{"id":4247,"date":"2026-03-09T15:57:25","date_gmt":"2026-03-09T20:57:25","guid":{"rendered":"https:\/\/www.itechsas.com\/blog\/?p=4247"},"modified":"2026-03-09T15:57:29","modified_gmt":"2026-03-09T20:57:29","slug":"exfiltracion-de-datos-golpea-a-entidades-publicas-privadas-y-universidades-en-colombia","status":"publish","type":"post","link":"https:\/\/www.itechsas.com\/blog\/ciberseguridad\/exfiltracion-de-datos-golpea-a-entidades-publicas-privadas-y-universidades-en-colombia\/","title":{"rendered":"Exfiltraci\u00f3n de datos golpea a entidades p\u00fablicas, privadas y universidades en Colombia"},"content":{"rendered":"\n<p>Se identific\u00f3 una campa\u00f1a activa de exfiltraci\u00f3n y publicaci\u00f3n de informaci\u00f3n que afecta principalmente a entidades p\u00fablicas y a instituciones de educaci\u00f3n superior en Colombia.<\/p>\n\n\n\n<p>El panorama de ciberseguridad en Colombia vuelve a encender alertas. Durante el primer trimestre del a\u00f1o, el Equipo de Respuesta a Emergencias Cibern\u00e9ticas de Colombia (ColCERT) identific\u00f3 una <strong>campa\u00f1a activa de exfiltraci\u00f3n y publicaci\u00f3n de informaci\u00f3n<\/strong> que afecta principalmente a entidades p\u00fablicas y a instituciones de educaci\u00f3n superior. Con <strong>23 reportes de seguridad<\/strong> y al menos <strong>nueve actores de amenaza<\/strong> involucrados, el caso revela fallas estructurales en la gesti\u00f3n de plataformas tecnol\u00f3gicas y una creciente profesionalizaci\u00f3n de grupos dedicados al tr\u00e1fico de datos y ciber delincuencia.<\/p>\n\n\n\n<p>Entre los actores identificados, destaca <strong>NyxarGroup<\/strong>, una figura emergente dentro de foros clandestinos que ha centrado su actividad en la <strong>exposici\u00f3n y comercializaci\u00f3n de datos<\/strong> presuntamente extra\u00eddos de plataformas institucionales.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Datos filtrados<\/strong><\/h2>\n\n\n\n<p>Uno de los hallazgos m\u00e1s relevantes del an\u00e1lisis de ColCERT es que la informaci\u00f3n filtrada se trata de:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Archivos en texto plano.<\/li>\n\n\n\n<li>Listados con nombres, apellidos, correos institucionales y fotograf\u00edas de perfil.<\/li>\n\n\n\n<li>Im\u00e1genes sin metadatos.<\/li>\n\n\n\n<li>C\u00f3digos de estudiante at\u00edpicamente cortos.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png\"><img data-opt-id=592346181  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"562\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:562\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png\" alt=\"\" class=\"wp-image-4269\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:562\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:165\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:421\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:455\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1083\/h:594\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-16.png 1083w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/www.colcert.gov.co\/800\/articles-428175_XCOLCERT_AL__20260304__096_Alerta_Campana_posible_de_exfiltracion_de_informacion.pdf\">https:\/\/www.colcert.gov.co\/800\/articles-428175_XCOLCERT_AL__20260304__096_Alerta_Campana_posible_de_exfiltracion_de_informacion.pdf<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>La informaci\u00f3n y datos filtrados supone un impacto potencialmente significativo: alimentar campa\u00f1as de <strong>ingenier\u00eda social<\/strong>, <strong>spear\u2011phishing<\/strong> y <strong>suplantaci\u00f3n de identidad<\/strong>, entre otros.<\/p><\/blockquote><\/figure>\n\n\n\n<p>En varios repositorios se encontraron grandes vol\u00famenes de im\u00e1genes tipo retrato sin ninguna estructura asociada. Esto sugiere que los actores est\u00e1n recopilando informaci\u00f3n mediante herramientas de <strong>web scraping<\/strong> para extraer datos, <strong>OSINT y Google Dorks<\/strong>, explotaci\u00f3n de vulnerabilidades, o incluso malas configuraciones en plataformas educativas como <strong>Moodle<\/strong> y CMS<strong> WordPress<\/strong> que usan <strong>plugins o m\u00f3dulos desactualizados<\/strong> y con problemas de seguridad. <\/p>\n\n\n\n<p>El an\u00e1lisis de las tendencias muestra una <strong>clara concentraci\u00f3n de ataques en el sector educativo y gubernamental<\/strong>. Este enfoque apunta a una superficie de ataque amplia, con recursos limitados y sistemas frecuentemente desactualizados.<\/p>\n\n\n\n<p>Adem\u00e1s, se identific\u00f3 un patr\u00f3n recurrente en los foros donde <strong>NyxarGroup<\/strong> opera:<br>un modelo de <strong>\u201cLeak\u2011to\u2011Sell\u201d<\/strong>, es decir, publicar muestras gratuitas para ganar reputaci\u00f3n y posteriormente ofrecer el conjunto completo a la venta. Estas son algunas de las im\u00e1genes publicadas de los sitios afectados: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png\"><img data-opt-id=1802437206  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"390\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:390\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png\" alt=\"\" class=\"wp-image-4248\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:390\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:114\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:293\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:586\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:316\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:610\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image.png 1600w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png\"><img data-opt-id=1655639378  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:276\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png\"  decoding=\"async\" width=\"1024\" height=\"276\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20276%22%20width%3D%221024%22%20height%3D%22276%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22276%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4249\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:276\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:81\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:207\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:415\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:224\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:432\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 1600w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png\"><img data-opt-id=1329129263  