{"id":1594174,"date":"2025-07-21T14:35:00","date_gmt":"2025-07-21T17:35:00","guid":{"rendered":"https:\/\/www.estrategiaconcursos.com.br\/blog\/?p=1594174"},"modified":"2025-07-11T13:48:38","modified_gmt":"2025-07-11T16:48:38","slug":"malwares-concurso-pf","status":"publish","type":"post","link":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/","title":{"rendered":"Malwares: resumo para o concurso da PF"},"content":{"rendered":"\n<p>Ol\u00e1, futuro policial federal! Hoje vamos explorar um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: <strong>Malware<\/strong>s.<\/p>\n\n\n\n<p>Este assunto \u00e9 essencial para compreender as amea\u00e7as digitais que enfrentamos diariamente. Para a <a href=\"https:\/\/www.cebraspe.org.br\/concursos\/pf_25\">Pol\u00edcia Federal<\/a>, dominar conceitos de malware \u00e9 crucial para investiga\u00e7\u00f5es de crimes cibern\u00e9ticos, an\u00e1lise forense de sistemas comprometidos e prote\u00e7\u00e3o da infraestrutura cr\u00edtica nacional.<\/p>\n\n\n\n<p>Preparei este conte\u00fado mesclando textos explicativos, t\u00f3picos organizados e tabelas did\u00e1ticas, focando nos aspectos que mais aparecem em quest\u00f5es de concursos e nas aplica\u00e7\u00f5es reais na seguran\u00e7a p\u00fablica.<\/p>\n\n\n\n<p>Vamos desvendar juntos o mundo das amea\u00e7as digitais!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-topicos-do-artigo\">T\u00f3picos do Artigo<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Conceito e Defini\u00e7\u00e3o de Malware<\/strong><\/li>\n\n\n\n<li><strong>Classifica\u00e7\u00e3o por Comportamento<\/strong><\/li>\n\n\n\n<li><strong>Principais Tipos de Malware<\/strong><\/li>\n\n\n\n<li><strong>M\u00e9todos de Propaga\u00e7\u00e3o<\/strong><\/li>\n\n\n\n<li><strong>T\u00e9cnicas de Detec\u00e7\u00e3o e Preven\u00e7\u00e3o<\/strong><\/li>\n\n\n\n<li><strong>An\u00e1lise Forense de Malware<\/strong><\/li>\n\n\n\n<li><strong>Aplica\u00e7\u00f5es na Pol\u00edcia Federal<\/strong><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-conceito-e-definicao-de-malware\">1. Conceito e Defini\u00e7\u00e3o de Malware<\/h2>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f7dfdf\"><strong>Malware<\/strong> \u00e9 a contra\u00e7\u00e3o de &#8220;<em><strong>Malicious Software<\/strong><\/em>&#8221; (Software Malicioso) &#8211; qualquer programa ou c\u00f3digo desenvolvido com inten\u00e7\u00f5es maliciosas para causar danos, roubar informa\u00e7\u00f5es, interromper opera\u00e7\u00f5es ou obter acesso n\u00e3o autorizado a sistemas computacionais.<\/p>\n\n\n\n<p>O termo engloba uma ampla categoria de software hostil que inclui <strong>v\u00edrus, <em>worms<\/em>, <em>trojans<\/em>, <em>ransomware<\/em>, <\/strong><em><strong>spyware<\/strong> <\/em>e outras amea\u00e7as digitais. Diferentemente de bugs ou falhas de software, o malware \u00e9 <strong>intencionalmente<\/strong> criado para realizar atividades prejudiciais.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-caracteristicas-fundamentais-do-malware\">Caracter\u00edsticas Fundamentais do Malware:<\/h3>\n\n\n\n<p><strong>Intencionalidade Maliciosa<\/strong>: O software \u00e9 deliberadamente projetado para causar danos ou realizar atividades n\u00e3o autorizadas, distinguindo-o de bugs acidentais.<\/p>\n\n\n\n<p><strong>Funcionalidade Oculta<\/strong>: O malware frequentemente opera de forma furtiva, tentando permanecer invis\u00edvel ao usu\u00e1rio e aos sistemas de seguran\u00e7a.<\/p>\n\n\n\n<p><strong>Capacidade de Propaga\u00e7\u00e3o<\/strong>: Muitos tipos de malware possuem mecanismos para se espalharem atrav\u00e9s de redes, dispositivos remov\u00edveis ou comunica\u00e7\u00f5es.<\/p>\n\n\n\n<p><strong>Persist\u00eancia<\/strong>: Mecanismos para permanecer ativo no sistema mesmo ap\u00f3s reinicializa\u00e7\u00f5es ou tentativas de remo\u00e7\u00e3o.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Aspecto<\/th><th>Descri\u00e7\u00e3o<\/th><th>Exemplo<\/th><\/tr><\/thead><tbody><tr><td><strong>Objetivo<\/strong><\/td><td>Prop\u00f3sito da infec\u00e7\u00e3o<\/td><td>Roubo de dados, danos ao sistema, controle remoto<\/td><\/tr><tr><td><strong>Alvo<\/strong><\/td><td>Sistemas ou dados visados<\/td><td>Senhas, documentos, sistemas cr\u00edticos<\/td><\/tr><tr><td><strong>M\u00e9todo<\/strong><\/td><td>Como atinge o objetivo<\/td><td>Keyloggers, criptografia, backdoors<\/td><\/tr><tr><td><strong>Distribui\u00e7\u00e3o<\/strong><\/td><td>Como se espalha<\/td><td>Email, downloads, dispositivos USB<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Para a Pol\u00edcia Federal, compreender malware \u00e9 fundamental porque:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Crimes Cibern\u00e9ticos<\/strong>: Muitos crimes utilizam malware como ferramenta<\/li>\n\n\n\n<li><strong>Per\u00edcia Digital<\/strong>: An\u00e1lise de sistemas infectados em investiga\u00e7\u00f5es<\/li>\n\n\n\n<li><strong>Seguran\u00e7a Institucional<\/strong>: Prote\u00e7\u00e3o dos pr\u00f3prios sistemas da PF<\/li>\n\n\n\n<li><strong>Intelig\u00eancia<\/strong>: Compreens\u00e3o de amea\u00e7as a infraestruturas cr\u00edticas<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-classificacao-por-comportamento\">2. Classifica\u00e7\u00e3o por Comportamento<\/h2>\n\n\n\n<p>O malware pode ser classificado de diferentes formas. A classifica\u00e7\u00e3o por comportamento \u00e9 uma das mais did\u00e1ticas para concursos:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-por-metodo-de-propagacao\">Por M\u00e9todo de Propaga\u00e7\u00e3o:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Auto-replicantes<\/strong>: V\u00edrus