{"id":8295,"date":"2021-06-05T00:00:00","date_gmt":"2021-06-05T00:00:00","guid":{"rendered":"https:\/\/198.27.90.141\/?p=8295"},"modified":"2021-06-16T12:57:20","modified_gmt":"2021-06-16T12:57:20","slug":"o-que-e-ransomware","status":"publish","type":"post","link":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/","title":{"rendered":"O que \u00e9 ransomware?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8295\" class=\"elementor elementor-8295 elementor-5617\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71d4f8be elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"71d4f8be\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-79830c4f\" data-id=\"79830c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-accbe5d elementor-widget elementor-widget-heading\" data-id=\"accbe5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">O que \u00e9 ransomware?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161d464 elementor-widget elementor-widget-template\" data-id=\"161d464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4201\" class=\"elementor elementor-4201 elementor-4192 elementor-4192\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dffd2b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dffd2b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb88354\" data-id=\"bb88354\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8309bfc elementor-align-left elementor-tablet-align-center elementor-widget elementor-widget-post-info\" data-id=\"8309bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-07d5219 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>5 junho, 2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-573941e elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Por<\/span>\n\t\t\t\t\t\t\t\t\t\tGatefy\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-389e7a6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-list\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/gatefy.com\/pt-br\/category\/blog\/educacao\/\" class=\"elementor-post-info__terms-list-item\">Educa\u00e7\u00e3o<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255fe8b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"255fe8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg\" class=\"attachment-full size-full wp-image-15795\" alt=\"Sequestro de dados e computador por ransomware.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg 800w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3476e9c elementor-widget elementor-widget-template\" data-id=\"3476e9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4319\" class=\"elementor elementor-4319 elementor-4237 elementor-4237\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3a25ba elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"b3a25ba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-baf9f65\" data-id=\"baf9f65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ffe851 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"4ffe851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec99e1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3ec99e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7767a29 elementor-widget elementor-widget-text-editor\" data-id=\"7767a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O ransomware \u00e9 um <a href=\"https:\/\/gatefy.com\/pt-br\/postagem\/o-que-e-malware\/\">malware<\/a> que ap\u00f3s ser instalado criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Depois, assim como acontece em um sequestro, \u00e9 exigido um resgate em dinheiro para que os arquivos sejam devolvidos ou o sistema liberado.<\/p><p>Normalmente, a exig\u00eancia do pagamento \u00e9 feita em criptomoeda, como bitcoin e monero, de modo que a transa\u00e7\u00e3o de dinheiro seja imposs\u00edvel de ser rastreada, protegendo a identidade do hacker.<\/p><p>A prop\u00f3sito, \u201cransom\u201d, em ingl\u00eas, significa resgate ou ref\u00e9m.<\/p><p>De acordo com relat\u00f3rio da Europol, o <a href=\"https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2020\" target=\"_blank\" rel=\"noopener\">Internet Organized Crime Threat Assesment (IOCTA)<\/a> de 2020, o ransomware continua sendo uma das principais amea\u00e7as do mundo cibern\u00e9tico. Ele, inclusive, est\u00e1 no topo da lista desde 2015.<\/p><p>O FBI tem uma opini\u00e3o parecida, uma vez que o ransomware sempre tem um lugar de destaque no <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">Internet Crime Report<\/a>. Por falar nisso, as perdas causadas por este tipo de malware aumentaram muito nos \u00faltimos anos: de USD 8,9 milh\u00f5es em 2019 para USD 29,1 milh\u00f5es em 2020.<\/p><p>Continue lendo para aprender mais sobre o que \u00e9 ransomware e como o ataque funciona.