{"id":491,"date":"2025-07-24T11:42:35","date_gmt":"2025-07-24T17:42:35","guid":{"rendered":"https:\/\/gtecnologica.com\/blog\/?p=491"},"modified":"2025-07-24T12:38:15","modified_gmt":"2025-07-24T18:38:15","slug":"ataque-hackers-sharepoint-2025-protegete","status":"publish","type":"post","link":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/","title":{"rendered":"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint"},"content":{"rendered":"<h2 style=\"text-align: center;\">\u00bfQu\u00e9 debes hacer hoy mismo para Proteger tu Empresa?<\/h2>\n<h2>\ud83d\udd0d En t\u00e9rminos Simples: \u00bfQu\u00e9 Riesgo corre tu empresa Hoy?<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-535 alignright\" src=\"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/gestor-documental-para-empresas-server-SHAREPOINT-300x174.jpg\" alt=\"los servidores Microsoft SharePoint, utilizados por miles de empresas para compartir archivos y colaborar internamente, se encuentran bajo ataque activo por parte de grupos de hackers chinos.\" width=\"311\" height=\"180\" srcset=\"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/gestor-documental-para-empresas-server-SHAREPOINT-300x174.jpg 300w, https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/gestor-documental-para-empresas-server-SHAREPOINT-768x445.jpg 768w, https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/gestor-documental-para-empresas-server-SHAREPOINT.jpg 906w\" sizes=\"(max-width: 311px) 100vw, 311px\" \/>Imagina que tu computadora de oficina tiene una <strong>&#8220;puerta invisible&#8221;<\/strong> que cualquier hacker del mundo puede abrir sin permiso. Aunque parezca exagerado, esto est\u00e1 ocurriendo actualmente. Los <strong>servidores Microsoft SharePoint<\/strong> \u2014usados por miles de empresas para compartir archivos y colaborar internamente\u2014 est\u00e1n siendo blanco de <strong>ataques cibern\u00e9ticos avanzados<\/strong> por parte de <strong>grupos de hackers chinos.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Estos cibercriminales est\u00e1n aprovechando fallos de seguridad para acceder a datos altamente sensibles, incluyendo bases de datos de clientes, contratos y credenciales internas. En consecuencia, si utilizas SharePoint en tu organizaci\u00f3n, podr\u00edas estar en riesgo sin saberlo.<\/p>\n<p>&nbsp;<\/p>\n<h2>\u26a0\ufe0f Los Fallos Cr\u00edticos que no puedes ignorar<\/h2>\n<p>Se han identificado dos vulnerabilidades de seguridad extremadamente peligrosas, conocidas como <strong>CVE-2025-49704<\/strong> y <strong>CVE-2025-49706<\/strong>. A continuaci\u00f3n, te las explicamos en t\u00e9rminos simples:<\/p>\n<ul>\n<li><strong>CVE-2025-49706:<\/strong> Permite a un atacante suplantar a un usuario leg\u00edtimo. Es como si alguien usara el uniforme de un empleado para entrar a tu oficina sin levantar sospechas.<\/li>\n<li><strong>CVE-2025-49704:<\/strong> Da acceso remoto para instalar malware y controlar el servidor afectado.<\/li>\n<\/ul>\n<p>Cuando se combinan, estas dos brechas permiten un <strong>robo total de la informaci\u00f3n<\/strong> alojada en SharePoint: documentos internos, configuraciones del sistema, archivos estrat\u00e9gicos\u2026 \u00a1todo!<\/p>\n<p>&nbsp;<\/p>\n<h2>\ud83d\udcca \u00bfPor qu\u00e9 este riesgo es urgente?<\/h2>\n<ul>\n<li>M\u00e1s de <strong>400 agencias gubernamentales y empresas privadas<\/strong> ya han sido hackeadas.<\/li>\n<li>Los grupos responsables \u2014como <strong>Linen Typhoon<\/strong> y <strong>Violet Typhoon<\/strong>\u2014 est\u00e1n especializados en espionaje digital.<\/li>\n<li>Usan t\u00e9cnicas discretas y avanzadas, como archivos disfrazados (por ejemplo: <code>debug.js<\/code>) que en realidad contienen virus.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>\ud83d\udee1\ufe0f \u00bfQu\u00e9 hacer si usas SharePoint? Sigue esta Gu\u00eda en 3 Pasos<\/h2>\n<h3>1. Verifica la versi\u00f3n de SharePoint que est\u00e1s utilizando<img decoding=\"async\" class=\"size-medium wp-image-553 alignright\" src=\"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/version-SharePoint-2016-300x150.jpg\" alt=\"o Si usas SharePoint 2013 o anterior: Descon\u00e9ctalo INMEDIATAMENTE de internet. Microsoft ya no da sop\" width=\"300\" height=\"150\" srcset=\"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/version-SharePoint-2016-300x150.jpg 300w, https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/version-SharePoint-2016.jpg 700w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/h3>\n<ul>\n<li><strong>SharePoint 2013 o anterior:<\/strong> Descon\u00e9ctalo <strong>inmediatamente<\/strong> de internet. Microsoft ya no ofrece soporte y est\u00e1 completamente expuesto.