<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Canal Hacker: Cibersegurança]]></title><description><![CDATA[Conteúdo geral sobre Cibersegurança e Segurança da Informação, mas sempre com um jeito despojado, sem aquelas formalidades.]]></description><link>https://www.canalhacker.com.br/s/ciberseguranca</link><image><url>https://substackcdn.com/image/fetch/$s_!HPGb!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec97aec-607e-405a-8e2c-b37d5b7817ad_820x820.png</url><title>Canal Hacker: Cibersegurança</title><link>https://www.canalhacker.com.br/s/ciberseguranca</link></image><generator>Substack</generator><lastBuildDate>Tue, 07 Apr 2026 01:06:17 GMT</lastBuildDate><atom:link href="https://www.canalhacker.com.br/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ricardo]]></copyright><language><![CDATA[pt-br]]></language><webMaster><![CDATA[canalhacker@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[canalhacker@substack.com]]></itunes:email><itunes:name><![CDATA[Ricardo Maganhati]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ricardo Maganhati]]></itunes:author><googleplay:owner><![CDATA[canalhacker@substack.com]]></googleplay:owner><googleplay:email><![CDATA[canalhacker@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ricardo Maganhati]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Falsos anúncios de ferramentas de vídeos de IA em redes sociais espalham malware]]></title><description><![CDATA[Campanha executada por grupo de cibercriminosos tira proveito deste hype em cima de geradores de videos de IA para disseminar malware em redes sociais.]]></description><link>https://www.canalhacker.com.br/p/falsos-anuncios-de-ferramentas-de</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/falsos-anuncios-de-ferramentas-de</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 30 May 2025 15:41:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UXAg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UXAg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UXAg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 424w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 848w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1272w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UXAg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86252,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164727317?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UXAg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 424w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 848w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1272w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://trustcloud.tech/trustcloud-services/deepfake-detection-with-ai/</figcaption></figure></div><p>A empresa de ciberseguran&#231;a chamada <a href="https://www.mandiant.com/">Mandiant Threat Defense</a> (<em><a href="https://www.cisoadvisor.com.br/google-conclui-aquisicao-da-mandiant-por-us-54-bilhoes/">adquirida pelo Google em 2022</a></em>), descobriu uma ampla opera&#231;&#227;o de crimes cibern&#233;ticos que tiram proveito desse entusiasmo do p&#250;blico por novas ferramentas de intelig&#234;ncia artificial.</p><p>Um grupo conhecido pelo nome de UNC6032 que acredita-se estar sediado no Vietn&#227;, estaria enganando pessoas com an&#250;ncios falsos em redes sociais, como Facebook e LinkedIn, que promovem desde meados de 2024 aqueles geradores de v&#237;deos de IA populares, como o Luma AI e o Canva Dream Lab.</p><h3><strong>Os ataques</strong></h3><p>No entanto, esses sites baixam secretamente softwares maliciosos, incluindo infostealers e backdoors, que roubam informa&#231;&#245;es confidenciais, como detalhes de login e dados pessoais. Os dados roubados provavelmente s&#227;o vendidos em mercados online ilegais, como a dark web.</p><p>Esse tipo de ataque &#233; uma grande preocupa&#231;&#227;o para todos. De acordo com o <a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025?e=48754805">report M-Trends da Mandiant</a>, credenciais roubadas s&#227;o a segunda forma principal de invas&#227;o de sistemas por cibercriminosos. A empresa encontrou muitos desses an&#250;ncios que alcan&#231;am milh&#245;es de usu&#225;rios, e acredita que campanhas semelhantes estejam ativas em outras redes sociais.</p><p>Por exemplo, um ataque espec&#237;fico investigado pela empresa de ciberseguran&#231;a come&#231;ou com um an&#250;ncio no Facebook da Luma Dream AI Machine. Quando um usu&#225;rio clicava em &#8220;Comece agora gratuitamente&#8221;, era conduzido por uma s&#233;rie de etapas que imitavam um processo real de cria&#231;&#227;o de v&#237;deos com IA.</p><p>Ap&#243;s a barra de carregamento, um bot&#227;o de download aparece, instalando o software malicioso em vez de baixar um v&#237;deo. Os arquivos baixados utilizam um truque com caracteres ocultos e o &#237;cone de um arquivo .mp4 falso para parecerem inofensivos.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vEVn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vEVn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vEVn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg" width="1456" height="1454" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1454,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:273720,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164727317?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vEVn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">An&#250;ncios maliciosos no Facebook e LinkedIn | Cr&#233;ditos da imagem: https://hackread.com/fake-ai-video-tool-ads-facebook-linkedin-infostealers/</figcaption></figure></div><h3><strong>Os malwares</strong></h3><p>O malware usado nesses ataques que a Mandiant identificou como STARKVEIL, &#233; um programa complexo escrito na linguagem Rust. Ele pode exibir mensagens de erro falsas para induzir os usu&#225;rios a reabrirem o programa. O software ent&#227;o instala outras ferramentas maliciosos, como XWORM, backdoor FROSTRIFT e o downloader GRIMPULL.</p><p>O software malicioso usado nesses ataques, que a Mandiant rastreia como STARKVEIL, &#233; um programa complexo escrito em <a href="https://hackread.com/rust-injector-xworm-remcos-rat-multi-stage-attack/">Rust</a> . Ele pode exibir mensagens de erro falsas para induzir os usu&#225;rios a reabrir o programa. O software ent&#227;o instala outras ferramentas perigosas, como <a href="https://hackread.com/hackers-script-kiddes-xworm-rat-compromise-devices/">XWORM</a> , backdoors FROSTRIFT e o downloader GRIMPULL.</p><p>Em <a href="https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites">uma publica&#231;&#227;o em seu blog</a>, a Mandiant detalha todas essas quest&#245;es t&#233;cnicas envolvendo amea&#231;as e mostra que est&#225; colaborando com a Meta e o LinkedIn no combate a essa campanha. Embora a Meta tenha removido muitos desses an&#250;ncios, outros novos aparecem diariamente. &#201; uma amea&#231;a cont&#237;nua que exige colabora&#231;&#227;o constante com a ind&#250;stria de tecnologia para proteger os usu&#225;rios.</p><p>Yash Gupta, gerente s&#234;nior da Mandiant, alerta que &#8220;<em>sites bem elaborados que se passam por ferramentas leg&#237;timas de IA podem representar uma amea&#231;a a qualquer um. Os usu&#225;rios precisam ter cuidado ao interagir com an&#250;ncios aparentemente inofensivos</em>&#8221;.</p><p>&#201; fato que as ferramentas de IA est&#227;o se tornando populares, e os cibercriminosos continuar&#227;o a explorar esse interesse. Recomendamos que voc&#234; seja cauteloso ao testar essas novas ferramentas e verifique sempre o endere&#231;o do site antes de interagir.</p><p><strong>Cr&#233;dito:</strong></p><p><a href="https://hackread.com/fake-ai-video-tool-ads-facebook-linkedin-infostealers/">https://hackread.com/fake-ai-video-tool-ads-facebook-linkedin-infostealers/</a></p>]]></content:encoded></item><item><title><![CDATA[Criminosos realizam campanhas de phishing com o tema DocuSign]]></title><description><![CDATA[O DocuSign &#233; tema de sofisticadas campanhas de phishing por cibercriminosos que possuem o objetivo de coletar credenciais corporativas, invadir redes e executar fraudes financeiras.]]></description><link>https://www.canalhacker.com.br/p/criminosos-realizam-campanhas-de</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/criminosos-realizam-campanhas-de</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 28 May 2025 22:22:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IRwd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IRwd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IRwd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 424w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 848w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1272w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IRwd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp" width="1456" height="820" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:820,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:406342,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164602723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IRwd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 424w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 848w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1272w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.techradar.com/pro/security/hackers-target-docusign-with-new-phishing-threat-watch-out-you-could-be-signing-your-data-away</figcaption></figure></div><p>O DocuSign, famosa ferramenta para assinatura digital de documentos com mais de 1 bilh&#227;o de usu&#225;rios e 95% das empresas da Fortune 500, &#233; tema de sofisticadas campanhas de phishing executadas por cibercriminosos que possuem o objetivo de coletar credenciais corporativas, invadir redes e executar fraudes financeiras.</p><h3><strong>Amea&#231;as cibern&#233;ticas que usam plataformas confi&#225;veis em seus ataques</strong></h3><p>Tendo em vista que o phishing &#233; respons&#225;vel por 19% dos vazamentos de dados e 60% envolvem o fator humano, conforme descobertas da empresa Verizon, entender essas amea&#231;as &#233; essencial para as empresas que buscam proteger suas informa&#231;&#245;es cr&#237;ticas.</p><p>As campanhas de phishing com o tema DocuSign empregam t&#225;ticas de engenharia social para enganar usu&#225;rios. Estas v&#237;timas geralmente recebem e-mails imitando o layout da ferramenta, com avisos urgentes que solicitam a revis&#227;o de documentos atrav&#233;s de bot&#245;es amarelos clic&#225;veis ou anexos de QR codes.</p><p>Ao serem levados para sites maliciosos, como p&#225;ginas falsas de login da Microsoft, os usu&#225;rios s&#227;o induzidos a digitarem credenciais de acesso ou detalhes financeiros.</p><p>Os QR codes representam um risco &#250;nico, pois os dispositivos m&#243;veis usados para escane&#225;-los geralmente n&#227;o possuem um software de seguran&#231;a robusto, o que facilita o contorno das defesas pelos invasores.</p><p>Esses ataques tamb&#233;m podem servir como ponte para o escalonamento de privil&#233;gios, movimenta&#231;&#227;o lateral dentro de redes corporativas, e at&#233; mesmo a implanta&#231;&#227;o de ransomware ou a exfiltra&#231;&#227;o de dados.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NCxQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NCxQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 424w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 848w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1272w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png" width="1105" height="835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:835,&quot;width&quot;:1105,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:90468,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164602723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NCxQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 424w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 848w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1272w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://gbhackers.com/threat-actors-use-fake-docusign-notifications/</figcaption></figure></div><h3>Mecanismos de ataques de phishing usando o DocuSign</h3><p>Outros incidentes destacam a diversidade desses golpes, com cibercriminosos registrando contas reais do DocuSign para enviar e-mails com apar&#234;ncia aut&#234;ntica, falsificando entidades confi&#225;veis, como fornecedores ou ag&#234;ncias municipais.</p><p>Outros orquestram golpes de faturas falsas para enganar empresas e fazer com quem realizem algum tipo de pagamento ou comentem fraudes de reembolso que induzem as v&#237;timas a divulgar informa&#231;&#245;es pessoais por telefone.</p><p>Al&#233;m disso, alguns invasores exploram as APIs do DocuSign para criar notifica&#231;&#245;es aparentemente leg&#237;timas, em que misturam algo realmente genu&#237;no com o engano cometido pelas v&#237;timas.</p><p>Normalmente esses e-mails podem se passar por departamentos de RH ou de Pagamento, criando aquele senso de urg&#234;ncia, o que pode levar os usu&#225;rios a agirem sem nenhum crit&#233;rio. O resultado disso pode ser o acesso n&#227;o autorizado a sistemas corporativos, perdas financeiras ou dados pessoais roubados aparecendo na dark web.</p><h3>Como se proteger?</h3><p><a href="https://www.welivesecurity.com/en/scams/personal-data-fraudsters-docusign-scam-emails/">De acordo com um report da ESET</a>, a prote&#231;&#227;o contra phishing do DocuSign requer uma abordagem em camadas.</p><p>As empresas precisam priorizar a educa&#231;&#227;o de seus funcion&#225;rios por meio de programas de conscientiza&#231;&#227;o sobre phishing, ensinando-os a analisar e-mails em busca de remetentes suspeitos, assinaturas incompat&#237;veis ou erros gramaticais e a verificar URLs antes de clicar nos links.</p><p>E-mails leg&#237;timos do DocuSign incluem c&#243;digos de seguran&#231;a para acesso direto aos documentos em sua plataforma, nunca por meio de links de e-mail ou anexos.</p><p>Implementar a autentica&#231;&#227;o multifator (MFA) em contas corporativas, impor uma higieniza&#231;&#227;o de senhas fortes por meio de gerenciadores de senha e implementar solu&#231;&#245;es avan&#231;adas de seguran&#231;a para detec&#231;&#227;o de links e anexos maliciosos s&#227;o prote&#231;&#245;es t&#233;cnicas essenciais.</p><p>As pol&#237;ticas de seguran&#231;a precisam desencorajar a intera&#231;&#227;o com esses e-mails n&#227;o solicitados, incentivando os usu&#225;rios a relatar mensagens suspeitas aos times de seguran&#231;a e ao endere&#231;o de den&#250;ncia de spam da DocuSign.</p><p>Caso ocorra alguma viola&#231;&#227;o, a&#231;&#245;es r&#225;pidas, como redefini&#231;&#227;o de senhas, verifica&#231;&#245;es de malware, isolamento de dispositivos e monitoramento da dark web, s&#227;o cruciais para conter danos.</p><p>Seja para fins comerciais ou pessoais, o uso do DocuSign deve ser equilibrado com a vigil&#226;ncia constante, para que n&#227;o haja sucesso nas investidas dos cibercriminosos que exploram a confian&#231;a em ferramentas leg&#237;timas.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://gbhackers.com/threat-actors-use-fake-docusign-notifications/">https://gbhackers.com/threat-actors-use-fake-docusign-notifications/</a></p>]]></content:encoded></item><item><title><![CDATA[Integrante de grupo hacktivista admite ter hackeado a Disney e vazado dados]]></title><description><![CDATA[A Disney iniciou uma investiga&#231;&#227;o em julho do ano passado, ap&#243;s um grupo de hackers ter anunciado o roubo de 1,1 TB de dados dos canais internos da ferramenta de colabora&#231;&#227;o Slack usada pela empresa.]]></description><link>https://www.canalhacker.com.br/p/integrante-de-grupo-hacktivista-admite</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/integrante-de-grupo-hacktivista-admite</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Thu, 08 May 2025 14:29:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DTZe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DTZe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DTZe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 424w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 848w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1272w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DTZe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:128222,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/162882060?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DTZe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 424w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 848w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1272w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://movies.fandom.com/wiki/The_Walt_Disney_Company</figcaption></figure></div><p>De acordo com o <a href="https://www.justice.gov/">DoJ</a> (Departamento de Justi&#231;a Americano), Ryan Mitchell Kramer se declarou culpado por acessar um computador e obtido informa&#231;&#245;es, al&#233;m de ter amea&#231;ado danificar dados, al&#233;m de duas acusa&#231;&#245;es de crime que podem resultar em uma pena de pris&#227;o de at&#233; cinco anos cada.</p><p><a href="https://www.securityweek.com/disney-investigating-hacker-groups-data-theft-claims/">Kramer est&#225; por tr&#225;s do ataque de 2024 contra a The Walt Disney Company</a>. A gigante da m&#237;dia iniciou uma investiga&#231;&#227;o sobre o incidente em julho do ano passado, ap&#243;s um grupo de hackers chamado NullBulge ter anunciado o roubo de 1,1 TB de dados dos canais internos da ferramenta de colabora&#231;&#227;o Slack usada pela empresa, incluindo mensagens, informa&#231;&#245;es sobre projetos n&#227;o lan&#231;ados, credencias de logins e c&#243;digos-fontes.</p><p>NullBulge alegou ser um &#8220;<em>grupo hacktivista que protege os direitos dos artistas e luta para garantir uma compensa&#231;&#227;o justa pelos seus trabalhos</em>&#8221;.</p><p>A empresa de seguran&#231;a SentinelOne detalhou as atividades do NullBulge, apontando que suas a&#231;&#245;es contradiziam suas alega&#231;&#245;es de hacktivismo. A SentinelOne analisou como o cibercriminoso atacou entidades relacionadas a IA e jogos com ransomare e outros malwares por meio de c&#243;digo malicioso implantado em plataformas como o GitHub e Hugging Face.</p><p>O malware distribu&#237;do por Kramer estava disfar&#231;ado de ferramenta que cria arte gerada por IA. Na realidade, ele implantava um malware que permitia ao hacker obter acesso ao dispositivo da v&#237;tima.</p><p>No caso da Disney, um funcion&#225;rio tinha baixado a ferramenta falsa de IA em seu computador pessoal. As credenciais armazenadas no dispositivo comprometido permitiram que Kramer obtivesse acesso &#224; conta do Slack usada pelo funcion&#225;rio como parte de seu trabalho na Disney. Isso permitiu que o NullBulge roubasse grandes quantidades de informa&#231;&#245;es de milhares de canais do Slack operados pela Disney.</p><p>O Departamento de Justi&#231;a afirmou que Kramer &#8212; que alegou representar o grupo hacktivista NullBulge, supostamente sediado na R&#250;ssia &#8212; tentou extorquir o funcion&#225;rio da Disney. Como o funcion&#225;rio n&#227;o respondeu, Kramer vazou suas informa&#231;&#245;es pessoais, juntamente com os arquivos roubados da Disney.</p><p>Parece que a Disney decidiu parar de usar o Slack para comunica&#231;&#227;o interna ap&#243;s o vazamento de dados. </p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/">https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/</a></p>]]></content:encoded></item><item><title><![CDATA[Ransomware: Conheça 10 ferramentas para descriptrografia de arquivos infectados]]></title><description><![CDATA[Conhe&#231;a algumas ferramentas que podem te ajudar a descriptografar/recuperar arquivos infectados com ransomware.]]