{"id":27911,"date":"2021-08-13T16:29:00","date_gmt":"2021-08-13T14:29:00","guid":{"rendered":"https:\/\/perseus.de\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/"},"modified":"2026-03-31T07:35:59","modified_gmt":"2026-03-31T05:35:59","slug":"los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/","title":{"rendered":"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27911\" class=\"elementor elementor-27911 elementor-22942\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27805\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>13.08.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Con la ayuda de una botnet (red de varios programas inform\u00e1ticos que realizan autom\u00e1ticamente e independientemente ciertas tareas), los dispositivos NAS Synology est\u00e1n siendo atacados actualmente. Intenta adivinar contrase\u00f1as e instalar malware. La seguridad de las contrase\u00f1as es crucial en este ataque.  <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El 9 de agosto, investigadores de seguridad de Synology en Taiw\u00e1n advirtieron a los clientes que la llamada botnet \u00ab<a href=\"https:\/\/www.synology.com\/en-global\/company\/news\/article\/BruteForce\/Synology\">StealthWorker<\/a>\u00bb hab\u00eda atacado sus productos de almacenamiento de datos, tambi\u00e9n conocidos como dispositivos de almacenamiento conectado a red (NAS). Con la ayuda de un ataque de fuerza bruta, se intenta acceder y cifrar los dispositivos objetivo. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfCu\u00e1les son los riesgos para mi negocio al atacar productos de Synology?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El ataque actual es un ataque de fuerza bruta. Normalmente se basan en adivinar datos de inicio de sesi\u00f3n. Los atacantes suelen usar una lista de contrase\u00f1as conocidas y comunes. Un software prueba todas las contrase\u00f1as de esta lista. Si se agota o uno de los intentos tiene \u00e9xito, la red cambia a otra cuenta. Los investigadores de seguridad de Synology han confirmado que no creen que el ataque en curso est\u00e9 relacionado con una vulnerabilidad existente en sus productos, sino que se trata de un ataque indiscriminado. El ataque supuestamente fue llevado a cabo por la botnet \u00abStealthWorker\u00bb. \u00abStealthWorker\u00bb apareci\u00f3 por primera vez en 2019 cuando se dirigi\u00f3 a negocios de comercio electr\u00f3nico de CMS. Synology emiti\u00f3 un comunicado diciendo que est\u00e1n trabajando con varios CERTs de todo el mundo para derribar la botnet.        <\/p><ol><li>Si no es posible aplicar parches inmediatos, Spring ha publicado soluciones alternativas para solucionar el problema por el momento<\/li><li>Para los administradores de TI: Aislar los sistemas afectados en una \u00abVLAN vulnerable\u00bb (Red de \u00c1rea Local Virtual).<\/li><li>Cuidado con cambios de configuraci\u00f3n no autorizados en todos los sistemas.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 puedo hacer?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si posees un dispositivo NAS Synology, sigue los pasos siguientes:<\/p>\n<ol>\n<li>Revisa la seguridad de tu contrase\u00f1a. Revisa tus datos de acceso y aseg\u00farate de que tu contrase\u00f1a no se use en otras cuentas, que sea \u00fanica y lo suficientemente compleja. Tambi\u00e9n puedes considerar usar un gestor de contrase\u00f1as.  <\/li>\n<li>Activa el bloqueo autom\u00e1tico y la protecci\u00f3n de cuenta. Puedes encontrar instrucciones paso a paso &nbsp;<a href=\"https:\/\/kb.synology.com\/en-global\/DSM\/help\/DSM\/AdminCenter\/connection_security_account?version=6\">Aqu\u00ed<\/a>.<\/li>\n<li>Si es posible, a\u00f1ade autenticaci\u00f3n en dos pasos a tu cuenta. Esta soluci\u00f3n te informa en cuanto alguien intenta iniciar sesi\u00f3n inesperadamente y comprueba tu autenticidad de otra manera, por ejemplo, por SMS. <\/li>\n<li>Synology ha emitido una instrucci\u00f3n adicional de protecci\u00f3n, que est\u00e1 disponible <a href=\"https:\/\/kb.synology.com\/en-us\/DSM\/tutorial\/How_to_add_extra_security_to_your_Synology_NAS\">aqu\u00ed<\/a> .<\/li>\n<\/ol>\n<p><br><\/p><p>Si tienes problemas para encontrar la soluci\u00f3n adecuada para tu dispositivo y eres cliente de Perseus, por favor cont\u00e1ctanos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>13.08.2021 Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n Con la ayuda de una botnet (red de varios programas inform\u00e1ticos que realizan autom\u00e1ticamente e independientemente ciertas tareas), los dispositivos NAS Synology est\u00e1n siendo atacados actualmente. Intenta adivinar contrase\u00f1as e instalar malware. La seguridad de las contrase\u00f1as [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":27910,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[66],"tags":[],"class_list":["post-27911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advertencia-de-peligro"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"13.08.2021 Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n Con la ayuda de una botnet (red de varios programas inform\u00e1ticos que realizan autom\u00e1ticamente e independientemente ciertas tareas), los dispositivos NAS Synology est\u00e1n siendo atacados actualmente. Intenta adivinar contrase\u00f1as e instalar malware. La seguridad de las contrase\u00f1as [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-13T14:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:35:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n\",\"datePublished\":\"2021-08-13T14:29:00+00:00\",\"dateModified\":\"2026-03-31T05:35:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/\"},\"wordCount\":491,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"articleSection\":[\"Advertencia de peligro\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/\",\"name\":\"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"datePublished\":\"2021-08-13T14:29:00+00:00\",\"dateModified\":\"2026-03-31T05:35:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/","og_locale":"es_ES","og_type":"article","og_title":"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n - Perseus Technologies","og_description":"13.08.2021 Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n Con la ayuda de una botnet (red de varios programas inform\u00e1ticos que realizan autom\u00e1ticamente e independientemente ciertas tareas), los dispositivos NAS Synology est\u00e1n siendo atacados actualmente. Intenta adivinar contrase\u00f1as e instalar malware. La seguridad de las contrase\u00f1as [&hellip;]","og_url":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/","og_site_name":"Perseus Technologies","article_published_time":"2021-08-13T14:29:00+00:00","article_modified_time":"2026-03-31T05:35:59+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n","datePublished":"2021-08-13T14:29:00+00:00","dateModified":"2026-03-31T05:35:59+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/"},"wordCount":491,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","articleSection":["Advertencia de peligro"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/","url":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/","name":"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","datePublished":"2021-08-13T14:29:00+00:00","dateModified":"2026-03-31T05:35:59+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/los-dispositivos-nas-de-synology-son-atacados-con-la-botnet-stealthworker-seguridad-por-contrasena-como-proteccion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Los dispositivos NAS de Synology son atacados con la botnet StealthWorker \u2013 Seguridad por contrase\u00f1a como protecci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27911"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27911\/revisions"}],"predecessor-version":[{"id":27912,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27911\/revisions\/27912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media\/27910"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}