{"id":16517,"date":"2025-07-04T18:42:17","date_gmt":"2025-07-04T18:42:17","guid":{"rendered":"https:\/\/hsclabs.com\/?p=16517"},"modified":"2025-07-04T19:04:09","modified_gmt":"2025-07-04T19:04:09","slug":"artigo-ataque-empresa-pix","status":"publish","type":"post","link":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/","title":{"rendered":"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16517\" class=\"elementor elementor-16517\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26ade54 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26ade54\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-df531b3\" data-id=\"df531b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7eeb21 elementor-widget elementor-widget-template\" data-id=\"f7eeb21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11928\" class=\"elementor elementor-11928\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b71fdbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b71fdbb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bbf772c\" data-id=\"bbf772c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd4831a elementor-widget elementor-widget-post-info\" data-id=\"cd4831a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f5a2311 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/2025\/07\/04\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-check\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Atualizado em<\/span>\n\t\t\t\t\t\t\t\t\t\t<time>4 julho  2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-ecb4e32 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/author\/hsc-labs\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-user-circle\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tHSC Labs\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-072a961 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/category\/analyst-report\/\" class=\"elementor-post-info__terms-list-item\">Analyst Report<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eb8a1e elementor-widget elementor-widget-ha-post-title happy-addon ha-post-title\" data-id=\"2eb8a1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ha-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"ha-post-title elementor-size-default\">Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f330cd elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"0f330cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg\" class=\"attachment-full size-full wp-image-16519\" alt=\"\" srcset=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg 1200w, https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix-300x157.jpg 300w, https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix-1024x535.jpg 1024w, https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix-768x401.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ded4b82 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ded4b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff2c311 elementor-widget elementor-widget-text-editor\" data-id=\"ff2c311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Por Junior Cunha, CTO e especialista em Seguran\u00e7a da Informa\u00e7\u00e3o na HSC Labs<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad793e elementor-widget elementor-widget-text-editor\" data-id=\"cad793e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Na madrugada de 30 de junho de 2025, o Brasil testemunhou o que j\u00e1 \u00e9 considerado o maior <a href=\"https:\/\/g1.globo.com\/jornal-nacional\/noticia\/2025\/07\/02\/pf-investiga-ataque-hacker-a-empresa-de-tecnologia-que-presta-servico-a-bancos-nacionais.ghtml\">a<strong>taque cibern\u00e9tico<\/strong><\/a> da hist\u00f3ria do seu sistema financeiro.\u00a0<\/p><p>As cifras precisas ainda est\u00e3o sendo confirmadas, mas estima-se que at\u00e9 R$1 bilh\u00e3o pode ter sido desviado a partir de credenciais comprometidas da empresa C&amp;M Software, respons\u00e1vel por integrar bancos e fintechs aos sistemas do Pix e do Banco Central.<\/p><p>O que parecia mais um sofisticado ataque hacker revelou, poucos dias depois, um componente ainda mais preocupante: a coopta\u00e7\u00e3o de um funcion\u00e1rio interno.<\/p><p>O epis\u00f3dio escancara vulnerabilidades cr\u00edticas com foco em tr\u00eas pontos centrais da seguran\u00e7a cibern\u00e9tica: a amea\u00e7a interna (Insider Threat), o uso de engenharia social para ataques e os riscos associados \u00e0 cadeia de fornecimento (Supply Chain Attack).<\/p><p>Neste artigo, vou falar mais sobre esses pontos e os impactos e aprendizados do caso.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26cf78b elementor-widget elementor-widget-template\" data-id=\"26cf78b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11922\" class=\"elementor elementor-11922\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d745e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d745e8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-82aa485\" data-id=\"82aa485\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-185f194 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"185f194\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;far fa-dot-circle&quot;,&quot;library&quot;:&quot;fa-regular&quot;},&quot;no_headings_message&quot;:&quot;N\\u00e3o foram encontrados cabe\\u00e7alhos nesta p\\u00e1gina.