e worms que se copiam automaticamente<\/li>\n\n\n\n<li><strong>N\u00e3o replicantes<\/strong>: Trojans e spyware que dependem de a\u00e7\u00e3o externa para propaga\u00e7\u00e3o<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-por-objetivo-principal\">Por Objetivo Principal:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Destrutivos<\/strong>: Visam causar danos aos dados ou sistema<\/li>\n\n\n\n<li><strong>Furtivos<\/strong>: Focam em roubar informa\u00e7\u00f5es sem serem detectados<\/li>\n\n\n\n<li><strong>Financeiros<\/strong>: Objetivam ganho monet\u00e1rio direto (ransomware, banking trojans)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-por-nivel-de-acesso\">Por N\u00edvel de Acesso:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>N\u00edvel de Usu\u00e1rio<\/strong>: Operam com privil\u00e9gios limitados<\/li>\n\n\n\n<li><strong>N\u00edvel de Sistema<\/strong>: Requerem ou obt\u00eam privil\u00e9gios administrativos<\/li>\n\n\n\n<li><strong>N\u00edvel de Firmware<\/strong>: Infectam BIOS\/UEFI (mais raros e avan\u00e7ados)<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Classifica\u00e7\u00e3o<\/th><th>Caracter\u00edsticas<\/th><th>Impacto<\/th><th>Detec\u00e7\u00e3o<\/th><\/tr><\/thead><tbody><tr><td><strong>V\u00edrus<\/strong><\/td><td>Anexa-se a arquivos<\/td><td>Corrup\u00e7\u00e3o de dados<\/td><td>Assinatura\/comportamento<\/td><\/tr><tr><td><strong>Worm<\/strong><\/td><td>Auto-propaga\u00e7\u00e3o<\/td><td>Congestionamento de rede<\/td><td>Tr\u00e1fego an\u00f4malo<\/td><\/tr><tr><td><strong>Trojan<\/strong><\/td><td>Disfar\u00e7ado como leg\u00edtimo<\/td><td>Acesso n\u00e3o autorizado<\/td><td>An\u00e1lise comportamental<\/td><\/tr><tr><td><strong>Ransomware<\/strong><\/td><td>Criptografa dados<\/td><td>Perda de acesso a dados<\/td><td>Monitoramento de arquivos<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"1024\" src=\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-975x1024.png\" alt=\"\" class=\"wp-image-1594512\" srcset=\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-975x1024.png 975w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-286x300.png 286w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-768x807.png 768w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-150x158.png 150w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png 1025w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-3-principais-tipos-de-malware\">3. Principais Tipos de Malware<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-virus\">V\u00edrus<\/h3>\n\n\n\n<p>Programa que <strong>se anexa a outros arquivos execut\u00e1veis<\/strong> <strong>e se replica quando o arquivo hospedeiro \u00e9 executado<\/strong>. \u00c9 um dos tipos mais antigos e conhecidos de malware.<\/p>\n\n\n\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#dff2ff\">\n<p><strong>Caracter\u00edsticas dos V\u00edrus:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Necessitam de um arquivo hospedeiro para existir<\/li>\n\n\n\n<li>Propagam-se atrav\u00e9s da execu\u00e7\u00e3o de arquivos infectados<\/li>\n\n\n\n<li>Podem permanecer dormentes at\u00e9 condi\u00e7\u00f5es espec\u00edficas<\/li>\n\n\n\n<li>Variam de simplesmente irritantes a extremamente destrutivos<\/li>\n<\/ul>\n<\/div>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tipo de V\u00edrus<\/th><th>Comportamento<\/th><th>Exemplo de Impacto<\/th><\/tr><\/thead><tbody><tr><td><strong>Boot Sector<\/strong><\/td><td>Infecta setor de boot do disco<\/td><td>Sistema n\u00e3o inicializa<\/td><\/tr><tr><td><strong>File Infector<\/strong><\/td><td>Infecta arquivos execut\u00e1veis<\/td><td>Corrup\u00e7\u00e3o de programas<\/td><\/tr><tr><td><strong>Macro Virus<\/strong><\/td><td>Infecta documentos com macros<\/td><td>Propaga\u00e7\u00e3o via Office<\/td><\/tr><tr><td><strong>Polymorphic<\/strong><\/td><td>Muda c\u00f3digo para evitar detec\u00e7\u00e3o<\/td><td>Dificulta identifica\u00e7\u00e3o<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-worms\">Worms<\/h3>\n\n\n\n<p>Software malicioso que se <strong><mark style=\"background-color:#ffedbc\" class=\"has-inline-color\">replica automaticamente<\/mark><\/strong> atrav\u00e9s de redes, sem necessidade de arquivo hospedeiro. Diferem dos v\u00edrus por serem programas independentes.<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#ffe8d9\">\n<p><strong>Principais Caracter\u00edsticas:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Propaga\u00e7\u00e3o Aut\u00f4noma<\/strong>: N\u00e3o dependem de a\u00e7\u00e3o do usu\u00e1rio<\/li>\n\n\n\n<li><strong>Explora\u00e7\u00e3o de Vulnerabilidades<\/strong>: Usam falhas de seguran\u00e7a para se espalhar<\/li>\n\n\n\n<li><strong>Consumo de Recursos<\/strong>: Podem causar lentid\u00e3o ou travamento de redes<\/li>\n\n\n\n<li><strong>Payload Vari\u00e1vel<\/strong>: Podem carregar outros malwares ou funcionalidades<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-trojans-cavalos-de-troia\">Trojans (Cavalos de Troia)<\/h3>\n\n\n\n<p>Programas que se disfar\u00e7am como software leg\u00edtimo, mas cont\u00eam funcionalidades maliciosas ocultas. Nome derivado do famoso cavalo de Troia da mitologia grega.