{"id":226647,"date":"2026-02-10T06:19:28","date_gmt":"2026-02-10T14:19:28","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=226647"},"modified":"2026-02-10T06:32:07","modified_gmt":"2026-02-10T14:32:07","slug":"noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/","title":{"rendered":"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub"},"content":{"rendered":"<p><span data-contrast=\"auto\">Golpes\u00a0da semana, tr\u00eas not\u00edcias apresentam o mesmo padr\u00e3o: os invasores est\u00e3o cada vez melhores em manipular pessoas, e n\u00e3o apenas em invadir sistemas.\u00a0Estamos\u00a0presenciando uma onda de invas\u00f5es ligadas \u00e0 engenharia social, uma grande plataforma de delivery confirmando uma viola\u00e7\u00e3o em meio a alega\u00e7\u00f5es de extors\u00e3o, e uma not\u00edcia de tecnologia de grande impacto que fez muitas pessoas repensarem como os apps lidam com seus dados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Toda semana, este resumo analisa as not\u00edcias sobre\u00a0golpes\u00a0e seguran\u00e7a cibern\u00e9tica que est\u00e3o em destaque e explica como eles\u00a0realmente funcionam, para que voc\u00ea possa identificar riscos previamente e evitar cair em alguma armadilha.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Vamos\u00a0come\u00e7ar.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Onda de ataques cibern\u00e9ticos atinge Bumble, Match, Panera e CrunchBase<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">O panorama geral:\u00a0<\/span><\/b><span data-contrast=\"auto\">v\u00e1rias grandes marcas foram alvo de incidentes de ciberseguran\u00e7a ligados a t\u00e1ticas de engenharia social, que s\u00e3o golpes que exploram a confian\u00e7a das pessoas, como phishing (golpes por e-mail) e vishing (golpes por telefone).<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">O que aconteceu:\u00a0<\/span><\/b><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-01-28\/bumble-panera-bread-crunchbase-match-hit-by-cyberattacks?srnd=phx-technology&amp;embedded-checkout=true\"><span data-contrast=\"none\">a Bloomberg relatou<\/span><\/a><span data-contrast=\"auto\">\u00a0que Bumble, Match Group, Panera Bread e CrunchBase confirmaram os incidentes.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Bumble informou que a conta de um prestador de servi\u00e7os foi comprometida em um ataque de phishing, permitindo acesso tempor\u00e1rio a uma pequena\u00a0parte\u00a0de sua rede, mas afirmou que os bancos de dados de usu\u00e1rios, contas, mensagens e perfis n\u00e3o foram acessados.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Panera informou que um invasor acessou um aplicativo de software usado para armazenar dados e que as informa\u00e7\u00f5es envolvidas eram dados de contato.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Match afirmou que o incidente afetou uma quantidade limitada de dados de usu\u00e1rios e que n\u00e3o h\u00e1\u00a0ind\u00edcios\u00a0de que logins, informa\u00e7\u00f5es financeiras ou comunica\u00e7\u00f5es privadas tenham sido acessados.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CrunchBase informou que os documentos em sua rede corporativa foram\u00a0impactados,\u00a0mas que conseguiu\u00a0conter\u00a0o incidente.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">De acordo com a Bloomberg, a empresa de seguran\u00e7a cibern\u00e9tica Mandiant tamb\u00e9m alertou sobre uma campanha de hacking vinculada a um grupo que se autodenomina\u00a0ShinyHunters. O grupo est\u00e1 usando\u00a0<\/span><b><span data-contrast=\"auto\">vishing, que significa\u00a0golpes\u00a0por chamadas telef\u00f4nicas<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">para enganar as pessoas e faz\u00ea-las fornecer suas informa\u00e7\u00f5es de login.<\/span><\/b><span data-contrast=\"auto\">\u00a0Uma vez que os atacantes conseguem essas credenciais de login, eles podem acessar ferramentas na nuvem e sistemas de trabalho online que as empresas usam todos os dias. O grupo afirmou ser respons\u00e1vel por alguns desses ataques recentes, mas isso ainda n\u00e3o foi confirmado de forma independente.