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:424\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"424\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20424%22%20width%3D%221024%22%20height%3D%22424%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22424%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4250\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:424\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:124\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:318\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:636\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:344\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:663\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 1600w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png\"><img data-opt-id=816028960  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:353\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"353\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20353%22%20width%3D%221024%22%20height%3D%22353%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22353%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4251\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:353\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:103\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:264\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:529\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:286\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:551\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 1600w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png\"><img data-opt-id=781329375  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:369\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"369\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20369%22%20width%3D%221024%22%20height%3D%22369%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22369%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4252\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:369\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:108\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:276\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:553\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:299\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:576\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-4.png 1600w\" \/><\/a><figcaption class=\"wp-element-caption\">ucc.edu.co (50K)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png\"><img data-opt-id=290097971  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:344\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"344\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20344%22%20width%3D%221024%22%20height%3D%22344%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22344%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4254\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:344\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:101\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:258\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:516\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:279\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:537\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-6.png 1600w\" \/><\/a><figcaption class=\"wp-element-caption\">urosario.edu.co (78K)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png\"><img data-opt-id=1412745302  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:335\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"335\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20335%22%20width%3D%221024%22%20height%3D%22335%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22335%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4255\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:335\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:98\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:252\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:503\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:272\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:524\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-7.png 1600w\" \/><\/a><figcaption class=\"wp-element-caption\">unal.edu.co (100K)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png\"><img data-opt-id=25649701  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:377\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"377\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20377%22%20width%3D%221024%22%20height%3D%22377%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22377%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4256\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:377\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:110\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:283\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:565\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:306\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:589\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-8.png 1600w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png\"><img data-opt-id=363845852  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:429\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"429\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20429%22%20width%3D%221024%22%20height%3D%22429%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22429%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4258\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:429\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:126\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:322\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:643\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:348\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:670\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-10.png 1600w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png\"><img data-opt-id=1811343863  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:579\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20579%22%20width%3D%221024%22%20height%3D%22579%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22579%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4259\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:579\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:170\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:434\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:869\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:469\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:905\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-11.png 