{"id":55349,"date":"2022-12-22T13:56:13","date_gmt":"2022-12-22T16:56:13","guid":{"rendered":"https:\/\/abes.org.br\/?p=55349"},"modified":"2022-12-20T11:13:38","modified_gmt":"2022-12-20T14:13:38","slug":"picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/","title":{"rendered":"Picus Labs and CLM Analyze the Five Most Harmful Cyber Threats of November 2022"},"content":{"rendered":"<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-55351\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png\" alt=\"\" width=\"455\" height=\"178\" \/><\/p>\n<p style=\"text-align: center\"><em>Malware families and ransomware campaigns adopt different strategies \u2013 phishing, information stealing, cryptomining, etc. \u2013 to succeed in your investees<\/em><\/p>\n<p>Picus Labs and CLM, a Latin American value-added distributor focused on information security, data protection, cloud and infrastructure for data centers, value-added distributor of Picus, list the top five cyberthreats that victimized thousands of organizations in the last month. Are they:<\/p>\n<p>Iranian government-sponsored APT (Advanced Persistent Threat) malicious actors have deployed a cryptominer and credential harvester on US federal networks.<\/p>\n<p>The Hive ransomware, which affected more than 1,300 companies, caused $100 million in ransom payments.<\/p>\n<p>Backdoor loader TONESHELL, whose attacks were perpetrated by the group Earth Preta, also known as Mustang Panda and Bronze President, use fake Google and DropBox accounts, with the use of APT.<\/p>\n<p>New variant of the Koxic ransomware that, despite having appeared in Korea, has perpetrated attacks all over the world. Koxic reconfigures the system, disables real-time monitoring features, including behavioral ones, preventing detection by Windows Defender.<\/p>\n<p>Aurora Malware, which initially emerged as a Malware-as-a-Service (MaaS) botnet with data theft and remote access capabilities. In September, cybersecurity researchers found that it had become an infostealer, and in November, from analysis of many active C2 servers, it was found that Aurora was the number one infostealer used by malicious actors.<\/p>\n<div id=\"attachment_55352\" style=\"width: 262px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55352\" class=\"wp-image-55352\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/Francisco-cLM-1.jpg\" alt=\"\" width=\"252\" height=\"243\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/Francisco-cLM-1.jpg 385w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/Francisco-cLM-1-300x289.jpg 300w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/Francisco-cLM-1-12x12.jpg 12w\" sizes=\"(max-width: 252px) 100vw, 252px\" \/><p id=\"caption-attachment-55352\" class=\"wp-caption-text\">Francisco Camargo<\/p><\/div>\n<p>Whatever the scenario, says CLM CEO Francisco Camargo, in order to prevent these and other threats, it is essential to carry out simulations and test the companies&#039; defenses. \u201cIt&#039;s worth mentioning that, according to a Picus Library report released this week, although most firewalls detect and block, for example, SQLi attacks quite easily. Recent research has shown that many vendors of web application firewalls (WAF) have failed to block SQLi attacks that exploit JSON for delivery. Picus Labs has added this new WAF bypass method for SQL injection to the Picus Threat Library.\u201d<\/p>\n<p>Detailed information on the five cyberthreats<\/p>\n<p>For those who need more details about these five threats, it is worth checking out more details, including the tables, whose various cyberthreats related to these attacks were included by Picus in its library.<\/p>\n<p>1. Agents of Iranian APTs who attacked FCEB (AA22-320A)<\/p>\n<p>On November 16, 2022, CISA (Cibersecurity &amp; Infrastructure Security Agency) and the FBI issued a joint statement regarding the attack campaign of these APT agents, who exploited the unpatched Log4Shell vulnerability to access a VMware Horizon server, which belongs to a organization of the Civilian Federal Executive Branch (FCEB) of the United States. On initial access, cybercriminals allowed specific directories to download malicious tools without being noticed by virus scans. Afterwards, they ran a PowerShell script to disable Windows Defender and downloaded malicious files and software (XMRig crypto miner) onto the target system, which was later leveraged to establish persistence and use the victim&#039;s computing power to mine cryptocurrency.<\/p>\n<p>The attackers then move laterally from the compromised Horizon VM server to the VMware VDI-KMS host using a built-in Windows user account over an RDP connection. Later they ported some tools to the VID-KMS host (Mimikatz, PsExec, ngrok) for post-exploitation activities. Finally, they were able to gain full control over all assets associated with the domain, including the domain controller.<\/p>\n<p>Picus Threat Library included the following for the Iranian APT:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-55353\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-16.png\" alt=\"\" width=\"557\" height=\"313\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-16.png 557w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-16-480x270.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 557px, 100vw\" \/><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\"><strong>2. Hive Ransomware (AA22-321A)<\/strong><u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">holders of\u00a0<strong>hive ransomware<\/strong>\u00a0use different initial access techniques. However, Picus Labs has observed that they send phishing emails with a malicious attachment designed to exploit known vulnerabilities in public-facing applications such as Windows Exchange Servers.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">Once the foothold is gained, Hive agents download malicious binaries and an obfuscated Powershell script, which is part of the Cobalt Strike framework, from their C2 server. By compromising the local computer&#039;s most powerful internal user, NT Authority, attackers dump all NTLM hashes to leverage a Pass-the-Hash (PtH) attack.