{"id":78511,"date":"2018-04-25T17:07:05","date_gmt":"2018-04-25T17:07:05","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security\/"},"modified":"2025-11-27T17:19:53","modified_gmt":"2025-11-27T17:19:53","slug":"another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security\/","title":{"rendered":"Otro evento de secuestro de BGP resalta la importancia de MANRS y seguridad de enrutamiento"},"content":{"rendered":"<p>Otro evento de secuestro de BGP est\u00e1 en las noticias de hoy. Esta vez, el evento es la criptomoneda Ethereum. Los usuarios se enfrentaron con un certificado SSL inseguro. Fueron redirigidos a un servidor en Rusia, que procedi\u00f3 a vaciar la billetera del usuario. DNSSEC es importante para nosotros, as\u00ed que consulte los recursos de\u00a0<a href=\"\/?page_id=28771\">Deploy360 <\/a> DNSSEC para asegurarse de que sus nombres de dominio est\u00e9n protegidos. En esta publicaci\u00f3n, sin embargo, nos centraremos en la parte de secuestro BGP de este ataque.<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security\/\">Saber m\u00e1s sobre el secuestro (en ingl\u00e9s)<\/a> y<em>\u00a0leer m\u00e1s sobre <a href=\"http:\/\/www.manrs.org\/\">MANRS aqu\u00ed<\/a>. Implemente <a href=\"https:\/\/www.manrs.org\/manrs\/\">las cuatro acciones para los operadores de redes<\/a> y <a href=\"https:\/\/www.manrs.org\/join\/\">\u00fanase a la comunidad de operadores<\/a> con mentalidad de seguridad que trabajan en conjunto para hacer que Internet sea m\u00e1s seguro para todos.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Otro evento de secuestro de BGP est\u00e1 en las noticias de hoy. Esta vez, el evento es la criptomoneda Ethereum. Los usuarios se enfrentaron con un certificado SSL inseguro. Fueron redirigidos a un servidor en Rusia, que procedi\u00f3 a vaciar la billetera del usuario. DNSSEC es importante para nosotros, as\u00ed que consulte los recursos de\u00a0Deploy360 [&hellip;]<\/p>\n","protected":false},"author":819,"featured_media":78358,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6188,186,168,2584,2590,179,2546,4910,4777,184,147],"tags":[6239,6251,6255,6269],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4083],"class_list":["post-78511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-como-funciona-internet","category-confianza","category-normas-abiertos-de-internet","category-extensiones-de-seguridad-del-dns-es","category-garantia-bgp-es","category-seguridad","category-manrs-es","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","category-deploy360-es","tag-extensiones-de-seguridad-del-sistema-de-nombres-de-dominio-dnssec","tag-normas-mutuamente-acordadas-para-la-seguridad-del-enrutamiento-manrs","tag-protocolo-de-puerta-de-enlace-de-frontera-bgp","tag-seguridad-de-enrutamiento","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack.jpg",11118,4497,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack-300x121.jpg",300,121,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack-768x311.jpg",768,311,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack-1024x414.jpg",1024,414,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack.jpg",1536,621,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack.jpg",2048,828,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack-250x101.jpg",250,101,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack.jpg",300,121,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack.jpg",400,162,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-thief-data-hijack.jpg",600,243,false]},"uagb_author_info":{"display_name":"Megan Kruse","author_link":"https:\/\/www.internetsociety.org\/es\/author\/kruse\/"},"uagb_comment_info":0,"uagb_excerpt":"Otro evento de secuestro de BGP est\u00e1 en las noticias de hoy. Esta vez, el evento es la criptomoneda Ethereum. Los usuarios se enfrentaron con un certificado SSL inseguro. Fueron redirigidos a un servidor en Rusia, que procedi\u00f3 a vaciar la billetera del usuario. DNSSEC es importante para nosotros, as\u00ed que consulte los recursos de\u00a0Deploy360&hellip;","authors":[{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/78511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/819"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=78511"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/78511\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/78358"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=78511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=78511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=78511"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=78511"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=78511"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=78511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}