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec7a7cf elementor-widget elementor-widget-template\" data-id=\"ec7a7cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4327\" class=\"elementor elementor-4327 elementor-4215 elementor-4215\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa2f920 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa2f920\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4faaeec\" data-id=\"4faaeec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c7bf09 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"8c7bf09\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tNeste artigo, voc\u00ea vai ler mais sobre:\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__8c7bf09\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__8c7bf09\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0406b elementor-widget elementor-widget-template\" data-id=\"7c0406b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4303\" class=\"elementor elementor-4303\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13ca685 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13ca685\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f3824af\" data-id=\"f3824af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-26ab6fe elementor-widget elementor-widget-image\" data-id=\"26ab6fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/bec-business-email-compromise\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/elementor\/thumbs\/bec-whitepaper-pt-p44ei873l77kv9n3u68beco60vyk1orejgjks299z2.jpg\" title=\"bec-whitepaper-pt\" alt=\"bec-whitepaper-pt\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2928299\" data-id=\"2928299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bbb67b elementor-widget elementor-widget-heading\" data-id=\"7bbb67b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">BEC - Business Email Compromise<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58730f6 elementor-widget elementor-widget-text-editor\" data-id=\"58730f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fa\u00e7a o download deste ebook para entender tudo sobre BEC, das caracter\u00edsticas \u00e0s t\u00e9cnicas mais usadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 1 PT BEC botao&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-a3d21a0 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a3d21a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook\/bec-business-email-compromise\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Baixar Agora!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-802296a elementor-widget elementor-widget-heading\" data-id=\"802296a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como o ataque de ransomware funciona<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b159dd elementor-widget elementor-widget-text-editor\" data-id=\"7b159dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os vetores mais comuns de ransomware s\u00e3o e-mails maliciosos, via <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-phishing\/\">golpes de phishing<\/a>, e vulnerabilidades em solu\u00e7\u00f5es de RDP (Remote Desktop Protocol).<\/p><p>Na pr\u00e1tica, o ransomware opera de modo que, ao infectar o dispositivo, ele criptografa arquivos e aplicativos do usu\u00e1rio, ou impede o acesso a todo o sistema operacional da m\u00e1quina.<\/p><p>Quando o processo de criptografia acaba, uma tela surge dizendo o dispositivo foi infectado e que um resgate precisa ser pago ou os arquivos ser\u00e3o deletados dentro de algumas horas.<\/p><p>Por geralmente se tratar de uma amea\u00e7a avan\u00e7ada, o ransomware acaba sendo dif\u00edcil de se detectar. Dependendo do caso, inclusive, ele consegue at\u00e9 mesmo enganar solu\u00e7\u00f5es de seguran\u00e7a.<\/p><p>A pior not\u00edcia \u00e9 que todos somos potenciais v\u00edtimas, j\u00e1 que o ransomware pode atingir Windows, Mac, Linux, iOS e Android.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8757fa5 elementor-widget elementor-widget-heading\" data-id=\"8757fa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quais s\u00e3o os tipos de ransomwares<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22c1193 elementor-widget elementor-widget-text-editor\" data-id=\"22c1193\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Existem 2 tipos de ransomware, ou 2 categorias principais:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3ccb33 elementor-widget elementor-widget-heading\" data-id=\"a3ccb33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Cryptor ou encryptor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d26e124 elementor-widget elementor-widget-text-editor\" data-id=\"d26e124\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os ransomwares da categoria cryptor criptografam apenas alguns arquivos e aplicativos. Ou seja, eles ainda permitem que voc\u00ea acesse a sua m\u00e1quina parcialmente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a76ae elementor-widget elementor-widget-heading\" data-id=\"40a76ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Blocker ou locker<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15d539a elementor-widget elementor-widget-text-editor\" data-id=\"15d539a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os ransomwares da categoria locker, como o pr\u00f3prio nome sugere, s\u00e3o mais radicais, bloqueando todo o sistema operacional do seu dispositivo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e99c608 elementor-widget elementor-widget-heading\" data-id=\"e99c608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RaaS (Ransomware as a Service)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc7c349 elementor-widget elementor-widget-text-editor\" data-id=\"cc7c349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>H\u00e1 ainda uma evolu\u00e7\u00e3o dessa amea\u00e7a digital que surgiu recentemente e aumento muito a sua capacidade de dissemina\u00e7\u00e3o: o <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-raas-ransomware-as-a-service\/\">Ransomware as a Service (RaaS)<\/a>.