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">Using stolen valid account credentials, criminals send RDP (Remote Desktop Protocol) connection requests to many internal assets to see which databases they have access to. It is suspected that this was done to check the expansion of their access and find out what sensitive information they can exfiltrate before encryption begins. Then, having a list of all domain objects, attackers run a batch script to ping all items in the list and record those that respond to a file. These files are further encrypted for greater impact.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">\u201cIn fact, cyber espionage exploiting Google Drive for C2 infrastructure has been reported by other leading cybersecurity companies, such as Netskope\u201d, mentions Camargo.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">Picus Labs has added new attack simulations to the Picus Threat Library for new malware used by Hive agents.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-55354\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-17.png\" alt=\"\" width=\"643\" height=\"131\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-17.png 643w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-17-480x98.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 643px, 100vw\" \/><\/p>\n<p>3. TONESHELL backdoor loader, whose attacks were filed by the group, which uses APT, Earth Preta, also known as Mustang Panda and Bronze President. These crackers use fake Google and DropBox accounts, sending spearphishing with a malicious Google Drive or DropBox link attached to them to deploy the Hive malware.<\/p>\n<p>\u201cFrom March 2022, we begin to see new cyber-espionage activity,\u201d says the Picus Labs report. According to security researchers, this attack campaign originates from an Advanced Persistent Threat (APT) agent. Analysis shows that the attachments contain malicious files (rar\/zip\/jar) such as images (.png), word documents (.doc) and legitimate executables (.exe), which have benign-looking names that trick victims into thinking they come from government sources. But in reality, they trigger the execution of the following malware families: TONEINS, TONESHELL and PUBLOAD.<\/p>\n<p>Among these three malware, TONESHELL is the backdoor mainly used by Earth Preta in its targeted phishing campaigns. TONESHELL is loaded and decoded on the target system via the shellcode loader called Backdoor.Win32.TONESHELL. Further analysis shows that the TONESHELL payload code contains several functions with self-explanatory strings used for file upload, download and execution, lateral movement and intranet data exchange via OnePipeShell, unidirectional shell over a named pipe and TwoPipeShell functions.<\/p>\n<p>Once the backdoor is installed and encrypted C2 communication is established, attackers exfiltrate sensitive information as part of their double extortion method.<\/p>\n<p>Picus Labs had already included threats for Mustang Panda. Now added to the Picus Threat Library the following threats for TONESHELL backdoor, TONEINS malware dropper and PUBLOAD malware downloader:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-55355\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-18.png\" alt=\"\" width=\"747\" height=\"389\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-18.png 747w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-18-480x250.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 747px, 100vw\" \/><\/p>\n<p>4. Koxic ransomware \u2013 new variant. Despite having originated in Korea, Koxic has perpetrated attacks around the world. It reconfigures the system, disables real-time monitoring features, including behavioral ones, preventing Windows Defender detection.<\/p>\n<p>Upon execution, Koxic ransomware initiates a discovery phase to recover current system information. It then resets the RDP expiration to its maximum to maintain a longer remote desktop session and disables Windows Defender&#039;s behavior and real-time monitoring features to evade detection and prevent defense systems from sending email notifications. alert to SIEM systems.<\/p>\n<p>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Terminal Services\\MaxDisconnectionTime HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Terminal Services\\MaxIdleTime<\/p>\n<p>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware<\/p>\n<p>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection\\DisableRealtimeMonitoring HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection\\DisableBehaviorMonitoring HKCU\\Software\\Policies\\Microsoft\\Windows\\Explorer\\DisableNotificationCenter<\/p>\n<p>The ransomware continues its flow, deleting volume shadow copies and disabling database services such as MongoDB, SQLWriter, and MySQL. Then, the malware starts making a list of all targets that can be encrypted. As a parallel process, this is a threat that goes through this list, encrypting each item one by one. Encryption is performed using the AES algorithm in CBC mode, where the initialization value (IV) value and the symmetric key for the AES algorithm are encrypted by an asymmetric encryption algorithm, RSA.<\/p>\n<p>The Picus Threat Library includes the following threats for Koxic ransomware:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-55356\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-19.png\" alt=\"\" width=\"659\" height=\"113\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-19.png 659w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-19-480x82.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 659px, 100vw\" \/><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\"><strong>5. Aurora Malware<\/strong>\u00a0initially emerged as a Malware-as-a-Service (MaaS) botnet with data theft and remote access capabilities. In September, cybersecurity researchers found that it had become an infostealer, and in November, from analysis of many active C2 servers, it was found that Aurora had become the number one infostealer used by malicious actors. \u201cThe data is exfiltrated in JSON format from the target system to an attacker-owned Aurora C2, which listens for incoming network traffic on ports 9865 and 8081 over TCP,\u201d details the Picus Labs report, which had already observed different RATs (PoetRAT, FairFAX) used in Aurora malware campaign in 2021.