{"id":2125,"date":"2025-06-21T12:57:39","date_gmt":"2025-06-21T10:57:39","guid":{"rendered":"https:\/\/www.elvigilantedigital.com\/?p=2125"},"modified":"2025-06-21T13:05:20","modified_gmt":"2025-06-21T11:05:20","slug":"filtran-16-000-millones-de-contrasenas-que-ha-pasado-y-como-protegerte","status":"publish","type":"post","link":"https:\/\/www.elvigilantedigital.com\/en\/2025\/06\/21\/filtran-16-000-millones-de-contrasenas-que-ha-pasado-y-como-protegerte\/","title":{"rendered":"16 billion passwords leaked: what happened and how to protect yourself"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2125\" class=\"elementor elementor-2125\">\n\t\t\t\t<div class=\"elementor-element elementor-element-422e1e8 e-flex e-con-boxed e-con e-parent\" data-id=\"422e1e8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f91f75 elementor-widget elementor-widget-text-editor\" data-id=\"4f91f75\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"207\" data-end=\"283\">\u00bfQu\u00e9 ha pasado?<\/h2><p data-start=\"207\" data-end=\"283\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Investigadores de Cybernews han descubierto una compilaci\u00f3n gigantesca de 30 bases de datos mal protegidas, con <strong data-start=\"112\" data-end=\"157\">16.000 millones de credenciales filtradas<\/strong>: nombres de usuario, contrase\u00f1as, tokens y cookies asociadas a plataformas como Google, Apple, Facebook, Telegram, GitHub, servicios gubernamentales y m\u00e1s<\/span><\/p><p data-start=\"285\" data-end=\"361\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Aunque estas credenciales no provienen de un solo ataque corporativo, s\u00ed fueron recopiladas mediante <strong data-start=\"101\" data-end=\"117\">infostealers<\/strong>, programas maliciosos que roban informaci\u00f3n directamente desde equipos infectados<\/span><\/p><h2>\u00bfPor qu\u00e9 es tan grave?<\/h2><ul><li data-start=\"398\" data-end=\"476\"><p data-start=\"400\" data-end=\"476\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Es la <strong data-start=\"6\" data-end=\"56\">mayor filtraci\u00f3n de datos conocida hasta ahora<\/strong>, llegando incluso a duplicar la poblaci\u00f3n mundial.<\/span><\/p><\/li><li data-start=\"477\" data-end=\"555\"><p data-start=\"479\" data-end=\"555\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">El riesgo real: los atacantes pueden realizar <strong data-start=\"46\" data-end=\"84\">ataques de relleno de credenciales<\/strong>, entrando a plataformas donde los usuarios tienen la misma contrase\u00f1a<\/span><\/p><\/li><li data-start=\"477\" data-end=\"555\"><p data-start=\"479\" data-end=\"555\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] bg-[#FCECC1] dark:bg-[#64572A] transition-colors duration-100 ease-in-out\">Incluso se ha advertido del aumento de fraudes, phishing y robos de identidad masivos.<\/span><\/p><\/li><\/ul><h2><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2130 size-full\" src=\"http:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/candado2.jpg\" alt=\"\" width=\"1344\" height=\"407\" srcset=\"https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/candado2.jpg 1344w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/candado2-300x91.jpg 300w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/candado2-1024x310.jpg 1024w, https:\/\/www.elvigilantedigital.com\/wp-content\/uploads\/2025\/06\/candado2-768x233.jpg 768w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/>\u00bfC\u00f3mo protegerte?<\/h2><h4 data-start=\"672\" data-end=\"712\">1. Cambia contrase\u00f1as de inmediato<\/h4><p data-start=\"713\" data-end=\"793\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Prioriza cuentas de correo, banca y redes sociales<\/span> .<\/p><h4 data-start=\"795\" data-end=\"837\">2. Usa contrase\u00f1as \u00fanicas y gestores<\/h4><p data-start=\"838\" data-end=\"918\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Utiliza herramientas como <a href=\"https:\/\/keepass.info\/\">KeePass<\/a>, <a href=\"https:\/\/bitwarden.com\/\">Bitwarden<\/a> o gestores incluidos en navegadores.