{"id":98023,"date":"2019-12-13T14:14:04","date_gmt":"2019-12-13T22:14:04","guid":{"rendered":"\/blogs\/?p=98023"},"modified":"2025-06-11T00:23:30","modified_gmt":"2025-06-11T07:23:30","slug":"9-tipos-de-hackers-e-as-suas-motivacoes","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/","title":{"rendered":"9 tipos de hackers e as suas motiva\u00e7\u00f5es"},"content":{"rendered":"<p><span data-contrast=\"auto\">Desde\u00a0<\/span><a href=\"https:\/\/www.csoonline.com\/article\/534628\/the-biggest-data-breaches-of-the-21st-century.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">ataques de ransomware<\/span><\/a><span data-contrast=\"auto\">\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de dados\u00a0massivas\u00a0que\u00a0revelaram\u00a0as\u00a0informa\u00e7\u00f5es\u00a0de\u00a0milh\u00f5es\u00a0de\u00a0clientes,\u00a0os\u00a0ciberataques\u00a0s\u00e3o\u00a0not\u00edcia\u00a0ultimamente, mas\u00a0raramente\u00a0ouvimos\u00a0falar\u00a0sobre\u00a0os\u00a0pr\u00f3prios\u00a0hackers.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Claro que\u00a0muitos\u00a0deles\u00a0ocultam\u00a0as\u00a0suas\u00a0identidades\u00a0porque\u00a0realizam\u00a0atividades\u00a0ilegais, mas\u00a0ficaria\u00a0surpreendido\u00a0ao\u00a0descobrir\u00a0que\u00a0nem\u00a0todos\u00a0os\u00a0hackers\u00a0s\u00e3o\u00a0vil\u00f5es. No\u00a0mundo\u00a0cada\u00a0vez\u00a0mais\u00a0tecnol\u00f3gico\u00a0em\u00a0que\u00a0vivemos,\u00a0existem\u00a0hackers de\u00a0todos\u00a0os\u00a0tipos.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Esta\u00a0\u00e9\u00a0uma\u00a0amostra\u00a0do que\u00a0fazem\u00a0e\u00a0porque\u00a0o\u00a0fazem:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Hackers de\u00a0chap\u00e9u\u00a0branco:<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">estes\u00a0s\u00e3o\u00a0os\u00a0her\u00f3is,\u00a0peritos\u00a0de\u00a0seguran\u00e7a\u00a0inform\u00e1tica\u00a0especializados\u00a0em\u00a0testes de\u00a0infiltra\u00e7\u00e3o\u00a0e\u00a0outras\u00a0metodologias\u00a0para\u00a0garantir\u00a0que\u00a0os\u00a0sistemas\u00a0de\u00a0uma\u00a0empresa\u00a0s\u00e3o\u00a0seguros. Estes\u00a0profissionais\u00a0de TI\u00a0apoiam-se num arsenal\u00a0tecnol\u00f3gico\u00a0para combater\u00a0os\u00a0hackers &#8220;maus&#8221;.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers de\u00a0chap\u00e9u\u00a0preto:<\/span><\/b><span data-contrast=\"auto\">\u00a0estes\u00a0s\u00e3o\u00a0os\u00a0vil\u00f5es,\u00a0geralmente\u00a0conhecidos\u00a0apenas\u00a0como\u00a0hackers. O\u00a0termo\u00a0\u00e9\u00a0geralmente\u00a0utilizado\u00a0para\u00a0os\u00a0hackers\u00a0que se\u00a0infiltram\u00a0em\u00a0redes\u00a0ou\u00a0computadores\u00a0ou\u00a0criam\u00a0v\u00edrus\u00a0inform\u00e1ticos.\u00a0Os\u00a0hackers de\u00a0chap\u00e9u\u00a0preto\u00a0superam\u00a0tecnologicamente\u00a0os\u00a0hackers de\u00a0chap\u00e9u\u00a0branco.\u00a0Costumam\u00a0encontrar\u00a0o\u00a0ponto\u00a0de\u00a0menor\u00a0resist\u00eancia,\u00a0quer\u00a0seja\u00a0devido\u00a0a\u00a0erro\u00a0humano\u00a0ou\u00a0desleixo,\u00a0ou\u00a0uma\u00a0nova forma de\u00a0ataque.