{"id":3760,"date":"2024-01-31T15:42:51","date_gmt":"2024-01-31T20:42:51","guid":{"rendered":"https:\/\/www.itechsas.com\/blog\/?p=3760"},"modified":"2024-02-03T13:15:10","modified_gmt":"2024-02-03T18:15:10","slug":"lo-que-se-conoce-del-nuevo-ataque-a-salud-total","status":"publish","type":"post","link":"https:\/\/www.itechsas.com\/blog\/ciberseguridad\/lo-que-se-conoce-del-nuevo-ataque-a-salud-total\/","title":{"rendered":"Lo que se conoce del nuevo ataque a Salud Total"},"content":{"rendered":"\n<p>En mayo de 2022, la EPS <strong><a href=\"https:\/\/www.itechsas.com\/blog\/ciberseguridad\/salud-total-eps-suspende-servicios-por-ataque-cibernetico\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salud Total reportaba que hab\u00eda sido victima de un ciberataque<\/a><\/strong> que afectaba sus plataformas tecnol\u00f3gicas y deb\u00edan suspender sus servicios virtuales. El pasado 27 de enero, vuelve a sufrir otro ciberataque que deja por fuera los servicios digitales a los usuarios de la EPS.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-8.png\"><img data-opt-id=1285831780  fetchpriority=\"high\" decoding=\"async\" width=\"838\" height=\"533\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-8.png\" alt=\"\" class=\"wp-image-3777\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:838\/h:533\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-8.png 838w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:191\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-8.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:488\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-8.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:528\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-8.png 830w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n\n\n\n<p>Dada la gravedad del incidente, la <strong>Superintendencia Nacional de Salud<\/strong> ha intervenido, implementando medidas de emergencia para mitigar los da\u00f1os y proteger los intereses de los m\u00e1s de <strong>4.8 millones de afiliados<\/strong> en todo el pa\u00eds, haciendo seguimiento a las reclamaciones y las quejas de usuarios relacionadas con los problemas de acceso asociadas con las fallas de los sistema afectados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image.png\"><img data-opt-id=615728801  fetchpriority=\"high\" decoding=\"async\" width=\"605\" height=\"653\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image.png\" alt=\"\" class=\"wp-image-3761\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:605\/h:653\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image.png 605w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:278\/h:300\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image.png 278w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure>\n\n\n\n<p>La EPS en comunicado realizado, advirti\u00f3 que por el ataque presentado, parte de<strong> la informaci\u00f3n relacionada con la operaci\u00f3n de la EPS no esta disponible<\/strong>, por lo que se activaron los protocolos para deshabilitar los servicios inform\u00e1ticos afectados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image-1.png\"><img data-opt-id=1049980871  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image-1.png\"  decoding=\"async\" width=\"663\" height=\"726\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3762\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:663\/h:726\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image-1.png 663w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:274\/h:300\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/01\/image-1.png 274w\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/saludtotal.com.co\/plan-de-beneficios-en-salud\/salud-total-eps-s-esta-siendo-objeto-de-ataque-informatico-externo-2\/\">Salud Total EPS-S est\u00e1 siendo objeto de ataque inform\u00e1tico externo &#8211; Salud Total EPS-S<\/a><\/p>\n\n\n\n<p>Comparando el comunicado actual con el publicado en <strong>mayo de 2022<\/strong> se observan muy similar, como si hubieran cortado y pegado. Da la impresi\u00f3n que no le han dado la importancia adecuada y tampoco se han tomado las acciones necesarias despu\u00e9s del primer ciberataque:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image.png\"><img data-opt-id=376942575  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image.png\"  loading=\"lazy\" decoding=\"async\" width=\"594\" height=\"709\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3252\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:594\/h:709\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image.png 594w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:251\/h:300\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image.png 251w\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Documentos filtrados del ataque a Salud Total<\/h3>\n\n\n\n<p>Seg\u00fan publicaci\u00f3n de MuchoHacker.lol, se logro evidenciar la existencia de documentos robados por los ciberdelincuentes y ahora disponibles a quien tenga acceso al link. Los atacantes identificados como el grupo <strong>Ra World<\/strong> publicaron 137 documentos como parte de las pruebas que tienen de su ataque para presionar el pago por su rescate:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-2.png\"><img data-opt-id=1488766557  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-2.png\"  