<\/p><p>O RaaS \u00e9 um neg\u00f3cio super lucrativo. Ele funciona da seguinte maneira: criminosos com maior capacidade de programa\u00e7\u00e3o criam ransomware para vender ou alugar a amea\u00e7a para outros hackers menos habilidosos.<\/p><p>Com isso, hackers do mundo inteiro t\u00eam acesso a armas poderosas que tornam os ataques mais complexos e escal\u00e1veis. Perceba que, neste caso, o cibercriminoso n\u00e3o precisa ter conhecimentos t\u00e9cnicos avan\u00e7ados.<\/p><p>Para montar uma estrat\u00e9gia e aplicar um golpe, basta que ele saiba os caminhos para adquirir um ransomware, como investigar perfis, como extrair dados da internet e como manusear ferramentas de disparo de e-mail.<\/p><p>O RaaS facilitou muito o acesso a amea\u00e7as, tanto que diferentes ag\u00eancias, como o <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/relatorio-fbi-ic3-cibercrimes-2020\/\">FBI<\/a> e a <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/relatorio-europol-crime-organizado-socta-2021\/\">Europol<\/a>, j\u00e1 se manifestaram a respeito do assunto.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc444b0 elementor-widget elementor-widget-heading\" data-id=\"bc444b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qual \u00e9 a rela\u00e7\u00e3o entre phishing, engenharia social e ransomware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd37da elementor-widget elementor-widget-heading\" data-id=\"dbd37da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Phishing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f2fa88 elementor-widget elementor-widget-text-editor\" data-id=\"9f2fa88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>De acordo com relat\u00f3rio da Coveware, cerca de <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6792822960290836480\">30% dos ataques de ransomware envolvem e-mails de phishing<\/a>. Ou seja, como voc\u00ea j\u00e1 sabe, o phishing \u00e9 um dos principais vetores de ransomware.<\/p><p>A prop\u00f3sito, o phishing acontece quando o hacker dispara um e-mail persuasivo com o objetivo de atrair a sua v\u00edtima para uma armadilha.<\/p><p>Esta armadilha envolve o uso de anexos e de links maliciosos. Por exemplo, depois de clicar em um link dentro de um e-mail, a v\u00edtima \u00e9 direcionada para um site. Ent\u00e3o, ela \u00e9 induzida a fazer o download de um ransomware sem saber.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fc6e1e elementor-widget elementor-widget-heading\" data-id=\"8fc6e1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Engenharia social<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f3d07e elementor-widget elementor-widget-text-editor\" data-id=\"8f3d07e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A engenharia social \u00e9 uma t\u00e9cnica muito utilizada em ataques de ransomware.<\/p><p>Ela acontece quando o criminoso realiza uma pesquisa detalhada e complexa sobre o seu alvo, que pode ser uma pessoa ou uma empresa. A partir da\u00ed, ele elege a v\u00edtima e tra\u00e7a um perfil com dados extra\u00eddos, geralmente, da web.<\/p><p>Imagine, por exemplo, que voc\u00ea recebeu um convite de conex\u00e3o no Linkedin. Depois disso, a pessoa envia uma mensagem para voc\u00ea se apresentando e pedindo o seu e-mail.<\/p><p>Voc\u00ea fornece o e-mail e, ent\u00e3o, recebe um anexo com uma suposta proposta de parceria, que, na verdade, \u00e9 um ransomware.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4181deb elementor-widget elementor-widget-heading\" data-id=\"4181deb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Casos reais de ataques de ransomware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-799bc39 elementor-widget elementor-widget-text-editor\" data-id=\"799bc39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Voc\u00ea ainda est\u00e1 com d\u00favidas se esses ataques realmente acontecem? Bom, \u00e9 por isso que separamos alguns casos reais de ataques de ransomware.