<\/li>\n<li><strong>Versiones recientes (2016, 2019, 2022):<\/strong> Aplica los <strong>parches de seguridad de emergencia<\/strong> publicados por Microsoft el <strong>8 de julio de 2025<\/strong>.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>2. Activa el Escudo AMSI<\/h3>\n<p>Microsoft recomienda activar el <strong>Antimalware Scan Interface (AMSI)<\/strong>, una funcionalidad que act\u00faa como un detector de amenazas dentro del servidor. Es una defensa \u00fatil, pero <strong>no suficiente<\/strong>. Debes seguir con el parche completo para garantizar una protecci\u00f3n real.<\/p>\n<h3>3. Cambia las \u201cLlaves Maestras\u201d del Servidor<\/h3>\n<p>Los atacantes est\u00e1n robando <strong>MachineKeys<\/strong>, claves que protegen datos cifrados. La agencia CISA recomienda cambiarlas <strong>dos veces<\/strong>: una antes y otra despu\u00e9s de instalar los parches. Luego, <strong>reinicia el servidor<\/strong> para aplicar todos los cambios.<\/p>\n<p>&nbsp;<\/p>\n<h2>\u2757 Datos importantes que debes saber<\/h2>\n<ul>\n<li><strong>AMSI no es invulnerable:<\/strong> los hackers m\u00e1s experimentados ya conocen t\u00e9cnicas para evadirlo. Por ello, el parche es obligatorio.<\/li>\n<li><strong>SharePoint Online (en la nube)<\/strong> no est\u00e1 afectado. Solo los servidores locales (\u201c<em>on-premises<\/em>\u201d) est\u00e1n en peligro.<\/li>\n<li><\/li>\n<\/ul>\n<h2>\ud83d\udca1 Consejo Final: No seas parte de la estad\u00edstica<\/h2>\n<p>Parchear tu servidor <strong>no es opcional<\/strong>; es como cerrar la puerta de tu casa antes de dormir. Si gestionas datos sensibles en tu empresa, debes actuar ahora:<\/p>\n<ul>\n<li>\ud83d\udd0c Desconecta los sistemas antiguos.<\/li>\n<li>\ud83d\udee0\ufe0f Actualiza y parchea los servidores recientes.<\/li>\n<li>\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Monitorea conexiones sospechosas a estas IPs:<br \/>\n<code>107.191.58.76<\/code>, <code>104.238.159.149<\/code>, <code>96.9.125.147<\/code>.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div style=\"background: linear-gradient(135deg, #ff4c4c, #990000); padding: 30px 20px; border-radius: 12px; text-align: center; color: white; box-shadow: 0 4px 10px rgba(0,0,0,0.2); max-width: 600px; margin: auto;\">\n<h2 style=\"font-size: 22px; line-height: 1.4; margin-bottom: 15px; color: #ffffff;\">\u00bfQuieres dormir tranquilo sabiendo que tu empresa est\u00e1 protegida?<\/h2>\n<p style=\"font-size: 16px; margin-bottom: 18px;\">En <strong>GTEC<\/strong>, transformamos la informaci\u00f3n t\u00e9cnica en acciones claras. Te ayudamos a proteger tu infraestructura digital sin complicaciones ni tecnicismos innecesarios.<\/p>\n<p style=\"font-size: 16px; margin-bottom: 25px;\">Evita ataques, protege tu informaci\u00f3n y mant\u00e9n a salvo tu empresa. \u00a1Act\u00faa hoy!<\/p>\n<p><a style=\"display: inline-block; background: #ffffff; color: #990000; font-weight: bold; padding: 12px 20px; border-radius: 8px; text-decoration: none; font-size: 15px; max-width: 100%; box-sizing: border-box;\" href=\"https:\/\/www.gtecnologica.com\/contact.php\" target=\"_blank\" rel=\"noopener\">Solicitar Auditor\u00eda de Seguridad<\/a><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Porque la ciberseguridad no es solo para expertos\u2026 es para todos.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h4>\ud83d\udcda Fuentes Oficiales Para Profundizar:<\/h4>\n<ul>\n<li><a href=\"https:\/\/cve.mitre.org\/cve\/search_cve_list.html\">Detalles T\u00e9cnicos de CVE-2025-49706<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/07\/20\/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770\">Gu\u00eda de Parches de Emergencia (Microsoft)<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2025\/07\/cisa-orders-urgent-patching-after.html\">Reporte Completo de The Hacker News<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 debes hacer hoy mismo para Proteger tu Empresa? \ud83d\udd0d En t\u00e9rminos Simples: \u00bfQu\u00e9 Riesgo corre tu empresa Hoy? Imagina que tu computadora de oficina tiene una &#8220;puerta invisible&#8221; que cualquier hacker del mundo puede abrir sin permiso. Aunque parezca exagerado, esto est\u00e1 ocurriendo actualmente. Los servidores Microsoft SharePoint \u2014usados por miles de empresas para [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint - Gesti\u00f3n Tecnol\u00f3gica<\/title>\n<meta name=\"description\" content=\"Grupos de hackers chinos est\u00e1n explotando vulnerabilidades cr\u00edticas en SharePoint. Descubre c\u00f3mo proteger tu empresa con esta gu\u00eda urgente y clara.