{"id":65749,"date":"2023-09-07T08:53:04","date_gmt":"2023-09-07T11:53:04","guid":{"rendered":"https:\/\/abes.org.br\/?p=65749"},"modified":"2023-08-11T16:26:20","modified_gmt":"2023-08-11T19:26:20","slug":"depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/","title":{"rendered":"After Phishing, Now It&#039;s Smishing-as-a-Service"},"content":{"rendered":"<p style=\"text-align: center\"><em>Nova\/velha amea\u00e7a para roubar clientes de bancos<\/em><\/p>\n<p style=\"text-align: center\"><em>CLM e SentinelOne divulgam modus operandi do grupo Neo_Net, que tem roubado dinheiro e dados de milhares de v\u00edtimas em todo o mundo<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-65763 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12-1024x533.jpg\" alt=\"\" width=\"417\" height=\"217\" \/><\/p>\n<p>A\u00a0CLM, distribuidora latino-americana de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, divulga a pesquisa que venceu o primeiro\u00a0<a href=\"https:\/\/makingnews.us15.list-manage.com\/track\/click?u=c6958463be0e40c92c53666f9&amp;id=a27ff50e86&amp;e=7f07dff456\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/makingnews.us15.list-manage.com\/track\/click?u%3Dc6958463be0e40c92c53666f9%26id%3Da27ff50e86%26e%3D7f07dff456&amp;source=gmail&amp;ust=1691860918892000&amp;usg=AOvVaw0UHhBhnhgmnSU5dhW_rtSc\">Malware Research Challenge<\/a>, realizado pela SentinelOne, especializada em tecnologias de ciberseguran\u00e7a baseada em IA (Intelig\u00eancia Artificial) que abrange desde preven\u00e7\u00e3o, detec\u00e7\u00e3o, resposta e ca\u00e7a aos ataques, em parceria com a\u00a0<a href=\"https:\/\/makingnews.us15.list-manage.com\/track\/click?u=c6958463be0e40c92c53666f9&amp;id=9c6b3f562c&amp;e=7f07dff456\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/makingnews.us15.list-manage.com\/track\/click?u%3Dc6958463be0e40c92c53666f9%26id%3D9c6b3f562c%26e%3D7f07dff456&amp;source=gmail&amp;ust=1691860918892000&amp;usg=AOvVaw36LujOvdDjOxTz93QywW8p\">vx-underground<\/a>.<\/p>\n<p>O vencedor do desafio foi\u00a0<a href=\"https:\/\/makingnews.us15.list-manage.com\/track\/click?u=c6958463be0e40c92c53666f9&amp;id=60afc4e57c&amp;e=7f07dff456\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/makingnews.us15.list-manage.com\/track\/click?u%3Dc6958463be0e40c92c53666f9%26id%3D60afc4e57c%26e%3D7f07dff456&amp;source=gmail&amp;ust=1691860918892000&amp;usg=AOvVaw2InrYoV7qFaKpwlGgAyQks\">Pol Thill<\/a>, pesquisador da comunidade de seguran\u00e7a cibern\u00e9tica, com um estudo aprofundado e meticuloso sobre o Neo_Net, um agente de amea\u00e7as do cibercrime dirigido a milhares de clientes, que usam apps m\u00f3veis de institui\u00e7\u00f5es financeiras. Thill mostra, inclusive, o uso de uma plataforma de\u00a0<em><b>Smishing-as-a-Service<\/b><\/em>, chamada de\u00a0<em><b>Ankarex<\/b><\/em>, que al\u00e9m de ser usada pelo grupo \u00e9 alugada para outros cibercriminosos, ampliando ainda mais o n\u00famero de v\u00edtimas.\u00a0Smishing \u00e9 todo Phishing que \u00e9 distribu\u00eddo por mensagens SMS em vez de e-mails. No Brasil, os criminosos conseguem at\u00e9 centrais 0800 para dar mais credibilidade.<\/p>\n<p>Francisco Camargo, CEO da CLM, que distribui as solu\u00e7\u00f5es da SentinelOne na Am\u00e9rica Latina, ressalta a import\u00e2ncia desse tipo de competi\u00e7\u00e3o por contribuir de forma significativa para a compreens\u00e3o do cen\u00e1rio de seguran\u00e7a cibern\u00e9tica no mundo e a descoberta do\u00a0<em>modus operandi<\/em>\u00a0de grupos de cibercriminosos.<\/p>\n<p>\u201cA pesquisa sobre o Neo_Net conseguiu descrever o passo a passo dessa opera\u00e7\u00e3o criminosa e como ela se ramifica. Sim, o submundo dos crimes cibern\u00e9ticos virou uma franquia, com venda e aluguel de infraestruturas prontas para serem usadas. Eles t\u00eam estrat\u00e9gias, artif\u00edcios de neg\u00f3cios e propagandas para divulgar seus \u2018servi\u00e7os\u2019 e obter lucro\u201d, conta.