\u00a0Os\u00a0hackers\u00a0puristas\u00a0usam\u00a0o\u00a0termo\u00a0&#8220;crackers&#8221; para se\u00a0referirem\u00a0aos\u00a0hackers de\u00a0chap\u00e9u\u00a0preto. A\u00a0motiva\u00e7\u00e3o\u00a0dos hackers de\u00a0chap\u00e9u\u00a0preto\u00a0\u00e9\u00a0ganharem\u00a0dinheiro.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Hackers de\u00a0chap\u00e9u\u00a0cinzento<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Estes hackers\u00a0n\u00e3o\u00a0utilizam\u00a0as\u00a0suas\u00a0habilidades\u00a0para\u00a0ganho\u00a0pessoal, mas\u00a0n\u00e3o\u00a0operam\u00a0com total\u00a0integridade. Por\u00a0exemplo, um hacker que se\u00a0infiltra\u00a0no\u00a0sistema\u00a0de\u00a0uma\u00a0empresa\u00a0para\u00a0revelar\u00a0a\u00a0sua\u00a0vulnerabilidade\u00a0e publica-a\u00a0na\u00a0Internet,\u00a0pode\u00a0estar\u00a0a\u00a0fazer\u00a0algo\u00a0bom\u00a0para\u00a0os\u00a0clientes\u00a0da\u00a0empresa, mas\u00a0tamb\u00e9m\u00a0est\u00e3o\u00a0a\u00a0comprometer\u00a0um\u00a0sistema\u00a0sem\u00a0permiss\u00e3o.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Se o hacker\u00a0exigir\u00a0dinheiro\u00a0da\u00a0empresa\u00a0para\u00a0n\u00e3o\u00a0revelar\u00a0a\u00a0vulnerabilidade\u00a0est\u00e1\u00a0a\u00a0ultrapassar\u00a0uma\u00a0linha\u00a0vermelha\u00a0e\u00a0torna-se um hacker de\u00a0chap\u00e9u\u00a0preto, operando\u00a0apenas\u00a0para\u00a0benef\u00edcio\u00a0pessoal.<\/span><br \/>\n<span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Script Kiddies:<\/span><\/b><span data-contrast=\"auto\">\u00a0\u00e9 um\u00a0termo\u00a0pejorativo\u00a0para\u00a0os\u00a0hackers de\u00a0chap\u00e9u\u00a0preto\u00a0que\u00a0utilizam\u00a0programas\u00a0transferidos\u00a0da Internet para\u00a0atacar\u00a0redes e\u00a0manipular\u00a0Web sites\u00a0numa\u00a0tentativa\u00a0de\u00a0ganharem\u00a0fama.<\/span><\/p>\n<p><span data-contrast=\"auto\">Alguns\u00a0\u201cscript kiddies\u201d\u00a0incluem-se\u00a0numa\u00a0nova\u00a0categoria\u00a0chamada\u00a0&#8220;hackers de\u00a0chap\u00e9u\u00a0verde&#8221;. Estes hackers\u00a0amadores\u00a0s\u00e3o\u00a0curiosos e\u00a0dispostos\u00a0a\u00a0aprender,\u00a0podem\u00a0tornar-se\u00a0verdadeiros\u00a0hackers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hacktivistas:<\/span><\/b><span data-contrast=\"auto\">\u00a0estes\u00a0hackers\u00a0procuram\u00a0provocar\u00a0mudan\u00e7as\u00a0sociais. A\u00a0sua\u00a0motiva\u00e7\u00e3o\u00a0\u00e9\u00a0a\u00a0exposi\u00e7\u00e3o\u00a0de\u00a0infra\u00e7\u00f5es\u00a0ou\u00a0pr\u00e1ticas\u00a0pol\u00edticas\u00a0e\u00a0religiosas\u00a0censur\u00e1veis.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Por\u00a0exemplo,\u00a0durante\u00a0a primavera\u00a0\u00e1rabe,\u00a0alguns\u00a0hacktivistas\u00a0trabalharam\u00a0para\u00a0fornecer\u00a0m\u00e9todos\u00a0de\u00a0comunica\u00e7\u00e3o\u00a0a\u00a0grupos\u00a0amea\u00e7ados\u00a0e\u00a0acesso\u00a0a\u00a0p\u00e1ginas\u00a0Web\u00a0censuradas\u00a0pelos\u00a0governos.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers\u00a0patrocinados\u00a0por\u00a0governos:<\/span><\/b><span data-contrast=\"auto\">\u00a0os\u00a0governos\u00a0em\u00a0todo\u00a0o\u00a0mundo\u00a0compreendem\u00a0que \u00e9\u00a0\u00fatil\u00a0para\u00a0os\u00a0seus\u00a0objetivos\u00a0militares\u00a0estarem\u00a0bem\u00a0posicionados\u00a0online.