{"id":13315,"date":"2018-11-26T18:25:53","date_gmt":"2018-11-26T15:25:53","guid":{"rendered":"https:\/\/vasexperts.com\/?p=13315"},"modified":"2025-09-09T15:07:38","modified_gmt":"2025-09-09T12:07:38","slug":"the-botnet-spams-via-routers","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/es\/blog\/security\/the-botnet-spams-via-routers\/","title":{"rendered":"La red de bots env\u00eda spam a trav\u00e9s de routers"},"content":{"rendered":"360Netlab se\u00f1ala que se trata de la actividad m\u00e1s alta en comparaci\u00f3n con otras redes de bots estudiadas anteriormente.\r\n\r\nLa interacci\u00f3n entre la red de bots y la \u00abv\u00edctima\u00bb se produjo en varias etapas (v\u00e9ase la figura siguiente). En primer lugar, se escane\u00f3 el puerto TCP 5431. A continuaci\u00f3n, se comprob\u00f3 el puerto UDP 1900, al que se envi\u00f3 una secuencia espec\u00edfica, a la espera de que el dispositivo proporcionara una URL vulnerable como respuesta. Tras recibir el enlace vulnerable, se llevaron a cabo cuatro sesiones m\u00e1s con el dispositivo para determinar el punto de entrada para ejecutar el c\u00f3digo shell en la memoria del dispositivo. Como resultado, el dispositivo se convirti\u00f3 en un bot que realizaba las tareas de la botnet principal.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2018\/11\/botnet-interaction.jpg\" alt=\"botnet interaction\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13319\" srcset=\"\/wp-content\/uploads\/2018\/11\/botnet-interaction.jpg 798w, \/wp-content\/uploads\/2018\/11\/botnet-interaction-300x230.jpg 300w, \/wp-content\/uploads\/2018\/11\/botnet-interaction-768x588.jpg 768w\" sizes=\"(max-width: 798px) 100vw, 798px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2018\/11\/botnet-interaction.jpg\" alt=\"botnet interaction\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13319 lazyload\" sizes=\"(max-width: 798px) 100vw, 798px\" data-src=\"\/wp-content\/uploads\/2018\/11\/botnet-interaction.jpg\" data-srcset=\"\/wp-content\/uploads\/2018\/11\/botnet-interaction.jpg 798w, \/wp-content\/uploads\/2018\/11\/botnet-interaction-300x230.jpg 300w, \/wp-content\/uploads\/2018\/11\/botnet-interaction-768x588.jpg 768w\">\r\n\r\nDe cara al futuro, debemos se\u00f1alar que los puertos 5431 y 1900 no se eligieron al azar, ya que el servicio UPnP suele funcionar en estos puertos. Esto significa que este servicio, que est\u00e1 habilitado de forma predeterminada en la mayor\u00eda de los dispositivos, tiene una vulnerabilidad. M\u00e1s adelante veremos la lista de dispositivos.\r\n\r\nDurante mucho tiempo, los expertos no pudieron detectar este problema. La dificultad radicaba en conseguir que <a href=\"https:\/\/en.wikipedia.org\/wiki\/Honeypot_(computing)\" rel=\"nofollow\">el honeypot<\/a> (un recurso que act\u00faa como cebo para los atacantes) imitara un dispositivo en el escenario descrito anteriormente. No fue hasta octubre de 2018, tras un largo proceso de configuraci\u00f3n, cuando lo consiguieron y lograron enga\u00f1ar a la botnet. El proyecto se denomin\u00f3 BCMUPnP_Hunter.\r\n\r\nInvestigaciones posteriores revelaron que la botnet tiene las siguientes caracter\u00edsticas:\r\n<ul>\r\n \t<li>El n\u00famero de infecciones es muy alto, con aproximadamente 100 000 direcciones IP activas de escaneo en cada evento.<\/li>\r\n \t<li>El objetivo de la infecci\u00f3n son principalmente los equipos de enrutamiento con la funci\u00f3n BroadCom UPnP habilitada.