{"id":12813,"date":"2024-11-08T08:00:08","date_gmt":"2024-11-08T07:00:08","guid":{"rendered":"https:\/\/www.sivsa.com\/site\/?p=12813"},"modified":"2024-11-08T09:59:23","modified_gmt":"2024-11-08T08:59:23","slug":"donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura","status":"publish","type":"post","link":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/","title":{"rendered":"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura?"},"content":{"rendered":"<p>Buscar credenciales almacenadas de forma insegura en los sistemas corporativos es una de las t\u00e9cnicas m\u00e1s habituales utilizadas por los cibercriminales en sus ataques de acceso a credenciales.<\/p>\n<p><strong>La matriz <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0006\/\" target=\"_blank\" rel=\"noopener\" data-cke-saved-href=\"https:\/\/attack.mitre.org\/tactics\/TA0006\/\">MITRE<\/a> identifica 8 subt\u00e9cnicas de ataque, en funci\u00f3n de la ubicaci\u00f3n donde est\u00e1n almacenadas o extraviadas estas credenciales no seguras.<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-12814 aligncenter\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1.png\" alt=\"\" width=\"898\" height=\"1942\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1.png 898w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1-139x300.png 139w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1-474x1024.png 474w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1-710x1536.png 710w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1-600x1298.png 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-1-768x1661.png 768w\" sizes=\"(max-width: 898px) 100vw, 898px\" \/><\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-12815 aligncenter\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-2.png\" alt=\"\" width=\"888\" height=\"576\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-2.png 888w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-2-300x195.png 300w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-2-600x389.png 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Credenciales-2-768x498.png 768w\" sizes=\"(max-width: 888px) 100vw, 888px\" \/><\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-12816 aligncenter\" src=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales.png\" alt=\"\" width=\"882\" height=\"1660\" srcset=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales.png 882w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales-159x300.png 159w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales-544x1024.png 544w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales-816x1536.png 816w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales-600x1129.png 600w, https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Recomendaciones-para-mitigar-un-ataque-de-credenciales-768x1445.png 768w\" sizes=\"(max-width: 882px) 100vw, 882px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Buscar credenciales almacenadas de forma insegura en los sistemas corporativos es una de las t\u00e9cnicas m\u00e1s habituales utilizadas por los cibercriminales en sus ataques de acceso a credenciales. La matriz MITRE identifica 8 subt\u00e9cnicas de ataque, en funci\u00f3n de la ubicaci\u00f3n donde est\u00e1n almacenadas o extraviadas estas credenciales no seguras.<\/p>\n","protected":false},"author":6,"featured_media":12818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"xn-wppe-expiration":[],"xn-wppe-expiration-action":[],"xn-wppe-expiration-prefix":[]},"categories":[216],"tags":[251,249,554],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura? - SIVSA<\/title>\n<meta name=\"description\" content=\"\u00a1Toma nota! y sigue nuestras recomendaciones para mitigar este tipo de ataques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura? - SIVSA\" \/>\n<meta property=\"og:description\" content=\"\u00a1Toma nota! y sigue nuestras recomendaciones para mitigar este tipo de ataques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/\" \/>\n<meta property=\"og:site_name\" content=\"SIVSA\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-08T07:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-08T08:59:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Newsletter-SIVSA_P-Ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"196\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"redactor\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@sivsa_es\" \/>\n<meta name=\"twitter:site\" content=\"@sivsa_es\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"redactor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/\",\"url\":\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/\",\"name\":\"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura? - SIVSA\",\"isPartOf\":{\"@id\":\"https:\/\/www.sivsa.com\/site\/#website\"},\"datePublished\":\"2024-11-08T07:00:08+00:00\",\"dateModified\":\"2024-11-08T08:59:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.sivsa.com\/site\/#\/schema\/person\/87d6f8631ae6bb552fd7d5d14c154243\"},\"description\":\"\u00a1Toma nota! y sigue nuestras recomendaciones para mitigar este tipo de ataques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.sivsa.com\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sivsa.com\/site\/#website\",\"url\":\"https:\/\/www.sivsa.com\/site\/\",\"name\":\"SIVSA\",\"description\":\"SIVSA. Communicate in technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sivsa.com\/site\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sivsa.com\/site\/#\/schema\/person\/87d6f8631ae6bb552fd7d5d14c154243\",\"name\":\"redactor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.sivsa.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b7152bc117bb2e43cdaa9b1c47da78da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b7152bc117bb2e43cdaa9b1c47da78da?s=96&d=mm&r=g\",\"caption\":\"redactor\"},\"url\":\"https:\/\/www.sivsa.com\/site\/author\/redactor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura? - SIVSA","description":"\u00a1Toma nota! y sigue nuestras recomendaciones para mitigar este tipo de ataques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura? - SIVSA","og_description":"\u00a1Toma nota! y sigue nuestras recomendaciones para mitigar este tipo de ataques.","og_url":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/","og_site_name":"SIVSA","article_published_time":"2024-11-08T07:00:08+00:00","article_modified_time":"2024-11-08T08:59:23+00:00","og_image":[{"width":1500,"height":196,"url":"https:\/\/www.sivsa.com\/site\/wp-content\/uploads\/2024\/10\/Newsletter-SIVSA_P-Ciberseguridad.jpg","type":"image\/jpeg"}],"author":"redactor","twitter_card":"summary","twitter_creator":"@sivsa_es","twitter_site":"@sivsa_es","twitter_misc":{"Escrito por":"redactor","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/","url":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/","name":"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura? - SIVSA","isPartOf":{"@id":"https:\/\/www.sivsa.com\/site\/#website"},"datePublished":"2024-11-08T07:00:08+00:00","dateModified":"2024-11-08T08:59:23+00:00","author":{"@id":"https:\/\/www.sivsa.com\/site\/#\/schema\/person\/87d6f8631ae6bb552fd7d5d14c154243"},"description":"\u00a1Toma nota! y sigue nuestras recomendaciones para mitigar este tipo de ataques.","breadcrumb":{"@id":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sivsa.com\/site\/donde-buscan-los-cibercriminales-credenciales-almacenadas-de-forma-insegura\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.sivsa.com\/site\/"},{"@type":"ListItem","position":2,"name":"\u00bfD\u00f3nde buscan los cibercriminales credenciales almacenadas de forma insegura?"}]},{"@type":"WebSite","@id":"https:\/\/www.sivsa.com\/site\/#website","url":"https:\/\/www.sivsa.com\/site\/","name":"SIVSA","description":"SIVSA. Communicate in technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sivsa.com\/site\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.sivsa.com\/site\/#\/schema\/person\/87d6f8631ae6bb552fd7d5d14c154243","name":"redactor","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.sivsa.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b7152bc117bb2e43cdaa9b1c47da78da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b7152bc117bb2e43cdaa9b1c47da78da?s=96&d=mm&r=g","caption":"redactor"},"url":"https:\/\/www.sivsa.com\/site\/author\/redactor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/posts\/12813"}],"collection":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/comments?post=12813"}],"version-history":[{"count":2,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/posts\/12813\/revisions"}],"predecessor-version":[{"id":12819,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/posts\/12813\/revisions\/12819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/media\/12818"}],"wp:attachment":[{"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/media?parent=12813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/categories?post=12813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sivsa.com\/site\/wp-json\/wp\/v2\/tags?post=12813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}