{"id":49088,"date":"2022-08-26T08:01:58","date_gmt":"2022-08-26T11:01:58","guid":{"rendered":"https:\/\/abes.org.br\/?p=49088"},"modified":"2022-08-16T07:16:51","modified_gmt":"2022-08-16T10:16:51","slug":"clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/","title":{"rendered":"CLM and Picus analyze the top five cyberthreats that emerged in July"},"content":{"rendered":"<p style=\"text-align: center\"><em>New groups and families of malware require agility in response and highlight the need to simulate violations in protection systems<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49095 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg\" alt=\"\" width=\"309\" height=\"309\" \/><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">In another hectic month for CISOS, the report by Picus Security, a pioneer in Breach and Attack Simulation (BAS \u2013 Breach and Attack Simulation), shows the emergence of cyberattack campaigns triggered by new groups of hackers and malware families. Among the most significant are:\u00a0<strong>Maui Ransomware<\/strong>, which uses a hybrid encryption method involving AES, RSA encryption and XOR encoding which increases its impact;\u00a0<strong>Green Stone Malware Dropper<\/strong>, which sends Open XML documents containing a malicious macro, which unpacks and runs an executable, with spy features, in a temporary directory, which avoids detection by most antiviruses.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">O\u00a0<strong>HavanaCrypt Ransomware<\/strong>\u00a0was another one that appeared in July. It masquerades as a legitimate Google Software application and uses an IP address belonging to a Microsoft hosting service as its C2 server to avoid detection. Another attack was that of a Ransomware that uses the double extortion method: it steals confidential data, encrypts it and releases a ransom note with a chat address on the Tor Browser, the most used to access the DeepWeb (and therefore , the DarkWeb). already the\u00a0<strong>H0lyGh0st Ransomware<\/strong>, although it has been active since 2021, the group now strikes back with a more persistent and improved variant of this malware, BTLC.exe.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">\u201cWithout cyber resilience, companies, government entities and other organizations are doomed to become the next victims of ransomware and countless other cyberattacks, as we have seen around the world\u201d, warns Tom Camargo, VP of CLM, Latin American distributor value-added focused on information security, data protection, infrastructure for data centers and cloud.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">For the CLM executive, which distributes Picus technology in Latin America, in this extremely dynamic scenario and marked by the emergence of new groups of cybercriminals, acting with new forms of attack, the agility in the response proves to be increasingly essential to avoid the data hijacking and other evils caused by a growing number of cyber threats. \u201cThe support of technologies that quickly simulate danger makes it possible to test the effectiveness of security controls. O\u00a0<a href=\"https:\/\/www.picussecurity.com\/resource\/author\/picus-labs\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fclick.cse360.com.br%252FClick%252FAddCampaignEmailClick%252F8722088b-d484-48ce-032b-08da6f7e5e3e%252Fhttps%2525253a%2525252f%2525252fwww.picussecurity.com%2525252fresource%2525252fauthor%2525252fpicus-labs%252F78893d7e-df5c-424c-8d6b-906c11b5efba%252Fchris.santos2007%2540outlook.com%252FFalse%26data%3D05%257C01%257C%257C049ce88eb01140dc551708da7ed56c34%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637961752381743239%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DzflzBOrWSBKp3LiX8aJ7dU246RupcBBipDOvSw5sOw0%253D%26reserved%3D0&amp;source=gmail&amp;ust=1660727910376000&amp;usg=AOvVaw1BKLz38DFVB4-1jc5ZWgDq\">Picus Labs<\/a>\u00a0included simulations of the various attacks registered in July in the Picus Threat Library, updating the Picus Complete Security Control Validation platform in real time\u201d.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">See details of the top five attacks in this period below:<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p>1.\u00a0\u00a0\u00a0\u00a0\u00a0<strong>Maui Ransomware<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The Cybersecurity and Infrastructure Security Agency (CISA), the US Treasury Department and the Federal Bureau of Investigation (FBI) released a joint statement on July 6 about a cyber threat actor based in North Korea using , Maui ransomware. Groups affiliated with this ransomware are mostly known for inflicting apparently North Korean government-sponsored ransomware attacks on healthcare sectors. Maui employs a single extortion method, so it does not exfiltrate data or remove system backups.