{"id":38616,"date":"2021-09-06T09:19:59","date_gmt":"2021-09-06T12:19:59","guid":{"rendered":"https:\/\/abes.org.br\/?p=38616"},"modified":"2021-08-30T14:57:45","modified_gmt":"2021-08-30T17:57:45","slug":"pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/","title":{"rendered":"Trend Micro Research Reveals TeamTNT Group Activities"},"content":{"rendered":"<p><em>Survey shows the tools and techniques used and the impact of the group&#039;s malicious activities<\/em><\/p>\n<p style=\"font-weight: 400\">Trend Micro Brasil, one of the leading companies in cybersecurity solutions, conducted detailed research on TeamTNT, one of the most persistent groups of malicious hackers, which started a series of campaigns in 2020 and early 2021. Most of these campaigns \u2014 although varying the tools, techniques, and purpose\u2014targeted cloud environments.<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-38613\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg\" alt=\"\" width=\"274\" height=\"183\" \/><\/p>\n<p style=\"font-weight: 400\">TeamTNT has been attacking in some form since 2011, but it wasn&#039;t until 2020 that the group started to draw attention. In April of last year, it launched a short-lived Covid-19-themed campaign, choosing pandemic-related words for its attack URLs. \u201cA month later, Trend Micro mapped an entry on how TeamTNT was targeting gateways.\u00a0<em>daemon<\/em>\u00a0open Docker, to distribute cryptocurrency mining. The group also sparked another campaign, in late 2020, deploying TNTbotinger, an Internet Relay Chat (IRC) bot with distributed denial-of-service (DDoS) capabilities. This year, it focused even more on the cloud, covering different cloud-based services and software\u201d, comments Rodrigo Garcia, Sales Director at Trend Micro.<\/p>\n<p><strong>Infection routines and payloads:<\/strong><br \/>\nTeamTNT&#039;s infection routines usually follow a pattern, in which the group does reconnaissance using its scanner to choose suitable victims. After narrowing down its targets, it checks for misconfigurations and other security holes that can be exploited, such as:<\/p>\n<ul style=\"font-weight: 400\">\n<li>Insecure instances of Redis;<\/li>\n<li>Internet of Things (IoT) device vulnerabilities;<\/li>\n<li>Exposed Docker APIs;<\/li>\n<li>Leaked credentials;<\/li>\n<li>Devices accessible via Secure Shell (SSH).<\/li>\n<\/ul>\n<p style=\"font-weight: 400\">Upon finding a system with exploitable security flaws, it begins to deliver its payloads, which include:<\/p>\n<ul style=\"font-weight: 400\">\n<li>Credential theft;<\/li>\n<li>Cryptocurrency mining;<\/li>\n<li>IRC bots;<\/li>\n<li>Local network scanners;<\/li>\n<li>Reverse\/linked shells<\/li>\n<\/ul>\n<p style=\"font-weight: 400\">Credential theft is often one of the group&#039;s goals, if not the main one. TeamTNT uses a series of techniques in its credential capture routines, with its own scripts that contain functions designed to look up credentials for specific services and software. It also implements persistence mechanisms in some of its expeditions, ensuring that the selected user is configured to be accessed via SSH. This is done to create a method of returning to the system after infection. In many cases, attackers deploy their own SSH public keys.<\/p>\n<p>The increasing use of cloud-based services, software and infrastructure has made the cloud an attractive target for groups like TeamTNT. A successful theft of cloud credentials or a cryptocurrency mining routine ends up infecting the entire system and can have far-reaching consequences on an organization \u2013 especially in terms of operational disruption and even reputational damage.<\/p>\n<p>\u201cOur job following TeamTNT&#039;s activities is to ensure a closer look at a cloud-focused hacker group. We aim to help companies understand how the group carries out its activities and offer insights and recommendations to prevent cyberattacks, concludes Rodrigo Garcia.<\/p>\n<p>See a complete copy of the report,\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/br\/security\/news\/cybercrime-and-digital-threats\/teamtnt-activities-probed\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/na01.