﻿{"id":19150,"date":"2014-12-01T07:45:04","date_gmt":"2014-12-01T09:45:04","guid":{"rendered":"http:\/\/www.magicwebdesign.com.br\/blog\/?p=19150"},"modified":"2026-01-20T15:20:46","modified_gmt":"2026-01-20T18:20:46","slug":"symantec-identifica-supervirus-espiao","status":"publish","type":"post","link":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/","title":{"rendered":"Symantec identifica superv\u00edrus espi\u00e3o"},"content":{"rendered":"<p style=\"text-align: justify;\">Pesquisadores da Symantec, uma das principais empresas de seguran\u00e7a da informa\u00e7\u00e3o do mundo, anunciaram a <strong>descoberta de um novo tipo de Trojan que pode estar sendo usado para espionar empresas e governos desde 2008.<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Apelidado de \u201cRegin\u201d, o v\u00edrus \u00e9 extremamente complexo, e possui uma estrutura rara, com diversas camadas de criptografia<\/strong> utilizadas para esconder a verdadeira inten\u00e7\u00e3o do malware. <a href=\"http:\/\/www.theverge.com\/2014\/11\/23\/7272157\/regin-malware-has-secretly-spied-on-computers-for-years\" target=\"_blank\" rel=\"noopener\"><strong>De acordo com o site The Verge<\/strong><\/a>, a estrutura \u00e9 t\u00e3o elaborada que os pesquisadores tiveram que decifrar diversos pacotes de dados apenas para ter uma ideia do que o programa estava fazendo, e que esta complexidade sugere que o v\u00edrus tenha sido desenvolvido por um governo ou uma grande empresa de tecnologia.<\/p>\n<p style=\"text-align: justify;\"><!--more--><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.symantec.com\/connect\/blogs\/regin-top-tier-espionage-tool-enables-stealthy-surveillance\" target=\"_blank\" rel=\"noopener\"><strong>Segundo a Symantec<\/strong><\/a>, o v\u00edrus espi\u00e3o foi encontrado no M\u00e9xico, Irlanda, \u00cdndia, Afeganist\u00e3o, Ir\u00e3, B\u00e9lgica, \u00c1ustria e Paquist\u00e3o. Por\u00e9m, mais da <strong>metade dos casos confirmados foram detectados na R\u00fassia e na Ar\u00e1bia Saudita<\/strong>. Aproximadamente 75% das infec\u00e7\u00f5es foram registradas em provedores de internet e empresas de telecomunica\u00e7\u00f5es, e as demais em empresas de energia, \u00f3rg\u00e3os de pesquisa e servi\u00e7os de hospedagem. <strong>A Symantec acredita que o objetivo do programa era coletar dados de pequenas empresas e servi\u00e7os<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Os pesquisadores afirmam que o<strong> v\u00edrus \u00e9 semelhante ao Stuxnet<\/strong>, que foi protagonista de um ataque cibern\u00e9tico ao sistema de opera\u00e7\u00e3o de uma usina de enriquecimento de ur\u00e2nio localizada no Ir\u00e3, em 2010, quando conseguiu parar um quinto das 5 mil centr\u00edfugas de enriquecimento da usina. <a href=\"http:\/\/www.nytimes.com\/2012\/06\/01\/world\/middleeast\/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all\" target=\"_blank\" rel=\"noopener\"><strong>Segundo o jornal The New York Times<\/strong><\/a>, o ataque fazia parte da ofensiva batizada de Olympic Games, promovida pelo governo de George Bush e refor\u00e7ada por Barack Obama.<\/p>\n<p style=\"text-align: justify;\">Por\u00e9m, o <strong>Regin possui caracter\u00edsticas muito mais perigosas<\/strong>. O malware \u00e9 altamente personaliz\u00e1vel, e consegue incorporar diferentes pacotes, sendo capaz de controlar remotamente o mouse e o teclado, tirar screenshots, recuperar arquivos apagados e at\u00e9 monitorar trechos espec\u00edficos de sistemas mais complexos. Segundo os pesquisadores, todas estas funcionalidades indicam que o programa foi criado pelo que eles chamam de \u201cgrande jogador\u201d, e que poucos pa\u00edses t\u00eam tecnologia para desenvolver algo assim, fazendo com que as suspeitas recaiam sobre Estados Unidos, China e Israel.<\/p>\n<p style=\"text-align: justify;\">Ainda n\u00e3o est\u00e1 claro como o v\u00edrus consegue acessar o sistema. Em apenas um caso o malware infectou o computador atrav\u00e9s de uma vulnerabilidade desconhecida do Yahoo Messenger, mas acredita-se que o programa utiliza vers\u00f5es falsas de sites populares ou falhas em <a href=\"https:\/\/www.redemagic.com\/blog\/tag\/aplicativo\/\"><strong>aplicativos<\/strong><\/a>.<\/p>\n<p style=\"text-align: justify;\">De acordo com o pesquisador Liam O&#8217;Murchu, <strong>a descoberta do v\u00edrus revelou uma campanha de espionagem que est\u00e1 ativa pelo menos desde 2008<\/strong>, cuja \u00faltima atualiza\u00e7\u00e3o \u00e9 de 2013. Com a divulga\u00e7\u00e3o, a Symantec acredita que deve revelar mais detalhes do programa nos pr\u00f3ximos meses.<\/p>\n<p><strong>Leia tamb\u00e9m: <a href=\"https:\/\/www.redemagic.com\/blog\/internet\/project-zero-busca-internet-mais-segura\/\">Project Zero: em busca de uma internet mais segura<\/a><\/strong><\/p>\n<p style=\"text-align: center; width: 655px;\"><span style=\"color: #000000;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/span><\/p>\n<p style=\"text-align: center;\">A <strong>Magic Web Design<\/strong> desenvolve, desde 1996, solu\u00e7\u00f5es completas para empresas de todo o Brasil nas \u00e1reas de internet e multim\u00eddia, com web sites, gerenciamento de m\u00eddias sociais, sistemas on-line, lojas virtuais (e-commerce), apresenta\u00e7\u00f5es multim\u00eddia e diversos outros servi\u00e7os.