{"id":5674,"date":"2025-07-23T22:09:03","date_gmt":"2025-07-24T01:09:03","guid":{"rendered":"https:\/\/cfpc-am.com.br\/?page_id=5674"},"modified":"2025-07-23T22:43:57","modified_gmt":"2025-07-24T01:43:57","slug":"hackers-estao-usando-o-dns-para-espalhar-virus-sem-ser-detectados","status":"publish","type":"page","link":"https:\/\/cfpc-am.com.br\/index.php\/hackers-estao-usando-o-dns-para-espalhar-virus-sem-ser-detectados\/","title":{"rendered":"Hackers est\u00e3o usando o DNS para espalhar v\u00edrus sem ser detectados."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5674\" class=\"elementor elementor-5674\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6fa9c80 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6fa9c80\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5f197be\" data-id=\"5f197be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee686ef elementor-widget elementor-widget-heading\" data-id=\"ee686ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h6 class=\"elementor-heading-title elementor-size-default\">Tecnologia<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fbbbedb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fbbbedb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bea95d5\" data-id=\"bea95d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01a06e9 elementor-widget elementor-widget-text-editor\" data-id=\"01a06e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p class=\"MsoNormal\"><span style=\"font-size: 18.0pt; line-height: 115%;\">Hackers est\u00e3o usando o DNS para espalhar v\u00edrus sem ser detectados.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61d3fd1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61d3fd1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7376346\" data-id=\"7376346\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee52c31 elementor-widget elementor-widget-text-editor\" data-id=\"ee52c31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Uma t\u00e9cnica quase invis\u00edvel aos olhos dos antiv\u00edrus est\u00e1 sendo usada por cibercriminosos para invadir computadores e redes pelo mundo. Entenda como o golpe funciona e o que voc\u00ea pode fazer para se proteger.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec6d202 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec6d202\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25519a4\" data-id=\"25519a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b83c680 elementor-widget elementor-widget-text-editor\" data-id=\"b83c680\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Por Ian Camilo<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5a87dcd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a87dcd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a96ff25\" data-id=\"a96ff25\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14bc899 elementor-widget elementor-widget-text-editor\" data-id=\"14bc899\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>O que est\u00e1 acontecendo?<\/p><p>Pesquisadores de seguran\u00e7a cibern\u00e9tica detectaram uma nova e melhorada forma de ataque hacker que utiliza o sistema DNS, conhecido para espalhar malwares de maneira silenciosa e eficaz. Ao inv\u00e9s de enviar o v\u00edrus diretamente por anexos de e-mail ou links maliciosos, os criminosos digitais est\u00e3o usando o tr\u00e1fego DNS para \u201cesconder\u201d os dados nocivos em partes fragmentadas, burlando at\u00e9 mesmo solu\u00e7\u00f5es de seguran\u00e7a do sistema dos computadores.<\/p><p>Essa t\u00e9cnica, chamada de &#8220;Tunneling via DNS&#8221;, permite que o malware se comunique com o servidor do hacker sem chamar aten\u00e7\u00e3o. Segundo o portal Canaltech, essa opera\u00e7\u00e3o foi detectada em ataques reais e representa um grande desafio para especialistas em ciberseguran\u00e7a, pois usa um canal leg\u00edtimo de comunica\u00e7\u00e3o da internet, o que dificulta o bloqueio autom\u00e1tico.<\/p><p>\u00a0<\/p><p>Por que esse tipo de ataque \u00e9 t\u00e3o perigoso?<\/p><p>A nova t\u00e9cnica usada por hackers para espalhar malwares via DNS representa uma amea\u00e7a silenciosa e altamente eficaz. O motivo \u00e9 simples, o DNS \u00e9 respons\u00e1vel por traduzir nomes de sites em endere\u00e7os IP \u00e9 utilizado pela maioria dos dispositivos conectados a internet. No entanto, justamente por ser um componente b\u00e1sico da base digital, ele costuma passar despercebido pelas ferramentas tradicionais de seguran\u00e7a.<\/p><p>Ao explorar esse ponto cego, os cibercriminosos conseguem infiltrar c\u00f3digos maliciosos em pacotes de dados aparentemente leg\u00edtimos, sem levantar suspeitas. O tr\u00e1fego DNS, por n\u00e3o ser rigidamente monitorado, permite que essas amea\u00e7as passem pelas defesas digitais sem serem detectadas. Isso faz com que o ataque possa atingir empresas, \u00f3rg\u00e3os p\u00fablicos e usu\u00e1rios comuns, sem deixar rastros vis\u00edveis.<\/p><p>Outro ponto preocupante \u00e9 que muitos antiv\u00edrus n\u00e3o conseguem identificar esse tipo de a\u00e7\u00e3o, j\u00e1 que o malware se esconde em canais que tempos atr\u00e1s n\u00e3o eram considerados t\u00e3o perigosos. O resultado \u00e9 um cen\u00e1rio em que sistemas s\u00e3o invadidos de forma invis\u00edvel, comprometendo dados, redes e informa\u00e7\u00f5es fr\u00e1geis antes mesmo que qualquer sinal de alerta seja disparado.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4608498 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4608498\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9847d3b\" data-id=\"9847d3b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3264f0a elementor-widget elementor-widget-image\" data-id=\"3264f0a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.3 - 28-12-2021 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cfpc-am.com.br\/index.php\/fotografia\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-1024x1024.jpeg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-1024x1024.jpeg 1024w, https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-300x300.jpeg 300w, https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-150x150.jpeg 150w, https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-768x768.jpeg 768w, https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-550x550.jpeg 550w, https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-1536x1536.jpeg 1536w, https:\/\/cfpc-am.com.br\/wp-content\/uploads\/2025\/07\/WhatsApp-Image-2025-07-23-at-22.37.01-2048x2048.jpeg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Foto: Ian Camilo<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tecnologia Hackers est\u00e3o usando o DNS para espalhar v\u00edrus sem ser detectados. Uma t\u00e9cnica quase invis\u00edvel aos olhos dos antiv\u00edrus est\u00e1 sendo usada por cibercriminosos para invadir computadores e redes pelo mundo. Entenda como o golpe funciona e o que voc\u00ea pode fazer para se proteger. Por Ian Camilo O que est\u00e1 acontecendo? Pesquisadores de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5674","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/pages\/5674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/comments?post=5674"}],"version-history":[{"count":7,"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/pages\/5674\/revisions"}],"predecessor-version":[{"id":5682,"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/pages\/5674\/revisions\/5682"}],"wp:attachment":[{"href":"https:\/\/cfpc-am.com.br\/index.php\/wp-json\/wp\/v2\/media?parent=5674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}