{"id":98033,"date":"2019-12-13T15:39:27","date_gmt":"2019-12-13T23:39:27","guid":{"rendered":"\/blogs\/?p=98033"},"modified":"2025-06-11T03:18:31","modified_gmt":"2025-06-11T10:18:31","slug":"9-tipos-de-hackers-e-suas-motivacoes","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/","title":{"rendered":"9 Tipos de hackers e suas motiva\u00e7\u00f5es"},"content":{"rendered":"<p><span data-contrast=\"auto\">Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0<\/span><a href=\"https:\/\/www.csoonline.com\/article\/534628\/the-biggest-data-breaches-of-the-21st-century.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">ransomware<\/span><\/a><span data-contrast=\"auto\">\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de dados\u00a0massivos\u00a0que\u00a0chegam\u00a0a\u00a0expor\u00a0informa\u00e7\u00f5es\u00a0de\u00a0milh\u00f5es\u00a0de\u00a0clientes,\u00a0os\u00a0ciberataques\u00a0s\u00e3o\u00a0parte\u00a0corriqueira\u00a0das\u00a0not\u00edcias\u00a0ultimamente, mas\u00a0n\u00e3o\u00a0sabemos\u00a0muito\u00a0sobre\u00a0os\u00a0hackers\u00a0enquanto\u00a0pessoas.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00c9\u00a0\u00f3bvio\u00a0que\u00a0muitos\u00a0deles\u00a0mant\u00eam\u00a0suas\u00a0identidades\u00a0ocultas\u00a0em\u00a0decorr\u00eancia\u00a0de\u00a0suas\u00a0atividades\u00a0criminosas, mas\u00a0voc\u00ea\u00a0pode\u00a0se\u00a0surpreender\u00a0ao\u00a0descobrir\u00a0que\u00a0nem\u00a0todos\u00a0os\u00a0hackers\u00a0s\u00e3o\u00a0maus.\u00a0Em\u00a0um\u00a0mundo\u00a0progressivamente\u00a0tecnol\u00f3gico,\u00a0existem\u00a0hackers de\u00a0todos\u00a0os\u00a0tipos.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"auto\">Abaixo\u00a0mencionamos\u00a0brevemente\u00a0o que\u00a0eles\u00a0fazem\u00a0e por\u00a0qu\u00ea:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Hackers White Hat:<\/span><\/b><span data-contrast=\"auto\"> Esses s\u00e3o os hackers bonzinhos. S\u00e3o especialistas em seguran\u00e7a computacional que se concentram em fazer testes de penetra\u00e7\u00e3o e outras metodologias de modo a garantir que os sistemas de informa\u00e7\u00e3o de empresas s\u00e3o realmente seguros. Esses profissionais de seguran\u00e7a de TI usam um arsenal em constante evolu\u00e7\u00e3o para enfrentar os hackers &#8220;ruins&#8221;.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers Black Hat:<\/span><\/b><span data-contrast=\"auto\"> Esses s\u00e3o os hackers malvados, geralmente chamados simplesmente de hackers. O termo costuma ser usado especificamente para criminosos que invadem redes ou computadores, ou ainda que criam v\u00edrus de computador. Hackers do tipo Black Hat continuam a agir mais rapidamente do que os do tipo White Hat. Eles costumam encontrar o caminho que oferece menor resist\u00eancia &#8211; seja erro humano ou neglig\u00eancia &#8211; ou criam um novo tipo de ataque. Puristas usam o termo &#8220;crackers&#8221; para se referir aos hackers do tipo Black Hat. A motiva\u00e7\u00e3o desse tipo costuma ser vantagens monet\u00e1rias.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers Gray Hat<\/span><\/b><br \/>\n<span data-contrast=\"auto\">Esses s\u00e3o hackers que n\u00e3o usam suas habilidades para benef\u00edcio pr\u00f3prio, mas n\u00e3o operam de forma totalmente legal. Por exemplo, um hacker que invada o sistema de uma empresa para revelar uma vulnerabilidade e poste a descoberta na internet pode, em \u00faltima inst\u00e2ncia, estar fazendo algo positivo para os clientes daquela empresa, mas, por outro lado, comprometeram um sistema sem permiss\u00e3o. <\/span><\/p>\n<p><span data-contrast=\"auto\">Se\u00a0este\u00a0mesmo\u00a0hacker\u00a0solicitar\u00a0dinheiro\u00a0da\u00a0empresa\u00a0para\u00a0n\u00e3o\u00a0revelar\u00a0a\u00a0vulnerabilidade,\u00a0nesse\u00a0caso\u00a0o\u00a0limite\u00a0seria\u00a0transposto\u00a0e\u00a0ele\u00a0estaria\u00a0agindo\u00a0como\u00a0um hacker do\u00a0tipo\u00a0Black Hat, operando\u00a0totalmente\u00a0para\u00a0ganho\u00a0pr\u00f3prio.<\/span><br \/>\n<span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Script Kiddies:<\/span><\/b><span data-contrast=\"auto\">\u00a0Termo\u00a0pejorativo\u00a0indicando\u00a0hackers Black Hat que\u00a0usam\u00a0programas\u00a0baixados\u00a0da internet para\u00a0atacar\u00a0redes,\u00a0alterar\u00a0sites para se\u00a0tornarem\u00a0conhecidos.<\/span> <span data-contrast=\"auto\">Alguns &#8220;script kiddies&#8221; se enquadram na categoria &#8220;Green Hat&#8221;: s\u00e3o amadores curiosos que desejam aprender e um dia se tornar hackers de verdade.