{"id":1985,"date":"2025-12-02T16:53:45","date_gmt":"2025-12-02T19:53:45","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=1985"},"modified":"2025-12-02T16:53:45","modified_gmt":"2025-12-02T19:53:45","slug":"ghost-student-scam","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/scams\/ghost-student-scam\/","title":{"rendered":"\u00bfC\u00f3mo funciona el fraude del Estudiante Fantasma?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">En los \u00faltimos a\u00f1os, un tipo de fraude ha preocupado a universidades y organismos de seguridad. Se trata del <\/span><b>fraude del Estudiante Fantasma<\/b><span style=\"font-weight: 400;\">, que ocurre principalmente en Estados Unidos y muestra c\u00f3mo los datos mal protegidos pueden facilitar esquemas sofisticados.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Con identidades falsas o robadas, los ciberdelincuentes logran inscribirse en cursos, recibir ayudas estudiantiles y causar da\u00f1os significativos. Por eso, entender c\u00f3mo funciona este fraude e implementar acciones de prevenci\u00f3n es un paso imprescindible para reforzar la seguridad y evitar problemas futuros.<\/span><\/p>\n<h3><b>\u00bfC\u00f3mo funciona la estafa?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">La <\/span><b>fraude del Estudiante Fantasma<\/b><span style=\"font-weight: 400;\"> se basa en la combinaci\u00f3n de ingenier\u00eda social y fallos en los sistemas de autenticaci\u00f3n de las instituciones educativas. Comienza cuando los delincuentes obtienen datos personales de estudiantes reales, tales como:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Nombre;<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">E-mail institucional;<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">N\u00famero de matr\u00edcula;<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Historial acad\u00e9mico.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Esta informaci\u00f3n se captura a trav\u00e9s de filtraciones de bases de datos, ataques de phishing, invasiones a sistemas universitarios o incluso por la exposici\u00f3n descuidada de datos en redes sociales y grupos de estudio.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Con los datos en mano, los estafadores crean identidades falsas a nombre de los estudiantes o alteran registros ya existentes.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> In many cases, they use automated tools or digitally forged documents to fill out enrollment forms, request financial aid, scholarships, or other student benefits provided by public and private programs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El fraude se vuelve viable porque parte de las instituciones todav\u00eda cuenta con procesos de verificaci\u00f3n de datos poco robustos. Muchos sistemas de inscripci\u00f3n, especialmente los que otorgan ayudas de forma online, est\u00e1n automatizados y no exigen una verificaci\u00f3n de identidad presencial o en tiempo real.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Esto permite que los delincuentes act\u00faen sin despertar sospechas hasta que se detectan inconsistencias; algo que, en la pr\u00e1ctica, puede tardar semanas o meses. Durante este periodo, los valores se liberan y se desv\u00edan r\u00e1pidamente a cuentas de terceros.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As\u00ed, este fraude se asemeja a un \u201cclon acad\u00e9mico\u201d: los criminales asumen digitalmente la identidad de alguien ya matriculado, explotando brechas en los sistemas de autenticaci\u00f3n y control para obtener ganancias financieras de manera casi invisible.<\/span><\/p>\n<h3><b>\u00bfC\u00f3mo protegerte del fraude?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Existen formas pr\u00e1cticas de reducir el riesgo de este tipo de fraude, como la verificaci\u00f3n de documentos originales y el monitoreo de cambios sospechosos. Estas acciones ayudan a identificar intentos de enga\u00f1o.Veamos otras medidas de protecci\u00f3n:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Tratamiento seguro de datos:<\/b><span style=\"font-weight: 400;\"> proteger la informaci\u00f3n personal dificulta la obtenci\u00f3n de material usado en fraudes de identidad. Limitar el acceso a datos sensibles, adoptar pol\u00edticas de minimizaci\u00f3n y almacenar informaci\u00f3n en repositorios cifrados reduce las posibilidades de filtraci\u00f3n.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Autenticaci\u00f3n multifactor (MFA):<\/b><span style=\"font-weight: 400;\"> agregar una segunda forma de verificaci\u00f3n dificulta que un invasor acceda a cuentas usando solo una contrase\u00f1a. En el portal de matr\u00edcula, por ejemplo, solicitar un c\u00f3digo del aplicativo autenticador antes de permitir cambios de registro es una buena pr\u00e1ctica.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Entrenamiento contra ingenier\u00eda social:<\/b><span style=\"font-weight: 400;\"> capacitar a equipos y alumnos disminuye el \u00e9xito de ataques que dependen de manipular a las personas. Se pueden realizar simulaciones para que los colaboradores est\u00e9n preparados en caso de un incidente real.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<h3><b>Beneficios de protegerse de estos ataques<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Al fortalecer los procesos de verificaci\u00f3n, aplicar la autenticaci\u00f3n multifactor y capacitar al personal, las organizaciones reducen la posibilidad de liberar beneficios indebidos y evitan p\u00e9rdidas financieras. La detecci\u00f3n temprana de actividades sospechosas tambi\u00e9n permite actuar r\u00e1pidamente, evitando investigaciones prolongadas.