{"id":242662,"date":"2026-02-11T10:41:11","date_gmt":"2026-02-11T10:41:11","guid":{"rendered":"https:\/\/www.jolera.com\/quando-as-plataformas-de-confianca-transportam-malware\/"},"modified":"2026-04-10T15:43:38","modified_gmt":"2026-04-10T15:43:38","slug":"quando-as-plataformas-de-confianca-transportam-malware","status":"publish","type":"post","link":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/","title":{"rendered":"Quando as plataformas de confian\u00e7a transportam malware"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.27.5&#8243; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/When-Trusted-Platforms-Carry-Malware-The-Emerging-Risk-on-Hugging-Face.jpg&#8221; custom_padding=&#8221;120px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Quando as plataformas de confian\u00e7a transportam malware<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>O risco emergente do Hugging Face<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;5 min. de leitura&#8221; button_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#0F2E5C&#8221; button_bg_color=&#8221;#d7f0ff&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;6px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Durante anos, o <strong>Hugging Face<\/strong> foi adotado pela comunidade de intelig\u00eancia artificial como um hub central para modelos, conjuntos de dados e desenvolvimento colaborativo. Muitas vezes comparada ao &#8220;<strong>GitHub da IA<\/strong>&#8220;, a plataforma aloja centenas de milhares de modelos de aprendizagem autom\u00e1tica utilizados por investigadores, programadores e empresas em todo o mundo. A sua reputa\u00e7\u00e3o de abertura e inova\u00e7\u00e3o tornou-a uma pedra angular do trabalho moderno de IA&#8230; <strong>at\u00e9 agora.<\/strong><\/p>\n<p>Investiga\u00e7\u00f5es recentes sobre ciberseguran\u00e7a revelam uma tend\u00eancia preocupante: os agentes de amea\u00e7as est\u00e3o a abusar da infraestrutura do <strong>Hugging Face <\/strong>para distribuir malware para Android em grande escala. Ao faz\u00ea-lo, est\u00e3o a explorar a confian\u00e7a impl\u00edcita que os programadores e os sistemas de seguran\u00e7a depositam nas plataformas estabelecidas. Esta mudan\u00e7a no comportamento dos atacantes destaca uma superf\u00edcie de risco mais ampla nos ecossistemas de IA e sublinha a necessidade de estrat\u00e9gias defensivas atualizadas na ciberseguran\u00e7a.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|30px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>A campanha: Da confian\u00e7a ao cavalo de Troia<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Esta amea\u00e7a resulta de uma <strong>campanha de malware para Android<\/strong> que abusa da infraestrutura de alojamento de modelos do Hugging Face. De acordo com a Bitdefender, o ataque baseia-se na engenharia social, enganando os utilizadores para que instalem uma falsa aplica\u00e7\u00e3o de seguran\u00e7a chamada <strong>TrustBastion<\/strong>. <\/p>\n<p>Uma vez instalada, a aplica\u00e7\u00e3o funciona como um dropper, exibindo falsos avisos de atualiza\u00e7\u00e3o do sistema ou do Google Play. Quando activada, descarrega e executa um payload malicioso alojado em conjuntos de dados do Hugging Face em vez de em dom\u00ednios abertamente maliciosos. <\/p>\n<p>Ao tirar partido de uma plataforma fi\u00e1vel e de elevada reputa\u00e7\u00e3o, os atacantes reduzem significativamente a probabilidade de os controlos de seguran\u00e7a tradicionais bloquearem ou assinalarem a atividade, permitindo que o malware evite a dete\u00e7\u00e3o.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/The-Campaign-From-Trust-to-Trojan.jpg&#8221; alt=&#8221;A campanha Da confian\u00e7a ao trojan&#8221; title_text=&#8221;A campanha Da confian\u00e7a ao trojan&#8221; align=&#8221;right&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;80%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Polimorfismo \u00e0 escala: Evitar a dete\u00e7\u00e3o<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>O que torna esta campanha particularmente eficaz (e preocupante) \u00e9 a utiliza\u00e7\u00e3o do <strong>polimorfismo do lado do servidor<\/strong>. Em vez de servir um ficheiro APK est\u00e1tico, os atacantes geram automaticamente milhares de pacotes de aplica\u00e7\u00f5es Android (APKs) \u00fanicos com pequenas varia\u00e7\u00f5es. Estas in\u00fameras variantes s\u00e3o carregadas nos reposit\u00f3rios do Hugging Face, criando um perfil de malware em constante mudan\u00e7a que os sistemas de dete\u00e7\u00e3o baseados em assinaturas t\u00eam dificuldade em identificar.  <\/p>\n<p>A an\u00e1lise da Bitdefender revelou que um desses reposit\u00f3rios acumulou mais de 6.000 commits em menos de um m\u00eas, com novas vers\u00f5es de payloads a aparecerem aproximadamente a cada 15 minutos. Quando esse reposit\u00f3rio foi retirado, a campanha ressurgiu rapidamente com um novo nome (Premium Club), apenas com altera\u00e7\u00f5es superficiais no \u00edcone, mantendo a mesma funcionalidade maliciosa. <\/p>\n<p>Este n\u00edvel de automa\u00e7\u00e3o e a r\u00e1pida muta\u00e7\u00e3o da carga \u00fatil demonstram como os atacantes est\u00e3o a industrializar a distribui\u00e7\u00e3o de malware, tratando as plataformas de confian\u00e7a como canais de distribui\u00e7\u00e3o n\u00e3o regulamentados, em vez de apenas ferramentas de desenvolvimento.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;60px|30px|||false|false&#8221; custom_padding_phone=&#8221;60px|30px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>As capacidades do malware<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Uma vez executado, o payload final funciona como um <strong>Trojan de Acesso Remoto (RAT)<\/strong>. Abusa dos Servi\u00e7os de Acessibilidade do Android e de outras permiss\u00f5es para monitorizar o comportamento do utilizador, capturar o conte\u00fado do ecr\u00e3, roubar credenciais e potencialmente exfiltrar dados sens\u00edveis. <\/p>\n<p>De acordo com os relat\u00f3rios da <strong>Bleeping Computer<\/strong> e da <strong>TechRadar<\/strong>, o malware tenta apresentar interfaces de in\u00edcio de sess\u00e3o fraudulentas para servi\u00e7os financeiros muito utilizados, com o objetivo de recolher credenciais e c\u00f3digos de ecr\u00e3 de bloqueio de v\u00edtimas desprevenidas.<\/p>\n<p>Como utiliza os Servi\u00e7os de Acessibilidade, o malware tamb\u00e9m pode contornar as protec\u00e7\u00f5es t\u00edpicas ao n\u00edvel do utilizador, tornando a dete\u00e7\u00e3o e remo\u00e7\u00e3o mais dif\u00edcil. Em alguns casos, bloqueia a desinstala\u00e7\u00e3o, entrincheirando-se ainda mais no dispositivo comprometido. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/Malwares-Capabilities.jpg&#8221; alt=&#8221;Capacidades do malware&#8221; title_text=&#8221;Capacidades do malware&#8221; align=&#8221;right&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Porque \u00e9 que as plataformas de confian\u00e7a s\u00e3o alvos atrativos<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Esta campanha sublinha uma mudan\u00e7a cr\u00edtica na forma como os agentes de amea\u00e7as encaram a confian\u00e7a. Historicamente, os agentes maliciosos t\u00eam confiado em s\u00edtios Web obscuros, dom\u00ednios de phishing ou servidores comprometidos para distribui\u00e7\u00e3o. Com o surgimento de sofisticadas redes de distribui\u00e7\u00e3o de conte\u00fados (CDN) e reposit\u00f3rios colaborativos, os atacantes reconhecem a vantagem de combinar atividades maliciosas com infra-estruturas leg\u00edtimas.  <\/p>\n<p>Plataformas como a do Hugging Face s\u00e3o intrinsecamente apelativas:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Reputa\u00e7\u00e3o de dom\u00ednio elevada<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>O tr\u00e1fego proveniente de dom\u00ednios Hugging Face raramente \u00e9 assinalado por ferramentas de seguran\u00e7a, que associam a plataforma a actividades leg\u00edtimas de programadores.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Modelo de contribui\u00e7\u00e3o aberta<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Os utilizadores podem carregar modelos e conjuntos de dados com o m\u00ednimo de fric\u00e7\u00e3o, facilitando aos atacantes a inser\u00e7\u00e3o de artefactos maliciosos que escapam aos filtros iniciais.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Integra\u00e7\u00e3o alargada<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Os modelos e conjuntos de dados do Hugging Face s\u00e3o integrados em fluxos de trabalho em todos os sectores, aumentando a exposi\u00e7\u00e3o e o impacto potencial.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>O resultado \u00e9 um risco para a cadeia de abastecimento que n\u00e3o se limita aos investigadores de IA. Mesmo as organiza\u00e7\u00f5es com defesas robustas contra malware podem ter dificuldade em detetar cargas maliciosas quando estas prov\u00eam de um reposit\u00f3rio de confian\u00e7a. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Mitiga\u00e7\u00f5es e pr\u00e1ticas defensivas<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Os especialistas em seguran\u00e7a sublinham que o risco vai para al\u00e9m do <strong>malware para Android<\/strong>. \u00c0 medida que os ataques \u00e0 cadeia de fornecimento de aprendizagem autom\u00e1tica se tornam mais comuns, as organiza\u00e7\u00f5es t\u00eam de repensar a forma como integram activos de IA externos. Algumas das melhores pr\u00e1ticas incluem:  <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Valida\u00e7\u00e3o rigorosa de modelos e conjuntos de dados<\/strong><br \/>Adotar uma verifica\u00e7\u00e3o rigorosa de malware e c\u00f3digo n\u00e3o seguro antes de integrar modelos externos. Formatos como os safetensors, introduzidos para mitigar os riscos de desserializa\u00e7\u00e3o hostil, devem ter prioridade sobre formatos menos seguros, como modelos baseados em pickles.  <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Sandboxing e isolamento<\/strong><br \/>Executar modelos ou c\u00f3digos de IA n\u00e3o fi\u00e1veis em sandboxes seguras para conter potenciais comportamentos maliciosos.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Rever os sinalizadores de confian\u00e7a<\/strong><br \/>Evitar habilitar recursos como trust_remote_code ou trust_repo sem entender as implica\u00e7\u00f5es de seguran\u00e7a, especialmente em sistemas de produ\u00e7\u00e3o.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Monitoriza\u00e7\u00e3o cont\u00ednua<\/strong><br \/>Implementar a dete\u00e7\u00e3o de anomalias e a an\u00e1lise comportamental na execu\u00e7\u00e3o do modelo e no comportamento da aplica\u00e7\u00e3o para identificar atividades suspeitas.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#056CF2&#8243; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Embora nenhuma medida isolada elimine totalmente o risco, uma estrat\u00e9gia defensiva em v\u00e1rias camadas pode reduzir significativamente a probabilidade de o c\u00f3digo malicioso atingir e afetar os utilizadores finais.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Garantir a confian\u00e7a num ecossistema orientado para a IA<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">A campanha de malware Hugging Face sublinha uma dura verdade: as plataformas de confian\u00e7a podem amplificar involuntariamente amea\u00e7as sofisticadas. \u00c0 medida que a ado\u00e7\u00e3o da IA acelera, a superf\u00edcie de ataque expande-se para al\u00e9m da infraestrutura tradicional, para reposit\u00f3rios de modelos, conjuntos de dados e fluxos de trabalho de desenvolvimento. <\/p>\n<p style=\"text-align: center;\">A reputa\u00e7\u00e3o j\u00e1 n\u00e3o \u00e9 um controlo. As organiza\u00e7\u00f5es t\u00eam de tratar os ecossistemas de IA como parte do seu per\u00edmetro de seguran\u00e7a, com monitoriza\u00e7\u00e3o cont\u00ednua, processos de valida\u00e7\u00e3o rigorosos e governa\u00e7\u00e3o incorporada na conce\u00e7\u00e3o. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0F2E5C&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Reforce a sua ciberdefesa contra as amea\u00e7as baseadas em IA<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">O abuso da cadeia de fornecimento de IA \u00e9 um risco operacional real. Para o mitigar, \u00e9 necess\u00e1ria uma monitoriza\u00e7\u00e3o cont\u00ednua, uma dete\u00e7\u00e3o avan\u00e7ada de amea\u00e7as e uma resposta r\u00e1pida a incidentes. <\/p>\n<p style=\"text-align: center;\">Na Jolera, protegemos as organiza\u00e7\u00f5es atrav\u00e9s de servi\u00e7os geridos de ciberseguran\u00e7a e prote\u00e7\u00e3o proativa, apoiando simultaneamente a ado\u00e7\u00e3o segura da IA com governa\u00e7\u00e3o integrada.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.jolera.com\/pt-pt\/solucoes-de-ciberseguranca\/&#8221; button_text=&#8221;Explora as nossas solu\u00e7\u00f5es de ciberseguran\u00e7a&#8221; button_alignment=&#8221;right&#8221; button_alignment_tablet=&#8221;right&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyODYwNCJ9fQ==@&#8221; button_text=&#8221;Contacte os nossos especialistas em seguran\u00e7a&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;left&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#0F2E5C&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quando as plataformas de confian\u00e7a transportam malwareO risco emergente do Hugging FaceDurante anos, o Hugging Face foi adotado pela comunidade de intelig\u00eancia artificial como um hub central para modelos, conjuntos de dados e desenvolvimento colaborativo. Muitas vezes comparada ao &#8220;GitHub da IA&#8221;, a plataforma aloja centenas de milhares de modelos de aprendizagem autom\u00e1tica utilizados por [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":242661,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[324],"tags":[],"class_list":["post-242662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quando as plataformas de confian\u00e7a transportam malware | Jolera<\/title>\n<meta name=\"description\" content=\"As recentes campanhas de malware para Android est\u00e3o a abusar da plataforma Hugging Face para distribuir cargas maliciosas disfar\u00e7adas de aplica\u00e7\u00f5es de seguran\u00e7a.