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint\" \/>\n<meta property=\"og:description\" content=\"Grupos de hackers chinos est\u00e1n explotando vulnerabilidades cr\u00edticas en SharePoint. Descubre c\u00f3mo proteger tu empresa con esta gu\u00eda urgente y clara.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/\" \/>\n<meta property=\"og:site_name\" content=\"Gesti\u00f3n Tecnol\u00f3gica\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-24T17:42:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T18:38:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gesti\u00f3n Tecnol\u00f3gica\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gesti\u00f3n Tecnol\u00f3gica\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/\"},\"author\":{\"name\":\"Gesti\u00f3n Tecnol\u00f3gica\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f9b6f6af5a2952d6e8f3e3825fd7395\"},\"headline\":\"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint\",\"datePublished\":\"2025-07-24T17:42:35+00:00\",\"dateModified\":\"2025-07-24T18:38:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg\",\"articleSection\":[\"Seguridad informatica\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/\",\"url\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/\",\"name\":\"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint - Gesti\u00f3n Tecnol\u00f3gica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg\",\"datePublished\":\"2025-07-24T17:42:35+00:00\",\"dateModified\":\"2025-07-24T18:38:15+00:00\",\"description\":\"Grupos de hackers chinos est\u00e1n explotando vulnerabilidades cr\u00edticas en SharePoint. Descubre c\u00f3mo proteger tu empresa con esta gu\u00eda urgente y clara.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg\",\"contentUrl\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg\",\"width\":1536,\"height\":1024,\"caption\":\"CHINOS ATACAN SERVIDORES SHAREPOINT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/ataque-hackers-sharepoint-2025-protegete\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/\",\"name\":\"Gesti\u00f3n Tecnol\u00f3gica\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#organization\",\"name\":\"Gesti\u00f3n Tecnol\u00f3gica\",\"url\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Logo_GTec-2-scaled.png\",\"contentUrl\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Logo_GTec-2-scaled.png\",\"width\":2560,\"height\":971,\"caption\":\"Gesti\u00f3n Tecnol\u00f3gica\"},\"image\":{\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f9b6f6af5a2952d6e8f3e3825fd7395\",\"name\":\"Gesti\u00f3n Tecnol\u00f3gica\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5039658bb744277aa9573cb4923d0e36a9a83b62ac183a06d80a807b7bfdb82?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5039658bb744277aa9573cb4923d0e36a9a83b62ac183a06d80a807b7bfdb82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5039658bb744277aa9573cb4923d0e36a9a83b62ac183a06d80a807b7bfdb82?s=96&d=mm&r=g\",\"caption\":\"Gesti\u00f3n Tecnol\u00f3gica\"},\"url\":\"https:\\\/\\\/gtecnologica.com\\\/blog\\\/author\\\/gtec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint - Gesti\u00f3n Tecnol\u00f3gica","description":"Grupos de hackers chinos est\u00e1n explotando vulnerabilidades cr\u00edticas en SharePoint. Descubre c\u00f3mo proteger tu empresa con esta gu\u00eda urgente y clara.