\u00a0Costumava\u00a0dizer-se: &#8220;Quem\u00a0controla\u00a0os\u00a0mares,\u00a0controla\u00a0o\u00a0mundo&#8221;,\u00a0depois\u00a0era &#8220;Quem\u00a0controla\u00a0o\u00a0ar,\u00a0controla\u00a0o\u00a0mundo&#8221; e agora \u00e9 o\u00a0mais\u00a0importante\u00a0\u00e9\u00a0controlar\u00a0o\u00a0ciberespa\u00e7o.\u00a0Os\u00a0hackers\u00a0patrocinados\u00a0pelos\u00a0governos\u00a0t\u00eam\u00a0tempo\u00a0ilimitado\u00a0para\u00a0atacar\u00a0civis,\u00a0empresas\u00a0e\u00a0governos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers\u00a0espias:<\/span><\/b><span data-contrast=\"auto\">\u00a0as\u00a0empresas\u00a0contratam\u00a0hackers\u00a0para se\u00a0infiltrarem\u00a0em\u00a0empresas\u00a0concorrentes\u00a0e\u00a0roubarem\u00a0os\u00a0seus\u00a0segredos\u00a0comerciais.\u00a0Podem\u00a0infiltrar-se\u00a0desde\u00a0o exterior\u00a0ou\u00a0empregarem-se\u00a0nessas\u00a0empresas\u00a0e\u00a0trabalharem\u00a0como\u00a0uma\u00a0toupeira.\u00a0Os\u00a0hackers\u00a0espias\u00a0podem\u00a0utilizar\u00a0t\u00e1ticas\u00a0semelhantes\u00a0aos\u00a0hactivistas, mas o\u00a0seu\u00a0objetivo\u00a0\u00e9\u00a0servir\u00a0os\u00a0objetivos\u00a0dos\u00a0seus\u00a0clientes\u00a0e\u00a0ganharem\u00a0dinheiro.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Informadores<\/span><\/b><span data-contrast=\"auto\">: \u00e9\u00a0algu\u00e9m\u00a0que\u00a0trabalha\u00a0numa\u00a0organiza\u00e7\u00e3o\u00a0e\u00a0utiliza\u00a0o\u00a0seu\u00a0acesso\u00a0aos\u00a0sistemas\u00a0para\u00a0divulgar\u00a0informa\u00e7\u00e3o\u00a0pertinente.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Por outro\u00a0lado,\u00a0este\u00a0informador\u00a0tamb\u00e9m\u00a0pode\u00a0ter\u00a0inten\u00e7\u00f5es\u00a0maliciosas\u00a0ou\u00a0um\u00a0ressentimento\u00a0contra\u00a0a\u00a0empresa. Estes hackers\u00a0podem\u00a0acessar\u00a0\u00e0s\u00a0informa\u00e7\u00f5es\u00a0para\u00a0venderem\u00a0segredos\u00a0comerciais\u00a0ou\u00a0serem\u00a0contratados\u00a0por\u00a0outra\u00a0empresa. Neste\u00a0caso,\u00a0s\u00e3o\u00a0chamados\u00a0&#8220;informadores\u00a0maliciosos&#8221;.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ciberterroristas:<\/span><\/b><span data-contrast=\"auto\">\u00a0estes\u00a0hackers,\u00a0geralmente\u00a0motivados\u00a0por\u00a0cren\u00e7as\u00a0religiosas\u00a0ou\u00a0pol\u00edticas,\u00a0tentam\u00a0criar\u00a0medo\u00a0e\u00a0caos\u00a0prejudicando\u00a0infraestruturas\u00a0cr\u00edticas.\u00a0Os\u00a0ciberterroristas\u00a0s\u00e3o\u00a0os\u00a0mais\u00a0perigosos, com\u00a0uma\u00a0ampla\u00a0gama\u00a0de\u00a0habilidades\u00a0e\u00a0objetivos. A\u00a0maior\u00a0motiva\u00e7\u00e3o\u00a0dos\u00a0ciberterroristas\u00a0\u00e9\u00a0difundir\u00a0o terror e a\u00a0viol\u00eancia.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Certifique-se de que\u00a0mant\u00e9m\u00a0as\u00a0suas\u00a0informa\u00e7\u00f5es\u00a0protegidas\u00a0de\u00a0todas\u00a0as\u00a0formas\u00a0de hackers\u00a0utilizando\u00a0um\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">software de seguran\u00e7a<\/span><\/a><span data-contrast=\"auto\">\u00a0abrangente\u00a0que\u00a0inclua\u00a0prote\u00e7\u00e3o\u00a0contra\u00a0roubo\u00a0de\u00a0identidade.