{"id":8198,"date":"2017-11-16T12:39:18","date_gmt":"2017-11-16T12:39:18","guid":{"rendered":"https:\/\/www.apen.es\/?p=8198"},"modified":"2025-03-04T10:20:11","modified_gmt":"2025-03-04T10:20:11","slug":"una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/","title":{"rendered":"A fake Adobe update that could become the new ransomware"},"content":{"rendered":"<p>It&#039;s called BadRabbit and experts detect many similarities with NotPetya, the epidemic that attacked hundreds of organizations last June, which was more dangerous and sophisticated than the already popular WannaCry, although it uses the same vulnerability.<\/p>\n\n\n\n<p>In late October, the Russian news outlet Interfax reported that its servers were inoperable due to a cyberattack. A few hours later, after journalists were forced to publish the news on Facebook, the Russian cybersecurity firm Group-IB shared a screenshot of a new&nbsp;<a href=\"https:\/\/elpais.com\/tag\/virus_informaticos\/a\/\"><em>ransomware<\/em><\/a>&nbsp;in action called BadRabbit and confirmed that there were at least three other media outlets that were also victims of this attack.<\/p>\n\n\n\n<p>BadRabbit aims to demand a ransom in exchange for recovering the data encrypted by the malware. It uses the same strategy as other well-known large-scale cyberattacks such as WannaCry and NotPetya.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"340\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/laptop-2450220__340.jpg\" alt=\"\" class=\"wp-image-8201\" srcset=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/laptop-2450220__340.jpg 510w, https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/laptop-2450220__340-300x200.jpg 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/figure>\n\n\n\n<p>BadRabbit also encrypts files and demands a ransom to be paid into a Bitcoin wallet, supposedly controlled by the cybercriminals. However, unlike NotPetya, this new cyberattack does allow for file recovery because each victim is offered a different Bitcoin wallet, making it more difficult to trace.<\/p>\n\n\n\n<p>The number of infections caused by BadRabbit is lower than that caused by WannaCry or NotPetya, but on the other hand, its victims are top-level targets: airports, Ukrainian state institutions or metro stations, and Russian media outlets, etc.<\/p>\n\n\n\n<p>The ransomware spread through simple web downloads rather than a mass-propagated attack seeking vulnerable users and slipped onto computers, disguised as a routine Adobe Flash Player update, through Russian news websites.<\/p>\n\n\n\n<p>Once installed on the user&#039;s computer, the ransomware seeks to spread through the Windows network protocol (SMB), also using a tool capable of changing the privileges of the victim&#039;s computer within the local network and another to extract passwords from other computers in plain text.<\/p>","protected":false},"excerpt":{"rendered":"<p>It&#039;s called BadRabbit, and experts have detected many similarities with NotPetya, the epidemic that attacked hundreds of organizations...<\/p>","protected":false},"author":4,"featured_media":8199,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,147,66,256,194,88],"tags":[302,214,301,236],"class_list":["post-8198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-ciberataques","category-mantenimiento-informatico","category-ransomware","category-seguridad","category-web","tag-badrabbit","tag-ciberataque","tag-ciberataque-masivo","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Se llama BadRabbit y los expertos detectan muchas similitudes con NotPetya, la epidemia que atac\u00f3 a centenares de organizaciones el pasado mes de junio,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Se llama BadRabbit y los expertos detectan muchas similitudes con NotPetya, la epidemia que atac\u00f3 a centenares de organizaciones el pasado mes de junio,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-16T12:39:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T10:20:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware\",\"datePublished\":\"2017-11-16T12:39:18+00:00\",\"dateModified\":\"2025-03-04T10:20:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/\"},\"wordCount\":387,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/hare-1634313_640.jpg\",\"keywords\":[\"badrabbit\",\"ciberataque\",\"ciberataque masivo\",\"Ransomware\"],\"articleSection\":[\"Apen\",\"Ciberataques\",\"Mantenimiento inform\u00e1tico\",\"Ransomware\",\"Seguridad\",\"WEB\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/\",\"name\":\"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/hare-1634313_640.jpg\",\"datePublished\":\"2017-11-16T12:39:18+00:00\",\"dateModified\":\"2025-03-04T10:20:11+00:00\",\"description\":\"Se llama BadRabbit y los expertos detectan muchas similitudes con NotPetya, la epidemia que atac\u00f3 a centenares de organizaciones el pasado mes de junio,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/hare-1634313_640.