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tPrincipais t\u00f3picos deste artigo\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__185f194\" aria-expanded=\"true\" aria-label=\"Abrir Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__185f194\" aria-expanded=\"true\" aria-label=\"Fechar Tabela de Conte\u00fados\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__185f194\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3360db4 elementor-widget elementor-widget-heading\" data-id=\"3360db4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Entenda o caso<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae90216 elementor-widget elementor-widget-text-editor\" data-id=\"ae90216\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Antes de falar mais sobre os pontos de aten\u00e7\u00e3o desse ataque, gostaria de explicar melhor o caso.<\/p><p>A C&amp;M Software presta servi\u00e7os de interconex\u00e3o para institui\u00e7\u00f5es financeiras menores, operando como elo entre bancos, fintechs e o Banco Central.\u00a0<\/p><p>Com as credenciais obtidas, os criminosos conseguiram acessar contas reservas de ao menos seis institui\u00e7\u00f5es financeiras que eram clientes da C&amp;M.<\/p><p>Essas contas, mantidas no Banco Central, s\u00e3o uma exig\u00eancia do BC para todas as institui\u00e7\u00f5es financeiras, e s\u00e3o usadas apenas para transa\u00e7\u00f5es entre os bancos \u2014 ou seja, n\u00e3o t\u00eam rela\u00e7\u00e3o com as contas ou dinheiro dos clientes. Foi delas que o dinheiro foi desviado.<\/p><p>A Pol\u00edcia Federal e a Pol\u00edcia Civil de S\u00e3o Paulo abriram inqu\u00e9rito e, poucos dias depois, <a href=\"https:\/\/g1.globo.com\/sp\/sao-paulo\/noticia\/2025\/07\/04\/preso-por-ataque-ao-sistema-financeiro-vendeu-senha-a-hackers-por-r-15-mil-e-trocava-de-celular-a-cada-15-dias.ghtml\"><strong>prenderam<\/strong><\/a> Jo\u00e3o Nazareno Roque, operador de TI da empresa.\u00a0<\/p><p>Segundo depoimento do pr\u00f3prio Roque \u00e0 pol\u00edcia, ele foi abordado ainda em mar\u00e7o, ao sair de um bar na capital paulista, por um homem que demonstrou conhecer detalhes sobre sua fun\u00e7\u00e3o. Recebeu R$5 mil para fornecer login e senha, e outros R$10 mil para executar comandos e desenvolver um sistema interno que facilitasse o desvio. Todos os pagamentos foram feitos em esp\u00e9cie, via motoboy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b1ea5 elementor-widget elementor-widget-heading\" data-id=\"28b1ea5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pontos de destaque sobre o ataque<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-131d13f elementor-widget elementor-widget-heading\" data-id=\"131d13f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Insider Threat<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a43603 elementor-widget elementor-widget-text-editor\" data-id=\"3a43603\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Roque n\u00e3o \u00e9 um hacker sofisticado, mas um funcion\u00e1rio com acesso leg\u00edtimo, conhecimento operacional e um hist\u00f3rico profissional humilde.\u00a0<\/p><p>Como acontece em tantos outros casos de Insider Threat, ele foi aliciado por um grupo externo e usou seu conhecimento e acesso privilegiado para burlar os sistemas de seguran\u00e7a.<\/p><p>Esse tipo de amea\u00e7a \u00e9 particularmente dif\u00edcil de prevenir, pois parte de pessoas j\u00e1 autorizadas a operar dentro do ambiente corporativo.\u00a0<\/p><p>T\u00e9cnicas de engenharia social, press\u00e3o financeira e abordagens discretas \u2014 como exigir a troca frequente de celulares para comunica\u00e7\u00e3o, no caso de Roque \u2014 s\u00e3o frequentemente utilizadas para manter o ataque longe dos radares por mais tempo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff181bf elementor-widget elementor-widget-heading\" data-id=\"ff181bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Engenharia social<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17837b6 elementor-widget elementor-widget-text-editor\" data-id=\"17837b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O sucesso da opera\u00e7\u00e3o criminosa teve como base um trabalho cir\u00fargico de<strong> <a href=\"https:\/\/hsclabs.com\/pt-br\/engenharia-social\/\">engenharia social<\/a><\/strong>. Os criminosos n\u00e3o apenas identificaram um funcion\u00e1rio com acesso privilegiado, como mapearam sua fun\u00e7\u00e3o, h\u00e1bitos e vulnerabilidades.\u00a0<\/p><p>Roque foi abordado pessoalmente na sa\u00edda de um bar, um ambiente informal e fora do controle da empresa, o que indica vigil\u00e2ncia pr\u00e9via e conhecimento sobre sua rotina.<\/p><p>Al\u00e9m disso, havia ind\u00edcios claros de que os criminosos estudaram seu perfil profissional e emocional. Trata-se de algu\u00e9m em transi\u00e7\u00e3o de carreira, com hist\u00f3rico de reinven\u00e7\u00e3o, e uma busca por crescimento.