></description><link>https://www.canalhacker.com.br/p/ransomware-conheca-10-ferramentas</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ransomware-conheca-10-ferramentas</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 23 Apr 2025 14:21:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BLN6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BLN6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BLN6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 424w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 848w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BLN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png" width="1456" height="808" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:808,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:686854,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160780065?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BLN6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 424w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 848w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://flowti.com.br/blog/ransomware-5-maneiras-de-evitar-o-furto-dos-dados-de-sua-empresa</figcaption></figure></div><p>Em tempos de infec&#231;&#245;es por ransomware e pedidos de resgates assolarem empresas de v&#225;rios segmentos, as ferramentas de descriptografia de arquivos infectados v&#234;m a calhar, na tentativa de recuperar dados criptografados sem a necessidade das v&#237;timas pagarem resgates.</p><p>Essas ferramentas ajudam as empresas a recuperar o acesso aos seus arquivos, por meio de chaves de descriptografia ou algor&#237;tmos que desbloqueio dados criptografados.</p><h3>Os projetos</h3><p>O projeto <strong>No More Ransomware</strong> &#233; um esfor&#231;o colaborativo que oferece uma ampla gama de &#8220;descriptografadores&#8221; (utilizaremos o termo <em>decryptor</em>) para mais de 100 cepas de ransomware. A Kaspersky, por exemplo, fornece ferramentas espec&#237;ficas como o Rakhni Decryptor, que tem como alvo diversas variantes de ransomware.</p><p>O <strong>Ransomware File Decryptor</strong> da Trend Micro suporta v&#225;rios tipos de ransomware, incluindo o WannaCry e Petya. J</p><p>O <strong>Ransomware File Decryptor</strong> da Trend Micro suporta v&#225;rios tipos de ransomware, incluindo WannaCry e Petya. A <strong>AVG</strong> oferece ferramentas para cepas espec&#237;ficas como Apocalypse e TeslaCrypt.</p><p>A <strong>Emsisoft</strong> fornece uma biblioteca de descriptografadores para v&#225;rios tipos de ransomware, incluindo Apocalypse e Xorist. A <strong>Avast</strong> tamb&#233;m oferece um conjunto de ferramentas de descriptografia para in&#250;meras variantes de ransomware. Essas ferramentas s&#227;o continuamente atualizadas para combater amea&#231;as de ransomware em evolu&#231;&#227;o.</p><p>Eles geralmente exigem a identifica&#231;&#227;o da cepa espec&#237;fica de ransomware para aplicar o m&#233;todo de descriptografia correto. Embora eficazes, essas ferramentas n&#227;o garantem a recupera&#231;&#227;o completa dos dados.</p><p>Atualiza&#231;&#245;es regulares s&#227;o cruciais conforme novas cepas de ransomware surgem. Os usu&#225;rios devem sempre verificar a compatibilidade e seguir as instru&#231;&#245;es cuidadosamente para garantir uma descriptografia bem-sucedida.</p><p>Aqui est&#227;o nossas escolhas para as 10 melhores ferramentas de descriptografia de arquivos de ransomware e seus recursos:</p><ol><li><p><strong><a href="https://support.kaspersky.com/common/disinfection/10556">Kaspersky Rakhni Decryptor</a></strong>: descriptografador especializado para o Rakhni, Agent. iih e outras fam&#237;lias de ransomware.</p></li><li><p><strong><a href="https://www.emsisoft.com/en/ransomware-decryption/">Ferramenta de descriptografia de ransomware Emsisoft</a></strong>: ferramenta abrangente que oferece suporte a diversas variantes de ransomware para uma descriptografia mais eficiente.</p></li><li><p><strong><a href="https://www.mcafee.com/">McAfee Ransomware Recover</a></strong>: ferramenta de recupera&#231;&#227;o eficaz para v&#225;rios tipos de ransomware com uma interface f&#225;cil de usar.</p></li><li><p><strong><a href="https://blog.360totalsecurity.com/en/ransomware-decryption-tool-petya-wannacry-released/">360 Ransomware</a></strong>: ferramenta gratuita que oferece descriptografia para v&#225;rios tipos de ransomware com atualiza&#231;&#245;es regulares.</p></li><li><p><strong><a href="https://www.avg.com/en-in/ransomware-decryption-tools#pc">Ferramenta de descriptografia de ransomware AVG</a></strong>: descriptografia f&#225;cil de usar para tipos comuns de ransomware, garantindo a recupera&#231;&#227;o de arquivos.</p></li><li><p><strong><a href="https://success.trendmicro.com/en-US/solution/KA-0006362">Trend Micro Ransomware File Decryptor</a></strong>: solu&#231;&#227;o robusta para descriptografar arquivos afetados por v&#225;rias cepas de ransomware.</p></li><li><p><strong><a href="https://www.nomoreransom.org/en/index.html">Projeto No More Ransomware</a></strong> : iniciativa colaborativa que fornece ferramentas de descriptografia gratuitas para muitas variantes de ransomware.</p></li><li><p><strong><a href="https://www.talosintelligence.com/pylocky">Ferramenta de descriptografia de arquivos PyLocky Ransomware</a></strong>: Esta &#233; uma ferramenta espec&#237;fica para descriptografar arquivos criptografados pelo ransomware PyLocky.</p></li><li><p><strong><a href="https://github.com/hasherezade/petya_key">Ferramenta de descriptografia do ransomware Petya</a></strong>: ferramenta dedicada para descriptografar arquivos afetados pelo ransomware Petya.</p></li><li><p><strong><a href="https://www.emsisoft.com/en/ransomware-decryption/pclock">Ferramenta de descriptografia CryptoLocker</a></strong>: ferramenta eficiente para descriptografar arquivos bloqueados pelo ransomware CryptoLocker.</p></li></ol><p>Veja mais detalhes sobre cada umas das ferramentas:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/866nX/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04081ae6-1888-441c-9ed3-87915ff61096_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:1263,&quot;title&quot;:&quot;10 Ferramentas de Descriptografia de Arquivos de Ransomware&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/866nX/1/" width="730" height="1263" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>O que achou do post?</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://cybersecuritynews.com/ransomware-file-decryptor-tools/">https://cybersecuritynews.com/ransomware-file-decryptor-tools/</a></p>]]></content:encoded></item><item><title><![CDATA[Oracle: empresa confirma hacking no Oracle Cloud]]></title><description><![CDATA[Empresa est&#225; informando de forma privada os clientes que alguns de seus sistemas de nuvem foram hackeados e aparentemente est&#225; tentando minimizar o impacto do incidente.]]></description><link>https://www.canalhacker.com.br/p/oracle-empresa-confirma-hacking-no</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/oracle-empresa-confirma-hacking-no</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 04 Apr 2025 15:53:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!51fn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!51fn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!51fn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 424w, https://substackcdn.com/image/fetch/$s_!51fn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 848w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1272w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!51fn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:87942,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160580597?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!51fn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 424w, https://substackcdn.com/image/fetch/$s_!51fn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 848w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1272w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/</figcaption></figure></div><p>Recentemente, um hacker sob o codinome &#8220;rose87168&#8221; esteve vendendo informa&#231;&#245;es possivelmente associadas a mais de 140 mil clientes do Oracle Cloud, incluindo credenciais criptografadas. O hacker inicialmente esperava extorquir cerca de 20 milh&#245;es de d&#243;lares da Oracle, mas come&#231;ou a oferecer os dados para qualquer um ou troc&#225;-los por <a href="https://acaditi.com.br/o-que-e-um-ataque-de-dia-zero-ou-zero-day-exploit/">exploits zero-day</a>.</p><p>Ap&#243;s as alega&#231;&#245;es do hacker virem &#224; tona, de que ele estaria de posse de dados da Oracle, a empresa negou categoricamente a invas&#227;o no Oracle Cloud, dizendo que &#8220;<em>n&#227;o houve nenhuma viola&#231;&#227;o de dados. As credenciais publicadas n&#227;o est&#227;o relacionadas ao Oracle Cloud. Nenhum cliente da solu&#231;&#227;o sofreu uma viola&#231;&#227;o ou perdeu dados</em>&#8221;.</p><p>No entanto, o hacker tem compartilhado v&#225;rios tipos de informa&#231;&#245;es para provar suas alega&#231;&#245;es, incluindo uma amostra de 10 mil registros de dados de clientes, um link para um arquivo demonstrando acesso aos sistemas de nuvem da Oracle, credenciais de usu&#225;rio e um longo v&#237;deo que parece ter sido gravado em uma reuni&#227;o interna da Oracle.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8tYZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tYZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 424w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 848w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1272w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png" width="1024" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tYZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 424w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 848w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1272w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Uma captura de tela do t&#243;pico atualizado de um f&#243;rum conectando ao coment&#225;rio do invasor exibindo uma amostra de dados de 2025 | Cr&#233;ditos da imagem: https://cybelangel.com/oracle-data-leak-breaking-news/</figcaption></figure></div><p>V&#225;rias empresas de seguran&#231;a e sites de not&#237;cias especializados t&#234;m apontado que as informa&#231;&#245;es vazadas pareciam genu&#237;nas e associadas a um ambiente de produ&#231;&#227;o. O site SecurityWeek e outras receberam a confirma&#231;&#227;o de que alguns clientes do Oracle Cloud tiveram seus dados inclu&#237;dos no vazamento.</p><h3>A Oracle notifica alguns clientes sobre a viola&#231;&#227;o de dados</h3><p>Existem v&#225;rios relat&#243;rios independentes da Oracle notificando privadamente os clientes afetados e confirmando que ocorreu uma viola&#231;&#227;o de dados. Por outro lado, os detalhes permanecem obscuros e parecem haver algumas informa&#231;&#245;es conflitantes.</p><p><a href="https://finance.yahoo.com/news/oracle-tells-clients-second-recent-213011742.html">A Bloomberg</a> soube por pessoas familiarizadas com o assunto de que a Oracle come&#231;ou a informar privadamente os clientes sobre uma viola&#231;&#227;o de dados que impactou nomes de usu&#225;rios, chaves de acesso e senhas criptografadas. O FBI e a CrowdStrike est&#227;o investigando o suposto crime.</p><p>De acordo com algumas fontes, a Oracle est&#225; informando aos clientes que o incidente envolveu um ambiente legado que n&#227;o est&#225; em uso h&#225; 8 anos e que as credenciais comprometidas representam pouco risco. Uma fonte diferente disse &#224; publica&#231;&#227;o que algumas das credenciais comprometidas s&#227;o de 2024.</p><h3>Como o ataque ocorreu?</h3><p>A empresa de seguran&#231;a CybelAngel soube de uma fonte n&#227;o identificada que os servidores em nuvem &#8216;Gen 1&#8217; foram afetados (os servidores mais novos, os &#8216;Gen 2&#8217;, n&#227;o foram afetados) e que as informa&#231;&#245;es comprometidas t&#234;m pelo menos 16 meses e n&#227;o incluem detalhes pessoais completos.</p><p>&#8220;Nossa fonte, que n&#227;o estamos nomeando conforme solicitado, est&#225; relatando que a Oracle supostamente identificou um invasor que estava no servi&#231;o de identidade compartilhada j&#225; em janeiro de 2025&#8221;, <a href="https://cybelangel.com/oracle-data-leak-breaking-news/">disse</a> a CybelAngel.</p><p>&#8220;<em>Essa exposi&#231;&#227;o foi facilitada por meio de um exploit Java de 2020 e o hacker conseguiu instalar um webshell junto com um malware, que tinha como alvo espec&#237;fico o banco de dados Oracle IDM, conseguindo exfiltrar dados. A Oracle supostamente tomou conhecimento de uma potencial viola&#231;&#227;o de dados no final de fevereiro e investigou esse problema internamente</em>&#8221;, acrescentou. &#8220;<em>Em poucos dias, a Oracle aparentemente conseguiu remover a amea&#231;a quando a primeira demanda por resgate foi feita no in&#237;cio de mar&#231;o</em>&#8221;.</p><p>O hacker afirma que informa&#231;&#245;es de 2025 tamb&#233;m foram comprometidas.</p><h3><strong>O ataque realmente ocorreu?</strong></h3><p>O pesquisador de seguran&#231;a cibern&#233;tica Kevin Beaumont, que acompanha a hist&#243;ria, soube de clientes da nuvem da Oracle que as notifica&#231;&#245;es da empresa foram apenas verbais, que n&#227;o h&#225; notifica&#231;&#245;es por escrito.</p><p>&#8220;<em>A Oracle esta tentando fazer declara&#231;&#245;es sobre o Oracle Cloud e usar palavras muito espec&#237;ficas para evitar responsabilidade. Isso n&#227;o est&#225; certo. A Oracle precisa falar clara, aberta e publicamente o que ocorreu, como isso impacta os clientes e o que eles est&#227;o fazendo sobre isso</em>&#8221;, <a href="https://doublepulsar.com/oracle-attempt-to-hide-serious-cybersecurity-incident-from-customers-in-oracle-saas-service-9231c8daff4a">disse o pesquisador</a>.</p><h3>A vida da Oracle n&#227;o est&#225; f&#225;cil</h3><p>Relatos de um hacking aparentemente n&#227;o relacionado com o Oracle Health tamb&#233;m t&#234;m circulados nos &#250;ltimos dias. <a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/">De acordo com o site Bleeping Computer</a>, as informa&#231;&#245;es de pacientes de v&#225;rias organiza&#231;&#245;es de sa&#250;de dos EUA foram comprometidas naquele incidente.</p><h3>Conclus&#227;o?</h3><p>Realmente a Oracle confirmou que houve um hacking em seus sistemas de nuvem, mas n&#227;o ficou claro 100% se ele ocorreu em tempos atuais, por mais que possam existir alguns relatos do hacking ser de 2025.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.securityweek.com/oracle-confirms-cloud-hack/">https://www.securityweek.com/oracle-confirms-cloud-hack/</a></p>]]></content:encoded></item><item><title><![CDATA[Mais de 20.000 sites WordPress estão vulneráveis a exploits de upload e exclusão de arquivos ]]></title><description><![CDATA[Um alerta de seguran&#231;a cr&#237;tico foi emitido para administradores de sites Wordpress ap&#243;s a descoberta de duas vulnerabilidades de alta gravidade no plugin &#8220;WP Ultimate CSV Importer&#8221;.]]></description><link>https://www.canalhacker.com.br/p/mais-de-20000-sites-wordpress-estao</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/mais-de-20000-sites-wordpress-estao</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 02 Apr 2025 14:50:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gy3b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gy3b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gy3b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:167268,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160420480?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gy3b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://bacsoftwareconsulting.com/wordpress-cat/4-effective-wordpress-techniques-for-better-security/</figcaption></figure></div><p>Um alerta de seguran&#231;a cr&#237;tico foi emitido para administradores de sites Wordpress ap&#243;s a descoberta de duas vulnerabilidades de alta gravidade no plugin &#8220;WP Ultimate CSV Importer&#8221;.</p><p>Com mais de 20 mil instala&#231;&#245;es ativas, as falhas no plugin representam um risco significativo para os sites afetados, podendo levar ao controle completo do site pelos invasores.</p><p>Com mais de 20.000 instala&#231;&#245;es ativas, as falhas do plugin representam um risco significativo para os sites afetados, podendo levar &#224; tomada completa do site por invasores.</p><h3>Exploits de upload e exclus&#227;o de arquivos</h3><p>As vulnerabilidades, catalogadas como CVE-2025-2008 e CVE-2025-2007, foram divulgadas de forma &#233;tica em mar&#231;o de 2025 pelo pesquisador de seguran&#231;a &#8220;mikemyers&#8221; atrav&#233;s do <em>Wordfence Bug Bounty Program</em>:</p><p><strong>CVE-2025-2008: Upload de arquivo arbitr&#225;rio</strong></p><p>A funcionalidade de importa&#231;&#227;o do plugin n&#227;o tinha possu&#237;a uma valida&#231;&#227;o adequada do tipo de arquivo, permitindo que invasores autenticados com acesso de n&#237;vel de assistente ou superior, carregassem arquivos de forma arbitr&#225;ria, incluindo scripts PHP (e tem gente falando que o PHP morreu) maliciosos. O c&#243;digo carregado poderia ent&#227;o ser executado para se obter controle remoto do servidor onde o site estaria hospedado.</p><p><strong>CVE-2025-2007: Exclus&#227;o arbitr&#225;ria de arquivo</strong></p><p>Um erro na fun&#231;&#227;o de exclus&#227;o de arquivo do plugin permitiu que invasores exclu&#237;ssem qualquer arquivo no servidor, como o arquivo cr&#237;tico wp-config.php. A exclus&#227;o deste arquivo for&#231;a o site a retornar a um estado de configura&#231;&#227;o do zero, potencialmente permitindo que invasores redirecionem o site para um banco de dados sob seu controle para explora&#231;&#227;o posterior.</p><p>Ambas as vulnerabilidades receberam altas pontua&#231;&#245;es CVSS, de 8.8 e 8.1, respectivamente, refletindo o s&#233;rio risco que representam.</p><h3>Corre&#231;&#227;o das vulnerabilidades</h3><p>Ap&#243;s a notifica&#231;&#227;o das vulnerabilidades em 5 de mar&#231;o deste ano, a criadora do plugin, a Smackcoders, agiu prontamente. Ap&#243;s uma colabora&#231;&#227;o com o time do Wordfence, uma vers&#227;o corrigida (7.19.1) foi lan&#231;ada em 25 de mar&#231;o deste ano.</p><p>Usu&#225;rios do Wordfence com plugins de seguran&#231;a ativos, est&#227;o protegidos desde a divulga&#231;&#227;o das vulnerabilidades, mas atualiza&#231;&#245;es gerais continuam sendo essenciais.</p><h3>Usu&#225;rios e administradores precisam atualizar o plugin para a vers&#227;o corrigida</h3><p>Todos os usu&#225;rios do plugin <em>WP Ultimate CSV Importer</em> devem atualizar imediatamente para a vers&#227;o 7.19.1 ou superior.</p><p>Os administradores devem garantir que seus sites n&#227;o est&#227;o executando vers&#245;es vulner&#225;veis, pois essas explora&#231;&#245;es podem levar a resultados s&#233;rios, desde viola&#231;&#245;es de dados at&#233; a invas&#227;o dos sites.</p><p>A descoberta dessas e outras vulnerabilidades destaca a necessidade cont&#237;nua de vigil&#226;ncia na manuten&#231;&#227;o da seguran&#231;a de sites WordPress. N&#227;o basta apenas colocar um site em opera&#231;&#227;o e n&#227;o se preocupar com a seguran&#231;a dele.</p><h3><strong>Dica do Canal Hacker</strong></h3><p>Empresas que possuem sites funcionando sob o WordPress precisam saber o que est&#225; &#8220;rolando debaixo do cap&#244;&#8221;. Muitas instala&#231;&#245;es s&#227;o mantidas por empresas de marketing e desenvolvimento de sites, onde muitas delas, acabam n&#227;o se preocupando com a seguran&#231;a dos sites desenvolvidos, em manter os plugins atualizados sempre, etc. Sendo o caso, converse com a sua ag&#234;ncia para que o melhor seja feito.</p><p>De qualquer forma, caso a empresa em que trabalha ou uma ag&#234;ncia, seja a respons&#225;vel direta por manter a estrutura do site, pense ent&#227;o na seguran&#231;a. Mas tamb&#233;m n&#227;o saia atualizando plugin &#8220;&#224; torto e &#224; direita&#8221;. Converse com os desenvolvedores do seu site e explique a necessidade de atualizar o plugin, para que seja validado a necessidade de recodifica&#231;&#227;o da aplica&#231;&#227;o, de forma que se  adeque &#224; nova vers&#227;o do plugin.</p><p>Sendo a sua empresa ou uma ag&#234;ncia, respons&#225;vel por manter a estrutura e desenvolvimento site, &#233; a imagem da empresa que est&#225; em jogo. Realize varreduras recorrentes para saber se est&#225; vulner&#225;vel ou n&#227;o.