{"id":14607,"date":"2019-03-18T09:26:27","date_gmt":"2019-03-18T15:26:27","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=14607"},"modified":"2019-03-18T09:27:22","modified_gmt":"2019-03-18T15:27:22","slug":"detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/","title":{"rendered":"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso"},"content":{"rendered":"<p><span>El Instituto Nacional de Ciberseguridad (Incibe) inform\u00f3 este jueves de que ha detectado m\u00e1s de 200 aplicaciones infectadas por un c\u00f3digo malicioso apodado Simbad,<!--more-->que estuvieron disponibles en la tienda oficial Google Play. Seg\u00fan precisa el centro tecnol\u00f3gico con sede en Le\u00f3n, la funcionalidad principal del malware es mostrar publicidad y, aunque las aplicaciones ya han sido eliminadas de Google Play, los usuarios que instalaron alguna de ellas deber\u00e1n borrarlas manualmente. Se han visto afectados aquellos usuarios que tengan instaladas en su dispositivo alguna de las aplicaciones incluidas en este enlace. Desde Google ya se han tomado las acciones necesarias para eliminar las aplicaciones afectadas de Google Play, por lo que no existe riesgo de que se vean infectados nuevos usuarios. Como una de las funcionalidades del c\u00f3digo malicioso es la de eliminar el icono de las aplicaciones del lanzador, para que sea m\u00e1s dif\u00edcil de eliminar, se aconseja acceder a Ajustes \u00bb Aplicaciones y revisar el listado completo de aplicaciones instaladas en el dispositivo para descartar que no se tenga instalada ninguna app de las afectadas.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Instituto Nacional de Ciberseguridad (Incibe) inform\u00f3 este jueves de que ha detectado m\u00e1s de 200 aplicaciones infectadas por un c\u00f3digo malicioso apodado Simbad,<\/p>\n","protected":false},"author":1,"featured_media":14608,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[376],"tags":[],"class_list":["post-14607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empresa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"El Instituto Nacional de Ciberseguridad (Incibe) inform\u00f3 este jueves de que ha detectado m\u00e1s de 200 aplicaciones infectadas por un c\u00f3digo malicioso apodado Simbad,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T15:26:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-18T15:27:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso\",\"datePublished\":\"2019-03-18T15:26:27+00:00\",\"dateModified\":\"2019-03-18T15:27:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\"},\"wordCount\":192,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg\",\"articleSection\":[\"Empresa\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\",\"name\":\"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg\",\"datePublished\":\"2019-03-18T15:26:27+00:00\",\"dateModified\":\"2019-03-18T15:27:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/","og_locale":"en_US","og_type":"article","og_title":"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"El Instituto Nacional de Ciberseguridad (Incibe) inform\u00f3 este jueves de que ha detectado m\u00e1s de 200 aplicaciones infectadas por un c\u00f3digo malicioso apodado Simbad,","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-03-18T15:26:27+00:00","article_modified_time":"2019-03-18T15:27:22+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso","datePublished":"2019-03-18T15:26:27+00:00","dateModified":"2019-03-18T15:27:22+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/"},"wordCount":192,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg","articleSection":["Empresa"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/","name":"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg","datePublished":"2019-03-18T15:26:27+00:00","dateModified":"2019-03-18T15:27:22+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.1-8.jpg","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/empresa\/detectan-200-aplicaciones-infectadas-por-un-codigo-malicioso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Detectan 200 aplicaciones infectadas por un c\u00f3digo malicioso"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=14607"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14607\/revisions"}],"predecessor-version":[{"id":14609,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14607\/revisions\/14609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/14608"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=14607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=14607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=14607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}