{"id":11192,"date":"2016-10-25T14:49:56","date_gmt":"2016-10-25T12:49:56","guid":{"rendered":"https:\/\/callidusprolab.com\/smartfense\/phishing-super-ingenioso-a-traves-de-google-docs\/"},"modified":"2024-05-30T12:55:53","modified_gmt":"2024-05-30T10:55:53","slug":"phishing-super-ingenioso-a-traves-de-google-docs","status":"publish","type":"post","link":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/","title":{"rendered":"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs"},"content":{"rendered":"<h2>Introducci\u00f3n<\/h2>\n<p>D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa modalidad utilizada por el delincuente, la cual merece el an\u00e1lisis que se muestra a continuaci\u00f3n.<\/p>\n<h2>Autopsia del sencillo e ingenioso ataque<\/h2>\n<p>Los pasos que sigui\u00f3 el ciberdelincuente fueron los siguientes:<\/p>\n<p><b>1)\u00a0<\/b><b>Crear una cuenta de Google.<\/b>\u00a0No es importante la direcci\u00f3n en s\u00ed. Lo importante es utilizar el nombre y apellido de la persona que se desea suplantar, por ejemplo\u00a0<b>el CEO de una organizaci\u00f3n<\/b>. Tambi\u00e9n se puede colocar luego una foto de perfil de la persona, la cual se puede conseguir en cualquier red social sin mayores problemas.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-23081 size-full\" src=\"https:\/\/smartfense.com\/file\/2016\/10\/crear-cuenta-google.png\" alt=\"\" width=\"1136\" height=\"920\" srcset=\"https:\/\/smartfense.com\/file\/2016\/10\/crear-cuenta-google.png 1136w, https:\/\/smartfense.com\/file\/2016\/10\/crear-cuenta-google-300x243.png 300w, https:\/\/smartfense.com\/file\/2016\/10\/crear-cuenta-google-1024x829.png 1024w, https:\/\/smartfense.com\/file\/2016\/10\/crear-cuenta-google-768x622.png 768w\" sizes=\"(max-width: 1136px) 100vw, 1136px\" \/><\/p>\n<p><b>2) Crear un documento de Google Docs<\/b>\u00a0y dejar all\u00ed el texto del enga\u00f1o de Phishing.<\/p>\n<p><b>3) Dejar un comentario en el documento arrobando a la v\u00edctima<\/b>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-23087 size-full\" src=\"https:\/\/smartfense.com\/file\/2016\/10\/comentario-documento.png\" alt=\"\" width=\"1238\" height=\"482\" srcset=\"https:\/\/smartfense.com\/file\/2016\/10\/comentario-documento.png 1238w, https:\/\/smartfense.com\/file\/2016\/10\/comentario-documento-300x117.png 300w, https:\/\/smartfense.com\/file\/2016\/10\/comentario-documento-1024x399.png 1024w, https:\/\/smartfense.com\/file\/2016\/10\/comentario-documento-768x299.png 768w\" sizes=\"(max-width: 1238px) 100vw, 1238px\" \/><\/p>\n<p><b>4) Esperar que la v\u00edctima ingrese al enlace malicioso proporcionado.<\/b><\/p>\n<p><b>\u00a1As\u00ed de f\u00e1cil!<\/b><br \/>\n<b>\u00a0<\/b><\/p>\n<blockquote><p>Nota: El enlace malicioso puede formar parte del documento o del comentario.<\/p><\/blockquote>\n<h2>Delivery garantizado en bandeja de entrada<\/h2>\n<p>La v\u00edctima,\u00a0<b>recibir\u00e1 un correo con el comentario de Google Docs<\/b>, de manera similar a la siguiente captura:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-23092 size-full\" src=\"https:\/\/smartfense.com\/file\/2016\/10\/delivery.png\" alt=\"\" width=\"1242\" height=\"868\" srcset=\"https:\/\/smartfense.com\/file\/2016\/10\/delivery.png 1242w, https:\/\/smartfense.com\/file\/2016\/10\/delivery-300x210.png 300w, https:\/\/smartfense.com\/file\/2016\/10\/delivery-1024x716.png 1024w, https:\/\/smartfense.com\/file\/2016\/10\/delivery-768x537.png 768w, https:\/\/smartfense.com\/file\/2016\/10\/delivery-500x350.png 500w\" sizes=\"(max-width: 1242px) 100vw, 1242px\" \/><\/p>\n<p>Este correo, es altamente probable\u00a0<b>que ingrese directamente a la bandeja de entrada del usuario<\/b>. Est\u00e1 enviado desde los servidores de Google, firmado por Google, con todas las medidas de seguridad tomadas por Google en perfecto estado \ud83d\ude42<\/p>\n<blockquote><p><b><i>Authentication-Results: mx.google.com;<\/i><\/b><br \/>\n<i>\u00a0<\/i><br \/>\n<i><b>dkim=pass<\/b>\u00a0header.i=@docs.google.com header.s=20161025 header.b=&#8221;O\/rA7Zvo&#8221;;<\/i><br \/>\n<i>\u00a0<\/i><br \/>\n<i><b>spf=pass<\/b>\u00a0(google.com: domain of &#8212;@docos.bounces.google.com designates 209.85.220.77 as permitted sender) smtp.mailfrom=&#8212;@docos.bounces.google.com;<\/i><br \/>\n<i>\u00a0<\/i><br \/>\n<i><b>dmarc=pass<\/b>\u00a0(p=REJECT sp=REJECT dis=NONE) header.from=docs.google.com<\/i><\/p><\/blockquote>\n<h2>Suplantaci\u00f3n de identidad nivel Dios<\/h2>\n<p>Como podemos ver en la captura anterior, no se muestra en ning\u00fan lugar el correo electr\u00f3nico del remitente, \u00fanicamente\u00a0<b>su nombre, apellido y foto de perfil, totalmente editables en una cuenta de Google<\/b>.