{"id":2153,"date":"2025-12-11T16:26:05","date_gmt":"2025-12-11T19:26:05","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2153"},"modified":"2025-12-11T16:47:13","modified_gmt":"2025-12-11T19:47:13","slug":"osint-what-is-it-and-how-cybercrimnals-are-using-it","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","title":{"rendered":"OSINT: qu\u00e9 es y c\u00f3mo la est\u00e1n usando los ciberdelincuentes"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\u00bfAlguna vez has o\u00eddo mencionar la sigla OSINT? Este concepto aun es bastante desconocido para el p\u00fablico no t\u00e9cnico aunque ya sea popular entre profesionales del \u00e1rea de la tecnolog\u00eda o incluso entre agentes de las fuerzas gubernamentales de investigaci\u00f3n policial o judicial. OSINT, sigla para Open Source Intelligence, se puede traducir libremente como Inteligencia de Fuentes Abiertas, lo que ya da una buena pista de lo que significa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Grosso modo, la t\u00e9cnica de OSINT est\u00e1 relacionada al uso de fuentes p\u00fablicas de informaci\u00f3n para la generaci\u00f3n de inteligencia. Espec\u00edficamente en el mundo virtual, la pr\u00e1ctica de OSINT involucra el aprovechamiento de toda la informaci\u00f3n disponible p\u00fablicamente en internet para realizar hallazgos, recoger evidencias o, lamentablemente, en el caso de delincuentes cibern\u00e9ticos, elaborar estafas m\u00e1s convincentes para enga\u00f1ar a las v\u00edctimas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En este punto, se hace necesario abordar un peque\u00f1o \u201cdetalle\u201d que deja a mucha gente en la duda: a fin de cuentas, \u00bfla OSINT es ilegal? La respuesta no es tan sencilla. En teor\u00eda, no, porque toda informaci\u00f3n puesta a disposici\u00f3n p\u00fablicamente puede, en principio, ser utilizada por cualquier persona. El problema se presenta cuando la t\u00e9cnica se emplea para fines maliciosos o cuando infringe reglas espec\u00edficas de alguna plataforma (como las redes sociales, que proh\u00edben la recogida de datos abiertos de sus usuarios).<\/span><\/p>\n<h2><b>Revolviendo en internet<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Como lo hemos mencionado, la t\u00e9cnica de OSINT es popular sobre todo entre fuerzas de investigaci\u00f3n, ya que permite cruzar una serie de datos de fuentes diversas para descubrir, por ejemplo, la verdadera identidad de un infractor. Basta con recordar c\u00f3mo equipos policiales de todo el mundo cruzan v\u00eddeos, fotograf\u00edas y m\u00e1s informaci\u00f3n p\u00fablica para identificar a v\u00e1ndalos o delincuentes, por ejemplo. Sin embargo, en el universo del cibercrimen, el m\u00e9todo tiene una aplicaci\u00f3n muy diferente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Usando herramientas espec\u00edficas de OSINT, los delincuentes son capaces de elaborar campa\u00f1as de phishing todav\u00eda m\u00e1s eficientes para obtener informaci\u00f3n m\u00e1s detallada sobre una v\u00edctima espec\u00edfica. Tambi\u00e9n pueden emplear softwares para detectar fallas en servidores, puertas de conexi\u00f3n abiertas, equipos de red con contrase\u00f1as d\u00e9biles y as\u00ed sucesivamente.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Solo se requiere un poco de paciencia, saber usar las palabras clave apropiadas en los buscadores m\u00e1s comunes del mercado para, al final del proceso, aplicar toda la inteligencia recogida para fines maliciosos.<\/span><\/p>\n<h2><b>\u00bfC\u00f3mo protegerse?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Tenemos una noticia buena y una mala. Empezando por la constataci\u00f3n desalentadora de que es dif\u00edcil mitigar ataques que se hayan elaborado a partir de OSINT. A fin de cuentas, la t\u00e9cnica se basa en recoger informaci\u00f3n p\u00fablica y las herramientas est\u00e1n disponibles para quien quiera utilizarlas. Lo que podemos hacer para protegernos es exponernos lo m\u00ednimo en la web, pens\u00e1ndolo dos veces antes de comentar algo comprometedor en un sitio p\u00fablico, reforzando nuestras configuraciones de privacidad en las redes sociales y as\u00ed sucesivamente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por otro lado, la buena noticia es que los equipos de seguridad de la informaci\u00f3n tambi\u00e9n pueden servirse de herramientas OSINT para blindar sus sistemas. Basta con usarlas para identificar, antes que los delincuentes cibern\u00e9ticos, eventuales fallas de seguridad en las infraestructuras computacionales empresariales, informaci\u00f3n sensible publicada de manera indebida en la web y otras vulnerabilidades. Se trata de una verdadera b\u00fasqueda del tesoro: quien es m\u00e1s h\u00e1bil y r\u00e1pido, \u00a1se queda con el oro!<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Have you ever heard the term OSINT? Though still largely unrecognized among the lay public, the concept is popular among technology professionals and even government investigative or law enforcement agencies. OSINT is the acronym for Open Source Intelligence, which should provide an initial idea of its meaning. In layman\u2019s terms, OSINT involves using public sources [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2154,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,122,119],"class_list":["post-2153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-osint","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OSINT: what it is and how cybercriminals are using it | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSINT: what it is and how cybercriminals are using it | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T19:26:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T19:47:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"OSINT: what it is and how cybercriminals are using it\",\"datePublished\":\"2025-12-11T19:26:05+00:00\",\"dateModified\":\"2025-12-11T19:47:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"keywords\":[\"cybersecurity\",\"OSINT\",\"security\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\",\"name\":\"OSINT: what it is and how cybercriminals are using it | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"datePublished\":\"2025-12-11T19:26:05+00:00\",\"dateModified\":\"2025-12-11T19:47:13+00:00\",\"description\":\"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"width\":1500,\"height\":1000,\"caption\":\"OSINT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSINT: what it is and how cybercriminals are using it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OSINT: what it is and how cybercriminals are using it | Hacker Rangers","description":"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"OSINT: what it is and how cybercriminals are using it | Hacker Rangers","og_description":"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-11T19:26:05+00:00","article_modified_time":"2025-12-11T19:47:13+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"OSINT: what it is and how cybercriminals are using it","datePublished":"2025-12-11T19:26:05+00:00","dateModified":"2025-12-11T19:47:13+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/"},"wordCount":463,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","keywords":["cybersecurity","OSINT","security"],"articleSection":["Cybersecurity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","name":"OSINT: what it is and how cybercriminals are using it | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","datePublished":"2025-12-11T19:26:05+00:00","dateModified":"2025-12-11T19:47:13+00:00","description":"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","width":1500,"height":1000,"caption":"OSINT"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"OSINT: what it is and how cybercriminals are using it"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2153"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2154"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}