{"id":7154,"date":"2021-03-22T16:17:13","date_gmt":"2021-03-22T16:17:13","guid":{"rendered":"https:\/\/198.27.90.141\/?p=7154"},"modified":"2021-05-11T13:05:33","modified_gmt":"2021-05-11T13:05:33","slug":"casos-reais-e-famosos-de-ataques-de-malware","status":"publish","type":"post","link":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/","title":{"rendered":"11 casos reais e famosos de ataques de malware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7154\" class=\"elementor elementor-7154 elementor-6134\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71d4f8be elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"71d4f8be\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-79830c4f\" data-id=\"79830c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56aafc2 elementor-widget elementor-widget-heading\" data-id=\"56aafc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">11 casos reais e famosos de ataques de malware<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161d464 elementor-widget elementor-widget-template\" data-id=\"161d464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4201\" class=\"elementor elementor-4201 elementor-4192 elementor-4192\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dffd2b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dffd2b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb88354\" data-id=\"bb88354\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8309bfc elementor-align-left elementor-tablet-align-center elementor-widget elementor-widget-post-info\" data-id=\"8309bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-07d5219 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>22 mar\u00e7o, 2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-573941e elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Por<\/span>\n\t\t\t\t\t\t\t\t\t\tGatefy\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-389e7a6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-list\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/ameaca\/\" class=\"elementor-post-info__terms-list-item\">Amea\u00e7a<\/a>, <a href=\"https:\/\/gatefy.com\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/category\/blog\/threat-research\/\" class=\"elementor-post-info__terms-list-item\">Threat Research<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255fe8b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"255fe8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png\" class=\"attachment-full size-full wp-image-7155\" alt=\"Malware famoso usado em casos de ataques hackers\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png 800w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware-300x150.png 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware-768x384.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3476e9c elementor-widget elementor-widget-template\" data-id=\"3476e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4319\" class=\"elementor elementor-4319 elementor-4237 elementor-4237\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3a25ba elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"b3a25ba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-baf9f65\" data-id=\"baf9f65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ffe851 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"4ffe851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec99e1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ec99e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7767a29 elementor-widget elementor-widget-text-editor\" data-id=\"7767a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Muitos casos de ataques famosos de hackers utilizam malware em algum momento. Por exemplo, primeiramente, o cibercriminoso pode enviar para voc\u00ea um e-mail de phishing. Sem anexo, sem links. S\u00f3 texto. Depois que ele conquistar a sua confian\u00e7a, em um segundo momento, ele pode enviar um anexo malicioso, ou seja, um malware disfar\u00e7ado de arquivo leg\u00edtimo.<\/p><p>O malware \u00e9 um software malicioso projetado para infectar computadores e outros dispositivos. A inten\u00e7\u00e3o por tr\u00e1s da infec\u00e7\u00e3o \u00e9 que varia. Por qu\u00ea? Porque o cibercriminoso pode usar um malware para ganhar dinheiro, para roubar informa\u00e7\u00f5es secretas que podem dar algum tipo de vantagem estrat\u00e9gica, para impedir que uma empresa funcione ou at\u00e9 mesmo s\u00f3 para se divertir.\u00a0<\/p><p>Sim, existem hackers que agem apenas pelo prazer.<\/p><p>Na verdade, malware \u00e9 um termo amplo. \u00c9 como uma categoria. Dentro desta categoria, existem diferentes tipos de amea\u00e7as, como <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/qual-e-diferenca-entre-worm-e-virus\/\" target=\"_blank\" rel=\"noopener\">v\u00edrus, worm<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-trojan\/\" target=\"_blank\" rel=\"noopener\">trojan<\/a> e <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>.\u00a0<\/p><p>Para combater malwares que s\u00e3o entregues via e-mail, aqui na Gatefy oferecemos uma solu\u00e7\u00e3o de e-mail gateway e outra de anti-fraude baseada em DMARC. Voc\u00ea pode solicitar uma <a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\" target=\"_blank\" rel=\"noopener\">demo clicando aqui<\/a> ou <a href=\"https:\/\/gatefy.com\/pt-br\/contato\/\" target=\"_blank\" rel=\"noopener\">mais informa\u00e7\u00f5es<\/a>.