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quando as plataformas de confian\u00e7a transportam malware | Jolera\" \/>\n<meta property=\"og:description\" content=\"As recentes campanhas de malware para Android est\u00e3o a abusar da plataforma Hugging Face para distribuir cargas maliciosas disfar\u00e7adas de aplica\u00e7\u00f5es de seguran\u00e7a.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Jolera\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jolerainc\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-11T10:41:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T15:43:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jolera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jolera\" \/>\n<meta name=\"twitter:site\" content=\"@jolera\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jolera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/\"},\"author\":{\"name\":\"Jolera\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#\\\/schema\\\/person\\\/9d0aa0ee3c29a585afccdf73a491a1ae\"},\"headline\":\"Quando as plataformas de confian\u00e7a transportam malware\",\"datePublished\":\"2026-02-11T10:41:11+00:00\",\"dateModified\":\"2026-04-10T15:43:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/\"},\"wordCount\":3792,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"articleSection\":[\"Not\u00edcias TI\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/\",\"name\":\"Quando as plataformas de confian\u00e7a transportam malware | Jolera\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"datePublished\":\"2026-02-11T10:41:11+00:00\",\"dateModified\":\"2026-04-10T15:43:38+00:00\",\"description\":\"As recentes campanhas de malware para Android est\u00e3o a abusar da plataforma Hugging Face para distribuir cargas maliciosas disfar\u00e7adas de aplica\u00e7\u00f5es de seguran\u00e7a.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"contentUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"width\":1200,\"height\":628,\"caption\":\"As plataformas de IA fi\u00e1veis n\u00e3o est\u00e3o imunes a amea\u00e7as\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/quando-as-plataformas-de-confianca-transportam-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quando as plataformas de confian\u00e7a transportam malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#website\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/\",\"name\":\"Global Systems Integrator \u2013 IT & Cybersecurity\",\"description\":\"Global Systems Integrator\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#organization\",\"name\":\"Jolera\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Jolera-logo-blue-sq.png\",\"contentUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Jolera-logo-blue-sq.png\",\"width\":400,\"height\":400,\"caption\":\"Jolera\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/jolerainc\\\/\",\"https:\\\/\\\/x.com\\\/jolera\",\"https:\\\/\\\/www.instagram.com\\\/jolerainc\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/jolera\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@JoleraTV\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/#\\\/schema\\\/person\\\/9d0aa0ee3c29a585afccdf73a491a1ae\",\"name\":\"Jolera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"caption\":\"Jolera\"},\"sameAs\":[\"https:\\\/\\\/www.jolera.com\"],\"url\":\"https:\\\/\\\/www.jolera.com\\\/pt-pt\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quando as plataformas de confian\u00e7a transportam malware | Jolera","description":"As recentes campanhas de malware para Android est\u00e3o a abusar da plataforma Hugging Face para distribuir cargas maliciosas disfar\u00e7adas de aplica\u00e7\u00f5es de seguran\u00e7a.