{"id":22179,"date":"2021-04-13T16:32:40","date_gmt":"2021-04-13T14:32:40","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=22179"},"modified":"2025-09-17T12:16:14","modified_gmt":"2025-09-17T10:16:14","slug":"analisis-del-hackeo-a-microsoft-exchange-server","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/","title":{"rendered":"An\u00e1lisis del hackeo a Microsoft Exchange Server"},"content":{"rendered":"\n<p id=\"block-4486ce7d-be8a-4053-bfdf-63788321b82e\"><br>Ya ha pasado m\u00e1s de un mes desde que Microsoft admitiese que ocurri\u00f3 una filtraci\u00f3n de datos en sus servidores in situ de <a href=\"https:\/\/es.wikipedia.org\/wiki\/Microsoft_Exchange_Server\">Microsoft Exchange Server<\/a>. Los atacantes obtuvieron <a href=\"https:\/\/es.wikipedia.org\/wiki\/Root\">privilegios de administrador<\/a> en los servidores afectados, acceso a los correos electr\u00f3nicos y contrase\u00f1as de los usuarios y tambi\u00e9n a los dispositivos conectados a la misma red. Tambi\u00e9n se han hecho m\u00e1s revelaciones al respecto.<br><\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100846\" class=\"elementor elementor-100846 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Su paquete de productividad seguro<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere su privacidad con<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensajes<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calendarios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/es\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Obtener Mailfence gratis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-02a5c498-e950-41b0-8f90-7b60ca8e4894\">Antecedentes del hackeo a Microsoft Exchange Server<\/h2>\n\n\n\n<p id=\"block-6b5da13a-6a87-4d6f-9069-9b7f1d00669e\">El 5 de enero de 2021, un investigador de la compa\u00f1\u00eda de testing de seguridad DEVCORE <a href=\"https:\/\/twitter.com\/orange_8361\/status\/1346401788811825153\">emiti\u00f3<\/a> el primer informe conocido de la vulnerabilidad a Microsoft. Este fue <a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/a-basic-timeline-of-the-exchange-mass-hack\/\">verificado<\/a> por Microsoft el 8 de enero. Diversas filtraciones en los servidores de Microsoft Exchange Server fueron observadas tambi\u00e9n por otros actores ese mismo mes, y todos alertaron a Microsoft.<\/p>\n\n\n\n<p id=\"block-2eea767e-5046-49e2-8d7a-b8b18663fcc0\">Entre<strong> 26 y el 27 de febrero<\/strong>, los atacantes comenzaron a escanear masivamente los servidores de Microsoft Exchange Server para a\u00f1adirles \u00abbackdoors\u00bb (software que genera puntos de acceso clandestinos) Esto parece haber sido perpetrado <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/really-messy-hack-microsofts-email-system-getting-worse-rcna377\">anticip\u00e1ndose<\/a> a un parche de software anunciado por Microsoft.<\/p>\n\n\n\n<p id=\"block-b237a7fc-fb5a-45fe-8f38-8dd7791c148c\">El <strong>2 de marzo<\/strong>, Microsoft <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\">public\u00f3<\/a> actualizaciones para remediar 4 vulnerabilidades \u00abzero-day\u00bb en el c\u00f3digo base de Microsoft Exchange Server, atribuy\u00e9ndole el ataque (con alto nivel de fiabilidad)&nbsp; a un <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\">conocido grupo de hackers<\/a>. Posteriormente hubo otros grupos de hackers que se vincularon al ataque.<\/p>\n\n\n\n<p id=\"block-48c13118-e234-4791-941c-1d8d543533f7\">El <strong>5 de marzo<\/strong>, un conocido periodista de ciberseguridad public\u00f3 la primicia de que no menos de 30.000 organizaciones en los EE. UU. y miles m\u00e1s a nivel mundial ahora ten\u00edan instaladas \u00abbackdoors\u00bb. Los expertos en seguridad se han esforzado por notificar a las v\u00edctimas y a la vez hacer hincapi\u00e9 en que es necesario prepararse para otra serie de ataques debido a \u00abbackdoors\u00bb instaladas previamente en los servidores afectados.