{"id":15547,"date":"2021-04-01T15:27:47","date_gmt":"2021-04-01T18:27:47","guid":{"rendered":"https:\/\/ostec.blog\/?p=15547"},"modified":"2021-04-01T15:27:47","modified_gmt":"2021-04-01T18:27:47","slug":"crackers-explotan-vulnerabilidades-zero-day","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/","title":{"rendered":"Crackers explotan vulnerabilidades Zero Day"},"content":{"rendered":"<p>\u00daltimamente, el mundo ha sufrido diversos filtrados de datos. Y ahora, un grupo peligroso de <a href=\"https:\/\/ostec.blog\/geral\/seo-nova-onda-dos-crackers\/\">crackers <\/a>est\u00e1 llamando la atenci\u00f3n hasta del mismo Google. <\/p>\n<p>Google ha estado estudiando formas cada vez m\u00e1s avanzadas de evitar la invasi\u00f3n de sus bases de datos y de sus socios. Como lo es Project Zero, creado por Google: un laboratorio que investiga fallas de seguridad que ni siquiera los desarrolladores de sistemas saben que existen en sus productos (vulnerabilidades Zero day).<\/p>\n<p>A trav\u00e9s de ese laboratorio, Google descubri\u00f3 a un grupo de cibercriminales experimentados, que han atacado diversos dispositivos Windows y aparatos m\u00f3viles con Android e iOS, usando vulnerabilidades en sus sistemas. <\/p>\n<p>Al explotarlas, los crackers se aprovechan del anonimato que esas vulnerabilidades zero day garantizan, ya que los desarrolladores no pueden identificar que est\u00e1 sucediendo. <\/p>\n<p>Seg\u00fan investigadores de Project Zero, por lo menos 11 ataques ocurridos el a\u00f1o pasado presentan un patr\u00f3n similar de operaci\u00f3n, lo que indica que un equipo organizado lo tuvo que haber realizado. <\/p>\n<p>En febrero del 2020, se encontraron 4 fallas de ese tipo en el navegador de Chrome y Windows, en todas se aprovechan de una vulnerabilidad en las aplicaciones. En seguida, se descubrieron 7 zero days para Android, Windows e iOS, con el mismo resultado: la falla se un\u00eda a trav\u00e9s de varios exploits en uno solo. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fluxograma.jpg\" alt=\"fluxograma do Google\" width=\"660\" height=\"259\" class=\"alignnone size-full wp-image-15534\" \/><\/p>\n<p>Imagem: Google (Project Zero)<\/p>\n<p>Seg\u00fan la investigadora, Maddie Stone:<\/p>\n<blockquote><p>\u201cLa vulnerabilidad cubre una vasta gama de problemas. En general, cada uno de los exploits mostraron una comprensi\u00f3n avanzada del desarrollo y de vulnerabilidades explotadas. <\/p>\n<p>En el caso de Chrome Freetype zero day, el m\u00e9todo de ataque era extra\u00f1o para el Project Zero. El proceso de entender c\u00f3mo activar la vulnerabilidad en el kernel de iOS no es com\u00fan. Los m\u00e9todos de camuflaje eran variados y llevaba tiempo entenderlos\u201d.<\/p><\/blockquote>\n<p>Por m\u00e1s que las fallas hayan sido corregidas, la investigadora dice que el m\u00e9todo de ataque de tal grupo puede indicar que volver\u00e1n a atacar, explotando posibles nuevos vac\u00edos de seguridad.<\/p>\n<p>Fonte: <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/03\/expert-hackers-used-11-zerodays-to-infect-windows-ios-and-android-users\/\">arsTechnica<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00daltimamente, el mundo ha sufrido diversos filtrados de datos. Y ahora, un grupo peligroso de crackers est\u00e1 llamando la atenci\u00f3n hasta del mismo Google. Google ha estado estudiando formas cada vez m\u00e1s avanzadas de evitar la invasi\u00f3n de sus bases de datos y de sus socios. Como lo es Project Zero, creado por Google: un [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":15540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019,1025],"tags":[1828,2001],"class_list":["post-15547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","category-noticias-es","tag-google-es","tag-zero-day-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Crackers explotan vulnerabilidades Zero Day - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crackers explotan vulnerabilidades Zero Day - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"\u00daltimamente, el mundo ha sufrido diversos filtrados de datos. Y ahora, un grupo peligroso de crackers est\u00e1 llamando la atenci\u00f3n hasta del mismo Google. Google ha estado estudiando formas cada vez m\u00e1s avanzadas de evitar la invasi\u00f3n de sus bases de datos y de sus socios. Como lo es Project Zero, creado por Google: un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-01T18:27:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"Crackers explotan vulnerabilidades Zero Day\",\"datePublished\":\"2021-04-01T18:27:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\"},\"wordCount\":354,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg\",\"keywords\":[\"Google\",\"zero-day\"],\"articleSection\":[\"Gen\u00e9rico\",\"Not\u00edcias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\",\"name\":\"Crackers explotan vulnerabilidades Zero Day - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg\",\"datePublished\":\"2021-04-01T18:27:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg\",\"width\":928,\"height\":534,\"caption\":\"fachada da empresa Google\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crackers explotan vulnerabilidades Zero Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crackers explotan vulnerabilidades Zero Day - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/","og_locale":"es_ES","og_type":"article","og_title":"Crackers explotan vulnerabilidades Zero Day - OSTEC | Seguran\u00e7a digital de resultados","og_description":"\u00daltimamente, el mundo ha sufrido diversos filtrados de datos. Y ahora, un grupo peligroso de crackers est\u00e1 llamando la atenci\u00f3n hasta del mismo Google. Google ha estado estudiando formas cada vez m\u00e1s avanzadas de evitar la invasi\u00f3n de sus bases de datos y de sus socios. Como lo es Project Zero, creado por Google: un [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2021-04-01T18:27:47+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"Crackers explotan vulnerabilidades Zero Day","datePublished":"2021-04-01T18:27:47+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/"},"wordCount":354,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg","keywords":["Google","zero-day"],"articleSection":["Gen\u00e9rico","Not\u00edcias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/","url":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/","name":"Crackers explotan vulnerabilidades Zero Day - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg","datePublished":"2021-04-01T18:27:47+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/03\/google-fachada.jpg","width":928,"height":534,"caption":"fachada da empresa Google"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/crackers-explotan-vulnerabilidades-zero-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"Crackers explotan vulnerabilidades Zero Day"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/15547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=15547"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/15547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/15540"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=15547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=15547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=15547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}