{"id":223196,"date":"2025-10-21T07:50:14","date_gmt":"2025-10-21T14:50:14","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=223196"},"modified":"2025-10-21T07:56:57","modified_gmt":"2025-10-21T14:56:57","slug":"hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/","title":{"rendered":"Hackers induzem funcion\u00e1rios a expor dados da Salesforce &#8211; saiba se voc\u00ea est\u00e1 seguro"},"content":{"rendered":"<p><span data-contrast=\"auto\">Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar milh\u00f5es de registros de clientes.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Aqui est\u00e1 a an\u00e1lise da McAfee sobre o que aconteceu, quais informa\u00e7\u00f5es vazaram e o que voc\u00ea precisa saber para manter seus dados e identidade seguros:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">O que est\u00e1 acontecendo<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Os hackers afirmam ter roubado dados de clientes de v\u00e1rias empresas importantes, incluindo nomes conhecidos como Adidas, Cisco, Disney, Google, IKEA, Pandora, Toyota e Vietnam Airlines. <\/span>A <a href=\"https:\/\/www.securityweek.com\/hackers-extorting-salesforce-after-stealing-data-from-dozens-of-customers\/\"><span data-contrast=\"none\">Security Week<\/span><\/a><span data-contrast=\"auto\"> relatou ao longo de 2025 uma onda de ataques de engenharia social que exploram vulnerabilidades humanas, em vez de vulnerabilidades de plataforma.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">De acordo com o <\/span><a href=\"https:\/\/www.wsj.com\/articles\/salesforce-linked-security-breach-fallout-escalates-with-qantas-leak-e42913fd?gaa_at=eafs&amp;gaa_n=AWEtsqdKXqgrnK3NcZnA0IaqpnFyKJ5A4LbqjF5VKBJ0qJhYQJLSuQq7jVM1kq69qCo%3D&amp;gaa_ts=68efe567&amp;gaa_sig=yaGAtCSaLQs2HndWG04jIVq3hZFfjSCHbtMbhA3k4YyaMTnL_wh-BgfkbipO5_a9xsqxi9kKRm-fW0SFt4S02A%3D%3D\"><span data-contrast=\"none\">The Wall Street Journal,<\/span><\/a><span data-contrast=\"auto\"> o grupo de hackers j\u00e1 divulgou milh\u00f5es de registros de clientes da Qantas Airlines e est\u00e1 amea\u00e7ando expor informa\u00e7\u00f5es de outras empresas em seguida.\u00a0<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Os dados <\/span><a href=\"https:\/\/www.wsj.com\/articles\/salesforce-linked-security-breach-fallout-escalates-with-qantas-leak-e42913fd?gaa_at=eafs&amp;gaa_n=AWEtsqdKXqgrnK3NcZnA0IaqpnFyKJ5A4LbqjF5VKBJ0qJhYQJLSuQq7jVM1kq69qCo%3D&amp;gaa_ts=68efe567&amp;gaa_sig=yaGAtCSaLQs2HndWG04jIVq3hZFfjSCHbtMbhA3k4YyaMTnL_wh-BgfkbipO5_a9xsqxi9kKRm-fW0SFt4S02A%3D%3D\"><span data-contrast=\"none\">supostamente incluem<\/span><\/a> <b><span data-contrast=\"auto\">nomes, endere\u00e7os de e-mail, n\u00fameros de telefone, datas de nascimento<\/span><\/b><span data-contrast=\"auto\"> e <\/span><b><span data-contrast=\"auto\">dados do programa de fidelidade<\/span><\/b><span data-contrast=\"auto\">. Ainda que pare\u00e7a que dados financeiros n\u00e3o tenham sido inclu\u00eddos, esse tipo de informa\u00e7\u00e3o pessoal ainda pode ser explorado em campanhas de phishing e golpes.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A Salesforce emitiu v\u00e1rios avisos enfatizando que esses ataques resultam de roubo de credenciais e aplicativos maliciosos conectados, e n\u00e3o de uma viola\u00e7\u00e3o de sua infraestrutura.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Infelizmente, incidentes como esses n\u00e3o s\u00e3o raros e n\u00e3o se limitam a uma \u00fanica plataforma ou setor. <\/span><\/b><span data-contrast=\"auto\">At\u00e9 mesmo as empresas mais sofisticadas podem ser v\u00edtimas quando os hackers se baseiam em engenharia social e manipula\u00e7\u00e3o para violar sistemas seguros.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Como os hackers fizeram isso<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Os hackers teriam ligado para os funcion\u00e1rios de v\u00e1rias empresas fingindo ser da equipe de suporte de TI, uma t\u00e1tica conhecida como <\/span><b><span data-contrast=\"auto\">&#8220;vishing&#8221;<\/span><\/b><span data-contrast=\"auto\">e os convenceram a compartilhar credenciais de login ou permitir a conex\u00e3o de ferramentas falsas de terceiros, basicamente entregando aos criminosos as chaves de suas contas. A partir da\u00ed, eles acessavam os bancos de dados dos clientes e roubavam as informa\u00e7\u00f5es armazenadas neles.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Pense nisso, n\u00e3o como um ladr\u00e3o arrombando uma fechadura e sim como algu\u00e9m sendo enganado para abrir a porta.