<\/p>\n<div id=\"attachment_65750\" style=\"width: 335px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65750\" class=\"wp-image-65750\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-1-1024x1024.jpg\" alt=\"\" width=\"325\" height=\"325\" \/><p id=\"caption-attachment-65750\" class=\"wp-caption-text\">Oferta de Halloween com 15% de recursos extras ao recarregar a conta<\/p><\/div>\n<p>Pol Thill descobriu que as campanhas do Neo_Net s\u00e3o feitas em v\u00e1rios est\u00e1gios: mensagens SMS de phishing direcionados a clientes de bancos, uso do Smishing-as-a-Service, links maliciosos para p\u00e1ginas falsas que se parecem muito com a dos apps dos bancos e criam a ilus\u00e3o de autenticidade, enganando muitos correntistas. O objetivo, al\u00e9m de roubar dinheiro \u00e9 extrair dados.<\/p>\n<p><strong>Estudo<\/strong><br \/>\nDe acordo com o estudo de Thill, o Neo_Net tem conduzido uma extensa campanha de e-Crime direcionada a clientes de bancos importantes em todo o mundo, de junho de 2021 a abril de 2023. O foco principal dos criminosos s\u00e3o bancos espanh\u00f3is e chilenos, tanto que 30 das 50 institui\u00e7\u00f5es financeiras-alvo t\u00eam sede na Espanha ou no Chile, incluindo grandes bancos como Santander, BBVA e CaixaBank. Institui\u00e7\u00f5es-alvo em outras regi\u00f5es incluem Deutsche Bank, Cr\u00e9dit Agricole e ING. Uma lista completa est\u00e1 no Ap\u00eandice A no final do texto.<\/p>\n<p>Apesar de usar ferramentas relativamente pouco sofisticadas, o Neo_Net alcan\u00e7ou uma alta taxa de sucesso adaptando sua infraestrutura para alvos espec\u00edficos, o que resultou no roubo de mais de 350 mil euros das contas banc\u00e1rias das v\u00edtimas e comprometeu informa\u00e7\u00f5es de identifica\u00e7\u00e3o pessoal (Personally Identifiable Information &#8211; PII) como n\u00fameros de telefone, de identidade nacional e nomes de milhares delas.<\/p>\n<p>O Neo_Net estabeleceu e alugou uma ampla infraestrutura, incluindo pain\u00e9is de phishing, software de Smishing e trojans Android para v\u00e1rios afiliados; vendeu dados comprometidos de v\u00edtimas e lan\u00e7ou o\u00a0<strong>Ankarex<\/strong>, uma oferta bem-sucedida de\u00a0<strong>Smishing-as-a-Service<\/strong>, direcionada a v\u00e1rios pa\u00edses em todo o mundo.<\/p>\n<p><strong>Detalhamento t\u00e9cnico<\/strong><br \/>\nA seguir, encontra-se o relat\u00f3rio com detalhes das campanhas e os antecedentes do Neo_Net que esclarecem suas opera\u00e7\u00f5es ao longo dos anos.<\/p>\n<p><strong>Campanha de eCrime contra institui\u00e7\u00f5es financeiras<\/strong><br \/>\nA campanha emprega uma estrat\u00e9gia de ataque em v\u00e1rios est\u00e1gios, come\u00e7ando com mensagens SMS de phishing direcionados, distribu\u00eddas pela Espanha e outros pa\u00edses, e usando o servi\u00e7o propriet\u00e1rio da Neo_Net, o Ankarex, sua plataforma de Smishing-as-a-Service.<\/p>\n<p>Essas mensagens aproveitavam IDs de remetente (SIDs) para criar uma ilus\u00e3o de autenticidade, imitando institui\u00e7\u00f5es financeiras respeit\u00e1veis para enganar as v\u00edtimas.<\/p>\n<div id=\"attachment_65751\" style=\"width: 284px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65751\" class=\"wp-image-65751\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-2.jpg\" alt=\"\" width=\"274\" height=\"416\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-2.jpg 405w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-2-198x300.jpg 198w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-2-8x12.jpg 8w\" sizes=\"(max-width: 274px) 100vw, 274px\" \/><p id=\"caption-attachment-65751\" class=\"wp-caption-text\">Demonstra\u00e7\u00e3o da funcionalidade SID da Ankarex no Ankarex News Channel<\/p><\/div>\n<p>As mensagens SMS usam v\u00e1rias t\u00e1ticas de intimida\u00e7\u00e3o, como alegar que a conta da v\u00edtima foi acessada por um dispositivo n\u00e3o autorizado ou que o limite do seu cart\u00e3o foi temporariamente limitado devido a quest\u00f5es de seguran\u00e7a.<\/p>\n<p>As mensagens tamb\u00e9m cont\u00eam um hiperlink para uma p\u00e1gina de phishing do criminoso.