{"id":2805,"date":"2018-10-25T14:02:58","date_gmt":"2018-10-25T18:02:58","guid":{"rendered":"https:\/\/orendasecurity.com\/blog\/how-the-xmrig-trojan-virus-sneaks-onto-your-computer-system-copy\/"},"modified":"2025-10-24T12:17:08","modified_gmt":"2025-10-24T16:17:08","slug":"como-virus-troyano-xmrig-se-cuela-sistema-informatico","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/","title":{"rendered":"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO"},"content":{"rendered":"<section class=\"c-text-block -generic js-animate is-show\">\n<div class=\"c-text-block_wrap s-wysiwyg\">\n<p>Es dif\u00edcil saber qu\u00e9 es real y qu\u00e9 es falso en el mundo cibern\u00e9tico, ya que la mayor\u00eda de los usuarios de ordenadores desconocen las amenazas en constante evoluci\u00f3n. No es culpa suya, ya que los ciberdelincuentes profesionales pueden enmascarar sus virus, como los troyanos. El XMRig CPU Miner es un troyano que muchos usuarios desprevenidos instalan. Secuestra el ordenador del usuario y utiliza sus recursos para minar moneda digital. Esto incluye:<\/p>\n<ul>\n<li>Bitcoin<\/li>\n<li>Monero<\/li>\n<li>Dashcoin<\/li>\n<li>DarkNetCoin<\/li>\n<\/ul>\n<p>Nuestros expertos est\u00e1n aqu\u00ed para informarle sobre las mejores formas de detectar la presencia de este virus y qu\u00e9 hacer si lo instala accidentalmente en su sistema.<\/p>\n<h2>C\u00f3mo reconocer XMRig<\/h2>\n<p>Dado que XMRig CPU Miner es un troyano, se ha dise\u00f1ado para que parezca una actualizaci\u00f3n de Adobe Flash Player, un programa de software que suele ser objeto de ataques. XMRig tiene una versi\u00f3n para GPU NVIDIA y otra para GPU AMD. En el \u00faltimo a\u00f1o, los ciberdelincuentes han modificado este virus troyano, permitiendo al usuario actualizar su Adobe Flash Player para reforzar a\u00fan m\u00e1s la ilusi\u00f3n de que se trata de una actualizaci\u00f3n real.<\/p>\n<p>Gracias a los investigadores de seguridad de Palo Alto Networks que investigaron el virus, los usuarios pueden determinar varios detalles que delatan a XMRig:<\/p>\n<ul>\n<li>La ventana emergente del instalador indicar\u00e1 que el editor es desconocido, cuando deber\u00eda indicar que el editor es Adobe Flash.<\/li>\n<li>El ordenador del usuario se ralentizar\u00e1 repentinamente porque XMRig utiliza el 70 % de la CPU del ordenador y consume energ\u00eda de las tarjetas gr\u00e1ficas.<\/li>\n<li>El ordenador del usuario se calentar\u00e1 durante largos periodos de tiempo, lo que reducir\u00e1 la vida \u00fatil de la CPU.<\/li>\n<li>Los usuarios pueden notar la presencia del programa Wise en su ordenador y del archivo Winserv.exe.<\/li>\n<\/ul>\n<p>Los investigadores de Palo Alto no han identificado las URL que llevan a los usuarios a descargar accidentalmente el virus, pero hay muchas formas de prevenirlo y otros virus.<\/p>\n<h2>C\u00f3mo proteger su sistema inform\u00e1tico<\/h2>\n<p>Aunque Adobe anunci\u00f3 el fin de la vida \u00fatil de Flash y que Microsoft lo eliminar\u00eda oficialmente a finales de 2020, las empresas siguen utiliz\u00e1ndolo y corren el riesgo de instalar el troyano XMRig.<\/p>\n<p>A continuaci\u00f3n se indican algunos m\u00e9todos para evitar que el virus entre en su sistema:<\/p>\n<ul>\n<li>Ejecute un programa antivirus de confianza con an\u00e1lisis programados y actualice continuamente el software.<\/li>\n<li>Utilice filtros web y de correo electr\u00f3nico para bloquear las URL maliciosas.<\/li>\n<li>Conciencie a su personal sobre las advertencias de seguridad y los riesgos de utilizar fuentes desconocidas para descargar y ejecutar programas.<\/li>\n<li>Acuda directamente al sitio web de Adobe para obtener actualizaciones.<\/li>\n<\/ul>\n<h2>Por qu\u00e9 las empresas utilizan Flash<\/h2>\n<p>Por lo general, las empresas utilizan software propietario obsoleto porque actualizarlo requiere tiempo y fondos de los que no disponen. As\u00ed es como las empresas desarrollan vulnerabilidades. Flash es \u00fatil en la creaci\u00f3n de anuncios porque permite a las empresas realizar un seguimiento del n\u00famero de clics que recibe un anuncio concreto. Hasta ahora, todo el mundo puede utilizar Flash para ver v\u00eddeos y reproducir m\u00fasica f\u00e1cilmente, pero algunos usuarios no pueden utilizar la alternativa, que es HTML5. A las empresas no les gusta HTML5 porque es m\u00e1s dif\u00edcil proteger el contenido entregado del usuario final. Flash Media Server tiene una funcionalidad DRM integrada que permite a los usuarios transmitir cualquier contenido mientras protege la URL y evita que los datos se almacenen en cach\u00e9.