\u00a0<\/p><p>Esses fatores o tornaram mais suscet\u00edvel \u00e0 abordagem. Ap\u00f3s o primeiro contato, as comunica\u00e7\u00f5es seguiram por celular, com trocas frequentes de aparelho e pagamentos em dinheiro, o que demonstra uma opera\u00e7\u00e3o consciente da import\u00e2ncia do sigilo e do fator humano como vetor de ataque.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2fa2be elementor-widget elementor-widget-heading\" data-id=\"a2fa2be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Supply Chain Attack<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-330752c elementor-widget elementor-widget-text-editor\" data-id=\"330752c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O incidente tamb\u00e9m evidencia os riscos associados \u00e0 cadeia de fornecimento. A C&amp;M Software n\u00e3o foi o alvo final, mas sua viola\u00e7\u00e3o permitiu o comprometimento de institui\u00e7\u00f5es financeiras parceiras, incluindo bancos e fintechs.\u00a0<\/p><p>Esse tipo de ataque, onde o fornecedor se torna a porta de entrada, exige revis\u00e3o urgente das pr\u00e1ticas de due diligence digital, gest\u00e3o de terceiros e segmenta\u00e7\u00e3o de acessos.<\/p><p>A suspens\u00e3o do acesso da C&amp;M ao sistema do Banco Central, bem como o bloqueio de fintechs que receberam os valores desviados, demonstra como um \u00fanico elo fr\u00e1gil pode impactar toda a infraestrutura financeira.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-687ece8 elementor-widget elementor-widget-heading\" data-id=\"687ece8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Impactos e aprendizados \n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f206af elementor-widget elementor-widget-text-editor\" data-id=\"4f206af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dentre as li\u00e7\u00f5es mais urgentes que esse caso nos traz, creio que podemos destacar algumas.&nbsp;<\/p>\n<p>A primeira \u00e9 a <b>gest\u00e3o de credenciais e acessos. <\/b>\u00c9 fato que o uso de autentica\u00e7\u00e3o multifator (MFA), pol\u00edticas de privil\u00e9gio m\u00ednimo (Zero Trust) e segmenta\u00e7\u00e3o de sistemas pode reduzir drasticamente o impacto de credenciais comprometidas.<\/p>\n<p>Outro ponto \u00e9 o <b>monitoramento comportamental<\/b>. Hoje, h\u00e1 solu\u00e7\u00f5es de seguran\u00e7a que analisam o comportamento de usu\u00e1rios (UEBA &#8211; User and Entity Behavior Analytics) e que poderiam ter detectado o uso fora do padr\u00e3o das credenciais de Roque, como hor\u00e1rios incomuns e comandos at\u00edpicos.<\/p>\n<p>E isso nos leva ao que \u00e9 um dos principais elementos desse caso: <b>o fator humano.<\/b>&nbsp;&nbsp;<\/p>\n<p>Lidar com a vulnerabilidade inerente ao ser humano \u00e9 um dos maiores desafios da ciberseguran\u00e7a atualmente, mas isso n\u00e3o quer dizer que as empresas est\u00e3o de m\u00e3os atadas. Processos rigorosos de contrata\u00e7\u00e3o, monitoramento de atividades e educa\u00e7\u00e3o cont\u00ednua s\u00e3o ferramentas que ajudam a evitar casos como esse.<\/p>\n<p>Em especial, destaco os <a href=\"https:\/\/hsclabs.com\/pt-br\/plano-de-conscientizacao-em-seguranca-da-informacao\/\"><b>programas de conscientiza\u00e7\u00e3o<\/b><\/a>, que precisam ensinar n\u00e3o apenas a como reconhecer phishing, mas tamb\u00e9m a como lidar com abordagens presenciais e press\u00e3o emocional.<\/p>\n<p>E, claro, ressaltar as <b>consequ\u00eancias civis e criminais<\/b> de facilitar a invas\u00e3o a sistemas da empresa.&nbsp;<\/p>\n<p>Por fim, refor\u00e7o a necessidade de repensar de forma urgente a seguran\u00e7a na cadeia de fornecimento. Mais do que exigir uma conformidade em contrato, \u00e9 preciso auditar e monitorar os fornecedores cr\u00edticos continuamente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f0265d elementor-widget elementor-widget-heading\" data-id=\"5f0265d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclus\u00e3o\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c75fc23 elementor-widget elementor-widget-text-editor\" data-id=\"c75fc23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O caso C&amp;M Software deve ser visto como um marco para o setor financeiro e tecnol\u00f3gico brasileiro.\u00a0<\/p><p>Ele n\u00e3o representa apenas uma falha pontual, mas o colapso tempor\u00e1rio de uma engrenagem fundamental da infraestrutura digital nacional, provocado por um \u00fanico ponto vulner\u00e1vel: a confian\u00e7a depositada em um funcion\u00e1rio.