<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Canal Hacker: Cibersegurança]]></title><description><![CDATA[Conteúdo geral sobre Cibersegurança e Segurança da Informação, mas sempre com um jeito despojado, sem aquelas formalidades.]]></description><link>https://www.canalhacker.com.br/s/ciberseguranca</link><image><url>https://substackcdn.com/image/fetch/$s_!TEPb!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ec820c5-c7a8-4d71-8da3-72d89a3af11c_1024x1024.png</url><title>Canal Hacker: Cibersegurança</title><link>https://www.canalhacker.com.br/s/ciberseguranca</link></image><generator>Substack</generator><lastBuildDate>Fri, 22 May 2026 16:48:50 GMT</lastBuildDate><atom:link href="https://www.canalhacker.com.br/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ricardo]]></copyright><language><![CDATA[pt-br]]></language><webMaster><![CDATA[canalhacker@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[canalhacker@substack.com]]></itunes:email><itunes:name><![CDATA[Ricardo Maganhati]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ricardo Maganhati]]></itunes:author><googleplay:owner><![CDATA[canalhacker@substack.com]]></googleplay:owner><googleplay:email><![CDATA[canalhacker@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ricardo Maganhati]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[IA já encontra falhas mais rápido do que conseguimos corrigir [e isso é um problema]]]></title><description><![CDATA[IA acelera descoberta de vulnerabilidades, mas exp&#245;e gargalo cr&#237;tico na capacidade de corre&#231;&#227;o.]]></description><link>https://www.canalhacker.com.br/p/ia-ja-encontra-falhas-mais-rapido</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ia-ja-encontra-falhas-mais-rapido</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Thu, 23 Apr 2026 19:00:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6FmL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6FmL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6FmL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6FmL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6FmL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6FmL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6FmL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2263416,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/195263478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6FmL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!6FmL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!6FmL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!6FmL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98ed5a87-1ae7-4161-832b-f3949c34ae0f_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>O an&#250;ncio do <strong><a href="https://www.anthropic.com/glasswing">Project Glasswing</a></strong>, da Anthropic, evidencia uma mudan&#231;a estrutural no cen&#225;rio de ciberseguran&#231;a: a capacidade de descoberta de vulnerabilidades por intelig&#234;ncia artificial j&#225; supera, com folga, a capacidade de corre&#231;&#227;o do ecossistema. O modelo usado pelo projeto, Mythos, j&#225; identificou falhas cr&#237;ticas em sistemas amplamente auditados, incluindo vulnerabilidades hist&#243;ricas, al&#233;m de encadear exploits complexos e automatizar t&#233;cnicas avan&#231;adas de ataque com alta taxa de sucesso.</p><h3><strong>Detalhes interessantes sobre o Projeto Glasswing</strong></h3><ul><li><p><strong>O Modelo Mythos:</strong> O projeto utiliza o Claude Mythos Preview, um modelo altamente avan&#231;ado (atingindo 93.9% no SWE-bench) capaz de encontrar autonomamente vulnerabilidades do tipo zero-days em sistemas operacionais.</p></li><li><p><strong>Cons&#243;rcio de Seguran&#231;a: </strong>A iniciativa re&#250;ne cerca de doze grandes empresas de tecnologia e infraestrutura para colaborar na avalia&#231;&#227;o de riscos e aplica&#231;&#227;o de corre&#231;&#245;es. Figuram nesta lista empresas como a Microsoft, Google, Apple, Linux Foundation, AWS (Amazon), etc.</p></li><li><p><strong>Descoberta de Falhas Antigas:</strong> O Mythos demonstrou capacidade de detectar vulnerabilidades com d&#233;cadas de exist&#234;ncia (ex: falhas de 27 anos) que passaram batidas por revis&#245;es humanas.</p></li><li><p><strong>Acesso Restrito: </strong>Devido ao seu alto poder de detec&#231;&#227;o de falhas, o modelo n&#227;o foi disponibilizado ao p&#250;blico geral, sendo restrito &#224;s empresas que fazem parte do projeto, para o desenvolvimento de corre&#231;&#245;es.</p></li></ul><div id="youtube2-INGOC6-LLv0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;INGOC6-LLv0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/INGOC6-LLv0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><strong>Quando encontrar falhas deixa de ser o problema?</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="2048" height="1536" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:2048,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;geometric shape digital wallpaper&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="geometric shape digital wallpaper" title="geometric shape digital wallpaper" srcset="https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1523961131990-5ea7c61b2107?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE3NzY5NTA1NDZ8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@fabioha">fabio</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Diante do risco imediato, o acesso &#224; tecnologia foi restrito a grandes empresas para mitiga&#231;&#227;o pr&#233;via das falhas. Ainda assim, menos de 1% das vulnerabilidades identificadas foram corrigidas, evidenciando um descompasso cr&#237;tico entre descoberta e remedia&#231;&#227;o.</p><p>O problema central n&#227;o est&#225; mais em encontrar falhas, mas em trat&#225;-las com velocidade compat&#237;vel. O que antes era um desafio t&#233;cnico virou um gargalo operacional.</p><h3><strong>Velocidade humana vs. velocidade de m&#225;quina</strong></h3><p>Enquanto defensores operam em ciclos de dias, atacantes j&#225; utilizam IA para conduzir ataques aut&#244;nomos em escala e em tempo quase real, reduzindo drasticamente o tempo entre divulga&#231;&#227;o e explora&#231;&#227;o de vulnerabilidades.</p><p>Casos recentes mostram ataques totalmente automatizados comprometendo milhares de organiza&#231;&#245;es simultaneamente. Paralelamente, sistemas aut&#244;nomos j&#225; superam humanos na identifica&#231;&#227;o de falhas e explora&#231;&#227;o, indicando que a tend&#234;ncia &#233; de amplia&#231;&#227;o desse gap.</p><h3><strong>O modelo atual come&#231;a a quebrar</strong></h3><p>Programas tradicionais de seguran&#231;a &#8212; baseados em testes peri&#243;dicos, prioriza&#231;&#227;o gen&#233;rica (como CVSS) e fluxos manuais de corre&#231;&#227;o &#8212; tornam-se insuficientes nesse novo cen&#225;rio. Quando o volume de vulnerabilidades cresce de forma exponencial, processos lineares simplesmente n&#227;o acompanham.</p><h3><strong>O que muda na pr&#225;tica: validar antes de correr para corrigir</strong></h3><p>Como resposta, ganha for&#231;a uma abordagem baseada em valida&#231;&#227;o cont&#237;nua, contextualizada ao ambiente e com ciclos automatizados de detec&#231;&#227;o, prioriza&#231;&#227;o e remedia&#231;&#227;o.</p><p>Mais do que saber se uma falha &#233; cr&#237;tica em teoria, o foco passa a ser entender se ela &#233; explor&#225;vel naquele ambiente espec&#237;fico, naquele momento.</p><h3><strong>A m&#233;trica que realmente importa agora</strong></h3><p>A principal conclus&#227;o &#233; direta: a efic&#225;cia da seguran&#231;a cibern&#233;tica n&#227;o ser&#225; mais medida pela quantidade de vulnerabilidades descobertas, mas pela capacidade de valid&#225;-las e corrigi-las antes que sejam exploradas.</p><p>Sem isso, o avan&#231;o da IA tende a transformar a atual superf&#237;cie de ataque em um cen&#225;rio de risco massivo, cont&#237;nuo e cada vez mais dif&#237;cil de conter.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html">https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html</a></p>]]></content:encoded></item><item><title><![CDATA[Google entrega dados de usuário ao governo dos EUA sem aviso e gera polêmica]]></title><description><![CDATA[A entrega de dados sem notifica&#231;&#227;o pr&#233;via levanta suspeitas sobre at&#233; que ponto as pol&#237;ticas de privacidade do Google s&#227;o realmente seguidas.]]></description><link>https://www.canalhacker.com.br/p/google-entrega-dados-de-usuario-ao</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/google-entrega-dados-de-usuario-ao</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Thu, 16 Apr 2026 16:26:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gT68!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gT68!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gT68!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!gT68!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!gT68!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!gT68!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gT68!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2028296,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/194369751?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gT68!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!gT68!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!gT68!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!gT68!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9d00f74-4fbf-4c90-85bf-627538ee9f87_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>O Google est&#225; no centro de uma nova controv&#233;rsia envolvendo privacidade e compartilhamento de dados com autoridades. A empresa teria quebrado uma promessa antiga ao entregar informa&#231;&#245;es de um usu&#225;rio para o governo dos Estados Unidos sem notific&#225;-lo previamente.</p><h2>&#128194; O caso: dados entregues sem chance de defesa</h2><p>A situa&#231;&#227;o envolve Amandla Thomas-Johnson, estudante de doutorado que estava nos EUA com visto acad&#234;mico. Ap&#243;s participar brevemente de um protesto pr&#243;-Palestina em 2024, ele acabou entrando no radar das autoridades.</p><p>Meses depois, j&#225; fora do pa&#237;s, o estudante recebeu um e-mail do Google informando que seus dados haviam sido entregues ao Departamento de Seguran&#231;a Interna dos EUA &#8212; sem qualquer aviso pr&#233;vio ou possibilidade de contesta&#231;&#227;o.</p><p>Esse ponto chama aten&#231;&#227;o porque o pr&#243;prio Google afirma, h&#225; anos, que notifica usu&#225;rios antes de responder a solicita&#231;&#245;es legais, justamente para permitir defesa.</p><h2>Promessa quebrada e investiga&#231;&#227;o na mesa</h2><p>A organiza&#231;&#227;o Electronic Frontier Foundation (EFF) entrou com den&#250;ncias contra o Google, pedindo investiga&#231;&#227;o por poss&#237;veis pr&#225;ticas enganosas. Segundo a entidade, a empresa n&#227;o cumpriu sua pol&#237;tica de transpar&#234;ncia ao ignorar o aviso pr&#233;vio.</p><h2>O que foi compartilhado (e por que isso &#233; preocupante)</h2><p>Mesmo sem acesso ao conte&#250;do das mensagens, os dados entregues incluem:</p><ul><li><p>Endere&#231;os IP</p></li><li><p>Endere&#231;o f&#237;sico</p></li><li><p>Identificadores da conta</p></li><li><p>Hor&#225;rios e dura&#231;&#227;o de sess&#245;es</p></li></ul><p>Na pr&#225;tica, esse conjunto permite montar um perfil detalhado do usu&#225;rio &#8212; incluindo localiza&#231;&#227;o aproximada, rotina e padr&#245;es de comunica&#231;&#227;o.</p><p>Ou seja: n&#227;o precisa ler suas mensagens para entender sua vida.</p><h2>Big Tech + governo = vigil&#226;ncia silenciosa?</h2><p>O caso levanta um alerta importante: a combina&#231;&#227;o entre grandes empresas de tecnologia e poder estatal pode viabilizar investiga&#231;&#245;es altamente invasivas &#8212; muitas vezes sem transpar&#234;ncia.</p><p>Para o estudante, o impacto vai al&#233;m do digital. Mesmo fora dos EUA, ele afirma n&#227;o se sentir fora do alcance das autoridades, levantando d&#250;vidas sobre vigil&#226;ncia internacional e poss&#237;veis consequ&#234;ncias futuras.</p><h2>O ponto central</h2><p>No fim das contas, o epis&#243;dio refor&#231;a uma preocupa&#231;&#227;o crescente no mundo da seguran&#231;a da informa&#231;&#227;o:</p><p><strong>&#128073; at&#233; que ponto seus dados est&#227;o realmente sob seu controle?</strong></p><p>E o mais importante:</p><p>&#128073; <strong>quem garante que promessas de privacidade ser&#227;o cumpridas quando entrarem em conflito com interesses governamentais?</strong></p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data">https://www.eff.org/deeplinks/2026/04/google-broke-its-promise-me-now-ice-has-my-data</a></p>]]></content:encoded></item><item><title><![CDATA[Extensões de navegador viraram a nova porta de entrada da IA (e quase ninguém percebeu)]]></title><description><![CDATA[As empresas podem bloquear o ChatGPT&#8230; mas n&#227;o (aparentemente) as extens&#245;es de navegador que usam IA por tr&#225;s.]]></description><link>https://www.canalhacker.com.br/p/extensoes-de-navegador-viraram-a</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/extensoes-de-navegador-viraram-a</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 10 Apr 2026 18:13:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qKl5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qKl5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qKl5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!qKl5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!qKl5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!qKl5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qKl5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qKl5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!qKl5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!qKl5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!qKl5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbd19e8-8ec2-45ee-a02a-10a2ce3df2b5_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Enquanto todo mundo est&#225; preocupado com IA generativa, shadow AI e APIs, tem um elefante na sala que est&#225; passando batido: <strong>as extens&#245;es de navegador com IA</strong>.</p><p>Um relat&#243;rio recente da LayerX escancarou esse problema. E n&#227;o &#233; pequeno.</p><p>Essas extens&#245;es simplesmente <strong>n&#227;o aparecem nos logs de ferramentas SaaS </strong>(software como servi&#231;o, padr&#227;o hoje no mercado), n&#227;o acionam DLP e ficam ali, dentro do navegador, com acesso direto a tudo: o que o usu&#225;rio v&#234;, digita e at&#233; sess&#245;es logadas.</p><p>E os n&#250;meros assustam:</p><ul><li><p>60% mais chance de ter vulnerabilidades</p></li><li><p>3x mais acesso a cookies</p></li><li><p>2,5x mais chance de executar scripts remotos</p></li><li><p>6x mais propensas a aumentar permiss&#245;es com o tempo</p></li></ul><p>Voc&#234; instala em segundos&#8230; e pode gerar um pesadelo permanente.</p><h3>Todo mundo usa extens&#245;es &#8212; mas ningu&#233;m est&#225; olhando</h3><p>Existe uma falsa sensa&#231;&#227;o de que extens&#245;es s&#227;o um risco &#8220;de nicho&#8221;, mas n&#227;o s&#227;o caro(a) padawan:</p><ul><li><p>99% dos usu&#225;rios corporativos usam pelo menos uma extens&#227;o</p></li><li><p>Mais de 25% usam mais de 10</p></li></ul><p>Agora vem o problema: a maioria das empresas <strong>n&#227;o faz ideia</strong> de:</p><ul><li><p>quais extens&#245;es est&#227;o instaladas</p></li><li><p>quem instalou</p></li><li><p>quais permiss&#245;es elas t&#234;m</p></li><li><p>que dados elas acessam</p></li></ul><p>As empresas passaram anos investindo em visibilidade de rede, endpoint e identidade&#8230; e o navegador? virou aquele ponto cego.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hRFI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hRFI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 424w, https://substackcdn.com/image/fetch/$s_!hRFI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 848w, https://substackcdn.com/image/fetch/$s_!hRFI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 1272w, https://substackcdn.com/image/fetch/$s_!hRFI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hRFI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png" width="1223" height="812" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:812,&quot;width&quot;:1223,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57652,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/193814907?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hRFI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 424w, https://substackcdn.com/image/fetch/$s_!hRFI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 848w, https://substackcdn.com/image/fetch/$s_!hRFI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 1272w, https://substackcdn.com/image/fetch/$s_!hRFI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F408b5933-a1b7-4a1a-ab87-5a16d6412fbe_1223x812.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html</figcaption></figure></div><h3>Extens&#245;es de IA: o canal invis&#237;vel de uso de IA</h3><p>Quando falamos de uso de IA nas empresas, o foco costuma ser:</p><ul><li><p>ChatGPT</p></li><li><p>APIs</p></li><li><p>ferramentas SaaS</p></li></ul><p>Mas as extens&#245;es seguem outro caminho.</p><p>Elas ficam dentro do navegador e conseguem acessar:</p><ul><li><p>conte&#250;do das p&#225;ginas</p></li><li><p>dados digitados</p></li><li><p>sess&#245;es ativas</p></li></ul><p>Tudo isso <strong>sem passar pelos controles tradicionais</strong>.</p><p>Na pr&#225;tica, criam uma camada paralela de uso de IA &#8212; totalmente fora de governan&#231;a.</p><p>E j&#225; est&#227;o crescendo r&#225;pido: cerca de <strong>1 em cada 6 usu&#225;rios corporativos</strong> j&#225; usa pelo menos uma.</p><h3>N&#227;o &#233; s&#243; hype &#8212; &#233; risco real tamb&#233;m</h3><p>Se voc&#234; acha que &#233; &#8220;s&#243; mais uma extens&#227;o&#8221;, n&#227;o &#233;.</p><p>Comparadas com extens&#245;es comuns, as de IA s&#227;o bem mais perigosas:</p><ul><li><p>60% mais chances de CVEs</p></li><li><p>3x mais acesso a cookies (roubo de sess&#227;o, algu&#233;m?)</p></li><li><p>2,5x mais permiss&#245;es de script (extra&#231;&#227;o e manipula&#231;&#227;o de dados)</p></li><li><p>2x mais controle sobre abas (phishing e redirecionamento silencioso)</p></li></ul><p>Traduzindo: &#233; praticamente um kit completo para ataque rodando dentro do navegador.</p><h3>O perigo que muda com o tempo</h3><p>Outro erro comum: tratar extens&#227;o como algo est&#225;tico.