{"id":26526,"date":"2022-04-19T15:56:00","date_gmt":"2022-04-19T13:56:00","guid":{"rendered":"https:\/\/perseus.de\/ransomware-de-doble-extorsion\/"},"modified":"2026-03-30T09:53:59","modified_gmt":"2026-03-30T07:53:59","slug":"ransomware-de-doble-extorsion","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/","title":{"rendered":"Ransomware de doble extorsi\u00f3n"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26526\" class=\"elementor elementor-26526 elementor-22223\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ransomware de doble extorsi\u00f3n\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25825\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f71efbf e-flex e-con-boxed e-con e-parent\" data-id=\"5f71efbf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c91c3b4 e-con-full e-flex e-con e-child\" data-id=\"6c91c3b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Extorsi\u00f3n doble se traduce en \u00abextorsi\u00f3n doble\u00bb. Esto no implica necesariamente m\u00faltiples chantajes, sino que los ciberdelincuentes utilizan varios medios de presi\u00f3n para su chantaje. <\/p><p>Con el ransomware que ha sido com\u00fan hasta ahora, normalmente existe una forma de ejercer presi\u00f3n: los datos de un ordenador, red o sistema est\u00e1n cifrados. Se exige un rescate para el descifrado. <\/p><p>En el caso del ransomware Double Extortion, los ciberdelincuentes a\u00f1aden m\u00e1s ventaja para hacer que el pago del rescate sea lo m\u00e1s inevitable posible para la empresa chantajeada.<\/p><h4> <\/h4><h4>\u00bfQu\u00e9 significa Doble Extorsi\u00f3n en detalle?<\/h4><p><span style=\"font-size: 1rem;\">Con el ransomware de doble extorsi\u00f3n, los ciberdelincuentes pueden usar diferentes medios de presi\u00f3n:<\/span><\/p><p><span style=\"font-size: 1rem;\"> <\/span><\/p><ul><li>Datos sensibles como informaci\u00f3n personal o secretos de la empresa. Los ciberdelincuentes copian estos datos antes de cifrar el sistema. Si el rescate no se materializa, entonces amenazan con publicar estos datos o subastarlo en la darknet.  <\/li><li>Ataques DDoS que los ciberdelincuentes utilizan para dejar inutilizable la p\u00e1gina web de la empresa chantajeada.<\/li><li>Las violaciones de la normativa por parte de la empresa detectadas por los ciberdelincuentes, como el RGPD. Entonces, las demandas de rescate suelen estar por debajo de la multa esperada. <\/li><\/ul><h3> <\/h3><h4>\u00bfD\u00f3nde encuentro el ransomware de doble extorsi\u00f3n en la vida diaria?<\/h4><p>Ya sea ransomware o ransomware de doble extorsi\u00f3n, los ciberdelincuentes suelen intentar colocar el malware correspondiente a trav\u00e9s de correos electr\u00f3nicos de phishing. As\u00ed que, si reconoces un correo as\u00ed, puede que acabes de defenderte de un ataque de Doble Extorsi\u00f3n y Ransomware. <\/p><p>Sin embargo, incluso sin ninguna acci\u00f3n por tu parte, a\u00fan podr\u00edas verse afectado por el ransomware de doble extorsi\u00f3n. Por ejemplo, el gran ciberataque en Mediamarktsaturn en 2021 fue llevado a cabo por ciberdelincuentes conocidos por el Ransomware de Doble Extorsi\u00f3n. En tales casos, se pueden publicar datos de los clientes de la empresa en cuesti\u00f3n. Sin embargo, hasta donde sabemos, esto no fue as\u00ed tras el ciberataque mencionado.   <\/p><h4> <\/h4><h4>\u00bfQu\u00e9 puedo hacer para mejorar mi seguridad?<\/h4><p>Los ciberdelincuentes utilizan diferentes vectores de ataque para el ransomware de doble extorsi\u00f3n. Estos incluyen correos electr\u00f3nicos de phishing, ataques de fuerza bruta al acceso remoto a la red corporativa y credenciales compradas en la dark web a redes que ya han sido comprometidas. Muchos, pero no todos, de estos ataques pueden prevenirse.  <\/p><p>Por ello, recomendamos una estrategia de protecci\u00f3n de dos frentes: por un lado, frustrar ataques exitosos (prevenci\u00f3n) y, por otro, limitar el da\u00f1o en caso de ataques exitosos (respuesta).<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6508b4e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6508b4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware de doble extorsi\u00f3n Extorsi\u00f3n doble se traduce en \u00abextorsi\u00f3n doble\u00bb. Esto no implica necesariamente m\u00faltiples chantajes, sino que los ciberdelincuentes utilizan varios medios de presi\u00f3n para su chantaje. Con el ransomware que ha sido com\u00fan hasta ahora, normalmente existe una forma de ejercer presi\u00f3n: los datos de un ordenador, red o sistema est\u00e1n cifrados. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-26526","post","type-post","status-publish","format-standard","hentry","category-ciberlexico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware de doble extorsi\u00f3n - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware de doble extorsi\u00f3n - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ransomware de doble extorsi\u00f3n Extorsi\u00f3n doble se traduce en \u00abextorsi\u00f3n doble\u00bb. Esto no implica necesariamente m\u00faltiples chantajes, sino que los ciberdelincuentes utilizan varios medios de presi\u00f3n para su chantaje. Con el ransomware que ha sido com\u00fan hasta ahora, normalmente existe una forma de ejercer presi\u00f3n: los datos de un ordenador, red o sistema est\u00e1n cifrados. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:53:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Ransomware de doble extorsi\u00f3n\",\"datePublished\":\"2022-04-19T13:56:00+00:00\",\"dateModified\":\"2026-03-30T07:53:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/\"},\"wordCount\":442,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Ciberl\u00e9xico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/\",\"name\":\"Ransomware de doble extorsi\u00f3n - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:56:00+00:00\",\"dateModified\":\"2026-03-30T07:53:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ransomware-de-doble-extorsion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware de doble extorsi\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware de doble extorsi\u00f3n - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/","og_locale":"es_ES","og_type":"article","og_title":"Ransomware de doble extorsi\u00f3n - Perseus Technologies","og_description":"Ransomware de doble extorsi\u00f3n Extorsi\u00f3n doble se traduce en \u00abextorsi\u00f3n doble\u00bb. Esto no implica necesariamente m\u00faltiples chantajes, sino que los ciberdelincuentes utilizan varios medios de presi\u00f3n para su chantaje. Con el ransomware que ha sido com\u00fan hasta ahora, normalmente existe una forma de ejercer presi\u00f3n: los datos de un ordenador, red o sistema est\u00e1n cifrados. [&hellip;]","og_url":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:56:00+00:00","article_modified_time":"2026-03-30T07:53:59+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Ransomware de doble extorsi\u00f3n","datePublished":"2022-04-19T13:56:00+00:00","dateModified":"2026-03-30T07:53:59+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/"},"wordCount":442,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Ciberl\u00e9xico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/","url":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/","name":"Ransomware de doble extorsi\u00f3n - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:56:00+00:00","dateModified":"2026-03-30T07:53:59+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/ransomware-de-doble-extorsion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Ransomware de doble extorsi\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=26526"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26526\/revisions"}],"predecessor-version":[{"id":26527,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26526\/revisions\/26527"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=26526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=26526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=26526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}