{"id":8800,"date":"2020-02-05T00:00:00","date_gmt":"2020-02-05T00:00:00","guid":{"rendered":"https:\/\/abes.org.br\/?p=8800"},"modified":"2020-02-05T00:00:00","modified_gmt":"2020-02-05T00:00:00","slug":"cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/","title":{"rendered":"Wave of Opportunistic Malware Exploiting the Coronavirus as Bait"},"content":{"rendered":"<div style=\"text-align: justify;\">\n<p>\n\t(Bitdefender issues global alert pointing out attacks using &quot;Malware as a Service&quot; to propagate threats)<\/p>\n<p>\tThe antivirus maker <a href=\"https:\/\/www.bitdefender.com.br\/\">Bitdefender<\/a>, represented in Brazil by <a href=\"https:\/\/www.securisoft.com.br\/\">Securisoft<\/a>, issued a global security alert on the intensification of malware attacks through malicious messages using as an attraction the offer of false content (news, health tips and catastrophic videos) involving the Coronavirus epidemic.<\/p>\n<p>\tAccording to Securisoft, various types of malicious code are contaminating computers of corporate and home users, using the Emotet trojan malware, also known as Geodo or Mealybug, as a propagation tool.<\/p>\n<p>\tEmotet, initially specializing in bank data theft, was first detected in 2014 and has since been heavily used by cybercrime.<\/p>\n<p>\tAccording to Eduardo D&#039;Antona, director at Securisoft and country partner at Bitdefender, the main feature of Emotet, which makes it attractive to criminals, is its ability to inoculate third-party computers from security flaws that are very common in applications text, spreadsheets and other office tools such as those contained in the Microsoft Office package.<\/p>\n<p>\tAs of 2016, Emotet&#039;s core code has been reconfigured to primarily function as a carrier for threats such as ransomware and spyware on an outsourced basis. That is, as a rental tool marketed in the hacker underworld in the MaaS (Malware as a Service) model for a wide variety of criminal activities. The form of contamination is, almost always, through the offer of a sensationalist attachment or containing false information &quot;indispensable&quot; to the victim.<br \/>\n\t&nbsp;<br \/>\n\tAlso according to D\u00b4Antona, Bitdefender and several other security companies have already detected several waves of malware related to the Coronavirus in several languages, but not yet with an appeal in Portuguese. &quot;It is very likely that phishing messages in Portuguese will begin to appear as more cases of suspected coronavirus appear in Brazil or with the imminent rescue by the government of Brazilian travelers currently confined in China&quot;, concludes the executive.<\/div>","protected":false},"excerpt":{"rendered":"<p>(Bitdefender emite alerta global apontando ataques com o uso de &quot;Malware as a Service&quot; para a propaga&ccedil;&atilde;o de amea&ccedil;as) A fabricante de antiv&iacute;rus Bitdefender, representada no Brasil pela Securisoft, emitiu um alerta global de seguran&ccedil;a sobre a intensifica&ccedil;&atilde;o de ataques de malware atrav&eacute;s de mensagens maliciosas usando como atra&ccedil;&atilde;o a oferta de falsos conte&uacute;dos (not&iacute;cias, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-8800","post","type-post","status-publish","format-standard","hentry","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca - ABES\" \/>\n<meta property=\"og:description\" content=\"(Bitdefender emite alerta global apontando ataques com o uso de &quot;Malware as a Service&quot; para a propaga&ccedil;&atilde;o de amea&ccedil;as) A fabricante de antiv&iacute;rus Bitdefender, representada no Brasil pela Securisoft, emitiu um alerta global de seguran&ccedil;a sobre a intensifica&ccedil;&atilde;o de ataques de malware atrav&eacute;s de mensagens maliciosas usando como atra&ccedil;&atilde;o a oferta de falsos conte&uacute;dos (not&iacute;cias, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-05T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"prima-dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"prima-dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/\"},\"author\":{\"name\":\"prima-dev\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\"},\"headline\":\"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca\",\"datePublished\":\"2020-02-05T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/\"},\"wordCount\":446,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"articleSection\":[\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/\",\"name\":\"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2020-02-05T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\",\"name\":\"prima-dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"caption\":\"prima-dev\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/prima-dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/","og_locale":"en_US","og_type":"article","og_title":"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca - ABES","og_description":"(Bitdefender emite alerta global apontando ataques com o uso de &quot;Malware as a Service&quot; para a propaga&ccedil;&atilde;o de amea&ccedil;as) A fabricante de antiv&iacute;rus Bitdefender, representada no Brasil pela Securisoft, emitiu um alerta global de seguran&ccedil;a sobre a intensifica&ccedil;&atilde;o de ataques de malware atrav&eacute;s de mensagens maliciosas usando como atra&ccedil;&atilde;o a oferta de falsos conte&uacute;dos (not&iacute;cias, [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2020-02-05T00:00:00+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"prima-dev","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"prima-dev","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/"},"author":{"name":"prima-dev","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e"},"headline":"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca","datePublished":"2020-02-05T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/"},"wordCount":446,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"articleSection":["\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/","url":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/","name":"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2020-02-05T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/cresce-onda-de-malwares-oportunistas-explorando-o-coronavirus-como-isca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Cresce onda de malwares oportunistas explorando o Coronav\u00edrus como isca"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e","name":"prima-dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","caption":"prima-dev"},"url":"https:\/\/abes.org.br\/en\/author\/prima-dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 18:12:52","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/8800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=8800"}],"version-history":[{"count":0,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/8800\/revisions"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=8800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=8800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=8800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}