{"id":2681,"date":"2023-12-02T08:32:35","date_gmt":"2023-12-02T07:32:35","guid":{"rendered":"https:\/\/enthec.com\/?p=2681"},"modified":"2025-01-29T11:56:50","modified_gmt":"2025-01-29T10:56:50","slug":"tipos-comunes-de-ciberataques-parte-ii","status":"publish","type":"post","link":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/","title":{"rendered":"Tipos comunes de ciberataques. Parte II."},"content":{"rendered":"

Si en la primera parte de este art\u00edculo sobre los tipos comunes de ciberataques explic\u00e1bamos el medio del que se valen los ciberdelincuentes para realizar el ataque, en este veremos las diversas formas que tienen de ejecutarlo.<\/p>\n

Como ya contamos en el anterior post<\/a>, un ciberataque<\/strong> es cualquier tipo de maniobra ofensiva empleada por individuos u organizaciones enteras, que apunta a sistemas de informaci\u00f3n inform\u00e1tica, infraestructuras, redes inform\u00e1ticas y\/o dispositivos inform\u00e1ticos personales. Estos ataques intentan por diversos medios de actos maliciosos, generalmente originados de una fuente an\u00f3nima, hackear un sistema<\/strong> para robar, alterar o destruir un objetivo espec\u00edfico.<\/p>\n

Los ciberdelincuentes son individuos o equipos de personas que utilizan la tecnolog\u00eda para cometer actividades maliciosas en sistemas o redes digitales con la intenci\u00f3n de robar informaci\u00f3n confidencial de la empresa o datos personales, y generar ganancias.<\/p>\n

 <\/p>\n

\"Tipos<\/p>\n

<\/h2>\n

Tipos comunes de ciberataques por su forma:<\/h2>\n

Botnet:<\/h3>\n

Las redes de bots son redes de dispositivos inform\u00e1ticos que los ciberdelincuentes secuestran y utilizan para llevar a cabo diversas estafas y ciberataques. Su nombre es una combinaci\u00f3n de dos palabras, \u00abrobot\u00bb y \u00abred\u00bb. Los bots sirven como una herramienta para automatizar ataques masivos, como el robo de datos, el bloqueo del servidor y la distribuci\u00f3n de malware.\u00a0\u00a0 Las botnets est\u00e1n dise\u00f1adas para crecer, automatizar y acelerar la capacidad de un hacker para llevar a cabo ataques m\u00e1s grandes.<\/p>\n

Spyware:<\/h3>\n

Spyware es cualquier software malicioso que secretamente recopila informaci\u00f3n sobre una persona u organizaci\u00f3n y la env\u00eda a otra entidad de una manera que da\u00f1a al usuario. Est\u00e1 dise\u00f1ado para controlar parcial o totalmente el funcionamiento de un ordenador sin el conocimiento de su usuario. Por ejemplo, al violar su privacidad o poner en peligro la seguridad de su dispositivo. Los sitios web pueden involucrarse en comportamientos de spyware como el seguimiento web. El spyware se asocia con frecuencia a la publicidad e implica muchas de las mismas ediciones.<\/p>\n

Phising:<\/h3>\n

Phishing es un delito cibern\u00e9tico en el que alguien que se hace pasar por una instituci\u00f3n leg\u00edtima\u00a0 contacta con un objetivo o objetivos por correo electr\u00f3nico, tel\u00e9fono o mensaje de texto\u00a0 para atraer a las personas a proporcionar datos confidenciales, como informaci\u00f3n de identificaci\u00f3n personal, datos bancarios y de tarjetas de cr\u00e9dito, y contrase\u00f1as.<\/p>\n

Los ataques de phishing se han vuelto cada vez m\u00e1s sofisticados y, a menudo, reflejan de forma transparente el sitio al que se dirigen, lo que permite al atacante observar todo mientras la v\u00edctima navega por el sitio y traspasar cualquier seguridad adicional.<\/p>\n

 <\/p>\n

Nuestra plataforma Kartos Corporate Threat Watchbots<\/a> by Enthec<\/a> te ayuda a prevenir diferentes tipos de ciberataques localizando en tiempo real la informaci\u00f3n corporativa filtrada as\u00ed como las vulnerabilidades expuestas de tu organizaci\u00f3n para poder evitar que sean utilizadas para ejecutar un ciberataque.<\/p>\n

