{"id":2466,"date":"2025-10-30T08:00:42","date_gmt":"2025-10-30T11:00:42","guid":{"rendered":"https:\/\/wp.ufpel.edu.br\/labgrima\/?p=2466"},"modified":"2025-10-30T16:09:58","modified_gmt":"2025-10-30T19:09:58","slug":"malwares-como-armas-de-estado-projecao-de-poder-e-ameacas-geopoliticas-por-victoria-de-aquino","status":"publish","type":"post","link":"https:\/\/wp.ufpel.edu.br\/labgrima\/2025\/10\/30\/malwares-como-armas-de-estado-projecao-de-poder-e-ameacas-geopoliticas-por-victoria-de-aquino\/","title":{"rendered":"Malwares como armas de Estado: proje\u00e7\u00e3o de poder e amea\u00e7as geopol\u00edticas por Vict\u00f3ria de Aquino"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Os malwares configuram atualmente vetores de a\u00e7\u00e3o internacional, cujas opera\u00e7\u00f5es podem gerar viola\u00e7\u00f5es de normas fundamentais do direito internacional p\u00fablico, incluindo a soberania dos Estados e a proibi\u00e7\u00e3o do uso da for\u00e7a armada.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">Os malwares configuram atualmente vetores de a\u00e7\u00e3o internacional, cujas opera\u00e7\u00f5es podem gerar viola\u00e7\u00f5es de normas fundamentais do direito internacional p\u00fablico, incluindo a soberania dos Estados e a proibi\u00e7\u00e3o do uso da for\u00e7a armada (i<\/span><i><span style=\"font-weight: 400;\">us cogen<\/span><\/i><span style=\"font-weight: 400;\">s, UN Charter, 1945, art. 2, \u00a74). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">De forma an\u00e1loga, o <\/span><b>Stuxnet (2010)<\/b><span style=\"font-weight: 400;\">, desenvolvido com o intuito de comprometer o programa nuclear iraniano, utilizou quatro vulnerabilidades<\/span><i><span style=\"font-weight: 400;\"> zero-day<\/span><\/i><span style=\"font-weight: 400;\"> no sistema operacional Windows e explorou falhas em controladores l\u00f3gicos program\u00e1veis (PLCs) Siemens S7-300, visando a destrui\u00e7\u00e3o f\u00edsica de centr\u00edfugas de enriquecimento de ur\u00e2nio (Kaspersky, 2010). Posteriormente, o <\/span><b>NotPetya (2017)<\/b><span style=\"font-weight: 400;\">, inicialmente identificado como ransomware, revelou-se um wiper disfar\u00e7ado, utilizando a vulnerabilidade EternalBlue para propagar-se rapidamente e destruir dados em sistemas Windows, afetando gravemente infraestruturas cr\u00edticas na Ucr\u00e2nia e em empresas globais (CISA, 2018).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em um est\u00e1gio mais recente do desenvolvimento de amea\u00e7as cibern\u00e9ticas, o <\/span><b>Brickstorm (2025)<\/b><span style=\"font-weight: 400;\">, atribu\u00eddo ao grupo UNC5221, \u00e9 um backdoor escrito em Go que explora vulnerabilidades em sistemas Linux e BSD, permitindo acesso persistente a <\/span><b>redes corporativas nos Estados Unidos, com foco em setores como jur\u00eddico, tecnologia e SaaS \u2014 <\/b><i><span style=\"font-weight: 400;\">Software as a Service<\/span><\/i><span style=\"font-weight: 400;\">, o qual possui import\u00e2ncia geopol\u00edtica por concentrar dados cr\u00edticos em servidores corporativos e em nuvem, tornando-se alvo estrat\u00e9gico em opera\u00e7\u00f5es de ciberespionagem e controle digital internacional. (Google Threat Intelligence, 2025).