{"id":26780,"date":"2024-08-01T14:17:29","date_gmt":"2024-08-01T14:17:29","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=26780"},"modified":"2024-09-23T14:32:15","modified_gmt":"2024-09-23T14:32:15","slug":"infostealers-prevention-and-protection-against-information-theft","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/","title":{"rendered":"Infostealers: Prevention and Protection against Information Theft"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/graciela-martinez\">Graciela Mart\u00ednez<\/a><\/p>\n\n\n\n<p>As part of our ongoing efforts to raise awareness among users and organizations in the region about Internet vulnerabilities and promote best cybersecurity practices, today we will be sharing information about infostealers. We have observed a rise in this type of cybersecurity threat, so we believe it is essential to alert and prepare the technical community.<\/p>\n\n\n\n<p>Infostealers are one of the cyberthreats that can cause us the most damage, as they have the ability to steal our system access credentials, i.e., the username and password associated with an account.<\/p>\n\n\n\n<p><strong>What is an infostealer?<\/strong> Infostealers are a type of malware designed to collect access credentials for the purpose of exfiltrating sensitive information.<\/p>\n\n\n\n<p>Their main goal is to gather access credentials to various systems, for example, those automatically saved in browsers, banking and financial information, personal identification numbers, and others. They can also collect information from web browsers, email clients, and other applications.<\/p>\n\n\n\n<p><strong>How do they work?<\/strong> Infostealers are spread through various means, primarily through phishing email messages (the most common method), malicious attachments, infected websites, software vulnerabilities, or pirated software, regardless of whether the device has active antivirus protection.<\/p>\n\n\n\n<p>The stolen credentials are often sold on black markets or on social networks frequented by cybercriminals.<\/p>\n\n\n\n<p><strong>Top infostealers. <\/strong>According to the <a href=\"https:\/\/csirt.lacnic.net\/en\">LACNIC CSIRT<\/a> observatory, RedLine, Raccoon, and Lumma are the leading infostealer families in our region. In fact, RedLine accounts for almost 50% of all incidents.<\/p>\n\n\n\n<p>The three malware families use various techniques to collect data from infected computers in order to steal access credentials and later sell them on the black market. The following image shows their distribution.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"657\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/fig1-distribucion-de-malware-por-tipo-1024x657.png\" alt=\"\" class=\"wp-image-26776\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/fig1-distribucion-de-malware-por-tipo-1024x657.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/fig1-distribucion-de-malware-por-tipo-300x193.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/fig1-distribucion-de-malware-por-tipo-514x330.png 514w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/fig1-distribucion-de-malware-por-tipo-768x493.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/fig1-distribucion-de-malware-por-tipo.png 1302w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It should be noted that \u201cOther\u201d includes 14.6% of generic stealers, which are developed to steal a wide variety of data.<\/p>\n\n\n\n<p><strong>Protecting our information.<\/strong> Our most important asset is information, whether personal or that of our organization. This is why we must protect it and why it is important to practice safe online behavior. We must pay attention while browsing and ensure that all actors \u2014including developers, professionals, and users\u2014 consider Internet security a shared responsibility.<\/p>\n\n\n\n<p><strong>Recommendations<\/strong><strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid practices that can put our equipment, devices, and data, especially our passwords, at risk.<\/li>\n\n\n\n<li>Pay attention before opening an email or downloading an attachment. Phishing techniques are designed to convince users to open, click on, and download malicious emails.<\/li>\n\n\n\n<li>Educate users about phishing and other social engineering tactics.<\/li>\n\n\n\n<li>Use strong and robust passwords; avoid saving them in your browsers.<\/li>\n\n\n\n<li>Use two-factor authentication whenever possible. A password combined with multi-factor authentication creates a double layer of protection.<\/li>\n\n\n\n<li>If the system is infected by malware, try to isolate the infected device(s).<\/li>\n\n\n\n<li>Once the problem is detected, it is necessary to address it and protect any of the organization&#8217;s environments that might have been compromised.<\/li>\n\n\n\n<li>Be careful and report if you detect or suspect that access credentials have been compromised. In addition to changing your password at the slightest suspicion, those potentially affected should immediately report to their organization&#8217;s CSIRT or, if unavailable, to their IT department.<\/li>\n<\/ul>\n\n\n\n<p>Our <a href=\"https:\/\/csirt.lacnic.net\/en\">CSIRT<\/a> is available to report security incidents and threats involving infostealers and is ready to coordinate as necessary to mitigate them. We even have a <a href=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-plan_gestion_incidentes_seguridad-en.pdf\">plan<\/a> for organizations to develop enhancements for their critical infrastructure.