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/","og_locale":"pt_PT","og_type":"article","og_title":"Quando as plataformas de confian\u00e7a transportam malware | Jolera","og_description":"As recentes campanhas de malware para Android est\u00e3o a abusar da plataforma Hugging Face para distribuir cargas maliciosas disfar\u00e7adas de aplica\u00e7\u00f5es de seguran\u00e7a.","og_url":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/","og_site_name":"Jolera","article_publisher":"https:\/\/www.facebook.com\/jolerainc\/","article_published_time":"2026-02-11T10:41:11+00:00","article_modified_time":"2026-04-10T15:43:38+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","type":"image\/png"}],"author":"Jolera","twitter_card":"summary_large_image","twitter_creator":"@jolera","twitter_site":"@jolera","twitter_misc":{"Escrito por":"Jolera","Tempo estimado de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#article","isPartOf":{"@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/"},"author":{"name":"Jolera","@id":"https:\/\/www.jolera.com\/pt-pt\/#\/schema\/person\/9d0aa0ee3c29a585afccdf73a491a1ae"},"headline":"Quando as plataformas de confian\u00e7a transportam malware","datePublished":"2026-02-11T10:41:11+00:00","dateModified":"2026-04-10T15:43:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/"},"wordCount":3792,"commentCount":0,"publisher":{"@id":"https:\/\/www.jolera.com\/pt-pt\/#organization"},"image":{"@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","articleSection":["Not\u00edcias TI"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/","url":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/","name":"Quando as plataformas de confian\u00e7a transportam malware | Jolera","isPartOf":{"@id":"https:\/\/www.jolera.com\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","datePublished":"2026-02-11T10:41:11+00:00","dateModified":"2026-04-10T15:43:38+00:00","description":"As recentes campanhas de malware para Android est\u00e3o a abusar da plataforma Hugging Face para distribuir cargas maliciosas disfar\u00e7adas de aplica\u00e7\u00f5es de seguran\u00e7a.","breadcrumb":{"@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#primaryimage","url":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","contentUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","width":1200,"height":628,"caption":"As plataformas de IA fi\u00e1veis n\u00e3o est\u00e3o imunes a amea\u00e7as"},{"@type":"BreadcrumbList","@id":"https:\/\/www.jolera.com\/pt-pt\/quando-as-plataformas-de-confianca-transportam-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jolera.com\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Quando as plataformas de confian\u00e7a transportam malware"}]},{"@type":"WebSite","@id":"https:\/\/www.jolera.com\/pt-pt\/#website","url":"https:\/\/www.jolera.com\/pt-pt\/","name":"Global Systems Integrator \u2013 IT & Cybersecurity","description":"Global Systems Integrator","publisher":{"@id":"https:\/\/www.jolera.com\/pt-pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jolera.com\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.jolera.com\/pt-pt\/#organization","name":"Jolera","url":"https:\/\/www.jolera.com\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.jolera.com\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.jolera.com\/wp-content\/uploads\/2024\/10\/Jolera-logo-blue-sq.png","contentUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/2024\/10\/Jolera-logo-blue-sq.png","width":400,"height":400,"caption":"Jolera"},"image":{"@id":"https:\/\/www.jolera.com\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/jolerainc\/","https:\/\/x.com\/jolera","https:\/\/www.instagram.com\/jolerainc\/","https:\/\/www.linkedin.com\/company\/jolera\/","https:\/\/www.youtube.com\/@JoleraTV"]},{"@type":"Person","@id":"https:\/\/www.jolera.com\/pt-pt\/#\/schema\/person\/9d0aa0ee3c29a585afccdf73a491a1ae","name":"Jolera","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","caption":"Jolera"},"sameAs":["https:\/\/www.jolera.com"],"url":"https:\/\/www.jolera.com\/pt-pt\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/posts\/242662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/comments?post=242662"}],"version-history":[{"count":0,"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/posts\/242662\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/media\/242661"}],"wp:attachment":[{"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/media?parent=242662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/categories?post=242662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jolera.com\/pt-pt\/wp-json\/wp\/v2\/tags?post=242662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}