{"id":47502,"date":"2019-05-09T16:35:42","date_gmt":"2019-05-09T21:35:42","guid":{"rendered":"https:\/\/nodored.com\/blog\/?p=47502"},"modified":"2022-05-05T14:51:10","modified_gmt":"2022-05-05T19:51:10","slug":"la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada","status":"publish","type":"post","link":"https:\/\/gigacore.io\/docs\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/","title":{"rendered":"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada"},"content":{"rendered":"\n<p>Las estafas de extorsi\u00f3n sexual se producen cuando un atacante env\u00eda correos electr\u00f3nicos a personas que indican que su computadora ha sido pirateada y que los atacantes han estado grabando la pantalla y la c\u00e1mara web mientras el usuario visita sitios de adultos. Los estafadores luego chantajean a los destinatarios indicando que lanzar\u00e1n los videos si no reciben un pago en bitcoins.<\/p>\n\n\n\n<p>Estas estafas se han vuelto muy rentables, ya que los estafadores ganan m\u00e1s de $ 50K en una semana, y esta nueva variante no es diferente. Seg\u00fan los informes de Dani\u00ebl Verlaan, esta nueva variante se vio por primera vez dirigida a las v\u00edctimas en los Pa\u00edses Bajos, donde los estafadores ganaron 40.000 \u20ac.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"894\" height=\"728\" src=\"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2021\/04\/sextorcion.jpg\" alt=\"sextorcion\" class=\"wp-image-54250\" srcset=\"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2021\/04\/sextorcion.jpg 894w, https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2021\/04\/sextorcion-300x244.jpg 300w, https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2021\/04\/sextorcion-768x625.jpg 768w, https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2021\/04\/sextorcion-368x300.jpg 368w, https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2021\/04\/sextorcion-624x508.jpg 624w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><figcaption>Ejemplo de un intento de estafa por sextorsion<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Spoofing: T\u00e9cnica de suplantaci\u00f3n de identidad<\/h3>\n\n\n\n<p>El \u00e9xito en este tipo de correos, es que aparentemente el correo llega desde tu misma direcci\u00f3n de correo. Esto se hace mediante una t\u00e9cnica conocida como <em>spoofing<\/em>,  con la cual el atacante hace creer a la v\u00edctima que la misma ha sido comprometida y se encuentra en poder del atacante.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00bfQue debes hacer?<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">1. No interact\u00faes con el atacante<\/h4>\n\n\n\n<p>Antes de continuar recomendamos <strong>no responder&nbsp;los correos de este estilo<\/strong> ni abrir sus adjuntos, y entender que se trata de un enga\u00f1o; por supuesto, <strong>tampoco se debe pagar a los atacantes<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. Toma el camino de la prevenci\u00f3n<\/h4>\n\n\n\n<p>Aplica las buenas pr\u00e1cticas en el uso del correo electr\u00f3nico como cambiar las contrase\u00f1as de manera regular, colocar claves seguras, utilizar soluciones de seguridad en los equipos, as\u00ed como habilitar las  opciones de doble autenticaci\u00f3n disponibles en los diferentes servicios  de Internet.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. Activa la autenticaci\u00f3n en tu correo empresarial<\/h4>\n\n\n\n<p>Para mitigar este ataque debes habilitar los registros DKIM y SPF (El SPF debe tener el mecanismo de Fallo Severo o \u00abHard-Fail\u00bb)<\/p>\n\n\n\n<p><strong>DKIM <\/strong><\/p>\n\n\n\n<p>DKIM permite al servidor verificar el correo electr\u00f3nico entrante y evitar los mensajes de spam entrantes. Esta caracter\u00edstica garantiza que los mensajes entrantes est\u00e9n sin modificar y sean realmente del remitente indicado. <\/p>\n\n\n\n<p> <strong>SPF <\/strong><\/p>\n\n\n\n<p>El sistema SPF permite autorizar a los servidores y direcciones IP para enviar el correo desde tu dominio. Esta caracter\u00edstica ayuda a evitar la  suplantaci\u00f3n de identidad. <\/p>\n\n\n\n<p><strong>Pasos para habilitar estos registros: <\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Inicia sesi\u00f3n en cPanel <\/li><li>En la secci\u00f3n Correo electr\u00f3nico, da clic en \u00abEmail Deliverability\u00bb <\/li><li>Click en \u00abAdministrar\u00bb al frente del dominio que deseas gestionar<\/li><li>En DKIM clic en \u00abActivar\u00bb <\/li><li>En SPF, da clic en \u00abActivar\u00bb <\/li><li>Ve a la secci\u00f3n \u00abZone Editor\u00bb en cPanel. <\/li><li>Busca el registro  \u00abSPF\u00bb <\/li><li>Cambia \u00ab~all\u00bb a \u00ab-all\u00bb para configurar el mecanismo Hard-Fail<\/li><\/ol>\n\n\n\n<p>Adem\u00e1s de eso, es recomendable que SpamAssassin este habilitado en las  cuentas para que los registros SPF se puedan procesar con \u00e9xito.