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47e59ff elementor-widget elementor-widget-heading\" data-id=\"47e59ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ryuk<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bf8747 elementor-widget elementor-widget-text-editor\" data-id=\"0bf8747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Ryuk j\u00e1 causou mais de USD 60 milh\u00f5es em preju\u00edzos, de acordo com o FBI. Este ransomware ficou famoso em 2018, quando sequestrou dados de grandes jornais nos EUA e afetou mais de 100 empresas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2ceeba elementor-widget elementor-widget-heading\" data-id=\"d2ceeba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WannaCry<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bfecab elementor-widget elementor-widget-text-editor\" data-id=\"0bfecab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O WannaCry \u00e9, talvez, o ransomware mais devastador da hist\u00f3ria, lan\u00e7ado em 2017. Estima-se que os danos causados por ele cheguem a USD 4 bilh\u00f5es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dadf9c elementor-widget elementor-widget-heading\" data-id=\"6dadf9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CryptoLocker<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77c5856 elementor-widget elementor-widget-text-editor\" data-id=\"77c5856\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O CryptoLocker foi lan\u00e7ado em 2013. Ele \u00e9 um marco para a \u00e9poca, infectando mais de 200 mil dispositivos e causando preju\u00edzos de USD 3 milh\u00f5es.<\/p><p>Ficou curioso para conhecer outros exemplos? <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/casos-reais-famosos-ataques-ransomware\/\">Confira a nossa lista de casos reais e famosos de ataques de ransomware.<\/a><\/p><p>Para n\u00e3o sairmos do assunto, vamos regressar ainda mais no tempo e conhecer a hist\u00f3ria do primeiro ransomware a se ter registro.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58eca75 elementor-widget elementor-widget-heading\" data-id=\"58eca75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hist\u00f3ria do ransomware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b51acbb elementor-widget elementor-widget-text-editor\" data-id=\"b51acbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Voc\u00ea sabia que o primeiro ransomware da hist\u00f3ria foi criado por um bi\u00f3logo formado em Harvard?<\/p><p>O AIDS Trojan (tamb\u00e9m conhecido por PC Cyborg) foi desenvolvido pelo hoje considerado pai do ransomware, Joseph Popp, que distribuiu disquetes infectados com o malware.<\/p><p>As v\u00edtimas foram participantes da confer\u00eancia da AIDS, coordenada pela Organiza\u00e7\u00e3o Mundial da Sa\u00fade (OMS), em 1989, na cidade de Estocolmo, na Su\u00e9cia.<\/p><p>O criminoso exigiu que o pagamento de USD 189 fosse enviado a uma caixa postal no Panam\u00e1. Dessa forma, ele entregaria a chave para desbloquear os arquivos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fdfb97 elementor-widget elementor-widget-heading\" data-id=\"6fdfb97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que fazer se a minha empresa for infectada<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce5ef25 elementor-widget elementor-widget-text-editor\" data-id=\"ce5ef25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Se a sua empresa sofrer um ataque de ransomware, voc\u00ea teria a estrutura adequada para solucionar o problema e aguentar a chantagem dos hackers?\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>O primeiro impulso de muitas empresas \u00e9 ceder \u00e0 press\u00e3o e pagar pelo resgate. Mas n\u00f3s n\u00e3o recomendamos o pagamento pelos seguintes motivos:<\/p><ol><li>Voc\u00ea n\u00e3o tem garantias de que vai receber a chave de descriptografia.<\/li><li>Voc\u00ea valida o modelo de neg\u00f3cio usado pelo cibercriminoso.<\/li><li>Voc\u00ea, provavelmente, ser\u00e1 alvo de novos golpes do mesmo hacker.<\/li><li>Voc\u00ea estimula o cibercrime a atacar outras pessoas e empresas.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b21378 elementor-widget elementor-widget-text-editor\" data-id=\"8b21378\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Inclusive, essa \u00e9 a mesma opini\u00e3o de ag\u00eancias de seguran\u00e7a internacionais, como o <a href=\"http:\/\/fbi.gov\/\" target=\"_blank\" rel=\"noopener\">FBI<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99a41a9 elementor-widget elementor-widget-heading\" data-id=\"99a41a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">No More Ransom<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0cb118 elementor-widget elementor-widget-text-editor\" data-id=\"b0cb118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Em caso de infec\u00e7\u00e3o por ransomware, uma das solu\u00e7\u00f5es para a recupera\u00e7\u00e3o dos dados \u00e9 recorrer \u00e0 ajuda do projeto No More Ransom, que disponibiliza uma s\u00e9rie de chaves de descriptografia.<\/p><p>Basta acessar <a href=\"https:\/\/www.nomoreransom.org\/\">nomoreransom.org<\/a> para ter mais informa\u00e7\u00f5es.<\/p><p><a href=\"https:\/\/gatefy.com\/pt-br\/blog\/no-more-ransom-combater-ransomware-gatefy\/\">A Gatefy \u00e9 uma empresa parceira do projeto<\/a>. Apoiamos a causa e trabalhamos em conjunto para educar pessoas e empresas, e combater os ataques de ransomware.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0abbde2 elementor-widget elementor-widget-heading\" data-id=\"0abbde2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Como se proteger de ransomware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-528d5e3 elementor-widget elementor-widget-text-editor\" data-id=\"528d5e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A prote\u00e7\u00e3o contra ransomware n\u00e3o difere muito da prote\u00e7\u00e3o contra a maior parte dos malwares. Recomendamos:<\/p><ul><li>Manter sistemas atualizados.