<\/p><p>Para se ter uma ideia da quantidade de casos envolvendo malware, de acordo com o FBI, os preju\u00edzos causados por diferentes tipos de <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/bec-phishing-continuam-moda-diz-relatorio-fbi\/\" target=\"_blank\" rel=\"noopener\">malware somaram mais de USD 10 milh\u00f5es em 2019<\/a>.\u00a0<\/p><p>A forma mais utilizada para propaga\u00e7\u00e3o de malware continua sendo via e-mail. Como o <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/relatorio-da-verizon-ransomware-phishing-bec\/\" target=\"_blank\" rel=\"noopener\">relat\u00f3rio da Verizon<\/a> confirma: de cada 10 tentativas de infec\u00e7\u00e3o usando malware, 9 acontecem por meio de e-mails.<\/p><p>Os exemplos de ataques de malware listados abaixo v\u00e3o te mostrar como as fraudes envolvendo este tipo de amea\u00e7a podem funcionar, mostrando o dano que eles causam a empresas e pessoas.<\/p><p>Neste post, vamos abordar os seguintes casos de malware:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec7a7cf elementor-widget elementor-widget-template\" data-id=\"ec7a7cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4327\" class=\"elementor elementor-4327 elementor-4215 elementor-4215\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa2f920 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa2f920\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4faaeec\" data-id=\"4faaeec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c7bf09 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"8c7bf09\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tNeste artigo, voc\u00ea vai ler mais sobre:\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__8c7bf09\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0406b elementor-widget elementor-widget-template\" data-id=\"7c0406b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4303\" class=\"elementor elementor-4303\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13ca685 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13ca685\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f3824af\" data-id=\"f3824af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-26ab6fe elementor-widget elementor-widget-image\" data-id=\"26ab6fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/bec-business-email-compromise\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/elementor\/thumbs\/bec-whitepaper-pt-p44ei873l77kv9n3u68beco60vyk1orejgjks299z2.jpg\" title=\"bec-whitepaper-pt\" alt=\"bec-whitepaper-pt\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2928299\" data-id=\"2928299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bbb67b elementor-widget elementor-widget-heading\" data-id=\"7bbb67b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">BEC - Business Email Compromise<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58730f6 elementor-widget elementor-widget-text-editor\" data-id=\"58730f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fa\u00e7a o download deste ebook para entender tudo sobre BEC, das caracter\u00edsticas \u00e0s t\u00e9cnicas mais usadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC botao&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-a3d21a0 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a3d21a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook\/bec-business-email-compromise\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Baixar Agora!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-802296a elementor-widget elementor-widget-heading\" data-id=\"802296a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Confira 11 casos reais de ataques de malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-234aa32 elementor-widget elementor-widget-heading\" data-id=\"234aa32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. CovidLock, ransomware, 2020<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b159dd elementor-widget elementor-widget-text-editor\" data-id=\"7b159dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O medo em rela\u00e7\u00e3o ao Coronav\u00edrus (COVID-19) tem sido muito explorado por cibercriminosos. O ransomware CovidLock \u00e9 um exemplo. O ransomware infecta as v\u00edtimas via arquivo malicioso. A promessa do arquivo \u00e9 oferecer mais informa\u00e7\u00f5es sobre a doen\u00e7a.<\/p><p>O problema \u00e9 que, depois de instalado, o CovidLock criptografa dados de dispositivos Android e nega acesso dos dados para as v\u00edtimas. Para liberar o acesso, \u00e9 preciso pagar o resgate de USD 100 por dispositivo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38f7da4 elementor-widget elementor-widget-heading\" data-id=\"38f7da4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. LockerGoga, ransomware, 2019<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9ce858 elementor-widget elementor-widget-text-editor\" data-id=\"b9ce858\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O LockerGoga \u00e9 um ransomware que ganhou os notici\u00e1rios em 2019 por infectar grandes corpora\u00e7\u00f5es no mundo, como, por exemplo, a Altran Technologies e a Hydro. \u00c9 estimado que ele tenha causado preju\u00edzos de milh\u00f5es de d\u00f3lares em ataques avan\u00e7ados e direcionados.