{"id":68485,"date":"2023-09-26T14:20:24","date_gmt":"2023-09-26T17:20:24","guid":{"rendered":"https:\/\/abes.org.br\/?p=68485"},"modified":"2023-09-29T17:28:09","modified_gmt":"2023-09-29T20:28:09","slug":"o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/","title":{"rendered":"Crime pays, at least e-Crime CLM and SentinelOne unravel this criminal ecosystem"},"content":{"rendered":"<p style=\"text-align: center;\"><em>True interdependent web of criminals collaborate and share <\/em><i><em>malicious tools and services automating the creation of new and sophisticated attack campaigns and becoming an increasingly profitable and low-risk business<\/em><\/i><\/p>\n<p>CLM, a Latin American value-added distributor focused on information security, data protection, cloud and infrastructure for data centers, and SentinelOne, one of the leaders in cybersecurity in the world, unravel the complex collaborative web of e-Crime and its cyberattacks. According to CLM&#039;s product director, Gabriel Camargo, the dynamics of cyber threats have taken on a new level of complexity, driven by the exchange of services, tools and knowledge between various types of partners, from those sponsored by governments to dangerous gangs.<\/p>\n<p><u><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-68486 alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg\" alt=\"\" width=\"361\" height=\"203\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1-980x551.jpg 980w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1-480x270.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, 100vw\" \/><\/u>\u201cIn the thriving business of cybercrime as a service (CaaS), diverse groups share kits and tools instantly and collaborate very efficiently, taking advantage of shared services accessible on the dark web. Understanding how the current threat scenario is configured is essential for cybersecurity\u201d, he explains.<\/p>\n<p><strong>Sharing knowledge and malicious business practices<\/strong><br \/>\nIn recent years, the availability of e-Crime services has become established among various levels of cybercriminals, leading to significant specialization of criminal networks and promoting cooperation between illicit providers. Cybercrime as a Service (CaaS) models allow attackers to share technical knowledge and malicious business practices on dark markets, where the tools, code and services needed for cyberattacks are accessible.<\/p>\n<p>This ecosystem functions as an authentic Market Place, where aspiring hackers can buy or rent what they need to launch their own campaigns. Furthermore, illicit service providers efficiently serve numerous criminal entities, with offers of obfuscation, rental of\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fcybersecurity-101%2Fbotnets%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=5f149501b2b1fd9f6494c1d670abc6d269103205a842b27acd40d400a55a2175\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fcybersecurity-101%252Fbotnets%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D5f149501b2b1fd9f6494c1d670abc6d269103205a842b27acd40d400a55a2175&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw08Py9pZHlGHuQ1GSbwdU0x\">botnets<\/a>\u00a0IoT, services\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fcybersecurity-101%2Fphishing-scams%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=7c3e72f00d0e736fd81d436d90695808d746bc80c5c58742477f21c1381e0d51\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fcybersecurity-101%252Fphishing-scams%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D7c3e72f00d0e736fd81d436d90695808d746bc80c5c58742477f21c1381e0d51&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw1NXZ2LU34-ZhgHc66V20JR\">phishing<\/a>, backdoor generators, among others, sold on private forums on the dark web.<\/p>\n<p><strong>Dark Web \u2013 breeding grounds for new waves of cybercrime<\/strong><br \/>\nTHE\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2F20-years-in-the-dark-the-dark-web-turns-twenty-what-does-this-mean-for-a-ciso%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=44a258dc83471bcbc71e3c4f950d2a44d35c735eb9d0b1df0090ea9048559c63\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fblog%252F20-years-in-the-dark-the-dark-web-turns-twenty-what-does-this-mean-for-a-ciso%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D44a258dc83471bcbc71e3c4f950d2a44d35c735eb9d0b1df0090ea9048559c63&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw2Ei7ZHZuY0XBV0lrFYEiOo\">dark web<\/a>\u00a0is a center for modern cybercrime, which facilitates exchanges between cybercriminals, allowing the scale and complexity of cyber threats to be expanded. These illicit environments are fed by several popular addresses, accessible through the