{"id":15192,"date":"2024-05-26T12:22:48","date_gmt":"2024-05-26T15:22:48","guid":{"rendered":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/"},"modified":"2024-05-26T12:22:48","modified_gmt":"2024-05-26T15:22:48","slug":"ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br","status":"publish","type":"post","link":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/","title":{"rendered":"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas &#8211; ipnews.com.br"},"content":{"rendered":"<p><span data-contrast=\"auto\">Os pesquisadores da Check Point Research (CPR) identificaram novas campanhas de phishing via e-mail, principal vetor em 86% de todos os ataques em 2022. Desta vez as campanhas de phishing utilizam as plataformas Google Ads e Google Collection. Os hackers est\u00e3o utilizando o Google Ads como uma forma de redirecionar os usu\u00e1rios para sites maliciosos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">A respeito deste ataque utilizando Google Ads, os pesquisadores da Check Point Software informam como os hackers est\u00e3o incluindo redirecionamentos de URL nos an\u00fancios do Google para levar os usu\u00e1rios finais a sites maliciosos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">Um e-mail de phishing com ataque via Google Ads come\u00e7a como uma representa\u00e7\u00e3o de um correio de voz da Microsoft. A expectativa do atacante \u00e9 que, ao ver uma mensagem de voz perdida, o usu\u00e1rio clique nela. Os usu\u00e1rios finais mais atentos, no entanto, ver\u00e3o que a URL em tal e-mail n\u00e3o tem nada relacionado \u00e0 Microsoft. H\u00e1 uma URL de an\u00fancios do Google, e \u00e9 aqui que o redirecionamento come\u00e7a no ataque.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">Ao verificar o c\u00f3digo-fonte da URL indicada, ela \u00e9 a base do servi\u00e7o de rastreamento e redirecionamento de cliques do Google Ads. Esses s\u00e3o os par\u00e2metros usados pelo Google Ads para fins de rastreamento e an\u00e1lise, bem como a URL de destino para onde o usu\u00e1rio ser\u00e1 redirecionado.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">Em vez de colocar uma URL comercial, o atacante coloca uma TinyURL (que \u00e9 um servi\u00e7o web que transforma links longos em links curtos e permitem um redirecionamento de p\u00e1ginas). \u00c9 para l\u00e1 que o usu\u00e1rio final ir\u00e1 e, neste caso, para um site malicioso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">Ao se aproveitarem da confian\u00e7a e da legitimidade de servi\u00e7os como o Google Ads, os atacantes est\u00e3o tendo sucesso em obter a URL pretendida ou a carga \u00fatil para os usu\u00e1rios. Nesse caso, ao inserir um redirecionamento de URL nos par\u00e2metros de um script do Google Ads, os hackers podem inserir o que desejam sem aviso pr\u00e9vio.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">No dia 5 de julho de 2023, a equipe de pesquisadores da Check Point Software entrou em contato com o Google para inform\u00e1-los sobre esse ataque envolvendo Google Ads.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">O Google Collection \u00e9 uma ferramenta que permite salvar links, imagens e v\u00eddeos e compartilh\u00e1-los com outras pessoas. Os hackers tamb\u00e9m est\u00e3o usando essa ferramenta para disseminar campanhas de phishing e aproveitando-se da legitimidade do Google para conseguirem ocultar links maliciosos em sites leg\u00edtimos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">Neste ataque com Google Collection, os hackers est\u00e3o utilizando as p\u00e1ginas do Google para enviar links para sites falsos de criptomoedas. O primeiro e-mail chega normalmente ao usu\u00e1rio por meio de uma notifica\u00e7\u00e3o diretamente do Google. Isso ocorre porque o hacker compartilhou a cole\u00e7\u00e3o com o usu\u00e1rio final. O e-mail vem de um endere\u00e7o leg\u00edtimo e seria reconhecido como tal por atacantes e usu\u00e1rios finais.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">As cole\u00e7\u00f5es do Google Collection funcionam com v\u00e1rias figuras semelhantes a cart\u00f5es. O usu\u00e1rio pode criar links para imagens, p\u00e1ginas da Web, entre outros, dentro dessa cole\u00e7\u00e3o. Clicar em um cart\u00e3o leva para uma p\u00e1gina que \u00e9 um formul\u00e1rio do Google. No entanto, no ataque, os hackers far\u00e3o com que isso redirecione para um site falso de criptomoeda, que eventualmente roubar\u00e1 dinheiro do usu\u00e1rio.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span data-contrast=\"auto\">Os pesquisadores da Check Point Software informam que na parte inferior da p\u00e1gina do Google h\u00e1 uma distin\u00e7\u00e3o importante escrita em ingl\u00eas, que pode ser traduzida como &#8220;Este conte\u00fado n\u00e3o foi criado nem endossado pelo Google&#8221;. Com isso, a empresa se omite da responsabilidade de conferir o conte\u00fado da p\u00e1gina.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/>&nbsp;<br \/><b><span data-contrast=\"none\">Participe das comunidades IPNews no<\/span><\/b> <a href=\"https:\/\/www.instagram.com\/ipnews_ci\/\"><b><span data-contrast=\"none\">Instagram<\/span><\/b><\/a><b><span data-contrast=\"none\">, <\/span><\/b><a href=\"https:\/\/www.facebook.com\/portalipnews\"><b><span data-contrast=\"none\">Facebook<\/span><\/b><\/a><b><span data-contrast=\"none\">, <\/span><\/b><a href=\"https:\/\/linkedin.com\/company\/portal-ipnews-cinterativa\"><b><span data-contrast=\"none\">LinkedIn<\/span><\/b><\/a><b><span data-contrast=\"none\"> e <\/span><\/b><a href=\"https:\/\/twitter.com\/portalipnews\"><b><span data-contrast=\"none\">Twitter<\/span><\/b><\/a><b><span data-contrast=\"none\">.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><br \/><span id=\"email-notes\">O seu endere\u00e7o de e-mail n\u00e3o ser\u00e1 publicado.