<\/li><li>Realizar backups com frequ\u00eancia.<\/li><li>Investir na educa\u00e7\u00e3o do time.<\/li><li>Gerenciar acessos e permiss\u00f5es com cuidado.<\/li><li>Adotar solu\u00e7\u00f5es de seguran\u00e7a, como prote\u00e7\u00e3o de e-mail avan\u00e7ada.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-000221d elementor-widget elementor-widget-text-editor\" data-id=\"000221d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Lembrando que um ataque de ransomware pode ter diferentes tipos de consequ\u00eancias, como, por exemplo:<\/p><ul><li>Preju\u00edzo financeiro.<\/li><li>Problemas legais devido a leis de prote\u00e7\u00e3o de dados.<\/li><li>Vazamentos de dados.<\/li><li>Roubo de dados sens\u00edveis.<\/li><li>Chantagem (77% dos ataques de ransomware envolvem amea\u00e7as de vazamentos).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a45568f elementor-widget elementor-widget-heading\" data-id=\"a45568f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seguran\u00e7a avan\u00e7ada para empresas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b326573 elementor-widget elementor-widget-text-editor\" data-id=\"b326573\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agora, voc\u00ea est\u00e1 interessado em saber mais sobre solu\u00e7\u00f5es de prote\u00e7\u00e3o avan\u00e7ada para a sua empresa?<\/p><p><a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\">Agende uma demo<\/a> e conhe\u00e7a os produtos da Gatefy. Somos especialistas em intelig\u00eancia artificial e prote\u00e7\u00e3o de e-mail.<\/p><p>Caso voc\u00ea tenha gostado deste artigo, em que abordamos o que \u00e9 ransomware e explicamos como o ataque funciona em detalhes, voc\u00ea n\u00e3o pode perder as <a href=\"https:\/\/gatefy.com\/pt-br\/blog\/\">not\u00edcias do nosso blog<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e004ea3 elementor-widget elementor-widget-template\" data-id=\"e004ea3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4620\" class=\"elementor elementor-4620\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-95982b0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95982b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f77959\" data-id=\"7f77959\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-f614fab elementor-widget elementor-widget-image\" data-id=\"f614fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/demo\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg\" class=\"attachment-full size-full wp-image-97\" alt=\"Gatefy Dashboard\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security.jpg 1280w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-300x169.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1024x576.jpg 1024w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-768x432.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2020\/10\/email-security-1200x675.jpg 1200w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b50450b\" data-id=\"b50450b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9416cd4 elementor-widget elementor-widget-text-editor\" data-id=\"9416cd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMelhore a seguran\u00e7a da sua empresa. Agende demo!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1deb1 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"3b1deb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;CTA 3 PT Demo form&quot;}\" class=\"events-tracker-for-elementor\" id=\"cta3_pt\" name=\"cta3_pt\" aria-label=\"cta3_pt\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"4620\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"3b1deb1\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Intelig\u00eancia artificial e machine learning para prote\u00e7\u00e3o de e-mail - Gatefy\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"8497\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Nome*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail Corporativo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail Corporativo*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_e594bbf elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_e594bbf\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTelefone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_e594bbf]\" id=\"form-field-field_e594bbf\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Telefone*\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Apenas n\u00fameros e caracteres de telefone (#, -, *, etc.) s\u00e3o aceitos.