{"id":64267,"date":"2025-02-20T17:09:24","date_gmt":"2025-02-20T16:09:24","guid":{"rendered":"https:\/\/blog.mailfence.com\/o-que-e-pretexting\/"},"modified":"2025-09-16T15:58:18","modified_gmt":"2025-09-16T13:58:18","slug":"o-que-e-pretexting","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/","title":{"rendered":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco?"},"content":{"rendered":"\n<p>Imagine receber uma liga\u00e7\u00e3o do departamento de fraudes do seu banco, alertando sobre uma atividade suspeita em sua conta. A pessoa que liga sabe seu nome completo, endere\u00e7o e transa\u00e7\u00f5es recentes, fazendo a amea\u00e7a parecer real.<\/p>\n\n\n\n<p><strong>Mas e se esse representante de confian\u00e7a for, na verdade, um golpista empregando uma t\u00e1tica enganosa conhecida como pretexting?<\/strong><\/p>\n\n\n\n<p>Neste guia, exploramos o pretexting, uma forma sofisticada de <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-engenharia-social\/\">engenharia social<\/a> em que criminosos criam cen\u00e1rios falsos para manipular pessoas a divulgar informa\u00e7\u00f5es confidenciais. Abordaremos:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>O que \u00e9 pretexting;<\/li>\n\n\n\n<li>Exemplos reais de ataques e suas consequ\u00eancias;<\/li>\n\n\n\n<li>Como identificar e evitar ser v\u00edtima desses golpes.<\/li>\n<\/ul>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100849\" class=\"elementor elementor-100849 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Sua su\u00edte de produtividade segura<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere sua privacidade com<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensagens<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calend\u00e1rios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/pt\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crie sua conta gratuita no Mailfence<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-o-que-e-pretexting\">O que \u00e9 Pretexting?<\/h2>\n\n\n\n<p>Pretexting \u00e9 uma forma de <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">ataque de phishing<\/a> que se baseia em um &#8220;pretexto&#8221;, ou seja, um cen\u00e1rio fabricado.<\/p>\n\n\n\n<p>Se voc\u00ea ainda n\u00e3o conhece o conceito de phishing, recomendamos ler este <a href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-phishing\/\">artigo sobre o tema<\/a>. Muitas das ideias discutidas l\u00e1 tamb\u00e9m se aplicam ao pretexting. Voc\u00ea tamb\u00e9m pode conferir este artigo que explica <a href=\"https:\/\/blog.mailfence.com\/pt\/spam-vs-phishing-qual-e-a-diferenca\/\" target=\"_blank\" rel=\"noreferrer noopener\">a diferen\u00e7a entre spam e phishing<\/a>.<\/p>\n\n\n\n<p>Os ataques de engenharia social e phishing em geral dependem de um ou v\u00e1rios dos seguintes componentes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Confian\u00e7a:<\/strong> Os criminosos se passam por entidades confi\u00e1veis, como bancos ou ag\u00eancias governamentais, usando logotipos, tom de voz e at\u00e9 endere\u00e7os de e-mail semelhantes aos originais <a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/scams-and-safety\/common-frauds-and-scams\/spoofing-and-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">(um m\u00e9todo chamado spoofing<\/a>). <br><\/li>\n\n\n\n<li><strong>Conformidade<\/strong>: Como seres humanos, tendemos a obedecer a figuras de autoridade. Ao se fazerem passar por funcion\u00e1rios de alto escal\u00e3o ou empresas importantes, os golpistas conseguem que as v\u00edtimas revelem informa\u00e7\u00f5es confidenciais. <br><\/li>\n\n\n\n<li><strong>Urg\u00eancia e medo<\/strong>: As pessoas agem de forma irracional quando s\u00e3o tomadas por uma sensa\u00e7\u00e3o de p\u00e2nico. Os invasores se aproveitam dessas emo\u00e7\u00f5es usando alertas falsos de cart\u00e3o de cr\u00e9dito, avisos de exclus\u00e3o de conta etc. <br><\/li>\n<\/ul>\n\n\n\n<p><strong>Os ataques de pretexto dependem de todos esses tr\u00eas elementos.<\/strong><\/p>\n\n\n\n<p>Vamos explorar isso mais a fundo com um exemplo hipot\u00e9tico.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-como-o-pretexto-se-baseia-em-confianca-conformidade-e-urgencia\">Como o pretexto se baseia em confian\u00e7a, conformidade e urg\u00eancia<\/h3>\n\n\n\n<p>Imagine receber um e-mail urgente do departamento de TI da sua empresa, alertando sobre uma viola\u00e7\u00e3o de seguran\u00e7a recente.