{"id":1,"date":"2013-09-01T06:16:53","date_gmt":"2013-09-01T06:16:53","guid":{"rendered":"http:\/\/www.xlabs.com.br\/blog\/?p=1"},"modified":"2021-08-27T12:53:38","modified_gmt":"2021-08-27T15:53:38","slug":"malwares-utilizando-extensoes-cpl","status":"publish","type":"post","link":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/","title":{"rendered":"Malwares utilizando extens\u00f5es .cpl"},"content":{"rendered":"<p>Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do <a href=\"https:\/\/www.xlabs.com.br\/solucoes\/security-operation-center\/\">SOC (Security Operation Center)<\/a>, ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de e-mail&#8217;s confi\u00e1veis, em coopera\u00e7\u00e3o com o cliente acessamos a sua esta\u00e7\u00e3o de trabalho e damos inicio a mais um chamado.<\/p>\n<p>Ao acessarmos o computador do cliente, o mesmo demonstra o e-mail suspeito para o analista que est\u00e1 atuando na situa\u00e7\u00e3o, o analista ao reparar o e-mail j\u00e1 detecta como uma poss\u00edvel amea\u00e7a ao usu\u00e1rio, conforme podemos demonstrar na imagem:<\/p>\n<p style=\"text-align: center;\">&nbsp;<a href=\"\/blog\/?attachment_id=17#main\" target=\"_blank\" rel=\"attachment noopener wp-att-17 noreferrer\"><img decoding=\"async\" class=\"aligncenter  wp-image-17\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/Email-300x187.jpg\" alt=\"Email\" width=\"526\" height=\"328\" srcset=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Email-300x187.jpg 300w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Email.jpg 796w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/><\/a><\/p>\n<p>O cliente informou ao analista que n\u00e3o possui nenhum d\u00e9bito com esta pessoa para a mesma estar a enviar um boleto via e-mail, portanto classificamos o e-mail como de risco e o enviamos a equipe do <a href=\"https:\/\/www.xlabs.com.br\/solucoes\/security-operation-center\/\">SOC da XLabs<\/a> para ser melhor analisado por toda a equipe, conforme foi constatado com nosso cliente, o mesmo informou que n\u00e3o efetuou o download e nem executou a aplica\u00e7\u00e3o suspeita em seu computador, mostrando que o treinamento de conscientiza\u00e7\u00e3o da cultura de Seguran\u00e7a da Informa\u00e7\u00e3o oferecido pela XLabs Security foi eficiente.<\/p>\n<p>Ap\u00f3s o envio do e-mail suspeito para a equipe da <a href=\"https:\/\/www.xlabs.com.br\/\">XLabs Security<\/a> o mesmo foi removido do cliente de e-mail do usu\u00e1rio, as primeiras an\u00e1lises efetuadas por nossa equipe do <a href=\"https:\/\/www.xlabs.com.br\/solucoes\/security-operation-center\/\">SOC<\/a> demonstram no c\u00f3digo fonte do e-mail os link&#8217;s aos quais iriam levar o usu\u00e1rio a um website que hospeda uma vers\u00e3o do Malware compactada, conforme podemos ver na seguinte imagem:<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/Fonte_Email2.jpg\"><img decoding=\"async\" class=\"aligncenter wp-image-26 size-full\" src=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Fonte_Email2.jpg\" alt=\"Fonte_Email2\" width=\"1339\" height=\"381\" srcset=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Fonte_Email2.jpg 1339w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Fonte_Email2-300x85.jpg 300w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Fonte_Email2-1024x291.jpg 1024w\" sizes=\"(max-width: 1339px) 100vw, 1339px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><em>A imagem foi modificada no dom\u00ednio utilizado para a dissemina\u00e7\u00e3o do Malware.<\/em><\/p>\n<p style=\"text-align: left;\">Ao clicarmos no link oferecido pelo e-mail&nbsp;somos direcionados ao download do arquivo <strong>Boleto_Cliente_000473845.PDF.zip,<\/strong>&nbsp;que cont\u00e9m o seguinte artefato&nbsp;<strong>Boleto_Cliente_000473845.PDF.cpl<\/strong>, nossos analistas ao perceberem que se tratava de um novo Malware enviaram este artefato suspeito ao nosso sistema de an\u00e1lises din\u00e2micas de execut\u00e1veis w32&nbsp;<a href=\"..\/?page_id=11\">ThorWeb<\/a>, ao qual constatou se tratar realmente de um Malware classificado em nossos sistemas com o nome de&nbsp;Trojan.Win32.ChePro.rue de protocolo&nbsp;458F97DD727242388500D1368628C7C7.