loading=\"lazy\" decoding=\"async\" width=\"436\" height=\"549\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3766\" style=\"width:510px;height:auto\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:436\/h:549\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-2.png 436w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:238\/h:300\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-2.png 238w\" \/><\/a><\/figure><\/div>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image.png\"><img data-opt-id=1291406093  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image.png\"  loading=\"lazy\" decoding=\"async\" width=\"548\" height=\"347\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3764\" style=\"width:652px;height:auto\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:548\/h:347\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image.png 548w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:190\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image.png 300w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-1.png\"><img data-opt-id=646186885  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-1.png\"  loading=\"lazy\" decoding=\"async\" width=\"763\" height=\"371\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3765\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:763\/h:371\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-1.png 763w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:146\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-1.png 300w\" \/><\/a><\/figure>\n\n\n\n<p>De acuerdo con la informaci\u00f3n publicada por los atacantes se puede ver la presunta nota de rescate que debieron recibir los ingenieros de Salud Total.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/muchohacker.lol\/wp-content\/uploads\/2024\/02\/Nota-de-rescate-Salud-Total.png\"><img data-opt-id=437670218  data-opt-src=\"https:\/\/muchohacker.lol\/wp-content\/uploads\/2024\/02\/Nota-de-rescate-Salud-Total.png\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-2121\"\/><\/a><\/figure>\n\n\n\n<p><strong>La traducci\u00f3n de la notificaci\u00f3n:<\/strong><\/p>\n\n\n\n<p>Tus datos han sido robados y cifrados mientras lees esta carta. Hemos copiado todos los datos en nuestro servidor. No te preocupes, tus datos no ser\u00e1n divulgados si haces lo que quiero. Pero si no pagas, liberaremos los datos, contactaremos a tus clientes y reguladores, y destruiremos tu sistema nuevamente. Podemos descifrar algunos archivos para demostrar que la herramienta de descifrado funciona correctamente.<br><br>Cont\u00e1ctanos, paga el rescate. Si pagas, te proporcionaremos los programas de descifrado y eliminaremos tus datos de nuestros servidores. Si no, filtraremos tus datos y tu empresa aparecer\u00e1 en la lista de verg\u00fcenza a continuaci\u00f3n. Si no, enviaremos un correo electr\u00f3nico a tus clientes e informaremos a la autoridad supervisora.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Datos t\u00e9cnicos del ciberataque a Salud Total<\/h3>\n\n\n\n<p>Seg\u00fan investigaci\u00f3n de <strong>German Fern\u00e1ndez <\/strong>(Security Research de Chile) que publica en su cuenta de <a href=\"https:\/\/www.linkedin.com\/in\/gfdez\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linkedin<\/a>, se detecto un archivo llamado <strong>Stage2.exe<\/strong>, el cual es muy probable que se uso en el ataque a Salud Total<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png\"><img data-opt-id=381334626  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:628\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"628\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20628%22%20width%3D%221024%22%20height%3D%22628%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22628%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3769\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:628\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:184\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:471\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:509\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1033\/h:634\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-4.png 1033w\" \/><\/a><\/figure>\n\n\n\n<p>Los atacantes configuraron el dominio interno de esta organizaci\u00f3n en la muestra y al parecer almacenan otros artefactos en \u00abC:\\Windows\\Help\\\u00bb.<\/p>\n\n\n\n<p>Parte del c\u00f3digo aqu\u00ed:<br>string args = \u00absaludtotal.loc\u00bb;<br>string path = \u00abC:\\\\Windows\\\\Help\\\\Exclude.exe\u00bb;<br>string path2 = \u00abC:\\\\Windows\\\\Help\\\\Finish.exe\u00bb;<br>string arg = \u00abC:\\\\Windows\\\\Help\\\\Stage2.exe\u00bb;<br>string text = \u00abC:\\\\Windows\\\\Help\\\\Stage3.exe\u00bb;<br>string text2 = \u00abMSOfficeRunOncelsls\u00bb;<br>string text3 = \u00abC:\\\\Windows\\\\Help\\\\Pay.txt\u00bb;<\/p>\n\n\n\n<p><strong>\u00abPay.txt\u00bb podr\u00eda contener la nota de rescate<\/strong><\/p>\n\n\n\n<p>Todo indica que este ransomware se ejecutar\u00eda luego de reiniciar el equipo en modo seguro, t\u00e9cnica utilizada para evadir la detecci\u00f3n de algunos productos de seguridad que no funcionan en este modo.<\/p>\n\n\n\n<p>Adicionalmente, tambi\u00e9n esta el archivo \u00abSD.bat\u00bb que b\u00e1sicamente elimina la carpeta de <strong>Trend Micro<\/strong> y utiliza el comando WMIC para obtener informaci\u00f3n sobre los discos. Tambi\u00e9n deja un log en \u00abC:\\DISKLOG.TXT\u00bb.