<\/p>\n\n\n\n<p>Additionally, we offer training services for professionals through the <a href=\"https:\/\/campus.lacnic.net\/en\/\">LACNIC Campus<\/a>, including specific courses on security and incident management.<\/p>\n\n\n\n<p>Our final recommendation for organizations is to implement access credential monitoring systems and indicators of compromise (IoC), implement two-factor authentication, and have a response plan in place for potential security breaches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Graciela Mart\u00ednez As part of our ongoing efforts to raise awareness among users and organizations in the region about Internet vulnerabilities and promote best cybersecurity practices, today we will be sharing information about infostealers. We have observed a rise in this type of cybersecurity threat, so we believe it is essential to alert and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":26773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1242],"tipo_autor":[],"class_list":["post-26780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-graciela-martinez-en"],"acf":{"author":" Graciela Mart\u00ednez","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Infostealers: Prevention and Protection against Information Theft<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Infostealers: Prevention and Protection against Information Theft\" \/>\n<meta property=\"og:description\" content=\"By Graciela Mart\u00ednez As part of our ongoing efforts to raise awareness among users and organizations in the region about Internet vulnerabilities and promote best cybersecurity practices, today we will be sharing information about infostealers. We have observed a rise in this type of cybersecurity threat, so we believe it is essential to alert and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-01T14:17:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-23T14:32:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Infostealers: Prevention and Protection against Information Theft\",\"datePublished\":\"2024-08-01T14:17:29+00:00\",\"dateModified\":\"2024-09-23T14:32:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\"},\"wordCount\":596,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\",\"name\":\"LACNIC Blog | Infostealers: Prevention and Protection against Information Theft\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png\",\"datePublished\":\"2024-08-01T14:17:29+00:00\",\"dateModified\":\"2024-09-23T14:32:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infostealers: Prevention and Protection against Information Theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Infostealers: Prevention and Protection against Information Theft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Infostealers: Prevention and Protection against Information Theft","og_description":"By Graciela Mart\u00ednez As part of our ongoing efforts to raise awareness among users and organizations in the region about Internet vulnerabilities and promote best cybersecurity practices, today we will be sharing information about infostealers. We have observed a rise in this type of cybersecurity threat, so we believe it is essential to alert and [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-08-01T14:17:29+00:00","article_modified_time":"2024-09-23T14:32:15+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Infostealers: Prevention and Protection against Information Theft","datePublished":"2024-08-01T14:17:29+00:00","dateModified":"2024-09-23T14:32:15+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/"},"wordCount":596,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/","url":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/","name":"LACNIC Blog | Infostealers: Prevention and Protection against Information Theft","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png","datePublished":"2024-08-01T14:17:29+00:00","dateModified":"2024-09-23T14:32:15+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/infostealers-prevention-and-protection-against-information-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Infostealers: Prevention and Protection against Information Theft"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/08\/ciberseguridad-robo-informacion-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":26770,"post_title":"Info-Stealers: prevenci\u00f3n y protecci\u00f3n contra el robo de informaci\u00f3n","slug":"info-stealers-prevencion-y-proteccion-contra-el-robo-de-informacion","href":"https:\/\/blog.lacnic.net\/info-stealers-prevencion-y-proteccion-contra-el-robo-de-informacion\/"},{"locale":"pt_BR","id":26784,"post_title":"Info-Stealers: preven\u00e7\u00e3o e prote\u00e7\u00e3o contra roubo de informa\u00e7\u00f5es","slug":"info-stealers-prevencao-e-protecao-contra-roubo-de-informacoes","href":"https:\/\/blog.lacnic.net\/pt-br\/info-stealers-prevencao-e-protecao-contra-roubo-de-informacoes\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=26780"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26780\/revisions"}],"predecessor-version":[{"id":27268,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26780\/revisions\/27268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/26773"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=26780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=26780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=26780"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=26780"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=26780"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=26780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}