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No plano internacional, a principal externalidade dos malwares reside na eros\u00e3o do regime de atribui\u00e7\u00e3o, uma vez que a <\/span><b>dificuldade de vincular um ataque a um ator estatal espec\u00edfico consequentemente amplia a margem de a\u00e7\u00e3o para opera\u00e7\u00f5es de espionagem e sabotagem,<\/b><span style=\"font-weight: 400;\"> sem que se desencadeiem consequ\u00eancias diplom\u00e1ticas imediatas. Outrossim, conforme observado pela European Union Agency for Cybersecurity (ENISA, 2024), a assimetria entre capacidades ofensivas e defensivas produz um \u201cd\u00e9ficit normativo\u201d, o qual leva os Estados, frequentemente, a tolerar ou explorar malwares com finalidade de prote\u00e7\u00e3o da soberania nacional, da defesa e da seguran\u00e7a militar e informacional, em detrimento da promo\u00e7\u00e3o de um consenso global. Em<\/span> <span style=\"font-weight: 400;\">consequ\u00eancia, esse d\u00e9ficit se manifesta na fragmenta\u00e7\u00e3o das normas internacionais de ciberseguran\u00e7a, ao passo que compromete a efic\u00e1cia dos mecanismos formais de responsabiliza\u00e7\u00e3o em inst\u00e2ncias multilaterais, refletindo uma lacuna estrutural na governan\u00e7a global de amea\u00e7as cibern\u00e9ticas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No que tange \u00e0 atribui\u00e7\u00e3o jur\u00eddica, a dificuldade de estabelecer controle efetivo de um Estado sobre o malware ou de vincular a a\u00e7\u00e3o a um <\/span><i><span style=\"font-weight: 400;\">proxy<\/span><\/i><span style=\"font-weight: 400;\"> criminoso representa um grande obst\u00e1culo para a aplica\u00e7\u00e3o de medidas corretivas ou retaliat\u00f3rias no \u00e2mbito do direito internacional. Nesse contexto, o <\/span><i><span style=\"font-weight: 400;\">Manual de Tallinn 2.0<\/span><\/i><span style=\"font-weight: 400;\"> (2013, \u00a76.1) estabelece que a comprova\u00e7\u00e3o de dire\u00e7\u00e3o funcional ou de controle efetivo constitui requisito essencial para a caracteriza\u00e7\u00e3o de atos il\u00edcitos cibern\u00e9ticos internacionais. Em decorr\u00eancia dessa exig\u00eancia, a dificuldade de atribui\u00e7\u00e3o inequ\u00edvoca amplia a margem de a\u00e7\u00e3o de atores estatais, que passam a explorar tais assimetrias sem risco imediato de responsabiliza\u00e7\u00e3o.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nesse sentido, a converg\u00eancia operacional entre malware e desinforma\u00e7\u00e3o \u2014 fen\u00f4meno conceituado pelo <\/span><i><span style=\"font-weight: 400;\">CyberPeace Institute<\/span><\/i><span style=\"font-weight: 400;\"> (2023) como Nexus cyber\u2013informa\u00e7\u00e3o \u2014 figura um vetor h\u00edbrido de amea\u00e7a, cujos efeitos multiplicadores potencializam simultaneamente a disrup\u00e7\u00e3o t\u00e9cnica de sistemas e a manipula\u00e7\u00e3o informacional em larga escala. Nesses casos, o ataque t\u00e9cnico \u00e9 apenas a primeira fase da opera\u00e7\u00e3o: segue-se o vazamento seletivo de dados, muitas vezes adulterados, e a dissemina\u00e7\u00e3o automatizada de narrativas desestabilizadoras via botnets e redes sociais.\u00a0 Essa sinergia compromete a resili\u00eancia operacional de institui\u00e7\u00f5es e amplifica a vulnerabilidade de setores cr\u00edticos \u2014 incluindo sa\u00fade, energia e log\u00edstica \u2014, na medida em que a paralisa\u00e7\u00e3o de sistemas, a corrup\u00e7\u00e3o de dados e a propaga\u00e7\u00e3o automatizada de informa\u00e7\u00f5es manipuladas podem gerar interrup\u00e7\u00e3o de cadeias de suprimento, degrada\u00e7\u00e3o de servi\u00e7os essenciais, perda financeira direta, falhas regulat\u00f3rias e eros\u00e3o da confian\u00e7a p\u00fablica, afetando simultaneamente a soberania de uma na\u00e7\u00e3o em sua estabilidade das esferas p\u00fablica, privada, pol\u00edtica, econ\u00f4mica e social.