<\/p>\n<p style=\"text-align: left;\">No inicio do post&nbsp;citamos o aumento de Malwares utilizando as extens\u00f5es CPL e s\u00f3 foi&nbsp;citado este caso, por\u00e9m nossos sensores espalhados pela rede mundial de computadores em apenas uma semana recolheram aproximadamente 36 amostras de Malwares diferentes, com o mesmo tipo de extens\u00e3o, a Control Panel Application ou CPL assim demonstrando o atual interesse de cibercriminosos em utilizar extens\u00f5es pouco conhecidas pelos usu\u00e1rios.<\/p>\n<p style=\"text-align: left;\">Como podemos&nbsp;observar alguns protocolos arquivados em nosso sistema <a href=\"..\/?page_id=11\">ThorWeb<\/a>:<\/p>\n<table border=\"0\" width=\"697\" cellspacing=\"0\" cellpadding=\"0\">\n<colgroup>\n<col width=\"261\">\n<col width=\"436\"> <\/colgroup>\n<tbody>\n<tr>\n<td width=\"261\" height=\"20\">Protocolo<\/td>\n<td width=\"436\">File Name<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">35E226317617DBE41FF2F92DAF3C84E9<\/td>\n<td>Boleto_Emitido_vlr1980.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">D39C5E48DA3647B55DC1CC7B4EA66051<\/td>\n<td>comprovante.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">80133A33665448011B50EC35A529BB1A<\/td>\n<td>Flash11.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">5BA371E953A47BBBCBD9CE4A06210425<\/td>\n<td>instagramvideomsg.avi.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">99AB1ABDD12F873BE825CEDC5DA35000<\/td>\n<td>BoletoBradesco.jpg.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">B2611E5B0A5C4294FAECEEFE76898426<\/td>\n<td>Documentos.Anexo.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">D6F91931377821806F8BB731CF2282FB<\/td>\n<td>Cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">FB29DE1CBEC56E9EEC75C90A216587C6<\/td>\n<td>Protesto-cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">373877427EAB1DC620761711A2BE8ECF<\/td>\n<td>08272343.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">F68A41A411888EEF99D79CEC0E4C2888<\/td>\n<td>Copia_Cheques_Devolvidos_019281993_IMAGEM_JPG_..3765432.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">4D7D868CBB61C73C888C64077492D16A<\/td>\n<td>protocolo_doc.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">663864B31EC7176D28E957294B11899C<\/td>\n<td>Cotacao.CPL<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">458F97DD727242388500D1368628C7C7<\/td>\n<td>Boleto_Cliente_000473845.PDF.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">68AA584B7A16720997F05C41FA5747B3<\/td>\n<td>Boleto-id-110992.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">C9D8EAFE2CA7024216EA69A65333DBF5<\/td>\n<td>B.cobranca.pdf.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">46B4EFE6089F518A9FFC6CD2F01E6E5C<\/td>\n<td>cheque012011.jpg.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">4E3123CA77C1E26BDE3C58E1BA522FA5<\/td>\n<td>Notificacao.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">FCB7DE5EFFD86A7270F321B1D215506F<\/td>\n<td>Foto_Printscrean-conversa_safada_a_ex-amiga.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">C0E0EF6FB5E37B27E961028B1B82B2A4<\/td>\n<td>Mensagem_de_Voz_Facebook.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">D3C4BE5F9EC617DAA38AD450F2A637B4<\/td>\n<td>Copia_dos_Documentos.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">53096C6E2712779BD3B586EFAFFAD1AE<\/td>\n<td>Copia_Documentos.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">E7CCB8754EEB70D7BFDDB252A956D136<\/td>\n<td>install_flashplayer11x32ax_gtba_chra_dy_aih.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">3697DDB98D6BCABB8F834194BEFEC162<\/td>\n<td>Copia_Documentos.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">563135C2E446BA7670EAFF1435A0EA5A<\/td>\n<td>flash_player_install_v12.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">34D2C6AC481679AF88EAA02F06ECB633<\/td>\n<td>Nota-Fiscal.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">F3CD2B248C423942DD603105A1130F53<\/td>\n<td>Cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">5DB6A615893789EF2494C48B1784DC92<\/td>\n<td>Fotos.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">342CE3C1AE77A188D3DD519619ACF417<\/td>\n<td>Cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">50FE01B51EABA861BFA3FA9E5164246A<\/td>\n<td>Cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">0F55B0BBABB79F379BDDA373285826DE<\/td>\n<td>Cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">797CF6D0BE928CF7FA7D4EBBECE43C5A<\/td>\n<td>ComentarioDeVoz.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">A6942DAC6ABABC202AD96C08946D7DC5<\/td>\n<td>ComentarioDeVoz.