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hacktivists:<\/span><\/b><span data-contrast=\"auto\">\u00a0Hackers que\u00a0almejam\u00a0fazer\u00a0parte\u00a0de\u00a0mudan\u00e7as\u00a0sociais. A\u00a0revela\u00e7\u00e3o\u00a0de\u00a0transgress\u00f5es,\u00a0ou\u00a0ganhos\u00a0religiosos\u00a0ou\u00a0pol\u00edticos\u00a0motivam\u00a0alguns\u00a0hacktivists.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Por exemplo, durante a Primavera \u00c1rabe, alguns hacktivists trabalharam para oferecer m\u00e9todos de comunica\u00e7\u00e3o seguros a grupos amea\u00e7ados, al\u00e9m de acesso a p\u00e1ginas da web censuradas por governos.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers\u00a0patrocinados\u00a0por\u00a0governos:<\/span><\/b><span data-contrast=\"auto\"> Governos ao redor do mundo est\u00e3o conscientes de que \u00e9 \u00fatil a seus objetivos militares estarem bem posicionados no mundo on-line. O ditado costumava ser &#8220;quem controla os mares, controla o mundo&#8221;. Passou a ser &#8220;quem controla os ares, controla o mundo&#8221;. Hoje o controle do ciberespa\u00e7o \u00e9 decisivo. Hackers patrocinados por governos n\u00e3o t\u00eam limite de tempo e contam com or\u00e7amento para focar civis, empresas e outros governos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hackers\u00a0espi\u00f5es:<\/span><\/b><span data-contrast=\"auto\"> Empresas contratam hackers para que se infiltrem em concorrentes e roubem segredos comerciais. Esses hackers podem tentar ataques externos ou podem conseguir empregos para agir como infiltrados. Hackers espi\u00f5es podem usar t\u00e1ticas semelhantes \u00e0s de hacktivists, mas sua \u00fanica meta \u00e9 atingir os objetivos do cliente e obter benef\u00edcios monet\u00e1rios.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Whistleblowers<\/span><\/b><span data-contrast=\"auto\">:\u00a0Trata-se de\u00a0uma\u00a0pessoa\u00a0inserida\u00a0em\u00a0uma\u00a0organiza\u00e7\u00e3o\u00a0que\u00a0usa\u00a0seu\u00a0acesso\u00a0a\u00a0sistemas\u00a0para\u00a0vazar\u00a0informa\u00e7\u00f5es\u00a0que\u00a0podem\u00a0ser\u00a0preocupantes.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Por outro\u00a0lado,\u00a0esta\u00a0pessoa\u00a0inserida\u00a0pode\u00a0ter\u00a0inten\u00e7\u00f5es\u00a0mal-intencionadas\u00a0ou\u00a0querer\u00a0vingan\u00e7a\u00a0contra\u00a0a\u00a0empresa. Esses hackers\u00a0podem\u00a0acessar\u00a0informa\u00e7\u00f5es\u00a0para vender\u00a0segredos\u00a0comerciais\u00a0ou\u00a0conseguir\u00a0emprego\u00a0em\u00a0outras\u00a0empresas. Nesse\u00a0caso,\u00a0s\u00e3o\u00a0chamados\u00a0de &#8220;Infiltrados\u00a0mal-intencionados&#8221;.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ciberterroristas:<\/span><\/b><span data-contrast=\"auto\"> Geralmente motivados por cren\u00e7as religiosas ou pol\u00edticas, esses hackers tentam criar medo e caos ao interromper o funcionamento de servi\u00e7os cruciais de infraestrutura. Os ciberterroristas s\u00e3o, de longe, os mais perigosos e contam com uma ampla variedade de habilidades e objetivos. Em \u00faltima inst\u00e2ncia, a motiva\u00e7\u00e3o de ciberterroristas \u00e9 espalhar medo, terror e viol\u00eancia.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Certifique-se de\u00a0manter\u00a0suas\u00a0informa\u00e7\u00f5es\u00a0sens\u00edveis\u00a0protegidas\u00a0de\u00a0todos\u00a0os\u00a0tipos\u00a0de hackers\u00a0usando\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">softwares d\u00a0 seguran\u00e7a<\/span><\/a><span data-contrast=\"auto\">\u00a0completos\u00a0que\u00a0incluam\u00a0prote\u00e7\u00e3o\u00a0contra\u00a0roubo\u00a0de\u00a0identidade.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Robert Siciliano \u00e9\u00a0especialista\u00a0em\u00a0roubo\u00a0de\u00a0identidade\u00a0e consultor da McAfee.\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p aria-level=\"1\"><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de dados\u00a0massivos\u00a0que\u00a0chegam\u00a0a\u00a0expor\u00a0informa\u00e7\u00f5es\u00a0de\u00a0milh\u00f5es\u00a0de\u00a0clientes,\u00a0os\u00a0ciberataques\u00a0s\u00e3o\u00a0parte\u00a0corriqueira\u00a0das\u00a0not\u00edcias\u00a0ultimamente, mas\u00a0n\u00e3o\u00a0sabemos\u00a0muito\u00a0sobre\u00a0os\u00a0hackers\u00a0enquanto\u00a0pessoas.\u00a0 \u00c9\u00a0\u00f3bvio\u00a0que\u00a0muitos\u00a0deles\u00a0mant\u00eam\u00a0suas\u00a0identidades\u00a0ocultas\u00a0em\u00a0decorr\u00eancia\u00a0de\u00a0suas\u00a0atividades\u00a0criminosas, mas\u00a0voc\u00ea\u00a0pode\u00a0se\u00a0surpreender\u00a0ao\u00a0descobrir\u00a0que\u00a0nem\u00a0todos\u00a0os\u00a0hackers\u00a0s\u00e3o\u00a0maus.\u00a0Em\u00a0um\u00a0mundo\u00a0progressivamente\u00a0tecnol\u00f3gico,\u00a0existem\u00a0hackers de\u00a0todos\u00a0os\u00a0tipos.