<\/li>\r\n \t<li>El servidor del atacante env\u00eda correos electr\u00f3nicos a trav\u00e9s de esta botnet, que es esencialmente un servidor proxy. Actualmente, se est\u00e1n registrando solicitudes a servidores de correo conocidos como Outlook, Hotmail, Yahoo! Mail, etc. Los investigadores creen que el objetivo de los atacantes es enviar spam.<\/li>\r\n<\/ul>\r\nLa frecuencia y el n\u00famero de nodos de escaneo se pueden ver en el gr\u00e1fico siguiente.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2018\/11\/nodes_scanning.png\" alt=\"nodes scanning\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13320\" srcset=\"\/wp-content\/uploads\/2018\/11\/nodes_scanning.png 728w, \/wp-content\/uploads\/2018\/11\/nodes_scanning-300x200.png 300w\" sizes=\"(max-width: 728px) 100vw, 728px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2018\/11\/nodes_scanning.png\" alt=\"nodes scanning\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13320 lazyload\" sizes=\"(max-width: 728px) 100vw, 728px\" data-src=\"\/wp-content\/uploads\/2018\/11\/nodes_scanning.png\" data-srcset=\"\/wp-content\/uploads\/2018\/11\/nodes_scanning.png 728w, \/wp-content\/uploads\/2018\/11\/nodes_scanning-300x200.png 300w\">\r\n\r\nComo se puede observar, la actividad aumenta cada 1-3 d\u00edas y, en algunos casos, alcanza los 100 000 nodos. El n\u00famero total de nodos atacantes es de aproximadamente 3,34 millones, pero no se debe descartar que los mismos dispositivos puedan tener diferentes direcciones IP.\r\n\r\nLa ubicaci\u00f3n geogr\u00e1fica de los sniffers se muestra en el mapa.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2018\/11\/sniffers_location.png\" alt=\"sniffers location\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13321\" srcset=\"\/wp-content\/uploads\/2018\/11\/sniffers_location.png 1600w, \/wp-content\/uploads\/2018\/11\/sniffers_location-300x150.png 300w, \/wp-content\/uploads\/2018\/11\/sniffers_location-1024x511.png 1024w, \/wp-content\/uploads\/2018\/11\/sniffers_location-768x384.png 768w, \/wp-content\/uploads\/2018\/11\/sniffers_location-1536x767.png 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2018\/11\/sniffers_location.png\" alt=\"sniffers location\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-13321 lazyload\" sizes=\"(max-width: 1600px) 100vw, 1600px\" data-src=\"\/wp-content\/uploads\/2018\/11\/sniffers_location.png\" data-srcset=\"\/wp-content\/uploads\/2018\/11\/sniffers_location.png 1600w, \/wp-content\/uploads\/2018\/11\/sniffers_location-300x150.png 300w, \/wp-content\/uploads\/2018\/11\/sniffers_location-1024x511.png 1024w, \/wp-content\/uploads\/2018\/11\/sniffers_location-768x384.png 768w, \/wp-content\/uploads\/2018\/11\/sniffers_location-1536x767.png 1536w\">\r\n\r\nIndia lidera la lista con 147 700 nodos, seguida de Estados Unidos y China.\r\n\r\nLa lista de dispositivos vulnerables incluye muchas marcas populares, como Cisco, Zyxel, D-Link, Eltex y TP-Link. En total, hay alrededor de 116 dispositivos, pero los investigadores se\u00f1alan que esta cifra podr\u00eda ser mayor. A continuaci\u00f3n se proporciona la lista completa.\r\n\r\nLas consecuencias son obvias: el 100 % de las direcciones IP del proveedor est\u00e1n en la lista negra de los servicios antispam.\r\n\r\nEs interesante observar que una gran proporci\u00f3n de los dispositivos vulnerables son enrutadores ADSL. Probablemente sea una coincidencia, pero no hay que olvidar que xDSL todav\u00eda se utiliza en muchos pa\u00edses en desarrollo con grandes poblaciones.