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Sinais de alerta a observar:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Chamadas que pressionam voc\u00ea a aprovar um login, redefinir credenciais ou compartilhar um c\u00f3digo de uso \u00fanico<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Mensagens que se fazem passar por suporte de TI, fornecedor ou &#8220;seguran\u00e7a&#8221; e tentam apressar voc\u00ea<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Solicita\u00e7\u00f5es de MFA que voc\u00ea n\u00e3o iniciou<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Solicita\u00e7\u00f5es de &#8220;verifica\u00e7\u00e3o r\u00e1pida&#8221; que ignoram os processos internos normais<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Como isso funciona:\u00a0<\/span><\/b><span data-contrast=\"auto\">a engenharia social funciona porque se mistura \u00e0 vida normal. Uma mensagem ou liga\u00e7\u00e3o convincente leva algu\u00e9m a fazer uma pequena coisa \u201crazo\u00e1vel&#8221;. Aprovar uma solicita\u00e7\u00e3o. Ler um c\u00f3digo. Redefinir o acesso. Muitas vezes, isso \u00e9 tudo o que um invasor precisa para entrar com credenciais leg\u00edtimas e, em seguida, acessar as ferramentas onde os dados valiosos est\u00e3o.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"wpa-warning wpa-image-missing-alt aligncenter size-full wp-image-216406\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447.jpg\" alt=\"\" width=\"1000\" height=\"679\" data-warning=\"Missing alt text\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-300x204.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-768x521.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-190x129.jpg 190w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Atualiza\u00e7\u00e3o da pol\u00edtica de privacidade do TikTok gera rea\u00e7\u00f5es negativas<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Ok, sabemos que este boletim se chama &#8220;Golpes da semana&#8221;, mas tamb\u00e9m \u00e9 um boletim informativo sobre seguran\u00e7a cibern\u00e9tica.\u00a0Ent\u00e3o\u00a0quando a maior manchete de tecnologia e privacidade da semana \u00e9 o TikTok atualizando sua pol\u00edtica de privacidade\u00a0precisamos\u00a0comentar sobre isso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">O panorama geral:\u00a0<\/span><\/b><span data-contrast=\"auto\">os termos e a pol\u00edtica de privacidade atualizados do TikTok est\u00e3o levantando novas quest\u00f5es sobre quais dados s\u00e3o coletados, especialmente em rela\u00e7\u00e3o \u00e0 localiza\u00e7\u00e3o.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">O que aconteceu:<\/span><\/b><span data-contrast=\"auto\">\u00a0o TikTok confirmou\u00a0na semana passada\u00a0que uma nova empresa sediada nos EUA passou a controlar o aplicativo, ap\u00f3s a separa\u00e7\u00e3o da ByteDance no in\u00edcio deste ano. No mesmo dia,\u00a0<\/span><a href=\"https:\/\/www.cbsnews.com\/news\/tiktok-new-terms-of-service-privacy-geolocation-personal-information\/\"><span data-contrast=\"none\">a CBS informou que o TikTok divulgou termos atualizados e uma nova pol\u00edtica de privacidade<\/span><\/a><span data-contrast=\"auto\">, provocando cr\u00edticas e rea\u00e7\u00f5es negativas nas redes sociais.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A CBS informou que um dos principais pontos de preocupa\u00e7\u00e3o \u00e9 a parte da pol\u00edtica que indica que o TikTok pode coletar informa\u00e7\u00f5es de localiza\u00e7\u00e3o precisas caso os usu\u00e1rios ativem os servi\u00e7os de localiza\u00e7\u00e3o nas configura\u00e7\u00f5es do dispositivo.\u00a0Segundo relatos\u00a0isso representa\u00a0uma mudan\u00e7a\u00a0em rela\u00e7\u00e3o \u00e0\u00a0pol\u00edtica\u00a0anterior, e o\u00a0TikTok afirmou que pretende oferecer aos usu\u00e1rios nos EUA a op\u00e7\u00e3o de ativar ou desativar esses recursos de localiza\u00e7\u00e3o precisa quando forem disponibilizados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Segundo a CBS, alguns usu\u00e1rios tamb\u00e9m est\u00e3o preocupados com o fato de a nova pol\u00edtica de privacidade\u00a0permitir que o TikTok compartilhe com mais facilidade\u00a0seus\u00a0dados privados\u00a0com o governo federal e local.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esse receio se baseia em uma\u00a0mudan\u00e7a\u00a0na reda\u00e7\u00e3o\u00a0da pol\u00edtica\u00a0que afirma\u00a0que\u00a0o TikTok &#8220;processa essas informa\u00e7\u00f5es pessoais sigilosas de acordo com a lei aplic\u00e1vel.