\u00a0 Abaixo\u00a0mencionamos\u00a0brevemente\u00a0o que\u00a0eles\u00a0fazem\u00a0e por\u00a0qu\u00ea:\u00a0 Hackers White Hat: Esses s\u00e3o os hackers bonzinhos. S\u00e3o especialistas em&#8230;<\/p>\n","protected":false},"author":674,"featured_media":97374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14389],"tags":[],"coauthors":[16332],"class_list":["post-98033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>9 Tipos de hackers e suas motiva\u00e7\u00f5es | Blogue da McAfee<\/title>\n<meta name=\"description\" content=\"Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9 Tipos de hackers e suas motiva\u00e7\u00f5es | Blogue da McAfee\" \/>\n<meta property=\"og:description\" content=\"Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogue da McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-13T23:39:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T10:18:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"9 Tipos de hackers e suas motiva\u00e7\u00f5es\",\"datePublished\":\"2019-12-13T23:39:27+00:00\",\"dateModified\":\"2025-06-11T10:18:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"articleSection\":[\"Seguran\u00e7a da Internet\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/\",\"name\":\"9 Tipos de hackers e suas motiva\u00e7\u00f5es | Blogue da McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"datePublished\":\"2019-12-13T23:39:27+00:00\",\"dateModified\":\"2025-06-11T10:18:31+00:00\",\"description\":\"Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg\",\"width\":1920,\"height\":1281,\"caption\":\"Working from home\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a da Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"9 Tipos de hackers e suas motiva\u00e7\u00f5es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/\",\"name\":\"Blogue da McAfee\",\"description\":\"Not\u00edcias sobre seguran\u00e7a na Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9 Tipos de hackers e suas motiva\u00e7\u00f5es | Blogue da McAfee","description":"Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_PT","og_type":"article","og_title":"9 Tipos de hackers e suas motiva\u00e7\u00f5es | Blogue da McAfee","og_description":"Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de","og_url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/","og_site_name":"Blogue da McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-12-13T23:39:27+00:00","article_modified_time":"2025-06-11T10:18:31+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Escrito por":"McAfee","Tempo estimado de leitura":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"9 Tipos de hackers e suas motiva\u00e7\u00f5es","datePublished":"2019-12-13T23:39:27+00:00","dateModified":"2025-06-11T10:18:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/"},"wordCount":786,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","articleSection":["Seguran\u00e7a da Internet"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/","name":"9 Tipos de hackers e suas motiva\u00e7\u00f5es | Blogue da McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","datePublished":"2019-12-13T23:39:27+00:00","dateModified":"2025-06-11T10:18:31+00:00","description":"Desde\u00a0ataques\u00a0devastadores\u00a0de\u00a0ransomware\u00a0que\u00a0interromperam\u00a0o\u00a0funcionamento\u00a0de\u00a0empresas\u00a0e\u00a0cidades\u00a0a\u00a0vazamentos\u00a0de","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/new-red-stock-image-2-min.jpeg","width":1920,"height":1281,"caption":"Working from home"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/9-tipos-de-hackers-e-suas-motivacoes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a da Internet","item":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/internet-security\/"},{"@type":"ListItem","position":3,"name":"9 Tipos de hackers e suas motiva\u00e7\u00f5es"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/","name":"Blogue da McAfee","description":"Not\u00edcias sobre seguran\u00e7a na Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts\/98033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/comments?post=98033"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts\/98033\/revisions"}],"predecessor-version":[{"id":215530,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts\/98033\/revisions\/215530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/media\/97374"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/media?parent=98033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/categories?post=98033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/tags?post=98033"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/coauthors?post=98033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}