browser\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2Fprivacy-2019-tor-meek-rise-fall-domain-fronting%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=1f63ab100aa418ff745a54e1be0b826a8802fe517fa53f7306ac9e04d4dd0084\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fblog%252Fprivacy-2019-tor-meek-rise-fall-domain-fronting%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D1f63ab100aa418ff745a54e1be0b826a8802fe517fa53f7306ac9e04d4dd0084&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw1g1J_6_uHabp4mCv4T6iG9\">TOR<\/a>, on darkNet, like\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fgeti2p.net%2Fen%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=52512a2b61340bb9da28ee75d6aab2c1ca6e5973c5878260cd3458ae67734989\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fgeti2p.net%252Fen%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D52512a2b61340bb9da28ee75d6aab2c1ca6e5973c5878260cd3458ae67734989&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw3TtdwAFK9s6tPvC5MFpgL2\">I2P<\/a>\u00a0(Invisible Internet Project) and\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.hyphanet.org%2Findex.html&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=cf7d42d84d7dc62f93f576b3086aec86ffb34a8a0d334c91f98f77e3c51b6e65\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.hyphanet.org%252Findex.html%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3Dcf7d42d84d7dc62f93f576b3086aec86ffb34a8a0d334c91f98f77e3c51b6e65&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw0EjVpD6FobD7qVbMtbliRn\">Hyphanet<\/a>.<\/p>\n<p>While these services also serve legitimate purposes, SentinelOne says there is no doubt that cybercriminals benefit greatly from the features they offer.<\/p>\n<p><strong>Monetization of breaches \u2013 the emergence of Initial Access Brokers<\/strong><br \/>\nIn this scenario, the\u00a0<strong>Initial Access Brokers<\/strong>\u00a0(<strong>IAB<\/strong>s), which\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2Fevil-markets-selling-access-to-breached-msps-to-low-level-criminals-2%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=6ed92a5be5cb85aeb30ba27faee3c47d3edaa225dfe5e8d22ef99b07ea07827a\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fblog%252Fevil-markets-selling-access-to-breached-msps-to-low-level-criminals-2%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D6ed92a5be5cb85aeb30ba27faee3c47d3edaa225dfe5e8d22ef99b07ea07827a&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw2-xn0IJZvKOvedqu15adWD\">sell<\/a>\u00a0unauthorized access to compromised systems, allowing buyers to launch their attacks. The introduction of monetization in\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fcybersecurity-101%2Fwhat-is-a-data-breach%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=819f32aac71906adc22bcd49099532c810728e5ba69df9378ee889b7242130c1\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fcybersecurity-101%252Fwhat-is-a-data-breach%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D819f32aac71906adc22bcd49099532c810728e5ba69df9378ee889b7242130c1&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw06PfZRNaZARFGNCI95wWyb\">data breaches<\/a>\u00a0emphasizes that there has been a transformation of cyber threats into extremely profitable commodities. IABs also provide a marketplace for stolen credentials, discovered software vulnerabilities, and other breaches, empowering a broader set of criminals. With this immediate access to potential targets, cybercriminals are able to exploit these gateways to quickly launch new campaigns.<\/p>\n<p><strong>Expertise in outsourcing for profit and the role of cyber associates<\/strong><br \/>\nThe change in the way cybercriminals collaborate is also attributed to\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Flabs%2Fenter-the-maze-demystifying-an-affiliate-involved-in-maze-snow%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=420744ec092e4e35c10c6eef237447b91e23450d56d3e2cb7d18d06f894aad67\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Flabs%252Fenter-the-maze-demystifying-an-affiliate-involved-in-maze-snow%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D420744ec092e4e35c10c6eef237447b91e23450d56d3e2cb7d18d06f894aad67&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw2Ci0Rwiaeon5oHtdpavIRV\">cyber affiliates or associates<\/a>, individuals or groups who use their knowledge to assist in cyberattacks in exchange for a share of the profits. This allows for specialization within the criminal ecosystem, where different participants contribute their knowledge to create an increasingly diverse and potent threat ecosystem.<\/p>\n<p>Affiliates act as components that integrate the structure of\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2Fransoms-without-ransomware-data-corruption-and-other-new-tactics-in-cyber-extortion%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=946f80de490a4bfa75679a444b9ba858bbeb712edf12a988092fd601bfdca490\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fblog%252Fransoms-without-ransomware-data-corruption-and-other-new-tactics-in-cyber-extortion%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D946f80de490a4bfa75679a444b9ba858bbeb712edf12a988092fd601bfdca490&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw2ICjEd7pPNyk0MY08ztMcd\">Ransomware as a Service (RaaS)<\/a>\u00a0and leverage specialized features and tools provided by RaaS platforms to launch sophisticated campaigns, even without advanced technical knowledge. This collaboration amplifies the scope and severity of ransomware attacks, as affiliates operate autonomously with the support of RaaS platforms, expanding the threat landscape.