</p><p>S&#243; que elas:</p><ul><li><p>recebem updates</p></li><li><p>mudam permiss&#245;es</p></li><li><p>podem at&#233; trocar de dono</p></li></ul><p>E aqui vem o dado cr&#237;tico:</p><ul><li><p>extens&#245;es de IA s&#227;o <strong>6x mais propensas a mudar permiss&#245;es</strong></p></li><li><p>mais de 60% dos usu&#225;rios j&#225; t&#234;m uma que mudou no &#250;ltimo ano</p></li></ul><p>Ou seja: aquilo que era seguro ontem&#8230; hoje pode n&#227;o ser mais.</p><h3>O &#8220;gap&#8221; de confian&#231;a &#233; maior do que parece</h3><p>Muita gente usa sinais b&#225;sicos pra confiar em extens&#245;es:</p><ul><li><p>n&#250;mero de downloads</p></li><li><p>frequ&#234;ncia de atualiza&#231;&#227;o</p></li><li><p>pol&#237;tica de privacidade</p></li></ul><p>Mas o cen&#225;rio real &#233; meio preocupante:</p><ul><li><p>mais de 10% t&#234;m menos de 1.000 usu&#225;rios</p></li><li><p>25% t&#234;m menos de 5.000</p></li><li><p>cerca de 40% n&#227;o recebem update h&#225; mais de 1 ano</p></li></ul><p>No caso das extens&#245;es de IA, isso &#233; ainda pior.</p><p>Resultado: <strong>baixo n&#237;vel de confian&#231;a + pouca visibilidade = risco alto</strong>.</p><h3>O que as empresas podem fazer na pr&#225;tica?</h3><p>O relat&#243;rio aponta alguns caminhos bem diretos:</p><p><strong>1. Mapear tudo</strong><br>Fa&#231;a um invent&#225;rio completo das extens&#245;es em uso. Sem isso, voc&#234; est&#225; no escuro.</p><p><strong>2. Tratar extens&#245;es de IA como risco elevado</strong><br>Mais controle, mais restri&#231;&#227;o, mais aten&#231;&#227;o.</p><p><strong>3. Monitorar comportamento (n&#227;o s&#243; permiss&#245;es)</strong><br>Aprovar uma vez n&#227;o resolve. Tem que acompanhar mudan&#231;as.</p><p><strong>4. Criar crit&#233;rios m&#237;nimos de confian&#231;a</strong><br>Poucos usu&#225;rios? Sem pol&#237;tica de privacidade? Sem updates?<br>Trate como suspeito.</p><blockquote><p><a href="https://go.layerxsecurity.com/browser-extension-security-report-2026?utm_source=thn&amp;utm_campaign=besr10042026">Baixe o relat&#243;rio completo de Seguran&#231;a de Extens&#245;es da LayerX</a> para entender o escopo total dessas descobertas, identificar onde realmente voc&#234; est&#225; vulner&#225;vel e encontrar um caminho claro para controlar essa crescente superf&#237;cie de ataque, sem interromper a produtividade da sua empresa.</p></blockquote><h3>Conclus&#227;o: o risco n&#227;o &#233; perif&#233;rico, n&#227;o est&#225; apenas na borda</h3><p>Extens&#245;es sempre foram vistas como &#8220;comodidade&#8221;.</p><p>Hoje, elas s&#227;o:</p><ul><li><p>amplamente usadas</p></li><li><p>altamente privilegiadas</p></li><li><p>praticamente invis&#237;veis para a seguran&#231;a</p></li></ul><p>E isso cria uma exposi&#231;&#227;o direta a dados sens&#237;veis e sess&#245;es de usu&#225;rios.</p><p>Em outras palavras:<br><strong>o navegador virou um campo de batalha&#8230; e as extens&#245;es s&#227;o agentes infiltrados (kkkk).</strong></p><p>As empresas precisam mudar a sua percep&#231;&#227;o de seguran&#231;a em rela&#231;&#227;o as extens&#245;es de navegador. Sen&#227;o j&#225; viu n&#233;?</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html">https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html</a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Campanha de espionagem sob demanda mira jornalistas no Oriente Médio e Norte da África]]></title><description><![CDATA[Opera&#231;&#227;o sofisticada usa phishing e OAuth para espionar jornalistas na regi&#227;o MENA.]]></description><link>https://www.canalhacker.com.br/p/campanha-de-espionagem-sob-demanda</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/campanha-de-espionagem-sob-demanda</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Thu, 09 Apr 2026 17:16:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4B9i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4B9i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4B9i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!4B9i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!4B9i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!4B9i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4B9i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4B9i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!4B9i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!4B9i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!4B9i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d1f8d53-be27-4eb5-8aaa-870505cb9a24_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Uma opera&#231;&#227;o de espionagem digital sob encomenda (hack-for-hire), possivelmente ligada a interesses governamentais indianos, est&#225; na mira ap&#243;s atingir jornalistas, ativistas e figuras p&#250;blicas na regi&#227;o MENA (Oriente M&#233;dio e Norte da &#193;frica). A investiga&#231;&#227;o foi conduzida por organiza&#231;&#245;es como <a href="https://www.accessnow.org/mena-phishing-2026/">Access Now</a>, <a href="https://www.lookout.com/threat-intelligence/article/bitter-hack-for-hire">Lookout </a>e <a href="https://smex.org/smex-may2025/">SMEX</a>.</p><h4>Phishing direcionado com alto n&#237;vel de personaliza&#231;&#227;o</h4><p>Entre os alvos est&#227;o dois jornalistas eg&#237;pcios bastante conhecidos por cr&#237;ticas ao governo. Eles foram atingidos por ataques de spear phishing entre 2023 e 2024, com p&#225;ginas falsas que imitavam servi&#231;os da Apple e Google para roubar credenciais e c&#243;digos de autentica&#231;&#227;o em dois fatores.</p><p>Os ataques n&#227;o foram gen&#233;ricos. Houve engenharia social bem constru&#237;da, incluindo abordagens via LinkedIn com falsas propostas de trabalho, levando as v&#237;timas a intera&#231;&#245;es aparentemente leg&#237;timas antes da tentativa de comprometimento.</p><h4>Abuso de OAuth do Google eleva sofistica&#231;&#227;o</h4><p>Um dos pontos mais interessantes da campanha foi o uso indevido do OAuth 2.0 do Google. Em vez de simplesmente roubar senha, os atacantes induziam a v&#237;tima a conceder permiss&#245;es a um app malicioso.</p><p>Na pr&#225;tica, isso reduz a suspeita do usu&#225;rio, j&#225; que a interface &#233; leg&#237;tima. Se a pessoa j&#225; estiver logada, basta autorizar o acesso &#8212; abrindo a porta diretamente para os atacantes sem precisar capturar a senha.</p><h4>Ataques via mensageiros e falsa identidade da Apple</h4><p>Outro vetor explorado foi o envio de links maliciosos via iMessage e WhatsApp, se passando por suporte oficial da Apple. Tamb&#233;m h&#225; ind&#237;cios de tentativas envolvendo Telegram e Signal.</p><p>Um jornalista liban&#234;s chegou a ter sua conta Apple totalmente comprometida, com adi&#231;&#227;o de um dispositivo virtual para manter acesso persistente aos dados.</p><h4>Infraestrutura e dom&#237;nios suspeitos</h4><p>Os atacantes utilizaram dom&#237;nios cuidadosamente montados para parecerem leg&#237;timos, explorando varia&#231;&#245;es de servi&#231;os populares como Apple, Signal e Telegram. Um detalhe curioso &#233; o uso recorrente do padr&#227;o &#8220;<strong><a href="https://www.virustotal.com/gui/domain/com-ae.net/details">com-ae[.]net</a></strong>&#8221; e "<strong><a href="https://www.virustotal.com/gui/domain/youtubepremiumapp.com/details">youtubepremiumapp[.]com</a></strong>,", j&#225; associado a campanhas anteriores de spyware Android.</p><p>Essa infraestrutura tamb&#233;m foi ligada a malwares como ProSpy e ToSpy, capazes de coletar contatos, SMS, arquivos e metadados do dispositivo.</p><h4>Poss&#237;vel liga&#231;&#227;o com grupo Bitter</h4><p>A an&#225;lise da Lookout aponta conex&#245;es com o grupo Bitter, conhecido por opera&#231;&#245;es de ciberespionagem alinhadas a interesses do governo indiano. No entanto, h&#225; uma diferen&#231;a importante: esse grupo tradicionalmente n&#227;o atacava membros da sociedade civil.</p><p>Isso levanta duas hip&#243;teses:</p><ul><li><p>Expans&#227;o do escopo do pr&#243;prio grupo</p></li><li><p>Uso de terceiros em um modelo &#8220;hack-for-hire&#8221;</p></li></ul><h4>Malware mobile segue como arma principal</h4><p>Mesmo sem confirma&#231;&#227;o de spyware direto nos casos analisados, a infraestrutura e os m&#233;todos utilizados mostram que o objetivo pode facilmente evoluir para infec&#231;&#227;o com malware.</p><p>A tend&#234;ncia &#233; clara: dispositivos m&#243;veis continuam sendo o elo mais explorado em campanhas de vigil&#226;ncia, seja via ferramentas comerciais, terceiriza&#231;&#227;o ou opera&#231;&#245;es estatais diretas.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html">https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html</a></p>]]></content:encoded></item><item><title><![CDATA[Ciberatacantes ligados ao governo iraniano têm como alvo a infraestrutura crítica dos EUA]]></title><description><![CDATA[Ag&#234;ncias dos EUA alertam que agentes maliciosos ligados ao Ir&#227; est&#227;o visando PLCs expostos &#224; internet e utilizados em redes de infraestrutura cr&#237;tica.]]></description><link>https://www.canalhacker.com.br/p/ciberatacantes-ligados-ao-governo</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ciberatacantes-ligados-ao-governo</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 08 Apr 2026 13:23:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!geZy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!geZy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!geZy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!geZy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!geZy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!geZy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!geZy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png" width="1024" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:608,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!geZy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 424w, https://substackcdn.com/image/fetch/$s_!geZy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 848w, https://substackcdn.com/image/fetch/$s_!geZy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 1272w, https://substackcdn.com/image/fetch/$s_!geZy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd20ab0db-c0f7-4d92-8970-1c1e032ff888_1024x608.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Ag&#234;ncias dos Estados Unidos, incluindo o FBI e a CISA, emitiram um alerta sobre ataques cibern&#233;ticos conduzidos por grupos ligados ao Ir&#227;. Esses ataques est&#227;o focados em dispositivos industriais conhecidos como PLCs (controladores l&#243;gicos program&#225;veis), especialmente os modelos da Rockwell Automation/Allen-Bradley que est&#227;o expostos diretamente na internet.</p><h4>Alvos dos Ataques</h4><p>Segundo o alerta, os invasores est&#227;o explorando falhas de seguran&#231;a nesses equipamentos para acessar sistemas de tecnologia operacional (OT), utilizados em setores cr&#237;ticos como energia, &#225;gua, saneamento e servi&#231;os governamentais. O objetivo principal &#233; causar interrup&#231;&#245;es nos processos e gerar preju&#237;zos financeiros.</p><h4>Como os Ataques Funcionam</h4><p>Os ataques ocorrem principalmente por meio da manipula&#231;&#227;o dos arquivos de projeto dos PLCs e da altera&#231;&#227;o de informa&#231;&#245;es exibidas em sistemas de monitoramento, como HMI e SCADA. Isso pode fazer com que operadores visualizem dados incorretos ou percam o controle sobre processos industriais, resultando em falhas operacionais.</p><h4>T&#233;cnicas Utilizadas</h4><p>As investiga&#231;&#245;es apontam que os atacantes utilizam ferramentas leg&#237;timas de engenharia, como o Studio 5000 Logix Designer, al&#233;m de acessos remotos por meio de protocolos comuns em redes industriais. Tamb&#233;m foi identificado o uso de ferramentas de acesso remoto, como SSH (Dropbear), e comunica&#231;&#227;o por portas espec&#237;ficas desses ambientes.</p><h4>Atores Envolvidos</h4><p>O grupo respons&#225;vel por essa campanha &#233; conhecido como CyberAv3ngers, associado &#224; Guarda Revolucion&#225;ria do Ir&#227; (IRGC), e tamb&#233;m identificado por outros nomes no setor de seguran&#231;a. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">Desde novembro de 2023</a>, esse grupo j&#225; comprometeu pelo menos 75 dispositivos, incluindo PLCs utilizados em sistemas de &#225;gua e esgoto.</p><h4>Contexto Atual</h4><p>As autoridades destacam que esse tipo de ataque tem aumentado recentemente, possivelmente em fun&#231;&#227;o de tens&#245;es geopol&#237;ticas envolvendo Ir&#227;, Estados Unidos e Israel. H&#225; ainda ind&#237;cios de que outros fabricantes de equipamentos industriais, como a Siemens, tamb&#233;m possam ser alvo dessas a&#231;&#245;es.</p><h4>Recomenda&#231;&#245;es de Seguran&#231;a</h4><p>Como medidas de prote&#231;&#227;o, recomenda-se que as organiza&#231;&#245;es evitem expor PLCs diretamente na internet, utilizem firewalls para restringir acessos, monitorem o tr&#225;fego de rede em busca de atividades suspeitas e revisem logs regularmente. Tamb&#233;m &#233; fundamental manter os dispositivos atualizados, desativar servi&#231;os desnecess&#225;rios, remover credenciais padr&#227;o e adotar autentica&#231;&#227;o multifator sempre que poss&#237;vel.</p><p>Por fim, &#233; importante que as empresas revisem os indicadores de comprometimento divulgados pelas autoridades e estejam preparadas para responder rapidamente a incidentes, buscando apoio de &#243;rg&#227;os especializados quando necess&#225;rio.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://securityaffairs.com/190485/apt/u-s-agencies-alert-iran-linked-actors-target-critical-infrastructure-plcs.html">https://securityaffairs.com/190485/apt/u-s-agencies-alert-iran-linked-actors-target-critical-infrastructure-plcs.html</a></p>]]></content:encoded></item><item><title><![CDATA[Falsos anúncios de ferramentas de vídeos de IA em redes sociais espalham malware]]></title><description><![CDATA[Campanha executada por grupo de cibercriminosos tira proveito deste hype em cima de geradores de videos de IA para disseminar malware em redes sociais.]]></description><link>https://www.canalhacker.com.br/p/falsos-anuncios-de-ferramentas-de</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/falsos-anuncios-de-ferramentas-de</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 30 May 2025 15:41:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UXAg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UXAg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UXAg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 424w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 848w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1272w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UXAg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86252,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164727317?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UXAg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 424w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 848w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1272w, https://substackcdn.com/image/fetch/$s_!UXAg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b580cca-d521-4b6c-b7ff-5d9d58caf25c_2048x1366.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://trustcloud.tech/trustcloud-services/deepfake-detection-with-ai/</figcaption></figure></div><p>A empresa de ciberseguran&#231;a chamada <a href="https://www.mandiant.com/">Mandiant Threat Defense</a> (<em><a href="https://www.cisoadvisor.com.br/google-conclui-aquisicao-da-mandiant-por-us-54-bilhoes/">adquirida pelo Google em 2022</a></em>), descobriu uma ampla opera&#231;&#227;o de crimes cibern&#233;ticos que tiram proveito desse entusiasmo do p&#250;blico por novas ferramentas de intelig&#234;ncia artificial.</p><p>Um grupo conhecido pelo nome de UNC6032 que acredita-se estar sediado no Vietn&#227;, estaria enganando pessoas com an&#250;ncios falsos em redes sociais, como Facebook e LinkedIn, que promovem desde meados de 2024 aqueles geradores de v&#237;deos de IA populares, como o Luma AI e o Canva Dream Lab.</p><h3><strong>Os ataques</strong></h3><p>No entanto, esses sites baixam secretamente softwares maliciosos, incluindo infostealers e backdoors, que roubam informa&#231;&#245;es confidenciais, como detalhes de login e dados pessoais. Os dados roubados provavelmente s&#227;o vendidos em mercados online ilegais, como a dark web.</p><p>Esse tipo de ataque &#233; uma grande preocupa&#231;&#227;o para todos. De acordo com o <a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025?e=48754805">report M-Trends da Mandiant</a>, credenciais roubadas s&#227;o a segunda forma principal de invas&#227;o de sistemas por cibercriminosos. A empresa encontrou muitos desses an&#250;ncios que alcan&#231;am milh&#245;es de usu&#225;rios, e acredita que campanhas semelhantes estejam ativas em outras redes sociais.</p><p>Por exemplo, um ataque espec&#237;fico investigado pela empresa de ciberseguran&#231;a come&#231;ou com um an&#250;ncio no Facebook da Luma Dream AI Machine. Quando um usu&#225;rio clicava em &#8220;Comece agora gratuitamente&#8221;, era conduzido por uma s&#233;rie de etapas que imitavam um processo real de cria&#231;&#227;o de v&#237;deos com IA.</p><p>Ap&#243;s a barra de carregamento, um bot&#227;o de download aparece, instalando o software malicioso em vez de baixar um v&#237;deo. Os arquivos baixados utilizam um truque com caracteres ocultos e o &#237;cone de um arquivo .mp4 falso para parecerem inofensivos.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vEVn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vEVn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vEVn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg" width="1456" height="1454" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1454,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:273720,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164727317?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vEVn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vEVn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd8ac12c-83c6-4aa3-87e0-6e9f40205bf7_2048x2045.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">An&#250;ncios maliciosos no Facebook e LinkedIn | Cr&#233;ditos da imagem: https://hackread.com/fake-ai-video-tool-ads-facebook-linkedin-infostealers/</figcaption></figure></div><h3><strong>Os malwares</strong></h3><p>O malware usado nesses ataques que a Mandiant identificou como STARKVEIL, &#233; um programa complexo escrito na linguagem Rust. Ele pode exibir mensagens de erro falsas para induzir os usu&#225;rios a reabrirem o programa. O software ent&#227;o instala outras ferramentas maliciosos, como XWORM, backdoor FROSTRIFT e o downloader GRIMPULL.