{"id":1068,"date":"2010-08-16T12:10:02","date_gmt":"2010-08-16T12:10:02","guid":{"rendered":"http:\/\/soi57.net\/blog\/?p=1068"},"modified":"2010-08-16T12:10:02","modified_gmt":"2010-08-16T12:10:02","slug":"analisis-forense-del-troyano-para-android","status":"publish","type":"post","link":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/","title":{"rendered":"Analisis forense del troyano para Android"},"content":{"rendered":"<p>El t\u00edtulo es de co\u00f1a. Para desmitificar el gran riesgo del nuevo troyano\/virus descubierto para android por alguna firma de antivirus, pasamos a explicar las posibles consecuencias de este software, explicadas no por mi, si no por <strong><a href=\"http:\/\/twitter.com\/jonoberheide\" target=\"_blank\">Jon Oberheide<\/a> <\/strong>(experto en seguridad)<\/p>\n<p>En primer lugar hay que recordar que este .apk pide permisos para enviar mensajes. No todos los usuarios van a entender que un software para reproducir pel\u00edculas no necesita de estos permisos, pero para los dem\u00e1s usuarios advertir que hay que tener cuidado con los permisos que se le dan a las aplicaciones que instalamos.<\/p>\n<ul>\n<li>Parece que este software es un trabajo amateur para crear tr\u00e1fico a un n\u00famero premium.<\/li>\n<li>Si no estas un una red rusa, es dif\u00edcil que tu operador te deje enviar un sms a un n\u00famero premium de un operador ruso.<\/li>\n<li>La aplicaci\u00f3n no se puede extender contagiando a otros tel\u00e9fonos, tiene que instalarlo el usuario conscientemente.<\/li>\n<\/ul>\n<p>Este es el da\u00f1o que puede hacer este virus instalado en tu tel\u00e9fono que como vemos que es bastante inofensivo si no est\u00e1s en una red rusa. Pero no deja de ser un buen momento para que nos paremos a pensar que es importante leer las advertencias sobre los permisos que se conceden a las aplicaciones que instalamos en nuestros Androids y si vemos que estos son incoherentes, es mejor no instalar la aplicaci\u00f3n.<\/p>\n<div style='text-align:left' class='yasr-auto-insert-visitor'><\/div>","protected":false},"excerpt":{"rendered":"<p>El t\u00edtulo es de co\u00f1a. Para desmitificar el gran riesgo del nuevo troyano\/virus descubierto para android por alguna firma de antivirus, pasamos a explicar las posibles consecuencias de este software, &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[801],"tags":[],"class_list":["post-1068","post","type-post","status-publish","format-standard","hentry","category-no-index"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analisis forense del troyano para Android<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analisis forense del troyano para Android\" \/>\n<meta property=\"og:description\" content=\"El t\u00edtulo es de co\u00f1a. Para desmitificar el gran riesgo del nuevo troyano\/virus descubierto para android por alguna firma de antivirus, pasamos a explicar las posibles consecuencias de este software, &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Android, administracion de sistemas y seo\" \/>\n<meta property=\"article:published_time\" content=\"2010-08-16T12:10:02+00:00\" \/>\n<meta name=\"author\" content=\"root\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\"},\"author\":{\"name\":\"root\",\"@id\":\"https:\/\/soi57.net\/blog\/#\/schema\/person\/9410e0a8d6f61a74f9f82f2229ab79d7\"},\"headline\":\"Analisis forense del troyano para Android\",\"datePublished\":\"2010-08-16T12:10:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\"},\"wordCount\":248,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/soi57.net\/blog\/#organization\"},\"articleSection\":[\"No Index\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\",\"url\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\",\"name\":\"Analisis forense del troyano para Android\",\"isPartOf\":{\"@id\":\"https:\/\/soi57.net\/blog\/#website\"},\"datePublished\":\"2010-08-16T12:10:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/soi57.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analisis forense del troyano para Android\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/soi57.net\/blog\/#website\",\"url\":\"https:\/\/soi57.net\/blog\/\",\"name\":\"Android, administracion de sistemas y seo\",\"description\":\"soi57.net\/blog\",\"publisher\":{\"@id\":\"https:\/\/soi57.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/soi57.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/soi57.net\/blog\/#organization\",\"name\":\"Soi57.Net\",\"url\":\"https:\/\/soi57.