\u00a0<\/p><p>As infec\u00e7\u00f5es do LockerGoga envolvem e-mails maliciosos, golpes de phishing e tamb\u00e9m o roubo de credenciais. O LockerGoga \u00e9 considerado uma amea\u00e7a muito perigosa porque bloqueia completamente o acesso das v\u00edtimas ao sistema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241a1bc elementor-widget elementor-widget-heading\" data-id=\"241a1bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Emotet, trojan, 2018<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15d539a elementor-widget elementor-widget-text-editor\" data-id=\"15d539a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Emotet \u00e9 um trojan que ficou famoso, em 2018, depois que o Department of Homeland Security, dos EUA, o definiu como um dos malwares mais perigosos e destrutivos. O motivo de tanto alarde \u00e9 que o Emotet \u00e9 muito usado em casos de roubos de informa\u00e7\u00f5es financeiras, de logins banc\u00e1rios e at\u00e9 de criptomoedas, como bitcoin.\u00a0<\/p><p>O principal vetor de infec\u00e7\u00e3o s\u00e3o e-mails maliciosos na forma de campanhas de spam e phishing. 2 exemplos marcantes s\u00e3o o caso do banco chileno Consorcio, com preju\u00edzo de USD 2 milh\u00f5es, e o caso da cidade de Allentown, na Pensilv\u00e2nia, com perdas de USD 1 milh\u00e3o.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cca28ae elementor-widget elementor-widget-heading\" data-id=\"cca28ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. WannaCry, ransomware, 2017<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df8668a elementor-widget elementor-widget-text-editor\" data-id=\"df8668a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Um dos piores ataques de ransomware da hist\u00f3ria atende pelo nome de WannaCry, introduzido por meio de e-mails de phishing, em 2017. A amea\u00e7a explora uma vulnerabilidade no Windows.<\/p><p>\u00c9 estimado que mais de 200 mil pessoas foram atingidas em todo o mundo pelo WannaCry, incluindo hospitais, universidades e grandes empresas, como FedEx, Telefonica, Nissan e Renault. O preju\u00edzo causado pelo WannaCry ultrapassa USD 4 bilh\u00f5es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd7602a elementor-widget elementor-widget-heading\" data-id=\"dd7602a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Petya, ransomware, 2016<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a56f96 elementor-widget elementor-widget-text-editor\" data-id=\"7a56f96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ao contr\u00e1rio da maioria dos ransomwares, o Petya atua bloqueando todo o sistema operacional da m\u00e1quina. Quero dizer, bloqueando o sistema Windows. Para liber\u00e1-lo, a v\u00edtima tem que pagar um resgate.\u00a0<\/p><p>Estima-se que as perdas envolvendo o Petya e suas varia\u00e7\u00f5es mais novas e destrutivas cheguem a USD 10 bilh\u00f5es desde que ele foi lan\u00e7ado em 2016. Dentre as v\u00edtimas, est\u00e3o bancos, aeroportos, empresas de petr\u00f3leo e empresas de transporte de diferentes partes do mundo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-455784b elementor-widget elementor-widget-heading\" data-id=\"455784b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. CryptoLocker, ransomware, 2013<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aecb0ac elementor-widget elementor-widget-text-editor\" data-id=\"aecb0ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O CryptoLocker \u00e9 um dos ransomwares mais famosos da hist\u00f3ria porque, quando foi lan\u00e7ado em 2013, utilizou uma chave de criptografia muito grande, o que dificultou o trabalho dos especialistas. Acredita-se que tenha causado preju\u00edzos de mais de USD 3 milh\u00f5es, infectando mais de 200 mil computadores com sistema Windows.\u00a0<\/p><p>Esse tipo de ransomware era distribu\u00eddo principalmente via e-mail, por meio de arquivos maliciosos que se pareciam com arquivos PDF, mas, obviamente, n\u00e3o eram.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-403fcb0 elementor-widget elementor-widget-heading\" data-id=\"403fcb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7. Stuxnet, worm, 2010<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-504f59b elementor-widget elementor-widget-text-editor\" data-id=\"504f59b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Stuxnet merece uma men\u00e7\u00e3o especial nesta lista por ter sido usado em um ataque pol\u00edtico, em 2010, ao programa nuclear do Ir\u00e3 e por explorar in\u00fameras <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/vulnerabilidade-de-dia-zero-e-ataque-de-dia-zeroa\/\" target=\"_blank\" rel=\"noopener\">vulnerabilidades de dia zero<\/a> do Windows. Esse worm supersofisticado tem a capacidade de infectar dispositivos atrav\u00e9s de drives USB, n\u00e3o sendo necess\u00e1ria, portanto, conex\u00e3o com internet.\u00a0<\/p><p>Uma vez instalado, o malware Stuxnet \u00e9 respons\u00e1vel por assumir o controle do sistema. Acredita-se que tenha sido desenvolvido a mando de algum governo. Leia-se: EUA e Israel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a76c892 elementor-widget elementor-widget-heading\" data-id=\"a76c892\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">8. Zeus, trojan, 2007<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eec0d4b elementor-widget elementor-widget-text-editor\" data-id=\"eec0d4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Zeus \u00e9 um trojan distribu\u00eddo por meio de arquivos maliciosos escondidos em e-mails e sites falsos, em casos de phishing. Ele ficou muito conhecido por se propagar rapidamente e tamb\u00e9m por copiar os toques do teclado, o que o levou a ser muito utilizado em casos de roubos de credenciais e senhas, como contas de e-mails e contas banc\u00e1rias.