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The curious thing is that it does not employ a lateral movement technique (when the attacker spreads from a non-confidential point or account to the rest of the network) and does not send a note instructing its victims to pay the ransom. However, Maui uses a hybrid encryption method combining AES, RSA encryption, and XOR encryption for increased impact. While the RSA algorithm generates a new public-private key pair, the AES algorithm encrypts each file in CBC mode. After each file is encrypted with a unique secret key, those secret keys are encrypted with the public key that is generated right at the start of the attack.<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The Picus Threat Library included the following threats for Maui ransomware: Maui Ransomware Download Threat (Network Infiltration) \u2013 ID 56700 and Maui Ransomware Email Threat (Email Infiltration (Phishing)) \u2013 ID 64940<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\"><strong>2. Green Stone Malware Dropper<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">In late July, many Iranian companies received an Office Open XML document containing a malicious macro, whose functions unpack and run an executable in a temporary directory, which is a common practice employed in cyberattacks to avoid detection. Further analysis showed that the executable has cyber-espionage capabilities. It collects information about the operating system, takes screenshots and sends the collected data to a remote server.<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-49089\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO1.png\" alt=\"\" width=\"632\" height=\"276\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO1.png 632w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO1-480x210.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 632px, 100vw\" \/><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\">Figure 1: Malicious executable contained in the Office Open XML document:\u00a0<a href=\"https:\/\/inquest.net\/blog\/2022\/07\/27\/green-stone\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fclick.cse360.com.br%252FClick%252FAddCampaignEmailClick%252F8722088b-d484-48ce-032b-08da6f7e5e3e%252Fhttps%2525253a%2525252f%2525252finquest.net%2525252fblog%2525252f2022%2525252f07%2525252f27%2525252fgreen-stone%252F78893d7e-df5c-424c-8d6b-906c11b5efba%252Fchris.santos2007%2540outlook.com%252FFalse%26data%3D05%257C01%257C%257C049ce88eb01140dc551708da7ed56c34%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637961752381899454%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3D5WRzf0NYD4N30W3y5eOmfF8owijaY0qtyVNXJqvd23o%253D%26reserved%3D0&amp;source=gmail&amp;ust=1660727910376000&amp;usg=AOvVaw0qTgiFSpo22nEhd-MXxUOY\"><strong>Green Stone Malware Dropper<\/strong><\/a><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\">\u00a0<u><\/u><u><\/u>Analysis of this malware points to an unusual technique of exchanging commands using a Telegram bot. This technique avoids unnecessary communications with a remote server and hides the C2 server.<u><\/u><u><\/u><\/p>\n<p style=\"text-align: center\">\u00a0<u><\/u><u><\/u><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-49090 alignnone\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO2.png\" alt=\"\" width=\"1340\" height=\"271\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO2.png 1340w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO2-1280x259.png 1280w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO2-980x198.png 980w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO2-480x97.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1340px, 100vw\" \/><\/strong><u><\/u>Figure 2:\u00a0<a href=\"https:\/\/inquest.net\/blog\/2022\/07\/27\/green-stone\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fclick.cse360.com.br%252FClick%252FAddCampaignEmailClick%252F8722088b-d484-48ce-032b-08da6f7e5e3e%252Fhttps%2525253a%2525252f%2525252finquest.net%2525252fblog%2525252f2022%2525252f07%2525252f27%2525252fgreen-stone%252F78893d7e-df5c-424c-8d6b-906c11b5efba%252Fchris.santos2007%2540outlook.com%252FFalse%26data%3D05%257C01%257C%257C049ce88eb01140dc551708da7ed56c34%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637961752381899454%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3D5WRzf0NYD4N30W3y5eOmfF8owijaY0qtyVNXJqvd23o%253D%26reserved%3D0&amp;source=gmail&amp;ust=1660727910377000&amp;usg=AOvVaw3UOKX38JPJmgMJO90yo26Z\">Commands<\/a>\u00a0supported via a Telegram bot<u><\/u><u><\/u><\/p>\n<p>\u00a0<u><\/u><u><\/u>\u201cAs many groups that use APT (advanced persistent threat) prefer to embed malicious content in a document that seems harmless, companies need to be aware of the possible threats coming from emails and evaluate the effectiveness of their XDR protection against Spam, Phishing and various malware , like the Green Stone Malware Dropper\u201d, recommends Camargo.