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">In April 2022, Aurora was first announced on Russian-speaking hacking forums and the Telegram channel as a Malware-as-a-Service (MaaS) botnet with data-stealing and remote access capabilities. As of August 2022, its activity has almost disappeared; being suspected that its developers stopped selling it and removed its code from underground repositories.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">However, in September 2022, a new and large Aurora activity caught the attention of security researchers, revealing itself not as a botnet, but as an \u201cinfostealer\u201d. It became so popular that many big drug teams suggested its use. By November 2022, an analysis of many active C2 servers showed that Aurora had become the number one infostealer used by hostile agents.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">Aurora primarily uses the lxn\/win library for system-related information, which depends on WMIC. The following wmic commands are executed on the infected host:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-55357\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-20.png\" alt=\"\" width=\"695\" height=\"526\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-20.png 695w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-20-480x363.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 695px, 100vw\" \/><\/p>\n<p>Data is exfiltrated in JSON format from the target system to an attacker-owned Aurora C2, which listens for incoming network traffic on ports 9865 and 8081 over TCP.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_4978790073283148673ql-align-justify\">The Picus Threat Library now includes the following threats for the Aurora infostealer malware:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-55358\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-21.png\" alt=\"\" width=\"727\" height=\"233\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-21.png 727w, https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-21-480x154.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 727px, 100vw\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Fam\u00edlias de malwares e campanhas de ransomware adotam diferentes estrat\u00e9gias \u2013 phishing, roubo de informa\u00e7\u00f5es, criptominerador etc. \u2013 para obter sucesso em suas investidas O Picus Labs e a CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, value-added distributor da Picus, listam [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[621,3547,3546,3548],"class_list":["post-55349","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-malware","tag-ransoware","tag-site-maliciosos","tag-trafego-de-rede"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022 - ABES\" \/>\n<meta property=\"og:description\" content=\"Fam\u00edlias de malwares e campanhas de ransomware adotam diferentes estrat\u00e9gias \u2013 phishing, roubo de informa\u00e7\u00f5es, criptominerador etc. \u2013 para obter sucesso em suas investidas O Picus Labs e a CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, value-added distributor da Picus, listam [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T16:56:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022\",\"datePublished\":\"2022-12-22T16:56:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/\"},\"wordCount\":1849,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/unnamed-22.png\",\"keywords\":[\"Malware\",\"ransoware\",\"site maliciosos\",\"tr\u00e1fego de rede\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/\",\"name\":\"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/unnamed-22.png\",\"datePublished\":\"2022-12-22T16:56:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/unnamed-22.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/unnamed-22.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/","og_locale":"en_US","og_type":"article","og_title":"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022 - ABES","og_description":"Fam\u00edlias de malwares e campanhas de ransomware adotam diferentes estrat\u00e9gias \u2013 phishing, roubo de informa\u00e7\u00f5es, criptominerador etc. \u2013 para obter sucesso em suas investidas O Picus Labs e a CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, value-added distributor da Picus, listam [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2022-12-22T16:56:13+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022","datePublished":"2022-12-22T16:56:13+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/"},"wordCount":1849,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png","keywords":["Malware","ransoware","site maliciosos","tr\u00e1fego de rede"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/","url":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/","name":"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png","datePublished":"2022-12-22T16:56:13+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2022\/12\/unnamed-22.png"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/picus-labs-e-clm-analisam-as-cinco-ciberameacas-mais-nocivas-de-novembro-de-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Picus Labs e CLM analisam as cinco ciberamea\u00e7as mais nocivas de novembro de 2022"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-12 15:05:54","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/55349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=55349"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/55349\/revisions"}],"predecessor-version":[{"id":55360,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/55349\/revisions\/55360"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=55349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=55349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=55349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}