</p><p>O software malicioso usado nesses ataques, que a Mandiant rastreia como STARKVEIL, &#233; um programa complexo escrito em <a href="https://hackread.com/rust-injector-xworm-remcos-rat-multi-stage-attack/">Rust</a> . Ele pode exibir mensagens de erro falsas para induzir os usu&#225;rios a reabrir o programa. O software ent&#227;o instala outras ferramentas perigosas, como <a href="https://hackread.com/hackers-script-kiddes-xworm-rat-compromise-devices/">XWORM</a> , backdoors FROSTRIFT e o downloader GRIMPULL.</p><p>Em <a href="https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites">uma publica&#231;&#227;o em seu blog</a>, a Mandiant detalha todas essas quest&#245;es t&#233;cnicas envolvendo amea&#231;as e mostra que est&#225; colaborando com a Meta e o LinkedIn no combate a essa campanha. Embora a Meta tenha removido muitos desses an&#250;ncios, outros novos aparecem diariamente. &#201; uma amea&#231;a cont&#237;nua que exige colabora&#231;&#227;o constante com a ind&#250;stria de tecnologia para proteger os usu&#225;rios.</p><p>Yash Gupta, gerente s&#234;nior da Mandiant, alerta que &#8220;<em>sites bem elaborados que se passam por ferramentas leg&#237;timas de IA podem representar uma amea&#231;a a qualquer um. Os usu&#225;rios precisam ter cuidado ao interagir com an&#250;ncios aparentemente inofensivos</em>&#8221;.</p><p>&#201; fato que as ferramentas de IA est&#227;o se tornando populares, e os cibercriminosos continuar&#227;o a explorar esse interesse. Recomendamos que voc&#234; seja cauteloso ao testar essas novas ferramentas e verifique sempre o endere&#231;o do site antes de interagir.</p><p><strong>Cr&#233;dito:</strong></p><p><a href="https://hackread.com/fake-ai-video-tool-ads-facebook-linkedin-infostealers/">https://hackread.com/fake-ai-video-tool-ads-facebook-linkedin-infostealers/</a></p>]]></content:encoded></item><item><title><![CDATA[Criminosos realizam campanhas de phishing com o tema DocuSign]]></title><description><![CDATA[O DocuSign &#233; tema de sofisticadas campanhas de phishing por cibercriminosos que possuem o objetivo de coletar credenciais corporativas, invadir redes e executar fraudes financeiras.]]></description><link>https://www.canalhacker.com.br/p/criminosos-realizam-campanhas-de</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/criminosos-realizam-campanhas-de</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 28 May 2025 22:22:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IRwd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IRwd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IRwd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 424w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 848w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1272w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IRwd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp" width="1456" height="820" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:820,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:406342,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164602723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IRwd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 424w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 848w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1272w, https://substackcdn.com/image/fetch/$s_!IRwd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe167309f-30ad-40c8-9922-170e54c7e546_1583x891.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.techradar.com/pro/security/hackers-target-docusign-with-new-phishing-threat-watch-out-you-could-be-signing-your-data-away</figcaption></figure></div><p>O DocuSign, famosa ferramenta para assinatura digital de documentos com mais de 1 bilh&#227;o de usu&#225;rios e 95% das empresas da Fortune 500, &#233; tema de sofisticadas campanhas de phishing executadas por cibercriminosos que possuem o objetivo de coletar credenciais corporativas, invadir redes e executar fraudes financeiras.</p><h3><strong>Amea&#231;as cibern&#233;ticas que usam plataformas confi&#225;veis em seus ataques</strong></h3><p>Tendo em vista que o phishing &#233; respons&#225;vel por 19% dos vazamentos de dados e 60% envolvem o fator humano, conforme descobertas da empresa Verizon, entender essas amea&#231;as &#233; essencial para as empresas que buscam proteger suas informa&#231;&#245;es cr&#237;ticas.</p><p>As campanhas de phishing com o tema DocuSign empregam t&#225;ticas de engenharia social para enganar usu&#225;rios. Estas v&#237;timas geralmente recebem e-mails imitando o layout da ferramenta, com avisos urgentes que solicitam a revis&#227;o de documentos atrav&#233;s de bot&#245;es amarelos clic&#225;veis ou anexos de QR codes.</p><p>Ao serem levados para sites maliciosos, como p&#225;ginas falsas de login da Microsoft, os usu&#225;rios s&#227;o induzidos a digitarem credenciais de acesso ou detalhes financeiros.</p><p>Os QR codes representam um risco &#250;nico, pois os dispositivos m&#243;veis usados para escane&#225;-los geralmente n&#227;o possuem um software de seguran&#231;a robusto, o que facilita o contorno das defesas pelos invasores.</p><p>Esses ataques tamb&#233;m podem servir como ponte para o escalonamento de privil&#233;gios, movimenta&#231;&#227;o lateral dentro de redes corporativas, e at&#233; mesmo a implanta&#231;&#227;o de ransomware ou a exfiltra&#231;&#227;o de dados.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NCxQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NCxQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 424w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 848w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1272w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png" width="1105" height="835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:835,&quot;width&quot;:1105,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:90468,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/164602723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NCxQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 424w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 848w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1272w, https://substackcdn.com/image/fetch/$s_!NCxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8205bf7f-2214-4ac3-ac98-4f502feab8eb_1105x835.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://gbhackers.com/threat-actors-use-fake-docusign-notifications/</figcaption></figure></div><h3>Mecanismos de ataques de phishing usando o DocuSign</h3><p>Outros incidentes destacam a diversidade desses golpes, com cibercriminosos registrando contas reais do DocuSign para enviar e-mails com apar&#234;ncia aut&#234;ntica, falsificando entidades confi&#225;veis, como fornecedores ou ag&#234;ncias municipais.</p><p>Outros orquestram golpes de faturas falsas para enganar empresas e fazer com quem realizem algum tipo de pagamento ou comentem fraudes de reembolso que induzem as v&#237;timas a divulgar informa&#231;&#245;es pessoais por telefone.</p><p>Al&#233;m disso, alguns invasores exploram as APIs do DocuSign para criar notifica&#231;&#245;es aparentemente leg&#237;timas, em que misturam algo realmente genu&#237;no com o engano cometido pelas v&#237;timas.</p><p>Normalmente esses e-mails podem se passar por departamentos de RH ou de Pagamento, criando aquele senso de urg&#234;ncia, o que pode levar os usu&#225;rios a agirem sem nenhum crit&#233;rio. O resultado disso pode ser o acesso n&#227;o autorizado a sistemas corporativos, perdas financeiras ou dados pessoais roubados aparecendo na dark web.</p><h3>Como se proteger?</h3><p><a href="https://www.welivesecurity.com/en/scams/personal-data-fraudsters-docusign-scam-emails/">De acordo com um report da ESET</a>, a prote&#231;&#227;o contra phishing do DocuSign requer uma abordagem em camadas.</p><p>As empresas precisam priorizar a educa&#231;&#227;o de seus funcion&#225;rios por meio de programas de conscientiza&#231;&#227;o sobre phishing, ensinando-os a analisar e-mails em busca de remetentes suspeitos, assinaturas incompat&#237;veis ou erros gramaticais e a verificar URLs antes de clicar nos links.</p><p>E-mails leg&#237;timos do DocuSign incluem c&#243;digos de seguran&#231;a para acesso direto aos documentos em sua plataforma, nunca por meio de links de e-mail ou anexos.</p><p>Implementar a autentica&#231;&#227;o multifator (MFA) em contas corporativas, impor uma higieniza&#231;&#227;o de senhas fortes por meio de gerenciadores de senha e implementar solu&#231;&#245;es avan&#231;adas de seguran&#231;a para detec&#231;&#227;o de links e anexos maliciosos s&#227;o prote&#231;&#245;es t&#233;cnicas essenciais.</p><p>As pol&#237;ticas de seguran&#231;a precisam desencorajar a intera&#231;&#227;o com esses e-mails n&#227;o solicitados, incentivando os usu&#225;rios a relatar mensagens suspeitas aos times de seguran&#231;a e ao endere&#231;o de den&#250;ncia de spam da DocuSign.</p><p>Caso ocorra alguma viola&#231;&#227;o, a&#231;&#245;es r&#225;pidas, como redefini&#231;&#227;o de senhas, verifica&#231;&#245;es de malware, isolamento de dispositivos e monitoramento da dark web, s&#227;o cruciais para conter danos.</p><p>Seja para fins comerciais ou pessoais, o uso do DocuSign deve ser equilibrado com a vigil&#226;ncia constante, para que n&#227;o haja sucesso nas investidas dos cibercriminosos que exploram a confian&#231;a em ferramentas leg&#237;timas.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://gbhackers.com/threat-actors-use-fake-docusign-notifications/">https://gbhackers.com/threat-actors-use-fake-docusign-notifications/</a></p>]]></content:encoded></item><item><title><![CDATA[Integrante de grupo hacktivista admite ter hackeado a Disney e vazado dados]]></title><description><![CDATA[A Disney iniciou uma investiga&#231;&#227;o em julho do ano passado, ap&#243;s um grupo de hackers ter anunciado o roubo de 1,1 TB de dados dos canais internos da ferramenta de colabora&#231;&#227;o Slack usada pela empresa.]]></description><link>https://www.canalhacker.com.br/p/integrante-de-grupo-hacktivista-admite</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/integrante-de-grupo-hacktivista-admite</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Thu, 08 May 2025 14:29:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DTZe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DTZe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DTZe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 424w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 848w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1272w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DTZe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:128222,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/162882060?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DTZe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 424w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 848w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1272w, https://substackcdn.com/image/fetch/$s_!DTZe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe266e340-34c3-4614-b376-c32f3f5b1b7b_1920x1080.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://movies.fandom.com/wiki/The_Walt_Disney_Company</figcaption></figure></div><p>De acordo com o <a href="https://www.justice.gov/">DoJ</a> (Departamento de Justi&#231;a Americano), Ryan Mitchell Kramer se declarou culpado por acessar um computador e obtido informa&#231;&#245;es, al&#233;m de ter amea&#231;ado danificar dados, al&#233;m de duas acusa&#231;&#245;es de crime que podem resultar em uma pena de pris&#227;o de at&#233; cinco anos cada.</p><p><a href="https://www.securityweek.com/disney-investigating-hacker-groups-data-theft-claims/">Kramer est&#225; por tr&#225;s do ataque de 2024 contra a The Walt Disney Company</a>. A gigante da m&#237;dia iniciou uma investiga&#231;&#227;o sobre o incidente em julho do ano passado, ap&#243;s um grupo de hackers chamado NullBulge ter anunciado o roubo de 1,1 TB de dados dos canais internos da ferramenta de colabora&#231;&#227;o Slack usada pela empresa, incluindo mensagens, informa&#231;&#245;es sobre projetos n&#227;o lan&#231;ados, credencias de logins e c&#243;digos-fontes.</p><p>NullBulge alegou ser um &#8220;<em>grupo hacktivista que protege os direitos dos artistas e luta para garantir uma compensa&#231;&#227;o justa pelos seus trabalhos</em>&#8221;.</p><p>A empresa de seguran&#231;a SentinelOne detalhou as atividades do NullBulge, apontando que suas a&#231;&#245;es contradiziam suas alega&#231;&#245;es de hacktivismo. A SentinelOne analisou como o cibercriminoso atacou entidades relacionadas a IA e jogos com ransomare e outros malwares por meio de c&#243;digo malicioso implantado em plataformas como o GitHub e Hugging Face.</p><p>O malware distribu&#237;do por Kramer estava disfar&#231;ado de ferramenta que cria arte gerada por IA. Na realidade, ele implantava um malware que permitia ao hacker obter acesso ao dispositivo da v&#237;tima.</p><p>No caso da Disney, um funcion&#225;rio tinha baixado a ferramenta falsa de IA em seu computador pessoal. As credenciais armazenadas no dispositivo comprometido permitiram que Kramer obtivesse acesso &#224; conta do Slack usada pelo funcion&#225;rio como parte de seu trabalho na Disney. Isso permitiu que o NullBulge roubasse grandes quantidades de informa&#231;&#245;es de milhares de canais do Slack operados pela Disney.</p><p>O Departamento de Justi&#231;a afirmou que Kramer &#8212; que alegou representar o grupo hacktivista NullBulge, supostamente sediado na R&#250;ssia &#8212; tentou extorquir o funcion&#225;rio da Disney. Como o funcion&#225;rio n&#227;o respondeu, Kramer vazou suas informa&#231;&#245;es pessoais, juntamente com os arquivos roubados da Disney.</p><p>Parece que a Disney decidiu parar de usar o Slack para comunica&#231;&#227;o interna ap&#243;s o vazamento de dados. </p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/">https://www.securityweek.com/man-admits-hacking-disney-and-leaking-data-disguised-as-hacktivist/</a></p>]]></content:encoded></item><item><title><![CDATA[Ransomware: Conheça 10 ferramentas para descriptrografia de arquivos infectados]]></title><description><![CDATA[Conhe&#231;a algumas ferramentas que podem te ajudar a descriptografar/recuperar arquivos infectados com ransomware.]]></description><link>https://www.canalhacker.com.br/p/ransomware-conheca-10-ferramentas</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ransomware-conheca-10-ferramentas</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 23 Apr 2025 14:21:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BLN6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BLN6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BLN6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 424w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 848w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BLN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png" width="1456" height="808" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:808,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:686854,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160780065?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BLN6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 424w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 848w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!BLN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb658681-2233-4fd4-af6d-4695a2fcb1de_1920x1066.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://flowti.com.br/blog/ransomware-5-maneiras-de-evitar-o-furto-dos-dados-de-sua-empresa</figcaption></figure></div><p>Em tempos de infec&#231;&#245;es por ransomware e pedidos de resgates assolarem empresas de v&#225;rios segmentos, as ferramentas de descriptografia de arquivos infectados v&#234;m a calhar, na tentativa de recuperar dados criptografados sem a necessidade das v&#237;timas pagarem resgates.</p><p>Essas ferramentas ajudam as empresas a recuperar o acesso aos seus arquivos, por meio de chaves de descriptografia ou algor&#237;tmos que desbloqueio dados criptografados.</p><h3>Os projetos</h3><p>O projeto <strong>No More Ransomware</strong> &#233; um esfor&#231;o colaborativo que oferece uma ampla gama de &#8220;descriptografadores&#8221; (utilizaremos o termo <em>decryptor</em>) para mais de 100 cepas de ransomware. A Kaspersky, por exemplo, fornece ferramentas espec&#237;ficas como o Rakhni Decryptor, que tem como alvo diversas variantes de ransomware.</p><p>O <strong>Ransomware File Decryptor</strong> da Trend Micro suporta v&#225;rios tipos de ransomware, incluindo o WannaCry e Petya. J</p><p>O <strong>Ransomware File Decryptor</strong> da Trend Micro suporta v&#225;rios tipos de ransomware, incluindo WannaCry e Petya. A <strong>AVG</strong> oferece ferramentas para cepas espec&#237;ficas como Apocalypse e TeslaCrypt.</p><p>A <strong>Emsisoft</strong> fornece uma biblioteca de descriptografadores para v&#225;rios tipos de ransomware, incluindo Apocalypse e Xorist. A <strong>Avast</strong> tamb&#233;m oferece um conjunto de ferramentas de descriptografia para in&#250;meras variantes de ransomware. Essas ferramentas s&#227;o continuamente atualizadas para combater amea&#231;as de ransomware em evolu&#231;&#227;o.</p><p>Eles geralmente exigem a identifica&#231;&#227;o da cepa espec&#237;fica de ransomware para aplicar o m&#233;todo de descriptografia correto. Embora eficazes, essas ferramentas n&#227;o garantem a recupera&#231;&#227;o completa dos dados.</p><p>Atualiza&#231;&#245;es regulares s&#227;o cruciais conforme novas cepas de ransomware surgem. Os usu&#225;rios devem sempre verificar a compatibilidade e seguir as instru&#231;&#245;es cuidadosamente para garantir uma descriptografia bem-sucedida.</p><p>Aqui est&#227;o nossas escolhas para as 10 melhores ferramentas de descriptografia de arquivos de ransomware e seus recursos:</p><ol><li><p><strong><a href="https://support.kaspersky.com/common/disinfection/10556">Kaspersky Rakhni Decryptor</a></strong>: descriptografador especializado para o Rakhni, Agent. iih e outras fam&#237;lias de ransomware.</p></li><li><p><strong><a href="https://www.emsisoft.com/en/ransomware-decryption/">Ferramenta de descriptografia de ransomware Emsisoft</a></strong>: ferramenta abrangente que oferece suporte a diversas variantes de ransomware para uma descriptografia mais eficiente.