<\/p>\n\n\n\n<p><strong>A mensagem pede que voc\u00ea redefina sua senha imediatamente para proteger dados confidenciais.<\/strong><\/p>\n\n\n\n<p>O e-mail tamb\u00e9m inclui um link para uma p\u00e1gina de redefini\u00e7\u00e3o de senha que parece id\u00eantica ao site da empresa. S\u00f3 mais tarde voc\u00ea descobre que acabou de enviar suas credenciais para hackers, e que nunca houve uma viola\u00e7\u00e3o de seguran\u00e7a.<\/p>\n\n\n\n<p>Vamos dissecar a anatomia desse ataque de pretexting:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>O pretexto<\/strong>: A empresa sofreu uma viola\u00e7\u00e3o de seguran\u00e7a, e voc\u00ea precisa atualizar sua senha.<br><\/li>\n\n\n\n<li><strong>Confian\u00e7a<\/strong>: O e-mail parece vir do departamento de TI, e o site de redefini\u00e7\u00e3o de senha \u00e9 uma c\u00f3pia fiel do original.<br><\/li>\n\n\n\n<li><strong>Conformidade<\/strong>: O tom autorit\u00e1rio do e-mail faz com que voc\u00ea siga as instru\u00e7\u00f5es sem questionar.<br><\/li>\n\n\n\n<li><strong>Urg\u00eancia e medo<\/strong>: Palavras como &#8220;viola\u00e7\u00e3o recente&#8221;, &#8220;a\u00e7\u00e3o imediata&#8221; e &#8220;urgente&#8221; criam press\u00e3o para agir rapidamente.<\/li>\n<\/ul>\n\n\n\n<p>Em outros cen\u00e1rios, o pretexto pode ser muito mais simples. Um golpista pode ligar dizendo ser do seu <a href=\"https:\/\/pt.wikipedia.org\/wiki\/Fornecedor_de_acesso_%C3%A0_internet\">provedor de internet<\/a> e pedir seus dados de login para &#8220;aumentar a velocidade da conex\u00e3o&#8221;, por exemplo. Esses ataques tamb\u00e9m podem ocorrer no mundo f\u00edsico, o que os aproxima <a href=\"https:\/\/blog.mailfence.com\/pt\/engenharia-social-o-que-e-tailgating\/\" target=\"_blank\" rel=\"noreferrer noopener\">dos ataques de tailgating<\/a>.<\/p>\n\n\n\n<p><strong>Por exemplo, um indiv\u00edduo pode fingir ser um entregador. Em seguida, ele convence o recepcionista a conceder acesso a uma \u00e1rea segura para entregar um pacote. <\/strong><\/p>\n\n\n\n<p>Os melhores ataques de pretextingo se baseiam em confian\u00e7a, conformidade e urg\u00eancia para criar seu pretexto. \u00c9 por isso que identific\u00e1-los \u00e9 fundamental para que voc\u00ea n\u00e3o seja v\u00edtima de tais ataques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-exemplos-reais-de-ataques-de-pretexto\">Exemplos reais de ataques de pretexto<\/h2>\n\n\n\n<p>Vamos examinar agora v\u00e1rios casos de ataques de pretexting de alto n\u00edvel e o que podemos aprender com eles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-o-ataque-do-grupo-lapsus-a-microsoft-e-a-nvidia\">O ataque do Grupo Lapsus$ \u00e0 Microsoft e \u00e0 Nvidia<\/h3>\n\n\n\n<p>Em 2022, o grupo criminoso cibern\u00e9tico Lapsus$ executou uma s\u00e9rie de ataques de pretexto de alto n\u00edvel contra grandes empresas de tecnologia, incluindo a Microsoft e a NVIDIA.<\/p>\n\n\n\n<p><strong>Os invasores se faziam passar por pessoas da empresa e usavam credenciais roubadas para obter acesso n\u00e3o autorizado a dados confidenciais.<\/strong><\/p>\n\n\n\n<p>Sua abordagem geralmente envolvia a manipula\u00e7\u00e3o de funcion\u00e1rios por meio de engenharia social para contornar os protocolos de seguran\u00e7a. Por exemplo, os invasores se faziam passar por pessoal interno de suporte de TI, entrando em contato com os funcion\u00e1rios sob o pretexto de realizar verifica\u00e7\u00f5es de seguran\u00e7a de rotina ou resolver problemas t\u00e9cnicos. <\/p>\n\n\n\n<p>O mesmo grupo tamb\u00e9m foi respons\u00e1vel por um ataque \u00e0 Otka, a empresa de gerenciamento de identidade digital, bem como \u00e0 Nvidia.<\/p>\n\n\n\n<p>Para saber mais sobre esse ataque, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/22\/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction\/\" target=\"_blank\" rel=\"noreferrer noopener\">consulte a entrada do blog da Microsoft aqui<\/a>.<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/03\/22\/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-violacao-de-dados-da-mgm-resorts-international\">Viola\u00e7\u00e3o de dados da MGM Resorts International<\/h3>\n\n\n\n<p>Em setembro de 2023, a cadeia de hot\u00e9is MGM Resorts International sofreu uma viola\u00e7\u00e3o de dados iniciada por um sofisticado ataque de pretexto.