{"id":24162,"date":"2026-04-26T08:00:00","date_gmt":"2026-04-26T11:00:00","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=24162"},"modified":"2026-04-22T20:30:56","modified_gmt":"2026-04-22T23:30:56","slug":"infraestrutura-moderna-se-torna-alvo-de-extorsao-digital","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2026\/04\/exploits\/infraestrutura-moderna-se-torna-alvo-de-extorsao-digital\/","title":{"rendered":"Infraestrutura moderna se torna alvo de extors\u00e3o digital"},"content":{"rendered":"\n<p style=\"text-align: justify;\" data-section-id=\"1os4ge9\" data-start=\"0\" data-end=\"85\"><strong>Viola\u00e7\u00e3o na Vercel: Quando infraestrutura moderna se torna alvo de extors\u00e3o digital<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"102\" data-end=\"510\">A crescente ado\u00e7\u00e3o de plataformas serverless e ambientes de desenvolvimento modernos trouxe ganhos significativos em agilidade e escalabilidade. No entanto, esse mesmo avan\u00e7o tamb\u00e9m ampliou a superf\u00edcie de ataque. Um exemplo recente foi a confirma\u00e7\u00e3o de uma viola\u00e7\u00e3o envolvendo a <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Vercel<\/span><\/span>, ap\u00f3s um hacker anunciar a venda de dados supostamente obtidos por cerca de US$ 2 milh\u00f5es.<\/p>\n<p style=\"text-align: justify;\" data-start=\"512\" data-end=\"780\">Este incidente levanta quest\u00f5es cr\u00edticas sobre seguran\u00e7a em ambientes cloud-native, prote\u00e7\u00e3o de dados e riscos associados a cadeias de desenvolvimento modernas. Neste artigo, analisamos tecnicamente o ocorrido, seus impactos e as li\u00e7\u00f5es estrat\u00e9gicas para organiza\u00e7\u00f5es.<\/p>\n<p data-start=\"512\" data-end=\"780\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1nms2x0\" data-start=\"787\" data-end=\"836\"><strong>O incidente: Dados \u00e0 venda no submundo digital<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"838\" data-end=\"986\">A viola\u00e7\u00e3o ganhou notoriedade quando um agente malicioso alegou ter comprometido sistemas da Vercel e colocado dados \u00e0 venda em f\u00f3runs clandestinos.<\/p>\n<p style=\"text-align: justify;\" data-start=\"988\" data-end=\"1015\">Entre os pontos destacados:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"1017\" data-end=\"1208\">\n<li data-section-id=\"7wercj\" data-start=\"1017\" data-end=\"1076\">Alega\u00e7\u00e3o de acesso a informa\u00e7\u00f5es internas da plataforma<\/li>\n<li data-section-id=\"g7yjff\" data-start=\"1077\" data-end=\"1135\">Oferta dos dados por aproximadamente <strong data-start=\"1116\" data-end=\"1133\">US$ 2 milh\u00f5es<\/strong><\/li>\n<li data-section-id=\"1mu33vo\" data-start=\"1136\" data-end=\"1208\">Poss\u00edvel exposi\u00e7\u00e3o de informa\u00e7\u00f5es relacionadas a clientes e projetos<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"1210\" data-end=\"1347\">Posteriormente, a empresa confirmou que houve um incidente de seguran\u00e7a, embora tenha indicado que o impacto foi limitado e controlado.<\/p>\n<p style=\"text-align: justify;\" data-start=\"1349\" data-end=\"1468\">Esse tipo de ataque segue um padr\u00e3o crescente: <strong data-start=\"1396\" data-end=\"1438\">extors\u00e3o baseada em vazamento de dados<\/strong>, mesmo sem ransomware direto.<\/p>\n<p data-start=\"1349\" data-end=\"1468\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1el7jog\" data-start=\"1475\" data-end=\"1525\"><strong>Infraestrutura moderna: Um novo campo de ataque<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1527\" data-end=\"1671\">A Vercel \u00e9 amplamente utilizada para hospedagem de aplica\u00e7\u00f5es modernas, especialmente com frameworks como <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Next.js<\/span><\/span>.