{"id":1060,"date":"2015-09-27T13:42:26","date_gmt":"2015-09-27T19:42:26","guid":{"rendered":"http:\/\/aguilarsoluciones.com\/portal\/blogs\/?p=5"},"modified":"2026-01-23T22:54:14","modified_gmt":"2026-01-24T04:54:14","slug":"blackhat-revela-funtenna-robo-de-datos-mediante-ondas-de-sonido-video","status":"publish","type":"post","link":"https:\/\/aguilarsoluciones.com\/network\/blackhat-revela-funtenna-robo-de-datos-mediante-ondas-de-sonido-video\/","title":{"rendered":"BlackHat revela: \u00abFuntenna\u00bb, robo de datos mediante ondas de sonido (Video)"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><strong>Un equipo de investigadores de seguridad ha demostrado en la conferencia Black Hat de Las Vegas el desarrollo de una nueva t\u00e9cnica de hacking llamada <a href=\"http:\/\/thehackernews.com\/2015\/08\/radio-signal-hacking-computer.html\" target=\"_blank\" rel=\"noopener noreferrer\">Funtenna<\/a> que utiliza sonido y ondas de radio para desviar los datos de los ordenadores, incluso sin conexi\u00f3n a Internet<\/strong><\/em><br><\/p>\n\n\n\n<!--more-->\n<\/blockquote>\n\n\n\n<p>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image wp-image-1700 size-full\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/aguilarsoluciones.com\/network\/wp-content\/uploads\/Futenna-840x473-compressor-300x169-1.jpg\" alt=\"Hackeo por medio de Funtenna\" class=\"wp-image-1700\" srcset=\"https:\/\/aguilarsoluciones.com\/network\/wp-content\/uploads\/Futenna-840x473-compressor-300x169-1.jpg 300w, https:\/\/aguilarsoluciones.com\/network\/wp-content\/uploads\/Futenna-840x473-compressor-300x169-1-260x146.jpg 260w, https:\/\/aguilarsoluciones.com\/network\/wp-content\/uploads\/Futenna-840x473-compressor-300x169-1-120x67.jpg 120w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Hackeo por medio de Funtenna<\/figcaption><\/figure>\n<\/div>\n\n\n<p>El atacante s\u00f3lo necesita <strong>instalar una pieza de malware en el objetivo<\/strong> que puede ser cualquiera conectado a una red, sea impresora, tel\u00e9fono de la oficina o un ordenador. El malware se apodera del control del circuito electr\u00f3nico del dispositivo hackeado y estos mismos son utilizados como transmisores<\/p>\n\n\n\n<p><span class=\"goog-text-highlight\">Funtenna tiene adem\u00e1s, el potencial para encender los dispositivos conectados a Internet (impresoras, lavadoras, aires acondicionados etc) popularmente conocido como la <\/span><span class=\"goog-text-highlight\">Internet de las cosas<\/span><\/p>\n\n\n\n<p>Seg\u00fan explica Ang Cui de the Manhattan-based Red Balloon Security en la Black Hat hacking conference de las vegas de este a\u00f1o, al cargar un programa malicioso en el dispositivo v\u00edctima, &nbsp;los atacantes pueden hacer vibrar f\u00edsicamente los puertos de entrada y\/o salida del mismo con una frecuencia de su elecci\u00f3n. Dichas vibraciones pueden ser recogidas por una antena de radio AM<\/p>\n\n\n\n<p>Tras la explicaci\u00f3n, se pudo observar una demostraci\u00f3n de la t\u00e9cnica:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Funtenna Demo Data Exfiltration Using Malware Induced Compromising Emanation\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1H1Lv9DAJPg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Un equipo de investigadores de seguridad ha demostrado en la conferencia Black Hat de Las Vegas el desarrollo de una nueva t\u00e9cnica de hacking llamada Funtenna\u00a0que utiliza sonido y ondas de radio para desviar los datos de los ordenadores, incluso sin conexi\u00f3n a Internet<\/p>\n<\/div>","protected":false},"author":2,"featured_media":1681,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"csbAdvScrollBarCursor":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,14,28,31],"tags":[81,122,123,195,214,316,382,411,430],"class_list":["post-1060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-hackers","category-seguridad","category-tecnologia","tag-black-hat","tag-conference","tag-conferencia","tag-funtenna","tag-hack","tag-ondas-de-sonido","tag-seguridad","tag-tecnologia","tag-vibraciones"],"jetpack_featured_media_url":"https:\/\/aguilarsoluciones.com\/network\/wp-content\/uploads\/post_blackhat2015-compressor-1024x538-1.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts\/1060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/comments?post=1060"}],"version-history":[{"count":9,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts\/1060\/revisions"}],"predecessor-version":[{"id":3439,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts\/1060\/revisions\/3439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/media\/1681"}],"wp:attachment":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/media?parent=1060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/categories?post=1060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/tags?post=1060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}