{"id":1764,"date":"2022-05-13T08:52:13","date_gmt":"2022-05-13T06:52:13","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/?p=1764"},"modified":"2022-05-13T13:44:59","modified_gmt":"2022-05-13T11:44:59","slug":"aniversario-del-mayo-ataque-de-ransomware-wannacry","status":"publish","type":"post","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/aniversario-del-mayo-ataque-de-ransomware-wannacry\/","title":{"rendered":"Aniversario del mayor ataque de Ransomware. Wannacry"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1283 alignleft\" src=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware.jpg\" alt=\"\" width=\"119\" height=\"119\" srcset=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware.jpg 800w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware-300x300.jpg 300w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware-700x700.jpg 700w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware-150x150.jpg 150w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2020\/09\/Ransomeware-75x75.jpg 75w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a>Estos d\u00edas hace 5 a\u00f1os del mayor ataque de ransomware con el virus Wannacry. En Espa\u00f1a hubo casi 300.000 descargas.<\/p>\n<p>Por ello el CCN nos deja como fu\u00e9 aquello reflejado en dos infograf\u00edas que aqu\u00ed os dejo.<\/p>\n<p><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2022\/05\/WannacryFuncionamiento_compressed.pdf\" target=\"_blank\" rel=\"noopener\">Funcionamiento del Wannacry<\/a><\/p>\n<p><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2022\/05\/CronologiaUnCiberataqueWannacry_compressed.pdf\" target=\"_blank\" rel=\"noopener\">Cronolog\u00eda de un Ciberataque. Wannacry<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Estos d\u00edas hace 5 a\u00f1os del mayor ataque de ransomware con el virus Wannacry. En Espa\u00f1a hubo casi 300.000 descargas. Por ello el CCN nos deja como fu\u00e9 aquello reflejado en dos infograf\u00edas que aqu\u00ed os dejo. Funcionamiento del Wannacry Cronolog\u00eda de un Ciberataque. Wannacry<\/p>\n","protected":false},"author":27,"featured_media":1283,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[12],"tags":[35,14,54],"class_list":{"0":"post-1764","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-noticias","8":"tag-ccn","9":"tag-noticias","10":"tag-ramsonware","11":"entry"},"_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/1764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=1764"}],"version-history":[{"count":3,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/1764\/revisions"}],"predecessor-version":[{"id":1774,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/1764\/revisions\/1774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/1283"}],"wp:attachment":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media?parent=1764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/categories?post=1764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/tags?post=1764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}