<\/p>\n<p>As p\u00e1ginas de phishing s\u00e3o meticulosamente configuradas usando os pain\u00e9is do Neo_Net, PRIV8, e implementam diversas medidas de defesa, incluindo o bloqueio de solicita\u00e7\u00f5es de usu\u00e1rios que acessavam por dispositivos n\u00e3o m\u00f3veis e a oculta\u00e7\u00e3o das p\u00e1ginas de bots e scanners de rede. Essas p\u00e1ginas s\u00e3o projetadas para se assemelhar a aplicativos banc\u00e1rios genu\u00ednos, completos, com anima\u00e7\u00f5es para criar uma fachada convincente:<\/p>\n<div id=\"attachment_65752\" style=\"width: 417px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65752\" class=\"wp-image-65752\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-3.jpg\" alt=\"\" width=\"407\" height=\"422\" \/><p id=\"caption-attachment-65752\" class=\"wp-caption-text\">P\u00e1ginas de phishing do BBVA e do Santander<\/p><\/div>\n<p>Ap\u00f3s o envio das credenciais, as informa\u00e7\u00f5es das v\u00edtimas s\u00e3o exfiltradas ilicitamente para um bate-papo no Telegram por meio da API do Telegram Bot, concedendo aos criminosos acesso irrestrito aos dados roubados, incluindo os endere\u00e7os IP e dados de usu\u00e1rio das v\u00edtimas.<\/p>\n<div id=\"attachment_65753\" style=\"width: 301px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65753\" class=\"wp-image-65753\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-4.jpg\" alt=\"\" width=\"291\" height=\"359\" \/><p id=\"caption-attachment-65753\" class=\"wp-caption-text\">Afiliados da Neo_Net discutindo as credenciais capturadas e a conta banc\u00e1ria correspondente<\/p><\/div>\n<p>Posteriormente, os invasores empregaram v\u00e1rias t\u00e9cnicas para contornar os mecanismos de autentica\u00e7\u00e3o multifator (MFA) comumente usados por aplicativos banc\u00e1rios. Uma dessas abordagens envolve persuadir as v\u00edtimas a instalar um suposto aplicativo de seguran\u00e7a para sua conta banc\u00e1ria em seus dispositivos Android.<\/p>\n<div id=\"attachment_65754\" style=\"width: 181px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65754\" class=\"wp-image-65754\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-5.jpg\" alt=\"\" width=\"171\" height=\"318\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-5.jpg 306w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-5-161x300.jpg 161w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-5-6x12.jpg 6w\" sizes=\"(max-width: 171px) 100vw, 171px\" \/><p id=\"caption-attachment-65754\" class=\"wp-caption-text\">Aplicativo Android representando ING<\/p><\/div>\n<p>No entanto, este aplicativo n\u00e3o serve a nenhum prop\u00f3sito de seguran\u00e7a leg\u00edtimo e apenas solicita permiss\u00f5es para enviar e visualizar mensagens SMS.<\/p>\n<div id=\"attachment_65755\" style=\"width: 279px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65755\" class=\"wp-image-65755\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-6.jpg\" alt=\"\" width=\"269\" height=\"543\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-6.jpg 304w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-6-149x300.jpg 149w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-6-6x12.jpg 6w\" sizes=\"(max-width: 269px) 100vw, 269px\" \/><p id=\"caption-attachment-65755\" class=\"wp-caption-text\">App BBVA &#8211; solicita\u00e7\u00e3o de permiss\u00e3o por SMS ap\u00f3s a v\u00edtima clicar no bot\u00e3o \u201cAtualizar\u201d<\/p><\/div>\n<p>Na realidade, esses trojans do Android funcionavam como vers\u00f5es modificadas do spyware de SMS para Android, dispon\u00edvel publicamente, conhecido como SMS Eye. Alguns atores de amea\u00e7as ofuscaram ainda mais o trojan usando empacotadores p\u00fablicos para evitar a detec\u00e7\u00e3o por solu\u00e7\u00f5es antimalware. Esses trojans exfiltraram secretamente as mensagens SMS recebidas para um bate-papo exclusivo do Telegram.