<\/p>\n<p style=\"text-align: justify;\" data-start=\"1673\" data-end=\"1730\">Esse tipo de ambiente possui caracter\u00edsticas espec\u00edficas:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"1732\" data-end=\"1927\">\n<li data-section-id=\"1c1k19f\" data-start=\"1732\" data-end=\"1776\">Integra\u00e7\u00e3o cont\u00ednua (CI\/CD) automatizada<\/li>\n<li data-section-id=\"1wohkbe\" data-start=\"1777\" data-end=\"1814\">Deploys frequentes e distribu\u00eddos<\/li>\n<li data-section-id=\"1842kah\" data-start=\"1815\" data-end=\"1860\">Uso intensivo de APIs e servi\u00e7os externos<\/li>\n<li data-section-id=\"rzzoba\" data-start=\"1861\" data-end=\"1927\">Armazenamento de vari\u00e1veis sens\u00edveis (tokens, chaves, secrets)<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"1929\" data-end=\"2008\">Essas caracter\u00edsticas, embora eficientes, criam m\u00faltiplos pontos de explora\u00e7\u00e3o.<\/p>\n<p data-start=\"1929\" data-end=\"2008\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"kiilom\" data-start=\"2015\" data-end=\"2045\"><strong>Poss\u00edveis vetores de ataque<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2047\" data-end=\"2178\">Embora detalhes t\u00e9cnicos completos n\u00e3o tenham sido divulgados, incidentes desse tipo geralmente envolvem uma combina\u00e7\u00e3o de fatores:<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"10f6r5i\" data-start=\"2180\" data-end=\"2217\"><strong>1. Comprometimento de credenciais<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2218\" data-end=\"2246\">Acesso indevido por meio de:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"2248\" data-end=\"2318\">\n<li data-section-id=\"1llwwm5\" data-start=\"2248\" data-end=\"2271\">Senhas reutilizadas<\/li>\n<li data-section-id=\"1bjgsu1\" data-start=\"2272\" data-end=\"2291\">Tokens expostos<\/li>\n<li data-section-id=\"oud1fy\" data-start=\"2292\" data-end=\"2318\">Falhas em autentica\u00e7\u00e3o<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1p8r2yz\" data-start=\"2320\" data-end=\"2352\"><strong>2. Explora\u00e7\u00e3o de integra\u00e7\u00f5es<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2353\" data-end=\"2453\">Ambientes modernos dependem de diversas integra\u00e7\u00f5es externas, que podem introduzir vulnerabilidades.<\/p>\n<p data-start=\"2353\" data-end=\"2453\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1hzfv01\" data-start=\"2455\" data-end=\"2487\"><strong>3. Falhas em pipelines CI\/CD<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2488\" data-end=\"2539\">Ataques \u00e0 cadeia de desenvolvimento podem permitir:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"2541\" data-end=\"2641\">\n<li data-section-id=\"1bquekk\" data-start=\"2541\" data-end=\"2573\">Inser\u00e7\u00e3o de c\u00f3digo malicioso<\/li>\n<li data-section-id=\"11mjhk0\" data-start=\"2574\" data-end=\"2611\">Extra\u00e7\u00e3o de vari\u00e1veis de ambiente<\/li>\n<li data-section-id=\"110pw5k\" data-start=\"2612\" data-end=\"2641\">Comprometimento de builds<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"bhfklv\" data-start=\"2643\" data-end=\"2667\"><strong>4. Engenharia social<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2668\" data-end=\"2752\">Usu\u00e1rios com acesso privilegiado podem ser alvo de phishing ou ataques direcionados.