{"id":2153,"date":"2025-12-11T16:26:05","date_gmt":"2025-12-11T19:26:05","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2153"},"modified":"2025-12-11T16:47:13","modified_gmt":"2025-12-11T19:47:13","slug":"osint-what-is-it-and-how-cybercrimnals-are-using-it","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","title":{"rendered":"OSINT: o que \u00e9 e como os cibercriminosos o est\u00e3o utilizando"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Voc\u00ea j\u00e1 ouviu falar no termo OSINT? Esse conceito ainda \u00e9 bastante desconhecido pelo p\u00fablico n\u00e3o t\u00e9cnico, embora seja popular entre profissionais da \u00e1rea de tecnologia e at\u00e9 mesmo for\u00e7as governamentais de investiga\u00e7\u00e3o policial ou judicial. OSINT, sigla para Open Source Intelligence, pode ser traduzida livremente como Intelig\u00eancia de Fontes Abertas \u2014 o que j\u00e1 oferece uma ideia inicial do seu significado.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Grosso modo, OSINT est\u00e1 relacionado ao uso de fontes p\u00fablicas de informa\u00e7\u00e3o para a gera\u00e7\u00e3o de intelig\u00eancia. Especificamente no mundo virtual, a pr\u00e1tica de OSINT envolve o aproveitamento de todas as informa\u00e7\u00f5es dispon\u00edveis publicamente na internet para obter descobertas, coletar evid\u00eancias ou, infelizmente, no caso de criminosos cibern\u00e9ticos, criar golpes mais convincentes para enganar as v\u00edtimas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A esse ponto, \u00e9 preciso abordar um pequeno \u201cdetalhe\u201d que deixa muita gente na d\u00favida: afinal, o OSINT \u00e9 ilegal? A resposta n\u00e3o \u00e9 t\u00e3o simples. Na teoria, n\u00e3o \u00e9, porque toda informa\u00e7\u00e3o disponibilizada publicamente pode, em tese, ser usada por quem quer que seja. O problema \u00e9 acontece quando a t\u00e9cnica \u00e9 empregada para fins maliciosos ou quando infringe regras espec\u00edficas de alguma plataforma \u2014 como as redes sociais, que pro\u00edbem a coleta de dados abertos de seus usu\u00e1rios.<\/span><\/p>\n<h2><b>Vasculhando a internet<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Como citado anteriormente, a t\u00e9cnica de OSINT \u00e9 popular sobretudo entre for\u00e7as de investiga\u00e7\u00e3o, j\u00e1 que permite cruzar uma s\u00e9rie de dados de fontes diversas para descobrir, por exemplo, a real identidade de um infrator. Basta se lembrar de como equipes policiais do mundo inteiro cruzaram v\u00eddeos, fotografias e outras informa\u00e7\u00f5es p\u00fablicas para identificar um v\u00e2ndalo ou criminoso, por exemplo. Contudo, no universo do cibercrime, o m\u00e9todo possui uma aplica\u00e7\u00e3o bem distinta.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Usando ferramentas espec\u00edficas de OSINT, os criminosos s\u00e3o capazes de elaborar campanhas de phishing ainda mais eficientes, obtendo informa\u00e7\u00f5es aprofundadas sobre uma v\u00edtima em espec\u00edfico. Eles tamb\u00e9m podem empregar softwares para detectar falhas em servidores, portas de conex\u00e3o abertas, equipamentos de rede com senhas fracas e assim por diante.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Basta ter um pouco de paci\u00eancia, saber usar as palavras-chave apropriadas nos buscadores mais comuns do mercado e, por fim, aplicar toda a intelig\u00eancia coletada para fins maliciosos.<\/span><\/p>\n<h2><b>Como se proteger?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Temos uma boa e uma m\u00e1 not\u00edcia. Come\u00e7ando pelo fato desanimador, \u00e9 dif\u00edcil mitigarmos ataques que foram arquitetados por meio de OSINT. Afinal, a t\u00e9cnica se baseia em coletar informa\u00e7\u00f5es p\u00fablicas, e as ferramentas est\u00e3o dispon\u00edveis para qualquer um utilizar. O que podemos fazer para nos proteger \u00e9 nos expor ao m\u00ednimo na web, pensando duas vezes antes de comentar algo comprometedor em um site p\u00fablico, refor\u00e7ando suas configura\u00e7\u00f5es de privacidade nas redes sociais e assim por diante.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por outro lado, a boa not\u00edcia \u00e9 que as equipes de seguran\u00e7a da informa\u00e7\u00e3o tamb\u00e9m podem usufruir de ferramentas OSINT para blindar seus sistemas. Basta us\u00e1-las para identificar, antes dos criminosos cibern\u00e9ticos, eventuais falhas de seguran\u00e7a nas infraestruturas computacionais corporativas, informa\u00e7\u00f5es sens\u00edveis publicadas de maneira indevida na web e assim por diante. Como sempre, trata-se de uma corrida de gato e rato: ganha quem chegar primeiro ao pote de ouro!<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Have you ever heard the term OSINT? Though still largely unrecognized among the lay public, the concept is popular among technology professionals and even government investigative or law enforcement agencies. OSINT is the acronym for Open Source Intelligence, which should provide an initial idea of its meaning. In layman\u2019s terms, OSINT involves using public sources [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2154,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,122,119],"class_list":["post-2153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-osint","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OSINT: what it is and how cybercriminals are using it | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSINT: what it is and how cybercriminals are using it | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T19:26:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T19:47:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"OSINT: what it is and how cybercriminals are using it\",\"datePublished\":\"2025-12-11T19:26:05+00:00\",\"dateModified\":\"2025-12-11T19:47:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"keywords\":[\"cybersecurity\",\"OSINT\",\"security\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\",\"name\":\"OSINT: what it is and how cybercriminals are using it | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"datePublished\":\"2025-12-11T19:26:05+00:00\",\"dateModified\":\"2025-12-11T19:47:13+00:00\",\"description\":\"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png\",\"width\":1500,\"height\":1000,\"caption\":\"OSINT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSINT: what it is and how cybercriminals are using it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OSINT: what it is and how cybercriminals are using it | Hacker Rangers","description":"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"OSINT: what it is and how cybercriminals are using it | Hacker Rangers","og_description":"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-11T19:26:05+00:00","article_modified_time":"2025-12-11T19:47:13+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"OSINT: what it is and how cybercriminals are using it","datePublished":"2025-12-11T19:26:05+00:00","dateModified":"2025-12-11T19:47:13+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/"},"wordCount":463,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","keywords":["cybersecurity","OSINT","security"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/","name":"OSINT: what it is and how cybercriminals are using it | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","datePublished":"2025-12-11T19:26:05+00:00","dateModified":"2025-12-11T19:47:13+00:00","description":"Learn how OSINT works, how criminals use public information to craft scams, and the steps you can take to reduce your digital exposure.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/OSINT.png","width":1500,"height":1000,"caption":"OSINT"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/osint-what-is-it-and-how-cybercrimnals-are-using-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"OSINT: what it is and how cybercriminals are using it"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2153"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2154"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}