<\/p>\n<p><strong>Facilitators work behind the scenes<\/strong><br \/>\nBeneath the surface of cybercrime lies a network of enablers that fuel malicious operations. Crypter developers, for example, create tools that try to disguise\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fcybersecurity-101%2Fwhat-is-malware-everything-you-need-to-know%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=e02aa07f0cec0f08852df727f2dacdec1b4cf6d3b6d54872d0c2e14a460c4159\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fcybersecurity-101%252Fwhat-is-malware-everything-you-need-to-know%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3De02aa07f0cec0f08852df727f2dacdec1b4cf6d3b6d54872d0c2e14a460c4159&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw1XQLHXxmBkWus1DO7dBcZT\">malware<\/a>, in order to avoid detection by less sophisticated security software. Already the\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fwp-content%2Fuploads%2Fpdf-gen%2F1630604837%2Fa-deep-dive-into-zebrocys-dropper-docs.pdf%3Futm_source%3Dtwitter.com%2Fthewebvy%3Futm_source%3Dtwitter.com%2Fthewebvy&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=8890687ff8ddee5027cad6ad54606c4df9f63d5b8fbf04c3f78b980172d6b466\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fwp-content%252Fuploads%252Fpdf-gen%252F1630604837%252Fa-deep-dive-into-zebrocys-dropper-docs.pdf%253Futm_source%253Dtwitter.com%252Fthewebvy%253Futm_source%253Dtwitter.com%252Fthewebvy%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D8890687ff8ddee5027cad6ad54606c4df9f63d5b8fbf04c3f78b980172d6b466&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw18F10IqWz51ildrKTP6NcY\">malware kits and droppers<\/a>\u00a0offer pre-packaged malicious code, further lowering the barrier to entry into cybercrime and attracting a new generation of would-be criminals with little technical knowledge.<\/p>\n<p>THE\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fcybersecurity-101%2Fbulletproof-hosting%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=fcc8a571a0157f4ee6115b1340c3bb5cb361abce49e069598360ed8b16e2b2ed\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fcybersecurity-101%252Fbulletproof-hosting%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3Dfcc8a571a0157f4ee6115b1340c3bb5cb361abce49e069598360ed8b16e2b2ed&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw0_BJACltcx5y5HkRfJap5s\">Bulletproof hosting<\/a>\u00a0or bulletproof hosting plays a fundamental role in the interconnection of cybercriminals. This type of hosting is a safe haven for illegal activities on the web, with an infrastructure resistant to removals and police actions. This is because providers have their infrastructure in jurisdictions that are known to have lenient or inadequate internet regulations. And so, cybercriminals can host illegal content, distribute malware, create phishing sites, and other malicious activities.<\/p>\n<p>\u201cIt is the perfect environment to collaborate, share resources and coordinate attacks, making their collective impact much greater than if they had operated independently\u201d, explains Camargo.<\/p>\n<p><strong>Cryptocurrencies have made financial settlement anonymous<\/strong><br \/>\nBehind the explosion of cybercrime in recent years is the ability of criminals to move large sums of money without supervision. Cryptocurrencies like Bitcoin have transformed the way attackers manage their earnings and conduct illegal activities. Crypto wallets store digital assets securely and allow anonymous transactions at unique addresses.\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2Fmalware-analyst-guide-bitcoin%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=f8901339523e197766f92e6a7d56251a4ecd331b6b6b6e611e2ae81738eee299\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fblog%252Fmalware-analyst-guide-bitcoin%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3Df8901339523e197766f92e6a7d56251a4ecd331b6b6b6e611e2ae81738eee299&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw3yxPFphDq1D11h5FokjIp3\">Mixers or tumblers<\/a>\u00a0they scramble transactions, ensuring that the origin of funds is difficult to trace. Threat actors also use\u00a0<strong>exchanges<\/strong>\u00a0to convert from one cryptocurrency to another.