{"id":1610,"date":"2015-12-21T14:38:29","date_gmt":"2015-12-21T14:38:29","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=1610"},"modified":"2015-12-21T14:38:29","modified_gmt":"2015-12-21T14:38:29","slug":"ddos-attacks-more-than-just-disruption","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/ddos-attacks-more-than-just-disruption\/","title":{"rendered":"DDoS attacks \u2013 more than just disruption?"},"content":{"rendered":"<p><strong>Track:\u00a0 General Security<\/strong><\/p>\n<p><strong><em>Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-1611\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175.jpg\" alt=\"DDoS attacks\" width=\"363\" height=\"212\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-1024x597.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-768x448.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-1536x896.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920.jpg 1920w\" sizes=\"(max-width: 363px) 100vw, 363px\" \/><\/a><\/p>\n<p>Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out.\u00a0 Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended users for some duration via either flood-type attacks or application-layer attacks (which are smaller, but just as effective) that overwhelm the target&#8217;s network or systems.<!--more-->But the result is basically the same: systems go down, resources are unavailable and the victim is scrambling to fix everything.\u00a0Recently, however, there has been a rise in DDoS attacks being used as smokescreens to cover up other criminal activity, such as theft of intellectual property, banking and financial records, stolen customer data or even vulnerability probes. The intent here is not to shut down a particular website, but to distract security teams long enough so that the real attack goes unnoticed \u2013 at least initially.<\/p>\n<p><strong>Divide and conquer<\/strong><\/p>\n<p>In November 2011, the <a href=\"http:\/\/www.fbi.gov\/denver\/press-releases\/2011\/fbi-denver-cyber-squad-advises-citizens-to-be-aware-of-a-new-phishing-campaign\">FBI warned<\/a> of one such attack type, which relies on the insertion of some form of malware. When the attacker is ready to activate the malware, a DDoS attack is launched to distract and occupy defenders, as was the case with the Zeus malware variant that targeted banking institutions. Considering most malware goes undetected for long periods of time, even a small DDoS attack should be a red flag that something else may be going on. One way to combat this is to have multiple teams responding to a DDoS attack \u2013 one to work on the DDoS defense itself and another (or multiple, depending on the company) that goes into hyper vigilance mode to look for evidence of other attacks. Even after the DDoS attack has ended, security teams should do a complete, methodical review of all systems to ensure no other breaches have taken place. The most successful security programs incorporate some form of data forensics to uncover threats and breaches that might otherwise go unnoticed. Doing this requires some preparation work to set up sensors that routinely grab data from sources beyond the core security and routing devices. Any irregularities in the data will indicate that something suspicious is going on outside the initial DDoS attack.<\/p>\n<p><strong>The recon team<\/strong><\/p>\n<p>Another trend is that the DDoS attack itself may be a bit more sinister. For example, a DDoS attack could be masking a simultaneous attack that is probing for vulnerabilities, such as a network flood masking a vulnerability scan.\u00a0 In fact, this scheme proved successful for a group of attackers that made off with nearly $1 million in stolen Bitcoins from a Denmark-based payment processor in a well publicized attack that took place in November of 2013 (Information week, Bitcoin Thefts Surge, DDoS Hackers Take Millions, 11\/15). In general, basic probing will likely be caught if the victim has even modest security protections, but that\u2019s not always the case. The best defense here is to have a purpose-built DDoS defensive service or appliance that keeps the bad traffic off of your core security systems.<\/p>\n<p><strong>Always be one step ahead<br \/>\n<\/strong><\/p>\n<p>In what was once a mere tool for taking down websites, DDoS attackers have found a new, useful application. Companies that have successfully thwarted attacks did so because they planned ahead and developed an action response plan, allocating resources to the proper channels and establishing it as a core part of the operations process. This not only allows security teams to act quickly to limit the time an attacker has to carry out their mission, but gives them the knowledge to better understand and stop the attack. Should a business find itself a victim of an attack, it\u2019s critical to keep an eye open for other potentially suspicious activity.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-1960\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-284x300.jpg\" alt=\"Vann\" width=\"151\" height=\"159\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-284x300.jpg 284w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-968x1024.jpg 968w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-768x812.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-1452x1536.jpg 1452w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/01\/Vann-1937x2048.jpg 1937w\" sizes=\"(max-width: 151px) 100vw, 151px\" \/><\/a><strong>Vann\u00a0Abernethy<\/strong> is the Field CTO for NSFOCUS. \u00a0He brings more than 20 years of Security and IT management experience working for a wide range of companies, from start-ups to the Fortune 500. Throughout his career, Abernethy has developed and deployed security, network and infrastructure management products and solutions; ranging from SMBs to government to some of the largest, industry-leading enterprises worldwide.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Track:\u00a0 General Security Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out.\u00a0 Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended users for some duration via [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35907,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[113,371,375,376,377,506,652],"class_list":["post-1610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-bitcoin","tag-ddos","tag-ddos-attacks","tag-ddos-defense","tag-ddos-protection","tag-malware","tag-smokescreens"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS attacks \u2013 more than just disruption? - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS attacks \u2013 more than just disruption? - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Track:\u00a0 General Security Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-21T14:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DDoS attacks \u2013 more than just disruption? - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Track:\u00a0 General Security Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"DDoS attacks \u2013 more than just disruption?\",\"datePublished\":\"2015-12-21T14:38:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/\"},\"wordCount\":694,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/cyber-crime-1012751_1920-300x175-1.jpg\",\"keywords\":[\"Bitcoin\",\"DDoS\",\"DDoS attacks\",\"DDoS defense\",\"DDoS protection\",\"malware\",\"smokescreens\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/\",\"name\":\"DDoS attacks \u2013 more than just disruption? - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/cyber-crime-1012751_1920-300x175-1.jpg\",\"datePublished\":\"2015-12-21T14:38:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/cyber-crime-1012751_1920-300x175-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/cyber-crime-1012751_1920-300x175-1.jpg\",\"width\":300,\"height\":175,\"caption\":\"Cybercrime text on binary code background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-attacks-more-than-just-disruption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS attacks \u2013 more than just disruption?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS attacks \u2013 more than just disruption? - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"DDoS attacks \u2013 more than just disruption? - NSFOCUS","og_description":"Track:\u00a0 General Security Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have","og_url":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/","og_site_name":"NSFOCUS","article_published_time":"2015-12-21T14:38:29+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"DDoS attacks \u2013 more than just disruption? - NSFOCUS","twitter_description":"Track:\u00a0 General Security Author: Vann Abernethy, Field\u00a0CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"DDoS attacks \u2013 more than just disruption?","datePublished":"2015-12-21T14:38:29+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/"},"wordCount":694,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg","keywords":["Bitcoin","DDoS","DDoS attacks","DDoS defense","DDoS protection","malware","smokescreens"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/","url":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/","name":"DDoS attacks \u2013 more than just disruption? - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg","datePublished":"2015-12-21T14:38:29+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/cyber-crime-1012751_1920-300x175-1.jpg","width":300,"height":175,"caption":"Cybercrime text on binary code background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/ddos-attacks-more-than-just-disruption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"DDoS attacks \u2013 more than just disruption?"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1610"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35907"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}