<\/p>\n<p data-start=\"2668\" data-end=\"2752\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"lay7zk\" data-start=\"2759\" data-end=\"2811\"><strong>O Modelo de extors\u00e3o: Dados como ativo financeiro<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2813\" data-end=\"2939\">Diferente de ataques tradicionais com criptografia de dados (ransomware), este incidente segue o modelo de <strong data-start=\"2920\" data-end=\"2938\">data extortion<\/strong>:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"2941\" data-end=\"3061\">\n<li data-section-id=\"1d98g3c\" data-start=\"2941\" data-end=\"2967\">O atacante rouba dados<\/li>\n<li data-section-id=\"1a9se8d\" data-start=\"2968\" data-end=\"3011\">N\u00e3o necessariamente interrompe sistemas<\/li>\n<li data-section-id=\"qgcn7a\" data-start=\"3012\" data-end=\"3061\">Exige pagamento para n\u00e3o divulgar informa\u00e7\u00f5es<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3063\" data-end=\"3111\">Esse modelo apresenta vantagens para o atacante:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3113\" data-end=\"3231\">\n<li data-section-id=\"d0n7mq\" data-start=\"3113\" data-end=\"3139\">Menor detec\u00e7\u00e3o inicial<\/li>\n<li data-section-id=\"f5lozc\" data-start=\"3140\" data-end=\"3185\">Maior press\u00e3o reputacional sobre a v\u00edtima<\/li>\n<li data-section-id=\"v9ndxv\" data-start=\"3186\" data-end=\"3231\">Possibilidade de venda m\u00faltipla dos dados<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"18z6bre\" data-start=\"3238\" data-end=\"3260\"><strong>Impactos potenciais<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3262\" data-end=\"3347\">Mesmo quando o impacto t\u00e9cnico \u00e9 limitado, as consequ\u00eancias podem ser significativas:<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"e7gc2s\" data-start=\"3349\" data-end=\"3377\"><strong>1. Exposi\u00e7\u00e3o de clientes<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3378\" data-end=\"3446\">Dados de projetos, configura\u00e7\u00f5es e usu\u00e1rios podem ser comprometidos.<\/p>\n<p data-start=\"3378\" data-end=\"3446\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1ny6inz\" data-start=\"3448\" data-end=\"3473\"><strong>2. Risco reputacional<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3474\" data-end=\"3541\">Empresas que dependem da plataforma podem questionar sua seguran\u00e7a.<\/p>\n<p data-start=\"3474\" data-end=\"3541\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"fifwll\" data-start=\"3543\" data-end=\"3564\"><strong>3. Efeito cascata<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3565\" data-end=\"3616\">Clientes afetados podem sofrer ataques secund\u00e1rios.<\/p>\n<p data-start=\"3565\" data-end=\"3616\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1ggl8ez\" data-start=\"3618\" data-end=\"3643\"><strong>4. Perda de confian\u00e7a<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3644\" data-end=\"3693\">A credibilidade da plataforma pode ser impactada.<\/p>\n<p data-start=\"3644\" data-end=\"3693\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"40myd1\" data-start=\"3700\" data-end=\"3739\"><strong>Cloud Security: Desafios estruturais<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3741\" data-end=\"3791\">Ambientes cloud-native apresentam desafios \u00fanicos:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"3793\" data-end=\"3964\">\n<li data-section-id=\"nhffm4\" data-start=\"3793\" data-end=\"3856\"><strong data-start=\"3795\" data-end=\"3829\">Responsabilidade compartilhada<\/strong> entre provedor e cliente<\/li>\n<li data-section-id=\"axx4b0\" data-start=\"3857\" data-end=\"3890\">Complexidade de configura\u00e7\u00f5es<\/li>\n<li data-section-id=\"18jap5o\" data-start=\"3891\" data-end=\"3923\">Grande volume de integra\u00e7\u00f5es<\/li>\n<li data-section-id=\"1skuho7\" data-start=\"3924\" data-end=\"3964\">Dificuldade de visibilidade completa<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"3966\" data-end=\"4027\">Isso exige uma abordagem de seguran\u00e7a mais madura e cont\u00ednua.