{"id":3108,"date":"2026-03-13T16:53:10","date_gmt":"2026-03-13T19:53:10","guid":{"rendered":"https:\/\/wai.global\/?p=3108"},"modified":"2026-03-13T16:53:13","modified_gmt":"2026-03-13T19:53:13","slug":"el-vibecoding-llego-al-estado-y-los-atacantes-lo-saben","status":"publish","type":"post","link":"https:\/\/wai.global\/en\/el-vibecoding-llego-al-estado-y-los-atacantes-lo-saben\/","title":{"rendered":"Vibecoding has come to the State. And the attackers know it."},"content":{"rendered":"<p>For years, the biggest threat to the security of a public system was the easy password. The classic \u201c123456\u201d on the administrator account. Also the shared access between ten people or the session that nobody closed.<\/p>\n\n\n\n<p>But according to Google's Cloud Threat Horizons Report H1 2026, that is changing. The report, which looks at the second half of 2025, shows that the most commonly used attack vector was no longer credential theft, but the <strong>exploitation of vulnerabilities in the software installed by users.<\/strong> 44.5% of intrusions started there. Weak passwords, which until the first half of the same year accounted for 47.1% of initial accesses, fell to 27.2%. A complete turnaround in less than twelve months.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/peligros-del-vibecoding-programar-con-ia-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"863\" src=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/peligros-del-vibecoding-programar-con-ia-1.jpg\" alt=\"\" class=\"wp-image-3111\" srcset=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/peligros-del-vibecoding-programar-con-ia-1.jpg 1000w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/peligros-del-vibecoding-programar-con-ia-1-300x259.jpg 300w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/peligros-del-vibecoding-programar-con-ia-1-768x663.jpg 768w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/peligros-del-vibecoding-programar-con-ia-1-14x12.jpg 14w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Why this matters especially in the public sector<\/h2>\n\n\n\n<p>Government agencies are not the most obvious target for a cyberattack. They don't have cryptocurrencies or handle credit cards. But they do have something that is worth a lot: <strong>citizen data, access to critical infrastructure<\/strong> and, in many cases, <strong>systems developed or adapted internally with little technical oversight.<\/strong><\/p>\n\n\n\n<p>This is where vibecoding comes in.<\/p>\n\n\n\n<p>The term, popularized in the last two years, describes a way of developing software where the programmer does not write code line by line: he asks an AI (Artificial Intelligence) tool to do it and approves what appears on his screen. The result is functional and often quite good. But with a particularity: <strong>who approves it does not always understand what they are approving.<\/strong><\/p>\n\n\n\n<p>In the private sector, this is already generating debate. In the public sector, where technical teams are smaller, budgets are tighter and the pressure to digitize is higher than ever, the phenomenon is amplified. Municipalities that previously could not afford their own development can now have an application ready in hours. This is a real advance. <strong>But it is also software that no one reviewed and with vulnerabilities that no one knows about... until a cybercriminal exploits them.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The time that no longer exists<\/h2>\n\n\n\n<p>The most worrying data in Google's report is not the percentage of attacks but their speed.<\/p>\n\n\n\n<p>In the past, when a vulnerability was released, organizations had weeks to apply the patch. That window allowed IT\/Systems teams to plan, test and update without rushing. In 2025 that window collapsed. Attackers went from public disclosure to active exploitation in a matter of days. In some cases documented by Google, they deployed cryptocurrency miners in less than 48 hours from the announcement of the flaw.<\/p>\n\n\n\n<p>For any public agency that depends on the goodwill of small teams, no budget, no audit, no technical training or a system developed with IA without a formal review process, that margin of days does not exist in practice and the patch arrives when it arrives, when something has already happened.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/vibecoding-en-el-sector-publico.jpg\"><img decoding=\"async\" width=\"1000\" height=\"863\" src=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/vibecoding-en-el-sector-publico.jpg\" alt=\"\" class=\"wp-image-3112\" srcset=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/vibecoding-en-el-sector-publico.jpg 1000w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/vibecoding-en-el-sector-publico-300x259.jpg 300w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/vibecoding-en-el-sector-publico-768x663.jpg 768w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/vibecoding-en-el-sector-publico-14x12.jpg 14w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The credentials did not disappear: they were added<\/h2>\n\n\n\n<p>It would be a mistake to read this report as \u201cpasswords no longer matter\u201d. What the data shows is an accumulation of problems, not a replacement.