{"id":5129,"date":"2018-01-29T17:06:07","date_gmt":"2018-01-29T20:06:07","guid":{"rendered":"https:\/\/ostec.blog\/seguridad-perimetral\/conheca-ameaca-crossrat"},"modified":"2020-10-02T14:11:32","modified_gmt":"2020-10-02T17:11:32","slug":"conozca-amenaza-crossrat","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/","title":{"rendered":"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos"},"content":{"rendered":"<p>[rev_slider alias=\u00bbebook-ransonware-360-280&#8243;][\/rev_slider] En la \u00faltima semana, una nueva amenaza viene probando el mundo de la seguridad digital. El CrossRat, como fue nombrado, es un malware construido en Java y desarrollado por el grupo liban\u00e9s Dark Caracal, ya conocido por haber diseminado otros programas maliciosos por internet.<\/p>\n<p>De acuerdo con la informaci\u00f3n de The Hacker News, CrossRat puede infectar dispositivos con Windows, Linux y MacOS, dando permiso para que los cibercriminales tengan acceso al n\u00facleo <strong>kernel<\/strong>del dispositivo. De esta forma, es posible instalar el malware de acuerdo con la configuraci\u00f3n del sistema operativo utilizado.<\/p>\n<p>Cuando se instala, permite a los cibercriminales emitir ciertos comandos y, de esta forma, realizar actividades espec\u00edficas. De entre ellas, es posible ejecutar programas y sacar screenshots, lo que facilita el principal objetivo del programa de espionaje: robar datos personales de la v\u00edctima.<\/p>\n<p>Por medio de la <strong>ingenier\u00eda social<\/strong>, la pr\u00e1ctica de conversaci\u00f3n e inducci\u00f3n utilizada en los medios sociales, el malware logra diseminarse por internet. Las publicaciones con URL maliciosas, generalmente divulgadas en Facebook y WhatsApp, posibilitan la infecci\u00f3n del programa malicioso.<\/p>\n<h2>\u00bfC\u00f3mo identificar el malware? *<\/h2>\n<h3>En Windows:<\/h3>\n<ul>\n<li>Analice la clave de registro &#8216;HKCU \\ Software \\ Microsoft \\ Windows \\ CurrentVersion \\ Run \\&#8217;.<\/li>\n<li>Si est\u00e1 infectado, habr\u00e1 un comando que incluye java, -java y mediamgrs.jar.<\/li>\n<\/ul>\n<h3>En MacOS:<\/h3>\n<ul>\n<li>Compruebe el archivo java, jar, en ~\/Library.<\/li>\n<li>Busque tambi\u00e9n por mediamgrs.plist. en \/Library \/LaunchAgents o ~\/Library \/LaunchAgents<\/li>\n<\/ul>\n<h3>En Linux:<\/h3>\n<ul>\n<li>Compruebe el archivo Java, mediamgrs.jar, en \/ usr \/ var.<\/li>\n<li>Busque tambi\u00e9n un archivo &#8216;autostart&#8217; en ~\/.config\/autostart probablemente llamado mediamgrs.desktop.<\/li>\n<\/ul>\n<h2>\u00bfC\u00f3mo protegerse?<\/h2>\n<p>CrossRAT tiene una gran capacidad de infecci\u00f3n en ordenadores, especialmente aquellos con los sistemas operativos Windows o Linux, ya que poseen el software Java preinstalado, lo mismo que la base del malware CrossRat.<\/p>\n<p>Sin embargo, muchos antivirus ya logran detectar la amenaza, incluyendo AVG, Avast y Karspersky &#8211; algunos de los m\u00e1s populares. Por lo tanto, tener un software b\u00e1sico de seguridad contra virus es esencial para identificar la amenaza y, en consecuencia, eliminarla.<\/p>\n<p>Pero, m\u00e1s que eso, es importante evitar la apertura de cualquier v\u00ednculo sospechoso, ya sean enviados por e-mails, aplicaciones de mensajer\u00eda instant\u00e1nea o redes sociales. De hecho, subrayamos que incluso los mensajes enviados por amigos cercanos deben ser considerados sospechosos. Cuando el asunto es seguridad digital, los cuidados deben ser grandes y espec\u00edficos.<\/p>\n<p><em>*Informaci\u00f3n retirada de The Hacker News.