{"id":14474,"date":"2017-11-04T12:25:07","date_gmt":"2017-11-04T12:25:07","guid":{"rendered":"https:\/\/blogs.funiber.org\/pt\/?p=14474"},"modified":"2017-11-07T12:30:00","modified_gmt":"2017-11-07T12:30:00","slug":"funiber-malware-arquivo","status":"publish","type":"post","link":"https:\/\/www.funiber.blog\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo","title":{"rendered":"A amea\u00e7a invis\u00edvel dos malware sem arquivo"},"content":{"rendered":"<h2>Os malwares sem arquivo s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles<\/h2>\n<p>A amea\u00e7a dos malwares sem arquivo, ou fileless malware, est\u00e1 cada vez mais presente na rede. Neste sentido, um estudo realizado pela empresa de ciberseguran\u00e7a <a href=\"https:\/\/www.carbonblack.com\/\" target=\"_blank\" rel=\"noopener\">Carbonblack<\/a> revelou que os hackers escolhem eles pela dificuldade que existem em os rastrear.<!--more--><\/p>\n<p>Por sua vez, a empresa de ciberseguran\u00e7a <a href=\"https:\/\/www.pandasecurity.com\" target=\"_blank\" rel=\"noopener\">Panda<\/a> alertou que \u201cos sistemas de prote\u00e7\u00e3o tradicionais n\u00e3o s\u00e3o capazes de os detectar. Isto torna que eles sejam muito mais dif\u00edceis de se defender deles, j\u00e1 que este tipo de infec\u00e7\u00f5es s\u00e3o muito mais resilientes e dif\u00edceis de controlar\u201d.<\/p>\n<p>Por sua vez, <a href=\"https:\/\/es.linkedin.com\/in\/asiermr\" target=\"_blank\" rel=\"noopener\">Asier Mart\u00ednez<\/a>, analista de ciberseguran\u00e7a do <a href=\"https:\/\/www.certsi.es\/\" target=\"_blank\" rel=\"noopener\">CERTSI<\/a>, explicou que \u201ceste tipo de malware permanece residente unicamente na mem\u00f3ria e, como seu pr\u00f3prio nome indica, n\u00e3o no disco\u201d. Isto o diferencia dos programas maliciosos tradicionais, que, ao ser executado, criam arquivos que podem ser detectados pelos antiv\u00edrus.<\/p>\n<p>Assim, os malware sem arquivos s\u00e3o executados na mem\u00f3ria. Por isso, desaparecem ap\u00f3s reiniciar o computador. Entretanto, danificam o equipamento antes de se dissipar, como relatou a Panda.<\/p>\n<p>Mart\u00ednez destacou que n\u00e3o apenas atuam no Windows, mas tamb\u00e9m existem vers\u00f5es para o Linux e para o MAC. Do mesmo modo, o analista alertou sobre o grande n\u00famero de fam\u00edlias de malware desta classe existente.<\/p>\n<p>No <a href=\"http:\/\/www.funiber.org.br\/mestrado-em-direcao-estrategica-em-engenharia-de-software\" target=\"_blank\" rel=\"noopener\">Mestrado em Dire\u00e7\u00e3o Estrat\u00e9gica em Engenharia de Software <\/a>patrocinado pela <a href=\"http:\/\/www.funiber.org.br\" target=\"_blank\" rel=\"noopener\">FUNIBER<\/a>, os alunos recebem conhecimento sobre os perigos da Internet e adquirem as compet\u00eancias necess\u00e1rias para enfrentar e dar solu\u00e7\u00f5es efetivas aos problemas que podem aparecer.<\/p>\n<p>Fontes: <a href=\"https:\/\/www.certsi.es\/blog\/veni-vidi-vici-malware-fichero\" target=\"_blank\" rel=\"noopener\">VENI, VIDI, VICI: Malware sin fichero<\/a><\/p>\n<p><a href=\"https:\/\/www.pandasecurity.com\/spain\/mediacenter\/seguridad\/malware-sin-fichero\/\" target=\"_blank\" rel=\"noopener\">Malware sin fichero, \u00bfuna amenaza indetectable?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os malwares sem arquivo s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles A amea\u00e7a dos malwares sem arquivo, ou fileless malware, est\u00e1 cada vez mais presente na rede. Neste sentido, um estudo realizado [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":14475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[6],"tags":[3134,1242,1496,228,3137,855,285,408,119,248,911,3135,2795,671,641,255,3136,26,51,2642],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A amea\u00e7a invis\u00edvel dos malware sem arquivo<\/title>\n<meta name=\"description\" content=\"Os malwares sem arquivos s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A amea\u00e7a invis\u00edvel dos malware sem arquivo\" \/>\n<meta property=\"og:description\" content=\"Os malwares sem arquivos s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo\" \/>\n<meta property=\"og:site_name\" content=\"FuniBlogs - FUNIBER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/funiber\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-04T12:25:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-07T12:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2017\/11\/funiber-malware-arquivo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:site\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo\"},\"author\":{\"name\":\"Michelle\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\"},\"headline\":\"A amea\u00e7a invis\u00edvel dos malware sem arquivo\",\"datePublished\":\"2017-11-04T12:25:07+00:00\",\"dateModified\":\"2017-11-07T12:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo\"},\"wordCount\":329,\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"keywords\":[\"arquivo\",\"Bolsas\",\"Computador\",\"Cuidados\",\"disco duro\",\"Doutorado\",\"Educa\u00e7\u00e3o\",\"Educa\u00e7\u00e3o a Dist\u00e2ncia\",\"Estudos\",\"Funiber\",\"FUNIBER Opini\u00f5es\",\"maliciosos\",\"malware\",\"mestrado\",\"Opini\u00e3o FUNIBER\",\"Opini\u00f5es Funiber\",\"programas\",\"tecnologia\",\"TI\",\"v\u00edrus\"],\"articleSection\":[\"Tecnologias TIC\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo\",\"name\":\"A amea\u00e7a invis\u00edvel dos malware sem