<br \/>\n<em><a href=\"https:\/\/www.redemagic.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.redemagic.com\/<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"text-align: justify;\">Pesquisadores da Symantec, uma das principais empresas de seguran\u00e7a da informa\u00e7\u00e3o do mundo, anunciaram a <strong>descoberta de um novo tipo de Trojan que pode estar sendo usado para espionar empresas e governos desde 2008.<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Apelidado de \u201cRegin\u201d, o v\u00edrus \u00e9 extremamente complexo, e possui uma estrutura rara, com diversas camadas de criptografia<\/strong> utilizadas para esconder a verdadeira inten\u00e7\u00e3o do malware. <a href=\"http:\/\/www.theverge.com\/2014\/11\/23\/7272157\/regin-malware-has-secretly-spied-on-computers-for-years\" target=\"_blank\" rel=\"noopener\"><strong>De acordo com o site The Verge<\/strong><\/a>, a estrutura \u00e9 t\u00e3o elaborada que os pesquisadores tiveram que decifrar diversos pacotes de dados apenas para ter uma ideia do que o programa estava fazendo, e que esta complexidade sugere que o v\u00edrus tenha sido desenvolvido por um governo ou uma grande empresa de tecnologia.<\/p>\n<p style=\"text-align: justify;\">\n","protected":false},"author":1,"featured_media":19152,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[56,12],"tags":[1695,891],"class_list":["post-19150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-tecnologia","tag-seguranca-na-internet","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Symantec identificou um superv\u00edrus espi\u00e3o<\/title>\n<meta name=\"description\" content=\"Pesquisadores da Symantec afirmam que o Regin esteve espionando empresas e governos desde 2008.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec identificou um superv\u00edrus espi\u00e3o\" \/>\n<meta property=\"og:description\" content=\"Pesquisadores afirmam que o Regin esteve espionando empresas e governos desde 2008.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/\" \/>\n<meta property=\"og:site_name\" content=\"Rede Magic\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/web.facebook.com\/RedeMagic\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-01T09:45:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T18:20:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2014\/11\/nuvem-tag-virus-Facebook-Magic.jpg\" \/>\n<meta name=\"author\" content=\"Magic Web Design\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Magic Web Design\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/\"},\"author\":{\"name\":\"Magic Web Design\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff94b5005a102b977d5e9847930aac3c\"},\"headline\":\"Symantec identifica superv\u00edrus espi\u00e3o\",\"datePublished\":\"2014-12-01T09:45:04+00:00\",\"dateModified\":\"2026-01-20T18:20:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/\"},\"wordCount\":531,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/nuvem-tag-virus-Magic.jpg\",\"keywords\":[\"seguran\u00e7a na internet\",\"v\u00edrus\"],\"articleSection\":[\"Internet\",\"Tecnologia\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/\",\"url\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/\",\"name\":\"Symantec identificou um superv\u00edrus espi\u00e3o\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/nuvem-tag-virus-Magic.jpg\",\"datePublished\":\"2014-12-01T09:45:04+00:00\",\"dateModified\":\"2026-01-20T18:20:46+00:00\",\"description\":\"Pesquisadores da Symantec afirmam que o Regin esteve espionando empresas e governos desde 2008.\",\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/tecnologia\\\/symantec-identifica-supervirus-espiao\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/nuvem-tag-virus-Magic.jpg\",\"contentUrl\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/11\\\/nuvem-tag-virus-Magic.jpg\",\"width\":555,\"height\":371},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/\",\"name\":\"Rede Magic\",\"description\":\"Ag\u00eancia de Total Marketing\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#organization\",\"name\":\"Rede Magic\",\"url\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo-RedeMagic.png\",\"contentUrl\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo-RedeMagic.png\",\"width\":660,\"height\":440,\"caption\":\"Rede Magic\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/web.facebook.com\\\/RedeMagic\",\"https:\\\/\\\/www.instagram.com\\\/redemagic\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/redemagic\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ff94b5005a102b977d5e9847930aac3c\",\"name\":\"Magic Web Design\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe38d590fcf82dfb6f7759031dbc772a10851578866099e7a0846ff832d6131?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe38d590fcf82dfb6f7759031dbc772a10851578866099e7a0846ff832d6131?