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Robert Siciliano \u00e9 um consultor da McAfee e\u00a0Especialista\u00a0em\u00a0roubo\u00a0de\u00a0identidade.\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de dados\u00a0massivas\u00a0que\u00a0revelaram\u00a0as\u00a0informa\u00e7\u00f5es\u00a0de\u00a0milh\u00f5es\u00a0de\u00a0clientes,\u00a0os\u00a0ciberataques\u00a0s\u00e3o\u00a0not\u00edcia\u00a0ultimamente, mas\u00a0raramente\u00a0ouvimos\u00a0falar\u00a0sobre\u00a0os\u00a0pr\u00f3prios\u00a0hackers.\u00a0 Claro que\u00a0muitos\u00a0deles\u00a0ocultam\u00a0as\u00a0suas\u00a0identidades\u00a0porque\u00a0realizam\u00a0atividades\u00a0ilegais, mas\u00a0ficaria\u00a0surpreendido\u00a0ao\u00a0descobrir\u00a0que\u00a0nem\u00a0todos\u00a0os\u00a0hackers\u00a0s\u00e3o\u00a0vil\u00f5es. No\u00a0mundo\u00a0cada\u00a0vez\u00a0mais\u00a0tecnol\u00f3gico\u00a0em\u00a0que\u00a0vivemos,\u00a0existem\u00a0hackers de\u00a0todos\u00a0os\u00a0tipos.\u00a0 Esta\u00a0\u00e9\u00a0uma\u00a0amostra\u00a0do que\u00a0fazem\u00a0e\u00a0porque\u00a0o\u00a0fazem:\u00a0 Hackers de\u00a0chap\u00e9u\u00a0branco:\u00a0 estes\u00a0s\u00e3o\u00a0os\u00a0her\u00f3is,\u00a0peritos\u00a0de\u00a0seguran\u00e7a\u00a0inform\u00e1tica\u00a0especializados\u00a0em\u00a0testes de\u00a0infiltra\u00e7\u00e3o\u00a0e\u00a0outras\u00a0metodologias\u00a0para\u00a0garantir\u00a0que\u00a0os\u00a0sistemas\u00a0de\u00a0uma\u00a0empresa\u00a0s\u00e3o\u00a0seguros. Estes\u00a0profissionais\u00a0de TI\u00a0apoiam-se num arsenal\u00a0tecnol\u00f3gico\u00a0para&#8230;<\/p>\n","protected":false},"author":674,"featured_media":97373,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11953],"tags":[],"coauthors":[16310],"class_list":["post-98023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-na-internet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>9 tipos de hackers e as suas motiva\u00e7\u00f5es | Blog da McAfee<\/title>\n<meta name=\"description\" content=\"Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9 tipos de hackers e as suas motiva\u00e7\u00f5es | Blog da McAfee\" \/>\n<meta property=\"og:description\" content=\"Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog da McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-13T22:14:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T07:23:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1265\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"9 tipos de hackers e as suas motiva\u00e7\u00f5es\",\"datePublished\":\"2019-12-13T22:14:04+00:00\",\"dateModified\":\"2025-06-11T07:23:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/\"},\"wordCount\":737,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"articleSection\":[\"Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/\",\"name\":\"9 tipos de hackers e as suas motiva\u00e7\u00f5es | Blog da McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"datePublished\":\"2019-12-13T22:14:04+00:00\",\"dateModified\":\"2025-06-11T07:23:30+00:00\",\"description\":\"Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"width\":1920,\"height\":1265,\"caption\":\"woman using her phone on the couch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a na Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"9 tipos de hackers