{"id":24121,"date":"2026-04-13T08:00:00","date_gmt":"2026-04-13T11:00:00","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=24121"},"modified":"2026-04-10T11:53:32","modified_gmt":"2026-04-10T14:53:32","slug":"ataques-com-falso-microsoft-teams","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2026\/04\/exploits\/ataques-com-falso-microsoft-teams\/","title":{"rendered":"Ataques com falso Microsoft Teams"},"content":{"rendered":"\n<section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-(--header-height)\" dir=\"auto\" data-turn-id=\"bf8daab1-7834-45e3-a051-2a785d754091\" data-testid=\"conversation-turn-13\" data-scroll-anchor=\"false\" data-turn=\"user\"><\/section>\n<section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-69d69869-422c-83e9-bd8f-6b95b88ad84c-4\" data-testid=\"conversation-turn-14\" data-scroll-anchor=\"false\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex max-w-full flex-col gap-4 grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"91b3fc09-40e5-4d0c-a2c4-63d14619ef0c\" data-turn-start-message=\"true\" data-message-model-slug=\"gpt-5-3\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden\">\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\">\n<p style=\"text-align: justify;\" data-section-id=\"d8vp60\" data-start=\"0\" data-end=\"77\"><strong>Ataques com falso Microsoft Teams: A nova fronteira do phishing corporativo<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"94\" data-end=\"349\">A transforma\u00e7\u00e3o digital acelerada trouxe consigo uma depend\u00eancia crescente de plataformas de colabora\u00e7\u00e3o, como o <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Microsoft Teams<\/span><\/span>. No entanto, essa popularidade tamb\u00e9m tornou essas ferramentas um alvo estrat\u00e9gico para cibercriminosos.<\/p>\n<p style=\"text-align: justify;\" data-start=\"351\" data-end=\"679\">Uma campanha recente, destacada pelo portal BoletimSec, revela como atacantes est\u00e3o utilizando <strong data-start=\"446\" data-end=\"471\">sites falsos do Teams<\/strong> para distribuir malware e comprometer ambientes corporativos. Este artigo analisa, sob a perspectiva de um analista de ciberseguran\u00e7a, os mecanismos desse ataque, seus impactos e as estrat\u00e9gias de mitiga\u00e7\u00e3o.<\/p>\n<p data-start=\"351\" data-end=\"679\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"hmjvyj\" data-start=\"686\" data-end=\"724\"><strong>O Novo vetor: sites falsos do Teams<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"726\" data-end=\"934\">Os atacantes criam p\u00e1ginas fraudulentas que imitam com alta fidelidade o site oficial do Microsoft Teams. O objetivo \u00e9 induzir o usu\u00e1rio a baixar um suposto instalador leg\u00edtimo, que na verdade cont\u00e9m malware.<\/p>\n<p style=\"text-align: justify;\" data-start=\"936\" data-end=\"994\">De acordo com an\u00e1lises recentes, essas campanhas utilizam:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"996\" data-end=\"1192\">\n<li data-section-id=\"1nd35qd\" data-start=\"996\" data-end=\"1043\">\n<p>Dom\u00ednios visualmente semelhantes ao oficial<\/p>\n<\/li>\n<li data-section-id=\"cuc90z\" data-start=\"1044\" data-end=\"1080\">\n<p>Layout id\u00eantico ao site leg\u00edtimo<\/p>\n<\/li>\n<li data-section-id=\"h07d3h\" data-start=\"1081\" data-end=\"1129\">\n<p>Certificados HTTPS para aumentar a confian\u00e7a<\/p>\n<\/li>\n<li data-section-id=\"k19a67\" data-start=\"1130\" data-end=\"1192\">\n<p>T\u00e9cnicas de SEO malicioso para aparecer no topo das buscas<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"1194\" data-end=\"1349\">Essas p\u00e1ginas falsas s\u00e3o projetadas para enganar at\u00e9 usu\u00e1rios experientes, explorando a confian\u00e7a na marca Microsoft.<\/p>\n<p data-start=\"1194\" data-end=\"1349\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"e1rswe\" data-start=\"1356\" data-end=\"1415\"><strong>Estrat\u00e9gia de distribui\u00e7\u00e3o: Malvertising e SEO Poisoning<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1417\" data-end=\"1535\">Uma das t\u00e9cnicas mais eficazes utilizadas nessa campanha \u00e9 o <strong data-start=\"1478\" data-end=\"1534\">envenenamento de mecanismos de busca (SEO poisoning)<\/strong>.