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las estafas de extorsi\u00f3n sexual se producen cuando un atacante env\u00eda correos electr\u00f3nicos a personas que indican que su computadora ha sido pirateada y que los atacantes han estado grabando la pantalla y la c\u00e1mara web mientras el usuario visita sitios de adultos. Los estafadores luego chantajean a los destinatarios&#8230;<\/p>\n","protected":false},"author":3073,"featured_media":61773,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62,53,102],"tags":[100,101],"class_list":["post-47502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-email","category-sextorcion","tag-sextorcion","tag-spoofing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada - Documentacion Gigacore<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada - Documentacion Gigacore\" \/>\n<meta property=\"og:description\" content=\"Las estafas de extorsi\u00f3n sexual se producen cuando un atacante env\u00eda correos electr\u00f3nicos a personas que indican que su computadora ha sido pirateada y que los atacantes han estado grabando la pantalla y la c\u00e1mara web mientras el usuario visita sitios de adultos. Los estafadores luego chantajean a los destinatarios...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/\" \/>\n<meta property=\"og:site_name\" content=\"Documentacion Gigacore\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gigacore.io\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-09T21:35:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-05T19:51:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aprende.gigacore.io\/wp-content\/uploads\/2019\/05\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alexis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/\"},\"author\":{\"name\":\"Alexis\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/person\\\/7feb6a17d7f57a767169bd3c83225b2d\"},\"headline\":\"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada\",\"datePublished\":\"2019-05-09T21:35:42+00:00\",\"dateModified\":\"2022-05-05T19:51:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/\"},\"wordCount\":489,\"publisher\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png\",\"keywords\":[\"sextorcion\",\"spoofing\"],\"articleSection\":[\"Ciberseguridad\",\"Email\",\"Sextorcion\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/\",\"url\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/\",\"name\":\"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada - Documentacion Gigacore\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png\",\"datePublished\":\"2019-05-09T21:35:42+00:00\",\"dateModified\":\"2022-05-05T19:51:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png\",\"contentUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png\",\"width\":1000,\"height\":250,\"caption\":\"la estafa de sextorcion que pretende venir de tu propia cuenta de correo electronico hackeada nodored hosting dominios web\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/aprende.gigacore.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#website\",\"url\":\"https:\\\/\\\/aprende.gigacore.io\\\/\",\"name\":\"Documentacion Gigacore\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aprende.gigacore.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#organization\",\"name\":\"Gigacore\",\"url\":\"https:\\\/\\\/aprende.gigacore.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-cropped-cropped-aprende.png\",\"contentUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-cropped-cropped-aprende.png\",\"width\":444,\"height\":111,\"caption\":\"Gigacore\"},\"image\":{\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gigacore.io\",\"https:\\\/\\\/youtube.com\\\/@gigacore-io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aprende.gigacore.io\\\/#\\\/schema\\\/person\\\/7feb6a17d7f57a767169bd3c83225b2d\",\"name\":\"Alexis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/litespeed\\\/avatar\\\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363\",\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/litespeed\\\/avatar\\\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363\",\"contentUrl\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/wp-content\\\/litespeed\\\/avatar\\\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363\",\"caption\":\"Alexis\"},\"description\":\"CTO | Director de Operaciones y Tecnolog\u00eda en NODORED.COM\",\"sameAs\":[\"https:\\\/\\\/gigacore.io\\\/docs\"],\"url\":\"https:\\\/\\\/gigacore.io\\\/docs\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada - Documentacion Gigacore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/","og_locale":"es_ES","og_type":"article","og_title":"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada - Documentacion Gigacore","og_description":"Las estafas de extorsi\u00f3n sexual se producen cuando un atacante env\u00eda correos electr\u00f3nicos a personas que indican que su computadora ha sido pirateada y que los atacantes han estado grabando la pantalla y la c\u00e1mara web mientras el usuario visita sitios de adultos. Los estafadores luego chantajean a los destinatarios...","og_url":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/","og_site_name":"Documentacion