{"id":23078,"date":"2025-09-16T08:00:00","date_gmt":"2025-09-16T11:00:00","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=23078"},"modified":"2025-08-19T12:21:10","modified_gmt":"2025-08-19T15:21:10","slug":"brasil-concentra-mais-de-84-de-ataques-ciberneticos","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2025\/09\/basico\/brasil-concentra-mais-de-84-de-ataques-ciberneticos\/","title":{"rendered":"Brasil concentra mais de 84% de ataques cibern\u00e9ticos"},"content":{"rendered":"\n<p style=\"text-align: justify;\" data-start=\"301\" data-end=\"859\"><strong data-start=\"301\" data-end=\"413\">Brasil concentra mais de 84% das tentativas de ataques cibern\u00e9ticos na Am\u00e9rica Latina no 1\u00ba semestre de 2025<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"301\" data-end=\"859\">Dados do relat\u00f3rio <em data-start=\"435\" data-end=\"462\">Cen\u00e1rio Global de Amea\u00e7as<\/em> do FortiGuard Labs, apresentados no Fortinet Cybersecurity Summit Brasil 2025, revelam que o pa\u00eds sofreu impressionantes <strong data-start=\"584\" data-end=\"625\">314,8 bilh\u00f5es de ataques cibern\u00e9ticos<\/strong> entre janeiro e junho de 2025. Esse volume representa 84% das investidas registradas na Am\u00e9rica Latina e Canad\u00e1, que totalizaram 374 bilh\u00f5es. Mexico, Col\u00f4mbia e Chile ficaram bem atr\u00e1s no ranking.<\/p>\n<p style=\"text-align: justify;\" data-start=\"301\" data-end=\"859\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"861\" data-end=\"1600\"><strong data-start=\"861\" data-end=\"922\">Fases dos ataques: da tentativa inicial ao impacto direto<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"861\" data-end=\"1600\">Utilizando o framework <em data-start=\"948\" data-end=\"966\">Cyber Kill Chain<\/em>, o estudo detalha as fases dos ataques: foram contabilizadas <strong data-start=\"1028\" data-end=\"1069\">1 bilh\u00e3o de tentativas de for\u00e7a bruta<\/strong>, <strong data-start=\"1071\" data-end=\"1121\">2,4 bilh\u00f5es de explora\u00e7\u00f5es de vulnerabilidades<\/strong> e <strong data-start=\"1124\" data-end=\"1178\">2 bilh\u00f5es de varreduras na etapa de reconhecimento<\/strong>. Na fase de entrega, houve <strong data-start=\"1206\" data-end=\"1254\">4 milh\u00f5es de tentativas de drive-by download<\/strong> e <strong data-start=\"1257\" data-end=\"1303\">662 mil arquivos maliciosos do tipo Office<\/strong>. Na instala\u00e7\u00e3o, foram detectados <strong data-start=\"1337\" data-end=\"1362\">12 milh\u00f5es de trojans<\/strong> e <strong data-start=\"1365\" data-end=\"1430\">67 mil tentativas de minera\u00e7\u00e3o de criptomoedas n\u00e3o autorizada<\/strong>. Na fase final de a\u00e7\u00e3o e objetivo, o Brasil enfrentou <strong data-start=\"1485\" data-end=\"1522\" data-is-only-node=\"\">309 bilh\u00f5es de tentativas de DDoS<\/strong> e <strong data-start=\"1525\" data-end=\"1562\">28,1 mil incidentes de ransomware<\/strong>.<\/p>\n<p style=\"text-align: justify;\" data-start=\"861\" data-end=\"1600\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"1602\" data-end=\"1924\"><strong data-start=\"1602\" data-end=\"1659\">Distribui\u00e7\u00e3o de malware e presen\u00e7a massiva de botnets<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1602\" data-end=\"1924\">Al\u00e9m das tentativas diretas, o pa\u00eds destacou-se com <strong data-start=\"1714\" data-end=\"1766\">41,9 milh\u00f5es de a\u00e7\u00f5es de distribui\u00e7\u00e3o de malware<\/strong> e <strong data-start=\"1769\" data-end=\"1806\">52 milh\u00f5es relacionadas a botnets<\/strong>, evidenciando um ambiente hostil e dominado por cadeias automatizadas de ataque.