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/","og_locale":"es_ES","og_type":"article","og_title":"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint","og_description":"Grupos de hackers chinos est\u00e1n explotando vulnerabilidades cr\u00edticas en SharePoint. Descubre c\u00f3mo proteger tu empresa con esta gu\u00eda urgente y clara.","og_url":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/","og_site_name":"Gesti\u00f3n Tecnol\u00f3gica","article_published_time":"2025-07-24T17:42:35+00:00","article_modified_time":"2025-07-24T18:38:15+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg","type":"image\/jpeg"}],"author":"Gesti\u00f3n Tecnol\u00f3gica","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Gesti\u00f3n Tecnol\u00f3gica","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#article","isPartOf":{"@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/"},"author":{"name":"Gesti\u00f3n Tecnol\u00f3gica","@id":"https:\/\/gtecnologica.com\/blog\/#\/schema\/person\/5f9b6f6af5a2952d6e8f3e3825fd7395"},"headline":"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint","datePublished":"2025-07-24T17:42:35+00:00","dateModified":"2025-07-24T18:38:15+00:00","mainEntityOfPage":{"@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/gtecnologica.com\/blog\/#organization"},"image":{"@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#primaryimage"},"thumbnailUrl":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg","articleSection":["Seguridad informatica"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/","url":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/","name":"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint - Gesti\u00f3n Tecnol\u00f3gica","isPartOf":{"@id":"https:\/\/gtecnologica.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#primaryimage"},"image":{"@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#primaryimage"},"thumbnailUrl":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg","datePublished":"2025-07-24T17:42:35+00:00","dateModified":"2025-07-24T18:38:15+00:00","description":"Grupos de hackers chinos est\u00e1n explotando vulnerabilidades cr\u00edticas en SharePoint. Descubre c\u00f3mo proteger tu empresa con esta gu\u00eda urgente y clara.","breadcrumb":{"@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#primaryimage","url":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg","contentUrl":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/07\/CHINOS-ATACAN-SERVIDORES-SHAREPOINT.jpg","width":1536,"height":1024,"caption":"CHINOS ATACAN SERVIDORES SHAREPOINT"},{"@type":"BreadcrumbList","@id":"https:\/\/gtecnologica.com\/blog\/ataque-hackers-sharepoint-2025-protegete\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gtecnologica.com\/blog\/"},{"@type":"ListItem","position":2,"name":"\u00a1ALERTA M\u00c1XIMA! Hackers Chinos atacan servidores SharePoint"}]},{"@type":"WebSite","@id":"https:\/\/gtecnologica.com\/blog\/#website","url":"https:\/\/gtecnologica.com\/blog\/","name":"Gesti\u00f3n Tecnol\u00f3gica","description":"","publisher":{"@id":"https:\/\/gtecnologica.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gtecnologica.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/gtecnologica.com\/blog\/#organization","name":"Gesti\u00f3n Tecnol\u00f3gica","url":"https:\/\/gtecnologica.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/gtecnologica.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/06\/Logo_GTec-2-scaled.png","contentUrl":"https:\/\/gtecnologica.com\/blog\/wp-content\/uploads\/2025\/06\/Logo_GTec-2-scaled.png","width":2560,"height":971,"caption":"Gesti\u00f3n Tecnol\u00f3gica"},"image":{"@id":"https:\/\/gtecnologica.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/gtecnologica.com\/blog\/#\/schema\/person\/5f9b6f6af5a2952d6e8f3e3825fd7395","name":"Gesti\u00f3n Tecnol\u00f3gica","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/d5039658bb744277aa9573cb4923d0e36a9a83b62ac183a06d80a807b7bfdb82?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5039658bb744277aa9573cb4923d0e36a9a83b62ac183a06d80a807b7bfdb82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5039658bb744277aa9573cb4923d0e36a9a83b62ac183a06d80a807b7bfdb82?s=96&d=mm&r=g","caption":"Gesti\u00f3n Tecnol\u00f3gica"},"url":"https:\/\/gtecnologica.com\/blog\/author\/gtec\/"}]}},"_links":{"self":[{"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/posts\/491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/comments?post=491"}],"version-history":[{"count":18,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/posts\/491\/revisions"}],"predecessor-version":[{"id":566,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/posts\/491\/revisions\/566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/media?parent=491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/categories?post=491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtecnologica.com\/blog\/wp-json\/wp\/v2\/tags?post=491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}