<\/p>\n\n\n\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#fff5d3\">\n<p><strong>Caracter\u00edsticas Distintivas:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Disfarce<\/strong>: Aparentam ser programas \u00fateis ou inofensivos<\/li>\n\n\n\n<li><strong>Depend\u00eancia do Usu\u00e1rio<\/strong>: Usu\u00e1rio deve executar voluntariamente<\/li>\n\n\n\n<li><strong>N\u00e3o Auto-replicantes<\/strong>: N\u00e3o se propagam automaticamente<\/li>\n\n\n\n<li><strong>Portas dos Fundos<\/strong>: Frequentemente abrem backdoors no sistema<\/li>\n<\/ul>\n<\/div>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tipo de Trojan<\/th><th>Fun\u00e7\u00e3o Principal<\/th><th>Risco<\/th><\/tr><\/thead><tbody><tr><td><strong>RAT<\/strong><\/td><td>Acesso remoto administrativo<\/td><td>Alto &#8211; controle total<\/td><\/tr><tr><td><strong>Banking<\/strong><\/td><td>Roubo de credenciais banc\u00e1rias<\/td><td>Alto &#8211; perdas financeiras<\/td><\/tr><tr><td><strong>Keylogger<\/strong><\/td><td>Captura de teclas digitadas<\/td><td>M\u00e9dio &#8211; roubo de senhas<\/td><\/tr><tr><td><strong>Downloader<\/strong><\/td><td>Download de outros malwares<\/td><td>M\u00e9dio &#8211; porta de entrada<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ransomware\">Ransomware<\/h3>\n\n\n\n<p>Tipo de malware que <strong>criptografa arquivos do usu\u00e1rio<\/strong> ou <strong>bloqueia acesso<\/strong> ao sistema, <strong><mark style=\"background-color:#f7cfd9\" class=\"has-inline-color has-black-color\">exigindo pagamento de resgate<\/mark><\/strong> para restaurar o acesso.<\/p>\n\n\n\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#ffeaf0\">\n<p><strong>Mecanismo de Funcionamento:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Infiltra\u00e7\u00e3o<\/strong>: Entra no sistema via email, download ou vulnerabilidade<\/li>\n\n\n\n<li><strong>Criptografia<\/strong>: Encrypta arquivos importantes do usu\u00e1rio<\/li>\n\n\n\n<li><strong>Exig\u00eancia<\/strong>: Exibe mensagem demandando pagamento<\/li>\n\n\n\n<li><strong>Amea\u00e7a<\/strong>: Promete deletar chaves se n\u00e3o houver pagamento<\/li>\n<\/ol>\n<\/div>\n\n\n\n<p><strong>Tipos de Ransomware:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Crypto-ransomware<\/strong>: Criptografa arquivos espec\u00edficos<\/li>\n\n\n\n<li><strong>Locker-ransomware<\/strong>: Bloqueia acesso ao sistema inteiro<\/li>\n\n\n\n<li><strong>Scareware<\/strong>: Simula infec\u00e7\u00e3o para extorquir pagamento<\/li>\n\n\n\n<li><strong>Doxware<\/strong>: Amea\u00e7a publicar dados confidenciais<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-spyware\">Spyware<\/h3>\n\n\n\n<p>Software projetado para <strong>coletar informa\u00e7\u00f5es sobre usu\u00e1rios ou organiza\u00e7\u00f5es sem conhecimento ou consentimento expl\u00edcito<\/strong>.<\/p>\n\n\n\n<p><strong>Tipos de Informa\u00e7\u00f5es Coletadas:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>H\u00e1bitos de navega\u00e7\u00e3o e sites visitados<\/li>\n\n\n\n<li>Informa\u00e7\u00f5es pessoais e credenciais<\/li>\n\n\n\n<li>Dados financeiros e senhas<\/li>\n\n\n\n<li>Comunica\u00e7\u00f5es e documentos<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Categoria<\/th><th>Fun\u00e7\u00e3o<\/th><th>M\u00e9todo de Coleta<\/th><th>Uso T\u00edpico<\/th><\/tr><\/thead><tbody><tr><td><strong>Adware<\/strong><\/td><td>Exibir an\u00fancios<\/td><td>H\u00e1bitos de navega\u00e7\u00e3o<\/td><td>Marketing direcionado<\/td><\/tr><tr><td><strong>Keylogger<\/strong><\/td><td>Capturar teclas<\/td><td>Registro de teclado<\/td><td>Roubo de senhas<\/td><\/tr><tr><td><strong>Screenlogger<\/strong><\/td><td>Capturar tela<\/td><td>Screenshots<\/td><td>Espionagem visual<\/td><\/tr><tr><td><strong>Cookie Tracker<\/strong><\/td><td>Rastrear navega\u00e7\u00e3o<\/td><td>Cookies do navegador<\/td><td>Perfil de usu\u00e1rio<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21212948\/image-218-1024x683.png\" alt=\"\" class=\"wp-image-1594521\" srcset=\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21212948\/image-218-1024x683.png 1024w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21212948\/image-218-300x200.png 300w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21212948\/image-218-768x512.png 768w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21212948\/image-218-150x100.png 150w, https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21212948\/image-218.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-rootkits\">Rootkits<\/h3>\n\n\n\n<p><strong>Conjunto de programas<\/strong> <strong>maliciosos <\/strong>projetados para <strong>manter acesso<\/strong> privilegiado persistente a um computador enquanto esconde sua presen\u00e7a.<\/p>\n\n\n\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#cfebe1\">\n<p><strong>Caracter\u00edsticas dos Rootkits:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Furtividade Extrema<\/strong>: Muito dif\u00edceis de detectar<\/li>\n\n\n\n<li><strong>Acesso Privilegiado<\/strong>: Operam com privil\u00e9gios de sistema<\/li>\n\n\n\n<li><strong>Persist\u00eancia<\/strong>: Resistem a tentativas de remo\u00e7\u00e3o<\/li>\n\n\n\n<li><strong>Modifica\u00e7\u00e3o de Sistema<\/strong>: Alteram componentes fundamentais do OS<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-backdoors\">Backdoors<\/h3>\n\n\n\n<p>Software ou c\u00f3digo que <strong>permite acesso n\u00e3o autorizado a um sistema<\/strong>, contornando mecanismos normais de autentica\u00e7\u00e3o e seguran\u00e7a.