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The Picus Threat Library includes the following threats for the Green Stone malware dropper: Green Stone Malware Dropper Email Threat (Email Infiltration (Phishing)) \u2013 ID 69096 and Green Stone Malware Dropper Download Threat (Network Infiltration) \u2013 ID 70452<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p><strong>3. The HavanaCrypt Ransomware<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The year 2022 was marked by the distribution of malware disguised as legitimate programs and software updates, such as Windows 10, Google Chrome and Microsoft Exchange. This month, a new malware family, HavanaCrypt, was found in native state. This malware masquerades as a legitimate Google Software application and uses an IP address belonging to a hosting service on Microsoft Azure, which is the C2 server, to appear legitimate. Further analysis showed that the malware uses the QueueUserWorkItem function to implement a threat array for its other payloads and a .NET System.Threading namespace method, which allows a sequence of execution methods. HavanaCrypt uses KeePass Password Safe modules, an open source password manager, during the file encryption process.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p>This malware is an application compiled in .NET and protects its code in a .NET assembly using Obfuscate, an open source .NET obfuscator.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49091 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO3.png\" alt=\"\" width=\"647\" height=\"324\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO3.png 647w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO3-480x240.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 647px, 100vw\" \/><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\"><strong>Figure 3. Obfuscated sample of HavanaCrypt<\/strong><u><\/u><u><\/u><\/p>\n<p>\u00a0<u><\/u><u><\/u>HavanaCrypt malware is designed to have several anti-virtualization techniques to avoid dynamic analysis in case it runs in a virtual machine. It even scans services mostly used by virtual machines like VMware Tools, VMTools and\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/havanacrypt-ransomware-fake-google\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fclick.cse360.com.br%252FClick%252FAddCampaignEmailClick%252F8722088b-d484-48ce-032b-08da6f7e5e3e%252Fhttps%2525253a%2525252f%2525252fwww.infosecurity-magazine.com%2525252fnews%2525252fhavanacrypt-ransomware-fake-google%2525252f%252F78893d7e-df5c-424c-8d6b-906c11b5efba%252Fchris.santos2007%2540outlook.com%252FFalse%26data%3D05%257C01%257C%257C049ce88eb01140dc551708da7ed56c34%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637961752381899454%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DWETaT0Qt1yC6Og7xBiYDzROmt2VFTye8xtJScOqT7Ms%253D%26reserved%3D0&amp;source=gmail&amp;ust=1660727910377000&amp;usg=AOvVaw3QtwBQKsyJRR1rPHjGjCvw\">mouse wm<\/a>???????? To analyze this malware, researchers used deobfuscation tools such as DeObfuscar and de4dot.<u><\/u><u><\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49092 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO4.png\" alt=\"\" width=\"597\" height=\"319\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO4.png 597w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO4-480x256.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 597px, 100vw\" \/><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\">\u00a0<u><\/u>Figure 4. Services scanned by HavanaCrypt malware<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">Browser Tor directories have been found to be among the targets that HavanaCrypt avoids encrypting. The attackers may have planned to communicate with their victims via the Tor browser. Another strange thing that stands out is that criminals do not send ransom notes. \u201cWith that in mind, the researchers think that HavanaCrypt is still in the development process. However, it is important that organizations test their system against this new family of malware\u201d, warns the CEO of CLM.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The Picus Threat Library includes the following threats for HavanaCrypt: HavanaCrypt Ransomware Email Threat (Email Infiltration (Phishing)) \u2013 ID 24728 and HavanaCrypt Ransomware Download Threat (Network Infiltration) \u2013 ID 91290<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\"><strong>4.\u00a0\u00a0\u00a0\u00a0<\/strong>\u00a0<strong>Lilith Ransomware<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">A C\/C++ console-based ransomware called Lilith has been discovered in its native state. This malware is designed for the Windows x64 architecture, and like many other ransomware operations, Lilith uses the double extortion method: it steals sensitive data, encrypts it, and sends a ransom note by providing a chat address in the Tor browser. on the target system.