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe38d590fcf82dfb6f7759031dbc772a10851578866099e7a0846ff832d6131?s=96&d=mm&r=g\",\"caption\":\"Magic Web Design\"},\"sameAs\":[\"http:\\\/\\\/www.magicwebdesign.com.br\"],\"url\":\"https:\\\/\\\/www.redemagic.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Symantec identificou um superv\u00edrus espi\u00e3o","description":"Pesquisadores da Symantec afirmam que o Regin esteve espionando empresas e governos desde 2008.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/","og_locale":"pt_BR","og_type":"article","og_title":"Symantec identificou um superv\u00edrus espi\u00e3o","og_description":"Pesquisadores afirmam que o Regin esteve espionando empresas e governos desde 2008.","og_url":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/","og_site_name":"Rede Magic","article_publisher":"https:\/\/web.facebook.com\/RedeMagic","article_published_time":"2014-12-01T09:45:04+00:00","article_modified_time":"2026-01-20T18:20:46+00:00","og_image":[{"url":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2014\/11\/nuvem-tag-virus-Facebook-Magic.jpg","type":"","width":"","height":""}],"author":"Magic Web Design","twitter_misc":{"Escrito por":"Magic Web Design","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/#article","isPartOf":{"@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/"},"author":{"name":"Magic Web Design","@id":"https:\/\/www.redemagic.com\/blog\/#\/schema\/person\/ff94b5005a102b977d5e9847930aac3c"},"headline":"Symantec identifica superv\u00edrus espi\u00e3o","datePublished":"2014-12-01T09:45:04+00:00","dateModified":"2026-01-20T18:20:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/"},"wordCount":531,"commentCount":2,"publisher":{"@id":"https:\/\/www.redemagic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2014\/11\/nuvem-tag-virus-Magic.jpg","keywords":["seguran\u00e7a na internet","v\u00edrus"],"articleSection":["Internet","Tecnologia"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/","url":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/","name":"Symantec identificou um superv\u00edrus espi\u00e3o","isPartOf":{"@id":"https:\/\/www.redemagic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/#primaryimage"},"image":{"@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2014\/11\/nuvem-tag-virus-Magic.jpg","datePublished":"2014-12-01T09:45:04+00:00","dateModified":"2026-01-20T18:20:46+00:00","description":"Pesquisadores da Symantec afirmam que o Regin esteve espionando empresas e governos desde 2008.","inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.redemagic.com\/blog\/tecnologia\/symantec-identifica-supervirus-espiao\/#primaryimage","url":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2014\/11\/nuvem-tag-virus-Magic.jpg","contentUrl":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2014\/11\/nuvem-tag-virus-Magic.jpg","width":555,"height":371},{"@type":"WebSite","@id":"https:\/\/www.redemagic.com\/blog\/#website","url":"https:\/\/www.redemagic.com\/blog\/","name":"Rede Magic","description":"Ag\u00eancia de Total Marketing","publisher":{"@id":"https:\/\/www.redemagic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.redemagic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.redemagic.com\/blog\/#organization","name":"Rede Magic","url":"https:\/\/www.redemagic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.redemagic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2025\/02\/Logo-RedeMagic.png","contentUrl":"https:\/\/www.redemagic.com\/blog\/wp-content\/uploads\/2025\/02\/Logo-RedeMagic.png","width":660,"height":440,"caption":"Rede Magic"},"image":{"@id":"https:\/\/www.redemagic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/web.facebook.com\/RedeMagic","https:\/\/www.instagram.com\/redemagic\/","https:\/\/www.linkedin.com\/company\/redemagic"]},{"@type":"Person","@id":"https:\/\/www.redemagic.com\/blog\/#\/schema\/person\/ff94b5005a102b977d5e9847930aac3c","name":"Magic Web Design","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/7fe38d590fcf82dfb6f7759031dbc772a10851578866099e7a0846ff832d6131?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fe38d590fcf82dfb6f7759031dbc772a10851578866099e7a0846ff832d6131?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fe38d590fcf82dfb6f7759031dbc772a10851578866099e7a0846ff832d6131?s=96&d=mm&r=g","caption":"Magic Web Design"},"sameAs":["http:\/\/www.magicwebdesign.com.br"],"url":"https:\/\/www.redemagic.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/posts\/19150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/comments?post=19150"}],"version-history":[{"count":5,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/posts\/19150\/revisions"}],"predecessor-version":[{"id":26468,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/posts\/19150\/revisions\/26468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/media\/19152"}],"wp:attachment":[{"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/media?parent=19150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/categories?post=19150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.redemagic.com\/blog\/wp-json\/wp\/v2\/tags?post=19150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}