{"id":1188,"date":"2018-05-24T18:02:03","date_gmt":"2018-05-24T18:02:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/28984\/FBI-Seeks-To-Thwart-Cyber-Attack-On-Ukraine.html"},"modified":"2018-05-24T18:02:03","modified_gmt":"2018-05-24T18:02:03","slug":"fbi-seeks-to-thwart-cyber-attack-on-ukraine","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/","title":{"rendered":"FBI Seeks To Thwart Cyber Attack On Ukraine"},"content":{"rendered":"<figure class=\"media-landscape has-caption full-width lead\"><span class=\"image-and-copyright-container\"> <img loading=\"lazy\" decoding=\"async\" class=\"js-image-replace\" alt=\"Replica of Champions League trophy\" src=\"https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/14368\/production\/_101729728_046990477-1.jpg\" width=\"976\" height=\"549\"\/><span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Reuters<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> The Champions League final between Liverpool and Real Madrid takes place in Kiev on Saturday <\/span> <\/figcaption><\/figure>\n<p class=\"story-body__introduction\">Preparations for a cyber-attack on Ukraine have been thwarted by the FBI.<\/p>\n<p>It seized a website that was helping communicate with home routers infected with malware that would carry out the digital bombardment.<\/p>\n<p>More than 500,000 routers in 54 countries had been infected by the &#8220;dangerous&#8221; malware and the FBI is now trying to clean up infected machines.<\/p>\n<p>The Kremlin has denied an allegation by Ukraine that Russia was planning a cyber-attack on the country.<\/p>\n<h2 class=\"story-body__crosshead\">Kill command<\/h2>\n<p>A key step in thwarting the attack came on 23 May when a US court ordered website registrar Verisign to hand over control of the ToKnowAll.com domain to the FBI. <\/p>\n<p>Infected machines regularly contacted that domain to update the malware with which they were infected. <\/p>\n<p>By taking control of the domain, the FBI will be able to log the location of infected machines and co-ordinate efforts to clean them up.<\/p>\n<p>A state-sponsored group known as Sofacy\/Fancy Bear has been identified as both developing the malware and preparing the attack.<\/p>\n<p>&#8220;This operation is the first step in the disruption of a botnet that provides the Sofacy actors with an array of capabilities that could be used for a variety of malicious purposes,&#8221; said John Demers, assistant attorney general for National Security, in a statement.<\/p>\n<p>Details of the preparation were shared by Cisco&#8217;s Talos security team which said it had been monitoring the &#8220;advanced, state-sponsored&#8221; attack for months. In a blog it said malware, which it dubbed <a href=\"https:\/\/blog.talosintelligence.com\/2018\/05\/VPNFilter.html\" class=\"story-body__link-external\">VPNFilter, used several sophisticated methods<\/a> to compromise routers. <\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Reuters<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> Ukraine&#8217;s energy grid has been attacked twice by hackers <\/span> <\/figcaption><\/figure>\n<p>In particular, it said, the malicious software had been coded to survive even when infected devices were turned off and on. In the past, infected devices have only needed a reboot to remove the malicious code.<\/p>\n<p>Cisco added that the malware included a &#8220;kill&#8221; command that would render devices unusable if it were used.<\/p>\n<p>In all, 14 models of home routers made by Linksys, Mikrotik, Negear and Qnap were targeted by the malware. Cisco said it had seen widespread scans seeking out routers with known vulnerabilities that the malware could exploit. <\/p>\n<p>Cleaning out the infection involves returning devices to their initial factory settings. Users are also being urged to update the firmware on their router to remove vulnerabilities exploited by the malware. <\/p>\n<p>Cisco said it went public with the information it had gathered because earlier this month it saw a sudden spike in scanning and a particular focus on home routers in Ukraine. The VPNFilter code shares some similarities with the Black Energy malware used in attacks on Ukraine&#8217;s power grid.<\/p>\n<p>The target of the expected attack is not clear but <a href=\"https:\/\/www.reuters.com\/article\/us-cyber-routers-ukraine\/cyber-firms-warn-on-suspected-russian-plan-to-attack-ukraine-idUSKCN1IO1U9\" class=\"story-body__link-external\">Reuters suggested the network<\/a> of infected machines could be used to cause disruption on Saturday when the Champions League final is played in Kiev.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/28984\/FBI-Seeks-To-Thwart-Cyber-Attack-On-Ukraine.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[726],"class_list":["post-1188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusacyberwarfbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FBI Seeks To Thwart Cyber Attack On Ukraine 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI Seeks To Thwart Cyber Attack On Ukraine 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-24T18:02:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"320\" \/>\n\t<meta property=\"og:image:height\" content=\"180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"FBI Seeks To Thwart Cyber Attack On Ukraine\",\"datePublished\":\"2018-05-24T18:02:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg\",\"keywords\":[\"headline,government,usa,cyberwar,fbi\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/\",\"name\":\"FBI Seeks To Thwart Cyber Attack On Ukraine 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg\",\"datePublished\":\"2018-05-24T18:02:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg\",\"width\":320,\"height\":180},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,cyberwar,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusacyberwarfbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"FBI Seeks To Thwart Cyber Attack On Ukraine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FBI Seeks To Thwart Cyber Attack On Ukraine 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/","og_locale":"en_US","og_type":"article","og_title":"FBI Seeks To Thwart Cyber Attack On Ukraine 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-24T18:02:03+00:00","og_image":[{"width":320,"height":180,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"FBI Seeks To Thwart Cyber Attack On Ukraine","datePublished":"2018-05-24T18:02:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/"},"wordCount":501,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg","keywords":["headline,government,usa,cyberwar,fbi"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/","url":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/","name":"FBI Seeks To Thwart Cyber Attack On Ukraine 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg","datePublished":"2018-05-24T18:02:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/fbi-seeks-to-thwart-cyber-attack-on-ukraine.jpg","width":320,"height":180},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fbi-seeks-to-thwart-cyber-attack-on-ukraine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,cyberwar,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusacyberwarfbi\/"},{"@type":"ListItem","position":3,"name":"FBI Seeks To Thwart Cyber Attack On Ukraine"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1188"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1188\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1189"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}