1600w\" \/><\/a><figcaption class=\"wp-element-caption\">personas.serviciodeempleo.gov.co (14M)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png\"><img data-opt-id=1975781274  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:544\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"544\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20544%22%20width%3D%221024%22%20height%3D%22544%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22544%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4260\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:544\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:159\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:408\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:816\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:441\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:850\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-12.png 1600w\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Robo masivo de datos en la DIAN<\/strong><\/h2>\n\n\n\n<p>Seg\u00fan la publicaci\u00f3n en <em><strong>Daily Dark Web<\/strong><\/em>, el atacante habr\u00eda vulnerado la plataforma de <strong>agendamiento de citas de la DIAN<\/strong>, desarrollada por la empresa <strong>Cielingenier\u00eda<\/strong>, y estar\u00eda vendiendo una base de datos con <strong>informaci\u00f3n personal de 18 millones de colombianos<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png\"><img data-opt-id=827223943  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:383\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"383\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20383%22%20width%3D%221024%22%20height%3D%22383%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22383%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4253\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:383\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:112\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:288\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:575\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:311\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:599\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-5.png 1600w\" \/><\/a><\/figure>\n\n\n\n<p>El atacante con el nombre de <strong>ARC Raiders<\/strong>, asegura que la vulnerabilidad fue reportada hace <strong>m\u00e1s de 12 meses<\/strong>, pero no fue solucionada por las autoridades.<\/p>\n\n\n\n<p>El ciberdelincuente ofrece:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Un archivo de <strong>16 GB<\/strong> con datos confidenciales.<\/li>\n\n\n\n<li>Informaci\u00f3n incluida: nombres, apellidos, tipo y n\u00famero de documento, correos electr\u00f3nicos y tel\u00e9fonos.<\/li>\n<\/ul>\n\n\n\n<p>Precio: <strong>USD 2.000<\/strong>, negociables, con dep\u00f3sito de garant\u00eda.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-14.png\"><img data-opt-id=1256299928  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-14.png\"  loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"885\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4266\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:992\/h:885\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-14.png 992w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:268\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-14.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:685\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-14.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:740\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-14.png 830w\" \/><\/a><\/figure>\n\n\n\n<p>El hacker tambi\u00e9n vende un programa hecho a la medida para:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Seguir extrayendo datos en tiempo real.<\/li>\n\n\n\n<li>Acceder a informaci\u00f3n de <strong>colombianos, extranjeros y empresas<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>El vendedor afirma haber participado en un ataque anterior que comprometi\u00f3 <strong>50.000 perfiles de la Ventanilla \u00danica de Comercio Exterior<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Al realizar una exploraci\u00f3n por internet <\/strong>con herramientas de reconocimiento de <strong>footprinting o fingerprint<\/strong>, se detectan vulnerabilidades que est\u00e1n presentes en la infraestructura detr\u00e1s del dominio <strong>dian.gov.co<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-19.png\"><img data-opt-id=1194066872  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-19.png\"  loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"376\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4274\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:888\/h:376\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-19.png 888w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:127\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-19.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:325\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-19.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:351\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-19.png 830w\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-18.png\"><img data-opt-id=1259505225  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-18.png\"  loading=\"lazy\" decoding=\"async\" width=\"234\" height=\"70\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4273\"\/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>La p\u00e1gina de <strong>Daily Dark Web<\/strong> re\u00fane m\u00faltiples reportes de brechas de datos y ciberataques que afectan a entidades p\u00fablicas y privadas en Colombia. Los casos destacados incluyen:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Instituciones gubernamentales privadas afectadas<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CNSC <\/strong>(Nov 11, 2025): Ataque de extorsi\u00f3n que compromete 2.9 TB de informaci\u00f3n.<\/li>\n\n\n\n<li><strong>Defensor\u00eda del Pueblo<\/strong> (Nov 10, 2025): Amenaza de filtraci\u00f3n de datos de la entidad.<\/li>\n\n\n\n<li><strong>Migraci\u00f3n Colombia<\/strong> (Oct 10, 2025): Base de datos de inmigraci\u00f3n presuntamente robada y ofrecida en venta.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Sector salud<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hospital General de Medell\u00edn<\/strong> (Mar 3, 2026): Exposici\u00f3n de registros de pacientes tras un ataque.