&#8221;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Uma conclus\u00e3o r\u00e1pida e pr\u00e1tica:\u00a0<\/span><\/b><span data-contrast=\"auto\">isso serve como um bom lembrete de que o \u201cdrama da pol\u00edtica de privacidade\u201d geralmente se resume a\u00a0<\/span><b><span data-contrast=\"auto\">uma coisa que voc\u00ea realmente pode\u00a0controlar:\u00a0as permiss\u00f5es do seu aplicativo.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">O que fazer (medidas gerais de privacidade):<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Verifique as configura\u00e7\u00f5es do seu celular para o TikTok e confirme se o acesso \u00e0 localiza\u00e7\u00e3o est\u00e1 Desativado, Durante o uso ou Sempre.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Se o seu dispositivo for compat\u00edvel com isso, considere desativar a localiza\u00e7\u00e3o precisa para aplicativos que realmente n\u00e3o precisam dela.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Fa\u00e7a uma r\u00e1pida varredura de permiss\u00f5es nos aplicativos sociais: localiza\u00e7\u00e3o, contatos, fotos, microfone, c\u00e2mera e Bluetooth.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Certifique-se de que sua conta esteja protegida com uma senha forte e exclusiva e autentica\u00e7\u00e3o de dois fatores.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Observa\u00e7\u00e3o: esta n\u00e3o \u00e9 uma recomenda\u00e7\u00e3o sobre manter ou remover nenhum aplicativo espec\u00edfico.\u00a0\u00c9\u00a0apenas um lembrete de que as configura\u00e7\u00f5es do seu dispositivo s\u00e3o importantes e vale a pena revis\u00e1-las.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Grubhub confirma viola\u00e7\u00e3o de dados em meio a relatos de extors\u00e3o<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">O panorama geral:\u00a0<\/span><\/b><span data-contrast=\"auto\">mesmo quando uma empresa afirma que os detalhes de pagamento n\u00e3o foram afetados, uma viola\u00e7\u00e3o ainda pode gerar riscos porque as informa\u00e7\u00f5es roubadas frequentemente s\u00e3o reutilizadas em ataques de phishing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">O que aconteceu:<\/span><\/b><span data-contrast=\"auto\">\u00a0de acordo com o\u00a0<\/span><a href=\"https:\/\/www.google.com\/search?q=bleeping+computer+grub+hub&amp;oq=bleeping+computer+grub+hub&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIJCAEQIRgKGKABMgkIAhAhGAoYoAEyCQgDECEYChigATIJCAQQIRgKGKABMgYIBRAhGAoyBwgGECEYjwIyBwgHECEYjwLSAQgyODAyajBqN6gCALACAA&amp;sourceid=chrome&amp;ie=UTF-8\"><span data-contrast=\"none\">BleepingComputer<\/span><\/a><span data-contrast=\"auto\">, o Grubhub confirmou que indiv\u00edduos n\u00e3o autorizados baixaram dados de alguns sistemas, e que a empresa investigou o caso, interrompeu a atividade e est\u00e1 tomando medidas para refor\u00e7ar a seguran\u00e7a. Fontes disseram ao BleepingComputer que a empresa enfrenta pedidos de extors\u00e3o relacionados aos dados roubados. O Grubhub afirmou que informa\u00e7\u00f5es sigilosas, como detalhes financeiros e hist\u00f3rico de pedidos, n\u00e3o foram afetadas, mas n\u00e3o deu detalhes sobre quando a viola\u00e7\u00e3o ocorreu nem sobre sua extens\u00e3o.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Sinais de alerta a observar a seguir:\u00a0<\/span><\/b><span data-contrast=\"auto\">manchetes sobre viola\u00e7\u00f5es costumam ser seguidas por\u00a0ondas\u00a0de golpes. Fique atento a:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">E-mails de &#8220;reembolso&#8221; ou &#8220;problema no pedido&#8221; que voc\u00ea n\u00e3o solicitou<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Mensagens falsas de suporte ao cliente solicitando que voc\u00ea verifique os detalhes da conta<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Solicita\u00e7\u00f5es de redefini\u00e7\u00e3o de senha que voc\u00ea n\u00e3o iniciou<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Links que pedem para \u201cverificar\u201d ou \u201cregularizar\u201d sua conta e que\u00a0n\u00e3o\u00a0venham de um dom\u00ednio oficial ou conhecido<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Como isso funciona:\u00a0<\/span><\/b><span data-contrast=\"auto\">sistemas de suporte ao cliente podem\u00a0conter\u00a0informa\u00e7\u00f5es pessoais que fazem com que os\u00a0golpes\u00a0sejam convincentes. Nomes, e-mails e anota\u00e7\u00f5es da conta costumam ser suficientes para que os invasores criem mensagens que soem como suporte leg\u00edtimo, especialmente quando a marca j\u00e1 est\u00e1 em destaque nas not\u00edcias.