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Quais dados foram vazados<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">At\u00e9 o momento, os dados vazados parecem incluir:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Nomes e endere\u00e7os de e-mail<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">N\u00fameros de telefone<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Datas de nascimento<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Endere\u00e7os residenciais ou de correspond\u00eancia<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">N\u00fameros do programa de milhas ou do programa de fidelidade<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">N\u00e3o h\u00e1 indica\u00e7\u00e3o <\/span><b><span data-contrast=\"auto\">de dados banc\u00e1rios ou de cart\u00e3o de cr\u00e9dito<\/span><\/b><span data-contrast=\"auto\"> nos vazamentos confirmados, mas isso n\u00e3o significa que voc\u00ea est\u00e1 a salvo.\u00a0<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Por que isso \u00e9 importante para voc\u00ea<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Mesmo que suas informa\u00e7\u00f5es financeiras n\u00e3o tenham sido expostas em uma viola\u00e7\u00e3o de dados, informa\u00e7\u00f5es pessoais como nome e endere\u00e7o ainda podem ser usados para <\/span><b><span data-contrast=\"auto\">golpes direcionados e phishing<\/span><\/b><span data-contrast=\"auto\">. \u00a0 Quando essas informa\u00e7\u00f5es s\u00e3o roubadas e vendidas online, os golpistas as utilizam para:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Enviar e-mails ou textos de phishing realistas que fa\u00e7am refer\u00eancia a dados aut\u00eanticos sobre voc\u00ea.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Tentar fazer login em suas outras contas, caso voc\u00ea reutilize suas senhas.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Aplicar golpes de &#8220;reembolso&#8221; ou &#8220;verifica\u00e7\u00e3o de conta&#8221; vinculados a marcas nas quais voc\u00ea confia.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Mesmo que seus dados n\u00e3o fa\u00e7am parte desse vazamento espec\u00edfico, <\/span><b><span data-contrast=\"auto\">esses ataques destacam a frequ\u00eancia com que suas informa\u00e7\u00f5es transitam por sistemas de terceiros que voc\u00ea n\u00e3o controla<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Como descobrir se voc\u00ea foi afetado<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/h2>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Verifique seu e-mail:<\/span><\/b><span data-contrast=\"auto\"> se voc\u00ea for membro ou cliente de uma das empresas mencionadas, fique atento \u00e0s notifica\u00e7\u00f5es oficiais.\u00a0<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Use um site confi\u00e1vel de verifica\u00e7\u00e3o de viola\u00e7\u00f5es:<\/span><\/b><span data-contrast=\"auto\"> visite o site <\/span><a href=\"https:\/\/haveibeenpwned.com\/\"><span data-contrast=\"none\">Have I Been Pwned<\/span><\/a><span data-contrast=\"auto\"> (\u00e9 um site que permite aos usu\u00e1rios da Internet verificar se seus dados pessoais foram comprometidos) ou fa\u00e7a login na sua conta McAfee para verificar se h\u00e1 viola\u00e7\u00f5es recentes vinculadas ao seu e-mail. Voc\u00ea tamb\u00e9m pode se inscrever no <\/span><a href=\"https:\/\/www.mcafee.com\/pt-br\/antivirus.html\"><span data-contrast=\"none\">McAfee Antivirus<\/span><\/a><span data-contrast=\"auto\"> para proteger seus dispositivos.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Evite servi\u00e7os de &#8220;pesquisa na dark web&#8221;:<\/span><\/b><span data-contrast=\"auto\"> alguns deles s\u00e3o golpes. Use fontes leg\u00edtimas.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">O que voc\u00ea deve fazer agora<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">1) Altere suas senhas &#8211; hoje mesmo.<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Use senhas fortes e exclusivas para cada conta. O gerenciador de senhas da McAfee pode ajudar. <\/span><a href=\"https:\/\/www.mcafee.com\/pt-br\/password-generator.html\"><span data-contrast=\"none\">Experimente nosso gerador de senhas aleat\u00f3rias aqui.<\/span><\/a><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2) Ative a autentica\u00e7\u00e3o de dois fatores (2FA).<\/span><\/b> <span data-contrast=\"auto\">Mesmo que um hacker tenha a sua senha, ele n\u00e3o conseguir\u00e1 entrar sem o seu c\u00f3digo.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3) Monitore suas contas financeiras e de fidelidade.<\/span><\/b> <span data-contrast=\"auto\">Fique atento a cobran\u00e7as estranhas, resgates ou e-mails de redefini\u00e7\u00e3o de senha que voc\u00ea n\u00e3o solicitou.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">4) Congele seu cr\u00e9dito.<\/span><\/b> <span data-contrast=\"auto\">\u00c9 gratuito e impede que novas contas sejam abertas em seu nome. Voc\u00ea pode descongelar a qualquer momento. Os usu\u00e1rios da McAfee podem <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/security-freeze\/\"><span data-contrast=\"none\">utilizar um &#8220;congelamento de seguran\u00e7a&#8221;<\/span><\/a><span data-contrast=\"auto\"> para prote\u00e7\u00e3o extra.