{"id":1444,"date":"2016-10-24T09:45:16","date_gmt":"2016-10-24T12:45:16","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=1444"},"modified":"2016-10-24T09:45:16","modified_gmt":"2016-10-24T12:45:16","slug":"alguien-ha-convertido-a-la-internet-de-las-cosas-en-un-arma","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=1444","title":{"rendered":"Alguien ha convertido a la Internet de las cosas en un arma"},"content":{"rendered":"<p>La interrupci\u00f3n de Internet del viernes 21 oct podr\u00eda ser una muestra de lo que est\u00e1 por venir cuando naciones y actores no estatales dejan de utilizar la web y comienzan a atacarla.<!--more--><\/p>\n<div class=\"text d1-article-content\">\n<p><strong><img loading=\"lazy\" class=\" alignright\" title=\"The first, and worst, attack was resolved by 9:20 a.m. EDT on Oct. 22, but disruptions continued throughout the day. Twitter, for example, was still experiencing outages at 4 p.m.\" src=\"http:\/\/cdn.defenseone.com\/media\/img\/upload\/2016\/10\/22\/Screenshot_2016-10-21_23.10.02\/defense-large.png\" alt=\"The first, and worst, attack was resolved by 9:20 a.m. EDT on Oct. 22, but disruptions continued throughout the day. Twitter, for example, was still experiencing outages at 4 p.m.\" width=\"352\" height=\"161\" \/>Like poor John Hurt\u2019s character in <\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=LsD6AL3HJtM\"><em>Alien<\/em><\/a>, the internet is infected with a monster that turned on its host. Instead of using the network to send propaganda videos, or dump emails, or destroy centrifuges, Friday\u2019s attack <a href=\"http:\/\/gizmodo.com\/this-is-probably-why-half-the-internet-shut-down-today-1788062835\">harnessed<\/a> thousands of connected devices to take down parts of the internet\u00a0itself.<\/p>\n<p>The basic pattern of a DDoS attack is nothing new: an attacker uses malware to recruit internet-connected computers into a globe-girdling robot army, which upon command overwhelm their target with unwanted requests. What\u2019s changing is the tremendous growth in the Internet of Things, or <span class=\"caps\">IOT<\/span>, the devices \u2014 from PCs to home routers to smart refrigerators \u2014 that we attach to the net. Far too many of these are installed with widely known factory-default passwords or other vulnerabilities, making them easy recruits for bot\u00a0armies.<\/p>\n<p>\u201cThe volume of DDoS attacks has more than doubled over the last 18 months. It\u2019s now approaching 650 gigabytes a second. That\u2019s only possible because they\u2019ve been recruiting <span class=\"caps\">IOT<\/span> devices,\u201d said one government official with direct knowledge of the attack. \u201cWe need to have a deliberative conversation about baking in security as much as possible into Internet of Things\u00a0devices.\u201d<\/p>\n<p>On Friday, at a signal from an as-yet-unknown party, thousands of internet-connected devices began sending waves of data at <a href=\"http:\/\/venturebeat.com\/2016\/10\/21\/dyn-dyn-dyn-internet-ddos-attack-back-up\/\">Dyn<\/a>, one of the domain name server, or <span class=\"caps\">DNS<\/span>, companies that link the internet\u2019s backbone to the human-readable web. <a href=\"http:\/\/gizmodo.com\/this-is-probably-why-half-the-internet-shut-down-today-1788062835\">Hundreds of websites<\/a>, including Twitter, the <em>New York Times<\/em>, Reddit and Amazon, went down for\u00a0hours.<\/p>\n<\/div>\n<p><strong>Fuente:<\/strong> <em><a href=\"http:\/\/www.defenseone.com\/threats\/2016\/10\/someone-weaponized-internet-things\/132553\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.defenseone.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La interrupci\u00f3n de Internet del viernes 21 oct podr\u00eda ser una muestra de lo que est\u00e1 por venir cuando naciones y actores no estatales dejan&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1444"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1444"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1444\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}