<\/p>\n<p>Adem\u00e1s,\u00a0<b>es posible colocar el asunto que se desee<\/b>\u00a0ya que es tomado desde el t\u00edtulo del documento.<\/p>\n<p>De hecho, ni siquiera es necesario que la v\u00edctima ingrese al documento por ning\u00fan motivo, ya que\u00a0<b>todo el contenido de inter\u00e9s ya se encuentra en el email recibido<\/b>.<\/p>\n<h2>Notificaciones PUSH directo al smartphone<\/h2>\n<p>Si la v\u00edctima posee la cuenta de correo electr\u00f3nico de Google configurada en su smartphone,\u00a0\u00a0<b>recibir\u00e1 adem\u00e1s el comentario en una notificaci\u00f3n PUSH<\/b>. Este tipo de notificaciones no muestran al usuario un nivel de detalle muy grande, por lo cual\u00a0\u00a0<b>aumentan las probabilidades de que el usuario termine ingresando en el documento malicioso<\/b>\u00a0al abrir la notificaci\u00f3n recibida.<\/p>\n<h2>\u00bfQui\u00e9n detecta esto?<\/h2>\n<p>Como podemos imaginar, el dominio de\u00a0<b>docs.google.com<\/b>\u00a0no caer\u00e1 en listas negras como\u00a0<i>Google Safe Browsing\u00a0<\/i>para que nuestros usuarios puedan estar protegidos.<\/p>\n<p>Lo m\u00e1ximo que ha hecho Google en el caso que me comparti\u00f3 mi compa\u00f1ero ha sido bloquear el ingreso al documento que conten\u00eda el enga\u00f1o:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23097 size-full\" src=\"https:\/\/smartfense.com\/file\/2016\/10\/deteccion.png\" alt=\"\" width=\"1252\" height=\"302\" srcset=\"https:\/\/smartfense.com\/file\/2016\/10\/deteccion.png 1252w, https:\/\/smartfense.com\/file\/2016\/10\/deteccion-300x72.png 300w, https:\/\/smartfense.com\/file\/2016\/10\/deteccion-1024x247.png 1024w, https:\/\/smartfense.com\/file\/2016\/10\/deteccion-768x185.png 768w\" sizes=\"(max-width: 1252px) 100vw, 1252px\" \/><\/p>\n<p>Pero esto no sirve de mucho,\u00a0<b>ya que el email sigue estando en bandeja de entrada con el contenido original intacto<\/b>.<\/p>\n<p>Probablemente, tampoco sea pr\u00e1ctico bloquearlo dentro de nuestra organizaci\u00f3n, y de todas maneras\u00a0<b>por fuera de la organizaci\u00f3n los usuarios podr\u00edan recibir igualmente el enga\u00f1o<\/b>.<\/p>\n<p>Como vimos, todos los registros SPF, DKIM y DMARC se encuentran perfectamente configurados, por lo cual\u00a0<b>los clientes de correo no lo van a bloquear<\/b>. Tampoco los sistemas Anti SPAM o similares. Ni hablar del Anti SPAM del propio Google.<\/p>\n<p>En mi opini\u00f3n,\u00a0<b>la mejor arma contra este tipo de casos<a href=\"https:\/\/smartfense.com\/plataforma\/herramientas-de-concientizacion-y-evaluacion\/\" target=\"_blank\" rel=\"noopener\">\u00a0es la concientizaci\u00f3n<\/a><\/b>. Un usuario concientizado respecto a este tipo de ataques, estar\u00e1 atento y podr\u00e1 detectarlos, reportarlos y prevenir convertirse en v\u00edctima de los ciberdelincuentes.<\/p>\n<p>\u00bfRecibiste un correo con estas caracter\u00edsticas?\u00a0<a href=\"https:\/\/antiphishing.la\/\" target=\"_blank\" rel=\"noopener\">Reportalo en Antiphishing.la<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa modalidad utilizada por el delincuente, la [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5910,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[198],"tags":[200],"class_list":["post-11192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-phishing-es-ar"],"acf":[],"yoast_head":" \n<title>Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs - SMARTFENSE - Concientizaci\u00f3n en ciberseguridad<\/title>\n<meta name=\"description\" content=\"phishing - Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs - SMARTFENSE - Concientizaci\u00f3n en ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"phishing - Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/\" \/>\n<meta property=\"og:site_name\" content=\"SMARTFENSE - Concientizaci\u00f3n en ciberseguridad\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-25T12:49:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T10:55:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartfense.com\/file\/2023\/07\/phising_ingenioso_google_docs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicol\u00e1s Bruna\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicol\u00e1s Bruna\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/\"},\"author\":{\"name\":\"Nicol\u00e1s