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/11\\\/hare-1634313_640.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A fake Adobe update that could become the new ransomware - Apen Informatics","description":"It&#039;s called BadRabbit, and experts have detected many similarities with NotPetya, the epidemic that attacked hundreds of organizations last June.,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware - Apen Inform\u00e1tica","og_description":"Se llama BadRabbit y los expertos detectan muchas similitudes con NotPetya, la epidemia que atac\u00f3 a centenares de organizaciones el pasado mes de junio,","og_url":"https:\/\/www.apen.es\/en\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2017-11-16T12:39:18+00:00","article_modified_time":"2025-03-04T10:20:11+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware","datePublished":"2017-11-16T12:39:18+00:00","dateModified":"2025-03-04T10:20:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/"},"wordCount":387,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg","keywords":["badrabbit","ciberataque","ciberataque masivo","Ransomware"],"articleSection":["Apen","Ciberataques","Mantenimiento inform\u00e1tico","Ransomware","Seguridad","WEB"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/","url":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/","name":"A fake Adobe update that could become the new ransomware - Apen Informatics","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg","datePublished":"2017-11-16T12:39:18+00:00","dateModified":"2025-03-04T10:20:11+00:00","description":"It&#039;s called BadRabbit, and experts have detected many similarities with NotPetya, the epidemic that attacked hundreds of organizations last June.,","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/una-falsa-actualizacion-de-adobe-que-podria-convertirse-en-el-nuevo-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Una falsa actualizaci\u00f3n de Adobe que podr\u00eda convertirse en el nuevo ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":147,"label":"Ciberataques"},{"value":66,"label":"Mantenimiento inform\u00e1tico"},{"value":256,"label":"Ransomware"},{"value":194,"label":"Seguridad"},{"value":88,"label":"WEB"}],"post_tag":[{"value":302,"label":"badrabbit"},{"value":214,"label":"ciberataque"},{"value":301,"label":"ciberataque masivo"},{"value":236,"label":"Ransomware"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2017\/11\/hare-1634313_640.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":66,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":66,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","term_order":"0","cat_ID":66,"category_count":78,"category_description":"","cat_name":"Mantenimiento inform\u00e1tico","category_nicename":"mantenimiento-informatico","category_parent":0},{"term_id":256,"name":"Ransomware","slug":"ransomware","term_group":0,"term_taxonomy_id":256,"taxonomy":"category","description":"","parent":0,"count":6,"filter":"raw","term_order":"0","cat_ID":256,"category_count":6,"category_description":"","cat_name":"Ransomware","category_nicename":"ransomware","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0},{"term_id":88,"name":"WEB","slug":"web","term_group":0,"term_taxonomy_id":88,"taxonomy":"category","description":"","parent":0,"count":121,"filter":"raw","term_order":"0","cat_ID":88,"category_count":121,"category_description":"","cat_name":"WEB","category_nicename":"web","category_parent":0}],"tag_info":[{"term_id":302,"name":"badrabbit","slug":"badrabbit","term_group":0,"term_taxonomy_id":302,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":214,"name":"ciberataque","slug":"ciberataque","term_group":0,"term_taxonomy_id":214,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw","term_order":"0"},{"term_id":301,"name":"ciberataque masivo","slug":"ciberataque-masivo","term_group":0,"term_taxonomy_id":301,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":236,"name":"Ransomware","slug":"ransomware","term_group":0,"term_taxonomy_id":236,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=8198"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8198\/revisions"}],"predecessor-version":[{"id":54070,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8198\/revisions\/54070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/8199"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=8198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=8198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=8198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}