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-208738\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner.jpg\" alt=\"Aba de pesquisa no Google no notebook\" width=\"1000\" height=\"668\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-768x513.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-193x129.jpg 193w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Extens\u00f5es falsas do Chrome est\u00e3o assumindo discretamente o controle de contas<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">O panorama geral: <\/span><\/b><span data-contrast=\"auto\">algumas extens\u00f5es de navegador que parecem ferramentas normais de local de trabalho s\u00e3o, na verdade, projetadas para sequestrar contas e bloquear os usu\u00e1rios de seus pr\u00f3prios controles de seguran\u00e7a.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">O que aconteceu:<\/span><\/b><span data-contrast=\"auto\">\u00a0pesquisadores de\u00a0seguran\u00e7a\u00a0<\/span><a href=\"https:\/\/www.foxnews.com\/tech\/malicious-google-chrome-extensions-hijack-accounts\"><span data-contrast=\"none\">disseram \u00e0 Fox News<\/span><\/a><span data-contrast=\"auto\">\u00a0que descobriram\u00a0uma campanha envolvendo extens\u00f5es maliciosas do Google Chrome que se passam por plataformas conhecidas de neg\u00f3cios e recursos humanos, incluindo ferramentas usadas com frequ\u00eancia para folhas de pagamento, benef\u00edcios e acesso ao local de trabalho.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Os pesquisadores\u00a0identificaram\u00a0v\u00e1rias extens\u00f5es falsas que foram comercializadas como ferramentas de produtividade ou seguran\u00e7a. Uma vez instaladas, elas eram executadas silenciosamente em segundo plano, sem sinais \u00f3bvios de alerta. Segundo a Fox News, a Google afirmou que as extens\u00f5es foram removidas da Chrome Web Store, mas algumas ainda circulam em sites de download de terceiros.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Como o\u00a0golpe\u00a0realmente funciona:<\/span><\/b><span data-contrast=\"auto\">\u00a0em vez de roubar senhas diretamente, as extens\u00f5es capturavam sess\u00f5es de login ativas. Quando voc\u00ea entra em um site, o navegador armazena pequenos arquivos que mant\u00eam voc\u00ea conectado. Se os invasores tiverem acesso a esses arquivos, eles conseguem entrar na conta sem nunca precisar saber a senha.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <span data-contrast=\"auto\">Algumas extens\u00f5es foram al\u00e9m, interferindo nas configura\u00e7\u00f5es de seguran\u00e7a. As v\u00edtimas n\u00e3o conseguiam alterar as senhas, revisar o hist\u00f3rico de login ou acessar os controles da conta. Isso tornou mais dif\u00edcil detectar a intrus\u00e3o e ainda mais complicado recuperar o acesso quando algo parecia errado.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Por que isso importa:\u00a0<\/span><\/b><span data-contrast=\"auto\">esse tipo de ataque elimina a rede de seguran\u00e7a na qual as pessoas confiam quando suas contas s\u00e3o comprometidas. Redefinir senhas e usar autentica\u00e7\u00e3o de dois fatores s\u00f3 ajuda se voc\u00ea conseguir acess\u00e1-las. Ao cortar o acesso a essas ferramentas, os invasores conseguem\u00a0manter\u00a0o controle por mais tempo e se mover pelos sistemas conectados com menos resist\u00eancia.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Sinais de alerta:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Extens\u00f5es de navegador que voc\u00ea\u00a0n\u00e3o\u00a0lembra de ter instalado<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Complementos que dizem gerenciar RH, folhas de pagamento ou acesso interno da empresa<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Configura\u00e7\u00f5es de seguran\u00e7a ausentes ou inacess\u00edveis nas contas<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Estar logado em contas que voc\u00ea n\u00e3o acessou recentemente<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Uma r\u00e1pida verifica\u00e7\u00e3o de seguran\u00e7a:\u00a0<\/span><\/b><span data-contrast=\"auto\">reserve alguns minutos para revisar as extens\u00f5es de seu navegador. Remova qualquer item desconhecido ou desnecess\u00e1rio, especialmente ferramentas vinculadas a plataformas de trabalho. As extens\u00f5es t\u00eam acesso profundo ao seu navegador, portanto merecem o mesmo n\u00edvel de aten\u00e7\u00e3o que qualquer outro software que voc\u00ea instale.