{"id":206,"date":"2024-02-06T09:41:24","date_gmt":"2024-02-06T14:41:24","guid":{"rendered":"https:\/\/blog.azuan.com\/?p=206"},"modified":"2024-02-06T09:41:24","modified_gmt":"2024-02-06T14:41:24","slug":"sim-swapping-desafiando-la-autenticacion-de-dos-factores-y-los-robos-millonarios","status":"publish","type":"post","link":"https:\/\/blog.azuan.com\/?p=206","title":{"rendered":"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios"},"content":{"rendered":"\n<p>En un mundo cada vez m\u00e1s conectado, las amenazas cibern\u00e9ticas evolucionan constantemente, presentando desaf\u00edos significativos para la seguridad en l\u00ednea. En este blog, exploraremos dos casos preocupantes que resaltan las vulnerabilidades en la autenticaci\u00f3n de dos factores y la falta de medidas de seguridad en las operadoras de telecomunicaciones.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-1024x1024.jpg\" alt=\"\" class=\"wp-image-207\" style=\"width:598px;height:auto\" srcset=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-1024x1024.jpg 1024w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-300x300.jpg 300w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-150x150.jpg 150w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-768x768.jpg 768w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-1536x1536.jpg 1536w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281.jpg 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Robo Millonario a Cliente de Daviplata: Suplantaci\u00f3n Autorizada por Tigo<\/strong><\/p>\n\n\n\n<p>En un reciente caso en Bogot\u00e1, un cliente de Daviplata se convirti\u00f3 en v\u00edctima de un robo millonario, desencadenado por una suplantaci\u00f3n autorizada por Tigo. A pesar de presentar pruebas, el afectado a\u00fan no ha logrado recuperar la totalidad del dinero perdido, lo que ha generado caos financiero y de seguridad.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"676\" height=\"536\" src=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153601.png\" alt=\"\" class=\"wp-image-208\" style=\"width:496px;height:auto\" srcset=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153601.png 676w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153601-300x238.png 300w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153601-378x300.png 378w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/figure>\n<\/div>\n\n\n<p>El incidente comenz\u00f3 con una empresa llamada Redec\u00f3mputo que consult\u00f3 el historial de Datacr\u00e9dito del damnificado sin su consentimiento. Con esta informaci\u00f3n en mano, los delincuentes se dirigieron a la sucursal de Tigo en Centro Mayor, donde un empleado, presuntamente sin seguir los protocolos de seguridad adecuados, realiz\u00f3 un cambio de titularidad y convirti\u00f3 la l\u00ednea pospago del cliente a prepago.<\/p>\n\n\n\n<p>El afectado resalta que el empleado de Tigo no sigui\u00f3 los procedimientos est\u00e1ndar, permitiendo que los delincuentes ejecutaran su plan. Esto subraya la importancia de reforzar los protocolos de seguridad en las empresas para prevenir futuros incidentes de suplantaci\u00f3n y robo de datos personales.<\/p>\n\n\n\n<p><strong>SIM Swapping: El Peligroso Fraude que Desaf\u00eda la Autenticaci\u00f3n de Dos Factores<\/strong><\/p>\n\n\n\n<p>En el panorama de amenazas cibern\u00e9ticas, el SIM Swapping ha emergido como una modalidad de fraude que desaf\u00eda la seguridad de la autenticaci\u00f3n de dos factores por SMS. Este m\u00e9todo implica la falsificaci\u00f3n de documentaci\u00f3n para obtener un duplicado de la tarjeta SIM asociada a una l\u00ednea telef\u00f3nica, permitiendo a los ciberdelincuentes suplantar la identidad del titular y acceder a cuentas bancarias.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"927\" height=\"659\" src=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153855.png\" alt=\"\" class=\"wp-image-209\" style=\"width:628px;height:auto\" srcset=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153855.png 927w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153855-300x213.png 300w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153855-768x546.png 768w, https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/Captura-de-pantalla-2024-01-04-153855-421x300.png 421w\" sizes=\"auto, (max-width: 927px) 100vw, 927px\" \/><\/figure>\n<\/div>\n\n\n<p>Los delincuentes utilizan malware o t\u00e9cnicas de ingenier\u00eda social para obtener credenciales de usuarios desprevenidos. Una vez que la v\u00edctima cae en la trampa, los atacantes se dirigen a una tienda de la operadora de telecomunicaciones, presentando documentaci\u00f3n falsa respaldada por denuncias policiales ficticias.<\/p>\n\n\n\n<p>Este m\u00e9todo no explota un fallo de seguridad en dispositivos individuales, sino la falta de mecanismos de seguridad en las operadoras al realizar duplicados de tarjetas SIM. Una vez que los ciberdelincuentes obtienen el duplicado de la tarjeta SIM, pueden acceder a la cuenta de banca en l\u00ednea de la v\u00edctima, realizando actividades fraudulentas y comprometiendo informaci\u00f3n sensible.