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_d2f3e82 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_d2f3e82\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_d2f3e82]\" id=\"form-field-field_d2f3e82\" class=\"elementor-field-textual elementor-size-sm\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Cargo*\">Cargo*<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Tecnologia\">Tecnologia<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Financeiro\">Financeiro<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Recursos Humanos\">Recursos Humanos<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Comercial\">Comercial<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Marketing\">Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_e5faed5 elementor-col-100\">\n\t\t\t\t\t<label> <font size=\"2\">\n<input type=\"checkbox\" data-privacy=\"true\" name=\"communications\"\u00a0 value=\"1\">\nConcordo em receber informa\u00e7\u00f5es de acordo com a <a href=\"https:\/\/gatefy.com\/pt-br\/politica-privacidade\/\"\ntarget=\"_blank\">Pol\u00edtica de Privacidade e Cookies da Gatefy<\/a>.\nVoc\u00ea pode cancelar a assinatura a qualquer momento.\n<input type=\"hidden\" data-privacy=\"true\" name=\"privacy_policy\" value=\"1\">\n\u00a0<input type=\"hidden\" data-privacy=\"true\" name=\"terms_of_use\" value=\"1\">\n<\/font>\n<\/label>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_83eebfa elementor-col-100 recaptcha_v3-bottomright\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_83eebfa\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Ley0Y4aAAAAADbdMG_0j3T4a82SexhiFrcCP5JE\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomright\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Receber contato<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41e2d34\" data-id=\"41e2d34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5368f99 elementor-widget elementor-widget-template\" data-id=\"5368f99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_offset&quot;:100,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;laptop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4297\" class=\"elementor elementor-4297\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab703fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab703fd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a46a065\" data-id=\"a46a065\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-wpl_tracker=\"{&quot;gtag&quot;:true,&quot;gtag_category&quot;:&quot;CTA blog&quot;,&quot;gtag_action&quot;:&quot;Clique&quot;,&quot;gtag_label&quot;:&quot;Sidebar 1 PT banner&quot;}\" class=\"events-tracker-for-elementor elementor-element elementor-element-8362479 elementor-widget elementor-widget-image\" data-id=\"8362479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/phishing\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"370\" height=\"230\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png\" class=\"attachment-full size-full wp-image-16407\" alt=\"\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1.png 370w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/02\/casos-phishing-gatefy-ebook-1-300x186.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-654f745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"654f745\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2924798\" data-id=\"2924798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b22d40 elementor-widget elementor-widget-wp-widget-recent-posts\" data-id=\"4b22d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n\t\t<h5>Veja tamb\u00e9m<\/h5><nav aria-label=\"Veja tamb\u00e9m\">\n\t\t<ul>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\">3 maneiras que a LGPD afeta o e-mail da sua empresa<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/materiais\/ebook-lgpg\/\">LGPD<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\">Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<\/ul>\n\n\t\t<\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d229c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d229c13\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9f7398\" data-id=\"f9f7398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2f385d elementor-widget elementor-widget-template\" data-id=\"c2f385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"4151\" class=\"elementor elementor-4151 elementor-3964 elementor-3964\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03c5dac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03c5dac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-782b239\" data-id=\"782b239\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-056265e elementor-widget elementor-widget-heading\" data-id=\"056265e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">N\u00e3o esque\u00e7a de compartilhar este post<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88cfcd1 elementor-share-buttons--view-icon elementor-share-buttons--shape-rounded elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"88cfcd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_reddit\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no reddit\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-reddit\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Compartilhar no whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af288c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af288c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e31e090 elementor-widget elementor-widget-heading\" data-id=\"e31e090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Not\u00edcias Relacionadas<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce216ce elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ce216ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-arrow-down\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4182cb elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"d4182cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-8305 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-dicas-conselhos\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg\" class=\"attachment-medium size-medium wp-image-8308\" alt=\"Checklist para LGPD assegurar prote\u00e7\u00e3o de e-mail.