.575.739 contrase\u00f1as \u00fanicas en texto plano.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/dc4321da-9b2e-11e6-b8c8-00163ed833e7\/107793415\/twitter-logo\" alt=\"Twitter\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Twitter<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/twitter.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">DESCARGAR<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/twitter.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Un grupo de investigadores de Cyber Press ha descubierto una filtraci\u00f3n masiva de datos de usuarios de Twitter, con un total de 9,4 GB de informaci\u00f3n expuesta. La base de datos, que contiene cerca de 200 millones de registros, representa una de las mayores exposiciones de datos de usuarios en tiempos recientes. Esta filtraci\u00f3n incluye &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/es\/twitter-acaba-de-sufrir-la-mayor-filtracion-de-datos-de-usuarios-de-su-historia-asi-te-afecta\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Twitter acaba de sufrir la mayor filtraci\u00f3n de datos de usuarios de su historia: as\u00ed te afecta&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9256,"featured_media":299744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":2},"categories":[9317],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-335671","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/335671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/users\/9256"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/comments?post=335671"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/335671\/revisions"}],"predecessor-version":[{"id":359025,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/335671\/revisions\/359025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media\/299744"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media?parent=335671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/categories?post=335671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/tags?post=335671"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/usertag?post=335671"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/vertical?post=335671"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/content-category?post=335671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}