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://gbhackers.com/20000-wordpress-sites-at-risk/">https://gbhackers.com/20000-wordpress-sites-at-risk/</a></p>]]></content:encoded></item><item><title><![CDATA[Google traz criptografia de ponta a ponta para usuários do Gmail corporativo]]></title><description><![CDATA[Novo recurso permitir&#225; em breve que usu&#225;rios do Gmail corporativo enviem e-mails protegidos pela criptografia de ponta a ponta.]]></description><link>https://www.canalhacker.com.br/p/google-traz-criptografia-de-ponta</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/google-traz-criptografia-de-ponta</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 02 Apr 2025 13:19:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lESo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lESo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lESo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lESo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lESo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg" width="1456" height="730" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:730,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:27158,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160414853?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lESo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lESo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://pt.wallpapers.com/fundo/acesseo-gmail-e-mantenha-se-conectado-sgjoz4gzf6l52cc8.html</figcaption></figure></div><p>Ainda em fase de testes, o recurso permitir&#225; em breve que usu&#225;rios corporativos do Gmail enviem e-mails com <a href="https://www.cloudflare.com/pt-br/learning/privacy/what-is-end-to-end-encryption/">Criptografia de Ponta a Ponta</a> (E2EE/End-to-End Encryption) para qualquer caixa de entrada de contas Gmail, e depois, para qualquer caixa de entrada, at&#233; o final do ano.</p><p>Esta &#233; uma medida de seguran&#231;a aprimorada, uma alternativa ao protocolo <em>Secure/Multipurpose Internet Mail Extensions</em> (S/MIME), que requer o aquisi&#231;&#227;o, o gerenciamento e a implementa&#231;&#227;o de certificados por usu&#225;rio para ser utilizado.</p><p>No modelo S/MIME &#8220;<em>os usu&#225;rios finais precisam descobrir se eles e os destinat&#225;rios possuem o S/MIME configurado (poucos t&#234;m), e ent&#227;o, passar pelo trabalho de trocar certificados antes que os e-mails criptografados possam ser trocados</em>&#8221;, observa o Google.</p><h3>Como a nova abordagem vai funcionar com o E2EE?</h3><p>O Google diz que a nova abordagem simplifica significativamente as coisas ao permitir o uso do E2EE para qualquer mensagem, independentemente do destinat&#225;rio, por meio de chaves de criptografias controladas pela organiza&#231;&#227;o, sem a necessidade de investimento em recursos adicionais, como a configura&#231;&#227;o de S/MIME ou o gerenciamento de certificados.</p><p>As mensagens enviadas para caixas de entrada do Gmail s&#227;o automaticamente descriptografadas e disponibilizadas aos destinat&#225;rios. Se enviadas para um servi&#231;o de e-mail diferente, o destinat&#225;rio receber&#225; um convite para visualizar a mensagem em uma vers&#227;o restrita do Gmail e ter&#225; a op&#231;&#227;o de usar uma conta de convidado do Google Workspace para interagir com ela.</p><p>Caso o servi&#231;o de e-mail do destinat&#225;rio possua o S/MIME configurado, o Gmail entregar&#225; a mensagem E2EE usando este protocolo.</p><p>&#8220;<em>Os times de TI tamb&#233;m t&#234;m a op&#231;&#227;o de exigir que todos os destinat&#225;rios externos (mesmo sendo usu&#225;rios do Gmail) usem a vers&#227;o restrita do Gmail Workspace. Isso ajuda a garantir que os dados da organiza&#231;&#227;o n&#227;o sejam armazenados em servidores e dispositivos de terceiros</em>&#8221;, explica o Google.</p><p>O novo recurso, diz o Google, aproveita a criptografia no lado do cliente (CSE), um controle t&#233;cnico do Workspace que permite que as organiza&#231;&#245;es protejam e-mails, documentos e outros recursos usando chaves de criptografia que elas controlam e armazenam fora infraestrutura do Google.</p><p>&#8220;<em>Os dados s&#227;o criptografados no cliente antes de serem transmitidos ou armazenados na nuvem do Google, tornando-os indecifr&#225;veis para a pr&#243;pria Google e outras entidades terceirizadas e ajudando a atender requisitos regulat&#243;rios, como a soberania dos dados, HIPAA e controles de exporta&#231;&#227;o</em>&#8221;, explica o Google.</p><p>Na ter&#231;a-feira, dia 1 de abril, o Google tamb&#233;m anunciou a disponibilidade geral de v&#225;rios recursos de seguran&#231;a no Gmail, incluindo o modo padr&#227;o CSE, preven&#231;&#227;o contra perda de dados (DLP), r&#243;tulos de classifica&#231;&#227;o de mensagens e um novo modelo de IA para prote&#231;&#227;o contra amea&#231;as.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/">https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/</a></p>]]></content:encoded></item><item><title><![CDATA[A ferramenta Cellebrite e o seu uso ético (ou nem tanto)]]></title><description><![CDATA[At&#233; que ponto vai o uso de ferramentas por governos, autoridades e empresas, para hackear dispositivos m&#243;veis em detrimento de um objetivo, onde em alguns casos, beira em quest&#245;es n&#227;o t&#227;o &#233;ticas?]]></description><link>https://www.canalhacker.com.br/p/a-ferramenta-cellebrite-e-o-seu-uso</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/a-ferramenta-cellebrite-e-o-seu-uso</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 01 Apr 2025 19:06:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!g6TT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g6TT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g6TT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g6TT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3396787,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g6TT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://sg.finance.yahoo.com/news/cellebrite-suspends-serbia-customer-claims-155531518.html</figcaption></figure></div><p>Muito se falou sobre a Cellebrite, ferramenta utilizada para ajudar na solu&#231;&#227;o do caso Vit&#243;ria (leia <strong><a href="https://www.terra.com.br/diversao/gente/o-que-e-software-cellebrite-entenda-sistema-utilizado-para-solucionar-o-caso-vitoria,ac13a3ecd5b2f8587673e0d0256eaa8816enykwc.html">esta</a></strong> e <strong><a href="https://www.cnnbrasil.com.br/nacional/caso-vitoria-entenda-como-software-extrai-dados-de-celular/">esta outra not&#237;cia</a></strong> para saber mais).</p><p>A Cellebrite &#233; uma tecnologia de ponta utilizada por v&#225;rios governos e empresas do mundo inteiro. Existem vers&#245;es de software e de hardware, como o UFED 4PC, UFED Touch3 Ruggedized Tablet, UFED Ruggedized Laptop e o <a href="https://cellebrite.com/wp-content/uploads/2020/09/ProductOverview_ForensicWorkstation_A4_web.pdf">Cellebrite Forensic Workstation</a> (esta&#231;&#227;o forense de alto desempenho). Maiores informa&#231;&#245;es <a href="https://cellebrite.com/en/ufed/">aqui</a> e <a href="https://cellebrite.com/wp-content/uploads/2020/09/ProductOverview_ForensicWorkstation_A4_web.pdf">aqui</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v6Wn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v6Wn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 424w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 848w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1272w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png" width="612" height="340" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:340,&quot;width&quot;:612,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169651,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v6Wn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 424w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 848w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1272w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cellebrite UFED | Cr&#233;ditos: https://cellebrite.com/wp-content/uploads/2022/11/Solution_Overview_Cellebrite_UFED_LTR.pdf</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NBFI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NBFI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 424w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 848w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1272w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NBFI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png" width="218" height="414.3901665344964" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2397,&quot;width&quot;:1261,&quot;resizeWidth&quot;:218,&quot;bytes&quot;:899758,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NBFI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 424w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 848w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1272w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cellebrite Forensic Workstation | Cr&#233;ditos: https://cellebrite.com/wp-content/uploads/2020/09/ProductOverview_ForensicWorkstation_A4_web.pdf</figcaption></figure></div><p>&#201; de grande notoriedade os benef&#237;cios que estas solu&#231;&#245;es da Cellebrite trazem na solu&#231;&#227;o de crimes, seja em governos ou do setor privado. Mas nem tudo s&#227;o flores quando determinados governos/autoridades e empresas utilizam ferramentas para determinados fins, se &#233; que me entendem.</p><div class="pullquote"><p><strong>DISCLAIMER : N&#227;o estou aqui para fazer acusa&#231;&#227;o alguma (e muito menos defendendo criminosos), apenas para reproduzir not&#237;cias de forma que o leitor entenda e tamb&#233;m tecer coment&#225;rios pertinentes sobre o tema, ok? Tudo o que eu falar aqui coloque sempre a palavra SUPOSTAMENTE na frente de qualquer frase.</strong></p></div><h3><strong>Autoridades usam spyware e ferramenta de extra&#231;&#227;o forense da Cellebrite para hackear jornalistas e ativistas</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nhVy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nhVy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 424w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 848w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1272w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nhVy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp" width="1456" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:339116,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nhVy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 424w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 848w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1272w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/</figcaption></figure></div><p><a href="https://www.amnesty.org/en/documents/eur70/8813/2024/en/">Em um relat&#243;rio</a> publicado do site da Anistia Internacional, em dezembro de 2024, intitulado &#8220;<em>Serbia: &#8220;A Digital Prison&#8221;: Surveillance and the suppression of civil society in Serbia</em>&#8221;, relata como produtos forenses de telefonia m&#243;vel desenvolvidos pela empresa israelense Cellebrite seriam usados para  extrair dados de dispositivos m&#243;veis pertencentes a jornalistas e ativistas. </p><p>O relat&#243;rio tamb&#233;m revela como a pol&#237;cia s&#233;rvia e a <a href="https://www.bia.gov.rs/">Ag&#234;ncia de Seguran&#231;a e Informa&#231;&#227;o</a> (Bezbedonosno-informativna Agencija &#8211; BIA) do pa&#237;s utilizou um spyware personalizado para o Android, o NoviSpy, para infectar secretamente dispositivos de indiv&#237;duos durante per&#237;odos de deten&#231;&#227;o ou em abordagens policiais.</p><h4>Como a Cellebrite e o NoviSpy foram usados para comprometer estes dispositivos?</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!czzr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!czzr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 424w, https://substackcdn.com/image/fetch/$s_!czzr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 848w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!czzr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:104446,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!czzr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 424w, https://substackcdn.com/image/fetch/$s_!czzr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 848w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.theguardian.com/world/2024/dec/16/serbian-authorities-using-spyware-to-illegally-surveil-activists-report-finds </figcaption></figure></div><p>O NoviSpy pode capturar dados confidenciais de um telefone e fornecer recursos, como ligar o microfone ou a c&#226;mera de um telefone remotamente enquanto as ferramentas forenses da Cellebrite foram usadas para desbloquear o telefone antes da infec&#231;&#227;o por spyware e tamb&#233;m permitir a extra&#231;&#227;o de dados do dispositivo.</p><p>Em pelo menos dois casos, a Anistia Internacional teria descoberto evid&#234;ncias de que exploits (software que tira vantagem de uma vulnerabilidade do dispositivo alvo) da Cellebrite UFED teriam sido usados para contornar mecanismos de seguran&#231;a de dispositivos Android, permitindo que as autoridades instalassem secretamente o NoviSpy durante abordagens policiais, por exemplo.</p><p>Em fevereiro de 2024, o jornalista investigativo s&#233;rvio Slavi&#353;a Milanov foi preso e detido pela pol&#237;cia sob o pretexto de realizarem um teste de baf&#244;metro. Enquanto estava detido, Slavi&#353;a foi interrogado por policiais &#224; paisana onde questionavam sobre seu trabalho jornal&#237;stico. Seu telefone Android estava desligado quando o havia entregue &#224; pol&#237;cia e nenhum momento ele foi questionado e nem precisou fornecer uma senha. Ap&#243;s sua libera&#231;&#227;o, Slavi&#353;a percebeu que seu telefone parecia ter sido adulterado e os dados de seu telefone coletados.</p><p>Ele solicitou que o Laborat&#243;rio de Seguran&#231;a da Anistia Internacional conduzisse um an&#225;lise forense em seu telefone - um Xiaomi Redmi Note 10S. A per&#237;cia revelou que a solu&#231;&#227;o UFED da Cellebrite havia sido usada para desbloquear secretamente o telefone de Slavi&#353;a  durante sua deten&#231;&#227;o.</p><p>Um segundo caso no relat&#243;rio, envolvendo um ativista ambiental, Nikola Risti&#263;, encontrou evid&#234;ncias forenses semelhantes de produtos da Cellebrite usados para desbloquear um dispositivo para ent&#227;o permitir a infec&#231;&#227;o seguinte pelo NoviSpy.</p><blockquote><p>Em fevereiro deste ano, o site da Anistia Internacional <a href="https://www.amnesty.org/en/latest/news/2025/02/cellebrite-halts-product-use-in-serbia-following-amnesty-surveillance-report/">publicou uma mat&#233;ria</a> comentando sobre a Cellebrite ter interrompido o uso de produtos na S&#233;rvia ap&#243;s o relat&#243;rio emitido pela Anistia em dezembro/2024.</p></blockquote><h4>Detalhes sobre o NoviSpy</h4><p>O NoviSpy foi projetado para coletar v&#225;rios tipos de informa&#231;&#245;es de telefone comprometidos, incluindo capturas de tela de todas as a&#231;&#245;es no dispositivos, geolocaliza&#231;&#227;o dos alvos, grava&#231;&#245;es de &#225;udio e microfone, arquivos e fotos. Ele &#233; instalado por meio do Android Debug Bridge (<a href="https://developer.android.com/tools/adb">adb</a>) e &#233; composto por dois aplicativos:</p><ul><li><p><strong>NoviSpayAdmin (com.serv.services)</strong>: solicita permiss&#245;es extensas para coletar registros de chamadas, mensagens SMS, listas de contatos e para gravar &#225;udio pelo microfone</p></li><li><p><strong>NoviSpyAccess (com.accesibilityservice)</strong>: tira proveito dos <a href="https://developer.android.com/reference/android/accessibilityservice/AccessibilityService">servi&#231;os de acessibilidade</a> do Android para coletar furtivamente prints de tela, contas de e-mail e aplicativos de mensagens como o Signal e WhatsApp, exfiltrar arquivos, rastrear a localiza&#231;&#227;o e ativar a c&#226;mera</p></li></ul><div class="pullquote"><p>No que diz respeito &#224; veracidade das informa&#231;&#245;es encontradas, pensando que elas podem ser manipuladas previamente, at&#233; que ponto uma investiga&#231;&#227;o n&#227;o seria comprometida? Teria validade judicial?</p></div><h3>Ferramenta forense da Cellebrite poderia conter falhas de seguran&#231;a que permitiriam a execu&#231;&#227;o arbitr&#225;ria de comandos na pr&#243;pria ferramenta?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cJrX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cJrX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 424w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 848w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1272w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cJrX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp" width="640" height="396" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:396,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:236046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cJrX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 424w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 848w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1272w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html</figcaption></figure></div><p>Moxie Marlinspike, criador do popular aplicativo de mensagens criptografadas Signal, anunciou em <a href="https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html">um post de abril de 2021, no site Security Affairs</a>, que as ferramentas forenses da Cellebrite s&#227;o afetadas por diversas vulnerabilidades que podem ser exploradas para se conseguir execu&#231;&#227;o arbitr&#225;ria de c&#243;digo no alvo.</p><p>Em dezembro de 2020, a Cellebrite <a href="https://cellebrite.com/en/cellebrites-new-solution-for-decrypting-the-signal-app/">anunciou em sua p&#225;gina</a> que a ferramenta <a href="https://cellebrite.com/en/physical-analyzer/">Physical Analyzer</a> seria capaz de descriptografar mensagens e dados do aplicativo de mensagens Signal.</p><p>Moxie destacou que &#8220;<em>os dados que o software da Cellebrite precisa extrair e exibir s&#227;o, em &#250;ltima an&#225;lise, gerados e controlados pelos aplicativos no dispositivo, n&#227;o por uma fonte &#8220;confi&#225;vel&#8221;, ent&#227;o a Cellebrite n&#227;o pode fazer nenhuma suposi&#231;&#227;o sobre a confiabilidade dos dados que est&#225; recebendo. Este &#233; o espa&#231;o em que virtualmente todas as vulnerabilidades de seguran&#231;a podem surgir</em>&#8221;, diz a <a href="https://signal.org/blog/cellebrite-vulnerabilities/">postagem</a> publicada pelo criador do Signal. &#8220;<em>Como quase todo c&#243;digo da Cellebrite existe para analisar entradas n&#227;o confi&#225;veis que podem ser formatadas de forma inesperada para explorar corrup&#231;&#227;o de mem&#243;ria ou outras vulnerabilidades no software de an&#225;lise, pode-se esperar que a criadora da ferramenta tenha sido extremamente cautelosa. Olhando para o UFED e o Physical Analyzer, no entanto, ficamos surpresos ao descobrir que muito pouco cuidado parece ser sido dado &#224; seguran&#231;a do pr&#243;prio software. Faltam defesas de mitiga&#231;&#227;o de explora&#231;&#227;o padr&#227;o da ind&#250;stria e muitas oportunidades de explora&#231;&#227;o est&#227;o presentes</em>&#8221;.</p><p>O especialista ainda explicou que a falha poderia ser explorada de v&#225;rias maneiras, bastando incluir um arquivo especialmente formatado, mas in&#243;cuo, em qualquer aplicativo de um dispositivo que, quando analisado pelo software da Cellebrite, poderia acionar a explora&#231;&#227;o.</p><p>Ele detalha: &#8220;<em>ao incluir este arquivo especialmente criado dentro de um dispositivo que ser&#225; analisado pela Cellebrite, &#233; poss&#237;vel executar um c&#243;digo que modifica n&#227;o apenas o relat&#243;rio da ferramenta criado naquela varredura, mas tamb&#233;m em todos os relat&#243;rios gerados anteriormente e no futuro, n&#227;o somente neste, mas em todos os dispositivos. A execu&#231;&#227;o arbitr&#225;ria de comando inclui inserir ou remover textos, e-mails, fotos, contatos, arquivos ou quaisquer outros dados, sem altera&#231;&#245;es detect&#225;veis de registro de data e hora ou de verifica&#231;&#245;es de checksum</em>&#8221;.