<\/span> <span class=\"required-field-message\">Campos obrigat\u00f3rios s\u00e3o marcados com <span class=\"required\">*<\/span><\/span><br \/><label for=\"comment\">Coment\u00e1rio <span class=\"required\">*<\/span><\/label> <textarea id=\"comment\" name=\"comment\" cols=\"45\" rows=\"8\" maxlength=\"65525\" required=\"required\"><\/textarea><br \/><label for=\"author\">Nome <span class=\"required\">*<\/span><\/label> <input id=\"author\" name=\"author\" type=\"text\" value=\"\" size=\"30\" maxlength=\"245\" autocomplete=\"name\" required=\"required\" \/><br \/><label for=\"email\">E-mail <span class=\"required\">*<\/span><\/label> <input id=\"email\" name=\"email\" type=\"text\" value=\"\" size=\"30\" maxlength=\"100\" aria-describedby=\"email-notes\" autocomplete=\"email\" required=\"required\" \/><br \/><label for=\"url\">Site<\/label> <input id=\"url\" name=\"url\" type=\"text\" value=\"\" size=\"30\" maxlength=\"200\" autocomplete=\"url\" \/><br \/><input name=\"submit\" type=\"submit\" id=\"submit\" class=\"submit\" value=\"Publicar coment\u00e1rio\" \/> <input type='hidden' name='comment_post_ID' value='119584' id='comment_post_ID' \/> <input type='hidden' name='comment_parent' id='comment_parent' value='0' \/> <br \/><img decoding=\"async\"   alt=\"\" width=\"300\" height=\"73\" data-srcset=\"https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-300x73.png 300w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-150x37.png 150w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-260x63.png 260w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-50x12.png 50w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1.png 460w\"  data-src=\"https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-300x73.png\" data-sizes=\"(max-width: 300px) 100vw, 300px\" class=\"alignnone size-medium wp-image-113356 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" \/><noscript><img decoding=\"async\" class=\"alignnone size-medium wp-image-113356\" src=\"https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-300x73.png\" alt=\"\" width=\"300\" height=\"73\" srcset=\"https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-300x73.png 300w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-150x37.png 150w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-260x63.png 260w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-50x12.png 50w, https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1.png 460w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/noscript><br \/> O Portal IPNews \u00e9 uma publica\u00e7\u00e3o da Comunica\u00e7\u00e3o Interativa, e refer\u00eancia em conte\u00fado jornal\u00edstico para os sistemas de Comunica\u00e7\u00e3o Convergente. O canal \u00e9 focado no segmento de servi\u00e7os de voz baseados em IP (VoIP), um padr\u00e3o de mercado para os pr\u00f3ximos anos.<\/p>\n<p><label> Seu nome<br \/>     <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input type=\"text\" name=\"your-name\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" \/><\/span> <\/label><br \/><label> Seu e-mail<br \/>     <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input type=\"email\" name=\"your-email\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" \/><\/span> <\/label><br \/><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-112\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-112\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">Ao continuar, voc\u00ea aceita a pol\u00edtica de privacidade<\/span><\/label><\/span><\/span><\/span><br \/><input type=\"submit\" value=\"Se Inscrever\" class=\"wpcf7-form-control has-spinner wpcf7-submit\" \/><\/p>\n<p><a href=\"https:\/\/news.google.com\/rss\/articles\/CBMiXGh0dHBzOi8vaXBuZXdzLmNvbS5ici9hdGFxdWVzLWRlLXBoaXNoaW5nLWVzdGFvLXVzYW5kby1nb29nbGUtYWRzLXBhcmEtcmVkaXJlY2lvbmFyLXZpdGltYXMv0gEA?oc=5\">source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os pesquisadores da Check Point Research (CPR) identificaram novas campanhas de phishing via e-mail, principal vetor em 86% de todos os ataques em 2022. Desta vez as campanhas de phishing utilizam as plataformas Google Ads e Google Collection. Os hackers est\u00e3o utilizando o Google Ads como uma forma de redirecionar os usu\u00e1rios para sites maliciosos.\u00a0A&#8230;<\/p>\n","protected":false},"author":1,"featured_media":15193,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[36],"class_list":["post-15192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-marketing","tag-marketing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.1 (Yoast SEO v22.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas - ipnews.com.br - 4tuneagencia.digital<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas - ipnews.com.br\" \/>\n<meta property=\"og:description\" content=\"Os pesquisadores da Check Point Research (CPR) identificaram novas campanhas de phishing via e-mail, principal vetor em 86% de todos os ataques em 2022. Desta vez as campanhas de phishing utilizam as plataformas Google Ads e Google Collection. Os hackers est\u00e3o utilizando o Google Ads como uma forma de redirecionar os usu\u00e1rios para sites maliciosos.\u00a0A...