<\/p>\n\n\n\n<p><strong>Os invasores se fizeram passar por funcion\u00e1rios da empresa e entraram em contato com o help desk de TI da MGM, convencendo a equipe a fornecer acesso \u00e0 rede.<\/strong><\/p>\n\n\n\n<p>Ao se passarem por funcion\u00e1rios confi\u00e1veis e criarem um senso de legitimidade, os invasores enganavam os funcion\u00e1rios para que concedessem a eles acesso a sistemas confidenciais. Foram adquiridos dados confidenciais, como nomes de clientes, n\u00fameros de telefone, endere\u00e7os de e-mail, n\u00fameros de carteira de motorista e outros.   <\/p>\n\n\n\n<p>Voc\u00ea pode encontrar mais informa\u00e7\u00f5es sobre <a href=\"https:\/\/investors.mgmresorts.com\/investors\/news-releases\/press-release-details\/2023\/MGM-RESORTS-UPDATE-ON-RECENT-CYBERSECURITY-ISSUE\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">esse ataque de pretexto no comunicado \u00e0 imprensa da MGM<\/a>.<a href=\"https:\/\/investors.mgmresorts.com\/investors\/news-releases\/press-release-details\/2023\/MGM-RESORTS-UPDATE-ON-RECENT-CYBERSECURITY-ISSUE\/default.aspx?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ataque-cibernetico-de-pretexto\">Ataque cibern\u00e9tico de pretexto<\/h3>\n\n\n\n<p>Em agosto de 2023, <a href=\"https:\/\/retool.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">a empresa de software Retool<\/a> sofreu um ataque cibern\u00e9tico iniciado por um esquema de phishing por SMS <a href=\"https:\/\/blog.mailfence.com\/pt\/engenharia-social-smishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">(tamb\u00e9m conhecido como smishing<\/a>).<\/p>\n\n\n\n<p><strong>Os atacantes se fizeram passar por membros da equipe de TI e criaram um cen\u00e1rio cr\u00edvel, convencendo os funcion\u00e1rios a clicar em links maliciosos.<\/strong><\/p>\n\n\n\n<p>Os links supostamente estavam relacionados a algum tipo de problema na folha de pagamento. Tudo o que os invasores precisavam era que uma pessoa ca\u00edsse no pretexto de obter acesso aos sistemas internos da empresa.   <\/p>\n\n\n\n<p>No final, os invasores conseguiram assumir o controle de 27 contas de clientes, com <a href=\"https:\/\/www.securityweek.com\/google-feature-blamed-for-retool-breach-that-led-to-cryptocurrency-firm-hacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">um cliente perdendo US$ 15 milh\u00f5es em criptomoedas.<\/a><a href=\"https:\/\/sosafe-awareness.com\/glossary\/pretexting\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ataques-de-pretexting-como-evita-los\">Ataques de pretexting: Como evit\u00e1-los?<\/h2>\n\n\n\n<p>A detec\u00e7\u00e3o e a preven\u00e7\u00e3o de ataques de pretexting s\u00e3o obtidas principalmente por meio de treinamento e conscientiza\u00e7\u00e3o.<\/p>\n\n\n\n<p>Aqui est\u00e3o algumas das etapas que voc\u00ea deve seguir sempre que suspeitar de um e-mail ou chamada:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Nunca forne\u00e7a informa\u00e7\u00f5es confidenciais por e-mail ou por telefone, especialmente informa\u00e7\u00f5es financeiras.<br><\/li>\n\n\n\n<li>Sempre preste aten\u00e7\u00e3o ao endere\u00e7o de e-mail do remetente. Ele pode imitar uma empresa leg\u00edtima com apenas alguns caracteres alterados ou omitidos. <br><\/li>\n\n\n\n<li>Nunca abra um anexo suspeito, pois esse \u00e9 um mecanismo de entrega padr\u00e3o para malware.<br><\/li>\n\n\n\n<li>Passe o mouse sobre os links para verificar o destino real. Verifique se h\u00e1 erros de ortografia no URL, o que pode ser uma indica\u00e7\u00e3o de um site falsificado. <br><\/li>\n\n\n\n<li>Nunca aja por medo ou urg\u00eancia. Reserve um tempo para avaliar a situa\u00e7\u00e3o e entre em contato com o remetente pelos meios habituais (site oficial, n\u00famero de telefone etc.) <\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusao\">Conclus\u00e3o<\/h2>\n\n\n\n<p>Agora que voc\u00ea sabe o que \u00e9 pretexting, como ele funciona e como evit\u00e1-lo, est\u00e1 mais preparado para se proteger contra esse tipo de golpe.<\/p>\n\n\n\n<p><strong>Lembre-se: nunca confie em mensagens n\u00e3o solicitadas, seja de bancos, empregadores ou at\u00e9 amigos, especialmente se inclu\u00edrem links ou pedidos de informa\u00e7\u00f5es sens\u00edveis.