\u00a0<\/p><p>Os ataques utilizando o Zeus atingiram grande empresas, como Amazon, Bank of America e Cisco. O preju\u00edzo causado pelo Zeus e suas varia\u00e7\u00f5es \u00e9 estimado em mais de USD 100 milh\u00f5es desde que a primeira vers\u00e3o foi criada em 2007.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56fb12e elementor-widget elementor-widget-heading\" data-id=\"56fb12e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">9. MyDoom, worm, 2004<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a32608 elementor-widget elementor-widget-text-editor\" data-id=\"0a32608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Em 2004, o worm MyDoom se tornou conhecido e famoso por atingir grandes empresas de tecnologia, como Google e Microsoft. Para atrair mais pessoas, ele era divulgado usando assuntos de e-mail chamativos, como, por exemplo, &#8220;Error&#8221;, &#8220;Test&#8221; e &#8220;Mail Delivery System\u201d.\u00a0<\/p><p>O MyDoom foi muito usado para <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-um-ataque-ddos\/\" target=\"_blank\" rel=\"noopener\">ataques de DDoS<\/a> e como backdoor para permitir controle remoto. Os preju\u00edzos s\u00e3o estimados, segundo not\u00edcias da \u00e9poca, em milh\u00f5es de d\u00f3lares.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68a0fd7 elementor-widget elementor-widget-heading\" data-id=\"68a0fd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">10. ILOVEYOU, worm, 2000<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9737059 elementor-widget elementor-widget-text-editor\" data-id=\"9737059\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O ILOVEYOU \u00e9 um malware do tipo worm que se disfar\u00e7ava como uma carta de amor, recebida via e-mail em forma de anexo malicioso, e pedia ao usu\u00e1rio para verific\u00e1-la gentilmente.\u00a0<\/p><p>Not\u00edcias apontam que ele infectou mais de 45 milh\u00f5es de pessoas nos anos 2000, causando mais de 15 bilh\u00f5es de d\u00f3lares em preju\u00edzos. \u00c9 considerado tamb\u00e9m um dos primeiros casos de engenharia social usados em ataques de malware. Uma vez executado, o ILOVEYOU tinha a capacidade de se autoreplicar utilizando o e-mail da v\u00edtima.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5fbf67 elementor-widget elementor-widget-heading\" data-id=\"a5fbf67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">11. Melissa, virus, 1999<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e88d3d elementor-widget elementor-widget-text-editor\" data-id=\"4e88d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O v\u00edrus Melissa infectou milhares de computadores no mundo pelos idos de 1999. A amea\u00e7a foi disseminada por e-mail, usando um anexo malicioso do Word e um assunto atraente: &#8220;Mensagem importante de (nome de algu\u00e9m)&#8221;.\u00a0<\/p><p>O v\u00edrus Melissa \u00e9 considerado um dos primeiros casos de engenharia social da hist\u00f3ria. Inclusive, a amea\u00e7a tinha a capacidade de se espalhar automaticamente por e-mail. Not\u00edcias da \u00e9poca relatam que ele infectou muitas empresas e pessoas, causando preju\u00edzos estimados em USD 80 milh\u00f5es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e99c608 elementor-widget elementor-widget-heading\" data-id=\"e99c608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como combater ataques de malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241fd99 elementor-widget elementor-widget-text-editor\" data-id=\"241fd99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Existem 2 pontos ou frentes de combate importantes para evitar e se prevenir de infec\u00e7\u00f5es causadas por malware.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241d6e5 elementor-widget elementor-widget-heading\" data-id=\"241d6e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Conscientiza\u00e7\u00e3o em ciberseguran\u00e7a<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21000b8 elementor-widget elementor-widget-text-editor\" data-id=\"21000b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O primeiro ponto \u00e9 a quest\u00e3o da conscientiza\u00e7\u00e3o em ciberseguran\u00e7a. \u00c9 preciso estar atento na internet. Isto significa: cuidado com sites e e-mails suspeitos. E aquela velha m\u00e1xima continua: se voc\u00ea n\u00e3o tiver certeza do que est\u00e1 fazendo, n\u00e3o clique em links e n\u00e3o abra anexos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34a2046 elementor-widget elementor-widget-heading\" data-id=\"34a2046\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Tecnologia para combater malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ae6018 elementor-widget elementor-widget-text-editor\" data-id=\"8ae6018\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O segundo ponto envolve o uso de tecnologia. \u00c9 importante que voc\u00ea tenha no seu computador ou dispositivo uma solu\u00e7\u00e3o anti-malware. Para usu\u00e1rios finais, h\u00e1 v\u00e1rias op\u00e7\u00f5es gratuitas e boas no mercado.<\/p><p>Para empresas, al\u00e9m deste tipo de solu\u00e7\u00e3o, n\u00f3s sempre recomendamos refor\u00e7ar a prote\u00e7\u00e3o da rede de e-mails. Como j\u00e1 explicado, o e-mail \u00e9 o principal vetor de malware. Ent\u00e3o, uma solu\u00e7\u00e3o de seguran\u00e7a de e-mail pode livrar o seu neg\u00f3cio de grandes dores de cabe\u00e7a.