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-d91e81e8-893d-4acb-b9d7-98fc62ab6141\">Situaci\u00f3n actual del hackeo a Microsoft Exchange Server<\/h2>\n\n\n\n<p>El <strong>12 de marzo de 2021<\/strong>, Microsoft <a href=\"https:\/\/twitter.com\/briankrebs\/status\/1370565978153684994\">twitte\u00f3<\/a> que a\u00fan hay alrededor de 82.000 servidores de Microsoft Exchange en riesgo, por no haber recibido el parche. Sin embargo, debido al no haber hecho la actualizaci\u00f3n oportunamente, muchos de esos servidores siguen teniendo fugas. Un cierto n\u00famero de <a href=\"https:\/\/blog.mailfence.com\/es\/protegerse-del-ransomware\/\">ransomware<\/a> fueron desplegados por los atacantes en el inter\u00edn en servidores previamente infectados.<\/p>\n\n\n\n<p>El <strong>22 de<\/strong> <strong>marzo<\/strong>, Microsoft anunci\u00f3 que en el 92% de los servidores in situ de Microsoft Exchange, los efectos del hackeo hab\u00edan sido corregidos o mitigados.<\/p>\n\n\n\n<p>El <strong>12 de abril<\/strong>, la CISA hab\u00eda agregado dos Informes de An\u00e1lisis de Malware (MAR, del ingl\u00e9s \u00abMalware Analysis Reports\u00bb) a la <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a\">Alerta AA21-062A: Mitigaci\u00f3n de las Vulnerabilidades en Microsoft Exchange Server<\/a>. Microsoft continu\u00f3 mitigando los problemas relacionados en la <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Apr\">actualizaci\u00f3n de seguridad de abril de 2021<\/a>. <\/p>\n\n\n\n<p>Como los ataques utilizaron 4 vulnerabilidades de \u00abd\u00eda cero\u00bb, vincul\u00e1ndolos entre s\u00ed para obtener acceso de administrador en los servidores afectados, lograron instalar <a href=\"https:\/\/blog.mailfence.com\/es\/puertas-traseras-de-cifrado\/\">puertas traseras<\/a>. Por lo tanto, es muy importante para cualquier servidor in situ de Microsoft Exchange Server que no solo se aplique la revisi\u00f3n sino que tambi\u00e9n se corrija cualquier efecto o persistencia (implementando las <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\">directrices<\/a> de Microsoft y otros <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/03\/06\/microsoft-ioc-detection-tool-exchange-server-vulnerabilities\">IoC independientes<\/a>)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-1078b327-e6b9-442f-918a-295cfd07346c\">Mailfence no result\u00f3 afectado<\/h2>\n\n\n\n<p id=\"block-d1eb292e-30df-4615-aaf3-d5d1fbece7c5\">Mailfence ofrece conectividad mediante el protocolo ActiveSync Nuestra implementaci\u00f3n de <a href=\"https:\/\/blog.mailfence.com\/es\/pop3-imap-y-exchange-activesync\/\">Exchange ActiveSync<\/a> (EAS) usa las <a href=\"https:\/\/docs.microsoft.com\/en-us\/openspecs\/exchange_server_protocols\/ms-oxprotlp\/229f77ea-6518-4fe7-84fe-bd535fc6c32e\">especificaciones de Microsoft<\/a>, pero es un protocolo de sincronizaci\u00f3n que no tiene nada que ver con los servidores de Exchange. Simplemente tienen la palabra \u00abexchange\u00bb en su nombre, pero es por coincidencia. No compartimos c\u00f3digo en absoluto con el servidor Microsoft Exchange Server in situ (ni con ninguno de sus servicios). Por tanto, nuestro servicio no resulta impactado.<\/p>\n\n\n\n<p id=\"block-de911b65-85e5-44c7-8e8c-917072f74562\">Tambi\u00e9n anunciamos esto mediante nuestra cuenta de Twitter:<br><\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">We run our own implementation of Microsoft specifications. Mailfence users are not impacted.<\/p>&mdash; Mailfence (@Mailfence) <a href=\"https:\/\/twitter.com\/Mailfence\/status\/1369701176866930700?ref_src=twsrc%5Etfw\">March 10, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">You may have heard that <a href=\"https:\/\/twitter.com\/hashtag\/Microsoft?src=hash&amp;ref_src=twsrc%5Etfw\">#Microsoft<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Exchange?src=hash&amp;ref_src=twsrc%5Etfw\">#Exchange<\/a> got hacked. \ud83d\udd13<br><br>Exchange is not the same as <a href=\"https:\/\/twitter.com\/hashtag\/ActiveSync?src=hash&amp;ref_src=twsrc%5Etfw\">#ActiveSync<\/a> Exchange the protocol  Mailfence uses.