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">7965AD6B629C1C0B5D1E11CD9BA3B45A<\/td>\n<td>Fotos.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">1C6F5DA0DD0B9E8486AE08E1FDED0E80<\/td>\n<td>Cheque.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">F5DF502918DAD8544B665795CD8AF3A3<\/td>\n<td>Install_Flash_Player_11.1.102.755.cpl<\/td>\n<\/tr>\n<tr>\n<td height=\"20\">04A32540238EB8C93815EE2CD42BE540<\/td>\n<td>install_flashplayer_aih_update_win.cpl<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do SOC (Security Operation Center), ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1694,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[24,30,31,29,26,25,28,32,27],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog<\/title>\n<meta name=\"description\" content=\"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog\" \/>\n<meta property=\"og:description\" content=\"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do SOC (Security Operation Center), ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de e-mail&#039;s confi\u00e1veis, em coopera\u00e7\u00e3o com o cliente acessamos a sua esta\u00e7\u00e3o de trabalho e damos inicio a mais um chamado.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\" \/>\n<meta property=\"og:site_name\" content=\"XLabs Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xlabs\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-01T06:16:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-27T15:53:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/malwares-utilizando-extensoes-cpl-blog-post-xlabs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mauricio Corr\u00eaa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog\" \/>\n<meta name=\"twitter:description\" content=\"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do SOC (Security Operation Center), ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de e-mail&#039;s confi\u00e1veis, em coopera\u00e7\u00e3o com o cliente acessamos a sua esta\u00e7\u00e3o de trabalho e damos inicio a mais um chamado.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/malwares-utilizando-extensoes-cpl-blog-post-xlabs.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mauricio Corr\u00eaa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\"},\"author\":{\"name\":\"Mauricio Corr\u00eaa\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d\"},\"headline\":\"Malwares utilizando extens\u00f5es .cpl\",\"datePublished\":\"2013-09-01T06:16:53+00:00\",\"dateModified\":\"2021-08-27T15:53:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\"},\"wordCount\":858,\"publisher\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\"},\"keywords\":[\".cpl malware\",\"458F97DD727242388500D1368628C7C7\",\"Boleto_Cliente_000473845.PDF.cpl\",\"Boleto_Cliente_000473845.PDF.zip\",\"Control Panel Application\",\"CPL\",\"Malware\",\"Trojan.Win32.ChePro.rue\",\"Windows Malware\"],\"articleSection\":[\"Casos de Seguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\",\"name\":\"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#website\"},\"datePublished\":\"2013-09-01T06:16:53+00:00\",\"dateModified\":\"2021-08-27T15:53:38+00:00\",\"description\":\"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.xlabs.com.br\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malwares utilizando extens\u00f5es .cpl\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#website\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/\",\"name\":\"XLabs Security Blog\",\"description\":\"Seguran\u00e7a da Informa\u00e7\u00e3o\",\"publisher\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.xlabs.com.br\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\",\"name\":\"XLabs Security\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png\",\"contentUrl\":\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png\",\"width\":478,\"height\":168,\"caption\":\"XLabs Security\"},\"image\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/xlabs.security\",\"https:\/\/www.linkedin.com\/company\/xlabs-security\/\",\"https:\/\/www.youtube.com\/channel\/UCPbGDmCQI7_UcAPmvVLi58g?view_as=subscriber\",\"https:\/\/www.facebook.com\/xlabs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d\",\"name\":\"Mauricio Corr\u00eaa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g\",\"caption\":\"Mauricio