<\/p>\n<p data-start=\"3966\" data-end=\"4027\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1s4apo7\" data-start=\"4034\" data-end=\"4056\"><strong>Li\u00e7\u00f5es Estrat\u00e9gicas<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4058\" data-end=\"4100\">O incidente traz aprendizados importantes:<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1qcjbcf\" data-start=\"4102\" data-end=\"4142\"><strong>1. Prote\u00e7\u00e3o de credenciais \u00e9 cr\u00edtica<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4143\" data-end=\"4170\">Tokens e secrets devem ser:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"4172\" data-end=\"4261\">\n<li data-section-id=\"1k5t9dr\" data-start=\"4172\" data-end=\"4201\">Rotacionados regularmente<\/li>\n<li data-section-id=\"shf4w1\" data-start=\"4202\" data-end=\"4231\">Armazenados com seguran\u00e7a<\/li>\n<li data-section-id=\"3vdqy7\" data-start=\"4232\" data-end=\"4261\">Monitorados continuamente<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"e2vvyn\" data-start=\"4263\" data-end=\"4300\"><strong>2. Seguran\u00e7a em CI\/CD \u00e9 essencial<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4301\" data-end=\"4351\">Pipelines devem ser tratados como ativos cr\u00edticos.<\/p>\n<p data-start=\"4301\" data-end=\"4351\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1n8ov5w\" data-start=\"4353\" data-end=\"4382\"><strong>3. Monitoramento cont\u00ednuo<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4383\" data-end=\"4435\">Detectar acessos an\u00f4malos rapidamente \u00e9 fundamental.<\/p>\n<p data-start=\"4383\" data-end=\"4435\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"18gjumi\" data-start=\"4437\" data-end=\"4454\"><strong>4. Zero Trust<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4455\" data-end=\"4503\">Nenhum acesso deve ser implicitamente confi\u00e1vel.<\/p>\n<p data-start=\"4455\" data-end=\"4503\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1epdrcw\" data-start=\"4510\" data-end=\"4537\"><strong>Estrat\u00e9gias de mitiga\u00e7\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4539\" data-end=\"4598\">Para reduzir riscos em ambientes semelhantes, recomenda-se:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"4600\" data-end=\"4862\">\n<li data-section-id=\"15inxze\" data-start=\"4600\" data-end=\"4648\">Implementa\u00e7\u00e3o de <strong data-start=\"4619\" data-end=\"4646\">MFA em todos os acessos<\/strong><\/li>\n<li data-section-id=\"130lyee\" data-start=\"4649\" data-end=\"4703\">Uso de <strong data-start=\"4658\" data-end=\"4701\">cofres de segredos (Secrets Management)<\/strong><\/li>\n<li data-section-id=\"1ayhzix\" data-start=\"4704\" data-end=\"4744\">Auditoria cont\u00ednua de logs e acessos<\/li>\n<li data-section-id=\"mhu7q4\" data-start=\"4745\" data-end=\"4806\">Segmenta\u00e7\u00e3o de permiss\u00f5es (princ\u00edpio do menor privil\u00e9gio)<\/li>\n<li data-section-id=\"tdamr7\" data-start=\"4807\" data-end=\"4862\">Monitoramento de atividades suspeitas em tempo real<\/li>\n<\/ul>\n<p style=\"text-align: justify;\" data-start=\"4864\" data-end=\"4930\">Al\u00e9m disso, \u00e9 fundamental realizar testes peri\u00f3dicos de seguran\u00e7a.<\/p>\n<p data-start=\"4864\" data-end=\"4930\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"h85oci\" data-start=\"4937\" data-end=\"4949\"><strong>Conclus\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4951\" data-end=\"5144\">O incidente envolvendo a <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Vercel<\/span><\/span> refor\u00e7a uma realidade inevit\u00e1vel: ambientes modernos, embora altamente eficientes, tamb\u00e9m s\u00e3o alvos valiosos para cibercriminosos.