<\/p><p>Aqui na Gatefy oferecemos uma solu\u00e7\u00e3o de e-mail gateway e outra de anti-fraude baseada em DMARC. Inclusive, voc\u00ea pode solicitar uma <a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\" target=\"_blank\" rel=\"noopener\">demo clicando aqui<\/a> ou <a href=\"https:\/\/gatefy.com\/pt-br\/contato\/\" target=\"_blank\" rel=\"noopener\">mais informa\u00e7\u00f5es<\/a>. O nosso time de especialistas em ciberseguran\u00e7a vai logo entrar em contato para te ajudar.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e004ea3 elementor-widget elementor-widget-template\" data-id=\"e004ea3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4620\" class=\"elementor elementor-4620\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95982b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95982b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f77959\" data-id=\"7f77959\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-f614fab elementor-widget elementor-widget-image\" data-id=\"f614fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg\" class=\"attachment-full size-full wp-image-97\" alt=\"Gatefy Dashboard\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg 1280w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-300x169.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1024x576.jpg 1024w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-768x432.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1200x675.jpg 1200w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b50450b\" data-id=\"b50450b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9416cd4 elementor-widget elementor-widget-text-editor\" data-id=\"9416cd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMelhore a seguran\u00e7a da sua empresa. Agende demo!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1deb1 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"3b1deb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo form&quot;}\" class=\"events-tracker-for-elementor\" id=\"cta3_pt\" name=\"cta3_pt\" aria-label=\"cta3_pt\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"4620\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"3b1deb1\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Relat\u00f3rio IBM: insights sobre custo de vazamentos de dados - Gatefy\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"7815\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Nome*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail Corporativo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail Corporativo*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_e594bbf elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_e594bbf\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTelefone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_e594bbf]\" id=\"form-field-field_e594bbf\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Telefone*\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Apenas n\u00fameros e caracteres de telefone (#, -, *, etc.) s\u00e3o aceitos.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_d2f3e82 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d2f3e82\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_d2f3e82]\" id=\"form-field-field_d2f3e82\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Cargo*\">Cargo*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Tecnologia\">Tecnologia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Financeiro\">Financeiro<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Recursos Humanos\">Recursos Humanos<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Comercial\">Comercial<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Marketing\">Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_e5faed5 elementor-col-100\">\n\t\t\t\t\t<label> <font size=\"2\">\n<input type=\"checkbox\" data-privacy=\"true\" name=\"communications\"\u00a0 value=\"1\">\nConcordo em receber informa\u00e7\u00f5es de acordo com a <a href=\"https:\/\/gatefy.com\/pt-br\/politica-privacidade\/\"\ntarget=\"_blank\">Pol\u00edtica de Privacidade e Cookies da Gatefy<\/a>.\nVoc\u00ea pode cancelar a assinatura a qualquer momento.\n<input type=\"hidden\" data-privacy=\"true\" name=\"privacy_policy\" value=\"1\">\n\u00a0<input type=\"hidden\" data-privacy=\"true\" name=\"terms_of_use\" value=\"1\">\n<\/font>\n<\/label>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_83eebfa elementor-col-100 recaptcha_v3-bottomright\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_83eebfa\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Ley0Y4aAAAAADbdMG_0j3T4a82SexhiFrcCP5JE\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomright\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Receber contato<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41e2d34\" data-id=\"41e2d34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5368f99 elementor-widget elementor-widget-template\" data-id=\"5368f99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_offset&quot;:100,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4297\" class=\"elementor elementor-4297\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab703fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab703fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a46a065\" data-id=\"a46a065\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;Sidebar 1 PT banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-8362479 elementor-widget elementor-widget-image\" data-id=\"8362479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/phishing\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"370\" height=\"230\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png\" class=\"attachment-full size-full wp-image-16407\" alt=\"\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png 370w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1-300x186.