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fwww.trendmicro.com%252Fvinfo%252Fbr%252Fsecurity%252Fnews%252Fcybercrime-and-digital-threats%252Fteamtnt-activities-probed%26data%3D04%257C01%257C%257C58ce746ea5c14a92237f08d96b9db9e0%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637659147443362757%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26sdata%3DqucVRYp8WktpiddZUrKRe8ybtOBCBgWIp0%252BYU%252FTI1Ks%253D%26reserved%3D0&amp;source=gmail&amp;ust=1630419459675000&amp;usg=AFQjCNHvvrgyRbW7F6-T4bb7oIzmITrQ3A\">on here<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Levantamento mostra as ferramentas e t\u00e9cnicas utilizadas e o impacto das atividades maliciosas do grupo A Trend Micro Brasil, uma das principais empresas em solu\u00e7\u00f5es de ciberseguran\u00e7a, realizou uma pesquisa detalhada sobre o TeamTNT, um dos mais persistentes grupos de hackers maliciosos, que iniciou uma s\u00e9rie de campanhas em 2020 e in\u00edcio de 2021. A [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[2098,2026,2101,2100,270,2099],"class_list":["post-38616","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-atividades-maliciosas","tag-ciberataques","tag-hackers-maliciosos","tag-mineracao-de-criptomoedas","tag-seguranca-cibernetica","tag-softwares-especificos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pesquisa da Trend Micro revela atividades do grupo TeamTNT - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pesquisa da Trend Micro revela atividades do grupo TeamTNT - ABES\" \/>\n<meta property=\"og:description\" content=\"Levantamento mostra as ferramentas e t\u00e9cnicas utilizadas e o impacto das atividades maliciosas do grupo A Trend Micro Brasil, uma das principais empresas em solu\u00e7\u00f5es de ciberseguran\u00e7a, realizou uma pesquisa detalhada sobre o TeamTNT, um dos mais persistentes grupos de hackers maliciosos, que iniciou uma s\u00e9rie de campanhas em 2020 e in\u00edcio de 2021. A [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-06T12:19:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Pesquisa da Trend Micro revela atividades do grupo TeamTNT\",\"datePublished\":\"2021-09-06T12:19:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg\",\"keywords\":[\"atividades maliciosas\",\"ciberataques\",\"hackers maliciosos\",\"minera\u00e7\u00e3o de criptomoedas\",\"seguran\u00e7a cibern\u00e9tica\",\"softwares espec\u00edficos\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/\",\"name\":\"Pesquisa da Trend Micro revela atividades do grupo TeamTNT - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg\",\"datePublished\":\"2021-09-06T12:19:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pesquisa da Trend Micro revela atividades do grupo TeamTNT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pesquisa da Trend Micro revela atividades do grupo TeamTNT - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/","og_locale":"en_US","og_type":"article","og_title":"Pesquisa da Trend Micro revela atividades do grupo TeamTNT - ABES","og_description":"Levantamento mostra as ferramentas e t\u00e9cnicas utilizadas e o impacto das atividades maliciosas do grupo A Trend Micro Brasil, uma das principais empresas em solu\u00e7\u00f5es de ciberseguran\u00e7a, realizou uma pesquisa detalhada sobre o TeamTNT, um dos mais persistentes grupos de hackers maliciosos, que iniciou uma s\u00e9rie de campanhas em 2020 e in\u00edcio de 2021. A [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2021-09-06T12:19:59+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Pesquisa da Trend Micro revela atividades do grupo TeamTNT","datePublished":"2021-09-06T12:19:59+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/"},"wordCount":573,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg","keywords":["atividades maliciosas","ciberataques","hackers maliciosos","minera\u00e7\u00e3o de criptomoedas","seguran\u00e7a cibern\u00e9tica","softwares espec\u00edficos"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/","url":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/","name":"Pesquisa da Trend Micro revela atividades do grupo TeamTNT - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg","datePublished":"2021-09-06T12:19:59+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/08\/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix-scaled.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/pesquisa-da-trend-micro-revela-atividades-do-grupo-teamtnt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Pesquisa da Trend Micro revela atividades do grupo TeamTNT"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-04 07:04:29","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/38616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=38616"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/38616\/revisions"}],"predecessor-version":[{"id":38618,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/38616\/revisions\/38618"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=38616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=38616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=38616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}