{"id":242671,"date":"2026-02-11T10:41:11","date_gmt":"2026-02-11T10:41:11","guid":{"rendered":"https:\/\/www.jolera.com\/cuando-las-plataformas-de-confianza-portan-malware\/"},"modified":"2026-04-14T14:22:31","modified_gmt":"2026-04-14T14:22:31","slug":"cuando-las-plataformas-de-confianza-portan-malware","status":"publish","type":"post","link":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/","title":{"rendered":"Cuando las plataformas de confianza portan malware"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.27.5&#8243; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/When-Trusted-Platforms-Carry-Malware-The-Emerging-Risk-on-Hugging-Face.jpg&#8221; custom_padding=&#8221;120px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Cuando las plataformas de confianza portan malware<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>El riesgo emergente de Hugging Face<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;5 min leer&#8221; button_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#0F2E5C&#8221; button_bg_color=&#8221;#d7f0ff&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;6px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>For years, <strong>Hugging Face<\/strong> has been embraced by the artificial intelligence community as a central hub for models, datasets, and collaborative development. Often likened to the \u201c<strong>GitHub of AI<\/strong>,\u201d the platform hosts hundreds of thousands of machine learning models used by researchers, developers, and enterprises across the world. Its reputation for openness and innovation has made it a cornerstone of modern AI work&#8230; <strong>until now.<\/strong><\/p>\n<p>Recent cybersecurity research reveals a disturbing trend: threat actors are abusing <strong>Hugging Face<\/strong>\u2019s trusted infrastructure to distribute Android malware at scale. In doing so, they are exploiting the implicit trust developers and security systems place in established platforms. This shift in attacker behaviour highlights a broader risk surface in AI ecosystems and underscores the need for updated defensive strategies in cybersecurity.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|30px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>La campa\u00f1a: De la confianza al troyano<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Esta amenaza proviene de una <strong>campa\u00f1a de malware para Android<\/strong> que abusa de la infraestructura de alojamiento de modelos de Hugging Face. Seg\u00fan Bitdefender, el ataque se basa en la ingenier\u00eda social, enga\u00f1ando a los usuarios para que instalen una falsa aplicaci\u00f3n de seguridad llamada <strong>TrustBastion<\/strong>. <\/p>\n<p>Una vez instalada, la aplicaci\u00f3n funciona como un dropper, mostrando falsos avisos de actualizaci\u00f3n del sistema o de Google Play. Cuando se activa, descarga y ejecuta una carga maliciosa alojada en conjuntos de datos de Hugging Face en lugar de en dominios abiertamente maliciosos. <\/p>\n<p>Al aprovechar una plataforma fiable y de gran reputaci\u00f3n, los atacantes reducen significativamente la probabilidad de que los controles de seguridad tradicionales bloqueen o marquen la actividad, permitiendo que el malware eluda la detecci\u00f3n.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/The-Campaign-From-Trust-to-Trojan.jpg&#8221; alt=&#8221;La campa\u00f1a De la confianza al troyano&#8221; title_text=&#8221;La campa\u00f1a De la confianza al troyano&#8221; align=&#8221;right&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;80%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Polimorfismo a escala: Evadir la detecci\u00f3n<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Lo que hace que esta campa\u00f1a sea especialmente eficaz (y preocupante) es el uso <strong>del polimorfismo del lado del servidor<\/strong>. En lugar de servir un archivo APK est\u00e1tico, los atacantes generan autom\u00e1ticamente miles de paquetes de aplicaciones Android (APK) \u00fanicos con peque\u00f1as variaciones. Estas innumerables variantes se suben a los repositorios de Hugging Face, creando un perfil de malware siempre cambiante que los sistemas de detecci\u00f3n basados en firmas tienen dificultades para identificar.  <\/p>\n<p>El an\u00e1lisis de Bitdefender descubri\u00f3 que uno de esos repositorios acumul\u00f3 m\u00e1s de 6.000 commits en menos de un mes, con nuevas versiones de la carga \u00fatil apareciendo aproximadamente cada 15 minutos. Cuando ese repositorio fue retirado, la campa\u00f1a resurgi\u00f3 r\u00e1pidamente con un nuevo nombre (Premium Club), con s\u00f3lo cambios superficiales en los iconos, pero conservando una funcionalidad maliciosa id\u00e9ntica. <\/p>\n<p>Este nivel de automatizaci\u00f3n y r\u00e1pida mutaci\u00f3n de la carga \u00fatil demuestra c\u00f3mo los atacantes est\u00e1n industrializando la distribuci\u00f3n de malware, tratando a las plataformas de confianza como canales de distribuci\u00f3n no regulados, en lugar de simples herramientas de desarrollo.