{"id":19857,"date":"2023-02-01T10:23:52","date_gmt":"2023-02-01T13:23:52","guid":{"rendered":"https:\/\/ostec.blog\/?p=19857"},"modified":"2023-02-01T10:23:52","modified_gmt":"2023-02-01T13:23:52","slug":"lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/","title":{"rendered":"LockBit encripta dominios del Windows usando pol\u00edticas de grupo"},"content":{"rendered":"<p>Los investigadores han descubierto una nueva variaci\u00f3n del ransomware LockBit que automatiza el cifrado de los dominios de Windows. Seg\u00fan Bleeping Computer, aprovecha las pol\u00edticas de grupo de Active Directory.<\/p>\n<p>La campa\u00f1a  de <a href=\"https:\/\/ostec.blog\/es\/generico\/la-mayoria-de-las-empresas-sufren-un-segundo-ataque-de-ransomware-despues-de-pagar-por-el-primero\/\">ransomware <\/a>LockBit comenz\u00f3 en septiembre de 2019 como un esquema RaaS (Ransomware como servicio), en el que los actores de amenazas tienen la tarea de infiltrarse en las redes y cifrar los dispositivos. A cambio, los afiliados empleados pagan del 70% al 80% del monto total, y el 20% restante se destina a los fundadores de LockBit.<\/p>\n<p>Un portavoz del grupo promueve la operaci\u00f3n de ransomware y brinda soporte para piratear foros web. Despu\u00e9s de prohibir los hilos de ransomware en los foros de piratas inform\u00e1ticos, LockBit comenz\u00f3 a promocionar un nuevo RaaS en su sitio de fuga de datos, LockBit 2.0.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-affiliate-program.jpg\" alt=\"captura de tela LockBit\" width=\"732\" height=\"588\" class=\"alignnone size-full wp-image-16626\" \/><br \/>\nImagen\/Reproducci\u00f3n: Bleeping Computer.<\/p>\n<p>Hay una gran cantidad de funciones compatibles con LockBit 2.0, muchas de las cuales se han empleado en campa\u00f1as de ransomware anteriores. Ahora se ha promovido a una funci\u00f3n espec\u00edfica, ya que los creadores dicen que la propagaci\u00f3n del ransomware se ha automatizado en todo el dominio de Windows, eliminando la necesidad de scripts.<\/p>\n<h2>Actualizaciones de directivas de grupo utilizadas para cifrar la red<\/h2>\n<p>Despu\u00e9s de infiltrarse en una red y hacerse con el control de un controlador de dominio, los ciberdelincuentes usan herramientas de terceros para ejecutar scripts que deshabilitan el software antivirus y luego lanzan ransomware en las m\u00e1quinas de la red.<\/p>\n<p>En muestras del ransomware LockBit 2.0 descubierto por <a href=\"https:\/\/twitter.com\/malwrhunterteam\">MalwareHunterTeam<\/a> y analizado por BleepingComputer y <a href=\"https:\/\/twitter.com\/VK_Intel\">Vitali Kremez<\/a>, los ciberdelincuentes automatizaron el proceso para que el ransomware se propagara por todo el dominio cuando se ejecutara en un controlador de dominio.<\/p>\n<p>Para cifrar los datos, el ransomware establece nuevas pol\u00edticas de grupo en el controlador de dominio que se aplican en la red. Estas pol\u00edticas evitan la protecci\u00f3n en tiempo real, las alertas, el muestreo para Microsoft y las acciones est\u00e1ndar de Microsoft Defender para detectar archivos malintencionados. Se configuran pol\u00edticas de grupo adicionales, incluida una que crea un proceso programado en dispositivos Windows para ejecutar malware.<\/p>\n<p>El ransomware luego ejecuta el comando para actualizar la Pol\u00edtica de grupo en todas las m\u00e1quinas con Windows. Durante esta operaci\u00f3n, el ransomware tambi\u00e9n realizar\u00e1 consultas LDAP para los controladores de dominio ADS y utilizar\u00e1 las API de Windows Active Directory para recuperar una lista de m\u00e1quinas de los controladores de dominio ADS.<\/p>\n<p>El ejecutable del ransomware se copia en el escritorio de cada dispositivo de la lista y la tarea programada definida por la directiva de grupo inicia el ransomware.<\/p>\n<p>Debido a que LockBit pasa por alto el control de la cuenta de usuario, la aplicaci\u00f3n se ejecuta en segundo plano y pasa desapercibida sin alertas externas para cifrar el dispositivo.<\/p>\n<p>Aunque MountLocker emplea la b\u00fasqueda LDAP en las API de Windows Active Directory, esta es la primera vez que el ransomware ha podido distribuir infecciones a trav\u00e9s de la pol\u00edtica de grupo autom\u00e1ticamente.<\/p>\n<p>Seg\u00fan Kremez, a BleepingComputer:<\/p>\n<blockquote><p>\u201cEsta es la primera operaci\u00f3n de ransomware que automatiza este proceso y permite que un actor de amenazas deshabilite Microsoft Defender y ejecute ransomware en toda la red con un solo comando.<\/p>\n<p>Se ha encontrado una nueva versi\u00f3n del ransomware LockBit 2.0 que automatiza la interacci\u00f3n y el posterior cifrado de un dominio de Windows utilizando pol\u00edticas de grupo de Active Directory.<\/p>\n<p>\u00abEl malware agreg\u00f3 un abordaje nuevo para interactuar con Active Directory, propagando ransomware a dominios locales, as\u00ed como una pol\u00edtica de actualizaci\u00f3n global integrada con desactivaci\u00f3n de antivirus, lo que facilita las operaciones de pentester para los nuevos operadores de malware\u00bb.<\/p><\/blockquote>\n<h2>LockBit 2.0 utiliza impresoras de red<\/h2>\n<p>LockBit 2.0 tambi\u00e9n incluye una funci\u00f3n utilizada anteriormente por la operaci\u00f3n Egregor Ransomware, que imprime la nota de rescate en todas las impresoras de la red.