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Ambos casos subrayan la necesidad urgente de fortalecer las medidas de seguridad en el \u00e1mbito digital. Tanto las empresas como los usuarios deben estar alerta y tomar medidas proactivas para proteger la integridad de la informaci\u00f3n personal y financiera. La conciencia y la implementaci\u00f3n de pr\u00e1cticas seguras son fundamentales en la lucha contra las amenazas cibern\u00e9ticas, ya sea a trav\u00e9s de suplantaciones autorizadas por empresas o mediante el astuto SIM Swapping.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En un mundo cada vez m\u00e1s conectado, las amenazas cibern\u00e9ticas evolucionan constantemente, presentando desaf\u00edos significativos para la seguridad en l\u00ednea. En este blog, exploraremos dos &hellip;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-206","post","type-post","status-publish","format-standard","hentry","category-sin-categoria"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios - Blog Azuan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.azuan.com\/?p=206\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios - Blog Azuan\" \/>\n<meta property=\"og:description\" content=\"En un mundo cada vez m\u00e1s conectado, las amenazas cibern\u00e9ticas evolucionan constantemente, presentando desaf\u00edos significativos para la seguridad en l\u00ednea. En este blog, exploraremos dos &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.azuan.com\/?p=206\" \/>\n<meta property=\"og:site_name\" content=\"Blog Azuan\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Azuan-technologies-sa\/100070250838801\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-06T14:41:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-1024x1024.jpg\" \/>\n<meta name=\"author\" content=\"Paola Utrera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azuantech\" \/>\n<meta name=\"twitter:site\" content=\"@azuantech\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paola Utrera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.azuan.com\/?p=206#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.azuan.com\/?p=206\"},\"author\":{\"name\":\"Paola Utrera\",\"@id\":\"http:\/\/blog.azuan.com\/#\/schema\/person\/d78e4815593dfc4f1b30feb20c451c3c\"},\"headline\":\"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios\",\"datePublished\":\"2024-02-06T14:41:24+00:00\",\"dateModified\":\"2024-02-06T14:41:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.azuan.com\/?p=206\"},\"wordCount\":513,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/blog.azuan.com\/#organization\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.azuan.com\/?p=206#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.azuan.com\/?p=206\",\"url\":\"https:\/\/blog.azuan.com\/?p=206\",\"name\":\"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios - Blog Azuan\",\"isPartOf\":{\"@id\":\"http:\/\/blog.azuan.com\/#website\"},\"datePublished\":\"2024-02-06T14:41:24+00:00\",\"dateModified\":\"2024-02-06T14:41:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.azuan.com\/?p=206#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.azuan.com\/?p=206\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.azuan.com\/?p=206#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"http:\/\/blog.azuan.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/blog.azuan.com\/#website\",\"url\":\"http:\/\/blog.azuan.com\/\",\"name\":\"Blog Azuan\",\"description\":\"Expertos en ciberseguridad y protecci\u00f3n del endpoint o punto final.\",\"publisher\":{\"@id\":\"http:\/\/blog.azuan.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/blog.azuan.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/blog.azuan.com\/#organization\",\"name\":\"Blog Azuan\",\"url\":\"http:\/\/blog.azuan.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"http:\/\/blog.azuan.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2022\/11\/logo-white-2.png\",\"contentUrl\":\"https:\/\/blog.azuan.com\/wp-content\/uploads\/2022\/11\/logo-white-2.png\",\"width\":330,\"height\":330,\"caption\":\"Blog Azuan\"},\"image\":{\"@id\":\"http:\/\/blog.azuan.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/people\/Azuan-technologies-sa\/100070250838801\/\",\"https:\/\/twitter.com\/azuantech\",\"https:\/\/www.linkedin.com\/company\/azuan-technologies-s.a.\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/blog.azuan.com\/#\/schema\/person\/d78e4815593dfc4f1b30feb20c451c3c\",\"name\":\"Paola Utrera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"http:\/\/blog.azuan.