\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/lgpd-afeta-email-empresa.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" >\n\t\t\t\t3 maneiras que a LGPD afeta o e-mail da sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/lgpd-afeta-email-empresa\/\" aria-label=\"Leia mais sobre 3 maneiras que a LGPD afeta o e-mail da sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-7960 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg\" class=\"attachment-medium size-medium wp-image-7961\" alt=\"Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/quais-sao-politicas-dmarc.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" >\n\t\t\t\tQuais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/quais-sao-politicas-dmarc\/\" aria-label=\"Leia mais sobre Quais s\u00e3o os 3 tipos de pol\u00edticas DMARC?\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16789 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-educacao\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg\" class=\"attachment-medium size-medium wp-image-16791\" alt=\"cadeado, escudo (senhas fortes e mecanismos de prote\u00e7\u00e3o) e outras boas praticas de seguran\u00e7a de e-mail\" srcset=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-300x150.jpg 300w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email-768x384.jpg 768w, https:\/\/gatefy.com\/wp-content\/uploads\/2021\/06\/melhores-praticas-de-seguranca-de-email.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" >\n\t\t\t\t6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/boas-praticas-de-seguranca-de-email-para-proteger-sua-empresa\/\" aria-label=\"Leia mais sobre 6 boas pr\u00e1ticas de seguran\u00e7a de e-mail para proteger sua empresa\" tabindex=\"-1\" >\n\t\t\tLeia Mais \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":15795,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,37],"tags":[],"class_list":["post-8295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-educacao"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: o que \u00e9, como funciona e quais s\u00e3o os tipos - Gatefy<\/title>\n<meta name=\"description\" content=\"Ransomware \u00e9 um malware que, depois de instalado, criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Veja mais sobre isso!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: o que \u00e9, como funciona e quais s\u00e3o os tipos - Gatefy\" \/>\n<meta property=\"og:description\" content=\"Ransomware \u00e9 um malware que, depois de instalado, criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Veja mais sobre isso!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Gatefy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gatefy\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-05T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-16T12:57:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gatefy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:site\" content=\"@gatefy_security\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gatefy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\"},\"author\":{\"name\":\"Gatefy\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\"},\"headline\":\"O que \u00e9 ransomware?\",\"datePublished\":\"2021-06-05T00:00:00+00:00\",\"dateModified\":\"2021-06-16T12:57:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\"},\"wordCount\":1424,\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg\",\"articleSection\":[\"Blog\",\"Educa\u00e7\u00e3o\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\",\"url\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\",\"name\":\"Ransomware: o que \u00e9, como funciona e quais s\u00e3o os tipos - Gatefy\",\"isPartOf\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg\",\"datePublished\":\"2021-06-05T00:00:00+00:00\",\"dateModified\":\"2021-06-16T12:57:20+00:00\",\"description\":\"Ransomware \u00e9 um malware que, depois de instalado, criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Veja mais sobre isso!\",\"breadcrumb\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg\",\"width\":800,\"height\":400,\"caption\":\"Sequestro de dados e computador por ransomware.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gatefy.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"O que \u00e9 ransomware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#website\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"name\":\"Gatefy\",\"description\":\"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.