{"id":104931,"date":"2023-04-18T13:36:32","date_gmt":"2023-04-18T17:36:32","guid":{"rendered":"https:\/\/adf-magazine.com\/?p=104931"},"modified":"2023-04-18T13:36:32","modified_gmt":"2023-04-18T17:36:32","slug":"relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas","status":"publish","type":"post","link":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/","title":{"rendered":"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas"},"content":{"rendered":"<p style=\"font-weight: 400;\">EQUIPA DA ADF<\/p>\n<p style=\"font-weight: 400;\">\u00c0 medida que a comunidade online de \u00c1frica continua a crescer, os piratas inform\u00e1ticos e outros actores maliciosos est\u00e3o \u00e0 espreita para invadir as redes em expans\u00e3o e roubar dados valiosos.<\/p>\n<p style=\"font-weight: 400;\">Um estudo recente dos analistas de amea\u00e7as cibern\u00e9ticas da Security X-Force da IBM mostrou que os chamados ataques \u201cbackdoor\u201d estavam entre as formas mais populares de os piratas inform\u00e1ticos terem acesso a sistemas inform\u00e1ticos em toda a \u00c1frica. Como um ex\u00e9rcito a invadir um castelo, entrando furtivamente pelo seu sistema de esgoto, os ataques d\u00e3o aos piratas inform\u00e1ticos uma forma de contornar as firewalls de um sistema inform\u00e1tico e outras formas de protec\u00e7\u00e3o.<\/p>\n<p style=\"font-weight: 400;\">Esses ataques \u201cbackdoor\u201d podem preparar o cen\u00e1rio para o roubo de dados pessoais ou para a introdu\u00e7\u00e3o de ransomware, que bloqueia um sistema de computador at\u00e9 que os piratas inform\u00e1ticos sejam pagos.<\/p>\n<p style=\"font-weight: 400;\">\u201cEstejam preparados,\u201d escrevem os autores do relat\u00f3rio. \u201cOs ataques s\u00e3o inevit\u00e1veis; o fracasso n\u00e3o tem de o ser.\u201d<\/p>\n<p style=\"font-weight: 400;\">Cerca de 45% dos 1,3 bilh\u00f5es de pessoas de \u00c1frica t\u00eam acesso \u00e0 internet. A Nig\u00e9ria conta com o maior n\u00famero de utilizadores de internet do continente com mais de 109 milh\u00f5es e \u00e9 um dos pa\u00edses africanos mais frequentemente alvo de ataques cibern\u00e9ticos.<\/p>\n<p style=\"font-weight: 400;\">A pandemia da COVID-19 levou os pa\u00edses africanos a expandir os seus sistemas de internet, com milh\u00f5es de utilizadores a adoptarem a banca online e as transfer\u00eancias de dinheiro.<\/p>\n<p style=\"font-weight: 400;\">No entanto, o r\u00e1pido crescimento da internet aconteceu com pouca considera\u00e7\u00e3o pelas medidas de seguran\u00e7a necess\u00e1rias para proteger os dados e a privacidade, disse o especialista nigeriano em seguran\u00e7a cibern\u00e9tica, Abdul-Hakeem Ajijola \u00e0 ADF. Ajijola lidera o Comit\u00e9 do Plano de Ac\u00e7\u00e3o do Roteiro Estrat\u00e9gico, do Gabinete de Protec\u00e7\u00e3o de Dados da Nig\u00e9ria.<\/p>\n<p style=\"font-weight: 400;\">Uma investiga\u00e7\u00e3o da Interpol de 2021 sobre o sistema de seguran\u00e7a cibern\u00e9tica de \u00c1frica revelou que as fracas redes e a fraca seguran\u00e7a tornaram o continente particularmente vulner\u00e1vel a ataques online.<\/p>\n<p style=\"font-weight: 400;\">O relat\u00f3rio da IBM X-Force concluiu que os ataques \u201cbackdoor\u201d s\u00e3o respons\u00e1veis por 27% dos ataques contra sistemas inform\u00e1ticos no M\u00e9dio Oriente e em \u00c1frica, regi\u00f5es que a IBM combina para a sua an\u00e1lise. Quase 45% desses ataques visaram as institui\u00e7\u00f5es financeiras do continente.<\/p>\n<p style=\"font-weight: 400;\">Ao mesmo tempo que os ataques cibern\u00e9ticos se transformam em invas\u00f5es \u201cbackdoor\u201d, o roubo de informa\u00e7\u00f5es de cart\u00f5es de cr\u00e9dito caiu de 61% dos casos em 2021 para menos de um ter\u00e7o deles em 2022, l\u00ea-se no relat\u00f3rio.<\/p>\n<p style=\"font-weight: 400;\">A raz\u00e3o \u00e9 simples: os piratas inform\u00e1ticos podem cobrar clientes, com inten\u00e7\u00f5es maliciosas, at\u00e9 10.000 d\u00f3lares americanos pelo acesso \u201cbackdoor\u201d a um sistema inform\u00e1tico. Os n\u00fameros de cart\u00f5es de cr\u00e9dito, por outro lado, custam 10 d\u00f3lares cada.