{"id":45034,"date":"2022-04-27T07:50:14","date_gmt":"2022-04-27T10:50:14","guid":{"rendered":"https:\/\/abes.org.br\/?p=45034"},"modified":"2022-04-22T07:55:08","modified_gmt":"2022-04-22T10:55:08","slug":"trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/","title":{"rendered":"Trend Micro throws spotlight on LockBit, one of the most active Ransomware-as-a-Service (RaaS)"},"content":{"rendered":"<p style=\"text-align: center\"><em>The malware has a variety of tactics and tools and has been active in several countries around the world.<\/em><\/p>\n<p>Research carried out by\u00a0<strong>Trend Micro<\/strong>, a global cybersecurity solutions company, reveals the techniques, procedures and damage caused by malicious software\u00a0<strong>LockBit,<\/strong>\u00a0considered one of the most active ransomware today. With strong malware capabilities and a robust affiliate program, organizations need to be vigilant to detect potential risks and defend against this dangerous virus.<\/p>\n<p>LockBit first appeared as the \u201cABCD\u201d malware in September 2019 and has been improved to become a\u00a0<em>Ransomware-as-a-Service\u00a0<\/em>(RaaS), business model that involves selling or renting ransomware with the conversion of profits for the team of developers and their affiliates.<\/p>\n<p>According to Rodrigo Garcia, Commercial Director at Trend Micro, the malware has infection chains that show a variety of tactics and tools employed. \u201cAffiliates often buy access to targets from another threat actor, who typically obtain it through\u00a0<em>phishing<\/em>, exploiting vulnerable applications or desktop protocol accounts remotely. By knowing their techniques, organizations can strengthen their defenses to prevent current and future attacks.\u201d<\/p>\n<p>LockBit is also known for hiring network access brokers, cooperating with other criminal groups (such as the now defunct Maze), recruiting\u00a0<em>insiders\u00a0<\/em>of talented companies and hackers. With these strategies, the group has become one of the most organized cybercriminal gangs in the world.<\/p>\n<p><strong>What do organizations need to know about LockBit?<\/strong><\/p>\n<p>Their method is double extortion, which adds more pressure to victims. One of their tactics was the creation and use of the StealBit malware, which automated data exfiltration, promoting faster and more efficient encryption, giving rise to LockBit 2.0.<\/p>\n<p>According to data from the Trend Micro\u2122 Smart Protection Network\u2122 platform, LockBit has been detected worldwide. The United States leads the ranking of attacks with 2,915 records from July 1, 2021 to January 20, 2022, followed by India and\u00a0<strong>Brazil.<\/strong>\u00a0The health sector was the hardest hit in the period, with education and technology also being priority targets.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-45035 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg\" alt=\"\" width=\"701\" height=\"426\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg 701w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit-480x292.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 701px, 100vw\" \/><\/p>\n<p>Experts believe that LockBit will increase its activity level in the coming months. \u201cOrganizations must keep abreast of the latest changes that may influence the security measures to be adopted. To help defend systems against threats, organizations need to establish cybersecurity frameworks that can systematically allocate resources, establishing a solid defense against ransomware,\u201d explains Rodrigo Garcia.<\/p>\n<p>To avoid the vulnerability, it is important to maintain some practices in the organization, such as identifying devices and software, granting administrative privileges only when necessary, and enabling security settings on network infrastructure devices. In addition, it is important to maintain protection measures such as backup, auditing event or incident logs, in addition to updating software, security solutions and applications.<\/p>\n<p>Trend Micro recommends a multi-layered approach to protecting potential system entry points (endpoint, email, web and network) through the use of security solutions that can detect malicious components and suspicious behavior.<\/p>\n<p>To read Trend Micro&#039;s in-depth research on LockBit\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/br\/security\/news\/ransomware-spotlight\/ransomware-spotlight-lockbit\">Click here<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>O malware possui uma variedade de t\u00e1ticas e ferramentas e vem agindo em diversos pa\u00edses ao redor do mundo Pesquisa realizada pela\u00a0Trend Micro, empresa mundial de solu\u00e7\u00f5es de ciberseguran\u00e7a, revela as t\u00e9cnicas, procedimentos e os estragos provocados pelo software malicioso\u00a0LockBit,\u00a0considerado um dos ransomware mais ativos da atualidade. Com fortes recursos de malware e um robusto [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[2839,620,2840],"class_list":["post-45034","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-atualizacao-de-softwares","tag-ransomware","tag-solucoes-de-seguranca-e-aplicativos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS) - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS) - ABES\" \/>\n<meta property=\"og:description\" content=\"O malware possui uma variedade de t\u00e1ticas e ferramentas e vem agindo em diversos pa\u00edses ao redor do mundo Pesquisa realizada pela\u00a0Trend Micro, empresa mundial de solu\u00e7\u00f5es de ciberseguran\u00e7a, revela as t\u00e9cnicas, procedimentos e os estragos provocados pelo software malicioso\u00a0LockBit,\u00a0considerado um dos ransomware mais ativos da atualidade. Com fortes recursos de malware e um robusto [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T10:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS)\",\"datePublished\":\"2022-04-27T10:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/lockbit.jpg\",\"keywords\":[\"atualiza\u00e7\u00e3o de softwares\",\"Ransomware\",\"solu\u00e7\u00f5es de seguran\u00e7a e aplicativos\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/\",\"name\":\"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS) - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/lockbit.jpg\",\"datePublished\":\"2022-04-27T10:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/lockbit.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/lockbit.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro shines a spotlight on LockBit, one of the most active Ransomware-as-a-Service (RaaS) - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS) - ABES","og_description":"O malware possui uma variedade de t\u00e1ticas e ferramentas e vem agindo em diversos pa\u00edses ao redor do mundo Pesquisa realizada pela\u00a0Trend Micro, empresa mundial de solu\u00e7\u00f5es de ciberseguran\u00e7a, revela as t\u00e9cnicas, procedimentos e os estragos provocados pelo software malicioso\u00a0LockBit,\u00a0considerado um dos ransomware mais ativos da atualidade. Com fortes recursos de malware e um robusto [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2022-04-27T10:50:14+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS)","datePublished":"2022-04-27T10:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/"},"wordCount":598,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg","keywords":["atualiza\u00e7\u00e3o de softwares","Ransomware","solu\u00e7\u00f5es de seguran\u00e7a e aplicativos"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/","url":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/","name":"Trend Micro shines a spotlight on LockBit, one of the most active Ransomware-as-a-Service (RaaS) - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg","datePublished":"2022-04-27T10:50:14+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/04\/lockbit.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/trend-micro-joga-holofote-no-lockbit-um-dos-mais-ativos-ransomware-as-a-service-raas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Trend Micro joga holofote no LockBit, um dos mais ativos Ransomware-as-a-Service (RaaS)"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-29 10:34:53","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/45034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=45034"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/45034\/revisions"}],"predecessor-version":[{"id":45036,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/45034\/revisions\/45036"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=45034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=45034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=45034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}