hlk_logo

"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of whatโ€™s going on, which helps us to make changes and recommendations for future plans."

IT Service Manager
Ian Harkess
Trusted by industry leaders
NHS Confederation Logo

Kickstart Your FastTrack Journey

Fill out the short form below to express your interest in our FastTrack programme, and weโ€™ll be in touch soon.

Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.
ENQUIRY - Popup w/ Fasttrack for dark backgrounds (#28)

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

Keep up to date with the experts

Get insights directly to your email inbox

MAIL LIST - Newsletter, Exit Intent Popup (#13)

Follow us on social

โ€œWe needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.โ€

IT Operations Manager
Simon Darley
Trusted by industry leaders
NHS Confederation Logo White

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)
Expert Intel

The importance of open-source intelligence (OSINT).

Published: September 15, 2022
Updated: October 17, 2025

sam-bracey-profile-pic

Expert: Sam Bracey

Role: SOC Team Lead

Specialises in: Security Operations

What you will learn:
The importance of open source intelligence.
Understanding what information is available about you online can go a long way towards preventing those with malicious intent from exploiting it.

Digital-based infrastructure is regularly under threat and day in, day out, within the Stripe OLT SOC team, we spend our time responding to these threats.ย  The most concerning incidents we face are dedicated campaigns against a particular individual or corporate entity. These campaigns are often built upon a foundation of open-source intelligence (OSINT) gathering.

What is OSINT?

OSINT is defined as โ€œpublicly available information appearing in print or electronic form including radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawingsโ€. For many individuals, vast quantities of information have already been documented within the publicly accessible digital space. Whether it through social media accounts, ancestry websites, government documents or information leaked during data breaches, much of this data is only a few Google searches away.

By utilising this information, those with malicious intentions can leverage various avenues of exploitation to gain access where they shouldnโ€™t. The most common tactic is using gathered intelligence combined with social engineering.

The following scenario details just how personal information online can provide threat actors with the leverage they so desperately seek. This scenario is based on a real-world OSINT case, with key information being obfuscated to provide adequate anonymity.

Real World Scenario

A malicious actor has been searching for a way to exploit a respected financial company, letโ€™s call them, Layton & Blues. But due to a tight security posture enforced by the Layton & Blues IT team, there is very little access that can be gained through remote means. Phishing campaigns and targeted brute-force password attacks have yielded no results.

From reviewing the Layton & Blues LinkedIn page, the threat actor uncovers that “Amanda Tims” (we shall call her) is the IT Manager. A few Google searches and the threat actor discovers Amanda’s Facebook social media account. The account has some security settings in place, hiding information such as her phone number, email, and photo albums. However, her profile photo and posts are publicly available to view, allowing the threat actor to validate Amanda’s identity against her LinkedIn profile photo and snoop through Amanda’s posted content carefree.

It would appear that Amanda has posted a link to Rightmove on her Facebook page. She is in the process of selling her house and is welcoming friends and family to share the post to promote the house sale. The Rightmove property listing shows quality pictures, detailing the bedrooms, living rooms, kitchen, and office. The office pictures show a spacious, well decorated room with a single desk and, oh, what luck,ย a desktop computer underneath it.

As with many different organisations in recent years, Layton & Blues have adopted a hybrid working policy (their marketing team created a great post about it on their website), which means that Amanda spends a lot of her time working from home. As the IT manager, she makes use of her personal high-spec desktop PC which has been properly enrolled into her employerโ€™s digital environment.

The malicious actor now has aย veryย clear avenue of attack. All that is required is technical know-how, the correct tools, and nerve.

Our threat actor contacts Rightmove and poses as a potentially interested cash buyer for Amandaโ€™s property, under a fake name of course. The estate agent handling the sale is extremely helpful in arranging for a viewing at the earliest convenience. The threat actor has leveraged the property listing to build a position of trust and gain access to Amandaโ€™s home address.

For those of you who havenโ€™t attended a house viewing before, estate agents are often more than happy for you to wander around the property unattended. Such an event in this case provides ample opportunity to enter the office and plug a USB tool into the back of Amandaโ€™s desktop.

The next time Amanda boots her computer, any number of malicious attacks could be executed on her device – be it traffic sniffers, keyloggers, or backdoor remote access capabilities, provided the attacker is clever enough to circumvent any local device security controls that are in place. The malicious actor now has explicit access to the IT Managers device and Layton & Blues data.

How can you defend against open-source intelligence (OSINT)?

There are a number of steps within that scenario where the threat actor would have been blocked had Amanda been more aware of her online presence and the fact that she was a high-value target for malicious actors targeting her employer. Enforcing stricter social media security controls in her case would have prevented sensitive information from being easily exposed. Using a personal device or allowing pictures to be posted of her device online was another key weakness.

Regarding defending against OSINT, awareness is everything. Understanding what information is available about you online can go a long way towards preventing those with devious intent from exploiting it. A Professional digital footprint assessments exposes an individualโ€™s digital footprint from the eyes of someone with the skills and tools used by malicious actors. Once youโ€™re aware of exploitable data, the next step is remediation. Removing that data or tightening security controls to prevent public access.

We are seeing increasing examples of OSINT being exploited in the wild. As tools and techniques develop, the threat will increase. OSINT is often overlooked in terms of corporate security posture, itโ€™s crucial that we recognise that criminal elements do and will continue to utilise OSINT alongside classic โ€˜hackerโ€™ tactics.ย 

As the digital working environment evolves it is our responsibility to be aware of our publicly accessible data, and to safeguard it against those that would seek to exploit it.