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;60px|30px|||false|false&#8221; custom_padding_phone=&#8221;60px|30px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Las capacidades del malware<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Una vez ejecutada, la carga \u00fatil final funciona como un <strong>troyano de acceso remoto (RAT)<\/strong>. Abusa de los Servicios de Accesibilidad de Android y otros permisos para monitorizar el comportamiento del usuario, capturar el contenido de la pantalla, robar credenciales y, potencialmente, exfiltrar datos sensibles. <\/p>\n<p>Seg\u00fan informan <strong>Bleeping Computer<\/strong> y <strong>TechRadar<\/strong>, el malware intenta presentar interfaces de inicio de sesi\u00f3n fraudulentas para servicios financieros muy utilizados, con el objetivo de obtener credenciales y c\u00f3digos de pantalla de bloqueo de v\u00edctimas desprevenidas.<\/p>\n<p>Dado que utiliza los Servicios de Accesibilidad, el malware tambi\u00e9n puede eludir las protecciones t\u00edpicas a nivel de usuario, lo que dificulta su detecci\u00f3n y eliminaci\u00f3n. En algunos casos, bloquea la desinstalaci\u00f3n, atrincher\u00e1ndose a\u00fan m\u00e1s en el dispositivo comprometido. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/Malwares-Capabilities.jpg&#8221; alt=&#8221;Capacidades del malware&#8221; title_text=&#8221;Capacidades del malware&#8221; align=&#8221;right&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Por qu\u00e9 las plataformas de confianza son objetivos atractivos<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Esta campa\u00f1a subraya un cambio cr\u00edtico en la forma en que los actores de amenazas ven la confianza. Hist\u00f3ricamente, los actores maliciosos han confiado en sitios web sospechosos, dominios de phishing o servidores comprometidos para su distribuci\u00f3n. Con el auge de las sofisticadas redes de distribuci\u00f3n de contenidos (CDN) y los repositorios colaborativos, los atacantes reconocen la ventaja de mezclar la actividad maliciosa con la infraestructura leg\u00edtima.  <\/p>\n<p>Plataformas como Hugging Face son intr\u00ednsecamente atractivas:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Alta reputaci\u00f3n de dominio<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>El tr\u00e1fico procedente de los dominios de Hugging Face rara vez es se\u00f1alado por las herramientas de seguridad, que asocian la plataforma con la actividad leg\u00edtima de los desarrolladores.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Modelo de contribuci\u00f3n abierta<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Los usuarios pueden cargar modelos y conjuntos de datos con una fricci\u00f3n m\u00ednima, lo que facilita a los atacantes la inserci\u00f3n de artefactos maliciosos que eludan los filtros iniciales.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Amplia integraci\u00f3n<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Los modelos y conjuntos de datos de Hugging Face se incorporan a los flujos de trabajo de todos los sectores, lo que aumenta su exposici\u00f3n y su impacto potencial.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>El resultado es un riesgo para la cadena de suministro que no se limita a los investigadores de IA. Incluso las organizaciones con s\u00f3lidas defensas contra el malware pueden tener dificultades para detectar cargas \u00fatiles maliciosas cuando proceden de un repositorio de confianza. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Mitigaci\u00f3n y pr\u00e1cticas defensivas<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Los expertos en seguridad subrayan que el riesgo va m\u00e1s all\u00e1 <strong>del malware para Android<\/strong>. A medida que los ataques a la cadena de suministro del aprendizaje autom\u00e1tico se hacen m\u00e1s comunes, las organizaciones deben replantearse c\u00f3mo integran los activos de IA externos. Algunas de las mejores pr\u00e1cticas incluyen:  <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Validaci\u00f3n estricta de modelos y conjuntos de datos<\/strong><br \/>Adopte un escaneado riguroso en busca de malware y c\u00f3digo inseguro antes de integrar modelos externos. Formatos como los safetensores, introducidos para mitigar los riesgos de deserializaci\u00f3n hostil, deben priorizarse sobre formatos menos seguros como los modelos basados en pickle.   <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Sandboxing y aislamiento<\/strong><br \/>Ejecute modelos o c\u00f3digo de IA que no sean de confianza dentro de sandboxes seguros para contener posibles comportamientos maliciosos.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Revise los indicadores de confianza<\/strong><br \/>Evite habilitar funciones como trust_remote_code o trust_repo sin comprender las implicaciones de seguridad, especialmente en sistemas de producci\u00f3n.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Supervisi\u00f3n continua<\/strong><br \/>Despliegue la detecci\u00f3n de anomal\u00edas y el an\u00e1lisis del comportamiento en la ejecuci\u00f3n de modelos y el comportamiento de las aplicaciones para identificar actividades sospechosas.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#056CF2&#8243; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Aunque ninguna medida por s\u00ed sola elimina el riesgo por completo, una estrategia defensiva de varias capas puede reducir significativamente la probabilidad de que un c\u00f3digo malicioso llegue a los usuarios finales y les afecte.