<\/p>\n<p style=\"text-align: justify;\" data-start=\"1537\" data-end=\"1550\">Os atacantes:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"1552\" data-end=\"1712\">\n<li data-section-id=\"ii9rf2\" data-start=\"1552\" data-end=\"1599\">\n<p>Compram an\u00fancios patrocinados em buscadores<\/p>\n<\/li>\n<li data-section-id=\"142kffi\" data-start=\"1600\" data-end=\"1650\">\n<p>Manipulam palavras-chave relacionadas ao Teams<\/p>\n<\/li>\n<li data-section-id=\"mz1tfe\" data-start=\"1651\" data-end=\"1712\">\n<p>Posicionam links maliciosos entre os primeiros resultados<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"1714\" data-end=\"1867\">Assim, quando o usu\u00e1rio busca por \u201cbaixar Microsoft Teams\u201d, pode ser redirecionado para um site falso sem perceber.<\/p>\n<p data-start=\"1714\" data-end=\"1867\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"168hvv5\" data-start=\"1874\" data-end=\"1927\"><strong>Execu\u00e7\u00e3o do ataque: Do download ao comprometimento<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1929\" data-end=\"1980\">O fluxo do ataque segue uma cadeia bem estruturada:<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1he74f7\" data-start=\"1982\" data-end=\"2011\"><strong>1. Acesso ao site falso<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2012\" data-end=\"2075\">O usu\u00e1rio clica em um link patrocinado ou resultado manipulado.<\/p>\n<p data-start=\"2012\" data-end=\"2075\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"furyo0\" data-start=\"2077\" data-end=\"2118\"><strong>2. Download do instalador malicioso<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2119\" data-end=\"2180\">O arquivo aparenta ser leg\u00edtimo, mas cont\u00e9m c\u00f3digo malicioso.<\/p>\n<p data-start=\"2119\" data-end=\"2180\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"13regtw\" data-start=\"2182\" data-end=\"2210\"><strong>3. Execu\u00e7\u00e3o do malware<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2211\" data-end=\"2229\">Ap\u00f3s a instala\u00e7\u00e3o:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"2231\" data-end=\"2345\">\n<li data-section-id=\"9f4fzs\" data-start=\"2231\" data-end=\"2270\">\n<p>Um backdoor \u00e9 implantado no sistema<\/p>\n<\/li>\n<li data-section-id=\"1djy3xx\" data-start=\"2271\" data-end=\"2305\">\n<p>O atacante obt\u00e9m acesso remoto<\/p>\n<\/li>\n<li data-section-id=\"z5b6si\" data-start=\"2306\" data-end=\"2345\">\n<p>Dados sens\u00edveis podem ser extra\u00eddos<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"2347\" data-end=\"2528\">Esse tipo de ataque frequentemente instala malwares como o <strong data-start=\"2406\" data-end=\"2416\">Oyster<\/strong>, capaz de executar comandos remotamente e manter persist\u00eancia no sistema.<\/p>\n<p data-start=\"2347\" data-end=\"2528\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"vj9sz1\" data-start=\"2535\" data-end=\"2575\"><strong>Engenharia Social: O elemento central<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2577\" data-end=\"2699\">Assim como em ataques cl\u00e1ssicos de <strong data-start=\"2612\" data-end=\"2653\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Phishing<\/span><\/span><\/strong>, o sucesso depende da manipula\u00e7\u00e3o do usu\u00e1rio.<\/p>\n<p style=\"text-align: justify;\" data-start=\"2701\" data-end=\"2724\">Os criminosos exploram:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"2726\" data-end=\"2896\">\n<li data-section-id=\"1j3mizz\" data-start=\"2726\" data-end=\"2774\">\n<p>Urg\u00eancia (\u201cbaixe agora a vers\u00e3o atualizada\u201d)<\/p>\n<\/li>\n<li data-section-id=\"u9cs23\" data-start=\"2775\" data-end=\"2807\">\n<p>Confian\u00e7a na marca Microsoft<\/p>\n<\/li>\n<li data-section-id=\"96lwq9\" data-start=\"2808\" data-end=\"2843\">\n<p>Falta de verifica\u00e7\u00e3o do dom\u00ednio<\/p>\n<\/li>\n<li data-section-id=\"lle07d\" data-start=\"2844\" data-end=\"2896\">\n<p>Automatismo do usu\u00e1rio em ambientes corporativos<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"2898\" data-end=\"3031\">Phishing continua sendo uma das t\u00e9cnicas mais eficazes, justamente por explorar o fator humano.