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Sector automotriz<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Distribuidora Nissan<\/strong> \u2013 Dinissan (Dec 23, 2025): Exposici\u00f3n de 680,000 registros de clientes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Energ\u00eda y tecnolog\u00eda<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Solumek SAS<\/strong> (Dec 19, 2025): Ataque del grupo de ransomware The Gentlemen a empresa de energ\u00eda solar.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Industria y log\u00edstica<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stewart &amp; Stevenson Colombia<\/strong> (Feb 20, 2026): Supuesta filtraci\u00f3n de 19 GB de datos corporativos.<\/li>\n\n\n\n<li><strong>Env\u00eda \u2013 Colvanes SAS<\/strong> (Oct 31, 2025): Robo de informaci\u00f3n de clientes de la empresa de log\u00edstica.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Loter\u00edas<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Loter\u00eda de Medell\u00edn \/ Lottired<\/strong> (Oct 13, 2025): Filtraci\u00f3n de datos de ganadores por parte del grupo Crimson Collective.<\/li>\n<\/ul>\n\n\n\n<p>La siguiente imagen muestra el mensaje que los ciber delincuentes enviaron despu\u00e9s del ataque al <strong>FNA.GOV.CO<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png\"><img data-opt-id=2080678011  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:577\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20577%22%20width%3D%221024%22%20height%3D%22577%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22577%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-4261\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:577\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:169\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:433\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1536\/h:866\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png 1536w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:468\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1600\/h:902\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2026\/03\/image-13.png 1600w\" \/><\/a><\/figure>\n\n\n\n<p>La baja complejidad t\u00e9cnica refuerza la tesis de que muchos ataques explotaron fallas b\u00e1sicas como:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerabilidades sin parches.<\/li>\n\n\n\n<li>M\u00f3dulos desactualizados. <\/li>\n\n\n\n<li>Contrase\u00f1as d\u00e9biles.<\/li>\n\n\n\n<li>Configuraciones permisivas de visibilidad en LMS y CMS.<\/li>\n\n\n\n<li>Protocolos y configuraciones d\u00e9biles en servicios web.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Recomendaciones de seguridad<\/strong><\/h2>\n\n\n\n<p>Se requiere una serie de acciones inmediatas y estrategias de fortalecimiento continuo para mitigar estos riesgos:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Acciones prioritarias<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Auditor\u00eda de registros de acceso.<\/li>\n\n\n\n<li>Parcheo urgente de sistemas.<\/li>\n\n\n\n<li>Activaci\u00f3n de autenticaci\u00f3n multifactor (MFA).<\/li>\n\n\n\n<li>Restricci\u00f3n de visibilidad de perfiles p\u00fablicos.<\/li>\n\n\n\n<li>Revisi\u00f3n de pol\u00edticas de autenticaci\u00f3n.<\/li>\n\n\n\n<li>Hardening de plataformas LMS, CMS y aplicaciones legacy.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Medidas de mediano y largo plazo<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rotaci\u00f3n peri\u00f3dica de credenciales.<\/li>\n\n\n\n<li>Monitoreo de <em>infostealer logs<\/em>.<\/li>\n\n\n\n<li>Gesti\u00f3n activa de exposici\u00f3n OSINT.<\/li>\n\n\n\n<li>Escaneos continuos de vulnerabilidades con priorizaci\u00f3n basada en riesgo.<\/li>\n\n\n\n<li>Pruebas de penetraci\u00f3n y validaci\u00f3n de vulnerabilidades.<\/li>\n\n\n\n<li>Detecci\u00f3n de scraping y solicitudes an\u00f3malas hacia APIs.<\/li>\n\n\n\n<li>Programas de concientizaci\u00f3n en ciberseguridad para usuarios internos.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\u00bfEst\u00e1 seguro que su sitio o aplicaci\u00f3n web es segura?<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png\"><img data-opt-id=937290856  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:529\/h:145\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png\"  loading=\"lazy\" decoding=\"async\" width=\"529\" height=\"145\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20529%20145%22%20width%3D%22529%22%20height%3D%22145%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22529%22%20height%3D%22145%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3845\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:529\/h:145\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png 529w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:82\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png 300w\" \/><\/a><\/figure>\n\n\n\n<p>Recibe un&nbsp;<strong>Diagn\u00f3stico Sin Costo&nbsp;<\/strong>del estado de seguridad de tu aplicaci\u00f3n o sitio web dando clic en el siguiente enlace:<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-vivid-red-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/forms.gle\/5yvxp32NRbNSGQ5W9\" target=\"_blank\" rel=\"noreferrer noopener\">Reciba Diagnostico sin Costo<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Se identific\u00f3 una campa\u00f1a activa de exfiltraci\u00f3n y publicaci\u00f3n de informaci\u00f3n que afecta principalmente a entidades p\u00fablicas y a instituciones de educaci\u00f3n superior en Colombia. El panorama de ciberseguridad en Colombia vuelve a encender alertas. Durante el primer trimestre del a\u00f1o, el Equipo de Respuesta a Emergencias Cibern\u00e9ticas de Colombia (ColCERT) identific\u00f3 una campa\u00f1a activa&hellip;<\/p>\n","protected":false},"author":1,"featured_media":4267,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[225,26,503,502,504,505,91],"class_list":["post-4247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-colombia","tag-datos","tag-dian","tag-exfiltracion","tag-nyxargroup","tag-scraping","tag-vulnerabilidad"],"_links":{"self":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/4247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/comments?post=4247"}],"version-history":[{"count":13,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/4247\/revisions"}],"predecessor-version":[{"id":4280,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/4247\/revisions\/4280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media\/4267"}],"wp:attachment":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media?parent=4247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/categories?post=4247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/tags?post=4247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}