</p></li><li><p><strong><a href="https://www.mcafee.com/">McAfee Ransomware Recover</a></strong>: ferramenta de recupera&#231;&#227;o eficaz para v&#225;rios tipos de ransomware com uma interface f&#225;cil de usar.</p></li><li><p><strong><a href="https://blog.360totalsecurity.com/en/ransomware-decryption-tool-petya-wannacry-released/">360 Ransomware</a></strong>: ferramenta gratuita que oferece descriptografia para v&#225;rios tipos de ransomware com atualiza&#231;&#245;es regulares.</p></li><li><p><strong><a href="https://www.avg.com/en-in/ransomware-decryption-tools#pc">Ferramenta de descriptografia de ransomware AVG</a></strong>: descriptografia f&#225;cil de usar para tipos comuns de ransomware, garantindo a recupera&#231;&#227;o de arquivos.</p></li><li><p><strong><a href="https://success.trendmicro.com/en-US/solution/KA-0006362">Trend Micro Ransomware File Decryptor</a></strong>: solu&#231;&#227;o robusta para descriptografar arquivos afetados por v&#225;rias cepas de ransomware.</p></li><li><p><strong><a href="https://www.nomoreransom.org/en/index.html">Projeto No More Ransomware</a></strong> : iniciativa colaborativa que fornece ferramentas de descriptografia gratuitas para muitas variantes de ransomware.</p></li><li><p><strong><a href="https://www.talosintelligence.com/pylocky">Ferramenta de descriptografia de arquivos PyLocky Ransomware</a></strong>: Esta &#233; uma ferramenta espec&#237;fica para descriptografar arquivos criptografados pelo ransomware PyLocky.</p></li><li><p><strong><a href="https://github.com/hasherezade/petya_key">Ferramenta de descriptografia do ransomware Petya</a></strong>: ferramenta dedicada para descriptografar arquivos afetados pelo ransomware Petya.</p></li><li><p><strong><a href="https://www.emsisoft.com/en/ransomware-decryption/pclock">Ferramenta de descriptografia CryptoLocker</a></strong>: ferramenta eficiente para descriptografar arquivos bloqueados pelo ransomware CryptoLocker.</p></li></ol><p>Veja mais detalhes sobre cada umas das ferramentas:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/866nX/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04081ae6-1888-441c-9ed3-87915ff61096_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:1263,&quot;title&quot;:&quot;10 Ferramentas de Descriptografia de Arquivos de Ransomware&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/866nX/1/" width="730" height="1263" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><p>O que achou do post?</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://cybersecuritynews.com/ransomware-file-decryptor-tools/">https://cybersecuritynews.com/ransomware-file-decryptor-tools/</a></p>]]></content:encoded></item><item><title><![CDATA[Oracle: empresa confirma hacking no Oracle Cloud]]></title><description><![CDATA[Empresa est&#225; informando de forma privada os clientes que alguns de seus sistemas de nuvem foram hackeados e aparentemente est&#225; tentando minimizar o impacto do incidente.]]></description><link>https://www.canalhacker.com.br/p/oracle-empresa-confirma-hacking-no</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/oracle-empresa-confirma-hacking-no</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 04 Apr 2025 15:53:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!51fn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!51fn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!51fn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 424w, https://substackcdn.com/image/fetch/$s_!51fn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 848w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1272w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!51fn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:87942,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160580597?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!51fn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 424w, https://substackcdn.com/image/fetch/$s_!51fn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 848w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1272w, https://substackcdn.com/image/fetch/$s_!51fn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee747be2-7aeb-41a7-9137-c3c08d5c2136_1600x800.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/</figcaption></figure></div><p>Recentemente, um hacker sob o codinome &#8220;rose87168&#8221; esteve vendendo informa&#231;&#245;es possivelmente associadas a mais de 140 mil clientes do Oracle Cloud, incluindo credenciais criptografadas. O hacker inicialmente esperava extorquir cerca de 20 milh&#245;es de d&#243;lares da Oracle, mas come&#231;ou a oferecer os dados para qualquer um ou troc&#225;-los por <a href="https://acaditi.com.br/o-que-e-um-ataque-de-dia-zero-ou-zero-day-exploit/">exploits zero-day</a>.</p><p>Ap&#243;s as alega&#231;&#245;es do hacker virem &#224; tona, de que ele estaria de posse de dados da Oracle, a empresa negou categoricamente a invas&#227;o no Oracle Cloud, dizendo que &#8220;<em>n&#227;o houve nenhuma viola&#231;&#227;o de dados. As credenciais publicadas n&#227;o est&#227;o relacionadas ao Oracle Cloud. Nenhum cliente da solu&#231;&#227;o sofreu uma viola&#231;&#227;o ou perdeu dados</em>&#8221;.</p><p>No entanto, o hacker tem compartilhado v&#225;rios tipos de informa&#231;&#245;es para provar suas alega&#231;&#245;es, incluindo uma amostra de 10 mil registros de dados de clientes, um link para um arquivo demonstrando acesso aos sistemas de nuvem da Oracle, credenciais de usu&#225;rio e um longo v&#237;deo que parece ter sido gravado em uma reuni&#227;o interna da Oracle.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8tYZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8tYZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 424w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 848w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1272w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png" width="1024" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8tYZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 424w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 848w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1272w, https://substackcdn.com/image/fetch/$s_!8tYZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2534f7db-c579-495e-9bc3-61e01a011c59_1024x400.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Uma captura de tela do t&#243;pico atualizado de um f&#243;rum conectando ao coment&#225;rio do invasor exibindo uma amostra de dados de 2025 | Cr&#233;ditos da imagem: https://cybelangel.com/oracle-data-leak-breaking-news/</figcaption></figure></div><p>V&#225;rias empresas de seguran&#231;a e sites de not&#237;cias especializados t&#234;m apontado que as informa&#231;&#245;es vazadas pareciam genu&#237;nas e associadas a um ambiente de produ&#231;&#227;o. O site SecurityWeek e outras receberam a confirma&#231;&#227;o de que alguns clientes do Oracle Cloud tiveram seus dados inclu&#237;dos no vazamento.</p><h3>A Oracle notifica alguns clientes sobre a viola&#231;&#227;o de dados</h3><p>Existem v&#225;rios relat&#243;rios independentes da Oracle notificando privadamente os clientes afetados e confirmando que ocorreu uma viola&#231;&#227;o de dados. Por outro lado, os detalhes permanecem obscuros e parecem haver algumas informa&#231;&#245;es conflitantes.</p><p><a href="https://finance.yahoo.com/news/oracle-tells-clients-second-recent-213011742.html">A Bloomberg</a> soube por pessoas familiarizadas com o assunto de que a Oracle come&#231;ou a informar privadamente os clientes sobre uma viola&#231;&#227;o de dados que impactou nomes de usu&#225;rios, chaves de acesso e senhas criptografadas. O FBI e a CrowdStrike est&#227;o investigando o suposto crime.</p><p>De acordo com algumas fontes, a Oracle est&#225; informando aos clientes que o incidente envolveu um ambiente legado que n&#227;o est&#225; em uso h&#225; 8 anos e que as credenciais comprometidas representam pouco risco. Uma fonte diferente disse &#224; publica&#231;&#227;o que algumas das credenciais comprometidas s&#227;o de 2024.</p><h3>Como o ataque ocorreu?</h3><p>A empresa de seguran&#231;a CybelAngel soube de uma fonte n&#227;o identificada que os servidores em nuvem &#8216;Gen 1&#8217; foram afetados (os servidores mais novos, os &#8216;Gen 2&#8217;, n&#227;o foram afetados) e que as informa&#231;&#245;es comprometidas t&#234;m pelo menos 16 meses e n&#227;o incluem detalhes pessoais completos.</p><p>&#8220;Nossa fonte, que n&#227;o estamos nomeando conforme solicitado, est&#225; relatando que a Oracle supostamente identificou um invasor que estava no servi&#231;o de identidade compartilhada j&#225; em janeiro de 2025&#8221;, <a href="https://cybelangel.com/oracle-data-leak-breaking-news/">disse</a> a CybelAngel.</p><p>&#8220;<em>Essa exposi&#231;&#227;o foi facilitada por meio de um exploit Java de 2020 e o hacker conseguiu instalar um webshell junto com um malware, que tinha como alvo espec&#237;fico o banco de dados Oracle IDM, conseguindo exfiltrar dados. A Oracle supostamente tomou conhecimento de uma potencial viola&#231;&#227;o de dados no final de fevereiro e investigou esse problema internamente</em>&#8221;, acrescentou. &#8220;<em>Em poucos dias, a Oracle aparentemente conseguiu remover a amea&#231;a quando a primeira demanda por resgate foi feita no in&#237;cio de mar&#231;o</em>&#8221;.</p><p>O hacker afirma que informa&#231;&#245;es de 2025 tamb&#233;m foram comprometidas.</p><h3><strong>O ataque realmente ocorreu?</strong></h3><p>O pesquisador de seguran&#231;a cibern&#233;tica Kevin Beaumont, que acompanha a hist&#243;ria, soube de clientes da nuvem da Oracle que as notifica&#231;&#245;es da empresa foram apenas verbais, que n&#227;o h&#225; notifica&#231;&#245;es por escrito.</p><p>&#8220;<em>A Oracle esta tentando fazer declara&#231;&#245;es sobre o Oracle Cloud e usar palavras muito espec&#237;ficas para evitar responsabilidade. Isso n&#227;o est&#225; certo. A Oracle precisa falar clara, aberta e publicamente o que ocorreu, como isso impacta os clientes e o que eles est&#227;o fazendo sobre isso</em>&#8221;, <a href="https://doublepulsar.com/oracle-attempt-to-hide-serious-cybersecurity-incident-from-customers-in-oracle-saas-service-9231c8daff4a">disse o pesquisador</a>.</p><h3>A vida da Oracle n&#227;o est&#225; f&#225;cil</h3><p>Relatos de um hacking aparentemente n&#227;o relacionado com o Oracle Health tamb&#233;m t&#234;m circulados nos &#250;ltimos dias. <a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/">De acordo com o site Bleeping Computer</a>, as informa&#231;&#245;es de pacientes de v&#225;rias organiza&#231;&#245;es de sa&#250;de dos EUA foram comprometidas naquele incidente.</p><h3>Conclus&#227;o?</h3><p>Realmente a Oracle confirmou que houve um hacking em seus sistemas de nuvem, mas n&#227;o ficou claro 100% se ele ocorreu em tempos atuais, por mais que possam existir alguns relatos do hacking ser de 2025.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://www.securityweek.com/oracle-confirms-cloud-hack/">https://www.securityweek.com/oracle-confirms-cloud-hack/</a></p>]]></content:encoded></item><item><title><![CDATA[Mais de 20.000 sites WordPress estão vulneráveis a exploits de upload e exclusão de arquivos ]]></title><description><![CDATA[Um alerta de seguran&#231;a cr&#237;tico foi emitido para administradores de sites Wordpress ap&#243;s a descoberta de duas vulnerabilidades de alta gravidade no plugin &#8220;WP Ultimate CSV Importer&#8221;.]]></description><link>https://www.canalhacker.com.br/p/mais-de-20000-sites-wordpress-estao</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/mais-de-20000-sites-wordpress-estao</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 02 Apr 2025 14:50:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gy3b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gy3b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gy3b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:167268,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160420480?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gy3b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gy3b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cf667eb-2990-48d2-8761-0e10fd7f7101_1920x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://bacsoftwareconsulting.com/wordpress-cat/4-effective-wordpress-techniques-for-better-security/</figcaption></figure></div><p>Um alerta de seguran&#231;a cr&#237;tico foi emitido para administradores de sites Wordpress ap&#243;s a descoberta de duas vulnerabilidades de alta gravidade no plugin &#8220;WP Ultimate CSV Importer&#8221;.</p><p>Com mais de 20 mil instala&#231;&#245;es ativas, as falhas no plugin representam um risco significativo para os sites afetados, podendo levar ao controle completo do site pelos invasores.</p><p>Com mais de 20.000 instala&#231;&#245;es ativas, as falhas do plugin representam um risco significativo para os sites afetados, podendo levar &#224; tomada completa do site por invasores.</p><h3>Exploits de upload e exclus&#227;o de arquivos</h3><p>As vulnerabilidades, catalogadas como CVE-2025-2008 e CVE-2025-2007, foram divulgadas de forma &#233;tica em mar&#231;o de 2025 pelo pesquisador de seguran&#231;a &#8220;mikemyers&#8221; atrav&#233;s do <em>Wordfence Bug Bounty Program</em>:</p><p><strong>CVE-2025-2008: Upload de arquivo arbitr&#225;rio</strong></p><p>A funcionalidade de importa&#231;&#227;o do plugin n&#227;o tinha possu&#237;a uma valida&#231;&#227;o adequada do tipo de arquivo, permitindo que invasores autenticados com acesso de n&#237;vel de assistente ou superior, carregassem arquivos de forma arbitr&#225;ria, incluindo scripts PHP (e tem gente falando que o PHP morreu) maliciosos. O c&#243;digo carregado poderia ent&#227;o ser executado para se obter controle remoto do servidor onde o site estaria hospedado.</p><p><strong>CVE-2025-2007: Exclus&#227;o arbitr&#225;ria de arquivo</strong></p><p>Um erro na fun&#231;&#227;o de exclus&#227;o de arquivo do plugin permitiu que invasores exclu&#237;ssem qualquer arquivo no servidor, como o arquivo cr&#237;tico wp-config.php. A exclus&#227;o deste arquivo for&#231;a o site a retornar a um estado de configura&#231;&#227;o do zero, potencialmente permitindo que invasores redirecionem o site para um banco de dados sob seu controle para explora&#231;&#227;o posterior.</p><p>Ambas as vulnerabilidades receberam altas pontua&#231;&#245;es CVSS, de 8.8 e 8.1, respectivamente, refletindo o s&#233;rio risco que representam.</p><h3>Corre&#231;&#227;o das vulnerabilidades</h3><p>Ap&#243;s a notifica&#231;&#227;o das vulnerabilidades em 5 de mar&#231;o deste ano, a criadora do plugin, a Smackcoders, agiu prontamente. Ap&#243;s uma colabora&#231;&#227;o com o time do Wordfence, uma vers&#227;o corrigida (7.19.1) foi lan&#231;ada em 25 de mar&#231;o deste ano.</p><p>Usu&#225;rios do Wordfence com plugins de seguran&#231;a ativos, est&#227;o protegidos desde a divulga&#231;&#227;o das vulnerabilidades, mas atualiza&#231;&#245;es gerais continuam sendo essenciais.</p><h3>Usu&#225;rios e administradores precisam atualizar o plugin para a vers&#227;o corrigida</h3><p>Todos os usu&#225;rios do plugin <em>WP Ultimate CSV Importer</em> devem atualizar imediatamente para a vers&#227;o 7.19.1 ou superior.</p><p>Os administradores devem garantir que seus sites n&#227;o est&#227;o executando vers&#245;es vulner&#225;veis, pois essas explora&#231;&#245;es podem levar a resultados s&#233;rios, desde viola&#231;&#245;es de dados at&#233; a invas&#227;o dos sites.</p><p>A descoberta dessas e outras vulnerabilidades destaca a necessidade cont&#237;nua de vigil&#226;ncia na manuten&#231;&#227;o da seguran&#231;a de sites WordPress. N&#227;o basta apenas colocar um site em opera&#231;&#227;o e n&#227;o se preocupar com a seguran&#231;a dele.</p><h3><strong>Dica do Canal Hacker</strong></h3><p>Empresas que possuem sites funcionando sob o WordPress precisam saber o que est&#225; &#8220;rolando debaixo do cap&#244;&#8221;. Muitas instala&#231;&#245;es s&#227;o mantidas por empresas de marketing e desenvolvimento de sites, onde muitas delas, acabam n&#227;o se preocupando com a seguran&#231;a dos sites desenvolvidos, em manter os plugins atualizados sempre, etc. Sendo o caso, converse com a sua ag&#234;ncia para que o melhor seja feito.</p><p>De qualquer forma, caso a empresa em que trabalha ou uma ag&#234;ncia, seja a respons&#225;vel direta por manter a estrutura do site, pense ent&#227;o na seguran&#231;a. Mas tamb&#233;m n&#227;o saia atualizando plugin &#8220;&#224; torto e &#224; direita&#8221;. Converse com os desenvolvedores do seu site e explique a necessidade de atualizar o plugin, para que seja validado a necessidade de recodifica&#231;&#227;o da aplica&#231;&#227;o, de forma que se  adeque &#224; nova vers&#227;o do plugin.</p><p>Sendo a sua empresa ou uma ag&#234;ncia, respons&#225;vel por manter a estrutura e desenvolvimento site, &#233; a imagem da empresa que est&#225; em jogo. Realize varreduras recorrentes para saber se est&#225; vulner&#225;vel ou n&#227;o.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://gbhackers.com/20000-wordpress-sites-at-risk/">https://gbhackers.com/20000-wordpress-sites-at-risk/</a></p>]]></content:encoded></item><item><title><![CDATA[Google traz criptografia de ponta a ponta para usuários do Gmail corporativo]]></title><description><![CDATA[Novo recurso permitir&#225; em breve que usu&#225;rios do Gmail corporativo enviem e-mails protegidos pela criptografia de ponta a ponta.]]></description><link>https://www.canalhacker.com.br/p/google-traz-criptografia-de-ponta</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/google-traz-criptografia-de-ponta</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 02 Apr 2025 13:19:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lESo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lESo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lESo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lESo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lESo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg" width="1456" height="730" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:730,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:27158,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/160414853?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lESo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lESo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lESo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30bd580f-8a82-44f2-ae95-7442892fb7af_1920x962.