{"id":17644,"date":"2026-01-27T20:01:53","date_gmt":"2026-01-28T00:01:53","guid":{"rendered":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/"},"modified":"2026-01-27T20:01:53","modified_gmt":"2026-01-28T00:01:53","slug":"amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad","status":"publish","type":"post","link":"https:\/\/dharmacorpstore.com\/ar\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/","title":{"rendered":"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad"},"content":{"rendered":"<p>Imag\u00ednate que un grupo de expertos en seguridad descubre una nueva amenaza que se camufla con t\u00e9cnicas sorprendentes para burlar los sistemas de seguridad corporativos m\u00e1s avanzados. Esta vez, el enemigo no usa herramientas comunes ni ataques toscos, sino que aprovecha componentes leg\u00edtimos del sistema operativo, todo para ejecutar un malware dise\u00f1ado para robar datos valiosos sin levantar sospechas. As\u00ed es como el <strong>Amatera Stealer<\/strong> ingresa silenciosamente, poniendo en jaque la seguridad de muchas empresas.<\/p>\n<h2>La Trampa del CAPTCHA Falso: Un Enga\u00f1o que Facilita el Asalto<\/h2>\n<p>El ataque comienza con la creaci\u00f3n de p\u00e1ginas falsas que parecen pedir una verificaci\u00f3n humana a trav\u00e9s de un CAPTCHA. Sin embargo, detr\u00e1s de esta apariencia inocente, se esconde una trampa ingeniosa. El objetivo es enga\u00f1ar al personal para que introduzca un comando manual dentro del cuadro de Ejecutar de Windows. Este simple acto es el desencadenante para activar el <strong>Amatera Stealer<\/strong>, sin que los sistemas de protecci\u00f3n corporativos lo perciban.<\/p>\n<h2>Uso Astuto del Script SyncAppvPublishingServer.vbs: La Entrada Oculta<\/h2>\n<p>Aqu\u00ed es donde la sofisticaci\u00f3n realmente destaca. Los atacantes explotan un script firmado por Microsoft llamado <strong>SyncAppvPublishingServer.vbs<\/strong>, que forma parte de la infraestructura App-V usada para manejar aplicaciones virtualizadas. M\u00e1s que un error, este script se convierte en un <em>LOLBin<\/em> \u2014 un archivo leg\u00edtimo usado para ejecutar c\u00f3digo malicioso, en este caso para canalizar comandos de PowerShell sin levantar alertas.<\/p>\n<p>Esta t\u00e9cnica solo funciona en ciertos entornos espec\u00edficos: Windows 10 o 11 en ediciones Enterprise o Educaci\u00f3n y algunos servidores modernos con App-V activado. Las versiones Home, Pro o entornos de sandbox est\u00e1n a salvo de este tipo de ataque, lo que indica que los atacantes buscan objetivos estrat\u00e9gicos y bien definidos.<\/p>\n<h2>\u00bfC\u00f3mo se Despliega el Ataque? Un Proceso Meticuloso<\/h2>\n<p>Todo sigue un camino detallado y calculado. Primero, <strong>wscript.exe<\/strong> se encarga de lanzar el script SyncAppvPublishingServer.vbs, que reside en App-V. Este script baja un cargador directamente a memoria. El primer paso del cargador es consultar un archivo p\u00fablico en Google Calendar (.ics) que funciona como un canal secreto para recibir instrucciones adicionales.<\/p>\n<p>Despu\u00e9s, el cargador descarga una imagen PNG que contiene un payload comprimido y encriptado de PowerShell. Esta imagen no parece sospechosa, pero dentro lleva la carga maliciosa que finalmente ejecuta en memoria el <strong>Amatera Stealer<\/strong>. Este malware se especializa en robar informaci\u00f3n del navegador y credenciales, un bot\u00edn valioso para cualquier atacante.<\/p>\n<h2>Discreci\u00f3n y Evasi\u00f3n: El Secreto del \u00c9xito del Ataque<\/h2>\n<p>Lo que diferencia este m\u00e9todo de otros ataques convencionales es su nivel excepcional de sigilo. Los atacantes combinan la legitimidad de componentes firmados por Microsoft con acciones que simulan comportamiento humano, uso de servicios externos y ejecuci\u00f3n directa en memoria. Todo eso hace que este malware sea extremadamente dif\u00edcil de detectar para los sistemas tradicionales que buscan patrones habituales de ataques.<\/p>\n<p>Adem\u00e1s, aunque esta t\u00e9cnica est\u00e1 relacionada con campa\u00f1as identificadas como ClickFix, es la primera vez que se usa App-V de esta manera, lo que marca un precedente importante en el mundo de la ciberseguridad.<\/p>\n<h2>\u0627\u0644\u062e\u0627\u062a\u0645\u0629<\/h2>\n<p>El descubrimiento de esta amenaza es una llamada de atenci\u00f3n para reforzar la vigilancia en los sistemas empresariales, especialmente en aquellos con configuraciones espec\u00edficas como App-V activo. La combinaci\u00f3n de ingenier\u00eda social, t\u00e9cnicas avanzadas y el uso inteligente de herramientas leg\u00edtimas convierte al <strong>Amatera Stealer<\/strong> en un adversario formidable. Mantente informado, actualiza tus sistemas y refuerza las medidas de seguridad para proteger tu entorno digital de esta y futuras amenazas.