<\/p>\n<p data-start=\"2898\" data-end=\"3031\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"tao8yu\" data-start=\"3038\" data-end=\"3073\"><strong>Capacidades do malware instalado<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3075\" data-end=\"3131\">Ap\u00f3s a infec\u00e7\u00e3o, o malware pode executar diversas a\u00e7\u00f5es:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3133\" data-end=\"3276\">\n<li data-section-id=\"sbsp8c\" data-start=\"3133\" data-end=\"3174\">\n<p>Acesso remoto completo ao dispositivo<\/p>\n<\/li>\n<li data-section-id=\"1ohbl1p\" data-start=\"3175\" data-end=\"3212\">\n<p>Roubo de credenciais corporativas<\/p>\n<\/li>\n<li data-section-id=\"jzmfob\" data-start=\"3213\" data-end=\"3243\">\n<p>Captura de dados sens\u00edveis<\/p>\n<\/li>\n<li data-section-id=\"14ck42f\" data-start=\"3244\" data-end=\"3276\">\n<p>Movimenta\u00e7\u00e3o lateral na rede<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3278\" data-end=\"3429\">Esse tipo de amea\u00e7a \u00e9 particularmente perigoso em ambientes corporativos, pois pode servir como ponto de entrada para ataques maiores, como ransomware.<\/p>\n<p data-start=\"3278\" data-end=\"3429\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1ofeeg0\" data-start=\"3436\" data-end=\"3478\"><strong>Impacto corporativo e riscos sist\u00eamicos<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3480\" data-end=\"3533\">Os impactos de ataques desse tipo s\u00e3o significativos:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3535\" data-end=\"3680\">\n<li data-section-id=\"t90l00\" data-start=\"3535\" data-end=\"3572\">\n<p>Comprometimento de redes internas<\/p>\n<\/li>\n<li data-section-id=\"o8wf5i\" data-start=\"3573\" data-end=\"3609\">\n<p>Vazamento de dados confidenciais<\/p>\n<\/li>\n<li data-section-id=\"1458l98\" data-start=\"3610\" data-end=\"3638\">\n<p>Interrup\u00e7\u00e3o de opera\u00e7\u00f5es<\/p>\n<\/li>\n<li data-section-id=\"10hdzza\" data-start=\"3639\" data-end=\"3680\">\n<p>Preju\u00edzos financeiros e reputacionais<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3682\" data-end=\"3806\">Al\u00e9m disso, o uso de ferramentas leg\u00edtimas como vetor de ataque dificulta a detec\u00e7\u00e3o por solu\u00e7\u00f5es tradicionais de seguran\u00e7a.<\/p>\n<p data-start=\"3682\" data-end=\"3806\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1lr7xuf\" data-start=\"3813\" data-end=\"3864\"><strong>Tend\u00eancia: Ataques baseados em confian\u00e7a digital<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3866\" data-end=\"3985\">Esse incidente refor\u00e7a uma tend\u00eancia clara: os atacantes est\u00e3o migrando para <strong data-start=\"3943\" data-end=\"3984\">ataques baseados em confian\u00e7a digital<\/strong>.<\/p>\n<p style=\"text-align: justify;\" data-start=\"3987\" data-end=\"4048\">Em vez de explorar vulnerabilidades t\u00e9cnicas complexas, eles:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"4050\" data-end=\"4160\">\n<li data-section-id=\"10kduby\" data-start=\"4050\" data-end=\"4079\">\n<p>Imitam servi\u00e7os populares<\/p>\n<\/li>\n<li data-section-id=\"1lpmd5b\" data-start=\"4080\" data-end=\"4123\">\n<p>Abusam da reputa\u00e7\u00e3o de grandes empresas<\/p>\n<\/li>\n<li data-section-id=\"xoidj8\" data-start=\"4124\" data-end=\"4160\">\n<p>Utilizam infraestrutura leg\u00edtima<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"4162\" data-end=\"4226\">Esse modelo aumenta drasticamente a taxa de sucesso dos ataques.<\/p>\n<p data-start=\"4162\" data-end=\"4226\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1epdrcw\" data-start=\"4233\" data-end=\"4260\"><strong>Estrat\u00e9gias de mitiga\u00e7\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4262\" data-end=\"4349\">Para mitigar esse tipo de amea\u00e7a, organiza\u00e7\u00f5es devem adotar uma abordagem multicamadas:<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"b33uw2\" data-start=\"4351\" data-end=\"4390\"><strong>1. Verifica\u00e7\u00e3o de fontes oficiais<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4391\" data-end=\"4447\">Sempre baixar softwares diretamente de sites confi\u00e1veis.<\/p>\n<p data-start=\"4391\" data-end=\"4447\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"884cuu\" data-start=\"4449\" data-end=\"4481\"><strong>2. Treinamento de usu\u00e1rios<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4482\" data-end=\"4539\">Educar colaboradores para identificar sinais de phishing.<\/p>\n<p data-start=\"4482\" data-end=\"4539\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"7226bo\" data-start=\"4541\" data-end=\"4588\"><strong>3. Uso de solu\u00e7\u00f5es de seguran\u00e7a avan\u00e7adas<\/strong><\/p>\n<ul style=\"text-align: justify;\" data-start=\"4589\" data-end=\"4681\">\n<li data-section-id=\"huc2ke\" data-start=\"4589\" data-end=\"4630\">\n<p>EDR (Endpoint Detection and Response)<\/p>\n<\/li>\n<li data-section-id=\"zhkpd\" data-start=\"4631\" data-end=\"4648\">\n<p>DNS filtering<\/p>\n<\/li>\n<li data-section-id=\"1wex95h\" data-start=\"4649\" data-end=\"4681\">\n<p>Prote\u00e7\u00e3o contra malvertising<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"6etuay\" data-start=\"4683\" data-end=\"4714\"><strong>4. Pol\u00edtica de Zero Trust<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4715\" data-end=\"4771\">Nenhuma fonte deve ser considerada confi\u00e1vel por padr\u00e3o.