{"id":9208,"date":"2016-07-06T13:19:37","date_gmt":"2016-07-06T19:19:37","guid":{"rendered":"https:\/\/la-uno.com\/blog\/?p=9208"},"modified":"2016-07-06T13:19:37","modified_gmt":"2016-07-06T19:19:37","slug":"nuevo-malware-en-os-x","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2016\/07\/06\/nuevo-malware-en-os-x\/","title":{"rendered":"Nuevo malware en OS X"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full aligncenter\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/Bitdefender-780x521.jpg\" alt=\"\" \/><\/p>\n<p>De nueva cuenta hay un malware que puede afectar a tu Mac, tomando control de tus sistema operativo.<\/p>\n<p>El nuevo Malware &#8220;Backdoor.Mac.Eleanor&#8221; permite a los atacantes abrir una puerta trasera en oS X al empotrar un script en un convertidor de archivo que se encuentra en varios sitios que venden apps para MAC.<\/p>\n<p>&#8220;Este tipo de malware es especialmente peligroso ya que es dificil de detectar y ofrece a los atacantes control total sobre el sistema comprometido&#8221; dice Tiberius Axinte, lider t\u00e9nico en Bitdefender. &#8220;Alguien puede bloquear tu computadora oblig\u00e1ndose a pagar para restaurar tus archivos privados o convirtiendo tu laptop en parte de una botnet para atacar otros dispositivos. Las posibilidades son infinitas&#8221;.<\/p>\n<p>Los investigadores de bitdefender encontraron el malware en un convertidor llamado &#8220;EasyDoc Converter&#8221; que es una app en la que arrastras un archivo para convertirlo, pero en realidad descarga el script malicioso en la maquina.<\/p>\n<p>Backdoor.MAC.Eleanor crea una direcci\u00f3n TOR en las m\u00e1quinas infectadas, permitiendo a los atacantes conectarse y obtener control total sobre el sistema. Tambi\u00e9n puede capturar im\u00e1genes o videos gracias a la camara web.<\/p>\n<p>Dado que esta app no ha sido firmada por Apple, los investigadores recomiendan cambiar las preferencias de la Mac para que solo apps firmadas o descargadas desde la App Store puedan ser instaladas en nuestro sistema.<\/p>\n<div class=\"ctx-social-container ctx-clearfix ctx_default_placement\"><\/div>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_9208\" class=\"pvc_stats all  \" data-element-id=\"9208\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>De nueva cuenta hay un malware que puede afectar a tu Mac, tomando control de tus sistema operativo. El nuevo Malware &#8220;Backdoor.Mac.Eleanor&#8221; permite a los atacantes abrir una puerta trasera en oS X al empotrar un script en un convertidor de archivo que se encuentra en varios sitios que venden apps para MAC. &#8220;Este tipo&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_9208\" class=\"pvc_stats all  \" data-element-id=\"9208\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":9210,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[37],"tags":[222,536,58],"class_list":["post-9208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-apple","tag-backdoor","tag-os-x"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/Bitdefender-780x521.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-2ow","jetpack-related-posts":[{"id":9830,"url":"https:\/\/la-uno.com\/blog\/2017\/01\/19\/nuevo-malware-en-macos-tambien-podria-afectar-linux\/","url_meta":{"origin":9208,"position":0},"title":"Nuevo Malware en macOS, tambi\u00e9n podr\u00eda afectar Linux.","author":"marco","date":"January 19, 2017","format":false,"excerpt":"Un nuevo malware ataca a mac OS, contiene c\u00f3digo que captura imagenes de la pantalla y d ela webcam, as\u00ed como informaci\u00f3n acerca de los dispositivos conectados en la misma red que la Mac infectada, y puede entonces, conectarse con esos otros dispositivos seg\u00fan Malwarebytes. El Malware fue descubierto apenas\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/01\/mac_malware.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/01\/mac_malware.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/01\/mac_malware.