{"id":112667,"date":"2022-04-11T08:10:00","date_gmt":"2022-04-11T06:10:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=112667"},"modified":"2022-03-14T11:12:03","modified_gmt":"2022-03-14T10:12:03","slug":"linux-based-systems-in-sight","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/linux-basierte-systeme-im-visier\/","title":{"rendered":"Dirigido a sistemas basados en Linux"},"content":{"rendered":"<p>Al ser el sistema operativo en la nube m\u00e1s ampliamente desplegado, Linux es una parte central de la infraestructura digital y se est\u00e1 convirtiendo r\u00e1pidamente en el billete de entrada de un atacante a un entorno multi-nube. VMware ha publicado un informe sobre amenazas titulado \"Exposing Malware in Linux-Based Multi-Cloud Environments\", que describe, entre otras cosas, c\u00f3mo los ciberdelincuentes utilizan el malware para atacar los sistemas operativos basados en Linux. El ransomware se est\u00e1 convirtiendo cada vez m\u00e1s en un objetivo en las im\u00e1genes de host utilizadas para ejecutar cargas de trabajo en entornos virtualizados. El 89% de los ataques de cryptojacking utilizan bibliotecas relacionadas con XMRig, y m\u00e1s de la mitad de los usuarios de Cobalt Strike podr\u00edan ser ciberdelincuentes o, al menos, estar utilizando Cobalt Strike ilegalmente. A medida que el malware dirigido a sistemas operativos basados en Linux aumenta tanto en volumen como en sofisticaci\u00f3n en un panorama de amenazas que cambia r\u00e1pidamente, las organizaciones deben dar mayor prioridad a la detecci\u00f3n de amenazas. Las amenazas m\u00e1s comunes para los sistemas operativos basados en Linux en entornos multicloud: Ransomware, Cryptominers y Herramientas de acceso remoto.<\/p>","protected":false},"excerpt":{"rendered":"<p>Las contramedidas actuales contra el malware tienden a centrarse en las amenazas basadas en Windows, lo que convierte a las cargas de trabajo basadas en Linux en objetivos f\u00e1ciles.<\/p>","protected":false},"author":38,"featured_media":112669,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40469],"tags":[67,3862,5207,306],"coauthors":[19920],"class_list":["post-112667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-03","tag-linux","tag-ransomware","tag-sapanoptikum","tag-vmware","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Aktuelle Malware-Gegenma\u00dfnahmen konzentrieren sich meist auf Windows-basierte Bedrohungen, wodurch Linux-basierte Workloads zum leichten Ziel werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/category\/mag-22-03\/\" rel=\"category tag\">Mag 22-03<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/112667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=112667"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/112667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/112669"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=112667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=112667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=112667"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=112667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}