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\" \/>\n<meta property=\"og:site_name\" content=\"4tuneagencia.digital\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-26T15:22:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-300x73.png\" \/>\n<meta name=\"author\" content=\"4tune\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"4tune\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\"},\"author\":{\"name\":\"4tune\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100\"},\"headline\":\"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas &#8211; ipnews.com.br\",\"datePublished\":\"2024-05-26T15:22:48+00:00\",\"dateModified\":\"2024-05-26T15:22:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\"},\"wordCount\":725,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png\",\"keywords\":[\"Marketing\"],\"articleSection\":[\"Marketing\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\",\"name\":\"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas - ipnews.com.br - 4tuneagencia.digital\",\"isPartOf\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png\",\"datePublished\":\"2024-05-26T15:22:48+00:00\",\"dateModified\":\"2024-05-26T15:22:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png\",\"contentUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/4tuneagencia.digital\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas &#8211; ipnews.com.br\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#website\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/\",\"name\":\"4tuneagencia.digital\",\"description\":\"Marketing e Web Designer \",\"publisher\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/4tuneagencia.digital\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\",\"name\":\"4tuneagencia.digital\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png\",\"contentUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png\",\"width\":250,\"height\":250,\"caption\":\"4tuneagencia.digital\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100\",\"name\":\"4tune\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g\",\"caption\":\"4tune\"},\"sameAs\":[\"http:\/\/4tuneagencia.digital\"],\"url\":\"https:\/\/4tuneagencia.digital\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas - ipnews.com.br - 4tuneagencia.digital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/","og_locale":"pt_BR","og_type":"article","og_title":"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas - ipnews.com.br","og_description":"Os pesquisadores da Check Point Research (CPR) identificaram novas campanhas de phishing via e-mail, principal vetor em 86% de todos os ataques em 2022. Desta vez as campanhas de phishing utilizam as plataformas Google Ads e Google Collection. Os hackers est\u00e3o utilizando o Google Ads como uma forma de redirecionar os usu\u00e1rios para sites maliciosos.\u00a0A...","og_url":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/","og_site_name":"4tuneagencia.digital","article_published_time":"2024-05-26T15:22:48+00:00","og_image":[{"url":"https:\/\/ipnews.com.br\/wp-content\/uploads\/2023\/01\/mobile-mini1-300x73.png"}],"author":"4tune","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"4tune","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#article","isPartOf":{"@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/"},"author":{"name":"4tune","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100"},"headline":"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas &#8211; ipnews.com.br","datePublished":"2024-05-26T15:22:48+00:00","dateModified":"2024-05-26T15:22:48+00:00","mainEntityOfPage":{"@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/"},"wordCount":725,"commentCount":0,"publisher":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#organization"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage"},"thumbnailUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png","keywords":["Marketing"],"articleSection":["Marketing"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/","url":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/","name":"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas - ipnews.com.br - 4tuneagencia.digital","isPartOf":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage"},"thumbnailUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png","datePublished":"2024-05-26T15:22:48+00:00","dateModified":"2024-05-26T15:22:48+00:00","breadcrumb":{"@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#primaryimage","url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png","contentUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/4tuneagencia.digital\/blog\/ataques-de-phishing-estao-usando-google-ads-para-redirecionar-vitimas-ipnews-com-br\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/4tuneagencia.digital\/blog\/"},{"@type":"ListItem","position":2,"name":"Ataques de phishing est\u00e3o usando Google Ads para redirecionar v\u00edtimas &#8211; ipnews.com.br"}]},{"@type":"WebSite","@id":"https:\/\/4tuneagencia.digital\/blog\/#website","url":"https:\/\/4tuneagencia.digital\/blog\/","name":"4tuneagencia.digital","description":"Marketing e Web Designer ","publisher":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4tuneagencia.digital\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/4tuneagencia.digital\/blog\/#organization","name":"4tuneagencia.digital","url":"https:\/\/4tuneagencia.digital\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png","contentUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png","width":250,"height":250,"caption":"4tuneagencia.digital"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100","name":"4tune","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g","caption":"4tune"},"sameAs":["http:\/\/4tuneagencia.digital"],"url":"https:\/\/4tuneagencia.digital\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2024\/05\/wp-header-logo-291.png","_links":{"self":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts\/15192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/comments?post=15192"}],"version-history":[{"count":0,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts\/15192\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/media\/15193"}],"wp:attachment":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/media?parent=15192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/categories?post=15192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/tags?post=15192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}