{"id":9283,"date":"2019-09-04T02:36:44","date_gmt":"2019-09-04T02:36:44","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9283"},"modified":"2026-04-17T18:07:52","modified_gmt":"2026-04-17T18:07:52","slug":"botnet-trend-report-12","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/botnet-trend-report-12\/","title":{"rendered":"Botnet Trend Report-12"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>4.3 XMRig: Cryptomining For Fun and Profit<\/strong><\/h2>\n<p>Cryptomining by botnets has gained popularity in the past two years. Unlike other common malicious activities like DDoS, ransomware attacks, and confidential information theft, cryptomining has some unique characteristics:<\/p>\n<p>1. Predictable earnings. Cryptominers are good at hiding their presence by controlling their CPU usage within 30%&acirc;&euro;&ldquo;40%. Based on the reference computing power obtained from open-source information6 , we calculate expected daily earnings of a bot as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9284\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"910\" height=\"151\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-1.jpg 910w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-1-300x50.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-1-768x127.jpg 768w\" sizes=\"(max-width: 910px) 100vw, 910px\" \/><\/a><\/p>\n<p>In the first quarter of 2018 the price of Monero was at a lifetime high of over USD $400\/XMR. Thus, each controlled host could bring in at its peak USD 73 cents\/day to an attacker.<\/p>\n<p>2. Concealed attacker information. A cryptominer when running, interacts only with a mining pool (a collection of cryptominers being operated as a group). An attacker can conceal his or her network information by using only public mining pools. In addition, owing to the anonymity of Monero, little information about the attacker can be obtained from wallets or transaction records. Therefore, in a cryptomining event, the defender typically knows only which hosts are mining cryptocurrency and the wallet addresses to which they are bound. This makes it extremely difficult to track cryptomining activities.<\/p>\n<p>For reference, we list the following cryptographic mechanisms that Monero uses to ensure full privacy and obscurity:<\/p>\n<p>a. Ring signature: a digital signature in which a group of possible signers are merged together to produce a unique signature for authorizing transactions. This makes the sender untraceable.<\/p>\n<p>b. Obfuscated receiving address: transactions can use stealth or one-time addresses to make the receiver untraceable.<\/p>\n<p>c. Ring confidential transactions: the transaction amounts are obfuscated to hide the amount of transactions.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9285\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"467\" height=\"414\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-2.jpg 467w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-2-300x266.jpg 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/><\/a><\/p>\n<p>Although there are a number of botnet families conducting cryptomining attacks, XMRig has its own communication mechanism separate from the botnet control mechanisms. By identifying and capturing these communications, defenders can detect cryptomining events and further determine their scale.<\/p>\n<p>Our analysis of cryptomining events in the past two years show that botnet families are, at first glance, irregular in the use of cryptominers.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9286\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"631\" height=\"462\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-3.jpg 631w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-3-300x220.jpg 300w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/a><\/p>\n<p>Deeper analysis shows that the trend of cryptomining events is directly related to the price of Monero. In the fourth quarter of 2017, the price of Monero reached a record high making cryptomining an extremely lucrative business. This led to a sudden influx of botnet groups switching to cryptomining. However, as the cryptocurrency price fell in the second half of 2018, a sharp drop of cryptomining events was also seen. In the fourth quarter of 2018, the number of cryptomining events rose a bit, which may be related with the explosive growth of Monero transactions in this quarter.<\/p>\n<p>For the prices and transaction volumes of Monero in the past two years, see the following figure from WorldCoinIndex7 .<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9287\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"568\" height=\"504\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-4.jpg 568w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0904-4-300x266.jpg 300w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><\/a><\/p>\n<p>While there is a significant increase in interest in blockchain technology, the cryptocurrency market has suffered a serious decline in the last year. Even if geopolitical events in the coming months may again contribute to a rise in the price of cryptocurrency, we think that the possibility of new cryptominer families emerging are very small. Despite that, considering the number of cryptomining events rising in the fourth quarter, we should still be on the lookout for such behavior. It would be prudent to add identifying cryptominer traffic to security monitoring and threat hunting processes. Once seen, analyses of their communications would help identify botnet families and the development of a mitigation strategy for blockin the attacks at the payload delivery and attack execution stages.<\/p>\n<p>To be continued.<\/p>\n<p>6&iuml;&frac34;&nbsp; https:\/\/github.com\/xmrig\/xmrig<\/p>\n<p>7&iuml;&frac34;&nbsp;https:\/\/www.worldcoinindex.com\/coin\/monero<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>4.3 XMRig: Cryptomining For Fun and Profit Cryptomining by botnets has gained popularity in the past two years. Unlike other common malicious activities like DDoS, ransomware attacks, and confidential information theft, cryptomining has some unique characteristics: 1. Predictable earnings. Cryptominers are good at hiding their presence by controlling their CPU usage within 30%&acirc;&euro;&ldquo;40%. Based on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8884,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[119],"class_list":["post-9283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-botnet-trend-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Botnet Trend Report-12 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Botnet Trend Report-12 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"4.3 XMRig: Cryptomining For Fun and Profit Cryptomining by botnets has gained popularity in the past two years. Unlike other common malicious activities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-04T02:36:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Botnet Trend Report-12 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"4.3 XMRig: Cryptomining For Fun and Profit Cryptomining by botnets has gained popularity in the past two years. Unlike other common malicious activities\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Botnet Trend Report-12\",\"datePublished\":\"2019-09-04T02:36:44+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/botnet.jpg\",\"keywords\":[\"Botnet Trend Report\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/\",\"name\":\"Botnet Trend Report-12 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/botnet.jpg\",\"datePublished\":\"2019-09-04T02:36:44+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/botnet.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/botnet.jpg\",\"width\":816,\"height\":555,\"caption\":\"Botnet Trend Report cover with green design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-12\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Botnet Trend Report-12\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Botnet Trend Report-12 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Botnet Trend Report-12 - NSFOCUS","og_description":"4.3 XMRig: Cryptomining For Fun and Profit Cryptomining by botnets has gained popularity in the past two years. Unlike other common malicious activities","og_url":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/","og_site_name":"NSFOCUS","article_published_time":"2019-09-04T02:36:44+00:00","article_modified_time":"2026-04-17T18:07:52+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Botnet Trend Report-12 - NSFOCUS","twitter_description":"4.3 XMRig: Cryptomining For Fun and Profit Cryptomining by botnets has gained popularity in the past two years. Unlike other common malicious activities","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Botnet Trend Report-12","datePublished":"2019-09-04T02:36:44+00:00","dateModified":"2026-04-17T18:07:52+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg","keywords":["Botnet Trend Report"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/","url":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/","name":"Botnet Trend Report-12 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg","datePublished":"2019-09-04T02:36:44+00:00","dateModified":"2026-04-17T18:07:52+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/botnet.jpg","width":816,"height":555,"caption":"Botnet Trend Report cover with green design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-12\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Botnet Trend Report-12"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9283"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9283\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8884"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}