{"id":14786,"date":"2018-10-04T19:52:49","date_gmt":"2018-10-04T19:52:49","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/"},"modified":"2018-10-04T19:52:49","modified_gmt":"2018-10-04T19:52:49","slug":"whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/","title":{"rendered":"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve"},"content":{"rendered":"<p>The growing market for commercial malware, the intermingling of state-sponsored agency&#8217;s code and the blurring lines between political and economic attacks are making it harder for researchers to connect attacks with specific groups.<\/p>\n<p>This according to researchers with FireEye, who say that as both government hacking groups and malware marketplaces have become more successful, commercial tools are being increasingly adopted and centralized intelligence agencies are letting groups share attacks.<\/p>\n<p>Traditionally, researchers have sought to identify APT groups by looking at multiple attacks and finding &#8216;artifacts&#8217; like re-used code or references to the same domains for command and control operations.<\/p>\n<p>&#8220;The adversary often gives us evidence, when they send a piece of malware they are handing you a piece of forensic evidence to track them,&#8221; explained FireEye&#8217;s John Holtquist.<\/p>\n<p>&#8220;We would find indications or unique artifacts that we could connect because we knew no one else could have access to this information of infrastructure.&#8221;<\/p>\n<p>As groups become more sophisticated, however, they also learn to cover their tracks. Likewise, with underground malware markets more prevalent, developers can write and sell a piece of malware to various groups.<\/p>\n<p>This is particularly the case with Russia, where crafting malware is a cottage industry and hackers that get caught face the choice of prison or cooperating with the government. The result is government hacking groups getting their pick of commercial malware to borrow or repurpose.<\/p>\n<p>&#8220;The security services have the requirement to do this [hacking] work and do all the law enforcement as well,&#8221; noted Holtquist. &#8220;We have seen them pull from the criminal space again and again.&#8221;<\/p>\n<p>Global events can also muddy the waters. One such example is China, where researchers Benjamin Read and Cris Kittner found that the 2016 reorganization of the People&#8217;s Liberation Army caused a hiatus, then re-launching, of China&#8217;s state-backed political and economic hacking campaigns.<\/p>\n<h3 class=\"crosshead\"><span>China crisis<\/span><\/h3>\n<p>Likewise, the Chinese hacking groups that were thought to have disbanded years ago have suddenly reappeared, and with them attacks that were long dormant. In the case of one 2018 attack on an unspecified US shipping company, network intruders sat quietly for more than a year and a half.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/08\/23\/shutterstock_trump.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"czar\"\/><\/p>\n<h2 title=\"Damning report shows Uncle Sam falling behind\">Trump&#8217;s axing of cyber czar role has left gaping holes in US defence<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/09\/27\/us_gov_eyes_off_the_cyber_security_prize\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;They set up a backdoor, and all you see for the next 18 months is someone checking the back door a couple times a month, then suddenly they moved in and got data,&#8221; said Read. &#8220;It is not just that we see these gaps, but we see on-network activity pausing too.&#8221;<\/p>\n<p>To make matters worse, financial hacking groups are also becoming more sophisticated and difficult to distinguish. Researchers Kimberly Goody and Nart Villaneuve said that financial attacks, like heists on the SWIFT transaction system or ATM &#8216;jackpotting&#8217; attacks, use the sort of complex operations previously only undertaken by government groups.<\/p>\n<p>&#8220;Due to the profitability of these attacks where you can make millions of dollars in one operation,&#8221; said Goody, &#8220;and due to the growing sophistication of criminals, this is a trend we expect to see continue.&#8221;<\/p>\n<p>Mea culpa: Some of the blame also falls on us hacks. Goody and Villaneuve note that when attacks occur, articles can also confuse the attacks from the tools. In the case of the this year&#8217;s attacks on Ticketmaster, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/09\/12\/feedify_magecart_javascript_library_hacked\/\">Feedify<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/09\/11\/british_airways_website_scripts\/\">British Airways<\/a>, for example, the MageCart malware was used each time, likely by different groups with different aims rather than one party devoted entirely to MageCart.<\/p>\n<p>Rather than look to link infections with groups, the researchers suggest people separate the two, and understand that these days a piece of malware itself isn&#8217;t a giveaway of a specific group, but rather a single tool that might have come from elsewhere. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/10\/04\/cyber_attack_id\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophisticated groups not always so easy to pick out The growing market for commercial malware, the intermingling of state-sponsored agency&#8217;s code and the blurring lines between political and economic attacks are making it harder for researchers to connect attacks with specific groups.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14787,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-14786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-04T19:52:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve\",\"datePublished\":\"2018-10-04T19:52:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/\",\"name\":\"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg\",\"datePublished\":\"2018-10-04T19:52:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/","og_locale":"en_US","og_type":"article","og_title":"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-04T19:52:49+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve","datePublished":"2018-10-04T19:52:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/"},"wordCount":644,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/","url":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/","name":"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg","datePublished":"2018-10-04T19:52:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/whose-hack-is-it-anyway-cyberattack-whodunnits-harder-than-ever-to-solve\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Whose hack is it anyway? Cyberattack whodunnits harder than ever to solve"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14786"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14786\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14787"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}