{"id":53745,"date":"2024-02-13T17:08:46","date_gmt":"2024-02-13T16:08:46","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=326226"},"modified":"2024-03-06T09:23:12","modified_gmt":"2024-03-06T13:23:12","slug":"microsoft-azure-enfrenta-a-maior-violacao-de-seguranca-de-sua-historia","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/br\/microsoft-azure-enfrenta-a-maior-violacao-de-seguranca-de-sua-historia\/","title":{"rendered":"Microsoft Azure enfrenta a maior viola\u00e7\u00e3o de seguran\u00e7a de sua hist\u00f3ria"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Centenas de contas do <strong>Azure<\/strong>, o servi\u00e7o de nuvem da <strong>Microsoft<\/strong>, teriam sido comprometidas em uma viola\u00e7\u00e3o de seguran\u00e7a que <strong>exposeu dados cr\u00edticos de seus usu\u00e1rios<\/strong>. O ataque cibern\u00e9tico, que afetou v\u00e1rios ambientes, teve como alvo altos executivos de grandes empresas.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2c07ee82-394d-11e7-804a-bc71dd8bf260\/3154456208\/microsoft-azure-logo\" alt=\"Microsoft Azure\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Microsoft Azure<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/microsoft-azure.softonic.com.br\/android\" target=\"_blank\" rel=\"noopener noreferrer\">Acessar<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/microsoft-azure.softonic.com.br\/android\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">De acordo com a empresa de seguran\u00e7a cibern\u00e9tica <strong><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/cloud-security\/community-alert-ongoing-malicious-campaign-impacting-azure-cloud-environments\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">Proofpoint<\/a><\/strong>, o hack utiliza a mesma campanha maliciosa detectada em novembro de 2023, que envolve m\u00e9todos de <strong>roubo de credenciais por meio de phishing<\/strong> e de tomada de controle de contas na nuvem (CTO). Isso permitiria que os atacantes obtivessem acesso ao <strong>OfficeHome<\/strong> e, ao mesmo tempo, aos aplicativos do <strong>Microsoft 365<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Os autores do hackeamento teriam usado <strong>servi\u00e7os de proxy para contornar as restri\u00e7\u00f5es geogr\u00e1ficas<\/strong> e mascarar sua verdadeira localiza\u00e7\u00e3o. Para realizar o ataque, os cibercriminosos <strong>incorporaram links nos documentos<\/strong> que redirecionavam os usu\u00e1rios para sites de phishing. Esses links costumavam ter como texto \u00e2ncora &#8216;Ver documento&#8217;, o que n\u00e3o levantava suspeitas.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/2\/2024\/02\/Phishing-130224-1024x575.jpg\" alt=\"\" class=\"wp-image-326231\" \/><\/figure>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">O ataque foi meticulosamente planejado e <strong>foi direcionado tanto a funcion\u00e1rios de n\u00edvel m\u00e9dio quanto superior<\/strong>, embora mais contas pertencentes aos primeiros tenham sido comprometidas. De acordo com a Proofpoint, cargos como diretores de vendas, diretores de contas, diretores financeiros, vice-presidentes de opera\u00e7\u00f5es, diretores financeiros, presidentes e CEO foram os alvos mais comuns. Isso permitiu que os invasores acessassem informa\u00e7\u00f5es por meio dos n\u00edveis e dom\u00ednios das organiza\u00e7\u00f5es.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Nesse tipo de ataque, uma vez que a conta \u00e9 comprometida, <strong>os cibercriminosos implantam seu pr\u00f3prio MFA<\/strong> (autentica\u00e7\u00e3o multifator) para prolongar o acesso, por exemplo, adicionando um n\u00famero de celular alternativo ou configurando um aplicativo de autentica\u00e7\u00e3o para que o usu\u00e1rio n\u00e3o consiga recuperar o acesso. Al\u00e9m disso, <strong>os atacantes eliminam todas as evid\u00eancias de atividade suspeita<\/strong> para apagar seus rastros.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2c07ee82-394d-11e7-804a-bc71dd8bf260\/3154456208\/microsoft-azure-logo\" alt=\"Microsoft Azure\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Microsoft Azure<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/microsoft-azure.softonic.com.br\/android\" target=\"_blank\" rel=\"noopener noreferrer\">Acessar<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/microsoft-azure.softonic.com.br\/android\" target=\"_blank\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">O objetivo desses ciberataques \u00e9 o roubo de dados e a pr\u00e1tica de fraudes financeiras. Embora ainda n\u00e3o haja evid\u00eancias claras para identificar os autores dos ataques, <strong>acredita-se que eles tenham se originado na R\u00fassia e na Nig\u00e9ria<\/strong>, com base no uso de provedores de internet de linha fixa locais dessas regi\u00f5es.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Centenas de contas do Azure, o servi\u00e7o de nuvem da Microsoft, teriam sido comprometidas em uma viola\u00e7\u00e3o de seguran\u00e7a que exposeu dados cr\u00edticos de seus usu\u00e1rios. O ataque cibern\u00e9tico, que afetou v\u00e1rios ambientes, teve como alvo altos executivos de grandes empresas. De acordo com a empresa de seguran\u00e7a cibern\u00e9tica Proofpoint, o hack utiliza a mesma &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/br\/microsoft-azure-enfrenta-a-maior-violacao-de-seguranca-de-sua-historia\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Microsoft Azure enfrenta a maior viola\u00e7\u00e3o de seguran\u00e7a de sua hist\u00f3ria&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9256,"featured_media":53746,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":2},"categories":[4082],"tags":[4445,4446,2994],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-53745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-app-subdomain-redirectionmicrosoft-azure","tag-azure","tag-microsoft-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/posts\/53745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/users\/9256"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/comments?post=53745"}],"version-history":[{"count":0,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/posts\/53745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/media\/53746"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/media?parent=53745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/categories?post=53745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/tags?post=53745"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/usertag?post=53745"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/vertical?post=53745"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/br\/wp-json\/wp\/v2\/content-category?post=53745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}