arquivo\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\"},\"datePublished\":\"2017-11-04T12:25:07+00:00\",\"dateModified\":\"2017-11-07T12:30:00+00:00\",\"description\":\"Os malwares sem arquivos s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/blogs.funiber.org\/pt\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A amea\u00e7a invis\u00edvel dos malware sem arquivo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"name\":\"FuniBlogs - FUNIBER\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\",\"name\":\"FuniBlogs - FUNIBER\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"contentUrl\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"width\":1,\"height\":1,\"caption\":\"FuniBlogs - FUNIBER\"},\"image\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/funiber\",\"https:\/\/twitter.com\/FUNIBER\",\"https:\/\/www.instagram.com\/funiber_becas\",\"https:\/\/www.youtube.com\/user\/funiber\",\"https:\/\/www.linkedin.com\/company\/funiber\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\",\"name\":\"Michelle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"caption\":\"Michelle\"},\"url\":\"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A amea\u00e7a invis\u00edvel dos malware sem arquivo","description":"Os malwares sem arquivos s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"pt_BR","og_type":"article","og_title":"A amea\u00e7a invis\u00edvel dos malware sem arquivo","og_description":"Os malwares sem arquivos s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles","og_url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo","og_site_name":"FuniBlogs - FUNIBER","article_publisher":"https:\/\/www.facebook.com\/funiber","article_published_time":"2017-11-04T12:25:07+00:00","article_modified_time":"2017-11-07T12:30:00+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2017\/11\/funiber-malware-arquivo.jpg","type":"image\/jpeg"}],"author":"Michelle","twitter_card":"summary_large_image","twitter_creator":"@FUNIBER","twitter_site":"@FUNIBER","twitter_misc":{"Escrito por":"Michelle","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo#article","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo"},"author":{"name":"Michelle","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d"},"headline":"A amea\u00e7a invis\u00edvel dos malware sem arquivo","datePublished":"2017-11-04T12:25:07+00:00","dateModified":"2017-11-07T12:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo"},"wordCount":329,"publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"keywords":["arquivo","Bolsas","Computador","Cuidados","disco duro","Doutorado","Educa\u00e7\u00e3o","Educa\u00e7\u00e3o a Dist\u00e2ncia","Estudos","Funiber","FUNIBER Opini\u00f5es","maliciosos","malware","mestrado","Opini\u00e3o FUNIBER","Opini\u00f5es Funiber","programas","tecnologia","TI","v\u00edrus"],"articleSection":["Tecnologias TIC"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo","url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo","name":"A amea\u00e7a invis\u00edvel dos malware sem arquivo","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/#website"},"datePublished":"2017-11-04T12:25:07+00:00","dateModified":"2017-11-07T12:30:00+00:00","description":"Os malwares sem arquivos s\u00e3o programas maliciosos que s\u00e3o executados a partir da mem\u00f3ria do computador e n\u00e3o deixam rastros no disco r\u00edgido. Por isso, os antiv\u00edrus mais simples s\u00e3o incapazes de detectar eles","breadcrumb":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2017\/11\/04\/funiber-malware-arquivo#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/blogs.funiber.org\/pt"},{"@type":"ListItem","position":2,"name":"A amea\u00e7a invis\u00edvel dos malware sem arquivo"}]},{"@type":"WebSite","@id":"https:\/\/blogs.funiber.org\/pt\/#website","url":"https:\/\/blogs.funiber.org\/pt\/","name":"FuniBlogs - FUNIBER","description":"","publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blogs.funiber.org\/pt\/#organization","name":"FuniBlogs - FUNIBER","url":"https:\/\/blogs.funiber.org\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","contentUrl":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","width":1,"height":1,"caption":"FuniBlogs - FUNIBER"},"image":{"@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/funiber","https:\/\/twitter.com\/FUNIBER","https:\/\/www.instagram.com\/funiber_becas","https:\/\/www.youtube.com\/user\/funiber","https:\/\/www.linkedin.com\/company\/funiber"]},{"@type":"Person","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d","name":"Michelle","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","caption":"Michelle"},"url":"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira"}]}},"jetpack_featured_media_url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2017\/11\/funiber-malware-arquivo.jpg","jetpack_shortlink":"https:\/\/wp.me\/p7ee1t-3Ls","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/14474"}],"collection":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/comments?post=14474"}],"version-history":[{"count":1,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/14474\/revisions"}],"predecessor-version":[{"id":14476,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/14474\/revisions\/14476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media\/14475"}],"wp:attachment":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media?parent=14474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/categories?post=14474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/tags?post=14474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}