<\/p>\n<p style=\"font-weight: 400;\">A extors\u00e3o foi respons\u00e1vel pela maior forma de ataques \u201cbackdoor\u201d, com 27% dos casos. Embora cerca de 17% dos casos tenham sido alguma forma de ransomware, os piratas inform\u00e1ticos parecem ter visado mais frequentemente informa\u00e7\u00f5es pessoais identific\u00e1veis (PII), como datas de nascimento, n\u00fameros de identifica\u00e7\u00e3o e dados biom\u00e9tricos.<\/p>\n<p style=\"font-weight: 400;\">\u201cAs PII podem ser recolhidas e vendidas na dark web ou em outros f\u00f3runs, ou usadas para conduzir outras opera\u00e7\u00f5es contra alvos\u201d, observa o relat\u00f3rio da X-Force.<\/p>\n<p style=\"font-weight: 400;\">Os piratas inform\u00e1ticos geralmente obt\u00eam acesso \u00e0s redes quando os utilizadores de computadores s\u00e3o v\u00edtimas de ataques de phishing, de acordo com o relat\u00f3rio. Phishing ocorre quando um pirata inform\u00e1tico cria um e-mail ou website para induzir uma pessoa a clicar num anexo que descarrega malware ou a entrar num p\u00e1gina de internet fraudulenta e a partilhar informa\u00e7\u00f5es pessoais, tais como palavras-passe, n\u00fameros de conta e outras informa\u00e7\u00f5es privadas.<\/p>\n<p style=\"font-weight: 400;\">Mais de 60% dos ataques de phishing utilizaram anexos para atrair utilizadores de computadores a convidar involuntariamente os atacantes para as suas redes. As liga\u00e7\u00f5es maliciosas representaram um ter\u00e7o dos ataques de phishing, de acordo com o relat\u00f3rio da X-Force.<\/p>\n<p style=\"font-weight: 400;\">Para proteger os seus sistemas contra piratas inform\u00e1ticos, a X-Force recomenda que as empresas e os governos que mant\u00eam sistemas de internet africanos prestem aten\u00e7\u00e3o \u00e0s amea\u00e7as prov\u00e1veis e actuem para as evitar.<\/p>\n<p style=\"font-weight: 400;\">\u201cAs organiza\u00e7\u00f5es devem assumir que j\u00e1 est\u00e3o afectadas,\u201d escreveram os autores do relat\u00f3rio.<\/p>\n<p style=\"font-weight: 400;\">Como parte do relat\u00f3rio, Frida Kleimert Knibbs, l\u00edder de seguran\u00e7a da IBM para o M\u00e9dio Oriente e \u00c1frica, sublinhou o papel crucial da seguran\u00e7a dos sistemas inform\u00e1ticos na salvaguarda dos mesmos contra ataques.<\/p>\n<p style=\"font-weight: 400;\">\u201cEnquanto a paisagem de seguran\u00e7a evolui, \u00e9 crucial dar prioridade \u00e0 seguran\u00e7a da informa\u00e7\u00e3o sobre amea\u00e7as e refor\u00e7ar as defesas,\u201d disse Knibbs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>EQUIPA DA ADF \u00c0 medida que a comunidade online de \u00c1frica continua a crescer, os piratas inform\u00e1ticos e outros actores maliciosos est\u00e3o \u00e0 espreita para invadir as redes em expans\u00e3o e roubar dados valiosos. Um estudo recente dos analistas de amea\u00e7as cibern\u00e9ticas da Security X-Force da IBM mostrou que os chamados ataques \u201cbackdoor\u201d estavam entre<\/p>\n","protected":false},"author":1,"featured_media":104929,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[363],"tags":[857,980,1163,453,744],"class_list":{"0":"post-104931","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-melhores-historias","8":"tag-ciberseguranca","9":"tag-eritreia","10":"tag-marroccos","11":"tag-nigeria-pt-pt","12":"tag-sudao-do-sul"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas - Africa Defense Forum<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas - Africa Defense Forum\" \/>\n<meta property=\"og:description\" content=\"EQUIPA DA ADF \u00c0 medida que a comunidade online de \u00c1frica continua a crescer, os piratas inform\u00e1ticos e outros actores maliciosos est\u00e3o \u00e0 espreita para invadir as redes em expans\u00e3o e roubar dados valiosos. Um estudo recente dos analistas de amea\u00e7as cibern\u00e9ticas da Security X-Force da IBM mostrou que os chamados ataques \u201cbackdoor\u201d estavam entre\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/\" \/>\n<meta property=\"og:site_name\" content=\"Africa Defense Forum\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ADFmagazine\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T17:36:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/04\/iStock-1340944124-1024x540.