<\/p>\n\n\n\n<p>83% of the compromises in cloud environments analyzed involved at some point credential theft, phishing or abuse of SaaS service tokens. Attackers walk through a door and look for keys inside. Y <strong>73% of the incidents were aimed at data theft.<\/strong><\/p>\n\n\n\n<p>In a public agency that translates into: <strong>municipal registry, employee files, files in process, contracts, medical records, medical records<\/strong> if there is an integrated health system. Information that has no obvious market price, but that can be used for <strong>extortion, for espionage or simply to paralyze the operation of a government.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What this means for decision makers<\/h2>\n\n\n\n<p>The instinctive response is usually technical: \u201csystems need to be upgraded\u201d, \u201cpersonnel need to be trained\u201d. This is necessary, but not sufficient.<\/p>\n\n\n\n<p>The underlying problem is one of technological governance (who decides what software is installed in a municipality, who allows the implementation of software developed with AI without adequate supervision, what process exists to apply patches when a vulnerability appears, or who has real visibility over access).<\/p>\n\n\n\n<p>Vibecoding is not the enemy. It is a tool. <strong>The problem is adopting it without the controls that any serious development process requires:<\/strong> code review, dependency management, access auditing, incident response protocols.<\/p>\n\n\n\n<p>In the public sector, these controls do not always exist because no one demanded them. And because, until now, attacks came through the weak password door, which is easier to understand and easier to communicate.<\/p>\n\n\n\n<p>The new attack surface is more technical, faster and harder to see. But the consequences for management are the same: <strong>systems down, data compromised, citizens affected and officials answering questions no one wants to answer.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can be controlled<\/h2>\n\n\n\n<p>Not all the news is bad. The same Google report documents that improvements in identity controls and secure default settings pushed attackers into more sophisticated vectors. In other words: when one door closes, attackers look for another. That's not a failure; it's evidence that the controls work.<\/p>\n\n\n\n<p><strong>For public agencies that are in the process of digitization, there are concrete decisions that reduce exposure:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Require software vendors to have a permanent updating process and response times in case of vulnerabilities. It is not enough for the system to work: it must be maintainable.<\/li>\n\n\n\n<li>Separate systems according to their criticality. When the systems are internal, it is not necessary for everything to be on the same network or with the same level of access. A shift system does not need to have the same perimeter as the records system or the payroll system.<\/li>\n\n\n\n<li>Implement multifactor authentication for administrative access. This is the most cost-effective control available and is still lacking in most public agencies in the region.<\/li>\n\n\n\n<li>Have a protocol, however basic, for when something goes wrong. Know who calls whom, what gets disconnected first, and how the incident is communicated to the public.<\/li>\n<\/ul>\n\n\n\n<p>The digital transformation of the State does not stop because new risks appear. But it does require <strong>that decision-makers understand that to digitize without considering security is to build on shaky ground.<\/strong><\/p>\n\n\n\n<p>Vibecoding is not a problem, but its misuse is the cause of an undesirable effect; however, good technological governance is the key to secure systems, vibecoded or not.<\/p>\n\n\n\n<p><em>Data source: Google Cloud Threat Horizons Report H1 2026.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Durante a\u00f1os, la mayor amenaza para la seguridad de un sistema p\u00fablico fue la contrase\u00f1a f\u00e1cil. El cl\u00e1sico &#8220;123456&#8221; en la cuenta del administrador. Tambi\u00e9n el acceso compartido entre diez personas o la sesi\u00f3n que nadie cerr\u00f3. Pero seg\u00fan el Cloud Threat Horizons Report H1 2026 de Google, eso esta cambiando. El informe, que analiza [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[31],"tags":[37,38,45,50],"class_list":["post-3108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-ciberseguridad-en-el-estado","tag-ciberseguridad-en-los-gobiernos","tag-inteligencia-artificial","tag-vibecoding"],"_links":{"self":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts\/3108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/comments?post=3108"}],"version-history":[{"count":1,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts\/3108\/revisions"}],"predecessor-version":[{"id":3114,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts\/3108\/revisions\/3114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/media\/3113"}],"wp:attachment":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/media?parent=3108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/categories?post=3108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/tags?post=3108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}