</p><p>O pesquisador compartilhou <a href="https://signal.org/blog/videos/cellebrite-hacktheplanet.mp4">um video</a> de uma POC do ataque que demonstra como acionar o problema ao analisar arquivos armazenados no dispositivo. O payload usado pelo especialista utiliza a API do MessageBox para Windows para entregar uma mensagem ao usu&#225;rio (pra quem &#233; f&#227; do filme Hackers, de 1995, vai curtir a montagem):</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;d11d8af7-7fb9-4181-a368-c2cf4688e699&quot;,&quot;duration&quot;:null}"></div><p>Moxie tamb&#233;m notou que o instalador do Packet Analyzer inclui pacotes MSI assinados digitalmente pela Apple e aparentemente extra&#237;dos do instalador do iTunes para Windows 12.9.0.167. Ambos os pacotes importam DLLs para permitir que ferramentas forenses extraiam dados de dispositivos iOS.</p><p>&#8220;<em>Parece improv&#225;vel para n&#243;s que a Apple tenha concedido &#224; Cellebrite uma licen&#231;a para redistribuir e incorporar DLLs da Apple em seu pr&#243;prio produto, o que poderia representar um risco legal para a Cellebrite e seus usu&#225;rios</em>&#8221;, conclui o especialista.</p><h3>O que podemos dizer?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6D1d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6D1d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6D1d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:585064,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6D1d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://theconversation.com/we-study-mass-surveillance-for-social-control-and-we-see-trump-laying-the-groundwork-to-contain-people-of-color-and-immigrants-221073</figcaption></figure></div><p>A forma de atua&#231;&#227;o de ferramentas como as da Cellebrite, no que diz respeito ao hacking executado em dispositivos alvo, n&#227;o seria novidade e nem nada milagroso. Em muitos casos, at&#233; facilitado pelas fabricantes de dispositivos m&#243;veis, se &#233; que me entende.</p><p>Estas ferramentas exploram vulnerabilidades e conseguem acesso ao dispositivo. &#8220;Simples&#8221; assim. No caso do Cellebrite UFED e Forensic Workstation, que utilizam um hardware dedicado, o sucesso pode ser obtido em menos tempo devido ao poder de processamento do hardware. Junte isso &#224; gama de exploits utilizados, e Voil&#225;: informa&#231;&#245;es podem ser descobertas em pouco tempo.</p><p>Estas ferramentas quando usadas em governos que possuem uma certa veia ditatorial ou de perseguir opositores, ou ainda, o de simplesmente invadir a privacidade de cidad&#227;os honestos, acaba sendo um grande fil&#227;o para a criadora do Cellebrite. &#201; basicamente um contrato bastante &#8220;vantajoso&#8221; $$. </p><p>O lobby dentro de um governo para que x ferramenta seja utilizada &#233; grande e os envolvidos podem se dar bem. Veja <a href="https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/">esta mat&#233;ria</a> no The Intercept (confira a <a href="https://theintercept-com.translate.goog/2022/02/08/cellebrite-phone-hacking-government-agencies/?_x_tr_sl=en&amp;_x_tr_tl=pt&amp;_x_tr_hl=pt-BR&amp;_x_tr_pto=wapp">vers&#227;o traduzida pelo Google Translator</a>), de fevereiro de 2022, onde &#233; relatado o uso em massa desta ferramenta no governo americano.</p><p>No que diz respeito &#224; veracidade das informa&#231;&#245;es encontradas, pensando que elas podem ser manipuladas previamente, at&#233; que ponto uma investiga&#231;&#227;o n&#227;o seria comprometida? Teria validade judicial?</p><p>Como falei no disclaimer, n&#227;o estou aqui pra defender ningu&#233;m, o foco aqui foi, &#233;, e sempre ser&#225;, o de analisar criticamente e parcialmente as poss&#237;veis situa&#231;&#245;es sobre o tema e fazer questionamentos pertinentes.</p><p>Para saber mais sobre poss&#237;veis rela&#231;&#245;es entre a ferramenta, spyware e vulnerabilidades, realize a consulta no Google abaixo:</p><p><a href="https://www.google.com/search?q=%22cellebrite%22+%2B+%22spyware%22+%2B+%22vulnerability%22">https://www.google.com/search?q=%22cellebrite%22+%2B+%22spyware%22+%2B+%22vulnerability%22</a></p><p>O que achou do post?</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html">https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html</a></p><p><a href="https://boletimsec.com.br/spyware-novispy-abusa-de-ferramentas-forenses-para-roubar-dados-sensiveis/">https://boletimsec.com.br/spyware-novispy-abusa-de-ferramentas-forenses-para-roubar-dados-sensiveis/</a></p><p><a href="https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/">https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/</a></p><p><a href="https://thehackernews.com/2024/12/novispy-spyware-installed-on.html">https://thehackernews.com/2024/12/novispy-spyware-installed-on.html</a></p><p><a href="https://www.business-humanrights.org/en/latest-news/cellebrite-products-allegedly-used-to-spy-on-asylum-seekers-in-morocco/">https://www.business-humanrights.org/en/latest-news/cellebrite-products-allegedly-used-to-spy-on-asylum-seekers-in-morocco/</a></p><p><a href="https://www.theguardian.com/world/2023/apr/06/labor-under-pressure-to-ban-use-of-israeli-spyware-in-investigations-of-alleged-welfare">https://www.theguardian.com/world/2023/apr/06/labor-under-pressure-to-ban-use-of-israeli-spyware-in-investigations-of-alleged-welfare</a></p><p><a href="https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/">https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/</a></p>]]></content:encoded></item><item><title><![CDATA[Cibersegurança: Como 'A Arte da Guerra' pode reescrever o cenário atual?]]></title><description><![CDATA[&#8220;A grande vit&#243;ria &#233; aquela que n&#227;o exige batalha&#8221; &#8211; Sun Tzu.]]></description><link>https://www.canalhacker.com.br/p/ciberseguranca-como-a-arte-da-guerra</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ciberseguranca-como-a-arte-da-guerra</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 11 Mar 2025 15:26:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gNFF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gNFF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gNFF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gNFF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg" width="1280" height="717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:717,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:126232,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gNFF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.linkedin.com/pulse/system-integration-alcuni-focus-riguardo-la-cyber-security-dhy8f/</figcaption></figure></div><p>&#8220;A grande vit&#243;ria &#233; aquela que n&#227;o exige batalha&#8221; &#8211; Sun Tzu.</p><p>Essas palavras milenares do antigo estrategista militar chin&#234;s Sun Tzu, a que o livro &#8216;A Arte da Guerra&#8217; lhe &#233; atribu&#237;do, s&#227;o muito importantes nos dias atuais, ainda mais quando trazemos para o cen&#225;rio da ciberseguran&#231;a.</p><p>Seguindo a id&#233;ia de Sun Tzu, a melhor defesa &#233; evitar um ataque. Tendo uma arquitetura e abordagem corretas, &#233; poss&#237;vel proteger seu ambiente contra essa corrida armamentista da ciberseguran&#231;a, para que, quando o invasor atacar, voc&#234; simplesmente n&#227;o esteja l&#225;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3zOr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3zOr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3zOr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1751369,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3zOr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.linkedin.com/pulse/how-can-writings-sun-tzu-applied-modern-security-role-christoph-puppe-kpf9e/</figcaption></figure></div><h4><strong>Pratique a preven&#231;&#227;o de ataques</strong></h4><p>Impedir ataques &#233; um dos tr&#234;s aspectos cr&#237;ticos da seguran&#231;a corporativa, junto com a preven&#231;&#227;o, que garante que as redes e sistemas sejam protegidos contra ataques, e a detec&#231;&#227;o, que identifica anomalias e fornece um meio para responder aos ataques.</p><p>A preven&#231;&#227;o que estamos falando &#233; frequentemente neglicenciada ou inclu&#237;da numa conversa mais generalista de zero-trust (confian&#231;a zero), mas abord&#225;-la no primeiro est&#225;gio do gerenciamento de risco traz imensos benef&#237;cios.</p><p>A melhor maneira de impedir um ataque &#233; garantir que ele nunca aconte&#231;a. Na &#233;poca de Sun Tzu, isso significava priorizar as informa&#231;&#245;es para obter vantagem tanto estrat&#233;gica quanto t&#225;tica. Na defesa cibern&#233;tica moderna, isso se traduz no aproveitamento de todo o poder dos dados, automa&#231;&#227;o e das pol&#237;ticas.</p><p>A maneira mais simples de evitar um ataque &#233; minimizar a superf&#237;cie de ataque. Para fazer isso, voc&#234; precisa:</p><ul><li><p><strong>Eliminar sua superf&#237;cie de ataque externa</strong> migrando para o acesso zero-trust fornecido pela nuvem com um modelo de acesso apenas de sa&#237;da;</p></li><li><p><strong>Reduzir a superf&#237;cie de ataque interna</strong> aproveitando a segmenta&#231;&#227;o de usu&#225;rio para um aplicativo de zero trust para os programas privados;</p></li><li><p><strong>Minimizar a superf&#237;cie de ataque de endpoint individual</strong> protegendo o tr&#225;fego de Internet do usu&#225;rio final;</p></li><li><p><strong>Reduzir a superf&#237;cie de ataque de dados</strong> com controles de SaaS (Software-as-a-Service ou Software como Servi&#231;o), como uma solu&#231;&#227;o de CASB (Cloud Access Security Broker), preven&#231;&#227;o de perda de dados (DLP), dentre outras solu&#231;&#245;es.</p></li></ul><p>A grande vantagem do zero-trust &#233; que cada dispositivo, aplicativo e usu&#225;rio &#233; distinto(a). Encontrar o caminho para um dispositivo n&#227;o permite que voc&#234; veja todo o ambiente, porque nada confia em nada. Se pudermos tornar essas superf&#237;cies de ataque furtivas individuais, poderemos aumentar ainda mais nosso jogo de seguran&#231;a.</p><h4><strong>Voc&#234; n&#227;o pode atacar o que n&#227;o pode ver</strong></h4><p>Os gateways de VPN tradicionais precisam que uma porta de entrada (um servi&#231;o que est&#225; esperando por conex&#245;es em determinada porta TCP) esteja aberta e que pode ser descoberta por qualquer pessoa na Internet. Conectar um endpoint a uma rede exp&#245;e toda ela (e os endpoints que se conectam a ela) a danos potenciais de ransomware ou de amea&#231;as internas.</p><p>A remo&#231;&#227;o desta porta de entrada elimina o ponto de apoio para o invasor e a conex&#227;o de usu&#225;rios aos sistemas protege a pr&#243;pria rede, bem como os dispositivos dos quais os usu&#225;rios est&#227;o se conectando. Uma solu&#231;&#227;o de &#8220;<strong><a href="https://hostry.com/blog/mighty-securing-your-server-with-port-knocking/?d=1">port-knocking</a></strong>&#8221; pode ser uma das alternativas.</p><p>O antigo m&#233;todo de prote&#231;&#227;o &#8220;<strong><a href="https://www.cloudflare.com/pt-br/learning/access-management/castle-and-moat-network-security/">castle-and-moat</a></strong>&#8221; n&#227;o &#233; mais um modelo de seguran&#231;a vi&#225;vel. Este modelo fala de paredes e barreiras, mas uma vez que algu&#233;m entrou, as pessoas n&#227;o tinham nenhum controle dentro do castelo. No modelo zero-trust, ningu&#233;m sabe onde est&#225; a sua infraestrutura, mesmo quando voc&#234; acompanha visitantes/funcion&#225;rios at&#233; a sua infra, eles apenas t&#234;m acesso &#224; partes da sua infraestrutura que voc&#234; mostrar. O restante da sua infraestrutura estar&#225; completamente oculta.</p><p>Do desenvolvimento &#224; avalia&#231;&#227;o de risco, reduzir a superf&#237;cie de ataque com modernas tecnologias ajudar&#225; a sua empresa a se proteger melhor e permitir&#225; que voc&#234; remova partes da sua infraestrutura desta corrida armamentista de ciberseguran&#231;a.</p><p>Como Sun Tzu tamb&#233;m disse: &#8220;<em>Vencer cem vit&#243;rias em cem batalhas n&#227;o &#233; o auge da habilidade. Vencer o inimigo sem lutar &#233; o auge da habilidade</em>&#8221;.</p><h4><strong>A ciberseguran&#231;a &#233; boa para os neg&#243;cios</strong></h4><p>A seguran&#231;a &#233; frequentemente ligada a coisas negativas, como viola&#231;&#245;es de dados, multas regulat&#243;rias e interrup&#231;&#227;o dos neg&#243;cios. No entanto, as vantagens raramente s&#227;o destacadas. Confira algumas:</p><ul><li><p><strong>Reter clientes mostra engajamento</strong>. Criar uma cultura que prioriza a seguran&#231;a e privacidade dos dados mostra um alto n&#237;vel de responsabilidade social corporativa. As empresas descuidadas com dados pessoais e que sofrem uma invas&#227;o geralmente est&#227;o sujeitas a rea&#231;&#245;es negativas por parte dos consumidores e parceiros de neg&#243;cios. Por outro lado, tomar a iniciativa de evitar ataques melhora a reputa&#231;&#227;o de uma empresa.</p></li><li><p><strong>A conformidade leva a oportunidades de neg&#243;cios</strong>. A maioria das empresas depende de uma rede de parceiros de neg&#243;cios. &#192; medida que as colabora&#231;&#245;es se estendem para a nuvem e redes h&#237;bridas, demonstrar conformidade com a seguran&#231;a torna-se um requisito para fazer neg&#243;cios. Com o crescente n&#250;mero de ataques, as empresas est&#227;o analisando com aten&#231;&#227;o as pr&#225;ticas de seguran&#231;a de potenciais parceiros como um pr&#233;-requisito para fazer neg&#243;cios.</p></li><li><p><strong>A inova&#231;&#227;o supera a inatividade</strong>. As empresas priorizam a inova&#231;&#227;o que impulsiona o crescimento. Pol&#237;ticas &#225;geis de ciberseguran&#231;a podem permitir que as empresas continuem seu trabalho sem interrup&#231;&#227;o, aumentando a receita e os lucros. No entanto, em um <strong><a href="https://web.archive.org/web/20221208002039/https://web.archive.org/web/20211206230145/https://www.newhorizons.com/Portals/278/Downloads/Cybersecurity-as-a-Growth-Advantage-Cisco.pdf">estudo conduzido pela Cisco</a></strong>, 71% dos executivos disseram que as preocupa&#231;&#245;es com a seguran&#231;a cibern&#233;tica impedem a inova&#231;&#227;o em suas empresas. Entre os entrevistados, 39% disseram ter interrompido as iniciativas de miss&#227;o cr&#237;tica devido a problemas de seguran&#231;a cibern&#233;tica. Essas respostas destacam como as vulnerabilidades de seguran&#231;a podem prejudicar a capacidade de uma organiza&#231;&#227;o de inovar.</p></li></ul><p>Com uma simples mudan&#231;a de perspectiva, os l&#237;deres de neg&#243;cios podem abordar a seguran&#231;a no sentido do que ela significa para as oportunidades de neg&#243;cios, permitindo assim uma discuss&#227;o com mais fundamento do que baseada no medo quando chega a hora de definir estrat&#233;gias de seguran&#231;a corporativa.</p><p><strong>Refer&#234;ncias:</strong></p><p><a href="https://www.darkreading.com/attacks-breaches/how-sun-tzu-s-wisdom-can-rewrite-the-rules-of-cybersecurity">https://www.darkreading.com/attacks-breaches/how-sun-tzu-s-wisdom-can-rewrite-the-rules-of-cybersecurity</a></p><p><a href="https://pt.wikipedia.org/wiki/A_Arte_da_Guerra">https://pt.wikipedia.org/wiki/A_Arte_da_Guerra</a></p>]]></content:encoded></item><item><title><![CDATA[GrassCall: Campanha tem como alvo candidatos a empregos para roubar credenciais de login]]></title><description><![CDATA[Cibercriminosos t&#234;m como alvo candidatos que est&#227;o &#224; procura de emprego para implantar malware, e assim, roubar credenciais de acesso das v&#237;timas.]]></description><link>https://www.canalhacker.com.br/p/grasscall-campanha-tem-como-alvo</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/grasscall-campanha-tem-como-alvo</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 05 Mar 2025 04:55:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lR7x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lR7x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lR7x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 424w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 848w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1272w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lR7x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532840,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/158375302?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lR7x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 424w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 848w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1272w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.bleepingcomputer.com/news/security/security-researchers-targeted-with-new-malware-via-job-offers-on-linkedin/</figcaption></figure></div><p>Chamada de <em>GrassCall</em>, uma campanha de ataque cibern&#233;tico recente, atrav&#233;s de entrevistas fake, tem como alvo pessoas que est&#227;o a procura de emprego nos setores de criptomoedas e Web3.</p><p>Atribu&#237;do ao grupo cibercriminoso russo &#8220;<em>Crazy Evil</em>&#8221;, a campanha utiliza an&#250;ncios de vagas fraudulentos em plataformas como <em>LinkedIn</em>, <em>WWellFound </em>e <em>CryptoJobsList </em>para atrair v&#237;timas para baixar software malicioso disfar&#231;ado de aplicativo de videoconfer&#234;ncia.</p><p>O malware foi criado para roubar informa&#231;&#245;es confidenciais, como credenciais de login, carteiras de criptomoeadas e cookies de autentica&#231;&#227;o de dispositivos Windows e macOS.</p><h4><strong>Como funciona o ataque?</strong></h4><p>Os fraudadores criam empresas falsas, como "ChainSeeker.io", contendo informa&#231;&#245;es completas com aquela apar&#234;ncia profissional e ainda perfis em redes sociais.</p><p>Eles anunciam oportunidades de empregos atraentes para cargos como &#8220;<em>Analista de Blockchain</em>&#8221; ou &#8220;<em>Gerente de M&#237;dia Socia</em>l&#8221;. Depois que a v&#237;tima se candidata, &#233; contactada por um falso Diretor de Marketing (CMO) via Telegram.</p><p>O CMO instrui a v&#237;tima para baixar um aplicativo chamado GrassCall de um site falso sob o pretexto de conduzir uma entrevista online.</p><p>Ap&#243;s a instala&#231;&#227;o, o GrassCall implanta um malware adaptado ao sistema operacional da v&#237;tima.</p><p>Para usu&#225;rios do Windows, ele instala <a href="https://seginfo.com.br/2023/12/22/o-que-e-infostealer-e-o-impacto-do-malware-nas-empresas/">infostealers</a>, como o <em>Rhadamanthys </em>ou Trojans de Acesso Remoto (RATs), enquanto que usu&#225;rios do macOS recebem o <em>AMOS Stealer</em>.</p><p>Estes <a href="https://pt.wikipedia.org/wiki/Carga_%C3%BAtil_(computa%C3%A7%C3%A3o)">payloads</a> extraem credenciais armazenadas, dados de carteira de criptomoedas e outras informa&#231;&#245;es de credenciais.</p><p>Os dados roubados geralmente s&#227;o enviados para canais do Telegram, onde s&#227;o monetizados.</p><h4><strong>Amea&#231;as e implica&#231;&#245;es em evolu&#231;&#227;o</strong></h4><p>Relat&#243;rios recentes indicam que o grupo Crazy Evil mudou para uma nova intera&#231;&#227;o desta campanha, agora chamada de <em>VibeCall</em>, que emprega t&#225;ticas semelhantes, mas com cepas de malware atualizadas.</p><p>O foco do grupo em usu&#225;rios de criptomoedas destaca a sofistica&#231;&#227;o crescente do crime cibern&#233;tico com motiva&#231;&#227;o financeira.</p><p>Centenas de pessoas foram v&#237;timas desta campanha, com muitos relatando perdas financeiras significativas ao terem suas carteiras de criptomoedas drenadas.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.canalhacker.com.br/subscribe?&amp;gift=true&quot;,&quot;text&quot;:&quot;Ofere&#231;a uma assinatura de presente&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.canalhacker.com.br/subscribe?&amp;gift=true"><span>Ofere&#231;a uma assinatura de presente</span></a></p><p>Especialistas em seguran&#231;a cibern&#233;tica enfatizam a import&#226;ncia do cuidado ao se candidatar a empregos em setores de alto risco.</p><p>Os usu&#225;rios s&#227;o aconselhados a:</p><ul><li><p>Evitar baixar aplicativos de fontes n&#227;o verificadas.