{"id":1550,"date":"2018-05-25T14:19:31","date_gmt":"2018-05-25T14:19:31","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132275"},"modified":"2018-05-25T14:19:31","modified_gmt":"2018-05-25T14:19:31","slug":"attackers-cashing-in-on-cryptocurrency-with-increased-scams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/","title":{"rendered":"Attackers Cashing In On Cryptocurrency With Increased Scams"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>As the popularity around cryptocurrency has continued to boom in 2018, it has also tempting target for cash-hungry scammers to launch \u201ccryptocurrency giveaway scams.\u201d<\/p>\n<p>Researchers at Proofpoint this week said they\u2019ve observed a sharp rise in these scams, which target users of Ethereum and Bitcoin and typically request that victims send a small amount of the currency in exchange for a much larger payout in the same cryptocurrency.<\/p>\n<p>The scams, which peaked in April, are an easy way for attackers to prey on the hype around cryptocurrency \u2013 with one observed scammer making away with more than $21,000, said Proofpoint.<\/p>\n<p>\u201cThe success of this scam shows that threat actors continue to look for new ways to exploit\u00a0the human factor \u2013 and people are inclined to fall for scams that can net them hot commodities like cryptocurrencies,\u201d wrote Proofpoint in a <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/money-nothing-cryptocurrency-giveaways-net-thousands-scammers-0\">post<\/a> about the scam on Wednesday.<\/p>\n<p>These scams typically start with a tweet or an email, which entice potential victims to send cryptocurrency to a wallet with the promise that more will be sent back.\u00a0 These tweets may say things like \u201cThere\u2019s an ongoing promotion by Ethereum that just started! I also wanted to share this awesome news! I\u2019ve personally received 92 ETH after just sending 9.2 ETH!\u201d<\/p>\n<p>As scammers lay the social engineering groundwork, they will also develop fake Twitter accounts impersonating exchanges, developers, and celebrities to try to further prompt users to click.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/25094652\/CRYPTO-SCAM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-132276 alignright\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/25094652\/CRYPTO-SCAM-674x1024.png\" alt=\"\" width=\"411\" height=\"625\"\/><\/a>When a user clicks the link or enters the URL from the image, they are generally taken to a landing page prompting them to send a certain amount of cryptocurrency to a payment address.<\/p>\n<p>The template attempts to establish legitimacy by showing a number of fake transactions, falsely suggesting that large amounts of coins are being sent back to those who send small amounts of coins to the scammer\u2019s wallet, researchers said.<\/p>\n<p>Interestingly,\u00a0 \u201cIn other cases, scammers do not promise rewards but instead emulate crowdfunding models, as in \u2026 a page promising to help free Julian Assange,\u201d according to Proofpoint.<\/p>\n<p>The scam is reportedly working. When researchers investigated some of the wallet addresses associated with the scam, they found that \u201csome of them are growing and do not reflect the \u2018giveaway\u2019 nature of the intended interaction.\u201d Typically, a scammer will also use a new wallet for each scam \u2013 but researchers said they also observed some reuse.<\/p>\n<p>In one case, researchers followed an Ethereum wallet that appeared 10 times in their data. The scammer dumped the wallet on May 5, collecting a fairly hefty amount of $21,700 in earnings.<\/p>\n<p>\u201cSearching through the wallet transactions, it appears that the actors may have better luck phishing with Ethereum as opposed to Bitcoin,\u201d said researchers.<\/p>\n<p>Proofpoint said they would continue to monitor these scams given the rebounding cryptocurrency values. Meanwhile, users should keep a keen eye out for these types of scams.<\/p>\n<p>\u201cAs with most of these scams, if it seems\u00a0to\u00a0good to be true, it probably is, but the appeal of nearly-free cryptocurrency and new approaches to social engineering, primarily via hijacked conversations on social media platforms, are proving too tempting for many users,\u201d they said.<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/132275\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the popularity around cryptocurrency has continued to rise in 2018, it has also paved an easy path for cash-hungry scammers to launch \u201ccryptocurrency giveaway scams.\u201d READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1551,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[21,803,17,18,804,333,355,76,69],"class_list":["post-1550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-cryptocurrency","tag-cryptocurrency-scam","tag-cryptography","tag-hacks","tag-online-scam","tag-scam","tag-social-engineering","tag-twitter","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attackers Cashing In On Cryptocurrency With Increased Scams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers Cashing In On Cryptocurrency With Increased Scams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-25T14:19:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png\" \/>\n\t<meta property=\"og:image:width\" content=\"674\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Attackers Cashing In On Cryptocurrency With Increased Scams\",\"datePublished\":\"2018-05-25T14:19:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/\"},\"wordCount\":525,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png\",\"keywords\":[\"Cryptocurrency\",\"cryptocurrency scam\",\"Cryptography\",\"Hacks\",\"online scam\",\"scam\",\"Social Engineering\",\"twitter\",\"Web Security\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/\",\"name\":\"Attackers Cashing In On Cryptocurrency With Increased Scams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png\",\"datePublished\":\"2018-05-25T14:19:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png\",\"width\":674,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptocurrency\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cryptocurrency\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Attackers Cashing In On Cryptocurrency With Increased Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers Cashing In On Cryptocurrency With Increased Scams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/","og_locale":"en_US","og_type":"article","og_title":"Attackers Cashing In On Cryptocurrency With Increased Scams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-25T14:19:31+00:00","og_image":[{"width":674,"height":1024,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Attackers Cashing In On Cryptocurrency With Increased Scams","datePublished":"2018-05-25T14:19:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/"},"wordCount":525,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png","keywords":["Cryptocurrency","cryptocurrency scam","Cryptography","Hacks","online scam","scam","Social Engineering","twitter","Web Security"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/","url":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/","name":"Attackers Cashing In On Cryptocurrency With Increased Scams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png","datePublished":"2018-05-25T14:19:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/attackers-cashing-in-on-cryptocurrency-with-increased-scams.png","width":674,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/attackers-cashing-in-on-cryptocurrency-with-increased-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cryptocurrency","item":"https:\/\/www.threatshub.org\/blog\/tag\/cryptocurrency\/"},{"@type":"ListItem","position":3,"name":"Attackers Cashing In On Cryptocurrency With Increased Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1550"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1550\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1551"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}