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49093 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO5.png\" alt=\"\" width=\"565\" height=\"328\" \/><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\">Figure 5: Ransom note sent by attackers<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">Analysis shows that Lilith malware does not encrypt all types of files on the target System. For example, EXE, DLL, SYS and Program Files, Web browsers and Trash Folders are excluded from the encryption process. In addition to these files, a strange file found on the victim&#039;s system stands out: ecdh_pub_k.bin. This file is also excluded from the encryption process and stores the local public key of the BABUK ransomware infections, indicating that these two malware families may be linked in some way.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The malware performs encryption using a Windows cryptographic API and the Windows CryptGenRandom function to generate a random key. While the researchers say the new Lilith family is nothing new, it is one of the latest that organizations need to test their systems.<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The Picus Threat Library includes the following threats for Lilith ransomware: Lilith Ransomware Email Threat (Email Infiltration (Phishing)) Lilith Ransomware Download Threat (Network Infiltration) \u2013 ID 35395 and Lilith Ransomware Download Threat (Network Infiltration) \u2013 ID 94407<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p><strong>5.<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0<strong>H0lyGh0st Ransomware<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">H0lyGh0st is a North Korean cyber extortion threat group known for developing malware payloads and perpetrating ransomware attacks since June 2021. In 2018, they launched many successful attacks against small and medium-sized businesses such as banks , manufacturers, schools and event and meeting planning companies worldwide.<u><\/u><u><\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49094 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO6.png\" alt=\"\" width=\"589\" height=\"268\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO6.png 589w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/ANEXO6-480x218.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 589px, 100vw\" \/><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-center\" align=\"center\">Figure 6: Timeline of payloads developed and used by H0lyGh0st<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">\u00a0<u><\/u><u><\/u>Although H0lyGh0st has been around since 2021 and tracked by MSTIC (Microsoft Threat Intelligence Center) at the time, the group now strikes back with a more persistent and improved malware variant: BTLC.exe.<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">The Picus Threat Library includes the following threats for H0lyGh0st ransomware: H0lyGh0st Ransomware Malware Download Threat (Network Infiltration) \u2013 ID 20076; H0lyGh0st Ransomware Malware Email Threat (Email Infiltration (Phishing)) \u2013 ID 41450; DEV-0530 Threat Group Campaign Malware Download Threat (Network Infiltration) \u2013 ID 97451 and DEV-0530 Threat Group Campaign Malware Email Threat (Email Infiltration (Phishing)) \u2013 ID 75946<u><\/u><u><\/u><u><\/u>\u00a0<u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\"><strong>About CLM<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">CLM is a value-added Latin American distributor focused on information security, data protection, data center infrastructure and cloud. The company recently received three awards: the best distributor in Latin America by Nutanix, an award won for the quality and agility in the services provided to the channels; the Lenovo\/Intel Best Growth LA Partner award given to the company that stands out the most in terms of sales growth; and the Infor Channel Distribution Excellence, an achievement that is due to CLM&#039;s commitment to excellence and tireless pursuit of providing the best solutions and services to business partners.<u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">Headquartered in S\u00e3o Paulo, the company has affiliates in the US, Colombia, Peru and Chile. With an extensive network of VARs in Latin America and enormous experience in the market, CLM is constantly looking for innovative and disruptive solutions to provide more and more value for its channels and customers.\u00a0<u><\/u><u><\/u><a href=\"https:\/\/www.clm.international\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fclick.cse360.com.br%252FClick%252FAddCampaignEmailClick%252F8722088b-d484-48ce-032b-08da6f7e5e3e%252Fhttp%2525253a%2525252f%2525252fwww.clm.international%2525252f%252F78893d7e-df5c-424c-8d6b-906c11b5efba%252Fchris.santos2007%2540outlook.com%252FFalse%26data%3D05%257C01%257C%257C049ce88eb01140dc551708da7ed56c34%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637961752381899454%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3Dd3sSzZhjsrV8jMZ9lqIaFOjiBQ17RkrrpYtLy0M62%252BY%253D%26reserved%3D0&amp;source=gmail&amp;ust=1660727910377000&amp;usg=AOvVaw2n4mv0BkmG7llp01rA82-o\">www.CLM.international<\/a><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\"><strong>About Picus Security<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_7701042262777879457ql-align-justify\">Founded in 2013 by cybersecurity veterans with academic backgrounds and extensive hands-on experience, Picus Security pioneered Breach and Attack Simulation (BAS) technology, helping organizations improve their cyber resilience ever since. The company is recognized by Frost &amp; Sullivan as one of the most innovative vendors in the BAX market, as well as being the highest rated BAS company by Gartner Peer Insights.