{"id":2544,"date":"2026-02-16T14:31:08","date_gmt":"2026-02-16T17:31:08","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2544"},"modified":"2026-02-16T14:37:45","modified_gmt":"2026-02-16T17:37:45","slug":"o-que-um-cibercriminoso-pode-fazer-com-o-meu-e-mail","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-um-cibercriminoso-pode-fazer-com-o-meu-e-mail\/","title":{"rendered":"O que um cibercriminoso pode fazer com o meu e-mail?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">N\u00e3o \u00e9 dif\u00edcil de imaginar por que um cibercriminoso se interessaria por senhas banc\u00e1rias ou dados de cart\u00f5es de cr\u00e9dito. Contudo, golpistas sabem tirar proveito de diversas outras informa\u00e7\u00f5es, inclusive algumas que podem ser consideradas p\u00fablicas. O endere\u00e7o de e-mail \u00e9 um bom exemplo disso.<\/span><\/p>\n<p><b>De acordo com o relat\u00f3rio da Cloudflare \u201cPhishing Threats Report\u201d, 90% dos ataques cibern\u00e9ticos bem-sucedidos come\u00e7am com o envio de uma simples mensagem de e-mail.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Qualquer mensagem maliciosa \u00e9 mais efetiva quando o criminoso acrescenta informa\u00e7\u00f5es pessoais, como nome ou a empresa onde a v\u00edtima trabalha. Infelizmente, o e-mail muitas vezes j\u00e1 traz pistas que ajudam o criminoso a conseguir outros dados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em e-mails corporativos, o nome da empresa costuma fazer parte do endere\u00e7o, ajudando o criminoso a encontrar perfis em redes sociais profissionais. Com o nome completo e o hist\u00f3rico profissional e acad\u00eamico da v\u00edtima, o criminoso j\u00e1 ter\u00e1 o que precisa para confeccionar um phishing personalizado.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Existem tamb\u00e9m servi\u00e7os e aplicativos que acabam vazando informa\u00e7\u00f5es de seus usu\u00e1rios. Os dados desses vazamentos podem ser consultados a partir do endere\u00e7o de e-mail, o que pode revelar detalhes pessoais e senhas expostas. No m\u00ednimo, o criminoso pode descobrir em quais sites o e-mail foi usado e usar um deles como pretexto para abordar o dono da conta em quest\u00e3o.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Golpes que n\u00e3o exigem nada al\u00e9m do e-mail<\/span><\/h2>\n<p><b>Phishing:<\/b><span style=\"font-weight: 400;\"> o phishing \u00e9 o envio de uma mensagem que tenta convencer a v\u00edtima a fazer algo que seja do interesse do criminoso. O phishing tradicional \u00e9 aquele que traz um link para uma p\u00e1gina clonada para roubar credenciais da v\u00edtima ou links e anexos para contaminar seu dispositivo com malware.\u00a0<\/span><\/p>\n<p><b>Golpe do dep\u00f3sito antecipado: <\/b><span style=\"font-weight: 400;\">\u00c9 uma fraude que pede um pagamento em troca de algum benef\u00edcio futuro, como desembara\u00e7ar uma encomenda, liberar dinheiro ou pagar uma multa.\u00a0<\/span><\/p>\n<p><b>Extors\u00e3o falsa: <\/b><span style=\"font-weight: 400;\">A extors\u00e3o falsa \u00e9 um ataque em que o criminoso alega ser um invasor que possui dados da v\u00edtima (inclusive v\u00eddeos \u00edntimos ou senhas) e pede um valor em dinheiro \u2013 muitas vezes cobrado em criptomoeda \u2013 para n\u00e3o utilizar nem distribuir as informa\u00e7\u00f5es. Por\u00e9m, na maioria das vezes, ele n\u00e3o possui informa\u00e7\u00e3o alguma.<\/span><\/p>\n<p><b>Spoofing: <\/b><span style=\"font-weight: 400;\">O criminoso pode tentar mascarar o endere\u00e7o de e-mail no campo de \"remetente\", forjando o envio de uma mensagem que parece ser de uma pessoa ou institui\u00e7\u00e3o conhecida. Muitos provedores de e-mail detectam tentativas de spoofing e filtram essas mensagens, mas elas ainda podem confundir alguns usu\u00e1rios.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Invas\u00e3o de contas de e-mail<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Se um endere\u00e7o de e-mail j\u00e1 \u00e9 valioso, a senha da caixa de entrada \u00e9 ainda mais.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Muitos aplicativos dependem do e-mail para redefinir a senha. Portanto, o acesso \u00e0 caixa de e-mail abre caminho para que o invasor acesse todos os demais servi\u00e7os associados \u00e0quele e-mail cujas senhas possam ser redefinidas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Al\u00e9m disso, quem tem acesso ao seu e-mail pode enviar mensagens como se fosse voc\u00ea sem recorrer a nenhuma t\u00e9cnica de spoofing. Isso ajuda o criminoso a realizar ataques de phishing contra seus contatos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em empresas, uma conta de e-mail comprometida pode ser usada para realizar uma fraude de Business Email Compromise (BEC). Por exemplo, o criminoso pode enviar uma fatura falsa para um cliente.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Como se proteger?