<\/strong><\/p>\n\n\n\n<p>Para refor\u00e7ar sua seguran\u00e7a cibern\u00e9tica, considere usar um provedor de e-mail seguro, como o <a href=\"https:\/\/mailfence.com\/\">Mailfence<\/a>, que oferece:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ferramentas de seguran\u00e7a avan\u00e7adas<\/strong>: <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-e-mail-ponta-a-ponta-como-funciona\/\" target=\"_blank\" rel=\"noreferrer noopener\">criptografia de ponta a ponta<\/a>, <a href=\"https:\/\/blog.mailfence.com\/pt\/criptografia-simetrica\/\" target=\"_blank\" rel=\"noreferrer noopener\">criptografia sim\u00e9trica<\/a>, <a href=\"https:\/\/blog.mailfence.com\/pt\/emails-assinados-digitalmente\/\" target=\"_blank\" rel=\"noreferrer noopener\">assinaturas digitais<\/a> e muito mais.<\/li>\n\n\n\n<li><strong>Sem rastreamento ou publicidade.<\/strong>  N\u00e3o usamos nenhum rastreador de publicidade ou marketing de terceiros. N\u00e3o rastreamos sua atividade no aplicativo. O Mailfence \u00e9 totalmente livre de an\u00fancios.  <\/li>\n\n\n\n<li><strong>Leis de privacidade r\u00edgidas.<\/strong>  Os servidores do Mailfence est\u00e3o localizados na B\u00e9lgica, onde h\u00e1 leis rigorosas de prote\u00e7\u00e3o \u00e0 privacidade. Somente uma ordem judicial belga v\u00e1lida pode nos obrigar a liberar dados. <\/li>\n<\/ul>\n\n\n\n<p>Voc\u00ea tem interesse em levar sua privacidade e seguran\u00e7a cibern\u00e9tica para o pr\u00f3ximo n\u00edvel? Crie sua conta gratuita hoje mesmo! <\/p>\n\n\n\n<p>Voc\u00ea quer se aprofundar no mundo dos ataques de pretexting? Confira <a href=\"https:\/\/www.verizon.com\/business\/resources\/T13a\/reports\/2023-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">este extenso relat\u00f3rio da Verizon<\/a> sobre o estado das viola\u00e7\u00f5es de dados no mundo, suas fontes e consequ\u00eancias.<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100849\" class=\"elementor elementor-100849 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Sua su\u00edte de produtividade segura<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere sua privacidade com<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensagens<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calend\u00e1rios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/pt\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crie sua conta gratuita no Mailfence<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>O pretexting \u00e9 uma forma de engenharia social cujo objetivo \u00e9 criar uma bom pretexto, ou situa\u00e7\u00e3o inventada, para convencer a v\u00edtima a fornecer informa\u00e7\u00f5es pessoais. A seguir, explicamos o que \u00e9 pretexting e detalhamos as melhores formas de prevenir este tipo de ataque de engenharia social.<\/p>\n","protected":false},"author":43,"featured_media":85575,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1379],"tags":[],"class_list":["post-64267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-de-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog<\/title>\n<meta name=\"description\" content=\"O que \u00e9 um ataque de pretexting? \u00c9 uma forma de engenharia social em que invasores se criam um bom pretexto para atingir a v\u00edtima.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-20T16:09:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T13:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Simon Haven\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mailfence\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Haven\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\"},\"author\":{\"name\":\"Simon Haven\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f\"},\"headline\":\"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco?\",\"datePublished\":\"2025-02-20T16:09:24+00:00\",\"dateModified\":\"2025-09-16T13:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\"},\"wordCount\":1445,\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png\",\"articleSection\":[\"Seguran\u00e7a de e-mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\",\"name\":\"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png\",\"datePublished\":\"2025-02-20T16:09:24+00:00\",\"dateModified\":\"2025-09-16T13:58:18+00:00\",\"description\":\"O que \u00e9 um ataque de pretexting? \u00c9 uma forma de engenharia social em que invasores se criam um bom pretexto para atingir a v\u00edtima.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png\",\"width\":600,\"height\":600,\"caption\":\"pretexting social engineering scam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\/\/blog.mailfence.