\r\n\r\n<a href=\"\/es\/products\/stingray\/\">Stingray<\/a> proporciona protecci\u00f3n contra ataques DDoS, y la nueva versi\u00f3n incluye una <a href=\"\/es\/products\/stingray\/mini-firewall\/\">funci\u00f3n mini-Firewall<\/a>, que describiremos en detalle pr\u00f3ximamente en nuestro blog. Para obtener informaci\u00f3n m\u00e1s detallada sobre las ventajas de la plataforma, su uso eficaz en redes de telecomunicaciones, as\u00ed como la migraci\u00f3n desde otras plataformas y la integraci\u00f3n con otros sistemas, p\u00f3ngase en contacto con los especialistas de VAS Experts, desarrollador y proveedor del sistema de an\u00e1lisis de tr\u00e1fico Stingray Service Gateway.\r\n\r\n[subscription id=\u00bb11987\u2033]Suscr\u00edbete a las actualizaciones de nuestro blog para estar al d\u00eda de las \u00faltimas noticias del sector de las telecomunicaciones.[\/subscription]\r\n\r\n<span class=\"h3-style\">Complete list of vulnerable devices<\/span>\r\n<em>ADB Broadband S.p.A, \u00a0\u00a0\u00a0HomeStation ADSL Router\u00a0<\/em>\r\n<em>ADB Broadband, \u00a0\u00a0\u00a0ADB ADSL Router\u00a0<\/em>\r\n<em>ADBB, \u00a0\u00a0\u00a0ADB ADSL Router \u00a0<\/em>\r\n<em>ALSiTEC, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>ASB, \u00a0\u00a0\u00a0ADSL Router \u00a0<\/em>\r\n<em>ASB, \u00a0\u00a0\u00a0ChinaNet EPON Router \u00a0<\/em>\r\n<em>ASB, \u00a0\u00a0\u00a0ChinaTelecom E8C(EPON) Gateway \u00a0<\/em>\r\n<em>Actiontec, \u00a0\u00a0\u00a0Actiontec GT784WN \u00a0<\/em>\r\n<em>Actiontec, \u00a0\u00a0\u00a0Verizon ADSL Router \u00a0<\/em>\r\n<em>BEC Technologies Inc., \u00a0\u00a0\u00a0Broadcom ADSL Router\u00a0<\/em>\r\n<em>Best IT World India Pvt. Ltd., \u00a0\u00a0\u00a0150M Wireless-N ADSL2+ Router\u00a0<\/em>\r\n<em>Best IT World India Pvt. Ltd., \u00a0\u00a0\u00a0iB-WRA300N\u00a0<\/em>\r\n<em>Billion Electric Co., Ltd., \u00a0\u00a0\u00a0ADSL2+ Firewall Router\u00a0<\/em>\r\n<em>Billion Electric Co., Ltd., \u00a0\u00a0\u00a0BiPAC 7800NXL\u00a0<\/em>\r\n<em>Billion, \u00a0\u00a0\u00a0BiPAC 7700N\u00a0<\/em>\r\n<em>Billion, \u00a0\u00a0\u00a0BiPAC 7700N R2 \u00a0<\/em>\r\n<em>Binatone Telecommunication, \u00a0\u00a0\u00a0Broadcom LAN Router\u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0ADSL Router\u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0ADSL2+ 11n WiFi CPE \u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0Broadcom\u00a0 Router \u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0D-Link DSL-2640B \u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0D-link ADSL Router \u00a0<\/em>\r\n<em>Broadcom, \u00a0\u00a0\u00a0DLink ADSL Router \u00a0<\/em>\r\n<em>ClearAccess, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Comtrend, \u00a0\u00a0\u00a0AR-5383n\u00a0<\/em>\r\n<em>Comtrend, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Comtrend, \u00a0\u00a0\u00a0Comtrend single-chip ADSL router \u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-Link DSL-2640B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-Link DSL-2641B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-Link DSL-2740B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-Link DSL-2750B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-LinkDSL-2640B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-LinkDSL-2641B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0D-LinkDSL-2741B\u00a0<\/em>\r\n<em>D-Link Corporation., \u00a0\u00a0\u00a0DSL-2640B\u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0ADSL 4*FE 11n Router \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link