<\/p><p>A ciberseguran\u00e7a do futuro exige n\u00e3o apenas firewalls e criptografia robusta, mas tamb\u00e9m uma cultura corporativa vigilante, processos de verifica\u00e7\u00e3o cont\u00ednuos e uma nova abordagem para lidar com os riscos humanos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d387d54\" data-id=\"d387d54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fb8f92 elementor-widget elementor-widget-template\" data-id=\"7fb8f92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"11911\" class=\"elementor elementor-11911\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0e534a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0e534a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a9b195e\" data-id=\"a9b195e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-861ae4f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"861ae4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/hsc-global-cyber-alliance-parceria\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/selo-proud-partner-gca-black.png\" title=\"selo-proud-partner-gca-black\" alt=\"selo-proud-partner-gca-black\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5b4e6f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"5b4e6f2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;slideInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4fb5e7e\" data-id=\"4fb5e7e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0008fa9 elementor-widget elementor-widget-heading\" data-id=\"0008fa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Inscreva-se para receber not\u00edcias de cybersecurity<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d77ffec elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"d77ffec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Form Newsletter\" aria-label=\"Form Newsletter\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"11911\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"d77ffec\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"HSC Cybersecurity\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-xs  elementor-field-textual\" placeholder=\"Nome\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-xs  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-field_92fe65d elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_92fe65d\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCargo\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[field_92fe65d]\" id=\"form-field-field_92fe65d\" class=\"elementor-field-textual elementor-size-xs\" required=\"required\">\n\t\t\t\t\t\t\t\t\t<option value=\"Especialista em Ciberseguran\u00e7a\">Especialista em Ciberseguran\u00e7a<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Analista de TI\">Analista de TI<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Gerente de TI\">Gerente de TI<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CIO ou CISO\">CIO ou CISO<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CTO\">CTO<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Desenvolvedor ou Arquiteto\">Desenvolvedor ou Arquiteto<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"CEO ou Diretor\">CEO ou Diretor<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Compliance\">Profissional de Compliance<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional Jur\u00eddico\">Profissional Jur\u00eddico<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Vendas \">Profissional de Vendas <\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de Marketing\">Profissional de Marketing<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Profissional de RH\">Profissional de RH<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Outro\">Outro<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_3197ff8 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_3197ff8\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCheck\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_3197ff8]\" id=\"form-field-field_3197ff8\" class=\"elementor-field elementor-size-xs  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_3197ff8\"><font size=\"1\"> Concordo com a <a href=\"https:\/\/hsclabs.com\/pt-br\/aviso-de-privacidade\/\">Pol\u00edtica de Privacidade<\/a> e dou o consentimento para o tratamento dos meus dados.<\/font><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-xs elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enviar<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-410d8c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"410d8c8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;],&quot;sticky_offset&quot;:75,&quot;sticky_effects_offset&quot;:50,&quot;_ha_eqh_enable&quot;:false,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11f3a71\" data-id=\"11f3a71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-01150fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01150fe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-46c6b70\" data-id=\"46c6b70\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2c93e3 elementor-widget elementor-widget-heading\" data-id=\"f2c93e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Bloqueie ataques que passam despercebidos por Microsoft e Google<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b35ca5 elementor-widget elementor-widget-image\" data-id=\"7b35ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/protecao-para-microsoft-365\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/Microsoft-365-color.png\" title=\"Microsoft-365-color\" alt=\"Microsoft-365-color\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef354be elementor-widget