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-654f745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"654f745\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2924798\" data-id=\"2924798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b22d40 elementor-widget elementor-widget-wp-widget-recent-posts\" data-id=\"4b22d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n\t\t<h5>Veja tamb\u00e9m<\/h5><nav aria-label=\"Veja tamb\u00e9m\">\n\t\t<ul>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\">3 maneiras que a LGPD afeta o e-mail da sua empresa<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook-lgpg\/\">LGPD<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\">Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<\/ul>\n\n\t\t<\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d229c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d229c13\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9f7398\" data-id=\"f9f7398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2f385d elementor-widget elementor-widget-template\" data-id=\"c2f385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4151\" class=\"elementor elementor-4151 elementor-3964 elementor-3964\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03c5dac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03c5dac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-782b239\" data-id=\"782b239\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-056265e elementor-widget elementor-widget-heading\" data-id=\"056265e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">N\u00e3o esque\u00e7a de compartilhar este post<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88cfcd1 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"88cfcd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af288c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af288c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e31e090 elementor-widget elementor-widget-heading\" data-id=\"e31e090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Not\u00edcias Relacionadas<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce216ce elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ce216ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-arrow-down\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4182cb elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"d4182cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8305 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-dicas-conselhos\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg\" class=\"attachment-medium size-medium wp-image-8308\" alt=\"Checklist para LGPD assegurar prote\u00e7\u00e3o de e-mail.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" >\n\t\t\t\t3 maneiras que a LGPD afeta o e-mail da sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" aria-label=\"Leia mais sobre 3 maneiras que a LGPD afeta o e-mail da sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-7960 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg\" class=\"attachment-medium size-medium wp-image-7961\" alt=\"Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" >\n\t\t\t\tQuais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" aria-label=\"Leia mais sobre Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16789 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg\" class=\"attachment-medium size-medium wp-image-16791\" alt=\"cadeado, escudo (senhas fortes e mecanismos de prote\u00e7\u00e3o) e outras boas praticas de seguran\u00e7a de e-mail\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" >\n\t\t\t\t6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" aria-label=\"Leia mais sobre 6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":7155,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,1,2,16],"tags":[],"class_list":{"0":"post-7154","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-ameaca","8":"category-blog","10":"category-threat-research"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>11 casos reais e famosos de ataques de malware - Gatefy<\/title>\n<meta name=\"description\" content=\"Malware \u00e9 um software malicioso projetado para infectar computadores e dispositivos. Confira uma lista de casos reais de ataques de malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"11 casos reais e famosos de ataques de malware - Gatefy\" \/>\n<meta property=\"og:description\" content=\"Malware \u00e9 um software malicioso projetado para infectar computadores e dispositivos. Confira uma lista de casos reais de ataques de malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Gatefy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gatefy\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T16:17:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-11T13:05:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gatefy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:site\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gatefy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\"},\"author\":{\"name\":\"Gatefy\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\"},\"headline\":\"11 casos reais e famosos de ataques de malware\",\"datePublished\":\"2021-03-22T16:17:13+00:00\",\"dateModified\":\"2021-05-11T13:05:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\"},\"wordCount\":1485,\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png\",\"articleSection\":[\"Amea\u00e7a\",\"Blog\",\"Blog\",\"Threat Research\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\",\"url\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\",\"name\":\"11 casos reais e famosos de ataques de malware - Gatefy\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png\",\"datePublished\":\"2021-03-22T16:17:13+00:00\",\"dateModified\":\"2021-05-11T13:05:33+00:00\",\"description\":\"Malware \u00e9 um software malicioso projetado para infectar computadores e dispositivos. Confira uma lista de casos reais de ataques de malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png\",\"width\":800,\"height\":400,\"caption\":\"Malware famoso usado em casos de ataques hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gatefy.