<br><br>If your mail is hosted on exchange servers and you are worried about the hack. <a href=\"https:\/\/twitter.com\/hashtag\/Mailfence?src=hash&amp;ref_src=twsrc%5Etfw\">#Mailfence<\/a> has you covered. 1\/2 <a href=\"https:\/\/t.co\/8POnFDtDLc\">pic.twitter.com\/8POnFDtDLc<\/a><\/p>&mdash; Mailfence (@Mailfence) <a href=\"https:\/\/twitter.com\/Mailfence\/status\/1371438664635580420?ref_src=twsrc%5Etfw\">March 15, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-d5958b90-7fc9-4179-87ca-47247786db21\"><br>Opte por servicios que sean privados por dise\u00f1o y que promuevan el cifrado<\/h2>\n\n\n\n<p id=\"block-4f88a386-14eb-42e3-acde-1d2061046a2c\">Mailfence es un servicio de webmail <a href=\"https:\/\/mailfence.com\/es\/e-mail-seguro.jsp\">seguro<\/a> y <a href=\"https:\/\/mailfence.com\/es\/e-mail-privado.jsp\">privado<\/a> que <a href=\"https:\/\/blog.mailfence.com\/es\/seguridad-privacidad-y-anonimato\/\">respeta la privacidad de los datos de sus usuarios<\/a> y ofrece <a href=\"https:\/\/blog.mailfence.com\/es\/cifrado-de-extremo-a-extremo-para-e-mail\/\">cifrado de extremo a extremo<\/a> para los mensajes de <a href=\"https:\/\/kb.mailfence.com\/categories\/encryption-and-digital-signatures\/\">correo electr\u00f3nico<\/a>. Los datos cifrados de extremo a extremo permanecen protegidos incluso en un servidor en situaci\u00f3n de peligro. Tenemos planes de expandir ese tipo de cifrado a los mensajes de texto simple enviados\/recibidos y tambi\u00e9n a los componentes de la documentaci\u00f3n. Adem\u00e1s tambi\u00e9n estaremos implementando el cifrado para los datos almacenados (o \u00abdatos en reposo\u00bb), lo que a\u00f1adir\u00e1 una capa adicional de protecci\u00f3n para los datos de los usuarios. \u00a1Mant\u00e9ngase atentos!<\/p>\n\n\n\n<p id=\"block-4f88a386-14eb-42e3-acde-1d2061046a2c\">S\u00edganos en <a href=\"https:\/\/twitter.com\/mailfence\" target=\"_blank\" rel=\"noreferrer noopener\">twitter<\/a>\/<a href=\"https:\/\/www.reddit.com\/r\/mailfence\" target=\"_blank\" rel=\"noreferrer noopener\">reddit<\/a> y mant\u00e9ngase actualizado en todo momento.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ya ha pasado m\u00e1s de un mes desde que Microsoft admitiese que ocurri\u00f3 una filtraci\u00f3n de datos en sus servidores in situ de Microsoft Exchange Server. Los atacantes obtuvieron privilegios de administrador en los servidores afectados, acceso a los correos electr\u00f3nicos y contrase\u00f1as de los usuarios y tambi\u00e9n a los dispositivos conectados a la misma [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85571,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18607,857],"tags":[],"class_list":["post-22179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-novedades-de-mailfence","category-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Qu\u00e9 pas\u00f3 en el hackeo a Microsoft Exchange Server | Blog de Mailfence<\/title>\n<meta name=\"description\" content=\"Los servidores de Microsoft Exchange Server fueron hackeados, revelando informaci\u00f3n personal. Mailfence no result\u00f3 afectado.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An\u00e1lisis del hackeo a Microsoft Exchange Server | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"An\u00e1lisis del hackeo a Microsoft Exchange Server | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T14:32:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T10:16:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"An\u00e1lisis del hackeo a Microsoft Exchange Server\",\"datePublished\":\"2021-04-13T14:32:40+00:00\",\"dateModified\":\"2025-09-17T10:16:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/\"},\"wordCount\":758,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"articleSection\":[\"Novedades de Mailfence\",\"Seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/\",\"name\":\"Qu\u00e9 pas\u00f3 en el hackeo a Microsoft Exchange Server | Blog de Mailfence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"datePublished\":\"2021-04-13T14:32:40+00:00\",\"dateModified\":\"2025-09-17T10:16:14+00:00\",\"description\":\"Los servidores de Microsoft Exchange Server fueron hackeados, revelando informaci\u00f3n personal. Mailfence no result\u00f3 afectado.