<\/p>\n\n\n\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#d5eeff\">\n<p><strong>Caracter\u00edsticas dos Backdoors:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Acesso Secreto<\/strong>: Porta de entrada oculta no sistema<\/li>\n\n\n\n<li><strong>Contorno de Seguran\u00e7a<\/strong>: Evita autentica\u00e7\u00e3o normal<\/li>\n\n\n\n<li><strong>Persist\u00eancia<\/strong>: Mant\u00e9m acesso mesmo ap\u00f3s atualiza\u00e7\u00f5es<\/li>\n\n\n\n<li><strong>Pode ser Leg\u00edtimo<\/strong>: Alguns s\u00e3o criados para manuten\u00e7\u00e3o (mas representam risco)<\/li>\n<\/ul>\n<\/div>\n\n\n\n<p><strong>Tipos de Backdoors:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hardware<\/strong>: Implementados em chips ou firmware<\/li>\n\n\n\n<li><strong>Software<\/strong>: C\u00f3digo malicioso em aplica\u00e7\u00f5es<\/li>\n\n\n\n<li><strong>Criptogr\u00e1fico<\/strong>: Chaves secretas em algoritmos<\/li>\n\n\n\n<li><strong>Web<\/strong>: Scripts ocultos em sites<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-4-metodos-de-propagacao\">4. M\u00e9todos de Propaga\u00e7\u00e3o<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-vetores-de-infeccao-tradicionais\">Vetores de Infec\u00e7\u00e3o Tradicionais:<\/h3>\n\n\n\n<p><strong>Email e Anexos<\/strong>: M\u00e9todo mais comum de distribui\u00e7\u00e3o, utilizando engenharia social para enganar usu\u00e1rios.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anexos maliciosos (execut\u00e1veis, documentos com macros)<\/li>\n\n\n\n<li>Links para sites comprometidos<\/li>\n\n\n\n<li>Phishing direcionado (spear phishing)<\/li>\n<\/ul>\n\n\n\n<p><strong>Downloads da Internet<\/strong>: Sites comprometidos ou maliciosos que hospedam malware.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Drive-by downloads (infec\u00e7\u00e3o autom\u00e1tica)<\/li>\n\n\n\n<li>Software pirateado infectado<\/li>\n\n\n\n<li>Atualiza\u00e7\u00f5es falsas<\/li>\n<\/ul>\n\n\n\n<p><strong>Dispositivos Remov\u00edveis<\/strong>: USB drives, CDs\/DVDs infectados.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Autorun malicioso<\/li>\n\n\n\n<li>Arquivos infectados compartilhados<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-vetores-modernos\">Vetores Modernos:<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Vetor<\/th><th>Descri\u00e7\u00e3o<\/th><th>Preven\u00e7\u00e3o<\/th><\/tr><\/thead><tbody><tr><td><strong>Exploit Kits<\/strong><\/td><td>Ferramentas que exploram vulnerabilidades automaticamente<\/td><td>Patches atualizados<\/td><\/tr><tr><td><strong>Supply Chain<\/strong><\/td><td>Comprometimento de software leg\u00edtimo<\/td><td>Verifica\u00e7\u00e3o de integridade<\/td><\/tr><tr><td><strong>Living off the Land<\/strong><\/td><td>Uso de ferramentas leg\u00edtimas para fins maliciosos<\/td><td>Monitoramento comportamental<\/td><\/tr><tr><td><strong>Fileless Malware<\/strong><\/td><td>Execu\u00e7\u00e3o em mem\u00f3ria sem arquivos no disco<\/td><td>An\u00e1lise de mem\u00f3ria<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tecnicas-de-engenharia-social\">T\u00e9cnicas de Engenharia Social:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pretexto<\/strong>: Cria\u00e7\u00e3o de cen\u00e1rio falso para ganhar confian\u00e7a<\/li>\n\n\n\n<li><strong>Autoridade<\/strong>: Fingir ser figura de autoridade<\/li>\n\n\n\n<li><strong>Urg\u00eancia<\/strong>: Criar sensa\u00e7\u00e3o de pressa para evitar an\u00e1lise<\/li>\n\n\n\n<li><strong>Curiosidade<\/strong>: Explorar interesse natural em t\u00f3picos sensacionais<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-5-tecnicas-de-deteccao-e-prevencao-contra-malwares\">5. T\u00e9cnicas de Detec\u00e7\u00e3o e Preven\u00e7\u00e3o contra Malwares<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-metodos-de-deteccao\">M\u00e9todos de Detec\u00e7\u00e3o:<\/h3>\n\n\n\n<p><strong>Detec\u00e7\u00e3o por Assinatura<\/strong>: Identifica malware atrav\u00e9s de padr\u00f5es conhecidos em seu c\u00f3digo.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vantagem: R\u00e1pida e precisa para amea\u00e7as conhecidas<\/li>\n\n\n\n<li>Desvantagem: Ineficaz contra malware novo ou modificado<\/li>\n<\/ul>\n\n\n\n<p><strong>Detec\u00e7\u00e3o Heur\u00edstica<\/strong>: Analisa comportamento suspeito em programas.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitora a\u00e7\u00f5es t\u00edpicas de malware<\/li>\n\n\n\n<li>Identifica amea\u00e7as zero-day<\/li>\n\n\n\n<li>Pode gerar falsos positivos<\/li>\n<\/ul>\n\n\n\n<p><strong>An\u00e1lise Comportamental<\/strong>: Observa padr\u00f5es de atividade do sistema.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detecta atividades an\u00f4malas<\/li>\n\n\n\n<li>Eficaz contra malware polim\u00f3rfico<\/li>\n\n\n\n<li>Requer aprendizado de padr\u00f5es normais<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>T\u00e9cnica<\/th><th>Efic\u00e1cia vs Malware Conhecido<\/th><th>Efic\u00e1cia vs Zero-Day<\/th><th>Falsos Positivos<\/th><\/tr><\/thead><tbody><tr><td><strong>Assinatura<\/strong><\/td><td>Alta<\/td><td>Baixa<\/td><td>Baixos<\/td><\/tr><tr><td><strong>Heur\u00edstica<\/strong><\/td><td>M\u00e9dia<\/td><td>Alta<\/td><td>M\u00e9dios<\/td><\/tr><tr><td><strong>Comportamental<\/strong><\/td><td>Alta<\/td><td>Alta<\/td><td>M\u00e9dios a Altos<\/td><\/tr><tr><td><strong>Sandbox<\/strong><\/td><td>Alta<\/td><td>Muito Alta<\/td><td>Baixos<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-estrategias-de-prevencao-contra-malwares\">Estrat\u00e9gias de Preven\u00e7\u00e3o contra Malwares:<\/h3>\n\n\n\n<p><strong>Camadas de Seguran\u00e7a (Defense in Depth)<\/strong>:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Firewall<\/strong>: Filtragem de tr\u00e1fego de rede<\/li>\n\n\n\n<li><strong>Antiv\u00edrus<\/strong>: Detec\u00e7\u00e3o de malware conhecido<\/li>\n\n\n\n<li><strong>IDS\/IPS<\/strong>: Detec\u00e7\u00e3o de intrus\u00f5es<\/li>\n\n\n\n<li><strong>Email Security<\/strong>: Filtragem de emails maliciosos<\/li>\n\n\n\n<li><strong>Web Filtering<\/strong>: Bloqueio de sites perigosos<\/li>\n\n\n\n<li><strong>Endpoint Protection<\/strong>: Prote\u00e7\u00e3o avan\u00e7ada de esta\u00e7\u00f5es<\/li>\n<\/ol>\n\n\n\n<p><strong>Pr\u00e1ticas de Seguran\u00e7a<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manter sistemas e software atualizados<\/li>\n\n\n\n<li>Princ\u00edpio do menor privil\u00e9gio<\/li>\n\n\n\n<li>Backup regular de dados importantes<\/li>\n\n\n\n<li>Educa\u00e7\u00e3o e treinamento de usu\u00e1rios<\/li>\n\n\n\n<li>Monitoramento cont\u00ednuo de rede<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-6-analise-forense-de-malwares\">6. An\u00e1lise Forense de Malwares<\/h2>\n\n\n\n<p>A an\u00e1lise forense de malware \u00e9 crucial para investiga\u00e7\u00f5es da Pol\u00edcia Federal, permitindo compreender como ataques ocorreram e identificar evid\u00eancias digitais.