<\/p>\n<p><strong>\u00bfQuieres saber m\u00e1s sobre c\u00f3mo proteger tus sistemas empresariales? \u00a1No dudes en explorar soluciones avanzadas y mantener siempre tus defensas activas!<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Imag\u00ednate que un grupo de expertos en seguridad descubre una nueva amenaza que se camufla con t\u00e9cnicas sorprendentes para burlar<\/p>","protected":false},"author":1,"featured_media":17643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-17644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad - Dharma Store Software<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dharmacorpstore.com\/ar\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad - Dharma Store Software\" \/>\n<meta property=\"og:description\" content=\"Imag\u00ednate que un grupo de expertos en seguridad descubre una nueva amenaza que se camufla con t\u00e9cnicas sorprendentes para burlar\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dharmacorpstore.com\/ar\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Dharma Store Software\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-28T00:01:53+00:00\" \/>\n<meta name=\"author\" content=\"Joffre Acevedo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joffre Acevedo\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/\"},\"author\":{\"name\":\"Joffre Acevedo\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#\\\/schema\\\/person\\\/abb34a87f9ed270909c03e340e47dabd\"},\"headline\":\"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad\",\"datePublished\":\"2026-01-28T00:01:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/\"},\"wordCount\":645,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dharmacorpstore.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/output1-36.png?fit=1024%2C1024&ssl=1\",\"articleSection\":[\"Sin categor\u00eda\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/\",\"url\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/\",\"name\":\"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad - Dharma Store Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dharmacorpstore.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/output1-36.png?fit=1024%2C1024&ssl=1\",\"datePublished\":\"2026-01-28T00:01:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dharmacorpstore.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/output1-36.png?fit=1024%2C1024&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dharmacorpstore.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/output1-36.png?fit=1024%2C1024&ssl=1\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dharmacorpstore.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#website\",\"url\":\"https:\\\/\\\/dharmacorpstore.com\\\/\",\"name\":\"Dharma Store Software\",\"description\":\"Venta de software original y licenciamiento electr\u00f3nico\",\"publisher\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dharmacorpstore.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#organization\",\"name\":\"Dharma Store Software\",\"url\":\"https:\\\/\\\/dharmacorpstore.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dharmacorpstore.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Dharma-Corp-Logo-2023-e1699245439652.png?fit=477%2C108&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dharmacorpstore.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Dharma-Corp-Logo-2023-e1699245439652.png?fit=477%2C108&ssl=1\",\"width\":477,\"height\":108,\"caption\":\"Dharma Store Software\"},\"image\":{\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dharmacorpstore.com\\\/#\\\/schema\\\/person\\\/abb34a87f9ed270909c03e340e47dabd\",\"name\":\"Joffre Acevedo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e340a05cdca494d3fd07f5f5ee21117ad566c02e3ea2ef99ffe7ea8a24d86e88?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e340a05cdca494d3fd07f5f5ee21117ad566c02e3ea2ef99ffe7ea8a24d86e88?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e340a05cdca494d3fd07f5f5ee21117ad566c02e3ea2ef99ffe7ea8a24d86e88?s=96&d=mm&r=g\",\"caption\":\"Joffre Acevedo\"},\"sameAs\":[\"http:\\\/\\\/dharmacorpstore.com\"],\"url\":\"https:\\\/\\\/dharmacorpstore.com\\\/ar\\\/author\\\/joffreyzulygmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad - Dharma Store Software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dharmacorpstore.com\/ar\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/","og_locale":"ar_AR","og_type":"article","og_title":"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad - Dharma Store Software","og_description":"Imag\u00ednate que un grupo de expertos en seguridad descubre una nueva amenaza que se camufla con t\u00e9cnicas sorprendentes para burlar","og_url":"https:\/\/dharmacorpstore.com\/ar\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/","og_site_name":"Dharma Store Software","article_published_time":"2026-01-28T00:01:53+00:00","author":"Joffre