ADSL Router \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL-2640U \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL-2730B \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL-2730U \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL-2750B \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL-2750U \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL-6751 \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link DSL2750U \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-Link Router \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0D-link ADSL Router \u00a0<\/em>\r\n<em>D-Link, \u00a0\u00a0\u00a0DVA-G3672B-LTT Networks ADSL Router \u00a0<\/em>\r\n<em>DARE, \u00a0\u00a0\u00a0Dare router \u00a0<\/em>\r\n<em>DLink, \u00a0\u00a0\u00a0D-Link DSL-2730B \u00a0<\/em>\r\n<em>DLink, \u00a0\u00a0\u00a0D-Link VDSL Router \u00a0<\/em>\r\n<em>DLink, \u00a0\u00a0\u00a0DLink ADSL Router \u00a0<\/em>\r\n<em>DQ Technology, Inc., \u00a0\u00a0\u00a0ADSL2+ 11n WiFi CPE\u00a0<\/em>\r\n<em>DQ Technology, Inc., \u00a0\u00a0\u00a0Broadcom ADSL Router\u00a0<\/em>\r\n<em>DSL, \u00a0\u00a0\u00a0ADSL Router \u00a0<\/em>\r\n<em>DareGlobal, \u00a0\u00a0\u00a0D-Link ADSL Router \u00a0<\/em>\r\n<em>Digicom S.p.A., \u00a0\u00a0\u00a0ADSL Wireless Modem\/Router \u00a0<\/em>\r\n<em>Digicom S.p.A., \u00a0\u00a0\u00a0RAW300C-T03\u00a0<\/em>\r\n<em>Dlink, \u00a0\u00a0\u00a0D-Link DSL-225 \u00a0<\/em>\r\n<em>Eltex, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>FiberHome, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>GWD, \u00a0\u00a0\u00a0ChinaTelecom E8C(EPON) Gateway \u00a0<\/em>\r\n<em>Genew, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>INTEX, \u00a0\u00a0\u00a0W150D\u00a0<\/em>\r\n<em>INTEX, \u00a0\u00a0\u00a0W300D\u00a0<\/em>\r\n<em>INTEX, \u00a0\u00a0\u00a0Wireless N 150 ADSL2+ Modem Router \u00a0<\/em>\r\n<em>INTEX, \u00a0\u00a0\u00a0Wireless N 300 ADSL2+ Modem Router \u00a0<\/em>\r\n<em>ITI Ltd., \u00a0\u00a0\u00a0ITI Ltd.ADSL2Plus Modem\/Router \u00a0<\/em>\r\n<em>Inteno, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Intercross, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>IskraTEL, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Kasda, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Link-One, \u00a0\u00a0\u00a0Modem Roteador Wireless N ADSL2+ 150 Mbps \u00a0<\/em>\r\n<em>Linksys, \u00a0\u00a0\u00a0Cisco X1000\u00a0<\/em>\r\n<em>Linksys, \u00a0\u00a0\u00a0Cisco X3500\u00a0<\/em>\r\n<em>NB, \u00a0\u00a0\u00a0DSL-2740B \u00a0<\/em>\r\n<em>NetComm Wireless Limited, \u00a0\u00a0\u00a0NetComm ADSL2+ Wireless Router \u00a0<\/em>\r\n<em>NetComm, \u00a0\u00a0\u00a0NetComm ADSL2+ Wireless Router \u00a0<\/em>\r\n<em>NetComm, \u00a0\u00a0\u00a0NetComm WiFi Data and VoIP Gateway<\/em>\r\n<em>OPTICOM, \u00a0\u00a0\u00a0DSLink 279\u00a0<\/em>\r\n<em>Opticom, \u00a0\u00a0\u00a0DSLink 485\u00a0<\/em>\r\n<em>Orcon, \u00a0\u00a0\u00a0Genius\u00a0<\/em>\r\n<em>QTECH, \u00a0\u00a0\u00a0QTECH\u00a0<\/em>\r\n<em>Raisecom, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Ramptel, \u00a0\u00a0\u00a0300Mbps ADSL Wireless-N Router \u00a0<\/em>\r\n<em>Router, \u00a0\u00a0\u00a0ADSL2+ Router \u00a0<\/em>\r\n<em>SCTY, \u00a0\u00a0\u00a0TYKH PON Router \u00a0<\/em>\r\n<em>Star-Net, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Starbridge Networks, \u00a0\u00a0\u00a0Broadcom ADSL Router\u00a0<\/em>\r\n<em>TP-LINK Technologies Co., Ltd, \u00a0\u00a0\u00a0300Mbps Wireless N ADSL2+ Modem Router \u00a0<\/em>\r\n<em>TP-LINK