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5146\" data-end=\"5340\">A combina\u00e7\u00e3o de infraestrutura distribu\u00edda, automa\u00e7\u00e3o e grande volume de dados cria oportunidades para ataques sofisticados, especialmente aqueles focados em extors\u00e3o e vazamento de informa\u00e7\u00f5es.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5342\" data-end=\"5542\">Diante desse cen\u00e1rio, a seguran\u00e7a precisa evoluir na mesma velocidade que a tecnologia. Isso significa adotar pr\u00e1ticas robustas de prote\u00e7\u00e3o de identidade, monitoramento cont\u00ednuo e governan\u00e7a de dados.<\/p>\n<p style=\"text-align: justify;\" data-start=\"5544\" data-end=\"5721\">Mais do que nunca, proteger a cadeia de desenvolvimento e os ambientes cloud n\u00e3o \u00e9 apenas uma necessidade t\u00e9cnica \u2014 \u00e9 uma exig\u00eancia estrat\u00e9gica para a continuidade dos neg\u00f3cios.<\/p>\n<p data-start=\"5544\" data-end=\"5721\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-section-id=\"1bfeuhi\" data-start=\"5728\" data-end=\"5757\"><strong>Refer\u00eancias Bibliogr\u00e1ficas<\/strong><\/p>\n<ul data-start=\"5759\" data-end=\"6162\">\n<li data-section-id=\"drpgjz\" data-start=\"5759\" data-end=\"5993\"><strong>TecMundo.<\/strong> <em data-start=\"5772\" data-end=\"5849\">Vercel confirma invas\u00e3o ap\u00f3s hacker colocar dados \u00e0 venda por US$ 2 milh\u00f5es<\/em>. Dispon\u00edvel em: <a class=\"decorated-link\" href=\"https:\/\/www.tecmundo.com.br\/seguranca\/412521-vercel-confirma-invasao-apos-hacker-colocar-dados-a-venda-por-us-2-milhoes.htm\" target=\"_blank\" rel=\"noopener\" data-start=\"5868\" data-end=\"5991\">https:\/\/www.tecmundo.com.br\/seguranca\/412521-vercel-confirma-invasao-apos-hacker-colocar-dados-a-venda-por-us-2-milhoes.htm<\/a><\/li>\n<li data-section-id=\"fa1sy6\" data-start=\"5995\" data-end=\"6162\"><strong>Cloud Security Alliance.<\/strong> <em data-start=\"6023\" data-end=\"6089\">Security Guidance for Critical Areas of Focus in Cloud Computing<\/em>. Dispon\u00edvel em: <a class=\"decorated-link\" href=\"https:\/\/cloudsecurityalliance.org\/research\/guidance\/\" target=\"_blank\" rel=\"noopener\" data-start=\"6108\" data-end=\"6160\">https:\/\/cloudsecurityalliance.org\/research\/guidance\/<\/a><\/li>\n<\/ul>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Viola\u00e7\u00e3o na Vercel: Quando infraestrutura moderna se torna alvo de extors\u00e3o digital A crescente ado\u00e7\u00e3o de plataformas serverless e ambientes de desenvolvimento modernos trouxe ganhos significativos em agilidade e escalabilidade. No entanto, esse mesmo avan\u00e7o tamb\u00e9m ampliou a superf\u00edcie de ataque. Um exemplo recente foi a confirma\u00e7\u00e3o de uma viola\u00e7\u00e3o envolvendo a Vercel, ap\u00f3s um [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":24163,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,105],"tags":[],"class_list":["post-24162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=24162"}],"version-history":[{"count":1,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24162\/revisions"}],"predecessor-version":[{"id":24164,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/24162\/revisions\/24164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/24163"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=24162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=24162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=24162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}