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/soi57.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/soi57.net\/blog\/wp-content\/logo_soi57.net_half.jpg\",\"contentUrl\":\"https:\/\/soi57.net\/blog\/wp-content\/logo_soi57.net_half.jpg\",\"width\":342,\"height\":77,\"caption\":\"Soi57.Net\"},\"image\":{\"@id\":\"https:\/\/soi57.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/soi57.net\/blog\/#\/schema\/person\/9410e0a8d6f61a74f9f82f2229ab79d7\",\"name\":\"root\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/soi57.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e87f10096d6c8f82a9bc2ddc0f3a223?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e87f10096d6c8f82a9bc2ddc0f3a223?s=96&d=mm&r=g\",\"caption\":\"root\"},\"sameAs\":[\"http:\/\/soi57.net\"]},false]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analisis forense del troyano para Android","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/","og_locale":"es_ES","og_type":"article","og_title":"Analisis forense del troyano para Android","og_description":"El t\u00edtulo es de co\u00f1a. Para desmitificar el gran riesgo del nuevo troyano\/virus descubierto para android por alguna firma de antivirus, pasamos a explicar las posibles consecuencias de este software, &hellip;","og_url":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/","og_site_name":"Android, administracion de sistemas y seo","article_published_time":"2010-08-16T12:10:02+00:00","author":"root","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#article","isPartOf":{"@id":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/"},"author":{"name":"root","@id":"https:\/\/soi57.net\/blog\/#\/schema\/person\/9410e0a8d6f61a74f9f82f2229ab79d7"},"headline":"Analisis forense del troyano para Android","datePublished":"2010-08-16T12:10:02+00:00","mainEntityOfPage":{"@id":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/"},"wordCount":248,"commentCount":0,"publisher":{"@id":"https:\/\/soi57.net\/blog\/#organization"},"articleSection":["No Index"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/","url":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/","name":"Analisis forense del troyano para Android","isPartOf":{"@id":"https:\/\/soi57.net\/blog\/#website"},"datePublished":"2010-08-16T12:10:02+00:00","breadcrumb":{"@id":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/soi57.net\/blog\/analisis-forense-del-troyano-para-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/soi57.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Analisis forense del troyano para Android"}]},{"@type":"WebSite","@id":"https:\/\/soi57.net\/blog\/#website","url":"https:\/\/soi57.net\/blog\/","name":"Android, administracion de sistemas y seo","description":"soi57.net\/blog","publisher":{"@id":"https:\/\/soi57.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/soi57.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/soi57.net\/blog\/#organization","name":"Soi57.Net","url":"https:\/\/soi57.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/soi57.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/soi57.net\/blog\/wp-content\/logo_soi57.net_half.jpg","contentUrl":"https:\/\/soi57.net\/blog\/wp-content\/logo_soi57.net_half.jpg","width":342,"height":77,"caption":"Soi57.Net"},"image":{"@id":"https:\/\/soi57.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/soi57.net\/blog\/#\/schema\/person\/9410e0a8d6f61a74f9f82f2229ab79d7","name":"root","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/soi57.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6e87f10096d6c8f82a9bc2ddc0f3a223?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e87f10096d6c8f82a9bc2ddc0f3a223?s=96&d=mm&r=g","caption":"root"},"sameAs":["http:\/\/soi57.net"]},false]}},"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/posts\/1068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/comments?post=1068"}],"version-history":[{"count":2,"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/posts\/1068\/revisions"}],"predecessor-version":[{"id":1070,"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/posts\/1068\/revisions\/1070"}],"wp:attachment":[{"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/media?parent=1068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/categories?post=1068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/soi57.net\/blog\/wp-json\/wp\/v2\/tags?post=1068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}