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5714,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/21\/inception-malware-de-pelicula\/","url_meta":{"origin":9208,"position":1},"title":"Inception, malware \u201cde pel\u00edcula\u201d","author":"marco","date":"December 21, 2014","format":false,"excerpt":"Malware por aqu\u00ed, malware por all\u00e1, muy constantes son las apariciones de estos c\u00f3digos da\u00f1inos, conocidos por ser programas que tienen como \u00fanico prop\u00f3sito el da\u00f1ar nuestro ordenador o para simplemente espiar al usuario llevando la cuenta desde que iniciamos en \u00e9l, las p\u00e1ginas que visitamos, siguiendo toda la rutina\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":8241,"url":"https:\/\/la-uno.com\/blog\/2015\/08\/11\/hackeando-dropbox-google-drive-onedrive-y-otros-sin-necesidad-de-saber-nombre-de-usuario-y-contrasena\/","url_meta":{"origin":9208,"position":2},"title":"Hackeando Dropbox, Google Drive, OneDrive y otros sin necesidad de saber nombre de usuario y contrase\u00f1a.","author":"marco","date":"August 11, 2015","format":false,"excerpt":"\u00a0\u00a0 La compa\u00f1\u00eda Imperva ha mostrado un gran fallo de seguridad en Dropbox, GoogleDrive, OneDrive y otros servicios de almacenamiento en la nube que permite al atacante tener acceso a los archivos e incluso instalar malware sin siquiera tener el nombre de usuario y contrase\u00f1a. El problema de seguridad se\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/08\/IMG_0553.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/08\/IMG_0553.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/08\/IMG_0553.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5353,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/27\/canonical-presenta-snappy-ubuntu-core\/","url_meta":{"origin":9208,"position":3},"title":"Canonical presenta Snappy Ubuntu Core","author":"marco","date":"December 27, 2014","format":false,"excerpt":"Canonical ha presentado a Snappy Ubuntu Core, un nuevo Spin de Ubuntu que se une al mont\u00f3n de sabores que ya tiene, oficiales y no oficiales. Snappy Ubuntu Core es un subset de elementos de Ubuntu, algo muy minimalista pero que se caracteriza por no utilizar apt-get para realizar actualizaciones\u2026","rel":"","context":"In &quot;Linux&quot;","block_context":{"text":"Linux","link":"https:\/\/la-uno.com\/blog\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/snappy-ubuntu.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/snappy-ubuntu.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/snappy-ubuntu.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/snappy-ubuntu.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5395,"url":"https:\/\/la-uno.com\/blog\/2015\/01\/09\/thunderstrike-el-boot-kit-que-apple-no-puede-eliminar\/","url_meta":{"origin":9208,"position":4},"title":"Thunderstrike,  el boot kit que Apple no puede eliminar","author":"marco","date":"January 9, 2015","format":false,"excerpt":"OS X siempre ha sido anunciado como el sistema operativo mas avanzado del mundo, y siendo honestos es en mi opini\u00f3n el mejor, claro, todo depende de para que lo usas y de las herramientas que usas en tu dia a dia, pero siendo un poco mas t\u00e9cnicos OS X\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/shutterstock_209983375-680x400.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/shutterstock_209983375-680x400.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/shutterstock_209983375-680x400.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5890,"url":"https:\/\/la-uno.com\/blog\/2015\/02\/13\/nadie-es-inmune\/","url_meta":{"origin":9208,"position":5},"title":"Nadie es inmune","author":"marco","date":"February 13, 2015","format":false,"excerpt":"Aunque Linux es un sistema minoritario en cuanto a computadoras personales para las empresas resulta una mejor alternativa, el 92.4% de los ordenadores m\u00e1s r\u00e1pidos del planeta ejecutan GNU\/Linux, y los riesgos a los que se enfrenta Windows en cuanto a seguridad puede que no est\u00e9n muy lejos. Y es\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/IMG_1076-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/IMG_1076-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/IMG_1076-1.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/9208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=9208"}],"version-history":[{"count":2,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/9208\/revisions"}],"predecessor-version":[{"id":9211,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/9208\/revisions\/9211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/9210"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=9208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=9208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=9208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}