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Adem\u00e1s, los criterios de seguridad fortalecen la credibilidad de la instituci\u00f3n y aumentan la confianza de alumnos, socios y organismos de control. Al dificultar la acci\u00f3n de ciberdelincuentes y combatir t\u00e9cnicas de ingenier\u00eda social, la organizaci\u00f3n protege registros sensibles, reduce riesgos legales y preserva su imagen p\u00fablica.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El fraude del Estudiante Fantasma evidencia c\u00f3mo las estafas pueden ocurrir sin la necesidad de ataques complejos. La combinaci\u00f3n de falsificaci\u00f3n digital y manipulaci\u00f3n social crea oportunidades para que los delincuentes obtengan ventajas indebidas y causen da\u00f1os financieros.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"> Al conocer c\u00f3mo funciona el fraude y adoptar medidas preventivas, las instituciones y los equipos de tecnolog\u00eda pueden reforzar sus barreras de seguridad y protegerse. <\/span><b>La informaci\u00f3n es una aliada fundamental para reducir riesgos y evitar da\u00f1os.<\/b><\/p>\n<p>\u00bfTe gust\u00f3 el contenido? Entonces no dejes de consultar nuestro material sobre <a href=\"https:\/\/hackerrangers.siteup.dev\/es\/scams\/estafa-del-selfi\/\">el fraude de la selfie y c\u00f3mo act\u00faan los ciberdelincuentes<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the United States and shows how poorly protected data can facilitate sophisticated schemes. Using false or stolen identities, cybercriminals manage to enroll in courses, receive student aid, and cause significant damage. [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":1986,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[40],"tags":[71,69,70],"class_list":["post-1985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","tag-fraud","tag-ghost-student","tag-scam"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How the \u201cGhost Student\u201d Scam Works | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the Learn about the &quot;Ghost Student&quot; scam.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How the \u201cGhost Student\u201d Scam Works | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the Learn about the &quot;Ghost Student&quot; scam.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/scams\/ghost-student-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-02T19:53:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"How the \u201cGhost Student\u201d Scam Works\",\"datePublished\":\"2025-12-02T19:53:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png\",\"keywords\":[\"fraud\",\"ghost student\",\"scam\"],\"articleSection\":[\"Scams\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/\",\"name\":\"How the \u201cGhost Student\u201d Scam Works | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png\",\"datePublished\":\"2025-12-02T19:53:45+00:00\",\"description\":\"In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the Learn about the \\\"Ghost Student\\\" scam.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png\",\"width\":1500,\"height\":1000,\"caption\":\"Imagens blog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How the \u201cGhost Student\u201d Scam Works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How the \u201cGhost Student\u201d Scam Works | Hacker Rangers","description":"In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the Learn about the \"Ghost Student\" scam.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"How the \u201cGhost Student\u201d Scam Works | Hacker Rangers","og_description":"In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the Learn about the \"Ghost Student\" scam.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/scams\/ghost-student-scam\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-02T19:53:45+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog-1024x683.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"How the \u201cGhost Student\u201d Scam Works","datePublished":"2025-12-02T19:53:45+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/"},"wordCount":608,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png","keywords":["fraud","ghost student","scam"],"articleSection":["Scams"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/","url":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/","name":"How the \u201cGhost Student\u201d Scam Works | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png","datePublished":"2025-12-02T19:53:45+00:00","description":"In recent years, a type of fraud has raised concern among universities and security agencies. It\u2019s the Ghost Student Scam, which mainly occurs in the Learn about the \"Ghost Student\" scam.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Imagens-blog.png","width":1500,"height":1000,"caption":"Imagens blog"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/scams\/ghost-student-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"How the \u201cGhost Student\u201d Scam Works"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/1985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=1985"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/1985\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/1986"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=1985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=1985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=1985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}