{"id":17138,"date":"2021-10-13T14:57:21","date_gmt":"2021-10-13T17:57:21","guid":{"rendered":"https:\/\/ostec.blog\/?p=17138"},"modified":"2021-10-13T14:57:21","modified_gmt":"2021-10-13T17:57:21","slug":"bulletprooflink-un-grupo-de-phishing-as-a-service-phaas","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/","title":{"rendered":"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS)"},"content":{"rendered":"<p>Mientras investigaba ataques de <a href=\"https:\/\/ostec.blog\/es\/generico\/brasil-es-uno-de-los-lideres-mundiales-en-ataques-de-phishing\/\">phishing <\/a>recientes, Microsoft identific\u00f3 BulletProofLink, una operaci\u00f3n de phishing-as-a-service (PhaaS) a gran escala, que es la fuerza motriz por detr\u00e1s de una buena parte de campa\u00f1as de phishing y tiene como objetivo a innumerables organizaciones. <\/p>\n<p>El grupo detr\u00e1s del BulletProofLink (que tambi\u00e9n es conocido como BulletProftLink y Anthrax) le ofrece a los cibercriminales varios servicios, que abarcan desde la venta de kits de phishing y modelos de correos electr\u00f3nicos, hasta servicios hospedaje y automatizaci\u00f3n con un pago \u00fanico o modelo de negocios basado en una suscripci\u00f3n mensual.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/21\/catching-the-big-fish-analyzing-a-large-scale-phishing-as-a-service-operation\/\">Seg\u00fan el equipo de inteligencia de Microsoft 365<\/a>, cuando investigaron los ataques de phishing, se encontraron con una campa\u00f1a que us\u00f3 un alto volumen de subdominios reci\u00e9n creados. <\/p>\n<p>Con m\u00e1s de 100 modelos de phishing disponibles, que imitan marcas y servicios conocidos. La operaci\u00f3n BulletProofLink es responsable de muchas de las campa\u00f1as de phishing que hoy causan impacto en empresas, dice Microsoft. <\/p>\n<p>BulletProofLink fue identificado por primera vez en octubre del 2020, por OSINT Fans, que public\u00f3 una serie, (<a href=\"https:\/\/osint.fans\/bulletproftlink-phishing-service-p1\">parte 1<\/a>, <a href=\"https:\/\/osint.fans\/bulletproftlink-phishing-service-p2\">parte 2<\/a>, <a href=\"https:\/\/osint.fans\/bulletproftlink-phishing-service-p3\">parte 3<\/a>) exponiendo algunos de los trabajos internos de esta operaci\u00f3n de PhaaS. <\/p>\n<p>OSINT revel\u00f3 que el grupo BulletProftLink en el ICQ tuvo 1.618 miembros solamente el a\u00f1o pasado. Todos eran potenciales compradores de contrase\u00f1as robadas y de servicios de phishing de BulletProftLink.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/BPL-PhaaS.png\" alt=\"BulletProofLink\" \/><br \/>\nImagem\/Reprodu\u00e7\u00e3o: Microsoft<\/p>\n<h2>Doble Robo<\/h2>\n<p>Las campa\u00f1as de phishing a gran escala habilitadas por el BulletProofLink tambi\u00e9n usan una especie de \u201cDoble Robo\u201d, un m\u00e9todo destinado a aumentar las ganancias de quien amenaza, de forma muy parecida a la doble extorsi\u00f3n usada por grupos de ransomware. <\/p>\n<p>En este caso, el doble robo al que Microsoft se refiere es una t\u00e1ctica en la cual las credenciales robadas en ataques de phishing tambi\u00e9n son enviadas a un servidor secundario controlado por operadores de PhaaS, en el caso que los kits de phishing utilizados en la campa\u00f1a se usaran con su configuraci\u00f3n padr\u00f3n. <\/p>\n<p>O sea, si los cibercriminales, que usan sus servicios, no personalizan los kits de phishing para ex-filtrar datos robados, solo para sus propios servidores, las credenciales recolectadas por los clientes de BulletProofLink tambi\u00e9n son enviadas para la operadora de PhaaS.<\/p>\n<p>Microsoft dice que, tanto en el ransomware como en el phishing, los operadores que proveen los recursos para facilitar los ataques maximizan la rentabilidad, garantizando que datos, acceso y credenciales robados sean utilizados de todas las maneras posibles. <\/p>\n<p>Eso es lo que sucede con el kit de phishing de BulletProofLink. Y, si los invasores que usan el servicio recibieron credenciales y logs al finalizar una semana, en vez de realizar sus propias campa\u00f1as, el operador de PhaaS mantiene el control de todas las credenciales que revende.<\/p>\n<p>Esa es la t\u00e1ctica para aumentar los lucros de PhaaS sin mucho esfuerzo, motiv\u00e1ndolos mucho m\u00e1s y financiando su operaci\u00f3n continua.  <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/Phishing-attack-chain-of-BulletProofLink-enabled-campaigns.png\" alt=\"campain BulletProofLink\" \/><br \/>\nCadena de ataques de phishing de campa\u00f1as habilitadas para BulletProofLink. Imagen\/Reproducci\u00f3n: Microsoft<\/p>\n<h2>Abuso de subdominios infinitos<\/h2>\n<p>El grupo tambi\u00e9n usa la t\u00e9cnica que Microsoft llama: \u201cabuso de subdominio infinito\u201d, que hace posible que los invasores atribuyan URLs exclusivos para cada destinatario de phishing, usando un solo dominio \u00fanico, comprometido o comprado antes de los ataques. <\/p>\n<p>Esa es una t\u00e1ctica utilizada cuando los cibercriminales pueden comprometer el DNS de un sitio web o cuando los sitios web comprometidos son configurados usando un DNS que permite subdominios ilimitados. <\/p>\n<p>Ese abuso de subdominios infinitos es una t\u00e1ctica cada vez m\u00e1s popular, visto que minimiza el esfuerzo invirtiendo en una campa\u00f1a de phishing mientras maximiza el n\u00famero de dominios exclusivos disponibles, listos para ser implantados en cualquier momento. <\/p>\n<p>Adem\u00e1s, Microsoft afirma que la creaci\u00f3n de URLs exclusivos representa un desaf\u00edo para los m\u00e9todos de mitigaci\u00f3n y detecci\u00f3n que dependen exclusivamente de la correspondencia exacta para dominios y URLs. <\/p>\n<p>Fonte: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/21\/catching-the-big-fish-analyzing-a-large-scale-phishing-as-a-service-operation\/\">Microsoft<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mientras investigaba ataques de phishing recientes, Microsoft identific\u00f3 BulletProofLink, una operaci\u00f3n de phishing-as-a-service (PhaaS) a gran escala, que es la fuerza motriz por detr\u00e1s de una buena parte de campa\u00f1as de phishing y tiene como objetivo a innumerables organizaciones. El grupo detr\u00e1s del BulletProofLink (que tambi\u00e9n es conocido como BulletProftLink y Anthrax) le ofrece a [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":17060,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019,1025],"tags":[1889],"class_list":["post-17138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","category-noticias-es","tag-phishing-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS) - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS) - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Mientras investigaba ataques de phishing recientes, Microsoft identific\u00f3 BulletProofLink, una operaci\u00f3n de phishing-as-a-service (PhaaS) a gran escala, que es la fuerza motriz por detr\u00e1s de una buena parte de campa\u00f1as de phishing y tiene como objetivo a innumerables organizaciones. El grupo detr\u00e1s del BulletProofLink (que tambi\u00e9n es conocido como BulletProftLink y Anthrax) le ofrece a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-13T17:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS)\",\"datePublished\":\"2021-10-13T17:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\"},\"wordCount\":668,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg\",\"keywords\":[\"phishing\"],\"articleSection\":[\"Gen\u00e9rico\",\"Not\u00edcias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\",\"name\":\"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS) - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg\",\"datePublished\":\"2021-10-13T17:57:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg\",\"width\":928,\"height\":534,\"caption\":\"anzol sobre triangulo vetorizado\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS) - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/","og_locale":"es_ES","og_type":"article","og_title":"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS) - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Mientras investigaba ataques de phishing recientes, Microsoft identific\u00f3 BulletProofLink, una operaci\u00f3n de phishing-as-a-service (PhaaS) a gran escala, que es la fuerza motriz por detr\u00e1s de una buena parte de campa\u00f1as de phishing y tiene como objetivo a innumerables organizaciones. El grupo detr\u00e1s del BulletProofLink (que tambi\u00e9n es conocido como BulletProftLink y Anthrax) le ofrece a [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2021-10-13T17:57:21+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS)","datePublished":"2021-10-13T17:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/"},"wordCount":668,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg","keywords":["phishing"],"articleSection":["Gen\u00e9rico","Not\u00edcias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/","url":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/","name":"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS) - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg","datePublished":"2021-10-13T17:57:21+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/09\/anzol.jpg","width":928,"height":534,"caption":"anzol sobre triangulo vetorizado"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/bulletprooflink-un-grupo-de-phishing-as-a-service-phaas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"BulletProoflink, un grupo de Phishing-as-a-Service (PhaaS)"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/17138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=17138"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/17138\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/17060"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=17138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=17138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=17138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}