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/878a2efbaa8b9b445bbaf817a7f3f4aec60be89b4b579c39644a9c129537f51d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/878a2efbaa8b9b445bbaf817a7f3f4aec60be89b4b579c39644a9c129537f51d?s=96&d=mm&r=g\",\"caption\":\"Paola Utrera\"},\"url\":\"https:\/\/blog.azuan.com\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios - Blog Azuan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.azuan.com\/?p=206","og_locale":"es_ES","og_type":"article","og_title":"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios - Blog Azuan","og_description":"En un mundo cada vez m\u00e1s conectado, las amenazas cibern\u00e9ticas evolucionan constantemente, presentando desaf\u00edos significativos para la seguridad en l\u00ednea. En este blog, exploraremos dos &hellip;","og_url":"https:\/\/blog.azuan.com\/?p=206","og_site_name":"Blog Azuan","article_publisher":"https:\/\/www.facebook.com\/people\/Azuan-technologies-sa\/100070250838801\/","article_published_time":"2024-02-06T14:41:24+00:00","og_image":[{"url":"https:\/\/blog.azuan.com\/wp-content\/uploads\/2024\/01\/7964812_3805281-1024x1024.jpg"}],"author":"Paola Utrera","twitter_card":"summary_large_image","twitter_creator":"@azuantech","twitter_site":"@azuantech","twitter_misc":{"Escrito por":"Paola Utrera","Tiempo estimado de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.azuan.com\/?p=206#article","isPartOf":{"@id":"https:\/\/blog.azuan.com\/?p=206"},"author":{"name":"Paola Utrera","@id":"http:\/\/blog.azuan.com\/#\/schema\/person\/d78e4815593dfc4f1b30feb20c451c3c"},"headline":"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios","datePublished":"2024-02-06T14:41:24+00:00","dateModified":"2024-02-06T14:41:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.azuan.com\/?p=206"},"wordCount":513,"commentCount":0,"publisher":{"@id":"http:\/\/blog.azuan.com\/#organization"},"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.azuan.com\/?p=206#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.azuan.com\/?p=206","url":"https:\/\/blog.azuan.com\/?p=206","name":"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios - Blog Azuan","isPartOf":{"@id":"http:\/\/blog.azuan.com\/#website"},"datePublished":"2024-02-06T14:41:24+00:00","dateModified":"2024-02-06T14:41:24+00:00","breadcrumb":{"@id":"https:\/\/blog.azuan.com\/?p=206#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.azuan.com\/?p=206"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.azuan.com\/?p=206#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"http:\/\/blog.azuan.com\/"},{"@type":"ListItem","position":2,"name":"SIM Swapping: Desafiando la Autenticaci\u00f3n de Dos Factores y los Robos Millonarios"}]},{"@type":"WebSite","@id":"http:\/\/blog.azuan.com\/#website","url":"http:\/\/blog.azuan.com\/","name":"Blog Azuan","description":"Expertos en ciberseguridad y protecci\u00f3n del endpoint o punto final.","publisher":{"@id":"http:\/\/blog.azuan.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/blog.azuan.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"http:\/\/blog.azuan.com\/#organization","name":"Blog Azuan","url":"http:\/\/blog.azuan.com\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"http:\/\/blog.azuan.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.azuan.com\/wp-content\/uploads\/2022\/11\/logo-white-2.png","contentUrl":"https:\/\/blog.azuan.com\/wp-content\/uploads\/2022\/11\/logo-white-2.png","width":330,"height":330,"caption":"Blog Azuan"},"image":{"@id":"http:\/\/blog.azuan.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Azuan-technologies-sa\/100070250838801\/","https:\/\/twitter.com\/azuantech","https:\/\/www.linkedin.com\/company\/azuan-technologies-s.a."]},{"@type":"Person","@id":"http:\/\/blog.azuan.com\/#\/schema\/person\/d78e4815593dfc4f1b30feb20c451c3c","name":"Paola Utrera","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"http:\/\/blog.azuan.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/878a2efbaa8b9b445bbaf817a7f3f4aec60be89b4b579c39644a9c129537f51d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/878a2efbaa8b9b445bbaf817a7f3f4aec60be89b4b579c39644a9c129537f51d?s=96&d=mm&r=g","caption":"Paola Utrera"},"url":"https:\/\/blog.azuan.com\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/blog.azuan.com\/index.php?rest_route=\/wp\/v2\/posts\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.azuan.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.azuan.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.azuan.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.azuan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=206"}],"version-history":[{"count":3,"href":"https:\/\/blog.azuan.com\/index.php?rest_route=\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":212,"href":"https:\/\/blog.azuan.com\/index.php?rest_route=\/wp\/v2\/posts\/206\/revisions\/212"}],"wp:attachment":[{"href":"https:\/\/blog.azuan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.azuan.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.azuan.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}