<\/p>\n<div id=\"attachment_65756\" style=\"width: 263px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65756\" class=\"wp-image-65756\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-7.jpg\" alt=\"\" width=\"253\" height=\"439\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-7.jpg 353w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-7-173x300.jpg 173w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-7-7x12.jpg 7w\" sizes=\"(max-width: 253px) 100vw, 253px\" \/><p id=\"caption-attachment-65756\" class=\"wp-caption-text\">Mensagens de telegrama mostrando OTPs BBVA exfiltrados<\/p><\/div>\n<p style=\"font-weight: 400\">As mensagens exfiltradas s\u00e3o usadas ent\u00e3o para ignorar o MFA nas contas de destino, capturando senhas descart\u00e1veis (OTPs). Al\u00e9m disso, os criminosos tamb\u00e9m foram observados fazendo liga\u00e7\u00f5es telef\u00f4nicas diretas para as v\u00edtimas, possivelmente para se passar por representantes do banco e engan\u00e1-las para que instalem o spyware do Android ou divulguem suas OTPs.<\/p>\n<p>O montante adquirido ilicitamente das v\u00edtimas durante um ano de opera\u00e7\u00e3o totalizou, no m\u00ednimo, 350 mil euros. No entanto, \u00e9 prov\u00e1vel que o valor real seja significativamente maior, uma vez que opera\u00e7\u00f5es e transa\u00e7\u00f5es mais antigas, que n\u00e3o envolvem mensagens de confirma\u00e7\u00e3o por SMS, podem n\u00e3o ter sido totalmente contabilizadas devido \u00e0 visibilidade limitada.<\/p>\n<h6><strong>Neo_Net<\/strong><\/h6>\n<p style=\"font-weight: 400\">Neo_Net, o ator proeminente respons\u00e1vel pela campanha global de crimes cibern\u00e9ticos, atua no cen\u00e1rio de ciberseguran\u00e7a pelo menos desde o in\u00edcio de 2021. Eles mant\u00eam um perfil p\u00fablico no GitHub com o nome \u201c<strong>notsafety<\/strong>\u201d e uma conta no Telegram que mostra seu trabalho e o identifica como o fundador da Ankarex, uma plataforma de Smishing-as-a-Service.<\/p>\n<div id=\"attachment_65757\" style=\"width: 283px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65757\" class=\"wp-image-65757\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-8.jpg\" alt=\"\" width=\"273\" height=\"329\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-8.jpg 392w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-8-249x300.jpg 249w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-8-10x12.jpg 10w\" sizes=\"(max-width: 273px) 100vw, 273px\" \/><p id=\"caption-attachment-65757\" class=\"wp-caption-text\">Perfil do Neo_Net no Telegram<\/p><\/div>\n<p>Por meio de suas contribui\u00e7\u00f5es no Telegram, o Neo_Net foi vinculado ao f\u00f3rum \u201c<a href=\"http:\/\/macosfera.com\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/macosfera.com&amp;source=gmail&amp;ust=1691860918892000&amp;usg=AOvVaw3pSbYH_5xC_2fNnKnIf6hH\">macosfera.com<\/a>\u201d, um f\u00f3rum de TI em espanhol. Endere\u00e7os de e-mail registrados com o dom\u00ednio do f\u00f3rum foram encontrados em rela\u00e7\u00e3o a v\u00e1rios pain\u00e9is de phishing criados pela Neo_Net, cujos alvos eram espanh\u00f3is e outras institui\u00e7\u00f5es. Esses endere\u00e7os de e-mail foram usados como nomes de usu\u00e1rio para os pain\u00e9is, sugerindo que Neo_Net pode ter colaborado com indiv\u00edduos deste f\u00f3rum para configurar sua infraestrutura. Os pain\u00e9is de phishing tamb\u00e9m indicam claramente o Neo_Net como o criador, com sua assinatura no topo dos arquivos php.<\/p>\n<div id=\"attachment_65758\" style=\"width: 623px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65758\" class=\"wp-image-65758\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-9-1024x566.jpg\" alt=\"\" width=\"613\" height=\"339\" \/><p id=\"caption-attachment-65758\" class=\"wp-caption-text\">Pain\u00e9is de phishing com links para macosfera[.]com (VirusTotal)<\/p><\/div>\n<h5><strong>Ankarex<\/strong><\/h5>\n<p style=\"font-weight: 400\">A principal cria\u00e7\u00e3o do Neo_Net \u00e9 a plataforma Ankarex Smishing-as-a-Service, que est\u00e1 ativa desde pelo menos maio de 2022. O Ankarex News Channel no Telegram, que anuncia o servi\u00e7o, tem atualmente 1700 assinantes e publica regularmente atualiza\u00e7\u00f5es sobre o software, bem como ofertas limitadas e brindes.