<\/p>\n<p style=\"text-align: justify;\" data-start=\"1602\" data-end=\"1924\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"1931\" data-end=\"2644\"><strong data-start=\"1931\" data-end=\"1944\">Conclus\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1931\" data-end=\"2644\">Os dados sobre o cen\u00e1rio cibern\u00e9tico brasileiro no primeiro semestre de 2025 delineiam um ambiente altamente amea\u00e7ador e orientado ao impacto, com predomin\u00e2ncia de ataques DDoS e ransomware. O elevado n\u00famero de tentativas nas fases iniciais sugere uma estrat\u00e9gia de infiltra\u00e7\u00e3o massiva, enquanto a predomin\u00e2ncia dos impactos na etapa final refor\u00e7a o car\u00e1ter disruptivo e lucrativo das opera\u00e7\u00f5es maliciosas. Diante desse panorama, \u00e9 essencial que empresas e institui\u00e7\u00f5es fortale\u00e7am estrat\u00e9gias de defesa que incluem monitoramento cont\u00ednuo, aplica\u00e7\u00e3o rigorosa de patches, segmenta\u00e7\u00e3o de rede, uso de intelig\u00eancia de amea\u00e7as, mitiga\u00e7\u00e3o proativa de botnets e fortalecimento de resili\u00eancia operacional.<\/p>\n<p data-start=\"1931\" data-end=\"2644\">\u00a0<\/p>\n<p data-start=\"2651\" data-end=\"2683\"><strong data-start=\"2651\" data-end=\"2681\">Refer\u00eancia Bibliogr\u00e1fica:<\/strong><\/p>\n<ul data-start=\"2684\" data-end=\"3257\">\n<li data-start=\"2684\" data-end=\"2962\">\n<p data-start=\"2687\" data-end=\"2962\"><em data-start=\"2687\" data-end=\"2766\">Brasil concentra 84% das tentativas de ataques cibern\u00e9ticos na Am\u00e9rica Latina<\/em> \u2013 TeleS\u00edntese, 12 de agosto de 2025. Dispon\u00edvel em: <a class=\"decorated-link\" href=\"https:\/\/www.cisoadvisor.com.br\/brasil-sofre-314-bilhoes-de-ataques-ciberneticos-no-1o-semestre-de-2025\/\" target=\"_blank\" rel=\"noopener\" data-start=\"2819\" data-end=\"2922\">https:\/\/www.cisoadvisor.com.br\/brasil-sofre-314-bilhoes-de-ataques-ciberneticos-no-1o-semestre-de-2025\/<\/a> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\" data-testid=\"webpage-citation-pill\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/telesintese.com.br\/brasil-concentra-84-das-tentativas-de-ataques-ciberneticos-na-america-latina\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">TeleS\u00edntese<\/span><\/span><\/span><\/a><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Brasil concentra mais de 84% das tentativas de ataques cibern\u00e9ticos na Am\u00e9rica Latina no 1\u00ba semestre de 2025 Dados do relat\u00f3rio Cen\u00e1rio Global de Amea\u00e7as do FortiGuard Labs, apresentados no Fortinet Cybersecurity Summit Brasil 2025, revelam que o pa\u00eds sofreu impressionantes 314,8 bilh\u00f5es de ataques cibern\u00e9ticos entre janeiro e junho de 2025. Esse volume representa [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":23080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,105],"tags":[],"class_list":["post-23078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/23078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=23078"}],"version-history":[{"count":2,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/23078\/revisions"}],"predecessor-version":[{"id":23081,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/23078\/revisions\/23081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/23080"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=23078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=23078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=23078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}