{"id":24221,"date":"2019-01-07T21:22:04","date_gmt":"2019-01-07T21:22:04","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/"},"modified":"2019-01-07T21:22:04","modified_gmt":"2019-01-07T21:22:04","slug":"she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/","title":{"rendered":"She will lock you out, livin&#8217; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty"},"content":{"rendered":"<p>A newly spotted piece of hybrid malware steals copies of victims&#8217; files and then encrypts said data, demanding a ransom to unscramble it.<\/p>\n<p>The software nasty, bestowed the moniker Vidar <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/01\/vidar-gandcrab-stealer-and-ransomware-combo-observed-in-the-wild\/\">earlier this month<\/a>, combines the GandCrab ransomware with parts of the Arkei data-harvesting trojan to create a two-pronged attack that, on infected Windows PCs, first copies documents to outside servers, then locks away that personal information with a ransom demand.<\/p>\n<p>According to Malwarebytes researcher Jerome Segura, the infection has been spreading in the wild via malicious advertising being piped into torrent and video streaming sites. The poisoned ads redirect users to a server hosting two exploit kits, Fallout EK and GrandSoft EK, which try to worm their way onto the target&#8217;s computer.<\/p>\n<p>Should the exploit kit succeed in breaking in, it launches the data-stealing component of the infection. Segura said that the data-slurper, which looks to lift things like payment card numbers, site passwords, and cryptocoin wallets, is easy to mistake for the Arkei malware.<\/p>\n<p>&#8220;Upon closer look, while the sample did share a lot of similarities with Arkei (including network events), it was actually a newer and, at the time, not yet publicly described piece of malware now identified as Vidar,&#8221; Segura explained.<\/p>\n<p>After looking to scrape whatever valuable data it can find from the victim&#8217;s machine, the Vidar infection then dials up a control server and launches its second phase: the Gandcrab ransomware.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/06\/15\/shutterstock_told_you_so.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Little girl looks at camera with an I told you so&quot;attitude. \"\/><\/p>\n<h2 title=\"Dr Shifro pays ransom, gets discount and adds its own margin, says Check Point\">He&#8217;s not cracked RSA-1024 encryption, he&#8217;s a very naughty Belarusian ransomware middleman<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/12\/04\/ransomware_helper_was_middleman_dr_shifro\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>If the Vidar infection has been set up to give out the ransomware, the victim&#8217;s machine will then be locked off and the wallpaper changed to a notification on how to pay in order to get the files unencrypted.<\/p>\n<p>Segura&#8217;s says the entire process, from loading up the malicious add to stealing the data and encrypting all of the victim&#8217;s files, takes roughly one minute to complete. The researcher suspects that, in this case, Vidar is using the ransomware as cover for its data-harvesting components.<\/p>\n<p>The idea is that the victim will be so concerned with cleaning up the Gandcrab malware infection that they won&#8217;t notice the malware was also lifting their passwords, payment card numbers, and unique system configuration information.<\/p>\n<p>&#8220;Threat actors can use ransomware for a variety of reasons within their playbook. It could be, for instance, a simple decoy where the real goal is to irreversibly corrupt systems without any way to recover lost data,&#8221; Segura said.<\/p>\n<p>&#8220;But as we see here, it can be coupled with other threats and used as a last payload when other resources have already been exhausted.&#8221; \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/01\/07\/vidar_infection\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>She&#8217;ll make you live her crazy life, but she&#8217;ll take away your pain like a bullet to your wallet A newly spotted piece of hybrid malware steals copies of victims&#8217; files and then encrypts said data, demanding a ransom to unscramble it.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24222,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-24221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>She will lock you out, livin&#039; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"She will lock you out, livin&#039; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-07T21:22:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"She will lock you out, livin&#8217; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty\",\"datePublished\":\"2019-01-07T21:22:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\",\"name\":\"She will lock you out, livin' la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg\",\"datePublished\":\"2019-01-07T21:22:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"She will lock you out, livin&#8217; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"She will lock you out, livin' la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/","og_locale":"en_US","og_type":"article","og_title":"She will lock you out, livin' la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-07T21:22:04+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"She will lock you out, livin&#8217; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty","datePublished":"2019-01-07T21:22:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/"},"wordCount":463,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/","url":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/","name":"She will lock you out, livin' la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg","datePublished":"2019-01-07T21:22:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/she-will-lock-you-out-livin-la-vidar-loca-enterprising-crims-breed-ransomware-file-thief-into-hybrid-nasty\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"She will lock you out, livin&#8217; la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24221"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24222"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}