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://pt.wallpapers.com/fundo/acesseo-gmail-e-mantenha-se-conectado-sgjoz4gzf6l52cc8.html</figcaption></figure></div><p>Ainda em fase de testes, o recurso permitir&#225; em breve que usu&#225;rios corporativos do Gmail enviem e-mails com <a href="https://www.cloudflare.com/pt-br/learning/privacy/what-is-end-to-end-encryption/">Criptografia de Ponta a Ponta</a> (E2EE/End-to-End Encryption) para qualquer caixa de entrada de contas Gmail, e depois, para qualquer caixa de entrada, at&#233; o final do ano.</p><p>Esta &#233; uma medida de seguran&#231;a aprimorada, uma alternativa ao protocolo <em>Secure/Multipurpose Internet Mail Extensions</em> (S/MIME), que requer o aquisi&#231;&#227;o, o gerenciamento e a implementa&#231;&#227;o de certificados por usu&#225;rio para ser utilizado.</p><p>No modelo S/MIME &#8220;<em>os usu&#225;rios finais precisam descobrir se eles e os destinat&#225;rios possuem o S/MIME configurado (poucos t&#234;m), e ent&#227;o, passar pelo trabalho de trocar certificados antes que os e-mails criptografados possam ser trocados</em>&#8221;, observa o Google.</p><h3>Como a nova abordagem vai funcionar com o E2EE?</h3><p>O Google diz que a nova abordagem simplifica significativamente as coisas ao permitir o uso do E2EE para qualquer mensagem, independentemente do destinat&#225;rio, por meio de chaves de criptografias controladas pela organiza&#231;&#227;o, sem a necessidade de investimento em recursos adicionais, como a configura&#231;&#227;o de S/MIME ou o gerenciamento de certificados.</p><p>As mensagens enviadas para caixas de entrada do Gmail s&#227;o automaticamente descriptografadas e disponibilizadas aos destinat&#225;rios. Se enviadas para um servi&#231;o de e-mail diferente, o destinat&#225;rio receber&#225; um convite para visualizar a mensagem em uma vers&#227;o restrita do Gmail e ter&#225; a op&#231;&#227;o de usar uma conta de convidado do Google Workspace para interagir com ela.</p><p>Caso o servi&#231;o de e-mail do destinat&#225;rio possua o S/MIME configurado, o Gmail entregar&#225; a mensagem E2EE usando este protocolo.</p><p>&#8220;<em>Os times de TI tamb&#233;m t&#234;m a op&#231;&#227;o de exigir que todos os destinat&#225;rios externos (mesmo sendo usu&#225;rios do Gmail) usem a vers&#227;o restrita do Gmail Workspace. Isso ajuda a garantir que os dados da organiza&#231;&#227;o n&#227;o sejam armazenados em servidores e dispositivos de terceiros</em>&#8221;, explica o Google.</p><p>O novo recurso, diz o Google, aproveita a criptografia no lado do cliente (CSE), um controle t&#233;cnico do Workspace que permite que as organiza&#231;&#245;es protejam e-mails, documentos e outros recursos usando chaves de criptografia que elas controlam e armazenam fora infraestrutura do Google.</p><p>&#8220;<em>Os dados s&#227;o criptografados no cliente antes de serem transmitidos ou armazenados na nuvem do Google, tornando-os indecifr&#225;veis para a pr&#243;pria Google e outras entidades terceirizadas e ajudando a atender requisitos regulat&#243;rios, como a soberania dos dados, HIPAA e controles de exporta&#231;&#227;o</em>&#8221;, explica o Google.</p><p>Na ter&#231;a-feira, dia 1 de abril, o Google tamb&#233;m anunciou a disponibilidade geral de v&#225;rios recursos de seguran&#231;a no Gmail, incluindo o modo padr&#227;o CSE, preven&#231;&#227;o contra perda de dados (DLP), r&#243;tulos de classifica&#231;&#227;o de mensagens e um novo modelo de IA para prote&#231;&#227;o contra amea&#231;as.</p><p>O que achou do post?</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/">https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/</a></p>]]></content:encoded></item><item><title><![CDATA[A ferramenta Cellebrite e o seu uso ético (ou nem tanto)]]></title><description><![CDATA[At&#233; que ponto vai o uso de ferramentas por governos, autoridades e empresas, para hackear dispositivos m&#243;veis em detrimento de um objetivo, onde em alguns casos, beira em quest&#245;es n&#227;o t&#227;o &#233;ticas?]]></description><link>https://www.canalhacker.com.br/p/a-ferramenta-cellebrite-e-o-seu-uso</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/a-ferramenta-cellebrite-e-o-seu-uso</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 01 Apr 2025 19:06:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!g6TT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g6TT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g6TT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g6TT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3396787,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g6TT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g6TT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323122d1-4d34-45a9-9a46-3223ad95b5cb_5472x3648.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://sg.finance.yahoo.com/news/cellebrite-suspends-serbia-customer-claims-155531518.html</figcaption></figure></div><p>Muito se falou sobre a Cellebrite, ferramenta utilizada para ajudar na solu&#231;&#227;o do caso Vit&#243;ria (leia <strong><a href="https://www.terra.com.br/diversao/gente/o-que-e-software-cellebrite-entenda-sistema-utilizado-para-solucionar-o-caso-vitoria,ac13a3ecd5b2f8587673e0d0256eaa8816enykwc.html">esta</a></strong> e <strong><a href="https://www.cnnbrasil.com.br/nacional/caso-vitoria-entenda-como-software-extrai-dados-de-celular/">esta outra not&#237;cia</a></strong> para saber mais).</p><p>A Cellebrite &#233; uma tecnologia de ponta utilizada por v&#225;rios governos e empresas do mundo inteiro. Existem vers&#245;es de software e de hardware, como o UFED 4PC, UFED Touch3 Ruggedized Tablet, UFED Ruggedized Laptop e o <a href="https://cellebrite.com/wp-content/uploads/2020/09/ProductOverview_ForensicWorkstation_A4_web.pdf">Cellebrite Forensic Workstation</a> (esta&#231;&#227;o forense de alto desempenho). Maiores informa&#231;&#245;es <a href="https://cellebrite.com/en/ufed/">aqui</a> e <a href="https://cellebrite.com/wp-content/uploads/2020/09/ProductOverview_ForensicWorkstation_A4_web.pdf">aqui</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v6Wn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v6Wn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 424w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 848w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1272w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png" width="612" height="340" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:340,&quot;width&quot;:612,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169651,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v6Wn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 424w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 848w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1272w, https://substackcdn.com/image/fetch/$s_!v6Wn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f60aa6a-05a8-40d9-b93c-9f292bd2db55_612x340.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cellebrite UFED | Cr&#233;ditos: https://cellebrite.com/wp-content/uploads/2022/11/Solution_Overview_Cellebrite_UFED_LTR.pdf</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NBFI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NBFI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 424w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 848w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1272w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NBFI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png" width="218" height="414.3901665344964" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2397,&quot;width&quot;:1261,&quot;resizeWidth&quot;:218,&quot;bytes&quot;:899758,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NBFI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 424w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 848w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1272w, https://substackcdn.com/image/fetch/$s_!NBFI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F71e63e30-638c-4e70-a99e-48dacaf366eb_1261x2397.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cellebrite Forensic Workstation | Cr&#233;ditos: https://cellebrite.com/wp-content/uploads/2020/09/ProductOverview_ForensicWorkstation_A4_web.pdf</figcaption></figure></div><p>&#201; de grande notoriedade os benef&#237;cios que estas solu&#231;&#245;es da Cellebrite trazem na solu&#231;&#227;o de crimes, seja em governos ou do setor privado. Mas nem tudo s&#227;o flores quando determinados governos/autoridades e empresas utilizam ferramentas para determinados fins, se &#233; que me entendem.</p><div class="pullquote"><p><strong>DISCLAIMER : N&#227;o estou aqui para fazer acusa&#231;&#227;o alguma (e muito menos defendendo criminosos), apenas para reproduzir not&#237;cias de forma que o leitor entenda e tamb&#233;m tecer coment&#225;rios pertinentes sobre o tema, ok? Tudo o que eu falar aqui coloque sempre a palavra SUPOSTAMENTE na frente de qualquer frase.</strong></p></div><h3><strong>Autoridades usam spyware e ferramenta de extra&#231;&#227;o forense da Cellebrite para hackear jornalistas e ativistas</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nhVy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nhVy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 424w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 848w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1272w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nhVy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp" width="1456" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:339116,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nhVy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 424w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 848w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1272w, https://substackcdn.com/image/fetch/$s_!nhVy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42fa2e6b-9023-44c7-9a46-33905aff27e6_1468x710.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/</figcaption></figure></div><p><a href="https://www.amnesty.org/en/documents/eur70/8813/2024/en/">Em um relat&#243;rio</a> publicado do site da Anistia Internacional, em dezembro de 2024, intitulado &#8220;<em>Serbia: &#8220;A Digital Prison&#8221;: Surveillance and the suppression of civil society in Serbia</em>&#8221;, relata como produtos forenses de telefonia m&#243;vel desenvolvidos pela empresa israelense Cellebrite seriam usados para  extrair dados de dispositivos m&#243;veis pertencentes a jornalistas e ativistas. </p><p>O relat&#243;rio tamb&#233;m revela como a pol&#237;cia s&#233;rvia e a <a href="https://www.bia.gov.rs/">Ag&#234;ncia de Seguran&#231;a e Informa&#231;&#227;o</a> (Bezbedonosno-informativna Agencija &#8211; BIA) do pa&#237;s utilizou um spyware personalizado para o Android, o NoviSpy, para infectar secretamente dispositivos de indiv&#237;duos durante per&#237;odos de deten&#231;&#227;o ou em abordagens policiais.</p><h4>Como a Cellebrite e o NoviSpy foram usados para comprometer estes dispositivos?</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!czzr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!czzr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 424w, https://substackcdn.com/image/fetch/$s_!czzr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 848w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!czzr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:104446,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!czzr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 424w, https://substackcdn.com/image/fetch/$s_!czzr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 848w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!czzr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd88e01a7-4933-47c7-b153-62abd6dbd9a4_1900x1140.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.theguardian.com/world/2024/dec/16/serbian-authorities-using-spyware-to-illegally-surveil-activists-report-finds </figcaption></figure></div><p>O NoviSpy pode capturar dados confidenciais de um telefone e fornecer recursos, como ligar o microfone ou a c&#226;mera de um telefone remotamente enquanto as ferramentas forenses da Cellebrite foram usadas para desbloquear o telefone antes da infec&#231;&#227;o por spyware e tamb&#233;m permitir a extra&#231;&#227;o de dados do dispositivo.</p><p>Em pelo menos dois casos, a Anistia Internacional teria descoberto evid&#234;ncias de que exploits (software que tira vantagem de uma vulnerabilidade do dispositivo alvo) da Cellebrite UFED teriam sido usados para contornar mecanismos de seguran&#231;a de dispositivos Android, permitindo que as autoridades instalassem secretamente o NoviSpy durante abordagens policiais, por exemplo.</p><p>Em fevereiro de 2024, o jornalista investigativo s&#233;rvio Slavi&#353;a Milanov foi preso e detido pela pol&#237;cia sob o pretexto de realizarem um teste de baf&#244;metro. Enquanto estava detido, Slavi&#353;a foi interrogado por policiais &#224; paisana onde questionavam sobre seu trabalho jornal&#237;stico. Seu telefone Android estava desligado quando o havia entregue &#224; pol&#237;cia e nenhum momento ele foi questionado e nem precisou fornecer uma senha. Ap&#243;s sua libera&#231;&#227;o, Slavi&#353;a percebeu que seu telefone parecia ter sido adulterado e os dados de seu telefone coletados.</p><p>Ele solicitou que o Laborat&#243;rio de Seguran&#231;a da Anistia Internacional conduzisse um an&#225;lise forense em seu telefone - um Xiaomi Redmi Note 10S. A per&#237;cia revelou que a solu&#231;&#227;o UFED da Cellebrite havia sido usada para desbloquear secretamente o telefone de Slavi&#353;a  durante sua deten&#231;&#227;o.</p><p>Um segundo caso no relat&#243;rio, envolvendo um ativista ambiental, Nikola Risti&#263;, encontrou evid&#234;ncias forenses semelhantes de produtos da Cellebrite usados para desbloquear um dispositivo para ent&#227;o permitir a infec&#231;&#227;o seguinte pelo NoviSpy.</p><blockquote><p>Em fevereiro deste ano, o site da Anistia Internacional <a href="https://www.amnesty.org/en/latest/news/2025/02/cellebrite-halts-product-use-in-serbia-following-amnesty-surveillance-report/">publicou uma mat&#233;ria</a> comentando sobre a Cellebrite ter interrompido o uso de produtos na S&#233;rvia ap&#243;s o relat&#243;rio emitido pela Anistia em dezembro/2024.</p></blockquote><h4>Detalhes sobre o NoviSpy</h4><p>O NoviSpy foi projetado para coletar v&#225;rios tipos de informa&#231;&#245;es de telefone comprometidos, incluindo capturas de tela de todas as a&#231;&#245;es no dispositivos, geolocaliza&#231;&#227;o dos alvos, grava&#231;&#245;es de &#225;udio e microfone, arquivos e fotos. Ele &#233; instalado por meio do Android Debug Bridge (<a href="https://developer.android.com/tools/adb">adb</a>) e &#233; composto por dois aplicativos:</p><ul><li><p><strong>NoviSpayAdmin (com.serv.services)</strong>: solicita permiss&#245;es extensas para coletar registros de chamadas, mensagens SMS, listas de contatos e para gravar &#225;udio pelo microfone</p></li><li><p><strong>NoviSpyAccess (com.accesibilityservice)</strong>: tira proveito dos <a href="https://developer.android.com/reference/android/accessibilityservice/AccessibilityService">servi&#231;os de acessibilidade</a> do Android para coletar furtivamente prints de tela, contas de e-mail e aplicativos de mensagens como o Signal e WhatsApp, exfiltrar arquivos, rastrear a localiza&#231;&#227;o e ativar a c&#226;mera</p></li></ul><div class="pullquote"><p>No que diz respeito &#224; veracidade das informa&#231;&#245;es encontradas, pensando que elas podem ser manipuladas previamente, at&#233; que ponto uma investiga&#231;&#227;o n&#227;o seria comprometida? Teria validade judicial?</p></div><h3>Ferramenta forense da Cellebrite poderia conter falhas de seguran&#231;a que permitiriam a execu&#231;&#227;o arbitr&#225;ria de comandos na pr&#243;pria ferramenta?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cJrX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cJrX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 424w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 848w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1272w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cJrX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp" width="640" height="396" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:396,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:236046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cJrX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 424w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 848w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1272w, https://substackcdn.com/image/fetch/$s_!cJrX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F218f1c1d-3e4e-4c8a-8ae0-1888e5d903be_640x396.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html</figcaption></figure></div><p>Moxie Marlinspike, criador do popular aplicativo de mensagens criptografadas Signal, anunciou em <a href="https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html">um post de abril de 2021, no site Security Affairs</a>, que as ferramentas forenses da Cellebrite s&#227;o afetadas por diversas vulnerabilidades que podem ser exploradas para se conseguir execu&#231;&#227;o arbitr&#225;ria de c&#243;digo no alvo.</p><p>Em dezembro de 2020, a Cellebrite <a href="https://cellebrite.com/en/cellebrites-new-solution-for-decrypting-the-signal-app/">anunciou em sua p&#225;gina</a> que a ferramenta <a href="https://cellebrite.com/en/physical-analyzer/">Physical Analyzer</a> seria capaz de descriptografar mensagens e dados do aplicativo de mensagens Signal.</p><p>Moxie destacou que &#8220;<em>os dados que o software da Cellebrite precisa extrair e exibir s&#227;o, em &#250;ltima an&#225;lise, gerados e controlados pelos aplicativos no dispositivo, n&#227;o por uma fonte &#8220;confi&#225;vel&#8221;, ent&#227;o a Cellebrite n&#227;o pode fazer nenhuma suposi&#231;&#227;o sobre a confiabilidade dos dados que est&#225; recebendo. Este &#233; o espa&#231;o em que virtualmente todas as vulnerabilidades de seguran&#231;a podem surgir</em>&#8221;, diz a <a href="https://signal.org/blog/cellebrite-vulnerabilities/">postagem</a> publicada pelo criador do Signal. &#8220;<em>Como quase todo c&#243;digo da Cellebrite existe para analisar entradas n&#227;o confi&#225;veis que podem ser formatadas de forma inesperada para explorar corrup&#231;&#227;o de mem&#243;ria ou outras vulnerabilidades no software de an&#225;lise, pode-se esperar que a criadora da ferramenta tenha sido extremamente cautelosa. Olhando para o UFED e o Physical Analyzer, no entanto, ficamos surpresos ao descobrir que muito pouco cuidado parece ser sido dado &#224; seguran&#231;a do pr&#243;prio software. Faltam defesas de mitiga&#231;&#227;o de explora&#231;&#227;o padr&#227;o da ind&#250;stria e muitas oportunidades de explora&#231;&#227;o est&#227;o presentes</em>&#8221;.