{"id":79352,"date":"2018-05-07T14:03:56","date_gmt":"2018-05-07T14:03:56","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/05\/what-is-bgp-hijacking-anyway\/"},"modified":"2025-11-27T17:19:23","modified_gmt":"2025-11-27T17:19:23","slug":"what-is-bgp-hijacking-anyway","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/05\/what-is-bgp-hijacking-anyway\/","title":{"rendered":"\u00bfQu\u00e9 es \u00abBGP Hijacking\u00bb, de todos modos?"},"content":{"rendered":"<p>Hace dos semanas, nos enteramos <a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/another-bgp-hijacking-event-highlights-the-importance-of-manrs-and-routing-security\/\">de otro incidente de incidente de seguridad<\/a>, a saber, el secuestro de rutas BGP a la infraestructura DNS de Amazon, utilizado como un trampol\u00edn para robar unos $ 150,000 de criptomoneda Ethereum de MyEtherWallet.com. Hemos hablado mucho sobre el secuestro de BGP, profundizando en los detalles de<a href=\"https:\/\/www.internetsociety.org\/es\/?p=80720\"> lo que sucedi\u00f3 en esta not<\/a>a. Pero, \u00bfqu\u00e9 es el secuestro de BGP, de todos modos, y por qu\u00e9 es importante? Aqu\u00ed, explicaremos los aspectos b\u00e1sicos y los operadores de red y los puntos de intercambio de Internet pueden <a href=\"http:\/\/www.manrs.org\/join\/\">unirse a MANRS<\/a> para ayudar a resolver el problema.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/05\/what-is-bgp-hijacking-anyway\/\">Saber m\u00e1s en ingl\u00e9s<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hace dos semanas, nos enteramos de otro incidente de incidente de seguridad, a saber, el secuestro de rutas BGP a la infraestructura DNS de Amazon, utilizado como un trampol\u00edn para robar unos $ 150,000 de criptomoneda Ethereum de MyEtherWallet.com. Hemos hablado mucho sobre el secuestro de BGP, profundizando en los detalles de lo que sucedi\u00f3 [&hellip;]<\/p>\n","protected":false},"author":819,"featured_media":78474,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6188,186,168,2590,179,2546,4910,4777,184,147],"tags":[6251,6255,6269],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4083],"class_list":["post-79352","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-como-funciona-internet","category-confianza","category-normas-abiertos-de-internet","category-garantia-bgp-es","category-seguridad","category-manrs-es","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","category-deploy360-es","tag-normas-mutuamente-acordadas-para-la-seguridad-del-enrutamiento-manrs","tag-protocolo-de-puerta-de-enlace-de-frontera-bgp","tag-seguridad-de-enrutamiento","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",5000,3300,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-300x198.jpg",300,198,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-768x507.jpg",768,507,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-1024x676.jpg",1024,676,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",1536,1014,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",2048,1352,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-250x165.jpg",250,165,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",300,198,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",400,264,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/dos-attack-cyber-unsafe-security.jpg",600,396,false]},"uagb_author_info":{"display_name":"Megan Kruse","author_link":"https:\/\/www.internetsociety.org\/es\/author\/kruse\/"},"uagb_comment_info":0,"uagb_excerpt":"Hace dos semanas, nos enteramos de otro incidente de incidente de seguridad, a saber, el secuestro de rutas BGP a la infraestructura DNS de Amazon, utilizado como un trampol\u00edn para robar unos $ 150,000 de criptomoneda Ethereum de MyEtherWallet.com. Hemos hablado mucho sobre el secuestro de BGP, profundizando en los detalles de lo que sucedi\u00f3&hellip;","authors":[{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/79352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/819"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=79352"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/79352\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/78474"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=79352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=79352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=79352"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=79352"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=79352"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=79352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}