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tipos-de-analise-de-malwares\">Tipos de An\u00e1lise de Malwares:<\/h3>\n\n\n\n<p><strong>An\u00e1lise Est\u00e1tica<\/strong>: Exame do malware sem execut\u00e1-lo.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An\u00e1lise de c\u00f3digo<\/li>\n\n\n\n<li>Identifica\u00e7\u00e3o de strings e recursos<\/li>\n\n\n\n<li>An\u00e1lise de estrutura de arquivos<\/li>\n\n\n\n<li>Criptografia e ofusca\u00e7\u00e3o<\/li>\n<\/ul>\n\n\n\n<p><strong>An\u00e1lise Din\u00e2mica<\/strong>: Execu\u00e7\u00e3o controlada do malware em ambiente isolado.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comportamento em tempo real<\/li>\n\n\n\n<li>Comunica\u00e7\u00f5es de rede<\/li>\n\n\n\n<li>Modifica\u00e7\u00f5es no sistema<\/li>\n\n\n\n<li>Arquivos criados ou modificados<\/li>\n<\/ul>\n\n\n\n<p><strong>An\u00e1lise de Mem\u00f3ria<\/strong>: Exame da mem\u00f3ria RAM durante execu\u00e7\u00e3o.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Processos ocultos<\/li>\n\n\n\n<li>Conex\u00f5es de rede ativas<\/li>\n\n\n\n<li>Chaves de criptografia<\/li>\n\n\n\n<li>C\u00f3digo injetado<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ferramentas-forenses-para-analise-de-malwares\">Ferramentas Forenses para an\u00e1lise de malwares:<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Categoria<\/th><th>Ferramenta<\/th><th>Fun\u00e7\u00e3o Principal<\/th><\/tr><\/thead><tbody><tr><td><strong>An\u00e1lise Est\u00e1tica<\/strong><\/td><td>IDA Pro, Ghidra<\/td><td>Engenharia reversa<\/td><\/tr><tr><td><strong>Sandboxing<\/strong><\/td><td>Cuckoo, Joe Sandbox<\/td><td>Execu\u00e7\u00e3o controlada<\/td><\/tr><tr><td><strong>An\u00e1lise de Rede<\/strong><\/td><td>Wireshark, TCPDump<\/td><td>Tr\u00e1fego de rede<\/td><\/tr><tr><td><strong>Mem\u00f3ria<\/strong><\/td><td>Volatility, Rekall<\/td><td>An\u00e1lise de RAM<\/td><\/tr><tr><td><strong>Disassembly<\/strong><\/td><td>OllyDbg, x64dbg<\/td><td>Debug e an\u00e1lise<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-indicadores-de-comprometimento-iocs\">Indicadores de Comprometimento (IoCs):<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hashes de arquivos<\/strong>: MD5, SHA1, SHA256<\/li>\n\n\n\n<li><strong>Endere\u00e7os IP<\/strong>: Servidores C&amp;C maliciosos<\/li>\n\n\n\n<li><strong>Dom\u00ednios<\/strong>: URLs maliciosas<\/li>\n\n\n\n<li><strong>Chaves de registro<\/strong>: Modifica\u00e7\u00f5es suspeitas<\/li>\n\n\n\n<li><strong>Mutexes<\/strong>: Identificadores \u00fanicos do malware<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-7-aplicacoes-na-policia-federal\">7. Aplica\u00e7\u00f5es na Pol\u00edcia Federal<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-investigacoes-de-crimes-ciberneticos\">Investiga\u00e7\u00f5es de Crimes Cibern\u00e9ticos:<\/h3>\n\n\n\n<p><strong>An\u00e1lise de Sistemas Comprometidos<\/strong>: Quando sistemas s\u00e3o apreendidos durante opera\u00e7\u00f5es, a an\u00e1lise de malware pode revelar:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>M\u00e9todos utilizados pelos criminosos<\/li>\n\n\n\n<li>Dados acessados ou roubados<\/li>\n\n\n\n<li>Conex\u00f5es com outros sistemas ou criminosos<\/li>\n\n\n\n<li>Timeline das atividades maliciosas<\/li>\n<\/ul>\n\n\n\n<p><strong>Investiga\u00e7\u00e3o de Fraudes Banc\u00e1rias<\/strong>: Banking trojans s\u00e3o analisados para:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identificar contas banc\u00e1rias comprometidas<\/li>\n\n\n\n<li>Rastrear transfer\u00eancias fraudulentas<\/li>\n\n\n\n<li>Descobrir redes de cybercriminosos<\/li>\n\n\n\n<li>Prevenir futuros ataques similares<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cenarios-praticos-na-pf\">Cen\u00e1rios Pr\u00e1ticos na PF:<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Cen\u00e1rio<\/th><th>Tipo de Malware<\/th><th>An\u00e1lise Requerida<\/th><th>Evid\u00eancias Buscadas<\/th><\/tr><\/thead><tbody><tr><td><strong>Vazamento de Dados<\/strong><\/td><td>Spyware\/RAT<\/td><td>Est\u00e1tica e din\u00e2mica<\/td><td>Dados exfiltrados, destinos<\/td><\/tr><tr><td><strong>Sabotagem Industrial<\/strong><\/td><td>Wiper\/Destrutivo<\/td><td>Forense completa<\/td><td>M\u00e9todo de entrada, danos<\/td><\/tr><tr><td><strong>Extors\u00e3o Digital<\/strong><\/td><td>Ransomware<\/td><td>An\u00e1lise de criptografia<\/td><td>Chaves, comunica\u00e7\u00f5es C&amp;C<\/td><\/tr><tr><td><strong>Espionagem Corporativa<\/strong><\/td><td>Keylogger\/Spyware<\/td><td>An\u00e1lise de comunica\u00e7\u00f5es<\/td><td>Informa\u00e7\u00f5es coletadas<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-protecao-da-infraestrutura-pf\">Prote\u00e7\u00e3o da Infraestrutura PF:<\/h3>\n\n\n\n<p><strong>Monitoramento Proativo<\/strong>: Sistemas da PF s\u00e3o constantemente monitorados para detectar:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tentativas de infec\u00e7\u00e3o por