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">5) Seja extremamente cauteloso com e-mails ou chamadas de &#8220;viola\u00e7\u00e3o&#8221;.<\/span><\/b> <span data-contrast=\"auto\">Os golpistas geralmente fingem ser das empresas afetadas para &#8220;ajudar voc\u00ea a proteger sua conta&#8221;. N\u00e3o clique em links nem forne\u00e7a informa\u00e7\u00f5es por telefone. V\u00e1 diretamente para o site ou aplicativo da empresa ou \u00e0 sua pr\u00f3pria equipe de TI se ocorrer uma viola\u00e7\u00e3o no seu local de trabalho.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">6) Considere a prote\u00e7\u00e3o da identidade.<\/span><\/b> <a href=\"https:\/\/www.mcafee.com\/learn\/pt-br\/monitoramento-de-identidade\/\"><span data-contrast=\"none\">O monitoramento de identidade integrado da McAfee<\/span><\/a><span data-contrast=\"auto\"> pode monitorar suas informa\u00e7\u00f5es pessoais na dark web, enviar alertas se os seus dados aparecerem em uma viola\u00e7\u00e3o e incluir at\u00e9 US$ 1 milh\u00e3o em cobertura para despesas de recupera\u00e7\u00e3o de identidade.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Quais ser\u00e3o os pr\u00f3ximos golpes<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Ofertas falsas de reembolso ou compensa\u00e7\u00e3o.<\/span><\/b><span data-contrast=\"auto\"> &#8220;Percebemos que sua conta foi afetada. Solicite seu reembolso aqui.&#8221; N\u00e3o clique.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Phishing de ponto de fidelidade.<\/span><\/b><span data-contrast=\"auto\"> E-mails que parecem ser de uma companhia a\u00e9rea ou loja pedindo que voc\u00ea fa\u00e7a login para &#8220;proteger seus pr\u00eamios&#8221;.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Golpes de fadiga de MFA.<\/span><\/b><span data-contrast=\"auto\"> Os invasores enviam repetidamente c\u00f3digos de login para te vencer pelo cansa\u00e7o e, em seguida, ligam fingindo ser o suporte, pedindo que voc\u00ea leia um deles em voz alta. N\u00e3o fa\u00e7a isso.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Voc\u00ea precisa de prote\u00e7\u00e3o cont\u00ednua?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Seus dados podem estar dispon\u00edveis por a\u00ed, mas voc\u00ea pode mudar isso.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A McAfee ajuda voc\u00ea a retomar o controle. Usando intelig\u00eancia artificial avan\u00e7ada,<\/span> <a href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\"><b><span data-contrast=\"none\">o detector de golpes da McAfee<\/span><\/b><\/a><b><span data-contrast=\"auto\"> detecta automaticamente golpes<\/span><\/b><span data-contrast=\"auto\"> por SMS, e-mail e v\u00eddeo, bloqueia links perigosos e identifica deepfakes, impedindo que voc\u00ea sofra danos antes que eles aconte\u00e7am.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">E <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/personal-data-cleanup\/\"><span data-contrast=\"none\">a Limpeza de dados pessoais da McAfee<\/span><\/a><span data-contrast=\"auto\"> pode ajudar voc\u00ea a verificar quais corretores de dados t\u00eam seus dados privados e solicitar a remo\u00e7\u00e3o deles em seu nome.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Fique \u00e0 frente dos golpistas. Verifique se voc\u00ea foi exposto, limpe seus dados e proteja sua identidade, tudo isso com a McAfee.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Saiba mais sobre a <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\"><span data-contrast=\"none\">McAfee e o detector de golpes da McAfee<\/span><\/a><span data-contrast=\"auto\">. \u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span> <span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Leia tamb\u00e9m:<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-youre-caught-up-in-a-data-breach\/\"><span data-contrast=\"none\">O que fazer se voc\u00ea for pego em uma viola\u00e7\u00e3o de dados<\/span><\/a><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-delete-yourself-from-the-internet\/\"><span data-contrast=\"none\">Como se excluir da Internet<\/span><\/a><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\"><span data-contrast=\"none\">Como identificar e-mails de phishing e fraudes<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":182196,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11953,11983],"tags":[],"coauthors":[16731],"class_list":["post-223196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-na-internet","category-noticias-sobre-ciberseguranca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers induzem funcion\u00e1rios a expor dados da Salesforce - saiba se voc\u00ea est\u00e1 seguro | Blog da McAfee<\/title>\n<meta