\",\"publisher\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#organization\",\"name\":\"Gatefy Email Security\",\"url\":\"https:\/\/gatefy.com\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"contentUrl\":\"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png\",\"width\":1500,\"height\":500,\"caption\":\"Gatefy Email Security\"},\"image\":{\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gatefy\",\"https:\/\/x.com\/gatefy_security\",\"https:\/\/www.linkedin.com\/company\/gatefy\",\"https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94\",\"name\":\"Gatefy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g\",\"caption\":\"Gatefy\"},\"url\":\"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: o que \u00e9, como funciona e quais s\u00e3o os tipos - Gatefy","description":"Ransomware \u00e9 um malware que, depois de instalado, criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Veja mais sobre isso!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/","og_locale":"pt_BR","og_type":"article","og_title":"Ransomware: o que \u00e9, como funciona e quais s\u00e3o os tipos - Gatefy","og_description":"Ransomware \u00e9 um malware que, depois de instalado, criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Veja mais sobre isso!","og_url":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/","og_site_name":"Gatefy","article_publisher":"https:\/\/www.facebook.com\/gatefy","article_published_time":"2021-06-05T00:00:00+00:00","article_modified_time":"2021-06-16T12:57:20+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg","type":"image\/jpeg"}],"author":"Gatefy","twitter_card":"summary_large_image","twitter_creator":"@gatefy_security","twitter_site":"@gatefy_security","twitter_misc":{"Escrito por":"Gatefy","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#article","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/"},"author":{"name":"Gatefy","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94"},"headline":"O que \u00e9 ransomware?","datePublished":"2021-06-05T00:00:00+00:00","dateModified":"2021-06-16T12:57:20+00:00","mainEntityOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/"},"wordCount":1424,"publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg","articleSection":["Blog","Educa\u00e7\u00e3o"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/","url":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/","name":"Ransomware: o que \u00e9, como funciona e quais s\u00e3o os tipos - Gatefy","isPartOf":{"@id":"https:\/\/gatefy.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg","datePublished":"2021-06-05T00:00:00+00:00","dateModified":"2021-06-16T12:57:20+00:00","description":"Ransomware \u00e9 um malware que, depois de instalado, criptografa os arquivos da sua m\u00e1quina ou bloqueia o seu sistema. Veja mais sobre isso!","breadcrumb":{"@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#primaryimage","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/o-que-e-ransomware.jpg","width":800,"height":400,"caption":"Sequestro de dados e computador por ransomware."},{"@type":"BreadcrumbList","@id":"https:\/\/gatefy.com\/pt-br\/blog\/o-que-e-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gatefy.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"O que \u00e9 ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/gatefy.com\/pt-br\/#website","url":"https:\/\/gatefy.com\/pt-br\/","name":"Gatefy","description":"We use artificial intelligence and machine learning to improve businesses&#039; inbound and outbound email security. Integrates with O365, Exchange and G Suite.","publisher":{"@id":"https:\/\/gatefy.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gatefy.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/gatefy.com\/pt-br\/#organization","name":"Gatefy Email Security","url":"https:\/\/gatefy.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","contentUrl":"https:\/\/gatefy.com\/wp-content\/uploads\/2021\/03\/logo-preto.png","width":1500,"height":500,"caption":"Gatefy Email Security"},"image":{"@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gatefy","https:\/\/x.com\/gatefy_security","https:\/\/www.linkedin.com\/company\/gatefy","https:\/\/www.youtube.com\/channel\/UCFSZUkcvfwYSrGopaRtUSog"]},{"@type":"Person","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/b305fce8ec3405a5f903af11c0b6bd94","name":"Gatefy","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/gatefy.com\/pt-br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16d13145e566652289dafe3e601881c48369dbb33a9a4273a33cacd65da4e3d0?s=96&d=wavatar&r=g","caption":"Gatefy"},"url":"https:\/\/gatefy.com\/pt-br\/author\/gatefy\/"}]}},"_links":{"self":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/8295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8295"}],"version-history":[{"count":0,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/posts\/8295\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media\/15795"}],"wp:attachment":[{"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gatefy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}