<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lembre-se que <strong><a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-um-cibercriminoso-pode-fazer-com-os-meus-dados-pessoais\/\">o criminoso pode coletar informa\u00e7\u00f5es<\/a><\/strong> a partir do seu e-mail, inclusive senhas vazadas de outros servi\u00e7os;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Considere usar endere\u00e7os de e-mail dedicados a determinadas tarefas, como um para cadastros online e outro para compras;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lembre-se de que e-mails marcados como spam podem ser altamente perigosos;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Utilize senhas \u00fanicas e fortes combinadas com a verifica\u00e7\u00e3o em duas etapas (2FA\/MFA).<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>It&#8217;s not hard to imagine why cybercriminals would be interested in getting their hands on bank passwords or credit card details. Scammers, however, know how to exploit a lot of other information, including some possibly considered public. Email addresses are a good example of this. According to Cloudflare&#8217;s &#8220;Phishing Threats Report&#8221;, 90% of successful cyberattacks [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2545,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[66,90,64,149],"class_list":["post-2544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-awareness","tag-cybercrime","tag-cybersecurity","tag-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What can cybercriminals do with my email? | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how cybercriminals exploit email addresses for phishing, scams, and account takeovers and how to protect your inbox and accounts.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What can cybercriminals do with my email? | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how cybercriminals exploit email addresses for phishing, scams, and account takeovers and how to protect your inbox and accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-um-cibercriminoso-pode-fazer-com-o-meu-e-mail\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-16T17:31:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T17:37:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"What can cybercriminals do with my email?\",\"datePublished\":\"2026-02-16T17:31:08+00:00\",\"dateModified\":\"2026-02-16T17:37:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png\",\"keywords\":[\"awareness\",\"cybercrime\",\"cybersecurity\",\"email\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/\",\"name\":\"What can cybercriminals do with my email? | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png\",\"datePublished\":\"2026-02-16T17:31:08+00:00\",\"dateModified\":\"2026-02-16T17:37:45+00:00\",\"description\":\"Learn how cybercriminals exploit email addresses for phishing, scams, and account takeovers and how to protect your inbox and accounts.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png\",\"width\":1500,\"height\":1000,\"caption\":\"email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What can cybercriminals do with my email?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What can cybercriminals do with my email? | Hacker Rangers","description":"Learn how cybercriminals exploit email addresses for phishing, scams, and account takeovers and how to protect your inbox and accounts.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"What can cybercriminals do with my email? | Hacker Rangers","og_description":"Learn how cybercriminals exploit email addresses for phishing, scams, and account takeovers and how to protect your inbox and accounts.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/o-que-um-cibercriminoso-pode-fazer-com-o-meu-e-mail\/","og_site_name":"Hacker Rangers","article_published_time":"2026-02-16T17:31:08+00:00","article_modified_time":"2026-02-16T17:37:45+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"What can cybercriminals do with my email?","datePublished":"2026-02-16T17:31:08+00:00","dateModified":"2026-02-16T17:37:45+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/"},"wordCount":571,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png","keywords":["awareness","cybercrime","cybersecurity","email"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/","name":"What can cybercriminals do with my email? | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png","datePublished":"2026-02-16T17:31:08+00:00","dateModified":"2026-02-16T17:37:45+00:00","description":"Learn how cybercriminals exploit email addresses for phishing, scams, and account takeovers and how to protect your inbox and accounts.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/email.png","width":1500,"height":1000,"caption":"email"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/what-can-cybercriminals-do-with-my-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"What can cybercriminals do with my email?"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2544"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2545"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}