<\/p>\n<p>O servi\u00e7o ser acessado em ankarex[.]net e, uma vez registrado, o usu\u00e1rio pode fazer upload de recursos usando transfer\u00eancias de criptomoeda e ent\u00e3o lan\u00e7ar suas pr\u00f3prias campanhas Smishing especificando o conte\u00fado do SMS e os n\u00fameros de telefone de destino. Atualmente, a Ankarex tem como alvo nove pa\u00edses, mas historicamente opera em outras regi\u00f5es.<\/p>\n<div id=\"attachment_65759\" style=\"width: 579px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65759\" class=\"wp-image-65759\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-10-1024x423.jpg\" alt=\"\" width=\"569\" height=\"235\" \/><p id=\"caption-attachment-65759\" class=\"wp-caption-text\">Lista de pre\u00e7os e pa\u00edses-alvo da Ankarex<\/p><\/div>\n<p>Al\u00e9m do servi\u00e7o Smishing, a Neo_Net tamb\u00e9m oferece leads, incluindo nomes de v\u00edtimas, endere\u00e7os de e-mail, IBANs e n\u00fameros de telefone para venda no Ankarex Channel. Ele tamb\u00e9m anunciou seu servi\u00e7o de spyware SMS para Android para membros selecionados. Notavelmente, todo canal criado para exfiltrar as mensagens SMS capturadas t\u00eam o Neo_Net listado como administrador, e v\u00e1rios nomes de pacotes dos trojans do Android aludem ao seu criador com nomes como com.neonet.app.reader. \u00c9 prov\u00e1vel que Neo_Net tenha alugado sua infraestrutura para afiliados, alguns dos quais foram observados trabalhando com ele em v\u00e1rias campanhas exclusivas, permitindo que eles conduzissem phishing e transfer\u00eancias de recursos de forma independente.<\/p>\n<div id=\"attachment_65760\" style=\"width: 270px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65760\" class=\"wp-image-65760\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-11.jpg\" alt=\"\" width=\"260\" height=\"539\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-11.jpg 294w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-11-145x300.jpg 145w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/08\/foto-clm-11-6x12.jpg 6w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><p id=\"caption-attachment-65760\" class=\"wp-caption-text\">Neo_Net demonstrando Ankarex em seu pr\u00f3prio telefone e exibindo not\u00e1vel OPSEC ao longo de suas campanhas<\/p><\/div>\n<p style=\"font-weight: 400\">Ao longo de sua opera\u00e7\u00e3o de um ano, o Neo_Net foi rastreado at\u00e9 v\u00e1rios endere\u00e7os IP exclusivos, indicando que ele atualmente reside no M\u00e9xico. Neo_Net opera principalmente em pa\u00edses de l\u00edngua espanhola e se comunica predominantemente em espanhol com suas afiliadas. A comunica\u00e7\u00e3o no Ankarex Channel \u00e9 quase exclusivamente feita em espanhol.<\/p>\n<p>No entanto, o Neo_Net tamb\u00e9m foi observado colaborando com pessoas que n\u00e3o falam espanhol, incluindo outro cibercriminoso identificado pelo Telegram como devilteam666. Essa opera\u00e7\u00e3o em particular envolveu o uso do Google Ads visando propriet\u00e1rios de carteiras criptogr\u00e1ficas, e o devilteam666 continua a oferecer servi\u00e7os maliciosos do Google Ads em seu canal do Telegram.<\/p>\n<p><strong>Ap\u00eandice A: Institui\u00e7\u00f5es Financeiras Alvo<\/strong><\/p>\n<ul style=\"font-weight: 400\">\n<li><strong>Espanha<\/strong>: Santander, BBVA, CaixaBank, Sabadell, ING Espa\u00f1a, Unicaja, Kutxabank, Bankinter, Abanca, Laboral Kutxa, Ibercaja, BancaMarch, CajaSur, OpenBank, Grupo Caja Rural, Cajalmendralejo, MoneyGo, Cecabank, Cetelem, Colonya, Self Bank, Banca Pueyo<\/li>\n<li><strong>Fran\u00e7a<\/strong>: Cr\u00e9dit Agricole, Caisse d\u2019Epargne, La Banque postale, Boursorama, Banque de Bretagne<\/li>\n<li><strong>Gr\u00e9cia<\/strong>: National Bank of Greece<\/li>\n<li><strong>Alemanha<\/strong>: Sparkasse, Deutsche Bank, Commerzbank<\/li>\n<li><strong>Reino Unido<\/strong>: Santander UK<\/li>\n<li><strong>\u00c1ustria<\/strong>: BAWAG P.S.K.