malware<\/li>\n\n\n\n<li>Comunica\u00e7\u00f5es suspeitas com servidores externos<\/li>\n\n\n\n<li>Comportamentos an\u00f4malos em esta\u00e7\u00f5es de trabalho<\/li>\n\n\n\n<li>Tentativas de acesso n\u00e3o autorizado<\/li>\n<\/ul>\n\n\n\n<p><strong>Resposta a Incidentes<\/strong>: Quando malware \u00e9 detectado nos sistemas da PF:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Conten\u00e7\u00e3o<\/strong>: Isolamento dos sistemas afetados<\/li>\n\n\n\n<li><strong>An\u00e1lise<\/strong>: Determina\u00e7\u00e3o do escopo e impacto<\/li>\n\n\n\n<li><strong>Erradica\u00e7\u00e3o<\/strong>: Remo\u00e7\u00e3o completa do malware<\/li>\n\n\n\n<li><strong>Recupera\u00e7\u00e3o<\/strong>: Restaura\u00e7\u00e3o dos servi\u00e7os normais<\/li>\n\n\n\n<li><strong>Li\u00e7\u00f5es Aprendidas<\/strong>: Melhoria dos controles de seguran\u00e7a<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cooperacao-internacional\">Coopera\u00e7\u00e3o Internacional:<\/h3>\n\n\n\n<p><strong>Compartilhamento de IoCs<\/strong>: A PF participa de redes internacionais para:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Trocar indicadores de malware entre ag\u00eancias<\/li>\n\n\n\n<li>Colaborar em investiga\u00e7\u00f5es transnacionais<\/li>\n\n\n\n<li>Receber alertas sobre novas amea\u00e7as<\/li>\n\n\n\n<li>Contribuir com intelig\u00eancia sobre amea\u00e7as locais<\/li>\n<\/ul>\n\n\n\n<p><strong>Opera\u00e7\u00f5es Coordenadas<\/strong>: Colabora\u00e7\u00e3o em opera\u00e7\u00f5es como:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Derrubada de botnets internacionais<\/li>\n\n\n\n<li>Pris\u00e3o de desenvolvedores de malware<\/li>\n\n\n\n<li>Desarticula\u00e7\u00e3o de grupos cibercriminosos<\/li>\n\n\n\n<li>Investiga\u00e7\u00e3o de ataques a infraestruturas cr\u00edticas<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-treinamento-e-capacitacao\">Treinamento e Capacita\u00e7\u00e3o:<\/h3>\n\n\n\n<p>A PF mant\u00e9m programas cont\u00ednuos de capacita\u00e7\u00e3o em:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>An\u00e1lise de Malware<\/strong>: T\u00e9cnicas avan\u00e7adas de engenharia reversa<\/li>\n\n\n\n<li><strong>Threat Intelligence<\/strong>: Compreens\u00e3o do cen\u00e1rio de amea\u00e7as<\/li>\n\n\n\n<li><strong>Incident Response<\/strong>: Resposta r\u00e1pida e eficaz a incidentes<\/li>\n\n\n\n<li><strong>Digital Forensics<\/strong>: Coleta e an\u00e1lise de evid\u00eancias digitais<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tabela-resumo-dos-principais-tipos-de-malwares\">Tabela Resumo dos Principais Tipos de Malwares<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-malwares-por-metodo-de-propagacao\">Malwares por M\u00e9todo de Propaga\u00e7\u00e3o<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tipo<\/th><th>Propaga\u00e7\u00e3o<\/th><th>Hospedeiro<\/th><th>Auto-replicante<\/th><th>Detec\u00e7\u00e3o<\/th><\/tr><\/thead><tbody><tr><td><strong>V\u00edrus<\/strong><\/td><td>Via arquivo infectado<\/td><td>Necess\u00e1rio<\/td><td>Sim<\/td><td>Assinatura\/Heur\u00edstica<\/td><\/tr><tr><td><strong>Worm<\/strong><\/td><td>Rede\/vulnerabilidades<\/td><td>N\u00e3o necess\u00e1rio<\/td><td>Sim<\/td><td>Tr\u00e1fego an\u00f4malo<\/td><\/tr><tr><td><strong>Trojan<\/strong><\/td><td>A\u00e7\u00e3o do usu\u00e1rio<\/td><td>Disfar\u00e7ado<\/td><td>N\u00e3o<\/td><td>Comportamental<\/td><\/tr><tr><td><strong>Backdoor<\/strong><\/td><td>Instala\u00e7\u00e3o manual\/trojan<\/td><td>N\u00e3o necess\u00e1rio<\/td><td>N\u00e3o<\/td><td>An\u00e1lise de rede<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-malwares-por-objetivo-principal\">Malwares por Objetivo Principal<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tipo<\/th><th>Objetivo<\/th><th>Visibilidade<\/th><th>Persist\u00eancia<\/th><th>Dano T\u00edpico<\/th><\/tr><\/thead><tbody><tr><td><strong>Ransomware<\/strong><\/td><td>Extors\u00e3o financeira<\/td><td>Alta (ap\u00f3s ativa\u00e7\u00e3o)<\/td><td>Tempor\u00e1ria<\/td><td>Perda de acesso a dados<\/td><\/tr><tr><td><strong>Spyware<\/strong><\/td><td>Roubo de informa\u00e7\u00f5es<\/td><td>Baixa<\/td><td>Alta<\/td><td>Vazamento de dados<\/td><\/tr><tr><td><strong>Adware<\/strong><\/td><td>Receita publicit\u00e1ria<\/td><td>M\u00e9dia<\/td><td>M\u00e9dia<\/td><td>Degrada\u00e7\u00e3o de performance<\/td><\/tr><tr><td><strong>Rootkit<\/strong><\/td><td>Controle persistente<\/td><td>Muito baixa<\/td><td>Muito alta<\/td><td>Comprometimento total<\/td><\/tr><tr><td><strong>Keylogger<\/strong><\/td><td>Captura de credenciais<\/td><td>Baixa<\/td><td>Alta<\/td><td>Roubo de senhas<\/td><\/tr><tr><td><strong>Banking Trojan<\/strong><\/td><td>Fraude financeira<\/td><td>Baixa<\/td><td>Alta<\/td><td>Perdas financeiras<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-malwares-por-nivel-de-sofisticacao\">Malwares por N\u00edvel de Sofistica\u00e7\u00e3o<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Categoria<\/th><th>Exemplos<\/th><th>Complexidade<\/th><th>Detec\u00e7\u00e3o<\/th><th>Impacto<\/th><\/tr><\/thead><tbody><tr><td><strong>B\u00e1sico<\/strong><\/td><td>V\u00edrus simples, adware<\/td><td>Baixa<\/td><td>F\u00e1cil<\/td><td>Baixo a m\u00e9dio<\/td><\/tr><tr><td><strong>Intermedi\u00e1rio<\/strong><\/td><td>Trojans, spyware<\/td><td>M\u00e9dia<\/td><td>Moderada<\/td><td>M\u00e9dio<\/td><\/tr><tr><td><strong>Avan\u00e7ado<\/strong><\/td><td>APT, rootkits<\/td><td>Alta<\/td><td>Dif\u00edcil<\/td><td>Alto<\/td><\/tr><tr><td><strong>Estado-na\u00e7\u00e3o<\/strong><\/td><td>Stuxnet, Flame<\/td><td>Muito alta<\/td><td>Muito dif\u00edcil<\/td><td>Muito alto<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusao\">Conclus\u00e3o<\/h2>\n\n\n\n<p>Espero que tenham gostado do conte\u00fado e que este material seja \u00fatil em sua jornada rumo \u00e0 aprova\u00e7\u00e3o no concurso da Pol\u00edcia Federal. Compreender malware \u00e9 fundamental para investiga\u00e7\u00f5es cibern\u00e9ticas modernas e prote\u00e7\u00e3o de infraestruturas cr\u00edticas!