Acevedo","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"Joffre Acevedo","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"3 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#article","isPartOf":{"@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/"},"author":{"name":"Joffre Acevedo","@id":"https:\/\/dharmacorpstore.com\/#\/schema\/person\/abb34a87f9ed270909c03e340e47dabd"},"headline":"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad","datePublished":"2026-01-28T00:01:53+00:00","mainEntityOfPage":{"@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/"},"wordCount":645,"commentCount":0,"publisher":{"@id":"https:\/\/dharmacorpstore.com\/#organization"},"image":{"@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2026\/01\/output1-36.png?fit=1024%2C1024&ssl=1","articleSection":["Sin categor\u00eda"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/","url":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/","name":"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad - Dharma Store Software","isPartOf":{"@id":"https:\/\/dharmacorpstore.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#primaryimage"},"image":{"@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2026\/01\/output1-36.png?fit=1024%2C1024&ssl=1","datePublished":"2026-01-28T00:01:53+00:00","breadcrumb":{"@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#primaryimage","url":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2026\/01\/output1-36.png?fit=1024%2C1024&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2026\/01\/output1-36.png?fit=1024%2C1024&ssl=1","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/dharmacorpstore.com\/amatera-stealer-la-nueva-amenaza-que-usa-componentes-de-microsoft-para-evadir-sistemas-de-seguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dharmacorpstore.com\/"},{"@type":"ListItem","position":2,"name":"Amatera Stealer: La Nueva Amenaza que Usa Componentes de Microsoft para Evadir Sistemas de Seguridad"}]},{"@type":"WebSite","@id":"https:\/\/dharmacorpstore.com\/#website","url":"https:\/\/dharmacorpstore.com\/","name":"\u0628\u0631\u0646\u0627\u0645\u062c \u0645\u062a\u062c\u0631 \u062f\u0627\u0631\u0645\u0627 \u0633\u062a\u0648\u0631","description":"\u0628\u064a\u0639 \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0623\u0635\u0644\u064a\u0629 \u0648\u0627\u0644\u062a\u0631\u062e\u064a\u0635 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a","publisher":{"@id":"https:\/\/dharmacorpstore.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dharmacorpstore.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/dharmacorpstore.com\/#organization","name":"\u0628\u0631\u0646\u0627\u0645\u062c \u0645\u062a\u062c\u0631 \u062f\u0627\u0631\u0645\u0627 \u0633\u062a\u0648\u0631","url":"https:\/\/dharmacorpstore.com\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/dharmacorpstore.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2023\/11\/Dharma-Corp-Logo-2023-e1699245439652.png?fit=477%2C108&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2023\/11\/Dharma-Corp-Logo-2023-e1699245439652.png?fit=477%2C108&ssl=1","width":477,"height":108,"caption":"Dharma Store Software"},"image":{"@id":"https:\/\/dharmacorpstore.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dharmacorpstore.com\/#\/schema\/person\/abb34a87f9ed270909c03e340e47dabd","name":"\u062c\u0648\u0641\u0631\u064a \u0623\u0633\u064a\u0641\u064a\u062f\u0648","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/secure.gravatar.com\/avatar\/e340a05cdca494d3fd07f5f5ee21117ad566c02e3ea2ef99ffe7ea8a24d86e88?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e340a05cdca494d3fd07f5f5ee21117ad566c02e3ea2ef99ffe7ea8a24d86e88?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e340a05cdca494d3fd07f5f5ee21117ad566c02e3ea2ef99ffe7ea8a24d86e88?s=96&d=mm&r=g","caption":"Joffre Acevedo"},"sameAs":["http:\/\/dharmacorpstore.com"],"url":"https:\/\/dharmacorpstore.com\/ar\/author\/joffreyzulygmail-com\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dharmacorpstore.com\/wp-content\/uploads\/2026\/01\/output1-36.png?fit=1024%2C1024&ssl=1","jetpack-related-posts":[],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/posts\/17644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/comments?post=17644"}],"version-history":[{"count":0,"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/posts\/17644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/media\/17643"}],"wp:attachment":[{"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/media?parent=17644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/categories?post=17644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dharmacorpstore.com\/ar\/wp-json\/wp\/v2\/tags?post=17644"}],"curies":[{"name":"\u062f\u0628\u0644\u064a\u0648 \u0628\u064a","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}