<\/li>\n<li><strong>Pa\u00edses Baixos<\/strong>: ING<\/li>\n<li><strong>Pol\u00f4nia<\/strong>: PKO Bank Polski<\/li>\n<li><strong>Chile<\/strong>: BancoEstado, Scotiabank (Cencosud Scotiabank), Santander (officebanking), Banco Ripley, Banco de Chile, Banco Falabella, Banco de Cr\u00e9dito e Inversiones, Ita\u00fa CorpBanca<\/li>\n<li><strong>Col\u00f4mbia<\/strong>: Bancolombia<\/li>\n<li><strong>Venezuela<\/strong>: Banco de Venezuela<\/li>\n<li><strong>Peru<\/strong>: BBVA Peru<\/li>\n<li><strong>Equador<\/strong>: Banco Pichincha<\/li>\n<li><strong>Panam\u00e1<\/strong>: Zinli<\/li>\n<li><strong>EUA<\/strong>: Prosperity Bank, Greater Nevada Credit Union<\/li>\n<li><strong>Austr\u00e1lia<\/strong>: CommBank<\/li>\n<\/ul>\n<p style=\"font-weight: 400\"><strong>Ap\u00eandice B<\/strong><br \/>\nIndicadores de comprometimento<\/p>\n<table style=\"font-weight: 400\" width=\"483\">\n<tbody>\n<tr>\n<td width=\"198\"><strong>APK SHA1 Hashes<\/strong><\/td>\n<td width=\"179\"><strong>Nome da atividade principal<\/strong><\/td>\n<td width=\"105\"><strong>Institui\u00e7\u00e3o personificada<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"198\">de8929c1a0273d0ed0dc3fc55058e0cb19486b3c<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">b344fe1bbb477713016d41d996c0772a308a5146<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Laboral Kutxa<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">8a099af61f1fa692f45538750d42aab640167fd2<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Correos<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">ab14161e243d478dac7a83086ed4839f8ad7ded8<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">ded2655512de7d3468f63f9487e16a0bd17818ff<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">CaixaBank<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">a5208de82def52b4019a6d3a8da9e14a13bc2c43<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">CaixaBank<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">21112c1955d131fa6cab617a3d7265acfab783c2<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Openbank<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">6ea53a65fe3a1551988c6134db808e622787e7f9<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Unicaja<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">62236a501e11d5fbfe411d841caf5f2253c150b8<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">7f0c3fdbfcdfc24c2da8aa3c52aa13f9b9cdda84<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">f918a6ecba56df298ae635a6a0f008607b0420b9<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Santander<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">ffbcdf915916595b96f627df410722cee5b83f13<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">7b4ab7b2ead7e004c0d93fe916af39c156e0bc61<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">CajaSur<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">34d0faea99d94d3923d0b9e36ef9e0c48158e7a0<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">e6c485551d4f209a0b7b1fa9aa78b7efb51be49b<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">1df3ed2e2957efbd1d87aac0c25a3577318b8e2a<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">6a907b8e5580a5067d9fb47ef21826f164f68f3f<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Grupo Caja Rural<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">5d1c7ff3d16ec770cf23a4d82a91358b9142d21a<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Grupo Caja Rural<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">86ad0123fa20b7c0efb6fe8afaa6a756a86c9836<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Grupo Caja Rural<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">14a36f18a45348ad9efe43b20d049f3345735163<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">Cajalmendralejo<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">b506503bb71f411bb34ec8124ed26ae27a4834b9<\/td>\n<td