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ADF\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ADFmagazine\" \/>\n<meta name=\"twitter:site\" content=\"@ADFmagazine\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"ADF\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/\"},\"author\":{\"name\":\"ADF\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\"},\"headline\":\"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas\",\"datePublished\":\"2023-04-18T17:36:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/\"},\"wordCount\":819,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/iStock-1340944124.jpg\",\"keywords\":[\"ciberseguran\u00e7a\",\"Eritreia\",\"Marroccos\",\"Nigeria\",\"Sud\u00e3o do Sul\"],\"articleSection\":[\"Not\u00edcias diaries\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/\",\"name\":\"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas - Africa Defense Forum\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/iStock-1340944124.jpg\",\"datePublished\":\"2023-04-18T17:36:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/iStock-1340944124.jpg\",\"contentUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/iStock-1340944124.jpg\",\"width\":2384,\"height\":1257,\"caption\":\"Um novo relat\u00f3rio sobre seguran\u00e7a cibern\u00e9tica revela que os ataques aos sistemas inform\u00e1ticos africanos atingem frequentemente as institui\u00e7\u00f5es financeiras, atrav\u00e9s de ataques \u201cbackdoor\u201d que d\u00e3o aos piratas inform\u00e1ticos uma forma de contornar as medidas de seguran\u00e7a cibern\u00e9tica.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/2023\\\/04\\\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/adf-magazine.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#website\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/\",\"name\":\"Africa Defense Forum\",\"description\":\"Africa Defense Forum\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adf-magazine.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\",\"name\":\"ADF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"contentUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"caption\":\"ADF\"},\"description\":\"ADF is a professional military magazine published quarterly by U.S. Africa Command to provide an international forum for African security professionals. ADF covers topics such as counter terrorism strategies, security and defense operations, transnational crime, and all other issues affecting peace, stability, and good governance on the African continent.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/ADFmagazine\"],\"url\":\"https:\\\/\\\/adf-magazine.com\\\/pt-pt\\\/author\\\/adf\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas - Africa Defense Forum","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/","og_locale":"pt_PT","og_type":"article","og_title":"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas - Africa Defense Forum","og_description":"EQUIPA DA ADF \u00c0 medida que a comunidade online de \u00c1frica continua a crescer, os piratas inform\u00e1ticos e outros actores maliciosos est\u00e3o \u00e0 espreita para invadir as redes em expans\u00e3o e roubar dados valiosos. Um estudo recente dos analistas de amea\u00e7as cibern\u00e9ticas da Security X-Force da IBM mostrou que os chamados ataques \u201cbackdoor\u201d estavam entre","og_url":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/","og_site_name":"Africa Defense Forum","article_publisher":"https:\/\/www.facebook.com\/ADFmagazine\/","article_published_time":"2023-04-18T17:36:32+00:00","og_image":[{"width":1024,"height":540,"url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/04\/iStock-1340944124-1024x540.jpg","type":"image\/jpeg"}],"author":"ADF","twitter_card":"summary_large_image","twitter_creator":"@ADFmagazine","twitter_site":"@ADFmagazine","twitter_misc":{"Escrito