Technologies Co., Ltd, \u00a0\u00a0\u00a0300Mbps Wireless N USB ADSL2+ Modem Router \u00a0<\/em>\r\n<em>TP-LINK, \u00a0\u00a0\u00a0TP-LINK Wireless ADSL2+ Modem Router \u00a0<\/em>\r\n<em>TP-LINK, \u00a0\u00a0\u00a0TP-LINK Wireless ADSL2+ Router \u00a0<\/em>\r\n<em>Technicolor, \u00a0\u00a0\u00a0CenturyLink TR-064 v4.0 \u00a0<\/em>\r\n<em>Tenda, \u00a0\u00a0\u00a0Tenda ADSL2+ WIFI MODEM \u00a0<\/em>\r\n<em>Tenda, \u00a0\u00a0\u00a0Tenda ADSL2+ WIFI Router \u00a0<\/em>\r\n<em>Tenda, \u00a0\u00a0\u00a0Tenda Gateway \u00a0<\/em>\r\n<em>Tenda\/Imex, \u00a0\u00a0\u00a0ADSL2+ WIFI-MODEM WITH 3G\/4G USB PORT \u00a0<\/em>\r\n<em>Tenda\/Imex, \u00a0\u00a0\u00a0ADSL2+ WIFI-MODEM WITH EVO SUPPORT \u00a0<\/em>\r\n<em>UTStarcom Inc., \u00a0\u00a0\u00a0UTStarcom ADSL2+ Modem Router \u00a0<\/em>\r\n<em>UTStarcom Inc., \u00a0\u00a0\u00a0UTStarcom ADSL2+ Modem\/Wireless Router \u00a0<\/em>\r\n<em>UniqueNet Solutions, \u00a0\u00a0\u00a0WLAN N300 ADSL2+ Modem Router \u00a0<\/em>\r\n<em>ZTE, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>ZTE, \u00a0\u00a0\u00a0ONU Router \u00a0<\/em>\r\n<em>ZYXEL, \u00a0\u00a0\u00a0ZyXEL VDSL Router \u00a0<\/em>\r\n<em>Zhone, \u00a0\u00a0\u00a0Broadcom ADSL Router \u00a0<\/em>\r\n<em>Zhone, \u00a0\u00a0\u00a0Zhone Wireless Gateway \u00a0<\/em>\r\n<em>Zoom, \u00a0\u00a0\u00a0Zoom Adsl Modem\/Router \u00a0<\/em>\r\n<em>ZyXEL, \u00a0\u00a0\u00a0CenturyLink UPnP v1.0 \u00a0<\/em>\r\n<em>ZyXEL, \u00a0\u00a0\u00a0P-660HN-51 \u00a0<\/em>\r\n<em>ZyXEL, \u00a0\u00a0\u00a0ZyXEL xDSL Router \u00a0<\/em>\r\n<em>huaqin, \u00a0\u00a0\u00a0HGU210 v3 Router \u00a0<\/em>\r\n<em>iBall Baton, \u00a0\u00a0\u00a0iBall Baton 150M Wireless-N ADSL2+ Router \u00a0<\/em>\r\n<em>iiNet Limited, \u00a0\u00a0\u00a0BudiiLite\u00a0<\/em>\r\n<em>iiNet, \u00a0\u00a0\u00a0BoB2\u00a0<\/em>\r\n<em>iiNet, \u00a0\u00a0\u00a0BoBLite\u00a0<\/em>","protected":false},"excerpt":{"rendered":"<p>Desde septiembre de 2018, 360Netlab Scanmon ha detectado m\u00faltiples picos en la actividad de escaneo en el puerto TCP 5431. Se registraron lecturas cada vez que el n\u00famero de conexiones (intentos de escaneo) super\u00f3 las 100 000.<\/p>\n","protected":false},"author":7,"featured_media":13317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110,48],"tags":[],"class_list":["post-13315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-telecom"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>VAS Experts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/\",\"name\":\"[:en]Botnet spams through routers: network protection from DDoS attacks[:es]Spam de botnets a trav\u00e9s de routers: protecci\u00f3n de la red contra ataques DDoS[:fr]Botnets spamm\u00e9s via les routeurs\u00a0: protection du r\u00e9seau contre les attaques DDoS[:br]Spams de botnets atrav\u00e9s de roteadores: prote\u00e7\u00e3o de rede contra ataques DDoS\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2025\/09\/bot_router.jpg\",\"datePublished\":\"2018-11-26T15:25:53+00:00\",\"dateModified\":\"2025-09-09T12:07:38+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\"},\"description\":\"[:en]The interaction between a botnet and a \u201cvictim\u201d resulting in the device becoming a bot that performs the tasks of the primary botnet.[:es]La interacci\u00f3n entre una red de bots y una \u00abv\u00edctima\u00bb que da como resultado que el dispositivo se convierta en un bot que realiza las tareas de la red de bots principal.[:fr]Interaction entre un botnet et une \u00ab\u00a0victime\u00a0\u00bb\u00a0: l'appareil devient un bot ex\u00e9cutant les t\u00e2ches du botnet principal.