name=\"description\" content=\"Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers induzem funcion\u00e1rios a expor dados da Salesforce - saiba se voc\u00ea est\u00e1 seguro | Blog da McAfee\" \/>\n<meta property=\"og:description\" content=\"Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog da McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-21T14:50:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-21T14:56:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Hackers induzem funcion\u00e1rios a expor dados da Salesforce &#8211; saiba se voc\u00ea est\u00e1 seguro\",\"datePublished\":\"2025-10-21T14:50:14+00:00\",\"dateModified\":\"2025-10-21T14:56:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/\"},\"wordCount\":1189,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"articleSection\":[\"Seguran\u00e7a na Internet\",\"Not\u00edcias sobre ciberseguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/\",\"name\":\"Hackers induzem funcion\u00e1rios a expor dados da Salesforce - saiba se voc\u00ea est\u00e1 seguro | Blog da McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"datePublished\":\"2025-10-21T14:50:14+00:00\",\"dateModified\":\"2025-10-21T14:56:57+00:00\",\"description\":\"Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"width\":300,\"height\":200,\"caption\":\"dati di salesforce rubati\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Not\u00edcias sobre ciberseguran\u00e7a\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers induzem funcion\u00e1rios a expor dados da Salesforce &#8211; saiba se voc\u00ea est\u00e1 seguro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\",\"name\":\"Blog da McAfee\",\"description\":\"Not\u00edcias sobre seguran\u00e7a na Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers induzem funcion\u00e1rios a expor dados da Salesforce - saiba se voc\u00ea est\u00e1 seguro | Blog da McAfee","description":"Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Hackers induzem funcion\u00e1rios a expor dados da Salesforce - saiba se voc\u00ea est\u00e1 seguro | Blog da McAfee","og_description":"Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar","og_url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/","og_site_name":"Blog da McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-10-21T14:50:14+00:00","article_modified_time":"2025-10-21T14:56:57+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Escrito por":"Brooke Seipel","Est. tempo de leitura":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Hackers induzem funcion\u00e1rios a expor dados da Salesforce &#8211; saiba se voc\u00ea est\u00e1 seguro","datePublished":"2025-10-21T14:50:14+00:00","dateModified":"2025-10-21T14:56:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/"},"wordCount":1189,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","articleSection":["Seguran\u00e7a na Internet","Not\u00edcias sobre ciberseguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/","name":"Hackers induzem funcion\u00e1rios a expor dados da Salesforce - saiba se voc\u00ea est\u00e1 seguro | Blog da McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","datePublished":"2025-10-21T14:50:14+00:00","dateModified":"2025-10-21T14:56:57+00:00","description":"Os criminosos cibern\u00e9ticos enganaram funcion\u00e1rios de grandes empresas globais para que entregassem o acesso \u00e0 Salesforce e usaram esse acesso para roubar","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","width":300,"height":200,"caption":"dati di salesforce rubati"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/hackers-enganam-grandes-empresas-para-que-exponham-os-dados-da-salesforce-saiba-se-voce-foi-afetado\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Not\u00edcias sobre ciberseguran\u00e7a","item":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/"},{"@type":"ListItem","position":3,"name":"Hackers induzem funcion\u00e1rios a expor dados da Salesforce &#8211; saiba se voc\u00ea est\u00e1 seguro"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/","name":"Blog da McAfee","description":"Not\u00edcias sobre seguran\u00e7a na Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/223196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/comments?post=223196"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/223196\/revisions"}],"predecessor-version":[{"id":223199,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/223196\/revisions\/223199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/media\/182196"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/media?parent=223196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/categories?post=223196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/tags?post=223196"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/coauthors?post=223196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}