por":"ADF","Tempo estimado de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#article","isPartOf":{"@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/"},"author":{"name":"ADF","@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025"},"headline":"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas","datePublished":"2023-04-18T17:36:32+00:00","mainEntityOfPage":{"@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/"},"wordCount":819,"commentCount":0,"image":{"@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#primaryimage"},"thumbnailUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/04\/iStock-1340944124.jpg","keywords":["ciberseguran\u00e7a","Eritreia","Marroccos","Nigeria","Sud\u00e3o do Sul"],"articleSection":["Not\u00edcias diaries"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/","url":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/","name":"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas - Africa Defense Forum","isPartOf":{"@id":"https:\/\/adf-magazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#primaryimage"},"image":{"@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#primaryimage"},"thumbnailUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/04\/iStock-1340944124.jpg","datePublished":"2023-04-18T17:36:32+00:00","author":{"@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025"},"breadcrumb":{"@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#primaryimage","url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/04\/iStock-1340944124.jpg","contentUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/04\/iStock-1340944124.jpg","width":2384,"height":1257,"caption":"Um novo relat\u00f3rio sobre seguran\u00e7a cibern\u00e9tica revela que os ataques aos sistemas inform\u00e1ticos africanos atingem frequentemente as institui\u00e7\u00f5es financeiras, atrav\u00e9s de ataques \u201cbackdoor\u201d que d\u00e3o aos piratas inform\u00e1ticos uma forma de contornar as medidas de seguran\u00e7a cibern\u00e9tica."},{"@type":"BreadcrumbList","@id":"https:\/\/adf-magazine.com\/pt-pt\/2023\/04\/relatorio-hackers-usam-ataques-backdoor-para-invadir-redes-informaticas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adf-magazine.com\/"},{"@type":"ListItem","position":2,"name":"Relat\u00f3rio: Hackers Usam Ataques \u201cBackdoor\u201d para Invadir Redes Inform\u00e1ticas"}]},{"@type":"WebSite","@id":"https:\/\/adf-magazine.com\/#website","url":"https:\/\/adf-magazine.com\/","name":"Africa Defense Forum","description":"Africa Defense Forum","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adf-magazine.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Person","@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025","name":"ADF","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","contentUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","caption":"ADF"},"description":"ADF is a professional military magazine published quarterly by U.S. Africa Command to provide an international forum for African security professionals. ADF covers topics such as counter terrorism strategies, security and defense operations, transnational crime, and all other issues affecting peace, stability, and good governance on the African continent.","sameAs":["https:\/\/x.com\/ADFmagazine"],"url":"https:\/\/adf-magazine.com\/pt-pt\/author\/adf\/"}]}},"_links":{"self":[{"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/posts\/104931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/comments?post=104931"}],"version-history":[{"count":0,"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/posts\/104931\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/media\/104929"}],"wp:attachment":[{"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/media?parent=104931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/categories?post=104931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adf-magazine.com\/pt-pt\/wp-json\/wp\/v2\/tags?post=104931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}