elementor-widget-image\" data-id=\"ef354be\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/hsclabs.com\/pt-br\/protecao-para-google-workspace\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/11\/Google-workspace-color.png\" title=\"Google-workspace-color\" alt=\"Google-workspace-color\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d553f0d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d553f0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-628b068\" data-id=\"628b068\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-188fcee elementor-widget elementor-widget-spacer\" data-id=\"188fcee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d96b708 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d96b708\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-391d788\" data-id=\"391d788\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c855e45 elementor-widget elementor-widget-heading\" data-id=\"c855e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Treine a sua equipe em ciberseguran\u00e7a<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef48b8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2ef48b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/hsclabs.com\/pt-br\/mindaware\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Comece Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos Por Junior Cunha, CTO e especialista em Seguran\u00e7a da Informa\u00e7\u00e3o na HSC Labs Na madrugada de 30 de junho de 2025, o Brasil testemunhou o que j\u00e1 \u00e9 considerado o maior ataque cibern\u00e9tico da hist\u00f3ria do [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":16519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[53],"tags":[],"class_list":["post-16517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyst-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos - HSC Labs<\/title>\n<meta name=\"description\" content=\"Veja como funciona o contrabando de SMTP, t\u00e9cnica de ataque que permite enviar e-mails falsos e driblar protocolos de seguran\u00e7a de e-mail.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos - HSC Labs\" \/>\n<meta property=\"og:description\" content=\"Veja como funciona o contrabando de SMTP, t\u00e9cnica de ataque que permite enviar e-mails falsos e driblar protocolos de seguran\u00e7a de e-mail.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/\" \/>\n<meta property=\"og:site_name\" content=\"HSC Labs\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-04T18:42:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-04T19:04:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"HSC Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"HSC Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/\"},\"author\":{\"name\":\"HSC Labs\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/53bd4e7c14d4e5ba52d2f4c2eb691d85\"},\"headline\":\"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos\",\"datePublished\":\"2025-07-04T18:42:17+00:00\",\"dateModified\":\"2025-07-04T19:04:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/\"},\"wordCount\":1175,\"publisher\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/artigo-junior-cunha-ataque-empresa-pix.jpg\",\"articleSection\":[\"Analyst Report\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/\",\"name\":\"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos - HSC Labs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/artigo-junior-cunha-ataque-empresa-pix.jpg\",\"datePublished\":\"2025-07-04T18:42:17+00:00\",\"dateModified\":\"2025-07-04T19:04:09+00:00\",\"description\":\"Veja como funciona o contrabando de SMTP, t\u00e9cnica de ataque que permite enviar e-mails falsos e driblar protocolos de seguran\u00e7a de e-mail.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/artigo-junior-cunha-ataque-empresa-pix.jpg\",\"contentUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/artigo-junior-cunha-ataque-empresa-pix.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/artigo-ataque-empresa-pix\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\",\"name\":\"HSC Cybersecurity\",\"description\":\"Full-scope cybersecurity solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#organization\",\"name\":\"HSC Cybersecurity\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-Logo-HSC-01.png\",\"contentUrl\":\"https:\\\/\\\/hsclabs.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/cropped-Logo-HSC-01.png\",\"width\":1496,\"height\":510,\"caption\":\"HSC Cybersecurity\"},\"image\":{\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/high-security-center\\\/\",\"https:\\\/\\\/www.instagram.com\\\/hsclabs\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hsclabs.