</p></li><li><p>Verificar ofertas de emprego e detalhes da empresa antes de se candidatar</p></li><li><p>Usar ferramentas robustas de prote&#231;&#227;o de endpoint que podem detectar e bloquear infostealers</p></li></ul><p>&#192; medida que cibercriminosos continuam a explorar tecnologias e setores emergentes, as pessoas que est&#227;o &#224; procura de emprego devem permanecer cautelosas e adotar pr&#225;ticas fortes de seguran&#231;a cibern&#233;tica para proteger suas informa&#231;&#245;es pessoais e profissionais.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://gbhackers.com/grasscall-malware-targets-job-seekers/">https://gbhackers.com/grasscall-malware-targets-job-seekers/</a></p>]]></content:encoded></item><item><title><![CDATA[Google lança correção para vulnerabilidade de execução remota de comandos (RCE) no Android]]></title><description><![CDATA[Boletim de Seguran&#231;a do Android do m&#234;s de fevereiro aborda diversas atualiza&#231;&#245;es de seguran&#231;a, como as que corrigem vulnerabilidades de execu&#231;&#227;o remota de comandos e o escalonamento de privil&#233;gios.]]></description><link>https://www.canalhacker.com.br/p/google-lanca-correcao-para-vulnerabilidade</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/google-lanca-correcao-para-vulnerabilidade</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 04 Feb 2025 21:13:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9nWc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9nWc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9nWc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9nWc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:346182,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9nWc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.forbes.com/sites/daveywinder/2020/03/04/critical-android-security-risk-confirmed-millions-of-devices-can-be-rooted---update-now-if-you-can/</figcaption></figure></div><p>O Google publicou em 3 de fevereiro deste ano, o seu <strong><a href="https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br">Boletim de Seguran&#231;a do Android de fevereiro</a></strong>, que aborda um total de 47 vulnerabilidades que afetam dispositivos rodando o Android.</p><p>Uma das vulnerabilidades cr&#237;ticas afeta um driver chamado <strong><a href="https://en.wikipedia.org/wiki/USB_video_device_class">USB Video Class (UVC)</a></strong> do kernetl Linux e foi catalogada no <strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104</a></strong> com um risco de seguran&#231;a significativo. O UVC trata-se de um padr&#227;o que possibilita a transmiss&#227;o de v&#237;deo por meio da interface USB.</p><p>Esta vulnerabilidade permite que invasores <strong><a href="https://www.cloudflare.com/pt-br/learning/security/what-is-remote-code-execution/">executem c&#243;digo remoto (RCE)</a></strong>, podendo conseguir acesso n&#227;o autorizado de leitura/grava&#231;&#227;o no sistema afetado.</p><h4><strong>Vis&#227;o geral t&#233;cnica da vulnerabilidade</strong></h4><p>A vulnerabilidade em quest&#227;o ocorre pela an&#225;lise inadequada de quadros marcados como <code>UVC_VS_UNDEFINED</code> dentro da fun&#231;&#227;o <code>uvc_parse_format</code> do driver UVC. Isso pode levar a erros de c&#225;lculos dos tamanhos dos buffers, resultando em grava&#231;&#245;es de mem&#243;ria fora dos limites.</p><p>Invasores podem explorar essa falha inserindo dispositivos USB maliciosos ou manipulando fluxos de v&#237;deo, gerando estouros de buffer que substituem regi&#245;es subjacentes da mem&#243;ria. Com isso, podem realizar escaladas de privil&#233;gios locais sem que o sistema exija privil&#233;gios de execu&#231;&#227;o adicionais.</p><p>Mesmo que a vulnerabilidade n&#227;o possa ser explorada diretamente de forma remota, como mencionado, invasores podem tirar proveito falsificando dispositivos USB, o que torna a vulnerabilidade uma amea&#231;a consider&#225;vel &#224; integridade e estabilidade do sistema.</p><h4><strong>Vers&#245;es do Kernel Afetadas</strong></h4><p>A vulnerabilidade afeta todas as vers&#245;es do kernel do Linux, desde a 2.6.26 at&#233; as &#250;ltimas vers&#245;es corrigidas.</p><p>Para mitigar esse risco, os usu&#225;rios s&#227;o orientados a atualizar seus dispositivos para o n&#237;veis de patch com as datas 2025-02-01 ou 2025-02-05, que incluem corre&#231;&#245;es para essas e outras vulnerabilidades em v&#225;rios componentes do Android.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bRUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bRUo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 424w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 848w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1272w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bRUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png" width="883" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:430,&quot;width&quot;:883,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79350,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bRUo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 424w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 848w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1272w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Vers&#245;es corrigidas | Cr&#233;ditos da imagem: https://gbhackers.com/android-security-update-fixes-linux-kernel-rce-flaw/</figcaption></figure></div><p>Al&#233;m do CVE-2024-53104, o Google tamb&#233;m corrigiu uma vulnerabilidade (CVE-2025-0088) relacionada ao escalonamento de privil&#233;gios no n&#237;vel do kernel que afeta o <em>mremap</em> , uma fun&#231;&#227;o cr&#237;tica de gerenciamento de mem&#243;ria.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f4zc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f4zc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 424w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 848w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1272w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f4zc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png" width="757" height="198" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:198,&quot;width&quot;:757,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18538,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f4zc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 424w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 848w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1272w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Vulnerabilidades cr&#237;ticas que podem levar ao escalonamento de privil&#233;gios no Android | Cr&#233;ditos da imagem: https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br</figcaption></figure></div><p>Al&#233;m disso, outras vulnerabilidades de alta gravidade (CVE-2025-0091, CVE-2025-0095, CVE-2025-0096) que afetam o Android da vers&#227;o 12 a 15 tamb&#233;m podem permitir que invasores executem c&#243;digo arbitr&#225;rio com privil&#233;gios aumentados.</p><p>Em se tratando de algo cr&#237;tico (CVE-2024-53104) e o seu potencial de explora&#231;&#227;o, &#233; importante que os usu&#225;rios do Android instalem as atualiza&#231;&#245;es de seguran&#231;a mais recentes o quanto antes.</p><h4><strong>Como atualizar meu Android?</strong></h4><p>Para atualizar as atualiza&#231;&#245;es em seu dispositivo, siga as etapas seguintes (a descri&#231;&#227;o das op&#231;&#245;es e telas podem ser diferentes, dependendo da vers&#227;o utilizada do Android):</p><ul><li><p>Acessar <strong>Configura&#231;&#245;es</strong></p></li><li><p>Tocar na op&#231;&#227;o <strong>Atualiza&#231;&#227;o de Software</strong></p></li><li><p>Em seguida na op&#231;&#227;o <strong>Baixar e Instalar</strong></p></li></ul><p>O que achou do post? Fale nos coment&#225;rios!</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://gbhackers.com/android-security-update-fixes-linux-kernel-rce-flaw/">https://gbhackers.com/android-security-update-fixes-linux-kernel-rce-flaw/</a></p><p><a href="https://cyberinsider.com/google-fixes-zero-day-flaw-exploited-in-targeted-android-attacks/">https://cyberinsider.com/google-fixes-zero-day-flaw-exploited-in-targeted-android-attacks/</a></p><p><a href="https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br">https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br</a></p>]]></content:encoded></item><item><title><![CDATA[Vulnerabilidade na #DeepSeek expõe publicamente banco de dados #ClickHouse]]></title><description><![CDATA[Pesquisadores descobriram um banco de dados p&#250;blico da DeepSeek expondo informa&#231;&#245;es sens&#237;veis.]]></description><link>https://www.canalhacker.com.br/p/vulnerabilidade-na-deepseek-expoe</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/vulnerabilidade-na-deepseek-expoe</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 31 Jan 2025 19:42:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D-CH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D-CH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D-CH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D-CH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75142,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D-CH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.em.com.br/emfoco/2025/01/28/deepseek-a-startup-chinesa-que-desafia-as-big-techs-com-inovacao-e-eficiencia-imparaveis/</figcaption></figure></div><p>A empresa Wiz Research descobriu um banco de dados <strong><a href="https://clickhouse.com/">ClickHouse</a></strong> p&#250;blico pertencente &#224; DeepSeek, em que est&#227;o expostos hist&#243;ricos de bate-papo, secret keys e detalhes de backend. Ap&#243;s a divulga&#231;&#227;o (&#233;tica), a DeepSeek prontamente corrigiu o problema.</p><p><em>&#8220;Em minutos, encontramos um banco de dados ClickHouse acess&#237;vel publicamente vinculado ao DeepSeek, completamente aberto e n&#227;o autenticado, expondo dados sens&#237;veis. Ele estava hospedado em oauth2callback.deepseek.com:9000 e dev.deepseek.com:9000</em>&#8221;<em>, </em>diz o <strong><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">relat&#243;rio</a> </strong>publicado pela Wiz<em>.</em></p><p>&#8220;<em>Este banco de dados continha um volume significativo de hist&#243;rico de bate-papo, dados de backend e informa&#231;&#245;es confidenciais, incluindo informa&#231;&#245;es de log, APIs secrets e detalhes operacionais</em>&#8221;.</p><p>Os pesquisadores observaram que o vazamento poderia ter permitido que invasores assumissem o controle total do banco de dados e potencialmente aumentassem os privil&#233;gios dentro do ambiente da DeepSeek, sem qualquer autentica&#231;&#227;o.</p><p>Os especialistas usaram a interface HTTP do ClickHouse e acessaram a url <code>/play</code> para executar consultas SQL arbitr&#225;rias por meio do navegador.</p><p>Ao executar uma consulta <code>SHOW TABLES</code>, os pesquisadores obtiveram uma lista completa de conjuntos de dados, incluindo a tabela <code>log_stream</code> com mais de um milh&#227;o de entradas de log contendo dados altamente sens&#237;veis. A tabela inclu&#237;a as seguintes colunas:</p><ul><li><p><code>timestamp </code>&#8211; Registros de <strong>6 de janeiro de 2025</strong></p></li><li><p><code>span_name</code> &#8211; Refer&#234;ncias a v&#225;rios <strong>endpoints internos da API DeepSeek</strong></p></li><li><p><code>string.values</code> &#8203;&#8203;&#8211; <strong>Logs de texto simples</strong> , incluindo <strong>hist&#243;rico de bate-papo</strong> , <strong>chaves de API, detalhes de backend e metadados operacionais</strong></p></li><li><p><code>_service</code> &#8211; Indicando qual <strong>servi&#231;o DeepSeek</strong> gerou os logs</p></li><li><p><code>_source</code> &#8211; Expondo a <strong>origem das solicita&#231;&#245;es de log</strong> , contendo <strong>hist&#243;rico de bate-papo, chaves de API, estruturas de diret&#243;rio e logs de metadados do chatbot</strong></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8MKl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8MKl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 424w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 848w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1272w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8MKl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp" width="976" height="533" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0df3f02-0242-4502-94be-5da18ef83501_976x533.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:533,&quot;width&quot;:976,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52294,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8MKl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 424w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 848w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1272w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://securityaffairs.com/173666/data-breach/deepseek-db-exposed-highly-sensitive-information.html</figcaption></figure></div><p>Os pesquisadores explicaram que n&#227;o executaram consultas intrusivas al&#233;m da enumera&#231;&#227;o, para preservarem as pr&#225;ticas &#233;ticas de pesquisa.</p><p>&#8220;<em>Esse n&#237;vel de acesso representou um risco cr&#237;tico para a pr&#243;pria seguran&#231;a do DeepSeek e para seus usu&#225;rios finais. Um invasor poderia n&#227;o apenas recuperar logs sens&#237;veis e mensagens de bate-papo em texto puro, mas tamb&#233;m poderiam potencialmente exfiltrar senhas em texto puro e arquivos locais junto com informa&#231;&#245;es de propriedade diretamente do servidor por meio de consultas como: SELECT *FROM (&#8216;'filename&#8217;) dependendo da configura&#231;&#227;o do ClickHouse&#8221;, conclui o relat&#243;rio</em>&#8221;.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://securityaffairs.com/173666/data-breach/deepseek-db-exposed-highly-sensitive-information.html">https://securityaffairs.com/173666/data-breach/deepseek-db-exposed-highly-sensitive-information.html</a></p>]]></content:encoded></item><item><title><![CDATA[Pesquisadores alertam sobre "bypass" do NTLMv1 via política do AD]]></title><description><![CDATA[Pesquisadores descobrem falha de configura&#231;&#227;o em pol&#237;tica de grupo do AD feita para desabilitar o NTLMv1, que pode ser ignorada, permitindo que autentica&#231;&#245;es NTLMv1 persistam.]]></description><link>https://www.canalhacker.com.br/p/pesquisadores-alertam-sobre-bypass</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/pesquisadores-alertam-sobre-bypass</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 17 Jan 2025 17:27:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!x3So!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x3So!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x3So!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!x3So!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x3So!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:259525,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x3So!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!x3So!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.crowe.com/cybersecurity-watch/ntlm-relay-attacks</figcaption></figure></div><p></p><p>A empresa de ciberseguran&#231;a, Silverfort, descobriu uma configura&#231;&#227;o incorreta que pode &#8220;bypassar&#8221; uma determinada pol&#237;tica de grupo do Active Directory (AD) feita para desabilitar o NTLMv1, permitindo assim que autentica&#231;&#245;es por este protocolo inseguro continuem funcionando. </p><h4><strong>Qual &#233; o problema com o NTLMv1?</strong></h4><p>Ele &#233; um protocolo de autentica&#231;&#227;o desatualizado com vulnerabilidades de seguran&#231;a conhecidas, tornando-o um alvo principal para invasores. A vulnerabilidade, descoberta pelo pesquisador s&#234;nior de seguran&#231;a Dor Segal, alertou que mesmo que as empresas implementem a pol&#237;tica para desativar o NTLMv1 estar&#227;o expostas a autentica&#231;&#245;es por meio deste protocolo.</p><p>Certas configura&#231;&#245;es locais podem ignorar esta restri&#231;&#227;o feita na pol&#237;tica de grupo ao solicitar especificamente a autentica&#231;&#227;o NTLMv1. Invasores podem ent&#227;o explorar esta vulnerabilidade para interceptar o tr&#225;fego, quebrar credenciais de usu&#225;rios e obter acesso n&#227;o autorizado ao sistema. Al&#233;m disso, ao explorar as vulnerabilidades do protocolo em quest&#227;o, poder&#227;o se mover lateralmente ou aumentar seus privil&#233;gios, expondo as empresas a riscos significativos.</p><p>&#8220;<em>&#201; importante observar que clientes (</em>esta&#231;&#245;es de trabalho<em>) Windows com a configura&#231;&#227;o <strong>LMCompatibilityLevel 3</strong> e posterior ativada n&#227;o gerar&#227;o o tr&#225;fego NTLMv1 se solicitado. No entanto, clientes n&#227;o Windows n&#227;o s&#227;o protegidos. Se um sistema solicitar uma mensagem NTLMv1 de um cliente n&#227;o Windows, o Controlador de Dom&#237;nio poder&#225; aprovar a autentica&#231;&#227;o e gerar uma chave de sess&#227;o</em>&#8221;, <strong><a href="https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/">observaram os pesquisadores em um post</a></strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D7yK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D7yK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D7yK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg" width="1024" height="897" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:897,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67464,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D7yK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/ | Levantamento do uso da autentica&#231;&#227;o via NTLM no AD atualmente</figcaption></figure></div><p>Olhando na imagem acima, temos alguns pontos interessantes:</p><ul><li><p>Em ambientes que usam o AD, 64% das contas de usu&#225;rio regularmente se autenticam via NTLM</p></li><li><p>48% das contas se autenticam tanto em NTLM e Kerberos</p></li><li><p>36% das contas realizam mais de 80% de autentica&#231;&#227;o via Kerberos</p></li></ul><p>Mesmo com a Microsoft reconhecendo o problema e ter <strong><a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-1-%e2%80%93-disabling-ntlmv1/3934787">anunciado</a></strong> (em 2023&#8230;) planos para remover completamente o suporte ao NTLMv1 em vers&#245;es futuras do Windows, as empresas ainda precisam tomar medidas  proativas para mitigar o risco. Estas medidas incluem habilitar logs de auditoria para autentica&#231;&#227;o NTLM, identificar sistemas/aplicativos que utilizem o NTLMv1 e implementar m&#233;todos de autentica&#231;&#227;o modernos, via SSO ou Kerberos, a fim de substituir o NTLMv1.</p><p>N&#227;o &#233; de hoje que esta vers&#227;o do NTLM &#233; comentada no meio da seguran&#231;a da informa&#231;&#227;o. O <strong><a href="https://www.varonis.com/pt-br/blog/o-que-e-mimikatz-guia-completo">Mimikatz</a></strong> come solto!</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://hackread.com/researchers-ntlmv1-bypass-active-directory-policy/">https://hackread.com/researchers-ntlmv1-bypass-active-directory-policy/</a></p><p><a href="https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/">https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/</a></p>]]></content:encoded></item><item><title><![CDATA[Vulnerabilidade no OAuth do Google expõe milhões de domínios a explorações]]></title><description><![CDATA[Calma, n&#227;o s&#227;o todos os sites que utilizam o OAuth do Google que est&#227;o com vulnerabilidades, MAS sim os dom&#237;nios desativados, que porventura sejam comprados novamente.]]></description><link>https://www.canalhacker.com.br/p/vulnerabilidade-no-oauth-do-google</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/vulnerabilidade-no-oauth-do-google</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 14 Jan 2025 18:58:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!G_vZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G_vZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G_vZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18217,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G_vZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://rockcontent.com/br/blog/aplicativos-do-google/</figcaption></figure></div><p>Uma pesquisa recente revelou uma vulnerabilidade no fluxo da famosa autentica&#231;&#227;o &#8220;Fazer login o Google&#8221; do Google, que pode explorar uma peculiaridade na propriedade de um dom&#237;nio para assim se obter acesso a dados confidenciais.