<\/p>\n<p data-start=\"4715\" data-end=\"4771\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"7omqma\" data-start=\"4773\" data-end=\"4804\"><strong>5. Monitoramento cont\u00ednuo<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4805\" data-end=\"4859\">Detectar comportamentos an\u00f4malos em endpoints e redes.<\/p>\n<p data-start=\"4805\" data-end=\"4859\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"h85oci\" data-start=\"4866\" data-end=\"4878\"><strong>Conclus\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4880\" data-end=\"5081\">A campanha que utiliza sites falsos do Microsoft Teams evidencia uma mudan\u00e7a significativa no cen\u00e1rio de amea\u00e7as: o foco deixou de ser exclusivamente t\u00e9cnico e passou a explorar a confian\u00e7a do usu\u00e1rio.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5083\" data-end=\"5259\">Ao combinar engenharia social, SEO malicioso e distribui\u00e7\u00e3o de malware, os atacantes conseguem comprometer ambientes corporativos com alta efici\u00eancia e baixo custo operacional.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5261\" data-end=\"5529\">Diante desse cen\u00e1rio, a ciberseguran\u00e7a moderna exige uma abordagem integrada, que una tecnologia, processos e conscientiza\u00e7\u00e3o humana. A prote\u00e7\u00e3o n\u00e3o est\u00e1 apenas em sistemas robustos, mas na capacidade de identificar e neutralizar amea\u00e7as antes que elas se concretizem.<\/p>\n<p data-start=\"5261\" data-end=\"5529\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1bfeuhi\" data-start=\"5536\" data-end=\"5565\"><strong>Refer\u00eancias Bibliogr\u00e1ficas<\/strong><\/p>\n<ul data-start=\"5567\" data-end=\"6064\">\n<li data-section-id=\"223hp8\" data-start=\"5567\" data-end=\"5795\"><strong>BoletimSec.<\/strong> <em data-start=\"5582\" data-end=\"5648\">Cibercriminosos usam sites falsos do Teams para instalar malware<\/em>. Dispon\u00edvel em:<br data-start=\"5664\" data-end=\"5667\" \/><a class=\"decorated-link\" href=\"https:\/\/boletimsec.com\/cibercriminosos-usam-sites-falsos-do-teams-para-instalar-malware\/\" target=\"_blank\" rel=\"noopener\" data-start=\"5667\" data-end=\"5755\">https:\/\/boletimsec.com\/cibercriminosos-usam-sites-falsos-do-teams-para-instalar-malware\/<\/a><\/li>\n<li data-section-id=\"1kf9sic\" data-start=\"5797\" data-end=\"6064\"><strong>Canaltech.<\/strong> <em data-start=\"5811\" data-end=\"5891\">Instalador falso do Microsoft Teams leva malware a PCs atrav\u00e9s de malvertising<\/em>. Dispon\u00edvel em: <a class=\"decorated-link\" href=\"https:\/\/canaltech.com.br\/seguranca\/instalador-falso-do-microsoft-teams-leva-malware-a-pcs-atraves-de-malvertising\/\" target=\"_blank\" rel=\"noopener\" data-start=\"5910\" data-end=\"6024\">https:\/\/canaltech.com.br\/seguranca\/instalador-falso-do-microsoft-teams-leva-malware-a-pcs-atraves-de-malvertising\/<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Ataques com falso Microsoft Teams: A nova fronteira do phishing corporativo A transforma\u00e7\u00e3o digital acelerada trouxe consigo uma depend\u00eancia crescente de plataformas de colabora\u00e7\u00e3o, como o Microsoft Teams. No entanto, essa popularidade tamb\u00e9m tornou essas ferramentas um alvo estrat\u00e9gico para cibercriminosos. Uma campanha recente, destacada pelo portal BoletimSec, revela como atacantes est\u00e3o utilizando sites falsos [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":24125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,105],"tags":[],"class_list":["post-24121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=24121"}],"version-history":[{"count":1,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24121\/revisions"}],"predecessor-version":[{"id":24123,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24121\/revisions\/24123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/24125"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=24121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=24121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=24121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}