<\/p>\n<p>Una vez que el ransomware ha terminado de cifrar un dispositivo, imprime repetidamente la nota de rescate en cualquier impresora conectada a la red para llamar la atenci\u00f3n de la v\u00edctima.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/print-bomb.jpg\" alt=\"papeis impressos pelo LockBit\" width=\"1067\" height=\"800\" class=\"alignnone size-full wp-image-16629\" \/><br \/>\nImagen\/Reproducci\u00f3n: BleepingComputer<\/p>\n<p>Fuwnte: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-now-encrypts-windows-domains-using-group-policies\/\">BleepingComputer<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los investigadores han descubierto una nueva variaci\u00f3n del ransomware LockBit que automatiza el cifrado de los dominios de Windows. Seg\u00fan Bleeping Computer, aprovecha las pol\u00edticas de grupo de Active Directory. La campa\u00f1a de ransomware LockBit comenz\u00f3 en septiembre de 2019 como un esquema RaaS (Ransomware como servicio), en el que los actores de amenazas tienen [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":16635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019,1025],"tags":[1756,1864,1869,1918],"class_list":["post-19857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","category-noticias-es","tag-ciberataques-es","tag-malware-es","tag-microsoft-es","tag-ransomware-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LockBit encripta dominios del Windows usando pol\u00edticas de grupo - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LockBit encripta dominios del Windows usando pol\u00edticas de grupo - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Los investigadores han descubierto una nueva variaci\u00f3n del ransomware LockBit que automatiza el cifrado de los dominios de Windows. Seg\u00fan Bleeping Computer, aprovecha las pol\u00edticas de grupo de Active Directory. La campa\u00f1a de ransomware LockBit comenz\u00f3 en septiembre de 2019 como un esquema RaaS (Ransomware como servicio), en el que los actores de amenazas tienen [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T13:23:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"LockBit encripta dominios del Windows usando pol\u00edticas de grupo\",\"datePublished\":\"2023-02-01T13:23:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\"},\"wordCount\":711,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg\",\"keywords\":[\"ciberataques\",\"malware\",\"Microsoft\",\"Ransomware\"],\"articleSection\":[\"Gen\u00e9rico\",\"Not\u00edcias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\",\"name\":\"LockBit encripta dominios del Windows usando pol\u00edticas de grupo - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg\",\"datePublished\":\"2023-02-01T13:23:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg\",\"width\":928,\"height\":534,\"caption\":\"notebook com cibercrminosos em sua tela\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LockBit encripta dominios del Windows usando pol\u00edticas de grupo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockBit encripta dominios del Windows usando pol\u00edticas de grupo - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/","og_locale":"es_ES","og_type":"article","og_title":"LockBit encripta dominios del Windows usando pol\u00edticas de grupo - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Los investigadores han descubierto una nueva variaci\u00f3n del ransomware LockBit que automatiza el cifrado de los dominios de Windows. Seg\u00fan Bleeping Computer, aprovecha las pol\u00edticas de grupo de Active Directory. La campa\u00f1a de ransomware LockBit comenz\u00f3 en septiembre de 2019 como un esquema RaaS (Ransomware como servicio), en el que los actores de amenazas tienen [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2023-02-01T13:23:52+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"LockBit encripta dominios del Windows usando pol\u00edticas de grupo","datePublished":"2023-02-01T13:23:52+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/"},"wordCount":711,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg","keywords":["ciberataques","malware","Microsoft","Ransomware"],"articleSection":["Gen\u00e9rico","Not\u00edcias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/","url":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/","name":"LockBit encripta dominios del Windows usando pol\u00edticas de grupo - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg","datePublished":"2023-02-01T13:23:52+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/07\/lockbit-1.jpg","width":928,"height":534,"caption":"notebook com cibercrminosos em sua tela"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/lockbit-encripta-dominios-del-windows-usando-politicas-de-grupo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"LockBit encripta dominios del Windows usando pol\u00edticas de grupo"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/19857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=19857"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/19857\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/16635"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=19857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=19857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=19857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}