<\/p>\n\n\n\n<p>Continue estudando com dedica\u00e7\u00e3o &#8211; sua aprova\u00e7\u00e3o est\u00e1 mais pr\u00f3xima do que voc\u00ea imagina!<\/p>\n\n\n\n<p>Sucesso nos estudos! <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"h-quer-saber-tudo-sobre-concursos-previstos-confira-nossos-artigos\">Quer saber tudo sobre concursos previstos?<br \/>Confira nossos artigos!<\/h2>\n\n\n\n<p class=\"has-text-align-center has-pale-cyan-blue-background-color has-background has-medium-font-size\"><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concursos-abertos\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concursos abertos<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center has-pale-cyan-blue-background-color has-background has-medium-font-size\"><a href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/concursos-2025\/#\" target=\"_blank\" rel=\"noreferrer noopener\">Concursos 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ol\u00e1, futuro policial federal! Hoje vamos explorar um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malwares. Este assunto \u00e9 essencial para compreender as amea\u00e7as digitais que enfrentamos diariamente. Para a Pol\u00edcia Federal, dominar conceitos de malware \u00e9 crucial para investiga\u00e7\u00f5es de crimes cibern\u00e9ticos, an\u00e1lise forense de sistemas comprometidos e prote\u00e7\u00e3o [&hellip;]<\/p>\n","protected":false},"author":2565,"featured_media":1594512,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"post_tipo":"article","footnotes":""},"categories":[1,220188,1988,220190],"tags":[222214,500,25,776],"tax_estado":[219963],"class_list":["post-1594174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cursos-e-concursos","category-policial-agente-penitenciario","category-policia","category-policial-peritos","tag-malwares","tag-policia-federal","tag-tecnologia-da-informacao","tag-ti","tax_estado-concursos-federais"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malwares: resumo para o concurso da PF<\/title>\n<meta name=\"description\" content=\"Este artigo aborda um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malwares: resumo para o concurso da PF\" \/>\n<meta property=\"og:description\" content=\"Este artigo aborda um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\" \/>\n<meta property=\"og:site_name\" content=\"Estrat\u00e9gia Concursos\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-21T17:35:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-975x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"975\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Antoniel da Silva Rego\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EstratConcursos\" \/>\n<meta name=\"twitter:site\" content=\"@EstratConcursos\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Antoniel da Silva Rego\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\"},\"author\":{\"name\":\"Antoniel da Silva Rego\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/65e75c615593894f0136e777b57e5d46\"},\"headline\":\"Malwares: resumo para o concurso da PF\",\"datePublished\":\"2025-07-21T17:35:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\"},\"wordCount\":2469,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png\",\"keywords\":[\"malwares\",\"Policia Federal\",\"Tecnologia da Informa\u00e7\u00e3o\",\"TI\"],\"articleSection\":[\"Concursos P\u00fablicos\",\"Policial (Agente Penitenci\u00e1rio)\",\"Policial (Agente, Escriv\u00e3o e Investigador)\",\"Policial (Peritos, Papiloscopistas)\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\",\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\",\"name\":\"Malwares: resumo para o concurso da PF\",\"isPartOf\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png\",\"datePublished\":\"2025-07-21T17:35:00+00:00\",\"description\":\"Este artigo aborda um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage\",\"url\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png\",\"contentUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png\",\"width\":1025,\"height\":1077,\"caption\":\"Malwares\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malwares: resumo para o concurso da PF\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website\",\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/\",\"name\":\"Estrat\u00e9gia Concursos\",\"description\":\"O blog da Estrat\u00e9gia Concursos traz not\u00edcias sobre concursos e artigos de professores oferecendo cursos para concursos (pdf + videaulas) no site.\",\"publisher\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization\",\"name\":\"Estrat\u00e9gia Concursos\",\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg\",\"contentUrl\":\"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg\",\"width\":230,\"height\":60,\"caption\":\"Estrat\u00e9gia Concursos\"},\"image\":{\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/EstratConcursos\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/65e75c615593894f0136e777b57e5d46\",\"name\":\"Antoniel da Silva Rego\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b8f680af1fe7f097d3f42a127f2b204823c881cf0f4a904ff915b5991017d762?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b8f680af1fe7f097d3f42a127f2b204823c881cf0f4a904ff915b5991017d762?