width=\"179\">com.neonet.app.reader.MainActivity<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">afe84fa17373ec187781f72c330dfb7bb3a42483<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">445468cd5c298f0393f19b92b802cfa0f76c32d4<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">8491ff15ad27b90786585b06f81a3938d5a61b39<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">2714e0744ad788142990696f856c5ffbc7173cf4<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">1ce0afe5e09b14f8aee6715a768329660e95121e<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">96a3600055c63576be9f7dc97c5b25f1272edd2b<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">9954ae7d31ea65cd6b8cbdb396e7b99b0cf833f4<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">07159f46a8adde95f541a123f2dda6c49035aad1<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">ab19a95ef3adcb83be76b95eb7e7c557812ad2f4<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">db8eeab4ab2e2e74a34c47ad297039485ff75f22<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">dbf0cec18caabeb11387f7e6d14df54c808e441d<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">69d38eed5dc89a7b54036cc7dcf7b96fd000eb92<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">c38107addc00e2a2f5dcb6ea0cbce40400c23b49<\/td>\n<td width=\"179\">com.cannav.cuasimodo.jumper.actividades<\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">279048e07c25fd75c4cef7c64d1ae741e178b35b<\/td>\n<td width=\"179\">com.uklapon.mafin.chinpiling.actividades<\/td>\n<td width=\"105\">Bankinter<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">ef8c5d639390d9ba138ad9c2057524ff6e1398de<\/td>\n<td width=\"179\"><\/td>\n<td width=\"105\">BBVA<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">e7c2d0c80125909d85913dfb941bdc373d677326<\/td>\n<td width=\"179\"><\/td>\n<td width=\"105\">ING<\/td>\n<\/tr>\n<tr>\n<td width=\"198\">145bd67f94698cc5611484f46505b3dc825bd6cd<\/td>\n<td width=\"179\"><\/td>\n<td width=\"105\">BancoEstado<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>Dom\u00ednios de phishing<\/strong><\/h3>\n<p style=\"font-weight: 400\">bbva.info-cliente[.]net<br \/>\nsantander.esentregas[.]ga<br \/>\nbbva.esentregas[.]ga<br \/>\ncorreos.esentregas[.]ga<\/p>\n<p><strong>Ap\u00eandice C: tags MITRE ATT&amp;CK<\/strong><\/p>\n<table style=\"font-weight: 400\" width=\"529\">\n<tbody>\n<tr>\n<td width=\"57\"><strong>ID<\/strong><\/td>\n<td width=\"198\"><strong>T\u00e9cnica<\/strong><\/td>\n<td width=\"274\"><strong>Explica\u00e7\u00e3o<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1406.002<\/td>\n<td width=\"198\">Obfuscated Files or Information: Software Packing<\/td>\n<td width=\"274\">Some APK files are packed and drop the unpacked dex file once executed<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1633.001<\/td>\n<td width=\"198\">Virtualization\/Sandbox Evasion: System Checks<\/td>\n<td width=\"274\">Some APK files have been modified and initially check for common sandbox names before unpacking<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1426<\/td>\n<td width=\"198\">System Information Discovery<\/td>\n<td width=\"274\">The Sms Eye trojan collects the brand and model of the infected phone<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1636.004<\/td>\n<td width=\"198\">Protected User Data: SMS Messages<\/td>\n<td width=\"274\">The Sms Eye trojan collects incoming SMS messages<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1437.001<\/td>\n<td width=\"198\">Application Layer Protocol: Web Protocols<\/td>\n<td width=\"274\">The Sms Eye trojan exfiltrates SMS messages over HTTPS<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1481.003<\/td>\n<td width=\"198\">Web Service: One-Way Communication<\/td>\n<td width=\"274\">The Sms Eye trojan uses the Telegram Bot API to exfiltrate SMS messages<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1521.002<\/td>\n<td width=\"198\">Encrypted Channel: Asymmetric Cryptography<\/td>\n<td width=\"274\">The C2 channel is encrypted by TLS<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">T1646<\/td>\n<td width=\"198\">Exfiltration Over C2 Channel<\/td>\n<td width=\"274\">The SMS messages are exfiltrated over the C2 channel<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Nova\/velha amea\u00e7a para roubar clientes de bancos CLM e SentinelOne divulgam modus operandi do grupo Neo_Net, que tem roubado dinheiro e dados de milhares de v\u00edtimas em todo o mundo A\u00a0CLM, distribuidora latino-americana de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, divulga a pesquisa que [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":65764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[49,4507,91,145,4506],"class_list":["post-65749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-cloud","tag-paineis-de-phishing","tag-protecao-de-dados","tag-seguranca-da-informacao","tag-software-de-smishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service - ABES\" \/>\n<meta property=\"og:description\" content=\"Nova\/velha amea\u00e7a para roubar clientes de bancos CLM e SentinelOne divulgam modus operandi do grupo Neo_Net, que tem roubado dinheiro e dados de milhares de v\u00edtimas em todo o mundo A\u00a0CLM, distribuidora latino-americana de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, divulga a pesquisa que [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-07T11:53:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12A.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1026\" \/>\n\t<meta property=\"og:image:height\" content=\"570\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service\",\"datePublished\":\"2023-09-07T11:53:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/\"},\"wordCount\":2784,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/foto-clm-12A.jpg\",\"keywords\":[\"cloud\",\"pain\u00e9is de phishing\",\"prote\u00e7\u00e3o de dados\",\"Seguran\u00e7a da Informa\u00e7\u00e3o\",\"software de Smishing\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/\",\"name\":\"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/foto-clm-12A.jpg\",\"datePublished\":\"2023-09-07T11:53:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/foto-clm-12A.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/foto-clm-12A.jpg\",\"width\":1026,\"height\":570},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"After Phishing, now it&#039;s time for Smishing-as-a-Service - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service - ABES","og_description":"Nova\/velha amea\u00e7a para roubar clientes de bancos CLM e SentinelOne divulgam modus operandi do grupo Neo_Net, que tem roubado dinheiro e dados de milhares de v\u00edtimas em todo o mundo A\u00a0CLM, distribuidora latino-americana de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, divulga a pesquisa que [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-09-07T11:53:04+00:00","og_image":[{"width":1026,"height":570,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12A.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service","datePublished":"2023-09-07T11:53:04+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/"},"wordCount":2784,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12A.jpg","keywords":["cloud","pain\u00e9is de phishing","prote\u00e7\u00e3o de dados","Seguran\u00e7a da Informa\u00e7\u00e3o","software de Smishing"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/","url":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/","name":"After Phishing, now it&#039;s time for Smishing-as-a-Service - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12A.jpg","datePublished":"2023-09-07T11:53:04+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12A.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/foto-clm-12A.jpg","width":1026,"height":570},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/depois-do-phishing-agora-e-a-vez-do-smishing-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Depois do Phishing, agora \u00e9 a vez do Smishing-as-a-Service"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-12 20:01:16","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/65749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=65749"}],"version-history":[{"count":3,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/65749\/revisions"}],"predecessor-version":[{"id":65762,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/65749\/revisions\/65762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/65764"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=65749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=65749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=65749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}