<\/p>\n<p>For CLM, the growing exchange between cybercriminals reflects the complexity of the current e-Crime scenario. It also demonstrates the urgency for organizations to establish end-to-end cybersecurity strategies that are capable of autonomously safeguarding multiple attack surfaces. \u201cThe disruption of the cybercrime ecosystem presents Boards of Directors, CISOS and CIOs with a major challenge. Cybersecurity needs to include\u00a0<a href=\"https:\/\/us15.mailchimp.com\/mctx\/clicks?url=https%3A%2F%2Fwww.sentinelone.com%2Fplatform%2F&amp;xid=c7a0d8af8a&amp;uid=72289334&amp;iid=0e8153dd5d&amp;pool=cts&amp;v=2&amp;c=1695061690&amp;h=78379cc30a1d3eef3258eb0199f3e94cd0c8f5a271c7e90a7de258db3cfd3bf0\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/us15.mailchimp.com\/mctx\/clicks?url%3Dhttps%253A%252F%252Fwww.sentinelone.com%252Fplatform%252F%26xid%3Dc7a0d8af8a%26uid%3D72289334%26iid%3D0e8153dd5d%26pool%3Dcts%26v%3D2%26c%3D1695061690%26h%3D78379cc30a1d3eef3258eb0199f3e94cd0c8f5a271c7e90a7de258db3cfd3bf0&amp;source=gmail&amp;ust=1696082344543000&amp;usg=AOvVaw1uJj0RHDoN5v6fCOCG_ltL\">solutions<\/a>\u00a0based on Artificial Intelligence, which provide deep visibility to all systems, detect and respond to threats in real time and are scalable\u201d, concludes Gabriel Camargo.<\/p>","protected":false},"excerpt":{"rendered":"<p>Verdadeira teia interdependente de criminosos colabora e compartilha ferramentas e servi\u00e7os maliciosos\u00a0automatizando a cria\u00e7\u00e3o de novas e sofisticadas campanhas de\u00a0ataques e se tornando um neg\u00f3cio cada vez mais lucrativo e de pouco risco CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, e [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":68486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[],"class_list":["post-68485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso - ABES\" \/>\n<meta property=\"og:description\" content=\"Verdadeira teia interdependente de criminosos colabora e compartilha ferramentas e servi\u00e7os maliciosos\u00a0automatizando a cria\u00e7\u00e3o de novas e sofisticadas campanhas de\u00a0ataques e se tornando um neg\u00f3cio cada vez mais lucrativo e de pouco risco CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, e [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T17:20:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-29T20:28:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1025\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso\",\"datePublished\":\"2023-09-26T17:20:24+00:00\",\"dateModified\":\"2023-09-29T20:28:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/\"},\"wordCount\":1120,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Camargo-CLM-1.jpg\",\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/\",\"name\":\"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Camargo-CLM-1.jpg\",\"datePublished\":\"2023-09-26T17:20:24+00:00\",\"dateModified\":\"2023-09-29T20:28:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Camargo-CLM-1.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Camargo-CLM-1.jpg\",\"width\":1025,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/","og_locale":"en_US","og_type":"article","og_title":"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso - ABES","og_description":"Verdadeira teia interdependente de criminosos colabora e compartilha ferramentas e servi\u00e7os maliciosos\u00a0automatizando a cria\u00e7\u00e3o de novas e sofisticadas campanhas de\u00a0ataques e se tornando um neg\u00f3cio cada vez mais lucrativo e de pouco risco CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, e [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-09-26T17:20:24+00:00","article_modified_time":"2023-09-29T20:28:09+00:00","og_image":[{"width":1025,"height":576,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso","datePublished":"2023-09-26T17:20:24+00:00","dateModified":"2023-09-29T20:28:09+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/"},"wordCount":1120,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg","articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/","url":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/","name":"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg","datePublished":"2023-09-26T17:20:24+00:00","dateModified":"2023-09-29T20:28:09+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/09\/Camargo-CLM-1.jpg","width":1025,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/o-crime-compensa-pelo-menos-o-e-crime-clm-e-sentinelone-desvendam-esse-ecossistema-criminoso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"O crime compensa, pelo menos o e-Crime CLM e SentinelOne desvendam esse ecossistema criminoso"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-27 14:37:27","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/68485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=68485"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/68485\/revisions"}],"predecessor-version":[{"id":68487,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/68485\/revisions\/68487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/68486"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=68485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=68485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=68485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}