<\/span><\/p><h4 data-start=\"920\" data-end=\"969\">3. Habilita verificaci\u00f3n en dos pasos (2FA)<\/h4><p data-start=\"970\" data-end=\"1050\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Un simple segundo factor detiene muchos ataques<\/span> .<\/p><h4 data-start=\"1052\" data-end=\"1093\">4. Considera el uso de <span style=\"text-decoration: underline;\">passkeys<\/span><\/h4><div class=\"WaaZC\"><div class=\"rPeykc\" data-hveid=\"CIUBEAE\" data-ved=\"2ahUKEwjd18nYq4KOAxVd9rsIHcGuOy4Qo_EKegUIhQEQAQ\"><span data-huuid=\"5146505195101625493\">Muchas empresas est\u00e1n adoptando passkeys como alternativa a las contrase\u00f1as, entre ellas:<span class=\"pjBG2e\" data-cid=\"a8e00dbf-b917-4b81-8bf9-967c7751aaaf\"><span class=\"UV3uM\">\u00a0<\/span><\/span><\/span><div class=\"NPrrbc\" data-cid=\"a8e00dbf-b917-4b81-8bf9-967c7751aaaf\" data-uuids=\"5146505195101625493\"><div class=\"BMebGe btku5b fCrZyc LwdV0e FR7ZSc OJeuxf\" tabindex=\"0\" role=\"button\" aria-label=\"Ver enlaces relacionados\" data-hveid=\"CIABEAE\" data-ved=\"2ahUKEwjd18nYq4KOAxVd9rsIHcGuOy4Q3fYKegUIgAEQAQ\"><div class=\"niO4u\"><div class=\"kHtcsd\">Google, Apple, Microsoft, Amazon o WhatsApp.<span class=\"pjBG2e\" data-cid=\"92dc9740-dec2-4aa4-9d27-2150de849b9a\"><span class=\"UV3uM\">\u00a0<\/span><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"WaaZC\"><div id=\"L45WaJ2EF93s7_UPwd3u8QI__61\" class=\"bsmXxe\"><div data-hveid=\"CJABEAE\" data-ved=\"2ahUKEwjd18nYq4KOAxVd9rsIHcGuOy4Qo_EKegUIkAEQAQ\">\u00a0<\/div><\/div><\/div><h4 data-start=\"1176\" data-end=\"1213\">5. Revisa si tu cuenta ha sido comprometida<\/h4><p data-start=\"1214\" data-end=\"1294\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Comprueba en servicios como <a href=\"https:\/\/haveibeenpwned.com\/\"><em data-start=\"28\" data-end=\"47\">Have I Been Pwned<\/em><\/a> o el monitor oscuro de Google <a href=\"https:\/\/support.google.com\/websearch\/answer\/15191033?hl=es\">(Dark Web Monitor)<\/a><\/span><\/p><h2 data-start=\"1214\" data-end=\"1294\">Conclusi\u00f3n<\/h2><p data-start=\"1214\" data-end=\"1294\">Esto muestra c\u00f3mo los ataques modernos no se limitan a grandes brechas corporativas, sino que las campa\u00f1as con malware son usadas sistem\u00e1ticamente para robar datos.\u00a0<\/p><p data-start=\"1214\" data-end=\"1294\">Tenemos que concienciarnos de que no estamos a salvo con solo una contrase\u00f1a fuerte, hemos de implementar seguridad adicional en nuestras cuentas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 ha pasado? Investigadores de Cybernews han descubierto una compilaci\u00f3n gigantesca de 30 bases de datos mal protegidas, con 16.000 millones de credenciales filtradas: nombres de usuario, contrase\u00f1as, tokens y cookies asociadas a plataformas como Google, Apple, Facebook, Telegram, GitHub, servicios gubernamentales y m\u00e1s Aunque estas credenciales no provienen de un solo ataque corporativo, s\u00ed [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2128,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[110,113,114,112,111,109],"class_list":["post-2125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias","tag-filtracion-masiva-contrasenas","tag-infostealers","tag-passkeys","tag-relleno-de-credenciales","tag-robo-credenciales-2025","tag-seguridad-ciber"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts\/2125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/comments?post=2125"}],"version-history":[{"count":4,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts\/2125\/revisions"}],"predecessor-version":[{"id":2133,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/posts\/2125\/revisions\/2133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/media\/2128"}],"wp:attachment":[{"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/media?parent=2125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/categories?post=2125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.elvigilantedigital.com\/en\/wp-json\/wp\/v2\/tags?post=2125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}