<\/em><\/p>\n<h2>Contin\u00fae leyendo<\/h2>\n<p>[latest_post type=&#8217;boxes&#8217; number_of_posts=&#8217;3&#8242; number_of_colums=&#8217;3&#8242; order_by=&#8217;date&#8217; order=&#8217;ASC&#8217; category=&#8217;reconoecimiento-problema&#8217; text_length=&#8217;100&#8242; title_tag=&#8217;h4&#8242; display_category=&#8217;0&#8242; display_time=&#8217;0&#8242; display_comments=&#8217;0&#8242; display_like=&#8217;0&#8242; display_share=&#8217;0&#8242;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[rev_slider alias=\u00bbebook-ransonware-360-280&#8243;][\/rev_slider] En la \u00faltima semana, una nueva amenaza viene probando el mundo de la seguridad digital. El CrossRat, como fue nombrado, es un malware construido en Java y desarrollado por el grupo liban\u00e9s Dark Caracal, ya conocido por haber diseminado otros programas maliciosos por internet. De acuerdo con la informaci\u00f3n de The Hacker News, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[],"class_list":["post-5129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos<\/title>\n<meta name=\"description\" content=\"Una nueva amenaza viene poniendo en jaque la seguridad digital. CrossRat, como se llama, es un malware que roba informaci\u00f3n personal. \u00a1Aprenda m\u00e1s!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos\" \/>\n<meta property=\"og:description\" content=\"Una nueva amenaza viene poniendo en jaque la seguridad digital. CrossRat, como se llama, es un malware que roba informaci\u00f3n personal. \u00a1Aprenda m\u00e1s!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-29T20:06:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T17:11:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos\",\"datePublished\":\"2018-01-29T20:06:07+00:00\",\"dateModified\":\"2020-10-02T17:11:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg\",\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\",\"name\":\"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg\",\"datePublished\":\"2018-01-29T20:06:07+00:00\",\"dateModified\":\"2020-10-02T17:11:32+00:00\",\"description\":\"Una nueva amenaza viene poniendo en jaque la seguridad digital. CrossRat, como se llama, es un malware que roba informaci\u00f3n personal. \u00a1Aprenda m\u00e1s!\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg\",\"width\":928,\"height\":534,\"caption\":\"Teclado de notebook com teclas iluminadas\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/es\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos","description":"Una nueva amenaza viene poniendo en jaque la seguridad digital. CrossRat, como se llama, es un malware que roba informaci\u00f3n personal. \u00a1Aprenda m\u00e1s!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/","og_locale":"es_ES","og_type":"article","og_title":"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos","og_description":"Una nueva amenaza viene poniendo en jaque la seguridad digital. CrossRat, como se llama, es un malware que roba informaci\u00f3n personal. \u00a1Aprenda m\u00e1s!","og_url":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2018-01-29T20:06:07+00:00","article_modified_time":"2020-10-02T17:11:32+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos","datePublished":"2018-01-29T20:06:07+00:00","dateModified":"2020-10-02T17:11:32+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg","articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/","url":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/","name":"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg","datePublished":"2018-01-29T20:06:07+00:00","dateModified":"2020-10-02T17:11:32+00:00","description":"Una nueva amenaza viene poniendo en jaque la seguridad digital. CrossRat, como se llama, es un malware que roba informaci\u00f3n personal. \u00a1Aprenda m\u00e1s!","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/teclado-iluminado.jpg","width":928,"height":534,"caption":"Teclado de notebook com teclas iluminadas"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/conozca-amenaza-crossrat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CrossRat: conozca la nueva amenaza que afecta a varios sistemas operativos"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/es\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/5129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=5129"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/5129\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/12773"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=5129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=5129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=5129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}