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b8f680af1fe7f097d3f42a127f2b204823c881cf0f4a904ff915b5991017d762?s=96&d=mm&r=g\",\"caption\":\"Antoniel da Silva Rego\"},\"url\":\"https:\/\/www.estrategiaconcursos.com.br\/blog\/author\/tonnyelgmail-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malwares: resumo para o concurso da PF","description":"Este artigo aborda um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/","og_locale":"pt_BR","og_type":"article","og_title":"Malwares: resumo para o concurso da PF","og_description":"Este artigo aborda um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malware.","og_url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/","og_site_name":"Estrat\u00e9gia Concursos","article_published_time":"2025-07-21T17:35:00+00:00","og_image":[{"width":975,"height":1024,"url":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217-975x1024.png","type":"image\/png"}],"author":"Antoniel da Silva Rego","twitter_card":"summary_large_image","twitter_creator":"@EstratConcursos","twitter_site":"@EstratConcursos","twitter_misc":{"Escrito por":"Antoniel da Silva Rego","Est. tempo de leitura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#article","isPartOf":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/"},"author":{"name":"Antoniel da Silva Rego","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/65e75c615593894f0136e777b57e5d46"},"headline":"Malwares: resumo para o concurso da PF","datePublished":"2025-07-21T17:35:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/"},"wordCount":2469,"commentCount":0,"publisher":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization"},"image":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage"},"thumbnailUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png","keywords":["malwares","Policia Federal","Tecnologia da Informa\u00e7\u00e3o","TI"],"articleSection":["Concursos P\u00fablicos","Policial (Agente Penitenci\u00e1rio)","Policial (Agente, Escriv\u00e3o e Investigador)","Policial (Peritos, Papiloscopistas)"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/","url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/","name":"Malwares: resumo para o concurso da PF","isPartOf":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage"},"image":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage"},"thumbnailUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png","datePublished":"2025-07-21T17:35:00+00:00","description":"Este artigo aborda um tema fundamental que aparece constantemente em concursos p\u00fablicos da \u00e1rea de tecnologia: Malware.","breadcrumb":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#primaryimage","url":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png","contentUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/21210545\/image-217.png","width":1025,"height":1077,"caption":"Malwares"},{"@type":"BreadcrumbList","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/malwares-concurso-pf\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.estrategiaconcursos.com.br\/blog\/"},{"@type":"ListItem","position":2,"name":"Malwares: resumo para o concurso da PF"}]},{"@type":"WebSite","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#website","url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/","name":"Estrat\u00e9gia Concursos","description":"O blog da Estrat\u00e9gia Concursos traz not\u00edcias sobre concursos e artigos de professores oferecendo cursos para concursos (pdf + videaulas) no site.","publisher":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.estrategiaconcursos.com.br\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#organization","name":"Estrat\u00e9gia Concursos","url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg","contentUrl":"https:\/\/dhg1h5j42swfq.cloudfront.net\/2025\/06\/03203428\/logo_concursos-1.jpg","width":230,"height":60,"caption":"Estrat\u00e9gia Concursos"},"image":{"@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EstratConcursos"]},{"@type":"Person","@id":"https:\/\/www.estrategiaconcursos.com.br\/blog\/#\/schema\/person\/65e75c615593894f0136e777b57e5d46","name":"Antoniel da Silva Rego","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/b8f680af1fe7f097d3f42a127f2b204823c881cf0f4a904ff915b5991017d762?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8f680af1fe7f097d3f42a127f2b204823c881cf0f4a904ff915b5991017d762?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8f680af1fe7f097d3f42a127f2b204823c881cf0f4a904ff915b5991017d762?s=96&d=mm&r=g","caption":"Antoniel da Silva Rego"},"url":"https:\/\/www.estrategiaconcursos.com.br\/blog\/author\/tonnyelgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts\/1594174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/users\/2565"}],"replies":[{"embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/comments?post=1594174"}],"version-history":[{"count":6,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts\/1594174\/revisions"}],"predecessor-version":[{"id":1597934,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/posts\/1594174\/revisions\/1597934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/media\/1594512"}],"wp:attachment":[{"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/media?parent=1594174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/categories?post=1594174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/tags?post=1594174"},{"taxonomy":"tax_estado","embeddable":true,"href":"https:\/\/www.estrategiaconcursos.com.br\/blog\/wp-json\/wp\/v2\/tax_estado?post=1594174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}