<\/p>\n<p>Las empresas tienen informaci\u00f3n cr\u00edtica, ya sea financiera o privada, por lo que necesitan implementar las medidas de seguridad m\u00e1s s\u00f3lidas. Conf\u00ede en nuestros expertos de Orenda Security para que utilicen sus diversos conocimientos para encontrar las vulnerabilidades de su sistema mediante penetration testing, pruebas din\u00e1micas y otras pr\u00e1cticas \u00fatiles. P\u00f3ngase en contacto con nosotros hoy mismo en Info@orendasecurity.com o solicite un presupuesto.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/section>\n<p><!--themify_builder_static--><!--\/themify_builder_static--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Es dif\u00edcil saber qu\u00e9 es real y qu\u00e9 es falso en el mundo cibern\u00e9tico, ya que la mayor\u00eda de los usuarios de ordenadores desconocen las amenazas en constante evoluci\u00f3n. No es culpa suya, ya que los ciberdelincuentes profesionales pueden enmascarar sus virus, como los troyanos. El XMRig CPU Miner es un troyano que muchos usuarios [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-2805","post","type-post","status-publish","format-standard","hentry","category-concienciacion-sobre-seguridad","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO - Orenda Security<\/title>\n<meta name=\"description\" content=\"The XMRig CPU Miner is a Trojan Horse that many unsuspecting users install. It hijacks the user\u2019s computer and uses its resources to mine digital currency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"The XMRig CPU Miner is a Trojan Horse that many unsuspecting users install. It hijacks the user\u2019s computer and uses its resources to mine digital currency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-25T18:02:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-24T16:17:08+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO\",\"datePublished\":\"2018-10-25T18:02:58+00:00\",\"dateModified\":\"2025-10-24T16:17:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/\"},\"wordCount\":674,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"articleSection\":[\"Concienciaci\u00f3n sobre seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/\",\"name\":\"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"datePublished\":\"2018-10-25T18:02:58+00:00\",\"dateModified\":\"2025-10-24T16:17:08+00:00\",\"description\":\"The XMRig CPU Miner is a Trojan Horse that many unsuspecting users install. It hijacks the user\u2019s computer and uses its resources to mine digital currency.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO - Orenda Security","description":"The XMRig CPU Miner is a Trojan Horse that many unsuspecting users install. It hijacks the user\u2019s computer and uses its resources to mine digital currency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/","og_locale":"es_ES","og_type":"article","og_title":"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO - Orenda Security","og_description":"The XMRig CPU Miner is a Trojan Horse that many unsuspecting users install. It hijacks the user\u2019s computer and uses its resources to mine digital currency.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/","og_site_name":"Orenda Security","article_published_time":"2018-10-25T18:02:58+00:00","article_modified_time":"2025-10-24T16:17:08+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO","datePublished":"2018-10-25T18:02:58+00:00","dateModified":"2025-10-24T16:17:08+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/"},"wordCount":674,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"articleSection":["Concienciaci\u00f3n sobre seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/","url":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/","name":"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"datePublished":"2018-10-25T18:02:58+00:00","dateModified":"2025-10-24T16:17:08+00:00","description":"The XMRig CPU Miner is a Trojan Horse that many unsuspecting users install. It hijacks the user\u2019s computer and uses its resources to mine digital currency.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/como-virus-troyano-xmrig-se-cuela-sistema-informatico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/es\/"},{"@type":"ListItem","position":2,"name":"C\u00d3MO EL VIRUS TROYANO XMRIG SE CUELA EN SU SISTEMA INFORM\u00c1TICO"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/es\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts\/2805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/comments?post=2805"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts\/2805\/revisions"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/media?parent=2805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/categories?post=2805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/tags?post=2805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}