<\/p>\n\n\n\n<p>&gt; rmdir \/s \/q \u00abC:\\Program Files (x86)\\Trend Micro\u00bb &gt;&gt; C:\\DISKLOG.TXT<br>&gt; wmic logicaldisk get name,deviceid,filesystem,freespace,size &gt;&gt; C:\\DISKLOG.TXT<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hallazgos en la Dark Web del dominio afectado<\/h3>\n\n\n\n<p>Nuestro equipo hizo un diagnostico al dominio&nbsp;<strong>saludtotal.com.co<\/strong>&nbsp;encontrando un <strong>incremento en la exposici\u00f3n<\/strong> de datos en la Dark Web, comparado con lo registrado en 2022.<\/p>\n\n\n\n<p><strong>Reporte registrado en Febrero 2 de 2024<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-5.png\"><img data-opt-id=1574314478  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-5.png\"  loading=\"lazy\" decoding=\"async\" width=\"848\" height=\"518\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3770\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:848\/h:518\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-5.png 848w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:183\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-5.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:469\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-5.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:507\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/02\/image-5.png 830w\" \/><\/a><\/figure>\n\n\n\n<p><strong>Reporte registrado en Mayor 4 de 2022<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image-1.png\"><img data-opt-id=1641795891  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image-1.png\"  loading=\"lazy\" decoding=\"async\" width=\"810\" height=\"671\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3255\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:810\/h:671\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image-1.png 810w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:249\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image-1.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:636\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/05\/image-1.png 768w\" \/><\/a><\/figure>\n\n\n\n<p>Los hallazgos encontrados estan en la Dark Web, incluidos varios foros de pirater\u00eda, mercados clandestinos, canales de IRC, sitios web de pegado y otros recursos donde los ciberdelincuentes suelen comercializar, publicitar o compartir datos robados.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.itechsas.com\/home\/product\/ptaas\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-opt-id=553365801  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/02\/image-7.png\"  loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"119\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3112\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:480\/h:119\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/02\/image-7.png 480w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:74\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2022\/02\/image-7.png 300w\" \/><\/a><\/figure>\n\n\n\n<p><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.itechsas.com\/home\/product\/ptaas\/\" target=\"_blank\">PTaaS<\/a><\/strong>: es un servicio moderno para encontrar vulnerabilidades y hacer pruebas de penetraci\u00f3n (Pentest) y Hacking \u00e9tico avanzado aprovechando la potencia de software especializado y la nube con la capacidad de realizar pruebas de seguridad bajo demanda, de forma \u00e1gil, automatizada y continua. Todo esto con el soporte, acompa\u00f1amiento, revisi\u00f3n y verificaci\u00f3n manual de nuestro&nbsp;<strong>Red Team<\/strong>&nbsp;y especialistas en&nbsp;<strong>seguridad web.<\/strong><\/p>\n\n\n\n<p>Recibe un&nbsp;<strong>Diagn\u00f3stico Sin Costo&nbsp;<\/strong>del estado de seguridad de tu aplicaci\u00f3n o sitio web dando clic en el siguiente enlace:<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-vivid-red-background-color has-background wp-element-button\" href=\"https:\/\/forms.gle\/5yvxp32NRbNSGQ5W9\" target=\"_blank\" rel=\"noreferrer noopener\">Reciba un test de seguridad sin Costo<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>En mayo de 2022, la EPS Salud Total reportaba que hab\u00eda sido victima de un ciberataque que afectaba sus plataformas tecnol\u00f3gicas y deb\u00edan suspender sus servicios virtuales. El pasado 27 de enero, vuelve a sufrir otro ciberataque que deja por fuera los servicios digitales a los usuarios de la EPS. Dada la gravedad del incidente,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3774,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[53,34,28,421,18,420],"class_list":["post-3760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-ciberataque","tag-ciberseguridad","tag-proteccion-de-datos","tag-ra-world","tag-ransomware","tag-salud-total"],"_links":{"self":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/3760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/comments?post=3760"}],"version-history":[{"count":7,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/3760\/revisions"}],"predecessor-version":[{"id":3778,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/3760\/revisions\/3778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media\/3774"}],"wp:attachment":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media?parent=3760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/categories?post=3760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/tags?post=3760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}