\u00a0<u><\/u><u><\/u><a href=\"https:\/\/www.picussecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fclick.cse360.com.br%252FClick%252FAddCampaignEmailClick%252F8722088b-d484-48ce-032b-08da6f7e5e3e%252Fhttp%2525253a%2525252f%2525252fwww.picussecurity.com%2525252f%252F78893d7e-df5c-424c-8d6b-906c11b5efba%252Fchris.santos2007%2540outlook.com%252FFalse%26data%3D05%257C01%257C%257C049ce88eb01140dc551708da7ed56c34%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637961752381899454%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DazpuQjRVgI%252BvvB1D9PaBDc9r4f7%252F4xGCegcrzY2pSXc%253D%26reserved%3D0&amp;source=gmail&amp;ust=1660727910377000&amp;usg=AOvVaw2rT3y4IdV5tEipcppkGJLH\">www.PicusSecurity.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Novos grupos e fam\u00edlias de malwares exigem agilidade na resposta e evidenciam a necessidade de simular viola\u00e7\u00f5es nos sistemas de prote\u00e7\u00e3o Em mais um m\u00eas agitado para os CISOS, o relat\u00f3rio da Picus Security, pioneira em simula\u00e7\u00e3o de viola\u00e7\u00e3o e ataque (BAS &#8211; Breach and Attack Simulation), mostra o surgimento de campanhas de ciberataques deflagradas [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[],"class_list":["post-49088","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho - ABES\" \/>\n<meta property=\"og:description\" content=\"Novos grupos e fam\u00edlias de malwares exigem agilidade na resposta e evidenciam a necessidade de simular viola\u00e7\u00f5es nos sistemas de prote\u00e7\u00e3o Em mais um m\u00eas agitado para os CISOS, o relat\u00f3rio da Picus Security, pioneira em simula\u00e7\u00e3o de viola\u00e7\u00e3o e ataque (BAS &#8211; Breach and Attack Simulation), mostra o surgimento de campanhas de ciberataques deflagradas [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-26T11:01:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho\",\"datePublished\":\"2022-08-26T11:01:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/\"},\"wordCount\":2037,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/unnamed-1.jpg\",\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/\",\"name\":\"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/unnamed-1.jpg\",\"datePublished\":\"2022-08-26T11:01:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/unnamed-1.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/unnamed-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CLM and Picus analyze the five main cyberthreats that emerged in July - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/","og_locale":"en_US","og_type":"article","og_title":"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho - ABES","og_description":"Novos grupos e fam\u00edlias de malwares exigem agilidade na resposta e evidenciam a necessidade de simular viola\u00e7\u00f5es nos sistemas de prote\u00e7\u00e3o Em mais um m\u00eas agitado para os CISOS, o relat\u00f3rio da Picus Security, pioneira em simula\u00e7\u00e3o de viola\u00e7\u00e3o e ataque (BAS &#8211; Breach and Attack Simulation), mostra o surgimento de campanhas de ciberataques deflagradas [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2022-08-26T11:01:58+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho","datePublished":"2022-08-26T11:01:58+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/"},"wordCount":2037,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg","articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/","url":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/","name":"CLM and Picus analyze the five main cyberthreats that emerged in July - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg","datePublished":"2022-08-26T11:01:58+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/08\/unnamed-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/clm-e-picus-analisam-as-cinco-principais-ciberameacas-que-surgiram-em-julho\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"CLM e Picus analisam as cinco principais ciberamea\u00e7as que surgiram em julho"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-27 14:45:33","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/49088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=49088"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/49088\/revisions"}],"predecessor-version":[{"id":49096,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/49088\/revisions\/49096"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=49088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=49088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=49088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}