</p><p>O especialista ainda explicou que a falha poderia ser explorada de v&#225;rias maneiras, bastando incluir um arquivo especialmente formatado, mas in&#243;cuo, em qualquer aplicativo de um dispositivo que, quando analisado pelo software da Cellebrite, poderia acionar a explora&#231;&#227;o.</p><p>Ele detalha: &#8220;<em>ao incluir este arquivo especialmente criado dentro de um dispositivo que ser&#225; analisado pela Cellebrite, &#233; poss&#237;vel executar um c&#243;digo que modifica n&#227;o apenas o relat&#243;rio da ferramenta criado naquela varredura, mas tamb&#233;m em todos os relat&#243;rios gerados anteriormente e no futuro, n&#227;o somente neste, mas em todos os dispositivos. A execu&#231;&#227;o arbitr&#225;ria de comando inclui inserir ou remover textos, e-mails, fotos, contatos, arquivos ou quaisquer outros dados, sem altera&#231;&#245;es detect&#225;veis de registro de data e hora ou de verifica&#231;&#245;es de checksum</em>&#8221;.</p><p>O pesquisador compartilhou <a href="https://signal.org/blog/videos/cellebrite-hacktheplanet.mp4">um video</a> de uma POC do ataque que demonstra como acionar o problema ao analisar arquivos armazenados no dispositivo. O payload usado pelo especialista utiliza a API do MessageBox para Windows para entregar uma mensagem ao usu&#225;rio (pra quem &#233; f&#227; do filme Hackers, de 1995, vai curtir a montagem):</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;d11d8af7-7fb9-4181-a368-c2cf4688e699&quot;,&quot;duration&quot;:null}"></div><p>Moxie tamb&#233;m notou que o instalador do Packet Analyzer inclui pacotes MSI assinados digitalmente pela Apple e aparentemente extra&#237;dos do instalador do iTunes para Windows 12.9.0.167. Ambos os pacotes importam DLLs para permitir que ferramentas forenses extraiam dados de dispositivos iOS.</p><p>&#8220;<em>Parece improv&#225;vel para n&#243;s que a Apple tenha concedido &#224; Cellebrite uma licen&#231;a para redistribuir e incorporar DLLs da Apple em seu pr&#243;prio produto, o que poderia representar um risco legal para a Cellebrite e seus usu&#225;rios</em>&#8221;, conclui o especialista.</p><h3>O que podemos dizer?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6D1d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6D1d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6D1d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:585064,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/159776964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6D1d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D1d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d947dd-bb9f-424d-8e22-5ed1d1308cc5_1920x1280.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://theconversation.com/we-study-mass-surveillance-for-social-control-and-we-see-trump-laying-the-groundwork-to-contain-people-of-color-and-immigrants-221073</figcaption></figure></div><p>A forma de atua&#231;&#227;o de ferramentas como as da Cellebrite, no que diz respeito ao hacking executado em dispositivos alvo, n&#227;o seria novidade e nem nada milagroso. Em muitos casos, at&#233; facilitado pelas fabricantes de dispositivos m&#243;veis, se &#233; que me entende.</p><p>Estas ferramentas exploram vulnerabilidades e conseguem acesso ao dispositivo. &#8220;Simples&#8221; assim. No caso do Cellebrite UFED e Forensic Workstation, que utilizam um hardware dedicado, o sucesso pode ser obtido em menos tempo devido ao poder de processamento do hardware. Junte isso &#224; gama de exploits utilizados, e Voil&#225;: informa&#231;&#245;es podem ser descobertas em pouco tempo.</p><p>Estas ferramentas quando usadas em governos que possuem uma certa veia ditatorial ou de perseguir opositores, ou ainda, o de simplesmente invadir a privacidade de cidad&#227;os honestos, acaba sendo um grande fil&#227;o para a criadora do Cellebrite. &#201; basicamente um contrato bastante &#8220;vantajoso&#8221; $$. </p><p>O lobby dentro de um governo para que x ferramenta seja utilizada &#233; grande e os envolvidos podem se dar bem. Veja <a href="https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/">esta mat&#233;ria</a> no The Intercept (confira a <a href="https://theintercept-com.translate.goog/2022/02/08/cellebrite-phone-hacking-government-agencies/?_x_tr_sl=en&amp;_x_tr_tl=pt&amp;_x_tr_hl=pt-BR&amp;_x_tr_pto=wapp">vers&#227;o traduzida pelo Google Translator</a>), de fevereiro de 2022, onde &#233; relatado o uso em massa desta ferramenta no governo americano.</p><p>No que diz respeito &#224; veracidade das informa&#231;&#245;es encontradas, pensando que elas podem ser manipuladas previamente, at&#233; que ponto uma investiga&#231;&#227;o n&#227;o seria comprometida? Teria validade judicial?</p><p>Como falei no disclaimer, n&#227;o estou aqui pra defender ningu&#233;m, o foco aqui foi, &#233;, e sempre ser&#225;, o de analisar criticamente e parcialmente as poss&#237;veis situa&#231;&#245;es sobre o tema e fazer questionamentos pertinentes.</p><p>Para saber mais sobre poss&#237;veis rela&#231;&#245;es entre a ferramenta, spyware e vulnerabilidades, realize a consulta no Google abaixo:</p><p><a href="https://www.google.com/search?q=%22cellebrite%22+%2B+%22spyware%22+%2B+%22vulnerability%22">https://www.google.com/search?q=%22cellebrite%22+%2B+%22spyware%22+%2B+%22vulnerability%22</a></p><p>O que achou do post?</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html">https://securityaffairs.com/117116/mobile-2/cellebrite-forensics-tool-flaw.html</a></p><p><a href="https://boletimsec.com.br/spyware-novispy-abusa-de-ferramentas-forenses-para-roubar-dados-sensiveis/">https://boletimsec.com.br/spyware-novispy-abusa-de-ferramentas-forenses-para-roubar-dados-sensiveis/</a></p><p><a href="https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/">https://www.amnesty.org/en/latest/news/2024/12/serbia-authorities-using-spyware-and-cellebrite-forensic-extraction-tools-to-hack-journalists-and-activists/</a></p><p><a href="https://thehackernews.com/2024/12/novispy-spyware-installed-on.html">https://thehackernews.com/2024/12/novispy-spyware-installed-on.html</a></p><p><a href="https://www.business-humanrights.org/en/latest-news/cellebrite-products-allegedly-used-to-spy-on-asylum-seekers-in-morocco/">https://www.business-humanrights.org/en/latest-news/cellebrite-products-allegedly-used-to-spy-on-asylum-seekers-in-morocco/</a></p><p><a href="https://www.theguardian.com/world/2023/apr/06/labor-under-pressure-to-ban-use-of-israeli-spyware-in-investigations-of-alleged-welfare">https://www.theguardian.com/world/2023/apr/06/labor-under-pressure-to-ban-use-of-israeli-spyware-in-investigations-of-alleged-welfare</a></p><p><a href="https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/">https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/</a></p>]]></content:encoded></item><item><title><![CDATA[Cibersegurança: Como 'A Arte da Guerra' pode reescrever o cenário atual?]]></title><description><![CDATA[&#8220;A grande vit&#243;ria &#233; aquela que n&#227;o exige batalha&#8221; &#8211; Sun Tzu.]]></description><link>https://www.canalhacker.com.br/p/ciberseguranca-como-a-arte-da-guerra</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/ciberseguranca-como-a-arte-da-guerra</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 11 Mar 2025 15:26:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gNFF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gNFF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gNFF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gNFF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg" width="1280" height="717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:717,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:126232,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gNFF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gNFF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dcf1b8f-1340-4161-8eb4-156154c5d592_1280x717.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.linkedin.com/pulse/system-integration-alcuni-focus-riguardo-la-cyber-security-dhy8f/</figcaption></figure></div><p>&#8220;A grande vit&#243;ria &#233; aquela que n&#227;o exige batalha&#8221; &#8211; Sun Tzu.</p><p>Essas palavras milenares do antigo estrategista militar chin&#234;s Sun Tzu, a que o livro &#8216;A Arte da Guerra&#8217; lhe &#233; atribu&#237;do, s&#227;o muito importantes nos dias atuais, ainda mais quando trazemos para o cen&#225;rio da ciberseguran&#231;a.</p><p>Seguindo a id&#233;ia de Sun Tzu, a melhor defesa &#233; evitar um ataque. Tendo uma arquitetura e abordagem corretas, &#233; poss&#237;vel proteger seu ambiente contra essa corrida armamentista da ciberseguran&#231;a, para que, quando o invasor atacar, voc&#234; simplesmente n&#227;o esteja l&#225;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3zOr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3zOr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3zOr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1751369,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3zOr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!3zOr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01e840c1-77e4-4a0a-9b51-9fff15281cdd_1280x720.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.linkedin.com/pulse/how-can-writings-sun-tzu-applied-modern-security-role-christoph-puppe-kpf9e/</figcaption></figure></div><h4><strong>Pratique a preven&#231;&#227;o de ataques</strong></h4><p>Impedir ataques &#233; um dos tr&#234;s aspectos cr&#237;ticos da seguran&#231;a corporativa, junto com a preven&#231;&#227;o, que garante que as redes e sistemas sejam protegidos contra ataques, e a detec&#231;&#227;o, que identifica anomalias e fornece um meio para responder aos ataques.</p><p>A preven&#231;&#227;o que estamos falando &#233; frequentemente neglicenciada ou inclu&#237;da numa conversa mais generalista de zero-trust (confian&#231;a zero), mas abord&#225;-la no primeiro est&#225;gio do gerenciamento de risco traz imensos benef&#237;cios.</p><p>A melhor maneira de impedir um ataque &#233; garantir que ele nunca aconte&#231;a. Na &#233;poca de Sun Tzu, isso significava priorizar as informa&#231;&#245;es para obter vantagem tanto estrat&#233;gica quanto t&#225;tica. Na defesa cibern&#233;tica moderna, isso se traduz no aproveitamento de todo o poder dos dados, automa&#231;&#227;o e das pol&#237;ticas.</p><p>A maneira mais simples de evitar um ataque &#233; minimizar a superf&#237;cie de ataque. Para fazer isso, voc&#234; precisa:</p><ul><li><p><strong>Eliminar sua superf&#237;cie de ataque externa</strong> migrando para o acesso zero-trust fornecido pela nuvem com um modelo de acesso apenas de sa&#237;da;</p></li><li><p><strong>Reduzir a superf&#237;cie de ataque interna</strong> aproveitando a segmenta&#231;&#227;o de usu&#225;rio para um aplicativo de zero trust para os programas privados;</p></li><li><p><strong>Minimizar a superf&#237;cie de ataque de endpoint individual</strong> protegendo o tr&#225;fego de Internet do usu&#225;rio final;</p></li><li><p><strong>Reduzir a superf&#237;cie de ataque de dados</strong> com controles de SaaS (Software-as-a-Service ou Software como Servi&#231;o), como uma solu&#231;&#227;o de CASB (Cloud Access Security Broker), preven&#231;&#227;o de perda de dados (DLP), dentre outras solu&#231;&#245;es.</p></li></ul><p>A grande vantagem do zero-trust &#233; que cada dispositivo, aplicativo e usu&#225;rio &#233; distinto(a). Encontrar o caminho para um dispositivo n&#227;o permite que voc&#234; veja todo o ambiente, porque nada confia em nada. Se pudermos tornar essas superf&#237;cies de ataque furtivas individuais, poderemos aumentar ainda mais nosso jogo de seguran&#231;a.</p><h4><strong>Voc&#234; n&#227;o pode atacar o que n&#227;o pode ver</strong></h4><p>Os gateways de VPN tradicionais precisam que uma porta de entrada (um servi&#231;o que est&#225; esperando por conex&#245;es em determinada porta TCP) esteja aberta e que pode ser descoberta por qualquer pessoa na Internet. Conectar um endpoint a uma rede exp&#245;e toda ela (e os endpoints que se conectam a ela) a danos potenciais de ransomware ou de amea&#231;as internas.</p><p>A remo&#231;&#227;o desta porta de entrada elimina o ponto de apoio para o invasor e a conex&#227;o de usu&#225;rios aos sistemas protege a pr&#243;pria rede, bem como os dispositivos dos quais os usu&#225;rios est&#227;o se conectando. Uma solu&#231;&#227;o de &#8220;<strong><a href="https://hostry.com/blog/mighty-securing-your-server-with-port-knocking/?d=1">port-knocking</a></strong>&#8221; pode ser uma das alternativas.</p><p>O antigo m&#233;todo de prote&#231;&#227;o &#8220;<strong><a href="https://www.cloudflare.com/pt-br/learning/access-management/castle-and-moat-network-security/">castle-and-moat</a></strong>&#8221; n&#227;o &#233; mais um modelo de seguran&#231;a vi&#225;vel. Este modelo fala de paredes e barreiras, mas uma vez que algu&#233;m entrou, as pessoas n&#227;o tinham nenhum controle dentro do castelo. No modelo zero-trust, ningu&#233;m sabe onde est&#225; a sua infraestrutura, mesmo quando voc&#234; acompanha visitantes/funcion&#225;rios at&#233; a sua infra, eles apenas t&#234;m acesso &#224; partes da sua infraestrutura que voc&#234; mostrar. O restante da sua infraestrutura estar&#225; completamente oculta.</p><p>Do desenvolvimento &#224; avalia&#231;&#227;o de risco, reduzir a superf&#237;cie de ataque com modernas tecnologias ajudar&#225; a sua empresa a se proteger melhor e permitir&#225; que voc&#234; remova partes da sua infraestrutura desta corrida armamentista de ciberseguran&#231;a.</p><p>Como Sun Tzu tamb&#233;m disse: &#8220;<em>Vencer cem vit&#243;rias em cem batalhas n&#227;o &#233; o auge da habilidade. Vencer o inimigo sem lutar &#233; o auge da habilidade</em>&#8221;.</p><h4><strong>A ciberseguran&#231;a &#233; boa para os neg&#243;cios</strong></h4><p>A seguran&#231;a &#233; frequentemente ligada a coisas negativas, como viola&#231;&#245;es de dados, multas regulat&#243;rias e interrup&#231;&#227;o dos neg&#243;cios. No entanto, as vantagens raramente s&#227;o destacadas. Confira algumas:</p><ul><li><p><strong>Reter clientes mostra engajamento</strong>. Criar uma cultura que prioriza a seguran&#231;a e privacidade dos dados mostra um alto n&#237;vel de responsabilidade social corporativa. As empresas descuidadas com dados pessoais e que sofrem uma invas&#227;o geralmente est&#227;o sujeitas a rea&#231;&#245;es negativas por parte dos consumidores e parceiros de neg&#243;cios. Por outro lado, tomar a iniciativa de evitar ataques melhora a reputa&#231;&#227;o de uma empresa.</p></li><li><p><strong>A conformidade leva a oportunidades de neg&#243;cios</strong>. A maioria das empresas depende de uma rede de parceiros de neg&#243;cios. &#192; medida que as colabora&#231;&#245;es se estendem para a nuvem e redes h&#237;bridas, demonstrar conformidade com a seguran&#231;a torna-se um requisito para fazer neg&#243;cios. Com o crescente n&#250;mero de ataques, as empresas est&#227;o analisando com aten&#231;&#227;o as pr&#225;ticas de seguran&#231;a de potenciais parceiros como um pr&#233;-requisito para fazer neg&#243;cios.</p></li><li><p><strong>A inova&#231;&#227;o supera a inatividade</strong>. As empresas priorizam a inova&#231;&#227;o que impulsiona o crescimento. Pol&#237;ticas &#225;geis de ciberseguran&#231;a podem permitir que as empresas continuem seu trabalho sem interrup&#231;&#227;o, aumentando a receita e os lucros. No entanto, em um <strong><a href="https://web.archive.org/web/20221208002039/https://web.archive.org/web/20211206230145/https://www.newhorizons.com/Portals/278/Downloads/Cybersecurity-as-a-Growth-Advantage-Cisco.pdf">estudo conduzido pela Cisco</a></strong>, 71% dos executivos disseram que as preocupa&#231;&#245;es com a seguran&#231;a cibern&#233;tica impedem a inova&#231;&#227;o em suas empresas. Entre os entrevistados, 39% disseram ter interrompido as iniciativas de miss&#227;o cr&#237;tica devido a problemas de seguran&#231;a cibern&#233;tica. Essas respostas destacam como as vulnerabilidades de seguran&#231;a podem prejudicar a capacidade de uma organiza&#231;&#227;o de inovar.</p></li></ul><p>Com uma simples mudan&#231;a de perspectiva, os l&#237;deres de neg&#243;cios podem abordar a seguran&#231;a no sentido do que ela significa para as oportunidades de neg&#243;cios, permitindo assim uma discuss&#227;o com mais fundamento do que baseada no medo quando chega a hora de definir estrat&#233;gias de seguran&#231;a corporativa.</p><p><strong>Refer&#234;ncias:</strong></p><p><a href="https://www.darkreading.com/attacks-breaches/how-sun-tzu-s-wisdom-can-rewrite-the-rules-of-cybersecurity">https://www.darkreading.com/attacks-breaches/how-sun-tzu-s-wisdom-can-rewrite-the-rules-of-cybersecurity</a></p><p><a href="https://pt.wikipedia.org/wiki/A_Arte_da_Guerra">https://pt.wikipedia.org/wiki/A_Arte_da_Guerra</a></p>]]></content:encoded></item><item><title><![CDATA[GrassCall: Campanha tem como alvo candidatos a empregos para roubar credenciais de login]]></title><description><![CDATA[Cibercriminosos t&#234;m como alvo candidatos que est&#227;o &#224; procura de emprego para implantar malware, e assim, roubar credenciais de acesso das v&#237;timas.]]></description><link>https://www.canalhacker.com.br/p/grasscall-campanha-tem-como-alvo</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/grasscall-campanha-tem-como-alvo</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Wed, 05 Mar 2025 04:55:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lR7x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lR7x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lR7x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 424w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 848w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1272w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lR7x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532840,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.canalhacker.com.br/i/158375302?