Gigacore","article_publisher":"https:\/\/www.facebook.com\/gigacore.io","article_published_time":"2019-05-09T21:35:42+00:00","article_modified_time":"2022-05-05T19:51:10+00:00","og_image":[{"width":1000,"height":250,"url":"https:\/\/aprende.gigacore.io\/wp-content\/uploads\/2019\/05\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png","type":"image\/png"}],"author":"Alexis","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alexis","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#article","isPartOf":{"@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/"},"author":{"name":"Alexis","@id":"https:\/\/aprende.gigacore.io\/#\/schema\/person\/7feb6a17d7f57a767169bd3c83225b2d"},"headline":"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada","datePublished":"2019-05-09T21:35:42+00:00","dateModified":"2022-05-05T19:51:10+00:00","mainEntityOfPage":{"@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/"},"wordCount":489,"publisher":{"@id":"https:\/\/aprende.gigacore.io\/#organization"},"image":{"@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#primaryimage"},"thumbnailUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2019\/05\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png","keywords":["sextorcion","spoofing"],"articleSection":["Ciberseguridad","Email","Sextorcion"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/","url":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/","name":"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada - Documentacion Gigacore","isPartOf":{"@id":"https:\/\/aprende.gigacore.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#primaryimage"},"image":{"@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#primaryimage"},"thumbnailUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2019\/05\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png","datePublished":"2019-05-09T21:35:42+00:00","dateModified":"2022-05-05T19:51:10+00:00","breadcrumb":{"@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#primaryimage","url":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2019\/05\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png","contentUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2019\/05\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada-nodored-hosting-dominios-web.png","width":1000,"height":250,"caption":"la estafa de sextorcion que pretende venir de tu propia cuenta de correo electronico hackeada nodored hosting dominios web"},{"@type":"BreadcrumbList","@id":"https:\/\/aprende.gigacore.io\/la-estafa-de-sextorcion-que-pretende-venir-de-tu-propia-cuenta-de-correo-electronico-hackeada\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/aprende.gigacore.io\/"},{"@type":"ListItem","position":2,"name":"La estafa de sextorcion que pretende venir de tu propia cuenta de correo electr\u00f3nico hackeada"}]},{"@type":"WebSite","@id":"https:\/\/aprende.gigacore.io\/#website","url":"https:\/\/aprende.gigacore.io\/","name":"Documentacion Gigacore","description":"","publisher":{"@id":"https:\/\/aprende.gigacore.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aprende.gigacore.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/aprende.gigacore.io\/#organization","name":"Gigacore","url":"https:\/\/aprende.gigacore.io\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/aprende.gigacore.io\/#\/schema\/logo\/image\/","url":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2024\/06\/cropped-cropped-cropped-aprende.png","contentUrl":"https:\/\/gigacore.io\/docs\/wp-content\/uploads\/2024\/06\/cropped-cropped-cropped-aprende.png","width":444,"height":111,"caption":"Gigacore"},"image":{"@id":"https:\/\/aprende.gigacore.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gigacore.io","https:\/\/youtube.com\/@gigacore-io"]},{"@type":"Person","@id":"https:\/\/aprende.gigacore.io\/#\/schema\/person\/7feb6a17d7f57a767169bd3c83225b2d","name":"Alexis","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/gigacore.io\/docs\/wp-content\/litespeed\/avatar\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363","url":"https:\/\/gigacore.io\/docs\/wp-content\/litespeed\/avatar\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363","contentUrl":"https:\/\/gigacore.io\/docs\/wp-content\/litespeed\/avatar\/a1656afde93f7d145dac822480506dcf.jpg?ver=1777431363","caption":"Alexis"},"description":"CTO | Director de Operaciones y Tecnolog\u00eda en NODORED.COM","sameAs":["https:\/\/gigacore.io\/docs"],"url":"https:\/\/gigacore.io\/docs\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/posts\/47502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/users\/3073"}],"replies":[{"embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/comments?post=47502"}],"version-history":[{"count":0,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/posts\/47502\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/media\/61773"}],"wp:attachment":[{"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/media?parent=47502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/categories?post=47502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gigacore.io\/docs\/wp-json\/wp\/v2\/tags?post=47502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}