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/43.png\",\"width\":600,\"height\":600,\"caption\":\"dhfhfhg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/analisis-del-hackeo-a-microsoft-exchange-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/category\\\/seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An\u00e1lisis del hackeo a Microsoft Exchange Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Qu\u00e9 pas\u00f3 en el hackeo a Microsoft Exchange Server | Blog de Mailfence","description":"Los servidores de Microsoft Exchange Server fueron hackeados, revelando informaci\u00f3n personal. Mailfence no result\u00f3 afectado.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/","og_locale":"es_ES","og_type":"article","og_title":"An\u00e1lisis del hackeo a Microsoft Exchange Server | Mailfence Blog","og_description":"An\u00e1lisis del hackeo a Microsoft Exchange Server | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2021-04-13T14:32:40+00:00","article_modified_time":"2025-09-17T10:16:14+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"M Salman Nadeem","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"An\u00e1lisis del hackeo a Microsoft Exchange Server","datePublished":"2021-04-13T14:32:40+00:00","dateModified":"2025-09-17T10:16:14+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/"},"wordCount":758,"publisher":{"@id":"https:\/\/blog.mailfence.com\/es\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","articleSection":["Novedades de Mailfence","Seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/","url":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/","name":"Qu\u00e9 pas\u00f3 en el hackeo a Microsoft Exchange Server | Blog de Mailfence","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","datePublished":"2021-04-13T14:32:40+00:00","dateModified":"2025-09-17T10:16:14+00:00","description":"Los servidores de Microsoft Exchange Server fueron hackeados, revelando informaci\u00f3n personal. Mailfence no result\u00f3 afectado.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","width":600,"height":600,"caption":"dhfhfhg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/es\/analisis-del-hackeo-a-microsoft-exchange-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/es\/"},{"@type":"ListItem","position":2,"name":"Seguridad","item":"https:\/\/blog.mailfence.com\/es\/category\/seguridad\/"},{"@type":"ListItem","position":3,"name":"An\u00e1lisis del hackeo a Microsoft Exchange Server"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/es\/#website","url":"https:\/\/blog.mailfence.com\/es\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/es\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/es\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/22179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/comments?post=22179"}],"version-history":[{"count":16,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/22179\/revisions"}],"predecessor-version":[{"id":103411,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/22179\/revisions\/103411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/media\/85571"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/media?parent=22179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/categories?post=22179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/tags?post=22179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}