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lR7x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 424w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 848w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1272w, https://substackcdn.com/image/fetch/$s_!lR7x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb83a8f9f-0079-4271-895d-636082f17d6a_1600x900.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.bleepingcomputer.com/news/security/security-researchers-targeted-with-new-malware-via-job-offers-on-linkedin/</figcaption></figure></div><p>Chamada de <em>GrassCall</em>, uma campanha de ataque cibern&#233;tico recente, atrav&#233;s de entrevistas fake, tem como alvo pessoas que est&#227;o a procura de emprego nos setores de criptomoedas e Web3.</p><p>Atribu&#237;do ao grupo cibercriminoso russo &#8220;<em>Crazy Evil</em>&#8221;, a campanha utiliza an&#250;ncios de vagas fraudulentos em plataformas como <em>LinkedIn</em>, <em>WWellFound </em>e <em>CryptoJobsList </em>para atrair v&#237;timas para baixar software malicioso disfar&#231;ado de aplicativo de videoconfer&#234;ncia.</p><p>O malware foi criado para roubar informa&#231;&#245;es confidenciais, como credenciais de login, carteiras de criptomoeadas e cookies de autentica&#231;&#227;o de dispositivos Windows e macOS.</p><h4><strong>Como funciona o ataque?</strong></h4><p>Os fraudadores criam empresas falsas, como "ChainSeeker.io", contendo informa&#231;&#245;es completas com aquela apar&#234;ncia profissional e ainda perfis em redes sociais.</p><p>Eles anunciam oportunidades de empregos atraentes para cargos como &#8220;<em>Analista de Blockchain</em>&#8221; ou &#8220;<em>Gerente de M&#237;dia Socia</em>l&#8221;. Depois que a v&#237;tima se candidata, &#233; contactada por um falso Diretor de Marketing (CMO) via Telegram.</p><p>O CMO instrui a v&#237;tima para baixar um aplicativo chamado GrassCall de um site falso sob o pretexto de conduzir uma entrevista online.</p><p>Ap&#243;s a instala&#231;&#227;o, o GrassCall implanta um malware adaptado ao sistema operacional da v&#237;tima.</p><p>Para usu&#225;rios do Windows, ele instala <a href="https://seginfo.com.br/2023/12/22/o-que-e-infostealer-e-o-impacto-do-malware-nas-empresas/">infostealers</a>, como o <em>Rhadamanthys </em>ou Trojans de Acesso Remoto (RATs), enquanto que usu&#225;rios do macOS recebem o <em>AMOS Stealer</em>.</p><p>Estes <a href="https://pt.wikipedia.org/wiki/Carga_%C3%BAtil_(computa%C3%A7%C3%A3o)">payloads</a> extraem credenciais armazenadas, dados de carteira de criptomoedas e outras informa&#231;&#245;es de credenciais.</p><p>Os dados roubados geralmente s&#227;o enviados para canais do Telegram, onde s&#227;o monetizados.</p><h4><strong>Amea&#231;as e implica&#231;&#245;es em evolu&#231;&#227;o</strong></h4><p>Relat&#243;rios recentes indicam que o grupo Crazy Evil mudou para uma nova intera&#231;&#227;o desta campanha, agora chamada de <em>VibeCall</em>, que emprega t&#225;ticas semelhantes, mas com cepas de malware atualizadas.</p><p>O foco do grupo em usu&#225;rios de criptomoedas destaca a sofistica&#231;&#227;o crescente do crime cibern&#233;tico com motiva&#231;&#227;o financeira.</p><p>Centenas de pessoas foram v&#237;timas desta campanha, com muitos relatando perdas financeiras significativas ao terem suas carteiras de criptomoedas drenadas.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.canalhacker.com.br/subscribe?&amp;gift=true&quot;,&quot;text&quot;:&quot;Ofere&#231;a uma assinatura de presente&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.canalhacker.com.br/subscribe?&amp;gift=true"><span>Ofere&#231;a uma assinatura de presente</span></a></p><p>Especialistas em seguran&#231;a cibern&#233;tica enfatizam a import&#226;ncia do cuidado ao se candidatar a empregos em setores de alto risco.</p><p>Os usu&#225;rios s&#227;o aconselhados a:</p><ul><li><p>Evitar baixar aplicativos de fontes n&#227;o verificadas.</p></li><li><p>Verificar ofertas de emprego e detalhes da empresa antes de se candidatar</p></li><li><p>Usar ferramentas robustas de prote&#231;&#227;o de endpoint que podem detectar e bloquear infostealers</p></li></ul><p>&#192; medida que cibercriminosos continuam a explorar tecnologias e setores emergentes, as pessoas que est&#227;o &#224; procura de emprego devem permanecer cautelosas e adotar pr&#225;ticas fortes de seguran&#231;a cibern&#233;tica para proteger suas informa&#231;&#245;es pessoais e profissionais.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://gbhackers.com/grasscall-malware-targets-job-seekers/">https://gbhackers.com/grasscall-malware-targets-job-seekers/</a></p>]]></content:encoded></item><item><title><![CDATA[Google lança correção para vulnerabilidade de execução remota de comandos (RCE) no Android]]></title><description><![CDATA[Boletim de Seguran&#231;a do Android do m&#234;s de fevereiro aborda diversas atualiza&#231;&#245;es de seguran&#231;a, como as que corrigem vulnerabilidades de execu&#231;&#227;o remota de comandos e o escalonamento de privil&#233;gios.]]></description><link>https://www.canalhacker.com.br/p/google-lanca-correcao-para-vulnerabilidade</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/google-lanca-correcao-para-vulnerabilidade</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 04 Feb 2025 21:13:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9nWc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9nWc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9nWc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9nWc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:346182,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9nWc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9nWc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1da3ae2f-9198-4143-b900-30d034fc2f37_5000x3333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.forbes.com/sites/daveywinder/2020/03/04/critical-android-security-risk-confirmed-millions-of-devices-can-be-rooted---update-now-if-you-can/</figcaption></figure></div><p>O Google publicou em 3 de fevereiro deste ano, o seu <strong><a href="https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br">Boletim de Seguran&#231;a do Android de fevereiro</a></strong>, que aborda um total de 47 vulnerabilidades que afetam dispositivos rodando o Android.</p><p>Uma das vulnerabilidades cr&#237;ticas afeta um driver chamado <strong><a href="https://en.wikipedia.org/wiki/USB_video_device_class">USB Video Class (UVC)</a></strong> do kernetl Linux e foi catalogada no <strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104</a></strong> com um risco de seguran&#231;a significativo. O UVC trata-se de um padr&#227;o que possibilita a transmiss&#227;o de v&#237;deo por meio da interface USB.</p><p>Esta vulnerabilidade permite que invasores <strong><a href="https://www.cloudflare.com/pt-br/learning/security/what-is-remote-code-execution/">executem c&#243;digo remoto (RCE)</a></strong>, podendo conseguir acesso n&#227;o autorizado de leitura/grava&#231;&#227;o no sistema afetado.</p><h4><strong>Vis&#227;o geral t&#233;cnica da vulnerabilidade</strong></h4><p>A vulnerabilidade em quest&#227;o ocorre pela an&#225;lise inadequada de quadros marcados como <code>UVC_VS_UNDEFINED</code> dentro da fun&#231;&#227;o <code>uvc_parse_format</code> do driver UVC. Isso pode levar a erros de c&#225;lculos dos tamanhos dos buffers, resultando em grava&#231;&#245;es de mem&#243;ria fora dos limites.</p><p>Invasores podem explorar essa falha inserindo dispositivos USB maliciosos ou manipulando fluxos de v&#237;deo, gerando estouros de buffer que substituem regi&#245;es subjacentes da mem&#243;ria. Com isso, podem realizar escaladas de privil&#233;gios locais sem que o sistema exija privil&#233;gios de execu&#231;&#227;o adicionais.</p><p>Mesmo que a vulnerabilidade n&#227;o possa ser explorada diretamente de forma remota, como mencionado, invasores podem tirar proveito falsificando dispositivos USB, o que torna a vulnerabilidade uma amea&#231;a consider&#225;vel &#224; integridade e estabilidade do sistema.</p><h4><strong>Vers&#245;es do Kernel Afetadas</strong></h4><p>A vulnerabilidade afeta todas as vers&#245;es do kernel do Linux, desde a 2.6.26 at&#233; as &#250;ltimas vers&#245;es corrigidas.</p><p>Para mitigar esse risco, os usu&#225;rios s&#227;o orientados a atualizar seus dispositivos para o n&#237;veis de patch com as datas 2025-02-01 ou 2025-02-05, que incluem corre&#231;&#245;es para essas e outras vulnerabilidades em v&#225;rios componentes do Android.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bRUo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bRUo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 424w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 848w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1272w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bRUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png" width="883" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:430,&quot;width&quot;:883,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79350,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bRUo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 424w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 848w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1272w, https://substackcdn.com/image/fetch/$s_!bRUo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08dd16e0-8eb7-4d99-a5ee-625ef102ffdc_883x430.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Vers&#245;es corrigidas | Cr&#233;ditos da imagem: https://gbhackers.com/android-security-update-fixes-linux-kernel-rce-flaw/</figcaption></figure></div><p>Al&#233;m do CVE-2024-53104, o Google tamb&#233;m corrigiu uma vulnerabilidade (CVE-2025-0088) relacionada ao escalonamento de privil&#233;gios no n&#237;vel do kernel que afeta o <em>mremap</em> , uma fun&#231;&#227;o cr&#237;tica de gerenciamento de mem&#243;ria.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f4zc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f4zc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 424w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 848w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1272w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f4zc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png" width="757" height="198" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:198,&quot;width&quot;:757,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18538,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f4zc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 424w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 848w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1272w, https://substackcdn.com/image/fetch/$s_!f4zc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74c8b5b9-5986-464c-b1e2-6757556de052_757x198.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Vulnerabilidades cr&#237;ticas que podem levar ao escalonamento de privil&#233;gios no Android | Cr&#233;ditos da imagem: https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br</figcaption></figure></div><p>Al&#233;m disso, outras vulnerabilidades de alta gravidade (CVE-2025-0091, CVE-2025-0095, CVE-2025-0096) que afetam o Android da vers&#227;o 12 a 15 tamb&#233;m podem permitir que invasores executem c&#243;digo arbitr&#225;rio com privil&#233;gios aumentados.</p><p>Em se tratando de algo cr&#237;tico (CVE-2024-53104) e o seu potencial de explora&#231;&#227;o, &#233; importante que os usu&#225;rios do Android instalem as atualiza&#231;&#245;es de seguran&#231;a mais recentes o quanto antes.</p><h4><strong>Como atualizar meu Android?</strong></h4><p>Para atualizar as atualiza&#231;&#245;es em seu dispositivo, siga as etapas seguintes (a descri&#231;&#227;o das op&#231;&#245;es e telas podem ser diferentes, dependendo da vers&#227;o utilizada do Android):</p><ul><li><p>Acessar <strong>Configura&#231;&#245;es</strong></p></li><li><p>Tocar na op&#231;&#227;o <strong>Atualiza&#231;&#227;o de Software</strong></p></li><li><p>Em seguida na op&#231;&#227;o <strong>Baixar e Instalar</strong></p></li></ul><p>O que achou do post? Fale nos coment&#225;rios!</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://gbhackers.com/android-security-update-fixes-linux-kernel-rce-flaw/">https://gbhackers.com/android-security-update-fixes-linux-kernel-rce-flaw/</a></p><p><a href="https://cyberinsider.com/google-fixes-zero-day-flaw-exploited-in-targeted-android-attacks/">https://cyberinsider.com/google-fixes-zero-day-flaw-exploited-in-targeted-android-attacks/</a></p><p><a href="https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br">https://source.android.com/docs/security/bulletin/2025-02-01?hl=pt-br</a></p>]]></content:encoded></item><item><title><![CDATA[Vulnerabilidade na #DeepSeek expõe publicamente banco de dados #ClickHouse]]></title><description><![CDATA[Pesquisadores descobriram um banco de dados p&#250;blico da DeepSeek expondo informa&#231;&#245;es sens&#237;veis.]]></description><link>https://www.canalhacker.com.br/p/vulnerabilidade-na-deepseek-expoe</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/vulnerabilidade-na-deepseek-expoe</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 31 Jan 2025 19:42:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D-CH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D-CH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D-CH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D-CH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75142,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D-CH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D-CH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc08c6b67-62ab-497b-bb6e-97787a610589_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.em.com.br/emfoco/2025/01/28/deepseek-a-startup-chinesa-que-desafia-as-big-techs-com-inovacao-e-eficiencia-imparaveis/</figcaption></figure></div><p>A empresa Wiz Research descobriu um banco de dados <strong><a href="https://clickhouse.com/">ClickHouse</a></strong> p&#250;blico pertencente &#224; DeepSeek, em que est&#227;o expostos hist&#243;ricos de bate-papo, secret keys e detalhes de backend. Ap&#243;s a divulga&#231;&#227;o (&#233;tica), a DeepSeek prontamente corrigiu o problema.</p><p><em>&#8220;Em minutos, encontramos um banco de dados ClickHouse acess&#237;vel publicamente vinculado ao DeepSeek, completamente aberto e n&#227;o autenticado, expondo dados sens&#237;veis. Ele estava hospedado em oauth2callback.deepseek.com:9000 e dev.deepseek.com:9000</em>&#8221;<em>, </em>diz o <strong><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">relat&#243;rio</a> </strong>publicado pela Wiz<em>.</em></p><p>&#8220;<em>Este banco de dados continha um volume significativo de hist&#243;rico de bate-papo, dados de backend e informa&#231;&#245;es confidenciais, incluindo informa&#231;&#245;es de log, APIs secrets e detalhes operacionais</em>&#8221;.</p><p>Os pesquisadores observaram que o vazamento poderia ter permitido que invasores assumissem o controle total do banco de dados e potencialmente aumentassem os privil&#233;gios dentro do ambiente da DeepSeek, sem qualquer autentica&#231;&#227;o.</p><p>Os especialistas usaram a interface HTTP do ClickHouse e acessaram a url <code>/play</code> para executar consultas SQL arbitr&#225;rias por meio do navegador.</p><p>Ao executar uma consulta <code>SHOW TABLES</code>, os pesquisadores obtiveram uma lista completa de conjuntos de dados, incluindo a tabela <code>log_stream</code> com mais de um milh&#227;o de entradas de log contendo dados altamente sens&#237;veis. A tabela inclu&#237;a as seguintes colunas:</p><ul><li><p><code>timestamp </code>&#8211; Registros de <strong>6 de janeiro de 2025</strong></p></li><li><p><code>span_name</code> &#8211; Refer&#234;ncias a v&#225;rios <strong>endpoints internos da API DeepSeek</strong></p></li><li><p><code>string.values</code> &#8203;&#8203;&#8211; <strong>Logs de texto simples</strong> , incluindo <strong>hist&#243;rico de bate-papo</strong> , <strong>chaves de API, detalhes de backend e metadados operacionais</strong></p></li><li><p><code>_service</code> &#8211; Indicando qual <strong>servi&#231;o DeepSeek</strong> gerou os logs</p></li><li><p><code>_source</code> &#8211; Expondo a <strong>origem das solicita&#231;&#245;es de log</strong> , contendo <strong>hist&#243;rico de bate-papo, chaves de API, estruturas de diret&#243;rio e logs de metadados do chatbot</strong></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8MKl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8MKl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 424w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 848w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1272w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8MKl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp" width="976" height="533" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0df3f02-0242-4502-94be-5da18ef83501_976x533.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:533,&quot;width&quot;:976,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52294,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8MKl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 424w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 848w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1272w, https://substackcdn.com/image/fetch/$s_!8MKl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0df3f02-0242-4502-94be-5da18ef83501_976x533.webp 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://securityaffairs.com/173666/data-breach/deepseek-db-exposed-highly-sensitive-information.html</figcaption></figure></div><p>Os pesquisadores explicaram que n&#227;o executaram consultas intrusivas al&#233;m da enumera&#231;&#227;o, para preservarem as pr&#225;ticas &#233;ticas de pesquisa.</p><p>&#8220;<em>Esse n&#237;vel de acesso representou um risco cr&#237;tico para a pr&#243;pria seguran&#231;a do DeepSeek e para seus usu&#225;rios finais. Um invasor poderia n&#227;o apenas recuperar logs sens&#237;veis e mensagens de bate-papo em texto puro, mas tamb&#233;m poderiam potencialmente exfiltrar senhas em texto puro e arquivos locais junto com informa&#231;&#245;es de propriedade diretamente do servidor por meio de consultas como: SELECT *FROM (&#8216;'filename&#8217;) dependendo da configura&#231;&#227;o do ClickHouse&#8221;, conclui o relat&#243;rio</em>&#8221;.</p><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://securityaffairs.com/173666/data-breach/deepseek-db-exposed-highly-sensitive-information.html">https://securityaffairs.com/173666/data-breach/deepseek-db-exposed-highly-sensitive-information.html</a></p>]]></content:encoded></item><item><title><![CDATA[Pesquisadores alertam sobre "bypass" do NTLMv1 via política do AD]]></title><description><![CDATA[Pesquisadores descobrem falha de configura&#231;&#227;o em pol&#237;tica de grupo do AD feita para desabilitar o NTLMv1, que pode ser ignorada, permitindo que autentica&#231;&#245;es NTLMv1 persistam.]]