Contacta<\/a> con nosostros para obtener m\u00e1s informaci\u00f3n sobre c\u00f3mo puede Kartos ayudarte a proteger tu empresa.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Si en la primera parte de este art\u00edculo sobre los tipos comunes de ciberataques explic\u00e1bamos el medio del que se […]<\/p>\n","protected":false},"author":4,"featured_media":2684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42],"tags":[21,27,28],"class_list":["post-2681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-ciberseguridad","tag-kartos","tag-riesgos"],"yoast_head":"\nTipos comunes de ciberataques II - Enthec<\/title>\n<meta name=\"description\" content=\"Un ciberataque intenta por diversas formas hackear un sistema con un objetivo malicioso espec\u00edfico. Te contamos aqu\u00ed las m\u00e1s comunes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tipos comunes de ciberataques II - Enthec\" \/>\n<meta property=\"og:description\" content=\"Un ciberataque intenta por diversas formas hackear un sistema con un objetivo malicioso espec\u00edfico. Te contamos aqu\u00ed las m\u00e1s comunes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T07:32:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T10:56:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Tipos comunes de ciberataques. Parte II.\",\"datePublished\":\"2023-12-02T07:32:35+00:00\",\"dateModified\":\"2025-01-29T10:56:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\"},\"wordCount\":516,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"keywords\":[\"Ciberseguridad\",\"Kartos\",\"Riesgos\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\",\"url\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\",\"name\":\"Tipos comunes de ciberataques II - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"datePublished\":\"2023-12-02T07:32:35+00:00\",\"dateModified\":\"2025-01-29T10:56:50+00:00\",\"description\":\"Un ciberataque intenta por diversas formas hackear un sistema con un objetivo malicioso espec\u00edfico. Te contamos aqu\u00ed las m\u00e1s comunes.\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg\",\"width\":2560,\"height\":2048},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tipos comunes de ciberataques. Parte II.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"description\":\"Deep tech cyber-surveillance company\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tipos comunes de ciberataques II - Enthec","description":"Un ciberataque intenta por diversas formas hackear un sistema con un objetivo malicioso espec\u00edfico. Te contamos aqu\u00ed las m\u00e1s comunes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/","og_locale":"es_ES","og_type":"article","og_title":"Tipos comunes de ciberataques II - Enthec","og_description":"Un ciberataque intenta por diversas formas hackear un sistema con un objetivo malicioso espec\u00edfico. Te contamos aqu\u00ed las m\u00e1s comunes.","og_url":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2023-12-02T07:32:35+00:00","article_modified_time":"2025-01-29T10:56:50+00:00","og_image":[{"width":2560,"height":2048,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Enthec","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Tipos comunes de ciberataques. Parte II.","datePublished":"2023-12-02T07:32:35+00:00","dateModified":"2025-01-29T10:56:50+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/"},"wordCount":516,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","keywords":["Ciberseguridad","Kartos","Riesgos"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/","url":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/","name":"Tipos comunes de ciberataques II - Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","datePublished":"2023-12-02T07:32:35+00:00","dateModified":"2025-01-29T10:56:50+00:00","description":"Un ciberataque intenta por diversas formas hackear un sistema con un objetivo malicioso espec\u00edfico. Te contamos aqu\u00ed las m\u00e1s comunes.","breadcrumb":{"@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/formas-comunes-ciberataques-scaled.jpg","width":2560,"height":2048},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/tipos-comunes-de-ciberataques-parte-ii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/"},{"@type":"ListItem","position":2,"name":"Tipos comunes de ciberataques. Parte II."}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","description":"Deep tech cyber-surveillance company","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC \u00b7 Kartos \u00b7 Qondar"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/enthec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/posts\/2681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/comments?post=2681"}],"version-history":[{"count":1,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/posts\/2681\/revisions"}],"predecessor-version":[{"id":2686,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/posts\/2681\/revisions\/2686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/media\/2684"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/media?parent=2681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/categories?post=2681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/wp-json\/wp\/v2\/tags?post=2681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}