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Garantizar la confianza en un ecosistema impulsado por la IA<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">La campa\u00f1a de malware Hugging Face subraya una dura verdad: las plataformas de confianza pueden amplificar involuntariamente las amenazas sofisticadas. A medida que se acelera la adopci\u00f3n de la IA, la superficie de ataque se expande m\u00e1s all\u00e1 de la infraestructura tradicional hacia repositorios de modelos, conjuntos de datos y flujos de trabajo de desarrollo. <\/p>\n<p style=\"text-align: center;\">La reputaci\u00f3n ya no es un control. Las organizaciones deben tratar los ecosistemas de IA como parte de su per\u00edmetro de seguridad, con una supervisi\u00f3n continua, procesos de validaci\u00f3n estrictos y una gobernanza integrada por dise\u00f1o. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0F2E5C&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Refuerce su ciberdefensa contra las amenazas posibilitadas por la IA<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">El abuso de la IA en la cadena de suministro es un riesgo operativo real. Mitigarlo requiere una supervisi\u00f3n continua, una detecci\u00f3n avanzada de amenazas y una respuesta r\u00e1pida a los incidentes. <\/p>\n<p style=\"text-align: center;\">En Jolera, aseguramos a las organizaciones mediante servicios de ciberseguridad gestionados y protecci\u00f3n proactiva, al tiempo que apoyamos la adopci\u00f3n segura de la IA con gobernanza incorporada.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.jolera.com\/es\/soluciones-de-ciberseguridad\/&#8221; button_text=&#8221;Explora nuestras soluciones de ciberseguridad&#8221; button_alignment=&#8221;right&#8221; button_alignment_tablet=&#8221;right&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyODYwNCJ9fQ==@&#8221; button_text=&#8221;Contacte con nuestros expertos en seguridad&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;left&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#0F2E5C&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cuando las plataformas de confianza portan malwareEl riesgo emergente de Hugging FaceFor years, Hugging Face has been embraced by the artificial intelligence community as a central hub for models, datasets, and collaborative development. Often likened to the \u201cGitHub of AI,\u201d the platform hosts hundreds of thousands of machine learning models used by researchers, developers, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":242670,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[335],"tags":[],"class_list":["post-242671","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-de-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cuando las plataformas de confianza portan malware | Jolera<\/title>\n<meta name=\"description\" content=\"Recientes campa\u00f1as de malware para Android est\u00e1n abusando de la plataforma de confianza Hugging Face para distribuir cargas \u00fatiles maliciosas disfrazadas de aplicaciones de seguridad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuando las plataformas de confianza portan malware | Jolera\" \/>\n<meta property=\"og:description\" content=\"Recientes campa\u00f1as de malware para Android est\u00e1n abusando de la plataforma de confianza Hugging Face para distribuir cargas \u00fatiles maliciosas disfrazadas de aplicaciones de seguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Jolera\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jolerainc\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-11T10:41:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T14:22:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jolera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jolera\" \/>\n<meta name=\"twitter:site\" content=\"@jolera\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jolera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/\"},\"author\":{\"name\":\"Jolera\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#\\\/schema\\\/person\\\/9d0aa0ee3c29a585afccdf73a491a1ae\"},\"headline\":\"Cuando las plataformas de confianza portan malware\",\"datePublished\":\"2026-02-11T10:41:11+00:00\",\"dateModified\":\"2026-04-14T14:22:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/\"},\"wordCount\":3746,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"articleSection\":[\"Noticias de TI\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/\",\"name\":\"Cuando las plataformas de confianza portan malware | Jolera\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"datePublished\":\"2026-02-11T10:41:11+00:00\",\"dateModified\":\"2026-04-14T14:22:31+00:00\",\"description\":\"Recientes campa\u00f1as de malware para Android est\u00e1n abusando de la plataforma de confianza Hugging Face para distribuir cargas \u00fatiles maliciosas disfrazadas de aplicaciones de seguridad.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"contentUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"width\":1200,\"height\":628,\"caption\":\"Las plataformas de IA de confianza no son inmunes a las amenazas\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/cuando-las-plataformas-de-confianza-portan-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cuando las plataformas de confianza portan malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/\",\"name\":\"Global Systems Integrator \u2013 IT & Cybersecurity\",\"description\":\"Global Systems