></description><link>https://www.canalhacker.com.br/p/pesquisadores-alertam-sobre-bypass</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/pesquisadores-alertam-sobre-bypass</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 17 Jan 2025 17:27:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!x3So!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x3So!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x3So!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!x3So!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x3So!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:259525,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x3So!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 424w, https://substackcdn.com/image/fetch/$s_!x3So!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 848w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!x3So!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa553c1e8-3705-4716-8f48-ed85d592c3df_2000x1125.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.crowe.com/cybersecurity-watch/ntlm-relay-attacks</figcaption></figure></div><p></p><p>A empresa de ciberseguran&#231;a, Silverfort, descobriu uma configura&#231;&#227;o incorreta que pode &#8220;bypassar&#8221; uma determinada pol&#237;tica de grupo do Active Directory (AD) feita para desabilitar o NTLMv1, permitindo assim que autentica&#231;&#245;es por este protocolo inseguro continuem funcionando. </p><h4><strong>Qual &#233; o problema com o NTLMv1?</strong></h4><p>Ele &#233; um protocolo de autentica&#231;&#227;o desatualizado com vulnerabilidades de seguran&#231;a conhecidas, tornando-o um alvo principal para invasores. A vulnerabilidade, descoberta pelo pesquisador s&#234;nior de seguran&#231;a Dor Segal, alertou que mesmo que as empresas implementem a pol&#237;tica para desativar o NTLMv1 estar&#227;o expostas a autentica&#231;&#245;es por meio deste protocolo.</p><p>Certas configura&#231;&#245;es locais podem ignorar esta restri&#231;&#227;o feita na pol&#237;tica de grupo ao solicitar especificamente a autentica&#231;&#227;o NTLMv1. Invasores podem ent&#227;o explorar esta vulnerabilidade para interceptar o tr&#225;fego, quebrar credenciais de usu&#225;rios e obter acesso n&#227;o autorizado ao sistema. Al&#233;m disso, ao explorar as vulnerabilidades do protocolo em quest&#227;o, poder&#227;o se mover lateralmente ou aumentar seus privil&#233;gios, expondo as empresas a riscos significativos.</p><p>&#8220;<em>&#201; importante observar que clientes (</em>esta&#231;&#245;es de trabalho<em>) Windows com a configura&#231;&#227;o <strong>LMCompatibilityLevel 3</strong> e posterior ativada n&#227;o gerar&#227;o o tr&#225;fego NTLMv1 se solicitado. No entanto, clientes n&#227;o Windows n&#227;o s&#227;o protegidos. Se um sistema solicitar uma mensagem NTLMv1 de um cliente n&#227;o Windows, o Controlador de Dom&#237;nio poder&#225; aprovar a autentica&#231;&#227;o e gerar uma chave de sess&#227;o</em>&#8221;, <strong><a href="https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/">observaram os pesquisadores em um post</a></strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D7yK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D7yK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D7yK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg" width="1024" height="897" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:897,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67464,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D7yK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 424w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 848w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!D7yK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9bf08bb8-24f7-4b64-a8fc-2f41099d8db0_1024x897.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos da imagem: https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/ | Levantamento do uso da autentica&#231;&#227;o via NTLM no AD atualmente</figcaption></figure></div><p>Olhando na imagem acima, temos alguns pontos interessantes:</p><ul><li><p>Em ambientes que usam o AD, 64% das contas de usu&#225;rio regularmente se autenticam via NTLM</p></li><li><p>48% das contas se autenticam tanto em NTLM e Kerberos</p></li><li><p>36% das contas realizam mais de 80% de autentica&#231;&#227;o via Kerberos</p></li></ul><p>Mesmo com a Microsoft reconhecendo o problema e ter <strong><a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-1-%e2%80%93-disabling-ntlmv1/3934787">anunciado</a></strong> (em 2023&#8230;) planos para remover completamente o suporte ao NTLMv1 em vers&#245;es futuras do Windows, as empresas ainda precisam tomar medidas  proativas para mitigar o risco. Estas medidas incluem habilitar logs de auditoria para autentica&#231;&#227;o NTLM, identificar sistemas/aplicativos que utilizem o NTLMv1 e implementar m&#233;todos de autentica&#231;&#227;o modernos, via SSO ou Kerberos, a fim de substituir o NTLMv1.</p><p>N&#227;o &#233; de hoje que esta vers&#227;o do NTLM &#233; comentada no meio da seguran&#231;a da informa&#231;&#227;o. O <strong><a href="https://www.varonis.com/pt-br/blog/o-que-e-mimikatz-guia-completo">Mimikatz</a></strong> come solto!</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://hackread.com/researchers-ntlmv1-bypass-active-directory-policy/">https://hackread.com/researchers-ntlmv1-bypass-active-directory-policy/</a></p><p><a href="https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/">https://www.silverfort.com/blog/ntlmv1-bypass-in-active-directory-technical-deep-dive/</a></p>]]></content:encoded></item><item><title><![CDATA[Vulnerabilidade no OAuth do Google expõe milhões de domínios a explorações]]></title><description><![CDATA[Calma, n&#227;o s&#227;o todos os sites que utilizam o OAuth do Google que est&#227;o com vulnerabilidades, MAS sim os dom&#237;nios desativados, que porventura sejam comprados novamente.]]></description><link>https://www.canalhacker.com.br/p/vulnerabilidade-no-oauth-do-google</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/vulnerabilidade-no-oauth-do-google</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Tue, 14 Jan 2025 18:58:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!G_vZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G_vZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G_vZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18217,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G_vZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!G_vZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61d495e2-cb49-46a6-9294-2068f319b98a_1200x630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://rockcontent.com/br/blog/aplicativos-do-google/</figcaption></figure></div><p>Uma pesquisa recente revelou uma vulnerabilidade no fluxo da famosa autentica&#231;&#227;o &#8220;Fazer login o Google&#8221; do Google, que pode explorar uma peculiaridade na propriedade de um dom&#237;nio para assim se obter acesso a dados confidenciais.</p><p>O login OAuth do Google n&#227;o protege adequadamente para os casos em que algu&#233;m com m&#225; f&#233; compra um dom&#237;nio de uma startup que j&#225; &#8220;fechou as portas&#8221; e o utiliza para recriar contas de e-mail para ex-funcion&#225;rios&#8221;, disse o cofundador e CEO da Truflle Security, Dylan Ayrey, em um <strong><a href="https://trufflesecurity.com/blog/millions-at-risk-due-to-google-s-oauth-flaw">relat&#243;rio publicado na segunda-feira</a></strong> (13/01/25).</p><blockquote><p><em>Mesmo que voc&#234; n&#227;o possa acessar dados de e-mails antigos, poder&#225; utilizar essas contas para fazer login em v&#225;rios produtos SaaS que a organiza&#231;&#227;o usou.</em></p><p><em>Essas contas inclu&#237;am acessos sens&#237;veis em sistemas de RH que continham documentos fiscais, recibos de pagamento, informa&#231;&#245;es de seguro, n&#250;meros de previd&#234;ncia social e muito mais</em>, disse Ayrey.</p></blockquote><h4><strong>O que &#233; o OAuth?</strong></h4><p>OAuth, abrevia&#231;&#227;o para Open Authentication (Autentica&#231;&#227;o Aberta). refere-se a um padr&#227;o aberto para delega&#231;&#227;o de acesso, permitindo que usu&#225;rios concedam a sites ou aplicativos acessos &#224;s suas informa&#231;&#245;es em outros sites sem ter que fornecer suas senhas. Isso &#233; feito por meio de um token de acesso que verifica a identidade do usu&#225;rio e permite que o servi&#231;o acesse o recurso ao qual o token se destina.</p><p>Quando o recurso &#8220;<em>Fazer login com o Google</em>&#8221; &#233; usado para o login em um aplicativo como Slack, o Google envia ao servi&#231;o um conjunto de declara&#231;&#245;es sobre o usu&#225;rio, incluindo seu endere&#231;o de e-mail e o dom&#237;nio hospedado (o dom&#237;nio em que usu&#225;rio est&#225; realizando login pelo Google), que podem ser utilizadas (as declara&#231;&#245;es) para fazer login dos usu&#225;rios em suas contas.</p><h4><strong>O problema</strong></h4><p>Continuando, isso tamb&#233;m significa que, se um servi&#231;o depende exclusivamente dessas informa&#231;&#245;es para autenticar usu&#225;rios, tamb&#233;m acabar&#225; abrindo uma porta para um cen&#225;rio em que mudan&#231;as na propriedade de dom&#237;nios podem permitir que um invasor recupere o acesso a contas antigas de funcion&#225;rios.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lcyf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lcyf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 424w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 848w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1272w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png" width="674" height="369" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:369,&quot;width&quot;:674,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:207381,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lcyf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 424w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 848w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1272w, https://substackcdn.com/image/fetch/$s_!Lcyf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07d0563a-b185-49b2-bcc2-eb51a20f8a31_674x369.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>O CEO da Truffle tamb&#233;m destacou que o token referente ao OAuth ID do Google inclui um identificador exclusivo de usu&#225;rio &#8211; a <strong><a href="https://developers.google.com/identity/openid-connect/openid-connect#obtainuserinfo">reivindica&#231;&#227;o sub</a></strong> &#8211; que na teoria poderia evitar o problema, mas que n&#227;o foi considerado confi&#225;vel. Vale comentar que o <strong><a href="https://www.microsoft.com/pt-br/security/business/identity-access/microsoft-entra-id">Entra ID da Microsoft</a></strong> inclui as <strong><a href="https://learn.microsoft.com/en-us/entra/identity-platform/id-token-claims-reference">reivindica&#231;&#245;es sub ou oid</a></strong> para armazenar um valor imut&#225;vel por usu&#225;rio.</p><p>Atualmente n&#227;o existem muitas medidas de prote&#231;&#227;o que os provedores de software podem tomar contra esta vulnerabilidade de implementa&#231;&#227;o do OAuth do Google.</p><blockquote><p><em>Como indiv&#237;duo, ap&#243;s voc&#234; ser desligado de uma empresa, acaba perdendo a capacidade de proteger seus dados nessas contas e ficar&#225; sujeito ao que ocorrer com o futuro desta empresa. Sem IDs imut&#225;veis, as altera&#231;&#245;es de propriedade de dom&#237;nios continuar&#227;o a comprometer as contas</em>, disse Ayrey.</p></blockquote><p><strong>Cr&#233;ditos:</strong></p><p><a href="https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html">https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html</a></p>]]></content:encoded></item><item><title><![CDATA[Hacker paranaense é indiciado nos EUA por extorsão de mais de 3 milhões de dólares em Bitcoin]]></title><description><![CDATA[Hacker de Curitiba foi indiciado nos EUA por tentativa de extors&#227;o de mais de 3 milh&#245;es de d&#243;lares em invas&#227;o envolvendo acesso indevido a dados de mais de 300 mil clientes da v&#237;tima.]]></description><link>https://www.canalhacker.com.br/p/hacker-paranaense-e-indiciado-nos</link><guid isPermaLink="false">https://www.canalhacker.com.br/p/hacker-paranaense-e-indiciado-nos</guid><dc:creator><![CDATA[Ricardo Maganhati]]></dc:creator><pubDate>Fri, 27 Dec 2024 02:57:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QRNb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QRNb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QRNb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 424w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 848w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1272w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QRNb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png" width="728" height="380" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:380,&quot;width&quot;:728,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:240367,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QRNb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 424w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 848w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1272w, https://substackcdn.com/image/fetch/$s_!QRNb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8d95ce2-66f0-4a6e-9aa9-3e785b8d11a0_728x380.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html</figcaption></figure></div><p>Parece que um hacker brasileiro foi indiciado nos EUA por ter supostamente amea&#231;ado divulgar dados roubados ap&#243;s uma invas&#227;o feita &#224; rede de uma empresa em mar&#231;o de 2020.</p><p>Junior Barros de Oliveira, de 29 anos, de Curitiba, foi indiciado em 4 acusa&#231;&#245;es de extors&#227;o envolvendo informa&#231;&#245;es obtidas de computadores protegidos e outras 4 por mensagens amea&#231;adoras, <strong><a href="https://www.justice.gov/usao-nj/pr/brazilian-man-charged-making-extortionate-threats-publicize-stolen-data-obtained">disse o Departamento de Justi&#231;a dos EUA (DoJ) em um indiciamento aberto no in&#237;cio desta semana</a></strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zd-j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zd-j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 424w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 848w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1272w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png" width="808" height="692" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:692,&quot;width&quot;:808,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:135600,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zd-j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 424w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 848w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1272w, https://substackcdn.com/image/fetch/$s_!Zd-j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eafa2c-d68d-4fe9-a313-1400175b902a_808x692.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cr&#233;ditos: https://www.justice.gov/usao-nj/media/1382276/dl?inline</figcaption></figure></div><p>A v&#237;tima, uma subsidi&#225;ria brasileira sediada em Nova Jersey, teve seus computadores invadidos pelo r&#233;u, que ent&#227;o explorou o acesso obtido para possivelmente roubar informa&#231;&#245;es confidenciais de cerca de 300 mil clientes em pelo menos 3 ocasi&#245;es.</p><p>Junior Barros teria ent&#227;o posteriormente enviado ao CEO da empresa uma mensagem de e-mail  em setembro de 2020 utilizando um pseud&#244;nimo, onde teria exigido o pagamento de 300 bitcoins (cerca de 3,2 milh&#245;es de d&#243;lares na &#233;poca) em troca de n&#227;o vender os dados.</p><p>Um m&#234;s depois, o r&#233;u enviou a mensagem citada acima tanto para o CEO quanto para um executivo da subsidi&#225;ria brasileira.</p><p>Em uma das mensagens enviadas a um executivo da empresa, Junior Barros disse que <em>estava muito interessado em ajud&#225;-los a resolver esta falha de seguran&#231;a</em>, mas disse que isso custaria uma taxa de consultoria de cerca de 75 bitcoins (800 mil d&#243;lares na &#233;poca). O r&#233;u tamb&#233;m forneceu instru&#231;&#245;es sobre como a v&#237;tima poderia efetuar o pagamento para uma carteira de bitcoin.</p><p>Cada uma das 4 amea&#231;as de extors&#227;o acarreta uma pena m&#225;xima de 5 anos de pris&#227;o e uma multa de 250 mil d&#243;lares ou o dobro do valor de qualquer ganho ou perda, o que for maior.</p><p>Da mesma forma, cada uma das 4 acusa&#231;&#245;es por &#8220;apenas&#8221; enviar mensagens amea&#231;adoras, acarreta uma pena m&#225;xima de 2 anos de pris&#227;o e uma multa m&#225;xima de 250 mil d&#243;lares ou o dobro do valor de qualquer ganho ou perda, o que for maior.</p><p>Realmente o crime n&#227;o compensa. O ser humano &#233; falho. Deixa rastros. Mais cedo ou mais tarde ser&#225; pego. Ent&#227;o n&#227;o se anime em achar que &#233; legal invadir ou derrubar sistemas. Por mais que seus objetivos sejam &#8220;legais&#8221;, as empresas n&#227;o ver&#227;o isso com bons olhos.</p><p>Quer &#8220;invadir&#8221; o sistema de uma empresa dentro de um contexto autorizado e ainda ganhar por isso? Fa&#231;a parte de sistemas de Bug Bounty ofertado por v&#225;rias empresas. A Hacker One oferece uma <strong><a href="https://hackerone.com/bug-bounty-programs">lista bem completa</a></strong> destes programas. J&#225; no Brasil temos a Hackaflag e a Bug Hunt, empresas estas que possuem uma plataforma de Bug Bounty utilizada por diversos clientes. <strong><a href="https://anchisesbr.blogspot.com/2022/12/seguranca-programas-de-bug-bounty-nas.html">Veja este post</a></strong> do Anchises que mostra quais programas est&#227;o em curso nas empresas (post de 2022).</p><p><strong>Cr&#233;ditos</strong>:</p><p><a href="https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html">https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html</a></p><p><a href="https://www.justice.gov/usao-nj/pr/brazilian-man-charged-making-extortionate-threats-publicize-stolen-data-obtained">https://www.justice.gov/usao-nj/pr/brazilian-man-charged-making-extortionate-threats-publicize-stolen-data-obtained</a></p><p></p><p></p>]]></content:encoded></item></channel></rss>