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a de e-mail\",\"item\":\"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#website\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/mailfence\/\",\"https:\/\/x.com\/mailfence\",\"https:\/\/www.reddit.com\/r\/Mailfence\/\",\"https:\/\/www.linkedin.com\/company\/mailfence\",\"https:\/\/www.instagram.com\/mailfence_\/\",\"https:\/\/www.youtube.com\/@mailfence\",\"https:\/\/en.wikipedia.org\/wiki\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f\",\"name\":\"Simon Haven\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"caption\":\"Simon Haven\"},\"description\":\"Simon crafts informative and engaging content that empowers users to take control of their online privacy. His areas of expertise include SEO, content creation and social media management.\",\"url\":\"https:\/\/blog.mailfence.com\/pt\/author\/simon\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog","description":"O que \u00e9 um ataque de pretexting? \u00c9 uma forma de engenharia social em que invasores se criam um bom pretexto para atingir a v\u00edtima.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/","og_locale":"pt_BR","og_type":"article","og_title":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog","og_description":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2025-02-20T16:09:24+00:00","article_modified_time":"2025-09-16T13:58:18+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png","type":"image\/png"}],"author":"Simon Haven","twitter_card":"summary_large_image","twitter_creator":"@mailfence","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Simon Haven","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/"},"author":{"name":"Simon Haven","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f"},"headline":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco?","datePublished":"2025-02-20T16:09:24+00:00","dateModified":"2025-09-16T13:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/"},"wordCount":1445,"publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png","articleSection":["Seguran\u00e7a de e-mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/","url":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/","name":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco? | Mailfence Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png","datePublished":"2025-02-20T16:09:24+00:00","dateModified":"2025-09-16T13:58:18+00:00","description":"O que \u00e9 um ataque de pretexting? \u00c9 uma forma de engenharia social em que invasores se criam um bom pretexto para atingir a v\u00edtima.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2020\/12\/44.png","width":600,"height":600,"caption":"pretexting social engineering scam"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/pt\/o-que-e-pretexting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a de e-mail","item":"https:\/\/blog.mailfence.com\/pt\/category\/seguranca-de-email\/"},{"@type":"ListItem","position":3,"name":"Golpes de pretexting: Suas informa\u00e7\u00f5es pessoais est\u00e3o em risco?"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/pt\/#website","url":"https:\/\/blog.mailfence.com\/pt\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/pt\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/pt\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f","name":"Simon Haven","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","caption":"Simon Haven"},"description":"Simon crafts informative and engaging content that empowers users to take control of their online privacy. His areas of expertise include SEO, content creation and social media management.","url":"https:\/\/blog.mailfence.com\/pt\/author\/simon\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/comments?post=64267"}],"version-history":[{"count":5,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64267\/revisions"}],"predecessor-version":[{"id":103098,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/posts\/64267\/revisions\/103098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media\/85575"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/media?parent=64267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/categories?post=64267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/pt\/wp-json\/wp\/v2\/tags?post=64267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}