</p><p>O login OAuth do Google n&#227;o protege adequadamente para os casos em que algu&#233;m com m&#225; f&#233; compra um dom&#237;nio de uma startup que j&#225; &#8220;fechou as portas&#8221; e o utiliza para recriar contas de e-mail para ex-funcion&#225;rios&#8221;, disse o cofundador e CEO da Truflle Security, Dylan Ayrey, em um <strong><a href="https://trufflesecurity.com/blog/millions-at-risk-due-to-google-s-oauth-flaw">relat&#243;rio publicado na segunda-feira</a></strong> (13/01/25).</p><blockquote><p><em>Mesmo que voc&#234; n&#227;o possa acessar dados de e-mails antigos, poder&#225; utilizar essas contas para fazer login em v&#225;rios produtos SaaS que a organiza&#231;&#227;o usou.</em></p><p><em>Essas contas inclu&#237;am acessos sens&#237;veis em sistemas de RH que continham documentos fiscais, recibos de pagamento, informa&#231;&#245;es de seguro, n&#250;meros de previd&#234;ncia social e muito mais</em>, disse Ayrey.</p></blockquote><h4><strong>O que &#233; o OAuth?</strong></h4><p>OAuth, abrevia&#231;&#227;o para Open Authentication (Autentica&#231;&#227;o Aberta). refere-se a um padr&#227;o aberto para delega&#231;&#227;o de acesso, permitindo que usu&#225;rios concedam a sites ou aplicativos acessos &#224;s suas informa&#231;&#245;es em outros sites sem ter que fornecer suas senhas. Isso &#233; feito por meio de um token de acesso que verifica a identidade do usu&#225;rio e permite que o servi&#231;o acesse o recurso ao qual o token se destina.</p><p>Quando o recurso &#8220;<em>Fazer login com o Google</em>&#8221; &#233; usado para o login em um aplicativo como Slack, o Google envia ao servi&#231;o um conjunto de declara&#231;&#245;es sobre o usu&#225;rio, incluindo seu endere&#231;o de e-mail e o dom&#237;nio hospedado (o dom&#237;nio em que usu&#225;rio est&#225; realizando login pelo Google), que podem ser utilizadas (as declara&#231;&#245;es) para fazer login dos usu&#225;rios em suas contas.</p><h4><strong>O problema</strong></h4><p>Continuando, isso tamb&#233;m significa que, se um servi&#231;o depende exclusivamente dessas informa&#231;&#245;es para autenticar usu&#225;rios, tamb&#233;m acabar&#225; abrindo uma porta para um cen&#225;rio em que mudan&#231;as na propriedade de dom&#237;nios podem permitir que um invasor recupere o acesso a contas antigas de funcion&#225;rios.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lcyf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lcyf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 424w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 848w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1272w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png" width="674" height="369" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:369,&quot;width&quot;:674,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:207381,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lcyf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 424w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 848w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1272w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>O CEO da Truffle tamb&#233;m destacou que o token referente ao OAuth ID do Google inclui um identificador exclusivo de usu&#225;rio &#8211; a <strong><a href="https://developers.google.com/identity/openid-connect/openid-connect#obtainuserinfo">reivindica&#231;&#227;o sub</a></strong> &#8211; que na teoria poderia evitar o problema, mas que n&#227;o foi considerado confi&#225;vel. Vale comentar que o <strong><a href="https://www.microsoft.com/pt-br/security/business/identity-access/microsoft-entra-id">Entra ID da Microsoft</a></strong> inclui as <strong><a href="https://learn.microsoft.com/en-us/entra/identity-platform/id-token-claims-reference">reivindica&#231;&#245;es sub ou oid</a></strong> para armazenar um valor imut&#225;vel por usu&#225;rio.</p><p>Atualmente n&#227;o existem muitas medidas de prote&#231;&#227;o que os provedores de software podem tomar contra esta vulnerabilidade de implementa&#231;&#227;o do OAuth do Google.</p><blockquote><p><em>Como indiv&#237;duo, ap&#243;s voc&#234; ser desligado de uma empresa, acaba perdendo a capacidade de proteger seus dados nessas contas e ficar&#225; sujeito ao que ocorrer com o futuro desta empresa. Sem IDs imut&#225;veis, as altera&#231;&#245;es de propriedade de dom&#237;nios continuar&#227;o a comprometer as contas</em>, disse Ayrey.</p></blockquote><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html">https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html</a></p>]]></content:encoded></item><item><title><![CDATA[Hacker paranaense é indiciado nos EUA por extorsão de mais de 3 milhões de dólares em Bitcoin]]></title><description><![CDATA[Hacker de Curitiba foi indiciado nos EUA por tentativa de extors&#227;o de mais de 3 milh&#245;es de d&#243;lares em invas&#227;o envolvendo acesso indevido a dados de mais de 300 mil clientes da v&#237;tima.]]></description><link>https://www.canalhacker.com.br/p/hacker-paranaense-e-indiciado-nos</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/hacker-paranaense-e-indiciado-nos</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 27 Dec 2024 02:57:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QRNb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QRNb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QRNb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 424w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 848w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1272w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QRNb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png" width="728" height="380" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:380,&quot;width&quot;:728,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:240367,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QRNb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 424w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 848w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1272w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html</figcaption></figure></div><p>Parece que um hacker brasileiro foi indiciado nos EUA por ter supostamente amea&#231;ado divulgar dados roubados ap&#243;s uma invas&#227;o feita &#224; rede de uma empresa em mar&#231;o de 2020.</p><p>Junior Barros de Oliveira, de 29 anos, de Curitiba, foi indiciado em 4 acusa&#231;&#245;es de extors&#227;o envolvendo informa&#231;&#245;es obtidas de computadores protegidos e outras 4 por mensagens amea&#231;adoras, <strong><a href="https://www.justice.gov/usao-nj/pr/brazilian-man-charged-making-extortionate-threats-publicize-stolen-data-obtained">disse o Departamento de Justi&#231;a dos EUA (DoJ) em um indiciamento aberto no in&#237;cio desta semana</a></strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zd-j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zd-j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 424w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 848w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1272w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png" width="808" height="692" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:692,&quot;width&quot;:808,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:135600,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zd-j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 424w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 848w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1272w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://www.justice.gov/usao-nj/media/1382276/dl?inline</figcaption></figure></div><p>A v&#237;tima, uma subsidi&#225;ria brasileira sediada em Nova Jersey, teve seus computadores invadidos pelo r&#233;u, que ent&#227;o explorou o acesso obtido para possivelmente roubar informa&#231;&#245;es confidenciais de cerca de 300 mil clientes em pelo menos 3 ocasi&#245;es.</p><p>Junior Barros teria ent&#227;o posteriormente enviado ao CEO da empresa uma mensagem de e-mail  em setembro de 2020 utilizando um pseud&#244;nimo, onde teria exigido o pagamento de 300 bitcoins (cerca de 3,2 milh&#245;es de d&#243;lares na &#233;poca) em troca de n&#227;o vender os dados.</p><p>Um m&#234;s depois, o r&#233;u enviou a mensagem citada acima tanto para o CEO quanto para um executivo da subsidi&#225;ria brasileira.</p><p>Em uma das mensagens enviadas a um executivo da empresa, Junior Barros disse que <em>estava muito interessado em ajud&#225;-los a resolver esta falha de seguran&#231;a</em>, mas disse que isso custaria uma taxa de consultoria de cerca de 75 bitcoins (800 mil d&#243;lares na &#233;poca). O r&#233;u tamb&#233;m forneceu instru&#231;&#245;es sobre como a v&#237;tima poderia efetuar o pagamento para uma carteira de bitcoin.</p><p>Cada uma das 4 amea&#231;as de extors&#227;o acarreta uma pena m&#225;xima de 5 anos de pris&#227;o e uma multa de 250 mil d&#243;lares ou o dobro do valor de qualquer ganho ou perda, o que for maior.</p><p>Da mesma forma, cada uma das 4 acusa&#231;&#245;es por &#8220;apenas&#8221; enviar mensagens amea&#231;adoras, acarreta uma pena m&#225;xima de 2 anos de pris&#227;o e uma multa m&#225;xima de 250 mil d&#243;lares ou o dobro do valor de qualquer ganho ou perda, o que for maior.</p><p>Realmente o crime n&#227;o compensa. O ser humano &#233; falho. Deixa rastros. Mais cedo ou mais tarde ser&#225; pego. Ent&#227;o n&#227;o se anime em achar que &#233; legal invadir ou derrubar sistemas. Por mais que seus objetivos sejam &#8220;legais&#8221;, as empresas n&#227;o ver&#227;o isso com bons olhos.</p><p>Quer &#8220;invadir&#8221; o sistema de uma empresa dentro de um contexto autorizado e ainda ganhar por isso? Fa&#231;a parte de sistemas de Bug Bounty ofertado por v&#225;rias empresas. A Hacker One oferece uma <strong><a href="https://hackerone.com/bug-bounty-programs">lista bem completa</a></strong> destes programas. J&#225; no Brasil temos a Hackaflag e a Bug Hunt, empresas estas que possuem uma plataforma de Bug Bounty utilizada por diversos clientes. <strong><a href="https://anchisesbr.blogspot.com/2022/12/seguranca-programas-de-bug-bounty-nas.html">Veja este post</a></strong> do Anchises que mostra quais programas est&#227;o em curso nas empresas (post de 2022).</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html">https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html</a></p><p><a href="https://www.justice.gov/usao-nj/pr/brazilian-man-charged-making-extortionate-threats-publicize-stolen-data-obtained">https://www.justice.gov/usao-nj/pr/brazilian-man-charged-making-extortionate-threats-publicize-stolen-data-obtained</a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Adolescente é preso nos EUA por hackear empresas de telecom]]></title><description><![CDATA[Opera&#231;&#227;o do FBI prendeu membro do grupo de crimes cibern&#233;ticos Scattered Spider. O rapaz resolveu abrir o bico sobre como a coisa funciona.]]></description><link>https://www.canalhacker.com.br/p/adolescente-e-preso-nos-eua-por-hackear</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/adolescente-e-preso-nos-eua-por-hackear</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 20 Dec 2024 21:52:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NwXY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NwXY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NwXY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NwXY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NwXY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NwXY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NwXY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg" width="1456" height="1018" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1018,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:560533,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NwXY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NwXY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NwXY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NwXY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c99b1d3-fa4c-4997-bdda-2bbb298c84fd_1920x1343.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://blog.grancursosonline.com.br/palavra-de-quem-entende-o-uso-das-algemas-e-a-sumula-vinculante-no-11-do-stf/</figcaption></figure></div><p>Perseguir membros do Scattered Spider, o grupo de crimes cibern&#233;ticos conhecido por hackear grandes empresas utilizando t&#233;cnicas de engenharia social, tem sido o objetivo principal da pol&#237;cia americana nos &#250;ltimos meses. Recentemente O FBI efetuou uma nova pris&#227;o, neste caso, de um hacker de 19 anos que mora em Fort Worth, Texas.</p><p>Remington Goy Ogletree &#233; acusado por fazer parte de uma opera&#231;&#227;o de phishing que ocorreu de outubro de 2023 a maio do ano passado, quando, de acordo com a den&#250;ncia, conseguiu obter credenciais e acesso n&#227;o autorizado a duas empresas de telecomunica&#231;&#245;es e um banco nacional com sede nos EUA. Ele ent&#227;o roubou dados, incluindo chaves de API e criptomoedas, e vendeu acesso a outros agentes de amea&#231;as na Dark Web, de acordo com a acusa&#231;&#227;o.</p><p>Ele tamb&#233;m &#233; acusado de sequestrar uma das plataformas de telecomunica&#231;&#245;es para enviar cerca de 8,5 milh&#245;es de mensagens de phishing em uma tentativa de roubar criptomoedas. Ogletree tamb&#233;m supostamente usou uma rede de telecomunica&#231;&#245;es hackeada para enviar mensagens de phishing a funcion&#225;rios de uma institui&#231;&#227;o financeira n&#227;o identificada com a inten&#231;&#227;o de roubar suas credenciais. A den&#250;ncia do FBI acrescentou que Ogletree invadiu uma segunda organiza&#231;&#227;o de telecomunica&#231;&#245;es para enviar mais 140.000 mensagens de texto fraudulentas de phishing.</p><h4><strong>Suspeito revela detalhes sobre a rede de crimes cibern&#233;ticos do Scattered Spider</strong></h4><p>Depois de ser preso em fevereiro, Ogletree admitiu fazer parte do grupo de hackers Scattered Spider.</p><p>"<em>Conhe&#231;o os principais membros do Scattered Spider</em>", disse Ogletree aos policiais. "<em>Qualquer atividade envolvendo empresas infectadas por ransomware... que n&#227;o seja relacionada a criptomoedas, ser&#227;o eles</em>."</p><p>Ele continuou dizendo ao FBI que o Scattered Spider prefere mirar em empresas de terceiter como alvo organiza&#231;&#245;es de terceiriza&#231;&#227;o de processos de neg&#243;cios (BPO), "porque as empresas de terceiriza&#231;&#227;o t&#234;m menos seguran&#231;a." Ele tamb&#233;m disse &#224; pol&#237;cia que o Scattered Spider j&#225; comprometeu cinco das principais empresas de BPO, explicou a den&#250;ncia.</p><p>O grupo de amea&#231;as Scattered Spider &#233; bem conhecido por recrutar jovens falantes nativos de ingl&#234;s para ajudar a executar esquemas descarados de engenharia social para roubar credenciais de login de funcion&#225;rios. Algumas das viola&#231;&#245;es mais infames do grupo incluem os ataques de ransomware de cassino do ano passado no Caesars e no MGM Resorts.</p><h4>O FBI continua prendendo membros do Scattered Spider</h4><p>Esta pris&#227;o &#233; mais recente de uma s&#233;rie de opera&#231;&#245;es do Scattered Spider. H&#225; apenas alguns meses atr&#225;s, outros membros do Scattered Spider foram presos e acusados de v&#225;rios crimes cibern&#233;ticos; quatro deles s&#227;o americanos. </p><p>Em junho passado, um brit&#226;nico de 22 anos foi preso pela pol&#237;cia espanhola por sua conex&#227;o com o grupo de criminosos e foi encontrado com o controle de mais 27 milh&#245;es de d&#243;lares em Bitcoin. E em julho, um jovem de 17 anos foi preso no Reino Unido por sua rela&#231;&#227;o com o grupo.</p><p>As pris&#245;es s&#227;o boas not&#237;cias. No ano passado, a pol&#237;cia foi criticada por n&#227;o se esfor&#231;ar em impedir que o grupo Scattered Spider cometesse mais crimes cibern&#233;ticos.</p><p>O FBI conseguiu capturar Ogletree por meio de uma falsa opera&#231;&#227;o de lavagem de criptomoedas chamada "Cash Service". Quando ele se envolveu na opera&#231;&#227;o de fachada para converter criptomoedas roubadas em dinheiro, eles conseguiram localiz&#225;-lo e efetuar a pris&#227;o, de acordo com a den&#250;ncia.</p><p><em><strong>Cr&#233;ditos</strong>: <a href="https://www.darkreading.com/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks">https://www.darkreading.com/cyberattacks-data-breaches/texas-teen-arrested-scattered-spider-telecom-hacks</a></em></p>]]></content:encoded></item><item><title><![CDATA[Hackers chineses invadiram empresa dos EUA e mantiveram acesso por meses]]></title><description><![CDATA[Empresa americana com opera&#231;&#245;es na China foi hackeada no in&#237;cio do ano por um grupo APT chin&#234;s, que manteve acesso cont&#237;nuo durante meses aos sistemas comprometidos.]]></description><link>https://www.canalhacker.com.br/p/hackers-chineses-invadiram-dos-eua</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/hackers-chineses-invadiram-dos-eua</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 06 Dec 2024 16:41:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5UmT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5UmT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5UmT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 424w, https://substackcdn.com/image/fetch/$s_!5UmT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 848w, https://substackcdn.com/image/fetch/$s_!5UmT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 1272w, https://substackcdn.com/image/fetch/$s_!5UmT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5UmT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:875282,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5UmT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 424w, https://substackcdn.com/image/fetch/$s_!5UmT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 848w, https://substackcdn.com/image/fetch/$s_!5UmT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 1272w, https://substackcdn.com/image/fetch/$s_!5UmT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1cf4232-c741-4e09-a117-cc8cbf174dfb_1920x1080.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://circleid.com/posts/chinese-hackers-had-access-to-canadian-government-systems-for-years-report-reveals</figcaption></figure></div><p>Uma empresa dos EUA com opera&#231;&#245;es na China foi hackeada no in&#237;cio deste ano, como dito pela empresa de seguran&#231;a Symentec. Acredita-se que a empreitada foi cometida por hackers chineses, que mantiverem acesso &#224; rede da empresa por pelo menos 4 meses, possivelmente coletando informa&#231;&#245;es confidenciais.</p><p>As descobertas da Symantec indicam que os hackers mantiveram o acesso entre os dias 11 de abril de 2024 at&#233; agosto deste ano, embora o invas&#227;o inicial possa ter ocorrido antes. Durante esse tempo, os hackers se moveram lateralmente pela rede da empresa, tendo acesso &#224; v&#225;rios servidores, incluindo servidores <a href="https://learn.microsoft.com/pt-br/exchange/plan-and-deploy/deployment-ref/editions-and-versions?view=exchserver-2019">Exchange</a> (servi&#231;o de email da Microsoft).</p><p>Isso sugere que talvez o objetivo inicial seria o do roubar dados de e-mail para fins de coleta de informa&#231;&#245;es. De acordo com a <strong><a href="https://www.security.com/threat-intelligence/us-china-espionage">postagem do blog</a></strong> da Symantec, os hackers utilizaram um mix de softwares leg&#237;timos e ferramentas opensource para executar seus ataques.</p><p>Utilizaram uma t&#233;cnica chamada de DLL-sideloading, em que um c&#243;digo malicioso &#233; carregado com softwares leg&#237;timos, como a explora&#231;&#227;o de ferramentas do Google e da Apple para este fim.</p><p>Al&#233;m disso, utilizaram o <strong><a href="https://github.com/fortra/impacket">Impacket</a></strong>, um kit de ferramentas Python para manipula&#231;&#227;o de protocolo de rede e o FileZilla (cliente de FTP/SSH), dentre outras.