Integrator\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#organization\",\"name\":\"Jolera\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Jolera-logo-blue-sq.png\",\"contentUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Jolera-logo-blue-sq.png\",\"width\":400,\"height\":400,\"caption\":\"Jolera\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/jolerainc\\\/\",\"https:\\\/\\\/x.com\\\/jolera\",\"https:\\\/\\\/www.instagram.com\\\/jolerainc\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/jolera\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@JoleraTV\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/#\\\/schema\\\/person\\\/9d0aa0ee3c29a585afccdf73a491a1ae\",\"name\":\"Jolera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"caption\":\"Jolera\"},\"sameAs\":[\"https:\\\/\\\/www.jolera.com\"],\"url\":\"https:\\\/\\\/www.jolera.com\\\/es\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cuando las plataformas de confianza portan malware | Jolera","description":"Recientes campa\u00f1as de malware para Android est\u00e1n abusando de la plataforma de confianza Hugging Face para distribuir cargas \u00fatiles maliciosas disfrazadas de aplicaciones de seguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/","og_locale":"es_ES","og_type":"article","og_title":"Cuando las plataformas de confianza portan malware | Jolera","og_description":"Recientes campa\u00f1as de malware para Android est\u00e1n abusando de la plataforma de confianza Hugging Face para distribuir cargas \u00fatiles maliciosas disfrazadas de aplicaciones de seguridad.","og_url":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/","og_site_name":"Jolera","article_publisher":"https:\/\/www.facebook.com\/jolerainc\/","article_published_time":"2026-02-11T10:41:11+00:00","article_modified_time":"2026-04-14T14:22:31+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","type":"image\/png"}],"author":"Jolera","twitter_card":"summary_large_image","twitter_creator":"@jolera","twitter_site":"@jolera","twitter_misc":{"Escrito por":"Jolera","Tiempo de lectura":"19 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#article","isPartOf":{"@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/"},"author":{"name":"Jolera","@id":"https:\/\/www.jolera.com\/es\/#\/schema\/person\/9d0aa0ee3c29a585afccdf73a491a1ae"},"headline":"Cuando las plataformas de confianza portan malware","datePublished":"2026-02-11T10:41:11+00:00","dateModified":"2026-04-14T14:22:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/"},"wordCount":3746,"commentCount":0,"publisher":{"@id":"https:\/\/www.jolera.com\/es\/#organization"},"image":{"@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","articleSection":["Noticias de TI"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/","url":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/","name":"Cuando las plataformas de confianza portan malware | Jolera","isPartOf":{"@id":"https:\/\/www.jolera.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","datePublished":"2026-02-11T10:41:11+00:00","dateModified":"2026-04-14T14:22:31+00:00","description":"Recientes campa\u00f1as de malware para Android est\u00e1n abusando de la plataforma de confianza Hugging Face para distribuir cargas \u00fatiles maliciosas disfrazadas de aplicaciones de seguridad.","breadcrumb":{"@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#primaryimage","url":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","contentUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","width":1200,"height":628,"caption":"Las plataformas de IA de confianza no son inmunes a las amenazas"},{"@type":"BreadcrumbList","@id":"https:\/\/www.jolera.com\/es\/cuando-las-plataformas-de-confianza-portan-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jolera.com\/es\/"},{"@type":"ListItem","position":2,"name":"Cuando las plataformas de confianza portan malware"}]},{"@type":"WebSite","@id":"https:\/\/www.jolera.com\/es\/#website","url":"https:\/\/www.jolera.com\/es\/","name":"Global Systems Integrator \u2013 IT & Cybersecurity","description":"Global Systems Integrator","publisher":{"@id":"https:\/\/www.jolera.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jolera.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.jolera.com\/es\/#organization","name":"Jolera","url":"https:\/\/www.jolera.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.jolera.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.jolera.com\/wp-content\/uploads\/2024\/10\/Jolera-logo-blue-sq.png","contentUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/2024\/10\/Jolera-logo-blue-sq.png","width":400,"height":400,"caption":"Jolera"},"image":{"@id":"https:\/\/www.jolera.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/jolerainc\/","https:\/\/x.com\/jolera","https:\/\/www.instagram.com\/jolerainc\/","https:\/\/www.linkedin.com\/company\/jolera\/","https:\/\/www.youtube.com\/@JoleraTV"]},{"@type":"Person","@id":"https:\/\/www.jolera.com\/es\/#\/schema\/person\/9d0aa0ee3c29a585afccdf73a491a1ae","name":"Jolera","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","caption":"Jolera"},"sameAs":["https:\/\/www.jolera.com"],"url":"https:\/\/www.jolera.com\/es\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/posts\/242671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/comments?post=242671"}],"version-history":[{"count":0,"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/posts\/242671\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/media\/242670"}],"wp:attachment":[{"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/media?parent=242671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/categories?post=242671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jolera.com\/es\/wp-json\/wp\/v2\/tags?post=242671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}