Corr\u00eaa\"},\"url\":\"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog","description":"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/","og_locale":"pt_BR","og_type":"article","og_title":"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog","og_description":"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do SOC (Security Operation Center), ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de e-mail's confi\u00e1veis, em coopera\u00e7\u00e3o com o cliente acessamos a sua esta\u00e7\u00e3o de trabalho e damos inicio a mais um chamado.","og_url":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/","og_site_name":"XLabs Security Blog","article_publisher":"https:\/\/www.facebook.com\/xlabs","article_published_time":"2013-09-01T06:16:53+00:00","article_modified_time":"2021-08-27T15:53:38+00:00","og_image":[{"width":1000,"height":488,"url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/malwares-utilizando-extensoes-cpl-blog-post-xlabs.png","type":"image\/png"}],"author":"Mauricio Corr\u00eaa","twitter_card":"summary_large_image","twitter_title":"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog","twitter_description":"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do SOC (Security Operation Center), ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de e-mail's confi\u00e1veis, em coopera\u00e7\u00e3o com o cliente acessamos a sua esta\u00e7\u00e3o de trabalho e damos inicio a mais um chamado.","twitter_image":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/malwares-utilizando-extensoes-cpl-blog-post-xlabs.png","twitter_misc":{"Escrito por":"Mauricio Corr\u00eaa","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/#article","isPartOf":{"@id":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/"},"author":{"name":"Mauricio Corr\u00eaa","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d"},"headline":"Malwares utilizando extens\u00f5es .cpl","datePublished":"2013-09-01T06:16:53+00:00","dateModified":"2021-08-27T15:53:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/"},"wordCount":858,"publisher":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#organization"},"keywords":[".cpl malware","458F97DD727242388500D1368628C7C7","Boleto_Cliente_000473845.PDF.cpl","Boleto_Cliente_000473845.PDF.zip","Control Panel Application","CPL","Malware","Trojan.Win32.ChePro.rue","Windows Malware"],"articleSection":["Casos de Seguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/","url":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/","name":"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog","isPartOf":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#website"},"datePublished":"2013-09-01T06:16:53+00:00","dateModified":"2021-08-27T15:53:38+00:00","description":"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows...","breadcrumb":{"@id":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.xlabs.com.br\/blog\/"},{"@type":"ListItem","position":2,"name":"Malwares utilizando extens\u00f5es .cpl"}]},{"@type":"WebSite","@id":"https:\/\/www.xlabs.com.br\/blog\/#website","url":"https:\/\/www.xlabs.com.br\/blog\/","name":"XLabs Security Blog","description":"Seguran\u00e7a da Informa\u00e7\u00e3o","publisher":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.xlabs.com.br\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.xlabs.com.br\/blog\/#organization","name":"XLabs Security","url":"https:\/\/www.xlabs.com.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png","contentUrl":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png","width":478,"height":168,"caption":"XLabs Security"},"image":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/xlabs.security","https:\/\/www.linkedin.com\/company\/xlabs-security\/","https:\/\/www.youtube.com\/channel\/UCPbGDmCQI7_UcAPmvVLi58g?view_as=subscriber","https:\/\/www.facebook.com\/xlabs"]},{"@type":"Person","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d","name":"Mauricio Corr\u00eaa","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g","caption":"Mauricio Corr\u00eaa"},"url":"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":23,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":1696,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/1\/revisions\/1696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/media\/1694"}],"wp:attachment":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}