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Dicas de seguran\u00e7a da McAfee para esta semana<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Seja\u00a0c\u00e9tico\u00a0em rela\u00e7\u00e3o a ferramentas \u201c\u00fateis\u201d.<\/span><\/b><span data-contrast=\"auto\">\u00a0Extens\u00f5es de navegador, complementos de trabalho (como plugins para e-mail, calend\u00e1rio ou apps corporativos) e ferramentas de produtividade podem ter acesso profundo \u00e0s suas contas. Instale somente o que voc\u00ea realmente precisa e remova qualquer item desconhecido.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Trate as chamadas e os avisos com cautela.<\/span><\/b><span data-contrast=\"auto\">\u00a0Solicita\u00e7\u00f5es inesperadas de login, aprova\u00e7\u00f5es de MFA ou contatos de \u201csuporte de TI\u201d s\u00e3o pontos comuns de entrada para ataques de engenharia social. Se voc\u00ea\u00a0n\u00e3o\u00a0iniciou\u00a0a a\u00e7\u00e3o, pare e verifique antes de prosseguir.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Revise as permiss\u00f5es de aplicativos e do navegador.<\/span><\/b><span data-contrast=\"auto\">\u00a0Reserve alguns minutos para verificar quais apps e extens\u00f5es podem acessar sua localiza\u00e7\u00e3o, contas e dados.\u00a0Pequenas altera\u00e7\u00f5es\u00a0nessas configura\u00e7\u00f5es podem reduzir significativamente os riscos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Proteja seus logins primeiro.<\/span><\/b><span data-contrast=\"auto\">\u00a0Use senhas fortes e \u00fanicas e ative a autentica\u00e7\u00e3o de dois fatores em e-mails e contas de trabalho. Se atacantes tiverem acesso ao seu e-mail, eles poder\u00e3o redefinir\u00a0praticamente quase todo o\u00a0resto.\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/learn\/pt-br\/gerenciador-de-senhas\/\"><span data-contrast=\"none\">O gerenciador de senhas da McAfee<\/span><\/a><span data-contrast=\"auto\">\u00a0pode ajudar voc\u00ea a criar e armazenar senhas exclusivas para\u00a0todas\u00a0as suas contas.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Espere golpes\u00a0relacionados\u00a0a not\u00edcias recentes.<\/span><\/b><span data-contrast=\"auto\">\u00a0Quando viola\u00e7\u00f5es ou altera\u00e7\u00f5es de pol\u00edticas s\u00e3o noticiadas, os golpistas costumam enviar mensagens de phishing que fazem refer\u00eancia a elas. Uma dose extra de\u00a0ceticismo\u00a0nos dias e semanas ap\u00f3s uma\u00a0not\u00edcia\u00a0pode evitar problemas maiores no futuro.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Golpes\u00a0da semana, tr\u00eas not\u00edcias apresentam o mesmo padr\u00e3o: os invasores est\u00e3o cada vez melhores em manipular pessoas, e n\u00e3o apenas&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":203208,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11953,12013,11983],"tags":[],"coauthors":[16731],"class_list":["post-226647","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-na-internet","category-privacidade-e-protecao-da-identidade","category-noticias-sobre-ciberseguranca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub | Blog da McAfee<\/title>\n<meta name=\"description\" content=\"Uma onda de ataques cibern\u00e9ticos de phishing atingiu o Bumble, Match, Panera e CrunchBase, enquanto o Grubhub confirma uma viola\u00e7\u00e3o e o TikTok atualiza sua pol\u00edtica de privacidade.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub | Blog da McAfee\" \/>\n<meta property=\"og:description\" content=\"Uma onda de ataques cibern\u00e9ticos de phishing atingiu o Bumble, Match, Panera e CrunchBase, enquanto o Grubhub confirma uma viola\u00e7\u00e3o e o TikTok atualiza sua pol\u00edtica de privacidade.