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diante desse panorama, os malwares configuram-se como instrumentos h\u00edbridos de proje\u00e7\u00e3o de poder geopol\u00edtico, inseridos em uma l\u00f3gica de guerra assim\u00e9trica e de competi\u00e7\u00e3o estrat\u00e9gica prolongada. Sua aplica\u00e7\u00e3o ultrapassa a esfera tecnol\u00f3gica, assumindo a fun\u00e7\u00e3o de vetores de dissuas\u00e3o e coer\u00e7\u00e3o, cuja efetividade adv\u00e9m tanto da paralisa\u00e7\u00e3o de infraestruturas cr\u00edticas quanto da manipula\u00e7\u00e3o de fluxos informacionais. A proje\u00e7\u00e3o geopol\u00edtica indica uma intensifica\u00e7\u00e3o das campanhas de APT vinculadas a interesses estatais e corporativos, particularmente em contextos de conflitos e diverg\u00eancias de interesses pol\u00edticos e soberanos \u2014 como EUA\u2013China, OTAN\u2013R\u00fassia e Oriente M\u00e9dio \u2014 nos quais opera\u00e7\u00f5es cibern\u00e9ticas passam a ser planejadas e executadas como extens\u00f5es diretas da pol\u00edtica externa e da guerra irregular inform\u00e1tica.<\/span><\/p>\n<p><b>Refer\u00eancias:<\/b><\/p>\n<p><b>PERRY, Chris.<\/b> <i><span style=\"font-weight: 400;\">The Stuxnet Virus: The Start of a New Digital Arms Race?<\/span><\/i><a href=\"https:\/\/www.ipinst.org\/2010\/12\/the-stuxnet-virus-the-start-of-a-new-digital-arms-race?utm_source=chatgpt.com\"> <span style=\"font-weight: 400;\">International Peace Institute<\/span><\/a><span style=\"font-weight: 400;\">. International Peace Institute, 2 dez. 2010. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.ipinst.org\/2010\/12\/the-stuxnet-virus-the-start-of-a-new-digital-arms-race\"><span style=\"font-weight: 400;\">https:\/\/www.ipinst.org\/2010\/12\/the-stuxnet-virus-the-start-of-a-new-digital-arms-race<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>ZETTER, Kim.<\/b> <i><span style=\"font-weight: 400;\">An Unprecedented Look at Stuxnet, the World&#8217;s First Digital Weapon<\/span><\/i><span style=\"font-weight: 400;\">. <\/span><i><span style=\"font-weight: 400;\">WIRED<\/span><\/i><span style=\"font-weight: 400;\">, 3 nov. 2014. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet\/\"><span style=\"font-weight: 400;\">https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet\/<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>CISA<\/b><span style=\"font-weight: 400;\"> \u2013 CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY. <\/span><i><span style=\"font-weight: 400;\">Petya ransomware<\/span><\/i><span style=\"font-weight: 400;\">. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2017\/07\/01\/petya-ransomware\"><span style=\"font-weight: 400;\">https:\/\/www.cisa.gov\/news-events\/alerts\/2017\/07\/01\/petya-ransomware<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>ENISA \u2013 EUROPEAN UNION AGENCY FOR CYBERSECURITY.<\/b> <i><span style=\"font-weight: 400;\">ENISA Threat Landscape 2024<\/span><\/i><span style=\"font-weight: 400;\">. Luxemburgo: Publica\u00e7\u00f5es da Uni\u00e3o Europeia, 2024. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2024-11\/ENISA%20Threat%20Landscape%202024_0.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2024-11\/ENISA%20Threat%20Landscape%202024_0.pdf<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>ENISA \u2013 EUROPEAN UNION AGENCY FOR CYBERSECURITY.<\/b> <i><span style=\"font-weight: 400;\">ENISA Threat Landscape 2025: ENISA Threat Landscape 2025 Booklet<\/span><\/i><span style=\"font-weight: 400;\">. Luxemburgo: ENISA, 2025. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA%20Threat%20Landscape%202025%20Booklet.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-10\/ENISA%20Threat%20Landscape%202025%20Booklet.pdf<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>NOLLKAEMPER, Andr\u00e9 et al.<\/b> <i><span style=\"font-weight: 400;\">Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations<\/span><\/i><span style=\"font-weight: 400;\">. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, 2017. Dispon\u00edvel em:<\/span><a href=\"https:\/\/www.onlinelibrary.iihl.org\/wp-content\/uploads\/2021\/05\/2017-Tallinn-Manual-2.0.pdf?utm_source=chatgpt.com\"> <span style=\"font-weight: 400;\">https:\/\/www.onlinelibrary.iihl.org\/wp-content\/uploads\/2021\/05\/2017-Tallinn-Manual-2.0.pdf<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE (CCDCOE).<\/b> <i><span style=\"font-weight: 400;\">Research: Tallinn Manual<\/span><\/i><span style=\"font-weight: 400;\">. Tallinn: CCDCOE, 2025. Dispon\u00edvel em:<\/span><a href=\"https:\/\/ccdcoe.org\/research\/tallinn-manual\/?utm_source=chatgpt.com\"> <span style=\"font-weight: 400;\">https:\/\/ccdcoe.org\/research\/tallinn-manual\/<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>HARVARD LAW SCHOOL \u2013 PILAC.<\/b> <i><span style=\"font-weight: 400;\">Tallinn 2.0 Project<\/span><\/i><span style=\"font-weight: 400;\">. Cambridge: Harvard Law School, 2025. Dispon\u00edvel em:<\/span><a href=\"https:\/\/pilac.law.harvard.edu\/tallinn-20-project?utm_source=chatgpt.com\"> <span style=\"font-weight: 400;\">https:\/\/pilac.law.harvard.edu\/tallinn-20-project<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.\u00a0<\/span><\/p>\n<p><b>NOLLKAEMPER, Andr\u00e9 et al.<\/b> <i><span style=\"font-weight: 400;\">Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations<\/span><\/i><span style=\"font-weight: 400;\">. Cambridge: Cambridge University Press, 2017. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/assets.cambridge.org\/97811071\/77222\/frontmatter\/9781107177222_frontmatter.pdf\"><span style=\"font-weight: 400;\">https:\/\/assets.cambridge.org\/97811071\/77222\/frontmatter\/9781107177222_frontmatter.pdf<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>GEORGETOWN JOURNAL OF INTERNATIONAL LAW.<\/b> <i><span style=\"font-weight: 400;\">The Tallinn Manual 2.0: An Overview<\/span><\/i><span style=\"font-weight: 400;\">. Washington: Georgetown University, 2018. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.law.georgetown.edu\/international-law-journal\/wp-content\/uploads\/sites\/21\/2018\/05\/48-3-The-Tallinn-Manual-2.0.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.law.georgetown.edu\/international-law-journal\/wp-content\/uploads\/sites\/21\/2018\/05\/48-3-The-Tallinn-Manual-2.0.pdf<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>CYBERPEACE INSTITUTE.<\/b> <i><span style=\"font-weight: 400;\">Nexus cyberattacks and disinformation<\/span><\/i><span style=\"font-weight: 400;\">. [S.l.]: CyberPeace Institute, 2024. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/cyberpeaceinstitute.org\/nexus-cyberattacks-and-disinformation\/\"><span style=\"font-weight: 400;\">https:\/\/cyberpeaceinstitute.org\/nexus-cyberattacks-and-disinformation\/<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>CYBERPEACE INSTITUTE.<\/b> <i><span style=\"font-weight: 400;\">Understanding Nexus operations: Where Cyberattacks and Disinformation converge<\/span><\/i><span style=\"font-weight: 400;\">. [S.l.]: CyberPeace Institute, 2025. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/cyberpeaceinstitute.org\/news\/understanding-nexus-operations-where-cyberattacks-and-disinformation-converge\/\"><span style=\"font-weight: 400;\">https:\/\/cyberpeaceinstitute.org\/news\/understanding-nexus-operations-where-cyberattacks-and-disinformation-converge\/<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>COUNCIL ON FOREIGN RELATIONS.<\/b> <i><span style=\"font-weight: 400;\">Confronting Reality in Cyberspace: Foreign Policy for a Digital Age<\/span><\/i><span style=\"font-weight: 400;\">. New York: Council on Foreign Relations, 2025. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.cfr.org\/task-force-report\/confronting-reality-in-cyberspace\"><span style=\"font-weight: 400;\">https:\/\/www.cfr.org\/task-force-report\/confronting-reality-in-cyberspace<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>FOREIGN RELATIONS.<\/b> <i><span style=\"font-weight: 400;\">Countering Russian Information Operations in the Age of Social Media<\/span><\/i><span style=\"font-weight: 400;\">. New York: Council on Foreign Relations, 2025. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.cfr.org\/report\/countering-russian-information-operations-age-social-media\"><span style=\"font-weight: 400;\">https:\/\/www.cfr.org\/report\/countering-russian-information-operations-age-social-media<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>COUNCIL ON FOREIGN RELATIONS.<\/b> <i><span style=\"font-weight: 400;\">Deep-Fake Disinformation on Steroids: The Threat of Deep Fakes<\/span><\/i><span style=\"font-weight: 400;\">. New York: Council on Foreign Relations, 2025. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.cfr.org\/report\/deep-fake-disinformation-steroids\"><span style=\"font-weight: 400;\">https:\/\/www.cfr.org\/report\/deep-fake-disinformation-steroids<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><b>SECUREWORKS.<\/b> <i><span style=\"font-weight: 400;\">2024 State of the Threat Report<\/span><\/i><span style=\"font-weight: 400;\">. Atlanta: Secureworks, 2024. Dispon\u00edvel em:<\/span> <a href=\"https:\/\/www.secureworks.com\/resources\/rp-state-of-the-threat-2024\"><span style=\"font-weight: 400;\">https:\/\/www.secureworks.com\/resources\/rp-state-of-the-threat-2024<\/span><\/a><span style=\"font-weight: 400;\">. Acesso em: 2 out. 2025.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">* Vict\u00f3ria de Aquino\u00a0 \u00e9 pesquisador do LabGRIMA.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os malwares configuram atualmente vetores de a\u00e7\u00e3o internacional, cujas opera\u00e7\u00f5es podem gerar viola\u00e7\u00f5es de normas fundamentais do direito internacional p\u00fablico, incluindo a soberania dos Estados e a proibi\u00e7\u00e3o do uso da for\u00e7a armada.<\/p><p><a class=\"more-link btn\" href=\"https:\/\/wp.ufpel.edu.br\/labgrima\/2025\/10\/30\/malwares-como-armas-de-estado-projecao-de-poder-e-ameacas-geopoliticas-por-victoria-de-aquino\/\">Continue lendo<\/a><\/p>\n","protected":false},"author":636,"featured_media":2468,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75,21,28,1],"tags":[108,4,15],"class_list":["post-2466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expert-opinions","category-labgrima-expert","category-news","category-noticias","tag-ciberseguranca","tag-geopolitica","tag-soft-power","nodate","item-wrap"],"jetpack_featured_media_url":"https:\/\/wp.ufpel.edu.br\/labgrima\/files\/2025\/10\/chris-yang-1tnS_BVy9Jk-unsplash-S-e1761680289809.jpg","_links":{"self":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts\/2466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/comments?post=2466"}],"version-history":[{"count":1,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts\/2466\/revisions"}],"predecessor-version":[{"id":2469,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts\/2466\/revisions\/2469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/media\/2468"}],"wp:attachment":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/media?parent=2466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/categories?post=2466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/tags?post=2466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}