{"id":24068,"date":"2019-01-04T23:35:14","date_gmt":"2019-01-04T23:35:14","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/"},"modified":"2019-01-04T23:35:14","modified_gmt":"2019-01-04T23:35:14","slug":"fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/","title":{"rendered":"Fake &#8216;U&#8217;s! Phishing creeps use homebrew fonts as message ciphers to evade filters"},"content":{"rendered":"<p>A new phishing campaign that uses a custom font to hide its tracks and evade detection has been uncovered.<\/p>\n<p>Security house <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/phishing-template-uses-fake-fonts-decode-content-and-evade-detection\">Proofpoint reports<\/a> this week that miscreants hoping to steal login credentials from customers of &#8220;a major retail bank&#8221; were able to hide their phishing emails from automatic detection tools by seemingly scrambling their messages into gibberish. Once rendered in an email client, the messages appear as coherent text, thanks to a custom font unscrambling the letters.<\/p>\n<p>Proofpoint said the phishing campaign has been in operation since at least May 2018, and is still active.<\/p>\n<p>Here&#8217;s how it works: the page loads a custom font that would, for example, draw the &#8220;A&#8221; as &#8220;E&#8221;, &#8220;B&#8221; as &#8220;H&#8221;, and so on. This creates a primitive substitution cipher fooling security tools looking for certain keywords, as the software would only observe a set of random letters, but the user would see readable text.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/02\/03\/russia_hack.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"lojax\"\/><\/p>\n<h2 title=\"ESET sheds new light on 'Lojax' firmware infection\">Detailed: How Russian government&#8217;s Fancy Bear UEFI rootkit sneaks onto Windows PCs<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/01\/02\/lojax_uefi_rootkit\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;In this case, actors developed a phishing template that uses a custom web font to implement a substitution cypher, among other techniques, to render well-crafted phishing pages for credentials to a major US bank,&#8221; Proofpoint said in its analysis.<\/p>\n<p>&#8220;While the substitution cypher itself is simple, the implementation via web font files appears to be unique, giving phishing actors yet another technique to hide their tracks and defraud consumers.&#8221;<\/p>\n<p>That a phishing page would use a cipher to disguise its actual displayed text is not uncommon, says Proofpoint. Normally, however, that operation is performed through JavaScript. Most browser security tools now know to look for decryption or deobfuscating scripts in a message&#8217;s source code, forcing the hackers in this operation to find another way to obfuscate their text.<\/p>\n<p>The logos used in the fake banking email are also obfuscated. Instead of embedding the actual corporate logos, which might be spotted by anti-phishing systems, they are rendered using scalable vector graphics, so the logo and its source do not appear in the source code<\/p>\n<p>As always, one way to avoid phishing attacks (along with running antivirus and spam filters) is to avoid following links from any unsolicited or suspicious emails that purport to be from your bank. If in doubt, users can always open a new browser window and manually type in the bank&#8217;s correct address and login to make sure they are on an authentic website. Viewing messages in plain-text will also reveal or neuter any shenanigans. \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/01\/04\/phishing_homebrew_fonts\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>fg xjc dua ihut vyfq, xjc uih jci sfat jg mjggfa A new phishing campaign that uses a custom font to hide its tracks and evade detection has been uncovered.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24069,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-24068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fake &#039;U&#039;s! Phishing creeps use homebrew fonts as message ciphers to evade filters 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake &#039;U&#039;s! Phishing creeps use homebrew fonts as message ciphers to evade filters 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-04T23:35:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fake &#8216;U&#8217;s! Phishing creeps use homebrew fonts as message ciphers to evade filters\",\"datePublished\":\"2019-01-04T23:35:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\"},\"wordCount\":432,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\",\"name\":\"Fake 'U's! Phishing creeps use homebrew fonts as message ciphers to evade filters 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg\",\"datePublished\":\"2019-01-04T23:35:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fake &#8216;U&#8217;s! Phishing creeps use homebrew fonts as message ciphers to evade filters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake 'U's! Phishing creeps use homebrew fonts as message ciphers to evade filters 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/","og_locale":"en_US","og_type":"article","og_title":"Fake 'U's! Phishing creeps use homebrew fonts as message ciphers to evade filters 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-04T23:35:14+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fake &#8216;U&#8217;s! Phishing creeps use homebrew fonts as message ciphers to evade filters","datePublished":"2019-01-04T23:35:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/"},"wordCount":432,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/","url":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/","name":"Fake 'U's! Phishing creeps use homebrew fonts as message ciphers to evade filters 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg","datePublished":"2019-01-04T23:35:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fake-us-phishing-creeps-use-homebrew-fonts-as-message-ciphers-to-evade-filters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Fake &#8216;U&#8217;s! Phishing creeps use homebrew fonts as message ciphers to evade filters"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24068"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24069"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}