</p><h4><strong>Liga&#231;&#227;o com grupos APT chineses</strong></h4><p>Mesmo que o grupo de hackers seja desconhecido, a Symantec acredita que os autores do ataque estejam intimamente ligados ao grupo <strong><a href="https://hackread.com/stormbamboo-apt-isps-malware-via-software-updates/">Daggerfly</a></strong> (Daggerfly (tamb&#233;m conhecido como BRONZE HIGHLAND, StormCloud e Evasive Panda) e ao Crimson Palace.</p><p>Essa alega&#231;&#227;o tem como base o uso repetido da t&#233;cnica DLL-sideloading em ataques passados. O Daggerfly &#233; bem conhecido por utilizar esta t&#233;cnica. Al&#233;m disso, um dos arquivos maliciosos encontrados em um sistema comprometido com o nome <code>textinputhost.dat</code>, tamb&#233;m foi associado a outro grupo chin&#234;s, o Crimson Palace. Esse grupo recentemente <strong><a href="https://hackread.com/crimson-palace-chinese-hackers-steal-military-secrets/">virou not&#237;cia</a></strong> por ter como alvo governos do sul da &#193;sia e de ter roubado segredos militares sens&#237;veis.</p><p><strong><a href="https://www.linkedin.com/in/jstephenkowski">Stephen Kowski</a></strong> , especialista em seguran&#231;a cibern&#233;tica da SlashNext, disse<em> ao site Hackread.com</em> que esse ataque &#233; parte de uma tend&#234;ncia preocupante. &#8220;Hackers est&#227;o usando m&#233;todos cada vez mais sofisticados para obter acesso de longo prazo &#224;s redes da empresa&#8221;, disse ele.</p><p>Ele enfatizou tamb&#233;m a necessidade de uma forte seguran&#231;a em sistemas de e-mails e o monitoramento cont&#237;nuo para detectar estes tipos de ataques.</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://hackread.com/chinese-hackers-breach-us-firm-network-for-months/">https://hackread.com/chinese-hackers-breach-us-firm-network-for-months/</a></p>]]></content:encoded></item><item><title><![CDATA[ICP-Brasil emitiu um certificado SSL em nome de google.com?]]></title><description><![CDATA[Em f&#243;runs de discuss&#227;o foi relatado que o ICP-Brasil teria emitido certificado em nome de google.com e que isso poderia ter quebrado algumas regras da emiss&#227;o de certificados. Veja no post!]]></description><link>https://www.canalhacker.com.br/p/icp-brasil-emitiu-um-certificado</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/icp-brasil-emitiu-um-certificado</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 03 Dec 2024 11:03:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!P9rM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P9rM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P9rM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!P9rM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!P9rM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!P9rM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P9rM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg" width="1024" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:215351,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!P9rM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!P9rM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!P9rM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!P9rM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10cda4ef-12f1-47e0-b7f5-9683c9f23cb8_1024x768.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://cryptoid.com.br/criptografia-identificacao-digital-id-biometria/o-que-e-icp-brasil-e-qual-sua-importancia-para-a-sociedade-brasileira/</figcaption></figure></div><p>Nos &#250;ltimos dias, mais precisamente no in&#237;cio do final de semana, l&#225; pelo dia 30 de Novembro de 2024, come&#231;ou a popular em alguns f&#243;runs de discuss&#227;o, algumas ocorr&#234;ncias envolvendo o ICP-Brasil, formalmente conhecido como Infraestrutura de Chaves P&#250;blicas Brasileira.</p><h4><strong>Emiss&#227;o incorreta de certificado SSL em nome do Google?</strong></h4><p>Andrew Ayer, propriet&#225;rio de um <a href="https://follow.agwa.name/">f&#243;rum de discuss&#227;o</a> que leva seu nome, <a href="https://follow.agwa.name/notice/AoZSMI38xcA3TrN1sm">comentou em uma postagem</a> que o ICP-Brasil haveria emitido incorretamente um certificado em nome do Google.</p><p>No site Bugzilla, conhecido reposit&#243;rio de bugs relacionado aos produtos da Mozilla, como o navegador Firefox, foi aberto um bug sob o n&#250;mero <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1934361">1934361</a> com o t&#237;tulo &#8220;<em>ICP-Brasil: Mis-issued certificate</em>&#8221;, pelo usu&#225;rio <a href="https://bugzilla.mozilla.org/user_profile?user_id=656199">Fabien Hochstrasser</a>.</p><p>O usu&#225;rio fala do site crt.sh onde voc&#234; pode consultar informa&#231;&#245;es do certificado emitido pelo ICP-Brasil, <a href="https://crt.sh/?sha256=421329f0dc2f683d6e96c1b5b310974d0997ad984ef69120f55372b4f48e1037">como podemos ver a seguir</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0393!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0393!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 424w, https://substackcdn.com/image/fetch/$s_!0393!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 848w, https://substackcdn.com/image/fetch/$s_!0393!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 1272w, https://substackcdn.com/image/fetch/$s_!0393!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0393!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png" width="1274" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1274,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:157189,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0393!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 424w, https://substackcdn.com/image/fetch/$s_!0393!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 848w, https://substackcdn.com/image/fetch/$s_!0393!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 1272w, https://substackcdn.com/image/fetch/$s_!0393!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F479f7ae5-2171-4949-b073-a6513941ad78_1274x814.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Voc&#234; pode baixar o referido certificado clicando no link <em>Certificate</em> (em destaque na imagem acima), abrir o arquivo em um editor de texto, copiar e colar o seu conte&#250;do no site <a href="https://www.sslshopper.com/certificate-decoder.html">https://www.sslshopper.com/certificate-decoder.html</a>, para ver o seguinte resultado:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FpU5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FpU5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 424w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 848w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1272w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FpU5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png" width="900" height="599" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:599,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:93904,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FpU5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 424w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 848w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1272w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>O usu&#225;rio tamb&#233;m relata que o dom&#237;nio google.com possui um <a href="https://docs.digicert.com/zf/certcentral/manage-certificates/dns-caa-resource-record-check.html">CAA RR</a> que permite apenas que pki.goog emita certificados para este dom&#237;nio (o usu&#225;rio possui d&#250;vidas se isto &#233; uma prova concreta, pois a regra pode ter mudado, mas acredita que n&#227;o mudou):</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yjhh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yjhh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 424w, https://substackcdn.com/image/fetch/$s_!Yjhh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 848w, https://substackcdn.com/image/fetch/$s_!Yjhh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 1272w, https://substackcdn.com/image/fetch/$s_!Yjhh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yjhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png" width="427" height="104" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:104,&quot;width&quot;:427,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8761,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yjhh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 424w, https://substackcdn.com/image/fetch/$s_!Yjhh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 848w, https://substackcdn.com/image/fetch/$s_!Yjhh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 1272w, https://substackcdn.com/image/fetch/$s_!Yjhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29312f59-89a0-4ecf-964e-49f3007065d1_427x104.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>No site <a href="https://docs.digicert.com/zf/certcentral/manage-certificates/dns-caa-resource-record-check.html">Digicert</a> vemos que &#233; poss&#237;vel que uma AC (autoridade certificadora) emita certificados em nome de um determinado dom&#237;nio, desde que os seguintes requisitos sejam atendidos:</p><ul><li><p>N&#227;o seja encontrado uma configura&#231;&#227;o de CAA RR para seu dom&#237;nio.</p></li><li><p>Caso encontre uma configura&#231;&#227;o de CAA RR para o dom&#237;nio, autorizando determinada AC a emitir esse certificado.</p></li><li><p>Caso encontrem configura&#231;&#245;es de CAA RR para o dom&#237;nio sem as tags de propriedade "issue" ou "issuewild".</p></li></ul><p>A configura&#231;&#227;o de CAA garante que apenas as CAs autorizadas possam emitir certificados em nome de determinado dom&#237;nio. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.canalhacker.com.br/subscribe?&quot;,&quot;text&quot;:&quot;Subscrever&quot;,&quot;language&quot;:&quot;pt&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Inscreva-se no Canal Hacker para receber conte&#250;do exclusivo no seu e-mail e fa&#231;a parte da comunidade de Seguran&#231;a da Informa&#231;&#227;o que mais cresce no Substack!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Digite o seu e-mail..." tabindex="-1"><input type="submit" class="button primary" value="Subscrever"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Quando n&#227;o existe nenhum registro CAA para determinado dom&#237;nio, <a href="https://www.cloudflare.com/pt-br/learning/dns/dns-records/">qualquer pessoa pode emitir um certificado para o dom&#237;nio</a>.</p><blockquote><h4><strong>O que &#233; um CAA?</strong></h4><p>Citamos algumas vezes o termo CAA, mas o que ele significa?</p><p>Criado pela Internet Engineering Task Force (IETF) e descrito em <strong><a href="https://tools.ietf.org/html/rfc6844">RFC 6844</a></strong>, O CAA permite que o propriet&#225;rio de um nome de dom&#237;nio autorize tarefas designadas e espec&#237;ficas <strong>Autoridades de certifica&#231;&#227;o</strong> (CAs) para emitir certificados SSL para seus nomes de dom&#237;nio. (Este trecho foi retirado da url <a href="https://www.ssl.com/pt/article/certification-authority-authorization-caa-2/">https://www.ssl.com/pt/article/certification-authority-authorization-caa-2/</a>)</p></blockquote><h4><strong>Domain Control Validation</strong></h4><p>Existe um processo chamado <em>Domain Control Validation</em> ou simplesmente DCV, em que consiste de m&#233;todos utilizados para provar que determinada CA tenha controle sobre determinado dom&#237;nio. Maiores informa&#231;&#245;es podem ser verificadas <a href="https://docs.digicert.com/pt/certcentral/manage-certificates/dv-certificate-enrollment/domain-control-validation--dcv--methods.html">neste link</a>.</p><p>No ticket da Bugzilla o usu&#225;rio <a href="https://bugzilla.mozilla.org/user_profile?user_id=764895">Micha&#322; Purzy&#324;ski</a> questiona se o ICP-Brasil ignora voluntariamente o CAA RR e se esta verifica&#231;&#227;o faz parte do processo padr&#227;o de inclus&#227;o de dom&#237;nios. Vimos que &#8220;teoricamente&#8221; faz parte.</p><p>Se o certificado em quest&#227;o foi emitido pela Certisign ICP Brasil, algo no processo formal de emiss&#227;o de certificados foi realmente ignorado?</p><h4><strong>Conclus&#227;o</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FpU5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FpU5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 424w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 848w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1272w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FpU5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png" width="900" height="599" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:599,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FpU5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 424w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 848w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1272w, https://substackcdn.com/image/fetch/$s_!FpU5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc147208-7ba1-4484-b293-4008c1f3cc6e_900x599.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Entendemos que o certificado em quest&#227;o pode ter sido emitido para uso restrito em determinados ambientes (como mostrado <a href="https://repositorio.iti.gov.br/resolucoes/Resolucao209_descontinuidade_SSL.htm">neste link</a>), mas situa&#231;&#245;es como as mostradas neste post normalmente n&#227;o podem passar em branco.</p><p>Creio que falta um pouco mais de clareza pelo ICP-Brasil ou Certisign sobre o processo da emiss&#227;o deste certificado.</p><p>Caso conhe&#231;a algu&#233;m que trabalhe em uma dessas empresas, o espa&#231;o aqui est&#225; aberto e teremos o enorme prazer em atualizar o post com a resposta.</p><p>Valeu!</p><h4></h4><p></p>]]></content:encoded></item><item><title><![CDATA[FBI alega que criptografia dificulta a extração de dados de celular]]></title><description><![CDATA[Parece que voltamos no tempo e voc&#234; vai entender.]]></description><link>https://www.canalhacker.com.br/p/fbi-alega-que-criptografia-dificulta-a-extracao-de-dados-de-celular</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/fbi-alega-que-criptografia-dificulta-a-extracao-de-dados-de-celular</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 02 Aug 2024 14:38:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i_Wk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i_Wk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 424w, https://substackcdn.com/image/fetch/$s_!i_Wk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 848w, https://substackcdn.com/image/fetch/$s_!i_Wk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 1272w, https://substackcdn.com/image/fetch/$s_!i_Wk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i_Wk!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp" width="1200" height="675.2941176470588" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:574,&quot;width&quot;:1020,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:43042,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i_Wk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 424w, https://substackcdn.com/image/fetch/$s_!i_Wk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 848w, https://substackcdn.com/image/fetch/$s_!i_Wk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 1272w, https://substackcdn.com/image/fetch/$s_!i_Wk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65a5baa9-05bd-4fd5-b0cd-5a05eef54573_1020x574.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://bgr.com/tech/iphone-encryption-hack-india/</figcaption></figure></div><p>Parece que voltamos no tempo e voc&#234; vai entender. Em 2015, terroristas mataram cerca de 14 pessoas (e feriram tantas outras) numa festa em San Bernardino, California. Ap&#243;s esse fato, o FBI iniciou uma investiga&#231;&#227;o intensa na vida dos terroristas, e nesse meio, os seus celulares. Mais precisamente, iPhones. No ano seguinte, em 2016, informaram que estavam com dificuldades para ter acesso aos dados contidos nos aparelhos (por conta da criptografia), com o DOJ (Departamento de Justi&#231;a dos EUA) chegando a &#8220;obrigar&#8221; a Apple a criar algum tipo de backdoor que permitisse o acesso. Como n&#227;o tiveram ajuda da Apple, uma &#8220;<em><a href="https://brasil.elpais.com/brasil/2016/03/29/internacional/1459204906_761502.html">&#8220;terceira pessoa&#8221; alheia ao conflito se ofereceu para ajudar os investigadores</a></em>&#8220;.</p><p>Dei essa introdu&#231;&#227;o toda, pois a hist&#243;ria est&#225; se repetindo. &#201; que o FBI est&#225; reclamando novamente sobre n&#227;o conseguir ter acesso a aparelhos de celular por conta da criptografia.</p><p>Embora o FBI tenha conseguido invadir o celular do atirador do com&#237;cio do Trump gra&#231;as a um software fornecido pela Cellebrite, o diretor do FBI, Chris Wray est&#225; dizendo ao Congresso Americano que simplesmente conseguir invadir um telefone j&#225; n&#227;o &#233; suficiente. Toda a criptografia deve acabar, n&#227;o apenas a prote&#231;&#227;o do dispositivo em si.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DZQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DZQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DZQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DZQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DZQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DZQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg" width="1000" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;FBI alega que criptografia dificulta a extra&#231;&#227;o de dados de celular&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="FBI alega que criptografia dificulta a extra&#231;&#227;o de dados de celular" title="FBI alega que criptografia dificulta a extra&#231;&#227;o de dados de celular" srcset="https://substackcdn.com/image/fetch/$s_!DZQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DZQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DZQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DZQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dafdc0a-bf80-432d-a91e-c37a5f9f3cd3_1000x500.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Chris Wray, diretor do FBI | Cr&#233;ditos: <a href="https://www.businessinsider.com/trump-called-fbi-director-chris-wray-the-worst-member-of-my-administration-book-2021-11">https://www.businessinsider.com/trump-called-fbi-director-chris-wray-the-worst-member-of-my-administration-book-2021-11</a></figcaption></figure></div><p>Wray disse que o FBI est&#225; enfrentando desafios para &#8220;entrar&#8221; em aplicativos de mensagens criprografadas usados por Thomas Matthew Crooks, que foi morto por uma equipe de contra-atiradores do servi&#231;o secreto ap&#243;s disparar pelo menos oito tiros em dire&#231;&#227;o ao palco em que Trump estava, no dia 13 de julho, em Butler, Pensilv&#226;nia. Relat&#243;rios informaram que as autoridades identificaram pelo menos tr&#234;s dessas contas de aplicativos de mensagens.</p><p>Wray est&#225; falando sobre o que ocorre nas investiga&#231;&#245;es como se isso fosse uma evid&#234;ncia de que os criminosos est&#227;o sempre um passo &#224; frente dos federais, mesmo quando o criminoso esteja morto e n&#227;o esteja enfrentando processos e nem seja mais capaz de cometer esses crimes.</p><p>&#8220;&#201; um verdadeiro desafio n&#227;o apenas para o FBI, mas para as autoridades estaduais e locais em todo o pa&#237;s&#8221;. Mesmo com acesso ao telefone de um usu&#225;rio, a criptografia de ponta a ponta usada em muitos aplicativos de tornaria mensagens e outros dados inacess&#237;veis at&#233; mesmo para o desenvolvedor do aplicativo.</p><p>No Brasil quando o governo n&#227;o consegue acessar os dados de pessoas suspeitas, amea&#231;a bloquear o aplicativo no pa&#237;s. Muito &#8220;inteligente&#8221; isso rsrs.</p><p>Podemos dizer que seja comum atualmente que mais servi&#231;os estejam oferecendo criptografia ponta a pontas, e que isso, possa ser uma &#8220;amea&#231;a&#8221; persistente &#224; investiga&#231;&#245;es criminais. Se realmente fosse, era de se esperar ouvir isso das autoridades. Em vez disso, a maior parte do que ouvimos de fato sobre o suposto mal da criptografia tenha vindo de diretores que j&#225; passaram e est&#227;o no FBI.