{"id":24626,"date":"2019-01-24T07:44:00","date_gmt":"2019-01-24T07:44:00","guid":{"rendered":"http:\/\/9ad8fa6c-bb8d-4678-9043-67637d5e522b"},"modified":"2019-01-24T07:44:00","modified_gmt":"2019-01-24T07:44:00","slug":"new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/","title":{"rendered":"New ransomware poses as games and software to trick you into downloading it"},"content":{"rendered":"<p>A new form of ransomware is infecting users around the world by disguising itself as applications or games and tricking victims into downloading and launching it on their PCs.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Anatova ransomware first emerged on January 1 this year and the new code behind it suggests that the cyber criminals distributing it are experienced malware developers.<\/p>\n<p>It displays the ability to morph quickly, with the potential for new evasion tactics and spreading mechanisms to be easily added. <a href=\"https:\/\/www.techrepublic.com\/article\/modular-anatova-ransomware-encrypts-data-as-quickly-as-possible-before-detection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anatova<\/a> also comes equipped with strong encryption, using a pair of RSA keys to lock users out of files \u2014 a tactic also used by some of the most successful ransomware families like <a href=\"https:\/\/www.zdnet.com\/article\/double-trouble-two-pronged-cyber-attack-infects-victims-with-data-stealing-trojan-malware-and-ransomware\/\" target=\"_blank\">GandCrab<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/crysis-ransomware-master-keys-released-to-the-public\/\" target=\"_blank\">Crysis<\/a>.<\/p>\n<p>It&#8217;s because of these capabilities, and how it&#8217;s prepared for modular extension, that security researchers at security company McAfee \u2014\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\" target=\"_blank\" rel=\"noopener noreferrer\">who uncovered the ransomware<\/a>\u00a0\u2014 have warned that Anatova is the work of skilled cyber criminals and has the potential to become a serious threat.<\/p>\n<p>&#8220;Anatova has the potential to become very dangerous with its modular architecture which means that new functionalities can easily be added. The malware is written by experienced authors that have embedded enough functionalities to be sure that typical methods to overcome ransomware will be ineffective,&#8221; said Christiaan Beek, lead scientist and principle engineer at McAfee.<\/p>\n<p>Currently, the largest number of victims is in the US, with the ransomware also being spotted in Belgium, Germany, France, the UK and other European countries.<\/p>\n<p>Spread via peer-to-peer networking, Anatova masquerades as free downloads of games and software to lure unsuspecting victims into downloading ransomware \u2014 although researchers note that it could be spread using other attack vectors in future.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>SEE:\u00a0<a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/\">A winning strategy for cybersecurity<\/a>\u00a0(ZDNet special report) |\u00a0<a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/a-winning-strategy-for-cybersecurity-free-pdf\/\" target=\"_blank\" rel=\"noopener noreferrer\">Download the report as a PDF<\/a>\u00a0(TechRepublic)<\/strong><\/p>\n<p>After the malware is sure it&#8217;s targeting a legitimate system, it will create an RSA Pair of Keys using the crypto API that will cipher all strings, before generating random keys to encrypt the target system and executing the process of fully deploying the ransomware.<\/p>\n<p>Those who become infected with Anatova will find themselves presented with a ransom note\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-the-crooks-are-ditching-bitcoin-and-where-they-are-going-next\/\" target=\"_blank\">demanding a payment in cryptocurrency of 10 Dash<\/a>, around $700, in exchange for unencrypting the files.<\/p>\n<p>A cryptocurrency wallet address is provided for making the payment and the user is told to email the attackers after doing so in order to receive a decryption key. Victims are warned against trying to retrieve the files themselves and that the attack is &#8220;nothing personal, only business&#8221;.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/01\/23\/3432baa7-ca3e-4fcd-aaf1-b9fe3d2f2c77\/846802a8045e59a2c39a71a125cae47c\/anatova-ransomware-note.png\" class=\"\" alt=\"anatova-ransomware-note.png\"\/><\/span><\/p>\n<p><span class=\"caption\">Anatova ransomware note.<\/span><\/p>\n<p><span class=\"credit\">Image: McAfee Labs<\/span><\/p>\n<p>It&#8217;s unknown for certain who is behind this new ransomware, but if the victim is a member of the Commonwealth of Independent States \u2014 made up of former Soviet nations, including Russia \u2014 Anatova will terminate itself.<\/p>\n<p>Anatova also refuses to infect systems in Syria, Egypt, Morocco, Iraq and India, in a move that has befuddled researchers.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/can-russian-hackers-be-stopped-heres-why-it-might-take-20-years\/\" target=\"_blank\" rel=\"noopener noreferrer\">Can Russian hackers be stopped? Here&#8217;s why it might take 20 years<\/a> (TechRepublic cover story) | <a href=\"https:\/\/www.techrepublic.com\/resource-library\/downloads\/can-russian-hackers-be-stopped-here-s-why-it-might-take-20-years-cover-story-pdf\/\" target=\"_blank\" rel=\"noopener noreferrer\">download the PDF version<\/a><\/strong>\u00a0 \u00a0\u00a0<\/p>\n<p>&#8220;It&#8217;s quite normal to see the CIS countries being excluded from execution and often an indicator that the authors might be originating from one of these countries,&#8221; said Alexandre Mundo, senior malware analyst in McAfee&#8217;s advanced threat research team.<\/p>\n<p>&#8220;In this case it was surprising to see the other countries being mentioned. We do not have a clear hypothesis on why these countries in particular are excluded,&#8221; he added.<\/p>\n<p><strong>READ MORE ON CYBER CRIME<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Potent new ransomware appears to be written by experienced cyber criminals and displays some of the same abilities as some of the most powerful families around.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24627,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-24626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New ransomware poses as games and software to trick you into downloading it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New ransomware poses as games and software to trick you into downloading it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-24T07:44:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png\" \/>\n\t<meta property=\"og:image:width\" content=\"974\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New ransomware poses as games and software to trick you into downloading it\",\"datePublished\":\"2019-01-24T07:44:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\",\"name\":\"New ransomware poses as games and software to trick you into downloading it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png\",\"datePublished\":\"2019-01-24T07:44:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png\",\"width\":974,\"height\":466},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New ransomware poses as games and software to trick you into downloading it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New ransomware poses as games and software to trick you into downloading it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/","og_locale":"en_US","og_type":"article","og_title":"New ransomware poses as games and software to trick you into downloading it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-24T07:44:00+00:00","og_image":[{"width":974,"height":466,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New ransomware poses as games and software to trick you into downloading it","datePublished":"2019-01-24T07:44:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/"},"wordCount":585,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/","url":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/","name":"New ransomware poses as games and software to trick you into downloading it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png","datePublished":"2019-01-24T07:44:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it.png","width":974,"height":466},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"New ransomware poses as games and software to trick you into downloading it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24626"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24627"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}