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/53bd4e7c14d4e5ba52d2f4c2eb691d85\",\"name\":\"HSC Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/05f6634217acd1266fc97e75a759ef32d90fc563e7274351a9deac8cc8105c2b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/05f6634217acd1266fc97e75a759ef32d90fc563e7274351a9deac8cc8105c2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/05f6634217acd1266fc97e75a759ef32d90fc563e7274351a9deac8cc8105c2b?s=96&d=mm&r=g\",\"caption\":\"HSC Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos - HSC Labs","description":"Veja como funciona o contrabando de SMTP, t\u00e9cnica de ataque que permite enviar e-mails falsos e driblar protocolos de seguran\u00e7a de e-mail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/","og_locale":"pt_BR","og_type":"article","og_title":"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos - HSC Labs","og_description":"Veja como funciona o contrabando de SMTP, t\u00e9cnica de ataque que permite enviar e-mails falsos e driblar protocolos de seguran\u00e7a de e-mail.","og_url":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/","og_site_name":"HSC Labs","article_published_time":"2025-07-04T18:42:17+00:00","article_modified_time":"2025-07-04T19:04:09+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg","type":"image\/jpeg"}],"author":"HSC Labs","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"HSC Labs","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#article","isPartOf":{"@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/"},"author":{"name":"HSC Labs","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/person\/53bd4e7c14d4e5ba52d2f4c2eb691d85"},"headline":"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos","datePublished":"2025-07-04T18:42:17+00:00","dateModified":"2025-07-04T19:04:09+00:00","mainEntityOfPage":{"@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/"},"wordCount":1175,"publisher":{"@id":"https:\/\/hsclabs.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#primaryimage"},"thumbnailUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg","articleSection":["Analyst Report"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/","url":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/","name":"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos - HSC Labs","isPartOf":{"@id":"https:\/\/hsclabs.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#primaryimage"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#primaryimage"},"thumbnailUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg","datePublished":"2025-07-04T18:42:17+00:00","dateModified":"2025-07-04T19:04:09+00:00","description":"Veja como funciona o contrabando de SMTP, t\u00e9cnica de ataque que permite enviar e-mails falsos e driblar protocolos de seguran\u00e7a de e-mail.","breadcrumb":{"@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#primaryimage","url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg","contentUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2025\/07\/artigo-junior-cunha-ataque-empresa-pix.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/hsclabs.com\/pt-br\/artigo-ataque-empresa-pix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hsclabs.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Quando a amea\u00e7a vem de dentro: o que o ataque a empresa ligada ao Pix revela sobre riscos internos"}]},{"@type":"WebSite","@id":"https:\/\/hsclabs.com\/pt-br\/#website","url":"https:\/\/hsclabs.com\/pt-br\/","name":"HSC Cybersecurity","description":"Full-scope cybersecurity solutions","publisher":{"@id":"https:\/\/hsclabs.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hsclabs.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hsclabs.com\/pt-br\/#organization","name":"HSC Cybersecurity","url":"https:\/\/hsclabs.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/cropped-Logo-HSC-01.png","contentUrl":"https:\/\/hsclabs.com\/wp-content\/uploads\/2023\/07\/cropped-Logo-HSC-01.png","width":1496,"height":510,"caption":"HSC Cybersecurity"},"image":{"@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/high-security-center\/","https:\/\/www.instagram.com\/hsclabs"]},{"@type":"Person","@id":"https:\/\/hsclabs.com\/pt-br\/#\/schema\/person\/53bd4e7c14d4e5ba52d2f4c2eb691d85","name":"HSC Labs","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/05f6634217acd1266fc97e75a759ef32d90fc563e7274351a9deac8cc8105c2b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/05f6634217acd1266fc97e75a759ef32d90fc563e7274351a9deac8cc8105c2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/05f6634217acd1266fc97e75a759ef32d90fc563e7274351a9deac8cc8105c2b?s=96&d=mm&r=g","caption":"HSC Labs"}}]}},"_links":{"self":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/16517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/comments?post=16517"}],"version-history":[{"count":10,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/16517\/revisions"}],"predecessor-version":[{"id":16529,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/posts\/16517\/revisions\/16529"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/media\/16519"}],"wp:attachment":[{"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/media?parent=16517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/categories?post=16517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hsclabs.com\/pt-br\/wp-json\/wp\/v2\/tags?post=16517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}