</p><p>At&#233; que o FBI seja honesto sobre o fato de seus diretores acharem que s&#227;o onipresentes, n&#227;o d&#234; bola para essa agita&#231;&#227;o anticriptografia. Certamente deve ser ignorada quando o FBI n&#227;o esteja fazendo nada mais do que reclamar sobre a falta de acesso ao conte&#250;do e &#224;s comunica&#231;&#245;es do telefone de uma pessoa morta.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.techdirt.com/2024/07/31/fbi-back-to-complaining-about-encryption-making-it-difficult-to-scrape-all-data-from-a-dead-persons-phone/">https://www.techdirt.com/2024/07/31/fbi-back-to-complaining-about-encryption-making-it-difficult-to-scrape-all-data-from-a-dead-persons-phone/</a></p><p><strong>Cr&#233;ditos da imagem usada na capa do post:</strong></p><p><a href="https://bgr.com/tech/iphone-encryption-hack-india/">https://bgr.com/tech/iphone-encryption-hack-india/</a></p><p><strong>Not&#237;cia interessante sobre criptografia</strong></p><p><a href="https://www.canalhacker.com.br/2023/01/11/a-criptografia-rsa-de-2-048-bits-realmente-foi-quebrada/">https://www.canalhacker.com.br/2023/01/11/a-criptografia-rsa-de-2-048-bits-realmente-foi-quebrada/</a></p><p>O post <a href="https://www.canalhacker.com.br/2024/08/02/fbi-alega-que-criptografia-dificulta-a-extracao-de-dados-de-celular/">FBI alega que criptografia dificulta a extra&#231;&#227;o de dados de celular</a> apareceu primeiro em <a href="https://www.canalhacker.com.br">Canal Hacker</a>.</p>]]></content:encoded></item><item><title><![CDATA[SS7: Redes de telefonia móvel estão vulneráveis?]]></title><description><![CDATA[(SS7) Um dos assuntos que sempre gostei, desde quando comecei a me interessar por tecnologia, foi a telefonia.]]></description><link>https://www.canalhacker.com.br/p/ss7-redes-de-telefonia-movel-estao-vulneraveis</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ss7-redes-de-telefonia-movel-estao-vulneraveis</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Mon, 15 Jul 2024 05:15:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/07701051-0f2f-459d-bb23-18149c9e2689_1024x697.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>(SS7) Um dos assuntos que sempre gostei, desde quando comecei a me interessar por tecnologia, foi a telefonia. Junte isso com o tema hacking e voc&#234; ter&#225; um terreno f&#233;rtil para o aprendizado e das possibilidades (se &#233; que me entendem). Com o SS7 n&#227;o &#233; diferente.</p><p>Postei h&#225; um tempo quando este site que voc&#234; est&#225; acessando tinha o nome de &#8220;O Analista (oanalista.com.br)&#8221; uma mat&#233;ria sobre o <em><a href="https://www.canalhacker.com.br/2017/05/04/hackers-exploram-falhas-no-ss7-para-sequestrar-contas-bancarias/">SS7</a></em>. Era um conte&#250;do mais introdut&#243;rio que tamb&#233;m falava sobre ataques sendo realizados contra a infraestrutura do SS7 para se obter acesso a contas banc&#225;rias de v&#237;timas.</p><p>O post pode parecer um pouco longo, mas tenha certeza de que ele vai enriquecer o seu conhecimento sobre o tema.</p><h4><strong>Mas qual &#233; a desse protocolo?</strong></h4><p>O Signaling System 7 (SS7) ou Sistema de Sinaliza&#231;&#227;o 7 (bem como o Diameter) &#233; uma fam&#237;lia de protocolos utilizada nas telecomunica&#231;&#245;es do mundo todo. Ele foi criado em 1975 (e &#233; usado at&#233; hoje) e n&#227;o se limita apenas a chamadas telef&#244;nicas, mas pe&#231;a importante nas conex&#245;es relacionadas ao roaming nacional e internacional, onde um aparelho celular possa facilmente passar da rede de uma empresa para outra.</p><p>Os protocolos de sinaliza&#231;&#227;o utilizados para este fim tamb&#233;m permitem que as redes recuperem informa&#231;&#245;es sobre o usu&#225;rio, tais como se um numero est&#225; ativo, quais servi&#231;os est&#227;o dispon&#237;veis para ele, em que rede do pa&#237;s est&#225; registrado e a sua localiza&#231;&#227;o.</p><p>Essa infraestrutura de conex&#245;es e protocolo de sinaliza&#231;&#227;o s&#227;o alvos constantes de explora&#231;&#245;es/ataques por pessoas/empresas/pa&#237;ses com o objetivo de expor informa&#231;&#245;es de aparelhos celulares, bem como a geolocaliza&#231;&#227;o deles. <a href="https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure">Veja maiores informa&#231;&#245;es neste report</a>, de autoria de Gary Muller e Christopher Parsons. Detalharemos mais &#224; frente este ataque de geolocaliza&#231;&#227;o.</p><h4><strong>Scanner SS7</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.made-in-china.com/showroom/bwdanae/product-detailGbfmTvcCqrpz/China-Ss7-Probe.html" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_F1C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_F1C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_F1C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_F1C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_F1C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg" width="657" height="176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:176,&quot;width&quot;:657,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.made-in-china.com/showroom/bwdanae/product-detailGbfmTvcCqrpz/China-Ss7-Probe.html&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?" title="SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?" srcset="https://substackcdn.com/image/fetch/$s_!_F1C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_F1C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_F1C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_F1C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ace28d6-e52f-49d4-b029-7a575b7f0998_657x176.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Dispositivo SS7 Probe | Cr&#233;ditos: https://www.made-in-china.com/showroom/bwdanae/product-detailGbfmTvcCqrpz/China-Ss7-Probe.html</figcaption></figure></div><p>Este scanner &#233; um dispositivo f&#237;sico que permite registrar ou obter informa&#231;&#245;es de uma rede de telecomunica&#231;&#245;es. &#201; capaz de extrair informa&#231;&#245;es ao monitorar um canal portador E1/T1 ou<a href="https://www.capterra.com.br/glossary/1369/sdhsonet"> SDH/SONET</a>. &#201; uma atividade feita de modo totalmente legal. Intercepta&#231;&#227;o legal aqui significa a entrega de chamadas e dados para centros de recepta&#231;&#227;o autorizados pelo governo antes de serem conclu&#237;dos (as chamadas por exemplo). Mas &#233; aquele neg&#243;cio, quem tem a tecnologia na m&#227;o, acesso aos sistemas, poder&#225; realizar algum tipo de ataque ao sistema.</p><h4><strong>Seguran&#231;a do SS7 em xeque</strong></h4><p>No dias atuais, o SS7 n&#227;o &#233; usado em larga escala, devido as tecnologias 4G e 5G terem adotado o protocolo <a href="https://www.f5.com/pt_br/glossary/diameter-protocol">Diameter</a>. MAS caro(a) amigo e amiga, como falei, o SS7 n&#227;o &#233; largamente usado, mas ainda &#233; usado.</p><p>O <em><a href="https://www.fcc.gov/about/overview">FCC</a></em>, &#243;rg&#227;o americano que regula as comunica&#231;&#245;es interestaduais e internacionais por r&#225;dio, televis&#227;o, fio, sat&#233;lite e cabo em todos os seus 50 estados, reconhece que as redes telef&#244;nicas americanas s&#227;o utilizadas por governos estrangeiros e equipamentos de vigil&#226;ncia para espionar e monitorar remotamente dispositivos sem fios.</p><p>Neste ponto est&#227;o os protocolos SS7 e o Diameter, que s&#227;o utilizados por operadoras de redes fixas e m&#243;veis para permitir a interliga&#231;&#227;o entre redes. Estes protocolos fazem parte da infraestrutura que mant&#233;m conectadas as redes de telecomunica&#231;&#245;es atualmente no mundo.</p><p>Os problemas do SS7 s&#227;o conhecidos h&#225; muitos anos, pelo menos desde 2008. J&#225; falamos sobre este procotolo em <a href="https://www.canalhacker.com.br/2017/05/04/hackers-exploram-falhas-no-ss7-para-sequestrar-contas-bancarias/">2017</a>. J&#225; o site <em>The Register</em> noticiou bem antes, em <a href="https://www.theregister.com/2010/04/22/gsm_info_disclosure_hack/">2010 </a>e <a href="https://www.theregister.com/2014/12/26/ss7_attacks/">2014</a>.</p><p>Pouco foi feito para resolver estas falhas de seguran&#231;a.</p><p>O SS7 foi criado em meados da d&#233;cada de 70, onde o foco realmente n&#227;o era seguran&#231;a. Com isso, permitiu que <a href="https://www.osul.com.br/o-protocolo-para-comunicacao-entre-operadoras-pode-ser-usado-por-hackers-e-criminosos-para-roubar-informacoes-interceptar-chamadas-e-mensagens-e-ate-cometer-fraudes-bancarias/#:~:text=Em%201975%2C%20o%20protocolo%20SS">hoje em dia, qualquer pessoa que tenha acesso &#224; rede p&#250;blica de telefonia possa bisbilhotar conversas, monitorar n&#250;meros espec&#237;ficos e roubar informa&#231;&#245;es</a>.</p><h5>O protocolo Diameter</h5><p>O protocolo Diameter foi desenvolvido no final da d&#233;cadas de 90 e inclui suporte para acesso &#224; rede e mobilidade IP em chamadas e mensagens locais e em roaming. No entanto, ele n&#227;o criptografa endere&#231;os IP de origem durante o transporte, o que torna mais f&#225;cil para pessoas mal-intencionadas realizarem ataques de IP Spoofing nas redes.</p><p>&#8220;<em>&#192; medida que a cobertura de servi&#231;os oferecidos aos usu&#225;rios se expande, mais e mais redes s&#227;o introduzidas, criando assim oportunidades para atacantes explorarem as falhas do SS7 e do Diameter</em>&#8220;, <a href="https://s3.documentcloud.org/documents/24527269/da-24-308a1.pdf">cita o FCC em um paper</a> (PDF).</p><h4>Ataques de descoberta de localiza&#231;&#227;o</h4><p>Em um <a href="https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/">report </a>lan&#231;ado em outubro de 2023, de autoria de Gary Muller e Christopher Parsons, &#233; detalhado como ataques envolvendo a geolocaliza&#231;&#227;o de usu&#225;rios normalmente s&#227;o realizados.</p><p>A maior parte deles ocorrem devido a forma como as redes de telecomunica&#231;&#245;es m&#243;veis se interconectam. Servi&#231;os estrangeiros de intelig&#234;ncia e seguran&#231;a, bem como empresas privadas, tentam frequentemente obter informa&#231;&#245;es de geolocaliza&#231;&#227;o, bem como tamb&#233;m as autoridades na aplica&#231;&#227;o da lei.</p><p>Os m&#233;todos dispon&#237;veis para servi&#231;os de interlig&#234;ncias e autoridades s&#227;o semelhantes para grupos ilegais que tamb&#233;m conseguem obter informa&#231;&#245;es de geolocaliza&#231;&#227;o de usu&#225;rios</p><p>Apesar das redes 4G estarem presentes em praticamente quase no mundo todo e o r&#225;pido crescimento das redes 5G, ainda existem dispositivos m&#243;veis e seus propriet&#225;rios que dependem de redes 3G mais antigas. Pra voc&#234; ter uma ideia, apenas um quarto das operadoras de redes m&#243;veis em todo o mundo implementou algum firewall de sinaliza&#231;&#227;o para proteger contra estes ataques de geolocaliza&#231;&#227;o, <a href="https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/">conforme consta neste report</a>.</p><p>&#201; praticamente um ataque 'As A Service'</p><p>Especialistas em telecomunica&#231;&#245;es entendem que as vulnerabilidades no protocolo SS7 usado no roaming 3G, por exemplo, permitiram o desenvolvimento de produtos comerciais de vigil&#226;ncia que fornecem aos seus operadores o anonimato, m&#250;ltiplos pontos de acesso e vetores de ataque, al&#233;m de uma rede onipresente e acess&#237;vel globalmente com uma lista ilimitada de ativos, e &#8220;melhor&#8221; ainda, com praticamente nenhum risco financeiro ou jur&#237;dico.</p><h5>Como atacantes acessam as redes para executar ataques de rastreamento de geolocaliza&#231;&#227;o?</h5><p>O rastreamento da geolocaliza&#231;&#227;o envolve normalmente tr&#234;s elementos interconectados:</p><ul><li><p>Software de vigil&#226;ncia especializado</p></li><li><p>Um endere&#231;o de sinaliza&#231;&#227;o que &#233; usado para encaminhar mensagens maliciosas para a(s) rede(s) alvo, com o objetivo de extrair dados de geolocaliza&#231;&#227;o do usu&#225;rio, e</p></li><li><p>Conectividade de rede com a rede global 3G SS7 e com o 4G Diameter</p></li></ul><p><strong>Backbone global do SS7/Diameter &#8211; IPX</strong></p><p>O backbone de rede global do SS7 ou do Diameter &#233; conhecido como IP Exchange (IPX). O objetivo do IPX (n&#227;o confundir com o protocolo antigo IPX usado em redes locais) &#233; facilitar a interconex&#227;o entre redes de operadoras m&#243;veis para o transporte de mensagens de sinaliza&#231;&#227;o (as operadoras possuem um acordo m&#250;tuo com defini&#231;&#245;es de servi&#231;os interoper&#225;veis e acordos comerciais). Al&#233;m disso, a arquitetura do IPX possui uma regra de que apenas provedores de servi&#231;os que sejam operadoras de redes m&#243;veis podem se conectar &#224; rede.</p><p>Portanto, terceiros que n&#227;o fa&#231;am parte da comunidade de operadoras de redes m&#243;veis n&#227;o deveriam ser autorizados a se conectarem e a enviarem mensagem de sinaliza&#231;&#227;o m&#243;vel, onde podem explorar vulnerabilidades que exp&#245;em os usu&#225;rios ao rastreamento n&#227;o autorizado de sua geolocaliza&#231;&#227;o.</p><p>A conex&#227;o dos atores de vigil&#226;ncia (os interessados em vigiar os usu&#225;rios) &#224; rede IPX ocorre normalmente por meio de acordos comerciais secretos com uma operadora m&#243;vel, com um intermedi&#225;rio que forne&#231;a acesso &#224; rede IPX, ou outros provedores de servi&#231;os terceirizados, como provedores de mensagens SMS, operadoras de redes m&#243;veis privadas ou provedores de servi&#231;os da Internet das Coisas (IoT) que possuam conex&#245;es com o IPX.</p><p>Embora o IPX tenha sido constru&#237;do para permitir o roaming de rede entre redes de diferentes operadoras, tamb&#233;m pode ser usado de forma abusiva para executar vigil&#226;ncia dos usu&#225;rios.</p><p>Com o IPX sendo usado por mais de 750 redes m&#243;veis em 195 pa&#237;ses ao redor do mundo, existe uma variedade de empresas com conex&#245;es ao IPX que podem estar dispostas a serem explicitamente c&#250;mplices, ou fazerem vista grossa para os interessados em monitorar os usu&#225;rios, que tiram proveito das vulnerabilidades da rede e dos pontos de interconex&#227;o um-para-muitos (one-to-many) que facilitam o rastreamento da geolocaliza&#231;&#227;o.</p><p><a href="https://www.gsma.com/latinamerica/pt-br/roaming-atraves-redes-lte/">Veja esse post interessante publicado em 20 de maio de 2013, quando as operadoras estavam na fase de migra&#231;&#227;o para as redes 4G.</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lARQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lARQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 424w, https://substackcdn.com/image/fetch/$s_!lARQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 848w, https://substackcdn.com/image/fetch/$s_!lARQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 1272w, https://substackcdn.com/image/fetch/$s_!lARQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lARQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png" width="1024" height="697" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:697,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?" title="SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?" srcset="https://substackcdn.com/image/fetch/$s_!lARQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 424w, https://substackcdn.com/image/fetch/$s_!lARQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 848w, https://substackcdn.com/image/fetch/$s_!lARQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 1272w, https://substackcdn.com/image/fetch/$s_!lARQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e63b1da-fc45-4557-8410-c9fef7f94958_1024x697.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cen&#225;rio de amea&#231;as para rastreamento de geolocaliza&#231;&#227;o baseado em rede externa. | Cr&#233;ditos da imagem: <a href="https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/">https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/</a></figcaption></figure></div><p>Para uma an&#225;lise realmente completa sobre o rastreamento da geolocaliza&#231;&#227;o, <a href="https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/">leia este report</a>.</p><h4><strong>O FCC resolve se preocupar com a seguran&#231;a das redes SS7 e Diameter</strong></h4><p>Eis que a s&#233;tima cavalaria, o FCC, em 27 de mar&#231;o de 2024, acabou solicitando &#224; operadoras de telecomunica&#231;&#245;es que avaliassem e detalhassem o que est&#227;o fazendo para evitar que as vulnerabilidades nos dois protocolos sejam utilizadas indevidamente para rastrear a localiza&#231;&#227;o dos consumidores, por exemplo.</p><p>O FCC tamb&#233;m solicitou que as empresas detalhassem quaisquer explora&#231;&#245;es dos protocolos desde 2018. O &#243;rg&#227;o queria saber a(s) data(s) do(s) incidente(s), o que aconteceu, quais vulnerabilidades foram exploradas e com quais t&#233;cnicas, a origem e, se conhecida, a identidade do invasor.</p><p>Este pedido do FCC vem em resposta a um a pedido do senador dos EUA, Ron Wyden, que em fevereiro de 2024 pediu que a Casa Branca &#8220;abordasse as graves amea&#231;as representadas pelas pr&#225;ticas negligentes de seguran&#231;a das operadoras de telefonia m&#243;vel [<a href="https://s3.documentcloud.org/documents/24527132/wyden-phone-hacking-letter-to-president-biden.pdf">PDF</a>]&#8221;.</p><h4><strong>Conclus&#227;o</strong></h4><p>Aqui no site j&#225; falamos sobre o<a href="https://www.canalhacker.com.br/2017/05/04/hackers-exploram-falhas-no-ss7-para-sequestrar-contas-bancarias/"> protocolo SS7</a> e sobre a <a href="https://www.canalhacker.com.br/2021/05/12/redes-5g-sao-vulneraveis-entenda-as-falhas-descobertas/">vulnerabilidade das redes 5G</a>. Este post n&#227;o teve a inten&#231;&#227;o de explorar &#224; fundo as possibilidades de ataques &#224; infraestrutura das redes de telefonia m&#243;vel, mas de mostrar que ela (a infraestrutura) est&#225; vulner&#225;vel &#224; ataques.</p><p>&#201; necess&#225;rio que as operadoras de telefonia m&#243;vel e fixa deixem claro o que est&#227;o realmente fazendo para evitar os ataques, pois isso nos afeta diretamente.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.geeksforgeeks.org/what-is-signaling-system-7">https://www.geeksforgeeks.org/what-is-signaling-system-7</a></p><p><a href="https://therecord.media/fcc-ss7-diameter-protocols-investigation">https://therecord.media/fcc-ss7-diameter-protocols-investigation</a></p><p><a href="https://www.thebureauinvestigates.com/stories/2021-12-06/swiss-tech-company-boss-accused-of-selling-mobile-network-access-for-spying">https://www.thebureauinvestigates.com/stories/2021-12-06/swiss-tech-company-boss-accused-of-selling-mobile-network-access-for-spying</a></p><p><a href="https://www.osul.com.br/o-protocolo-para-comunicacao-entre-operadoras-pode-ser-usado-por-hackers-e-criminosos-para-roubar-informacoes-interceptar-chamadas-e-mensagens-e-ate-cometer-fraudes-bancarias/#:~:text=Em%201975%2C%20o%20protocolo%20SS7,um%20novo%20protocolo%2C%20o%20Diameter.">https://www.osul.com.br/o-protocolo-para-comunicacao-entre-operadoras-pode-ser-usado-por-hackers-e-criminosos-para-roubar-informacoes-interceptar-chamadas-e-mensagens-e-ate-cometer-fraudes-bancarias/#:~:text=Em%201975%2C%20o%20protocolo%20SS7,um%20novo%20protocolo%2C%20o%20Diameter.</a></p><p><a href="https://www.theregister.com/2024/04/02/fcc_ss7_security/">FCC finally set to do something about SS7 vulnerabilities &#8226; The Register</a></p><p><a href="https://www.infosecinstitute.com/resources/general-security/ss7-protocol-how-hackers-might-find-you/">SS7 protocol: How hackers might find you | Infosec (infosecinstitute.com)</a></p><p><strong>Cr&#233;dito da imagem usada na capa do post</strong></p><p><a href="https://threatpost.com/phone-hack-could-block-messages-calls-on-some-mobile-networks/102090">https://threatpost.com/phone-hack-could-block-messages-calls-on-some-mobile-networks/102090</a></p><p>O post <a href="https://www.canalhacker.com.br/2024/07/15/ss7-redes-de-telefonia-movel-estao-vulneraveis/">SS7: Redes de telefonia m&#243;vel est&#227;o vulner&#225;veis?</a> apareceu primeiro em <a href="https://www.canalhacker.com.br">Canal Hacker</a>.</p>]]></content:encoded></item></channel></rss>