e as suas motiva\u00e7\u00f5es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\",\"name\":\"Blog da McAfee\",\"description\":\"Not\u00edcias sobre seguran\u00e7a na Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-br\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9 tipos de hackers e as suas motiva\u00e7\u00f5es | Blog da McAfee","description":"Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"9 tipos de hackers e as suas motiva\u00e7\u00f5es | Blog da McAfee","og_description":"Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de","og_url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/","og_site_name":"Blog da McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-12-13T22:14:04+00:00","article_modified_time":"2025-06-11T07:23:30+00:00","og_image":[{"width":1920,"height":1265,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Escrito por":"McAfee","Est. tempo de leitura":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"9 tipos de hackers e as suas motiva\u00e7\u00f5es","datePublished":"2019-12-13T22:14:04+00:00","dateModified":"2025-06-11T07:23:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/"},"wordCount":737,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","articleSection":["Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/","name":"9 tipos de hackers e as suas motiva\u00e7\u00f5es | Blog da McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","datePublished":"2019-12-13T22:14:04+00:00","dateModified":"2025-06-11T07:23:30+00:00","description":"Desde\u00a0ataques de ransomware\u00a0incapacitantes\u00a0que\u00a0pararam\u00a0empresas\u00a0e\u00a0cidades\u00a0at\u00e9\u00a0fugas\u00a0de","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","width":1920,"height":1265,"caption":"woman using her phone on the couch"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/9-tipos-de-hackers-e-as-suas-motivacoes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a na Internet","item":"https:\/\/www.mcafee.com\/blogs\/pt-br\/seguranca-na-internet\/"},{"@type":"ListItem","position":3,"name":"9 tipos de hackers e as suas motiva\u00e7\u00f5es"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#website","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/","name":"Blog da McAfee","description":"Not\u00edcias sobre seguran\u00e7a na Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.mcafee.com\/blogs\/pt-br\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/pt-br\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/98023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/comments?post=98023"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/98023\/revisions"}],"predecessor-version":[{"id":215512,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/posts\/98023\/revisions\/215512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/media\/97373"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/media?parent=98023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/categories?post=98023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/tags?post=98023"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-br\/wp-json\/wp\/v2\/coauthors?post=98023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}