Bruna\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#\\\/schema\\\/person\\\/5494c12e79213c554fa449135589c24c\"},\"headline\":\"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs\",\"datePublished\":\"2016-10-25T12:49:56+00:00\",\"dateModified\":\"2024-05-30T10:55:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/\"},\"wordCount\":660,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/phising_ingenioso_google_docs.jpg\",\"keywords\":[\"phishing\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"es-AR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/\",\"name\":\"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs - SMARTFENSE - Concientizaci\u00f3n en ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/phising_ingenioso_google_docs.jpg\",\"datePublished\":\"2016-10-25T12:49:56+00:00\",\"dateModified\":\"2024-05-30T10:55:53+00:00\",\"description\":\"phishing - Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#breadcrumb\"},\"inLanguage\":\"es-AR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/phising_ingenioso_google_docs.jpg\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/phising_ingenioso_google_docs.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/blog\\\/phishing-super-ingenioso-a-traves-de-google-docs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/concientizacion-en-ciberseguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#website\",\"url\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/\",\"name\":\"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-AR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#organization\",\"name\":\"SMARTFENSE\",\"url\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"width\":241,\"height\":40,\"caption\":\"SMARTFENSE\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/#\\\/schema\\\/person\\\/5494c12e79213c554fa449135589c24c\",\"name\":\"Nicol\u00e1s Bruna\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b03096bf4c3dd886cfcffd7415eadf6f80d2c8126188409e7d4d1d1b6b911fcb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b03096bf4c3dd886cfcffd7415eadf6f80d2c8126188409e7d4d1d1b6b911fcb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b03096bf4c3dd886cfcffd7415eadf6f80d2c8126188409e7d4d1d1b6b911fcb?s=96&d=mm&r=g\",\"caption\":\"Nicol\u00e1s Bruna\"},\"description\":\"Product Manager de SMARTFENSE. Su misi\u00f3n en la empresa es mejorar la plataforma d\u00eda a d\u00eda y evangelizar sobre la importancia de la concientizaci\u00f3n. Ha escrito dos whitepapers y m\u00e1s de 150 art\u00edculos sobre gesti\u00f3n del riesgo de la ingenier\u00eda social, creaci\u00f3n de culturas seguras y cumplimiento de normativas. Tambi\u00e9n es uno de los autores de la Gu\u00eda de Ransomware de OWASP y el Calculador de costos de Ransomware, entre otros recursos gratuitos.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nicolasbruna\\\/\"],\"url\":\"https:\\\/\\\/smartfense.com\\\/es-ar\\\/author\\\/nicolas\\\/\"}]}<\/script>\n ","yoast_head_json":{"title":"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs - SMARTFENSE - Concientizaci\u00f3n en ciberseguridad","description":"phishing - Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/","og_locale":"es_ES","og_type":"article","og_title":"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs - SMARTFENSE - Concientizaci\u00f3n en ciberseguridad","og_description":"phishing - Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa","og_url":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/","og_site_name":"SMARTFENSE - Concientizaci\u00f3n en ciberseguridad","article_published_time":"2016-10-25T12:49:56+00:00","article_modified_time":"2024-05-30T10:55:53+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/smartfense.com\/file\/2023\/07\/phising_ingenioso_google_docs.jpg","type":"image\/jpeg"}],"author":"Nicol\u00e1s Bruna","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Nicol\u00e1s Bruna","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#article","isPartOf":{"@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/"},"author":{"name":"Nicol\u00e1s Bruna","@id":"https:\/\/smartfense.com\/es-ar\/#\/schema\/person\/5494c12e79213c554fa449135589c24c"},"headline":"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs","datePublished":"2016-10-25T12:49:56+00:00","dateModified":"2024-05-30T10:55:53+00:00","mainEntityOfPage":{"@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/"},"wordCount":660,"commentCount":0,"publisher":{"@id":"https:\/\/smartfense.com\/es-ar\/#organization"},"image":{"@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2023\/07\/phising_ingenioso_google_docs.jpg","keywords":["phishing"],"articleSection":["Blog"],"inLanguage":"es-AR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/","url":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/","name":"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs - SMARTFENSE - Concientizaci\u00f3n en ciberseguridad","isPartOf":{"@id":"https:\/\/smartfense.com\/es-ar\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#primaryimage"},"image":{"@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2023\/07\/phising_ingenioso_google_docs.jpg","datePublished":"2016-10-25T12:49:56+00:00","dateModified":"2024-05-30T10:55:53+00:00","description":"phishing - Introducci\u00f3n D\u00edas antes de la fecha de publicaci\u00f3n de este post, un compa\u00f1ero de trabajo me reenvi\u00f3 una trampa de Phishing, destacando la ingeniosa","breadcrumb":{"@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#breadcrumb"},"inLanguage":"es-AR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/"]}]},{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#primaryimage","url":"https:\/\/smartfense.com\/file\/2023\/07\/phising_ingenioso_google_docs.jpg","contentUrl":"https:\/\/smartfense.com\/file\/2023\/07\/phising_ingenioso_google_docs.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/smartfense.com\/es-ar\/blog\/phishing-super-ingenioso-a-traves-de-google-docs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/smartfense.com\/es-ar\/concientizacion-en-ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Phishing s\u00faper ingenioso a trav\u00e9s de Google Docs"}]},{"@type":"WebSite","@id":"https:\/\/smartfense.com\/es-ar\/#website","url":"https:\/\/smartfense.com\/es-ar\/","name":"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad","description":"","publisher":{"@id":"https:\/\/smartfense.com\/es-ar\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartfense.com\/es-ar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-AR"},{"@type":"Organization","@id":"https:\/\/smartfense.com\/es-ar\/#organization","name":"SMARTFENSE","url":"https:\/\/smartfense.com\/es-ar\/","logo":{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/smartfense.com\/es-ar\/#\/schema\/logo\/image\/","url":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","contentUrl":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","width":241,"height":40,"caption":"SMARTFENSE"},"image":{"@id":"https:\/\/smartfense.com\/es-ar\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/smartfense.com\/es-ar\/#\/schema\/person\/5494c12e79213c554fa449135589c24c","name":"Nicol\u00e1s Bruna","image":{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/secure.gravatar.com\/avatar\/b03096bf4c3dd886cfcffd7415eadf6f80d2c8126188409e7d4d1d1b6b911fcb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b03096bf4c3dd886cfcffd7415eadf6f80d2c8126188409e7d4d1d1b6b911fcb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b03096bf4c3dd886cfcffd7415eadf6f80d2c8126188409e7d4d1d1b6b911fcb?s=96&d=mm&r=g","caption":"Nicol\u00e1s Bruna"},"description":"Product Manager de SMARTFENSE. Su misi\u00f3n en la empresa es mejorar la plataforma d\u00eda a d\u00eda y evangelizar sobre la importancia de la concientizaci\u00f3n. Ha escrito dos whitepapers y m\u00e1s de 150 art\u00edculos sobre gesti\u00f3n del riesgo de la ingenier\u00eda social, creaci\u00f3n de culturas seguras y cumplimiento de normativas. Tambi\u00e9n es uno de los autores de la Gu\u00eda de Ransomware de OWASP y el Calculador de costos de Ransomware, entre otros recursos gratuitos.","sameAs":["https:\/\/www.linkedin.com\/in\/nicolasbruna\/"],"url":"https:\/\/smartfense.com\/es-ar\/author\/nicolas\/"}]}},"_links":{"self":[{"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/posts\/11192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/comments?post=11192"}],"version-history":[{"count":3,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/posts\/11192\/revisions"}],"predecessor-version":[{"id":23100,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/posts\/11192\/revisions\/23100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/media\/5910"}],"wp:attachment":[{"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/media?parent=11192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/categories?post=11192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smartfense.com\/es-ar\/wp-json\/wp\/v2\/tags?post=11192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}