[:br]A intera\u00e7\u00e3o entre uma botnet e uma \\\"v\u00edtima\\\", resultando na transforma\u00e7\u00e3o do dispositivo em um bot que executa as tarefas da botnet prim\u00e1ria.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2025\/09\/bot_router.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2025\/09\/bot_router.jpg\",\"width\":1278,\"height\":852,\"caption\":\"botnet router\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The botnet spams via routers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\",\"name\":\"Elena Rudich\",\"url\":\"https:\/\/vasexperts.com\/es\/blog\/author\/elena-rudich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VAS Experts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/","url":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/","name":"[:en]Botnet spams through routers: network protection from DDoS attacks[:es]Spam de botnets a trav\u00e9s de routers: protecci\u00f3n de la red contra ataques DDoS[:fr]Botnets spamm\u00e9s via les routeurs\u00a0: protection du r\u00e9seau contre les attaques DDoS[:br]Spams de botnets atrav\u00e9s de roteadores: prote\u00e7\u00e3o de rede contra ataques DDoS","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/09\/bot_router.jpg","datePublished":"2018-11-26T15:25:53+00:00","dateModified":"2025-09-09T12:07:38+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170"},"description":"[:en]The interaction between a botnet and a \u201cvictim\u201d resulting in the device becoming a bot that performs the tasks of the primary botnet.[:es]La interacci\u00f3n entre una red de bots y una \u00abv\u00edctima\u00bb que da como resultado que el dispositivo se convierta en un bot que realiza las tareas de la red de bots principal.[:fr]Interaction entre un botnet et une \u00ab\u00a0victime\u00a0\u00bb\u00a0: l'appareil devient un bot ex\u00e9cutant les t\u00e2ches du botnet principal.[:br]A intera\u00e7\u00e3o entre uma botnet e uma \"v\u00edtima\", resultando na transforma\u00e7\u00e3o do dispositivo em um bot que executa as tarefas da botnet prim\u00e1ria.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#primaryimage","url":"\/wp-content\/uploads\/2025\/09\/bot_router.jpg","contentUrl":"\/wp-content\/uploads\/2025\/09\/bot_router.jpg","width":1278,"height":852,"caption":"botnet router"},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/security\/the-botnet-spams-via-routers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"The botnet spams via routers"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"es"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170","name":"Elena Rudich","url":"https:\/\/vasexperts.com\/es\/blog\/author\/elena-rudich\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/posts\/13315"}],"collection":[{"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/comments?post=13315"}],"version-history":[{"count":6,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/posts\/13315\/revisions"}],"predecessor-version":[{"id":13328,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/posts\/13315\/revisions\/13328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/media\/13317"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/media?parent=13315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/categories?post=13315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/es\/wp-json\/wp\/v2\/tags?post=13315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}