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog da McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-10T14:19:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T14:32:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub\",\"datePublished\":\"2026-02-10T14:19:28+00:00\",\"dateModified\":\"2026-02-10T14:32:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/\"},\"wordCount\":2010,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"articleSection\":[\"Seguran\u00e7a na Internet\",\"Privacidade e prote\u00e7\u00e3o da identidade\",\"Not\u00edcias sobre ciberseguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/\",\"name\":\"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub | Blog da McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"datePublished\":\"2026-02-10T14:19:28+00:00\",\"dateModified\":\"2026-02-10T14:32:07+00:00\",\"description\":\"Uma onda de ataques cibern\u00e9ticos de phishing atingiu o Bumble, Match, Panera e CrunchBase, enquanto o Grubhub confirma uma viola\u00e7\u00e3o e o TikTok atualiza sua pol\u00edtica de privacidade.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"width\":300,\"height\":200,\"caption\":\"truffe della settimana\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Not\u00edcias sobre ciberseguran\u00e7a\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\",\"name\":\"Blog da McAfee\",\"description\":\"Not\u00edcias sobre seguran\u00e7a na Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub | Blog da McAfee","description":"Uma onda de ataques cibern\u00e9ticos de phishing atingiu o Bumble, Match, Panera e CrunchBase, enquanto o Grubhub confirma uma viola\u00e7\u00e3o e o TikTok atualiza sua pol\u00edtica de privacidade.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub | Blog da McAfee","og_description":"Uma onda de ataques cibern\u00e9ticos de phishing atingiu o Bumble, Match, Panera e CrunchBase, enquanto o Grubhub confirma uma viola\u00e7\u00e3o e o TikTok atualiza sua pol\u00edtica de privacidade.","og_url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/","og_site_name":"Blog da McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2026-02-10T14:19:28+00:00","article_modified_time":"2026-02-10T14:32:07+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Escrito por":"Brooke Seipel","Est. tempo de leitura":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub","datePublished":"2026-02-10T14:19:28+00:00","dateModified":"2026-02-10T14:32:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/"},"wordCount":2010,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","articleSection":["Seguran\u00e7a na Internet","Privacidade e prote\u00e7\u00e3o da identidade","Not\u00edcias sobre ciberseguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/","name":"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub | Blog da McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","datePublished":"2026-02-10T14:19:28+00:00","dateModified":"2026-02-10T14:32:07+00:00","description":"Uma onda de ataques cibern\u00e9ticos de phishing atingiu o Bumble, Match, Panera e CrunchBase, enquanto o Grubhub confirma uma viola\u00e7\u00e3o e o TikTok atualiza sua pol\u00edtica de privacidade.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","width":300,"height":200,"caption":"truffe della settimana"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/noticias-golpes-esta-semana-tiktok-dados-hinge-bumble-grubhub\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Not\u00edcias sobre ciberseguran\u00e7a","item":"https:\/\/www.mcafee.com\/blogs\/pt-br\/noticias-sobre-ciberseguranca\/"},{"@type":"ListItem","position":3,"name":"Golpes da semana: apps de namoro, dados do TikTok e extors\u00e3o no Grubhub"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/","name":"Blog da McAfee","description":"Not\u00edcias sobre seguran\u00e7a na Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/226647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/comments?post=226647"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/226647\/revisions"}],"predecessor-version":[{"id":226651,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/226647\/revisions\/226651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/media\/203208"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/media?parent=226647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/categories?post=226647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/tags?post=226647"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/coauthors?post=226647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}