{"id":24836,"date":"2019-01-31T15:42:53","date_gmt":"2019-01-31T15:42:53","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29770\/Insider-Trading-Schemes-Appear-To-Be-The-New-Hacker-Hotness.html"},"modified":"2019-01-31T15:42:53","modified_gmt":"2019-01-31T15:42:53","slug":"insider-trading-schemes-appear-to-be-the-new-hacker-hotness","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/","title":{"rendered":"Insider Trading Schemes Appear To Be The New Hacker Hotness"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2019\/01\/31\/8824a069-4cf9-4019-8f84-2f33a6f18c2d\/thumbnail\/770x578\/fcb8cd49d227122df17b10f995365813\/screenshot-2019-01-31-at-10-07-53.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Black hat hackers and white collar workers with a dubious moral code are teaming up in schemes designed to acquire valuable corporate data to sell in underground marketplaces.<\/p>\n<p>It was <a href=\"https:\/\/www.zdnet.com\/article\/us-charges-ukrainian-for-sec-2016-hack-others-for-insider-trading\/\" target=\"_blank\">earlier this month<\/a> when the US Securities and Exchange Commission (SEC) charged a Ukrainian national with hacking the agency in order to steal private corporate data from its EDGAR system and pass this valuable information on to other parties who profited by way of insider trading.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>The cyberattacker was also found guilty of hacking three press release newswire services, and at least $1.4 million in profit is believed to have been made through the illegal insider deals.<\/p>\n<p>According to Ken Westin, a Splunk cybersecurity specialist, the increasingly &#8220;cozy&#8221; relationship between these groups, such as in this case, is focused on the monetization of business data.<\/p>\n<p>Insider information can be lucrative as it can give those with confidential data the upper hand in the trading of stocks &amp; shares based on company acquisition and merger plans not yet made public, or give them the edge when investing into products due to receive official approval, alongside many other business deals.<\/p>\n<p>Insider trading is illegal as it gives participants an unfair advantage in the market. However, this information is always valuable &#8212; and may have become even more so as a new business opportunity for cybercriminals in a market which is now saturated with stolen credit card data worth far less than in past years.<\/p>\n<p>Westin outlined an investigation into the evolution of these schemes <a href=\"https:\/\/www.splunk.com\/content\/splunk-blogs\/en\/2019\/01\/29\/black-hats-white-collars-sec-edgar-database-hackers-revealed.html\" target=\"_blank\" rel=\"noopener noreferrer\">in a blog post<\/a>. As the researcher noted, years ago, credit card data which could be stolen and sold on was a key product in underground forums.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The market is still awash with this kind of data, but financial institutions are now beginning to implement more protections and anti-fraud systems, which can make it far less valuable considering cards can quickly be blocked and credit score reports can be used to detect suspicious activity quickly.<\/p>\n<p>It is also worth noting that such information can now be purchased in bulk for as little <a href=\"https:\/\/www.zdnet.com\/article\/the-dark-web-how-much-is-your-bank-account-worth\/\" target=\"_blank\">as a few dollars<\/a>.<\/p>\n<p>These criminal revenue schemes have now evolved into blackmail in the <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" target=\"_blank\">form of ransomware<\/a>, as such data can be monetized more effectively by tapping into the information&#8217;s worth not to external actors, but to the victim themselves.<\/p>\n<p><strong>See also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/facebook-slammed-over-vpn-research-project-that-rewards-teens-for-data\/\" target=\"_blank\">Facebook slammed over covert app that pays teenagers for data<\/a><\/p>\n<p>Over the past year, however, insider trading schemes have risen in popularity, as business-specific information can reach high prices if sold to the right people, albeit illegally.<\/p>\n<p>While investigating this criminal trend, Westin came across a forum which specialized in the trade of insider, non-public information including earnings reports, mergers &amp; acquisitions, FDA approvals, and patient data.<\/p>\n<p>Participants in the forum asked not only for information from insiders but also for hackers that may have access to such data to get in touch.<\/p>\n<p>Delving deeper into this world revealed a &#8220;number of hidden services and forums&#8221; established not only for information requests but to facilitate the sale of insider information.<\/p>\n<p><strong>TechRepublic:\u00a0<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/57-of-it-workers-who-get-phished-dont-change-their-password-behaviors\/\" target=\"_blank\" rel=\"noopener noreferrer\">57% of IT workers who get phished don&#8217;t change their password behaviors<\/a><\/p>\n<p>In some cases, payment was offered through cryptocurrencies, whereas in others, white collar and hacker teams were willing to seal the deal in return for shares in earnings based on traded data.<\/p>\n<p>PR firms, alongside major newswires, were targeted for the data they hold in confidence, and this stolen information &#8212; such as press releases &#8212; was advertised as for sale in these groups.<\/p>\n<p><strong>CNET:\u00a0<\/strong><a href=\"https:\/\/www.cnet.com\/news\/uae-karma-hack-tool-spied-on-iphones-just-by-sending-a-text-report-says\/\" target=\"_blank\" rel=\"noopener noreferrer\">UAE&#8217;s &#8216;Karma&#8217; hack tool spied on iPhones just by sending a text, report says<\/a><\/p>\n<p>&#8220;Initially, access to the data was provided for a fee. However, over time the traders set up accounts for the hackers so they could make more money from their exploits,&#8221; the researcher said.<\/p>\n<p>In the case of the hackers targeting EDGAR, the correlation of logs gathered from SEC, the targeted PR firms, brokers, and the hacker&#8217;s equipment revealed the connections between traders and hackers &#8212; and in such a lucrative market, insider trading made possible through cyberattackers is unlikely to vanish anytime soon as long as money can still be made through the theft of data.\u00a0<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29770\/Insider-Trading-Schemes-Appear-To-Be-The-New-Hacker-Hotness.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24837,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[1683],"class_list":["post-24836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackercybercrimefraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insider Trading Schemes Appear To Be The New Hacker Hotness 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider Trading Schemes Appear To Be The New Hacker Hotness 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-31T15:42:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Insider Trading Schemes Appear To Be The New Hacker Hotness\",\"datePublished\":\"2019-01-31T15:42:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/\"},\"wordCount\":717,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png\",\"keywords\":[\"headline,hacker,cybercrime,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/\",\"name\":\"Insider Trading Schemes Appear To Be The New Hacker Hotness 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png\",\"datePublished\":\"2019-01-31T15:42:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,cybercrime,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackercybercrimefraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Insider Trading Schemes Appear To Be The New Hacker Hotness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insider Trading Schemes Appear To Be The New Hacker Hotness 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/","og_locale":"en_US","og_type":"article","og_title":"Insider Trading Schemes Appear To Be The New Hacker Hotness 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-31T15:42:53+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Insider Trading Schemes Appear To Be The New Hacker Hotness","datePublished":"2019-01-31T15:42:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/"},"wordCount":717,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png","keywords":["headline,hacker,cybercrime,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/","url":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/","name":"Insider Trading Schemes Appear To Be The New Hacker Hotness 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png","datePublished":"2019-01-31T15:42:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/insider-trading-schemes-appear-to-be-the-new-hacker-hotness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,cybercrime,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackercybercrimefraud\/"},{"@type":"ListItem","position":3,"name":"Insider Trading Schemes Appear To Be The New Hacker Hotness"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24836"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24837"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}