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"11 casos reais e famosos de ataques de malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"name\":\"Gatefy\",\"description\":\"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.\",\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\",\"name\":\"Gatefy Email Security\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"width\":1500,\"height\":500,\"caption\":\"Gatefy Email Security\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gatefy\",\"https:\/\/x.com\/gatefy_security\",\"https:\/\/www.linkedin.com\/company\/gatefy\",\"https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\",\"name\":\"Gatefy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"caption\":\"Gatefy\"},\"url\":\"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"11 casos reais e famosos de ataques de malware - Gatefy","description":"Malware \u00e9 um software malicioso projetado para infectar computadores e dispositivos. Confira uma lista de casos reais de ataques de malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/","og_locale":"pt_BR","og_type":"article","og_title":"11 casos reais e famosos de ataques de malware - Gatefy","og_description":"Malware \u00e9 um software malicioso projetado para infectar computadores e dispositivos. Confira uma lista de casos reais de ataques de malware.","og_url":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/","og_site_name":"Gatefy","article_publisher":"https:\/\/www.facebook.com\/gatefy","article_published_time":"2021-03-22T16:17:13+00:00","article_modified_time":"2021-05-11T13:05:33+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png","type":"image\/png"}],"author":"Gatefy","twitter_card":"summary_large_image","twitter_creator":"@gatefy_security","twitter_site":"@gatefy_security","twitter_misc":{"Escrito por":"Gatefy","Est. tempo de leitura":"12 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#article","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/"},"author":{"name":"Gatefy","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94"},"headline":"11 casos reais e famosos de ataques de malware","datePublished":"2021-03-22T16:17:13+00:00","dateModified":"2021-05-11T13:05:33+00:00","mainEntityOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/"},"wordCount":1485,"publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png","articleSection":["Amea\u00e7a","Blog","Blog","Threat Research"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/","url":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/","name":"11 casos reais e famosos de ataques de malware - Gatefy","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png","datePublished":"2021-03-22T16:17:13+00:00","dateModified":"2021-05-11T13:05:33+00:00","description":"Malware \u00e9 um software malicioso projetado para infectar computadores e dispositivos. Confira uma lista de casos reais de ataques de malware.","breadcrumb":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#primaryimage","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/8_casos_reais_e_famosos_de_ataques_de_malware.png","width":800,"height":400,"caption":"Malware famoso usado em casos de ataques hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-e-famosos-de-ataques-de-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gatefy.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"11 casos reais e famosos de ataques de malware"}]},{"@type":"WebSite","@id":"https:\/\/gatefy.com\/pt-br\/#website","url":"https:\/\/gatefy.com\/pt-br\/","name":"Gatefy","description":"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.","publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/gatefy.com\/pt-br\/#organization","name":"Gatefy Email Security","url":"https:\/\/gatefy.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","width":1500,"height":500,"caption":"Gatefy Email Security"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gatefy","https:\/\/x.com\/gatefy_security","https:\/\/www.linkedin.com\/company\/gatefy","https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog"]},{"@type":"Person","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94","name":"Gatefy","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","caption":"Gatefy"},"url":"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/"}]}},"_links":{"self":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/7154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7154"}],"version-history":[{"count":0,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/7154\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media\/7155"}],"wp:attachment":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}